0% found this document useful (0 votes)
2 views

Computer network mcq

The document contains multiple-choice questions (MCQs) related to computer networks, covering topics such as transmission media, network protocols, IP addressing, and data communication techniques. Each question is followed by the correct answer, providing a comprehensive overview of essential networking concepts. This resource serves as a study guide for individuals preparing for exams or seeking to enhance their knowledge in computer networking.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Computer network mcq

The document contains multiple-choice questions (MCQs) related to computer networks, covering topics such as transmission media, network protocols, IP addressing, and data communication techniques. Each question is followed by the correct answer, providing a comprehensive overview of essential networking concepts. This resource serves as a study guide for individuals preparing for exams or seeking to enhance their knowledge in computer networking.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Computer Network MCQ

1. Which transmission media has the highest transmission speed in a network?

a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable

Answer: Optical fiber

2. What is the max data capacity of STP?

a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps

Answer: b) 100 mbps

3. In which topology there is a central controller or hub?

a) Star
b) Mesh
c) Ring
d) Bus

Answer: Star

4. Bits can be sent over guided and unguided media as analog signal by

a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation

Answer: digital modulation


5. A single channel is shared by multiple signals by

a) analog modulation In communication and computer networks, the main goal


b) digital modulation is to share a scarce resource. This is done by multiplexing,
c) multiplexing where multiple analog or digital signals are combined
d) none of the mentioned into one signal over a shared medium.

Answer: multiplexing

6. How long is an IPv6 address?

a) 32 bits
b) 128 bytes
c) 64 bits
d) 128 bits

Answer: 128 Bits

7. Communication between a computer and a keyboard involves ______________ transmission

a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex

Answer: simplex

8. MAC address is of

a) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits

e) Answer: 48 bits
9. Ethernet frame consists of

a) MAC address
b) IP address
c) both MAC address and IP address
d) none of the mentioned

Answer: a) MAC address

10. ICMP is primarily used for

a) error and diagnostic functions


b) addressing
c) forwarding
d) none of the mentioned

Answer: a) error and diagnostic functions (Internet Control Message Protocol)

11. What flavor of Network Address Translation can be used to have one IP address allow many
users to connect to the global Internet?

a) NAT
b) Static
c) Dynamic
d) PAT

Answer: PAT

12. A __________ is a device that forwards packets between networks by processing the routing
information included in the packet.

a) bridge
b) firewall
c) router
d) all of the mentioned

Answer: Router
13. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

a) CDMA
b) CSMA/CA
c) ALOHA
d) None of the mentioned

Answer: b) CSMA/CA

14. Multiplexing is used in _______

a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching

Answer: b) Circuit switching

15. Which multiplexing technique transmits digital signals?

a) FDM
b) TDM
c) WDM
d) FDM & WDM

Answer: TDM (Time Division Multiplexing)

16. The state when dedicated signals are idle are called __________

a) Death period
b) Poison period
c) Silent period
d) None of the mentioned

Answer: c) Silent period


17. Propagation delay depends on

a) Packet length
b) Transmission rate
c) Distance between the routers
d) None of the mentioned

Answer: c) Distance between the routers

18. A list of protocols used by a system, one protocol per layer, is called

a) protocol architecture
b) protocol stack
c) protocol suite
d) none of the mentioned

Answer: protocol stack

19. A local telephone network is an example of a _______ network.

a) Packet switched
b) Circuit switched
c) Both Packet switched and Circuit switched
d) Line switched

Answer: b) Circuit switched

20. Most packet switches use this principle ____________

a) Stop and wait


b) Store and forward
c) Both Stop and wait and Store and forward
d) Stop and forward

Answer: b) Store and forward


21. Bluetooth uses

a) frequency hoping spread spectrum


b) orthogonal frequency division multiplexing
c) time division multiplexing
d) none of the mentioned

Answer: a) frequency hoping spread spectrum

22. The default connection type used by HTTP is _________

a) Persistent
b) Non-persistent
c) Can be either persistent or non-persistent depending on connection request
d) None of the mentioned

Answer: a) Persistent

23. FTP is built on _____ architecture

a) Client-server
b) P2P
c) Both of the mentioned
d) None of the mentioned

Answer: a) Client-server

24. FTP uses _________ parallel TCP connections to transfer a file

a) 1
b) 2
c) 3
d) 4

Answer: 2
25. If you have to send multimedia data over SMTP it has to be encoded into

a) Binary
b) Signal
c) ASCII
d) None of the mentioned

Answer: c) ASCII

26. Secure shell (SSH) network protocol is used for __________

a) secure data communication


b) remote command-line login
c) remote command execution
d) all of the mentioned

Answer: d) all of the mentioned

27. SSH uses ___________ to authenticate the remote computer.

a) public-key cryptography
b) private-key cryptography
c) any of public-key or private-key
d) both public-key & private-key

