Computer Network Quiz MCQ: Exam!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Djkizfamous
D
Djkizfamous
Community Contributor
Quizzes Created: 1 | Total Attempts: 77
Questions: 17 | Attempts: 77

SettingsSettingsSettings
Computer Network Quiz MCQ: Exam! - Quiz

.


Questions and Answers
  • 1. 

    What was the first Integrated Services Digital Network standard to be published by the ITU?

    • A.

      ISDN-1

    • B.

      ISDN-N1

    • C.

      NI

    • D.

      NI-1

    Correct Answer
    D. NI-1
    Explanation
    NI-1 was the first Integrated Services Digital Network (ISDN) standard to be published by the ITU. This standard was developed to provide a digital network for both voice and data communication, allowing for the integration of different services over a single network. NI-1 defined the signaling and protocol specifications for ISDN, enabling interoperability between different network equipment and facilitating the widespread adoption of ISDN technology.

    Rate this question:

  • 2. 

    How many B-channels are available in a typical ISDN PRI?

    • A.

      2

    • B.

      20

    • C.

      23

    • D.

      30

    Correct Answer
    C. 23
    Explanation
    A typical ISDN PRI (Primary Rate Interface) has 23 B-channels available. B-channels are used for carrying voice or data traffic, and in ISDN PRI, there are 23 B-channels available for this purpose. The other channels in an ISDN PRI are the D-channel, which is used for signaling and control purposes, and the framing and synchronization channels. Therefore, the correct answer is 23.

    Rate this question:

  • 3. 

    Which network-layer protocols can the Serial Line Internet use during a dial-up session?

    • A.

      TCP/IP

    • B.

      IPX/SPX

    • C.

      PPP

    • D.

      NetBEUI

    Correct Answer
    A. TCP/IP
    Explanation
    The Serial Line Internet can use TCP/IP protocol during a dial-up session. TCP/IP is a widely used network protocol suite that enables communication between devices on the internet. It provides reliable and efficient transmission of data packets over the network. TCP/IP is the foundation of the internet and supports various applications and services. Therefore, it is a suitable choice for the Serial Line Internet during a dial-up session.

    Rate this question:

  • 4. 

    Which remote protocol supports running many different types of network protocols over a serial link?

    • A.

      SLIP

    • B.

      PPP

    • C.

      IPX

    • D.

      NetBEUI

    Correct Answer
    B. PPP
    Explanation
    PPP (Point-to-Point Protocol) is the correct answer because it is a remote protocol that supports running many different types of network protocols over a serial link. PPP provides a standardized method for encapsulating multiple network layer protocols such as IP, IPX, and NetBEUI, allowing them to be transmitted over a serial connection. This flexibility and versatility make PPP an ideal choice for connecting remote networks and devices.

    Rate this question:

  • 5. 

    Which components are part of the Point-to-Point Protocol?

    • A.

      Network Control Protocol

    • B.

      Link Control Protocol and this

    • C.

      Internet Protocol

    • D.

      Internet Packet Exchange Protocol

    Correct Answer
    A. Network Control Protocol
    Explanation
    The Point-to-Point Protocol (PPP) consists of several components, one of which is the Network Control Protocol (NCP). NCP is responsible for establishing and configuring network-layer protocols, such as IP or IPX, over the PPP link. It handles the negotiation and management of network-layer parameters between the two endpoints of the PPP connection. Therefore, NCP is an essential part of the Point-to-Point Protocol.

    Rate this question:

  • 6. 

    Which network control protocol is used in PPP to facilitate the transport of TCP/IP?

    • A.

      IPNP

    • B.

      IPCP

    • C.

      IPXCP

    • D.

      None of the above

    Correct Answer
    B. IPCP
    Explanation
    IPCP stands for Internet Protocol Control Protocol. It is the network control protocol used in PPP (Point-to-Point Protocol) to facilitate the transport of TCP/IP (Transmission Control Protocol/Internet Protocol). IPCP is responsible for negotiating and configuring the IP addresses and other IP-related parameters between the PPP client and server, allowing the transmission of TCP/IP packets over the PPP connection. IPNP and IPXCP are not valid network control protocols used in PPP.

    Rate this question:

  • 7. 

    Which forms of the validation can PPP use to authenticate a remote server?

    • A.

      CHAP

    • B.

      Domain account

    • C.

      PAP and this

    • D.

      KPA

    Correct Answer
    A. CHAP
    Explanation
    PPP can use CHAP (Challenge Handshake Authentication Protocol) to authenticate a remote server. CHAP is a secure authentication method that involves a three-way handshake process. During this process, the server sends a challenge to the remote server, which responds with a hashed value of the challenge and a secret password. The server then compares the received hashed value with its own calculation to verify the authenticity of the remote server. CHAP provides a higher level of security compared to other authentication methods like PAP (Password Authentication Protocol) or KPA (Keyed-Hashing for Message Authentication).

    Rate this question:

  • 8. 

    How many incoming RAS connections does Windows XP support?

    • A.

      1

    • B.

      10

    • C.

      256

    • D.

      1024

    Correct Answer
    A. 1
  • 9. 

    Where is the logging information for a connection appended when modem logging is enabled?

    • A.

      ModemLOG.TXT

    • B.

      PPP.LOG

    • C.

      Modemlog_modemname.txt

    • D.

