0% found this document useful (0 votes)
581 views15 pages

Complete Mcqs Network

The document provides information about different layers of the OSI model and TCP/IP model. It discusses the functions and protocols used at each layer. It also compares the OSI model and TCP/IP model. Some key points covered are: - The physical layer deals with bit-level delivery and electrical signaling. - The data link layer encapsulates packets into frames and performs error control. Media access control and logical link control are its sublayers. - The network layer handles packet routing and addressing. IP is the main protocol. - The transport layer aggregates data streams and provides port addressing. TCP and UDP are common protocols. - The TCP/IP model combines the session and presentation layers into the
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
581 views15 pages

Complete Mcqs Network

The document provides information about different layers of the OSI model and TCP/IP model. It discusses the functions and protocols used at each layer. It also compares the OSI model and TCP/IP model. Some key points covered are: - The physical layer deals with bit-level delivery and electrical signaling. - The data link layer encapsulates packets into frames and performs error control. Media access control and logical link control are its sublayers. - The network layer handles packet routing and addressing. IP is the main protocol. - The transport layer aggregates data streams and provides port addressing. TCP and UDP are common protocols. - The TCP/IP model combines the session and presentation layers into the
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 15

1.

When collection of various computers seems a single coherent system to its client, then it is called
a) computer network
b) distributed system
c) both (a) and (b)
d) none of the mentioned
Answer:b

2. Two devices are in network if


a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) none of the mentioned
Answer:a

3. Which one of the following computer network is built on the top of another network?
d) overlay network
Answer:d

5. Communication channel is shared by all the machines on the network in


a) broadcast network
Answer:a

6. Bluetooth is an example of
a) personal area network

Answer:a

7. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.
a) bridge
b) firewall
c) router
Answer:c

8. A list of protocols used by a system, one protocol per layer, is called

b) protocol stack
c) protocol suit
Answer:b

9. Network congestion occurs


a) in case of traffic overloading
Answer:a

10. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network

Answer:b
1) The IETF standards documents are called
a) RFC
b) RCF
Answer: a
Explanation: Request For Comments.
2) In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
a) Added
b) Removed
Answer: a
Explanation: Every layer adds its own header to the packet from previous layer.
3) The structure or format of data is called
a) Syntax
b) Semantics
Answer: a
Explanation: Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
4) Communication between a computer and a keyboard involves ______________ transmission
a) Automaticb) Half-duplexc) Full-duplexd) Simplex

Answer: d
Explanation: Data flows in single direction.
5) The first Network
d) ARPANET
Answer: d

7) Which organization has authority over interstate and international commerce in the communications field?
a) ITU-T
b) IEEE
c) FCC
Answer: c

10) Three or more devices share a link in ________ connection


a) Unipoint
b) Multipoint
c) Point to point
Answer: b

3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) presentation layer
c) application layer
d) both (a) and (b)
Answer:d
TCP/IP OSI
Implementation of OSI model Reference model
Model around which Internet is developed This is a theoretical model
Has only 4 layers Has 7 layers
Considered more reliable Considered a reference tool
Protocols are not strictly defined Stricter boundaries for the protocols
Horizontal approach Vertical approach
Combines the session and presentation layer in the application layer Has separate session and presentation layer
Protocols were developed first and then the model was developed Model was developed before the development of protocols
Supports only connectionless communication in the network layer Supports connectionless and connection-oriented
communication in the network layer
Protocol dependent standard Protocol independent standard

4. Which layer links the network support layers and user support layers
a) session layer b) data link layer c) transport layer d) network layer
Answer:c
Explanation:Physical, data link and network layers are network support layers and session, presentation and application layers are user support layers.
5. Which address is used in an internet employing the TCP/IP protocols?
a) physical address and logical address b) port address c) specific address d) all of the mentioned
Answer:d

6. TCP/IP model was developed _____ the OSI model.


a) prior to b) after c) simultaneous to d) none of the mentioned
Answer:a

7. Which layer is responsible for process to process delivery?


a) network layer b) transport layer c) session layer d) data link layer
Answer:b

8. Which address identifies a process on a host?


a) physical address b) logical address c) port address d) specific address
Answer:c

9. Which layer provides the services to user?


a) application layer b) session layer c) presentation layer d) none of the mentioned
Answer:a

10. Transmission data rate is decided by


a) network layer b) physical layer c) data link layer d) transport layer
Answer:b

