0% found this document useful (0 votes)
45 views15 pages

Networks

Networks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views15 pages

Networks

Networks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Object

Object10
12
11
9
8
7
6
4
3
2
1

NETWORKING APTITUDE QUESTIONS-


IN CASE YOU ARE NOT ABLE TO SOLVE THESES QUESTIONS ON YOU OWN!

WE HAVE CREATED A SEPARATE COURSE FOR NETWORKS,


THAT COVERS ALL THE IMPORTANT TOPICS WITH 100+ QUESTIONS
Object 5

SOLVED.
JUST FOR 3000, OHH SORRY I MEANT 300 :)
FULL REFUND IF NOT SATISFIED

COURSE LINK - https://www.rithikcodez.com/courses/Computer-Networks-for-


technical-interview-65036318e4b07901b1435c39-65036318e4b07901b1435c39

1. What is a computer network?


a) A device used to display information on a computer screen
b) A collection of interconnected computers and devices that can communicate and share resources
c) A type of software used to create documents and presentations
d) The physical casing that protects a computer’s internal components

2. What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network

3. Which of the following is an example of Bluetooth?


a) wide area network
b) virtual private network
c) local area network
d) personal area network

4. Which of the following computer networks is built on the top of another network?
a) overlay network
b) prime network
c) prior network
d) chief network
5. What is the full form of OSI?
a) optical service implementation
b) open service Internet
c) open system interconnection
d) operating system interface
6. When a collection of various computers appears as a single coherent system to its clients, what is
this called?
a) mail system
b) networking system
c) computer network
d) distributed system
7. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6

8. What are nodes in a computer network?


a) the computer that routes the data
b) the computer that terminates the data
c) the computer that originates the data
d) all of the mentioned
9. Which one of the following is not a function of network layer?
a) congestion control
b) error control
c) routing
d) inter-networking
10. How is a single channel shared by multiple signals in a computer network?
a) multiplexing
b) phase modulation
c) analog modulation
d) digital modulation
11. Which of the following devices forwards packets between networks by processing the routing
information included in the packet?
a) firewall
b) bridge
c) hub
d) router

12. What is the term for an endpoint of an inter-process communication flow across a computer
network?
a) port
b) machine
c) socket
d) pipe
13. How do two devices become part of a network?
a) PIDs of the processes running of different devices are same
b) a process in one device is able to exchange information with a process in another device
c) a process is active and another is inactive
d) a process is running on both devices
14. Which layer does the data link layer take packets from and encapsulate them into frames for
transmission?
a) transport layer
b) application layer
c) network layer
d) physical layer
15. Which of this is not a network edge device?
a) Switch
b) PC
c) Smartphones
d) Servers

16. Which type of network shares the communication channel among all the machines?
a) anycast network
b) multicast network
c) unicast network
d) broadcast network
17. Which topology requires a multipoint connection?
a) Ring
b) Bus
c) Star
d) Mesh
18. Which of the following maintains the Domain Name System?
a) a single server
b) a single computer
c) distributed database system
d) none of the mentioned
19. When discussing IDS/IPS, what is a signature?
a) It refers to “normal,” baseline network behavior
b) It is used to authorize the users on a network
c) An electronic signature used to authenticate the identity of a user on the network
d) Attack-definition file

20. Which of the following are Gigabit Ethernets?


a) 1000 BASE-LX
b) 1000 BASE-CX
c) 1000 BASE-SX
d) All of the mentioned
21. Which of the following networks extends a private network across public networks?
a) virtual private network
b) local area network
c) storage area network
d) enterprise private network
22. Which layer is responsible for process to process delivery in a general network model?
a) session layer
b) data link layer
c) transport layer
d) network layer
23. What does each packet contain in a virtual circuit network?
a) only source address
b) only destination address
c) full source and destination address
d) a short VC number

