Computer Network MCQ (beginner to advanced)
Ask-1➡ Given below are two statements: Statement I: In Caesar Cipher each letter of Plain text is replaced by another letter for encryption. Statement II: Diffie-Hellman algorithm is used for exchange of secret key. In the light of the above statements, choose the correct answer from the options given below |
i➥ Both Statement I and Statement II are true |
ii ➥ Both Statement I and Statement II are false |
iii ➥Statement I is correct but Statement II is false |
iv ➥Statement I is incorrect but Statement II is true |
Show Answer With Best Explanation
Answer: I
Explanation: Upload Soon
Ask-2➡ Using ‘RSA’ public key cryptosystem, if p=3, q=11 and d=7, find the value of e and encrypt the number ’19’? |
i ➥ 20,19 |
ii ➥ 33,11 |
iii ➥ 3,28 |
iv ➥ 77,28 |
Show Answer With Best Explanation
Answer: III
Explanation: Upload soon
Ask-3➡ If an IP address starts with a bit sequence of 11110, it is a class____address. |
i ➥ E |
ii ➥ B |
iii ➥ D |
iv ➥ C |
Show Answer With Best Explanation
Answer: i
Explanation:
In class E address, IP address start with bit sequence 11110.
Ask-4➡ In which kind of communication, the destination address in each packet is the same for all duplicate? |
i ➥ Multicasting |
ii ➥ Unicasting |
iii ➥ Broad casting |
iv ➥ Multiple unicasting |
Show Answer With Best Explanation
Answer: iii
Explanation:
In Broad casting, the destination address in each packet is the same for all duplicate
If address is 100.20.50.10, then its
Limited Broadcast Address is 255.255.255.255 &
Directed Broadcast Address is 100.255.255.255
Ask-5➡ Which of the following are not valid IPV4 addresses? |
i ➥ 65.92.11.00 |
ii ➥ 10.34.110.77 |
iii ➥ 192.10.14.3 |
iv ➥ 200.172.287.33 |
Show Answer With Best Explanation
Answer: iv
Explanation:
None of the IP address contain number beyond 255.
Option iv , IP address 200.172.287.33 is invalid IP address.
Ask-6➡ IP address range for E class network is ? |
i ➥ 240.0.0.0 to 255.255.255 |
ii ➥ 1.0.0.0 to 127.0.0.0 |
iii ➥ 128.0.0.0 to 191.255.0.0 |
iv ➥ 224.0.0 to 239.255.255.0 |
Show Answer With Best Explanation
Answer: i
Explanation:
Ask-7➡ Consider the classful addressing, the IP address 128.252.144.84 denotes: |
i ➥ 128.0.0.0 as network ID and 128.252.127.84 as node ID |
ii ➥ 128.252.144.0 as network ID and 128.252.144.84 as node ID |
iii ➥ 128.252.0.0 as network ID and 128.252.144.84 as node ID |
iv ➥ 0.0.0.0 as network ID and 128.252.252.84 as node ID |
Show Answer With Best Explanation
Answer: iii
Explanation:
Ask-8➡ In the IPv-4 addressing format, the number of networks allowed under Class C addresses is- |
i ➥ 221 |
ii ➥ 27 |
iii ➥ 224 |
iv ➥ 214 |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-9➡ A block of addresses is granted to a small organization, If one of the addresses is 210.32.64.79/26, then what will be the values of the following? (a) First address (b) Last address (c) Total number of addresses |
i ➥ (a) 210.32.64.64, (b) 210.32.64.79, (c)128 |
ii ➥ (a) 210.32.64.79, (b) 210.32.64.255, (c)64 |
iii ➥ (a) 210.32.64.64, (b) 210.32.64.255, (c)32 |
iv ➥ (a) 210.32.64.64, (b) 210.32.64.127, (c)64 |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-10➡ An organization has a Class B network and wishes to form subnets for 60 departments. The subnet mask would be. |
i ➥ 255.255.252.0 |
ii ➥ 255.255.255.0 |
iii ➥ 255.255.64.0 |
iv ➥ 255.255.0.0 |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-11➡ You need 500 subnets, each with about 100 usable host addresses per subnet. What network mass will you assign using a class B network address? |
i ➥ 255.255.255.0 |
ii ➥ 255.255.254.0 |
