networking objectives prepration

63
Questions & Answers C Interview Questions C++ Questions Linux MCQs C# Quiz Java MCQs JavaScript MCQs SAN Questions PHP Questions Python Quiz Computer Science Questions Operating System Quiz Computer Architecture MCQs Software Architecture MCQs Software Engineering MCQs Artificial Intelligence MCQs LISP Programming MCQs Database Management MCQs Computer Network MCQs Microprocessor MCQs C Programming Examples Simple C Programs C - Arrays C - Matrix C - Strings C - Bitwise Operations C - Linked Lists C - Stacks & Queues C - Searching & Sorting C - Trees C - Strings C - File Handling C - Mathematical Functions C - Puzzles & Games C Programs - Recursion C Programs - No Recursion Java Algorithms Java - Numerical Problems Java - Combinatorial Problems Java - Graph Problems Java - Hard Graph Problems Java - Computation Geometry Java - Sets & Strings Java - Data-Structures Java - Collection API Problems C++ Algorithms C++ - Numerical Problems C++ - Combinatorial Problems C++ - Graph Problems C++ - Hard Graph Problems C++ - Computation Geometry C++ - Sets & Strings C++ - Data-Structures C++ - STL Library C Algorithms C - Numerical Problems C - Combinatorial Problems C - Graph Problems C - Hard Graph Problems C - Computation Geometry C - Sets & Strings C - Data-Structures advertisements Computer Networks Questions and Answers Our Computer Networks questions and answers focuses on all areas of Computer Networks covering 100+ topics in Computer Networks. Highlights - 1000+ Multiple Choice Questions & Answers in Computer Networks with explanations - Every MCQ set focuses on a specific topic in Computer Networks Who should Practice these Computer Networks Questions? - Anyone wishing to sharpen their

Upload: adil-farooq

Post on 14-Jan-2016

64 views

Category:

Documents


7 download

DESCRIPTION

networking topicscomputer networkingprotocolsnetworking portsall objectiveslayers architecturewireless objectivesethernetcontain all information regarding lecturer prepartion

TRANSCRIPT

Questions & Answers

C Interview QuestionsC++ QuestionsLinux MCQsC# QuizJava MCQsJavaScript MCQsSAN QuestionsPHP QuestionsPython Quiz

Computer Science Questions

Operating System QuizComputer Architecture MCQsSoftware Architecture MCQsSoftware Engineering MCQsArtificial Intelligence MCQsLISP Programming MCQsDatabase Management MCQsComputer Network MCQsMicroprocessor MCQs

C Programming Examples

Simple C ProgramsC - ArraysC - MatrixC - StringsC - Bitwise OperationsC - Linked ListsC - Stacks & QueuesC - Searching & SortingC - TreesC - StringsC - File HandlingC - Mathematical FunctionsC - Puzzles & GamesC Programs - RecursionC Programs - No Recursion

Java Algorithms

Java - Numerical ProblemsJava - Combinatorial ProblemsJava - Graph Problems

Java - Hard Graph ProblemsJava - Computation GeometryJava - Sets & StringsJava - Data-StructuresJava - Collection API Problems

C++ Algorithms

C++ - Numerical ProblemsC++ - Combinatorial ProblemsC++ - Graph ProblemsC++ - Hard Graph ProblemsC++ - Computation GeometryC++ - Sets & StringsC++ - Data-StructuresC++ - STL Library

C Algorithms

C - Numerical ProblemsC - Combinatorial ProblemsC - Graph ProblemsC - Hard Graph ProblemsC - Computation GeometryC - Sets & StringsC - Data-Structures

advertisements

Computer Networks Questions and Answers

Our Computer Networks questions and answers focuses on all areas of Computer Networks covering 100+ topics in Computer Networks.

Highlights

- 1000+ Multiple Choice Questions & Answers in Computer

Networks with explanations

- Every MCQ set focuses on a specific topic in Computer

Networks

Who should Practice these Computer Networks

Questions?

- Anyone wishing to sharpen their skills on Computer

Networks

- Anyone preparing for aptitude test in Computer

Networks (both objective type and coding written test)

- Anyone preparing for interviews (campus/off-campus

interviews, walk-in interview and company interviews)

- Anyone preparing for entrance examinations and other

competitive examinations

- All – Experienced, Freshers and Students

Here’s list of Questions & Answers on Computer Networks Programming with 100+ topics:

Basics-1 Basics-2 Reference Models Physical Layer Data Link Layer Network Layer Transport Layer Application Layer-1 Application Layer-2 DNS Telnet-1 Telnet-2 World Wide Web HTTP and FTP Ethernet-1 Ethernet-2 Wireless LAN WiMAX Bluetooth ATM and Frame Relay Access Networks Physical Media Multiplexing

Topology Packet Switching and Circuit SwitchingSONET Internet CryptographySecurity In The InternetDelays and LossNetwork AttacksReference ModelsDHCP SSH SMTP-1 SMTP-2 RPC RTP FTP Network UtilitiesHTTP IPv4 IPv6

If you like to learn Computer Networks thoroughly, you should attempt to work on the complete set of Computer Networks questions and answers mentioned above. It will immensely help anyone trying to crack a Computer Networks code or an interview.

Here’s the list of Best Reference Books in Computer

Networks.

Wish you the best in your endeavor to learn and master

Computer Networks!

inShare

advertisements

Read Next:

1. Computer Networks Questions & Answers – Reference Models

2. Computer Networks Questions & Answers – Telnet 3. Computer Networks Questions & Answers – SSH 4. Computer Networks Questions & Answers – Internet 5. Computer Networks Questions & Answers – Reference

Models

Manish Bhojasia, a technology veteran with 18+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer and SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage & Cluster Administration, Advanced C Programming, SAN Storage Technologies, SCSI Internals and Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him below:Google+ | Facebook | Twitter | LinkedIn

Subscribe Newsletter & Posts

SAN Training ISAN Administration IILinux Administration

Advanced C ProgrammingLinux Debugging

Linux ProgrammingLinux IPCs ProgrammingNetwork ProgrammingLinux Multithreading

Linux Kernel ProgrammingLinux Kernel Debugging

Device Drivers BasicsLinux Block Drivers

Linux Network DriversLinux PCI DriversLinux USB Drivers

Linux Video DriversLinux Audio DriversI2C Driver Training

Computer Networks Questions and Answers

Our Computer Networks questions and

answers focuses on all areas of Computer

Networks covering 100+ topics in Computer

Networks.

Highlights

- 1000+ Multiple Choice Questions &

Answers in Computer Networks with

explanations

- Every MCQ set focuses on a specific

topic in Computer Networks

Who should Practice these Computer

Networks Questions?

- Anyone wishing to sharpen their skills

on Computer Networks

- Anyone preparing for aptitude test in

Computer Networks (both objective type

and coding written test)

- Anyone preparing for interviews

(campus/off-campus interviews, walk-in

interview and company interviews)

- Anyone preparing for entrance

examinations and other competitive

examinations

- All – Experienced, Freshers and

Students

Here’s list of Questions & Answers on

Computer Networks Programming

with 100+ topics:

If you like to learn Computer Networks

thoroughly, you should attempt to work on

the complete set of Computer Networks

questions and answers mentioned above. It

will immensely help anyone trying to crack a

Computer Networks code or an interview.

Basics-1  

Computer Networks Question & Answers – Basics

This section of our 1000+ Computer Networks MCQs focuses on reference models of computer networks.

1. When collection of various computers seems a single coherent system to its client, then it is calleda) computer networkb) distributed systemc) both (a) and (b)d) none of the mentionedView Answer

Answer:bExplanation:None.

1) Basics-1 Basics-2 Reference Models Physical Layer Data Link Layer Network Layer Transport Layer Application Layer-1 Application Layer-2 DNS Telnet-1 Telnet-2 World Wide Web HTTP and FTP Ethernet-1 Ethernet-2 Wireless LAN WiMAX Bluetooth ATM and Frame Relay Access Networks Physical Media MultiplexingPacket Switching and Circuit Switching SONET Internet Cryptography Security In The Internet Delays and Loss Network Attacks Reference Models DHCP SSH SMTP-1 SMTP-2 

2. Two devices are in network ifa) a process in one device is able to exchange information with a process in another deviceb) a process is running on both devicesc) PIDs of the processes running of different devices are samed) none of the mentionedView Answer

Answer:aExplanation:None.

3. Which one of the following computer network is built on the top of another network?a) prior networkb) chief networkc) prime networkd) overlay networkView Answer

Answer:dExplanation:None.

4. In computer network nodes area) the computer that originates the datab) the computer that routes the datac) the computer that terminates the datad) all of the mentionedView Answer

Answer:dExplanation:None.

5. Communication channel is shared by all the machines on the network ina) broadcast networkb) unicast networkc) multicast networkd) none of the mentionedView Answer

6. Bluetooth is an example ofa) personal area networkb) local area networkc) virtual private networkd) none of the mentionedView Answer

Answer:aExplanation:None.

7. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.a) bridgeb) firewallc) routerd) all of the mentionedView Answer

Answer:cExplanation:None.

8. A list of protocols used by a system, one protocol per layer, is calleda) protocol architectureb) protocol stackc) protocol suitd) none of the mentionedView Answer

Answer:bExplanation:None.

9. Network congestion occursa) in case of traffic overloadingb) when a system terminatesc) when connection between two nodes terminatesd) none of the mentionedView Answer

Answer:aExplanation:None.

10. Which one of the following extends a private network across public networks?a) local area networkb) virtual private networkc) enterprise private networkd) storage area networkView Answer

Answer:bExplanation:None.

Computer Networks Questions & Answers – Basics

This set of Computer Networks Questions & Answers focuses on “Basics”.

1) The IETF standards documents are calleda) RFCb) RCFc) IDd) None of the mentionedView Answer

Answer: aExplanation: Request For Comments.

2) In the layer hierarchy as the data packet moves from the upper to the lower layers, headers area) Addedb) Removedc) Rearrangedd) ModifiedView Answer

Answer: aExplanation: Every layer adds its own header to the packet from previous layer.

3) The structure or format of data is calleda) Syntaxb) Semanticsc) Structd) None of the mentionedView Answer

Answer: aExplanation: Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.

4) Communication between a computer and a keyboard involves ______________ transmissiona) Automaticb) Half-duplexc) Full-duplexd) SimplexView Answer

Answer: dExplanation: Data flows in single direction.

5) The first Networka) CNNETb) NSFNETc) ASAPNET

d) ARPANETView Answer

6) The _______ is the physical path over which a message travelsa) Ppathb) Mediumc) Protocold) RouteView Answer

Answer: bExplanation: Message travel from sender to reciever via a medium using a protocol.

7) Which organization has authority over interstate and international commerce in the communications field?a) ITU-Tb) IEEEc) FCCd) ISOCView Answer

Answer: cExplanation: None.

