Networking Objectives Prepration
-
Upload
adil-farooq -
Category
Documents
-
view
64 -
download
7
description
Transcript of Networking Objectives Prepration
Questions & Answers
C Interview QuestionsC++ QuestionsLinux MCQsC# QuizJava MCQsJavaScript MCQsSAN QuestionsPHP QuestionsPython Quiz
Computer Science Questions
Operating System QuizComputer Architecture MCQsSoftware Architecture MCQsSoftware Engineering MCQsArtificial Intelligence MCQsLISP Programming MCQsDatabase Management MCQsComputer Network MCQsMicroprocessor MCQs
C Programming Examples
Simple C ProgramsC - ArraysC - MatrixC - StringsC - Bitwise OperationsC - Linked ListsC - Stacks & QueuesC - Searching & SortingC - TreesC - StringsC - File HandlingC - Mathematical FunctionsC - Puzzles & GamesC Programs - RecursionC Programs - No Recursion
Java Algorithms
Java - Numerical ProblemsJava - Combinatorial ProblemsJava - Graph Problems
Java - Hard Graph ProblemsJava - Computation GeometryJava - Sets & StringsJava - Data-StructuresJava - Collection API Problems
C++ Algorithms
C++ - Numerical ProblemsC++ - Combinatorial ProblemsC++ - Graph ProblemsC++ - Hard Graph ProblemsC++ - Computation GeometryC++ - Sets & StringsC++ - Data-StructuresC++ - STL Library
C Algorithms
C - Numerical ProblemsC - Combinatorial ProblemsC - Graph ProblemsC - Hard Graph ProblemsC - Computation GeometryC - Sets & StringsC - Data-Structures
advertisements
Computer Networks Questions and Answers
Our Computer Networks questions and answers focuses on all areas of Computer Networks covering 100+ topics in Computer Networks.
Highlights
- 1000+ Multiple Choice Questions & Answers in Computer
Networks with explanations
- Every MCQ set focuses on a specific topic in Computer
Networks
Who should Practice these Computer Networks
Questions?
- Anyone wishing to sharpen their skills on Computer
Networks
- Anyone preparing for aptitude test in Computer
Networks (both objective type and coding written test)
- Anyone preparing for interviews (campus/off-campus
interviews, walk-in interview and company interviews)
- Anyone preparing for entrance examinations and other
competitive examinations
- All – Experienced, Freshers and Students
Here’s list of Questions & Answers on Computer Networks Programming with 100+ topics:
Basics-1 Basics-2 Reference Models Physical Layer Data Link Layer Network Layer Transport Layer Application Layer-1 Application Layer-2 DNS Telnet-1 Telnet-2 World Wide Web HTTP and FTP Ethernet-1 Ethernet-2 Wireless LAN WiMAX Bluetooth ATM and Frame Relay Access Networks Physical Media Multiplexing
Topology Packet Switching and Circuit SwitchingSONET Internet CryptographySecurity In The InternetDelays and LossNetwork AttacksReference ModelsDHCP SSH SMTP-1 SMTP-2 RPC RTP FTP Network UtilitiesHTTP IPv4 IPv6
If you like to learn Computer Networks thoroughly, you should attempt to work on the complete set of Computer Networks questions and answers mentioned above. It will immensely help anyone trying to crack a Computer Networks code or an interview.
Here’s the list of Best Reference Books in Computer
Networks.
Wish you the best in your endeavor to learn and master
Computer Networks!
inShare
advertisements
Read Next:
1. Computer Networks Questions & Answers – Reference Models
2. Computer Networks Questions & Answers – Telnet 3. Computer Networks Questions & Answers – SSH 4. Computer Networks Questions & Answers – Internet 5. Computer Networks Questions & Answers – Reference
Models
Manish Bhojasia, a technology veteran with 18+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer and SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage & Cluster Administration, Advanced C Programming, SAN Storage Technologies, SCSI Internals and Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him below:Google+ | Facebook | Twitter | LinkedIn
Subscribe Newsletter & Posts
SAN Training ISAN Administration IILinux Administration
Advanced C ProgrammingLinux Debugging
Linux ProgrammingLinux IPCs ProgrammingNetwork ProgrammingLinux Multithreading
Linux Kernel ProgrammingLinux Kernel Debugging
Device Drivers BasicsLinux Block Drivers
Linux Network DriversLinux PCI DriversLinux USB Drivers
Linux Video DriversLinux Audio DriversI2C Driver Training
Computer Networks Questions and Answers
Our Computer Networks questions and
answers focuses on all areas of Computer
Networks covering 100+ topics in Computer
Networks.
Highlights
- 1000+ Multiple Choice Questions &
Answers in Computer Networks with
explanations
- Every MCQ set focuses on a specific
topic in Computer Networks
Who should Practice these Computer
Networks Questions?
- Anyone wishing to sharpen their skills
on Computer Networks
- Anyone preparing for aptitude test in
Computer Networks (both objective type
and coding written test)
- Anyone preparing for interviews
(campus/off-campus interviews, walk-in
interview and company interviews)
- Anyone preparing for entrance
examinations and other competitive
examinations
- All – Experienced, Freshers and
Students
Here’s list of Questions & Answers on
Computer Networks Programming
with 100+ topics:
If you like to learn Computer Networks
thoroughly, you should attempt to work on
the complete set of Computer Networks
questions and answers mentioned above. It
will immensely help anyone trying to crack a
Computer Networks code or an interview.
Basics-1
Computer Networks Question & Answers – Basics
This section of our 1000+ Computer Networks MCQs focuses on reference models of computer networks.
1. When collection of various computers seems a single coherent system to its client, then it is calleda) computer networkb) distributed systemc) both (a) and (b)d) none of the mentionedView Answer
Answer:bExplanation:None.
1) Basics-1 Basics-2 Reference Models Physical Layer Data Link Layer Network Layer Transport Layer Application Layer-1 Application Layer-2 DNS Telnet-1 Telnet-2 World Wide Web HTTP and FTP Ethernet-1 Ethernet-2 Wireless LAN WiMAX Bluetooth ATM and Frame Relay Access Networks Physical Media MultiplexingPacket Switching and Circuit Switching SONET Internet Cryptography Security In The Internet Delays and Loss Network Attacks Reference Models DHCP SSH SMTP-1 SMTP-2
2. Two devices are in network ifa) a process in one device is able to exchange information with a process in another deviceb) a process is running on both devicesc) PIDs of the processes running of different devices are samed) none of the mentionedView Answer
Answer:aExplanation:None.
3. Which one of the following computer network is built on the top of another network?a) prior networkb) chief networkc) prime networkd) overlay networkView Answer
Answer:dExplanation:None.
4. In computer network nodes area) the computer that originates the datab) the computer that routes the datac) the computer that terminates the datad) all of the mentionedView Answer
Answer:dExplanation:None.
5. Communication channel is shared by all the machines on the network ina) broadcast networkb) unicast networkc) multicast networkd) none of the mentionedView Answer
6. Bluetooth is an example ofa) personal area networkb) local area networkc) virtual private networkd) none of the mentionedView Answer
Answer:aExplanation:None.
7. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.a) bridgeb) firewallc) routerd) all of the mentionedView Answer
Answer:cExplanation:None.
8. A list of protocols used by a system, one protocol per layer, is calleda) protocol architectureb) protocol stackc) protocol suitd) none of the mentionedView Answer
Answer:bExplanation:None.
9. Network congestion occursa) in case of traffic overloadingb) when a system terminatesc) when connection between two nodes terminatesd) none of the mentionedView Answer
Answer:aExplanation:None.
10. Which one of the following extends a private network across public networks?a) local area networkb) virtual private networkc) enterprise private networkd) storage area networkView Answer
Answer:bExplanation:None.
Computer Networks Questions & Answers – Basics
This set of Computer Networks Questions & Answers focuses on “Basics”.
1) The IETF standards documents are calleda) RFCb) RCFc) IDd) None of the mentionedView Answer
Answer: aExplanation: Request For Comments.
2) In the layer hierarchy as the data packet moves from the upper to the lower layers, headers area) Addedb) Removedc) Rearrangedd) ModifiedView Answer
Answer: aExplanation: Every layer adds its own header to the packet from previous layer.
3) The structure or format of data is calleda) Syntaxb) Semanticsc) Structd) None of the mentionedView Answer
Answer: aExplanation: Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
4) Communication between a computer and a keyboard involves ______________ transmissiona) Automaticb) Half-duplexc) Full-duplexd) SimplexView Answer
Answer: dExplanation: Data flows in single direction.
5) The first Networka) CNNETb) NSFNETc) ASAPNET
d) ARPANETView Answer
6) The _______ is the physical path over which a message travelsa) Ppathb) Mediumc) Protocold) RouteView Answer
Answer: bExplanation: Message travel from sender to reciever via a medium using a protocol.
7) Which organization has authority over interstate and international commerce in the communications field?a) ITU-Tb) IEEEc) FCCd) ISOCView Answer
Answer: cExplanation: None.
8) Which of this is not a network edge device?a) PCb) Smartphonesc) Serversd) SwitchView Answer
Answer: dExplanation: Network egde devices refer to host systems, which can host applications like web browser.
9) A set of rules that governs data communicationa) Protocolsb) Standardsc) RFCsd) None of the mentionedView Answer
Answer: aExplanation: None.
10) Three or more devices share a link in ________ connectiona) Unipoint
b) Multipointc) Point to pointd) None of the mentionedView Answer
Answer: bExplanation: None.
Computer Networks Questions & Answers – Reference Models
This section of our 1000+ Computer Networks MCQs focuses on reference models of computer networks.
1. OSI stands fora) open system interconnectionb) operating system interfacec) optical service implementationd) none of the mentionedView Answer
Answer:aExplanation:None.
2. The OSI model has ___ layers.a) 4b) 5c) 6d) 7View Answer
Answer:dExplanation:None.
3. TCP/IP model does not have ______ layer but OSI model have this layer.a) session layerb) presentation layerc) application layerd) both (a) and (b)View Answer
Answer:dExplanation:None.
4. Which layer links the network support layers and user support layersa) session layerb) data link layerc) transport layer
d) network layerView Answer
Answer:cExplanation:Physical, data link and network layers are network support layers and session, presentation and application layers are user support layers.
5. Which address is used in an internet employing the TCP/IP protocols?a) physical address and logical addressb) port addressc) specific addressd) all of the mentionedView Answer
Answer:dExplanation:None.
