Home

1000+ Networking MCQ for SSC GD [Solved]

Thursday 9th of March 2023

Sharing is caring

1. If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….
A. Skeleton
B. Private
C. Public
D. Symmetric
Answer : D
2. What is the default port for Telnet?
A. 23
B. 21
C. 25
D. 80
Answer : A
3. Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of
servers?

A. CANCEL
B. ACK
C. OPTIONS
D. PRACK
Answer : C
4. Which layer of the OSI model does a switch operate in?
A. Physical
B. Data-link
C. Network
D. Transport
Answer : B
5. Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.
A. 6
B. 7
C. 2
D. 3
Answer : A
6. ADSL uses high-speed Internet service phone lines
A. True.
B. False.
C.
D.
Answer : A
7. Which of the following algorithms are meant for establishing the paths through the network?
A. Unicast
B. Broadcast
C. Multicast
D. Any cast
Answer : C
8. The network interface layer specifies how to organize data into………………………..and Internet layer specifies the format of …………………….. Sent across an Internet.
A. Bits, message.
B. frame,packet.
C. packet, messge.
D. datagram, packet.
Answer : B
9. What is the distance limitation of Cat5 UTP?
A. 1 km
B. 100 km
C. 100 m
D. 100 foot
Answer : C
10. In ________ routing, the tunnel creates a bridge through areas that do not support
multicast traffic.

A. Internet
B. MBONE
C. Border Gateway Protocol
D. Multicast OSPF
Answer : B
11. Which of the following is used for establishing, configuring, and testing the data-link
Link Control Protocol (LCP)

A. Method
B. Network Control Protocols (NCPs)
C. Link Control Protocol (LCP)
D. File transfer protocol(FTP)
Answer : C
12. Following are the advantages of tree topology
i) Point-to-point wiring for individual segments.
ii) Supported by several hardware and software venders.
iii) Easy to install and wire

A. i) only
B. i) and ii) only
C. iii) only
D. i) ,ii) and iii)
Answer : B
13. Which of the following protocols is not routable?
A. TCP/IP
B. IPX/SPX
C. AppleTalk
D. NetBEUI
Answer : D
14. Select the standard for token ring using token-passing media access.
A. 802.2
B. 802.3
C. 802.5
D. 802.11(b)
Answer : C
15. Which cable type is immune to outside interference and crosstalk?
A. Thinnet
B. Twisted pair
C. Fiber optic
D. Thicknet
Answer : C
16. BGP is …………………………………….routing protocol used to ………………………….routing table.
A. intrautonomous system, update
B. Interautonomous system, update
C. Interautonomous system, create
D. intrautonomous system, create
Answer : B
17. How many 64-Kbps channels are used on an ISDN BRI?
A. 1
B. 2
C. 3
D. 4
Answer : B
18. Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?
A. Port
B. IP address
C. MAC address
D. Frame header
Answer : A
19. _____________ command is used by the client to transfer the job across to the server.
A. Any upper layer protocol
B. User datagram protocol
C. Transmission Control protocol
D. Remote Shell protocol
Answer : D
20. The Hamming Distance for the codes generated using either even or odd parity will be------------------
A. 2
B. 4
C. 1
D. 0
Answer : A
21. This mapping of name to IP address is done by …………………………….
A. Address resolution protocol
B. Domain name server
C. reverse address resolution protocol
D. Ethernet
Answer : B
22. How many 64-Kbps channels are used on an ISDN BRI?
A. 1
B. 2
C. 3
D. 4
Answer : B
23. Which of the following provides control over multimedia sessions?
A. Session Initiation Protocol (SIP)
B. Session Description Protocol (SDP)
C. Session Announcement Protocol (SAP)
D. Real-time Control Protocol (RTCP)
Answer : A
24. Which of the following IP addresses are used by multicast devices?
A. Class D
B. Class C
C. Class B
D. Class A
Answer : A
25. If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization can have at the most……………. networks and each of these networks that can support only…………………...hosts.
A. 1022 networks, 62 hosts.
B. 62 networks, 1022 hosts.
C. 4094 networks, 14 hosts.
D. 14 networks, 4094 hosts.
Answer : A
26. ____________ was developed to support aggregation and summarization of routing
information.