8) Which of this is not a network edge device?a) PCb) Smartphonesc) Serversd) SwitchView Answer

Answer: dExplanation: Network egde devices refer to host systems, which can host applications like web browser.

9) A set of rules that governs data communicationa) Protocolsb) Standardsc) RFCsd) None of the mentionedView Answer

Answer: aExplanation: None.

10) Three or more devices share a link in ________ connectiona) Unipoint

b) Multipointc) Point to pointd) None of the mentionedView Answer

Answer: bExplanation: None.

Computer Networks Questions & Answers – Reference Models

This section of our 1000+ Computer Networks MCQs focuses on reference models of computer networks.

1. OSI stands fora) open system interconnectionb) operating system interfacec) optical service implementationd) none of the mentionedView Answer

Answer:aExplanation:None.

2. The OSI model has ___ layers.a) 4b) 5c) 6d) 7View Answer

Answer:dExplanation:None.

3. TCP/IP model does not have ______ layer but OSI model have this layer.a) session layerb) presentation layerc) application layerd) both (a) and (b)View Answer

Answer:dExplanation:None.

4. Which layer links the network support layers and user support layersa) session layerb) data link layerc) transport layer

d) network layerView Answer

Answer:cExplanation:Physical, data link and network layers are network support layers and session, presentation and application layers are user support layers.

5. Which address is used in an internet employing the TCP/IP protocols?a) physical address and logical addressb) port addressc) specific addressd) all of the mentionedView Answer

Answer:dExplanation:None.

6. TCP/IP model was developed _____ the OSI model.a) prior tob) afterc) simultaneous tod) none of the mentionedView Answer

Answer:aExplanation:None.

7. Which layer is responsible for process to process delivery?a) network layerb) transport layerc) session layerd) data link layerView Answer

Answer:bExplanation:None.

8. Which address identifies a process on a host?a) physical addressb) logical addressc) port addressd) specific addressView Answer

Answer:cExplanation:None.

9. Which layer provides the services to user?a) application layerb) session layerc) presentation layerd) none of the mentionedView Answer

Answer:aExplanation:None.

10. Transmission data rate is decided bya) network layerb) physical layerc) data link layerd) transport layerView Answer

Answer:bExplanation:None

Computer Networks Questions & Answers – Physical Layer

This section of our 1000+ Computer Networks MCQs focuses on physical layer.

1. The physical layer concerns witha) bit-by-bit deliveryp) process to process deliveryc) application to application deliveryd) none of the mentionedView Answer

Answer:aExplanation:None.

2. Which transmission media has the highest transmission speed in a network?a) coaxial cableb) twisted pair cablec) optical fiberd) electrical cableView Answer

Answer:cExplanation:None.

3. Bits can be send over guided and unguided media as analog signal bya) digital modulation

b) amplitude modulationc) frequency modulationd) phase modulationView Answer

Answer:aExplanation:None.

4. The portion of physical layer that interfaces with the media access control sublayer is calleda) physical signalling sublayerb) physical data sublayerc) physical address sublayerd) none of the mentionedView Answer

Answer:aExplanation:None.

5. physical layer providesa) mechanical specifications of electrical connectors and cablesb) electrical specification of transmission line signal levelc) specification for IR over optical fiberd) all of the mentionedView Answer

Answer:dExplanation:None.

6. In asynchronous serial communication the physical layer providesa) start and stop signallingb) flow controlc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

7. The physical layer is responsible fora) line codingb) channel codingc) modulationd) all of the mentionedView Answer

Answer:dExplanation:None.

8. The physical layer translates logical communication requests from the ______ into hardware specific operations.a) data link layerb) network layerc) trasnport layerd) application layerView Answer

Answer:aExplanation:None.

9. A single channel is shared by multiple signals bya) analog modulationb) digital modulationc) multiplexingd) none of the mentionedView Answer

Answer:cExplanation:None.

10. Wireless transmission can be done viaa) radio wavesb) microwavesc) infraredd) all of the mentionedView Answer

Answer:dExplanation:None

Computer Networks Questions & Answers – Data Link Layer

This section of our 1000+ Computer Networks MCQs focuses on data link layer.

1. The data link layer takes the packets from _____ and encapsulates them into frames for transmission.a) network layerb) physical layerc) transport layerd) application layerView Answer

Answer:aExplanation:None.

2. Which one of the following task is not done by data link layer?a) framingb) error controlc) flow controld) channel codingView Answer

Answer:dExplanation:None.

3. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?a) logical link control sublayerb) media access control sublayerc) network interface control sublayerd) none of the mentionedView Answer

Answer:bExplanation:None.

4. Header of a frame generally containsa) synchronization bytesb) addressesc) frame identifierd) all of the mentionedView Answer

Answer:dExplanation:None.

5. Automatic repeat request error management mechanism is provided bya) logical link control sublayerb) media access control sublayerc) network interface control sublayerd) none of the mentionedView Answer

Answer:aExplanation:None.

6. When 2 or more bits in a data unit has been changed during the transmission, the error is calleda) random errorb) burst errorc) inverted errord) none of the mentionedView Answer

Answer:bExplanation:None.

7. CRC stands fora) cyclic redundancy checkb) code repeat checkc) code redundancy checkd) cyclic repeat checkView Answer

Answer:aExplanation:None.

8. Which one of the following is a data link protocol?a) ethernetb) point to point protocolc) HDLCd) all of the mentionedView Answer

Answer:dExplanation:None.

9. Which one of the following is the multiple access protocol for channel access control?a) CSMA/CDb) CSMA/CAc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

10. The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is calleda) piggybackingb) cyclic redundancy checkc) fletcher’s checksumd) none of the mentionedView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – Network Layer

This section of our 1000+ Computer Networks MCQs focuses on network layer.

1. The network layer concerns witha) bitsb) framesc) packetsd) none of the mentionedView Answer

Answer:cExplanation:None.

2. Which one of the following is not a function of network layer?a) routingb) inter-networkingc) congestion controld) none of the mentionedView Answer

Answer:dExplanation:None.

3. The 4 byte IP address consists ofa) network addressb) host addressc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

4. In virtual circuit network each packet containsa) full source and destination addressb) a short VC numberc) both (a) and (b)d) none of the mentionedView Answer

Answer:bExplanation:None.

5. Which one of the following routing algorithm can be used for network layer design?a) shortest path algorithmb) distance vector routingc) link state routing

d) all of the mentionedView Answer

Answer:dExplanation:None.

6. Multidestination routinga) is same as broadcast routingb) contains the list of all destinationsc) data is not sent by packetsd) none of the mentionedView Answer

Answer:cExplanation:None.

7. A subset of a network that includes all the routers but contains no loops is calleda) spanning treeb) spider structurec) spider treed) none of the mentionedView Answer

Answer:aExplanation:None.

8. Which one of the following algorithm is not used for congestion control?a) traffic aware routingb) admission controlc) load sheddingd) none of the mentionedView Answer

Answer:dExplanation:None.

9. The network layer protocol of internet isa) ethernetb) internet protocolc) hypertext transfer protocold) none of the mentionedView Answer

Answer:bExplanation:None.

10. ICMP is primarily used fora) error and diagnostic functions

b) addressingc) forwardingd) none of the mentionedView Answer

Answer:aExplanation:None

Computer Networks Questions & Answers – Transport Layer

This section of our 1000+ Computer Networks MCQs

focuses transport layer.1. Transport layer aggregates data from different applications into a single stream before passing it toa) network layerb) data link layerc) application layerd) physical layerView Answer

Answer:aExplanation:None.

2. Which one of the following is a transport layer protocol used in internet?a) TCPb) UDPc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

3. User datagram protocol is called connectionless becausea) all UDP packets are treated independently by transport layerb) it sends data as a stream of related packetsc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

4. Transmission control protocol isa) connection oriented protocol

b) uses a three way handshake to establish a connectionc) recievs data from application as a single streamd) all of the mentionedView Answer

Answer:dExplanation:None.

5. An endpoint of an inter-process communication flow across a computer network is calleda) socketb) pipec) portd) none of the mentionedView Answer

Answer:aExplanation:None.

6. Socket-style API for windows is calleda) wsockb) winsockc) winsd) none of the mentionedView Answer

Answer:bExplanation:None.

7. Which one of the following is a version of UDP with congestion control?a) datagram congestion control protocolb) stream control transmission protocolc) structured stream transportd) none of the mentionedView Answer

Answer:aExplanation:None.

8. A _____ is a TCP name for a transport service access point.a) portb) pipec) noded) none of the mentionedView Answer

Answer:aExplanation:None.

9. Transport layer protocols deals witha) application to application communicationb) process to process communicationc) node to node communicationd) none of the mentionedView Answer

Answer:bExplanation:None.

10. Which one of the following is a transport layer protocol?a) stream control transmission protocolb) internet control message protocolc) neighbor discovery protocold) dynamic host configuration protocolView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – Application Layer

This section of our 1000+ Computer Networks MCQs

focuses on application layer.1. The ____ translates internet domain and host names to IP address.a) domain name systemb) routing information protocolc) network time protocold) internet relay chatView Answer

Answer:aExplanation:None.

2. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?a) HTTPb) FTPc) telnetd) none of the mentionedView Answer

Answer:cExplanation:None.

3. Application layer protocol definesa) types of messages exchangedb) message format, syntax and semanticsc) rules for when and how processes send and respond to messagesd) all of the mentionedView Answer

Answer:dExplanation:None.

4. Which one of the following protocol delivers/stores mail to reciever server?a) simple mail transfer protocolb) post office protocolc) internet mail access protocold) hypertext transfer protocolView Answer

Answer:aExplanation:None.

5. The ASCII encoding of binary data is calleda) base 64 encodingb) base 32 encodingc) base 16 encodingd) base 8 encodingView Answer

Answer:aExplanation:None.

6. Which one of the following is an internet standard protocol for managing devices on IP network?a) dynamic host configuration protocolb) simple newtwork management protocolc) internet message access protocold) media gateway protocolView Answer

Answer:bExplanation:None.

7. Which one of the following is not an application layer protocol?a) media gateway protocolb) dynamic host configuration protocolc) resource reservation protocold) session initiation protocolView Answer

Answer:cExplanation:None.

8. Which protocol is a signalling communication protocol used for controlling multimedia communication sessions?a) session initiation protocolb) session modelling protocolc) session maintenance protocold) none of the mentionedView Answer

Answer:aExplanation:None.

9. Which one of the following is not correct?a) application layer protocols are used by both source and destination devices during a communication sessionb) application layer protocols implemented on the source and destination host must matchc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

10. When displaying a web page, the application layer uses thea) HTTP protocolb) FTP protocolc) SMTP protocold) none of the mentionedView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – Application Layer

This set of Computer Networks Questions & Answers

focuses on “Application Layer”.1) This is not a application layer protocola) HTTPb) SMTPc) FTPd) TCPView Answer

Answer: dExplanation: TCP is transport layer protocol

2) The packet of information at the application layer is calleda) Packetb) Messagec) Segmentd) FrameView Answer

Answer: bExplanation: None.

