Home

Networking MCQ Solved Paper for CEED

Thursday 9th of March 2023

Sharing is caring

1. In the symmetric-key method of cryptography, which key is publicly known?
A. Encryption key only
B. Decryption key only
C. Both
D. None of the above
Answer : B
2. Which of the following protocols is described in RFC 793?
A. Address Resolution Protocol (ARP)
B. Transmission Control Protocol (TCP)
C. Bootstrap Protocol (BOOTP)
D. User Datagram Protocol (UDP)
Answer : B
3. The packet transmit using standard Internet Protocol(IP) throughout the Internet by
A. Circuit switching
B. Packet switching
C. Message switching
D. None of the above.
Answer : B
4. How many 64-Kbps channels are used on an ISDN BRI?
A. 1
B. 2
C. 3
D. 4
Answer : B
5. In which of the following states after selecting a mailbox, actions can be taken against the
mail within the mailbox?

A. Non-authenticated state
B. Authenticated state
C. Selected state
D. Logout state
Answer : C
6. In flags message attribute, which of the following flag indicates that message has been
completed?

A. \Deleted
B. \Recent
C. \Flagged
D. \Draft
Answer : D
7. …………………… have a single communication channel that is shared by all the users on the network.
A. Point-to-point
B. Broadcast networks
C. Protocol
D. PAN
Answer : B
8. Which of the following provides a structure for conveying message through TCP/IP network
to host?

A. Address Resolution protocol (ARP)
B. Internet Control Message Protocol (ICMP)
C. Bootstrap Protocol (BOOTP)
D. Dynamic Host Configuration Protocol (DHCP)
Answer : D
9. You wish to install a 100BaseT network. What type of cabling will you use?
A. CAT 3 UTP
B. CAT 5 UTP
C. Thinnet
D. Fiber optic
Answer : B
10. A router receives an IP packet with source IP address 130.45.3.3 and destination IP address 202.23.4.16. The router cannot find the destination IP address in its routing table. Which ICMP message should be sent?
A. Time stamp request
B. Router solicitation
C. Destination Unreachable
D. Parameter problem on a datagram
Answer : C
11. Which type of BGP message is sent by a system to notify another router of the senders existence?
A. Keep-alive
B. Notification
C. Open
D. Update
Answer : A
12. Which of these is a feature of hubs?
A. Hubs amplify the incoming signal.
B. Hubs understand frames, packets or headers
C. All lines coming into a Hub must operate at a same speed.
D. all of these
Answer : C
13. Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?
A. Port
B. IP address
C. MAC address
D. Frame header
Answer : A
14. A time exceeded message is generated if ………………………………………………….
A. The round trip time between hosts is close to zero.
B. The Time-to Live field has a zero value.
C. Fragments of a message do not arrive within a set time
D. both b & c
Answer : D
15. In TCP segment format _______indicates start of data.
A. RST
B. ACK
C. URG
D. Data Offset
Answer : D
16. The idea of sharing one network address among the multiple physical networks can be done using the following technique:
A. Supernetting
B. Subnetting
C. Transparent router
D. Both b & c
Answer : D
17. OSPF is based on …………………
A. Distance vector routing
B. Path vector routing
C. Link state routing
D. both a and b
Answer : C
18. In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
A. 90
B. 10
C. 20
D. 45
Answer : D
19. What is attenuation?
A. cable noise
B. cable shortage
C. loss of signal strength
D. unwanted signals on the network
Answer : C
20. Which of the following network topologies has the highest level of redundancy?
A. Bus
B. Star
C. Star
D. Mesh
Answer : D
21. Which is the port used by HTTPS?
A. 123
B. 143
C. 69
D. 443
Answer : D
22. Which of the following pieces of equipment will receive a packet from one port and forward that packet out the one port to which the destination computer is connected?
A. Hub
B. MAU
C. Switch
D. TDR
Answer : C
23. 127.0.0.1 address is reserved for internal loopback functions.
A. True.
B. False.
C.
D.
Answer : A
24. What is the maximum length of thick Ethernet cable before a signal booster is needed?
A. 500 feet
B. 500 meters
C. 1000 feet
D. 2 miles
Answer : B
25. Which of the following can be used to transfer files from a Unix server?
A. FTP
B. Telnet
C. IPX
D. Netstat
Answer : A
26. What is the maximum length of thinnet cable before a signal booster is needed?
A. 185 meters
B. 500 feet
C. 1600 feet
D. 1 mile
Answer : A
27. Which is the port used by POP3?
A. 69
B. 110
C. 143
D. 443
Answer : B
28. ____________ was developed to support aggregation and summarization of routing
information.

