network engineering mcqs

A Naval Officer of Network Engineering has a good salary package in Pak Navy rather he is in Pakistan or in UK which usually remains more than one Lac in starting package. Network Engineering salary is same as other branch officers have as per Pak Navy Ranks.

Candidates who have their skills in network Engineering can apply for Pak Navy Jobs as an officer through SSC. Network engineering technology helps in many tasks of Pak Navy in ships as well as in the working fields.

Network Engineering jobs are available in Pak Navy in which one can become a Naval officer through Short Service Commission (SSC).  Jobs are also related to software and network engineering because the art of network engineering is very helpful for the candidates.

Pakistan Navy announced vacancies for network engineers who have done their basic education in network & computer engineering, network science and engineering, network analysis electrical engineering, and network traffic engineering.

Network Engineering MCQs are available here which have been collected from the past candidates who have appeared in Short Service Commission (SSC) in Pak Navy.

Network Engineering Multiple Choice Questions

MCQs of Network Engineering (Part-01)

The IETF standards documents are called ________
a) RFC
b) RCF
c) ID
d) DFC

Answer: a

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________
a) Added
b) Removed
c) Rearranged
d) Modified

Answer: a

The structure or format of data is called ___________
a) Syntax
b) Semantics
c) Struct
d) Formatting

Answer: a

Communication between a computer and a keyboard involves ______________ transmission.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex

Answer: d

The first Network was called ________
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET

Answer: d

A _______ is the physical path over which a message travels.
a) Path
b) Medium
c) Protocol
d) Route

Answer: b

Which organization has authority over interstate and international commerce in the communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC

Answer: c

Which of this is not a network edge device?
a) PC
b) Smartphones
c) Servers
d) Switch

Answer: d

A _________ set of a rule that governs data communication.
a) Protocols
b) Standards
c) RFCs
d) Servers

Answer: a

Q.Three or more devices share a link in ________ connection.
a) Unipoint
b) Multipoint
c) Point to point
d) Simplex

Answer: b

When collection of various computers seems a single coherent system to its client, then it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system

Answer: b

Two devices are in network if __________
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive

Answer: a

Which of the following computer networks is built on the top of another network?
a) Prior network

b) chief network
c) prime network
d) overlay network

Answer: d

In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

Answer: d

Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network

Answer: a

Bluetooth is an example of __________
a) personal area network
b) local area network
c) virtual private network
d) wide area network

Answer: a

A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
a) Bridge
b) firewall
c) router
d) hub

Answer: c

A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system

Answer: b

Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure

Answer: a

Which of the following networks extends a private network across public networks?
a) Local area network
b) virtual private network
c) enterprise private network
d) storage area network

Answer: b

Which of this is not a constituent of residential telephone line?
a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) An ultra-high speed downstream channel

Answer: c

DSL telcos provide which of the following services?
a) Wired phone access
b) ISP
c) Wired phone access and ISP
d) Network routing and ISP

Answer: c

The function of DSLAM is to __________
a) Convert analog signals into digital signals

b) Convert digital signals into analog signals
c) Amplify digital signals
d) De-amplify digital signals

Answer: a

Which of the following terms is not associated with DSL?
a) DSLAM
b) CO
c) Splitter
d) CMTS

Answer: d

HFC contains _______
a) Fibre cable
b) Coaxial cable
c) A combination of Fibre cable and Coaxial cable
d) Twisted Pair Cable

Answer: c

Which of the following statements is not applicable for cable internet access?
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM

Answer: d.

Among the optical-distribution architectures that are essentially switched ethernet is __________
a) AON
b) PON
c) NON
d) MON

Answer: a

Network Engineering Jobs related MCQs

MCQs of Network Engineering (Part-02)

Star Band provides __________
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access

Answer: d

Home Internet Access is provided by __________
a) DSL
b) FTTP
c) Cable
d) All of the mentioned

Answer: d

ONT is connected to splitter using _________
a) High speed fibre cable
b) HFC
c) Optical cable
d) Twisted pair cable

Answer: c

Which of the following factors affect transmission rate in DSL?
a) The gauge of the twisted-pair line
b) Degree of electrical interfernece
c) Shadow fading
d) The gauge of the twisted-pair line and degree of electrical interference

Answer: d

How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10

Answer: a

The number of layers in ISO OSI reference model is __________
a) 5
b) 7
c) 6
d) 10