24. What is the term for the data communication system within a building or campus?
a) MAN
b) LAN
c) PAN
d) WAN
25. What was the name of the first network?
a) ASAPNET
b) ARPANET
c) CNNET
d) NSFNET
26. Which of the following is the network layer protocol for the internet?
a) hypertext transfer protocol
b) file transfer protocol
c) ethernet
d) internet protocol
27. Which network topology requires a central controller or hub?
a) Ring
b) Bus
c) Star
d) Mesh

28. If a link transmits 4000 frames per second, and each slot has 8 bits, what is the transmission
rate of the circuit using Time Division Multiplexing (TDM)?
a) 500kbps
b) 32kbps
c) 32bps
d) 500bps
29. Which of the following allows LAN users to share computer programs and data?
a) File server
b) Network
c) Communication server
d) Print server
30. What type of transmission is involved in communication between a computer and a keyboard?
a) Half-duplex
b) Full-duplex
c) Simplex
d) Automatic

31. Which layer provides the services to user?


a) physical layer
b) presentation layer
c) session layer
d) application layer
32. Which connection is necessary for a computer to join the internet?
a) internet society
b) internet service provider
c) different computer
d) internet architecture board
33. Which of the following allows you to connect and login to a remote computer?
a) SMTP
b) HTTP
c) FTP
d) Telnet
34. Which of the following is used in an attempt to render a computer resource unavailable to its
intended users?
a) botnet process
b) worms attack
c) virus attack
d) denial-of-service attack

35. The network layer is concerned with __________ of data.


a) bits
b) frames
c) packets
d) bytes
36. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) error control

37. A 4 byte IP address consists of __________


a) only network address
b) only host address
c) network address & host address
d) network address & MAC address

38. In virtual circuit network each packet contains ___________


a) full source and destination address
b) a short VC number
c) only source address
d) only destination address

39. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned

40. Which of the following is not correct in relation to multi-destination routing?


a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers

41. A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree
b) spider structure
c) spider tree
d) special tree

42. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol

43. The network layer protocol for internet is __________


a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol

44.ICMP is primarily used for __________


a) error and diagnostic functions
b) addressing
c) forwarding
d) routing

45. Datagram switching is done at which layer of OSI model?


a) Network layer
b) Physical layer
c) Application layer
d) Transport layer

46. Packets in datagram switching are referred to as ________


a) Switches
b) Segments
c) Datagrams
d) Data-packets

47. Datagram networks mainly refers to _________


a) Connection oriented networks
b) Connection less networks
c) Telephone networks
d) Internetwork

48. Which of the following is not a name for MAC(Media Access Control) in data link layer?
a) Burned-in-address
b) Hardware address
c) Physical address
d) Logical address

49. What is the size of MAC address in medium access control sub layer?
a) 48 bytes
b) 48 bits
c) 32 bits
d) 32 bytes

50. Which of the following is not a separator to be used in MAC address?


a) Hyphen(-)
b) Period(.)
c) Colon(:)
d) Dollar($)
51. What is the primary use of MAC filtering on wireless networks?
a) Efficiency
b) Speed
c) Security
d) Performance
52. Which of the following is not a type of MAC address?
a) Uni-cast MAC address
b) Multicast MAC address
c) Broadcast MAC address
d) Multiple cast MAC address

7. Which of the following is not a similarity between MAC and IP address?


a) Unique
b) Used for communication
c) Every device should have it
d) Both Operates on data link layer

53. Which of the following hardware in our computer is embedded with MAC address?
a) Keyboard
b) NIC
c) Chip
d) Driver
54. How many octets are dedicated to OUI(Organizationally unique identifier) in in 48 MAC address
space?
a) 5
b) 3
c) 2
d) 4
Object 13

55. Nodes in a network(router) has only one MAC address in the network.
a) True
b) False
56. Which of these is not applicable for IP protocol?
a) Connectionless
b) Offer reliable service
c) Offer unreliable service
d) Does not offer error reporting

