Open In App

MCQ on Computer Networking for Bank Exams

Improve
Improve
Like Article
Like
Save
Share
Report

Here is the first set of questions for the Networking topic. A little bit is related to internet questions. Therefore interconnection between the topics might help. Please go through the practice set of questions and let us know if any discrepancy is there. Its very deep topic not very easy therefore pay your full focus to the topic.

Ques 1. Which of the following is the actual IP address?

(a) Inside local address

(b) Inside global address

(c) Outside local address

(d) WAN

(e) None of these

Answer: Option (c)

Explanation:

The actual IP address in a network is outside the local address. Inside the local address is the private network.
 

Ques 2. Which of the following ( is a Network address translation)  can be used to have one IP address that allows many users the browsing?

(a) Intranet

(b) NAT

(c)  PAT

(d) Mesh

(e) Dynamic

Answer: Option (c)

Explanation:

For interconnection of many networks or many users that can have more than one IP address is known as PAT. PAT stands for Port Address Translation where the port is addressed. 
 

Ques 3. Which of the following commands is used to create a configurational backup?

(a) Running back & copy

(b) Copy running-config startup-config

(c) Configurational Mem

(d) Wr Mem

(e) None of the above

Answer: Option (b)

Explanation:

The command used to create a configurational backup is copy running-config startup-config. It is stored in ROM as it is a non-volatile memory and all of the configurations are not lost if the device does not lose power. We need to type the given command to create the backup as told.
 

Ques 4. Which of the following WLAN specification at 2.4 GHz allows up to 54 Mbps?

(a) A

(b) F

(c) G 

(d) B

(e) None of these

Answer: Option (c)

Explanation:

G is the IEEE 802.11 WLAN specification which allows 54 Mbps top speed at 2.4 GHz. The original frame of 802.11 was launched in 1997 and had a data speed of 1-2 Mbps at 2.4 GHz. Further amendments were done to reach the top speed.
 

Ques 5. For the IOS backup which command we shall use?

(a) IOS Disk backup

(b) IOS TFTP copy

(c) Copy Flash TFTP

(d) Any of the above

(e) None of these

Answer: Option (c)

Explanation:

The command to use for IOS backup is Copy Flash TFTP. We use the given command prompt for copying any file name.
 

Ques 6. IP address 192.168.168.188.255.255.255.192 has there a place on which of the following valid IP host ranges?

(a) 192.168.168.129-190

(b) 192.168.168.129-152

(c) 192.168.168.129-192

(d) 192.168.152.129-151

(e) None of these

Answer: Option (a)

Explanation:

We have a certain calculation for the IP addresses:

256 – 192 = 64, 64 + 64 = 128, 128 + 64 = 192.

The subnet address will be 128, the broadcast address will be 192. Valid host numbers are between 129-190 therefore the address start from 192 and end on 129 – 190.
 

Ques 7. To set a Telnet password on a cisco router we set a command called?

(a) line con 0

(b) line telnet 0 4

(c) line con  1

(d) line vty 0 4

(e) None of these

Answer: Option (d)

Explanation:

The command to be set for the telnet password will be line vty 0 4. There is a step-by-step process for these commands:

Step 1- Configuration mode is entered

Step 2- Login on the vty lines enabled

Step 3- We set a password for telnet access

Step 4- Finally the execution time is entered.
 

Ques 8. A device that can connect to a network without a cable is referred to as-

(a) Distributed device

(b) Centralized device

(c) Open-source device

(d) Wireless device

(e) None of these

Answer: Option (d)

Explanation:

Cell phones, personal digital assistants, pagers, and other devices that only receive and/or send voice, data, or video signals using radio waves in conjunction with other technologies are referred to as wireless devices (such as the Internet).
 

Ques 9. Class of IP address which has the most number of hosts available?

(a)  A and B

(b) A

(c) B and C

(d) D

(e) None of these

Answer: Option (b)

Explanation:

Class A has the most number of hosts available. These are used for huge networks and are deployed by ISPs.
 

