InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
In File Transfer Protocol, data transfer cannot be done in __________(a) stream mode(b) block mode(c) compressed mode(d) message modeThis question was posed to me in homework.This interesting question is from Ports topic in chapter Networking of Computer Network |
|
Answer» The correct ANSWER is (d) message MODE |
|
| 52. |
The File Transfer Protocol is built on __________(a) data centric architecture(b) service oriented architecture(c) client server architecture(d) connection oriented architectureThe question was asked in an internship interview.I would like to ask this question from Ports topic in chapter Networking of Computer Network |
|
Answer» The correct answer is (c) CLIENT server architecture |
|
| 53. |
In Active mode FTP, the client initiates both the control and data connections.(a) True(b) FalseThe question was asked by my college director while I was bunking the class.This interesting question is from Ports in chapter Networking of Computer Network |
|
Answer» Correct option is (b) False |
|
| 54. |
In FTP protocol, a client contacts a server using ______ as the transport protocol.(a) Transmission control protocol(b) User datagram protocol(c) Datagram congestion control protocol(d) Stream control transmission protocolThe question was posed to me in an internship interview.I'm obligated to ask this question of Ports in chapter Networking of Computer Network |
|
Answer» Correct option is (a) Transmission CONTROL PROTOCOL |
|
| 55. |
FTP server listens for connection on which port number?(a) 20(b) 21(c) 22(d) 23The question was posed to me in an international level competition.The origin of the question is Ports in portion Networking of Computer Network |
|
Answer» The correct OPTION is (b) 21 |
|
| 56. |
In HTTP pipelining __________(a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses(b) multiple HTTP requests cannot be sent on a single TCP connection(c) multiple HTTP requests are sent in a queue on a single TCP connection(d) multiple HTTP requests are sent at random on a single TCP connectionI got this question in my homework.Enquiry is from Ports topic in chapter Networking of Computer Network |
|
Answer» Right option is (a) multiple HTTP requests are SENT on a SINGLE TCP connection without waiting for the corresponding responses |
|
| 57. |
HTTP client requests by establishing a __________ connection to a particular port on the server.(a) User datagram protocol(b) Transmission control protocol(c) Border gateway protocol(d) Domain host control protocolI have been asked this question in a job interview.This intriguing question originated from Ports topic in section Networking of Computer Network |
|
Answer» The correct ANSWER is (b) Transmission control protocol |
|
| 58. |
In the network HTTP resources are located by __________(a) Uniform resource identifier(b) Unique resource locator(c) Unique resource identifier(d) Union resource locatorI got this question in an interview for job.My question is based upon Ports in division Networking of Computer Network |
|
Answer» The CORRECT option is (a) UNIFORM RESOURCE IDENTIFIER |
|
| 59. |
HTTP is ________ protocol.(a) application layer(b) transport layer(c) network layer(d) data link layerThis question was posed to me by my school principal while I was bunking the class.This interesting question is from Ports topic in portion Networking of Computer Network |
|
Answer» Correct option is (a) APPLICATION layer |
|
| 60. |
Multiple objects can be sent over a TCP connection between client and server in a persistent HTTP connection.(a) True(b) FalseThis question was addressed to me in homework.The query is from Ports in chapter Networking of Computer Network |
|
Answer» Right option is (a) True |
|
| 61. |
Cryptographic hash function takes an arbitrary block of data and returns _________(a) fixed size bit string(b) variable size bit string(c) both fixed size bit string and variable size bit string(d) variable sized byte stringThe question was asked in an online quiz.Origin of the question is Cryptography topic in section Networking of Computer Network |
|
Answer» Correct answer is (a) fixed size bit string |
|
| 62. |
