POST BY -- SURENDRA SOLANKI
Multiple Choice: Networking MCQ FOR IBPS PO3
1.
Which of the following is NOT an advantage of using
networks compared to a stand-alone computer?
A.
ease of maintenance and administration
B.
enhanced resource sharing
C.
increased productivity
D.
increased communication capabilities
2.
____________ networks may experience significant
slowdowns if more than ten (10) users are on the network.
A.
Wide area
B.
Peer-to-peer
C.
Server-based
D.
Metropolitan area
Answer: B Reference: Client/Server Networks Difficulty: Moderate
3.
All of the following statements are DISADVANTAGES
of peer-to-peer networks EXCEPT:
A.
P2P networks do not require servers.
B.
security cannot be implemented centrally on P2P
networks.
C.
each computer must be updated individually in P2P
networks.
D.
P2P networks are decentralized and not easily scalable.
Answer: A Reference: Client/Server Networks Difficulty: Easy
4.
Individual users must take responsibility for data
backups and security on a peer-to-peer network because this kind of network is
considered:
A.
scalable.
B.
centralized.
C.
decentralized.
D.
dedicated.
Answer: C Reference: Client/Server Networks Difficulty: Moderate
5.
The ability to easily add additional users means
that a network is:
A.
scalable.
B.
dedicated.
C.
decentralized.
D.
secure.
Answer: A Reference: Client/Server Networks Difficulty: Moderate
6.
In a client/server network, all clients are
connected to a server that performs tasks for them, such as backup and
security; therefore, it is known as a ____________ network.
A.
local area
B.
dedicated
C.
decentralized
D.
centralized
Answer: D Reference: Client/Server Networks Difficulty: Easy
7.
A(n) ____________ is a small group of computers and
peripherals linked together in a small geographic area.
A.
LAN
B.
PAN
C.
CAN
D.
MAN
8.
The Internet is most accurately categorized as a:
A.
LAN.
B.
PAN.
C.
WAN.
D.
MAN.
Answer: C Reference: Classifications of
Client/Server Networks: LANS… Difficulty: Easy
9.
PANs are used to connect ____________ devices (such
as Bluetooth-enabled devices) in close proximity to each other.
A.
peripheral
B.
wireless
C.
dedicated
D.
client
Answer: B Reference: Classifications of
Client/Server Networks: LANs… Difficulty: Easy
10.
A(n) ____________ is a private corporate network,
used exclusively by company employees.
A.
Internet
B.
local area network
C.
peer-to-peer
D.
intranet
Answer: D Reference: Constructing Client/Server
Networks Difficulty: Moderate
11.
____________ is specialized software that runs on a
server computer to control network functionality.
A.
NOS software
B.
NCP software
C.
TCP software
D.
MAC software
Answer: A Reference: Constructing Client/Server
Networks Difficulty: Easy
12.
The layout and structure of the network is known as
the network’s:
A.
NOS.
B.
topology.
C.
components.
D.
protocol.
Answer: B Reference: Constructing Client/Server
Networks Difficulty: Easy
13.
Cable and wireless communication technologies are
types of:
A.
network adapters.
B.
topologies.
C.
transmission media.
D.
network operating systems.
Answer: C Reference: Constructing Client/Server
Networks Difficulty: Moderate
14.
Network navigation devices include all of the
following EXCEPT:
A.
servers.
B.
routers.
C.
switches.
D.
hubs.
Answer: A Reference: Constructing Client/Server
Networks Difficulty: Easy
15.
____________ servers store and manage files for
network users.
A.
File
B.
Web
C.
Authentication
D.
Main
Answer: A Reference: Constructing Client/Server
Networks Difficulty: Moderate
16.
A(n) ____________ server keeps track of users
logging onto the network and the services available to the users.
A.
file
B.
authentication
C.
Web
D.
e-mail
17.
____________ servers are used to fulfill one
specific function, such as handling e-mail.
A.
Dedicated
B.
Network
C.
Protocol
D.
Peer-to-peer
Answer: A Reference: Servers Difficulty: Moderate
18.