3) This is one of the architecture paradigma) Peer to peerb) Client-serverc) HTTPd) Both a and bView Answer

Answer: dExplanation: HTTP is a protocol.

4) Application developer has permission to decide the following on transport layer sidea) Transport layer protocolb) Maximum buffer sizec) Both of the mentionedd) None of the mentionedView Answer

Answer: cExplanation: None.

5) Application layer offers _______ servicea) End to endb) Process to processc) Both of the mentionedd) None of the mentionedView Answer

Answer: aExplanation: None.

6) E-mail isa) Loss-tolerant applicationb) Bandwidth-sensitive applicationc) Elastic application

d) None of the mentionedView Answer

Answer: cExplanation: Because it can work with available throughput.

7) Pick the odd one outa) File transferb) File downloadc) E-maild) Interactive gamesView Answer

Answer: dExplanation: Internet telephony is Loss-tolerant other applications are not.

8) Which of the following is an application layer service ?a) Network virtual terminalb) File transfer, access, and managementc) Mail serviced) All of the mentionedView Answer

Answer: dExplanation: None.

9) To deliver a message to the correct application program running on a host, the _______ address must be consulteda) IPb) MACc) Portd) None of the mentionedView Answer

Answer: cExplanation: None.

10) This is a time-sensitive servicea) File transferb) File downloadc) E-maild) Internet telephonyView Answer

Answer: dExplanation: Internet telephony is Loss-tolerant other applications are not.

11) Transport services available to applications in one or another forma) Reliable data transferb) Timingc) Securityd) All of the mentionedView Answer

Answer: dExplanation: None.

12) Electronic mail uses this Application layer protocola) SMTPb) HTTPc) FTPd) SIPView Answer

Answer: aExplanation: None.

Computer Networks Questions & Answers – DNS

This section of our 1000+ Computer Networks MCQs

focuses on Domain Name System.1. The entire hostname has a maximum ofa) 255 charactersb) 127 charactersc) 63 charactersd) 31 charactersView Answer

Answer:aExplanation:None.

2. A DNS client is calleda) DNS updaterb) DNS resolverc) DNS handlerd) none of the mentionedView Answer

Answer:bExplanation:None.

3. Servers handle requests for other domainsa) directlyb) by contacting remote DNS server

c) it is not possibled) none of the mentionedView Answer

Answer:bExplanation:None.

4. DNS database containsa) name server recordsb) hostname-to-address recordsc) hostname aliasesd) all of the mentionedView Answer

Answer:dExplanation:None.

5. If a server has no clue about where to find the address for a hostname thena) server asks to the root serverb) server asks to its adjcent serverc) request is not processedd) none of the mentionedView Answer

Answer:aExplanation:None.

6. Which one of the following allows client to update their DNS entry as their IP address change?a) dynamic DNSb) mail transfer agentc) authoritative name serverd) none of the mentionedView Answer

Answer:aExplanation:None.

7. Wildcard domain names start with labela) @b) *c) &d) #View Answer

Answer:bExplanation:None.

8. The right to use a domain name is delegated by domain name registers which are accredited bya) internet architecture boardb) internet societyc) internet research task forced) internet corporation for assigned names and numbersView Answer

Answer:dExplanation:None.

9. The domain name system is maintained bya) distributed database systemb) a single serverc) a single computerd) none of the mentionedView Answer

Answer:aExplanation:None.

10. Which one of the following is not true?a) multiple hostnames may correspond to a single IP addressb) a single hostname may correspond to many IP addressesc) a single hostname may correspond to a single IP addressd) none of the mentionedView Answer

Answer:cExplanation:None.

Computer Networks Questions & Answers – Telnet

This section of our 1000+ Computer Networks MCQs focuses on telnet.

1. Telnet protocol is used to establish a connection toa) TCP port number 21b) TCP port number 22c) TCP port number 23d) TCP port number 24View Answer

Answer:cExplanation:None.

2. Which one of the following is not true?a) telnet defines a network virtual terminal (NVT) standardb) client programs interact with NVTc) server translates NVT operationsd) none of the mentionedView Answer

Answer:dExplanation:None.

3. All telnet operations are sent asa) 4 bytesb) 8 bytesc) 16 bytesd) 32 bytesView Answer

Answer:bExplanation:None.

4. AbsoluteTelnet is a telnet client fora) windowsb) linuxc) macd) none of the mentionedView Answer

Answer:aExplanation:None.

5. The decimal code of interpret as command (IAC) character isa) 252b) 253c) 254d) 255View Answer

Answer:dExplanation:None.

6. In character mode operation of telnet implementationa) each character typed is sent by the client to the serverb) each character typed is discarded by the serverc) both (a) an (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

7. In telnet, the client echoes the character on the screen but does not send it until a whole line is completed ina) default modec) character modec) server moded) none of the mentionedView Answer

Answer:aExplanation:None.

8. Which one of the following is not correct?a) telnet is a general purpose client-server programb) telnet lets user access an application on a remote computerc) telnet can also be used for file transferd) none of the mentionedView Answer

Answer:cExplanation:None.

9. Which operating mode of telnet is full duplex?a) default modeb) server modec) line moded) none of the mentionedView Answer

Answer:cExplanation:None.

10. If we want that a character be interpreted by the client instead of servera) escape character has to be usedb) control functions has to be disabledc) it is not possibled) none of the mentionedView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – Telnet

This set of Computer Networks Questions & Answers focuses on “Telnet”.

1) The protocol used by Telnet application isa) Telnetb) FTPc) HTTPd) None of the mentionedView Answer

Answer: aExplanation: None.

2) In “character at a time” modea) Character processing is done on the local system under the control of the remote systemb) Most text typed is immediately sent to the remote host for processingc) All text is echoed locally, only completed lines are sent to the remote hostd) None of the mentionedView Answer

Answer: bExplanation: None.

3) _______ allows you to connect and login to a remote computera) Telnetb) FTPc) HTTPd) None of the mentionedView Answer

Answer: aExplanation: None.

4) The correct syntax to be written in the web browser to Telnet to www.sanfoundry.com isa) telnet//www.sanfoundry.comb) telnet:www.sanfoundry.comc) telnet://www.sanfoundry.comd) telnet www.sanfoundry.comView Answer

Answer: cExplanation: None.

5) Telnet is aa) Television on netb) Network of Telephonesc) Remote Login

d) Teleshopping siteView Answer

Answer: cExplanation: None.

Computer Networks Questions & Answers – World Wide Web

This section of our 1000+ Computer Networks MCQs focuses on World Wide Web.

1. A piece of icon or image on a web page associated with another webpage is calleda) urlb) hyperlinkc) plugind) none of the mentionedView Answer

Answer:bExplanation:None.

2. Dynamic web pagea) is same every time whenever it displaysb) generates on demand by a program or a request from browserc) both (a) and (b)d) none of the mentionedView Answer

Answer:bExplanation:None.

3. What is a web browser?a) a program that can display a web pageb) a program used to view html documentsc) it enables user to access the resources of internetd) all of the mentionedView Answer

Answer:dExplanation:None.

4. Common gateway interface is used toa) generate executable files from web content by web serverb) generate web pagesc) stream videos

d) none of the mentionedView Answer

Answer:aExplanation:None.

5. URL stands fora) unique reference labelb) uniform reference labelc) uniform resource locatord) unique resource locatorView Answer

Answer:cExplanation:None.

6. A web cookie is a small piece of dataa) sent from a website and stored in user’s web browser while a user is browsing a websiteb) sent from user and stored in the server while a user is browsing a websitec) sent from root server to all serversd) none of the mentionedView Answer

Answer:aExplanation:None.

7. Which one of the following is not used to generate dynamic web pages?a) PHPb) ASP.NETc) JSPd) none of the mentionedView Answer

Answer:dExplanation:None.

8. An alternative of javascript on windows platform isa) VBScriptb) ASP.NETc) JSPd) none of the mentionedView Answer

Answer:aExplanation:None.

9. What is document object model (DOM)?a) convention for representing and interacting with objects in html documentsb) application programming interfacec) hierarchy of objects in ASP.NETd) none of the mentionedView Answer

Answer:aExplanation:None.

10. AJAX stands fora) asynchronous javascript and xmlb) advanced JSP and xmlc) asynchronous JSP and xmld) advanced javascript and xmlView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – HTTP & FTP

This section of our 1000+ Computer Networks MCQs focuses on HTTP & FTP protocols.

1. Multiple object can be sent over a TCP connection between client and server ina) persistent HTTPb) nonpersistent HTTPc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

2. HTTP is ________ protocol.a) application layerb) transport layerc) network layerd) none of the mentionedView Answer

Answer:aExplanation:None.

3. In the network HTTP resources are located bya) uniform resource identifierb) unique resource locatorc) unique resource identifierd) none of the mentionedView Answer

Answer:aExplanation:None.

4. HTTP client requests by establishing a __________ connection to a particular port on the server.a) user datagram protocolb) transmission control protocolc) broader gateway protocold) none of the mentionedView Answer

Answer:bExplanation:None.

5. In HTTP pipelininga) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responsesb) multiple HTTP requests can not be sent on a single TCP connectionc) multiple HTTP requests are sent in a queue on a single TCP connectiond) none of the mentionedView Answer

Answer:aExplanation:None.

6. FTP server listens for connection on port numbera) 20b) 21c) 22d) 23View Answer

Answer:bExplanation:None.

7. In FTP protocol, client contacts server using ____ as the transport protocol.a) transmission control protocolb) user datagram protocolc) datagram congestion control protocol

d) stream control transmission protocolView Answer

Answer:aExplanation:None.

8. In which mode FTP, the client initiates both the control and data connections.a) active modeb) passive modec) both (a) and (b)d) none of the mentionedView Answer

Answer:bExplanation:None.

9. The file transfer protocol is built ona) data centric architectureb) service oriented architecturec) client server architectured) none of the mentionedView Answer

Answer:cExplanation:None.

10. In file transfer protocol, data transfer can be done ina) stream modeb) block modec) compressed moded) all of the mentionedView Answer

Answer:dExplanation:None.

Computer Networks Questions & Answers – Ethernet

This section of our 1000+ Computer Networks MCQs focuses on Ethernet.

1. Ethernet frame consists ofa) MAC addressb) IP addressc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

2. What is stat frame delimeter (SFD) in ethernet frame?a) 10101010b) 10101011c) 00000000d) 11111111View Answer

Answer:bExplanation:None.

3. MAC address is of1) 24 bitsb) 36 bitsc) 42 bitsd) 48 bitsView Answer

Answer:dExplanation:None.

4. What is autonegotiation?a) a procedure by which two connected devices choose common transmission parametersb) a security algorithmc) a routing algorithmd) none of the mentionedView Answer

Answer:aExplanation:None.