iii ➥ 255.255.255.128 |
iv ➥ 255.255.255.252 |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-12➡ Consider the following two statements with respect to IPv4 in computer networking: P: The loopback(IP) address is a member of class B network Q: The loopback(IP) address is used to send a packet from host to itself What can you say about the statements P and Q? |
i ➥ P-False; Q-True |
ii ➥ P-True; Q-True |
iii ➥ P-True; Q-True |
iv ➥ P-True: Q-False |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-13➡ What is the name of the protocol that allows a client to send a broadcast message with its MAC address and receive an IP address in reply? |
i ➥ RARP |
ii ➥ ARP |
iii ➥ ICMP |
iv ➥ DNS |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-14➡ What percentage(%) of the IPv4, IP address space do all class B addresses consume? |
i ➥ 50% |
ii ➥ 37.5% |
iii ➥ 12.5% |
iv ➥ 25% |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-15➡ An internet service provider (ISP) has following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20 . The ISP want to give half of this chunk of addresses to organization A and a quarter to Organization B while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B? |
i ➥ 245.248.136.0/21 and 245.248.128.0/22 |
ii ➥ 245.248.136.0/24 and 245.248.132.0/21 |
iii ➥ 245.248.128.0/21 and 245.248.128.0/22 |
iv ➥ 245.248.132.0/22 and 245.248.132.0/21 |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-16➡ Classful addressing, first four bits in Class-A IP address is. |
i ➥ 0000 |
ii ➥ 1010 |
iii ➥ 1110 |
iv ➥ 1011 |
Show Answer With Best Explanation
Answer: i
Explanation:
First 4 bit in classful IP address given below.
Class A – 0
Class B – 10
Class C – 110
Class D – 1110
Class E – 1111
Ask-17➡ router uses the following routing table: ![]() A packet bearing a destination address 144.16.68.117 arrives at the router. On which interface will it be forwarded? |
i ➥ Ethernet-2 |
ii ➥ Ethernet-3 |
iii ➥ Ethernet-0 |
iv ➥ Ethernet-1 |
Show Answer With Best Explanation
Answer: i, Ethernet-2
Explanation:
Since, there are 3 matches for subnet id. & we know that, when there are more than one matches, then choose the one who have more number of 1’s & subnet id 144.16.68.0 have more number of 1’s.
So, On interface ethernet 2 router will be forwarded.
Ask-18➡ The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network? |
i ➥ 128.8.129.43 and 128.8.161.55 |
ii ➥ 128.8.129.43 and 128.8.161.55 |
iii ➥ 191.203.31.87 and 191.234.31.88 |
iv ➥ 172.57.88.62 and 172.56.87.23 |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-19➡ What is IP class and number of sub-networks if the subnet mask is 255.224.0.0? |
i ➥ Class A, 8 |
ii ➥ Class A, 3 |
iii ➥ Class B, 32 |
iv ➥ Class B, 3 |
Show Answer With Best Explanation
Answer: ii,Class A, 8
Explanation: Upload Soon
Ask-20➡ A subnetted Class B network has the following broadcast address: 144.16.95.255. Its subnet mask |
i ➥ any one of 255.255.224.0, 255.255.240.0, 255.255.248.0 |
ii ➥ is necessarily 255.255.248.0 |
iii ➥ is necessarily 255.255.240.0 |
iv ➥ is necessarily 255.255.224.0 |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-21➡ Mechanism that is used to convert domain name into IP address is known___________ |
i ➥ FTP |
ii ➥ DNS |
iii ➥ HTTP |
iv ➥ URL |
Show Answer With Best Explanation
Answer: ii
Explanation:
Domain name servers are a basic part of the Domain Name System.
(DNS)Domain name server is a server which responsible for maintain table or file that contains information about the domain name(s) and corresponding IP addresses (zone file)
and the basic role of DNS is conversion of domain name into IP address.
