Home
MCQS
MCA MCQ Quiz Hub
Computer Network MCA Question MCQ Set 10
Choose a topic to test your knowledge and improve your MCA skills
1. Which of the following are Gigabit Ethernets?
1000 BASE-SX
1000 BASE-LX
1000 BASE-CX
all of the mentioned
2. _____ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.
Ethernet
Fast Ethernet
Gigabit Ethernet
Gigabyte Ethernet
3. ______ is another kind of fiber optic network with an active star for switching.
S/NET
SW/NET
NET/SW
FS/NET
4. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
14
15
16
30
5. You need to subnet a network into 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
6. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
2
3
4
5
7. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?
172.16.112.0
172.16.0.0
172.16.96.0
172.16.255.0
8. You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface?
6
8
30
32
9. What is the subnet id of a host with an IP address 172.16.66.0/21?
172.16.36.0
172.16.48.0
172.16.64.0
172.16.0.0
10. The network address of 172.16.0.0/19 provides how many subnets and hosts?
7 subnets, 30 hosts each
8 subnets, 8,190 hosts each
8 subnets, 2,046 hosts each
7 subnets, 2,046 hosts each
11. Which type of Ethernet framing is used for TCP/IP and DEC net?
Ethernet 802.3
Ethernet 802.2
Ethernet II
Ethernet SNAP
12. Consider a situation in which you are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem?
NetWare 4.11 defaults to 802.2 encapsulation
NetWare 4.11 defaults to 802.3 encapsulation
Cisco routers only work with NetWare 3.11
NetWare 3.11 defaults to 802.2 encapsulation
13. NetWare IPX addressing uses a network number and a node number. Which statement is not true?
The network address is administratively assigned and can be up to 16 hexadecimal digits long
The node address is always administratively assigned
The node address is usually the MAC address
If the MAC address is used as the node address, then IPX eliminates the use of ARP
14. Which NetWare protocol works on layer 3–network layer—of the OSI model?
IPX
NCP
SPX
NetBIOS
15. Which NetWare protocol provides link-state routing?
NLSP
RIP
SAP
NCP
16. As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?
Debug IP IGRP event
Debug IP IGRP-events
Debug IP IGRP summary
Debug IP IGRP events
17. What does the following series of commands “Router IGRP 71 network” accomplish? 10.0.0.0 router IGRP 109 network 172.68.7.0
It isolates networks 10.0.0.0 and 172.68.7.0
It loads IGRP for networks 109 and 71
It disables RIP
It disables all routing protocols
18. The “IPX delay number” command will allow an administrator to change the default settings. What are the default settings?
For LAN interfaces, one tick; for WAN interfaces, six ticks
For LAN interfaces, six ticks; for WAN interfaces, one tick
For LAN interfaces, zero ticks; for WAN interfaces, five ticks
For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
19. As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this?
Interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface Ethernet 0.2 IPX network 6c
Interface Ethernet 0 IPX encapsulation Novell-ether IPX network 9e interface Ethernet 0 IPX encapsulation sap IPX network 6c
Interface Ethernet 0.1 IPX encapsulation Novell-ether interface Ethernet 0.2 IPX encapsulation sap
Interface Ethernet 0.1ipx encapsulation Novell-ether IPX network 9e interface Ethernet 0.2 IPX encapsulation sap IPX network 6c
20. What does the “IPX maximum-paths 2” command accomplish?
It enables load sharing on 2 paths if the paths are equal metric paths
It sets up routing to go to network 2
It is the default for Cisco IPX load sharing
It enables load sharing on 2 paths if the paths are unequal metric paths
21. You want to enable both arpa and snap encapsulation on one router interface. How do you do this?
The interface can handle multiple encapsulation types with no extra configuration
Assign two network numbers, one for each encapsulation type
Enable Novell-ether to run multiple encapsulation types
Both arpa and snap are enabled by default so you don’t have to configure anything
22. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks?
