Computer Network MCQ (beginner to advanced)

Ask-1➡
Given below are two statements:
Statement I: In Caesar Cipher each letter of Plain text is replaced by another letter for encryption.
Statement II: Diffie-Hellman algorithm is used for exchange of secret key.

In the light of the above statements, choose the correct answer from the options given below
i➥ Both Statement I and Statement II are true
ii ➥ Both Statement I and Statement II are false
iii ➥Statement I is correct but Statement II is false
iv ➥Statement I is incorrect but Statement II is true

Show Answer With Best Explanation

Answer: I
Explanation: Upload Soon


Ask-2➡
Using ‘RSA’ public key cryptosystem, if p=3, q=11 and d=7, find the value of e and encrypt the number ’19’?
i ➥ 20,19
ii ➥ 33,11
iii ➥ 3,28
iv ➥ 77,28

Show Answer With Best Explanation

Answer: III
Explanation: Upload soon


Ask-3➡
If an IP address starts with a bit sequence of 11110, it is a class____address.
i ➥ E
ii ➥ B
iii ➥ D
iv ➥ C

Show Answer With Best Explanation

Answer: i
Explanation:

In class E address, IP address start with bit sequence 11110.


Ask-4➡
In which kind of communication, the destination address in each packet is the same for all duplicate?
i ➥ Multicasting
ii ➥ Unicasting
iii ➥ Broad casting
iv ➥ Multiple unicasting

Show Answer With Best Explanation

Answer: iii
Explanation:
In Broad casting, the destination address in each packet is the same for all duplicate

If address is 100.20.50.10, then its
Limited Broadcast Address is 255.255.255.255 &
Directed Broadcast Address is 100.255.255.255


Ask-5➡
Which of the following are not valid IPV4 addresses?
i ➥ 65.92.11.00
ii ➥ 10.34.110.77
iii ➥ 192.10.14.3
iv ➥ 200.172.287.33

Show Answer With Best Explanation

Answer: iv
Explanation:
None of the IP address contain number beyond 255.
Option iv , IP address 200.172.287.33 is invalid IP address.


Ask-6➡
IP address range for E class network is ?
i ➥ 240.0.0.0 to 255.255.255
ii ➥ 1.0.0.0 to 127.0.0.0
iii ➥ 128.0.0.0 to 191.255.0.0
iv ➥ 224.0.0 to 239.255.255.0

Show Answer With Best Explanation

Answer: i
Explanation:


Ask-7➡
Consider the classful addressing, the IP address 128.252.144.84 denotes:
i ➥ 128.0.0.0 as network ID and 128.252.127.84 as node ID
ii ➥ 128.252.144.0 as network ID and 128.252.144.84 as node ID
iii ➥ 128.252.0.0 as network ID and 128.252.144.84 as node ID
iv ➥ 0.0.0.0 as network ID and 128.252.252.84 as node ID

Show Answer With Best Explanation

Answer: iii
Explanation:


Ask-8➡
In the IPv-4 addressing format, the number of networks allowed under Class C addresses is-
i ➥ 221
ii ➥ 27
iii ➥ 224
iv ➥ 214

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-9➡
A block of addresses is granted to a small organization, If one of the addresses is 210.32.64.79/26, then what will be the values of the following?
(a) First address
(b) Last address
(c) Total number of addresses
i ➥ (a) 210.32.64.64, (b) 210.32.64.79, (c)128
ii ➥ (a) 210.32.64.79, (b) 210.32.64.255, (c)64
iii ➥ (a) 210.32.64.64, (b) 210.32.64.255, (c)32
iv ➥ (a) 210.32.64.64, (b) 210.32.64.127, (c)64

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-10➡
An organization has a Class B network and wishes to form subnets for 60 departments. The subnet mask would be.
i ➥ 255.255.252.0
ii ➥ 255.255.255.0
iii ➥ 255.255.64.0
iv ➥ 255.255.0.0

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-11➡
You need 500 subnets, each with about 100 usable host addresses per subnet. What network mass will you assign using a class B network address?
i ➥ 255.255.255.0
ii ➥ 255.255.254.0
iii ➥ 255.255.255.128
iv ➥ 255.255.255.252

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-12➡
Consider the following two statements with respect to IPv4 in computer networking:
P: The loopback(IP) address is a member of class B network
Q: The loopback(IP) address is used to send a packet from host to itself
What can you say about the statements P and Q?
i ➥ P-False; Q-True
ii ➥ P-True; Q-True
iii ➥ P-True; Q-True
iv ➥ P-True: Q-False

