InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called _______(a) short frame(b) runt frame(c) mini frame(d) man frameI had been asked this question in semester exam.Query is from Ethernet topic in section Network Layer of Computer Network |
|
Answer» RIGHT choice is (B) runt frame To explain: An ethernet frame that is less than the IEEE 802.3 MINIMUM LENGTH of 64 octets is called a runt frame. Such frames are a RESULT of collisions or software malfunctions. |
|
| 2. |
What is interframe gap?(a) idle time between frames(b) idle time between frame bits(c) idle time between packets(d) idle time between networksI got this question in examination.My question is from Ethernet in division Network Layer of Computer Network |
|
Answer» Right option is (a) IDLE time between frames |
|
| 3. |
The maximum size of payload field in ethernet frame is __________(a) 1000 bytes(b) 1200 bytes(c) 1300 bytes(d) 1500 bytesI have been asked this question in a job interview.Question is taken from Ethernet in division Network Layer of Computer Network |
|
Answer» Correct ANSWER is (d) 1500 BYTES |
|
| 4. |
High speed ethernet works on _________(a) coaxial cable(b) twisted pair cable(c) optical fiber(d) unshielded twisted pair cableI had been asked this question during an online interview.This question is from Ethernet in portion Network Layer of Computer Network |
|
Answer» Right choice is (c) optical fiber |
|
| 5. |
A point-to-point protocol over ethernet is a network protocol for __________(a) encapsulating PPP frames inside ethernet frames(b) encapsulating ehternet framse inside PPP frames(c) for security of ethernet frames(d) for security of PPP framesThe question was asked in an interview for internship.The doubt is from Ethernet in chapter Network Layer of Computer Network |
|
Answer» RIGHT answer is (a) encapsulating PPP FRAMES INSIDE ethernet frames Best explanation: PPoE or Point-to-Point protocol over Ethernet was first introduced in 1999. It is popularly used by modern DAY Internet Service Providers for Dial-up connectivity. |
|
| 6. |
Ethernet in metropolitan area network (MAN) can be used as ___________(a) pure ethernet(b) ethernet over SDH(c) ethernet over MPLS(d) all of the mentionedThis question was posed to me during a job interview.My query is from Ethernet topic in division Network Layer of Computer Network |
|
Answer» The correct answer is (d) all of the mentioned |
|
| 7. |
What is autonegotiation?(a) a procedure by which two connected devices choose common transmission parameters(b) a security algorithm(c) a routing algorithm(d) encryption algorithmThis question was addressed to me in unit test.This intriguing question comes from Ethernet topic in division Network Layer of Computer Network |
|
Answer» CORRECT answer is (a) a procedure by which two connected devices choose common transmission parameters To EXPLAIN: autonegotiation is a procedure by which two connected devices choose common transmission parameters. It is a SIGNALING mechanism used in Ethernet over Twisted PAIR cables. |
|
| 8. |
MAC address is of ___________(a) 24 bits(b) 36 bits(c) 42 bits(d) 48 bitsThe question was asked in homework.This intriguing question originated from Ethernet in division Network Layer of Computer Network |
|
Answer» Right choice is (d) 48 bits |
|
| 9. |
What is start frame delimeter (SFD) in ethernet frame?(a) 10101010(b) 10101011(c) 00000000(d) 11111111I had been asked this question during a job interview.This intriguing question comes from Ethernet in section Network Layer of Computer Network |
|
Answer» The correct option is (b) 10101011 |
|
| 10. |
Ethernet frame consists of ____________(a) MAC address(b) IP address(c) Default mask(d) Network addressI had been asked this question during an interview for a job.The question is from Ethernet topic in portion Network Layer of Computer Network |
|
Answer» RIGHT answer is (a) MAC address Easy explanation: The Ethernet FRAME has a header that contains the source and destination MAC address. Each MAC address is of 48 bits. |
|
| 11. |
Choose the wrong statement from the following.(a) Nslookup is used to query a DNS server for DNS data(b) Ping is used to check connectivity(c) Pathping combines the functionality of ping with that of route(d) Ifconfig can configure TCP/IP network interface parametersI have been asked this question by my college director while I was bunking the class.I'd like to ask this question from Network Utilities in portion Network Layer of Computer Network |
|
Answer» The correct answer is (c) Pathping combines the FUNCTIONALITY of ping with that of route |
|
| 12. |
__________ allows checking if a domain is available for registration.(a) Domain Check(b) Domain Dossier(c) Domain Lookup(d) Domain registersI have been asked this question by my college professor while I was bunking the class.My enquiry is from Network Utilities in division Network Layer of Computer Network |
|
Answer» The CORRECT ANSWER is (a) Domain Check |
|
| 13. |