Ask-22➡ If a packet arrive with an M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is______fragment. |
i ➥ Last |
ii ➥ Middle |
iii ➥ First |
iv ➥ All of the above |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-23➡ The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is: |
i ➥ 11001010 |
ii ➥ 110010010011 |
iii ➥ 11001001000 |
iv ➥ 11001001011 |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-24➡ Which error detection method involves polynomials? |
i ➥ CRC |
ii ➥ Checksum |
iii ➥ LRC |
iv ➥ VRC |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-25➡ Error detection at the data link level is achieved by |
i ➥ Hamming |
ii ➥ Equalization |
iii ➥ Bit stuffing |
iv ➥ Cyclic redundancy codes |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-26➡ An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes. The number of fragments that the IP datagram will be divided into for transmission is______. |
i ➥ 16 |
ii ➥ 15 |
iii ➥ 14 |
iv ➥ 13 |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-27➡ Which one of the following fields of an IP header is NOT modified by a typical IP router? |
i ➥ Source address |
ii ➥ Checksum |
iii ➥ (TTL)Time to Live |
iv ➥ Length |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-28➡ In a stop and wait protocol used across a link of bandwidth of 1Mbps, data packets to 1000 bits are transmitted. The round trip time for a bit is 20ms. The link utilization is : |
i ➥ 0.05 |
ii ➥ 0.005 |
iii ➥ 0.5 |
iv ➥ 5.0 |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-29➡ The major functions of the presentation layer in OSI stack are : |
i ➥ Enabling end to end error control presentation |
ii ➥ Presenting the full and half duplex services to the user |
iii ➥ Dialog presentation and control |
iv ➥ Dealing with differences in data representation, encryption and compression |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-30➡ _______provide a method to recover data that has been delivered but not get used : |
i ➥ Translation |
ii ➥ Synchronization |
iii ➥ Segmentation |
iv ➥ Concatenation |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-31➡ What is the main reason for developing ISO/OSI model for networks? |
i ➥ The rate of data transfer was increasing exponentially |
ii ➥ Standards were needed to allow any two systems to communicate |
iii ➥ Manufactures disliked the TCP/IP protocol suite |
iv ➥ None of the given options |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-32➡ Which layer of OSI model is responsible for transmitting raw bit stream over on physical cable? |
i ➥ Physical |
ii ➥ Presentation |
iii ➥ Network |
iv ➥ Transport |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-33➡ Which layer of OSI model is responsible to translates logical network address and names to their physical address? |
i ➥ Network |
ii ➥ Session |
iii ➥ Data |
iv ➥ Presentation |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-34➡ Which network component is not associated at physical layer of OSI model? |
i ➥ Amplifier |
ii ➥ Router |
iii ➥ Multiplexer |
iv ➥ Hubs |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-35➡ In OSI model, data compression is carried out by: |
i ➥ Presentation layer |
ii ➥ Data Link layer |
iii ➥ Physical layer |
iv ➥ Network layer |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-36➡ In which layer of the OSI model, DBMS and email software are found |
i ➥ Application Layer |
ii ➥ Sessional layer |
iii ➥ Transport layer |
iv ➥ Presentation Layer |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-37➡ The function of network layer of OSI model |
i ➥ Internetworking |
ii ➥ Congestion Control |
iii ➥ Packet Routing |
iv ➥ All of the above |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-38➡ In the context of computer networks, which of the following is false? |
i ➥ A set of layers and protocol |
ii ➥ Fiber optic devices for transmission have higher bandwidth than copper based devices |
iii ➥ In OSI model, network layer accepts messages from sessions layer and passes it to transport layer |
iv ➥ In the context of network architecture, a service is a set of primitive operations that a layer provides to the layer above it |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-39➡ The major functions of the presentation layer in OSI stack are : |
i ➥ Dealing with differences in data representation, encryption and compression |