6. TCP/IP model was developed _____ the OSI model.a) prior tob) afterc) simultaneous tod) none of the mentionedView Answer
Answer:aExplanation:None.
7. Which layer is responsible for process to process delivery?a) network layerb) transport layerc) session layerd) data link layerView Answer
Answer:bExplanation:None.
8. Which address identifies a process on a host?a) physical addressb) logical addressc) port addressd) specific addressView Answer
Answer:cExplanation:None.
9. Which layer provides the services to user?a) application layerb) session layerc) presentation layerd) none of the mentionedView Answer
Answer:aExplanation:None.
10. Transmission data rate is decided bya) network layerb) physical layerc) data link layerd) transport layerView Answer
Answer:bExplanation:None
Computer Networks Questions & Answers – Physical Layer
This section of our 1000+ Computer Networks MCQs focuses on physical layer.
1. The physical layer concerns witha) bit-by-bit deliveryp) process to process deliveryc) application to application deliveryd) none of the mentionedView Answer
Answer:aExplanation:None.
2. Which transmission media has the highest transmission speed in a network?a) coaxial cableb) twisted pair cablec) optical fiberd) electrical cableView Answer
Answer:cExplanation:None.
3. Bits can be send over guided and unguided media as analog signal bya) digital modulation
b) amplitude modulationc) frequency modulationd) phase modulationView Answer
Answer:aExplanation:None.
4. The portion of physical layer that interfaces with the media access control sublayer is calleda) physical signalling sublayerb) physical data sublayerc) physical address sublayerd) none of the mentionedView Answer
Answer:aExplanation:None.
5. physical layer providesa) mechanical specifications of electrical connectors and cablesb) electrical specification of transmission line signal levelc) specification for IR over optical fiberd) all of the mentionedView Answer
Answer:dExplanation:None.
6. In asynchronous serial communication the physical layer providesa) start and stop signallingb) flow controlc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
7. The physical layer is responsible fora) line codingb) channel codingc) modulationd) all of the mentionedView Answer
Answer:dExplanation:None.
8. The physical layer translates logical communication requests from the ______ into hardware specific operations.a) data link layerb) network layerc) trasnport layerd) application layerView Answer
Answer:aExplanation:None.
9. A single channel is shared by multiple signals bya) analog modulationb) digital modulationc) multiplexingd) none of the mentionedView Answer
Answer:cExplanation:None.
10. Wireless transmission can be done viaa) radio wavesb) microwavesc) infraredd) all of the mentionedView Answer
Answer:dExplanation:None
Computer Networks Questions & Answers – Data Link Layer
This section of our 1000+ Computer Networks MCQs focuses on data link layer.
1. The data link layer takes the packets from _____ and encapsulates them into frames for transmission.a) network layerb) physical layerc) transport layerd) application layerView Answer
Answer:aExplanation:None.
2. Which one of the following task is not done by data link layer?a) framingb) error controlc) flow controld) channel codingView Answer
Answer:dExplanation:None.
3. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?a) logical link control sublayerb) media access control sublayerc) network interface control sublayerd) none of the mentionedView Answer
Answer:bExplanation:None.
4. Header of a frame generally containsa) synchronization bytesb) addressesc) frame identifierd) all of the mentionedView Answer
Answer:dExplanation:None.
5. Automatic repeat request error management mechanism is provided bya) logical link control sublayerb) media access control sublayerc) network interface control sublayerd) none of the mentionedView Answer
Answer:aExplanation:None.
6. When 2 or more bits in a data unit has been changed during the transmission, the error is calleda) random errorb) burst errorc) inverted errord) none of the mentionedView Answer
Answer:bExplanation:None.
7. CRC stands fora) cyclic redundancy checkb) code repeat checkc) code redundancy checkd) cyclic repeat checkView Answer
Answer:aExplanation:None.
8. Which one of the following is a data link protocol?a) ethernetb) point to point protocolc) HDLCd) all of the mentionedView Answer
Answer:dExplanation:None.
9. Which one of the following is the multiple access protocol for channel access control?a) CSMA/CDb) CSMA/CAc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
10. The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is calleda) piggybackingb) cyclic redundancy checkc) fletcher’s checksumd) none of the mentionedView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – Network Layer
This section of our 1000+ Computer Networks MCQs focuses on network layer.
1. The network layer concerns witha) bitsb) framesc) packetsd) none of the mentionedView Answer
Answer:cExplanation:None.
2. Which one of the following is not a function of network layer?a) routingb) inter-networkingc) congestion controld) none of the mentionedView Answer
Answer:dExplanation:None.
3. The 4 byte IP address consists ofa) network addressb) host addressc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
4. In virtual circuit network each packet containsa) full source and destination addressb) a short VC numberc) both (a) and (b)d) none of the mentionedView Answer
Answer:bExplanation:None.
5. Which one of the following routing algorithm can be used for network layer design?a) shortest path algorithmb) distance vector routingc) link state routing
d) all of the mentionedView Answer
Answer:dExplanation:None.
6. Multidestination routinga) is same as broadcast routingb) contains the list of all destinationsc) data is not sent by packetsd) none of the mentionedView Answer
Answer:cExplanation:None.
7. A subset of a network that includes all the routers but contains no loops is calleda) spanning treeb) spider structurec) spider treed) none of the mentionedView Answer
Answer:aExplanation:None.
8. Which one of the following algorithm is not used for congestion control?a) traffic aware routingb) admission controlc) load sheddingd) none of the mentionedView Answer
Answer:dExplanation:None.
9. The network layer protocol of internet isa) ethernetb) internet protocolc) hypertext transfer protocold) none of the mentionedView Answer
Answer:bExplanation:None.
10. ICMP is primarily used fora) error and diagnostic functions
b) addressingc) forwardingd) none of the mentionedView Answer
Answer:aExplanation:None
Computer Networks Questions & Answers – Transport Layer
This section of our 1000+ Computer Networks MCQs
focuses transport layer.1. Transport layer aggregates data from different applications into a single stream before passing it toa) network layerb) data link layerc) application layerd) physical layerView Answer
Answer:aExplanation:None.
2. Which one of the following is a transport layer protocol used in internet?a) TCPb) UDPc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
3. User datagram protocol is called connectionless becausea) all UDP packets are treated independently by transport layerb) it sends data as a stream of related packetsc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
4. Transmission control protocol isa) connection oriented protocol
b) uses a three way handshake to establish a connectionc) recievs data from application as a single streamd) all of the mentionedView Answer
Answer:dExplanation:None.
5. An endpoint of an inter-process communication flow across a computer network is calleda) socketb) pipec) portd) none of the mentionedView Answer
Answer:aExplanation:None.
6. Socket-style API for windows is calleda) wsockb) winsockc) winsd) none of the mentionedView Answer
Answer:bExplanation:None.
7. Which one of the following is a version of UDP with congestion control?a) datagram congestion control protocolb) stream control transmission protocolc) structured stream transportd) none of the mentionedView Answer
Answer:aExplanation:None.
8. A _____ is a TCP name for a transport service access point.a) portb) pipec) noded) none of the mentionedView Answer
Answer:aExplanation:None.
9. Transport layer protocols deals witha) application to application communicationb) process to process communicationc) node to node communicationd) none of the mentionedView Answer
Answer:bExplanation:None.
10. Which one of the following is a transport layer protocol?a) stream control transmission protocolb) internet control message protocolc) neighbor discovery protocold) dynamic host configuration protocolView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – Application Layer
This section of our 1000+ Computer Networks MCQs
focuses on application layer.1. The ____ translates internet domain and host names to IP address.a) domain name systemb) routing information protocolc) network time protocold) internet relay chatView Answer
Answer:aExplanation:None.
2. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?a) HTTPb) FTPc) telnetd) none of the mentionedView Answer
Answer:cExplanation:None.
3. Application layer protocol definesa) types of messages exchangedb) message format, syntax and semanticsc) rules for when and how processes send and respond to messagesd) all of the mentionedView Answer
Answer:dExplanation:None.
4. Which one of the following protocol delivers/stores mail to reciever server?a) simple mail transfer protocolb) post office protocolc) internet mail access protocold) hypertext transfer protocolView Answer
Answer:aExplanation:None.
5. The ASCII encoding of binary data is calleda) base 64 encodingb) base 32 encodingc) base 16 encodingd) base 8 encodingView Answer
Answer:aExplanation:None.
6. Which one of the following is an internet standard protocol for managing devices on IP network?a) dynamic host configuration protocolb) simple newtwork management protocolc) internet message access protocold) media gateway protocolView Answer
Answer:bExplanation:None.
7. Which one of the following is not an application layer protocol?a) media gateway protocolb) dynamic host configuration protocolc) resource reservation protocold) session initiation protocolView Answer
Answer:cExplanation:None.
8. Which protocol is a signalling communication protocol used for controlling multimedia communication sessions?a) session initiation protocolb) session modelling protocolc) session maintenance protocold) none of the mentionedView Answer
Answer:aExplanation:None.
9. Which one of the following is not correct?a) application layer protocols are used by both source and destination devices during a communication sessionb) application layer protocols implemented on the source and destination host must matchc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
10. When displaying a web page, the application layer uses thea) HTTP protocolb) FTP protocolc) SMTP protocold) none of the mentionedView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – Application Layer
This set of Computer Networks Questions & Answers
focuses on “Application Layer”.1) This is not a application layer protocola) HTTPb) SMTPc) FTPd) TCPView Answer
Answer: dExplanation: TCP is transport layer protocol
2) The packet of information at the application layer is calleda) Packetb) Messagec) Segmentd) FrameView Answer
Answer: bExplanation: None.
3) This is one of the architecture paradigma) Peer to peerb) Client-serverc) HTTPd) Both a and bView Answer
Answer: dExplanation: HTTP is a protocol.
4) Application developer has permission to decide the following on transport layer sidea) Transport layer protocolb) Maximum buffer sizec) Both of the mentionedd) None of the mentionedView Answer
Answer: cExplanation: None.
5) Application layer offers _______ servicea) End to endb) Process to processc) Both of the mentionedd) None of the mentionedView Answer
Answer: aExplanation: None.
6) E-mail isa) Loss-tolerant applicationb) Bandwidth-sensitive applicationc) Elastic application
d) None of the mentionedView Answer
Answer: cExplanation: Because it can work with available throughput.
