Computer Networks Mcqs
Computer Networks Mcqs
Constitution Of India, Law And Engineering / Indian Tradition, Culture And Society (Dr.
A.P.J. Abdul Kalam Technical University)
→Telegram Channel
→Telegram Group
COMPUTER NETWORKS
Computer Networks
Course Outcome ( CO)
At the end of course , the student will be
able to understand
Explain basic concepts, OSI reference model, services and role of each layer of OSI model and
CO 1
TCP/IP, networks devices and transmission media, Analog and digital data transmission
CO 4 Explain the different Transport Layer function i.e. Port addressing, Connection Management,
Error control and Flow control mechanism.
CO 5 Explain the functions offered by session and presentation layer and their Implementation.
CO6 Explain the different protocols used at application layer i.e. HTTP, SNMP, SMTP, FTP,
TELNET and VPN.
DETAILED SYLLABUS
Unit Topic
1 University Academy
COMPUTER NETWORKS
Solved MCQ
1. Unit-1 ………………………………………………..……………………………….3
2. Unit-II……………………………………………………...……….…………...…….8
3. Unit-III..……………………………………………………...…………..….....…... 16
4. Unit-IV...………………………..…….………………………………………..…….23
5. Unit-V..…………………………………………………..……….....................…….28
2 University Academy
Unit-1
6. What is the central device in star topology? 11. The protocol data unit (PDU) for the
a. STP server application layer in the Internet stack is?
3 University Academy
15. Which protocol does HTTP (Hyper Text 20. A list of protocols used by a system, one
Transfer Protocol) - use for transferring web protocol per layer, is called ________
pages at the Transport layer a) protocol architecture
a. IP b) protocol stack
b. UDP c) protocol suite
c. TCP d) protocol system
d. ARP Answer: Option(b)
Answer: Option(c)
21. Connector RJ-45 contains?
16. There are 10 users plugged into a hub a. Two pins
running 10Mbps half-duplex.and a server b. Four pins
4 University Academy
5 University Academy
c. 6 c. Transport layer
d. 10 d. Link layer
Answer: b Answer: b
33. Which of the following layers is an addition 38. In OSI model, when data is sent from device
to OSI model when compared with TCP IP A to device B, the 5th layer to receive data at
model? B is _________
a. Application layer a. Application layer
b. Presentation layer b. Transport layer
c. Session layer c. Link layer
d. Session and Presentation layer d. Session layer
Answer: d Answer: d
39. In TCP IP Model, when data is sent from
34. Application layer is implemented in _______ device A to device B, the 5th layer to receive
a. End system data at B is ____________
b. NIC a. Application layer
c. Ethernet b. Transport layer
d. Packet transport c. Link layer
Answer: a d. Session layer
35. Transport layer is implemented in _________ Answer: a
a. End system 40. In the OSI model, as a data packet moves from
b. NIC the lower to the upper layers, headers are
c. Ethernet _______
d. Signal transmission a. Added
Answer: a b. Removed
36. The functionalities of the presentation layer c. Rearranged
include ____________ d. Randomized
a. Data compression Answer: b
b. Data encryption 41. Which of the following statements can be
c. Data description associated with OSI model?
d. All of the mentioned a. A structured way to discuss and easier
Answer: d update system components
37. Delimiting and synchronization of data b. One layer may duplicate lower layer
exchange is provided by __________ functionality
a. Application layer
b. Session layer
6 University Academy
7 University Academy
c. infrared
d. all of the mentioned
Answer: Option(d)
Unit-II
c. ARP (Address Resolution Protocol),
IEEE802.3
1. The two sublayers of a Data Link layer are d. All the above
a. LLC Logical Link Control Layer Answer: Option(d)
b. MAC Medium Access Control Layer
c. Both A and B
d. Data Layer 5. Which is the protocol that maps varying IP
Answer: Option(c) addresses to the Physical MAC Address of a
machine in a LAN network?
a. ARQ (Automatic Repeat Request)
2. The functions of a Logical Link Layer b. ARP (Address Resolution Protocol)
(LLC) are c. SLIP (Serial Line Internet Protocol)
a. Error control d. PLIP (Parallel Line Internet Protocol)
b. Flow control Answer: Option(b)
c. Creating and managing the
communication link between two 6. Which protocols adopted the standards of
devices with the help of the Transport HDLC (High Level Link Control) protocol?
layer. a. X.25 protocol as LAPB (Link Access
d. All the above Procedure Balanced, V.42 protocol as
Answer: Option(d) LAPM (Link Access Procedure for
Modems)
b. Frame Relay protocol as LAPF (Link
3. The types of data services offered by an Access Procedure for Frame Relay)
LLC (Logical Link Control) layer are c. ISDN (Integrated Services Digital
a. Connectionless which is fast and Network) protocol as LAPD (Link
unreliable Access Procedure on D channel)
b. Connection Oriented which is slow d. All the above
and reliable Answer: Option(d)
c. Both A and B
d. None 7. The Dialup connections to access the
Answer: Option(c) internet uses ___ protocol.
a. PPP (Point to Point protocol)
b. X.25 protocol
4. Choose the Protocols working in the Data c. PLIP protocol
Link Control Layer of OSI model below. d. None
a. ATM (Asynchronous Transfer Mode), Answer: Option(a)
Frame Relay
b. HDLC (High Level Data Link 8. Automatic repeat request error management
Control), SDLC (Synchronous Data mechanism is provided by ________
Link Control) a. logical link control sublayer
b. media access control sublayer
8 University Academy
c. network interface control sublayer 14. Which of the following is the multiple
d. application access control sublayer access protocol for channel access control?