Answer: b

Which of the following layers is an addition to OSI model when compared with TCP IP model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer

Answer: d

Application layer is implemented in ____________
a) End system
b) NIC
c) Ethernet
d) Packet transport

Answer: a

Transport layer is implemented in ______________
a) End system
b) NIC
c) Ethernet
d) Signal transmission

Answer: a

Delimiting and synchronization of data exchange is provided by __________
a) Application layer
b) Session layer
c) Transport layer
d) Link layer

Answer: b

In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer

Answer: d

In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer

Answer: a

In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______
a) Added
b) Removed
c) Rearranged
d) Randomized

Answer: b

Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model

Answer: c

OSI stands for __________
a) open system interconnection
b) operating system interface
c) optical service implementation
d) open service Internet

Answer: a

The number of layers in ISO OSI reference model is __________
a) 4
b) 5
c) 6
d) 7

Answer: d

TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer

Answer: a

Which layer is used to link the network support layers and user support layers?
a) session layer
b) data link layer
c) transport layer
d) network layer

Answer: c

Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned

Answer: d

TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) with no link to

Answer: a

Which layer is responsible for process to process delivery in a general network model?
a) network layer
b) transport layer
c) session layer
d) data link layer

Answer: b

Which address is used to identify a process on a host by the transport layer?
a) physical address
b) logical address
c) port address
d) specific address

Answer: c

Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) physical layer

Answer: a

Transmission data rate is decided by ____________
a) network layer
b) physical layer
c) data link layer
d) transport layer

Answer: b

The physical layer is concerned with ___________
a) bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) port to port delivery

Answer: a

Which transmission media provides the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable

Answer: c

Bits can be sent over guided and unguided media as analog signal by ___________
a) digital modulation

b) amplitude modulation
c) frequency modulation
d) phase modulation

Answer: a

Network Engineering Degree MCQs

MCQs of Network Engineering (Part-03)

The portion of physical layer that interfaces with the media access control sublayer is called ___________
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) physical transport sublayer

Answer: a

The physical layer provides __________
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned

Answer: d

In asynchronous serial communication the physical layer provides ___________
a) start and stop signalling
b) flow control
c) both start & stop signalling and flow control
d) only start signalling

Answer: c

The physical layer is responsible for __________
a) line coding

b) channel coding
c) modulation
d) all of the mentioned

Answer: d

The physical layer translates logical communication requests from the ______ into hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer

Answer: a

A single channel is shared by multiple signals by ____________
a) analog modulation
b) digital modulation
c) multiplexing
d) phase modulation

Answer: c

Wireless transmission of signals can be done via ___________
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned

Answer: d

The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer

Answer: a

Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding

Answer: d

Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer

Answer: b

Header of a frame generally contains ______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned

Answer: d

Automatic repeat request error management mechanism is provided by ________
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer

Answer: a

When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________
a) random error
b) burst error
c) inverted error
d) double error

Answer: b

CRC stands for __________
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check

Answer: a

Which of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned

Answer: d

Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC

Answer: c

The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________
a) piggybacking

b) cyclic redundancy check
c) fletcher’s checksum
d) parity check

Answer: a

The network layer is concerned with __________ of data.
a) bits
b) frames
c) packets
d) bytes

Answer: c

Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) error control

Answer: d

A 4 byte IP address consists of __________
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address

Answer: c

In virtual circuit network each packet contains ___________
a) full source and destination address
b) a short VC number
c) only source address
d) only destination address

Answer: b                                                                                    

Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned

Answer: d

Which of the following is not correct in relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers

Answer: c

A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree
b) spider structure
c) spider tree
d) special tree

Answer: a

Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol

Answer: d

The network layer protocol for internet is __________
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol

Answer: b

ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing

Answer: a

 

Network Engineering Course Multiple Choice Questions

MCQs of Network Engineering (Part-04)

Transport layer aggregates data from different applications into a single stream before passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer

Answer: a

Which of the following are transport layer protocols used in networking?
a) TCP and FTP

b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP

Answer: c

User datagram protocol is called connectionless because _____________
a) all UDP packets are treated independently by transport layer

b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly

Answer: a

Transmission control protocol ___________
a) is a connection-oriented protocol

b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned

Answer: d

An endpoint of an inter-process communication flow across a computer network is called __________
a) socket
b) pipe
c) port
d) machine

