Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

99701.

Open Shortest Path First (OSPF) is also called as _____________(a) Link state protocol(b) Error-correction protocol(c) Routing information protocol(d) Border gateway protocol

Answer» The correct option is (a) Link state protocol

The best explanation: In OSPF, the link state of each path is checked, and then the shortest path is chosen among only the open state links. Each OSPF router monitors the cost of the link to each of its neighbors and then floods the link state information to other routers in the network.
99702.

DHCP uses UDP port _________ for sending data to the server.(a) 66(b) 67(c) 68(d) 69

Answer» The correct choice is (b) 67

For explanation I would say: 67 is the UDP port number that is used as the destination port of a server. Whereas UDP port number 68 is used by the client.
99703.

The network layer protocol for internet is __________(a) ethernet(b) internet protocol(c) hypertext transfer protocol(d) file transfer protocol

Answer» Right option is (b) internet protocol

Easy explanation: There are several protocols used in Network layer. Some of them are IP, ICMP, CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet protocol is for data link layer.
99704.

The link necessarily begins and ends with this phase. During the ______ phase, the LCP automata will be in INITIAL or STARTING states.(a) Link-termination phase(b) Link establishment phase(c) Authentication phase(d) Link dead phase

Answer» Right answer is (d) Link dead phase

The explanation: The link necessarily begins and ends with the link dead phase. During this phase, the LCP automata will be in the initial or its final state. The link is non-functioning or inactive during the link dead phase.
99705.

Expansion of FTP is __________(a) Fine Transfer Protocol(b) File Transfer Protocol(c) First Transfer Protocol(d) Fast Transfer Protocol

Answer» The correct option is (b) File Transfer Protocol

For explanation I would say: File Transfer Protocol is an application layer protocol used to share “files” between a server and a client. The protocol uses two separate ports for data and control connections: port 20 for data and port 21 for control.
99706.

Which methods are commonly used in Server Socket class?(a) Public Output Stream get Output Stream ()(b) Public Socket accept ()(c) Public synchronized void close ()(d) Public void connect ()

Answer» Correct option is (b) Public Socket accept ()

To explain I would say: The Public socket accept () method is used by the ServerSocket class to accept the connection request of exactly one client at a time. The client requests by initializing the socket object with the servers IP address.
99707.

When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________(a) DNS lookup(b) DNS hijacking(c) DNS spoofing(d) DNS authorizing

Answer» The correct option is (c) DNS spoofing

Explanation: In DNS spoofing, also known as DNS cache poisoning, an attacker gets the valid credentials from a victim by spoofing the intended resource, and tricking the victim to give his/her valid authorization credentials.
99708.

A Link Control Protocol (LCP) is used for ____________(a) Establishing, configuring and testing the data-link connection(b) Establishing and configuring different network-layer protocols(c) Testing the different network-layer protocols(d) Provides for multiplexing of different network-layer protocols

Answer» The correct choice is (a) Establishing, configuring and testing the data-link connection

Explanation: The Link Control Protocol (LCP) is the part of PPP that is used for establishing, configuring and testing the data-link connection. The other two components are Network Control Protocol and Encapsulation.
99709.

In File Transfer Protocol, data transfer cannot be done in __________(a) stream mode(b) block mode(c) compressed mode(d) message mode

Answer» The correct answer is (d) message mode

To elaborate: In Stream mode, the data is transferred in a continuous stream. In Block mode, data is transferred after being divided into smaller blocks. In Compressed mode, data is transferred after being compressed using some compression algorithm.
99710.

In File Transfer Protocol, data transfer cannot be done in ___________(a) stream mode(b) block mode(c) compressed mode(d) message mode

Answer» Correct option is (d) message mode

For explanation: In Stream mode, the data is transferred in a continuous stream. In Block mode, data is transferred after being divided into smaller blocks. In Compressed mode, data is transferred after being compressed using some compression algorithm.
99711.

Transmission control protocol ___________(a) is a connection-oriented protocol(b) uses a three way handshake to establish a connection(c) receives data from application as a single stream(d) all of the mentioned

Answer» The correct answer is (d) all of the mentioned

To explain: TCP provides reliable and ordered delivery of a stream of bytes between hosts communicating via an IP network. Major internet applications like www, email, file transfer etc rely on TCP. TCP is connection oriented and it is optimized for accurate delivery rather than timely delivery.
99712.

