Networks & Telecommunication MCQs

Networks & Telecommunication MCQs

Answer these 200+ Networks & Telecommunication MCQs and assess your grip on the subject of Networks & Telecommunication.
Scroll below and get started!

A.   EIA/TIA 568BA standard

B.   EIA/TIA 568A standard

C.   EIA/TIA RS-232 (Recommended Standard 232)

D.   EIA/TIA Commercial Building Wiring Standard

2: ____ is a set of protocols created to support the secure transfer of data at the ip layer.

A.   Transport Layer Security (TLS)

B.   IPsec (IP security)

C.   Date Encryption Standard (DES)

D.   Advanced Encryption Standard (AES

3: ____ is an example of a circuit-switched network.

A.   A telephone system

B.   The Internet

C.   The United States Postal Service

D.   A local area network

4: ____ is most frequently associated with data classification schemes.

A.   Top secret

B.   Need to know

C.   Kerberos

D.   /etc/passwd

5: ____ lets a router represent an entire local area network to the internet as a single ip address.

A.   TCP

B.   DHCP

C.   ARP

D.   NAT

E.   None of the above

6: ____ multiplexing is the multiplexing technique used to support sonet.

A.   FDM

B.   ADM

C.   Frequency division

D.   Synchronous time division

7: ____ storage allocation allows files to use any storage space available on the disk.

A.   Contiguous

B.   Noncontiguous

C.   Fragmented

D.   Extended

8: A ____ is a hardware device that allows several nodes to share one communication channel.

A.   Multiplexer

B.   Controller

C.   Terminator

D.   Router

9: A _____ sends messages through several connected lans or to a wide-area network.

A.   Router

B.   Network interface card

C.   Bridge

D.   Gateway

10: A ________ is a formatted message that passes through networks.

A.   Codec

B.   Protocol

C.   Package

D.   Packet

11: In lans, ________ typically is for ________.

A.   Trunk lines

B.   Access lines

C.   Workgroup switches

D.   Core switches

12: Most internet connections use ____ transmission.

A.   Full-duplex

B.   Speed

C.   Digital

D.   The middle

13: Rfid technology is most useful in areas where ____ is used.

A.   Rfid

B.   Bluetooth

C.   Electromagnetic spectrum

D.   Automatic identification

14: The process of deciding which path data takes on a network is called _____.

A.   Convergence

B.   Roaming

C.   Divergence

D.   Routing

15: The shell that is used by default in linux is the ____ shell.

A.   BASH

B.   Root

C.   Gdm

D.   Command line

16: The snmp manager stores the information it receives from get commands ________.

A.   In the MIB

B.   On the agent.

C.   On the managed device.

D.   In the cloud

17: The sql injection statement ____ determines the names of different fields in a database.

A.   Whatever AND email IS NULL; --

B.   Whatever; AND email IS NULL; --

C.   Whatever” AND email IS NULL; --

D.   Whatever’ AND email IS NULL;

18: To create a positive online learning experience, _____.

A.   Content that is unrelated to the learning objectives should also be included in e-learning

B.   The use of multiple types of media to deliver e-learning should be avoided

C.   Trainees should be allowed to skip over material that they are competent in

D.   Learning modules should be kept long and delivered continuously

19: Wi-fi access points are connected to networks via ____.

A.   Hotspots

B.   True

C.   ZigBee

D.   Network cable

20: Most large-scale delivery services use a ____ system to connect source and destination nodes.

A.   Point-to-point

B.   Store and forward

C.   High-capacity

D.   Media access

21: To boldface text in html, you would enclose your text in ________.

A.   and

B.   /b and b

C.   *b* and */b*

D.   HTM.bold.on and HTM.bold.off

22: Jitter is a problem for ________.

A.   Voice over IP (VoIP)

B.   Streaming media.

C.   Both A and B

D.   Neither A nor B

23: The windows server 2012 edition which is designed for servers with up to 64 processors is _____:

A.   Use the Minimal Server Interface

B.   Windows Server 2012 R2 Datacenter

C.   Minimal Server Interface

D.   Windows Server 2012 R2 Essentials

24: To exchange information, two antennas must be tuned to the same __________.

