Multiple Choice Questions of Computer Networking
Multiple Choice Questions of Computer Networking
3-5. What is the size of Network bits & Host bits of Class A of IP address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits 24
C. Network bits 7, Host bits 23
D. Network bits 8, Host bits 23
3-6. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link
3-7. The Internet is an example of
A. Cell switched network
B. circuit switched network
C. Packet switched network
D. All of above
3-8. What does protocol defines?
A. Protocol defines what data is communicated.
B. Protocol defines how data is communicated.
C. Protocol defines when data is communicated.
D. All of above
3-9. What is the uses of subnetting?
A. It divides one large network into several smaller ones
B. It divides network into network classes
C. It speeds up the speed of network
D. None of above
3-10. Repeater operates in which layer of the OSI model?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
2.
Two
devices
are
in
network
if
a) a process in one device is able to exchange information with a process in
another
device
b)
a
process
is
running
on
both
devices
c) PIDs of the processes running of different devices are same
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
3. Which one of the following computer network is built on the top of another
network?
a)
prior
network
b)
chief
network
c)
prime
network
d)
overlay
network
View Answer
Answer:d
Explanation:None.
4.
In
a)
the
b)
the
c)
the
d)
View Answer
computer
computer
computer
computer
all
network
that
originates
that
routes
that
terminates
of
the
nodes
the
the
the
are
data
data
data
mentioned
6.
a)
b)
c)
Bluetooth
personal
local
virtual
is
an
area
area
private
example
of
network
network
network
d)
View Answer
none
of
the
mentioned
Answer:a
Explanation:None.
9.
Network
a)
in
case
b)
when
c)
when
connection
d)
none
View Answer
congestion
of
traffic
a
system
between
two
nodes
of
the
occurs
overloading
terminates
terminates
mentioned
Answer:a
Explanation:None.
10. Which one of the following extends a private network across public networks?
a)
local
area
network
b)
virtual
private
network
c)
enterprise
private
network
d)
storage
area
network
View Answer
Answer:b
Explanation:None.
This set of Computer Networks Questions & Answers focuses on Physical Media.
c) 2n*51.8
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
8) Geostationary satellites
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
View Answer
Answer: a
Explanation: They are placed in orbit at 36,000km above Earths surface.
Answer:b
Explanation:None.
2.
Dynamic
web
page
a)
is
same
every
time
whenever
it
displays
b) generates on demand by a program or a request from browser
c)
both
(a)
and
(b)
d)
none
of
the
mentioned
View Answer
Answer:b
Explanation:None.
3.
What
is
a
a)
a
program
that
can
b)
a
program
used
to
c)
it
enables
user
to
access
d)
all
of
View Answer
web
display
a
view
html
the
resources
the
browser?
web
page
documents
of
internet
mentioned
Answer:d
Explanation:None.
4.
Common
gateway
interface
is
a) generate executable files from web content
b)
generate
web
c)
stream
d)
none
of
the
View Answer
used
by web
to
server
pages
videos
mentioned
Answer:a
Explanation:None.
5.
a)
b)
c)
d)
View Answer
URL
unique
uniform
uniform
unique
stands
reference
reference
resource
resource
for
label
label
locator
locator
Answer:c
Explanation:None.
6.
A
web
cookie
is
a
small
piece
of
data
a) sent from a website and stored in users web browser while a user is browsing
a
website
b) sent from user and stored in the server while a user is browsing a website
c)
sent
d)
View Answer
from
none
root
server
of
to
the
all
servers
mentioned
Answer:a
Explanation:None.
7. Which one of the following is not used to generate dynamic web pages?
a)
PHP
b)
ASP.NET
c)
JSP
d)
none
of
the
mentioned
View Answer
8.
An
alternative
a)
b)
c)
d)
none
View Answer
of
javascript
on
of
windows
the
platform
is
VBScript
ASP.NET
JSP
mentioned
Answer:a
Explanation:None.
9.
What
is
document
object
model
(DOM)?
a) convention for representing and interacting with objects in html documents
b)
application
programming
interface
c)
hierarchy
of
objects
in
ASP.NET
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
10.