Which of the following is not related to ipconfig in Microsoft Windows?(a) Display all current TCP/IP network configuration values(b) ModifyDHCPsettings(c) Modify DNS settings(d) Trace the routers in the path to destinationI got this question during an online interview.This is a very interesting question from Network Utilities topic in division Network Layer of Computer Network |
|
Answer» Right option is (d) TRACE the routers in the path to DESTINATION |
|
| 14. |
If you want to find the number of routers between a source and destination, the utility to be used is ___________(a) route(b) Ipconfig(c) Ifconfig(d) TracerouteI have been asked this question during an online interview.This question is from Network Utilities topic in section Network Layer of Computer Network |
|
Answer» Right answer is (d) Traceroute |
|
| 15. |
__________ command is used to manipulate TCP/IP routing table.(a) route(b) Ipconfig(c) Ifconfig(d) TracerouteThis question was posed to me in my homework.My enquiry is from Network Utilities topic in chapter Network Layer of Computer Network |
|
Answer» The CORRECT choice is (a) route |
|
| 16. |
ICMP is used in _________(a) Ping(b) Traceroute(c) Ifconfig(d) Both Ping & TracerouteI had been asked this question by my college professor while I was bunking the class.Question is from Network Utilities topic in division Network Layer of Computer Network |
|
Answer» Correct CHOICE is (d) Both Ping & TRACEROUTE |
|
| 17. |
Ping sweep is a part of _________(a) Traceroute(b) Nmap(c) Route(d) IpconfigThis question was posed to me in class test.The query is from Network Utilities in chapter Network Layer of Computer Network |
|
Answer» The correct choice is (b) Nmap |
|
| 18. |
Ping can _________(a) Measure round-trip time(b) Report packet loss(c) Report latency(d) All of the mentionedThis question was addressed to me during an online interview.This key question is from Network Utilities in chapter Network Layer of Computer Network |
|
Answer» Correct option is (d) All of the mentioned |
|
| 19. |
A network management system can be divided into ___________(a) three categories(b) five broad categories(c) seven broad categories(d) ten broad categoriesI got this question during an internship interview.I want to ask this question from Network Management topic in division Network Layer of Computer Network |
|
Answer» Right choice is (b) five BROAD categories |
|
| 20. |
MIB is a collection of groups of objects that can be managed by __________(a) SMTP(b) UDP(c) SNMP(d) TCP/IPThe question was asked during an interview for a job.Origin of the question is Network Management in chapter Network Layer of Computer Network |
|
Answer» Right option is (c) SNMP |
|
| 21. |
In Network Management System, maps track each piece of hardware and its connection to the _________(a) IP Server(b) Domain(c) Network(d) DataI have been asked this question in a job interview.Question is taken from Network Management topic in division Network Layer of Computer Network |
|
Answer» Correct option is (c) Network |
|
| 22. |
Which of the following networks supports pipelining effect?(a) Circuit-switched networks(b) Message-switched networks(c) Packet-switched networks(d) Stream-switched networksI have been asked this question in an internship interview.My enquiry is from Network Management in section Network Layer of Computer Network |
|
Answer» The correct answer is (C) Packet-SWITCHED networks |
|
| 23. |
The physical connection between an end point and a switch or between two switches is __________(a) Transmission path(b) Virtual path(c) Virtual circuit(d) Transmission circuitI got this question in an international level competition.My enquiry is from Network Management topic in chapter Network Layer of Computer Network |
|
Answer» CORRECT option is (a) Transmission path The explanation: The physical connection between an end POINT and a switch or between two switches is transmission path. The transmission path is the physical ROADWAY that the packet needs to PROPAGATE in order to travel through the network. |
|
| 24. |
Control of users’ access to network resources through charges is the main responsibility of ______________(a) Reactive Fault Management(b) Reconfigured Fault Management(c) Accounting Management(d) Security ManagementThe question was asked in an interview for job.The question is from Network Management topic in section Network Layer of Computer Network |
|
Answer» Correct answer is (c) Accounting Management |
|
| 25. |
In Network Management System, the term that is responsible for controlling access to network based on predefined policy is called ___________(a) Fault Management(b) Secured Management(c) Active Management(d) Security ManagementThis question was addressed to me in unit test.My question comes from Network Management in division Network Layer of Computer Network |
|
Answer» The CORRECT option is (d) Security Management |
|
| 26. |
Configuration management can be divided into two subsystems: reconfiguration and __________(a) Documentation(b) Information(c) Servers(d) EntityI had been asked this question in an internship interview.This question is from Network Management in portion Network Layer of Computer Network |
