90+ Computer Networking (CN) Solved MCQs

Third generation of firewall offers_ to prevent web fingerprint attacks.

The identity management system binds logical addresses to for reputed servers.

IPS in firewall stands for .

Third generation firewalls were otherwise called .

Second generation firewalls were otherwise called .

First generation firewalls were otherwise called .

Third general firewalls operated at layer of the OSI model.

Second general firewalls operated at layer of the OSI model.

First general firewalls operated at layer of the OSI model.

Filtering connections and disallowing prohibited connections is carried out using .

Connection to the Internet requires enforcement of security.

The address 2001:db8:a0b:12f0::1 is formatted in .

Internet is constituted of .

Computers and devices can be connected using technology to create a network.

Most of the wired network connections use .

The port for connecting broadband cable to a computer is called .

Wireless network connections use technologies.

are the hardware devices that help the computer to connect to a network.

MODEM stands for .

Routers help in .

IP address helps to a computer connected to a network.

Port number on a computer host connected to a network denotes a .

A program which runs in the background and sends results requested by a client is called a .

Firewall can .

Firewall can be implemented through .

The design adopted for connecting several hosts on a network is called .

When 2 devices are connected through a dedicated line, it is topology.

When all nodes are connected to a central hub, it is topology.

Usually, the network connecting hosts inside a single building is called .

Usually, the network connecting hosts located in several cities or nations is called .

When network hosts are connected without wires, protocol is used.

MODEM is a device used for converting .

MODEM is used to convey data over .

Hub is to switch/ bridge since it repeats data even to the unwanted connections.

Switch is to a hub since unwanted repetitions are curtailed.

The device which connects one Local Area Network to another Local Area Network is called

A cable with single copper core and braided metal shield is called .

Fibre optic cables are interferences from electric cables and electromagnetic waves.

Wireless networks communicate using signal instead of cables.

In the modern days, is the best choice for wireless networking.

Wireless networks are wired networks.

In terms of data safety, wireless networks are wired networks.

Normally, WiFi signal reach m distance.

WiFi networks have for connecting.

Name of a WiFi network may be .

Open WiFi networks have .

The network established using Bluetooth technology is called a .

Bluetooth permits .

UDP stands for .

allows for mapping IP address to an ethernet or hardware address.

is the version of Internet Protocol now being phased out.

IPV4 addresses have a by numeric address.

In a client server network, the ports in the range of 0 to 1023 are called ports.

Network protocols are standardized through .

RFC in networking stands for .

TCP/IP port number 7 is assigned for protocol.

TCP/IP port number 13 is assigned for protocol.

TCP/IP port number 17 is assigned for protocol.

TCP/IP port number 18 is assigned for protocol.

TCP/IP port number 20 is assigned for .

TCP/IP port number 23 is assigned for .

TCP/IP port number 25 is assigned for .

TCP/IP port number 69 is assigned for .

TCP/IP port number 80 is assigned for .

TCP/IP port number 109 is assigned for .

TCP/IP port number 118/ 156 is assigned for .

TCP/IP port number 119/ 443 is assigned for .

TCP/IP port number 143/ 220 is assigned for .

TCP/IP port number 161 is assigned for .

TCP/IP port number 443 is assigned for .

TCP/IP port number 530 is assigned for .

TCP/IP port number 546/ 547 is assigned for .

TCP/IP port number 993 is assigned for .

The FTP server which does not require login process is called .

Using FTP, a file can be copied from remote system to the local system using the command .

Using FTP, a file can be copied from local host to remote host using the command .

Using FTP, working directory on the remote host can be changed using the command .

Using FTP, working directory on the local host can be changed using the command .

Using FTP, list of files on the remote host can be viewed using the command .

Using FTP, a file on the remote host may be deleted using the command .

Using FTP, connection to remote FTP server may be terminated using the command .

Popular FTP clients are .

Usually, telnet connection is established using command followed by name of host.

In networking, MAC stands for .

Logical address of a host connected to a network is otherwise called address.

The addresses of class A network has subnet mask of .

The addresses of class B network has subnet mask of .

The addresses of class C network has subnet mask of .

First byte of class A network is in the range of .

First byte of class B network is in the range of .

First byte of class C network is in the range of .

Each class A network supports hosts.

Each class B network supports hosts.

IPV4 has got_ bits for addressing of hosts.

IPV6 has got bits for addressing of hosts.

IPV4 has got bytes for addressing of hosts.

IPV6 has got bytes for addressing of hosts.

Done Reading?

Your recent visits

McqMate.com is an educational platform, Which is developed BY STUDENTS, FOR STUDENTS, The main objective of our platform is to assist fellow students in preparing for exams and in their Studies throughout their Academic career.

MCQMATE IS ALSO AVAILABLE ON