4 Coc Computer Networks Questions New
4 Coc Computer Networks Questions New
4 Coc Computer Networks Questions New
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Basics – 1”.
a) RFC
b) RCF
c) ID
View Answer
Answer: a
2. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
a) Added
b) Removed
c) Rearranged
d) Modified
View Answer
Answer: a
Explanation: Every layer adds its own header to the packet from the previous layer.
a) Syntax
b) Semantics
c) Struct
View Answer
Answer: a
Explanation: The structure and format of data are defined using syntax. Semantics defines how a particular
pattern to be interpreted, and what action is to be taken based on that interpretation.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
View Answer
Answer: d
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
View Answer
Answer: d
Explanation: ARPANET – Advanced Research Projects Agency Networks was the first network to be
implemented which used the TCP/IP protocol.
a) Path
b) Medium
c) Protocol
d) Route
View Answer
Answer: b
Explanation: Message travel from sender to reciever via a medium using a protocol.
7. Which organization has authority over interstate and international commerce in the communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
View Answer
Answer: c
Explanation: FCC is the abbreviation for Federal Communications Commission. FCC is responsible for
regulating all interstate communications originating or terminating in USA.
a) PC
b) Smartphones
c) Servers
d) Switch
View Answer
Answer: d
Explanation: Network egde devices refer to host systems, which can host applications like web browser.
a) Protocols
b) Standards
c) RFCs
View Answer
Answer: a
Explanation: In communications, a protocol refers to a set of rules and regulations that allow a network of nodes
to transmit and receive information.
a) Unipoint
b) Multipoint
c) Point to point
View Answer
Answer: b
Explanation: A multipoint communication is established when three or many network nodes are connected to
each other.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Basics – 2”.
1. When collection of various computers seems a single coherent system to its client, then it is called
a) computer network
b) distributed system
c) networking system
View Answer
Answer: b
Explanation: Computer networks is defined as a collection of interconnected computers which uses a single
technology for connection.
A distributed system is also the same as computer network but the main difference is that the whole collection of
computers appears to its users as a single coherent system
a) a process in one device is able to exchange information with a process in another device
View Answer
Answer: a
Explanation: A computer network, or data network, is a digital telecommunications network which allows nodes
to share resources. In computer networks, computing devices exchange data with each other using connections
between nodes.
3. Which one of the following computer network is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
View Answer
Answer: d
Explanation: An overlay network is a computer network that is built on top of another network.
View Answer
Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or
even routing the data to the destination.
a) broadcast network
b) unicast network
c) multicast network
View Answer
Answer: a
Explanation: In a broadcast network, an information is sent to all station in a network whereas in a multicast
network the data or information is sent to a group of stations in the network. In unicast network, information is
sent to only one specific station.
6. Bluetooth is an example of
View Answer
Answer: a
Explanation: A personal area network (PAN) is the interconnection of information technology devices within the
range of an individual person, typically within a range of 10 meters.
7. A __________ is a device that forwards packets between networks by processing the routing information
included in the packet.
a) bridge
b) firewall
c) router
View Answer
Answer: c
Explanation: A router[a] is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet.
a) protocol architecture
b) protocol stack
c) protocol suite
View Answer
Answer: b
Explanation: A protocol stack refers to a group of protocols that are running concurrently that are employed for
the implementation of network protocol suite.
View Answer
Answer: a
Explanation: A network congestion occurs when traffic in the network is more than the network could handle.
10. Which one of the following extends a private network across public networks?
View Answer
Answer: b
Explanation: A virtual private network extends a private network across a public network, and enables users to
send and receive data across shared or public networks as if their computing devices were directly connected to
the private network.
Computer Networks Questions & Answers – Access Networks
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Access Networks”.
View Answer
Answer: c
b) ISP
View Answer
Answer: c
Explanation: The same company which provides phone connection is also its ISP in DSL.
View Answer
Answer: a
Explanation: The DSLAM located in telco’s Central Office does this function.
a) DSLAM
b) CO
c) Splitter
d) CMTS
View Answer
Answer: d
5. HFC contains
a) Fibre cable
b) Coaxial cable
View Answer
Answer: c
Explanation: Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband network that
combines optical fiber and coaxial cable.