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-13➡
What is the name of the protocol that allows a client to send a broadcast message with its MAC address and receive an IP address in reply?
i ➥ RARP
ii ➥ ARP
iii ➥ ICMP
iv ➥ DNS

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-14➡
What percentage(%) of the IPv4, IP address space do all class B addresses consume?
i ➥ 50%
ii ➥ 37.5%
iii ➥ 12.5%
iv ➥ 25%

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-15➡
An internet service provider (ISP) has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP want to give half of this chunk of addresses to organization A and a quarter to Organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?
i ➥ 245.248.136.0/21 and 245.248.128.0/22
ii ➥ 245.248.136.0/24 and 245.248.132.0/21
iii ➥ 245.248.128.0/21 and 245.248.128.0/22
iv ➥ 245.248.132.0/22 and 245.248.132.0/21

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-16➡
Classful addressing, first four bits in Class-A IP address is.
i ➥ 0000
ii ➥ 1010
iii ➥ 1110
iv ➥ 1011

Show Answer With Best Explanation

Answer: i
Explanation:
First 4 bit in classful IP address given below.
Class A – 0
Class B – 10
Class C – 110
Class D – 1110
Class E – 1111


Ask-17➡
router uses the following routing table:

A packet bearing a destination address 144.16.68.117 arrives at the router. On which interface will it be forwarded?
i ➥ Ethernet-2
ii ➥ Ethernet-3
iii ➥ Ethernet-0
iv ➥ Ethernet-1

Show Answer With Best Explanation

Answer: i, Ethernet-2
Explanation:


Since, there are 3 matches for subnet id. & we know that, when there are more than one matches, then choose the one who have more number of 1’s & subnet id 144.16.68.0 have more number of 1’s.
So, On interface ethernet 2 router will be forwarded.


Ask-18➡
The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?
i ➥ 128.8.129.43 and 128.8.161.55
ii ➥ 128.8.129.43 and 128.8.161.55
iii ➥ 191.203.31.87 and 191.234.31.88
iv ➥ 172.57.88.62 and 172.56.87.23

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-19➡
What is IP class and number of sub-networks if the subnet mask is 255.224.0.0?
i ➥ Class A, 8
ii ➥ Class A, 3
iii ➥ Class B, 32
iv ➥ Class B, 3

Show Answer With Best Explanation

Answer: ii,Class A, 8
Explanation: Upload Soon


Ask-20➡
A subnetted Class B network has the following broadcast address: 144.16.95.255. Its subnet mask
i ➥ any one of 255.255.224.0, 255.255.240.0, 255.255.248.0
ii ➥ is necessarily 255.255.248.0
iii ➥ is necessarily 255.255.240.0
iv ➥ is necessarily 255.255.224.0

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-21➡
Mechanism that is used to convert domain name into IP address is known___________
i ➥ FTP
ii ➥ DNS
iii ➥ HTTP
iv ➥ URL

Show Answer With Best Explanation

Answer: ii
Explanation:
Domain name servers are a basic part of the Domain Name System.
(DNS)Domain name server is a server which responsible for maintain table or file that contains information about the domain name(s) and corresponding IP addresses (zone file)
and the basic role of DNS is conversion of domain name into IP address.


Ask-22➡
If a packet arrive with an M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is______fragment.
i ➥ Last
ii ➥ Middle
iii ➥ First
iv ➥ All of the above

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-23➡
The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is:
i ➥ 11001010
ii ➥ 110010010011
iii ➥ 11001001000
iv ➥ 11001001011

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-24➡
Which error detection method involves polynomials?
i ➥ CRC
ii ➥ Checksum
iii ➥ LRC
iv ➥ VRC

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-25➡
Error detection at the data link level is achieved by
i ➥ Hamming
ii ➥ Equalization
iii ➥ Bit stuffing
iv ➥ Cyclic redundancy codes

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-26➡
An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes.
The number of fragments that the IP datagram will be divided into for transmission is______.
i ➥ 16
ii ➥ 15
iii ➥ 14
iv ➥ 13

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-27➡
Which one of the following fields of an IP header is NOT modified by a typical IP router?
i ➥ Source address
ii ➥ Checksum
iii ➥ (TTL)Time to Live
iv ➥ Length