7) Pick the odd one outa) File transferb) File downloadc) E-maild) Interactive gamesView Answer
Answer: dExplanation: Internet telephony is Loss-tolerant other applications are not.
8) Which of the following is an application layer service ?a) Network virtual terminalb) File transfer, access, and managementc) Mail serviced) All of the mentionedView Answer
Answer: dExplanation: None.
9) To deliver a message to the correct application program running on a host, the _______ address must be consulteda) IPb) MACc) Portd) None of the mentionedView Answer
Answer: cExplanation: None.
10) This is a time-sensitive servicea) File transferb) File downloadc) E-maild) Internet telephonyView Answer
Answer: dExplanation: Internet telephony is Loss-tolerant other applications are not.
11) Transport services available to applications in one or another forma) Reliable data transferb) Timingc) Securityd) All of the mentionedView Answer
Answer: dExplanation: None.
12) Electronic mail uses this Application layer protocola) SMTPb) HTTPc) FTPd) SIPView Answer
Answer: aExplanation: None.
Computer Networks Questions & Answers – DNS
This section of our 1000+ Computer Networks MCQs
focuses on Domain Name System.1. The entire hostname has a maximum ofa) 255 charactersb) 127 charactersc) 63 charactersd) 31 charactersView Answer
Answer:aExplanation:None.
2. A DNS client is calleda) DNS updaterb) DNS resolverc) DNS handlerd) none of the mentionedView Answer
Answer:bExplanation:None.
3. Servers handle requests for other domainsa) directlyb) by contacting remote DNS server
c) it is not possibled) none of the mentionedView Answer
Answer:bExplanation:None.
4. DNS database containsa) name server recordsb) hostname-to-address recordsc) hostname aliasesd) all of the mentionedView Answer
Answer:dExplanation:None.
5. If a server has no clue about where to find the address for a hostname thena) server asks to the root serverb) server asks to its adjcent serverc) request is not processedd) none of the mentionedView Answer
Answer:aExplanation:None.
6. Which one of the following allows client to update their DNS entry as their IP address change?a) dynamic DNSb) mail transfer agentc) authoritative name serverd) none of the mentionedView Answer
Answer:aExplanation:None.
7. Wildcard domain names start with labela) @b) *c) &d) #View Answer
Answer:bExplanation:None.
8. The right to use a domain name is delegated by domain name registers which are accredited bya) internet architecture boardb) internet societyc) internet research task forced) internet corporation for assigned names and numbersView Answer
Answer:dExplanation:None.
9. The domain name system is maintained bya) distributed database systemb) a single serverc) a single computerd) none of the mentionedView Answer
Answer:aExplanation:None.
10. Which one of the following is not true?a) multiple hostnames may correspond to a single IP addressb) a single hostname may correspond to many IP addressesc) a single hostname may correspond to a single IP addressd) none of the mentionedView Answer
Answer:cExplanation:None.
Computer Networks Questions & Answers – Telnet
This section of our 1000+ Computer Networks MCQs focuses on telnet.
1. Telnet protocol is used to establish a connection toa) TCP port number 21b) TCP port number 22c) TCP port number 23d) TCP port number 24View Answer
Answer:cExplanation:None.
2. Which one of the following is not true?a) telnet defines a network virtual terminal (NVT) standardb) client programs interact with NVTc) server translates NVT operationsd) none of the mentionedView Answer
Answer:dExplanation:None.
3. All telnet operations are sent asa) 4 bytesb) 8 bytesc) 16 bytesd) 32 bytesView Answer
Answer:bExplanation:None.
4. AbsoluteTelnet is a telnet client fora) windowsb) linuxc) macd) none of the mentionedView Answer
Answer:aExplanation:None.
5. The decimal code of interpret as command (IAC) character isa) 252b) 253c) 254d) 255View Answer
Answer:dExplanation:None.
6. In character mode operation of telnet implementationa) each character typed is sent by the client to the serverb) each character typed is discarded by the serverc) both (a) an (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
7. In telnet, the client echoes the character on the screen but does not send it until a whole line is completed ina) default modec) character modec) server moded) none of the mentionedView Answer
Answer:aExplanation:None.
8. Which one of the following is not correct?a) telnet is a general purpose client-server programb) telnet lets user access an application on a remote computerc) telnet can also be used for file transferd) none of the mentionedView Answer
Answer:cExplanation:None.
9. Which operating mode of telnet is full duplex?a) default modeb) server modec) line moded) none of the mentionedView Answer
Answer:cExplanation:None.
10. If we want that a character be interpreted by the client instead of servera) escape character has to be usedb) control functions has to be disabledc) it is not possibled) none of the mentionedView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – Telnet
This set of Computer Networks Questions & Answers focuses on “Telnet”.
1) The protocol used by Telnet application isa) Telnetb) FTPc) HTTPd) None of the mentionedView Answer
Answer: aExplanation: None.
2) In “character at a time” modea) Character processing is done on the local system under the control of the remote systemb) Most text typed is immediately sent to the remote host for processingc) All text is echoed locally, only completed lines are sent to the remote hostd) None of the mentionedView Answer
Answer: bExplanation: None.
3) _______ allows you to connect and login to a remote computera) Telnetb) FTPc) HTTPd) None of the mentionedView Answer
Answer: aExplanation: None.
4) The correct syntax to be written in the web browser to Telnet to www.sanfoundry.com isa) telnet//www.sanfoundry.comb) telnet:www.sanfoundry.comc) telnet://www.sanfoundry.comd) telnet www.sanfoundry.comView Answer
Answer: cExplanation: None.
5) Telnet is aa) Television on netb) Network of Telephonesc) Remote Login
d) Teleshopping siteView Answer
Answer: cExplanation: None.
Computer Networks Questions & Answers – World Wide Web
This section of our 1000+ Computer Networks MCQs focuses on World Wide Web.
1. A piece of icon or image on a web page associated with another webpage is calleda) urlb) hyperlinkc) plugind) none of the mentionedView Answer
Answer:bExplanation:None.
2. Dynamic web pagea) is same every time whenever it displaysb) generates on demand by a program or a request from browserc) both (a) and (b)d) none of the mentionedView Answer
Answer:bExplanation:None.
3. What is a web browser?a) a program that can display a web pageb) a program used to view html documentsc) it enables user to access the resources of internetd) all of the mentionedView Answer
Answer:dExplanation:None.
4. Common gateway interface is used toa) generate executable files from web content by web serverb) generate web pagesc) stream videos
d) none of the mentionedView Answer
Answer:aExplanation:None.
5. URL stands fora) unique reference labelb) uniform reference labelc) uniform resource locatord) unique resource locatorView Answer
Answer:cExplanation:None.
6. A web cookie is a small piece of dataa) sent from a website and stored in user’s web browser while a user is browsing a websiteb) sent from user and stored in the server while a user is browsing a websitec) sent from root server to all serversd) none of the mentionedView Answer
Answer:aExplanation:None.
7. Which one of the following is not used to generate dynamic web pages?a) PHPb) ASP.NETc) JSPd) none of the mentionedView Answer
Answer:dExplanation:None.
8. An alternative of javascript on windows platform isa) VBScriptb) ASP.NETc) JSPd) none of the mentionedView Answer
Answer:aExplanation:None.
9. What is document object model (DOM)?a) convention for representing and interacting with objects in html documentsb) application programming interfacec) hierarchy of objects in ASP.NETd) none of the mentionedView Answer
Answer:aExplanation:None.
10. AJAX stands fora) asynchronous javascript and xmlb) advanced JSP and xmlc) asynchronous JSP and xmld) advanced javascript and xmlView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – HTTP & FTP
This section of our 1000+ Computer Networks MCQs focuses on HTTP & FTP protocols.
1. Multiple object can be sent over a TCP connection between client and server ina) persistent HTTPb) nonpersistent HTTPc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
2. HTTP is ________ protocol.a) application layerb) transport layerc) network layerd) none of the mentionedView Answer
Answer:aExplanation:None.
3. In the network HTTP resources are located bya) uniform resource identifierb) unique resource locatorc) unique resource identifierd) none of the mentionedView Answer
Answer:aExplanation:None.
4. HTTP client requests by establishing a __________ connection to a particular port on the server.a) user datagram protocolb) transmission control protocolc) broader gateway protocold) none of the mentionedView Answer
Answer:bExplanation:None.
5. In HTTP pipelininga) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responsesb) multiple HTTP requests can not be sent on a single TCP connectionc) multiple HTTP requests are sent in a queue on a single TCP connectiond) none of the mentionedView Answer
Answer:aExplanation:None.
6. FTP server listens for connection on port numbera) 20b) 21c) 22d) 23View Answer
Answer:bExplanation:None.
7. In FTP protocol, client contacts server using ____ as the transport protocol.a) transmission control protocolb) user datagram protocolc) datagram congestion control protocol
d) stream control transmission protocolView Answer
Answer:aExplanation:None.
8. In which mode FTP, the client initiates both the control and data connections.a) active modeb) passive modec) both (a) and (b)d) none of the mentionedView Answer
Answer:bExplanation:None.
9. The file transfer protocol is built ona) data centric architectureb) service oriented architecturec) client server architectured) none of the mentionedView Answer
Answer:cExplanation:None.
10. In file transfer protocol, data transfer can be done ina) stream modeb) block modec) compressed moded) all of the mentionedView Answer
Answer:dExplanation:None.
Computer Networks Questions & Answers – Ethernet
This section of our 1000+ Computer Networks MCQs focuses on Ethernet.
1. Ethernet frame consists ofa) MAC addressb) IP addressc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
2. What is stat frame delimeter (SFD) in ethernet frame?a) 10101010b) 10101011c) 00000000d) 11111111View Answer
Answer:bExplanation:None.
3. MAC address is of1) 24 bitsb) 36 bitsc) 42 bitsd) 48 bitsView Answer
Answer:dExplanation:None.
4. What is autonegotiation?a) a procedure by which two connected devices choose common transmission parametersb) a security algorithmc) a routing algorithmd) none of the mentionedView Answer
Answer:aExplanation:None.
5. Ethernet in metropolitan area network (MAN) can be used asa) pure ethernetb) ethernet over SDHc) ethernet over MPLSd) all of the mentionedView Answer
Answer:dExplanation:None.
6. A point-to-point protocol over ethernet is a network protocol fora) encapsulating PPP frames inside ethernet framesb) encapsulating ehternet framse inside PPP framesc) for security of ethernet frames
d) for security of PPP framesView Answer
Answer:aExplanation:None.