5. Ethernet in metropolitan area network (MAN) can be used asa) pure ethernetb) ethernet over SDHc) ethernet over MPLSd) all of the mentionedView Answer

Answer:dExplanation:None.

6. A point-to-point protocol over ethernet is a network protocol fora) encapsulating PPP frames inside ethernet framesb) encapsulating ehternet framse inside PPP framesc) for security of ethernet frames

d) for security of PPP framesView Answer

Answer:aExplanation:None.

7. High speed ethernet works ona) coaxial cableb) twisted pair cablec) optical fiberd) none of the mentionedView Answer

Answer:cExplanation:None.

8. The maximum size of payload field in ethernet frame isa) 1000 bytesb) 1200 bytesc) 1300 bytesd) 1500 bytesView Answer

Answer:dExplanation:None.

9. What is interframe gap?a) idle time between framesb) idle time between frame bitsc) idle time between packetsd) none of the mentionedView Answer

Answer:aExplanation:None.

10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is calleda) short frameb) run framec) mini framed) man frameView Answer

Answer:bExplanation:None

Computer Networks Questions & Answers – Ethernet

This section of our 1000+ Computer Networks MCQs focuses on Ethernet.

1. Ethernet frame consists ofa) MAC addressb) IP addressc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

2. What is stat frame delimeter (SFD) in ethernet frame?a) 10101010b) 10101011c) 00000000d) 11111111View Answer

Answer:bExplanation:None.

3. MAC address is of1) 24 bitsb) 36 bitsc) 42 bitsd) 48 bitsView Answer

Answer:dExplanation:None.

4. What is autonegotiation?a) a procedure by which two connected devices choose common transmission parametersb) a security algorithmc) a routing algorithmd) none of the mentionedView Answer

Answer:aExplanation:None.

5. Ethernet in metropolitan area network (MAN) can be used asa) pure ethernetb) ethernet over SDHc) ethernet over MPLS

d) all of the mentionedView Answer

Answer:dExplanation:None.

6. A point-to-point protocol over ethernet is a network protocol fora) encapsulating PPP frames inside ethernet framesb) encapsulating ehternet framse inside PPP framesc) for security of ethernet framesd) for security of PPP framesView Answer

Answer:aExplanation:None.

7. High speed ethernet works ona) coaxial cableb) twisted pair cablec) optical fiberd) none of the mentionedView Answer

Answer:cExplanation:None.

8. The maximum size of payload field in ethernet frame isa) 1000 bytesb) 1200 bytesc) 1300 bytesd) 1500 bytesView Answer

Answer:dExplanation:None.

9. What is interframe gap?a) idle time between framesb) idle time between frame bitsc) idle time between packetsd) none of the mentionedView Answer

Answer:aExplanation:None.

10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is calleda) short frame

b) run framec) mini framed) man frameView Answer

Answer:bExplanation:None.

Computer Networks Questions & Answers – Wireless LAN

This section of our 1000+ Computer Networks MCQs focuses on Wireless LAN.

1. What is the access point (AP) in wireless LAN?a) device that allows wireless devices to connect to a wired networkb) wireless devices itselfc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

2. In wireless ad-hoc networka) access point is not requiredb) access point is mustc) nodes are not requiredd) none of the mentionedView Answer

Answer:aExplanation:None.

3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?a) CDMAb) CSMA/CAc) ALOHAd) none of the mentionedView Answer

Answer:bExplanation:None.

4. In wireless distribution systema) multiple access point are inter-connected with each other

b) there is no access pointc) only one access point existsd) none of the mentionedView Answer

Answer:aExplanation:None.

5. A wireless network interface controller can work ina) infrastructure modeb) ad-hoc modec) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.

6. In wireless network an extended service set is a set ofa) connected basic service setsb) all stationsc) all access pointsd) none of the mentionedView Answer

Answer:aExplanation:None.

7. Mostly ________ is used in wireless LAN.a) time division multiplexingb) orthogonal frequency division multiplexingc) space division multiplexingd) none of the mentionedView Answer

Answer:bExplanation:None.

8. Which one of the following event is not possible in wireless LAN.a) collision detectionb) Acknowledgement of data framesc) multi-mode data transmissiond) none of the mentionedView Answer

Answer:aExplanation:None.

9. What is Wired Equivalent Privacy (WEP) ?a) security algorithm for ethernetb) security algorithm for wireless networksc) security algorithm for usb communicationd) none of the mentionedView Answer

Answer:bExplanation:None.

10. What is WPA?a) wi-fi protected accessb) wired protected accessc) wired process accessd) wi-fi process accessView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – WiMAX

This section of our 1000+ Computer Networks MCQs focuses on WiMAX.

1. WiMAX stands fora) wireless maximum communicationb) worldwide interoperability for microwave accessc) worldwide international standard for microwave accessd) none of the mentionedView Answer

Answer:bExplanation:None.

2. WiMAX providesa) simplex communicationb) half duplex communicationc) full duplex communicationd) none of the mentionedView Answer

Answer:cExplanation:None.

3. WiMAX uses thea) orthogonal frequency division multiplexingb) time division multiplexing

c) space division multiplexingd) all of the mentionedView Answer

Answer:aExplanation:None.

4. Which one of the following modulation scheme is supported by WiMAX?a) binary phase shift keying modulationb) quadrature phase shift keying modulationc) quadrature amplitude modulationd) all of the mentionedView Answer

Answer:dExplanation:None.

5. WiMAX MAC layer provides an interface betweena) higher transport layers and physical layerb) application layer and network layerc) data link layer and network layerd) none of the mentionedView Answer

Answer:aExplanation:None.

6. For encryption, WiMAX supportsa) advanced encryption standardb) triple data encryption standardc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

7. WiMAX providesa) VoIP servicesb) IPTV servicesc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

8. Devices that provide the connectivity to a WiMAX network are known as

a) subscriber stationsb) base stationsc) gatewayd) none of the mentionedView Answer

Answer:aExplanation:None.

9. WiMAX is mostly used fora) local area networkb) metropolitan area networkc) personal area networkd) none of the mentionedView Answer

Answer:bExplanation:None.

10. Which one of the following frequency is not used in WiMAX for communication?a) 2.3 GHzb) 2.4 GHzc) 2.5 GHzd) 3.5 GHzView Answer

Answer:bExplanation:None.

Computer Networks Questions & Answers – Bluetooth

This section of our 1000+ Computer Networks MCQs focuses on Bluetooth.

1. An interconnected collection of piconet is calleda) scatternetb) micronetc) mininetd) none of the mentionedView Answer

Answer:aExplanation:Piconet is the basic unit of bluetooth system having a master node and upto seven active slave nodes.

2. In a piconet, there can be up to _____ parked nodes in the net.

a) 63b) 127c) 255d) 511View Answer

Answer:cExplanation:None.

3. Bluetooth is the wireless technology fora) local area networkb) personal area networkc) both (a) and (b)d) none of the mentionedView Answer

Answer:bExplanation:None.

4. Bluetooth usesa) frequency hoping spread spectrumb) orthogonal frequency division multiplexingc) time division multiplexingd) none of the mentionedView Answer

Answer:aExplanation:None.

5. Unauthorised access of information from a wireless device through a bluetooth connection is calleda) bluemakingb) bluesnarfingc) bluestringd) none of the mentionedView Answer

Answer:bExplanation:None.

6. What is A2DP (advanced audio distribution profile)?a) a bluetooth profile for streaming audiob) a bluetooth profile for streaming videoc) a bluetooth profile for securityd) none of the mentionedView Answer

Answer:aExplanation:None.

7. In the piconet of bluetooth one master devicea) can not be slaveb) can be slave in another piconetc) can be slave in the same piconetd) none of the mentionedView Answer

Answer:bExplanation:None.

8. Bluetooth transceiver devices operate in ______ band.a) 2.4 GHz ISMb) 2.5 GHz ISMc) 2.6 GHz ISMd) 2.7 GHz ISMView Answer

Answer:aExplanation:None.

9. The bluetooth supportsa) point-to-point connectionsb) point-to-multipoint connectionc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

10. A scatternet can have maximuma) 10 piconetsb) 20 piconetsc) 30 piconetsd) 40 piconetsView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – ATM & Frame Relay

This section of our 1000+ Computer Networks MCQs focuses on ATM & Frame Relay.

1. ATM and frame relay area) virtual circuit networksb) datagram networks

c) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:ATM stands for asynchronous transfer mode.

2. ATM uses thea) asynchronous frequency division multiplexingb) asynchronous time division multiplexingc) asynchronous space division multiplexingd) none of the mentionedView Answer

Answer:bExplanation:None.

3. ATM standard defines ____ layers.a) 2b) 3c) 4d) 5View Answer

Answer:bExplanation:Three layers are physical layer, ATM layer and application adoption layer.

4. ATM can be used fora) local area networkb) wide area networkc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

5. An ATM cell has the payload field ofa) 32 bytesb) 48 bytesc) 64 bytesd) 128 bytesView Answer

Answer:bExplanation:None.

6. Frame relay has error detection at thea) physical layer

b) data link layerc) network layerd) transport layerView Answer

Answer:bExplanation:None.

7. Virtual circuit identifier in frame relay is calleda) data link connection identifierb) frame relay identifierc) cell relay identifierd) none of the mentionedView Answer

Answer:aExplanation:None.

8. Frame relay has onlya) physical layerb) data link layerc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

9. In frame relay networks, extended address is useda) to increase the range of data link connection identifiersb) for error detectionc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

10. What is FRAD in frame relay network?a) FRAD assembles and disassembles the frames coming from other protocolsb) FRAD is used for modulation and demodulationc) FRAD is used for error detectiond) none of the mentionedView Answer

Answer:aExplanation:FRAD stands for frame relay assembler/disassembler.

Computer Networks Questions & Answers – Access Networks

This set of Computer Networks Questions & Answers focuses on “Access Networks”.

1) Which of this is not a constituent of residential telephone line?a) A high-speed downstream channelb) A medium-speed downstream channelc) A low-speed downstream channeld) None of the mentionedView Answer

Answer: cExplanation: The third part is ordinary two way telephone channel.

2) In DSL telco provides these servicesa) Wired phone accessb) ISPc) All of the mentionedd) None of the mentionedView Answer

Answer: cExplanation: The same company which provides phone connection is also its ISP in DSL.

3) The function of DSLAM isa) Convert analog signals into digital signalsb) Convert digital signals into analog signalsc) Amplify digital signalsd) None of the mentionedView Answer

Answer: aExplanation: The DSLAM located in telco’s Central Office does this function.

4) The following term is not associted with DSLa) DSLAMb) COc) Splitterd) CMTSView Answer

Answer: dExplanation: Cable modem termination system is used in cable internet access.

5) HFC containsa) Fibre cableb) Coaxial cablec) Both of the mentionedd) None of the mentionedView Answer

Answer: cExplanation: None.