AJAX
a)
asynchronous
b)
advanced
c)
asynchronous
d)
advanced
View Answer
Answer:a
Explanation:None.
stands
javascript
JSP
JSP
javascript
and
and
and
and
for
xml
xml
xml
xml
1. Multiple object can be sent over a TCP connection between client and server
in
a)
persistent
HTTP
b)
nonpersistent
HTTP
c)
both
(a)
and
(b)
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
2.
HTTP
a)
b)
c)
d)
none
View Answer
is
application
transport
network
of
________
the
protocol.
layer
layer
layer
mentioned
Answer:a
Explanation:None.
3.
In
the
network
a)
uniform
b)
unique
c)
unique
d)
none
View Answer
HTTP
of
resources
resource
resource
resource
the
are
located
by
identifier
locator
identifier
mentioned
Answer:a
Explanation:None.
5.
In
HTTP
pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting
for
the
corresponding
responses
6.
FTP
server
a)
b)
c)
d)
View Answer
listens
for
connection
on
port
number
20
21
22
23
Answer:b
Explanation:None.
protocol.
protocol
protocol
protocol
protocol
Answer:a
Explanation:None.
8. In which mode FTP, the client initiates both the control and data connections.
a)
active
mode
b)
passive
mode
c)
both
(a)
and
(b)
d)
none
of
the
mentioned
View Answer
Answer:b
Explanation:None.
9.
The
a)
b)
c)
d)
View Answer
file
data
service
client
none
transfer
of
protocol
centric
oriented
server
is
the
built
on
architecture
architecture
architecture
mentioned
Answer:c
Explanation:None.
10. In file
a)
b)
c)
d)
View Answer
transfer
all
protocol, data
stream
block
compressed
of
transfer
can
be
the
done in
mode
mode
mode
mentioned
Answer:d
Explanation:None.
1.
a)
b)
c)
d)
View Answer
Ethernet
frame
MAC
IP
(a)
of
both
none
consists
and
the
of
address
address
(b)
mentioned
Answer:a
Explanation:None.
2.
What
is
a)
b)
c)
d)
View Answer
stat
frame
delimeter
(SFD)
in
ethernet
frame?
10101010
10101011
00000000
11111111
Answer:b
Explanation:None.
3.
1)
b)
c)
d)
View Answer
MAC
address
24
36
42
48
is
of
bits
bits
bits
bits
Answer:d
Explanation:None.
4.
What
is
autonegotiation?
a) a procedure by which two connected devices choose common transmission
parameters
b)
c)
d)
View Answer
a
a
security
routing
none
of
algorithm
algorithm
mentioned
the
Answer:a
Explanation:None.
5. Ethernet in metropolitan
a)
b)
ethernet
c)
ethernet
d)
all
View Answer
area network
pure
of
(MAN)
can
be
over
over
the
used as
ethernet
SDH
MPLS
mentioned
Answer:d
Explanation:None.
7.
High
speed
ethernet
a)
coaxial
b)
twisted
pair
c)
optical
d)
none
of
the
View Answer
works
on
cable
cable
fiber
mentioned
ethernet
frame is
bytes
bytes
bytes
bytes
Answer:c
Explanation:None.
8. The maximum
a)
b)
c)
d)
View Answer
size
of
payload
1000
1200
1300
1500
field
in
Answer:d
Explanation:None.
9.
What
a)
idle
b)
idle
c)
idle
d)
none
View Answer
is
time
time
time
of
interframe
between
between
frame
between
the
gap?
frames
bits
packets
mentioned
Answer:a
Explanation:None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64
octets
is
called
a)
short
frame
b)
run
frame
c)
mini
frame
d)
man
frame
View Answer
Answer:b
Explanation:None.
6) Expand WAN
a) World area network
b) Wide area network
c) Web area network
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
3) If there are N routers from source to destination, total end to end delay in sending packet P(L->number of
bits in the packet R-> transmission rate)
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
View Answer
Answer: b
Explanation: None.
5) The resources needed for communication between end systems are reserved for the duration of session
between end systems in ________
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
View Answer
Answer: b
Explanation: None.
6) As the resouces are reserved between two communicating end systems in circuit switching, this is achieved
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
View Answer
Answer: b
Explanation: None.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.