7. High speed ethernet works ona) coaxial cableb) twisted pair cablec) optical fiberd) none of the mentionedView Answer
Answer:cExplanation:None.
8. The maximum size of payload field in ethernet frame isa) 1000 bytesb) 1200 bytesc) 1300 bytesd) 1500 bytesView Answer
Answer:dExplanation:None.
9. What is interframe gap?a) idle time between framesb) idle time between frame bitsc) idle time between packetsd) none of the mentionedView Answer
Answer:aExplanation:None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is calleda) short frameb) run framec) mini framed) man frameView Answer
Answer:bExplanation:None
Computer Networks Questions & Answers – Ethernet
This section of our 1000+ Computer Networks MCQs focuses on Ethernet.
1. Ethernet frame consists ofa) MAC addressb) IP addressc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
2. What is stat frame delimeter (SFD) in ethernet frame?a) 10101010b) 10101011c) 00000000d) 11111111View Answer
Answer:bExplanation:None.
3. MAC address is of1) 24 bitsb) 36 bitsc) 42 bitsd) 48 bitsView Answer
Answer:dExplanation:None.
4. What is autonegotiation?a) a procedure by which two connected devices choose common transmission parametersb) a security algorithmc) a routing algorithmd) none of the mentionedView Answer
Answer:aExplanation:None.
5. Ethernet in metropolitan area network (MAN) can be used asa) pure ethernetb) ethernet over SDHc) ethernet over MPLS
d) all of the mentionedView Answer
Answer:dExplanation:None.
6. A point-to-point protocol over ethernet is a network protocol fora) encapsulating PPP frames inside ethernet framesb) encapsulating ehternet framse inside PPP framesc) for security of ethernet framesd) for security of PPP framesView Answer
Answer:aExplanation:None.
7. High speed ethernet works ona) coaxial cableb) twisted pair cablec) optical fiberd) none of the mentionedView Answer
Answer:cExplanation:None.
8. The maximum size of payload field in ethernet frame isa) 1000 bytesb) 1200 bytesc) 1300 bytesd) 1500 bytesView Answer
Answer:dExplanation:None.
9. What is interframe gap?a) idle time between framesb) idle time between frame bitsc) idle time between packetsd) none of the mentionedView Answer
Answer:aExplanation:None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is calleda) short frame
b) run framec) mini framed) man frameView Answer
Answer:bExplanation:None.
Computer Networks Questions & Answers – Wireless LAN
This section of our 1000+ Computer Networks MCQs focuses on Wireless LAN.
1. What is the access point (AP) in wireless LAN?a) device that allows wireless devices to connect to a wired networkb) wireless devices itselfc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
2. In wireless ad-hoc networka) access point is not requiredb) access point is mustc) nodes are not requiredd) none of the mentionedView Answer
Answer:aExplanation:None.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?a) CDMAb) CSMA/CAc) ALOHAd) none of the mentionedView Answer
Answer:bExplanation:None.
4. In wireless distribution systema) multiple access point are inter-connected with each other
b) there is no access pointc) only one access point existsd) none of the mentionedView Answer
Answer:aExplanation:None.
5. A wireless network interface controller can work ina) infrastructure modeb) ad-hoc modec) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.
6. In wireless network an extended service set is a set ofa) connected basic service setsb) all stationsc) all access pointsd) none of the mentionedView Answer
Answer:aExplanation:None.
7. Mostly ________ is used in wireless LAN.a) time division multiplexingb) orthogonal frequency division multiplexingc) space division multiplexingd) none of the mentionedView Answer
Answer:bExplanation:None.
8. Which one of the following event is not possible in wireless LAN.a) collision detectionb) Acknowledgement of data framesc) multi-mode data transmissiond) none of the mentionedView Answer
Answer:aExplanation:None.
9. What is Wired Equivalent Privacy (WEP) ?a) security algorithm for ethernetb) security algorithm for wireless networksc) security algorithm for usb communicationd) none of the mentionedView Answer
Answer:bExplanation:None.
10. What is WPA?a) wi-fi protected accessb) wired protected accessc) wired process accessd) wi-fi process accessView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – WiMAX
This section of our 1000+ Computer Networks MCQs focuses on WiMAX.
1. WiMAX stands fora) wireless maximum communicationb) worldwide interoperability for microwave accessc) worldwide international standard for microwave accessd) none of the mentionedView Answer
Answer:bExplanation:None.
2. WiMAX providesa) simplex communicationb) half duplex communicationc) full duplex communicationd) none of the mentionedView Answer
Answer:cExplanation:None.
3. WiMAX uses thea) orthogonal frequency division multiplexingb) time division multiplexing
c) space division multiplexingd) all of the mentionedView Answer
Answer:aExplanation:None.
4. Which one of the following modulation scheme is supported by WiMAX?a) binary phase shift keying modulationb) quadrature phase shift keying modulationc) quadrature amplitude modulationd) all of the mentionedView Answer
Answer:dExplanation:None.
5. WiMAX MAC layer provides an interface betweena) higher transport layers and physical layerb) application layer and network layerc) data link layer and network layerd) none of the mentionedView Answer
Answer:aExplanation:None.
6. For encryption, WiMAX supportsa) advanced encryption standardb) triple data encryption standardc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
7. WiMAX providesa) VoIP servicesb) IPTV servicesc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
8. Devices that provide the connectivity to a WiMAX network are known as
a) subscriber stationsb) base stationsc) gatewayd) none of the mentionedView Answer
Answer:aExplanation:None.
9. WiMAX is mostly used fora) local area networkb) metropolitan area networkc) personal area networkd) none of the mentionedView Answer
Answer:bExplanation:None.
10. Which one of the following frequency is not used in WiMAX for communication?a) 2.3 GHzb) 2.4 GHzc) 2.5 GHzd) 3.5 GHzView Answer
Answer:bExplanation:None.
Computer Networks Questions & Answers – Bluetooth
This section of our 1000+ Computer Networks MCQs focuses on Bluetooth.
1. An interconnected collection of piconet is calleda) scatternetb) micronetc) mininetd) none of the mentionedView Answer
Answer:aExplanation:Piconet is the basic unit of bluetooth system having a master node and upto seven active slave nodes.
2. In a piconet, there can be up to _____ parked nodes in the net.
a) 63b) 127c) 255d) 511View Answer
Answer:cExplanation:None.
3. Bluetooth is the wireless technology fora) local area networkb) personal area networkc) both (a) and (b)d) none of the mentionedView Answer
Answer:bExplanation:None.
4. Bluetooth usesa) frequency hoping spread spectrumb) orthogonal frequency division multiplexingc) time division multiplexingd) none of the mentionedView Answer
Answer:aExplanation:None.
5. Unauthorised access of information from a wireless device through a bluetooth connection is calleda) bluemakingb) bluesnarfingc) bluestringd) none of the mentionedView Answer
Answer:bExplanation:None.
6. What is A2DP (advanced audio distribution profile)?a) a bluetooth profile for streaming audiob) a bluetooth profile for streaming videoc) a bluetooth profile for securityd) none of the mentionedView Answer
Answer:aExplanation:None.
7. In the piconet of bluetooth one master devicea) can not be slaveb) can be slave in another piconetc) can be slave in the same piconetd) none of the mentionedView Answer
Answer:bExplanation:None.
8. Bluetooth transceiver devices operate in ______ band.a) 2.4 GHz ISMb) 2.5 GHz ISMc) 2.6 GHz ISMd) 2.7 GHz ISMView Answer
Answer:aExplanation:None.
9. The bluetooth supportsa) point-to-point connectionsb) point-to-multipoint connectionc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
10. A scatternet can have maximuma) 10 piconetsb) 20 piconetsc) 30 piconetsd) 40 piconetsView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – ATM & Frame Relay
This section of our 1000+ Computer Networks MCQs focuses on ATM & Frame Relay.
1. ATM and frame relay area) virtual circuit networksb) datagram networks
c) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:ATM stands for asynchronous transfer mode.
2. ATM uses thea) asynchronous frequency division multiplexingb) asynchronous time division multiplexingc) asynchronous space division multiplexingd) none of the mentionedView Answer
Answer:bExplanation:None.
3. ATM standard defines ____ layers.a) 2b) 3c) 4d) 5View Answer
Answer:bExplanation:Three layers are physical layer, ATM layer and application adoption layer.
4. ATM can be used fora) local area networkb) wide area networkc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
5. An ATM cell has the payload field ofa) 32 bytesb) 48 bytesc) 64 bytesd) 128 bytesView Answer
Answer:bExplanation:None.
6. Frame relay has error detection at thea) physical layer
b) data link layerc) network layerd) transport layerView Answer
Answer:bExplanation:None.
7. Virtual circuit identifier in frame relay is calleda) data link connection identifierb) frame relay identifierc) cell relay identifierd) none of the mentionedView Answer
Answer:aExplanation:None.
8. Frame relay has onlya) physical layerb) data link layerc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
9. In frame relay networks, extended address is useda) to increase the range of data link connection identifiersb) for error detectionc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
10. What is FRAD in frame relay network?a) FRAD assembles and disassembles the frames coming from other protocolsb) FRAD is used for modulation and demodulationc) FRAD is used for error detectiond) none of the mentionedView Answer
Answer:aExplanation:FRAD stands for frame relay assembler/disassembler.
Computer Networks Questions & Answers – Access Networks
This set of Computer Networks Questions & Answers focuses on “Access Networks”.
1) Which of this is not a constituent of residential telephone line?a) A high-speed downstream channelb) A medium-speed downstream channelc) A low-speed downstream channeld) None of the mentionedView Answer
Answer: cExplanation: The third part is ordinary two way telephone channel.
2) In DSL telco provides these servicesa) Wired phone accessb) ISPc) All of the mentionedd) None of the mentionedView Answer
Answer: cExplanation: The same company which provides phone connection is also its ISP in DSL.
3) The function of DSLAM isa) Convert analog signals into digital signalsb) Convert digital signals into analog signalsc) Amplify digital signalsd) None of the mentionedView Answer
Answer: aExplanation: The DSLAM located in telco’s Central Office does this function.
4) The following term is not associted with DSLa) DSLAMb) COc) Splitterd) CMTSView Answer
Answer: dExplanation: Cable modem termination system is used in cable internet access.
