Computer network mcq
Computer network mcq
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
a) Star
b) Mesh
c) Ring
d) Bus
Answer: Star
4. Bits can be sent over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
Answer: multiplexing
a) 32 bits
b) 128 bytes
c) 64 bits
d) 128 bits
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
Answer: simplex
8. MAC address is of
a) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
e) Answer: 48 bits
9. Ethernet frame consists of
a) MAC address
b) IP address
c) both MAC address and IP address
d) none of the mentioned
11. What flavor of Network Address Translation can be used to have one IP address allow many
users to connect to the global Internet?
a) NAT
b) Static
c) Dynamic
d) PAT
Answer: PAT
12. A __________ is a device that forwards packets between networks by processing the routing
information included in the packet.
a) bridge
b) firewall
c) router
d) all of the mentioned
Answer: Router
13. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) None of the mentioned
Answer: b) CSMA/CA
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
a) FDM
b) TDM
c) WDM
d) FDM & WDM
16. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) None of the mentioned
a) Packet length
b) Transmission rate
c) Distance between the routers
d) None of the mentioned
18. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suite
d) none of the mentioned
a) Packet switched
b) Circuit switched
c) Both Packet switched and Circuit switched
d) Line switched
a) Persistent
b) Non-persistent
c) Can be either persistent or non-persistent depending on connection request
d) None of the mentioned
Answer: a) Persistent
a) Client-server
b) P2P
c) Both of the mentioned
d) None of the mentioned
Answer: a) Client-server
a) 1
b) 2
c) 3
d) 4
Answer: 2
25. If you have to send multimedia data over SMTP it has to be encoded into
a) Binary
b) Signal
c) ASCII
d) None of the mentioned
Answer: c) ASCII
a) public-key cryptography
b) private-key cryptography
c) any of public-key or private-key
d) both public-key & private-key
a) 5
b) 7
c) 6
d) None of the mentioned
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
31. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server
connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each
host have to the server?
a) 100 kbps
b) 1 Mbps
c) 2 Mbps
d) 10 Mbps
Answer: 10 Mbps
32. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192
resides? 256 - 192 = 64
64 + 64 = 128
a) 192.168.168.129-190 128 + 64 = 192
b) 192.168.168.129-191 The subnet is 128, the broadcast address is
c) 192.168.168.128-190 191, and the valid host range is the numbers
d) 192.168.168.128-192 in between, or 129-190.
Answer: 192.168.168.129-190
33. To back up an IOS, what command will you use?
34. What protocol does PPP use to identify the Network layer protocol?
Answer: NCP
35. Which of the following commands will allow you to set your Telnet password on a Cisco
router?
a) line telnet 0 4
b) line aux 0 4
c) line vty 0 4
d) line con 0
36. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned
Answer: a) IP address
a) IP
b) TCP
c) UDP
d) ARP
Answer: UDP
40. Which command is used to determine if an IP access list is enabled on a particular interface?
A. show access-lists
B. show interface
C. show ip interface
D. show interface access-lists
A. Session layer
B. Physical layer
C. Data Link layer
D. Application layer
a) Transport layer
b) Network layer
c) Application layer
d) Session layer
a) Browser security
b) Email security
c) FTP security
d) None of the mentioned
44. What does the passive command provide to dynamic routing protocols?
Answer: B. Stops an interface from sending periodic dynamic updates but not from receiving
updates.
45. Which protocol is used to send a destination network unknown message back to originating
hosts?
A. TCP
B. ARP
C. ICMP ICMP is the protocol at the Network layer
D. BootP that is used to send messages back to an
originating router.
Answer: ICMP
a) 32 bytes
b) 48 bytes
c) 64 bytes
d) 128 bytes
Answer: a) 48 bytes
a) physical layer
b) data link layer
c) network layer
d) transport layer
50. In classless addressing, there are no classes but addresses are still granted in
a) IPs
b) Blocks
c) Codes
d) Sizes
Answer: b) Blocks
51. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
Answer: d) 40bytes
53. Which of the following is the broadcast address for a Class B network ID using the default
subnetmask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
Answer: c) 172.16.255.255
54. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class
of address, subnet address, and broadcast address?
a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248
Answer: c) 255.255.255.240
56. Which router command allows you to view the entire contents of all access lists?
57. Which class of IP address has the most host addresses available by default?
A. A
B. B
C. C
D. A and B
a) SNMP
b) LDAP
c) POP3
d) MIB
Answer: a) SNMP
59. _______ allows you to connect and login to a remote computer
a) Telnet
b) FTP
c) HTTP
d) None of the mentioned
Answer: a) Telnet
60. What PPP protocol provides dynamic addressing, authentication, and multilink?
A. NCP
B. HDLC
C. LCP
D. X.25
Answer: D. A network that has only one entry and exit point.
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
a) Packet
b) Buffer
c) Segment
d) Stack
Answer: c) Segment
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) All of the mentioned
Answer: a) Connection-oriented
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
Answer: a) 8 bytes
66. The technique in which a congested node stops receiving data from the immediate upstream
node or nodes is called as
a) Admission policy
b) Backpressure
c) Forward signalling
d) Backward signalling
Answer: b) Backpressure
67. Which one of the following is true regarding VLANs?
Answer: D. VTP is used to send VLAN information to switches in a configured VTP domain.
69. What is the main reason the OSI model was created?
A. TCP
B. ARP
C. ICMP
D. BootP
Answer: ICMP
(ICMP is the protocol at the Network layer that is used to send echo requests and replies.)
71. In the transfer of file between server and client, if the transmission rates along the path is
10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
Answer: 10 Mbps [The throughput is generally the transmission rate of bottleneck link.]
72. In a network with dozens of switches, how many root bridges would you have?
A. 1
B. 2
C. 5
D. 12
Answer: 1 (You should have only one root bridge per network)
73. Application Layer protocols are HTTP, FTP, SSH, DNS etc.
77. Network Layer protocols are routing, IP, IPsec, ICMP, Packets etc.
78. Datalink Layer Protocols are Frame, PPP, Switch, Bridge etc.
79. Physical Layer Protocols are Coax, Fiber, Hubs, repeaters etc.
80. Address Resolution Protocol ( ARP ) is used to find the hardware address of a local device.
81. BUS, Ring and Star Topologies are mostly used in LAN
96. In class A the range is 1-126 and there are 16M host.
97. In class B the range is 128-191 and there are 64k host.
98. In class C the range is 192-223 and there are 254 host