A.   Frequency

B.   Bandwidth

C.   Amplitude

D.   Wavelength

25: Wireless network devices use ________ to communicate with each other.

A.   Fiber optics

B.   Satellites

C.   Radio waves

D.   DSL

26: Wireless networks usually use ____ signals to send data.

A.   Fiber optics

B.   Satellites

C.   Radio

D.   DSL

27: You can configure the windows firewall to allow or block specific _________.

A.   Ports, protocols,

B.   Applications, users,

C.   And IP address ranges

D.   All of these

28: ____ media operate on line-of-sight.

A.   Terrestrial microwave

B.   Coaxial

C.   Multipoint

D.   Fiber optic

29: ____ operates at the network layer and manages multicasting

A.   IGMP

B.   ICMP

C.   UDP

D.   IP

30: A transparent bridge creates the internal port table by using a form of ____.

A.   Forward learning

B.   Backward learning

C.   Backward correction

D.   Forward correction

31: A(n) ____ idps is focused on protecting network information assets.

A.   Network-based

B.   Application-based

C.   Host-based

D.   Server-based

32: A(n) _____ enables communication between a video card and memory.

A.   Internal bus

B.   Keyboard

C.   Floppy drive

D.   Optical disc

33: Public places where you can wirelessly connect to the internet are known as ________.

A.   Hotspots

B.   WiFi hotspots

C.   Wireless hotspots

D.   All of these

34: Ethernet standards are specified at the ________ layer.

A.   Physical

B.   Internet

C.   Both A and B

D.   Neither A nor B

35: A physical topology ____

A.   Specifies device types

B.   Depicts a network in broad scope

C.   Specifies connectivity methods

D.   Specifies addressing schemes

36: Each vm is known as a ____

A.   Client

B.   Guest

C.   Host

D.   Node

37: Telecommunications around the world are shifting to ________ networks.

A.   Cellular

B.   Mobile

C.   Wi-Fi

D.   VoIP

38: When three resistors are combined in series, the total resistance of the combination is __________.

A.   The average of the individual resistance values

B.   Less than any of the individual resistance values

C.   Greater than any of the individual resistance values

D.   None of the above

39: The longest transmission distances are possible with ________.

A.   USB

B.   UTP

C.   Single-mode fiber

D.   Multimode fiber

40: Firewalls can be used on web ____.

A.   Session Keys

B.   Private key encryption

C.   Web Servers and Web Clients

D.   None of these

41: A dynamic disk requires ____ mb of storage for the disk management database

A.   1

B.   2

C.   3

D.   4

42: Log files are typically stored in the ____ directory.

A.   Alert

B.   /etc/skel

C.   /var/log

D.   None of these

43: Most files on a linux system that contain configuration information are ____ files.

A.   System

B.   Text

C.   Directory

D.   Program

44: Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.

A.   Breaks

B.   Corruption

C.   Degradation

D.   Failures

A.   Fiber optics

B.   Coaxial Cable

C.   Wireless LAN

D.   None of these

46: A ________ sends data between two networks.

A.   Bridge

B.   Switch

C.   Router

D.   Link

47: To allow multiple users to share a single medium, fdm assigns each user a separate ____.

A.   Time slot

B.   Transmission code

C.   Channel

D.   Amplitude

48: Eavesdropping usually is more of a concern for ________ lans than for ________ lans.

A.   Wired, wireless

B.   Wireless, wired

C.   About an equal concern for wired and wireless LANs

D.   None of the above

49: If a firewall has to drop packets because it cannot keep up with traffic volume, this is ________.

A.   Good because it will prevent possible attack packets from entering the network

B.   Bad because valid, non-attack packets will be dropped and this will effectively created a self-generated DOS attack

C.   Both A and B

D.   Neither A nor B

50: In vpns designed to frustrate evil twin attacks, the shared secret ________.

A.   Is transmitted in the clear

B.   Is transmitted with cryptographic protections

C.   Is not transmitted

D.   Any of the above

51: The highest-level dns servers are called ________.