5) HFC containsa) Fibre cableb) Coaxial cablec) Both of the mentionedd) None of the mentionedView Answer
Answer: cExplanation: None.
6) Choose the statement which is not applicable for cable internet accessa) It is a shared broadcast mediumb) It includes HFCsc) Cable modem connects home PC to Ethernet portd) Analog signal is converted to digital signal in DSLAMView Answer
Answer: dExplanation: In cable access analog signal is converted to digital signal by CMTS.
7) Among the optical-distribution architectures that is essentially switched ehternet isa) AONb) PONc) NONd) None of the mentionedView Answer
Answer:aExplanation: Active optical networks are essentially switched ehternets.
8) StarBand providesa) FTTH internet accessb) Cable accessc) Telephone accessd) Satellite accessView Answer
Answer: dExplanation: None.
9) Home Access is provided bya) DSL
b) FTTPc) Cabled) All of the mentionedView Answer
Answer: dExplanation: None.
10) ONT is connected to splitter usinga) High speed fibre cableb) HFCc) Optical cabled) None of the mentionedView Answer
Answer: cExplanation: None.
11) These factors affect transmission rate in DSLa) The gauge of the twisted-pair lineb) Degree of electrical interfernecec) Shadow fadingd) Both a and bView Answer
Answer: dExplanation: Because DSL is made of twisted wire copper pair.
Computer Networks Questions & Answers – Physical Media
This set of Computer Networks Questions & Answers focuses on “Physical Media”.
1) Which of this is not a guided media ?a) Fiber optical cableb) Coaxial cablec) Wireless LANd) Copper wireView Answer
Answer: cExplanation: Wireless LAN is unguided media.
2) UTP is commonly used ina) DSLb) FTTPc) HTTP
d) None of the mentionedView Answer
Answer: aExplanation: Unshielded twisted pair(UTP) is commonly used in home access.
3) Coaxial cable consists of _______ concentric copper conductors.a) 1b) 2c) 3d) 4View Answer
Answer: bExplanation: None.
4) Fiber optics posses following propertiesa) Immune electromagnetic interferenceb) Very less signal attenuationc) Very hard to tapd) All of the mentionedView Answer
Answer: dExplanation: None.
5) If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps),a) n*39.8b) n*51.8c) 2n*51.8d) None of the mentionedView Answer
Answer: bExplanation: None.
6) Terrestrial radio channels are broadly classifed into _____ groups.a) 2b) 3c) 4d) 1View Answer
Answer: bExplanation: The three types are those that operate over
very short distance, those that operate in local areas, those that operate in the wide area.
7) Radio channels are attractive medium becausea) Can penetrate wallsb) Connectivity can be given to mobile userc) Can carry signals for long distanced) All of the mentionedView Answer
Answer: dExplanation: None.
8) Geostationary satellitesa) Are placed at a fixed point above the earthb) Rotate the earth about a fixed axisc) Rotate the earth about a varying axisd) All of the mentionedView Answer
Answer: aExplanation: They are placed in orbit at 36,000km above Earth’s surface.
Computer Networks Questions & Answers – Multiplexing
This set of Computer Networks Questions & Answers focuses on “Multiplexing”.
1) The sharing of a medium and its link by two or more devices is called _______a) Fully duplexingb) Multiplexingc) Both a and bd) None of the mentionedView Answer
Answer: bExplanation: None.
2) Multiplexing is used in _______a) Packet switchingb) Circuit switchingc) Data switchingd) None of the mentionedView Answer
Answer: bExplanation: None.
3) Which multiplexing technique transmits digital signals ?a) FDMb) TDMc) WDMd) None of the mentionedView Answer
Answer: bExplanation: FDM and WDM are used in analog signals.
4) If there are n signal sources of same data rate than TDM link has _______ slotsa) nb) n/2c) n*2d) 2^nView Answer
Answer: aExplanation: Each slot is dedicated to one of the source.
5) If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM isa) 32kbpsb) 500bpsc) 500kbpsd) None of the mentionedView Answer
Answer: aExplanation: Transmission rate= frame rate * number os bits in a slot.
6) The state when dedicated signals are idle are calleda) Death periodb) Poison periodc) Silent periodd) None of the mentionedView Answer
Answer: cExplanation: None.
7) Multiplexing can providea) Efficiencyb) Privacyc) Anti jamming
d) Both a and bView Answer
Answer: dExplanation: None.
8) In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources.a) Greater thanb) Lesser thanc) Equal tod) Equal to or greater thanView Answer
Answer: aExplanation: None.
9) In TDM, slots are further divided intoa) Secondsb) Framesc) Packetsd) None of the mentionedView Answer
Answer: bExplanation: None.
10) Multiplexing technique that shifts each signal to a different carrier frequencya) FDMb) TDMc) Either a or bd) Both a and bView Answer
Answer: aExplanation: FDM stands for Frequency division multiplexing.
Computer Networks Questions & Answers – Topology
This set of Computer Networks Questions & Answers
focuses on “Topology”.
1) Physical or logical arrangement of network isa) Topologyb) Routingc) Networkingd) None of the mentionedView Answer
Answer: aExplanation: None.
2) In this topology there is a central controller or huba) Starb) Meshc) Ringd) BusView Answer
Answer: aExplanation: None.
3) This topology requires multipoint connectiona) Starb) Meshc) Ringd) BusView Answer
Answer: dExplanation: None.
4) Data communication system spanning states, countries, or the whole world isa) LANb) WANc) MANd) None of the mentionedView Answer
Answer: bExplanation:Wide area network(WAN) covers the whole of the world network.
5) Data communication system within a building or campus isa) LANb) WANc) MAN
d) None of the mentionedView Answer
Answer: aExplanation: None.
6) Expand WANa) World area networkb) Wide area networkc) Web area networkd) None of the mentionedView Answer
Answer: b
Computer Networks Questions & Answers – Packet Switching & Circuit Switching
This set of Computer Networks Questions & Answers focuses on “Packet Switching and Circuit Switching”.
1) A local telephone network is an example of a _______ networka) Packet switchedb) Circuit switchedc) both of the mentionedd) none of the mentionedView Answer
Answer: aExplanation: None.
2) Most packet switches use this principlea) Stop and waitb) Store and forwardc) Both of the mentionedd) None of the mentionedView Answer
Answer: bExplanation: The packet switch will not transmit the first bit to outbound link until it recieves the entire packet.
3) If there are N routers from source to destination, total end to end delay in sending packet P(L->number of bits in the packet R-> transmission rate)a) Nb) (N*L)/R
c) (2N*L)/Rd) L/RView Answer
Answer: bExplanation: None.
4) Method(s) to move data through a network of links and switchesa) Packet switchingb) Circuit switchingc) Line switchingd) Both a and bView Answer
Answer: dExplanation: None.
5) The resources needed for communication between end systems are reserved for the duration of session between end systems in ________a) Packet switchingb) Circuit switchingc) Line switchingd) Frequency switchingView Answer
Answer: bExplanation: None.
6) As the resouces are reserved between two communicating end systems in circuit switching, this is achieveda) authenticationb) guaranteed constant ratec) reliabilityd) store and forwardView Answer
Answer: bExplanation: None.
7) In _________ resources are allocated on demand.a) packet switchingb) circuit switchingc) line switchingd) frequency switchingView Answer
Answer: aExplanation: In packet switching there is no reservation.
Computer Networks Questions & Answers – SONET
This section of our 1000+ Computer Networks MCQs focuses on SONET.
1. SONET stands fora) synchronous optical networkb) synchronous operational networkc) stream optical networkd) shell operational networkView Answer
Answer:aExplanation:None.
2. In SONET, STS-1 level of electrical signalling has the data rate ofa) 51.84 Mbpsb) 155.52 Mbpsc) 466.56 Mbpsd) none of the mentionedView Answer
Answer:aExplanation:None.
3. The path layer of SONET is responsible for the movement of a signala) from its optical source to its optical destinationb) across a physical linec) across a physical sectiond) none of the mentionedView Answer
Answer:bExplanation:None.
4. The photonic layer of the SONET is similar to the _____ of OSI model.a) network layerb) data link layerc) physical layerd) none of the mentionedView Answer
Answer:cExplanation:None.
5. In SONET, each synchronous transfer signal STS-n is composed ofa) 2000 framesb) 4000 framesc) 8000 framesd) 16000 framesView Answer
Answer:cExplanation:None.
6. Which one of the following is not true about SONET?a) frames of lower rate can be synchronously time-division multiplexed into a higher-rate frameb) multiplexing is synchronous TDMc) all clocks in the network are locked to a master clockd) none of the mentionedView Answer
Answer:dExplanation:None.
7. A linear SONET network can bea) point-to-pointb) multi-pointc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
8. Automatic protection switching in linear network is defined at thea) line layerb) section layerc) photonic layerd) path layerView Answer
Answer:aExplanation:None.
9. A unidirectional path switching ring is a network witha) one ringb) two ringsc) three ringsd) four ringsView Answer
Answer:bExplanation:One ring is used as the working ring and other as the protection ring.
10. What is SDH?a) SDH is similar standard to SONET developed by ITU-Tb) synchronous digital hierarchyc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
Computer Networks Questions & Answers – Internet
This section of our 1000+ Computer Networks MCQs focuses on Internet.
1. What is internet?a) a single networkb) a vast collection of different networksc) interconnection of local area networksd) none of the mentionedView Answer
Answer:bExplanation:None.
2. To join the internet, the computer has to be connected to aa) internet architecture boardb) internet societyc) internet service providerd) none of the mentionedView Answer
Answer:cExplanation:None.
3. Internet access by transmitting digital data over the wires of a local telephone network is provided bya) leased lineb) digital subscriber linec) digital signal lined) none of the mentionedView Answer
Answer:bExplanation:None.
4. ISP exchanges internet traffic between their networks bya) internet exchange pointb) subscriber end pointc) ISP end pointd) none of the mentionedView Answer
Answer:aExplanation:None.
5. Which one of the following protocol is not used in internet?a) HTTPb) DHCPc) DNSd) none of the mentionedView Answer
Answer:dExplanation:None.
6. IPv6 addressed have a size ofa) 32 bitsb) 64 bitsc) 128 bitsd) 265 bitsView Answer
Answer:cExplanation:None.
7. Internet works ona) packet switchingb) circuit switchingc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
8. Which one of the following is not an application layer protocol used in internet?a) remote procedure callb) internet relay chatc) resource reservation protocol
d) none of the mentionedView Answer
Answer:cExplanation:None.
