Computer Network MCQ
Computer Network MCQ
(A) RARP
(B) UDP
(C) FTP
(D) TELNET
Ans: D
TELNET
2.Which of the following terms is just the collection of networks that can be joined
together?
(A) Intranet
(B) Extranet
(C) Internet
(D) LAN
Ans: A
Intranet
3.Bluetooth is an example of
(A) Wide area network
(B) Virtual private network
(C) Local area network
(D) Personal area network
Ans: D
Personal area network
4.The application layer of the OSI model is
(A) Four layer
(B) Five layer
(C) Six layer
(D) Seven layer
Ans: D Seven layer
5.FDDI is
(A) Bus based network
(B) Mesh network
(C) Star network
(D) Ring network
Ans: D
Ring network
6.Which of the following is the fastest type of computer?
(A) Personal computer
(B) Workstation
(C) Notebook
(D) Laptop
Ans: D
Laptop
7.Which can read data and convert them to a form that a computer can use?
(A) Control
(B) Input device
(C) Storage
(D) Logic
Ans: B
Input device
8.A device which can be connected to a network without using cable is called
(A) Distributed device
(B) Centralized device
(C) Open-source device
(D) Wireless device
Ans: D
Wireless device
9.The vast network of computers that connects millions of people all over the world is
called
(A) Internet
(B) Hypertext
(C) LAN
(D) Web
Ans: A
Internet
10.The cheapest modems can transmit
(A) 300 bits per second
(B) 1,200 bits per second
(C) 2,400 bits per second
(D) None of these
Ans: A
300 bits per second
Answer: a
12. In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are ___________
a) Added
b) Removed
c) Rearranged
d) Modified
Answer: a
Answer: a
14. Communication between a computer and a keyboard involves ______________
transmission.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
Answer: d
Answer: d
Answer: b
17. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
Answer: c
Answer: d
19. A _________ set of rules that governs data communication.
a) Protocols
b) Standards
c) RFCs
d) Servers
Answer: a.
Answer: b
21.When collection of various computers seems a single coherent system to its client, then
it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system
Answer: b
Answer: a
23. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
Answer: d
25. Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
Answer: a
Answer: a
27. A __________ is a device that forwards packets between networks by processing the
routing information included in the packet.
a) bridge
b) firewall
c) router
d) hub
Answer: c
28. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
Answer: b
Answer: a.
30. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
Answer: b
31.How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10
Answer: a
Answer: b
33. Which of the following layers is an addition to OSI model when compared with TCP IP
model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
Answer: d
Answer: a
35. Transport layer is implemented in ______________
a) End system
b) NIC
c) Ethernet
d) Signal transmission
Answer: a
Answer: d
Answer: b
38. In OSI model, when data is sent from device A to device B, the 5th layer to receive data
at B is _________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
Answer: d
39. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive
data at B is ____________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
Answer: a
40. In the OSI model, as a data packet moves from the lower to the upper layers, headers
are _______
a) Added
b) Removed
c) Rearranged
d) Randomized
Answer: b
41. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model
Answer: c
Answer: a
Answer: d
44. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer
Answer: a
45. Which layer is used to link the network support layers and user support layers?
a) session layer
b) data link layer
c) transport layer
d) network layer
Answer: c
46. Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
Answer: d
Answer: a
48. Which layer is responsible for process to process delivery in a general network model?
a) network layer
b) transport layer
c) session layer
d) data link layer
Answer: b
49. Which address is used to identify a process on a host by the transport layer?
a) physical address
b) logical address
c) port address
d) specific address
Answer: c
50. Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) physical layer
Answer: a
Answer: a
53. Which transmission media provides the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
Answer: c
54. Bits can be sent over guided and unguided media as analog signal by ___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
Answer: a
55. The portion of physical layer that interfaces with the media access control sublayer is
called ___________
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) physical transport sublayer
Answer: a
Answer: d
Answer: c
Answer: d
59. The physical layer translates logical communication requests from the ______ into
hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
Answer: a
Answer: c
61. Wireless transmission of signals can be done via ___________
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
Answer: d
Answer: d
Answer: b
66. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer: d
67. Which of the following is not correct in relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers
Answer: c
68. A subset of a network that includes all the routers but contains no loops is called
________
a) spanning tree
b) spider structure
c) spider tree
d) special tree
Answer: a
69. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
Answer: d
Answer: b
Answer: a
72.The data link layer takes the packets from _________ and encapsulates them into
frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Answer: a
73. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
Answer: d
74. Which sublayer of the data link layer performs data link functions that depend upon the
type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
Answer: b
Answer: d
Answer: a
77. When 2 or more bits in a data unit has been changed during the transmission, the error
is called ____________
a) random error
b) burst error
c) inverted error
d) double error
Answer: b
Answer: a
Answer: d
80. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer: c
81. The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Answer: a
82.Transport layer aggregates data from different applications into a single stream before
passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer: a
83. Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
Answer: c
Answer: a
Answer: d
Answer: a
87. Socket-style API for windows is called ____________
a) wsock
b) winsock
c) wins
d) sockwi
Answer: b
88. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
Answer: a
Answer: a
Answer: b
Answer: a
92.What is the access point (AP) in a wireless LAN?
a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both device that allows wireless devices to connect to a wired network and wireless
devices itself
d) all the nodes in the network
Answer: a
Answer: a
94. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
Answer: b
Answer: a
Answer: c
Answer: a
Answer: b
99. Which one of the following event is not possible in wireless LAN?
a) collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks
Answer: a
Answer: b
Answer: a
102.An RPC (remote procedure call) is initiated by the _________
a) server
b) client
c) client after the sever
d) a third party
Answer: b
103. In RPC, while a server is processing the call, the client is blocked ________
a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) unless the server is disconnected
Answer: a
Answer: a
Answer: b
106. RPC works between two processes. These processes must be ____________
a) on the same computer
b) on different computers connected with a network
c) on the same computer and also on different computers connected with a network
d) on none of the computers
Answer: c
Answer: d
Answer: d
Answer: c
Answer: a
111. The local operating system on the server machine passes the incoming packets to the
___________
a) server stub
b) client stub
c) client operating system
d) client process
Answer: a
112.The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
Answer: b
113. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
Answer: b
Answer: b
115. If there are n signal sources of same data rate, then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n
Answer: a
116. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate
of circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
Answer: a
117. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period
Answer: c
Answer: d
119. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the
transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
Answer: a
Answer: b
Answer: a
122. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
Answer: c
123. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
Answer: c
124. If the value in protocol field is 17, the transport layer protocol used is _____________
a) TCP
b) UDP
c) ICMP
d) IGMP
Answer: b
Answer: c
126. What should be the flag value to indicate the last fragment?
a) 0
b) 1
c) TTl value
d) Protocol field value
Answer: a
Answer: d
129. Which field helps to check rearrangement of the fragments?
a) offset
b) flag
c) ttl
d) identifer
Answer: a
130.Which of the following is the broadcast address for a Class B network ID using the
default subnetmask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
Answer: c
131. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is
your class of address, subnet address, and broadcast address?
a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
Answer: b
132. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would
you use?
a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248
Answer: c
133. The combination of _________ and __________ is often termed the local address of
the local portion of the IP address.
a) Network number and host number
b) Network number and subnet number
c) Subnet number and host number
d) Host number
Answer: c
134. _________ implies that all subnets obtained from the same subnet mask.
a) Static subnetting
b) Dynamic subnetting
c) Variable length subnetting
d) Dynamic length subnetting
Answer: a
Answer: a
136. __________ is a high performance fiber optic token ring LAN running at 100 Mbps
over distances upto 1000 stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR
Answer: a
Answer: d
138. _________ is a collective term for a number of Ethernet Standards that carry traffic at
the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.
