Networks & Telecommunication MCQs

Networks & Telecommunication MCQs

Answer these 200+ Networks & Telecommunication MCQs and assess your grip on the subject of Networks & Telecommunication.
Scroll below and get started!

A.   EIA/TIA 568BA standard

B.   EIA/TIA 568A standard

C.   EIA/TIA RS-232 (Recommended Standard 232)

D.   EIA/TIA Commercial Building Wiring Standard

2: ____ is a set of protocols created to support the secure transfer of data at the ip layer.

A.   Transport Layer Security (TLS)

B.   IPsec (IP security)

C.   Date Encryption Standard (DES)

D.   Advanced Encryption Standard (AES

3: ____ is an example of a circuit-switched network.

A.   A telephone system

B.   The Internet

C.   The United States Postal Service

D.   A local area network

4: ____ is most frequently associated with data classification schemes.

A.   Top secret

B.   Need to know

C.   Kerberos

D.   /etc/passwd

5: ____ lets a router represent an entire local area network to the internet as a single ip address.

A.   TCP


C.   ARP

D.   NAT

E.   None of the above

6: ____ multiplexing is the multiplexing technique used to support sonet.

A.   FDM

B.   ADM

C.   Frequency division

D.   Synchronous time division

7: ____ storage allocation allows files to use any storage space available on the disk.

A.   Contiguous

B.   Noncontiguous

C.   Fragmented

D.   Extended

8: A ____ is a hardware device that allows several nodes to share one communication channel.

A.   Multiplexer

B.   Controller

C.   Terminator

D.   Router

9: A _____ sends messages through several connected lans or to a wide-area network.

A.   Router

B.   Network interface card

C.   Bridge

D.   Gateway

10: A ________ is a formatted message that passes through networks.

A.   Codec

B.   Protocol

C.   Package

D.   Packet

11: In lans, ________ typically is for ________.

A.   Trunk lines

B.   Access lines

C.   Workgroup switches

D.   Core switches

12: Most internet connections use ____ transmission.

A.   Full-duplex

B.   Speed

C.   Digital

D.   The middle

13: Rfid technology is most useful in areas where ____ is used.

A.   Rfid

B.   Bluetooth

C.   Electromagnetic spectrum

D.   Automatic identification

14: The process of deciding which path data takes on a network is called _____.

A.   Convergence

B.   Roaming

C.   Divergence

D.   Routing

15: The shell that is used by default in linux is the ____ shell.


B.   Root

C.   Gdm

D.   Command line

16: The snmp manager stores the information it receives from get commands ________.

A.   In the MIB

B.   On the agent.

C.   On the managed device.

D.   In the cloud

17: The sql injection statement ____ determines the names of different fields in a database.

A.   Whatever AND email IS NULL; --

B.   Whatever; AND email IS NULL; --

C.   Whatever” AND email IS NULL; --

D.   Whatever’ AND email IS NULL;

18: To create a positive online learning experience, _____.

A.   Content that is unrelated to the learning objectives should also be included in e-learning

B.   The use of multiple types of media to deliver e-learning should be avoided

C.   Trainees should be allowed to skip over material that they are competent in

D.   Learning modules should be kept long and delivered continuously

19: Wi-fi access points are connected to networks via ____.

A.   Hotspots

B.   True

C.   ZigBee

D.   Network cable

20: Most large-scale delivery services use a ____ system to connect source and destination nodes.

A.   Point-to-point

B.   Store and forward

C.   High-capacity

D.   Media access

21: To boldface text in html, you would enclose your text in ________.

A.   and

B.   /b and b

C.   *b* and */b*

D.   HTM.bold.on and

22: Jitter is a problem for ________.

A.   Voice over IP (VoIP)

B.   Streaming media.

C.   Both A and B

D.   Neither A nor B

23: The windows server 2012 edition which is designed for servers with up to 64 processors is _____:

A.   Use the Minimal Server Interface

B.   Windows Server 2012 R2 Datacenter

C.   Minimal Server Interface

D.   Windows Server 2012 R2 Essentials

24: To exchange information, two antennas must be tuned to the same __________.