ii ➥ Dialog presentation and control |
iii ➥ Enabling end to end error control presentation |
iv ➥ Presenting the full and half duplex services to the user |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-40➡ If there are n devices (nodes) in a network, what is the number of cable links required for a fully connected mesh and a star topology respectively |
i ➥ n−1, n(n −1)/2 |
ii ➥ n(n−1)/ 2, n−1 |
iii ➥ n, n−1 |
iv ➥ n−1, n |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-41➡ In which of the topology, each device has a dedicated point-to-point link to a central controller? |
i ➥ Star |
ii ➥ Bus |
iii ➥ Ring |
iv ➥ Mesh |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-42➡ Which one of the following transmission systems provides the highest data rate to an individual device? |
i ➥ Voice and mode |
ii ➥ Lease lines |
iii ➥ Computer bus |
iv ➥ Telephone bus |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-43➡ Which of the following topologies highest reliability? |
i ➥ Star topology |
ii ➥ Ring topology |
iii ➥ Mesh topology |
iv ➥ Bus topology |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-44➡ ________do not take their decisions on measurements or estimates of the current traffic and topology. |
i ➥ Non – adaptive algorithms |
ii ➥ Recursive algorithms |
iii ➥ Static algorithms |
iv ➥ Adaptive algorithms |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-45➡ In a fully-connected mesh network with 10 computers, total___number of cables are required and____number of ports are required for each device. |
i ➥ 45,9 |
ii ➥ 50,10 |
iii ➥ 45,10 |
iv ➥ 40,9 |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-46➡ Consider the following three statements about link state and distance vector routing protocols, for a large network with 500 network nodes and 4000 links. [S1] –The computational overhead in link state protocols is higher than in distance vector protocols. [S2]- A distance vector protocol (with split horizon) avoids persistent routing loops, but not a link state protocol. [S3]- After a topology change, a link state protocol will converge faster than a distance vector protocol. Which one of the following is correct about S1, S2, and S3 ? |
i ➥ S1, S2, and S3 are all true. |
ii ➥ S1 and S3 are true, but S2 is false. |
iii ➥ S1 and S2 are true, but S3 is false. |
iv ➥ S1, S2, and S3 are all false. |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-47➡ Which one of the following is TRUE about the interior gateway routing protocols – Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)? |
i ➥ OSPF uses distance vector routing and RIP uses link state routing |
ii ➥ Both RIP and OSPF use distance vector routing |
iii ➥ Both RIP and OSPF use link state routing |
iv ➥ RIP uses distance vector routing and OSPF uses link state routing |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-48➡ Dynamic routing protocol enable routers to |
i ➥ Distribute routing updates to other routers |
ii ➥ Dynamically discover and maintain routes |
iii ➥ Reach agreement with other routers about the network topology |
iv ➥ All of the above |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-49➡ What is routing algorithm used by OSPF routing protocol? |
i ➥ Path vector |
ii ➥ Link state |
iii ➥ Distance vector |
iv ➥ Flooding |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-50➡ In OSI network architecture, routing is performed by the. |
i ➥ Session layer |
ii ➥ Transport layer |
iii ➥ Network layer |
iv ➥ Data link layer |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-51➡ One of the ad-hoc solutions to count to infinity problem in network routing is: |
i ➥ Flow based routing |
ii ➥ split horizon hack |
iii ➥ Shortest path routing |
iv ➥ Flooding |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-52➡ Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated______. |
i ➥ backup database |
ii ➥ by exchanging information with neighbour nodes |
iii ➥ by server |
iv ➥ automatically |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-53➡ In link state routing algorithm after construction of link state packets, new routes are computed using: |
i ➥ Reverse path forwarding |
ii ➥ Multi Destination routing |
iii ➥ Flooding |
iv ➥ All of the above |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-54➡ In link state routing algorithm after construction of link state packets, new routes are computed using: |