____________ servers are used to manage all
client-requested printing jobs for all printers.
A.
Database
B.
Network
C.
Print
D.
E-mail
Answer: C Reference: Print
Servers Difficulty: Easy
19.
A(n) ____________ server, on a network, delivers
the software to the clients because the software does not reside on the client
computers.
A.
Web
B.
application
C.
communications
D.
database
Answer: B Reference: Application
Servers Difficulty: Easy
20.
The ____________ server, on a network, is the
single point of contact with the outside world and is often the only device
connected to the Internet.
A.
intranet
B.
database
C.
application
D.
communications
Answer: D Reference: Communications
Servers Difficulty: Challenging
21.
In a(n) ____________ topology, all computers are
connected in sequence, using a single cable.
A.
bus
B.
star
C.
hybrid
D.
ring
22.
In a bus topology, a ____________, located at each
end of the network, absorbs the signal to prevent it from being reflected back
onto the cable.
A.
node
B.
terminator
C.
packet
D.
network device
Answer: B Reference: Bus Topology Difficulty: Easy
23.
In a bus topology, the nodes do nothing to move the
data along the network, making it a(n) ____________ topology.
A.
client/server
B.
active
C.
passive
D.
terminated
Answer: C Reference: Bus Topology Difficulty: Moderate
24.
Active topologies differ from passive topologies in
that nodes on the active topology network:
A.
help pass the data along the network.
B.
listen for signals on the line before transmitting.
C.
ultimately send their messages to a terminator.
D.
actively search for packets intended for themselves.
Answer: A Reference: Ring
Topology Difficulty: Challenging
25.
When two computers send data at the same time on a
bus network it is called a(n):
A.
access method.
B.
data collision.
C.
active topology.
D.
data termination.
Answer: B Reference: Bus Topology Difficulty: Moderate
26.
In a ring topology, the computer in possession of
the ____________can transmit data.
A.
packet
B.
data
C.
access method
D.
token
Answer: D Reference: Ring
Topology Difficulty: Moderate
27.
Because each node on the network is responsible for
retransmitting the token and the data to the next node, the ____________
topology is considered an active topology.
A.
ring
B.
bus
C.
star
D.
hybrid
Answer: A Reference: Ring
Topology Difficulty: Moderate
28.
Which of the following statements about ring
topology networks is TRUE?
A.
A ring topology network is plagued with data
collisions.
B.
A ring topology network uses the CSMA/CD access method
to transmit data.
C.
A ring topology network allows only one node to
transmit data at a time.
D.
A ring topology network is considered passive.
Answer: C Reference: Ring
Topology Difficulty: Moderate
29.
In the star topology, the central point of failure
is the:
A.
client.
B.
switch.
C.
terminator.
D.
access point.
Answer: B Reference: Star
Topology Difficulty: Challenging
30.
Which of the following statements, concerning star
topology networks, is FALSE?
A.
Star topology networks use the CSMA/CD access method.
B.
If one computer fails, it does not affect the rest of
the network.
C.
There are no data collisions on a star topology network.
D.
If the switch fails, the network no longer functions.
Answer: C Reference: Star
Topology Difficulty: Challenging
31.
When a collision occurs on an Ethernet network, the
node that detects the collision sends a(n):
A.
token.
B.
packet.
C.
jam signal.
D.
warning.
Answer: C Reference: Star
Topology Difficulty: Moderate
32.
On an Ethernet network, after a collision occurs
between two computers and a jam signal is sent, what happens next?
A.
The signals are encrypted to avoid a second collision.
B.
A token is resent by the two computers that caused the
collision.
C.
The two computers wait random amounts of time, and then
resend their signals.
D.
The switch notifies the network of the collision.
Answer: C Reference: Star
Topology Difficulty: Challenging
33.
Which of the following statements is FALSE
concerning bandwidth?
A.
Bandwidth defines the speed at which the data flows on
the network.
B.
Cable is rated by the
maximum amount of bandwidth it supports.
C.
Bandwidth is the amount of data transmitted across the
transmission medium in a certain amount of time.
