Home

DRDO - Networking 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. 17. Which of the following use default routes for inter-domain routing?
A. Type 2
B. Type 4
C. Type 3
D. Type 1
Answer : B
2. Following are the advantages of tree topology
i) Point-to-point wiring for individual segments.
ii) Supported by several hardware and software venders.
iii) Easy to install and wire

A. i) only
B. i) and ii) only
C. iii) only
D. i) ,ii) and iii)
Answer : B
3. _____________ command is used by the client to transfer the job across to the server.
A. Any upper layer protocol
B. User datagram protocol
C. Transmission Control protocol
D. Remote Shell protocol
Answer : D
4. What are the subnet mask in dotted decimal notation for /20 networks?
A. 255.255.252.0
B. 255.255.255.0
C. 255.255.254.0
D. 255.255.240.0
Answer : D
5. Which of these cable is/are used to connect devices to hubs and switches.
A. crossover
B. straight-through
C. co-axial
D. both A) and B)
Answer : D
6. Which of the following is also known as IP masquerading?
A. Fiber Distributed Data Interface (FDDI)
B. Network Address Translation (NAT)
C. Classless Inter-Domain Routing (CIDR)
D. None of the above
Answer : B
7. TCP protocol is responsible for logical addressing and delivery of packets.
A. True.
B. False.
C.
D.
Answer : B
8. What is the pattern of a preamble?
A. 11110000
B. 11111111
C. 00000000
D. none of these
Answer : D
9. Internet e-mail system based on the ……………………………………………..
A. FTP
B. Simple Mail Transfer Protocol (SMTP)
C. POP
D. Both SMTP and POP
Answer : B
10. The network interface layer specifies how to organize data into………………………..and Internet layer specifies the format of …………………….. Sent across an Internet.
A. Bits, message.
B. frame,packet.
C. packet, messge.
D. datagram, packet.
Answer : B
11. What can be used in the place of DNS to resolve host names to IP addresses?
A. WINS
B. LMHosts
C. Hosts
D. DHCP
Answer : C
12. 127.0.0.1 address is reserved for internal loopback functions.
A. True.
B. False.
C.
D.
Answer : A
13. Strings enclosed in _______ quotation marks indicate single tokens.
A. Alphanumeric
B. Morse code
C. ASCII
D. Binary
Answer : C
14. You have a network card with the connector in question 43, and it also has a 9 pin female connector. What type of card is it?
A. ethernet
B. token ring
C. fiber optic
D. ipx/spx
Answer : B
15. ADSL uses high-speed Internet service phone lines
A. True.
B. False.
C.
D.
Answer : A
16. Which of the following can be used to transfer files from a Unix server?
A. FTP
B. Telnet
C. IPX
D. Netstat
Answer : A
17. What is used to boost a digital signal?
A. amplifier
B. digi-booster
C. multiplexer
D. booster
Answer : D
18. How many table entries are supported by global routing table in CIDR?
A. 90,000
B. 80,000
C. 70,000
D. 60,000
Answer : D
19. The packet transmit using standard Internet Protocol(IP) throughout the Internet by
A. Circuit switching
B. Packet switching
C. Message switching
D. None of the above.
Answer : B
20. Which of the following is the port used by SMTP?
A. 21
B. 23
C. 25
D. 80
Answer : C
21. Which of the following is currently a de facto standard, commonly used for point-to-point
serial connections running TCP/IP?

A. Fiber Distributed Data Interface (FDDI)
B. Serial Line IP (SLIP)
C. Point-to-Point Protocol (PPP)
D. IEEE 802.3
Answer : B
22. In ________ routing, the tunnel creates a bridge through areas that do not support
multicast traffic.