6. Choose the statement which is not applicable for cable internet access
b) It includes HFCs
View Answer
Answer: d
b) PON
c) NON
View Answer
Answer:a
8. StarBand provides
b) Cable access
c) Telephone access
d) Satellite access
View Answer
Answer: d
Explanation: StarBand was a two-way satellite broadband Internet service available in the U.S. from 2000–2015.
a) DSL
b) FTTP
c) Cable
View Answer
Answer: d
b) HFC
c) Optical cable
d) None of the mentioned
View Answer
Answer: c
Explanation: ONT stands for Optical Network Terminal. The ONT connects to the Termination Point (TP) with
an optical fibre cable.
advertisement
c) Shadow fading
d) Both The gauge of the twisted-pair line and Degree of electrical interfernece
View Answer
Answer: d
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Reference Models –
1”.
a) 5
b) 7
c) 6
View Answer
Answer: a
Explanation: There are five layers in the Internet Protocol stack. The five layers in Internet Protocol stack is
Application, Transport, Network, Data link and Physical layer.
a) 5
b) 7
c) 6
View Answer
Answer: b
Explanation: The seven layers in ISO OSI reference model is Application, Presentation, Session, Transport,
Network, Data link and Physical layer.
3. This layer is an addition to OSI model when compared with TCP IP model
a) Application layer
b) Presentation layer
c) Session layer
View Answer
Answer: d
Explanation: The only difference between OSI model and TCP/IP model is that in OSI model two layers namely
Presentation and Session layer have been added.
a) End system
b) NIC
c) Ethernet
View Answer
Answer: a
Explanation: Not only application layer, but presentation layer, session layer and transport layer are also
implemented in the end system.
a) End system
b) NIC
c) Ethernet
View Answer
Answer: a
Explanation: Application, Presentation, Session and Transport layer are implemented in the end system.
a) Data compression
b) Data encryption
c) Data description
View Answer
Answer: d
Explanation: Some functions of the presentation layer include character-code translation, data conversion, data
encryption and decryption, and data translation.
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
View Answer
Answer: b
Explanation: The session layer provides the mechanism for opening, closing and managing a session between
end-user application processes. The session layer 5 is responsible for establishing managing synchronizing and
terminating sessions.
8. In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Answer: d
Explanation: In OSI reference model, the fifth layer is Session layer. Session layer provides the mechanism for
opening, closing and managing a session between end-user application processes.
9. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Answer: a
Explanation: In TCP/IP model, the fifth layer is application layer. when data is sent from device A to device B,
the 5th layer to receive data at B is application layer.
10. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______
a) Added
b) Removed
c) Rearranged
View Answer
Answer: b
Explanation: In OSI reference model, when data packet moves from lower layers to higher layer, headers get
removed. Whereas when data packet move from higher layer to lower layers, headers are added.
Computer Networks Questions & Answers – Reference Models – 2
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Reference Models –
2”.
View Answer
Answer: a
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides a structured plan on
how applications communicate over a network, which also helps us to have a structured plan for troubleshooting.
a) 4
b) 5
c) 6
d) 7
View Answer
Answer: d
Explanation: In OSI reference model, there are 7 layers namely Application, Presentation, Session, Transport,
Network, Data Link and Physical layer.
3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
View Answer
Answer: a
Explanation: In OSI reference model, there are two layers which are not present in TCP/IP model. They are
Presentation and Session layer.
4. Which layer links the network support layers and user support layers
a) session layer
c) transport layer
d) network layer
View Answer
Answer: c
Explanation: Physical, data link and network layers are network support layers and session, presentation and
application layers are user support layers.
b) port address
c) specific address
View Answer
Answer: d
Explanation: All of the mentioned above addresses are used in TCP/IP protocol. All the addressing scheme, that
is physical (MAC) and logical address, port address and specific address are employed in both TCP/IP model
and OSI model.
a) prior to
b) after
c) simultaneous to
View Answer
Answer: a
Explanation: Several TCP/IP prototypes were developed at multiple research centers between 1978 and 1983,
whereas OSI reference model was developed in the year 1984.
a) network layer
b) transport layer
c) session layer
View Answer
Answer: b
Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end connection between two
system in a network. The protocols used in Transport layer is TCP and UDP.
a) physical address
b) logical address
c) port address
d) specific address
View Answer
Answer: c
Explanation: A port number is a way to identify a specific process to which an Internet or other network message
is to be forwarded when it arrives at a server.
a) application layer
b) session layer
c) presentation layer
View Answer
Answer: a
Explanation: In networking, a user mainly interacts with application layer to create and send information to other
computer or network.
a) network layer
b) physical layer
d) transport layer
View Answer
Answer: b
Explanation: Physical layer is a layer 1 device which deals with network cables or the standards in use like
connectors, pins, electric current used etc. Basically the transmission speed is determined by the cables and
connectors used. Hence it is physical layer that determines the transmission speed in network.