|
Answer» Right option is (a) Documentation |
|
| 27. |
Performance management is closely related to _________(a) Proactive Fault Management(b) Fault management(c) Reactive Fault Management(d) Preventive Fault ManagementI got this question in final exam.This interesting question is from Network Management topic in section Network Layer of Computer Network |
|
Answer» CORRECT OPTION is (b) Fault management The EXPLANATION: Fault management is really CLOSELY related to performance management. It is important to ensure that the network handles faults as effectively as it handles it’s normal functioning to achieve better performance management. |
|
| 28. |
Complex networks today are made up of hundreds and sometimes thousands of _________(a) Documents(b) Components(c) Servers(d) EntitiesThis question was posed to me in an internship interview.I'm obligated to ask this question of Network Management in portion Network Layer of Computer Network |
|
Answer» Right OPTION is (b) Components |
|
| 29. |
A firewall needs to be __________ so that it can grow proportionally with the network that it protects.(a) Robust(b) Expansive(c) Fast(d) ScalableThe question was posed to me during an interview for a job.My doubt is from Firewalls topic in division Network Layer of Computer Network |
|
Answer» Right option is (B) Expansive |
|
| 30. |
A stateful firewall maintains a ___________ which is a list of active connections.(a) Routing table(b) Bridging table(c) State table(d) Connection tableI had been asked this question in semester exam.Enquiry is from Firewalls in chapter Network Layer of Computer Network |
|
Answer» Right option is (a) Routing table |
|
| 31. |
What tells a firewall how to reassemble a data stream that has been divided into packets?(a) The source routing feature(b) The number in the header’s identification field(c) The destination IP address(d) The header checksum field in the packet headerI got this question by my college director while I was bunking the class.Question is taken from Firewalls in chapter Network Layer of Computer Network |
|
Answer» Right answer is (a) The source routing feature |
|
| 32. |
What is one advantage of setting up a DMZ with two firewalls?(a) You can control where traffic goes in three networks(b) You can do stateful packet filtering(c) You can do load balancing(d) Improved network performanceThe question was posed to me during an online exam.This intriguing question comes from Firewalls in section Network Layer of Computer Network |
|
Answer» The correct option is (c) You can do load BALANCING |
|
| 33. |
A packet filter firewall filters at __________(a) Physical layer(b) Data link layer(c) Network layer or Transport layer(d) Application layerThis question was addressed to me by my college director while I was bunking the class.This key question is from Firewalls topic in portion Network Layer of Computer Network |
|
Answer» Right answer is (c) Network layer or TRANSPORT layer |
|
| 34. |
A proxy firewall filters at _________(a) Physical layer(b) Data link layer(c) Network layer(d) Application layerI got this question in class test.Enquiry is from Firewalls topic in portion Network Layer of Computer Network |
|
Answer» The CORRECT answer is (d) APPLICATION layer |
|
| 35. |
Which of the following is / are the types of firewall?(a) Packet Filtering Firewall(b) Dual Homed Gateway Firewall(c) Screen Host Firewall(d) Dual Host FirewallThe question was posed to me in an interview.The origin of the question is Firewalls topic in section Network Layer of Computer Network |
|
Answer» Right option is (a) Packet Filtering Firewall |
|
| 36. |
A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as __________(a) Chock point(b) Meeting point(c) Firewall point(d) Secure pointThis question was posed to me in my homework.I'd like to ask this question from Firewalls topic in chapter Network Layer of Computer Network |
|
Answer» Right answer is (a) Chock point |
|
| 37. |
Network layer firewall has two sub-categories as _________(a) State full firewall and stateless firewall(b) Bit oriented firewall and byte oriented firewall(c) Frame firewall and packet firewall(d) Network layer firewall and session layer firewallThe question was asked in an online quiz.This interesting question is from Firewalls topic in division Network Layer of Computer Network |
|
Answer» Right answer is (a) State full firewall and stateless firewall |
|
| 38. |
Network layer firewall works as a __________(a) Frame filter(b) Packet filter(c) Content filter(d) Virus filterThe question was posed to me in homework.I'd like to ask this question from Firewalls topic in division Network Layer of Computer Network |
|
Answer» RIGHT choice is (b) PACKET filter The explanation: As you know, firewalls are AVAILABLE as hardware appliances, as software-only, or a combination of the TWO. In every case, the purpose of a firewall is to ISOLATE your trusted internal network (or your personal PC) from the dangers of unknown resources on the Internet and other network connections that may be harmful. The firewall prevents unauthorized access to your internal, trusted network from outside threats. |