WiMAX uses the _________(a) orthogonal frequency division multiplexing(b) time division multiplexing(c) space division multiplexing(d) channel division multiplexing

Answer» Correct option is (a) orthogonal frequency division multiplexing

The best I can explain: WiMAX physical layer uses orthogonal frequency division multiplexing as it provides simplified reception in multipath and allows WiMAX to operate in NLOS conditions.
99713.

Which of the following is a data link protocol?(a) ethernet(b) point to point protocol(c) hdlc(d) all of the mentioned

Answer» The correct answer is (d) all of the mentioned

The explanation is: There are many data link layer protocols. Some of them are SDLC (synchronous data link protocol), HDLC (High level data link control), SLIP (serial line interface protocol), PPP (Point to point protocol) etc. These protocols are used to provide the logical link control function of the Data Link Layer.
99714.

The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________(a) piggybacking(b) cyclic redundancy check(c) fletcher’s checksum(d) parity check

Answer» The correct choice is (a) piggybacking

The explanation: Piggybacking is a technique in which the acknowledgment is temporarily delayed so as to be hooked with the next outgoing data frame. It saves a lot of channel bandwidth as in non-piggybacking system, some bandwidth is reserved for acknowledgement.
99715.

Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.(a) Half-trip time(b) Round-trip time(c) Travel time for the next router(d) Time to reach the destination/source

Answer» Right option is (b) Round-trip time

The best I can explain: The round-trip time refers to the total time taken combining the time taken for a packet sent from a source to reach a destination and the time taken the acknowledgement sent by the destination to reach the source. The Router sends destination unreachable message if the destination is not found.
99716.

Which of the following is the multiple access protocol for channel access control?(a) CSMA/CD(b) CSMA/CA(c) Both CSMA/CD & CSMA/CA(d) HDLC

Answer» The correct answer is (c) Both CSMA/CD & CSMA/CA

For explanation: In CSMA/CD, it deals with detection of collision after collision has occurred, whereas CSMA/CA deals with preventing collision. CSMA/CD is abbreviation for Carrier Sensing Multiple Access/Collision detection. CSMA/CA is abbreviation for Carrier Sensing Multiple Access/Collision Avoidance. These protocols are used for efficient multiple channel access.
99717.

WiMAX is mostly used for __________(a) local area network(b) metropolitan area network(c) personal area network(d) wide area network

Answer» Right choice is (b) metropolitan area network

The best explanation: WiMAX provides Wi-Fi connectivity within the home or business for computers and smartphones. WiMAX network operators typically provide a WiMAX Subscriber Unit to do so. The subscriber unit is used to connect to the metropolitan WiMAX network.
99718.

Which is a time-sensitive service?(a) File transfer(b) File download(c) E-mail(d) Internet telephony

Answer» Right choice is (d) Internet telephony

To explain: Internet telephony is Loss-tolerant other applications are not.
99719.

Communication channel is shared by all the machines on the network in ________(a) broadcast network(b) unicast network(c) multicast network(d) anycast network

Answer» Right option is (a) broadcast network

To explain: In a broadcast network, information is sent to all stations in a network whereas in a multicast network the data or information is sent to a group of stations in the network. In unicast network, information is sent to only one specific station. The broadcast address of the network is the last assigned address of the network.
99720.

A __________ is a device that forwards packets between networks by processing the routing information included in the packet.(a) bridge(b) firewall(c) router(d) hub

Answer» Right answer is (c) router

Easiest explanation: A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the cheapest path to the destination.
99721.

A scatternet can have maximum __________(a) 10 piconets(b) 20 piconets(c) 30 piconets(d) 40 piconets

Answer» Right answer is (a) 10 piconets

To elaborate: A scatternet can have maximum of 10 piconets and minimum of 2 piconets. To connect these piconets, a slave node of one piconet may act as a master in a piconet that is part of the scatternet.
99722.

Bluetooth is an example of __________(a) personal area network(b) local area network(c) virtual private network(d) wide area network

Answer» Right choice is (a) personal area network

For explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.
99723.

Bluetooth supports _______(a) point-to-point connections(b) point-to-multipoint connection(c) both point-to-point connections and point-to-multipoint connection(d) multipoint to point connection

Answer» Right option is (c) both point-to-point connections and point-to-multipoint connection

For explanation I would say: In Bluetooth, each slave node communicates with the master of the piconet independently i.e. each master-slave connection is independent. The slave is not allowed to communicate with other slaves directly.
99724.

To deliver a message to the correct application program running on a host, the _______ address must be consulted.(a) IP(b) MAC(c) Port(d) None of the mentioned

Answer» The correct choice is (c) Port

The best I can explain: IP address lets you know where the network is located. Whereas MAC address is a unique address for every device. Port address identifies a process or service you want to carry on.
99725.