Computer Networks Questions & Answers – Physical Layer
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Physical Layer”.
a) bit-by-bit delivery
View Answer
Answer: a
Explanation: Physical layer deals with bit to bit delivery in networking. The data unit in the physical layer is bits.
Process to process delivery is dealy in the transport layer.
a) coaxial cable
c) optical fiber
d) electrical cable
View Answer
Answer: c
Explanation: Fibre optics is considered to have the highest transmission speed among the all mentioned above.
The fibre optics transmission runs at 1000Mb/s. It is called as 1000Base-Lx whereas IEEE stndard for it is
802.3z.
3. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
View Answer
Answer: a
Explanation: In analog modulation, digital low frequency baseband signal (digital bitstream) are transmitted over
a higher frequency. Whereas in digital modulation the only difference is that the base band signal is of discrete
amplitude level.
4. The portion of physical layer that interfaces with the media access control sublayer is called
View Answer
Answer: a
Explanation: The portion of physcial layer that interfaces with the medium access control sublayer is Physical
Signaling Sublayer. The main function of this layer is character encoding, reception, decoding and performs
optional isolation functions.
View Answer
Answer: d
Explanation: Anything dealing with a network cable or the standards in use – including pins, connectors and the
electric current used is dealt in the physical layer (Layer 1).
b) flow control
View Answer
Answer: c
Explanation: In asynchronous serial communication, the communication is not synchronized by clock signal.
Instead of a start and stop signaling and flow control method is followed.
a) line coding
b) channel coding
c) modulation
View Answer
Answer: d
Explanation: The physical layer is responsible for line coding, channel coding and modulation that is needed for
the transmission of the information.
8. The physical layer translates logical communication requests from the ______ into hardware specific
operations.
b) network layer
c) trasnport layer
d) application layer
View Answer
Answer: a
Explanation: Physical layer accepts data or information from the data link layer and converts it into hardware
specific operations so as to transfer the message through physical cables.
a) analog modulation
b) digital modulation
c) multiplexing
View Answer
Answer: c
Explanation: In communication and computer networks, the main goal is to share a scarce resource. This is done
by multiplexing, where multiple analog or digital signals are combined into one signal over a shared medium.
a) radio waves
b) microwaves
c) infrared
View Answer
Answer: d
Explanation: Wireless transmission is carried out by radio waves, microwaves and IR waves. These waves range
from 3 Khz to above 300 Ghz and are more suitable for wireless transmission because they allow a wider band
for modulating signals, so you can obtain higher frequency transmission.
Computer Networks Questions & Answers – Data Link Layer
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Data Link Layer”.
1. The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
View Answer
Answer: a
Explanation: In computer networks, the data from application layer is sent to transport layer and is converted to
segments. These segments are then transferred to the network layer and these are called packets. These packets
are then sent to data link layer where they are encapsulated into frames. These frames are then transferred to
physical layer where the frames are converted to bits.
2. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
View Answer
Answer: d
Explanation: Channel coding is the function of physical layer. Data link layer mainly deals with framing, error
control and flow control.
3. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
Answer: b
Explanation: Media access control (MAC) deals with transmission of data packets to and from the network-
interface card, and also to and from another remotely shared channel.
a) synchronization bytes
b) addresses
c) frame identifier
View Answer
Answer: d
Explanation: In computer networks, the header is a part of the data that contains all the required information
about the transmission of the file. It contains information like synchronization bytes, addresses, frame identifier
etc.
View Answer
Answer: a
Explanation: The logical link control is a sublayer of data link layer whose main function is to manage traffic,
flow and error control. This layer also acts as an interface between MAC layer and network layer.
6. When 2 or more bits in a data unit has been changed during the transmission, the error is called
a) random error
b) burst error
c) inverted error
Answer: b
Explanation: When a single bit error occurs in a data, it is called single bit error. When more than a single bit of
data is corrupted or has error, it is called burst error.
View Answer
Answer: a
Explanation: Cyclic redundancy check is a code that is added to a data which helps us to identify any error that
occurred during the transmission of the data.
a) ethernet
c) hdlc
View Answer
Answer: d
Explanation: There are many data link layer protocols. Some of them are SDLC (synchronous data link
protocol), HDLC (High level data link control), SLIP (serial line interface protocol), PPP (Point to point
protocol) etc.