9. Which protocol assigns IP address to the client connected in the internet?a) DHCPb) IPc) RPCd) none of the mentionedView Answer
Answer:aExplanation:None.
10. Which one of the following is not used in media access control?a) ethernetb) digital subscriber linec) fiber distributed data interfaced) none of the mentionedView Answer
Answer:dExplanation:None.
Computer Networks Questions & Answers – Cryptography
This section of our 1000+ Computer Networks MCQs focuses on Cryptography.
1. In cryptography, what is cipher?a) algorithm for performing encryption and decryptionb) encrypted messagec) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
2. In asymmetric key cryptography, the private key is kept bya) senderb) receiverc) sender and receiver
d) all the connected devices to the networkView Answer
Answer:bExplanation:None.
3. Which one of the following algorithm is not used in asymmetric-key cryptography?a) RSA algorithmb) diffie-hellman algorithmc) electronic code book algorithmd) none of the mentionedView Answer
Answer:cExplanation:None.
4. In cryptography, the order of the letters in a message is rearranged bya) transpositional ciphersb) substitution ciphersc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
5. What is data encryption standard (DES)?a) block cipherb) stream cipherc) bit cipherd) none of the mentionedView Answer
Answer:aExplanation:None.
6. Cryptanalysis is useda) to find some insecurity in a cryptographic schemeb) to increase the speedc) to encrypt the datad) none of the mentionedView Answer
Answer:aExplanation:None.
7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)b) transport layer security (TSL)c) explicit congestion notification (ECN)d) resource reservation protocolView Answer
Answer:bExplanation:None.
8. Voice privacy in GSM cellular telephone protocol is provided bya) A5/2 cipherb) b5/4 cipherc) b5/6 cipherd) b5/8 cipherView Answer
Answer:aExplanation:None
9. ElGamal encryption system isa) symmetric key encryption algorithmb) asymmetric key encryption algorithmc) not an encryption algorithmd) none of the mentionedView Answer
Answer:bExplanation:None.
10. Cryptographic hash function takes an arbitrary block of data and returnsa) fixed size bit stringb) variable size bit stringc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – Security In The Internet
This section of our 1000+ Computer Networks MCQs focuses on Security In The Internet.
1. IPSec is designed to provide the security at thea) transport layerb) network layer
c) application layerd) session layerView Answer
Answer:bExplanation:None.
2. In tunnel mode IPsec protects thea) entire IP packetb) IP headerc) IP payloadd) none of the mentionedView Answer
Answer:aExplanation:None.
3. Network layer firewall works as aa) frame filterb) packet filterc) both (a) and (b)d) none of the mentionedView Answer
Answer:bExplanation:None.
4. Network layer firewall has two sub-categories asa) stateful firewall and stateless firewallb) bit oriented firewall and byte oriented firewallc) frame firewall and packet firewalld) none of the mentionedView Answer
Answer:aExplanation:None.
5. WPA2 is used for security ina) ethernetb) bluetoothc) wi-fid) none of the mentionedView Answer
Answer:cExplanation:None.
6. An attempt to make a computer resource unavailable to its intended users is calleda) denial-of-service attack
b) virus attackc) worms attackd) botnet processView Answer
Answer:aExplanation:None.
7. Extensible authentication protocol is authentication framework frequently used ina) wired personal area networkb) wireless networksc) wired local area networkd) none of the mentionedView Answer
Answer:bExplanation:None.
8. Pretty good privacy (PGP) is used ina) browser securityb) email securityc) FTP securityd) none of the mentionedView Answer
Answer:bExplanation:None.
9. PGP encrypts data by using a block cipher calleda) international data encryption algorithmb) private data encryption algorithmc) intrenet data encryption algorithmd) none of the mentionedView Answer
Answer:aExplanation:None.
10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is calleda) DNS lookupb) DNS hijackingc) DNS spoofingd) none of the mentionedView Answer
Computer Networks Questions & Answers – Delays and Loss
This set of Computer Networks Questions & Answers
focuses on “Delays and Loss”.
1) Which of the following delay is faced by the
packet in travelling from one end system to another
?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
2) For a 10Mbps Ethernet link, if the length of the
packet is 32bits, the transmission delay is(in
milliseconds)
a) 3.2
b) 32
c) 0.32
d) None of the mentioned
View Answer
Answer: a
Explanation: Transmission rate = length / transmission
rate = 32/10 = 3.2milli seconds.
3) The time required to examine the packet’s
header and determine where to direct the packet is
part of
a) Processing delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned
View Answer
Answer: a
Explanation: None.
4) Traffic intensity is given by, where L = number of
bits in the packet a = average rate R = transmission
rate
a) La/R
b) LR/a
c) R/La
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
5) In the transfer of file between server and client, if
the transmission rates along the path is 10Mbps,
20Mbps, 30Mbps, 40Mbps. The throughput is
usually
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
View Answer
Answer: b
Explanation: The throughput is generally the
transmission rate of bottleneck link.
6) If end to end delay is given by dend-end =
N(dproc + dtrans + dprop) is a non congested
network. The number of routers between source
and destination is
a) N/2
b) N
c) N-1
d) 2N
View Answer
Answer: c
Explanation: None.
7) The total nodal delay is given by
a) dnodal = dproc – dqueue + dtrans + dprop
b) dnodal = dproc + dtrans – dqueue
c) dnodal = dproc + dqueue + dtrans + dprop
d) dnodal = dproc + dqueue – dtrans – dprop
View Answer
Answer: c
Explanation: None.
8) In a network, If P is the only packet being
transmitted and there was no earlier transmission,
which of the following delays could be zero
a) Propogation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
View Answer
Answer: b
Explanation: None.
9) Transmission delay does not depend on
a) Packet length
b) Distance between the routers
c) Transmission rate
d) None of the mentioned
View Answer
Answer: b
Explanation: Transmission delay = packet length /
transmission rate
10) Propagation delay depends on
a) Packet length
b) Transmission rate
c) Distance between the routers
d) None of the mentioned
View Answer
Answer: c
Explanation: Propagation delay is the time it takes a bit
to propagate from one router to the next.
Computer Networks Questions & Answers – Network Attacks
This set of Computer Networks Questions & Answers
focuses on “Network Attacks”.
1) The attackers a network of compromised
devices known as
a) Internet
b) Botnet
c) Telnet
d) D-net
View Answer
Answer: b
Explanation: None.
2) Which of the following is a form of DoS attack ?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
3) The DoS attack is which the attacker establishes
a large number of half-open or fully open TCP
connections at the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: c
Explanation: None.
4)The DoS attack is which the attacker sends
deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: b
Explanation: None.
5) Packet sniffers involve
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: They donot inject packets into the channel.
6) Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
7) Firewalls are often configured to block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
Computer Networks Questions & Answers – Reference Models
This set of Computer Networks Questions & Answers
focuses on “Reference Models”.
1) The number of layers in Internet protocol stack
a) 5
b) 7
c) 6
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
2) The number of layers in ISO OSI reference
model
a) 5
b) 7
c) 6
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
3) This layer in an addition to OSI model
a) Application layer
b) Presentation layer
c) Session layer
d) Both b and c
View Answer
Answer: d
Explanation: None.
4) Application layer is implemented in
a) End system
b) NIC
c) Ethernet
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
4) Transport layer is implemented in
a) End system
b) NIC
c) Ethernet
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
5) The functionalities of presentation layer includes
a) Data compression
b) Data encryption
c) Data description
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
6) Delimiting and synchronization of data exchange
is provided by
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
View Answer
Answer: b
Explanation: None.
7) In OSI model, when data is sent from device A to
device B, the 5th layer to recieve data at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Answer: d
Explanation: None.
8) In Internet protocol stack, when data is sent from
device A to device B, the 5th layer to receive data
at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Answer: a
Explanation: None.
9) In the OSI model, as a data packet moves from
the lower to the upper layers, headers are _______
a) Added
b) Removed
c) Rearranged
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
10) Identify the statement which cannot be
associated with OSI model
a) A structured way to discuss and easier update
syatem components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires
information from another layer
d) None of the mentioned
View Answer
Answer: c
Explanation: One layer may use the information from
another layer Ex: time stamp value.Computer Networks Questions & Answers – DHCP
This section of our 1000+ Computer Networks MCQs focuses on DHCP Protocol.
1. DHCP (dynamic host configuration protocol) provides _____ to the client.a) IP addressb) MAC addressc) urld) none of the mentionedView Answer
Answer:aExplanation:None.
2. DHCP is used fora) IPv6b) IPv4c) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
3. The DHCP servera) maintains a database of available IP addressesb) maintains the information about client configuration parametersc) grants a IP address when receives a request from a clientd) all of the mentionedView Answer
Answer:dExplanation:None.
4. IP assigned for a client by DHCP server isa) for a limited periodb) for unlimited periodc) not time dependentd) none of the mentionedView Answer
Answer:aExplanation:None.
5. DHCP uses UDP port ____ for sending data to the server.a) 66b) 67c) 68d) 69View Answer
Answer:bExplanation:None.
6. The DHCP server can provide the _______ of the IP addresses.a) dynamic allocationb) automatic allocationc) static allocationd) all of the mentionedView Answer
Answer:dExplanation:None.
7. DHCP client and servers on the same subnet communicate viaa) UDP broadcastb) UDP unicastc) TCP broadcastd) TCP unicastView Answer
Answer:aExplanation:None.
8. After obtaining the IP address, to prevent the IP conflict the client may usea) internet relay chatb) broader gateway protocolc) address resolution protocold) none of the mentionedView Answer
Answer:cExplanation:None.
9. What is DHCP snooping?a) techniques applied to ensure the security of an existing DHCP infrastructureb) encryption of the DHCP server requestsc) algorithm for DHCPd) none of the mentionedView Answer
Answer:aExplanation:None.
10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.a) MAC address
b) IP addressc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
Computer Networks Questions & Answers – SSH
This section of our 1000+ Computer Networks MCQs focuses on SSH Protocol.
1. Secure shell (SSH) network protocol is used fora) secure data communicationb) remote command-line loginc) remote command executiond) all of the mentionedView Answer
Answer:dExplanation:None.