In segment header, sequence number and acknowledgement number fields refer to _______(a) Byte number(b) Buffer number(c) Segment number(d) Acknowledgment

Answer» The correct option is (a) Byte number

To explain I would say: As TCP has to ensure ordered delivery of packets, sequence number and acknowledgement number are used to identify the byte number of the packet in the stream of bytes being transmitted.
99726.

Which of the following is an application layer service?(a) Network virtual terminal(b) File transfer, access, and management(c) Mail service(d) All of the mentioned

Answer» The correct option is (d) All of the mentioned

Explanation: The services provided by the application layer are network virtual terminal, file transfer, access and management, mail services, directory services, various file and data operations.
99727.

Bluetooth is the wireless technology for __________(a) local area network(b) personal area network(c) metropolitan area network(d) wide area network

Answer» Right choice is (b) personal area network

Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.
99728.

Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?(a) 10000(b) 10001(c) 12001(d) 11001

Answer» Correct option is (b) 10001

Easiest explanation: The sequence number given to first byte of a segment, with respect to its order among the previous segments, is the sequence number of that segment.
99729.

Connection establishment in TCP is done by which mechanism?(a) Flow control(b) Three-Way Handshaking(c) Forwarding(d) Synchronization

Answer» Right answer is (b) Three-Way Handshaking

The explanation is: A three-way handshake allows both, the server and the client to choose their Initial Sequence Number and inform about it to the other party. This won’t be possible using the two-way handshake mechanism.
99730.

Transport layer aggregates data from different applications into a single stream before passing it to ____________(a) network layer(b) data link layer(c) application layer(d) physical layer

Answer» The correct option is (a) network layer

The best I can explain: The flow of data in the OSI model flows in following manner Application -> Presentation -> Session -> Transport -> Network -> Data Link -> Physical. Each and every layer has its own set of functions and protocols to ensure efficient network performance.
99731.

Pick the odd one out.(a) File transfer(b) File download(c) E-mail(d) Interactive games

Answer» The correct option is (d) Interactive games

To elaborate: File transfer, File download and Email are services provided by the application layer and there are message and data oriented.
99732.

Size of TCP segment header ranges between ___________(a) 16 and 32 bytes(b) 16 and 32 bits(c) 20 and 60 bytes(d) 20 and 60 bits

Answer» The correct choice is (c) 20 and 60 bytes

For explanation I would say: The size of the header can be 20 bytes at a minimum if there are no options and can go up to 60 bytes at maximum with 40 bytes in the options field. The header contains all the control information required to ensure ordered, error-free and reliable delivery of the segment.
99733.

According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?(a) Well-known ports(b) Registered ports(c) Dynamic ports(d) Static ports

Answer» The correct choice is (d) Static ports

Easiest explanation: IANA divided port numbers into three ranges i.e., Well-known, Registered and Dynamic ports. Well-known port numbers range from 0 to 1023, registered port numbers are from 1024 to 49151 and dynamic port numbers are from 49152 to 65535.
99734.

The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method.(a) Packet switching(b) Circuit switching(c) Line switching(d) Frequency switching

Answer» The correct choice is (b) Circuit switching

The best I can explain: In circuit switching, a physical path between the sender and receiver is established. This path is maintained until the connection is needed. Circuit switching is implemented in the Physical layer and is used in telephonic systems.
99735.

The functionalities of the presentation layer include ____________(a) Data compression(b) Data encryption(c) Data description(d) All of the mentioned

Answer» The correct option is (d) All of the mentioned

Easiest explanation: Some functions of the presentation layer include character-code translation, data conversion, data encryption and decryption, and data translation. It connects the application layer with the layers below converting the human readable text and media to machine readable format and vice-versa.
99736.

E-mail is _________(a) Loss-tolerant application(b) Bandwidth-sensitive application(c) Elastic application(d) None of the mentioned

Answer» Correct choice is (c) Elastic application

The explanation is: Because it can work with available throughput.
99737.

The sizes of source and destination port address in TCP header are ___________ respectively.(a) 16-bits and 32-bits(b) 16-bits and 16-bits(c) 32-bits and 16-bits(d) 32-bits and 32-bits

Answer» The correct choice is (b) 16-bits and 16-bits

The best explanation: All port addresses are of 16 bits and they specify the type of service being used by the network entity. For example, port 21 is used for FTP connections and port 25 is used for ICMP connections.
99738.