Ques 10. The most affordable MODEMs can transmit-

(a) 300 bits per second

(b) 1,200 bits per second

(c) 2,400 bits per second

(d) 1600 bits per second

(e) 3600 bits per second

Answer: Option (b)

Explanation:

The least expensive modems have a 1200 bps transmission rate.

 

Ques 11. Stub in a network is known as:

(a) Having only one exit and one entry point

(b) Having more than one entry point

(c) Having no Exit point

(d) Having more than one exit point

(e) No exit and no entry point

Answer: Option (a)

Explanation:

Stub networks are those that can have multiple networks but have one single point for a destination. They primarily do not connect the outside data packets or are deadline LANs that have only one network exit.
 

Ques 12.  What are VLANs known for?

(a) If we have a cisco switched network then only VLANs work.

(b) In the same VTP domain we must have more than 10 switches 

(c) VTP is used to send VLAN information to switches in a VTP domain

(d) All of the above

(e) None of the above

Answer: Option (b)

Explanation:

Cisco switches by default do not send any VLAN information. We shall always configure the VTP domain for the system. Virtual trunk protocol (VTP) is used as a trunk link for VLAN information propagation.
 

Ques 13. What is done by VLANs?

(a) More than one collision domain are provided on one switch.

(b) It is the quickest port to all servers.

(c) It is broken into the broadcast domain of the layer 2 switch network.

(d) Any of the above

(e) None of the above

Answer: Option (c)

Explanation:

VLANs are known as virtual LANs. It is broken in to broadcast domain of the layer 2 switch network. 
 

Ques 14. How many types of VLANs are there?

(a) 4

(b) 5

(c) 6

(d) 3

(e) 7

Answer: Option (b)

There are 5 types of VLANs. They are:

Default VLAN, Data VLAN, Voice VLAN, Management VLAN, and Native VLAN. 
 

Ques 15. Which of the following is the protocol used by ping?

(a) ICMP

(b) SNMP

(c)  SDP

(d) TCP

(e) None of these

Answer: Option (a)

Explanation:

ICMP is probably the most well-known message protocol for the ping command. A ping command sends an ICMP echo request for the ping command access.
 

Ques 16. How many types of controlled access methods are there?

(a) 3

(b) 4

(c) 5

(d) 6

(e) None of the above

Answer: Option (a)

Explanation:

There are three controlled access methods to be known. They are:

1) Reservation

2) Polling

3) Token Passing
 

Ques 17.  What is framing in a data link layer?

(a) Framing is done manually 

(b) Framing is done digitally

(c) In parts manually and digitally

(d) Not transmitted digitally

(e) None of the above

Answer: Option (b)

Explanation:

Frames are transmitted digitally in units. They are comparable to photons which are called packets of energy. Frames are used in the time division multiplexing process.
 

Ques 18. The network structure is divided into how many parts?

(a) 1

(b) 3

(c) 5

(d) 6

(e) 2

Answer: Option (b)

Explanation:

The network structure is divided into three parts as follows:

Network edge, Network core, and Access network.
 

Ques 19. The area of server memory reserved for momentarily storing data packets from workstations is known as-

(a) Dirty packet buffer

(b) Packet block

(c) Packet receive buffer

(d) Packet cache buffer

(e) None of the above

Answer: Option (c)

Explanation:

A packet buffer is a memory area designated for the storage of packets that are either being transmitted over networks or have been received over networks. These memory regions can be found in the computer that houses the network interface card (NIC) or in the card itself.
 

Ques 20. What are hamming codes in computer networks?

(a) It is a code to crack any network

(b) It is a logical code for the interconnection

(c) Set of error correction codes to detect and correct the errors

(d) Codes for multiplexing

(e) None of these

Answer: Option (c)

Explanation:

Hamming codes are the set of error correction codes that are used to detect and correct the errors which can occur when the data is moved from the sender to the receiver. It is a technique developed by R.W. hamming for error correction.

 



Last Updated : 25 Nov, 2022
Like Article
Save Article
Previous
Next
Share your thoughts in the comments
Similar Reads