D.
Bandwidth is measured in bits per second (bps).
Answer: A Reference: Transmission Media Difficulty: Easy
34.
____________ defines whether the transmission media
uses electrical impulses or pulses of light to transmit data.
A.
Bandwidth
B.
Susceptibility to interference
C.
Signal transmission method
D.
Access method
Answer: C Reference: Wired Transmission Media Difficulty: Challenging
35.
EMI and RFI are types of:
A.
signal interference.
B.
bandwidth measurements.
C.
twisted pair cable.
D.
wireless transmission media.
Answer: A Reference: Wired Transmission Media Difficulty: Moderate
36.
All of the following statements concerning twisted
pair cable are true EXCEPT:
A.
Twisted pair uses pulses of light to send data.
B.
The number of twists in twisted pair is significant
because it makes the wires less susceptible to interference.
C.
UTP is not recommended in areas with significant
sources of interference.
D.
The two most common types of UTP in use today are Cat
5e and Cat 6.
Answer: A Reference: Twisted Pair Cable Difficulty: Moderate
37.
UTP and STP are examples of:
A.
CATV cable.
B.
thicknet coaxial cable.
C.
fiber-optic cable.
D.
twisted pair cable.
Answer: D Reference: Twisted Pair Cable Difficulty: Easy
38.
The core of a coaxial cable is usually made from:
A.
magnesium oxide.
B.
copper.
C.
silicon.
D.
glass fibers.
Answer: B Reference: Coaxial Cable Difficulty: Easy
39.
All of the following statements regarding
fiber-optic cable are true EXCEPT:
A.
the core of fiber-optic cable is composed of copper.
B.
fiber-optic cable uses pulses of light to transmit
data.
C.
data passes through fiber-optic cable in one direction
only.
D.
the outer jacket of fiber-optic cables is often made of
Kevlar.
Answer: A Reference: Fiber-Optic Cable Difficulty: Moderate
40.
The wired medium least susceptible to signal
interference is:
A.
STP cable.
B.
coaxial cable.
C.
fiber-optic cable.
D.
UTP cable.
Answer: C Reference: Fiber-Optic Cable Difficulty: Moderate
41.
____________ wireless devices have largely been
replaced with faster technology.
A.
802.11b
B.
802.11g
C.
802.11n
D.
802.11a
42.
All of the following protocols are proprietary
EXCEPT:
A.
TCP/IP.
B.
IPX.
C.
NetBEUI.
D.
AFP.
Answer: A Reference: Network Operating Systems Difficulty: Easy
43.
The major network operating systems for
installation on the server, in a client/server environment, include all of the
following EXCEPT:
A.
Windows Server 2003.
B.
UNIX.
C.
Windows XP.
D.
Novell
NetWare .
Answer: C Reference: Network Operating Systems Difficulty: Easy
44.
The OSI model is divided into ____________
processes called layers.
A.
five
B.
six
C.
seven
D.
eight
Answer: C Reference: Dig Deeper: The OSI Model Difficulty:
Easy
45.
In the OSI model, the ____________ layer handles
data encryption and compression.
A.
application
B.
presentation
C.
data link
D.
session
Answer: B Reference: Dig Deeper: The OSI Model Difficulty: Challenging
46.
In the OSI model, the ____________ layer is
responsible for assembling the data packets into frames.
A.
session
B.
transport
C.
data link
D.
network
Answer: C Reference: Dig Deeper: The OSI Model Difficulty: Challenging
47.
The device that acts as an interface to connect
with and communicate on a network is known as the:
A.
network adapter.
B.
hub.
C.
repeater.
D.
switch.
Answer: A Reference: Network Adapters Difficulty: Easy
48.
Which of the following statements concerning MAC
addresses is TRUE?
A.
A MAC address is used to externally identify a computer on a network.
B.
The MAC address and the IP address can be used
interchangeably.
C.
A MAC address must match the IP address.
D.
The first three numbers in the address identify the
manufacturer.
49.
If a network requires a cable to connect two
devices farther apart than the normal maximum run length of the media, the way
to prevent signal degradation is to install a(n):
A.
adapter.