4. If the value in protocol field is 17, the transport layer protocol used is ____.
a) TCP
b) UDP
c) Either of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: For TCP it is 6.
c) TTl value
d) None of the mentioned
View Answer
Answer: a
Explanation: flag=0 indicates that it is the last fragment.
b) 128bits
c) 8bytes
d) 100bits
View Answer
Answer: b
Explanation: An IPv6 address is 128 bits long.
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer
Answer: c
Explanation: This field enables to have different types of IP datagram.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by
intervening IPv4 routers. The best solution here is
a) use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tuunel.
9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by
bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
View Answer
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.
1.
What
a)
b)
c)
is
single
vast
collection
interconnection
d)
internet?
of
none
network
of
local
of
different
networks
area
networks
the
mentioned
View Answer
Answer:b
Explanation:None.
2.
To
join
the
a)
internet,
the
computer
internet
has
to
be
connected
to
architecture
b)
board
internet
c)
internet
d)
none
society
service
of
provider
the
mentioned
View Answer
Answer:c
Explanation:None.
3. Internet access by transmitting digital data over the wires of a local telephone network is provided by
a)
leased
b)
digital
c)
subscriber
digital
d)
line
none
line
signal
of
line
the
mentioned
View Answer
Answer:b
Explanation:None.
4.
a)
b)
ISP
exchanges
internet
internet
subscriber
traffic
between
exchange
end
their
networks
by
point
point
c)
ISP
d)
end
none
of
point
the
mentioned
View Answer
Answer:a
Explanation:None.
5.
Which
one
of
the
following
protocol
is
not
used
in
internet?
a)
HTTP
b)
DHCP
c)
DNS
d)
none
of
the
mentioned
View Answer
Answer:d
Explanation:None.
6.
IPv6
addressed
have
size
of
a)
32
bits
b)
64
bits
c)
128
bits
d)
265
bits
View Answer
Answer:c
Explanation:None.
7.
Internet
works
on
a)
packet
switching
b)
circuit
switching
c)
both
d)
(a)
none
and
of
(b)
the
mentioned
View Answer
Answer:a
Explanation:None.
8.
Which
one
of
the
following
a)
d)
View Answer
not
an
remote
b)
c)
is
internet
resource
none
of
application
layer
protocol
used
in
internet?
procedure
call
relay
chat
reservation
protocol
the
mentioned
Answer:c
Explanation:None.
9.
Which
protocol
assigns
IP
address
to
the
client
connected
in
the
internet?
a)
DHCP
b)
IP
c)
RPC
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
10.
Which
one
of
the
following
is
not
used
in
media
access
control?
a)
ethernet
b)
digital
c)
fiber
d)
subscriber
distributed
none
line
data
of
interface
the
mentioned
View Answer
Answer:d
Explanation:None.
1.
DHCP
(dynamic
host
configuration
protocol)
provides
_____
to
the
client.
a)
IP
address
b)
MAC
address
c)
d)
url
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
2.
DHCP
is
used
for
a)
IPv6
b)
IPv4
c)
both
(a)
and
(b)
d)
none
of
the
mentioned
View Answer
Answer:c
Explanation:None.
3.
The
a)
b)
c)
maintains
maintains
grants
database
the
of
information
IP
d)
DHCP
address
about
when
all
server
available
client
receives
of
IP
addresses
configuration
request
parameters
from
the
client
mentioned
View Answer
Answer:d
Explanation:None.
4.
IP
assigned
a)
for
for
client
by
a
for
unlimited
c)
not
time
none
server
limited
b)
d)
DHCP
of
is
period
period
dependent
the
mentioned
View Answer
Answer:a
Explanation:None.
5.
DHCP
uses
UDP
port
____
for
sending
data
to
the
server.
a)
66
b)
67
c)
68
d)
69
View Answer
Answer:b
Explanation:None.
6.
The
DHCP
server
can
provide
the
_______
of
the
IP
addresses.
a)
dynamic
allocation
b)
automatic
allocation
c)
static
allocation
d)
View Answer
all
of
the
mentioned
Answer:d
Explanation:None.
7.
DHCP
client
and
servers
a)
on
the
same
subnet
communicate
UDP
b)
broadcast
UDP
c)
unicast
TCP
d)
via
broadcast
TCP
unicast
View Answer
Answer:a
Explanation:None.
8.