A. Static Routing protocol
B. Enhanced Interior Gateway Routing Protocol (EIGRP)
C. Routing Information Protocol (RIP)
D. Border Gateway Protocol (BGP)
Answer : D
29. What is the default subnet mask for a class A network?
A. 255.0.0.0
B. 255.224.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer : A
30. Which of the following protocol resolves a host's hardware address for a known IP
address?

A. InATMARP protocol
B. ATMARP protocol
C. InARP protocol
D. ARP protocol
Answer : D
31. ________acts as source and destination for IP traffic.
A. Interface
B. Node
C. Host
D. Router
Answer : C
32. _______ body looks after the protocol identifiers used over Internet.
A. Transmission Control Protocol
B. Telnet protocol
C. Internet Protocol
D. Network Control Protocol
Answer : D
33. Which of the following can provide a backbone network of 600 meters in length without using repeaters?
A. 10BaseT
B. 100BaseT
C. 10Base5
D. 100BaseFX
Answer : D
34. Using a class B address maximum of …………………networks can be defined with up to……………………..hosts per networks.
A. 2,097,152-------------254
B. 16,384-----------------65,536
C. 16,384---------------65,534
D. 126--------------------16,777,214
Answer : C
35. The worldwide Internet is a well-known example of ------------------.
A. PAN
B. Subnet
C. Intra-Network
D. Inter-network
Answer : D
36. You have a network card with the connector in question 43, and it also has a 9 pin female connector. What type of card is it?
A. ethernet
B. token ring
C. fiber optic
D. ipx/spx
Answer : B
37. ------------------- is/ are caused by the random motion of the electrons in a wire and is unavoidable.
A. Dispersion
B. Thermal noise
C. Delay distortion
D. all of these
Answer : B
38. Which of the following is defined in RFC 4366?
A. Secure File Trasfer Protocol (SFTP)
B. Trivial File Transfer Protocol (TFTP)
C. File Transfer Protocol (FTP)
D. Transport Layer Security (TLS)
Answer : D
39. Following are the advantages of tree topology
i) Point-to-point wiring for individual segments.
ii) Supported by several hardware and software venders.
iii) Easy to install and wire

A. i) only
B. i) and ii) only
C. iii) only
D. i) ,ii) and iii)
Answer : B
40. What is the maximum size of IP header in the UDP Datagram format?
A. 40 bytes
B. 50 bytes
C. 60 bytes
D. 70 bytes
Answer : C
41. Select the standard for token ring using token-passing media access.
A. 802.2
B. 802.3
C. 802.5
D. 802.11(b)
Answer : C
42. Where are routing tables placed?
A. in network interface card
B. in routers memory
C. in server memory
D. in a subnets memory
Answer : B
43. Which is the port used by HTTPS?
A. 123
B. 143
C. 69
D. 443
Answer : D
44. Which of the following is currently a de facto standard, commonly used for point-to-point
serial connections running TCP/IP?

A. Fiber Distributed Data Interface (FDDI)
B. Serial Line IP (SLIP)
C. Point-to-Point Protocol (PPP)
D. IEEE 802.3
Answer : B
45. What is the IEEE specification for Ethernet?
A. 802.1
B. 802.2
C. 802.3
D. 802.4
Answer : C
46. DSL stands for ------------------------
A. data subscriber lines
B. dual subscriber lines
C. delay sbscriber lines
D. digital subscriber lines
Answer : D
47. In FTP, to execute a file transfer, the user begins by _________.
A. Navigating the directory structure
B. Connecting to a remote host
C. Listing files available for transfer.
D. Defining the transfer mode
Answer : B
48. Which field in Domain Name System message format specifies the class of query?
A. Type
B. Class
C. Rdlength
D. Rdata
Answer : B
49. If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….
A. Skeleton
B. Private
C. Public
D. Symmetric
Answer : D
50. What layer of the OSI protocol reference model does a bridge operate under?
A. Physical
B. Data-link
C. Network
D. Transport
Answer : B

Sharing is caring