A.   Root servers.

B.   Top-level servers.

C.   Both A and B

D.   Neither A nor B

52: Wireless radio transmission speed is usually measured in terms of ________.

A.   Wavelength

B.   Frequency

C.   Amplitude

D.   Wetness

53: If a firewall cannot keep up with traffic volume, it will ________.

A.   Stateful packet inspection

B.   Both good because it will prevent possible attack packets from entering the network and bad because valid, non-attack packets will be dropped and this will effectively created a self-generated DOS attack

C.   Both stateful packet and static packet filtering

D.   Drop packets it cannot process

54: Raid 0 uses disk ____, which spreads files over several disk drives.

A.   Burning

B.   Striping

C.   Clustering

D.   Mirroring

55: The delegation of control wizard is capable of ________ permissions.

A.   Granting

B.   Modifying

C.   Removing

D.   All the above

56: ________ permits two or more people to communicate over the internet in real time.

A.   E-mail

B.   Snapfish

C.   Flickr

D.   Instant messaging

57: ____ technology may someday replace today?s bar code system for identifying items in inventory.

A.   RFID

B.   FRID

C.   DRIF

D.   IRDF

58: The test statement ____ would be used to determine if a is numerically greater than b.

A.   [ A –gt B ]

B.   [ A –bt B ]

C.   [ A –et B ]

D.   [ A –at B

59: A(n) ____ connection is one in which the transfer speeds in both directions are equal.

A.   Symmetric

B.   Static

C.   Asymmetric

D.   Dynamic

60: The data transfer speed of a wide area network (wan) depends on the speed of _____.

A.   Its interconnections

B.   Its application layers

C.   The expansion of the data source

D.   The expansion of the data sink

61: Regarding security templates, a strategy plan should consider ______.

A.   Departmental roles

B.   Workstation locations

C.   Individual users and job functions

D.   Computer roles

62: The distance between corresponding points on a wave's cycle is called its ____.

A.   Wavelength

B.   Speed

C.   Amplitude

D.   Frequency

63: ___________ ensures that the network is operating as efficiently as possible.

A.   Firefighting

B.   Fault tolerance

C.   Fault management

D.   Performance management

E.   Troubleshooting

64: Getting a hash value with a ____ is much faster and easier than with a(n) ____.

A.   High-level language, assembler

B.   HTML editor, hexadecimal editor

C.   Computer forensics tool, hexadecimal editor

D.   Hexadecimal editor, computer forensics tool

65: Most home networks use ________ cable, which is most susceptible to interference.

A.   Fiber-optic

B.   Unshielded twisted-pair

C.   Wi-Fi

D.   Coaxial

66: Technical management of the internet's domain name system is coordinated by ____.

A.   The government

B.   ICANN

C.   CANN

D.   The Internet

67: The more twists per foot in a pair of wires, the more resistant the pair will be to ____.

A.   Throughput

B.   Attenuation

C.   Cross talk

D.   Latency

68: The transmission control protocol (tcp) operates at the osi model's ____ layer.

A.   Network

B.   Term

C.   Routing

D.   Terminators

69: A(n) _____________ is not a common type of dedicated server.

A.   File server

B.   Print server

C.   Database server

D.   Collision server

70: A(n) ____________________ printer has its own nic.

A.   Infrared

B.   Network

C.   Default

D.   Inkjet

71: A ________ network can contain servers as well as individual computers.

A.   Client/server.

B.   Peer-to-peer.

C.   Switch.

D.   Star

72: To drive around a city looking for working access points that are unprotected is ________.

A.   Drive-by hacking

B.   War driving

C.   Both of these

D.   None of these

73: The wi-fi alliance calls 802.1x mode ________ mode.

A.   Enterprise.

B.   Personal.

C.   WEP

D.   WPA.

74: The physical address assigned to each network adapter is called its ________ address.

A.   Network access control (NAC)

B.   Physical address control (PAC)

C.   Network physical address (NPA)

D.   Media access control (MAC)

75: The internet2 (i2) project started in ____.