After
obtaining
the
IP
a)
address,
to
prevent
the
internet
IP
conflict
the
client
relay
may
use
chat
b)
broader
gateway
protocol
c)
address
resolution
protocol
d)
none
of
the
mentioned
View Answer
Answer:c
Explanation:None.
9.
a)
What
techniques
b)
applied
encryption
to
ensure
of
c)
d)
is
the
DHCP
security
the
an
existing
DHCP
algorithm
none
of
snooping?
server
for
of
DHCP
infrastructure
requests
DHCP
the
mentioned
View Answer
Answer:a
Explanation:None.
10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the
network.
a)
MAC
address
b)
IP
address
c)
d)
View Answer
Answer:c
Explanation:None.
both
none
(a)
of
and
the
(b)
mentioned
5) HFC contains
a) Fibre cable
b) Coaxial cable
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
6) Choose the statement which is not applicable for cable internet access
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
View Answer
Answer: d
Explanation: In cable access analog signal is converted to digital signal by CMTS.
8) StarBand provides
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
View Answer
Answer: d
Explanation: None.
c) Cable
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
1.
The
physical
a)
layer
concerns
with
bit-by-bit
delivery
p)
process
to
process
delivery
c)
application
to
application
delivery
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
2.
a)
Which
transmission
media
has
the
highest
coaxial
transmission
speed
in
network?
cable
b)
twisted
pair
cable
c)
optical
fiber
d)
electrical
cable
View Answer
Answer:c
Explanation:None.
3.
Bits
can
be
send
over
guided
and
unguided
media
as
analog
signal
by
a)
digital
modulation
b)
amplitude
modulation
c)
frequency
modulation
d)
phase
modulation
View Answer
Answer:a
Explanation:None.
4. The portion of physical layer that interfaces with the media access control sublayer is called
a)
physical
b)
signalling
physical
c)
physical
d)
none
sublayer
data
sublayer
address
sublayer
of
the
mentioned
View Answer
Answer:a
Explanation:None.
5.
physical
a)
mechanical
b)
electrical
c)
specification
d)
all
layer
specifications
of
electrical
specification
of
transmission
for
IR
provides
connectors
line
over
of
and
signal
optical
the
cables
level
fiber
mentioned
View Answer
Answer:d
Explanation:None.
6.
a)
In
asynchronous
start
b)
c)
serial
communication
and
the
physical
stop
(a)
provides
signalling
flow
both
layer
control
and
(b)
d)
none
of
the
mentioned
View Answer
Answer:c
Explanation:None.
7.
The
physical
layer
is
responsible
for
a)
line
coding
b)
channel
coding
c)
modulation
d)
all
of
the
mentioned
View Answer
Answer:d
Explanation:None.
8. The physical layer translates logical communication requests from the ______ into hardware specific
operations.
a)
data
link
layer
b)
network
layer
c)
trasnport
layer
d)
application
layer
View Answer
Answer:a
Explanation:None.
9.
single
channel
is
shared
by
multiple
signals
by
a)
analog
modulation
b)
digital
modulation
c)
multiplexing
d)
none
of
the
mentioned
View Answer
Answer:c
Explanation:None.
10.
Wireless
transmission
a)
can
be
radio
done
via
waves
b)
microwaves
c)
infrared
d)
View Answer
all
of
the
mentioned
Answer:d
Explanation:None.
1.
The
network
layer
concerns
with
a)
bits
b)
frames
c)
packets
d)
none
of
the
mentioned
View Answer
Answer:c
Explanation:None.
2.
Which
one
of
the
following
is
not
function
of
network
layer?
a)
routing
b)
inter-networking
c)
congestion
d)
none
of
control
the
mentioned
View Answer
Answer:d
Explanation:None.
3.
The
byte
IP
address
consists
of
a)
network
address
b)
host
address
c)
both
d)
(a)
none
and
of
(b)
the
mentioned
View Answer
Answer:c
Explanation:None.
4.
In
a)
b)
c)
d)
View Answer
virtual
full
circuit
network
source
a
and
short
both
none
each
packet
destination
address
VC
number
(a)
of
contains
and
the
(b)
mentioned
Answer:b
Explanation:None.
5.
Which
one
of
the
following
routing
algorithm
can
be
used
a)
shortest
path
b)
distance
vector
c)
link
d)
for
network
layer
design?
algorithm
routing
state
all
routing
of
the
mentioned
View Answer
Answer:d
Explanation:None.