6) Choose the statement which is not applicable for cable internet accessa) It is a shared broadcast mediumb) It includes HFCsc) Cable modem connects home PC to Ethernet portd) Analog signal is converted to digital signal in DSLAMView Answer

Answer: dExplanation: In cable access analog signal is converted to digital signal by CMTS.

7) Among the optical-distribution architectures that is essentially switched ehternet isa) AONb) PONc) NONd) None of the mentionedView Answer

Answer:aExplanation: Active optical networks are essentially switched ehternets.

8) StarBand providesa) FTTH internet accessb) Cable accessc) Telephone accessd) Satellite accessView Answer

Answer: dExplanation: None.

9) Home Access is provided bya) DSL

b) FTTPc) Cabled) All of the mentionedView Answer

Answer: dExplanation: None.

10) ONT is connected to splitter usinga) High speed fibre cableb) HFCc) Optical cabled) None of the mentionedView Answer

Answer: cExplanation: None.

11) These factors affect transmission rate in DSLa) The gauge of the twisted-pair lineb) Degree of electrical interfernecec) Shadow fadingd) Both a and bView Answer

Answer: dExplanation: Because DSL is made of twisted wire copper pair.

Computer Networks Questions & Answers – Physical Media

This set of Computer Networks Questions & Answers focuses on “Physical Media”.

1) Which of this is not a guided media ?a) Fiber optical cableb) Coaxial cablec) Wireless LANd) Copper wireView Answer

Answer: cExplanation: Wireless LAN is unguided media.

2) UTP is commonly used ina) DSLb) FTTPc) HTTP

d) None of the mentionedView Answer

Answer: aExplanation: Unshielded twisted pair(UTP) is commonly used in home access.

3) Coaxial cable consists of _______ concentric copper conductors.a) 1b) 2c) 3d) 4View Answer

Answer: bExplanation: None.

4) Fiber optics posses following propertiesa) Immune electromagnetic interferenceb) Very less signal attenuationc) Very hard to tapd) All of the mentionedView Answer

Answer: dExplanation: None.

5) If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps),a) n*39.8b) n*51.8c) 2n*51.8d) None of the mentionedView Answer

Answer: bExplanation: None.

6) Terrestrial radio channels are broadly classifed into _____ groups.a) 2b) 3c) 4d) 1View Answer

Answer: bExplanation: The three types are those that operate over

very short distance, those that operate in local areas, those that operate in the wide area.

7) Radio channels are attractive medium becausea) Can penetrate wallsb) Connectivity can be given to mobile userc) Can carry signals for long distanced) All of the mentionedView Answer

Answer: dExplanation: None.

8) Geostationary satellitesa) Are placed at a fixed point above the earthb) Rotate the earth about a fixed axisc) Rotate the earth about a varying axisd) All of the mentionedView Answer

Answer: aExplanation: They are placed in orbit at 36,000km above Earth’s surface.

Computer Networks Questions & Answers – Multiplexing

This set of Computer Networks Questions & Answers focuses on “Multiplexing”.

1) The sharing of a medium and its link by two or more devices is called _______a) Fully duplexingb) Multiplexingc) Both a and bd) None of the mentionedView Answer

Answer: bExplanation: None.

2) Multiplexing is used in _______a) Packet switchingb) Circuit switchingc) Data switchingd) None of the mentionedView Answer

Answer: bExplanation: None.

3) Which multiplexing technique transmits digital signals ?a) FDMb) TDMc) WDMd) None of the mentionedView Answer

Answer: bExplanation: FDM and WDM are used in analog signals.

4) If there are n signal sources of same data rate than TDM link has _______ slotsa) nb) n/2c) n*2d) 2^nView Answer

Answer: aExplanation: Each slot is dedicated to one of the source.

5) If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM isa) 32kbpsb) 500bpsc) 500kbpsd) None of the mentionedView Answer

Answer: aExplanation: Transmission rate= frame rate * number os bits in a slot.

6) The state when dedicated signals are idle are calleda) Death periodb) Poison periodc) Silent periodd) None of the mentionedView Answer

Answer: cExplanation: None.

7) Multiplexing can providea) Efficiencyb) Privacyc) Anti jamming

d) Both a and bView Answer

Answer: dExplanation: None.

8) In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources.a) Greater thanb) Lesser thanc) Equal tod) Equal to or greater thanView Answer

Answer: aExplanation: None.

9) In TDM, slots are further divided intoa) Secondsb) Framesc) Packetsd) None of the mentionedView Answer

Answer: bExplanation: None.

10) Multiplexing technique that shifts each signal to a different carrier frequencya) FDMb) TDMc) Either a or bd) Both a and bView Answer

Answer: aExplanation: FDM stands for Frequency division multiplexing.

Computer Networks Questions & Answers – Topology

This set of Computer Networks Questions & Answers

focuses on “Topology”.

1) Physical or logical arrangement of network isa) Topologyb) Routingc) Networkingd) None of the mentionedView Answer

Answer: aExplanation: None.

2) In this topology there is a central controller or huba) Starb) Meshc) Ringd) BusView Answer

Answer: aExplanation: None.

3) This topology requires multipoint connectiona) Starb) Meshc) Ringd) BusView Answer

Answer: dExplanation: None.

4) Data communication system spanning states, countries, or the whole world isa) LANb) WANc) MANd) None of the mentionedView Answer

Answer: bExplanation:Wide area network(WAN) covers the whole of the world network.

5) Data communication system within a building or campus isa) LANb) WANc) MAN

d) None of the mentionedView Answer

Answer: aExplanation: None.

6) Expand WANa) World area networkb) Wide area networkc) Web area networkd) None of the mentionedView Answer

Answer: b

Computer Networks Questions & Answers – Packet Switching & Circuit Switching

This set of Computer Networks Questions & Answers focuses on “Packet Switching and Circuit Switching”.

1) A local telephone network is an example of a _______ networka) Packet switchedb) Circuit switchedc) both of the mentionedd) none of the mentionedView Answer

Answer: aExplanation: None.

2) Most packet switches use this principlea) Stop and waitb) Store and forwardc) Both of the mentionedd) None of the mentionedView Answer

Answer: bExplanation: The packet switch will not transmit the first bit to outbound link until it recieves the entire packet.

3) If there are N routers from source to destination, total end to end delay in sending packet P(L->number of bits in the packet R-> transmission rate)a) Nb) (N*L)/R

c) (2N*L)/Rd) L/RView Answer

Answer: bExplanation: None.

4) Method(s) to move data through a network of links and switchesa) Packet switchingb) Circuit switchingc) Line switchingd) Both a and bView Answer

Answer: dExplanation: None.

5) The resources needed for communication between end systems are reserved for the duration of session between end systems in ________a) Packet switchingb) Circuit switchingc) Line switchingd) Frequency switchingView Answer

Answer: bExplanation: None.

6) As the resouces are reserved between two communicating end systems in circuit switching, this is achieveda) authenticationb) guaranteed constant ratec) reliabilityd) store and forwardView Answer

Answer: bExplanation: None.

7) In _________ resources are allocated on demand.a) packet switchingb) circuit switchingc) line switchingd) frequency switchingView Answer

Answer: aExplanation: In packet switching there is no reservation.

Computer Networks Questions & Answers – SONET

This section of our 1000+ Computer Networks MCQs focuses on SONET.

1. SONET stands fora) synchronous optical networkb) synchronous operational networkc) stream optical networkd) shell operational networkView Answer

Answer:aExplanation:None.

2. In SONET, STS-1 level of electrical signalling has the data rate ofa) 51.84 Mbpsb) 155.52 Mbpsc) 466.56 Mbpsd) none of the mentionedView Answer

Answer:aExplanation:None.

3. The path layer of SONET is responsible for the movement of a signala) from its optical source to its optical destinationb) across a physical linec) across a physical sectiond) none of the mentionedView Answer

Answer:bExplanation:None.

4. The photonic layer of the SONET is similar to the _____ of OSI model.a) network layerb) data link layerc) physical layerd) none of the mentionedView Answer

Answer:cExplanation:None.

5. In SONET, each synchronous transfer signal STS-n is composed ofa) 2000 framesb) 4000 framesc) 8000 framesd) 16000 framesView Answer

Answer:cExplanation:None.

6. Which one of the following is not true about SONET?a) frames of lower rate can be synchronously time-division multiplexed into a higher-rate frameb) multiplexing is synchronous TDMc) all clocks in the network are locked to a master clockd) none of the mentionedView Answer

Answer:dExplanation:None.

7. A linear SONET network can bea) point-to-pointb) multi-pointc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

8. Automatic protection switching in linear network is defined at thea) line layerb) section layerc) photonic layerd) path layerView Answer

Answer:aExplanation:None.

9. A unidirectional path switching ring is a network witha) one ringb) two ringsc) three ringsd) four ringsView Answer

Answer:bExplanation:One ring is used as the working ring and other as the protection ring.

10. What is SDH?a) SDH is similar standard to SONET developed by ITU-Tb) synchronous digital hierarchyc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

Computer Networks Questions & Answers – Internet

This section of our 1000+ Computer Networks MCQs focuses on Internet.

1. What is internet?a) a single networkb) a vast collection of different networksc) interconnection of local area networksd) none of the mentionedView Answer

Answer:bExplanation:None.

2. To join the internet, the computer has to be connected to aa) internet architecture boardb) internet societyc) internet service providerd) none of the mentionedView Answer

Answer:cExplanation:None.

3. Internet access by transmitting digital data over the wires of a local telephone network is provided bya) leased lineb) digital subscriber linec) digital signal lined) none of the mentionedView Answer

Answer:bExplanation:None.

4. ISP exchanges internet traffic between their networks bya) internet exchange pointb) subscriber end pointc) ISP end pointd) none of the mentionedView Answer

Answer:aExplanation:None.

5. Which one of the following protocol is not used in internet?a) HTTPb) DHCPc) DNSd) none of the mentionedView Answer

Answer:dExplanation:None.

6. IPv6 addressed have a size ofa) 32 bitsb) 64 bitsc) 128 bitsd) 265 bitsView Answer

Answer:cExplanation:None.

7. Internet works ona) packet switchingb) circuit switchingc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

8. Which one of the following is not an application layer protocol used in internet?a) remote procedure callb) internet relay chatc) resource reservation protocol

d) none of the mentionedView Answer

Answer:cExplanation:None.

9. Which protocol assigns IP address to the client connected in the internet?a) DHCPb) IPc) RPCd) none of the mentionedView Answer

Answer:aExplanation:None.

10. Which one of the following is not used in media access control?a) ethernetb) digital subscriber linec) fiber distributed data interfaced) none of the mentionedView Answer

Answer:dExplanation:None.

Computer Networks Questions & Answers – Cryptography

This section of our 1000+ Computer Networks MCQs focuses on Cryptography.

