Home

Networking MCQ Solved Paper for SBI Clerk

Thursday 9th of March 2023

Sharing is caring

1. In an autonomous system with n areas, how many areas are connected to the backbone?
A. 1
B. N
C. N+1
D. N-1
Answer : D
2. Which of the following is the IEEE specification for wireless networks?
A. 802.3
B. 802.5
C. 802.2
D. 802.11b
Answer : D
3. Which of the following are not the standard representations defined by Telnet protocol?
A. IP and AO
B. YTA and WAY
C. EC and EL
D. SYNCH
Answer : B
4. In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization
B. Purchase order
C. Inquiry
D. Capture
Answer : A
5. Which layer use User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)?
A. Network layer
B. Physical layer
C. TCP/IP transport layer
D. Data link layer
Answer : C
6. Which OSI model layer provides for encryption and decryption of data?
A. Data-link
B. Transport
C. Presentation
D. Application
Answer : C
7. UDP datagram has a header, which is of ________.
A. 16 bytes
B. 8-bytes
C. 32 bytes
D. 64 bytes
Answer : B
8. Network administrator checks whether all the devices connected to the end-to-end path
are _________-enabled.

A. Any cast
B. Broadcast
C. Unicast
D. Multicast
Answer : D
9. ADSL uses high-speed Internet service phone lines
A. True.
B. False.
C.
D.
Answer : A
10. What is 10baseT?
A. specification for twisted-pair cable
B. specification for cable terminators
C. 10 megawatt transceiver
D. 10 Mhz analog transfers
Answer : A
11. How many number of host/machine can be attached to a network using a class B address?
A. 65,536
B. 128
C. 256
D. 16,777,216
Answer : A
12. Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?
A. Port
B. IP address
C. MAC address
D. Frame header
Answer : A
13. Which of the following can be used to transfer files from a Unix server?
A. FTP
B. Telnet
C. IPX
D. Netstat
Answer : A
14. 80 is the well-known port number for the HTTP service.
A. True.
B. False.
C.
D.
Answer : A
15. Which of the following can be used to transfer files from a Unix server?
A. FTP
B. Telnet
C. IPX
D. Netstat
Answer : A
16. Your network has gotten a single class C address but has 300 computers. How can you connect them to the Internet?
A. Use IPX.
B. Implement NAT.
C. Use DHCP.
D. Use DNS.
Answer : B
17. ________allows receiver to inform sender about the successful receiving of all the
segments.