A session may include ________(a) Zero or more SMTP transactions(b) Exactly one SMTP transactions(c) Always more than one SMTP transactions(d) Number of SMTP transactions cant be determined

Answer» Correct option is (a) Zero or more SMTP transactions

To explain I would say: An SMTP session consists of SMTP transactions only even if no transactions have been performed. But no transactions in the session might mean that the session is inactive or is just initiated.
99739.

Internet mail places each object in _________(a) Separate messages for each object(b) One message(c) Varies with number of objects(d) Multiple messages for each object

Answer» Right option is (b) One message

Explanation: It places all objects into one message as it wouldn’t be efficient enough if there are different messages for each object. The objects include the text and all the multimedia to be sent.
99740.

Typically the TCP port used by SMTP is _________(a) 25(b) 35(c) 50(d) 15

Answer» The correct choice is (a) 25

To explain I would say: The ports 15, 35 and 50 are all UDP ports and SMTP only uses TCP port 25 for reliability.
99741.

An email client needs to know the _________ of its initial SMTP server.(a) IP address(b) MAC address(c) URL(d) Name

Answer» Correct choice is (a) IP address

For explanation I would say: The client needs to know the IP of its initial SMTP server as it has to send the mail first to that server and then the server forwards the mail ahead on behalf of the user.
99742.

L2F was developed by which company?(a) Microsoft(b) Cisco(c) Blizzard Entertainment(d) IETF

Answer» Correct option is (b) Cisco

Best explanation: L2F stands for Layer 2 Forwarding protocol. It was designed by Cisco to tunnel PPP traffic, helping create VPNs over the internet.
99743.

The entire hostname has a maximum of ___________(a) 255 characters(b) 127 characters(c) 63 characters(d) 31 characters

Answer» Right answer is (a) 255 characters

Easy explanation: An entire hostname can have a maximum of 255 characters. Although each label must be from 1 to 63 characters long. Host name is actually a label that is given to a device in a network.
99744.

The application-level protocol in which a few manager stations control a set of agents is called ______(a) HTML(b) TCP(c) SNMP(d) SNMP/IP

Answer» The correct option is (c) SNMP

Explanation: SNMP stands for Simple Network Management Protocol. It is an application-level protocol in which a few manager stations control a set of agents. It is used under the TCP/IP protocol suite and is used for managing devices on the internet.
99745.

SMTP is not used to deliver messages to ______(a) user’s terminal(b) user’s mailbox(c) user’s word processor(d) user’s email client

Answer» Right choice is (c) user’s word processor

Easy explanation: SMTP can only be used to send messages to user’s terminal, email client or mailbox. A stand-alone word processor cannot be connected to a network, so it won’t be possible to deliver messages to it.
99746.

SMI-S Standard uses which of the following?(a) Java RMI(b) CIM-XML/HTTP(c) CORBA(d) .NET

Answer» Right answer is (b) CIM-XML/HTTP

The best I can explain: The Distributed Management Task Force maintains a Common Information Model (CIM) to represent a common set of network objects and their relationships. CIM-XML/HTTP refers to the operations of CIM being performed over HTTP or XML. SMI-S uses CIM-XML/HTTP.
99747.

ESP (Encapsulating Security Protocol) is defined in which of the following standards?(a) IPsec(b) PPTP(c) PPP(d) L2TP

Answer» Correct answer is (a) IPsec

The explanation: ESP is a security component of IPSec. ESP provides content protection and ensures that there is integrity and confidentiality of the message. The other security components of IPSec are Authentication Header and Internet Key Exchange.
99748.

The IETF standards documents are called ________(a) RFC(b) RCF(c) ID(d) DFC

Answer» Correct answer is (a) RFC

To explain: RFC stands for Request For Comments and they are documents that describe methods, behaviors, research, or innovations applicable to the working of the Internet.
99749.

Structure of Management Information (SMI), is the guideline of ________(a) HTTP(b) SNMP(c) URL(d) MIB

Answer» Correct option is (b) SNMP

Explanation: SMI was developed by the Storage Networking Industry Association (SNIA) and it defines a standard that can be manipulated by SNMP. Basically, it defines the standard format and hierarchy of management data which is used by the SNMP. It does not describe how the objects are to be managed.
99750.

SMTP defines _______(a) message transport(b) message encryption(c) message content(d) message password

Answer» Correct option is (a) message transport

Explanation: As the name suggests, Simple Mail Transfer Protocol is only responsible for “how” the message is transferred i.e. Transport of the message. Other protocols such as TCP are used to provide other services like encryption for the messages.