NP MCQ'S 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

.

1) The Unix system deals with two important API ………….

a. BSD –Berkeley Software Distribution and Transport Layer Interface (TLI)


b. only BSD –Berkeley Software Distribution
c. only Transport Layer Interface
d. None of the above

Answer is a)

2) Which method is often called a “reliable” network service?

a. Connection-oriented
b. object-oriented
c. both a) and b)
d. None of the above

Answer is a)

3)  The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the
following subnet masks can be used for the above requirement?

a.255.243.240

a. 255.255.0.0
b. 255.255.0
c. 255.255.255

Answer: (c) 255.255.255.0

4) When the mail server sends mail to other mail servers it becomes ___ ?

a. SMTP client
b. SMTP server
c. Peer
d. Master

Answer: (a) SMTP client

5) The length of an IPv6 address is?

a. 32 bits
b. 64 bits
c. 128 bits
d. 256 bits

Answer: (c) 128 bits

6)  Which of the following is true with regard to the ping command?

a. Ping stands for Packet Internet Generator.


b. The ping command checks the port level connectivity between source destinations end
points.
c. Ping summarizes the packet loss and round-trip delay between two IP end points.
d. The ping command activates the RARP protocol of the IP layer.

Answer: (c)

7)  ______is the default port of SMTP.

A. 25
B. 70
C. 80
D. 85
E. None of these

ANSWER: C

8)  ICMP stands for ______________ .


a. Internet Component Mail Protocol
b. Internet Control Mail Protocol
c. Information Component Mail Protocol
d. Internet Control Message Protocol
ANSWER: Internet Control Message ProtocoL

9) Match the following  List 1 to List 2

1. Ping ------------ i) discover the routes


2.Traceroute ----- ii) method for troubleshooting the accessibility of devices
3. Netstat --------- iii) control the network connections on Windows NT/XP
4. Ipconfig -------- iv) finding problems in the network
a. 1-iii, 2-i, 3-iv, 4-ii
b. 1-ii, 2-i, 3-iv, 4-iii
c. 1-i, 2-iii, 3-ii, 4-iv
d. 1-iv, 2-ii, 3-iii, 4-ii
ANSWER: 1-ii, 2-i, 3-iv, 4-iii

10)  What is the purpose of using pseudo header in UDP


a. The data packets are delivered sequentially.
b. Find out the destination port number and source port number.
c. Sends the context of a particular internet destination address to UDP.
d. Verifying the UDP packet has reached its correct destination.
ANSWER: Verifying the UDP packet has reached its correct destination

11) What is the difference between IP and ICMP?


a. IP is a reliable protocol while ICMP is an unreliable protocol.
b. In IP, error checking and control are not concerns while in ICMP it concerns.
c. IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms.
d. None of the above.
ANSWER: In IP, error checking and control are not concerns while in ICMP it concerns.

12) What is the use of ICMP protocol in the network?


a. It provides a mechanism for host and management queries.
b. There is no flow control and congestion control.
c. It doesn't provide error reporting mechanism.
d. All of the above
ANSWER: It provides a mechanism for host and management queries.

13) What is the difference between IPv4 and IPv6?


a. The IPv4 address is written in hexadecimal value while the IPv6 address is written by dotted-
decimal notation.
b. In IPV4 source and destination address is 128 bits while in IPv6 it is 32 bits.
c. The IPv4 node has only stateful auto-configuration while the IPv6 node has both a stateful and
a stateless address auto-configuration.
d. In IPv4 the IPsec support is required while in IPv6 it is optional.
ANSWER: The IPv4 node has only stateful auto-configuration while the IPv6 node has
both a stateful and a stateless address auto-configuration.

14) Which of the following is true about Domain Name System (DNS)?
a. DNS is the client server application.
b. It uses alias names for identifying the sender and receiver instead of an IP address. So the alias
address has to be mapped to the IP address.
c. It identifies sender and receiver so they should be known to each other.
d. All of the above.

ANSWER: All of the above.

15)  Which of the following statements is / are true for ICMP packets?
a. It can provide hosts with information about network problems.
b. It is encapsulated within IP datagrams.
c. It is encapsulated within UDP datagrams.
d. Both A and B
ANSWER: Both A and B

16)

A one-to-all communication between one source and all hosts on a network is classified as a
_______ communication.

a. unicast

b. multicast

c. broadcast

d. none of the above


Answer: (c).broadcast

17)

A one-to-many communication between one source and a


specific group of hosts is classified as a _______
communication.

a. unicast

b. multicast

c. broadcast

none of the above


Answer: (b).multicast

18)

A one-to-one communication between one source and one destination is classified as a _______
communication.

a.unicast

Multicast

Broadcast

none of the above


Answer: (a).unicast

19)  An RPC (remote procedure call) is initiated by the _________


a) server
b) client
c) client after the sever
d) a third party

Answer: b

20) In RPC, while a server is processing the call, the client is blocked ________
a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) unless the server is disconnected
Answer: a

21) When a user wants to access an application program or utility located on a remote machine,
he or she performs ___________ login.

A) local

B) remote

C) temporary

D) none of the above

Answer: Option B

22) The formal protocol that defines the MTA client and server in the Internet is called
___________.

A) SMTP

B) SNMP

C) TELNET

D) none of the above

Answer: Option A
23) What is a daemon?

A. process whose parent has died


B. process who has completed its execution but still has an entry in the process table
C. process which is running infinitely
D. process which runs automatically without any user interaction
Ans : D

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy