Complete Computer Networks Questions & Answers Sanfoundary
Complete Computer Networks Questions & Answers Sanfoundary
8. In OSI model, when data is sent from device A 2. The OSI model has _______ layers.
to device B, the 5th layer to receive data at B is a) 4
a) Application layer b) 5
b) Transport layer c) 6
c) Link layer d) 7
d) Session layer View Answer
View Answer
Answer: d
Answer: d Explanation: In OSI reference model, there are 7 layers
Explanation: In OSI reference model, the fifth layer is namely Application, Presentation, Session, Transport,
Session layer. Session layer provides the mechanism Network, Data Link and Physical layer.
for opening, closing and managing a session between
end-user application processes. 3. TCP/IP model does not have ______ layer but
OSI model have this layer.
9. In TCP IP Model, when data is sent from device a) session layer
A to device B, the 5th layer to receive data at B is b) transport layer
a) Application layer c) application layer
b) Transport layer d) None of the mentioned
c) Link layer View Answer
d) Session layer
View Answer Answer: a
Explanation: In OSI reference model, there are two
Answer: a layers which are not present in TCP/IP model. They are
Explanation: In TCP/IP model, the fifth layer is Presentation and Session layer.
application layer. when data is sent from device A to
device B, the 5th layer to receive data at B is application 4. Which layer links the network support layers and
layer. user support layers
a) session layer
10. In the OSI model, as a data packet moves from b) data link layer
the lower to the upper layers, headers are _______ c) transport layer
a) Added d) network layer
b) Removed View Answer
c) Rearranged
d) None of the mentioned Answer: c
View Answer Explanation: Physical, data link and network layers are
network support layers and session, presentation and
Answer: b application layers are user support layers.
Explanation: In OSI reference model, when data packet
moves from lower layers to higher layer, headers get 5. Which address is used in an internet employing
removed. Whereas when data packet move from higher the TCP/IP protocols?
layer to lower layers, headers are added. a) physical address and logical address
b) port address
c) specific address
Computer Networks Questions & d) all of the mentioned
Answers – Reference Models – 2 View Answer
9. Which layer provides the services to user? 3. Bits can be send over guided and unguided
a) application layer media as analog signal by
b) session layer a) digital modulation
c) presentation layer b) amplitude modulation
d) none of the mentioned c) frequency modulation
View Answer d) phase modulation
View Answer
Answer: a
Explanation: In networking, a user mainly interacts with Answer: a
application layer to create and send information to other Explanation: In analog modulation, digital low frequency
computer or network. baseband signal (digital bitstream) are transmitted over
a higher frequency. Whereas in digital modulation the
10. Transmission data rate is decided by only difference is that the base band signal is of discrete
a) network layer amplitude level.
b) physical layer
c) data link layer 4. The portion of physical layer that interfaces with
d) transport layer the media access control sublayer is called
View Answer a) physical signalling sublayer
b) physical data sublayer
Answer: b c) physical address sublayer
Explanation: Physical layer is a layer 1 device which d) none of the mentioned
deals with network cables or the standards in use like
View Answer
connectors, pins, electric current used etc. Basically the
transmission speed is determined by the cables and Answer: a
connectors used. Hence it is physical layer that Explanation: The portion of physcial layer that interfaces
determines the transmission speed in network. with the medium access control sublayer is Physical
Signaling Sublayer. The main function of this layer is
character encoding, reception, decoding and performs d) none of the mentioned
optional isolation functions. View Answer
5. physical layer provides Answer: c
a) mechanical specifications of electrical Explanation: In communication and computer networks,
connectors and cables the main goal is to share a scarce resource. This is
b) electrical specification of transmission line signal done by multiplexing, where multiple analog or digital
level signals are combined into one signal over a shared
c) specification for IR over optical fiber medium.
d) all of the mentioned 10. Wireless transmission can be done via
View Answer a) radio waves
Answer: d b) microwaves
Explanation: Anything dealing with a network cable or c) infrared
the standards in use – including pins, connectors and d) all of the mentioned
the electric current used is dealt in the physical layer View Answer
(Layer 1).
Answer: d
6. In asynchronous serial communication the Explanation: Wireless transmission is carried out by
physical layer provides radio waves, microwaves and IR waves. These waves
a) start and stop signalling range from 3 Khz to above 300 Ghz and are more
b) flow control suitable for wireless transmission because they allow a
wider band for modulating signals, so you can obtain
c) both start & stop signalling and flow control
higher frequency transmission.
d) none of the mentioned
View Answer
Answer: c
Computer Networks Questions &
Explanation: In asynchronous serial communication, the Answers – Data Link Layer
communication is not synchronized by clock signal.
Instead of a start and stop signaling and flow control This set of Computer Networks Multiple Choice
method is followed. Questions & Answers (MCQs) focuses on “Data
Link Layer”.
7. The physical layer is responsible for
a) line coding 1. The data link layer takes the packets from
b) channel coding _________ and encapsulates them into frames for
c) modulation transmission.
d) all of the mentioned a) network layer
View Answer b) physical layer
c) transport layer
Answer: d
Explanation: The physical layer is responsible for line d) application layer
coding, channel coding and modulation that is needed View Answer
for the transmission of the information.
Answer: a
8. The physical layer translates logical Explanation: In computer networks, the data from
application layer is sent to transport layer and is
communication requests from the ______ into
converted to segments. These segments are then
hardware specific operations. transferred to the network layer and these are called
a) data link layer packets. These packets are then sent to data link layer
b) network layer where they are encapsulated into frames. These frames
c) trasnport layer are then transferred to physical layer where the frames
d) application layer are converted to bits.
View Answer
2. Which one of the following task is not done by
Answer: a data link layer?
Explanation: Physical layer accepts data or information a) framing
from the data link layer and converts it into hardware b) error control
specific operations so as to transfer the message c) flow control
through physical cables.
d) channel coding
9. A single channel is shared by multiple signals by View Answer
a) analog modulation Answer: d
b) digital modulation Explanation: Channel coding is the function of physical
c) multiplexing layer. Data link layer mainly deals with framing, error
control and flow control.
3. Which sublayer of the data link layer performs Answer: a
data link functions that depend upon the type of Explanation: Cyclic redundancy check is a code that is
medium? added to a data which helps us to identify any error that
a) logical link control sublayer occurred during the transmission of the data.
b) media access control sublayer 8. Which one of the following is a data link
c) network interface control sublayer protocol?
d) none of the mentioned a) ethernet
View Answer b) point to point protocol
Answer: b c) hdlc
Explanation: Media access control (MAC) deals with d) all of the mentioned
transmission of data packets to and from the network- View Answer
interface card, and also to and from another remotely
shared channel. Answer: d
Explanation: There are many data link layer protocols.
4. Header of a frame generally contains Some of them are SDLC (synchronous data link
a) synchronization bytes protocol), HDLC (High level data link control), SLIP
b) addresses (serial line interface protocol), PPP (Point to point
protocol) etc.
c) frame identifier
d) all of the mentioned 9. Which one of the following is the multiple access
View Answer protocol for channel access control?
Answer: d a) CSMA/CD
Explanation: In computer networks, the header is a part b) CSMA/CA
of the data that contains all the required information c) Both CSMA/CD & CSMA/CA
about the transmission of the file. It contains information d) None of the mentioned
like synchronization bytes, addresses, frame identifier View Answer
etc.