1. In cryptography, what is cipher?a) algorithm for performing encryption and decryptionb) encrypted messagec) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

2. In asymmetric key cryptography, the private key is kept bya) senderb) receiverc) sender and receiver

d) all the connected devices to the networkView Answer

Answer:bExplanation:None.

3. Which one of the following algorithm is not used in asymmetric-key cryptography?a) RSA algorithmb) diffie-hellman algorithmc) electronic code book algorithmd) none of the mentionedView Answer

Answer:cExplanation:None.

4. In cryptography, the order of the letters in a message is rearranged bya) transpositional ciphersb) substitution ciphersc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

5. What is data encryption standard (DES)?a) block cipherb) stream cipherc) bit cipherd) none of the mentionedView Answer

Answer:aExplanation:None.

6. Cryptanalysis is useda) to find some insecurity in a cryptographic schemeb) to increase the speedc) to encrypt the datad) none of the mentionedView Answer

Answer:aExplanation:None.

7. Which one of the following is a cryptographic protocol used to secure HTTP connection?

a) stream control transmission protocol (SCTP)b) transport layer security (TSL)c) explicit congestion notification (ECN)d) resource reservation protocolView Answer

Answer:bExplanation:None.

8. Voice privacy in GSM cellular telephone protocol is provided bya) A5/2 cipherb) b5/4 cipherc) b5/6 cipherd) b5/8 cipherView Answer

Answer:aExplanation:None

9. ElGamal encryption system isa) symmetric key encryption algorithmb) asymmetric key encryption algorithmc) not an encryption algorithmd) none of the mentionedView Answer

Answer:bExplanation:None.

10. Cryptographic hash function takes an arbitrary block of data and returnsa) fixed size bit stringb) variable size bit stringc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – Security In The Internet

This section of our 1000+ Computer Networks MCQs focuses on Security In The Internet.

1. IPSec is designed to provide the security at thea) transport layerb) network layer

c) application layerd) session layerView Answer

Answer:bExplanation:None.

2. In tunnel mode IPsec protects thea) entire IP packetb) IP headerc) IP payloadd) none of the mentionedView Answer

Answer:aExplanation:None.

3. Network layer firewall works as aa) frame filterb) packet filterc) both (a) and (b)d) none of the mentionedView Answer

Answer:bExplanation:None.

4. Network layer firewall has two sub-categories asa) stateful firewall and stateless firewallb) bit oriented firewall and byte oriented firewallc) frame firewall and packet firewalld) none of the mentionedView Answer

Answer:aExplanation:None.

5. WPA2 is used for security ina) ethernetb) bluetoothc) wi-fid) none of the mentionedView Answer

Answer:cExplanation:None.

6. An attempt to make a computer resource unavailable to its intended users is calleda) denial-of-service attack

b) virus attackc) worms attackd) botnet processView Answer

Answer:aExplanation:None.

7. Extensible authentication protocol is authentication framework frequently used ina) wired personal area networkb) wireless networksc) wired local area networkd) none of the mentionedView Answer

Answer:bExplanation:None.

8. Pretty good privacy (PGP) is used ina) browser securityb) email securityc) FTP securityd) none of the mentionedView Answer

Answer:bExplanation:None.

9. PGP encrypts data by using a block cipher calleda) international data encryption algorithmb) private data encryption algorithmc) intrenet data encryption algorithmd) none of the mentionedView Answer

Answer:aExplanation:None.

10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is calleda) DNS lookupb) DNS hijackingc) DNS spoofingd) none of the mentionedView Answer

Computer Networks Questions & Answers – Delays and Loss

This set of Computer Networks Questions & Answers

focuses on “Delays and Loss”.

1) Which of the following delay is faced by the

packet in travelling from one end system to another

?

a) Propagation delay

b) Queuing delay

c) Transmission delay

d) All of the mentioned

View Answer

Answer: d

Explanation: None.

2) For a 10Mbps Ethernet link, if the length of the

packet is 32bits, the transmission delay is(in

milliseconds)

a) 3.2

b) 32

c) 0.32

d) None of the mentioned

View Answer

Answer: a

Explanation: Transmission rate = length / transmission

rate = 32/10 = 3.2milli seconds.

3) The time required to examine the packet’s

header and determine where to direct the packet is

part of

a) Processing delay

b) Queuing delay

c) Transmission delay

d) All of the mentioned

View Answer

Answer: a

Explanation: None.

4) Traffic intensity is given by, where L = number of

bits in the packet a = average rate R = transmission

rate

a) La/R

b) LR/a

c) R/La

d) None of the mentioned

View Answer

Answer: a

Explanation: None.

5) In the transfer of file between server and client, if

the transmission rates along the path is 10Mbps,

20Mbps, 30Mbps, 40Mbps. The throughput is

usually

a) 20Mbps

b) 10Mbps

c) 40Mbps

d) 50Mbps

View Answer

Answer: b

Explanation: The throughput is generally the

transmission rate of bottleneck link.

6) If end to end delay is given by dend-end =

N(dproc + dtrans + dprop) is a non congested

network. The number of routers between source

and destination is

a) N/2

b) N

c) N-1

d) 2N

View Answer

Answer: c

Explanation: None.

7) The total nodal delay is given by

a) dnodal = dproc – dqueue + dtrans + dprop

b) dnodal = dproc + dtrans – dqueue

c) dnodal = dproc + dqueue + dtrans + dprop

d) dnodal = dproc + dqueue – dtrans – dprop

View Answer

Answer: c

Explanation: None.

8) In a network, If P is the only packet being

transmitted and there was no earlier transmission,

which of the following delays could be zero

a) Propogation delay

b) Queuing delay

c) Transmission delay

d) Processing delay

View Answer

Answer: b

Explanation: None.

9) Transmission delay does not depend on

a) Packet length

b) Distance between the routers

c) Transmission rate

d) None of the mentioned

View Answer

Answer: b

Explanation: Transmission delay = packet length /

transmission rate

10) Propagation delay depends on

a) Packet length

b) Transmission rate

c) Distance between the routers

d) None of the mentioned

View Answer

Answer: c

Explanation: Propagation delay is the time it takes a bit

to propagate from one router to the next.

Computer Networks Questions & Answers – Network Attacks

This set of Computer Networks Questions & Answers

focuses on “Network Attacks”.

1) The attackers a network of compromised

devices known as

a) Internet

b) Botnet

c) Telnet

d) D-net

View Answer

Answer: b

Explanation: None.

2) Which of the following is a form of DoS attack ?

a) Vulnerability attack

b) Bandwidth flooding

c) Connection flooding

d) All of the mentioned

View Answer

Answer: d

Explanation: None.

3) The DoS attack is which the attacker establishes

a large number of half-open or fully open TCP

connections at the target host

a) Vulnerability attack

b) Bandwidth flooding

c) Connection flooding

d) All of the mentioned

View Answer

Answer: c

Explanation: None.

4)The DoS attack is which the attacker sends

deluge of packets to the targeted host

a) Vulnerability attack

b) Bandwidth flooding

c) Connection flooding

d) All of the mentioned

View Answer

Answer: b

Explanation: None.

5) Packet sniffers involve

a) Active receiver

b) Passive receiver

c) Both of the mentioned

d) None of the mentioned

View Answer

Answer: b

Explanation: They donot inject packets into the channel.

6) Sniffers can be deployed in

a) Wired environment

b) WiFi

c) Ethernet LAN

d) All of the mentioned

View Answer

Answer: d

Explanation: None.

7) Firewalls are often configured to block

a) UDP traffic

b) TCP traffic

c) Both of the mentioned

d) None of the mentioned

View Answer

Answer: a

Explanation: None.

Computer Networks Questions & Answers – Reference Models

This set of Computer Networks Questions & Answers

focuses on “Reference Models”.

1) The number of layers in Internet protocol stack

a) 5

b) 7

c) 6

d) None of the mentioned

View Answer

Answer: a

Explanation: None.

2) The number of layers in ISO OSI reference

model

a) 5

b) 7

c) 6

d) None of the mentioned

View Answer

Answer: b

Explanation: None.

3) This layer in an addition to OSI model

a) Application layer

b) Presentation layer

c) Session layer

d) Both b and c

View Answer

Answer: d

Explanation: None.

4) Application layer is implemented in

a) End system

b) NIC

c) Ethernet

d) None of the mentioned

View Answer

Answer: a

Explanation: None.

4) Transport layer is implemented in

a) End system

b) NIC

c) Ethernet

d) None of the mentioned

View Answer

Answer: a

Explanation: None.

5) The functionalities of presentation layer includes

a) Data compression

b) Data encryption

c) Data description

d) All of the mentioned

View Answer

Answer: d

Explanation: None.

6) Delimiting and synchronization of data exchange

is provided by

a) Application layer

b) Session layer

c) Transport layer

d) Link layer

View Answer

Answer: b

Explanation: None.

7) In OSI model, when data is sent from device A to

device B, the 5th layer to recieve data at B is

a) Application layer

b) Transport layer

c) Link layer

d) Session layer

View Answer

Answer: d

Explanation: None.

8) In Internet protocol stack, when data is sent from

device A to device B, the 5th layer to receive data

at B is

a) Application layer

b) Transport layer

c) Link layer

d) Session layer

View Answer

Answer: a

Explanation: None.

9) In the OSI model, as a data packet moves from

the lower to the upper layers, headers are _______

a) Added

b) Removed

c) Rearranged

d) None of the mentioned

View Answer

Answer: b

Explanation: None.

10) Identify the statement which cannot be

associated with OSI model

a) A structured way to discuss and easier update

syatem components

b) One layer may duplicate lower layer functionality

c) Functionality at one layer no way requires

information from another layer

d) None of the mentioned

View Answer

Answer: c

Explanation: One layer may use the information from

another layer Ex: time stamp value.Computer Networks Questions & Answers – DHCP

This section of our 1000+ Computer Networks MCQs focuses on DHCP Protocol.

1. DHCP (dynamic host configuration protocol) provides _____ to the client.a) IP addressb) MAC addressc) urld) none of the mentionedView Answer

Answer:aExplanation:None.

2. DHCP is used fora) IPv6b) IPv4c) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

3. The DHCP servera) maintains a database of available IP addressesb) maintains the information about client configuration parametersc) grants a IP address when receives a request from a clientd) all of the mentionedView Answer

Answer:dExplanation:None.

4. IP assigned for a client by DHCP server isa) for a limited periodb) for unlimited periodc) not time dependentd) none of the mentionedView Answer

Answer:aExplanation:None.

5. DHCP uses UDP port ____ for sending data to the server.a) 66b) 67c) 68d) 69View Answer

Answer:bExplanation:None.

6. The DHCP server can provide the _______ of the IP addresses.a) dynamic allocationb) automatic allocationc) static allocationd) all of the mentionedView Answer

Answer:dExplanation:None.

7. DHCP client and servers on the same subnet communicate viaa) UDP broadcastb) UDP unicastc) TCP broadcastd) TCP unicastView Answer

Answer:aExplanation:None.