Answer: Option(a) a. CSMA/CD
b. CSMA/CA
9. Header of a frame generally contains c. Both CSMA/CD & CSMA/CA
a. synchronization bytes d. HDLC
b. addresses Answer: Option(c)
c. frame identifier
d. all of the mentioned 15. The technique of temporarily delaying
Answer: Option(d) outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is
called ____________
10. Which sublayer of the data link layer a. piggybacking
performs data link functions that depend upon b. cyclic redundancy check
the type of medium? c. fletcher’s checksum
a. logical link control sublayer d. parity check
b. media access control sublayer Answer: Option(a)
c. network interface control sublayer
d. error control sublayer 16. Which of the following uses a very thin
Answer: Option(b) glass or plastic fiber through which pulses of
light travel?
11. CRC stands for __________
a. cyclic redundancy check a. Cat 1
b. code repeat check b. Optical fiber
c. code redundancy check c. Twisted pair
d. cyclic repeat check d. Coax
Answer: Option(a) Answer: Option(b)
9 University Academy
22. Which operational mode/s of HDLC a. only when no error occurs at the
support/s the balanced configuration by transmission level
governing point to point link connectivity in b. when retransmission of old packet in a
addition to the primary as well as secondary novel frame is necessary
functions performed by the station? c. only when station B receives frame
with errors
10 University Academy
11 University Academy
12 University Academy
46. How many bytes of data can be sent in 15 50. Consider a link with packet loss probability
seconds over a serial link with baud rate of of 0.2. What is the expected number of
9600 in asynchronous mode with odd parity transmissions it would take to transfer 200
and two stop bits in the frame? packets given that the stop and wait protocol
a. 10,000 bytes is used?
b. 12,000 bytes a. 125
c. 15,000 bytes b. 250
d. 27,000 bytes c. 225
13 University Academy
14 University Academy
15 University Academy
Unit-III
Answer: Option(c)
1. The network layer is concerned with
__________ of data.
a. bits
b. frames 6. Which of the following routing algorithms
c. packets can be used for network layer design?
d. bytes a. shortest path algorithm
Answer: Option(c) b. distance vector routing
2. Which one of the following is not a function c. link state routing
of network layer? d. all of the mentioned
a. routing Answer: Option(b)
b. inter-networking 7. A subset of a network that includes all the
c. congestion control routers but contains no loops is called
d. error control ________
Answer: Option(d) a. spanning tree
b. spider structure
3. In virtual circuit network each packet c. spider tree
contains ___________ d. special tree
Answer: Option(a)
a. full source and destination address 8. Which one of the following algorithm is not
b. a short VC number used for congestion control?
c. only source address
d. only destination address a. traffic aware routing
Answer: Option(b) b. admission control
c. load shedding
d. routing information protocol
4. Which of the following is not correct in Answer: Option(d)
relation to multi-destination routing?
16 University Academy
17 University Academy
d. 128.64.0.0 b. Masking
Answer: Option(d) c. Fragmenting
22. How many versions available of IP? d. Hopping
Answer: Option(a)
a. 6 version
b. 4 version
c. 2 version 28. Which field/s of ICMPv6 packet header
d. 1 version has/have a provision of minimal integrity level
Answer: Option(c) concerning to verification for ICMP
23. The term IPv4 stands for? messages?
a. A & B
27. The ability of a single network to span
multiple physical networks is known as b. C & D
______ c. B& C
a. Subnetting
d. A & D
18 University Academy
a. 1005 ms
b. 1010 ms 36. Which of the following assertions is
c. 3000 ms FALSE about the Internet Protocol (IP)?
d. 3003 ms
Answer: Option(a) a. It is possible for a computer to have
multiple IP addresses
33. One of the header fields in an IP datagram b. IP packets from the same source to the
is the Time to Live (TTL) field. Which of the same destination can take different
following statements best explains the need for routes in the network
this field? c. IP ensures that a packet is discarded if
it is unable to reach its destination
a. It can be used to prioritize packets within a given number of hops
b. It can be used to reduce delays d. The packet source cannot set the
c. It can be used to optimize throughput route of an outgoing packets; the
d. It can be used to prevent packet route is determined only by the
looping routing tables in the routers on the
Answer: Option(d) way
Answer: Option(d)
19 University Academy
37. An organization is granted the block c. Reach agreement with other routers
130.34.12.64/26. It needs to have 4 subnets. about the network topology
Which of the following is not an address of d. All of the above
this organization? Answer: Option(d)
a. 130.34.12.124
b. 130.34.12.89 41. When a host on network A sends a message
c. 130.34.12.70 to a host on network B, which address does
d. 130.34.12.132 the router look at?