Answer: c
5. Automatic repeat request error management Explanation: In CSMA/CD, it deals with detection of
mechanism is provided by collision after collision has occurred. Whereas
a) logical link control sublayer CSMA/CA deals with preventing collision. CSMA/CD is
b) media access control sublayer abbreviation for Carrier Sensing Multiple
Access/Collision detection. CSMA/CA is abbreviation for
c) network interface control sublayer
Carrier Sensing Multiple Access/Collision Avoidance.
d) none of the mentioned
View Answer 10. The technique of temporarily delaying outgoing
acknowledgements so that they can be hooked
Answer: a
Explanation: The logical link control is a sublayer of data onto the next outgoing data frame is called
link layer whose main function is to manage traffic, flow a) piggybacking
and error control. This layer also acts as an interface b) cyclic redundancy check
between MAC layer and network layer. c) fletcher’s checksum
d) none of the mentioned
6. When 2 or more bits in a data unit has been View Answer
changed during the transmission, the error is called
a) random error Answer: a
b) burst error Explanation: Piggybacking is a technique in which the
c) inverted error acknowledgment is temporarily delayed so as to be
hooked with the next outgoing data frame.
d) none of the mentioned
View Answer
Answer: b Computer Networks Questions &
Explanation: When a single bit error occurs in a data, it Answers – Network Layer
is called single bit error. When more than a single bit of
data is corrupted or has error, it is called burst error. This set of Computer Networks Multiple Choice
Questions & Answers (MCQs) focuses on “Network
7. CRC stands for
Layer”.
a) cyclic redundancy check
b) code repeat check 1. The network layer concerns with
c) code redundancy check a) bits
d) cyclic repeat check b) frames
View Answer c) packets
d) none of the mentioned vector routing, link state routing, Hierarchical routing
View Answer etc.
10. Which one of the following is a transport layer 4. Data communication system spanning states,
protocol? countries, or the whole world is ________
a) stream control transmission protocol a) LAN
b) internet control message protocol b) WAN
c) neighbor discovery protocol c) MAN
d) dynamic host configuration protocol d) None of the mentioned
View Answer View Answer
Answer: a Answer: b
Explanation: There are many protocols in transport Explanation: WAN is the abbreviation for Wide Area
layer. The most prominent are TCP and UDP. Some of Network. This network extends over a large
the other protocols are RDP, RUDP, SCTP, DCCP etc. geographical area. These are used to connect cities,
states or even countries.
1. The sharing of a medium and its link by two or more 6. The state when dedicated signals are idle are called
devices is called _________ __________
a) Fully duplexing a) Death period
b) Multiplexing b) Poison period
c) Both Fully duplexing and Multiplexing c) Silent period
d) Duplexing d) None of the mentioned
View Answer View Answer
Answer: b Answer: c
Explanation: Multiplexing is a method using which one Explanation: There are instances when connection
can send multiples signals through a shared medium at between two endpoints have been established, but no
the same time. This helps in using less resources and communication or transfer of messages occur. This
thus saving the cost of sending messages. period of time is called silent period.
Answer: b Answer: d
Explanation: Circuit switching is a switching method by Explanation: Multiplexing helps us to transfer our
which one can obtain a physical path between end messages over a shared channel. This brings up the
points. Circuit switching method is also called a issue of privacy and efficiency. Fortunately, Multiplexing
connection oriented network. has high efficiency and high privacy when implemented.
2. Which of the following is a form of DoS attack ? 8. In a network, If P is the only packet being
a) Vulnerability attack transmitted and there was no earlier transmission,
b) Bandwidth flooding which of the following delays could be zero
c) Connection flooding a) Propogation delay
d) All of the mentioned b) Queuing delay
View Answer c) Transmission delay
d) Processing delay
Answer: d
View Answer
Explanation: None.
Answer: b
3. The DoS attack is which the attacker establishes Explanation: None.
a large number of half-open or fully open TCP
connections at the target host
a) Vulnerability attack Computer Networks Questions &
b) Bandwidth flooding
c) Connection flooding
Answers – Physical Media
d) All of the mentioned This set of Computer Networks Multiple Choice
View Answer Questions & Answers (MCQs) focuses on
Answer: c “Physical Media”.
Explanation: None.
1. Which of this is not a guided media?
4. The DoS attack is which the attacker sends a) Fiber optical cable
deluge of packets to the targeted host b) Coaxial cable
a) Vulnerability attack c) Wireless LAN
b) Bandwidth flooding d) Copper wire
c) Connection flooding View Answer
d) All of the mentioned
Answer: c
View Answer Explanation: Wireless LAN is unguided media.
2. UTP is commonly used in __________ Answer: b
a) DSL Explanation: The three types are those that operate
b) FTTP over very short distance, those that operate in local
c) HTTP areas, those that operate in the wide area.
d) None of the mentioned 7. Radio channels are attractive medium because
View Answer __________
Answer: a a) Can penetrate walls
Explanation: Unshielded twisted pair(UTP) is commonly b) Connectivity can be given to mobile user
used in home access. c) Can carry signals for long distance
d) All of the mentioned
3. Coaxial cable consists of _______ concentric View Answer
copper conductors.
a) 1 Answer: d
b) 2 Explanation: Radio channels can penetrate walls, can
c) 3 be used to provide connectivity to mobile users and can
also carry signals for long distances.
d) 4
View Answer advertisement
Answer: b 8. Geostationary satellites ___________
Explanation: Coaxial cable has an inner conductor a) Are placed at a fixed point above the earth
surrounded by a insulating layer, which is surrounded
b) Rotate the earth about a fixed axis
by a conducting shield. Coaxial cable is used to carry
high frequency signals with low losses. c) Rotate the earth about a varying axis
d) All of the mentioned
4. Fiber optics posses following properties View Answer
__________
Answer: a
a) Immune electromagnetic interference
Explanation: They are placed in orbit at 36,000km
b) Very less signal attenuation above Earth’s surface.
c) Very hard to tap
d) All of the mentioned
View Answer Computer Networks Questions &
Answer: d Answers – Packet Switching &
Explanation: In fibre optics the transmission of
information is in the form of light or photons. Due to all
Circuit Switching
above properties mentioned in options fibre optics can
This set of Computer Networks Multiple Choice
be submerged in water and are used at more risk
environments.
Questions & Answers (MCQs) focuses on “Packet
Switching & Circuit Switching”.
5. If an Optical Carrier is represented as OC-n,
generally the link speed equals(in Mbps) 1. A local telephone network is an example of a
__________ _______ network.
a) n*39.8 a) Packet switched
b) n*51.8 b) Circuit switched
c) 2n*51.8 c) Both Packet switched and Circuit switched
d) None of the mentioned d) Line switched
View Answer View Answer
Answer: b Answer: b
Explanation: The base unit of transmission rates in Explanation: Circuit switching is connection oriented
optical fibre is 51.8 Mbits/s. So an optical carrier switching technique. Whereas in the case of packet
switching, it is connectionless. Circuit switching is
represented as OC-n has n*51.8 Mbits/s transmission
implemented in the Physical layer, whereas packet
speed. For eg. OC-3 has 3*51.8 Mbits/s speed.
switching is implemented in the Network layer.
6. Terrestrial radio channels are broadly classifed
2. Most packet switches use this principle
into _____ groups.
____________
a) 2
a) Stop and wait
b) 3
b) Store and forward
c) 4
c) Both Stop and wait and Store and forward
d) 1
d) Stop and forward
View Answer
View Answer
Answer: b b) circuit switching
Explanation: The packet switch will not transmit the first c) line switching
bit to outbound link until it receives the entire packet. d) frequency switching
View Answer
3. If there are N routers from source to destination,
a total end to end delay in sending packet P(L-> Answer: a
number of bits in the packet R-> transmission rate) Explanation: In packet switching, the bits are received in
a) N out of order and need to be assembled at the receiver
b) (N*L)/R end. Whereas in the case of Circuit switching, all the
c) (2N*L)/R bits are received in order.
d) L/R
advertisement
View Answer
8. Which of the following is an application layer
Answer: b
Explanation: The equation to find the end to end delay service?
when no. of bits, transmission rate and no. of routers is a) Network virtual terminal
given by (N*L)/R. b) File transfer, access, and management
c) Mail service
4. What are the Methods to move data through a d) All of the mentioned
network of links and switches? View Answer
a) Packet switching
b) Circuit switching Answer: d
c) Line switching Explanation: Network virtual terminal, mail service, file
transfer, access and management are all services of an
d) Both Packet switching and Circuit switching
application layer.