A. Static Routing protocol
B. Enhanced Interior Gateway Routing Protocol (EIGRP)
C. Routing Information Protocol (RIP)
D. Border Gateway Protocol (BGP)
Answer : D
27. What is used to boost a digital signal?
A. amplifier
B. digi-booster
C. multiplexer
D. booster
Answer : D
28. Which of the following use default routes for inter domain routing?
A. Type 2
B. Type 4
C. Type 3
D. Type 1
Answer : B
29. What is the address identified when socket is available at each end of TCP?
A. "<TCP, IP address, socket number>."
B. "<TCP, Host address, port address>."
C. "<TCP, IP address, port number>."
D. "<TCP, Network address, socket address>."
Answer : C
30. Using a class B address maximum of …………………networks can be defined with up to……………………..hosts per networks.
A. 2,097,152-------------254
B. 16,384-----------------65,536
C. 16,384---------------65,534
D. 126--------------------16,777,214
Answer : C
31. Which of the following can translate between dissimilar protocols and network types?
A. Hub
B. Repeater
C. Switch
D. Gateway
Answer : D
32. AppleTalk protocol configures hosts in zones on the network.
A. True.
B. False.
C.
D.
Answer : A
33. What is the code used for Interpret As Command (IAC)?
A. 253
B. 255
C. 240
D. 241
Answer : B
34. Which of the following is also known as IP masquerading?
A. Fiber Distributed Data Interface (FDDI)
B. Network Address Translation (NAT)
C. Classless Inter-Domain Routing (CIDR)
D. None of the above
Answer : B
35. What does a patch cable connect to within an Ethernet network?
A. The patch panel to the hub
B. The patch panel to the wall jack
C. The wall jack to the computer
D. The NIC directly to another computer's NIC
Answer : A
36. Which of the following protocols is described in RFC 793?
A. Address Resolution Protocol (ARP)
B. Transmission Control Protocol (TCP)
C. Bootstrap Protocol (BOOTP)
D. User Datagram Protocol (UDP)
Answer : B
37. Which of the following transmission media suffers more from transmission impairment?
A. coaxial cable
B. Optical fiber
C. twisted pair
D. wave guides
Answer : C
38. Where are routing tables placed?
A. in network interface card
B. in routers memory
C. in server memory
D. in a subnets memory
Answer : B
39. ICMP messages require ………………. levels of encapsulation
A. One
B. Two
C. Three
D. Four
Answer : B
40. Which of the following protocols are considered unreliable or connectionless?
A. UDP
B. TCP
C. FTP
D. TFTP
Answer : A
41. How many layers are there in the OSI model?
A. 4
B. 5
C. 6
D. 7
Answer : D
42. At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?
A. Physical
B. Network
C. Transport
D. Application
Answer : D
43. Which piece of equipment operates at both the data-link and network layers?
A. Hub
B. Bridge
C. Brouter
D. Router
Answer : C
44. Twisted-pair cable uses what type of connector?
A. RJ-11
B. XT-20
C. RJ-45
D. RJ-50
Answer : C
45. A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection is this?
A. DSL
B. Cable modem
C. ISDN
D. T1
Answer : C
46. 80 is the well-known port number for the HTTP service.
A. True.
B. False.
C.
D.
Answer : A
47. ----------------is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on.
A. Distance vector
B. Congestion
C. Link state routing
D. Flooding
Answer : D
48. The idea of sharing one network address among the multiple physical networks can be done using the following technique:
A. Supernetting
B. Subnetting
C. Transparent router
D. Both b & c
Answer : D
49. Which of the following algorithms are easy to implement and debug?
A. Hybrid algorithm
B. Path vector algorithm
C. Link state algorithm
D. Distance vector algorithms
Answer : D
50. In flags message attribute, which of the following flag indicates that message has been
completed?

A. \Deleted
B. \Recent
C. \Flagged
D. \Draft
Answer : D

Sharing is caring