Answer: Option(d) a. Port
b. IP
38. An IP datagram of size 1000 bytes arrives c. Physical
at a router. The router has to forward this d. Subnet mask
Answer: Option(b)
packet on a link whose MTU (maximum
42. For n devices in a network, ________
transmission unit) is 100 bytes. Assume that
the size of the IP header is 20 bytes. The number of duplex-mode links are required
number of fragments that the IP datagram will for a mesh topology.
be divided into for transmission is : a. n(n + 1)
b. n (n – 1)
a. 10 c. n(n + 1)/2
b. 50 d. n(n – 1)/2
c. 12 Answer: Option(d)
d. 13 43. __________ is a bit-oriented protocol for
communication over point-to-point and
Answer: Option(d) multipoint links.
a. Stop-and-wait
b. HDLC
39. In an IPv4 datagram, the M bit is 0, the
c. Sliding window
value of HLEN is 10, the value of total length
d. Go-back-N
is 400 and the fragment offset value is 300.
Answer: Option(c)
The position of the datagram, the sequence
44. In Challenge-Response authentication the
numbers of the first and the last bytes of the
claimant ________.
payload, respectively are
a. Proves that she knows the secret
a. Last fragment, 2400 and 2789 without revealing it
b. First fragment, 2400 and 2759 b. Proves that she doesn’t know the
c. Last fragment, 2400 and 2759 secret
d. Middle fragment, 300 and 689 c. Reveals the secret
Answer: Option(c) d. Gives a challenge
Answer: Option(a)
45. An organization is granted the block
40. Dynamic routing protocol enable routers to 130.34.12.64/26. It needs to have 4 subnets.
Which of the following is not an address of
a. Dynamically discover and maintain
this organization?
routes
a. 130.34.12.124
b. Distribute routing updates to other
b. 130.34.12.89
routers
c. 130.34.12.70
20 University Academy
d. 130.34.12.132 d. 10 Mbps
Answer: Option(d)
51. Dynamic routing protocol enable routers to
46. A pure ALOHA Network transmits 200 bit a. Dynamically discover and maintain
frames using a shared channel with 200 routes
Kbps bandwidth. If the system (all stations b. Distribute routing updates to other
put together) produces 500 frames per routers
second, then the throughput of the system is c. Reach agreement with other routers
______. about the network topology
a. 0.384 d. All of the above
b. 0.184
c. 0.286 Answer: Option(d)
d. 0.58 52. The address of a class B host is to be split
Answer: Option(b) into subnets with a 6-bit subnet number.
47. IPv6 does not support which of the What is the maximum number of subnets
following addressing modes? and the maximum number of hosts in each
a. unicast addressing subnet?
b. multicast addressing a. 62 subnets and 262142 hosts.
c. broadcast addressing b. 64 subnets and 262142 hosts.
d. anycast addressing c. 62 subnets and 1022 hosts.
d. 64 subnets and 1024 hosts
Answer: Option(c)
Answer: Option(c)
48. What is IP class and number of sub-
networks if the subnet mask is 255.224.0.0? 53. A network with bandwidth of 10 Mbps can
a. Class A, 3 pass only an average of 12,000 frames per
b. Class A, 8 minute with each frame carrying an average
c. Class B, 3 of 10,000 bits. What is the throughput of
d. Class B, 32 this network ?
a. 1 Mbps
Answer: Option(b) b. 2 Mbps
49. Which of the following is not a congestion c. 10 Mbps
policy at network layer? d. 12 Mbps
a. Flow Control Policy Answer: Option(b)
b. Packet Discard Policy 54. Suppose transmission rate of a channel is
c. Packet Lifetime Management Policy 32 kbps. If there are ‘8’ routes from source
d. Routing Algorithm to destination and each packet p contains
Answer: Option(a) 8000 bits. Total end to end delay in sending
50. A network with bandwidth of 10 Mbps can packet P is _____.
pass only an average of 15,000 frames per a. 2 sec
minute with each frame carrying an average b. 3 sec
of 8,000 bits. What is the throughput of this c. 4 sec
network? d. 1 sec
a. 2 Mbps Answer: Option(a)
b. 60 Mbps
c. 120 Mbps
21 University Academy
55. Which of the following routing technique / 59. In the TCP/IP protocol suite, which one of
techniques is / are used in distributed the following is NOT part of the IP header?
systems ? a. Fragment Offset
A. Fixed Routing b. Source IP address
B. Virtual Routing c. Destination IP address
C. Dynamic Routing d. Destination port number
Answer: Option(d)
a. A Only 60. In the network 200.10.11.144/27, the fourth
b. A and B only octet (in decimal) of the last IP address of
c. C only the network which can be assigned to a host
d. All A,B,C is ________
a. 158
Answer: Option(a) b. 255
56. Consider the given network implementation c. 222
scenario. For the given classful NID d. 223
199.10.20.0/24, the requirement is to create Answer: Option(a)
13 subnets. With given details, find the
range of first and last valid IP in 15th 61. Which one of the following fields of an IP
subnet. header is NOT modified by a typical IP
a. 199.10.20.208 to 199.10.20.222 router?