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-28➡
In a stop and wait protocol used across a link of bandwidth of 1Mbps, data packets to 1000 bits are transmitted. The round trip time for a bit is 20ms. The link utilization is :
i ➥ 0.05
ii ➥ 0.005
iii ➥ 0.5
iv ➥ 5.0

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-29➡
The major functions of the presentation layer in OSI stack are :
i ➥ Enabling end to end error control presentation
ii ➥ Presenting the full and half duplex services to the user
iii ➥ Dialog presentation and control
iv ➥ Dealing with differences in data representation, encryption and compression

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-30➡
_______provide a method to recover data that has been delivered but not get used :
i ➥ Translation
ii ➥ Synchronization
iii ➥ Segmentation
iv ➥ Concatenation

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-31➡
What is the main reason for developing ISO/OSI model for networks?
i ➥ The rate of data transfer was increasing exponentially
ii ➥ Standards were needed to allow any two systems to communicate
iii ➥ Manufactures disliked the TCP/IP protocol suite
iv ➥ None of the given options

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-32➡
Which layer of OSI model is responsible for transmitting raw bit stream over on physical cable?
i ➥ Physical
ii ➥ Presentation
iii ➥ Network
iv ➥ Transport

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-33➡
Which layer of OSI model is responsible to translates logical network address and names to their physical address?
i ➥ Network
ii ➥ Session
iii ➥ Data
iv ➥ Presentation

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-34➡
Which network component is not associated at physical layer of OSI model?
i ➥ Amplifier
ii ➥ Router
iii ➥ Multiplexer
iv ➥ Hubs

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-35➡
In OSI model, data compression is carried out by:
i ➥ Presentation layer
ii ➥ Data Link layer
iii ➥ Physical layer
iv ➥ Network layer

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-36➡
In which layer of the OSI model, DBMS and email software are found
i ➥ Application Layer
ii ➥ Sessional layer
iii ➥ Transport layer
iv ➥ Presentation Layer

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-37➡
The function of network layer of OSI model
i ➥ Internetworking
ii ➥ Congestion Control
iii ➥ Packet Routing
iv ➥ All of the above

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-38➡
In the context of computer networks, which of the following is false?
i ➥ A set of layers and protocol
ii ➥ Fiber optic devices for transmission have higher bandwidth than copper based devices
iii ➥ In OSI model, network layer accepts messages from sessions layer and passes it to transport layer
iv ➥ In the context of network architecture, a service is a set of primitive operations that a layer provides to the layer above it

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-39➡
The major functions of the presentation layer in OSI stack are :
i ➥ Dealing with differences in data representation, encryption and compression
ii ➥ Dialog presentation and control
iii ➥ Enabling end to end error control presentation
iv ➥ Presenting the full and half duplex services to the user

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-40➡
If there are n devices (nodes) in a network, what is the number of cable links required for a fully connected mesh and a star topology respectively
i ➥ n−1, n(n −1)/2
ii ➥ n(n−1)/ 2, n−1
iii ➥ n, n−1
iv ➥ n−1, n

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-41➡
In which of the topology, each device has a dedicated point-to-point link to a central controller?
i ➥ Star
ii ➥ Bus
iii ➥ Ring
iv ➥ Mesh

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-42➡
Which one of the following transmission systems provides the highest data rate to an individual device?
i ➥ Voice and mode
ii ➥ Lease lines
iii ➥ Computer bus
iv ➥ Telephone bus

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-43➡
Which of the following topologies highest reliability?
i ➥ Star topology
ii ➥ Ring topology
iii ➥ Mesh topology
iv ➥ Bus topology

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-44➡
________do not take their decisions on measurements or estimates of the current traffic and topology.
i ➥ Non – adaptive algorithms
ii ➥ Recursive algorithms
iii ➥ Static algorithms
iv ➥ Adaptive algorithms

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-45➡
In a fully-connected mesh network with 10 computers, total___number of cables are required and____number of ports are required for each device.
i ➥ 45,9
ii ➥ 50,10
iii ➥ 45,10
iv ➥ 40,9

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-46➡
Consider the following three statements about link state and distance vector routing protocols, for a large network with 500 network nodes and 4000 links.
[S1] –The computational overhead in link state protocols is higher than in distance vector protocols.
[S2]- A distance vector protocol (with split horizon) avoids persistent routing loops, but not a link state protocol.
[S3]- After a topology change, a link state protocol will converge faster than a distance vector protocol.
Which one of the following is correct about S1, S2, and S3 ?
i ➥ S1, S2, and S3 are all true.
ii ➥ S1 and S3 are true, but S2 is false.
iii ➥ S1 and S2 are true, but S3 is false.
iv ➥ S1, S2, and S3 are all false.