8. After obtaining the IP address, to prevent the IP conflict the client may usea) internet relay chatb) broader gateway protocolc) address resolution protocold) none of the mentionedView Answer

Answer:cExplanation:None.

9. What is DHCP snooping?a) techniques applied to ensure the security of an existing DHCP infrastructureb) encryption of the DHCP server requestsc) algorithm for DHCPd) none of the mentionedView Answer

Answer:aExplanation:None.

10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.a) MAC address

b) IP addressc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

Computer Networks Questions & Answers – SSH

This section of our 1000+ Computer Networks MCQs focuses on SSH Protocol.

1. Secure shell (SSH) network protocol is used fora) secure data communicationb) remote command-line loginc) remote command executiond) all of the mentionedView Answer

Answer:dExplanation:None.

2. SSH can be used in onlya) unix-like operating systemsb) windowsc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

3. SSH uses _______ to authenticate the remote computer.a) public-key cryptographyb) private-key cryptographyc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

4. Which standard TCP port is assigned for contacting SSH servers?a) port 21b) port 22c) port 23

d) port 24View Answer

Answer:bExplanation:None.

5. Which one of the following protocol can be used for login to a shell on a remote host except SSH?a) telnetb) rloginc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:SSH is more secured then telnet and rlogin.

6. Which one of the following is a file transfer protocol using SSH?a) SCPb) SFTPc) rsyncd) all of the mentionedView Answer

Answer:dExplanation:None.

7. SSH-2 does not containa) transport layerb) user authentication layerc) physical layerd) connection layerView Answer

Answer:cExplanation:None.

8. Which one of the following feature was present in SSH protocol, version 1?a) password changingb) periodic replacement of session keysc) support for public-key certificatesd) none of the mentionedView Answer

Answer:dExplanation:None.

9. SCP protocol is evolved from _____ over SSH.a) RCP protocolb) DHCP protocolc) MGCP protocold) none of the mentionedView Answer

Answer:aExplanation:None.

10. Which one of the following authentication method is used by SSH?a) public-keyb) host basedc) passwordd) all of the mentionedView Answer

Answer:dExplanation:None.

Computer Networks Questions & Answers – SMTP

This section of our 1000+ Computer Networks MCQs focuses on SMTP Protocol.

1. Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.a) TCPb) UDPc) DCCPd) SCTPView Answer

Answer:aExplanation:None.

2. SMTP connections secured by SSL are known asa) SMTPSb) SSMTPc) SNMPd) none of the mentionedView Answer

Answer:aExplanation:None.

3. SMTP uses the TCP porta) 22b) 23

c) 24d) 25View Answer

Answer:dExplanation:None.

4. Which one of the following protocol is used to receive mail messages?a) SMTPb) post office protocolc) internet message access protocold) all of the mentionedView Answer

Answer:dExplanation:None.

5. What is on-demand mail relay (ODMR)?a) protocol for SMTP securityb) an SMTP extensionc) protocol for web pagesd) none of the mentionedView Answer

Answer:bExplanation:None.

6. An email client needs to know the ____ of its initial SMTP server.a) IP addressb) MAC addressc) urld) none of the mentionedView Answer

Answer:aExplanation:None.

7. A SMTP session may includea) zero SMTP transactionb) one SMTP transactionc) more than one SMTP transactiond) all of the mentionedView Answer

Answer:dExplanation:None.

8. SMTP definesa) message transportb) message encryptionc) message contentd) none of the mentionedView Answer

Answer:aExplanation:None.

9. Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?a) open mail relayb) wide mail receptionc) open mail receptiond) none of the mentionedView Answer

Answer:aExplanation:None.

10. SMTP is used to deliver messages toa) user’s terminalb) user’s mailboxc) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

Computer Networks Questions & Answers – SMTP

This set of Computer Networks Questions & Answers focuses on “SMTP”.

1) When the mail server sends mail to other mail servers it becomes _____ ?a) SMTP serverb) SMTP clientc) Peerd) None of the mentionedView Answer

Answer: bExplanation: None.

2) If you have to send multimedia data over SMTP it has to be encoded into

a) Binaryb) Signalc) ASCIId) None of the mentionedView Answer

Answer: cExplanation: None.

3) Expansion of SMTP isa) Simple Mail Transfer Protocolb) Simple Message Transfer Protocolc) Simple Mail Transmission Protocold) Simple Message Transmission ProtocolView Answer

Answer: aExplanation: None.

4) In SMTP, the command to write recievers mail adress is written with this commanda) SEND TOb) RCPT TOc) MAIL TOd) None of the mentionedView Answer

Answer: bExplanation: None.

5) The underlying Transport layer protocol used by SMTP isa) TCPb) UDPc) Either a or bd) None of the mentionedView Answer

Answer: aExplanation: None.

6) Choose the statement which is wrong incase of SMTPa) It requires message to be in 7bit ASCII formatb) It is a pull protocolc) It transfers files from one mail server to another mail serverd) None of the mentionedView Answer

Answer: bExplanation: The sending mail server pushes the mail to receiving mail server hence it is push protocol.

7) Internet mail places each object ina) Separate messages for each objectb) One messagec) Varies with number of objectsd) None of the mentionedView Answer

Answer: bExplanation: None.

8) Typically the TCP port used by SMTP isa) 25b) 35c) 50d) 15View Answer

Answer: aExplanation: None.

9) A session may includea) Zero or more SMTP transactionsb) Exactly one SMTP transactionsc) Always more than one SMTP transactionsd) Number of SMTP transactions cant be determinedView Answer

Answer: aExplanation: None.

10) Example of user agents for e-maila) Microsoft Outlookb) Apple Mailc)d) All of the mentionedView Answer

Answer: dExplanation: None.

11) When the sender and the receiver of an email are on different systems, we need only ______ .a) One MTAb) Two UAsc) Two UAs and one pair of MTAs

d) Two UAs and two pairs of MTAsView Answer

Answer: dExplanation: None.

12) User agent does not support thisa) Composing messagesb) Reading messagesc) Replying messagesd) All of the mentionedView Answer

Answer: dExplanation: None.

Computer Networks Questions & Answers – SMTP

This set of Computer Networks Questions & Answers focuses on “SMTP”.

1) When the mail server sends mail to other mail servers it becomes _____ ?a) SMTP serverb) SMTP clientc) Peerd) None of the mentionedView Answer

Answer: bExplanation: None.

2) If you have to send multimedia data over SMTP it has to be encoded intoa) Binaryb) Signalc) ASCIId) None of the mentionedView Answer

Answer: cExplanation: None.

3) Expansion of SMTP isa) Simple Mail Transfer Protocolb) Simple Message Transfer Protocolc) Simple Mail Transmission Protocold) Simple Message Transmission ProtocolView Answer

Answer: aExplanation: None.

4) In SMTP, the command to write recievers mail adress is written with this commanda) SEND TOb) RCPT TOc) MAIL TOd) None of the mentionedView Answer

Answer: bExplanation: None.

5) The underlying Transport layer protocol used by SMTP isa) TCPb) UDPc) Either a or bd) None of the mentionedView Answer

Answer: aExplanation: None.

6) Choose the statement which is wrong incase of SMTPa) It requires message to be in 7bit ASCII formatb) It is a pull protocolc) It transfers files from one mail server to another mail serverd) None of the mentionedView Answer

Answer: bExplanation: The sending mail server pushes the mail to receiving mail server hence it is push protocol.

7) Internet mail places each object ina) Separate messages for each objectb) One messagec) Varies with number of objectsd) None of the mentionedView Answer

Answer: bExplanation: None.

8) Typically the TCP port used by SMTP isa) 25b) 35

c) 50d) 15View Answer

Answer: aExplanation: None.

9) A session may includea) Zero or more SMTP transactionsb) Exactly one SMTP transactionsc) Always more than one SMTP transactionsd) Number of SMTP transactions cant be determinedView Answer

Answer: aExplanation: None.

10) Example of user agents for e-maila) Microsoft Outlookb) Apple Mailc)d) All of the mentionedView Answer

Answer: dExplanation: None.

11) When the sender and the receiver of an email are on different systems, we need only ______ .a) One MTAb) Two UAsc) Two UAs and one pair of MTAsd) Two UAs and two pairs of MTAsView Answer

Answer: dExplanation: None.

12) User agent does not support thisa) Composing messagesb) Reading messagesc) Replying messagesd) All of the mentionedView Answer

Answer: dExplanation: None.

Computer Networks Questions & Answers – RPC

This section of our 1000+ Computer Networks MCQs focuses on RPC Protocol.

1. An RPC (remote procedure call) is initiated by thea) serverb) clientc) both (a) and (b)d) none of the mentionedView Answer

Answer:bExplanation:None.

2. In RPC, while a server is processing the call, the client is blockeda) unless the client sends an asynchronous request to the serverb) unless the call processing is completec) for the complete duration of the connectiond) none of the mentionedView Answer

Answer:aExplanation:None.

3. Remote procedure calls isa) inter-process communicationb) a single processc) a single threadd) none of the mentionedView Answer

Answer:aExplanation:None.

4. RPC allows a computer program to cause a subroutine to execute ina) its own address spaceb) another address spacec) both (a) and (b)d) none of the mentionedView Answer

Answer:bExplanation:None.

5. RPC works between two processes. These processes must bea) on the same computerb) on different computers connected with a network

c) both (a) and (b)d) none of the mentionedView Answer

Answer:cExplanation:None.

6. A remote procedure is uniquely identified bya) program numberb) version numberc) procedure numberd) all of the mentionedView Answer

Answer:dExplanation:None.

7. An RPC application requiresa) specific protocol for client server communicationb) a client programc) a server programd) all of the mentionedView Answer

Answer:dExplanation:None.

8. RPC is used toa) establish a server on remote machine that can respond to queriesb) retrieve information by calling a queryc) both (a) and (b)d) none of the mentionedView Answer

9. RPC is aa) synchronous operationb) asynchronous operationc) time independent operationd) none of the mentionedView Answer

Answer:aExplanation:None.

10. The local operating system on the server machine passes the incoming packets to thea) server stubb) client stubc) client operating system

d) none of the mentionedView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – RTP

This section of our 1000+ Computer Networks MCQs focuses on rea-time transport protocol.

1. Real-time transport protocol (RTP) is mostly used ina) streaming mediab) video teleconferencec) television servicesd) all of the mentionedView Answer

Answer:dExplanation:None.

2. RTP is used toa) carry the media streamb) monitor transmission statistics of streamsc) monitor quality of service of streamsd) none of the mentionedView Answer

Answer:aExplanation:None.

3. RTP provides the facility of jitter ____ .a) compensationb) expansionc) both (a) and (b)d) none of the mentionedView Answer

Answer:aExplanation:None.

4. Which protocol provides the synchronization between media streams?a) RTPb) RTCPc) RPCd) none of the mentionedView Answer

Answer:bExplanation:None.