      PPP.TXT

    Correct Answer
    C. Modemlog_modemname.txt
    Explanation
    When modem logging is enabled, the logging information for a connection is appended to a file named "modemlog_modemname.txt". This file is specific to the modem being used, as indicated by the "modemname" in the file name. Therefore, each modem will have its own separate log file to store the logging information for its connections.

    Rate this question:

  • 10. 

    Which Windows feature can create a dial-up connection in Windows XP?

    • A.

      Device Manager

    • B.

      Control Panel

    • C.

      Accessories

    • D.

      New Connection Wizard

    Correct Answer
    D. New Connection Wizard
    Explanation
    The New Connection Wizard is the correct answer because it is a Windows feature that allows users to create a dial-up connection in Windows XP. It provides a step-by-step guide for setting up the connection and configuring the necessary settings, such as the phone number and authentication details. The Device Manager is not relevant to creating a dial-up connection, as it is used for managing hardware devices. The Control Panel and Accessories may contain some networking settings, but they do not specifically provide a wizard for creating dial-up connections.

    Rate this question:

  • 11. 

    Which application programming interface is used to include features such as call monitoring and multiple localities?

    • A.

      Unimodem

    • B.

      COMM

    • C.

      TAPI

    • D.

      None of the above

    Correct Answer
    C. TAPI
    Explanation
    TAPI stands for Telephony Application Programming Interface. It is used to include features such as call monitoring and multiple localities in application programming. TAPI provides a standard interface for applications to interact with telephony services on a computer system. It allows developers to create applications that can control and manage telephony devices, such as modems and telephones, and perform various telephony functions. Therefore, TAPI is the correct answer for this question.

    Rate this question:

  • 12. 

    What technology do virtual private networks (VPNs) offer to provide a more secure communications channel?

    • A.

      IP header compression

    • B.

      Tunneling

    • C.

      Multiple network protocol support

    • D.

      None of the above

    Correct Answer
    B. Tunneling
    Explanation
    Tunneling is the correct answer because virtual private networks (VPNs) use this technology to create a secure communications channel by encapsulating and encrypting data packets within another protocol. This allows the data to be transmitted securely over the internet, protecting it from unauthorized access or interception. IP header compression and multiple network protocol support are not directly related to the security aspect of VPNs.

    Rate this question:

  • 13. 

    Which of the following are protocols for setting up a "tunnel" for PPTP?

    • A.

      PPP connection and communication

    • B.

      PPTP control connection

    • C.

      PPTP data tunneling

    • D.

      PPTP data transfer

    Correct Answer
    B. PPTP control connection
    Explanation
    The correct answer is PPTP control connection. PPTP (Point-to-Point Tunneling Protocol) is a protocol used to create virtual private networks (VPNs). It involves the use of a control connection to set up and manage the tunnel for PPTP. This control connection is responsible for establishing and maintaining the secure connection between the client and the server. It handles authentication, encryption, and other security-related tasks. The control connection is separate from the data tunneling, which is used for transmitting the actual data between the client and the server.

    Rate this question:

  • 14. 

    What protocol is used by Terminal Services to send screenshots to the client?

    • A.

      RDP

    • B.

      NetBEUI

    • C.

      ICA

    • D.

      TCP/IP

    Correct Answer
    A. RDP
    Explanation
    Terminal Services use the RDP (Remote Desktop Protocol) to send screenshots to the client. RDP is a proprietary protocol developed by Microsoft that allows users to connect to and control a remote computer over a network. It provides a secure and efficient way to transmit graphical user interface (GUI) data, including screenshots, from the remote server to the client device. RDP is widely used for remote desktop access and virtualization solutions. NetBEUI, ICA, and TCP/IP are not specifically designed for sending screenshots in Terminal Services.

    Rate this question:

  • 15. 

    What are some advantages of using Terminal Services?

    • A.

      Use of older workstation PCs is supported.

    • B.

      A higher-performance server is required.

    • C.

      Administrators can watch user session. and this

    • D.

      Less training required for employees. and this

    Correct Answer
    A. Use of older workstation PCs is supported.
    Explanation
    Using Terminal Services allows organizations to extend the life of their older workstation PCs by enabling them to connect to a more powerful server. This means that even if the individual workstations are outdated and cannot handle the latest software or applications, they can still access them through the server. This not only saves costs on purchasing new hardware but also ensures that employees can continue to work efficiently without any major disruptions.

    Rate this question:

  • 16. 

    What port number is used by Remote Desktop and Terminal Services?

    • A.

      443

    • B.

      3389

    • C.

      389

    • D.

      1701

    Correct Answer
    B. 3389
    Explanation
    The correct answer is 3389. Remote Desktop and Terminal Services use port number 3389 for communication. This port allows users to remotely access and control a computer over a network. By using this port, users can establish a remote desktop session and interact with the remote computer as if they were physically present at the machine.

    Rate this question:

  • 17. 

    Which of the following are protocols used for VPN solutions?

    • A.

      PPTP

    • B.

      PPP

    • C.

      L2TP and this

    • D.

      SLIP

    Correct Answer
    A. PPTP
    Explanation
    PPTP (Point-to-Point Tunneling Protocol) is a protocol used for VPN solutions. It is a widely supported protocol that allows users to establish a secure and encrypted connection to a remote network over the internet. PPTP is known for its simplicity and compatibility with various operating systems and devices. It provides authentication, encryption, and compression, making it a popular choice for VPN implementations.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.