A. Internet
B. MBONE
C. Border Gateway Protocol
D. Multicast OSPF
Answer : B
23. Which of the following is required to communicate between two computers?
A. Communications software
B. Protocol
C. Communication hardware
D. All of the above including access to transmission medium
Answer : D
24. E-mail is an example of ………………………… mode of communication where one party can send a note to another person and the recipient need not be online to receive the e-mail.
A. asynchronous
B. synchronous
C. full duplex
D. either A or B
Answer : A
25. ADSL uses high-speed Internet service phone lines
A. True.
B. False.
C.
D.
Answer : A
26. Which function is not supported by E-mail?
A. authentication
B. composition
C. Disposition
D. Displaying
Answer : A
27. Which piece of equipment operates at both the data-link and network layers?
A. Hub
B. Bridge
C. Brouter
D. Router
Answer : C
28. The worldwide Internet is a well-known example of ------------------.
A. PAN
B. Subnet
C. Intra-Network
D. Inter-network
Answer : D
29. What is the distance limitation of Cat5 UTP?
A. 1 km
B. 100 km
C. 100 m
D. 100 foot
Answer : C
30. SMTP protocol is responsible for sending email across the Internet
A. True.
B. False.
C.
D.
Answer : A
31. Which of the following headers does a router look at to find how to route a data packet?
A. Ethernet frame header
B. MAC address
C. Application header
D. IP header
Answer : D
32. How many 64-Kbps channels are used on an ISDN BRI?
A. 1
B. 2
C. 3
D. 4
Answer : B
33. Which of the following is the IEEE specification for wireless networks?
A. 802.3
B. 802.5
C. 802.2
D. 802.11b
Answer : D
34. What can be used in the place of DNS to resolve host names to IP addresses?
A. WINS
B. LMHosts
C. Hosts
D. DHCP
Answer : C
35. Which of the following can be used to transfer files from a Unix server?
A. FTP
B. Telnet
C. IPX
D. Netstat
Answer : A
36. Which of the following algorithms are meant for establishing the paths through the network?
A. Unicast
B. Broadcast
C. Multicast
D. Any cast
Answer : C
37. _____________________ are set up to fulfill service ordering, service assurance, and
billing functions.

A. IPTV server
B. Users
C. Content servers
D. Complex Operation Support Systems (OSS)
Answer : D
38. Which layer of the OSI model does a switch operate in?
A. Physical
B. Data-link
C. Network
D. Transport
Answer : B
39. UDP datagram has a header, which is of ________.
A. 16 bytes
B. 8-bytes
C. 32 bytes
D. 64 bytes
Answer : B
40. What is the maximum length of thinnet cable before a signal booster is needed?
A. 185 meters
B. 500 feet
C. 1600 feet
D. 1 mile
Answer : A
41. The Hamming Distance for the codes generated using either even or odd parity will be------------------
A. 2
B. 4
C. 1
D. 0
Answer : A
42. What is the default subnet mask for a class B network?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.192.0
Answer : B
43. In the IP address 129.2.8.9, what does 129.2 specify?
A. Protocol address
B. Router address
C. Host number
D. Network number
Answer : D
44. Which of the following fields holds the packets of several protocols?
A. NLPID field
B. Pad field
C. UI (0x03) field
D. Q.922 field
Answer : A
45. How many layers are there in the OSI model?
A. 4
B. 5
C. 6
D. 7
Answer : D
46. Videoconferencing is an example for…………………… communication
A. Simplex
B. Half duplex
C. Full duplex
D. serial
Answer : C
47. Which of the following is the port used by SMTP?
A. 21
B. 23
C. 25
D. 80
Answer : C
48. FDDI operates on 100 Mbps.
A. True.
B. False.
C.
D.
Answer : A
49. Which of the following is used for establishing, configuring, and testing the data-link
Link Control Protocol (LCP)

A. Method
B. Network Control Protocols (NCPs)
C. Link Control Protocol (LCP)
D. File transfer protocol(FTP)
Answer : C
50. In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization
B. Purchase order
C. Inquiry
D. Capture
Answer : A

Sharing is caring