ElGamal encryption system is __________(a) symmetric key encryption algorithm(b) asymmetric key encryption algorithm(c) not an encryption algorithm(d) block cipher methodThe question was posed to me during an online interview.This key question is from Cryptography topic in portion Networking of Computer Network |
|
Answer» Correct choice is (b) ASYMMETRIC key encryption algorithm |
|
| 63. |
Voice privacy in GSM cellular telephone protocol is provided by _______(a) A5/2 cipher(b) b5/4 cipher(c) b5/6 cipher(d) b5/8 cipherI had been asked this question during an online exam.The question is from Cryptography in chapter Networking of Computer Network |
|
Answer» RIGHT answer is (a) A5/2 CIPHER The EXPLANATION: The A5/2 cipher was published in the YEAR 1996 and was cryptanalysed in the same year within a month. It’s use was discontinued from the year 2006 as it was really weak. |
|
| 64. |
Which one of the following is a cryptographic protocol used to secure HTTP connection?(a) stream control transmission protocol (SCTP)(b) transport layer security (TLS)(c) explicit congestion notification (ECN)(d) resource reservation protocolThis question was addressed to me by my college professor while I was bunking the class.I'm obligated to ask this question of Cryptography in division Networking of Computer Network |
|
Answer» CORRECT CHOICE is (b) transport LAYER security (TLS) To elaborate: TLS has strong message authentication and key-material generation to prevent eavesdropping, TAMPERING and message forgery. It has been used since the year 1996. |
|
| 65. |
Cryptanalysis is used __________(a) to find some insecurity in a cryptographic scheme(b) to increase the speed(c) to encrypt the data(d) to make new ciphersI had been asked this question by my college professor while I was bunking the class.I would like to ask this question from Cryptography in chapter Networking of Computer Network |
|
Answer» Correct option is (a) to find some insecurity in a cryptographic scheme |
|
| 66. |
What is data encryption standard (DES)?(a) block cipher(b) stream cipher(c) bit cipher(d) byte cipherI had been asked this question in an online interview.Origin of the question is Cryptography topic in chapter Networking of Computer Network |
|
Answer» CORRECT OPTION is (a) block cipher The explanation is: DES is a symmetric key block cipher in which the block size is 64 bits and the key size is 64 bits. It is VULNERABLE to some attacks and is hence not that popularly used. |
|
| 67. |
In cryptography, the order of the letters in a message is rearranged by __________(a) transpositional ciphers(b) substitution ciphers(c) both transpositional ciphers and substitution ciphers(d) quadratic ciphersThis question was addressed to me during an online exam.The query is from Cryptography in division Networking of Computer Network |
|
Answer» Correct ANSWER is (a) transpositional ciphers |
|
| 68. |
Which one of the following algorithm is not used in asymmetric-key cryptography?(a) rsa algorithm(b) diffie-hellman algorithm(c) electronic code book algorithm(d) dsa algorithmI got this question in final exam.My question is from Cryptography topic in portion Networking of Computer Network |
|
Answer» Correct answer is (C) ELECTRONIC code book algorithm |
|
| 69. |
In asymmetric key cryptography, the private key is kept by __________(a) sender(b) receiver(c) sender and receiver(d) all the connected devices to the networkI got this question in an international level competition.My question is from Cryptography in chapter Networking of Computer Network |
|
Answer» The correct answer is (B) receiver |
|
| 70. |
In cryptography, what is cipher?(a) algorithm for performing encryption and decryption(b) encrypted message(c) both algorithm for performing encryption and decryption and encrypted message(d) decrypted messageThe question was posed to me in exam.My question comes from Cryptography in portion Networking of Computer Network |
|
Answer» Right answer is (a) algorithm for PERFORMING ENCRYPTION and DECRYPTION |
|
| 71. |
Which routing protocol implements the diffusing update algorithm?(a) IS-IS(b) IGRP(c) EIGRP(d) OSPFI got this question by my college director while I was bunking the class.My question is based upon RIP v2 in division Networking of Computer Network |
|
Answer» Right CHOICE is (c) EIGRP |
|
| 72. |