1. The physical layer concerns with


a) bit-by-bit delivery p) process to process delivery c) application to application delivery
Answer:a

3. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
Answer:a

4. The portion of physical layer that interfaces with the media access control sublayer is called
a) physical signalling sublayer b) physical data sublayer c) physical address sublayer

Answer:a

5. physical layer provides


a) mechanical specifications of electrical connectors and cables b) electrical specification of transmission line signal level
c) specification for IR over optical fiber d) all of the mentioned
Answer:d

6. In asynchronous serial communication the physical layer provides


a) start and stop signaling b) flow control c) both (a) and (b)
Answer:c

7. The physical layer is responsible for


a) line coding b) channel coding c) modulation d) all of the mentioned
Answer:d

1. The data link layer takes the packets from _____ and encapsulates them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer

2. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding

3. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned

4. Header of a frame generally contains


a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned

5. Automatic repeat request error management mechanism is provided by


a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned

6. When 2 or more bits in a data unit has been changed during the transmission, the error is called
a) random error
b) burst error
c) inverted error
d) none of the mentioned

7. CRC stands for


a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check

8. Which one of the following is a data link protocol?


a) ethernet
b) point to point protocol
c) HDLC
d) all of the mentioned

9. Which one of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) both (a) and (b)
d) none of the mentioned

10. The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned

1. The network layer concerns with


a) bits b) frames c) packets
Answer:c

2. Which one of the following is not a function of network layer?


a) routing b) inter-networking c) congestion control d) none of the mentioned
Answer:d

4. In virtual circuit network each packet contains


a) full source and destination address
b) a short VC number
Answer:b

5. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm b) distance vector routing c) link state routing d) all of the mentioned
Answer:d

6. Multi-destination routing
a) is same as broadcast routing b) contains the list of all destinations c) data is not sent by packets
Answer:c

7. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree b) spider structure c) spider tree
Answer:a

8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing b) admission control c) load shedding d) none of the mentioned
Answer:d

9. The network layer protocol of internet is


a) Ethernet b) internet protocol c) hypertext transfer protocol
Answer:b

10. ICMP is primarily used for


a) error and diagnostic functions
Answer:a

1. Transport layer aggregates data from different applications into a single stream before passing it to
a) network layer b) data link layer c) application layer d) physical layer

Answer:a

2. Which one of the following is a transport layer protocol used in internet?


a) TCP b) UDP c) both (a) and (b)
Answer:c

3. User datagram protocol is called connectionless because


a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
Answer:a

4. Transmission control protocol is


a) connection oriented protocol b) uses a three way handshake to establish a connection c) receives data from application as a single stream
d) all of the mentioned

Answer:d

5. An endpoint of an inter-process communication flow across a computer network is called


a) socket b) pipe c) port d) none of the mentioned
Answer:a

6. Socket-style API for windows is called


a) wsock b) winsock c) wins
Answer:b

7. Which one of the following is a version of UDP with congestion control?


a) datagram congestion control protocol b) stream control transmission protocol c) structured stream transport
Answer:a

8. A _____ is a TCP name for a transport service access point.


a) port b) pipe c) node
Answer:a

9. Transport layer protocols deals with


a) application to application communication b) process to process communication c) node to node communication
Answer:b

10. Which one of the following is a transport layer protocol?


a) stream control transmission protocol b) internet control message protocol
c) neighbor discovery protocol d) dynamic host configuration protocol
Answer:a

2. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote
host?
a) HTTP b) FTP c) telnet
Answer:c

3. Application layer protocol defines


a) types of messages exchanged b) message format, syntax and semantics c) rules for when and how processes send and respond to messages
d) all of the mentioned
Answer:d

4. Which one of the following protocol delivers/stores mail to receiver server?


a) simple mail transfer protocol b) post office protocol c) internet mail access protocol
d) hypertext transfer protocol
Answer:a

5. The ASCII encoding of binary data is called


a) base 64 encoding
Answer:a

6. Which one of the following is an internet standard protocol for managing devices on IP network?
a) dynamic host configuration protocol
b) simple newtwork management protocol
Answer:b

7. Which one of the following is not an application layer protocol?


a) media gateway protocol b) dynamic host configuration protocol
c) resource reservation protocol d) session initiation protocol
Answer:c

9. Which one of the following is not correct?


a) application layer protocols are used by both source and destination devices during a communication session
b) application layer protocols implemented on the source and destination host must match
c) both (a) and (b)
Answer:c