57. Which of the following demerits does Fragmentation have?


a) Complicates routers
b) Open to DOS attack
c) Overlapping of fragments
d) All of the mentioned

58. Which field helps to check rearrangement of the fragments?


a) Offset
b) Flag
c) TTL
d) Identifier

59. In classless addressing, there are no classes but addresses are still granted in ______
a) IPs
b) Blocks
c) Codes
d) Sizes

60. In IPv4 Addresses, classful addressing is replaced with ________


a) Classless Addressing
b) Classful Addressing
c) Classful Advertising
d) Classless Advertising
61. First address in a block is used as network address that represents the ________
a) Class Network
b) Entity
c) Organization
d) Codes
62. In classful addressing, a large part of available addresses are ________
a) Organized
b) Blocked
c) Wasted
d) Communicated

63. Network addresses are a very important concept of ________


a) Routing
b) Mask
c) IP Addressing
d) Classless Addressing

64. Which of this is not a class of IP address?


a) Class E
b) Class C
c) Class D
d) Class F

65. Which is not a application layer protocol?


a) HTTP
b) SMTP
c) FTP
d) TCP

66. The packet of information at the application layer is called __________


a) Packet
b) Message
c) Segment
d) Frame

67. Which one of the following is an architecture paradigms?


a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server

68. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned

69. Application layer offers _______ service.


a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned

70. E-mail is _________


a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned

71. Pick the odd one out.


a) File transfer
b) File download
c) E-mail
d) Interactive games

72. Which of the following is an application layer service?


a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
73. To deliver a message to the correct application program running on a host, the _______ address
must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
74. Which is a time-sensitive service?
a) File transfer
b) File download
c) E-mail
d) Internet telephony

75. Transport services available to applications in one or another form _________


a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned

76. Electronic mail uses which Application layer protocol?


a) SMTP
b) HTTP
c) FTP
d) SIP

77. The ____________ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
78. Which one of the following allows a user at one site to establish a connection to another site and
then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) TCP

79. Application layer protocol defines ____________


a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned

80. Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol

81. The ASCII encoding of binary data is called


a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding

82. Which one of the following is an internet standard protocol for managing devices on IP network?
a) dynamic host configuration protocol
b) simple network management protocol
c) internet message access protocol
d) media gateway protocol

83. Which one of the following is not an application layer protocol?


a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol

84. Which protocol is a signaling communication protocol used for controlling multimedia
communication sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) resource reservation protocol
85. Which one of the following is not correct?
a) Application layer protocols are used by both source and destination devices during a
communication session
b) HTTP is a session layer protocol
c) TCP is an application layer protocol
d) All of the mentioned

86. When displaying a web page, the application layer uses the _____________
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol

87. Transport layer aggregates data from different applications into a single stream before passing it
to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer

88. Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP

89. User datagram protocol is called connectionless because _____________


a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly

90. Socket-style API for windows is called ____________


a) wsock
b) winsock
c) wins
d) sockwi

91. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
92. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol
93. Transport layer protocols deals with ____________
a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication

94. Which of the following is a transport layer protocol?


a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol

95. Transmission control protocol ___________


a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned

96. An endpoint of an inter-process communication flow across a computer network is called


__________
a) socket
b) pipe
c) port
d) machine

97. Frame Relay is cheaper than other _____


a) LANs
b) WANs
c) MANs
d) Multipoint Networks

98. Frame Relay networks offer an option called _______


a) Voice Over For Relay
b) Voice Over Fine Relay
c) Voice On Frame Relay
d) Voice Over Frame Relay
99. There are ________ total features of Frame Relay.
a) Five
b) Seven
c) Nine
d) Ten

100. Frame Relay does not provide flow or error control, they must be provided by the ______
a) Lower Level Protocol
b) Highest Level Protocol
c) Upper Level Protocol
d) Lowest Level Protocol

You might also like