6.
Multidestination
a)
is
b)
contains
c)
same
as
the
data
broadcast
list
is
d)
routing
of
not
none
routing
all
sent
destinations
by
of
packets
the
mentioned
View Answer
Answer:c
Explanation:None.
7.
subset
of
network
that
includes
a)
all
the
routers
but
contains
no
loops
spanning
b)
structure
spider
d)
none
called
tree
spider
c)
is
tree
of
the
mentioned
View Answer
Answer:a
Explanation:None.
8.
Which
one
of
the
a)
Answer:d
Explanation:None.
is
not
used
aware
of
congestion
control?
control
load
none
for
routing
admission
c)
View Answer
algorithm
traffic
b)
d)
following
shedding
the
mentioned
9.
The
network
layer
protocol
of
internet
a)
is
ethernet
b)
internet
c)
protocol
hypertext
d)
transfer
none
of
protocol
the
mentioned
View Answer
Answer:b
Explanation:None.
10.
ICMP
a)
is
error
primarily
and
used
for
diagnostic
functions
b)
addressing
c)
forwarding
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
1. Transport layer aggregates data from different applications into a single stream before passing it to
a)
network
b)
data
layer
link
layer
c)
application
layer
d)
physical
layer
View Answer
Answer:a
Explanation:None.
2.
Which
one
of
the
following
is
transport
layer
protocol
used
in
internet?
a)
TCP
b)
UDP
c)
d)
View Answer
Answer:c
Explanation:None.
both
none
(a)
of
and
the
(b)
mentioned
3.
a)
b)
User
all
datagram
UDP
it
protocol
packets
sends
c)
are
data
is
treated
as
connectionless
independently
both
d)
called
by
stream
of
(a)
none
transport
related
and
of
because
layer
packets
(b)
the
mentioned
View Answer
Answer:a
Explanation:None.
4.
Transmission
a)
b)
c)
control
connection
uses
three
recievs
data
d)
protocol
is
oriented
way
handshake
from
to
application
all
protocol
establish
single
as
of
the
connection
stream
mentioned
View Answer
Answer:d
Explanation:None.
socket
b)
pipe
c)
port
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
6.
Socket-style
API
for
windows
is
called
a)
wsock
b)
winsock
c)
wins
d)
none
of
the
mentioned
View Answer
Answer:b
Explanation:None.
7.
Which
one
of
the
a)
datagram
b)
stream
following
is
version
congestion
control
of
UDP
with
congestion
control?
control
protocol
transmission
protocol
c)
structured
d)
stream
none
of
transport
the
mentioned
View Answer
Answer:a
Explanation:None.
8.
_____
is
TCP
name
for
transport
service
access
point.
a)
port
b)
pipe
c)
node
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
9.
Transport
layer
protocols
deals
with
a)
application
to
application
communication
b)
process
to
process
communication
c)
node
to
node
communication
d)
none
of
the
mentioned
View Answer
Answer:b
Explanation:None.
10.
Which
a)
one
of
the
stream
b)
is
control
internet
c)
following
control
dynamic
layer
transmission
protocol
discovery
host
protocol?
protocol
message
neighbor
d)
transport
protocol
configuration
protocol
View Answer
Answer:a
Explanation:None.
1.
a)
b)
The
____
translates
internet
domain
routing
domain
and
host
name
information
names
to
IP
address.
system
protocol
c)
network
d)
time
internet
protocol
relay
chat
View Answer
Answer:a
Explanation:None.
2. Which one of the following allows a user at one site to establish a connection to another site and then pass
keystrokes
from
local
host
to
remote
host?
a)
HTTP
b)
FTP
c)
telnet
d)
none
of
the
mentioned
View Answer
Answer:c
Explanation:None.
3.
Application
a)
types
b)
c)
layer
of
message
rules
for
d)
protocol
messages
format,
when
and
how
all
defines
exchanged
syntax
processes
and
send
and
of
respond
semantics
to
the
messages
mentioned
View Answer
Answer:d
Explanation:None.
4.