B.
repeater.
C.
bridge.
D.
switch.
Answer: B Reference: Repeaters and Hubs Difficulty: Moderate
50.
Another name for a “smart” hub is a:
A.
bridge.
B.
repeater.
C.
firewall.
D.
switch.
Answer: D Reference: Switches and Bridges Difficulty: Moderate
Fill in the Blank:
51.
____________ are designed to send information
between two networks.
Answer: Routers Reference:
Routers Difficulty: Easy
52.
The special communications software, installed on a
computer to enable the network adapter to communicate with the operating system
is called the ____________.
Answer: device driver Reference: Network Adapters Difficulty: Moderate
53.
Entering a user ID and password is known as
____________.
Answer: authentication Reference:
Authentication Difficulty: Easy
54.
The acronym NOS stands for ____________.
Answer: Network Operating System Reference: Network Operating Systems Difficulty:
Easy
55.
NetBEUI, AFP, and IPX are known as ____________
protocols, which means that they do not work with another vendor’s NOS.
Answer: proprietary Reference: Network Operating Systems Difficulty: Challenging
56.
The
____________ identifies a computer internally on the network.
Answer: MAC address Reference: MAC Addresses Difficulty: Moderate
57.
In the OSI model, the ____________ layer converts
the data into signals for transmission over the network.
Answer: physical Reference: Dig Deeper: The OSI Model Difficulty: Challenging
58.
Combining multiple topologies into one network is
known as a(n) ____________ network.
Answer: hybrid Reference:
Comparing Topologies Difficulty: Easy
59.
CSMA/CD is the access method used on ____________
networks.
Answer: Ethernet Reference: Star Topology Difficulty: Challenging
60.
The
____________ passing method is used on a ring topology to avoid collisions.
Answer: token Reference: Ring Topology Difficulty: Moderate
61.
____________
is the amount of data that can be transmitted over transmission media in
a certain amount of time.
Answer: Bandwidth Reference: Wired Transmission Media Difficulty: Challenging
62.
A(n) ____________ is a set of rules for exchanging
communication.
Answer: protocol Reference: Star Topology Difficulty: Easy
63.
____________ cable is composed of a glass or
plastic fiber (or bundle of fibers) as its core.
Answer: Fiber-optic Reference: Fiber-Optic Cable Difficulty: Easy
64.
____________ networks do not need specialized
network operating system software.
Answer: Peer-to-peer Reference: Network Operating Systems Difficulty: Moderate
65.
The 802.11 wireless standard is also known as
____________.
Answer: Wi-Fi Reference: Wireless Media Options Difficulty: Easy
66.
In wireless networks, wireless NICs connect to
____________, which provide wireless devices with a sending and receiving
connection to the network.
Answer: wireless access points Reference: Network
Adapters Difficulty: Moderate
67.
____________ are containers that hold multiple data
packets.
Answer: Frames Reference: MAC Addresses Difficulty: Challenging
68.
The acronym MAC, as in MAC address, stands for
____________.
Answer: Media Access Control Reference: MAC Addresses Difficulty: Moderate
69.
A(n) ____________ sends data only to the intended
recipient as opposed to a hub, which sends the data to all devices connected to
it.
Answer: switch Reference: Switches and Bridges Difficulty: Moderate
70.
____________ are devices used to send data between
different segments (collision domains) on a network.
Answer: Bridges Reference: Switches and Bridges Difficulty: Easy
71.
____________ amplify a signal and retransmit it to
extend cable runs beyond the maximum run length.
Answer: Repeaters Reference:
Repeaters and Hubs Difficulty: Moderate
72.
____________ is the open protocol used by the
Internet.
Answer: TCP/IP Reference: Network Operating Systems Difficulty: Challenging
73.
EMI and RFI are types of ____________.
Answer: interference Reference: Wired Transmission Media Difficulty: Easy
74.
The term packet screening refers to the examination
of incoming data packets by the ____________to ensure that they originate or
are authorized by valid users on the internal network.