Which protocol maintains neighbor adjacencies?(a) RIPv2 and EIGRP(b) IGRP and EIGRP(c) RIPv2(d) EIGRPI have been asked this question in an online interview.My question is taken from RIP v2 in portion Networking of Computer Network |
|
Answer» Right option is (C) RIPv2 |
|
| 73. |
What does administrative distance rank?(a) Metrics(b) Sources of routing information(c) Router reliability(d) Best pathsThe question was asked in an interview for job.Question is from RIP v2 in section Networking of Computer Network |
|
Answer» Right answer is (b) SOURCES of routing information |
|
| 74. |
Which is a reason for avoiding doing route redistribution on two routers between the same two routing domains?(a) Higher cost of two routers(b) Routing feedback(c) Cisco IOS incompatibility(d) Not possible to use two routersThe question was asked in an internship interview.My enquiry is from RIP v2 in chapter Networking of Computer Network |
|
Answer» The CORRECT option is (b) Routing feedback |
|
| 75. |
Which two routing protocols can be redistributed into OSPF by a Cisco router?(a) IP EIGRP and AppleTalk EIGRP(b) AppleTalk EIGRP and RIPv2(c) RIPv2 and IP EIGRP(d) IPX RIP & AppleTalk EIGRPThe question was asked by my school teacher while I was bunking the class.My doubt is from RIP v2 topic in section Networking of Computer Network |
|
Answer» Right option is (c) RIPv2 and IP EIGRP |
|
| 76. |
Which of the situations might not require multiple routing protocols in a network?(a) When a new Layer 2-only switch is added to the network(b) When you are migrating from one routing protocol to another(c) When you are using routers from multiple vendors(d) When there are host-based routers from multiple vendorsThis question was posed to me in class test.My enquiry is from RIP v2 in chapter Networking of Computer Network |
|
Answer» Right choice is (a) When a new Layer 2-only switch is ADDED to the network |
|
| 77. |
Which of the following is true regarding RIPv2?(a) It has a lower administrative distance than RIPv1(b) It converges faster than RIPv1(c) It has the same timers as RIPv1(d) It is harder to configure than RIPv1I got this question in semester exam.My enquiry is from RIP v2 topic in chapter Networking of Computer Network |
|
Answer» Right choice is (c) It has the same timers as RIPv1 |
|
| 78. |
What is route poisoning?(a) It sends back the protocol received from a router as a poison pill, which stops the regular updates. The use of variable length subnet masks is permitted(b) It is information received from a router that can’t be sent back to the originating router.RIPv2 supports classless routing(c) It prevents regular update messages from reinstating a route that has just come up(d) It describes when a router sets the metric for a downed link to infinityThis question was posed to me in semester exam.The doubt is from RIP v2 in portion Networking of Computer Network |
|
Answer» The correct option is (d) It describes when a ROUTER sets the metric for a downed LINK to infinity |
|
| 79. |
Which statement is true regarding classless routing protocols?(a) The use of discontinuous networks is not allowed(b) The use of variable length subnet masks is permitted(c) RIPv1 is a classless routing protocol(d) RIPv2 supports classless routingThe question was posed to me during an internship interview.Question is taken from RIP v2 in division Networking of Computer Network |
|
Answer» CORRECT choice is (b) The USE of variable length SUBNET masks is permitted Easy explanation: Classful routing means that all hosts in the internetwork use the same mask. Classless routing means that you can use Variable Length Subnet Masks (VLSMs) and can also SUPPORT DISCONTINUOUS networking. |
|
| 80. |
Where should we use default routing?(a) On stub networks- which have only one exit path out of the network(b) Which have more than one exit path out of the network(c) Minimum five exit paths out of the network(d) Maximum five exit paths out of the networkThis question was addressed to me in unit test.My enquiry is from RIP v1 in chapter Networking of Computer Network |
|
Answer» CORRECT CHOICE is (a) On stub NETWORKS- which have only one exit PATH out of the network Explanation: We MUST use default routing on stub networks. They have only one exit path out of the network, so there can be no specific path decided for such networks. |
|
| 81. |