Which
one
a)
of
the
following
simple
b)
protocol
mail
to
reciever
protocol
access
hypertext
server?
protocol
office
internet
d)
mail
transfer
post
c)
delivers/stores
protocol
transfer
protocol
View Answer
Answer:a
Explanation:None.
5.
The
ASCII
encoding
of
binary
data
is
called
a)
base
64
encoding
b)
base
32
encoding
c)
base
16
encoding
d)
base
encoding
View Answer
Answer:a
Explanation:None.
6. Which one of the following is an internet standard protocol for managing devices on IP network?
a)
dynamic
b)
host
simple
c)
configuration
protocol
management
protocol
newtwork
internet
message
d)
access
media
protocol
gateway
protocol
View Answer
Answer:b
Explanation:None.
7.
Which
one
of
the
a)
following
is
not
media
b)
an
host
resource
d)
session
layer
protocol?
gateway
dynamic
c)
application
protocol
configuration
protocol
reservation
protocol
initiation
protocol
View Answer
Answer:c
Explanation:None.
8. Which protocol is a signalling communication protocol used for controlling multimedia communication
sessions?
a)
session
initiation
protocol
b)
session
modelling
protocol
maintenance
protocol
c)
session
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
9.
Which
one
of
the
following
is
not
correct?
a) application layer protocols are used by both source and destination devices during a communication session
b)
application
c)
d)
View Answer
layer
protocols
implemented
on
both
none
the
source
and
destination
(a)
of
and
the
host
must
match
(b)
mentioned
Answer:c
Explanation:None.
10.
When
displaying
web
page,
the
application
layer
uses
the
a)
HTTP
protocol
b)
FTP
protocol
c)
SMTP
protocol
d)
none
of
the
View Answer
Answer:a
Explanation:None.
mentioned
Answer: d
Explanation: HTTP is a protocol.
4) Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
6) E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
View Answer
Answer: c
Explanation: Because it can work with available throughput.
9) To deliver a message to the correct application program running on a host, the _______ address must be
consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
b) HTTP
c) FTP
d) SIP
View Answer
Answer: a
Explanation: None.
1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______
a) 4
b) 1
c) 5
d) None of the mentioned
View Answer
Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
3. The time taken by a packet to travel from client to server and then back to the client is called ____
a) STT
b) RTT
c) PTT
d) None of the mentioned
View Answer
Answer: b
Explanation: RTT stands for round-trip time.
b) Second
c) Third
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
5. In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.
a) 2
b) 1
c) 4
d) 3
View Answer
Answer: b
Explanation: None.
7. The values GET, POST, HEAD etc are specified in ____ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
View Answer
Answer: a
Explanation: It is specified in the method field of request line in the HTTP request message.
8. The ______ method when used in the method field, leaves entity body empty.
a) POST
b) GET
c) Both of the mentioned
9. The HTTP response message leaves out the requested object when _____ method is used
a) GET
b) POST
c) HEAD
d) PUT
View Answer
Answer: c
Explanation: None.
Answer: c
Explanation: None.
13. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
1) Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
3) ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b
View Answer
Answer: d
Explanation: None.
5) If you want to find the number of routers between a source and destination, the utility to be used is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer: d
Explanation: None.
Answer: a
Explanation: None.
1) Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: b
Explanation: Control connection and data connection.
5) If 5 files are transfered from server A to client B in the same session. The number of TCP connection
between A and B is
a) 5
b) 10
c) 2
d) 6
View Answer
Answer: d
Explanation: 1 control connection and other 5 for five file transfers.
6) FTP server
a) Mantains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
7) The commands, from client to server, and replies, from server to client, are sent across the control
connection in ____ bit ASCII format
a) 8
b) 7
c) 3
d) 5
View Answer
Answer: b
Explanation: None.
Answer: b
Explanation: None.
3) The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections
at the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: c
Explanation: None.
4)The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: b
Explanation: None.
1.
IPSec
is
designed
to
provide
the
security
at
the
a)
transport
layer
b)
network
layer
c)
application
layer
d)
session
layer
View Answer
Answer:b
Explanation:None.
2.
In
tunnel
a)
mode
entire
IPsec
protects
IP
the
packet
b)
IP
header
c)
IP
payload
d)
View Answer
Answer:a
Explanation:None.
none
of
the
mentioned
3.