10. When displaying a web page, the application layer uses the
a) HTTP protocol
Answer:a

1) This is not a application layer protocol


a) HTTP b) SMTP c) FTP d) TCP
Answer: d
Explanation: TCP is transport layer protocol
2) The packet of information at the application layer is called
a) Packet b) Message c) Segment d) Frame
Answer: b

4) Application developer has permission to decide the following on transport layer side
a) Transport layer protocol b) Maximum buffer size c) Both of the mentioned
Answer: c

5) Application layer offers _______ service


a) End to end
Answer: a

6) E-mail is
a) Loss-tolerant application b) Bandwidth-sensitive application c) Elastic application
Answer: c
Explanation: Because it can work with available throughput.
8) Which of the following is an application layer service ?
a) Network virtual terminal b) File transfer, access, and management c) Mail service
d) All of the mentioned
Answer: d

9) To deliver a message to the correct application program running on a host, the _______ address must be consulted
a) IP b) MAC c) Port
Answer: c

10) This is a time-sensitive service


a) File transfer b) File download c) E-mail d) Internet telephony
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
12) Electronic mail uses this Application layer protocol
a) SMTP
Answer: a

1. The entire hostname has a maximum of


a) 255 characters
Answer:a

2. A DNS client is called


a) DNS updater b) DNS resolver c) DNS handler
Answer:b

3. Servers handle requests for other domains


a) directly b) by contacting remote DNS server
Answer:b

4. DNS database contains


a) name server records b) hostname-to-address records c) hostname aliases
d) all of the mentioned
Answer:d

5. If a server has no clue about where to find the address for a hostname then
a) server asks to the root server b) server asks to its adjcent server c) request is not processed
Answer:a

6. Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
Answer:a

9. The domain name system is maintained by


a) distributed database system
Answer:a

10. Which one of the following is not true?


a) multiple hostnames may correspond to a single IP address b) a single hostname may correspond to many IP addresses
c) a single hostname may correspond to a single IP address d) none of the mentioned
Answer:c
1. Telnet protocol is used to establish a connection to
c) TCP port number 23
Answer:c

3. All telnet operations are sent as


b) 8 bytes
Answer:b

4. AbsoluteTelnet is a telnet client for


a) windows
Answer:a

6. In character mode operation of telnet implementation


a) each character typed is sent by the client to the server
Answer:a

7. In telnet, the client echoes the character on the screen but does not send it until a whole line is completed in
a) default mode
Answer:a

8. Which one of the following is not correct?


a) telnet is a general purpose client-server program b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
Answer:c

9. Which operating mode of telnet is full duplex?


a) default mode b) server mode c) line mode
Answer:c

10. If we want that a character be interpreted by the client instead of server


a) escape character has to be used

Answer:a
1) The protocol used by Telnet application is
a) Telnet
Answer: a

2) In “character at a time” mode


a) Character processing is done on the local system under the control of the remote system
b) Most text typed is immediately sent to the remote host for processing
Answer: b

4) The correct syntax to be written in the web browser to Telnet to www.sanfoundry.com is


c) telnet://www.sanfoundry.com
Answer: c

2. Dynamic web page


a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
Answer:b

4. Common gateway interface is used to


a) generate executable files from web content by web server
Answer:a

5. URL stands for


c) uniform resource locator
Answer:c

6. A web cookie is a small piece of data


a) sent from a website and stored in user’s web browser while a user is browsing a website
Answer:a

10. AJAX stands for


a) asynchronous javascript and xml
Answer:a

1. Multiple object can be sent over a TCP connection between client and server in
a) persistent HTTP
Answer:a

2. HTTP is ________ protocol.


a) application layer
Answer:a

3. In the network HTTP resources are located by


a) uniform resource identifier
Answer:a
5. In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
Answer:a

6. FTP server listens for connection on port number


b) 21

Answer:b

7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
Answer:a

8. In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
Answer:b

9. The file transfer protocol is built on


a) data centric architecture b) service oriented architecture c) client server architecture
Answer:c

10. In file transfer protocol, data transfer can be done in


a) stream mode b) block mode c) compressed mode
d) all of the mentioned
Answer:d

1. Ethernet frame consists of


a) MAC address
Answer:a

3. MAC address is of
d) 48 bits
Answer:d

4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission parameters
Answer:a

5. Ethernet in metropolitan area network (MAN) can be used as


a) pure ethernet b) ethernet over SDH c) ethernet over MPLS
d) all of the mentioned
Answer:d