b. 199.10.20.225 to 199.10.20.238 a. Checksum
c. 199.10.20.193 to 199.10.20.206 b. Source address
d. Not of these c. Time to Live (TTL)
d. Length
Answer: Option(b) Answer: Option(b)
57. __________ do not take their decisions on 62. If a Company require 60 hosts then What is
measurements or estimates of the current the best possible subnet mask?
traffic and topology. a. 255.255.255.0
a. Static algorithms b. 255.255.255.192
b. Adaptive algorithms c. 255.255.225.224
c. Non - adaptive algorithms d. 225.225.255.240
d. Recursive algorithms Answer: Option(b)
Answer: Option(c)
63. The address resolution protocol (ARP) is
58. A subnet has been assigned a subnet mask used for
of 255.255.255.192. What is the maximum a. Finding the IP address from the DNS
number of hosts that can belong to this b. Finding the IP address of the default
subnet? gateway
a. 14 c. Finding the IP address that
b. 30 corresponds to a MAC address
c. 62 d. Finding the MAC address that
d. 126 corresponds to an IP address
Answer: Option(c)
Answer: Option(d)
22 University Academy
Unit-IV
24 University Academy
25 University Academy
26 University Academy
42. Which algorithm is used to shape the bursty 47. Silly Window Syndrome is related to
traffic into a fixed rate traffic by averaging a. Error during transmission
the data rate? b. File transfer protocol
a. solid bucket algorithm c. Degrade in TCP performance
b. spanning tree algorithm d. Interface problem
c. hocken helm algorithm
d. leaky bucket algorithm Answer: Option(c)
Answer: Option(d)
48. SSL is not responsible for
43. Four channels are multiplexed using TDM. a. Mutual authentication of client &
If each channel sends 100 bytes/second and server
we multiplex 1 byte per channel, then the b. Secret communication
bit rate for the link is __________. c. Data Integrity protection
a. 400 bps d. Error detection and correction
b. 800 bps Answer: Option(d)
c. 1600 bps 49. Which of the following is not a field in
d. 3200 bps TCP header?
Answer: Option(d) a. Sequence number
44. A device is sending out data at the rate of b. Fragment offset
2000 bps. How long does it take to send a c. Checksum
file of 1,00,000 characters ? d. Window size
a. 50 Answer: Option(b)
b. 200 50. To guarantee correction of upto t errors, the
c. 400 minimum Hamming distance d min in a
d. 800 block code must be ________.
Answer: Option(c) a. t+1
45. The TCP sliding window b. t−2
c. 2t−1
a. can be used to control the flow of d. 2t+1
information Answer: Option(d)
b. always occurs when the field value is
0
c. always occurs when the field value is
1
d. occurs horizontally
Answer: Option(a)
27 University Academy
Unit-V
1. The ____ layer is the network dialog
controller. 6. The functionalities of the presentation layer
a. network include ____________
b. transport a. Data compression
c. session b. Data encryption
d. presentation c. Data description
Answer: Option(c) d. All of the mentioned
Answer: Option(d)
2. The ____ layer establishes, maintains, and
synchronizes the interaction between 7. Encryption and decryption are functions of
communicating systems. which layer?
a. network a. transport
b. transport b. session
c. session c. application
d. presentation d. presentation
Answer: Option(c) Answer: Option(d)
3. The session layer lies between the 8. Which of the following layers of the OSI
______layer and the presentation layer. reference model is concerned with the syntax
a. network of data exchanged between application
b. transport entities?
c. data link a. Presentation layer
d. application b. Application layer
Answer: Option(b) c. Transportation layer
d. Session layer
4. The _____ layer lies between the session Answer: Option(a)
layer and he application layer.
a. network 9. In respect of OSI model, LANs implement
b. transport a. lower two layers
c. data link b. all seven layers
d. presentation c. upper five layers
Answer: Option(d) d. None of the above
Answer: Option(b)
5. The _____ layer uses data compression to
reduce the number of bits to be transmitted.
a. presentation 10. In OSI model, which of the following layer
b. network transforms information from machine format
c. data link into that understandable by user
d. application a. application
Answer: Option(a) b. session
28 University Academy
11. Which network component/s is/are 16. Which of the following layers is an
involved in the Presentation layer of an OSI addition to OSI model when compared with
model? TCP IP model?