View Answer
Answer: d
Explanation: Packet switching and Circuit switching are Computer Networks Questions &
two different types of switching methods used to Answers – Application Layer – 1
connect the multiple communicating devices with one
another. This set of Computer Networks Multiple Choice
Questions & Answers (MCQs) focuses on
5. The resources needed for communication “Application Layer – 1”.
between end systems are reserved for the duration
of the session between end systems in ________ 1. Which is not a application layer protocol?
a) Packet switching a) HTTP
b) Circuit switching b) SMTP
c) Line switching c) FTP
d) Frequency switching d) TCP
View Answer View Answer
Answer: b Answer: d
Explanation: In circuit switching, a physical path Explanation: TCP is transport layer protocol.
between the sender and receiver is established. This
path is maintained until the connection is needed. 2. The packet of information at the application layer
is called __________
6. As the resouces are reserved between two a) Packet
communicating end systems in circuit switching, b) Message
this is achieved ___________ c) Segment
a) authentication d) Frame
b) guaranteed constant rate View Answer
c) reliability
d) store and forward Answer: b
View Answer Explanation: For Application, Presentation and Session
layers there is no data format for message. Message is
Answer: b message as such in these three layers. But when it
Explanation: Circuit switching is connection oriented comes to Transport, Network, Data and Physical layer
and is always implemented in the physical layer. Once a they have data in format of segments, packets, frames
path is set, all transmission occurs through the same and bits respectively.
path.
3. Which one of the following is an architecture
7. In _________ resources are allocated on paradigms?
demand. a) Peer to peer
a) packet switching b) Client-server
c) HTTP Answer: d
d) Both Peer-to-Peer & Client-Server Explanation: The services provided by the application
View Answer layer are network virtual terminal, file transfer, access
and management, mail services, directory services,
Answer: d various file and data operations.
Explanation: HTTP is a protocol.
9. To deliver a message to the correct application
4. Application developer has permission to decide program running on a host, the _______ address
the following on transport layer side must be consulted.
a) Transport layer protocol a) IP
b) Maximum buffer size b) MAC
c) Both Transport layer protocol and Maximum c) Port
buffer size d) None of the mentioned
d) None of the mentioned View Answer
View Answer
Answer: c
Answer: c Explanation: IP address lets you know where the
Explanation: Application layer provides the interface network is located. Whereas MAC address is a unique
between applications and the network. So application address for every device. Port address identifies a
developer can decide what transport layer to use and process or service you want to carry on.
what should be its maximum buffer size.
10. Which is a time-sensitive service?
5. Application layer offers _______ service. a) File transfer
a) End to end b) File download
b) Process to process c) E-mail
c) Both End to end and Process to process d) Internet telephony
d) None of the mentioned View Answer
View Answer
Answer: d
Answer: a Explanation: Internet telephony is Loss-tolerant other
Explanation: End to End service is provided in the applications are not.
application layer. Whereas process to process service is
provided at the transport layer. advertisement
Computer Networks Questions & 5. In the process of fetching a web page from a
server the HTTP request/response takes
Answers – HTTP __________ RTTs.
This set of Computer Networks Multiple Choice a) 2
Questions & Answers (MCQs) focuses on “HTTP”. b) 1
c) 4
1. The number of objects in a Web page which d) 3
consists of 4 jpeg images and HTML text is View Answer
________
Answer: b
a) 4
Explanation: By default the http connection will be
b) 1 persistent connection. Hence it will take only 1 RTT to
c) 5 fetch a webpage from a server.
d) 7
View Answer 6. The first line of HTTP request message is called
_____________
Answer: c a) Request line
Explanation: 4 jpeg images + 1 base HTML file.
b) Header line
2. The default connection type used by HTTP is c) Status line
_________ d) Entity line
a) Persistent View Answer
b) Non-persistent Answer: a
c) Can be either persistent or non-persistent Explanation: The line followed by request line are called
depending on connection request header lines and status line is the initial part of response
d) None of the mentioned message.
View Answer
7. The values GET, POST, HEAD etc are specified
Answer: a in ____________ of HTTP message
Explanation: By default the http connection is issued a) Request line
with persistent connection. In persistent connection b) Header line
server leaves connection open after sending response.
c) Status line
As little as one RTT (Time for a small packet to travel
from client to server and back) is required for all d) Entity body
referenced objects. View Answer
3. Which protocols are used for Storage 8. Effect of open standards like SMI(s)
management? a) Standardization drives software interoperability
a) SNMP and interchange ability
b) LDAP b) Breaks the old-style dependence on proprietary
c) POP3 methods, trade secrets, and single providers
d) MIB c) Builds a strong foundation on which others can
View Answer quickly build and innovate
d) All of the mentioned
Answer: a View Answer
Explanation: Simple Network Management Protocol is
for storage management. Answer: d
Explanation: Driver software, old style dependence and
4. Identify the difficulties the SAN administrator strong foundation.
incur while dealing with diverse vendors
a) Proprietary management interfaces 9. Task of Distributed Management Task Force is
b) Multiple applications to manage storage in the to
data center a) To promote interoperability among the
c) No single view management solution providers
d) All of the mentioned b Acts as an interface between the various budding
View Answer technologies and provide solution to manage
various environments
Answer: d c) Only To promote interoperability among the
Explanation: Proprietary management interfaces,
management solution providers
multiple applications management and no single view
are main difficulties.
d) Both To promote interoperability among the
management solution providers and Acts as an
5. How do Storage administrators ensure secure interface between the various budding
access to storage devices: technologies and provide solution to manage
a) By using Zoning various environments
b) By putting a physical lock on the storage device View Answer
c) By keeping devices shutdown when not in use
Answer: d
d) By keeping devices when used Explanation: Promote interoperability and interface
View Answer between various buildings.
Answer: a
10. SMI-S Standard uses
Explanation: By using Zoning, Storage administrators
ensure secure access to storage devices.
a) Java RMI
b) CIM-XML/HTTP
6. Effective Storage management includes c) CORBA
a) Securities d) .NET
b) Backups View Answer
c) Reporting
Answer: b
d) All of the mentioned Explanation: CIM-XML/HTTP is a SMI-S standard.
View Answer
Answer: d
Explanation: In storage management all necessities like
Computer Networks Questions &
security, backups and reporting facilities are included. Answers – SNMP
7. Identify the tasks involved in Storage Capacity This set of Computer Networks Multiple Choice
management Questions & Answers (MCQs) focuses on “SNMP”.
a) Identifying storage systems are approaching full
capacity 1. An application-level protocol in which a few
b) Monitoring trends for each resource manager stations control a set of agents is called
c) Tracking Total capacity, total used, total a) HTML
available b) TCP
c) SNMP
d) SNMP/IP d) Security Management
View Answer View Answer
Answer: c Answer: d
Explanation: An application-level protocol in which a few Explanation: A term that responsible for controlling
manager stations control a set of agents is called access to network based on predefined policy is called
SNMP. security management.
7. Virtual circuit identifier in frame relay is called 2. Frame Relay networks offer an option called
a) data link connection identifier a) Voice Over For Relay
b) frame relay identifier b) Voice Over Fine Relay
c) cell relay identifier c) Voice On Frame Relay
d) Voice Over Frame Relay Answer: a
View Answer Explanation: Virtual circuit identifier in frame relay is
calleddata link connection identifier.
Answer: d
Explanation: Frame Relay networks offer an option 8. Frame relay has only
calledVoice Over Frame Relay a) physical layer
b) data link layer
3. There are ________ total features of Frame c) both physical layer and data link layer
Relay. d) none of the mentioned
a) Five View Answer
b) Seven
c) Nine Answer: c
d) Ten Explanation: Frame relay has only physical and data
View Answer link layer for error detection in data link layer and for
conversion in physical layer.