Answer: a) public-key cryptography

28. The number of layers in Internet protocol stack is_________

a) 5
b) 7
c) 6
d) None of the mentioned

Answer: 5 (Application, Transport, Network, Data link and Physical layer)


29. Delimiting and synchronization of data exchange is provided by

a) Application layer
b) Session layer
c) Transport layer
d) Link layer

Answer: Session layer

30. What command is used to create a backup configuration?

a) copy running backup


b) copy running-config startup-config
c) config mem
d) wr mem

Answer: copy running-config startup-config

31. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server
connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each
host have to the server?

a) 100 kbps
b) 1 Mbps
c) 2 Mbps
d) 10 Mbps

Answer: 10 Mbps

32. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192
resides? 256 - 192 = 64
64 + 64 = 128
a) 192.168.168.129-190 128 + 64 = 192
b) 192.168.168.129-191 The subnet is 128, the broadcast address is
c) 192.168.168.128-190 191, and the valid host range is the numbers
d) 192.168.168.128-192 in between, or 129-190.

Answer: 192.168.168.129-190
33. To back up an IOS, what command will you use?

a) backup IOS disk


b) copy ios tftp
c) copy tftp flash
d) copy flash tftp

Answer: copy flash tftp

34. What protocol does PPP use to identify the Network layer protocol?

a) NCP Network Control Protocol is used to help


b) ISDN identify the Network layer protocol used
c) HDLC
in the packet.
d) LCP

Answer: NCP

35. Which of the following commands will allow you to set your Telnet password on a Cisco
router?

a) line telnet 0 4
b) line aux 0 4
c) line vty 0 4
d) line con 0

Answer: line vty 0 4

36. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned

Answer: a) IP address

37. The DHCP server _________

a) maintains a database of available IP addresses


b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client
d) all of the mentioned

Answer: d) all of the mentioned


38. What is DHCP snooping?

a) techniques applied to ensure the security of an existing DHCP infrastructure


b) encryption of the DHCP server requests
c) algorithm for DHCP
d) none of the mentioned

Answer: a) techniques applied to ensure the security of an existing DHCP infrastructure

39. Which protocol does DHCP use at the Transport layer?

a) IP
b) TCP
c) UDP
d) ARP
Answer: UDP

40. Which command is used to determine if an IP access list is enabled on a particular interface?

A. show access-lists
B. show interface
C. show ip interface
D. show interface access-lists

Answer: show ip interface

41. Where is a hub specified in the OSI model?

A. Session layer
B. Physical layer
C. Data Link layer
D. Application layer

Answer: Physical layer

42. IPsec is designed to provide the security at the

a) Transport layer
b) Network layer
c) Application layer
d) Session layer

Answer: b) Network layer


43. Pretty good privacy (PGP) is used in

a) Browser security
b) Email security
c) FTP security
d) None of the mentioned

Answer: b) Email security

44. What does the passive command provide to dynamic routing protocols?

A. Stops an interface from sending or receiving periodic dynamic updates.


B. Stops an interface from sending periodic dynamic updates but not from receiving updates.
C. Stops the router from receiving any dynamic updates.
D. Stops the router from sending any dynamic updates.

Answer: B. Stops an interface from sending periodic dynamic updates but not from receiving
updates.

45. Which protocol is used to send a destination network unknown message back to originating
hosts?

A. TCP
B. ARP
C. ICMP ICMP is the protocol at the Network layer
D. BootP that is used to send messages back to an
originating router.

Answer: ICMP

46. ATM and frame relay are

a) virtual circuit networks


b) datagram networks
c) virtual private networks
d) none of the mentioned

Answer: a) virtual circuit networks


47. ATM uses the

a) asynchronous frequency division multiplexing


b) asynchronous time division multiplexing
c) asynchronous space division multiplexing
d) none of the mentioned

Answer: a) asynchronous frequency division multiplexing

48. An ATM cell has the payload field of

a) 32 bytes
b) 48 bytes
c) 64 bytes
d) 128 bytes

Answer: a) 48 bytes

49. Frame relay has error detection at the

a) physical layer
b) data link layer
c) network layer
d) transport layer

Answer: b) data link layer

50. In classless addressing, there are no classes but addresses are still granted in

a) IPs
b) Blocks
c) Codes
d) Sizes

Answer: b) Blocks
51. The header length of an IPv6 datagram is ___________

a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes

Answer: d) 40bytes

52. The main reason for transition from IPv4 to IPv6 is

a) Huge number of systems on the internet


b) Very low number of system on the internet
c) Providing standard address
d) None of the mentioned

Answer: a) Huge number of systems on the internet

53. Which of the following is the broadcast address for a Class B network ID using the default
subnetmask?

a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255

Answer: c) 172.16.255.255

54. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class
of address, subnet address, and broadcast address?