Which statement is true regarding classless routing protocol?(a) The use of discontinuous networks is not allowed(b) Use of variable length subnet masks is permitted(c) RIPv1 is a classless routing protocol(d) IGRP supports classes routing within the same autonomous systemThis question was addressed to me in unit test.This interesting question is from RIP v1 topic in chapter Networking of Computer Network |
|
Answer» Correct answer is (b) USE of VARIABLE length subnet masks is PERMITTED |
|
| 82. |
_________ is the default administrative distance of RIP.(a) 0(b) 90(c) 120(d) 130I had been asked this question in final exam.My doubt stems from RIP v1 in portion Networking of Computer Network |
|
Answer» The correct choice is (c) 120 |
|
| 83. |
Which protocol gives a full route table update every 30 seconds?(a) IEGRP(b) RIP(c) ICMP(d) IPThis question was posed to me in an international level competition.My doubt is from RIP v1 topic in chapter Networking of Computer Network |
|
Answer» Correct choice is (b) RIP |
|
| 84. |
Default administrative distance of a static route is ________(a) 0(b) 90(c) 100(d) 1The question was posed to me in exam.The question is from RIP v1 in chapter Networking of Computer Network |
|
Answer» Right answer is (d) 1 |
|
| 85. |
You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?(a) The route is 16 hops away Debug IP rip(b) The route has a delay of 16 microseconds Debug IP route(c) The route is inaccessible(d) The route is queued at 16 messages a secondThis question was addressed to me during a job interview.The query is from RIP v1 topic in section Networking of Computer Network |
|
Answer» Correct option is (c) The route is inaccessible |
|
| 86. |
Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?(a) The updated information will be added to the existing routing table Debug IP rip(b) The update will be ignored and no further action will occur Debug IP route(c) The updated information will replace the existing routing table entry(d) The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergenceI had been asked this question by my college professor while I was bunking the class.My doubt is from RIP v1 in division Networking of Computer Network |
|
Answer» The correct option is (b) The update will be ignored and no further action will occur Debug IP route |
|
| 87. |
Which command displays RIP routing updates?(a) Show IP route(b) Debug IP rip(c) Show protocols(d) Debug IP routeThe question was asked during an internship interview.This key question is from RIP v1 in division Networking of Computer Network |
|
Answer» Correct option is (b) Debug IP rip |
|
| 88. |
How often does a RIPv1 router broadcast its routing table by default?(a) Every 30 seconds(b) Every 60 seconds(c) Every 90 seconds(d) RIPv1 does not broadcast periodicallyThe question was posed to me by my school principal while I was bunking the class.This intriguing question originated from RIP v1 in chapter Networking of Computer Network |
|
Answer» Correct CHOICE is (a) Every 30 seconds |
|
| 89. |
Which routing protocol has a maximum network diameter (hop count) of 15?(a) RIPv1(b) RIPv2(c) EIGRP(d) Both RIPv1 and RIPv2The question was posed to me by my school principal while I was bunking the class.The doubt is from RIP v1 topic in section Networking of Computer Network |
|
Answer» CORRECT answer is (d) Both RIPv1 and RIPV2 Explanation: Both RIPv1 and RIPv2 SUPPORT a maximum hop COUNT of 15 because they use 4-bits to store this value. RIPv1 USES classful routing whereas RIPv2 uses classless routing. The routing updates are broadcasted over the network. It notifies routers about the update so that they update their own routing tables. |
|
| 90. |
In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics.(a) Ticks & Hops(b) Hops & Loops(c) Loops & Counts(d) Counts & TicksI got this question in homework.The origin of the question is IP Routing in section Networking of Computer Network |
|
Answer» The correct answer is (a) TICKS & Hops |
|
| 91. |
Novell’s implementation of RIP updates routing tables every _________ seconds.(a) 60(b) 90(c) 10(d) 30The question was posed to me in an international level competition.My question is based upon IP Routing in section Networking of Computer Network |
|
Answer» Right option is (a) 60 |
|
| 92. |