i ➥ Dijkstra’s algorithm |
ii ➥ DES algorithm |
iii ➥ Packets |
iv ➥ RSA algorithm |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-55➡ The count-to-infinity problem is associated with |
i ➥ Link state routing algorithm |
ii ➥ Distance vector routing algorithm |
iii ➥ Hierarchical routing algorithm |
iv ➥ Flooding algorithm |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-56➡ Networks that use different technologies can be connected by using |
i ➥ Routers |
ii ➥ Packets |
iii ➥ Switches |
iv ➥ Bridges |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-57➡ In which Routing Method do all the routers have a common database ? |
i ➥ Link state |
ii ➥ Distance vector |
iii ➥ Dijkstra method |
iv ➥ Link vector |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-58➡ What is the routing algorithm used by ‘RIP’ and ‘IGRP’ ? |
i ➥ Link-state |
ii ➥ Dynamic |
iii ➥ Dijkstra vector |
iv ➥ Distance vector protocol. |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-59➡ A station in a network in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ? |
i ➥ Flooding |
ii ➥ Delta routing |
iii ➥ Hot potato routing |
iv ➥ Static routing |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-60➡ Consider the following two statements: S1: TCP handles both congestion and flow control S2: UDP handles congestion but not flow control Which of the following option is correct with respect to the above statements (S1) and (S2)? |
i ➥ S1 is not correct but S2 is correct |
ii ➥ S1 is correct but S2 is not correct |
iii ➥ Neither S1 nor S2 is correct |
iv ➥ Both S1 and S2 are correct |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-61➡ Checksum field in the TCP header is |
i ➥ Ones complement of sum of header and data in bytes |
ii ➥ Dropped from IPv6 header format |
iii ➥ Ones complement of sum of header, data and pseudo header in 16 bit words |
iv ➥ None of the above |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-62➡ Two devices are in network if_______ |
i ➥ PIDs of the processes running of different devices are same |
ii ➥ a process is active and another is inactive |
iii ➥ a process in one device is able to exchange information with a process in another device |
iv ➥ a process is running on both devices |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-63➡ Communication channel is shared by all the machines on the network in________ |
i ➥ anycast network |
ii ➥ broadcast network |
iii ➥ unicast network |
iv ➥ multicast network |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-64➡ Bluetooth is an example of.. |
i ➥ local area network |
ii ➥ virtual private network |
iii ➥ wide area network |
iv ➥ personal area network |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-65➡ A_________is a device that forwards packets between networks by processing the routing information included in the packet. |
i ➥ router |
ii ➥ hub |
iii ➥ bridge |
iv ➥ firewall |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-66➡ A list of protocols used by a system, one protocol per layer, is called___ |
i ➥ protocol suite |
ii ➥ protocol system |
iii ➥ protocol architecture |
iv ➥ protocol stack |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-67➡ Network congestion occurs____ |
i ➥ in case of transfer failure |
ii ➥ in case of traffic overloading |
iii ➥ when a system terminates |
iv ➥ when connection between two nodes terminates |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-68➡ Which of the following networks extends a private network across public networks? |
i ➥ enterprise private network |
ii ➥ storage area network |
iii ➥ local area network |
iv ➥ virtual private network |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-69➡ Which of the following layers is an addition to OSI model when compared with TCP IP model? |
i ➥ Session and Presentation layer |
ii ➥ Session layer |
iii ➥ Presentation layer |
iv ➥ Application layer |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-70➡ Application layer is implemented in____ |
i ➥ Ethernet |
ii ➥ Packet transport |
iii ➥ End system |
iv ➥ NIC |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-71➡ Transport layer is implemented in_____ |
i ➥ Ethernet |
ii ➥ Signal transmission |
iii ➥ End system |