Answer: c
Explanation: There are total features of Frame Relay 9. In frame relay networks, extended address is
are Nine. used
a) to increase the range of data link connection
4. Frame Relay does not provide flow or error identifiers
control, they must be provided by the b) for error detection
a) Lower Level Protocol c) both to increase the range of data link
b) High Level Protocol connection identifiers and for error detection
c) Upper Level Protocol d) none of the mentioned
d) Downward Level Protocol View Answer
View Answer
Answer: a
Answer: c Explanation: In frame relay networks, extended address
Explanation: Frame Relay does not provide flow or error is usedto increase the range of data link connection
control, they must be provided by theUpper Level identifiers.
Protocol.
10. What is FRAD in frame relay network?
5. Frame Relay deploys physical layer carriers a) FRAD assembles and disassembles the frames
such as coming from other protocols
a) ADMs b) FRAD is used for modulation and demodulation
b) UPSR c) FRAD is used for error detection
c) BLSR d) None of the mentioned
d) SONET View Answer
View Answer
Answer: a
Answer: d Explanation: FRAD stands for frame relay
Explanation: Frame Relay deploys physical layer assembler/disassembler.
carriers such asSONET.
6. Frame relay has error detection at the Computer Networks Questions &
a) physical layer
b) data link layer Answers – World Wide Web
c) network layer
This set of Computer Networks Multiple Choice
d) transport layer
Questions & Answers (MCQs) focuses on “World
View Answer
Wide Web”.
Answer: b
Explanation: In data link layer error control header is the
1. A piece of icon or image on a web page
main thing for any packet transfer, so we use this layer associated with another webpage is called
frame relay has error detection. a) url
b) hyperlink
7. Virtual circuit identifier in frame relay is called c) plugin
a) data link connection identifier d) none of the mentioned
b) frame relay identifier View Answer
c) cell relay identifier
d) none of the mentioned Answer: b
View Answer Explanation: None.
2. Dynamic web page d) None of the mentioned
a) is same every time whenever it displays View Answer
b) generates on demand by a program or a request
from browser Answer: d
Explanation: None.
c) both is same every time whenever it displays
and generates on demand by a program or a 8. An alternative of javascript on windows platform
request from browser is
d) none of the mentioned a) VBScript
View Answer b) ASP.NET
Answer: b c) JSP
Explanation: None. d) None of the mentioned
View Answer
3. What is a web browser?
a) a program that can display a web page Answer: a
Explanation: None.
b) a program used to view html documents
c) it enables user to access the resources of 9. What is document object model (DOM)?
internet a) convention for representing and interacting with
d) all of the mentioned objects in html documents
View Answer b) application programming interface
Answer: d c) hierarchy of objects in ASP.NET
Explanation: None. d) none of the mentioned
View Answer
4. Common gateway interface is used to
a) generate executable files from web content by Answer: a
Explanation: None.
web server
b) generate web pages 10. AJAX stands for
c) stream videos a) asynchronous javascript and xml
d) none of the mentioned b) advanced JSP and xml
View Answer c) asynchronous JSP and xml
Answer: a d) advanced javascript and xml
Explanation: None. View Answer
advertisement Answer: c
Explanation: This field enables to have different types of
8. Network addresses are very important concepts IP datagram.
of
4. IPv6 doesnot use _________ type of address
a) Routing
a) Broadcast
b) Mask
b) Multicast
c) IP Addressing
c) Anycast
d) Classless Addressing
d) None of the mentioned
View Answer
View Answer
Answer: c
Answer: a
Explanation: Network addresses are very important
Explanation: Broadcast has been eliminated in IPv6.
concepts of IP addressing.
9. Which of this is not a class of IP address? 5. These are the features present in IPv4 but not in
a) ClassE IPv6.
b) ClassC a) Fragmentation
c) ClassD b) Header checksum
c) Options
d) All of the mentioned This set of Computer Networks test focuses on
View Answer “IPv6 Addressing”.
Answer: d 1. Dual-stack approach refers to
Explanation: All the features are only present in IPv4 a) Implementing Ipv4 with 2 stacks
and not IPv6. b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
6. The _________ field determines the lifetime of
d) None of the mentioned
IPv6 datagram
View Answer
a) Hop limit
b) TTL Answer: c
c) Next header Explanation: Dual-stack is one of the approach used to
d) None of the mentioned support IPv6 in already existing systems.
View Answer
2. Suppose two IPv6 nodes want to interoperate
Answer: a using IPv6 datagrams but are connected to each
Explanation: The Hop limit value is decremented by one other by intervening IPv4 routers. The best solution
by a router when the datagram is forwaded by the here is
router. When the value becomes zero the datagram is a) Use dual-stack approach
discarded.
b) Tunneling
7. Dual-stack approach refers to c) No solution
a) Implementing Ipv4 with 2 stacks d) Replace the system
b) Implementing Ipv6 with 2 stacks View Answer
c) Node has both IPv4 and IPv6 support Answer: b
d) None of the mentioned Explanation: The IPv4 routers can form a tunnel.
View Answer
3. Teredo is an automatic tunneling technique. In
Answer: c each client the obfuscated IPv4 address is
Explanation: Dual-stack is one of the approach used to
represented by bits
support IPv6 in already existing systems.
a) 96 to 127
advertisement b) 0 to 63
c) 80 to 95
8. Suppose two IPv6 nodes want to interoperate d) 64 to 79
using IPv6 datagrams but are connected to each View Answer
other by intervening IPv4 routers. The best solution
here is Answer: a
a) Use dual-stack approach Explanation: Bits 96 to 127 in the datagram represents
b) Tunneling obfuscated 1Pv4 address.
c) No solution 4. A link local address of local addresses is used in
d) Replace the system an
View Answer a) Isolated router
Answer: b b) Isolated mask
Explanation: The IPv4 routers can form a tuunel. c) Isolated subnet
d) Isolated net
9. Teredo is an automatic tunneling technique. In View Answer
each client the obfuscated IPv4 address is
represented by bits Answer: c
a) 96 to 127 Explanation: Isolated subnet is very huge sharing
network area in this link local address of local
b) 0 to 63
addresses is used.
c) 80 to 95
d) 64 to 79 5. In subcategories of reserved address in IPv6,
View Answer address that is used by a host to test itself without
going into network is called
Answer: a
Explanation: Bits 96 to 127 in the datagram represents a) Unspecified address
obfuscated 1Pv4 address. b) Loopback address
c) Compatible address
d) Mapped address
Computer Networks Questions & View Answer
Answers – IPv6 Addressing Answer: b
Explanation: In subcategories of reserved address in
IPv6, address that is used by a host to test itself without This set of Computer Networks Problems focuses
going into network is called loop back address. on “P2P Applications”.
6. A few leftmost bits in each address of IPv6 1. Which layer is responsible for process-to-
address define its category is called process delivery?
a) Prefix type a) Physical layer
b) Postfix type b) Network layer
c) Reserved type c) Transport layer
d) Local type d) Application layer
View Answer View Answer
Answer: a Answer: c
Explanation: Prefix means bits in the IP address are Explanation: Transport layer is responsible for process-
placed in leftmost position. to-process delivery.
7. In IPv6 addresses, addresses start with eight 0s 2. In process-to-process delivery, two processes
are called communicate in which of the following methods?
a) Unicast addresses a) Client/Server
b) Multicast addresses b) Source/Destination
c) Any cast addresses c) Message Transfer
d) Reserved addresses d) None of the mentioned
View Answer View Answer
Answer: d Answer: a
Explanation: In IPv6 address format the starting bits are Explanation: The most common method used for this
specified with eight 0s called reserved address. communication is Client/Server.
advertisement 3. Multiple processes on destinations at transport
layer are identified by:
8. Which statement(s) about IPv6 addresses are
a) Mac address
true?
b) Port number
a) Leading zeros are required
c) Host number
b) Two colons (::) are used to represent successive
d) Host address
hexadecimal fields of zeros
View Answer
c) Two colons (::) are used to separate fields
d) A single interface cannot have multiple IPv6 Answer: b
addresses of different types Explanation: Multiple processes on destinations are
View Answer identified by transport layer address also called as port
number.
