Home

GATE - Networking 1000+ MCQ [Solved] PDF Download

Thursday 9th of March 2023

Sharing is caring

1. Telnet protocol uses ___________ representation for the function Synchronize.
A. SYC
B. SYNCH
C. SNZ
D. SY
Answer : B
2. …………………………..combines characteristics of linear bus and star topologies.
A. Ring topology
B. A hybrid topology
C. A tree topology
D. mesh topology
Answer : C
3. Which of the following is the port used by SMTP?
A. 21
B. 23
C. 25
D. 80
Answer : C
4. Which of the following is required to communicate between two computers?
A. Communications software
B. Protocol
C. Communication hardware
D. All of the above including access to transmission medium
Answer : D
5. What is 10baseT?
A. specification for twisted-pair cable
B. specification for cable terminators
C. 10 megawatt transceiver
D. 10 Mhz analog transfers
Answer : A
6. OSPF is based on …………………
A. Distance vector routing
B. Path vector routing
C. Link state routing
D. both a and b
Answer : C
7. Where are routing tables placed?
A. in network interface card
B. in routers memory
C. in server memory
D. in a subnets memory
Answer : B
8. How many table entries are supported by global routing table in CIDR?
A. 90,000
B. 80,000
C. 70,000
D. 60,000
Answer : D
9. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and run graphical terminal emulation to the new server?
A. ICA
B. Telnet
C. RAS
D. HTTP
Answer : A
10. In the symmetric-key method of cryptography, which key is publicly known?
A. Encryption key only
B. Decryption key only
C. Both
D. None of the above
Answer : B
11. Data Transmission is not a layer in the OSI model
A. True.
B. False.
C.
D.
Answer : A
12. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured for an IP network over 100BaseT using DHCP. You can't connect, even though the client says that DHCP is working on his 100BaseT network. What should
A. Use Ipconfig /release to release the old DHCP address.
B. Use Winipcfg and click Release to release the old DHCP address.
C. Use Ifconfig to initialize the NIC.
D. Use Tracert to determine the problem.
Answer : A
13. What is the default subnet mask for a class A network?
A. 255.0.0.0
B. 255.224.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer : A
14. What is the maximum length of twisted-pair cable before a signal booster is needed? Select all that apply.
A. 25 meters
B. 100 meters
C. 328 feet
D. 1000 feet
Answer : B
15. --------------- is/are used for error detection.
A. Parity bit
B. checksum
C. both A) and B)
D. neither A) nor B).
Answer : C
16. What is the code used for Interpret As Command (IAC)?
A. 253
B. 255
C. 240
D. 241
Answer : B
17. Twisted-pair cable uses what type of connector?
A. RJ-11
B. XT-20
C. RJ-45
D. RJ-50
Answer : C
18. You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain name resolution?
A. Contoso.com, contoso.org, microsoft.com, com
B. Contoso.com, org, microsoft.org, org
C. Contoso.org, org, root [.], com, microsoft.com
D. Microsoft.com, com, org, contoso.org
Answer : C
19. BGP is …………………………………….routing protocol used to ………………………….routing table.
A. intrautonomous system, update
B. Interautonomous system, update
C. Interautonomous system, create
D. intrautonomous system, create
Answer : B
20. What does a patch cable connect to within an Ethernet network?
A. The patch panel to the hub
B. The patch panel to the wall jack
C. The wall jack to the computer
D. The NIC directly to another computer's NIC
Answer : A
21. Which of the following filed represents the sender of the message in an electronic mail?
A. To
B. From
C. Cc
D. Reply-to
Answer : B
22. What is used to boost a digital signal?
A. amplifier
B. digi-booster
C. multiplexer
D. booster
Answer : D
23. Which of the following is the IEEE specification forwireless networks?
A. 802.3
B. 802.5
C. 802.2
D. 802.11b
Answer : D
24. You have a network card with only one connector, which looks like a place to plug an oversized phone cord. What type of card is it?
A. token ring
B. decnet
C. d. ethernet
D. fiber optic
Answer : C
25. A network's Internet connection uses a 128-Kbps Basic Rate Interface (BRI). What type of connection is this?
A. DSL
B. Cable modem
C. ISDN
D. T1
Answer : C
26. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and run graphical terminal emulation to the new server?
A. ICA
B. Telnet
C. RAS
D. HTTP
Answer : A
27. Strings enclosed in _______ quotation marks indicate single tokens.
A. Alphanumeric
B. Morse code
C. ASCII
D. Binary
Answer : C
28. What is the maximum distance of single-mode fiber (SMF)?
A. 300 meters
B. 500 meters
C. 2km
D. 850 meters
Answer : C
29. ADSL uses high-speed Internet service phone lines
A. True.
B. False.
C.
D.
Answer : A
30. What layer of the OSI protocol reference model does a bridge operate under?
A. Physical
B. Data-link
C. Network
D. Transport
Answer : B
31. ____________ developed to provide a loop-free method of exchanging routing information
between autonomous systems.

