computer network banner

Computer Network Multiple Choice Questions (MCQs) and Answers

Master Computer Network with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of Computer Network. Begin your placement preparation journey now!

Q121

Q121 Which protocol is specifically designed for low-power and low-data-rate wireless communications in IoT networks?

A

Zigbee

B

LTE

C

WiMAX

D

Bluetooth

Q122

Q122 How can you use the iwconfig command in Linux to set the Wi-Fi network's SSID?

A

iwconfig wlan0 essid [SSID name]

B

iwconfig set wlan0 ssid [SSID name]

C

iwconfig ssid [SSID name] wlan0

D

iwconfig wlan0 connect [SSID name]

Q123

Q123 What command line tool and syntax can be used to analyze Wi-Fi networks and signal strength on a Windows machine?

A

netsh wlan show networks mode=bssid

B

wifiinfo view

C

wlan report

D

scanwifi networks

Q124

Q124 If a mobile device frequently disconnects from a Wi-Fi network, what should be investigated first?

A

The device's Wi-Fi adapter settings

B

The strength and stability of the Wi-Fi signal

C

The compatibility of the Wi-Fi network protocol

D

The security settings of the network

Q125

Q125 How can interference from other wireless devices be mitigated in a Wi-Fi network?

A

Changing the network's operating frequency

B

Decreasing the network's signal range

C

Encrypting network traffic

D

Increasing the number of access points

Q126

Q126 What is SNMP primarily used for in network management?

A

Encrypting network traffic

B

Authenticating network users

C

Monitoring and managing network devices

D

Routing network traffic

Q127

Q127 Which SNMP component is responsible for collecting data from managed devices?

A

SNMP manager

B

SNMP agent

C

SNMP MIB (Management Information Base)

D

SNMP trap

Q128

Q128 What type of SNMP message is sent by an agent to notify a manager of an event?

A

GET

B

SET

C

TRAP

D

ACK

Q129

Q129 How does SNMPv3 improve upon SNMPv1 and SNMPv2?

A

By increasing the number of MIBs

B

By adding more TRAP types

C

By enhancing security features

D

By extending protocol compatibility

Q130

Q130 In SNMP, what is the role of the MIB?

A

To store user credentials

B

To encrypt data

C

To define a set of manageable objects

D

To route data

Q131

Q131 What mechanism is used in SNMP to set a value on a managed device?

A

SNMP GET

B

SNMP SET

C

SNMP TRAP

D

SNMP INFORM

Q132

Q132 Which feature distinguishes SNMP INFORM messages from TRAP messages?

A

INFORM messages require acknowledgment, while TRAP messages do not

B

INFORM messages are encrypted, while TRAP messages are not

C

INFORM messages are used for error reporting, while TRAP messages are not

D

INFORM messages can only be sent from manager to agent

Q133

Q133 How can you list all SNMP community strings configured on a Linux system?

A

grep "community" /etc/snmp/snmpd.conf

B

snmpwalk -v2c -c community localhost

C

cat /etc/snmp/snmpd.conf

D

find /etc/snmp/ -type f -exec grep "community" {} \;

Q134

Q134 What command can be used to initiate an SNMP SET request to change a setting on a remote device?

A

snmpset -v2c -c community host OID value

B

snmpget -v2c -c community host OID set value

C

snmpcmd -set -v2c -c community host OID value

D

snmpconfig -v2c -c community host OID value

Q135

Q135 How can you use SNMP to retrieve the system uptime of a remote device?

A

snmpget -v2c -c community host 1.3.6.1.2.1.1.3.0

B

snmpwalk -v2c -c community host 1.3.6.1.2.1.1.3.0

C

snmpquery -v2c -c community host SYSTEM-UPTIME-OID

D

snmpuptime -v2c -c community host

Q136

Q136 When an SNMP-managed device is not responding to requests, what is a common first step to troubleshoot?

A

Checking the network connection to the device

B

Verifying the device's SNMP configuration

C

Testing with a different SNMP manager

D

Reviewing the device's firewall settings

Q137

Q137 How can network congestion impact SNMP-based network management?

A

It can delay SNMP TRAP delivery

B

It can prevent SNMP SET commands from reaching devices

C

It can cause SNMP query timeouts

D

It can corrupt SNMP messages

Q138

Q138 What approach can be taken to secure SNMP communications in a network prone to eavesdropping?

A

Using SNMPv3 with authentication and encryption

B

Switching to a different network protocol

C

Disabling SNMP on sensitive devices

D

Implementing physical security measures

Q139

Q139 What is the primary goal of SDN (Software-Defined Networking)?

A

To increase the physical infrastructure

B

To centralize network management and control

C

To encrypt network traffic

D

To increase network hardware

Q140

Q140 NFV (Network Functions Virtualization) primarily aims to:

A

Replace physical network devices with software versions

B

Increase the use of traditional networking hardware

C

Improve physical network security

D

Enhance wireless signal strength

Q141

Q141 In the context of IoT, what is the main function of edge computing?

A

To process data on the cloud exclusively

B

To reduce data processing latency by processing data near its source

C

To store large volumes of data locally

D

To increase data encryption

Q142

Q142 How does SDN enhance network security?

A

By decentralizing network control

B

By physically securing network devices

C

By enabling dynamic, centralized security policy management

D

By requiring additional hardware firewalls

Q143

Q143 What challenge does the IoT face regarding data privacy and security?

A

Limited processing power on IoT devices complicates encryption

B

IoT devices do not generate sensitive data

C

IoT devices exclusively use secure, wired connections

D

All IoT communications are automatically encrypted

Q144

Q144 Which technology is foundational to the deployment of NFV?

A

3G cellular networks

B

Cloud computing infrastructure

C

Bluetooth technology

D

RFID technology

Q145

Q145 How can you utilize an API to interact with an SDN controller?

A

By sending HTTP GET requests to the controller's IP address

B

By using SNMP traps

C

By directly accessing the controller's database

D

By physical console access

Q146

Q146 What command line tool can be used to simulate IoT devices for testing IoT applications?

A

Wireshark

B

Mosquitto

C

Docker

D

GNS3

Q147

Q147 Which tool is used for creating a virtualized network function in an NFV infrastructure?

A

OpenStack

B

Netcat

C

OpenFlow

D

Curl

Q148

Q148 When troubleshooting connectivity issues in an IoT network, what is a common factor to investigate?

A

The compatibility of IoT protocols

B

The strength of the Wi-Fi signal

C

The firmware version of IoT devices

D

The battery levels of IoT devices

Q149

Q149 How can latency issues in an SDN environment be identified and addressed?

A

By increasing the bandwidth

B

By updating the SDN controller software

C

By optimizing the control plane communication

D

By adding more access points

Q150

Q150 What approach is effective in managing the security of a large-scale IoT deployment?

A

Implementing device-level authentication and encryption

B

Using a single, centralized firewall

C

Limiting device functionality

D

Deploying devices without internet access

ad vertical
ad