Home

Networking 1000+ MCQ with answer for RRB JE

Thursday 9th of March 2023

Sharing is caring

1. Thick Ethernet cable uses what type of connector? Select all that apply.
A. RJ-45
B. AUI
C. DB-15
D. BNC
Answer : B
2. Which type of connector is used on 10Base2 networks?
A. SC
B. BNC
C. RJ-45
D. RJ-11
Answer : B
3. Class C network address class supports 65,534 hosts.
A. True.
B. False.
C.
D.
Answer : B
4. FDDI operates on 100 Mbps.
A. True.
B. False.
C.
D.
Answer : A
5. Which is the port used by POP3?
A. 69
B. 110
C. 143
D. 443
Answer : B
6. Which field in Domain Name System message format specifies the class of query?
A. Type
B. Class
C. Rdlength
D. Rdata
Answer : B
7. What is the maximum distance of single-mode fiber (SMF)?
A. 300 meters
B. 500 meters
C. 2km
D. 850 meters
Answer : C
8. ARP is defined in RFC _____ and it is a current internet standard, ________
A. RFC-37, STD 903
B. RFC-903, STD 37
C. RFC 826; STD 37
D. RFC 37; STD 826
Answer : C
9. What is the maximum size of IP header in the UDP Datagram format?
A. 40 bytes
B. 50 bytes
C. 60 bytes
D. 70 bytes
Answer : C
10. Which of these is a feature of hubs?
A. Hubs amplify the incoming signal.
B. Hubs understand frames, packets or headers
C. All lines coming into a Hub must operate at a same speed.
D. all of these
Answer : C
11. _____________________ are set up to fulfill service ordering, service assurance, and
billing functions.

A. IPTV server
B. Users
C. Content servers
D. Complex Operation Support Systems (OSS)
Answer : D
12. FDDI operates on 100 Mbps.
A. True.
B. False.
C.
D.
Answer : A
13. Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.
A. 6
B. 7
C. 2
D. 3
Answer : A
14. ------------------- is/ are caused by the random motion of the electrons in a wire and is unavoidable.
A. Dispersion
B. Thermal noise
C. Delay distortion
D. all of these
Answer : B
15. What is the address identified when socket is available at each end of TCP?
A. "<TCP, IP address, socket number>."
B. "<TCP, Host address, port address>."
C. "<TCP, IP address, port number>."
D. "<TCP, Network address, socket address>."
Answer : C
16. Which of the following algorithms are easy to implement and debug?
A. Hybrid algorithm
B. Path vector algorithm
C. Link state algorithm
D. Distance vector algorithms
Answer : D
17. In the symmetric-key method of cryptography, which key is publicly known?
A. Encryption key only
B. Decryption key only
C. Both
D. None of the above
Answer : B
18. _______ Domain name corresponds to US military.
A. .us mili
B. .mili
C. .mil
D. .us
Answer : C
19. Which of the following SIP request terminates a call?
A. ACK
B. BYE
C. INVITE
D. CANCEL
Answer : B
20. ____________ was developed to support aggregation and summarization of routing
information.