A. Enhanced Interior Gateway Routing Protocol (EIGRP)
B. User Datagram Protocol (UDP)
C. Border Gateway Protocol (BGP)
D. User Datagram Protocol (UDP)
Answer : C
32. In ________ routing, the tunnel creates a bridge through areas that do not support
multicast traffic.

A. Internet
B. MBONE
C. Border Gateway Protocol
D. Multicast OSPF
Answer : B
33. Which of the following protocols use a topology table to install routes into the IP routing
table?

A. Open Shortest Path First (OSPF)
B. Enhanced Interior Gateway Routing Protocol (EIGRP)
C. Exterior Gateway Protocol (EGP)
D. Static routing protocols
Answer : B
34. ___________ is based on resources that are present within the Diffserv region.
A. Admission control
B. Packet scheduler
C. Packet classifier
D. Packet control
Answer : A
35. Which of the following IP addresses are used by multicast devices?
A. Class D
B. Class C
C. Class B
D. Class A
Answer : A
36. In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization
B. Purchase order
C. Inquiry
D. Capture
Answer : A
37. Which class does the IP address 202.119.22.31 belong to?
A. Class A
B. Class B
C. Class C
D. APIPA
Answer : C
38. ADSL uses high-speed Internet service phone lines
A. True.
B. False.
C.
D.
Answer : A
39. Internet Architecture Board (IAB) governs which of the following bodies?
A. Internet Assigned Number Authority (IANA)
B. Internet Research Task Force (IRTF)
C. Internet Engineering Task Force (IETF)
D. All of the above
Answer : D
40. You have a network card with the connector in question 43, and it also has a 15 pin female connector, the pins being in two rows. What type of card is it?
A. ethernet
B. token ring
C. arcnet
D. dlc
Answer : A
41. Which is the port used by POP3?
A. 69
B. 110
C. 143
D. 443
Answer : B
42. 80 is the well-known port number for the HTTP service.
A. True.
B. False.
C.
D.
Answer : A
43. Which of the following IEEE specifications uses CSMA/CD?
A. 802.2
B. 802.3
C. 802.5
D. 802.11b
Answer : B
44. E-mail is an example of ………………………… mode of communication where one party can send a note to another person and the recipient need not be online to receive the e-mail.
A. asynchronous
B. synchronous
C. full duplex
D. either A or B
Answer : A
45. The packet transmit using standard Internet Protocol(IP) throughout the Internet by
A. Circuit switching
B. Packet switching
C. Message switching
D. None of the above.
Answer : B
46. What is attenuation?
A. cable noise
B. cable shortage
C. loss of signal strength
D. unwanted signals on the network
Answer : C
47. Which of the following SIP request terminates a call?
A. ACK
B. BYE
C. INVITE
D. CANCEL
Answer : B
48. Which piece of equipment operates at both the data-link and network layers?
A. Hub
B. Bridge
C. Brouter
D. Router
Answer : C
49. Internet e-mail system based on the ……………………………………………..
A. FTP
B. Simple Mail Transfer Protocol (SMTP)
C. POP
D. Both SMTP and POP
Answer : B
50. Which of the following algorithms are easy to implement and debug?
A. Hybrid algorithm
B. Path vector algorithm
C. Link state algorithm
D. Distance vector algorithms
Answer : D

Sharing is caring