2. SSH can be used in onlya) unix-like operating systemsb) windowsc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
3. SSH uses _______ to authenticate the remote computer.a) public-key cryptographyb) private-key cryptographyc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
4. Which standard TCP port is assigned for contacting SSH servers?a) port 21b) port 22c) port 23
d) port 24View Answer
Answer:bExplanation:None.
5. Which one of the following protocol can be used for login to a shell on a remote host except SSH?a) telnetb) rloginc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:SSH is more secured then telnet and rlogin.
6. Which one of the following is a file transfer protocol using SSH?a) SCPb) SFTPc) rsyncd) all of the mentionedView Answer
Answer:dExplanation:None.
7. SSH-2 does not containa) transport layerb) user authentication layerc) physical layerd) connection layerView Answer
Answer:cExplanation:None.
8. Which one of the following feature was present in SSH protocol, version 1?a) password changingb) periodic replacement of session keysc) support for public-key certificatesd) none of the mentionedView Answer
Answer:dExplanation:None.
9. SCP protocol is evolved from _____ over SSH.a) RCP protocolb) DHCP protocolc) MGCP protocold) none of the mentionedView Answer
Answer:aExplanation:None.
10. Which one of the following authentication method is used by SSH?a) public-keyb) host basedc) passwordd) all of the mentionedView Answer
Answer:dExplanation:None.
Computer Networks Questions & Answers – SMTP
This section of our 1000+ Computer Networks MCQs focuses on SMTP Protocol.
1. Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.a) TCPb) UDPc) DCCPd) SCTPView Answer
Answer:aExplanation:None.
2. SMTP connections secured by SSL are known asa) SMTPSb) SSMTPc) SNMPd) none of the mentionedView Answer
Answer:aExplanation:None.
3. SMTP uses the TCP porta) 22b) 23
c) 24d) 25View Answer
Answer:dExplanation:None.
4. Which one of the following protocol is used to receive mail messages?a) SMTPb) post office protocolc) internet message access protocold) all of the mentionedView Answer
Answer:dExplanation:None.
5. What is on-demand mail relay (ODMR)?a) protocol for SMTP securityb) an SMTP extensionc) protocol for web pagesd) none of the mentionedView Answer
Answer:bExplanation:None.
6. An email client needs to know the ____ of its initial SMTP server.a) IP addressb) MAC addressc) urld) none of the mentionedView Answer
Answer:aExplanation:None.
7. A SMTP session may includea) zero SMTP transactionb) one SMTP transactionc) more than one SMTP transactiond) all of the mentionedView Answer
Answer:dExplanation:None.
8. SMTP definesa) message transportb) message encryptionc) message contentd) none of the mentionedView Answer
Answer:aExplanation:None.
9. Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?a) open mail relayb) wide mail receptionc) open mail receptiond) none of the mentionedView Answer
Answer:aExplanation:None.
10. SMTP is used to deliver messages toa) user’s terminalb) user’s mailboxc) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
Computer Networks Questions & Answers – SMTP
This set of Computer Networks Questions & Answers focuses on “SMTP”.
1) When the mail server sends mail to other mail servers it becomes _____ ?a) SMTP serverb) SMTP clientc) Peerd) None of the mentionedView Answer
Answer: bExplanation: None.
2) If you have to send multimedia data over SMTP it has to be encoded into
a) Binaryb) Signalc) ASCIId) None of the mentionedView Answer
Answer: cExplanation: None.
3) Expansion of SMTP isa) Simple Mail Transfer Protocolb) Simple Message Transfer Protocolc) Simple Mail Transmission Protocold) Simple Message Transmission ProtocolView Answer
Answer: aExplanation: None.
4) In SMTP, the command to write recievers mail adress is written with this commanda) SEND TOb) RCPT TOc) MAIL TOd) None of the mentionedView Answer
Answer: bExplanation: None.
5) The underlying Transport layer protocol used by SMTP isa) TCPb) UDPc) Either a or bd) None of the mentionedView Answer
Answer: aExplanation: None.
6) Choose the statement which is wrong incase of SMTPa) It requires message to be in 7bit ASCII formatb) It is a pull protocolc) It transfers files from one mail server to another mail serverd) None of the mentionedView Answer
Answer: bExplanation: The sending mail server pushes the mail to receiving mail server hence it is push protocol.
7) Internet mail places each object ina) Separate messages for each objectb) One messagec) Varies with number of objectsd) None of the mentionedView Answer
Answer: bExplanation: None.
8) Typically the TCP port used by SMTP isa) 25b) 35c) 50d) 15View Answer
Answer: aExplanation: None.
9) A session may includea) Zero or more SMTP transactionsb) Exactly one SMTP transactionsc) Always more than one SMTP transactionsd) Number of SMTP transactions cant be determinedView Answer
Answer: aExplanation: None.
10) Example of user agents for e-maila) Microsoft Outlookb) Apple Mailc)d) All of the mentionedView Answer
Answer: dExplanation: None.
11) When the sender and the receiver of an email are on different systems, we need only ______ .a) One MTAb) Two UAsc) Two UAs and one pair of MTAs
d) Two UAs and two pairs of MTAsView Answer
Answer: dExplanation: None.
12) User agent does not support thisa) Composing messagesb) Reading messagesc) Replying messagesd) All of the mentionedView Answer
Answer: dExplanation: None.
Computer Networks Questions & Answers – SMTP
This set of Computer Networks Questions & Answers focuses on “SMTP”.
1) When the mail server sends mail to other mail servers it becomes _____ ?a) SMTP serverb) SMTP clientc) Peerd) None of the mentionedView Answer
Answer: bExplanation: None.
2) If you have to send multimedia data over SMTP it has to be encoded intoa) Binaryb) Signalc) ASCIId) None of the mentionedView Answer
Answer: cExplanation: None.
3) Expansion of SMTP isa) Simple Mail Transfer Protocolb) Simple Message Transfer Protocolc) Simple Mail Transmission Protocold) Simple Message Transmission ProtocolView Answer
Answer: aExplanation: None.
4) In SMTP, the command to write recievers mail adress is written with this commanda) SEND TOb) RCPT TOc) MAIL TOd) None of the mentionedView Answer
Answer: bExplanation: None.
5) The underlying Transport layer protocol used by SMTP isa) TCPb) UDPc) Either a or bd) None of the mentionedView Answer
Answer: aExplanation: None.
6) Choose the statement which is wrong incase of SMTPa) It requires message to be in 7bit ASCII formatb) It is a pull protocolc) It transfers files from one mail server to another mail serverd) None of the mentionedView Answer
Answer: bExplanation: The sending mail server pushes the mail to receiving mail server hence it is push protocol.
7) Internet mail places each object ina) Separate messages for each objectb) One messagec) Varies with number of objectsd) None of the mentionedView Answer
Answer: bExplanation: None.
8) Typically the TCP port used by SMTP isa) 25b) 35
c) 50d) 15View Answer
Answer: aExplanation: None.
9) A session may includea) Zero or more SMTP transactionsb) Exactly one SMTP transactionsc) Always more than one SMTP transactionsd) Number of SMTP transactions cant be determinedView Answer
Answer: aExplanation: None.
10) Example of user agents for e-maila) Microsoft Outlookb) Apple Mailc)d) All of the mentionedView Answer
Answer: dExplanation: None.
11) When the sender and the receiver of an email are on different systems, we need only ______ .a) One MTAb) Two UAsc) Two UAs and one pair of MTAsd) Two UAs and two pairs of MTAsView Answer
Answer: dExplanation: None.
12) User agent does not support thisa) Composing messagesb) Reading messagesc) Replying messagesd) All of the mentionedView Answer
Answer: dExplanation: None.
Computer Networks Questions & Answers – RPC
This section of our 1000+ Computer Networks MCQs focuses on RPC Protocol.
1. An RPC (remote procedure call) is initiated by thea) serverb) clientc) both (a) and (b)d) none of the mentionedView Answer
Answer:bExplanation:None.
2. In RPC, while a server is processing the call, the client is blockeda) unless the client sends an asynchronous request to the serverb) unless the call processing is completec) for the complete duration of the connectiond) none of the mentionedView Answer
Answer:aExplanation:None.
3. Remote procedure calls isa) inter-process communicationb) a single processc) a single threadd) none of the mentionedView Answer
Answer:aExplanation:None.
4. RPC allows a computer program to cause a subroutine to execute ina) its own address spaceb) another address spacec) both (a) and (b)d) none of the mentionedView Answer
Answer:bExplanation:None.
5. RPC works between two processes. These processes must bea) on the same computerb) on different computers connected with a network
c) both (a) and (b)d) none of the mentionedView Answer
Answer:cExplanation:None.
6. A remote procedure is uniquely identified bya) program numberb) version numberc) procedure numberd) all of the mentionedView Answer
Answer:dExplanation:None.
7. An RPC application requiresa) specific protocol for client server communicationb) a client programc) a server programd) all of the mentionedView Answer
Answer:dExplanation:None.
8. RPC is used toa) establish a server on remote machine that can respond to queriesb) retrieve information by calling a queryc) both (a) and (b)d) none of the mentionedView Answer
9. RPC is aa) synchronous operationb) asynchronous operationc) time independent operationd) none of the mentionedView Answer
Answer:aExplanation:None.
10. The local operating system on the server machine passes the incoming packets to thea) server stubb) client stubc) client operating system
d) none of the mentionedView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – RTP
This section of our 1000+ Computer Networks MCQs focuses on rea-time transport protocol.
1. Real-time transport protocol (RTP) is mostly used ina) streaming mediab) video teleconferencec) television servicesd) all of the mentionedView Answer
Answer:dExplanation:None.
2. RTP is used toa) carry the media streamb) monitor transmission statistics of streamsc) monitor quality of service of streamsd) none of the mentionedView Answer
Answer:aExplanation:None.
3. RTP provides the facility of jitter ____ .a) compensationb) expansionc) both (a) and (b)d) none of the mentionedView Answer
Answer:aExplanation:None.
4. Which protocol provides the synchronization between media streams?a) RTPb) RTCPc) RPCd) none of the mentionedView Answer
Answer:bExplanation:None.
5. An RTP session is established fora) each media streamb) all media streamsc) some predefined number of media streamsd) none of the mentionedView Answer
Answer:aExplanation:None.
6. RTP can usea) unprevileleged UDP portsb) stream control transmission protocolc) datagram congestion control protocold) all of the mentionedView Answer
Answer:dExplanation:None.
7. Which one of the following multimedia formats can not be supported by RTP?a) MPEG-4b) MJPEGc) MPEGd) none of the mentionedView Answer
Answer:dExplanation:None.