Answer: b
Explanation: In order to shorten the written length of an 4. Range of port numbers in Internet model is
IPv6 address, successive fields of zeros may be a) 0 and 32,765(8-bit)
replaced by double colons. In trying to shorten the b) 0 and 32,765(16-bit)
address further, leading zeros may also be removed. c) 0 and 65,535(32-bit)
Just as with IPv4, a single device’s interface can have
d) 0 and 65,535(16-bit)
more than one address; with IPv6 there are more types
of addresses and the same rule applies. There can be View Answer
link-local, global unicast, and multicast addresses all
Answer: d
assigned to the same interface. Explanation: Port numbers are 16-bit integers between
0 and 65,535.
9. When IPV6 launched
a) June 2, 2012 5. According to Internet Assigned Numbers
b) June 4, 2012 Authority(IANA), which of the following range is not
c) June 5, 2012 a part of port number?
d) June 6, 2012 a) Well-known ports
View Answer b) Registered ports
Answer: d c) Dynamic ports
Explanation: None d) Static ports
View Answer
9. Two machines can use the timestamp request 1. The main reason for transition from IPv4 to IPv6
and timestamp replay messages to determine the is
___________ needed for an IP datagram to travel a) Huge number of systems on the internet
between them. b) Very low number of system on the internet
a) Half-trip time c) Providing standard address
b) Round-trip time d) None of the mentioned
c) Travel time for the next router View Answer
d) Time to reach the destination/source
Answer: a
View Answer
Explanation: Due to huge number of systems on the
Answer: b internet, transition from IPv4 to IPv6 happens.
Explanation: Router sends destination unreachable
message if the destination is not found. 2. Which of the following is not a transition
strategies?
10. During debugging, we can use the a) Dual stack
____________ program to find if a host is alive and b) Tunnelling
responding c) Conversion
d) Header translation 7. Header translation uses ___________ to
View Answer translate an IPv6 address to an IPv4 address.
a) IP address
Answer: c b) Physical address
Explanation: Dual stack, tunnelling and header
c) Mapped address
translation are the only three transition strategies.
d) Any of the mentioned
3. To determine which version to use when View Answer
sending a packet to a destination, the source host Answer: c
queries which of the following? Explanation: Mapped address is used to translate an
a) Dual stack IPv6 address to an IPv4 address.
b) Domain Name Server
c) Header information advertisement
d) All of the mentioned
View Answer 8. Which of the following is not the step in Header
translation procedure?
Answer: b a) The IPv6 mapped address is changed to an
Explanation: Source host queries DNS to determine IPv4 address by extracting the rightmost 32bits
which version to use when sending a packet to a b) The value of the IPv6 priority field is discarded
destination. c) The type of service field in IPv4 is set to zero
d) The IPv6 flow label is considered
4. The strategy used when two computers using
View Answer
IPv6 want to communicate with each other and the
packet must pass through a region that uses IPv4 Answer: d
is Explanation: In header translation procedure, IPv6 flow
a) Dual stack label is ignored.
b) Header translation
c) Conversion
d) Tunnelling Computer Networks Questions &
View Answer Answers – IPV4 and IPV6
Answer: d Comparision
Explanation: Tunnelling is used when two computers
using IPv6 want to communicate with each other and This set of Computer Networks Multiple Choice
the packet must pass through a region that uses IPv4. Questions & Answers (MCQs) focuses on “IPV4
and IPV6 Comparision”.
5. The correct format of packet in tunnel that uses
IPv4 region is 1. Which of the following is not applicable for IP?
1. IPv6 header a) Error reporting
2. Payload b) Handle addressing conventions
3. IPv4 header c) Datagram format
a) 3-1-2 d) Packet handling
b) 3-2-1 View Answer
c) 1-2-3
d) 1-3-2 Answer: a
View Answer Explanation: Error reporting is handled by ICMP.
5. You type debug IP rip on your router console 10. Where we should use default routing
and see that 172.16.10.0 is being advertised to you a) On stub networks- which have only one exit path
with a metric of 16. What does this mean? out of the network
a) The route is 16 hops away Debug IP rip b) Which have more than one exit path out of the
b) The route has a delay of 16 microseconds network
Debug IP route c) Minimum five exit paths out of the network
c) The route is inaccessible d) None of the mentioned
d) The route is queued at 16 messages a second View Answer
View Answer
Answer: a
Answer: c Explanation: On stub networks- which have only one
Explanation: You cannot have 16 hops on a RIP exit path out of the networkuse default routing.
network by default. If you receive a route advertised
with a metric of 16, this means it is inaccessible.
Computer Networks Questions &
6. Default administrative distance of Static Route Answers – RIP v2
a) 0
b) 90 This set of Computer Networks Multiple Choice
c) 100 Questions & Answers focuses on “RIP v2”.
d) 1
View Answer 1. Which statement is true regarding classless
routing protocols?
Answer: d a) The use of discontinuous networks is not
Explanation: 1 is the default administrative distance of allowed
Static Route.
b) The use of variable length subnet masks is
7. Which protocol gives a full route table update permitted
every 30 seconds? c) RIPv1 is a classless routing protocol
a) IEGRP d) RIPv2 supports classless routing
b) RIP View Answer
c) both IEGRP and RIP Answer: b
d) none of the mentioned Explanation: Classful routing means that all hosts in the
View Answer internetwork use the same mask. Classless routing
means that you can use Variable Length Subnet Masks
Answer: b (VLSMs) and can also support discontinuous
Explanation: RIP gives a full route table update every 30 networking.
seconds.
2. What is route poisoning?
8. Default administrative distance of RIP
a) It sends back the protocol received from a router
a) 0
as a poison pill, which stops the regular updates.
b) 90
The use of variable length subnet masks is
c) 120
permitted
d) 130
b) It is information received from a router that can’t
View Answer
be sent back to the originating router.RIPv2
supports classless routing
c) It prevents regular update messages from Answer: b
reinstating a route that has just come up Explanation: Routing feedback is a reason for avoiding
d) It describes when a router sets the metric for a doing route redistribution on two routers between the
downed link to infinity same two routing domains.
View Answer 7. What does administrative distance rank?
Answer: d a) Metrics
Explanation: When a network goes down, the distance- b) Sources of routing information
vector routing protocol initiates route poisoning by c) Router reliability
advertising the network with a metric of 16, or d) Best paths
unreachable. View Answer
3. Which of the following is true regarding RIPv2? Answer: b
a) It has a lower administrative distance than Explanation: Sources of routing information is the
RIPv1 administrative distance rank.
b) It converges faster than RIPv1
c) It has the same timers as RIPv1 8. Which protocol maintains neighbor adjacencies?
d) It is harder to configure than RIPv1 a) RIPv2 and EIGRP
View Answer b) IGRP and EIGRP
c) RIPv2
Answer: c d) EIGRP
Explanation: RIPv2 is pretty much just like RIPv1. It has View Answer
the same administrative distance and timers and is
configured just like RIPv1. Answer: c
Explanation: RIP V2 maintains neighbor adjacencies.
4. Which of the situations might not require require
multiple routing protocols in a network? 9. Which routing protocol implements the diffusing
a) When a new Layer 2-only switch is added to the update algorithm?
network a) IS-IS
b) When you are migrating from one routing b) IGRP
protocol to another c) EIGRP
c) When you are using routers from multiple d) OSPF
vendors View Answer
d) When there are host-based routers from multiple Answer: c
vendors Explanation: EIGRProuting protocol implements the
View Answer diffusing update algorithm.