Answer: firewall Reference: Firewalls Difficulty: Moderate
75.
____________ use IP addresses to send information
between two networks.
Answer: Routers Reference: Routers Difficulty: Moderate
True and False:
76.
In a ring topology, if one computer fails it can
bring the entire network to a halt.
Answer: True Reference: Ring Topology Difficulty: Easy
77.
An application server acts as a go-between for
computers on an internal network and the external network (Internet).
Answer: False
(proxy) Reference: Firewalls Difficulty: Moderate
78.
The hub is responsible for breaking down data into
packets and preparing the packets for transmission across the network.
Answer: False (network adapter or NIC) Reference:
Network Adapters Difficulty: Easy
79.
In the OSI model, the session layer sets up and
manages the virtual (not physical) connection between the sending and receiving
devices.
Answer: True Reference: Dig Deeper: The OSI Model Difficulty: Challenging
80.
Twisted pair cable has the lowest susceptibility to
interference.
Answer: False (highest) Reference:
Figure 12.14: Comparison of Characteristics… Difficulty: Moderate
81.
Throughput is another name for bandwidth.
Answer: True Reference: Wired
Transmission Media Difficulty: Easy
82.
Crosstalk interference is the tendency of signals
on one twisted pair wire to interfere with signals on a wire next to it.
Answer: True Reference: Twisted
Pair Cable Difficulty: Easy
83.
The ring topology is the most widely deployed
client/server topology in businesses today.
Answer: False (star) Reference: Star Topology Difficulty: Moderate
84.
Token passing and CSMA/CD are methods of avoiding
data collisions.
Answer: True Reference: Network Topologies Difficulty: Easy
85.
A bus topology provides a fairer allocation of
resources than a ring topology by giving all the nodes on the network an equal
opportunity to send data.
Answer: False Reference: Ring Topology Difficulty: Challenging
86.
MAC addresses enable computers on one network to
communicate with computers on another network.
Answer: False (IP
addresses) Reference: MAC Addresses Difficulty: Moderate
87.
Bridges are relatively simple devices whose sole
purpose is to amplify a signal and retransmit it.
Answer: False (Repeaters) Reference:
Repeaters and Hubs Difficulty: Challenging
88.
In a star network, the failure of one computer
affects the other computers on the network.
Answer: False Reference: Figure 12.10: Advantages and Disadvantages of Bus,… Difficulty:
Easy
89.
Hubs receive a signal from a device, reconstruct
it, and transmit it to all the ports on the hub.
Answer: True Reference: Repeaters and Hubs Difficulty: Challenging
90.
Authentication can be achieved through passwords,
biometric access devices, and possessed objects.
Answer: True Reference: Authentication Difficulty: Easy
Matching:
91.
Match the following acronyms to their descriptions:
I. MAC A. type of interference
II. CSMA/CD B. device address
III. OSI C. Ethernet access
method
IV. EMI D. type of cable
V. UTP E. protocol standard
Answer: B, C, E, A, D Reference: Multiple locations in chapter Difficulty:
Moderate
92.
Match the following terms to their meanings:
II. bastion B. assemblage of packets
III. token C. a Novell protocol
IV. IPX D. host configured as
proxy server
V. jam E. signal indicating
data collisions
Answer: B, D, A, C, E Reference: Multiple locations in
chapter Difficulty: Moderate
93.
Match the following devices to their functions:
II. hub B. transmits data
between two different networks
III. switch C. device used for signal
amplification and retransmission
IV. bridge D. multiport device used for
signal amplification and broadcast
V. router E. connects collision
domains of a network
Answer: C, D, A, E, B Reference: Multiple locations in
chapter Difficulty: Challenging
94.
Match the following terms to their meanings:
II. proxy B. large size coaxial cable
III. intranet C. server controlling Internet
access of network
IV. protocol D. private Web-based network
V. ThickNet E. layout of a network
Answer: E, C, D, A, B Reference: Multiple locations in
chapter Difficulty: Moderate
95.
