Computer Networks MCQ Number 01557

Computer Networks MCQ Set 1

1. An RPC (remote procedure call) is initiated by the
a) server
b) client
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: b [Reason:] None.

2. In RPC, while a server is processing the call, the client is blocked
a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) none of the mentioned

Answer

Answer: a [Reason:] None.

3. Remote procedure calls is
a) inter-process communication
b) a single process
c) a single thread
d) none of the mentioned

Answer

Answer: a [Reason:] None.

4. RPC allows a computer program to cause a subroutine to execute in
a) its own address space
b) another address space
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: b [Reason:] None.

5. RPC works between two processes. These processes must be
a) on the same computer
b) on different computers connected with a network
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: c [Reason:] None.

6. A remote procedure is uniquely identified by
a) program number
b) version number
c) procedure number
d) all of the mentioned

Answer

Answer: d [Reason:] None.

7. An RPC application requires
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned

Answer

Answer: d [Reason:] None.

8. RPC is used to
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: c [Reason:] None.

9. RPC is a
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) none of the mentioned

Answer

Answer: a [Reason:] None.

10. The local operating system on the server machine passes the incoming packets to the
a) server stub
b) client stub
c) client operating system
d) none of the mentioned

Answer

Answer: a [Reason:] None.

Computer Networks MCQ Set 2

1. Real-time transport protocol (RTP) is mostly used in
a) streaming media
b) video teleconference
c) television services
d) all of the mentioned

Answer

Answer: d [Reason:] None.

2. RTP is used to
a) carry the media stream
b) monitor transmission statistics of streams
c) monitor quality of service of streams
d) none of the mentioned

Answer

Answer: a [Reason:] None.

3. RTP provides the facility of jitter ____________
a) media stream
b) expansion
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: a [Reason:] None.

4. Which protocol provides the synchronization between media streams?
a) RTP
b) RTCP
c) RPC
d) None of the mentioned

Answer

Answer: b [Reason:] None.

5. An RTP session is established for
a) each media stream
b) all media streams
c) some predefined number of media streams
d) none of the mentioned

Answer

Answer: a [Reason:] None.

6. RTP can use
a) unprevileleged UDP ports
b) stream control transmission protocol
c) datagram congestion control protocol
d) all of the mentioned

Answer

Answer: d [Reason:] None.

7. Which one of the following multimedia formats can not be supported by RTP?
a) MPEG-4
b) MJPEG
c) MPEG
d) None of the mentioned

Answer

Answer: d [Reason:] None.

8. An RTP header has a minimum size of
a) 12 bytes
b) 16 bytes
c) 24 bytes
d) 32 bytes

Answer

Answer: a [Reason:] None.

9. Which one of the following is not correct?
a) RTCP provides canonical end-point identifiers to all session participants
b) RTCP reports are expected to be sent by all participants
c) Both (a) and (b)
d) None of the mentioned

Answer

Answer: d [Reason:] None.

10. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?
a) SRTP
b) RTCP
c) RCP
d) None of the mentioned

Answer

Answer: a [Reason:] None.

Computer Networks MCQ Set 3

1. IPSec is designed to provide the security at the
a) transport layer
b) network layer
c) application layer
d) session layer

Answer

Answer: b [Reason:] None.

2. In tunnel mode IPsec protects the
a) Entire IP packet
b) IP header
c) IP payload
d) None of the mentioned

Answer

Answer: a [Reason:] None.

3. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: b [Reason:] None.

4. Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned

Answer

Answer: a [Reason:] None.

5. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned

Answer

Answer: c [Reason:] None.

6. An attempt to make a computer resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process

Answer

Answer: a [Reason:] None.

7. Extensible authentication protocol is authentication framework frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned

Answer

Answer: b [Reason:] None.

8. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned

Answer

Answer: b [Reason:] None.

9. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned

Answer

Answer: a [Reason:] None.

10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned

Answer

Answer: c [Reason:] None.

Computer Networks MCQ Set 4

1. An application-level protocol in which a few manager stations control a set of agents is called
a) HTML
b) TCP
c) SNMP
d) SNMP/IP

Answer

Answer: c [Reason:] An application-level protocol in which a few manager stations control a set of agents is called SNMP.

2. Full duplex mode increases capacity of each domain from
a) 10 to 20 mbps
b) 20 to 30 mbps
c) 30 to 40 mbps
d) 40 to 50 mbps

Answer

Answer: a [Reason:] 10 to 20 mbps capacity increased on each domain in full duplex mode.

3. Configuration management can be divided into two subsystems those are
a) Reconfiguration and documentation
b) Management and configuration
c) Documentation and dialing up
d) Both a and c

Answer

Answer: a [Reason:] Reconfiguration and documentation are two subsystems of configuration management.

4. To use Simple Network Management System (SNMP), we need
a) Servers
b) IP
c) Protocols
d) Rules

Answer

Answer: d [Reason:] To use Simple Network Management System (SNMP), we need rules.

5. Main difference between SNMPv3 and SNMPv2 is the
a) Management
b) Integration
c) Classification
d) Enhanced security

Answer

Answer: d [Reason:] Enhanced security is the main difference between SNMPv3 and SNMPv2.

6. In Network Management System, a term that responsible for controlling access to network based on predefined policy is called
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management

Answer

Answer: d [Reason:] A term that responsible for controlling access to network based on predefined policy is called security management.

7. BER stands for
a) Basic Encoding Rules
b) Basic Encoding Resolver
c) Basic Encoding Rotator
d) Basic Encoding Router

Answer

Answer: a [Reason:] Basic encoding rules.

8. Control of users’ access to network resources through charges are main responsibilities of
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management

Answer

Answer: c [Reason:] Control of users’ access to network resources through charges are main responsibilities of accounting management.

9. SNMP is a framework for managing devices in an internet using the
a) TCP/IP protocol
b) UDP
c) SMTP
d) None

Answer

Answer: a [Reason:] SNMP is a framework for managing devices in an internet using the TCP/IP protocol.

10. Structure of Management Information (SMI), is guideline of
a) HTTP
b) SNMP
c) URL
d) MIB

Answer

Answer: b [Reason:] SMI is guidelines of SNMP.

Computer Networks MCQ Set 5

1. SONET stands for
a) synchronous optical network
b) synchronous operational network
c) stream optical network
d) shell operational network

Answer

Answer: a [Reason:] None.

2. In SONET, STS-1 level of electrical signalling has the data rate of
a) 51.84 Mbps
b) 155.52 Mbps
c) 466.56 Mbps
d) none of the mentioned

Answer

Answer: a [Reason:] None.

3. The path layer of SONET is responsible for the movement of a signal
a) from its optical source to its optical destination
b) across a physical line
c) across a physical section
d) none of the mentioned

Answer

Answer: b [Reason:] None.

4. The photonic layer of the SONET is similar to the __________ of OSI model.
a) network layer
b) data link layer
c) physical layer
d) none of the mentioned

Answer

Answer: c [Reason:] None.

5. In SONET, each synchronous transfer signal STS-n is composed of
a) 2000 frames
b) 4000 frames
c) 8000 frames
d) 16000 frames

Answer

Answer: c [Reason:] None.

6. Which one of the following is not true about SONET?
a) frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame
b) multiplexing is synchronous TDM
c) all clocks in the network are locked to a master clock
d) none of the mentioned

Answer

Answer: d [Reason:] None.

7. A linear SONET network can be
a) point-to-point
b) multi-point
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: c [Reason:] None.

8. Automatic protection switching in linear network is defined at the
a) line layer
b) section layer
c) photonic layer
d) path layer

Answer

Answer: a [Reason:] None.

9. A unidirectional path switching ring is a network with
a) one ring
b) two rings
c) three rings
d) four rings

Answer

Answer: b [Reason:] One ring is used as the working ring and other as the protection ring.

10. What is SDH?
a) sdh is similar standard to SONET developed by ITU-T
b) synchronous digital hierarchy
c) both (a) and (b)
d) none of the mentioned

Answer

Answer: c [Reason:] None.

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.