A. SACK-permitted Option
B. Window scale option
C. Selective Acknowledgment (SACK)
D. Maximum segment size option
Answer : C
18. 25 is used by SMTP
A. True.
B. False.
C.
D.
Answer : A
19. The Point-to-Point Protocol (PPP) is described in which of the following?
A. RFC 3390 AND RFC 3392
B. RFC 1661 AND RFC 1662
C. RFC 2490 AND RFC 2492
D. RFC 2225 AND RFC 2226
Answer : B
20. A router receives an IP packet with source IP address 130.45.3.3 and destination IP address 202.23.4.16. The router cannot find the destination IP address in its routing table. Which ICMP message should be sent?
A. Time stamp request
B. Router solicitation
C. Destination Unreachable
D. Parameter problem on a datagram
Answer : C
21. Which is the port used by HTTPS?
A. 123
B. 143
C. 69
D. 443
Answer : D
22. What is the default subnet mask for a class A network?
A. 255.0.0.0
B. 255.224.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer : A
23. Twisted-pair cable uses what type of connector?
A. RJ-11
B. XT-20
C. RJ-45
D. RJ-50
Answer : C
24. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and run graphical terminal emulation to the new server?
A. ICA
B. Telnet
C. RAS
D. HTTP
Answer : A
25. Which of the following filed represents the sender of the message in an electronic mail?
A. To
B. From
C. Cc
D. Reply-to
Answer : B
26. Which cable type is immune to outside interference and crosstalk?
A. Thinnet
B. Twisted pair
C. Fiber optic
D. Thicknet
Answer : C
27. What is the distance limitation of Cat5 UTP?
A. 1 km
B. 100 km
C. 100 m
D. 100 foot
Answer : C
28. A time exceeded message is generated if ………………………………………………….
A. The round trip time between hosts is close to zero.
B. The Time-to Live field has a zero value.
C. Fragments of a message do not arrive within a set time
D. both b & c
Answer : D
29. Select the class C IP address from the following:
A. 122.10.8.25
B. 170.5.88.2
C. 191.5.26.1
D. 207.67.112.55
Answer : D
30. Which of the following is the port used by SMTP?
A. 21
B. 23
C. 25
D. 80
Answer : C
31. This mapping of name to IP address is done by …………………………….
A. Address resolution protocol
B. Domain name server
C. reverse address resolution protocol
D. Ethernet
Answer : B
32. Pure ALOHA has a maximum throughput of -----------
A. 16.4 %
B. 18.4 %
C. 7.4 %
D. 1 %
Answer : B
33. AppleTalk protocol configures hosts in zones on the network.
A. True.
B. False.
C.
D.
Answer : A
34. FDDI operates on 100 Mbps.
A. True.
B. False.
C.
D.
Answer : A
35. What layer of the OSI protocol reference model does a bridge operate under?
A. Physical
B. Data-link
C. Network
D. Transport
Answer : B
36. Which of the following is required to communicate between two computers?
A. Communications software
B. Protocol
C. Communication hardware
D. All of the above including access to transmission medium
Answer : D
37. Which class of IP addressing was not brought in much use?
A. Class A addresses
B. Class D addresses
C. Class B addresses
D. Class C addresses
Answer : C
38. Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.
A. 6
B. 7
C. 2
D. 3
Answer : A
39. What is the maximum length of thinnet cable before a signal booster is needed?
A. 185 meters
B. 500 feet
C. 1600 feet
D. 1 mile
Answer : A
40. Which of the following protocol is used by Integrated Services for signaling of the
reservation messages?

A. Link state protocols
B. Distance Vector Multicast Routing Protocol (DVMRP)
C. Resource Reservation Protocol (RSVP)
D. Static routing protocols
Answer : C
41. Which field in Domain Name System message format specifies the class of query?
A. Type
B. Class
C. Rdlength
D. Rdata
Answer : B
42. Following are the advantages of tree topology
i) Point-to-point wiring for individual segments.
ii) Supported by several hardware and software venders.
iii) Easy to install and wire

A. i) only
B. i) and ii) only
C. iii) only
D. i) ,ii) and iii)
Answer : B
43. Which of the following request in Session Initiation Protocol (SIP) queries the capabilities of
servers?

A. CANCEL
B. ACK
C. OPTIONS
D. PRACK
Answer : C
44. In FTP, to execute a file transfer, the user begins by _________.
A. Navigating the directory structure
B. Connecting to a remote host
C. Listing files available for transfer.
D. Defining the transfer mode
Answer : B
45. Which directory service is used in Windows 2000 Server?
A. Active Directory
B. SAM
C. NDS
D. Bindery
Answer : A
46. Select the class C IP address from the following:
A. 122.10.8.25
B. 170.5.88.2
C. 191.5.26.1
D. 207.67.112.55
Answer : D
47. At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?
A. Physical
B. Network
C. Transport
D. Application
Answer : D
48. _____________ command is used by the client to transfer the job across to the server.
A. Any upper layer protocol
B. User datagram protocol
C. Transmission Control protocol
D. Remote Shell protocol
Answer : D
49. What is the IEEE specification for Ethernet?
A. 802.1
B. 802.2
C. 802.3
D. 802.4
Answer : C
50. Which of the following is a simplex protocol?
A. Multicast Source Discovery Protocol (MSDP)
B. User datagram protocol(UDP)
C. Resource Reservation Protocol (RSVP)
D. Internet Group Management Protocol (IGMP)
Answer : C

Sharing is caring