a) Ethernet
b) Fast Ethernet
c) Gigabit Ethernet
d) Gigabyte Ethernet
Answer: b
139. _________ is another kind of fiber optic network with an active star for switching.
a) S/NET
b) SW/NET
c) NET/SW
d) FS/NET
Answer: a
Answer: d
Answer: a
142. TCP process may not write and read data at the same speed. So we need
__________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
Answer: b
143. TCP groups a number of bytes together into a packet called _______
a) Packet
b) Buffer
c) Segment
d) Stack
Answer: c
144. Communication offered by TCP is ________
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
Answer: a
145. To achieve reliable transport in TCP, ___________ is used to check the safe and
sound arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
Answer: d
146. In segment header, sequence number and acknowledgement number fields refer to
_______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
Answer: a
147. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only
one segment?
a) 10000
b) 10001
c) 12001
d) 11001
Answer: b
148. Bytes of data being transferred in each connection are numbered by TCP. These
numbers start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
Answer: d
149. The value of acknowledgement field in a segment defines _______
a) sequence number of the byte received previously
b) total number of bytes to receive
c) sequence number of the next byte to be received
d) sequence of zeros and ones
Answer: c
Answer: d
Answer: a
152. During error reporting, ICMP always reports error messages to ________
a) Destination
b) Source
c) Next router
d) Previous router
Answer: b
Answer: c
154. ICMP error message will not be generated for a datagram having a special address
such as _______
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127
Answer: a
155. When a router cannot route a datagram or host cannot deliver a datagram, the
datagram is discarded and the router or the host sends a ____________ message back to
the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
Answer: a
156. The source-quench message in ICMP was designed to add a kind of ____________ to
the IP.
a) error control
b) flow control
c) router control
d) switch control
Answer: b
157. In case of time exceeded error, when the datagram visits a router, the value of time to
live field is _________
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1
Answer: d
158. Two machines can use the timestamp request and timestamp replay messages to
determine the ___________ needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source
Answer: b
159. During debugging, we can use the ____________ program to find if a host is alive and
responding.
a) traceroute
b) shell
c) ping
d) java
Answer: c
160. In windows ____________ can be used to trace the route of the packet from the
source to the destination.
a) traceroute
b) tracert
c) ping
d) locater
Answer: b
161. In a simple echo-request message, the value of the sum is 01010000 01011100. Then,
value of checksum is ___________
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
Answer: a
162.The number of objects in a Web page which consists of 4 jpeg images and HTML text
is ________
a) 4
b) 1
c) 5
d) 7
Answer: c
Answer: a
164. The time taken by a packet to travel from client to server and then back to the client is
called __________
a) STT
b) RTT
c) PTT
d) JTT
Answer: b
165. The HTTP request message is sent in _________ part of three-way handshake.
a) First
b) Second
c) Third
d) Fourth
Answer: c
166. In the process of fetching a web page from a server the HTTP request/response takes
__________ RTTs.
a) 2
b) 1
c) 4
d) 3
Answer: b
Answer: a
168. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
Answer: a
169. The __________ method when used in the method field, leaves entity body empty.
a) POST
b) SEND
c) GET
d) PUT
Answer: c
170. The HTTP response message leaves out the requested object when ____________
method is used
a) GET
b) POST
c) HEAD
d) PUT
Answer: c
Answer: a
Answer: c
174. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
Answer: a
175.When the mail server sends mail to other mail servers it becomes ____________