iv ➥ NIC |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-72➡ The functionalities of the presentation layer include______ |
i ➥ Data description |
ii ➥ Data encryption |
iii ➥ Data compression |
iv ➥ All of the above |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-73➡ Delimiting and synchronization of data exchange is provided by |
i ➥ Link layer |
ii ➥ Application layer |
iii ➥ Session layer |
iv ➥ Transport layer |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-74➡ Which layer is used to link the network support layers and user support layers? |
i ➥ transport layer |
ii ➥ network layer |
iii ➥ session layer |
iv ➥ data link layer |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-75➡ Which address is used to identify a process on a host by the transport layer? |
i ➥ port address |
ii ➥ specific address |
iii ➥ physical address |
iv ➥ logical address |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-76➡ Which layer provides the services to user? |
i ➥ presentation layer |
ii ➥ physical layer |
iii ➥ application layer |
iv ➥ session layer |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-77➡ Transmission data rate is decided by_____ |
i ➥ physical layer |
ii ➥ data link layer |
iii ➥ transport layer |
iv ➥ network layer |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-78➡ The data link layer takes the packets from_____and encapsulates them into frames for transmission. |
i ➥ transport layer |
ii ➥ application layer |
iii ➥ network layer |
iv ➥ physical layer |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-79➡ Which of the following tasks is not done by data link layer? |
i ➥ channel coding |
ii ➥ framing |
iii ➥ flow control |
iv ➥ error control |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-80➡ Which of the following routing algorithms can be used for network layer design? |
i ➥ link state routing |
ii ➥ shortest path algorithm |
iii ➥ distance vector routing |
iv ➥ All |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-81➡ In virtual circuit network each packet contains_______ |
i ➥ a short VC number |
ii ➥ only source address |
iii ➥ only destination address |
iv ➥ full source and destination address |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-82➡ ICMP is primarily used for________ |
i ➥ forwarding |
ii ➥ routing |
iii ➥ error and diagnostic functions |
iv ➥ addressing |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-83➡ Which of the following are transport layer protocols used in networking? |
i ➥ TCP and UDP |
ii ➥ HTTP and FTP |
iii ➥ TCP and FTP |
iv ➥ UDP and HTTP |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-84➡ User datagram protocol is called connectionless because_______ |
i ➥ it sends data very quickly |
ii ➥ it is received in the same order as sent order |
iii ➥ it sends data as a stream of related packets |
iv ➥ all UDP packets are treated independently by transport layer |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-85➡ Transmission control protocol____ |
i ➥ receives data from application as a single stream |
ii ➥ is a connection-oriented protocol |
iii ➥ uses a three way handshake to establish a connection |
iv ➥ All |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-86➡ An endpoint of an inter-process communication flow across a computer network is called___ |
i ➥ port |
ii ➥ machine |
iii ➥ socket |
iv ➥ pipe |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-87*➡ Socket-style API for windows is called____ |
i ➥ sockwi |
ii ➥ wins |
iii ➥ wsock |
iv ➥ winsock |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-88➡ A_____is a TCP name for a transport service access point. |
i ➥ pipe |
ii ➥ protocol |
iii ➥ port |
iv ➥ node |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-89➡ Transport layer protocols deals with |
i ➥ process to process communication |
ii ➥ node to node communication |
iii ➥ man to man communication |
iv ➥ application to application communication |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-90➡ Which of the following is a transport layer protocol? |
i ➥ internet control message protocol |
ii ➥ dynamic host configuration protocol |
iii ➥ stream control transmission protocol |
iv ➥ All |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-91➡ Physical or logical arrangement of network is_____ |
i ➥ Routing |
ii ➥ Control |
iii ➥ Topology |