A.   Frequency

B.   Bandwidth

C.   Amplitude

D.   Wavelength

25: Wireless network devices use ________ to communicate with each other.

A.   Fiber optics

B.   Satellites

C.   Radio waves

D.   DSL

26: Wireless networks usually use ____ signals to send data.

A.   Fiber optics

B.   Satellites

C.   Radio

D.   DSL

27: You can configure the windows firewall to allow or block specific _________.

A.   Ports, protocols,

B.   Applications, users,

C.   And IP address ranges

D.   All of these

28: ____ media operate on line-of-sight.

A.   Terrestrial microwave

B.   Coaxial

C.   Multipoint

D.   Fiber optic

29: ____ operates at the network layer and manages multicasting



C.   UDP

D.   IP

30: A transparent bridge creates the internal port table by using a form of ____.

A.   Forward learning

B.   Backward learning

C.   Backward correction

D.   Forward correction

31: A(n) ____ idps is focused on protecting network information assets.

A.   Network-based

B.   Application-based

C.   Host-based

D.   Server-based

32: A(n) _____ enables communication between a video card and memory.

A.   Internal bus

B.   Keyboard

C.   Floppy drive

D.   Optical disc

33: Public places where you can wirelessly connect to the internet are known as ________.

A.   Hotspots

B.   WiFi hotspots

C.   Wireless hotspots

D.   All of these

34: Ethernet standards are specified at the ________ layer.

A.   Physical

B.   Internet

C.   Both A and B

D.   Neither A nor B

35: A physical topology ____

A.   Specifies device types

B.   Depicts a network in broad scope

C.   Specifies connectivity methods

D.   Specifies addressing schemes

36: Each vm is known as a ____

A.   Client

B.   Guest

C.   Host

D.   Node

37: Telecommunications around the world are shifting to ________ networks.

A.   Cellular

B.   Mobile

C.   Wi-Fi

D.   VoIP

38: When three resistors are combined in series, the total resistance of the combination is __________.

A.   The average of the individual resistance values

B.   Less than any of the individual resistance values

C.   Greater than any of the individual resistance values

D.   None of the above

39: The longest transmission distances are possible with ________.

A.   USB

B.   UTP

C.   Single-mode fiber

D.   Multimode fiber

40: Firewalls can be used on web ____.

A.   Session Keys

B.   Private key encryption

C.   Web Servers and Web Clients

D.   None of these

41: A dynamic disk requires ____ mb of storage for the disk management database

A.   1

B.   2

C.   3

D.   4

42: Log files are typically stored in the ____ directory.

A.   Alert

B.   /etc/skel

C.   /var/log

D.   None of these

43: Most files on a linux system that contain configuration information are ____ files.

A.   System

B.   Text

C.   Directory

D.   Program

44: Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.

A.   Breaks

B.   Corruption

C.   Degradation

D.   Failures

A.   Fiber optics

B.   Coaxial Cable

C.   Wireless LAN

D.   None of these

46: A ________ sends data between two networks.

A.   Bridge

B.   Switch

C.   Router

D.   Link

47: To allow multiple users to share a single medium, fdm assigns each user a separate ____.

A.   Time slot

B.   Transmission code

C.   Channel

D.   Amplitude

48: Eavesdropping usually is more of a concern for ________ lans than for ________ lans.

A.   Wired, wireless

B.   Wireless, wired

C.   About an equal concern for wired and wireless LANs

D.   None of the above

49: If a firewall has to drop packets because it cannot keep up with traffic volume, this is ________.

A.   Good because it will prevent possible attack packets from entering the network

B.   Bad because valid, non-attack packets will be dropped and this will effectively created a self-generated DOS attack

C.   Both A and B

D.   Neither A nor B

50: In vpns designed to frustrate evil twin attacks, the shared secret ________.

A.   Is transmitted in the clear

B.   Is transmitted with cryptographic protections

C.   Is not transmitted

D.   Any of the above