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-47➡
Which one of the following is TRUE about the interior gateway routing protocols – Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)?
i ➥ OSPF uses distance vector routing and RIP uses link state routing
ii ➥ Both RIP and OSPF use distance vector routing
iii ➥ Both RIP and OSPF use link state routing
iv ➥ RIP uses distance vector routing and OSPF uses link state routing

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-48➡
Dynamic routing protocol enable routers to
i ➥ Distribute routing updates to other routers
ii ➥ Dynamically discover and maintain routes
iii ➥ Reach agreement with other routers about the network topology
iv ➥ All of the above

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-49➡
What is routing algorithm used by OSPF routing protocol?
i ➥ Path vector
ii ➥ Link state
iii ➥ Distance vector
iv ➥ Flooding

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-50➡
In OSI network architecture, routing is performed by the.
i ➥ Session layer
ii ➥ Transport layer
iii ➥ Network layer
iv ➥ Data link layer

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-51➡
One of the ad-hoc solutions to count to infinity problem in network routing is:
i ➥ Flow based routing
ii ➥ split horizon hack
iii ➥ Shortest path routing
iv ➥ Flooding

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-52➡
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated______.
i ➥ backup database
ii ➥ by exchanging information with neighbour nodes
iii ➥ by server
iv ➥ automatically

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-53➡
In link state routing algorithm after construction of link state packets, new routes are computed using:
i ➥ Reverse path forwarding
ii ➥ Multi Destination routing
iii ➥ Flooding
iv ➥ All of the above

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-54➡
In link state routing algorithm after construction of link state packets, new routes are computed using:
i ➥ Dijkstra’s algorithm
ii ➥ DES algorithm
iii ➥ Packets
iv ➥ RSA algorithm

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-55➡
The count-to-infinity problem is associated with
i ➥ Link state routing algorithm
ii ➥ Distance vector routing algorithm
iii ➥ Hierarchical routing algorithm
iv ➥ Flooding algorithm

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-56➡
Networks that use different technologies can be connected by using
i ➥ Routers
ii ➥ Packets
iii ➥ Switches
iv ➥ Bridges

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-57➡
In which Routing Method do all the routers have a common database ?
i ➥ Link state
ii ➥ Distance vector
iii ➥ Dijkstra method
iv ➥ Link vector

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-58➡
What is the routing algorithm used by ‘RIP’ and ‘IGRP’ ?
i ➥ Link-state
ii ➥ Dynamic
iii ➥ Dijkstra vector
iv ➥ Distance vector protocol.

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-59➡
A station in a network in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?
i ➥ Flooding
ii ➥ Delta routing
iii ➥ Hot potato routing
iv ➥ Static routing

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-60➡
Consider the following two statements:
S1: TCP handles both congestion and flow control
S2: UDP handles congestion but not flow control
Which of the following option is correct with respect to the above statements (S1) and (S2)?
i ➥ S1 is not correct but S2 is correct
ii ➥ S1 is correct but S2 is not correct
iii ➥ Neither S1 nor S2 is correct
iv ➥ Both S1 and S2 are correct

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-61➡
Checksum field in the TCP header is
i ➥ Ones complement of sum of header and data in bytes
ii ➥ Dropped from IPv6 header format
iii ➥ Ones complement of sum of header, data and pseudo header in 16 bit words
iv ➥ None of the above

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-62➡
Two devices are in network if_______
i ➥ PIDs of the processes running of different devices are same
ii ➥ a process is active and another is inactive
iii ➥ a process in one device is able to exchange information with a process in another device
iv ➥ a process is running on both devices

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-63➡
Communication channel is shared by all the machines on the network in________
i ➥ anycast network
ii ➥ broadcast network
iii ➥ unicast network
iv ➥ multicast network

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-64➡
Bluetooth is an example of..
i ➥ local area network
ii ➥ virtual private network
iii ➥ wide area network
iv ➥ personal area network