a) SMTP server
b) SMTP client
c) Peer
d) Master
Answer: b
176. If you have to send multimedia data over SMTP it has to be encoded into _______
a) Binary
b) Signal
c) ASCII
d) Hash
Answer: c
Answer: a
178. In SMTP, the command to write receiver’s mail address is written with the command
_______
a) SEND TO
b) RCPT TO
c) MAIL TO
d) RCVR TO
Answer: b
Answer: a
Answer: b
Answer: b
Answer: a
Answer: a
Answer: a
185. When the sender and the receiver of an email are on different systems, we need only
_________
a) One MTA
b) Two UAs
c) Two UAs and one MTA
d) Two UAs and two MTAs
Answer: d
187. User agent does not support this ___________
a) Composing messages
b) Reading messages
c) Replying messages
d) Routing messages
Answer: d
Answer: a
Answer: b
Answer: b
Answer: d
192. If a server has no clue about where to find the address for a hostname then _______
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Answer: a
193. Which one of the following allows client to update their DNS entry as their IP address
change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Answer: a
Answer: b
195. The right to use a domain name is delegated by domain name registers which are
accredited by _______
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Answer: d
Answer: a
Answer: c
198.The application layer protocol used by a Telnet application is ________
a) Telnet
b) FTP
c) HTTP
d) SMTP
Answer: a
199. Which amongst the following statements is correct for “character at a time” mode?
a) Character processing is done on the local system under the control of the remote system
b) Most text typed is immediately sent to the remote host for processing
c) All text is echoed locally, only completed lines are sent to the remote host
d) All text is processed locally, and only confirmed lines are sent to the remote host
Answer: b
Answer: a
201. What is the correct syntax to be written in the web browser to initiate a Telnet
connection to www.sanfoundry.com?
a) telnet//www.sanfoundry.com
b) telnet:www.sanfoundry.com
c) telnet://www.sanfoundry.com
d) telnet www.sanfoundry.com
Answer: c
Answer: c
Answer: c
Answer: c.
205. If we want that a character be interpreted by the client instead of server _________
a) interpret as command (IAC) escape character has to be used
b) control functions has to be disabled
c) it is not possible
d) cli character has to be used
Answer: a
Answer: c
Answer: d
Answer: b
advertisement
209. AbsoluteTelnet is a telnet client for _______ Operating system.
a) windows
b) linux
c) mac
d) ubuntu
Answer: a
Answer: d.
211. Which of the following is true for character mode operation of telnet implementation?
a) each character typed is sent by the client to the server
b) each character typed is discarded by the server
c) each character typed is aggregated into a word and then sent to the server
d) each character type is aggregated into a line and then sent to the server
Answer: a
212. In which mode of telnet, the client echoes the character on the screen but does not
send it until a whole line is completed?
a) default mode
c) character mode
c) server mode
d) command mode
Answer: a
Answer: c
214. A ___________ is an extension of an enterprise’s private intranet across a public
network such as the internet, creating a secure private connection.
a) VNP
b) VPN
c) VSN
d) VSPN
Answer: b
Answer: d
Answer: c
Answer: d
Answer: c
219. VPNs are financially speaking __________
a) Always more expensive than leased lines
b) Always cheaper than leased lines
c) Usually cheaper than leased lines
d) Usually more expensive than leased lines
Answer: c
Answer: d
221. ESP (Encapsulating Security Protocol) is defined in which of the following standards?
a) IPsec
b) PPTP
c) PPP
d) L2TP
Answer: a
Answer: b
233. Which layer of the OSI reference model does PPTP work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
Answer: b
234. Which layer of the OSI reference model does IPsec work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
Answer: c
235. Multiple objects can be sent over a TCP connection between client and server in a
persistent HTTP connection.
a) True
b) False
View Answer
Answer: a
Explanation: Persistent connections are kept active after completing transaction so that
multiple objects can be sent over the same TCP connection.
Answer: a
Answer: b
239. In HTTP pipelining ________________
a) multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) multiple HTTP requests are sent at random on a single TCP connection
Answer: a
Answer: b
241. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
Answer: a
242. In Active mode FTP, the client initiates both the control and data connections.
a) True
b) False
Answer: b
Answer: c
244. In File Transfer Protocol, data transfer cannot be done in ___________
a) stream mode
b) block mode
c) compressed mode
d) message mode
Answer: d
Answer: a
Answer: c
Answer: d
Answer: a
249. DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
Answer: b
250. The DHCP server can provide the _______ of the IP addresses.
a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned
Answer: d