a. Gateway a. Application layer
b. Multiplexer & Oscilloscope b. Presentation layer
c. Amplifier & Hub c. Session layer
d. All of the above d. Session and Presentation layer
Answer: Option(a) Answer: Option(d)
12. Which OSI layer assumes responsibility 17. In the OSI model, as a data packet moves
for managing network connections between from the lower to the upper layers, headers are
applications? a. Added
a. Network layer b. Removed
b. Data link layer c. Rearranged
c. Application layer d. Randomized
d. Session layer Answer: Option(b)
Answer: Option(d)
18. Which of the following statements can be
13. The _______ layer ensures interoperability associated with OSI model?
between communicating devices through a. A structured way to discuss and easier
transformation of data into a mutually agreed update system components
upon format. b. One layer may duplicate lower layer
functionality
a. network c. Functionality at one layer no way
b. presentation requires information from another
c. transport layer
d. data link d. It is an application specific network
Answer: Option(b) model
Answer: Option(b)
14. In OSI model, when data is sent from
device A to device B, the 5th layer to receive 19. In OSI model, session layer is responsible
data at B is _________ for
a. Application layer a. Recovery
b. Transport layer b. Check pointing
c. Link layer c. Both a and b
d. Session layer d. None of the above
Answer: Option(d) Answer: Option(c)
15. Delimiting and synchronization of data 20. In which layer of OSI client send request
exchange is provided by __________ to the server?
a. Application layer a. Application layer
b. Session layer b. Presentation layer
29 University Academy
30 University Academy
a. mail d. OPTION
b. pine Answer: Option(c)
c. Outlook & Netscape 34. Which language in WWW specifies a
d. All of the above web's way by describing three-
Answer: Option(c) dimensional objects?
a. HTML
31. Which phase/s of POP3 allow/s an user b. VRML
agent to retrieve the messages as well as c. XML
to mark the messages for deletion d. UML
purpose? Answer: Option(b)
35. Which field of cookie in WWW
a. Authorization Phase represents the server's directory structure
b. Transaction Phase by identifying the utilization of part
c. Update Phase associated with server's file tree?
d. All of the above
Answer: Option(b) a. Domain
b. Path
32. Consider the assertions given below. c. Content
Which among them prove to be beneficial d. Secure
for Persistent HTTP connections? Answer: Option(b)
A. Reduction in latency over the sub- 36. Which among the below mentioned
sequent requests protocols provides a mechanism of
B. Pipeline-oriented connection over the acquiring an IP address without manual
requests and responses intervention in addition to plug and play
C. Increase in number of packets due to type of networking?
TCP opens
D. Prevention in opening and closing of a. BOOTP
some TCP connections b. DHCP
c. Both a & b
a. A & B d. None of the above
b. C & D Answer: Option(b)
c. A & C
d. B & B 37. Which of the following layers of the OSI
Answer: Option(a) model is responsible for user interaction?
a. Layer 4
33. Which URL method of HTTP performs b. Layer 5
similar function as that of PUT method c. Layer 6
only with an exception of request d.Layer 7
comprising a list of differences that Answer: Option(d)
exhibit the necessity to get implemented
in the existing file? 38. What occurs in the session layer?
a. Data compression and encryption
a. POST b. MAC address are handled
b. GET c. binary to decimal conversion
c. PATCH d.sessions are created
31 University Academy
32 University Academy
33 University Academy
34 University Academy
Practice Set
Set-1
1. The computer network is D) Fiber Distributed Data Interface
A) Network computer with cable 8. Which of the following is an application
B) Network computer without cable layer service?
C) Both of the above
A) Network virtual terminal
D) None of the above
B) File transfer, access and management
2. FDDI used which type of physical
C) Mail service
topology?
D) All of the above
A) Bus 9. Which is the main function of transport
B) Ring layer?
C) Star
A) Node to node delivery
D) Tree
B) End to end delivery
3. FTP stands for
C) Synchronization
A) File transfer protocol d) Updating and maintaining routing tables
B) File transmission protocol 10. The .............. layer change bits onto
C) Form transfer protocol electromagnetic signals.
D) Form transmission protocol A) Physical
4. Ethernet system uses which of the
B) Transport
following technology.
C) Data Link
A) Bus D) Presentation
B) Ring 11. In mesh topology, relationship between
C) Star one device and another is ..............
D) Tree A) Primary to peer
5. Which of the following are the network B) Peer to primary
services?
C) Primary to secondary
A) File service D) Peer to Peer
B) Print service 12. The performance of data communications
C) Database service network depends on ..............
D) All of the above A) Number of users
6. If all devices are connected to a central
B) The hardware and software
hub, then topology is called
C) The transmission
A) Bus Topology D) All of the above
B) Ring Topology 13. Find out the OSI layer, which performs
C) Star Topology token management.
D) Tree Topology A) Network Layer
7. FDDI stands for
B) Transport Layer
A) Fiber Distributed Data Interface C) Session Layer
B) Fiber Data Distributed Interface D) Presentation Layer
C) Fiber Dual Distributed Interface
35 University Academy
Set-2
1. A network that needs human 7. Which of the following OSI
beings to manually route signals is layers correspond to TCP/IP's
called.... application layer?