Network
layer
firewall
works
as
a)
frame
filter
b)
packet
filter
c)
both
d)
(a)
none
and
of
(b)
the
mentioned
View Answer
Answer:b
Explanation:None.
4.
Network
a)
layer
firewall
stateful
b)
bit
firewall
oriented
c)
two
sub-categories
and
firewall
frame
d)
has
and
firewall
stateless
byte
firewall
oriented
and
none
as
firewall
packet
of
firewall
the
mentioned
View Answer
Answer:a
Explanation:None.
5.
WPA2
is
used
for
security
in
a)
ethernet
b)
bluetooth
c)
wi-fi
d)
none
of
the
mentioned
View Answer
Answer:c
Explanation:None.
6.
An
attempt
to
make
computer
resource
unavailable
to
its
intended
users
is
called
a)
denial-of-service
attack
b)
virus
attack
c)
worms
attack
d)
botnet
process
View Answer
Answer:a
Explanation:None.
7.
a)
b)
Extensible
authentication
wired
protocol
is
authentication
personal
wireless
framework
area
frequently
used
in
network
networks
c)
wired
local
d)
none
of
area
network
the
mentioned
View Answer
Answer:b
Explanation:None.
8.
Pretty
good
privacy
(PGP)
is
used
in
a)
browser
security
b)
security
c)
FTP
security
d)
none
of
the
mentioned
View Answer
Answer:b
Explanation:None.
9.
PGP
a)
encrypts
data
by
international
using
data
block
cipher
called
encryption
algorithm
b)
private
data
encryption
algorithm
c)
intrenet
data
encryption
algorithm
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information,
then
it
a)
is
called
DNS
lookup
b)
DNS
hijacking
c)
DNS
spoofing
d)
none
of
the
mentioned
View Answer
Answer:c
Explanation:None.
1.
a)
IPSec
is
designed
to
provide
transport
the
security
at
the
layer
b)
network
layer
c)
application
layer
d)
session
layer
View Answer
Answer:b
Explanation:None.
2.
In
tunnel
a)
mode
IPsec
entire
protects
IP
the
packet
b)
IP
header
c)
IP
payload
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
3.
Network
layer
firewall
works
as
a)
frame
filter
b)
packet
filter
c)
both
d)
(a)
none
and
of
(b)
the
mentioned
View Answer
Answer:b
Explanation:None.
4.
Network
a)
b)
layer
firewall
stateful
bit
firewall
oriented
c)
and
firewall
none
two
and
firewall
frame
d)
has
sub-categories
stateless
byte
and
oriented
packet
of
the
as
firewall
firewall
firewall
mentioned
View Answer
Answer:a
Explanation:None.
5.
WPA2
is
used
for
security
in
a)
ethernet
b)
bluetooth
c)
wi-fi
d)
none
of
the
mentioned
View Answer
Answer:c
Explanation:None.
6.
An
attempt
to
make
computer
resource
unavailable
to
its
intended
users
is
called
a)
denial-of-service
attack
b)
virus
attack
c)
worms
attack
d)
botnet
process
View Answer
Answer:a
Explanation:None.
7.
Extensible
a)
authentication
protocol
wired
is
authentication
framework
personal
b)
frequently
area
wired
local
d)
none
of
in
network
wireless
c)
used
networks
area
network
the
mentioned
View Answer
Answer:b
Explanation:None.
8.
Pretty
good
privacy
(PGP)
is
used
in
a)
browser
security
b)
security
c)
FTP
security
d)
none
of
the
mentioned
View Answer
Answer:b
Explanation:None.
9.
PGP
a)
encrypts
international
data
by
using
data
block
encryption
cipher
called
algorithm
b)
private
data
encryption
algorithm
c)
intrenet
data
encryption
algorithm
d)
none
of
the
mentioned
View Answer
Answer:a
Explanation:None.
10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information,
then
a)
it
is
DNS
called
lookup
b)
DNS
hijacking
c)
DNS
spoofing
d)
none
of
the
View Answer
Answer:c
Explanation:None.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
mentioned
Answer:b
Explanation:None.
Answer:b
Explanation:None.
2. WiMAX provides
a) simplex communication
b) half duplex communication
c) full duplex communication
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
7. WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
10. Which one of the following frequency is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
View Answer
Answer:b
Explanation:None.