9. What is interframe gap?


a) idle time between frames
Answer:a

10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called
a) short frame
b) run frame
Answer:b

1. What is the access point (AP) in wireless LAN?


a) device that allows wireless devices to connect to a wired network
Answer:a

2. In wireless ad-hoc network


a) access point is not required
Answer:a

3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA b) CSMA/CA c) ALOHA
Answer:b

4. In wireless distribution system


a) multiple access point are inter-connected with each other
Answer:a

7. Mostly ________ is used in  wireless LAN.


a) time division multiplexing b) orthogonal frequency division multiplexing c) space division multiplexing
Answer:b

8. Which one of the following event is not possible in wireless LAN.


a) collision detection
Answer:a

9. What is Wired Equivalent Privacy (WEP) ?


b) security algorithm for wireless networks
Answer:b

10. What is WPA?


a) wi-fi protected access
Answer:a
This section of our 1000+ Computer Networks MCQs focuses on WiMAX.
1. WiMAX stands for
a) wireless maximum communication
b) worldwide interoperability for microwave access
Answer:b

2. WiMAX provides
c) full duplex communication
Answer:c
3. WiMAX uses the
a) orthogonal frequency division multiplexing
Answer:a

5. WiMAX MAC layer provides an interface between


a) higher transport layers and physical layer
Answer:a

7. WiMAX provides
a) VoIP services b) IPTV services
c) both (a) and (b)
Answer:c

8. Devices that provide the connectivity to a WiMAX network are known as


a) subscriber stations
Answer:a

9. WiMAX is mostly used for


b) metropolitan area network
Answer:b

10. Which one of the following frequency is not used in WiMAX for communication?
b) 2.4 GHz
Answer:b

3. Bluetooth is the wireless technology for


b) personal area network
b
4. Bluetooth uses
a) frequency hoping spread spectrum
Answer:a

5. Unauthorised access of information from a wireless device through a bluetooth connection is called
a) bluemaking b) bluesnarfing
Answer:b

6. What is A2DP (advanced audio distribution profile)?


a) a bluetooth profile for streaming audio
Answer:b

8. Bluetooth transceiver devices operate in ______ band.


a) 2.4 GHz ISM
Answer:a

9. The bluetooth supports


a) point-to-point connections b) point-to-multipoint connection
c) both (a) and (b) answer: c

3) Coaxial cable consists of _______ concentric copper conductors.


b) 2
Answer: b

4) Fiber optics posses following properties


a) Immune electromagnetic interference b) Very less signal attenuation c) Very hard to tap
d) All of the mentioned
Answer: d

8) StarBand provides
d) Satellite access
Answer: d

9) Home Access is provided by


a) DSL b) FTTP c) Cable d) All of the mentioned
Answer: d

10) ONT is connected to splitter using


a) High speed fibre cable b) HFC c) Optical cable
Answer: c

11) These factors affect transmission rate in DSL


a) The gauge of the twisted-pair line b) Degree of electrical interference c) Shadow fading
d) Both a and b
Answer: d
Explanation: Because DSL is made of twisted wire copper pair.
1. ATM and frame relay are
a) virtual circuit networks
Answer:a
Explanation:ATM stands for asynchronous transfer mode.
2. ATM uses the
b) asynchronous time division multiplexing
Answer:b

4. ATM can be used for


a) local area network b) wide area network
c) both (a) and (b) answer C
5. An ATM cell has the payload field of
a) 32 bytes b) 48 bytes
Answer:b

6. Frame relay has error detection at the


a) physical layer b) data link layer
Answer:b

8. Frame relay has only


a) physical layer b) data link layer
c) both (a) and (b)
Answer:c

9. In frame relay networks, extended address is used


a) to increase the range of data link connection identifiers
Answer:a

10. What is FRAD in frame relay network?


a) FRAD assembles and disassembles the frames coming from other protocols
Answer:a
Explanation:FRAD stands for frame relay assembler/disassembler.