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-65➡
A_________is a device that forwards packets between networks by processing the routing information included in the packet.
i ➥ router
ii ➥ hub
iii ➥ bridge
iv ➥ firewall

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-66➡
A list of protocols used by a system, one protocol per layer, is called___
i ➥ protocol suite
ii ➥ protocol system
iii ➥ protocol architecture
iv ➥ protocol stack

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-67➡
Network congestion occurs____
i ➥ in case of transfer failure
ii ➥ in case of traffic overloading
iii ➥ when a system terminates
iv ➥ when connection between two nodes terminates

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-68➡
Which of the following networks extends a private network across public networks?
i ➥ enterprise private network
ii ➥ storage area network
iii ➥ local area network
iv ➥ virtual private network

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-69➡
Which of the following layers is an addition to OSI model when compared with TCP IP model?
i ➥ Session and Presentation layer
ii ➥ Session layer
iii ➥ Presentation layer
iv ➥ Application layer

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-70➡
Application layer is implemented in____
i ➥ Ethernet
ii ➥ Packet transport
iii ➥ End system
iv ➥ NIC

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-71➡
Transport layer is implemented in_____
i ➥ Ethernet
ii ➥ Signal transmission
iii ➥ End system
iv ➥ NIC

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-72➡
The functionalities of the presentation layer include______
i ➥ Data description
ii ➥ Data encryption
iii ➥ Data compression
iv ➥ All of the above

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-73➡
Delimiting and synchronization of data exchange is provided by
i ➥ Link layer
ii ➥ Application layer
iii ➥ Session layer
iv ➥ Transport layer

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-74➡
Which layer is used to link the network support layers and user support layers?
i ➥ transport layer
ii ➥ network layer
iii ➥ session layer
iv ➥ data link layer

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-75➡
Which address is used to identify a process on a host by the transport layer?
i ➥ port address
ii ➥ specific address
iii ➥ physical address
iv ➥ logical address

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-76➡
Which layer provides the services to user?
i ➥ presentation layer
ii ➥ physical layer
iii ➥ application layer
iv ➥ session layer

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-77➡
Transmission data rate is decided by_____
i ➥ physical layer
ii ➥ data link layer
iii ➥ transport layer
iv ➥ network layer

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-78➡
The data link layer takes the packets from_____and encapsulates them into frames for transmission.
i ➥ transport layer
ii ➥ application layer
iii ➥ network layer
iv ➥ physical layer

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-79➡
Which of the following tasks is not done by data link layer?
i ➥ channel coding
ii ➥ framing
iii ➥ flow control
iv ➥ error control

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-80➡
Which of the following routing algorithms can be used for network layer design?
i ➥ link state routing
ii ➥ shortest path algorithm
iii ➥ distance vector routing
iv ➥ All

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-81➡
In virtual circuit network each packet contains_______
i ➥ a short VC number
ii ➥ only source address
iii ➥ only destination address
iv ➥ full source and destination address

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-82➡
ICMP is primarily used for________
i ➥ forwarding
ii ➥ routing
iii ➥ error and diagnostic functions
iv ➥ addressing

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-83➡
Which of the following are transport layer protocols used in networking?
i ➥ TCP and UDP
ii ➥ HTTP and FTP
iii ➥ TCP and FTP
iv ➥ UDP and HTTP

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-84➡
User datagram protocol is called connectionless because_______
i ➥ it sends data very quickly
ii ➥ it is received in the same order as sent order
iii ➥ it sends data as a stream of related packets
iv ➥ all UDP packets are treated independently by transport layer

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-85➡
Transmission control protocol____
i ➥ receives data from application as a single stream
ii ➥ is a connection-oriented protocol
iii ➥ uses a three way handshake to establish a connection
iv ➥ All

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-86➡
An endpoint of an inter-process communication flow across a computer network is called___
i ➥ port
ii ➥ machine
iii ➥ socket
iv ➥ pipe

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-87*➡
Socket-style API for windows is called____
i ➥ sockwi
ii ➥ wins
iii ➥ wsock
iv ➥ winsock

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-88➡
A_____is a TCP name for a transport service access point.
i ➥ pipe
ii ➥ protocol
iii ➥ port
iv ➥ node

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-89➡
Transport layer protocols deals with
i ➥ process to process communication
ii ➥ node to node communication
iii ➥ man to man communication
iv ➥ application to application communication