Answer: a

Socket-style API for windows is called ____________
a) wsock
b) winsock
c) wins
d) sockwi

Answer: b

Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol

b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol

Answer: a

A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol

Answer: a

Transport layer protocols deals with ____________
a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication

Answer: b

Which of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol

Answer: a

Physical or logical arrangement of network is __________
a) Topology

b) Rrouting
c) Networking
d) Control

Answer: a

Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus

Answer: a

_______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus

Answer: d

Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
d) PAN

Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) PAN

Answer: a

WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network

Answer: b

In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits

Answer: b

_____ is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM

b) TDM
c) Both FDM & TDM
d) PDM

Answer: a

The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing

Answer: b

Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching

Answer: b

Which multiplexing technique used to transmit digital signals?
a) FDM

b) TDM
c) WDM
d) FDM & WDM

Answer: b

If there are n signal sources of same data rate, then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n

Answer: a

If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps

Answer: a

The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period

Answer: c

Multiplexing provides _________
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy

Answer: d

In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than

Answer: a

In TDM, slots are further divided into _________
a) Seconds
b) Frames
c) Packets
d) Bits

Answer: b

Which of the following delay is faced by the packet in travelling from one end system to another?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned

Answer: d

Network Engineering Interview Questions

MCQs of Network Engineering (Part-05)

For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is ____________ (in microseconds)
a) 3.2
b) 32
c) 0.32
d) 320

Answer: a

The time required to examine the packet’s header and determine where to direct the packet is part of __________
a) Processing delay
b) Queuing delay
c) Transmission delay
d) Propagation delay

Answer: a

Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by ____________
a) La/R
b) LR/a
c) R/La
d) Ra/L

Answer: a

In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ___________
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps

Answer: b

If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is?
a) N/2
b) N
c) N-1
d) 2N

Answer: c

The total nodal delay is given by ____________
a) dnodal = dproc – dqueue + dtrans + dprop
b) dnodal = dproc + dtrans – dqueue
c) dnodal = dproc + dqueue + dtrans + dprop
d) dnodal = dproc + dqueue – dtrans – dprop

Answer: c

In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay

Answer: b

Transmission delay does not depend on _____________
a) Packet length
b) Distance between the routers
c) Transmission rate
d) Bandwidth of medium

Answer: b

Propagation delay depends on ___________
a) Packet length

b) Transmission rate
c) Distance between the routers
d) Speed of the CPU

Answer: c

_____________ allows LAN users to share computer programs and data.
a) Communication server

b) Print server
c) File server
d) Network

Answer: c

With respect to physical media, STP cables stands for _________
a) Shielded Twisted Pair Cable
b) Spanning Tree Protocol Cable
c) Static Transport Protocol Cable
d) Shielded Two Power Cable

Answer: a

A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software

Answer: a

The __________ portion of LAN management software restricts access, records user activities and audit data, etc.
a) Configuration management
b) Security management
c) Performance management
d) Recovery management

Answer: b

What is the max length of the Shielded twisted pair cable?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m

Answer: c

What is the max data transfer rate of STP cables?
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps

Answer: b

Which connector does the STP cable use?
a) BNC

b) RJ-11
c) RJ-45
d) RJ-69

Answer: c

 

Network Engineering Technology MCQs

MCQs of Network Engineering (Part-06)

What is the central device in star topology?
a) STP server
b) Hub/switch
c) PDC
d) Router

Answer: b

What is the max data transfer rate for optical fiber cable?
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps

Answer: d

Which of the following architecture uses the CSMA/CD access method?
a) ARC net

b) Ethernet
c) Router
d) STP server

Answer: b

The attacker using a network of compromised devices is known as _____________
a) Internet
b) Botnet
c) Telnet
d) D-net

Answer: b

Which of the following is a form of DoS attack?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned

Answer: d

The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding

Answer: c

The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding

Answer: b

Packet sniffers involve ____________
a) Active receiver

b) Passive receiver
c) Legal receiver
d) Partially-active receiver

Answer: b

Sniffers can be prevented by using _______________
a) Wired environment

b) WiFi
c) Ethernet LAN
d) Switched network

Answer: d

Firewalls are often configured to block ___________
a) UDP traffic

b) TCP traffic
c) Sensitive traffic
d) Best-effort traffic

Answer: a

In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay

Answer: b

Latest Posts

Scroll to Top
Scroll to Top