iv ➥ Networking |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-92➡ Which network topology requires a central controller or hub? |
i ➥ Ring |
ii ➥ Star |
iii ➥ Bus |
iv ➥ Mesh |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-93➡ _____topology requires a multipoint connection. |
i ➥ Bus |
ii ➥ Ring |
iii ➥ Mesh |
iv ➥ Star |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-94➡ Data communication system spanning states, countries, or the whole world is____ |
i ➥ MAN |
ii ➥ PAN |
iii ➥ WAN |
iv ➥ LAN |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-95➡ In TDM (Time division multiplexing), slots are further divided into____ |
i ➥ Packets |
ii ➥ Bits |
iii ➥ Seconds |
iv ➥ Frames |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-96➡ Which is not a application layer protocol? |
i ➥ TCP |
ii ➥ FTP |
iii ➥ HTTP |
iv ➥ SMTP |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-97➡ Application layer offers______service. |
i ➥ Both End to end and Process to process |
ii ➥ Process to process |
iii ➥ End to end |
iv ➥ None |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-98➡ To deliver a message to the correct application program running on a host, the_________address must be consulted. |
i ➥ IP |
ii ➥ Port |
iii ➥ MAC |
iv ➥ None |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-99➡ Electronic mail uses which Application layer protocol? |
i ➥ FTP |
ii ➥ SIP |
iii ➥ HTTP |
iv ➥ SMTP |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-100➡ When displaying a web page, the application layer uses the_____ |
i ➥ SMTP |
ii ➥ TCP |
iii ➥ HTTP |
iv ➥ FTP |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-101➡ port number for FTP connection |
i ➥ 23 |
ii ➥ 25 |
iii ➥ 20 |
iv ➥ 21 |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-102➡ Telnet Port address |
i ➥ 20 |
ii ➥ 21 |
iii ➥ 22 |
iv ➥ 23 |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-103➡ SMTP Port address |
i ➥ 23 |
ii ➥ 24 |
iii ➥ 25 |
iv ➥ 26 |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-104➡ HTTP Port address |
i ➥ 79 |
ii ➥ 80 |
iii ➥ 81 |
iv ➥ 82 |
Show Answer With Best Explanation
Answer: ii
Explanation: Upload Soon
Ask-105➡ The File Transfer Protocol is built on___ |
i ➥ client server architecture |
ii ➥ connection oriented architecture |
iii ➥ data centric architecture |
iv ➥ service oriented architecture |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-106➡ In File Transfer Protocol, data transfer cannot be done in__ |
i ➥ compressed mode |
ii ➥ stream mode |
iii ➥ message mode |
iv ➥ block mode |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-107➡ FTP uses _ parallel TCP connections to transfer a file. |
i ➥ 2 |
ii ➥ 3 |
iii ➥ 4 |
iv ➥ 1 |
Show Answer With Best Explanation
Answer: i
Explanation:
FTP PORT-20 for data
FTP PORT -21 for Control
Ask-108➡ Simple mail transfer protocol (SMTP) utilizes____as the transport layer protocol for electronic mail transfer. |
i ➥ DCCP |
ii ➥ SCTP |
iii ➥ TCP |
iv ➥ UDP |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-109➡ SMTP connections secured by SSL are known as__ |
i ➥ STARTTLS |
ii ➥ SNMP |
iii ➥ SSMTP |
iv ➥ SMTPS |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-110➡ DHCP (dynamic host configuration protocol) provides __ to the client. |
i ➥ MAC address |
ii ➥ Url |
iii ➥ IP address |
iv ➥ None |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-111➡ The DHCP server____ |
i ➥ maintains the information about client configuration parameters |
ii ➥ grants a IP address when receives a request from a client |
iii ➥ maintains a database of available IP addresses |
iv ➥ All |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-112➡ DHCP uses UDP port _ for sending data to the server. |
i ➥ 67 |
ii ➥ 68 |
iii ➥ 69 |
iv ➥ 66 |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-113➡ The DHCP server can provide the _ of the IP addresses. |
i ➥ static allocation |
ii ➥ dynamic allocation |
iii ➥ automatic allocation |
iv ➥ All |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-114➡ WPA2 is used for security in___ |
i ➥ Wi-Fi |
ii ➥ Email |
iii ➥ Ethernet |
iv ➥ Bluetooth |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-115➡ Telnet is used for |
i ➥ Remote Login |
ii ➥ Teleshopping site |
iii ➥ Television on net |
iv ➥ Network of Telephones |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-116➡ All telnet operations are sent as__ |