A) Fiber Optic Network A) Application
B) Bus Network B) IP Address
C) T-switched network C) Session
D) Ring network D) All of the above
2. TCP/IP layer corresponds to
the OSI models to three layers. 8. Devices on one network can
A) Application communicate with devices on another
B) Presentation network via a .......
C) Session A) File Server
D) Transport B) Utility Server
3. Which of the transport layer C) Printer Server
protocols is connectionless? D) Gateway
A) UDP 9. A communication device that
B) TCP combines transmissions from several
C) FTP I/O devices into one line is a
D) Nvt A) Concentrator
4. Which of the following B) Modifier
applications allows a user to access C) Multiplexer
and change remote files without actual D) Full duplex file
transfer? 10. Which layers of the OSI
A) DNS determines the interface often system
B) FTP with the user?
C) NFS A) Network
D) Telnet B) Application
5. The data unit in the TCP/IP C) Data link
layer called a ..... D) Session
A) Message 11. Which of the following of the
B) Segment TCP/IP protocols is the used for
C) Datagram transferring files from one machine to
D) Frame another?
6. DNS can obtain the of A) FTP
host if its domain name is known and B) C) SNMP
vice versa. C) SMTP
A) Station address D) D) Rpe
B) IP address 12. In which OSI layers does the
C) Port address FDDI protocol operate?
D) Checksum A) Physical
37 University Academy
38 University Academy
Set-3
c. Both A and B
1. Which of the following is not the layer d. None of the above
of TCP/IP protocol?
a. Application Layer
b. Session Layer 6. Which is not the Regional Internet
c. Transport Layer Registers (RIR) of the following?
d. Internetwork layer a. American Registry for Internet
2. address use 7 bits for the <network> Numbers (ARIN)
and 24 bits for the <host> portion of b. Europeans Registry for
the IP Internet Numbers (ERIN)
a. address. c. Reseaux IP Europeans (RIPE)
b. Class A d. Asia Pacific Network
c. Class B Information Centre (APNIC)
d. Class C 7. Match the following IEEE No to their
e. Class D corresponding Name for IEEE 802
3. addresses are reserved for standards for LANs.
multicasting. i) 802.3 a) WiFi
a. Class B ii) 802.11 b) WiMa
b. Class C iii) 802.15.1 c) Ethernet
c. Class D iv) 802.16 d) Bluetooth
d. Class E a. i-b, ii-c, iii-d, iv-a
4. State the following statement is true or b. i-c, ii-d, iii-a, iv-b
false. c. i-c, ii-a, iii-d, iv-b
I. In class B addresses a total of d. i-b, ii-d, iii-c, iv-a
more than 1 billion addresses 8. was the first step in the evolution of
can be formed. Ethernet from a coaxial cable bus to
II. Class E addresses are reserved hub managed, twisted pair network.
for future or experimental use. a. Star LAN
a. True, False b. Ring LAN
b. True, True c. Mesh LAN
c. False, True d. All of the above
d. False, False 9. is the predominant form of Fast
5. Which of the following statement is Ethernet, and runs over two pairs of
true? category 5 or above cable.
I. An address with all bits 1 is a. 100 BASE-T
interpreted as all networks or all hosts. b. 100 BASE-TX
II. The class A network 128.0.0.0 is c. 100 BASE-T4
defined as the loopback network. d. 100 BASE-T2
a. i only 10. IEEE 802.3ab defines Gigabit
b. ii only Ethernet transmission over unshielded
39 University Academy
40 University Academy
d. Manual allocation
Answer:
1. B) Session Layer
2. A) Class A
3. C) Class D
4. B) True, True
5. A) i only
6. B) Europeans (ERIN)
7. C) i-c, ii-a, iii-d, iv-b
8. A) Star LAN
9. B) 100 BASE-TX
10. A) 1000 BASE-T
11. A) FDDI
12. D) All of the above
13. B) Fast Ethernet
14. A) S/NET
15. C) Subnet... number.
16. B) True, True
17. A) Static subnetting
18. D) All i, ii, iii, iv and v only
19. A) Address Protocol (ARP)
20. B) Static allocation
41 University Academy
Set-4
1. Which server computer that is d. all of above
configured to serve file transfer and storage,
data migration, file updates
synchronization? 5. Which of the following is not email
a. FTP Server. service?
b. Database Server a. Hotmail
c. File Server b. Gmail
d. None of above c. Yahoo
d. None of above
2. Which of the following is responsible
for approving standards and allocating 6. Which of the following application is
resources in the Internet? required to read your email in
a. Internet Architecture Board (IAB) Hotmail?
b. Internet Engineering Task Force (IETF) a. A computer with browser and internet
c. InterNIC connection
d. None of above b. Outlook Express or Microsoft Outlook
c. Eudora Pro
3. Which body in Internet provides the d. All of above
registration services to Internet
community? 7. Tim Berners Lee is credited for the
a. Internet Architecture Board (IAB) creation of
b. Internet Engineering Task Force (IETF) a. Web email system
c. InterNIC b. world wide web
d. None of above c. File Transfer Protocol
d. All of above
4. Which of the following is considered a
broad band communication 8. Error control is needed at the transport
channel? layer because of potential errors occurring
a. coaxial cable _____.