Answer: a 10. Which protocol should you select if the network
Explanation: One routing protocol to another, routers
diameter is more than 17 hops?
from multiple vendors,host-based routers from multiple
vendors.
a) RIPv1
b) RIPv2
5. Which two routing protocols can be redistributed c) EIGRP
into OSPF by a Cisco router? d) All of the above
a) IP EIGRP and AppleTalk EIGRP View Answer
b) AppleTalk EIGRP and RIPv2
Answer: b
c) RIPv2 and IP EIGRP Explanation: RIPv2protocol should you select if the
d) IPX RIP & AppleTalk EIGRP network diameter is more than 17 hops.
View Answer
Answer: c
Explanation: IP EIGRP, RIPv2. These can be
Computer Networks Questions &
redistributed into OSPF by a Cisco router. Answers – Cryptography
6. Which is a reason for avoiding doing route This set of Computer Networks Multiple Choice
redistribution on two routers between the same two Questions & Answers (MCQs) focuses on
routing domains? “Cryptography”.
a) Higher cost of two routers
b) Routing feedback 1. In cryptography, what is cipher?
c) Cisco IOS incompatibility a) algorithm for performing encryption and
d) Not possible to use two routers decryption
View Answer b) encrypted message
c) both algorithm for performing encryption and
decryption and encrypted message a) stream control transmission protocol (SCTP)
d) none of the mentioned b) transport layer security (TSL)
View Answer c) explicit congestion notification (ECN)
d) resource reservation protocol
Answer: a View Answer
Explanation: None.
Answer: b
2. In asymmetric key cryptography, the private key Explanation: None.
is kept by
a) sender 8. Voice privacy in GSM cellular telephone protocol
b) receiver is provided by
c) sender and receiver a) A5/2 cipher
d) all the connected devices to the network b) b5/4 cipher
View Answer c) b5/6 cipher
d) b5/8 cipher
Answer: b View Answer
Explanation: None.
Answer: a
3. Which one of the following algorithm is not used Explanation: None
in asymmetric-key cryptography?
a) rsa algorithm 9. ElGamal encryption system is
b) diffie-hellman algorithm a) symmetric key encryption algorithm
c) electronic code book algorithm b) asymmetric key encryption algorithm
d) none of the mentioned c) not an encryption algorithm
View Answer d) none of the mentioned
View Answer
Answer: c
Explanation: None. Answer: b
Explanation: None.
4. In cryptography, the order of the letters in a
message is rearranged by 10. Cryptographic hash function takes an arbitrary
a) transpositional ciphers block of data and returns
b) substitution ciphers a) fixed size bit string
c) both transpositional ciphers and substitution b) variable size bit string
ciphers c) both fixed size bit string and variable size bit
d) none of the mentioned string
View Answer d) none of the mentioned
View Answer
Answer: a
Explanation: None. Answer: a
Explanation: None.
5. What is data encryption standard (DES)?
a) block cipher
b) stream cipher Computer Networks Questions &
c) bit cipher
d) none of the mentioned
Answers – Ports
View Answer This set of Computer Networks Multiple Choice
Answer: a Questions & Answers (MCQs) focuses on “Ports”.
Explanation: None.
1. Multiple object can be sent over a TCP
6. Cryptanalysis is used connection between client and server in
a) to find some insecurity in a cryptographic a) Persistent HTTP
scheme b) Ponpersistent HTTP
b) to increase the speed c) Both Persistent HTTP and Ponpersistent HTTP
c) to encrypt the data d) None of the mentioned
d) none of the mentioned View Answer
View Answer Answer: a
Answer: a Explanation: hypertext transfer protocol is used for
Explanation: None. sending multiple objects over TCP connection.
Answer: a Answer: b
Explanation: HTTP resources are located by uniform Explanation: In passive mode the client initiates both the
resource identifier. control and data connections.
1. What REST stands for? 6. Which of the following HTTP Status code means
a) Represent State Transfer CREATED, when a resource is successful created
b) Representational State Transfer using POST or PUT request?
c) Represent State Transfer a) 200
d) None of the mentioned b) 201
View Answer c) 204
d) 304
Answer: b View Answer
Explanation: REST stands for Representational State
Transfer. Answer: b
Explanation: HTTP Status Code 201 means CREATED,
2. Which of the following protocol is used by when a resource is successful created using POST or
Restful web services as a medium of PUT request.
communication between client and server?
a) HTTP 7. Which of the following annotation of JAX RS API
b) FTP is used to annotate a method used to create
c) Gopher resource?
d) None of the mentioned a) @Path
View Answer b) @GET
c) @PUT
Answer: a d) @POST
Explanation: Restful web services make use of HTTP View Answer
protocol as a medium of communication between client
and server. Answer: C
Explanation: @PUT – HTTP Get request, used to create
3. Which of the following is a best practice to resource.
create a standard URI for a web service?
a) Maintain Backward Compatibility 8. Which of the following annotation of JAX RS API
b) Use HTTP Verb binds the parameter passed to method to a HTTP
c) Both of the mentioned matrix parameter in path?
d) None of the mentioned a) @PathParam
View Answer b) @QueryParam
c) @MatrixParam
Answer: C d) @HeaderParam
Explanation: Both of the above options are correct. View Answer
4. Which of the following HTTP method should be Answer: c
idempotent in nature? Explanation: @MatrixParam – Binds the parameter
a) OPTIONS passed to method to a HTTP matrix parameter in path.
b) DELETE
c) POST 9. In REST architecture, a REST Server simply
d) HEAD provides access to resources and REST client
View Answer accesses and presents the resources.
a) False
Answer: b b) True
Explanation: DELETE operations should be idempotent, View Answer
means their result will always same no matter how
many times these operations are invoked. Answer: b
Explanation: In REST architecture, a REST Server
5. Which of the following directive of Cache Control simply provides access to resources and REST client
Header of HTTP response indicates that resource accesses and presents the resources.
is cachable by only client and server?
a) Public 10. POST operations should be idempotent.
b) Private a) True
c) Nocache/nostore b) False
View Answer
Answer: b d) Delivery Measures
Explanation: POST operation can cause different result. View Answer
Answer: b
Computer Networks Questions & Explanation: Security measures.
Answers – Packet Forwarding and 6. In Unicast routing, if instability is between three
Routing nodes, stability cannot be
a) Stable
This set of Computer Networks online test focuses b) Reversed
on “Packet Forwarding and Routing”. c) Guaranteed
d) Forward
1. Term is used to place packet in its route to its View Answer
destination is called
a) Delayed Answer: c
b) Urgent Explanation: It is only for unidirectional.
c) Forwarding
d) Delivering 7. In Unicast Routing, Dijkstra algorithm creates a
View Answer shortest path tree from a
a) Graph
Answer: c b) Tree
Explanation: It is for transforming the message from c) Network
source to destination with forward technique. d) Link
View Answer
2. A second technique to reduce routing table and
simplify searching process is called Answer: a
a) Network-Specific Method Explanation: Graph technique is used for best node
b) Network-Specific Motion finding technic with shortest path algorithms.
c) Network-Specific Maintaining
d) Network-Specific Membership 8. In Multicast Routing Protocol, flooding is used to
View Answer broadcast packets but it creates
a) Gaps
Answer: a b) Loops
Explanation: It is the before method of the packet c) Holes
switching. d) Links
View Answer
3. Next-Hop Method is used to reduce contents of
a Answer: b
a) Revolving table Explanation: Loops is for multicast routing.
b) Rotating Table
c) Routing Table 9. RPF stands for
d) Re-allocate table a) Reverse Path Forwarding
View Answer b) Reverse Path Failure
c) Reverse Packet Forwarding
Answer: c d) Reverse Protocol Failure
Explanation: This method is for creating the shortest View Answer
distances.