A.   969

B.   1978

C.   1987

D.   1995

76: Cars often have ________ networks.

A.   Wi-Fi and Bluetooth

B.   Exhaust and fuel injection

C.   IPv7 and IPv6

D.   ROVER-5 and ethernet

77: If more users move to an access point, this decreases ________.

A.   Individual throughput

B.   Aggregate throughput

C.   Both A and B

D.   Neither A nor B

78: In 802.11i, ________ authentication always uses ssl/tls.

A.   Inner

B.   Outer

C.   Both A and B

D.   Neither A nor B

79: Rerouting traffic using arp poisoning is an attack on ________ of a network.

A.   Functionality

B.   Confidentiality

C.   Both A and B

D.   None of the above

80: Strong encryption now requires ________-bit keys.

A.   40

B.   128

C.   256

D.   512

81: The ____ command will confirm the system directory that you are currently in.

A.   Dir

B.   Whereami

C.   Pwd

D.   Ld

82: Early local area networks transmitted data at only ____ million bits per second.

A.   1

B.   100

C.   10

D.   1000.

83: Using a wireless network without the network owner's permission is known as ________.

A.   Piggybacking.

B.   Hijacking.

C.   Spamming.

D.   Phishing

84: The original first-generation cell phones were ____ and designed for voice data only.

A.   Analog

B.   Magnetic

C.   Discrete

D.   Digital.

85: ____ is a serial connection or bus that can carry multiple channels of data at the same time.

A.   Fibre Channel

B.   NfiniBand

C.   USB

D.   SCSI

86: Local gpos contain fewer options than domain gpos. local gpos do not support ______.

A.   Folder redirection or Group Policy software installation

B.   Yes, if the workstation is running the Remote Server Administration Tools package

C.   Software settings, Windows settings, and Administrative Templates

D.   Group Policy Management console

87: Configuring a central store of admx files help solve the problem of ________.

A.   "SYSVOL bloat"

B.   Starter GPO

C.   Local GPO

D.   The first

88: Another name for cellular networking is ______ networking.

A.   Wide area, organic, computer, or (mobile).

B.   POTS, DSLAM, [CMTS], or ONT

C.   FTTB, FTTH, FTTX, or [FTTN]

D.   [Overlap], Distance, Security, or Speed

89: Another name for diagnostic software tools is ____.

A.   Networkmonitorsoftware

B.   Utilitysoftware

C.   Registryeditors

D.   Remotecontrolsoftware.

90: A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.

A.   Management

B.   Copy

C.   Image

D.   Full backup.

91: Fibre channel can support the interconnection of up to ____ devices only.

A.   56

B.   256

C.   126

D.   512.

92: The most common 1-gigabit ethernet standard in use today is ____.

A.   1000Base-T

B.   1000Base-SX

C.   10GBase-SR

D.   1000Base-LX.

93: The typical query one dns server sends to a root name server is called a(n) _______.

A.   Recursive query

B.   Iterative query

C.   Referral

D.   Forwarded query

94: In the fhs, the _____ directory contains the linux kernel and files used by the boot loader.

A.   /load

B.   /bin

C.   /boot

D.   /mnt

95: The logical printer that users can access in windows is known as a _______.

A.   Print device

B.   Printer

C.   Printer job

D.   Printer spooler.

96: The dominant architecture used to secure network access today is the __________ firewall.

A.   Static

B.   Bastion.

C.   Unlimited.

D.   Screened subnet.

97: The easiest method for monitoring free space by mounted filesystems is to use the ____ command.

A.   U

B.   Df

C.   Fs

D.   Fd.

98: A(n) ____ policy controls password characteristics for local user accounts.

A.   Encryption

B.   Account Lockout

C.   Hash

D.   Password

99: The core component of the gui in linux is referred to as ____.

A.   GNOME

B.   KDE

C.   Red Hat

D.   X Windows

100: The elapsed time for data to make a round trip from point a to point b and back is called ____.

A.   Router

B.   Portable

C.   Uploaded

D.   Latency