b. fiber optics cable a. from transmission line noise
c. microwave circuits b. in routers
42 University Academy
Answers
1.c
2.a
3.c
4.d
5.c
6.a
7.b
8.b
9.d
10.c
43 University Academy
Set-5
1. What is the powerful, centralized b. Internet Engineering Task Force
computer system that performs data (IETF)
storage and processing tasks on behalf c. InterNIC
of clients and other network devices ? d. None of above
a. Client
b. Host computer 5. Which body in Internet
c. Terminal provides the registration services to
d. Network Internet community?
a. Internet Architecture Board
2. A self-sufficient computer that (IAB)
acts as both a server and a client is b. Internet Engineering Task Force
known as (IETF)
a. Host c. InterNIC
b. Client d. None of above
c. Server
d. Peer 6. Who is responsible for
discussing and investigating the
3. A server computer that is operational and technical problems of
configured to serve file transfer and Internet?
storage, data migration, file updates a. Internet Architecture Board
synchronization is (IAB)
a. FTP Server b. Internet Engineering Task Force
b. Database Server (IETF)
c. File Server c. InterNIC
d. None of above d. None of above
4. Which of the following is 7. Which is the channel handle
responsible for approving standards moderate data volumes in transmission
and allocating resources in the rate between 110 to 9600 bps?
Internet? a. Narrowband channel
a. Internet Architecture Board b. Voice band channel
(IAB) c. Broadband channel
44 University Academy
Answers
1.b
2.d
3.c
4.a
5.c
6.b
7.b
8.c
45 University Academy
Set-6
1. A group of computers connected c. microwave transmission
together to communicate and share d. none of above
resources is known as
a. A computer network 5. The interactive transmission
b. A server of data within a time sharing system
c. A client may be best suited to
d. Authentication a. simplex lines
b. half-duplex lines
2. A high speed, high capacity c. full duplex lines
transmission medium that can carry d. biflex-lines
signals from multiple independent
network carrier is 6. Who owns and governs the
a. Narrowband channel Internet?
b. Voice band channel a. IAB
c. Broadband channel b. IETF
d. None of above c. InterNIC
d. None of above
3. A channel handle moderate
data volumes in transmission rate 7. Who is responsible for
between 110 to 9600 bps is discussing and investigating the
a. Narrowband channel operational and technical problems of
b. Voice band channel Internet?
c. Broadband channel a. Internet Architecture Board
d. None of above (IAB)
b. Internet Engineering Task Force
4. A form of wireless (IETF)
transmission in which signals are sent c. InterNIC
via pulses of infrared light d. None of above
a. radio networking
b. infrared transmission 8. Website is a collection of
46 University Academy
a. HTML documents
b. Graphics file
c. audio and video files
d. All of above
Answers
1.a
2.c
3.b
4.b
5.c
6.d
7.b
8.d
9.b
10.b
47 University Academy
Set-7
5.c 9.d
6.c 10.b
7.d
8.b
Set-8
1. A computer circuit board installed in c. microwave transmission
a computer so that it can be connected to a d. none of above
network?
a. NIC
b. Switch 7. A communications device that
c. RJ45 combines transmissions from several I/O
d. Hub devices into one line is a?
a. concentrator
2. A NIC card can be used for? b. modifier
a. FDDI c. multiplexer
b. Ethernet d. full-duplex line
c. Microwave
d. WiFi 8. UTP cable has ___ pair of wires in
it?
3. Which of the following is unbound a. 3
transmission media? b. 4
a. UTP c. 5
b. Co-axial d. 6
c. Microwave
d. Fiber Optics 9. Which of the following might not be
present in a computer network?
4. Which of the following memories a. NIC
needs refresh? b. Switch
a. SRAM c. MODEM
b. DRAM d. NOS
c. ROM
d. All of above 10. To connect two networks of similar
systems you will use a
5. What is the set of information that a. Bridge
defines the status of resources allocated to a b. Gateway
process? c. Router
a. Process control d. Any of above
b. ALU
c. Register Unit Answers
d. Process description 1.a
2.b
6. A form of wireless transmission in which 3.c
signals are sent via pulses of infrared light? 4.b
a. radio networking 5.d
b. infrared transmission 6.b
49 University Academy
7.c 9.c
8.b 10.a
Set -9
1. Which data communication method is c. 100 picowatts
used to transmit the data over a serial d. 10 miliwatts
communication link?
a. simplex
b. half-duplex 7. The synchronous modems are more
c. full-duplex costly than the asynchronous modems because
d. b and c a. they produce large volume of data
b. they contain clock recovery circuits
2. What is the minimum number of wires c. they transmit the data with stop and start
needed to send data over a serial bits
communication link layer? d. they operate with a larger bandwidth
a. 1
b. 2 8. Which of the following statement is
c. 4 correct?