Answer: a
4. Several techniques can make size of routing Explanation: Reverse Path Forwarding.
table manageable and also handle issues such as
a) Maturity 10. LSP stands for
b) Error reporting a) Link Stable Packet
c) Tunneling b) Link State Packet
d) Security c) Link State Protocol
View Answer d) Link State Path
View Answer
Answer: d
Explanation: To visible only accessing sub networks. Answer: b
Explanation: Link State Packet
5. Host-specific routing is used for purposes such
as checking route or providing
a) Network Measures Computer Networks Questions &
b) Security Measures Answers – Security In The Internet
c) Routing Measures
This set of Computer Networks Multiple Choice 7. Extensible authentication protocol is
Questions & Answers (MCQs) focuses on “Security authentication framework frequently used in
In The Internet”. a) wired personal area network
b) wireless networks
1. IPSec is designed to provide the security at the c) wired local area network
a) transport layer d) none of the mentioned
b) network layer View Answer
c) application layer
d) session layer Answer: b
View Answer Explanation: None.
11. DBD packets are involved during which two Computer Networks Questions &
states?
a) Exstart Answers – Datagram Networks
b) Loading
This set of Computer Networks Questions and
c) Exchange
Answers for Aptitude test focuses on “Datagram
d) Two-way
Networks”.
View Answer
1. Datagram switching is done at which layer of
Answer: a
Explanation: DBD packets are involved during which OSI model?
two states Exstart, Exchange. a) Network layer
b) Physical layer
12. At which interval does OSPF refresh LSAs? c) Application layer
a) 10 seconds d) Transport layer
b) 30 seconds View Answer
c) 30 minutes
d) 1 hour Answer: a
Explanation: Datagram switching is normally done at
View Answer
network layer.
Answer: d
Explanation: None. 2. Packets in datagram switching are referred to as
a) Switches
advertisement b) Segments
c) Datagrams
13. Which field is NOT a field within an OSPF d) Data-packets
packet header? View Answer
a) Packet length
b) Router ID Answer: c
c) Authentication type Explanation: As the name suggests, in datagram
d) Maxage time switching packets are called as datagrams.
View Answer
3. Datagram networks mainly refers to
Answer: d a) Connection oriented networks
Explanation: Maxage timeis NOT a field within an OSPF b) Connection less networks
packet header. c) Telephone networks
d) Internetwork
14. Which two commands are required for basic View Answer
OSPF configuration?
a) Network ip-address mask area area-id Answer: b
b) Network ip-address wildcard-mask area area-id Explanation: The switch does not keep the information
c) Router ospf process-id about the connection state, hence it is connection less.
d) both Network ip-address wildcard-mask area
4. Datagrams are routed to their destinations with
area-id and Router ospf process-id
the help of
View Answer
a) Switch table
Answer: d b) Segments table
Explanation: Network ip-address wildcard-mask area c) Datagram table
d) Routing table d) None of the mentioned
View Answer View Answer
Answer: c Answer: c
Explanation: Routing table is used to route the packets Explanation: Probability of the error in a transmitted
to their destinations. block increases with the length of the block.
5. The main contents of the routing table in 10. Which of the following is true with respect to
datagram networks are the datagram networks?
a) Source and Destination address a) Number of flows of packets are not limited
b) Destination address and Output port b) Packets may not be in order at the destination
c) Source address and Output port c) Path is not reserved
d) Input port and Output port d) All of the mentioned
View Answer View Answer
Answer: b Answer: d
Explanation: Routing table contains destination address Explanation: All are the facts with respect to the
and output port to route the packets to their datagram networks.
destinations.
6. Which of the following remains same in the Computer Networks Questions &
header of the packet in a datagram network during
the entire journey of the packet?
Answers – Firewalls
a) Destination address This set of Computer Networks Multiple Choice
b) Source address Questions & Answers (MCQs) focuses on
c) Checksum “Firewalls”.
d) Padding
View Answer 1. Network layer firewall works as a
a) Frame filter
Answer: a
b) Packet filter
Explanation: Destination address remains same in the
header during the entire journey of the packet. c) Both Frame as well as Packet filter
d) None of the mentioned
7. Which of the following is true with respect to the View Answer
delay in datagram networks?
Answer: b
a) Delay is greater than in a virtual circuit network
Explanation: As you know, firewalls are available as
b) Each packet may experience a wait at a switch hardware appliances, as software-only, or a
c) Delay is not uniform for the packets of a combination of the two. In every case, the purpose of a
message firewall is to isolate your trusted internal network (or
d) All of the mentioned your personal PC) from the dangers of unknown
View Answer resources on the Internet and other network
connections that may be harmful. The firewall prevents
Answer: d unauthorized access to your internal, trusted network
Explanation: All the options are true with respect to the from outside threats.
delay in datagram networks.
2. Network layer firewall has two sub-categories as
8. During datagram switching, the packets are a) State full firewall and stateless firewall
placed in __________ to wait until the given b) Bit oriented firewall and byte oriented firewall
transmission line becomes available. c) Frame firewall and packet firewall
a) Stack d) None of the mentioned
b) Queue View Answer
c) Hash
d) Routing table Answer: a
View Answer Explanation: Most network layer firewalls can operate
as stateful or stateless firewalls, creating two
Answer: b subcategories of the standard network layer firewall.
Explanation: Packets are stored in queue during delay Stateful firewalls have the advantage of being able to
and are served as first in first out. track packets over a period of time for greater analysis
and accuracy — but they require more memory and
9. The probability of the error in a transmitted block operate more slowly. Stateless firewalls do not analyze
_________ with the length of the block past traffic and can be useful for systems where speed
a) Remains same is more important than security, or for systems that have
b) Decreases very specific and limited needs. For example, a
c) Increases computer that only needs to connect to a particular
backup server does not need the extra security of a security system that monitors and controls the incoming
stateful firewall. and outgoing network traffic based on predetermined
security rules.[1] A firewall typically establishes a barrier
3. A firewall is installed at the point where the between a trusted, secure internal network and another
secure internal network and untrusted external outside network, such as the Internet, that is assumed
network meet which is also known as __________ not to be secure or trusted.[2] Firewalls are often
a) Chock point categorized as either network firewalls or host-based
b) Meeting point firewalls.
c) Firewall point
7. What is one advantage of setting up a DMZ with
d) Secure point
two firewalls?
View Answer
a) You can control where traffic goes in three
Answer: a networks
Explanation: A firewall can be a PC, a router, a b) You can do stateful packet filtering
midrange, a mainframe, a UNIX workstation, or a c) You can do load balancing
combination of these that determines which information d) Improved network performance
or services can be accessed from the outside and who View Answer
is permitted to use the information and services from
outside. Generally, a firewall is installed at the point Answer: c
where the secure internal network and untrusted Explanation: In a topology with a single firewall serving
external network meet, which is also known as a both internal and external users (LAN and WAN), it acts
chokepoint. as a shared resource for these two zones.
4. Which of the following is / are the types of 8. What tells a firewall how to reassemble a data
firewall? stream that has been divided into packets?
a) Packet Filtering Firewall a) The source routing future
b) Dual Homed Gateway Firewall b) The number in the header’s identification field
c) Screen Host Firewall c) The destination IP address
d) All of the mentioned d) The header checksum field in the packet header
View Answer View Answer
Answer: a Answer: a
Explanation: A firewall can be a PC, a midrange, a Explanation: source routing future.
mainframe, a UNIX workstation, a router, or
combination of these. Depending on the requirements, a 9. A stateful firewall maintains a ___________
firewall can consist of one or more of the following which is a list of active connections?
functional components: Packet-filtering router a) Routing table
b) Bridging table
5. A proxy firewall filters at? c) State table
a) Physical layer d) Connection table
b) Data link layer View Answer
c) Network layer
d) Application layer Answer: a
View Answer Explanation: Routing table with best performance
Answer: b Answer: c
Explanation: Fault management is called the Explanation: Packet switched network is most preferred
performance management. for pipelining process.