a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127


b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255

Answer: b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127


55. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you
use?

a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248

Answer: c) 255.255.255.240

56. Which router command allows you to view the entire contents of all access lists?

A. show all access-lists


B. show access-lists
C. show ip interface
D. show interface

Answer: show access-lists

57. Which class of IP address has the most host addresses available by default?

A. A
B. B
C. C
D. A and B

Answer: Class A (Class A addressing provides 24 bits for host addressing)

58. Which protocols are used for Storage management?

a) SNMP
b) LDAP
c) POP3
d) MIB

Answer: a) SNMP
59. _______ allows you to connect and login to a remote computer

a) Telnet
b) FTP
c) HTTP
d) None of the mentioned

Answer: a) Telnet

60. What PPP protocol provides dynamic addressing, authentication, and multilink?

A. NCP
B. HDLC
C. LCP
D. X.25

Answer: LCP (Link Control Protocol)

61. What is a stub network?

A. A network with more than one exit point.


B. A network with more than one exit and entry point.
C. A network with only one entry and no exit point.
D. A network that has only one entry and exit point.

Answer: D. A network that has only one entry and exit point.

62. In TCP, sending and receiving data is done as

a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets

Answer: a) Stream of bytes


63. TCP groups a number of bytes together into a packet called

a) Packet
b) Buffer
c) Segment
d) Stack

Answer: c) Segment

64. Which of the following is false with respect to UDP

a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) All of the mentioned

Answer: a) Connection-oriented

65. what is the header size of UDP packet?

a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes

Answer: a) 8 bytes

66. The technique in which a congested node stops receiving data from the immediate upstream
node or nodes is called as

a) Admission policy
b) Backpressure
c) Forward signalling
d) Backward signalling

Answer: b) Backpressure
67. Which one of the following is true regarding VLANs?

A. Two VLANs are configured by default on all Cisco switches.


B. VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are
allowed.
C. You should not have more than 10 switches in the same VTP domain.
D. VTP is used to send VLAN information to switches in a configured VTP domain.

Answer: D. VTP is used to send VLAN information to switches in a configured VTP domain.

68. What does a VLAN do?

A. Acts as the fastest port to all servers.


B. Provides multiple collision domains on one switch port.
C. Breaks up broadcast domains in a layer 2 switch internetwork.
D. Provides multiple broadcast domains within a single collision domain.

Answer: C. Breaks up broadcast domains in a layer 2 switch internetwork.

69. What is the main reason the OSI model was created?

A. To create a layered model larger than the DoD model.


B. So application developers can change only one layer's protocols at a time.
C. So different networks could communicate.
D. So Cisco could use the model.

Answer: C. So different networks could communicate.

70. Which protocol does Ping use?

A. TCP
B. ARP
C. ICMP
D. BootP

Answer: ICMP

(ICMP is the protocol at the Network layer that is used to send echo requests and replies.)
71. In the transfer of file between server and client, if the transmission rates along the path is
10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually

a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps

Answer: 10 Mbps [The throughput is generally the transmission rate of bottleneck link.]

72. In a network with dozens of switches, how many root bridges would you have?

A. 1
B. 2
C. 5
D. 12

Answer: 1 (You should have only one root bridge per network)

73. Application Layer protocols are HTTP, FTP, SSH, DNS etc.

74. Presentation Layer protocols are SSL, MPEG, JPEG etc.

75. Session Layer protocols are API’s , Sockets etc.

76. Transport Layer protocols are TCP, UDP

77. Network Layer protocols are routing, IP, IPsec, ICMP, Packets etc.

78. Datalink Layer Protocols are Frame, PPP, Switch, Bridge etc.

79. Physical Layer Protocols are Coax, Fiber, Hubs, repeaters etc.

80. Address Resolution Protocol ( ARP ) is used to find the hardware address of a local device.

81. BUS, Ring and Star Topologies are mostly used in LAN

82. Connection of telephone regional office is a practical example of MESH topology.

83. Cable TV and DSL are example of MAN.

84. Repeaters are used in Ring topology.

85. Modulator and Demodulator combinely known as Modem.

86. BUS backbone uses LAN and Bridges.

87. Star backbone uses Switch.


88. IEEE 802.3 is ETHERNET

89. Repeater works with volts or signals.

90. Getway connects different networks.

91. Class C starts with 110 (binary) or 192 (dotted decimal)

92. Session, Presentation and Application layers are user supported.

93. Kerbaros is an authentication service for passwords.

94. TCP is connection Oriented.

95. IEEE 802.11 is a slang name for Wi-Fi

96. In class A the range is 1-126 and there are 16M host.

97. In class B the range is 128-191 and there are 64k host.

98. In class C the range is 192-223 and there are 254 host

99. Class D is used for Brodcasting

100. Class E used for future use.

You might also like