Match the following acronyms to their descriptions:
I. TCP/IP A. proprietary communications
protocol
II. IPX B. software controlling
communications in a network
III. NOS C. network spanning a
metropolitan area
IV. MAN D. type of network adapter
V. NIC E. open communications
protocol
Answer: E, A, B, C, D Reference: Multiple locations in
chapter Difficulty: Moderate
96.
Match the following OSI layers to their functions:
I. Session A. reformats, compresses, and
encrypts data
II. Presentation B. sets up a virtual connection
between sending and receiving devices and manages
communication
III. Data
Link C. determines where to
send the data packets on the network
IV. Transport D. assembles the data packets
into frames and delivers them to the physical layer
V. Network E. handles packet
acknowledgment
Answer: B, A, D, E, C Reference: Dig Deeper: The OSI Model Difficulty: Challenging
97.
Match the following terms to their meanings:
II. bend
radius B. examining incoming
data packets to ensure they originated from an authorized user
III. ThinNet C. degree of flexibility in a
cable
IV. authentication D. a type of coaxial cable used for
cable TV
V. packet
screening E. amount of data that can be
transmitted in a certain amount of time
Answer: E, C, D, A, B Reference: Multiple locations in
chapter Difficulty: Moderate
98.
Match the following terms to their meanings:
II. terminator B. a device that absorbs the
signal to prevent its reflection back onto the network
III. passive
topology C. a special data packet on a
ring topology
IV. access
method D. nodes on a network do
nothing to move data along the network
V. token E. controls how computers
can use the transmission media
Answer: A, B, D, E, C Reference: Multiple locations in
chapter Difficulty: Moderate
99.
Match the following terms to their meanings:
II. hybrid B. the routes
data takes to flow between devices
III. transmission
media C.
each node on the network is responsible for retransmitting the signal
IV. device
driver D. a chunk of
data containing the address of the receiving computer
V. packet E. enables a
device to communicate with the operating system
Answer: C, A, B, E, D Reference: Multiple locations in
chapter Difficulty: Moderate
100.
Match the following terms to their meanings:
II. CAT
6 B. can handle bandwidth
of 1 Gbps
III. open
protocol C. computers connected in
sequence on a single cable
IV. centralized D. not associated with one
particular vendor
V. bus E. characteristic of
client/server networks
Answer: A, B, D, E, C Reference: Multiple locations in
chapter Difficulty: Moderate
Q.46- In the OSI model, the ____________ layer is responsible for assembling the data packets into frames.
ReplyDeleteI think answer is Net work layer.. pls clarify.
thank you sir..
ReplyDeleteThank you sirji,
ReplyDeleteIf possible sir kuch ibps so ke questions bhi post kar do.
pranav
Very informative and worthy post. Thanks for the sharing such a precious updates with us.
ReplyDeletePanasonic - 10.1" Toughbook Notebook - 4 GB Memory - 320 GB Hard Drive
Panasonic - Refurbished - 10.4" Toughbook Notebook - 1 GB Memory - 80 GB Hard Drive - Magnesium Alloy
Thank you Sir :)
ReplyDeleteThank you for all your questions on basic networking sir.
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteAnkara
ReplyDeleteBolu
Sakarya
Mersin
Malatya
JU47
whatsapp görüntülü show
ReplyDeleteücretli.show
SF2
Bolu Lojistik
ReplyDeleteMardin Lojistik
Kocaeli Lojistik
Diyarbakır Lojistik
İstanbul Lojistik
UJR0N0
D6C24
ReplyDeleteDenizli Şehirler Arası Nakliyat
Çerkezköy Halı Yıkama
Ünye Boya Ustası
Kars Şehir İçi Nakliyat
Yenimahalle Fayans Ustası
Kütahya Şehirler Arası Nakliyat
Kocaeli Parça Eşya Taşıma
Ünye Koltuk Kaplama
Şırnak Parça Eşya Taşıma
3F8B4
ReplyDeletebinance kod
A9D08
ReplyDeletetrust
wallet ledger
eigenlayer
onekey wallet
web ledger wallet
ledger
web arculus
trezor suite
desktop ledger live