2) Multiplexing is used in _______


a) Packet switching b) Circuit switching
Answer: b

3) Which multiplexing technique transmits digital signals ?


a) FDM b) TDM
Answer: b
Explanation: FDM and WDM are used in analog signals.
6) The state when dedicated signals are idle are called
c) Silent period
Answer: c

7) Multiplexing can provide


a) Efficiency b) Privacy
d) Both a and b
Answer: d

10) Multiplexing technique that shifts each signal to a different carrier frequency
a) FDM
Answer: a

This set of Computer Networks Questions & Answers focuses on “Packet Switching and Circuit Switching”.
1) A local telephone network is an example of a _______ network
a) Packet switched

Answer: a

2) Most packet switches use this principle


b) Store and forward
Answer: b
Explanation: The packet switch will not transmit the first bit to outbound link until it recieves the entire packet.
4) Method(s) to move data through a network of links and switches
a) Packet switching
b) Circuit switching
d) Both a and b

Answer: d
5) The resources needed for communication between end systems are reserved for the duration of session between end systems in
________
a) Packet switching
b) Circuit switching
Answer: b
6) As the resouces are reserved between two communicating end systems in circuit switching, this is achieved
b) guaranteed constant rate
Answer: b

7) In _________ resources are allocated on demand.


a) packet switching
Answer: a
This section of our 1000+ Computer Networks MCQs focuses on SONET.
1. SONET stands for
a) synchronous optical network

Answer:a

3. The path layer of SONET is responsible for the movement of a signal


a) from its optical source to its optical destination
b) across a physical line
Answer:b

4. The photonic layer of the SONET is similar to the _____ of OSI model.
c) physical layer
Answer:c

Answer:d

7. A linear SONET network can be


a) point-to-point b) multi-point
c) both (a) and (b) Answer:c
8. Automatic protection switching in linear network is defined at the
a) line layer
Answer:a
9. A unidirectional path switching ring is a network with
a) one ring
b) two rings
Answer:b
Explanation:One ring is used as the working ring and other as the protection ring.
3. Internet access by transmitting digital data over the wires of a local telephone network is provided by
b) digital subscriber line
Answer:b
4. ISP exchanges internet traffic between their networks by
a) internet exchange point

Answer:a

6. IPv6 addressed have a size of


c) 128 bits
Answer:c

7. Internet works on
a) packet switching
Answer:a

10. Which one of the following is not used in media access control?
a) ethernet b) digital subscriber line c) fiber distributed data interface
d) none of the mentioned
Answer:d

This section of our 1000+ Computer Networks MCQs focuses on Cryptography.


1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
Answer:a
2. In asymmetric key cryptography, the private key is kept by
a) sender b) receiver
Answer:b

3. Which one of the following algorithm is not used in asymmetric-key cryptography?


a) RSA algorithm b) diffie-hellman algorithm c) electronic code book algorithm
Answer:c

4. In cryptography, the order of the letters in a message is rearranged by


a) transpositional ciphers
Answer:a
5. What is data encryption standard (DES)?
a) block cipher
Answer:a
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
Answer:a

8. Voice privacy in GSM cellular telephone protocol is provided by


a) A5/2 cipher
Answer:a
9. ElGamal encryption system is
b) asymmetric key encryption algorithm
Answer:b

10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
Answer:a

This section of our 1000+ Computer Networks MCQs focuses on Security In The Internet.
1. IPSec is designed to provide the security at the
b) network layer
Answer:b
2. In tunnel mode IPsec protects the
a) entire IP packet
Answer:a
3. Network layer firewall works as a
b) packet filter
Answer:b

4. Network layer firewall has two sub-categories as


a) stateful firewall and stateless firewall
Answer:a
5. WPA2 is used for security in
c) wi-fi
Answer:c

6. An attempt to make a computer resource unavailable to its intended users is called


a) denial-of-service attack
Answer:a
7. Extensible authentication protocol is authentication framework frequently used in
b) wireless networks
Answer:b

8. Pretty good privacy (PGP) is used in


b) email security
Answer:b
9. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
Answer:a
10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is
called
c) DNS spoofing
Answer:c

This set of Computer Networks Questions & Answers focuses on “Delays and Loss”.
1) Which of the following delay is faced by the packet in travelling from one end system to another ?
a) Propagation delay b) Queuing delay ) Transmission delay d) All of the mentioned
Answer: d
2) For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is(in milliseconds)
a) 3.2
Answer: a
Explanation: Transmission rate = length / transmission rate = 32/10 = 3.2milli seconds.
3) The time required to examine the packet’s header and determine where to direct the packet is part of
a) Processing delay
Answer: a
5) In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps.
The throughput is usually
a) 20Mbps b) 10Mbps

Answer: b
Explanation: The throughput is generally the transmission rate of bottleneck link.
9) Transmission delay does not depend on
b) Distance between the routers
Answer: b
Explanation: Transmission delay = packet length / transmission rate
10) Propagation delay depends on
c) Distance between the routers
Answer: c
Explanation: Propagation delay is the time it takes a bit to propagate from one router to the next.
7) Firewalls are often configured to block
a) UDP traffic
Answer: a

This set of Computer Networks Questions & Answers focuses on “Reference Models”.