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-90➡
Which of the following is a transport layer protocol?
i ➥ internet control message protocol
ii ➥ dynamic host configuration protocol
iii ➥ stream control transmission protocol
iv ➥ All

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-91➡
Physical or logical arrangement of network is_____
i ➥ Routing
ii ➥ Control
iii ➥ Topology
iv ➥ Networking

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-92➡
Which network topology requires a central controller or hub?
i ➥ Ring
ii ➥ Star
iii ➥ Bus
iv ➥ Mesh

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-93➡
_____topology requires a multipoint connection.
i ➥ Bus
ii ➥ Ring
iii ➥ Mesh
iv ➥ Star

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-94➡
Data communication system spanning states, countries, or the whole world is____
i ➥ MAN
ii ➥ PAN
iii ➥ WAN
iv ➥ LAN

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-95➡
In TDM (Time division multiplexing), slots are further divided into____
i ➥ Packets
ii ➥ Bits
iii ➥ Seconds
iv ➥ Frames

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-96➡
Which is not a application layer protocol?
i ➥ TCP
ii ➥ FTP
iii ➥ HTTP
iv ➥ SMTP

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-97➡
Application layer offers______service.
i ➥ Both End to end and Process to process
ii ➥ Process to process
iii ➥ End to end
iv ➥ None

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-98➡
To deliver a message to the correct application program running on a host, the_________address must be consulted.
i ➥ IP
ii ➥ Port
iii ➥ MAC
iv ➥ None

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-99➡
Electronic mail uses which Application layer protocol?
i ➥ FTP
ii ➥ SIP
iii ➥ HTTP
iv ➥ SMTP

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-100➡
When displaying a web page, the application layer uses the_____
i ➥ SMTP
ii ➥ TCP
iii ➥ HTTP
iv ➥ FTP

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-101➡
port number for FTP connection
i ➥ 23
ii ➥ 25
iii ➥ 20
iv ➥ 21

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-102➡
Telnet Port address
i ➥ 20
ii ➥ 21
iii ➥ 22
iv ➥ 23

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-103➡
SMTP Port address
i ➥ 23
ii ➥ 24
iii ➥ 25
iv ➥ 26

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-104➡
HTTP Port address
i ➥ 79
ii ➥ 80
iii ➥ 81
iv ➥ 82

Show Answer With Best Explanation

Answer: ii
Explanation: Upload Soon


Ask-105➡
The File Transfer Protocol is built on___
i ➥ client server architecture
ii ➥ connection oriented architecture
iii ➥ data centric architecture
iv ➥ service oriented architecture

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-106➡
In File Transfer Protocol, data transfer cannot be done in__
i ➥ compressed mode
ii ➥ stream mode
iii ➥ message mode
iv ➥ block mode

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-107➡
FTP uses _ parallel TCP connections to transfer a file.
i ➥ 2
ii ➥ 3
iii ➥ 4
iv ➥ 1

Show Answer With Best Explanation

Answer: i
Explanation:
FTP PORT-20 for data
FTP PORT -21 for Control


Ask-108➡
Simple mail transfer protocol (SMTP) utilizes____as the transport layer protocol for electronic mail transfer.
i ➥ DCCP
ii ➥ SCTP
iii ➥ TCP
iv ➥ UDP

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-109➡
SMTP connections secured by SSL are known as__
i ➥ STARTTLS
ii ➥ SNMP
iii ➥ SSMTP
iv ➥ SMTPS

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-110➡
DHCP (dynamic host configuration protocol) provides __ to the client.
i ➥ MAC address
ii ➥ Url
iii ➥ IP address
iv ➥ None

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-111➡
The DHCP server____
i ➥ maintains the information about client configuration parameters
ii ➥ grants a IP address when receives a request from a client
iii ➥ maintains a database of available IP addresses
iv ➥ All

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-112➡
DHCP uses UDP port _ for sending data to the server.
i ➥ 67
ii ➥ 68
iii ➥ 69
iv ➥ 66

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-113➡
The DHCP server can provide the _ of the IP addresses.
i ➥ static allocation
ii ➥ dynamic allocation
iii ➥ automatic allocation
iv ➥ All

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-114➡
WPA2 is used for security in___
i ➥ Wi-Fi
ii ➥ Email
iii ➥ Ethernet
iv ➥ Bluetooth

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-115➡
Telnet is used for
i ➥ Remote Login
ii ➥ Teleshopping site
iii ➥ Television on net
iv ➥ Network of Telephones