5. An RTP session is established fora) each media streamb) all media streamsc) some predefined number of media streamsd) none of the mentionedView Answer

Answer:aExplanation:None.

6. RTP can usea) unprevileleged UDP portsb) stream control transmission protocolc) datagram congestion control protocold) all of the mentionedView Answer

Answer:dExplanation:None.

7. Which one of the following multimedia formats can not be supported by RTP?a) MPEG-4b) MJPEGc) MPEGd) none of the mentionedView Answer

Answer:dExplanation:None.

8. An RTP header has a minimum size ofa) 12 bytesb) 16 bytesc) 24 bytesd) 32 bytesView Answer

Answer:aExplanation:None.

9. Which one of the following is not correct?a) RTCP provides canonical end-point identifiers to all session participantsb) RTCP reports are expected to be sent by all participantsc) both (a) and (b)d) none of the mentionedView Answer

Answer:dExplanation:None.

10. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?a) SRTPb) RTCPc) RCPd) none of the mentionedView Answer

Answer:aExplanation:None.

Computer Networks Questions & Answers – FTP

This set of Computer Networks Questions & Answers focuses on “FTP”.

1) Expansion of FTP isa) Fine Transfer Protocolb) File Transfer Protocolc) First Transfer Protocold) None of the mentionedView Answer

Answer: bExplanation: None.

2) FTP is built on _____ architecturea) Client-serverb) P2Pc) Both of the mentionedd) None of the mentionedView Answer

Answer: aExplanation: None.

3) FTP uses _____ parallel TCP connections to transfer a filea) 1b) 2c) 3d) 4View Answer

Answer: bExplanation: Control connection and data connection.

4) Identify the incorrect statementa) FTP stands for File Transfer Protocolb) FTP uses two parallel TCP connectionsc) FTP sends its control information in-bandd) FTP sends exactly one file over the data connectionView Answer

Answer: cExplanation: FTP is out-of-band as it has separate control connection.

5) If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B isa) 5b) 10c) 2d) 6View Answer

Answer: dExplanation: 1 control connection and other 5 for five file transfers.

6) FTP servera) Mantains stateb) Is statelessc) Has single TCP connection for a file transferd) None of the mentionedView Answer

Answer: aExplanation: None.

7) The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII formata) 8b) 7c) 3d) 5View Answer

Answer: bExplanation: None.

8) Find the FTP reply whose message is wrongly matcheda) 331 – Username OK, password requiredb) 425 – Can’t open data connectionc) 452 – Error writing file

d) 452 – Can’t open data connectionView Answer

Answer: dExplanation: None.

9) Mode of data transfer in FTP, where all the is left to TCPa) Stream modeb) Block modec) Compressed moded) None of the mentionedView Answer

Answer: aExplanation: None.

10) The password is sent to the server using _____ commanda) PASSWDb) PASSc) PASSWORDd) None of the mentionedView Answer

Answer: bExplanation: None.

Computer Networks Questions & Answers – Network Utilities

This set of Computer Networks Questions & Answers focuses on “Network Utilities”.

1) Ping cana) Measure round-trip timeb) Report packet lossc) Report latencyd) All of the mentionedView Answer

Answer: dExplanation: None.

2) Ping sweep is a part ofa) Tracerouteb) Nmapc) Routed) IpconfigView Answer

Answer: bExplanation: A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are mostly used by network scanning tools like nmap.

3) ICMP is used ina) Pingb) Traceroutec) Ifconfigd) Both a and bView Answer

Answer: dExplanation: None.

4) _____ command is used to manipulate TCP/IP routing table.a) routeb) Ipconfigc) Ifconfigd) TracerouteView Answer

Answer: aExplanation: None.

5) If you want to find the number of routers between a source and destination, the utility to be used is.a) routeb) Ipconfigc) Ifconfigd) TracerouteView Answer

Answer: dExplanation: None.

6) Which of the following is related to ipconfig in Microsoft Windows ?a) Display all current TCP/IP network configuration valuesb) Modify DHCP settingsc) Modify DNS settingsd) All of the mentionedView Answer

Answer: dExplanation: None.

7) This allows to check if a domain is available for registration.

a) Domain Checkb) Domain Dossierc) Domain Lookupd) None of the mentionedView Answer

Answer: aExplanation: None.

8) Choose the wrong statementa) Nslookup is used to query a DNS server for DNS datab) Ping is used to check connectivityc) Pathping combines the functionality of ping with that of routed) Ifconfig can configure TCP/IP network interface parametersView Answer

Answer: cExplanation: Pathping combines the functionality of ping with that of traceroute (tracert)

Computer Networks Questions & Answers – HTTP

This set of Computer Networks Questions & Answers focuses on “HTTP”.

1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______a) 4b) 1c) 5d) None of the mentionedView Answer

Answer: cExplanation: 4 jpeg images + 1 base HTML file.

2. The default connection type used by HTTP is _____a) Persistentb) Non-persistentc) Either of the mentionedd) None of the mentionedView Answer

Answer: aExplanation: None.

3. The time taken by a packet to travel from client to server and then back to the client is called ____

a) STTb) RTTc) PTTd) None of the mentionedView Answer

Answer: bExplanation: RTT stands for round-trip time.

4. The HTTP request message is sent in ____ part of three-way handshake.a) Firstb) Secondc) Thirdd) None of the mentionedView Answer

Answer: cExplanation: None.

5. In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.a) 2b) 1c) 4d) 3View Answer

Answer: bExplanation: None.

6. The first line of HTTP request message is called ____a) Request lineb) Header linec) Status lined) Entity lineView Answer

Answer: aExplanation: The line followed by request line are called header lines and status line is the initial part of response message.

7. The values GET, POST, HEAD etc are specified in ____ of HTTP messagea) Request lineb) Header linec) Status lined) Entity bodyView Answer

Answer: aExplanation: It is specified in the method field of request line in the HTTP request message.

8. The ______ method when used in the method field, leaves entity body empty.a) POSTb) GETc) Both of the mentionedd) None of the mentionedView Answer

Answer: bExplanation: None.

9. The HTTP response message leaves out the requested object when _____ method is useda) GETb) POSTc) HEADd) PUTView Answer

Answer: cExplanation: None.

10. Find the oddly matched HTTP status codesa) 200 OKb) 400 Bad Requestc) 301 Moved permanentlyd) 304 Not FoundView Answer

Answer: dExplanation: 404 Not Found.

11. Which of the following is not correct ?a) Web cache doesnt has its own disk spaceb) Web cache can act both like server and clientc) Web cache might reduce the response timed) Web cache contains copies of recently requested objectsView Answer

Answer: aExplanation: None.

12. The conditional GET mechanisma) Imposes conditions on the objects to be requestedb) Limits the number of response from a server

c) Helps to keep a cache upto dated) None of the mentionedView Answer

Answer: cExplanation: None.

13. Which of the following is present in both an HTTP request line and a status line?a) HTTP version numberb) URLc) Methodd) None of the mentionedView Answer

Answer: aExplanation: None

Computer Networks Questions & Answers – IPv4

This set of Computer Networks Questions & Answers focuses on “IPv4″.

1. Which of the following is not applicable for IP?a) Error reportingb) Handle addressing conventionsc) Datagram formatd) Packet handling conventionsView Answer

Answer: aExplanation: Error reporting is handled by ICMP.

2. Which of the following field in IPv4 datagram is not related to fragmentation?a) Flagsb) Offsetc) TOSd) IdentifierView Answer

Answer: cExplanation: TOS-type of service identifies the type of packets.

3. The TTL field has value 10. How many routers (max) can process this datagram?a) 11b) 5c) 10

d) 1View Answer

Answer: cExplanation: TTL field is decremented by one each time the datagram is processed by a router.

4. If the value in protocol field is 17, the transport layer protocol used is ____.a) TCPb) UDPc) Either of the mentionedd) None of the mentionedView Answer

Answer: bExplanation: For TCP it is 6.

5. The data field can carry which of the following?a) TCP segemntb) UDP segmentc) ICMP messagesd) None of the mentionedView Answer

Answer: cExplanation: Data field usually has tranaport layer segment, but it can also carry ICMP messages.

6. What should be the flag value to indicate the last fragment?a) 0b) 1c) TTl valued) None of the mentionedView Answer

Answer: aExplanation: flag=0 indicates that it is the last fragment.

7. Which of these is not applicable for IP protocol?a) is connectionlessb) offer reliable servicec) offer unreliable serviced) None of the mentionedView Answer

Answer: bExplanation: Ip offers unreliable service.

8. Fragmentation has following demeritsa) complicates routersb) open to DOS attackc) overlapping of fragments.d) All of the mentionedView Answer

Answer: dExplanation: Fragmentation makes the implementation complex and also can create DOS attack.

9. Which field helps to check rearrangement of the fragments?a) offsetb) flagc) TTLd) identiferView Answer

Answer: aExplanation: offset field specifies where the fragment fits in the original datagram.

Computer Networks Questions & Answers – IPv6

This set of Computer Networks Questions & Answers focuses on “IPv6″.

1. The size of IP address in IPv6 isa) 4bytesb) 128bitsc) 8bytesd) 100bitsView Answer

Answer: bExplanation: An IPv6 address is 128 bits long.

2. The header length of an IPv6 datagram is _____.a) 10bytesb) 25bytesc) 30bytesd) 40bytesView Answer

Answer: dExplanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the datagram.

3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?a) Fragmentation fieldb) Fast-switchingc) ToS fieldd) Option fieldView Answer

Answer: cExplanation: This field enables to have different types of IP datagram.

4. IPv6 doesnot use ______ type of addressa) Broadcastb) Multicastc) Anycastd) None of the mentionedView Answer

Answer: aExplanation: Broadcast has been eliminated in IPv6.

5. These are the features present in IPv4 but not in IPv6.a) Fragmentationb) Header checksumc) Optionsd) All of the mentionedView Answer

Answer: dExplanation: All the features are only present in IPv4 and not IPv6.

6. The ____ field determines the lifetime of IPv6 datagrama) Hop limitb) TTLc) Next headerd) None of the mentionedView Answer

Answer: aExplanation: The Hop limit value is decremented by one by a router when the datagram is forwaded by the router. When the value becomes zero the datagram is discarded.

7. Dual-stack approach refers toa) Implementing Ipv4 with 2 stacksb) Implementing Ipv6 with 2 stacksc) Node has both IPv4 and IPv6 support

d) None of the mentionedView Answer

Answer: cExplanation: dual-stack is one of the approach used to support IPv6 in already existing systems.

8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here isa) use dual-stack approachb) Tunnelingc) No solutiond) Replace the systemView Answer

Answer: bExplanation: The IPv4 routers can form a tuunel.

9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bitsa) 96 to 127b) 0 to 63c) 80 to 95d) 64 to 79View Answer

Answer: aExplanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.