1) The number of layers in Internet protocol stack
a) 5 Answer: a
2) The number of layers in ISO OSI reference model
b) 7 Answer: b
3) This layer in an addition to OSI model
b) Presentation layer c) Session layerd d) Both b and c
Answer: d
4) Application layer is implemented in
a) End system Answer: a
4) Transport layer is implemented in
a) End system Answer: a
6) Delimiting and synchronization of data exchange is provided by
a) Application layer b) Session layer
Answer: b
7) In OSI model, when data is sent from device A to device B, the 5th layer to recieve data at B is
a) Application layer b) Transport layer Answer: d
8) In Internet protocol stack, when data is sent from device A to device B, the 5th layer to receive data at B is
a) Application layer
Answer: a
9) In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______
b) Removed
Answer: b

This section of our 1000+ Computer Networks MCQs focuses on DHCP Protocol.
1. DHCP (dynamic host configuration protocol) provides _____ to the client.
a) IP address Answer:a

2. DHCP is used for


a) IPv6 b) IPv4 c) both (a) and (b)
Answer:c
3. The DHCP server
a) maintains a database of available IP addresses b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client d) all of the mentioned
Answer:d

4. IP assigned for a client by DHCP server is


a) for a limited period Answer:a

5. DHCP uses UDP port ____ for sending data to the server.
b) 67 Answer:b
6. The DHCP server can provide the _______ of the IP addresses.
a) dynamic allocationb) automatic allocationc) static allocationd) all of the mentioned
Answer:d

7. DHCP client and servers on the same subnet communicate via


a) UDP broadcast Answer:a

8. After obtaining the IP address, to prevent the IP conflict the client may use
c) address resolution protocol
Answer:c
9. What is DHCP snooping?
a) techniques applied to ensure the security of an existing DHCP infrastructure
Answer:a
10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.
a) MAC addressb) IP address
c) both (a) and (b) Answer:c

This section of our 1000+ Computer Networks MCQs focuses on SSH Protocol.
1. Secure shell (SSH) network protocol is used for
a) secure data communication b) remote command-line login
c) remote command execution d) all of the mentioned
Answer:d

2. SSH can be used in only


a) unix-like operating systems b) windows c) both (a) and (b)
Answer:c

3. SSH uses _______ to authenticate the remote computer.


a) public-key cryptography
Answer:a
4. Which standard TCP port is assigned for contacting SSH servers?
b) port 22 Answer:b

5. Which one of the following protocol can be used for login to a shell on a remote host except SSH?
a) telnet b) rlogin
c) both (a) and (b)
Answer:c
Explanation:SSH is more secured then telnet and rlogin.
1. Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.
a) TCP
Answer:a

2. SMTP connections secured by SSL are known as


a) SMTPS

3. SMTP uses the TCP port


d) 25 Answer:d

4. Which one of the following protocol is used to receive mail messages?


a) SMTP b) post office protocol c) internet message access protocol
d) all of the mentioned Answer:d
6. An email client needs to know the ____ of its initial SMTP server.
a) IP address
Answer:a

7. A SMTP session may include


a) zero SMTP transaction b) one SMTP transaction c) more than one SMTP transaction
d) all of the mentioned Answer:d
8. SMTP defines
a) message transport
Answer:a
9. Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail
through it?
a) open mail relay
Answer:a

10. SMTP is used to deliver messages to


a) user’s terminal b) user’s mailbox c) both (a) and (b)
Answer:c

This set of Computer Networks Questions & Answers focuses on “SMTP”.