To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks?(a) Each router builds its own SAP table and forwards that every 60 seconds(b) Each router assigns a service number and broadcasts that(c) SAPs aren’t necessary with Cisco routers(d) Cisco routers filter out all SAPsThis question was posed to me in homework.Question is from IP Routing topic in division Networking of Computer Network |
|
Answer» Right OPTION is (a) Each router builds its own SAP table and forwards that every 60 seconds |
|
| 93. |
By default, Cisco routers forward GNS SAPs to remote networks.(a) False(b) TrueThis question was posed to me during an online exam.This intriguing question originated from IP Routing in portion Networking of Computer Network |
|
Answer» Correct option is (a) False |
|
| 94. |
You want to enable both arpa and snap encapsulation on one router interface. How do you do this?(a) The interface can handle multiple encapsulation types with no extra configuration(b) Assign two network numbers, one for each encapsulation type(c) Enable Novell-ether to run multiple encapsulation types(d) Both arpa and snap are enabled by default so you don’t have to configure anythingThis question was posed to me in homework.My question is based upon IP Routing in division Networking of Computer Network |
|
Answer» The correct choice is (b) Assign two NETWORK numbers, one for each encapsulation type |
|
| 95. |
What does the “IPX maximum-paths 2” command accomplish?(a) It enables load sharing on 2 paths if the paths are equal metric paths(b) It sets up routing to go to network 2(c) It is the default for Cisco IPX load sharing(d) It enables load sharing on 2 paths if the paths are unequal metric pathsThis question was addressed to me in unit test.My question is taken from IP Routing topic in chapter Networking of Computer Network |
|
Answer» Correct OPTION is (a) It enables load sharing on 2 paths if the paths are equal metric paths |
|
| 96. |
The “IPX delay number” command will allow an administrator to change the default settings. What are the default settings?(a) For LAN interfaces, one tick; for WAN interfaces, six ticks(b) For LAN interfaces, six ticks; for WAN interfaces, one tick(c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks(d) For LAN interfaces, five ticks; for WAN interfaces, zero TicksThe question was posed to me during an internship interview.My doubt is from IP Routing in chapter Networking of Computer Network |
|
Answer» Correct answer is (a) For LAN interfaces, one tick; for WAN interfaces, six ticks |
|
| 97. |
As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?(a) Debug IP IGRP event(b) Debug IP IGRP-events(c) Debug IP IGRP summary(d) Debug IP IGRP eventsI had been asked this question at a job interview.My question is taken from IP Routing in section Networking of Computer Network |
|
Answer» RIGHT answer is (d) Debug IP IGRP EVENTS The best explanation: The “debug IP IGRP events” is USED to DISPLAY a short summary of IGRP routing information. You can append an IP address onto EITHER console’s command-line to see only the IGRP updates from a neighbor. The command will only give a short summary and hence won’t flood the command line. |
|
| 98. |
Which NetWare protocol provides link-state routing?(a) NLSP(b) RIP(c) SAP(d) NCPI have been asked this question during an online interview.This is a very interesting question from IP Routing in division Networking of Computer Network |
|
Answer» The correct choice is (a) NLSP |
|
| 99. |
Which NetWare protocol works on layer 3–network layer—of the OSI model?(a) IPX(b) NCP(c) SPX(d) NetBIOSThis question was posed to me in an online interview.This question is from IP Routing in section Networking of Computer Network |
|
Answer» Right answer is (a) IPX |
|
| 100. |
NetWare IPX addressing uses a network number and a node number. Which statement is not true?(a) The network address is administratively assigned and can be up to 16 hexadecimal digits long(b) The node address is always administratively assigned(c) The node address is usually the MAC address(d) If the MAC address is used as the node address, then IPX eliminates the use of ARPThis question was posed to me in quiz.Enquiry is from IP Routing in chapter Networking of Computer Network |
|
Answer» Correct choice is (b) The NODE ADDRESS is always ADMINISTRATIVELY assigned |
|