d. 6 a. terminal section of a synchronous
3. Which of the following types of modem contains the scrambler
channels moves data relatively slowly? b. receiver section of a synchronous modem
a. wide band channel contains the scrambler
b. voice band challen c. transmission section of a synchronous
c. narrow band channel modem contains the scrambler
d. None of these d. control section of a synchronous modem
contains the scrambler
4. Most data communications involving
telegraph lines use: 9. In a synchronous modem, the digital-
a. simplex lines to-analog converter transmits signal to the
b. wideband channel a. equilizer
c. narrowband channel b. modulator
d. dialed service c. demodulator
d. terminal
5. A communications device that
combines transmissions from several I/O 10. Which of the following
devices into one line is a communications lines is best suited to
a. concentrator interactive processing applications?
b. modifier a. narrow band channel
c. multiplexer b. simplex lines
d. full-duplex line c. full duplex lines
d. mixed band channels
6. How much power (roughly) a light Answers
emitting diode can couple into an optical 1.c
fiber? 2.b
a. 100 microwatts 3.c
b. 440 microwatts 4.c
50 University Academy
5.c 8.c
6.a 9.a
7.b 10.c
Set-10
1. The interactive transmission of data b. multiplexer
within a time sharing system may be best c. concentrator
suited to d. controller
a. simplex lines 6. Which of the following signal is not
b. half-duplex lines standard RS-232-C signal?
c. full duplex lines a. VDR
d. biflex-lines b. RTS
c. CTS
2. Which of the following statement is d. DSR
incorrect?
a. The difference between synchronous and 7. Which of the following statement is
asynchronous transmission is the clocking incorrect?
derived from the data in synchronous a. Multiplexers are designed to accept data
transmission. from several I/O devices and transmit a unified
b. Half duplex line is a communication line stream of data on one communication line
in which data can move in two directions, but b. HDLC is a standard synchronous
not at the same time. communication protocol.
c. Teleprocessing combines c. RTS/CTS is the way the DTE indicates
telecommunications and DP techniques in that it is ready to transmit data and the way the
online activities DCW indicates that it is ready to accept data
d. Batch processing is the prefered d. RTS/CTS is the way the terminal
processing mode for telecommunication indicates ringing
operation.
8. Which of the following is an
3. Which of hte following is considered a advantage to using fiber optics data
broad band communication channel? transmission?
a. coaxial cable a. resistance to data theft
b. fiber optics cable b. fast data transmission rate
c. microwave circuits c. low noise level
d. all of above d. all of above
9. Which of the following is required to
4. Which of the following is not a communicate between two computers?
transmission medium? a. communications software
a. telephone lines b. protocol
b. coaxial cables c. communication hardware
c. modem d. all of above including access to
d. microwave systems transmission medium
5. Which of the following does not allow 10. The transmission signal coding
multiple uses or devices to share one method of TI carrier is called
communication line? a. Bipolar
a. doubleplexer b. NRZ
51 University Academy
c. Manchester
d. Binary
Answers
1.b
2.d
3.d
4.c
5.a
6.a
7.d
8.d
9.d
10.a
52 University Academy
Set-11
1. Why IP Protocol is considered as d. Forwards a packet to all outgoing links
unreliable? except the originated link
a. A packet may be lost
b. Packets may arrive out of order 7. The Internet is an example of
c. Duplicate packets may be generated a. Cell switched network
d. All of the above b. circuit switched network
c. Packet switched network
2. What is the minimum header size of d. All of above
an IP packet?
a. 16 bytes
b. 10 bytes 8. What does protocol defines?
c. 20 bytes a. Protocol defines what data is
d. 32 bytes communicated.
b. Protocol defines how data is
3. Which of following provides reliable communicated.
communication? c. Protocol defines when data is
a. TCP communicated.
b. IP d. All of above
c. UDP
d. All of the above 9. What is the uses of subnetting?
a. It divides one large network into several
4. What is the address size of IPv6 ? smaller ones
a. 32 bit b. It divides network into network classes
b. 64 bit c. It speeds up the speed of network
c. 128 bit d. None of above
d. 256 bit
5. What is the size of Network bits & 10. Repeater operates in which layer of
Host bits of Class A of IP address? the OSI model?
a. Network bits 7, Host bits 24 a. Physical layer
b. Network bits 8, Host bits 24 b. Data link layer
c. Network bits 7, Host bits 23 c. Network layer
d. Network bits 8, Host bits 23 d. Transport layer
53 University Academy
7.c
8.d
9.a
10.a
Set-12
1. Each IP packet must contain c. Network bit - 18, Host bit -16
a. Only Source address d. Network bit- 12, Host bit - 14
b. Only Destination address
c. Source and Destination address
d. Source or Destination address 7. The last address of IP address
represents
2. Bridge works in which layer of the a. Unicast address
OSI model? b. Network address
a. Appliation layer c. Broadcast address
b. Transport layer d. None of above
c. Network layer
d. Datalink layer
54 University Academy
3.a 8.b
4.a 9.a
5.d 10.d
6.a
7.c
55 University Academy
→Telegram Channel
→Telegram Group