1) When the mail server sends mail to other mail servers it becomes _____ ?
b) SMTP client Answer: b
2) If you have to send multimedia data over SMTP it has to be encoded into
c) ASCII
Answer: c

4) In SMTP, the command to write recievers mail adress is written with this command
b) RCPT TO Answer: b
5) The underlying Transport layer protocol used by SMTP is
a) TCP Answer: a

6) Choose the statement which is wrong in case of SMTP


a) It requires message to be in 7bit ASCII format b) It is a pull protocol
c) It transfers files from one mail server to another mail server
Answer: b
Explanation: The sending mail server pushes the mail to receiving mail server hence it is push protocol.
7) Internet mail places each object in
a) Separate messages for each object b) One message
Answer: b
8) Typically the TCP port used by SMTP is
a) 25 Answer: a

9) A session may include


a) Zero or more SMTP transactions
Answer: a

10) Example of user agents for e-mail


a) Microsoft Outlook b) Apple Mail
d) All of the mentioned Answer: d

11) When the sender and the receiver of an email are on different systems, we need only ______ .
d) Two UAs and two pairs of MTAs
Answer: d

12) User agent does not support this


a) Composing messages b) Reading messages
c) Replying messages d) All of the mentioned
Answer: d
1. An RPC (remote procedure call) is initiated by the
b) client
Answer:b

2. In RPC, while a server is processing the call, the client is blocked


a) unless the client sends an asynchronous request to the server
Answer:a

3. Remote procedure calls is


a) inter-process communication

Answer:a

4. RPC allows a computer program to cause a subroutine to execute in


a) its own address space
b) another address space
Answer:b

5. RPC works between two processes. These processes must be


a) on the same computer b) on different computers connected with a network
c) both (a) and (b) Answer:c

6. A remote procedure is uniquely identified by


a) program number b) version number c) procedure number
d) all of the mentioned Answer:d

7. An RPC application requires


a) specific protocol for client server communication b) a client program
c) a server program d) all of the mentioned
Answer:d

8. RPC is used to
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query c) both (a) and (b)
Answer:c

9. RPC is a
a) synchronous operation
Answer:a

10. The local operating system on the server machine passes the incoming packets to the
a) server stub
Answer:a

1. Real-time transport protocol (RTP) is mostly used in


a) streaming media b) video teleconference c) television services
d) all of the mentioned Answer:d

2. RTP is used to
a) carry the media stream Answer:a

3. RTP provides the facility of jitter ____ .


a) compensation
Answer:a

4. Which protocol provides the synchronization between media streams?


a) RTP b) RTCP
Answer:b

5. An RTP session is established for


a) each media stream
Answer:a

6. RTP can use


a) unprevileleged UDP ports b) stream control transmission protocol
c) datagram congestion control protocol d) all of the mentioned
Answer:d

8. An RTP header has a minimum size of


a) 12 bytes
Answer:a

9. Which one of the following is not correct?


a) RTCP provides canonical end-point identifiers to all session participants
b) RTCP reports are expected to be sent by all participants
c) both (a) and (b) d) none of the mentioned Answer:d

10. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?
a) SRTP
Answer:a

this set of Computer Networks Questions & Answers focuses on “FTP”.

2) FTP is built on _____ architecture


a) Client-server
b) P2P
Answer: a
3) FTP uses _____ parallel TCP connections to transfer a file
a) 1 b) 2
Answer: b
Explanation: Control connection and data connection.
4) Identify the incorrect statement
a) FTP stands for File Transfer Protocol b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band d) FTP sends exactly one file over the data connection
Answer: c
Explanation: FTP is out-of-band as it has separate control connection.
5) If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is
a) 5 b) 10 c) 2 d) 6
Answer: d
Explanation: 1 control connection and other 5 for five file transfers.
6) FTP server
a) Mantains state
b) Is stateless
Answer: a

7) The commands, from client to server, and replies, from server to client, are sent across the control connection in ____
bit ASCII format
a) 8 b) 7
Answer: b

8) Find the FTP reply whose message is wrongly matched


d) 452 – Can’t open data connection
Answer: d

9) Mode of data transfer in FTP, where all the is left to TCP


a) Stream mode
Answer: a

10) The password is sent to the server using _____ command


a) PASSWD
b) PASS
Answer: b

This set of Computer Networks Questions & Answers focuses on “Network Utilities”.