|
| 39. |
Which of the following is false with respect to the datagram networks?(a) Number of flows of packets are not limited(b) Packets may not be in order at the destination(c) Path is not reserved(d) Delay is the same for all packets in a flowI have been asked this question by my college director while I was bunking the class.Origin of the question is Datagram Networks in section Network Layer of Computer Network |
|
Answer» The correct CHOICE is (d) Delay is the same for all PACKETS in a flow |
|
| 40. |
The probability of the error in a transmitted block _________ with the length of the block(a) Remains same(b) Decreases(c) Increases(d) Is not proportionalThis question was posed to me in an international level competition.This interesting question is from Datagram Networks in division Network Layer of Computer Network |
|
Answer» Correct answer is (C) Increases |
|
| 41. |
During datagram switching, the packets are placed in __________ to wait until the given transmission line becomes available.(a) Stack(b) Queue(c) Hash(d) Routing tableThe question was asked in my homework.This is a very interesting question from Datagram Networks in portion Network Layer of Computer Network |
|
Answer» The correct CHOICE is (b) Queue |
|
| 42. |
Which of the following is true with respect to the delay in datagram networks?(a) Delay is greater than in a virtual circuit network(b) Each packet may experience a wait at a switch(c) Delay is not uniform for the packets of a message(d) All of the mentionedThe question was asked in semester exam.I'm obligated to ask this question of Datagram Networks in chapter Network Layer of Computer Network |
|
Answer» Correct option is (d) All of the mentioned |
|
| 43. |
Which of the following remains same in the header of the packet in a datagram network during the entire journey of the packet?(a) Destination address(b) Source address(c) Checksum(d) PaddingI had been asked this question in a job interview.My query is from Datagram Networks topic in portion Network Layer of Computer Network |
|
Answer» Correct answer is (a) Destination address |
|
| 44. |
The main contents of the routing table in datagram networks are ___________(a) Source and Destination address(b) Destination address and Output port(c) Source address and Output port(d) Input port and Output portI got this question in an interview.The query is from Datagram Networks topic in portion Network Layer of Computer Network |
|
Answer» The CORRECT choice is (b) Destination address and Output PORT |
|
| 45. |
Datagrams are routed to their destinations with the help of ________(a) Switch table(b) Segments table(c) Datagram table(d) Routing tableThis question was addressed to me in semester exam.The origin of the question is Datagram Networks in section Network Layer of Computer Network |
|
Answer» The correct option is (d) Routing table |
|
| 46. |
Datagram networks mainly refers to _________(a) Connection oriented networks(b) Connection less networks(c) Telephone networks(d) InternetworkThis question was addressed to me in exam.This interesting question is from Datagram Networks in division Network Layer of Computer Network |
|
Answer» The CORRECT OPTION is (b) Connection less networks |
|
| 47. |
Packets in datagram switching are referred to as ________(a) Switches(b) Segments(c) Datagrams(d) Data-packetsI got this question by my college director while I was bunking the class.The above asked question is from Datagram Networks topic in portion Network Layer of Computer Network |
|
Answer» Correct option is (c) Datagrams |
|
| 48. |
Datagram switching is done at which layer of OSI model?(a) Network layer(b) Physical layer(c) Application layer(d) Transport layerThis question was posed to me in an online quiz.My question comes from Datagram Networks topic in division Network Layer of Computer Network |
|
Answer» Right answer is (a) NETWORK layer |
|
| 49. |
Which OSPF show command describes a list of OSPF adjacencies?(a) Show ip ospf interface(b) Show ip ospf(c) Show ip route(d) Show ip ospf neighborI got this question during a job interview.This question is from OSPF Configuration topic in chapter Network Layer of Computer Network |
|
Answer» The correct OPTION is (d) Show ip OSPF neighbor |
|
| 50. |
Which two commands are required for basic OSPF configuration?(a) “[Network mask] area [area-id]” and “Router ospf [process-id]”(b) “[Wildcard-mask] area [area-id]” and “[Network mask] area [area-id]”(c) Only “Router ospf [process-id]”(d) “[Wildcard-mask] area [area-id]” and “Router ospf [process-id]”I got this question by my college professor while I was bunking the class.Question is from OSPF Configuration topic in chapter Network Layer of Computer Network |
|
Answer» The correct choice is (d) “[Wildcard-mask] area [area-id]” and “ROUTER ospf [process-id]” |
|