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-116➡
All telnet operations are sent as__
i ➥ 32 bits
ii ➥ 4 bits
iii ➥ 8 bits
iv ➥ 16 bits

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-117➡
In TCP, sending and receiving data is done as__
i ➥ Packets
ii ➥ Lines of data
iii ➥ Stream of bytes
iv ➥ Sequence of characters

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-118➡
What is the header size of a UDP packet?
i ➥ 16 bytes
ii ➥ 124 bytes
iii ➥ 8 bytes
iv ➥ 8 bits

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-119➡
The____field is used to detect errors over the entire user datagram.
i ➥ source port
ii ➥ destination port
iii ➥ checksum
iv ➥ UDP header

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-120➡
Which of the following is not applicable for IP?
i ➥ Datagram format
ii ➥ Packet handling conventions
iii ➥ Error reporting
iv ➥ Handle addressing conventions

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-121➡
Which of the following field in IPv4 datagram is not related to fragmentation?
i ➥ TOS
ii ➥ Identifier
iii ➥ Offset
iv ➥ Flags

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-122➡
Which field helps to check rearrangement of the fragments?
i ➥ TTL
ii ➥ Identifier
iii ➥ Offset
iv ➥ Flag

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-123➡
In classless addressing, there are no classes but addresses are still granted in
i ➥ Codes
ii ➥ Sizes
iii ➥ Blocks
iv ➥ IPs

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-124➡
In IPv4 Addresses, classful addressing is replaced with
i ➥ Classful Advertising
ii ➥ Classless Advertising
iii ➥ Classless Addressing
iv ➥ Classful Addressing

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-125➡
In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called_____
i ➥ Compatible address
ii ➥ Mapped address
iii ➥ Unspecified address
iv ➥ Loopback address

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-126➡
Internet Control Message Protocol (ICMP) has been designed to compensate
i ➥ Host and management queries
ii ➥ Error-correction
iii ➥ Error-reporting
iv ➥ All

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-127➡
Header size of the ICMP message is
i ➥ 16-bytes
ii ➥ 16-bits
iii ➥ 8-bytes
iv ➥ 8-bits

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-128*➡
ICMP error message will not be generated for a datagram having a special address such as
i ➥ 127
ii ➥ 31.4.5.6
iii ➥ 127.0.0.0
iv ➥ 222.1

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-129➡
The source-quench message in ICMP was designed to add a kind of______to the IP.
i ➥ router control
ii ➥ switch control
iii ➥ flow control
iv ➥ error control

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-130➡
The source-quench message in ICMP was designed to add a kind of_____to the IP.
i ➥ flow control
ii ➥ switch control
iii ➥ router control
iv ➥ error control

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-131➡
Ethernet frame consists of______
i ➥ Default mask
ii ➥ Network address
iii ➥ MAC address
iv ➥ IP address

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


Ask-132➡
Frames from one LAN can be transmitted to another LAN through the device..
i ➥ Repeater
ii ➥ Modem
iii ➥ Router
iv ➥ Bridge

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-133➡
What is the default subnet mask for a class C network?
i ➥ 255.0.0.0
ii ➥ 255.255.0.0
iii ➥ 127.0.0.1
iv ➥ 255.255.255.0

Show Answer With Best Explanation

Answer: iv
Explanation: Upload Soon


Ask-134➡
In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is
i ➥ 4 bytes
ii ➥ 2 bytes
iii ➥ 5 bytes
iv ➥ 6 bytes

Show Answer With Best Explanation

Answer: iii
Explanation:
Let.
Total Message size=48 bytes
Packet header=3 bytes
we have 24 packets and each packet carries 2 bytes data with 3 byte header
Now we can say that. Packet size is = 2 byte Data + 3 byte Header =5 bytes
so. answer is 5 bytes


Ask-135➡
In which kind of communication, the destination address in each packet is the same for all duplicate?
i ➥ Broad casting
ii ➥ Multiple unicasting
iii ➥ Multicasting
iv ➥ Unicasting

Show Answer With Best Explanation

Answer: i
Explanation: Upload Soon


Ask-*➡
i ➥
ii ➥
iii ➥
iv ➥

Show Answer With Best Explanation

Answer: iii
Explanation: Upload Soon


error: Content is protected !!
Open chat
1
Hi,how Can We Help You ?