1) Ping can
a) Measure round-trip time b) Report packet loss
c) Report latency d) All of the mentioned
Answer: d

2) Ping sweep is a part of


a) Traceroute b) Nmap
c) Route d) Ipconfig
Answer: b
Explanation: A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are mostly used by
network scanning tools like nmap.
3) ICMP is used in
a) Ping b) Traceroute
c) Ifconfig d) Both a and b
Answer: d

4) _____ command is used to manipulate TCP/IP routing table.


a) route Answer: a

5) If you want to find the number of routers between a source and destination, the utility to be used is.
d) Traceroute
Answer: d

6) Which of the following is related to ipconfig in Microsoft Windows ?


a) Display all current TCP/IP network configuration values b) Modify DHCP settings
c) Modify DNS settings d) All of the mentioned
Answer: d
7) This allows to check if a domain is available for registration.
a) Domain Check
Answer: a
8) Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters
Answer: c
Explanation: Pathping combines the functionality of ping with that of traceroute (tracert).
This set of Computer Networks Questions & Answers focuses on “HTTP”.
1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______
c) 5
Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
2. The default connection type used by HTTP is _____
a) Persistent
b) Non-persistent
Answer: a

3. The time taken by a packet to travel from client to server and then back to the client is called ____
a) STT
b) RTT
Answer: b
Explanation: RTT stands for round-trip time.
4. The HTTP request message is sent in ____ part of three-way handshake.
c) Third
Answer: c

5. In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.
a) 2 b) 1
Answer: b
6. The first line of HTTP request message is called ____
a) Request line
Answer: a
Explanation: The line followed by request line are called header lines and status line is the initial part of response message.
7. The values GET, POST, HEAD etc are specified in ____ of HTTP message
a) Request line
Answer: a
Explanation: It is specified in the method field of request line in the HTTP request message.
8. The ______ method when used in the method field, leaves entity body empty.
a) POST
b) GET
Answer: b

9. The HTTP response message leaves out the requested object when _____ method is used
c) HEAD
d) PUT
Answer: c
11. Which of the following is not correct ?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects
Answer: a

12. The conditional GET mechanism


a) Imposes conditions on the objects to be requested b) Limits the number of response from a server
c) Helps to keep a cache upto date Answer: c

13. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
Answer: a

This set of Computer Networks Questions & Answers focuses on “IPv4″.


1. Which of the following is not applicable for IP?
a) Error reporting
Answer: a
Explanation: Error reporting is handled by ICMP.
2. Which of the following field in IPv4 datagram is not related to fragmentation?
c) TOS d) Identifier
Answer: c
Explanation: TOS-type of service identifies the type of packets.
3. The TTL field has value 10. How many routers (max) can process this datagram?
c) 10
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.
4. If the value in protocol field is 17, the transport layer protocol used is ____.
a) TCP
b) UDP
Answer: b
Explanation: For TCP it is 6.
5. The data field can carry which of the following?
ac) ICMP messages
Answer: c
Explanation: Data field usually has tranaport layer segment, but it can also carry ICMP messages.
6. What should be the flag value to indicate the last fragment?
a) 0
Answer: a
Explanation: flag=0 indicates that it is the last fragment.
7. Which of these is not applicable for IP protocol?
a) is connectionless
b) offer reliable service
Answer: b
Explanation: Ip offers unreliable service.
8. Fragmentation has following demerits
a) complicates routers b) open to DOS attack
c) overlapping of fragments. d) All of the mentioned
Answer: d
Explanation: Fragmentation makes the implementation complex and also can create DOS attack.
9. Which field helps to check rearrangement of the fragments?
a) Offset b) flag Answer: a
Explanation: offset field specifies where the fragment fits in the original datagram.
This set of Computer Networks Questions & Answers focuses on “IPv6″.
1. The size of IP address in IPv6 is
a) 4bytes
b) 128bits
Answer: b
Explanation: An IPv6 address is 128 bits long.
2. The header length of an IPv6 datagram is _____.
d) 40bytes
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the datagram.
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
c) ToS field
d) Option field
Answer: c
Explanation: This field enables to have different types of IP datagram.
4. IPv6 doesnot use ______ type of address
a) Broadcast
Answer: a
Explanation: Broadcast has been eliminated in IPv6.
5. These are the features present in IPv4 but not in IPv6.
a) Fragmentation b) Header checksum
c) Options d) All of the mentioned
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6.
6. The ____ field determines the lifetime of IPv6 datagram
a) Hop limit
Answer: a
Explanation: The Hop limit value is decremented by one by a router when the datagram is forwaded by the router. When
the value becomes zero the datagram is discarded.
7. Dual-stack approach refers to
c) Node has both IPv4 and IPv6 support
Answer: c
Explanation: dual-stack is one of the approach used to support IPv6 in already existing systems.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers.
The best solution here is
a) use dual-stack approach
b) Tunneling
Answer: b
Explanation: The IPv4 routers can form a tuunel.
9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
a) 96 to 127
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.

You might also like