A. Static Routing protocol
B. Enhanced Interior Gateway Routing Protocol (EIGRP)
C. Routing Information Protocol (RIP)
D. Border Gateway Protocol (BGP)
Answer : D
21. Which directory service is used in Windows 2000 Server?
A. Active Directory
B. SAM
C. NDS
D. Bindery
Answer : A
22. What is the default subnet mask for a class B network?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.192.0
Answer : B
23. What are the subnet mask in dotted decimal notation for /20 networks?
A. 255.255.252.0
B. 255.255.255.0
C. 255.255.254.0
D. 255.255.240.0
Answer : D
24. Which of the following delivery methods works with only one source and one destination? Multicast
A. Multicast
B. Broadcast
C. Unicast
D. Any cast
Answer : C
25. Internet e-mail system based on the ……………………………………………..
A. FTP
B. Simple Mail Transfer Protocol (SMTP)
C. POP
D. Both SMTP and POP
Answer : B
26. Which of the following is defined in RFC 4366?
A. Secure File Trasfer Protocol (SFTP)
B. Trivial File Transfer Protocol (TFTP)
C. File Transfer Protocol (FTP)
D. Transport Layer Security (TLS)
Answer : D
27. You wish to install a 100BaseT network. What type of cabling will you use?
A. CAT 3 UTP
B. CAT 5 UTP
C. Thinnet
D. Fiber optic
Answer : B
28. You're configuring a dial-up connection to an ISP. Which of the following protocols is used?
A. PPTP
B. PPP
C. VPN
D. IPSec
Answer : B
29. What is the distance limitation of Cat5 UTP?
A. 1 km
B. 100 km
C. 100 m
D. 100 foot
Answer : C
30. preamble field of 802.3 frames is encoded using ------------------- encoding
A. Manchester
B. differential Manchester
C. Bi polar
D. uni polar
Answer : A
31. What is attenuation?
A. cable noise
B. cable shortage
C. loss of signal strength
D. unwanted signals on the network
Answer : C
32. ________is a multicast extension to OSPF Version 2.
A. Multicast Source Discovery Protocol (MSDP)
B. Distance Vector Multicast Routing Protocol (DVMRP)
C. Multicast OSPF (MOSPF)
D. Internet Group Management Protocol (IGMP)
Answer : C
33. Which of the following protocol resolves a host's hardware address for a known IP
address?

A. InATMARP protocol
B. ATMARP protocol
C. InARP protocol
D. ARP protocol
Answer : D
34. Network administrator checks whether all the devices connected to the end-to-end path
are _________-enabled.

A. Any cast
B. Broadcast
C. Unicast
D. Multicast
Answer : D
35. ARP is defined in RFC _____ and it is a current internet standard, ________
A. RFC-37, STD 903
B. RFC-903, STD 37
C. RFC 826; STD 37
D. RFC 37; STD 826
Answer : C
36. …………………… have a single communication channel that is shared by all the users on the network.
A. Point-to-point
B. Broadcast networks
C. Protocol
D. PAN
Answer : B
37. What is attenuation?
A. cable noise
B. cable shortage
C. loss of signal strength
D. unwanted signals on the network
Answer : C
38. In flags message attribute, which of the following flag indicates that message has been
completed?

A. \Deleted
B. \Recent
C. \Flagged
D. \Draft
Answer : D
39. 127.0.0.1 address is reserved for internal loopback functions.
A. True.
B. False.
C.
D.
Answer : A
40. A time exceeded message is generated if ………………………………………………….
A. The round trip time between hosts is close to zero.
B. The Time-to Live field has a zero value.
C. Fragments of a message do not arrive within a set time
D. both b & c
Answer : D
41. 802.5 project standard defines Token Ring.
A. True.
B. False
C.
D.
Answer : A
42. SMTP protocol is responsible for sending email across the Internet
A. True.
B. False.
C.
D.
Answer : A
43. You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain name resolution?
A. Contoso.com, contoso.org, microsoft.com, com
B. Contoso.com, org, microsoft.org, org
C. Contoso.org, org, root [.], com, microsoft.com
D. Microsoft.com, com, org, contoso.org
Answer : C
44. What is the default subnet mask for a class A network?
A. 255.0.0.0
B. 255.224.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer : A
45. 25 is used by SMTP
A. True.
B. False.
C.
D.
Answer : A
46. Internet Research Task Force (IRTF) body looks after ________.
A. The research projects of TCP/IP suit
B. Technical related issues
C. Development of standards like Requests for Comments
D. Maintenance of Internet
Answer : A
47. 25 is used by SMTP
A. True.
B. False.
C.
D.
Answer : A
48. Which layer use User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)?
A. Network layer
B. Physical layer
C. TCP/IP transport layer
D. Data link layer
Answer : C
49. Which of the following transmission media suffers more from transmission impairment?
A. coaxial cable
B. Optical fiber
C. twisted pair
D. wave guides
Answer : C
50. Using a class B address maximum of …………………networks can be defined with up to……………………..hosts per networks.
A. 2,097,152-------------254
B. 16,384-----------------65,536
C. 16,384---------------65,534
D. 126--------------------16,777,214
Answer : C

Sharing is caring