Each router builds its own SAP table and forwards that every 60 seconds
Each router assigns a service number and broadcasts that
SAPs aren’t necessary with Cisco routers
Cisco routers filter out all SAPs
23. Novell’s implementation of RIP updates routing tables every _________ seconds.
60
90
10
30
24. In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics.
Ticks & Hops
Hops & Loops
Loops & Counts
Counts & Ticks
25. Which routing protocol has a maximum network diameter (hop count) of 15?
RIPv1
RIPv2
EIGRP
Both RIPv1 and RIPv2
26. How often does a RIPv1 router broadcast its routing table by default?
Every 30 seconds
Every 60 seconds
Every 90 seconds
RIPv1 does not broadcast periodically
27. Which command displays RIP routing updates?
Show IP route
Debug IP rip
Show protocols
Debug IP route
28. Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?
The updated information will be added to the existing routing table Debug IP rip
The update will be ignored and no further action will occur Debug IP route
The updated information will replace the existing routing table entry
The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence
29. You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?
The route is 16 hops away Debug IP rip
The route has a delay of 16 microseconds Debug IP route
The route is inaccessible
The route is queued at 16 messages a second
30. Default administrative distance of a static route is ________
0
90
100
1
31. Which protocol gives a full route table update every 30 seconds?
IEGRP
RIP
ICMP
IP
32. _______ is the default administrative distance of RIP.
0
90
120
130
33. Which statement is true regarding classless routing protocol?
The use of discontinuous networks is not allowed
Use of variable length subnet masks is permitted
RIPv1 is a classless routing protocol
IGRP supports classes routing within the same autonomous system
34. Where should we use default routing?
On stub networks- which have only one exit path out of the network
Which have more than one exit path out of the network
Minimum five exit paths out of the network
Maximum five exit paths out of the network
35. Which statement is true regarding classless routing protocols?
The use of discontinuous networks is not allowed
The use of variable length subnet masks is permitted
RIPv1 is a classless routing protocol
RIPv2 supports classless routing
36. What is route poisoning?
It sends back the protocol received from a router as a poison pill, which stops the regular updates. The use of variable length subnet masks is permitted
It is information received from a router that can’t be sent back to the originating router.RIPv2 supports classless routing
It prevents regular update messages from reinstating a route that has just come up
It describes when a router sets the metric for a downed link to infinity
37. Which of the following is true regarding RIPv2?
It has a lower administrative distance than RIPv1
It converges faster than RIPv1
It has the same timers as RIPv1
It is harder to configure than RIPv1
38. Which of the situations might not require multiple routing protocols in a network?
When a new Layer 2-only switch is added to the network
When you are migrating from one routing protocol to another
When you are using routers from multiple vendors
When there are host-based routers from multiple vendors
39. Which two routing protocols can be redistributed into OSPF by a Cisco router?
IP EIGRP and AppleTalk EIGRP
AppleTalk EIGRP and RIPv2
RIPv2 and IP EIGRP
RIPv2 and IP EIGRP
40. Which is a reason for avoiding doing route redistribution on two routers between the same two routing domains?
Higher cost of two routers
Routing feedback
Cisco IOS incompatibility
Not possible to use two routers
41. What does administrative distance rank?
Metrics
Sources of routing information
Router reliability
Best paths
42. Which protocol maintains neighbor adjacencies?
RIPv2 and EIGRP
IGRP and EIGRP
RIPv2
EIGRP
43. Which routing protocol implements the diffusing update algorithm?
IS-IS
IGRP
EIGRP
OSPF
44. In cryptography, what is cipher?
algorithm for performing encryption and decryption
encrypted message
both algorithm for performing encryption and decryption and encrypted message
decrypted message
45. In asymmetric key cryptography, the private key is kept by _____
sender
receiver
sender and receiver
all the connected devices to the network
46. Which one of the following algorithm is not used in asymmetric-key cryptography?
rsa algorithm
diffie-hellman algorithm
electronic code book algorithm
dsa algorithm
47. In cryptography, the order of the letters in a message is rearranged by ______
transpositional ciphers
substitution ciphers
both transpositional ciphers and substitution ciphers
quadratic ciphers
48. What is data encryption standard (DES)?
block cipher
stream cipher
bit cipher
byte cipher
49. Cryptanalysis is used ______
to find some insecurity in a cryptographic scheme
to increase the speed
to encrypt the data
to make new ciphers
50. Which one of the following is a cryptographic protocol used to secure HTTP connection?
stream control transmission protocol (SCTP)
transport layer security (TLS)
explicit congestion notification (ECN)
resource reservation protocol
Submit