i ➥ 32 bits |
ii ➥ 4 bits |
iii ➥ 8 bits |
iv ➥ 16 bits |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-117➡ In TCP, sending and receiving data is done as__ |
i ➥ Packets |
ii ➥ Lines of data |
iii ➥ Stream of bytes |
iv ➥ Sequence of characters |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-118➡ What is the header size of a UDP packet? |
i ➥ 16 bytes |
ii ➥ 124 bytes |
iii ➥ 8 bytes |
iv ➥ 8 bits |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-119➡ The____field is used to detect errors over the entire user datagram. |
i ➥ source port |
ii ➥ destination port |
iii ➥ checksum |
iv ➥ UDP header |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-120➡ Which of the following is not applicable for IP? |
i ➥ Datagram format |
ii ➥ Packet handling conventions |
iii ➥ Error reporting |
iv ➥ Handle addressing conventions |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-121➡ Which of the following field in IPv4 datagram is not related to fragmentation? |
i ➥ TOS |
ii ➥ Identifier |
iii ➥ Offset |
iv ➥ Flags |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-122➡ Which field helps to check rearrangement of the fragments? |
i ➥ TTL |
ii ➥ Identifier |
iii ➥ Offset |
iv ➥ Flag |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-123➡ In classless addressing, there are no classes but addresses are still granted in |
i ➥ Codes |
ii ➥ Sizes |
iii ➥ Blocks |
iv ➥ IPs |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-124➡ In IPv4 Addresses, classful addressing is replaced with |
i ➥ Classful Advertising |
ii ➥ Classless Advertising |
iii ➥ Classless Addressing |
iv ➥ Classful Addressing |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-125➡ In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called_____ |
i ➥ Compatible address |
ii ➥ Mapped address |
iii ➥ Unspecified address |
iv ➥ Loopback address |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-126➡ Internet Control Message Protocol (ICMP) has been designed to compensate |
i ➥ Host and management queries |
ii ➥ Error-correction |
iii ➥ Error-reporting |
iv ➥ All |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-127➡ Header size of the ICMP message is |
i ➥ 16-bytes |
ii ➥ 16-bits |
iii ➥ 8-bytes |
iv ➥ 8-bits |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-128*➡ ICMP error message will not be generated for a datagram having a special address such as |
i ➥ 127 |
ii ➥ 31.4.5.6 |
iii ➥ 127.0.0.0 |
iv ➥ 222.1 |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-129➡ The source-quench message in ICMP was designed to add a kind of______to the IP. |
i ➥ router control |
ii ➥ switch control |
iii ➥ flow control |
iv ➥ error control |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-130➡ The source-quench message in ICMP was designed to add a kind of_____to the IP. |
i ➥ flow control |
ii ➥ switch control |
iii ➥ router control |
iv ➥ error control |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-131➡ Ethernet frame consists of______ |
i ➥ Default mask |
ii ➥ Network address |
iii ➥ MAC address |
iv ➥ IP address |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon
Ask-132➡ Frames from one LAN can be transmitted to another LAN through the device.. |
i ➥ Repeater |
ii ➥ Modem |
iii ➥ Router |
iv ➥ Bridge |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-133➡ What is the default subnet mask for a class C network? |
i ➥ 255.0.0.0 |
ii ➥ 255.255.0.0 |
iii ➥ 127.0.0.1 |
iv ➥ 255.255.255.0 |
Show Answer With Best Explanation
Answer: iv
Explanation: Upload Soon
Ask-134➡ In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is |
i ➥ 4 bytes |
ii ➥ 2 bytes |
iii ➥ 5 bytes |
iv ➥ 6 bytes |
Show Answer With Best Explanation
Answer: iii
Explanation:
Let.
Total Message size=48 bytes
Packet header=3 bytes
we have 24 packets and each packet carries 2 bytes data with 3 byte header
Now we can say that. Packet size is = 2 byte Data + 3 byte Header =5 bytes
so. answer is 5 bytes
Ask-135➡ In which kind of communication, the destination address in each packet is the same for all duplicate? |
i ➥ Broad casting |
ii ➥ Multiple unicasting |
iii ➥ Multicasting |
iv ➥ Unicasting |
Show Answer With Best Explanation
Answer: i
Explanation: Upload Soon
Ask-*➡ |
i ➥ |
ii ➥ |
iii ➥ |
iv ➥ |
Show Answer With Best Explanation
Answer: iii
Explanation: Upload Soon