8. An RTP header has a minimum size ofa) 12 bytesb) 16 bytesc) 24 bytesd) 32 bytesView Answer
Answer:aExplanation:None.
9. Which one of the following is not correct?a) RTCP provides canonical end-point identifiers to all session participantsb) RTCP reports are expected to be sent by all participantsc) both (a) and (b)d) none of the mentionedView Answer
Answer:dExplanation:None.
10. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?a) SRTPb) RTCPc) RCPd) none of the mentionedView Answer
Answer:aExplanation:None.
Computer Networks Questions & Answers – FTP
This set of Computer Networks Questions & Answers focuses on “FTP”.
1) Expansion of FTP isa) Fine Transfer Protocolb) File Transfer Protocolc) First Transfer Protocold) None of the mentionedView Answer
Answer: bExplanation: None.
2) FTP is built on _____ architecturea) Client-serverb) P2Pc) Both of the mentionedd) None of the mentionedView Answer
Answer: aExplanation: None.
3) FTP uses _____ parallel TCP connections to transfer a filea) 1b) 2c) 3d) 4View Answer
Answer: bExplanation: Control connection and data connection.
4) Identify the incorrect statementa) FTP stands for File Transfer Protocolb) FTP uses two parallel TCP connectionsc) FTP sends its control information in-bandd) FTP sends exactly one file over the data connectionView Answer
Answer: cExplanation: FTP is out-of-band as it has separate control connection.
5) If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B isa) 5b) 10c) 2d) 6View Answer
Answer: dExplanation: 1 control connection and other 5 for five file transfers.
6) FTP servera) Mantains stateb) Is statelessc) Has single TCP connection for a file transferd) None of the mentionedView Answer
Answer: aExplanation: None.
7) The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII formata) 8b) 7c) 3d) 5View Answer
Answer: bExplanation: None.
8) Find the FTP reply whose message is wrongly matcheda) 331 – Username OK, password requiredb) 425 – Can’t open data connectionc) 452 – Error writing file
d) 452 – Can’t open data connectionView Answer
Answer: dExplanation: None.
9) Mode of data transfer in FTP, where all the is left to TCPa) Stream modeb) Block modec) Compressed moded) None of the mentionedView Answer
Answer: aExplanation: None.
10) The password is sent to the server using _____ commanda) PASSWDb) PASSc) PASSWORDd) None of the mentionedView Answer
Answer: bExplanation: None.
Computer Networks Questions & Answers – Network Utilities
This set of Computer Networks Questions & Answers focuses on “Network Utilities”.
1) Ping cana) Measure round-trip timeb) Report packet lossc) Report latencyd) All of the mentionedView Answer
Answer: dExplanation: None.
2) Ping sweep is a part ofa) Tracerouteb) Nmapc) Routed) IpconfigView Answer
Answer: bExplanation: A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are mostly used by network scanning tools like nmap.
3) ICMP is used ina) Pingb) Traceroutec) Ifconfigd) Both a and bView Answer
Answer: dExplanation: None.
4) _____ command is used to manipulate TCP/IP routing table.a) routeb) Ipconfigc) Ifconfigd) TracerouteView Answer
Answer: aExplanation: None.
5) If you want to find the number of routers between a source and destination, the utility to be used is.a) routeb) Ipconfigc) Ifconfigd) TracerouteView Answer
Answer: dExplanation: None.
6) Which of the following is related to ipconfig in Microsoft Windows ?a) Display all current TCP/IP network configuration valuesb) Modify DHCP settingsc) Modify DNS settingsd) All of the mentionedView Answer
Answer: dExplanation: None.
7) This allows to check if a domain is available for registration.
a) Domain Checkb) Domain Dossierc) Domain Lookupd) None of the mentionedView Answer
Answer: aExplanation: None.
8) Choose the wrong statementa) Nslookup is used to query a DNS server for DNS datab) Ping is used to check connectivityc) Pathping combines the functionality of ping with that of routed) Ifconfig can configure TCP/IP network interface parametersView Answer
Answer: cExplanation: Pathping combines the functionality of ping with that of traceroute (tracert)
Computer Networks Questions & Answers – HTTP
This set of Computer Networks Questions & Answers focuses on “HTTP”.
1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______a) 4b) 1c) 5d) None of the mentionedView Answer
Answer: cExplanation: 4 jpeg images + 1 base HTML file.
2. The default connection type used by HTTP is _____a) Persistentb) Non-persistentc) Either of the mentionedd) None of the mentionedView Answer
Answer: aExplanation: None.
3. The time taken by a packet to travel from client to server and then back to the client is called ____
a) STTb) RTTc) PTTd) None of the mentionedView Answer
Answer: bExplanation: RTT stands for round-trip time.
4. The HTTP request message is sent in ____ part of three-way handshake.a) Firstb) Secondc) Thirdd) None of the mentionedView Answer
Answer: cExplanation: None.
5. In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.a) 2b) 1c) 4d) 3View Answer
Answer: bExplanation: None.
6. The first line of HTTP request message is called ____a) Request lineb) Header linec) Status lined) Entity lineView Answer
Answer: aExplanation: The line followed by request line are called header lines and status line is the initial part of response message.
7. The values GET, POST, HEAD etc are specified in ____ of HTTP messagea) Request lineb) Header linec) Status lined) Entity bodyView Answer
Answer: aExplanation: It is specified in the method field of request line in the HTTP request message.
8. The ______ method when used in the method field, leaves entity body empty.a) POSTb) GETc) Both of the mentionedd) None of the mentionedView Answer
Answer: bExplanation: None.
9. The HTTP response message leaves out the requested object when _____ method is useda) GETb) POSTc) HEADd) PUTView Answer
Answer: cExplanation: None.
10. Find the oddly matched HTTP status codesa) 200 OKb) 400 Bad Requestc) 301 Moved permanentlyd) 304 Not FoundView Answer
Answer: dExplanation: 404 Not Found.
11. Which of the following is not correct ?a) Web cache doesnt has its own disk spaceb) Web cache can act both like server and clientc) Web cache might reduce the response timed) Web cache contains copies of recently requested objectsView Answer
Answer: aExplanation: None.
12. The conditional GET mechanisma) Imposes conditions on the objects to be requestedb) Limits the number of response from a server
c) Helps to keep a cache upto dated) None of the mentionedView Answer
Answer: cExplanation: None.
13. Which of the following is present in both an HTTP request line and a status line?a) HTTP version numberb) URLc) Methodd) None of the mentionedView Answer
Answer: aExplanation: None
Computer Networks Questions & Answers – IPv4
This set of Computer Networks Questions & Answers focuses on “IPv4″.
1. Which of the following is not applicable for IP?a) Error reportingb) Handle addressing conventionsc) Datagram formatd) Packet handling conventionsView Answer
Answer: aExplanation: Error reporting is handled by ICMP.
2. Which of the following field in IPv4 datagram is not related to fragmentation?a) Flagsb) Offsetc) TOSd) IdentifierView Answer
Answer: cExplanation: TOS-type of service identifies the type of packets.
3. The TTL field has value 10. How many routers (max) can process this datagram?a) 11b) 5c) 10
d) 1View Answer
Answer: cExplanation: TTL field is decremented by one each time the datagram is processed by a router.
4. If the value in protocol field is 17, the transport layer protocol used is ____.a) TCPb) UDPc) Either of the mentionedd) None of the mentionedView Answer
Answer: bExplanation: For TCP it is 6.
5. The data field can carry which of the following?a) TCP segemntb) UDP segmentc) ICMP messagesd) None of the mentionedView Answer
Answer: cExplanation: Data field usually has tranaport layer segment, but it can also carry ICMP messages.
6. What should be the flag value to indicate the last fragment?a) 0b) 1c) TTl valued) None of the mentionedView Answer
Answer: aExplanation: flag=0 indicates that it is the last fragment.
7. Which of these is not applicable for IP protocol?a) is connectionlessb) offer reliable servicec) offer unreliable serviced) None of the mentionedView Answer
Answer: bExplanation: Ip offers unreliable service.
8. Fragmentation has following demeritsa) complicates routersb) open to DOS attackc) overlapping of fragments.d) All of the mentionedView Answer
Answer: dExplanation: Fragmentation makes the implementation complex and also can create DOS attack.
9. Which field helps to check rearrangement of the fragments?a) offsetb) flagc) TTLd) identiferView Answer
Answer: aExplanation: offset field specifies where the fragment fits in the original datagram.
Computer Networks Questions & Answers – IPv6
This set of Computer Networks Questions & Answers focuses on “IPv6″.
1. The size of IP address in IPv6 isa) 4bytesb) 128bitsc) 8bytesd) 100bitsView Answer
Answer: bExplanation: An IPv6 address is 128 bits long.
2. The header length of an IPv6 datagram is _____.a) 10bytesb) 25bytesc) 30bytesd) 40bytesView Answer
Answer: dExplanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the datagram.
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?a) Fragmentation fieldb) Fast-switchingc) ToS fieldd) Option fieldView Answer
Answer: cExplanation: This field enables to have different types of IP datagram.
4. IPv6 doesnot use ______ type of addressa) Broadcastb) Multicastc) Anycastd) None of the mentionedView Answer
Answer: aExplanation: Broadcast has been eliminated in IPv6.
5. These are the features present in IPv4 but not in IPv6.a) Fragmentationb) Header checksumc) Optionsd) All of the mentionedView Answer
Answer: dExplanation: All the features are only present in IPv4 and not IPv6.
6. The ____ field determines the lifetime of IPv6 datagrama) Hop limitb) TTLc) Next headerd) None of the mentionedView Answer
Answer: aExplanation: The Hop limit value is decremented by one by a router when the datagram is forwaded by the router. When the value becomes zero the datagram is discarded.
7. Dual-stack approach refers toa) Implementing Ipv4 with 2 stacksb) Implementing Ipv6 with 2 stacksc) Node has both IPv4 and IPv6 support
d) None of the mentionedView Answer
Answer: cExplanation: dual-stack is one of the approach used to support IPv6 in already existing systems.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here isa) use dual-stack approachb) Tunnelingc) No solutiond) Replace the systemView Answer
Answer: bExplanation: The IPv4 routers can form a tuunel.
9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bitsa) 96 to 127b) 0 to 63c) 80 to 95d) 64 to 79View Answer
Answer: aExplanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.