Top

Networking Basics

61.

What command will display the line, protocol, DLCI, and LMI information of an interface?

Answer: B

The show interface command shows the line, protocol, DLCI, and LMI information of an interface.

Enter details here

62.

If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link?

Answer: D

The clock rate command is two words, and the speed of the line is in bps.

Enter details here

63.

The structure or format of data is called:

Answer: A

Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.

Enter details here

64.

What are the two main types of access control lists (ACLs)?

1.Standard

2.IEEE

3.Extended

4.Specialized

Answer: D

Standard and extended access control lists (ACLs) are used to configure security on a router.

Enter details here

65.

What command is used to create a backup configuration?

Answer: B

The command to back up the configuration on a router is copy running-config startup-config.

Enter details here

Answer: D

Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to its destination. Routers, Computers and Smartphones are some examples of network nodes.

Enter details here

67.

Where is a hub specified in the OSI model?

Answer: B

Hubs regenerate electrical signals, which are specified at the Physical layer.

Enter details here

68.

To back up an IOS, what command will you use?

Answer: D

The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host.

Enter details here

Answer: A

Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.

Enter details here

Answer: A

Explanation: Network congestion occurs when traffic in the network is more than the network could handle. To avoid network congestion, the network management uses various open-loop and closed-loop congestion control techniques.

Enter details here

Loading…
Tags: Networking Basics Questions and Answers || Networking Basics MCQ Questions and Answers || Networking Basics GK Questions and Answers || Networking Basics GK MCQ Questions || Networking Basics Multiple Choice Questions and Answers || Networking Basics GK || GK on Networking Basics || Computer Networking Questions and Answers || Computer Networking MCQ Questions and Answers || Computer Networking GK Questions and Answers || GK on Computer Networking