3. Configuration management can be divided into 8. In Network Management System, maps track
two subsystems: reconfiguration and each piece of hardware and its connection to the
a) Documentation a) IP Server
b) Information b) Domain
c) Servers c) Network
d) Entity d) Data
View Answer View Answer
Answer: a Answer: c
Explanation: Documentation is the other type of Explanation: Network is main thing in connecting
configuration management. different entities in a place.
4. In Network Management System, a term that 9. MIB is a collection of groups of objects that can
responsible for controlling access to network based be managed by
on predefined policy is called a) SMTP
a) Fault Management b) UDP
b) Secured Management c) SNMP
c) Active Management d) TCP/IP
d) Security Management View Answer
View Answer
Answer: c
Answer: d Explanation: Simple network management controls the
Explanation: In Network Management System, a term group of objects in management interface base.
that responsible for controlling access to network based
on predefined policy is called security management. 10. A network management system can be divided
into
5. Control of users’ access to network resources a) three categories
through charges are main responsibilities of b) five broad categories
a) Reactive Fault Management c) seven broad categories
b) Reconfigured Fault Management d) ten broad categories
c) Accounting Management View Answer
d) Security Management
View Answer Answer: b
Explanation: Five broad categories are
Answer: c • Fault Management
Explanation: Control of users’ access to network • Configuration Management
resources through charges are main responsibilities of • Accounting (Administration)
accounting management. • Performance Management
• Security Management.
6. The physical connection between an end point
and a switch or between two switches is
Computer Networks Questions & 6. Which of the following is related to ipconfig in
Microsoft Windows ?
Answers – Network Utilities a) Display all current TCP/IP network configuration
values
This set of Computer Networks Multiple Choice b) Modify DHCP settings
Questions & Answers (MCQs) focuses on “Network c) Modify DNS settings
Utilities”. d) All of the mentioned
1. Ping can View Answer
a) Measure round-trip time Answer: d
b) Report packet loss Explanation: None.
c) Report latency
d) All of the mentioned 7. This allows to check if a domain is available for
View Answer registration.
a) Domain Check
Answer: d b) Domain Dossier
Explanation: None. c) Domain Lookup
2. Ping sweep is a part of d) None of the mentioned
a) Traceroute View Answer
b) Nmap Answer: a
c) Route Explanation: None.
d) Ipconfig
View Answer advertisement
6. A point-to-point protocol over ethernet is a 1. What is the access point (AP) in wireless LAN?
network protocol for a) device that allows wireless devices to connect to
a) encapsulating PPP frames inside ethernet a wired network
frames b) wireless devices itself
b) encapsulating ehternet framse inside PPP c) both device that allows wireless devices to
frames connect to a wired network and wireless devices
c) for security of ethernet frames itself
d) for security of PPP frames d) none of the mentioned
View Answer View Answer
Answer: a Answer: a
Explanation: None. Explanation: None.
Answer: c Answer: a
Explanation: None. Explanation: None.
8. The maximum size of payload field in ethernet 3. Which multiple access technique is used by
frame is IEEE 802.11 standard for wireless LAN?
a) 1000 bytes a) CDMA
b) CSMA/CA 9. What is Wired Equivalent Privacy (WEP) ?
c) ALOHA a) security algorithm for ethernet
d) None of the mentioned b) security algorithm for wireless networks
View Answer c) security algorithm for usb communication
d) none of the mentioned
Answer: b View Answer
Explanation: None.
Answer: b
4. In wireless distribution system Explanation: None.
a) multiple access point are inter-connected with
each other 10. What is WPA?
b) there is no access point a) wi-fi protected access
c) only one access point exists b) wired protected access
d) none of the mentioned c) wired process access
View Answer d) wi-fi process access
View Answer
Answer: a
Explanation: None. Answer: a
Explanation: None.
5. A wireless network interface controller can work
in
a) infrastructure mode Computer Networks Questions &
b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
Answers – Internet
d) none of the mentioned This set of Computer Networks Multiple Choice
View Answer Questions & Answers (MCQs) focuses on
Answer: c “Internet”.
Explanation: In infrastructure mode WNIC needs access
1. What is internet?
point but in ad-hoc mode access point is not required.
a) a single network
6. In wireless network an extended service set is a b) a vast collection of different networks
set of c) interconnection of local area networks
a) connected basic service sets d) none of the mentioned
b) all stations View Answer
c) all access points
Answer: b
d) none of the mentioned Explanation: None.
View Answer
2. To join the internet, the computer has to be
Answer: a
connected to a
Explanation: None.
a) internet architecture board
7. Mostly ________ is used in wireless LAN. b) internet society
a) time division multiplexing c) internet service provider
b) orthogonal frequency division multiplexing d) none of the mentioned
c) space division multiplexing View Answer
d) none of the mentioned
Answer: c
View Answer Explanation: None.
Answer: b
3. Internet access by transmitting digital data over
Explanation: None.
the wires of a local telephone network is provided
8. Which one of the following event is not possible by
in wireless LAN. a) leased line
a) collision detection b) digital subscriber line
b) acknowledgement of data frames c) digital signal line
c) multi-mode data transmission d) none of the mentioned
d) none of the mentioned View Answer
View Answer
Answer: b
Answer: a Explanation: None.
Explanation: None.
4. ISP exchanges internet traffic between their
networks by
a) internet exchange point a) ethernet
b) subscriber end point b) digital subscriber line
c) isp end point c) fiber distributed data interface
d) none of the mentioned d) none of the mentioned
View Answer View Answer
Answer: a Answer: d
Explanation: None. Explanation: None.
10. Which one of the following frequency is not 5. In SONET, each synchronous transfer signal
used in WiMAX for communication? STS-n is composed of
a) 2.3 GHz a) 2000 frames
b) 2.4 GHz b) 4000 frames
c) 2.5 GHz c) 8000 frames
d) 3.5 GHz d) 16000 frames
View Answer View Answer
Answer: b Answer: c
Explanation: None. Explanation: None.
8. Automatic protection switching in linear network 3. RTP provides the facility of jitter ____________
is defined at the a) media stream
a) line layer b) expansion
b) section layer c) both media stream and expansion
c) photonic layer d) none of the mentioned
d) path layer View Answer
View Answer
Answer: a
Answer: a Explanation: None.
Explanation: None.
4. Which protocol provides the synchronization
9. A unidirectional path switching ring is a network between media streams?
with a) RTP
a) one ring b) RTCP
b) two rings c) RPC
c) three rings d) None of the mentioned
d) four rings View Answer
View Answer
Answer: b
Answer: b Explanation: None.
Explanation: One ring is used as the working ring and
other as the protection ring. 5. An RTP session is established for
a) each media stream
10. What is SDH? b) all media streams
a) sdh is similar standard to SONET developed by c) some predefined number of media streams
ITU-T d) none of the mentioned
b) synchronous digital hierarchy View Answer
c) both sdh is similar standard to SONET
developed by ITU-T and synchronous digital Answer: a
hierarchy Explanation: None.
d) none of the mentioned 6. RTP can use
View Answer a) unprevileleged UDP ports
Answer: c b) stream control transmission protocol
Explanation: None. c) datagram congestion control protocol
d) all of the mentioned
View Answer
Computer Networks Questions &
Answer: d
Answers – RTP Explanation: None.
This set of Computer Networks Multiple Choice 7. Which one of the following multimedia formats
Questions & Answers (MCQs) focuses on “RTP”. can not be supported by RTP?
a) MPEG-4
1. Real-time transport protocol (RTP) is mostly b) MJPEG
used in c) MPEG
a) streaming media d) None of the mentioned
b) video teleconference View Answer
c) television services
d) all of the mentioned Answer: d
View Answer Explanation: None.