9. Which one of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
Answer: c
Explanation: In CSMA/CD, it deals with detection of collision after collision has occurred. Whereas CSMA/CA
deals with preventing collision. CSMA/CD is abbreviation for Carrier Sensing Multiple Access/Collision
detection. CSMA/CA is abbreviation for Carrier Sensing Multiple Access/Collision Avoidance.
10. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next
outgoing data frame is called
a) piggybacking
c) fletcher’s checksum
View Answer
Answer: a
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Network Layer”.
a) bits
b) frames
c) packets
View Answer
Answer: c
Explanation: In computer networks, the data from the application layer is sent to the transport layer and is
converted to segments. These segments are then transferred to the network layer and these are called packets.
These packets are then sent to data link layer where they are encapsulated into frames. These frames are then
transferred to physical layer where the frames are converted to bits.
a) routing
b) inter-networking
c) congestion control
View Answer
Answer: d
Explanation: In the OSI model, network layer is the third layer and it provides data routing paths for network
communications.
a) network address
b) host address
Answer: c
Explanation: An ip address which is 32 bits long, that means it is of 4 bytes and is composed of a network and
host portion and it depends on address class.
b) a short VC number
View Answer
Answer: b
Explanation: A short VC number also called as VCID (virtual circuit identifier) is a type of identifier which is
used to distinguish between several virtual circuits in a connection oriented circuit switched network.
5. Which one of the following routing algorithm can be used for network layer design?
View Answer
Answer: d
Explanation: The routing algorithm is what decides where a packet should go next. There are several routing
techniques like shortest path algorithm, static and dynamic routing, decentralized routing, distance vector
routing, link state routing, Hierarchical routing etc.
6. Multidestination routing
Answer: c
Explanation: None.
7. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
View Answer
Answer: a
Explanation: Spanning tree protocol (STP) is a network protocol that creates a loop free logical topology for
ethernet networks. It is a layer 2 protocol that runs on bridges and switches. The main purpose of STP is to
ensure that you do not create loops when you have redundant paths in your network.
8. Which one of the following algorithm is not used for congestion control?
b) admission control
c) load shedding
View Answer
Answer: d
Explanation: None.
a) ethernet
b) internet protocol
View Answer
Answer: b
Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP, CLNP, ARP, IPX,
HRSP etc. Hypertext transfer protocol is for application layer and ethernet protocol is for data link layer.
b) addressing
c) forwarding
View Answer
Answer: a
Explanation: ICMP abbreviation for Internet Control Message Protocol is used by networking devices to send
error messages and operational information indicating a host or router cannot be reached.
Computer Networks Questions & Answers – Transport Layer
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Transport Layer”.
1. Transport layer aggregates data from different applications into a single stream before passing it to
a) network layer
c) application layer
d) physical layer
View Answer
Answer: a
Explanation: The flow of data in the OSI model flows in following manner Application -> Presentation ->
Session -> Transport -> Network -> Data Link -> Physical.
a) TCP
b) UDP
View Answer
Answer: c
Explanation: Both TCP and UDP are transport layer protocol in networking. TCP is an abbreviation for
Transmission Control Protocol and UDP is an abbreviation for User Datagram Protocol. TCP is connection
oriented whereas UDP is connectionless.
View Answer
Answer: a
Explanation: UDP is an alternative for TCP and it is used for those purposes where speed matters most whereas
loss of data is not a problem. UDP is connectionless whereas TCP is connection oriented.
View Answer
Answer: d
Explanation: Major internet applications like www, email, file transfer etc rely on tcp. TCP is connection
oriented and it is optimized for accurate delivery rather than timely delivery.
a) socket
b) pipe
c) port
View Answer
Answer: a
Explanation: Socket is one end point in a two way communication link in the network. TCP layer can identify
the application that data is destined to be sent by using the port number that is bound to socket.
a) wsock
b) winsock
c) wins
View Answer
Answer: b
Explanation: Winsock is a programming interface which deals with input output requests for internet
applications in windows OS. It defines how windows network software should access network services.
View Answer
Answer: a
Explanation: The datagram congestion control is a transport layer protocol which deals with reliable connection
setup, teardown, congestion control, explicit congestion notification, feature negotiation.
a) port
b) pipe
c) node
View Answer
Answer: a
Explanation: Just as the IP address identifies the computer, the network port identifies the application or service
running on the computer. A port number is 16 bits.
View Answer
Answer: b
Explanation: Transport layer is 4th layer in TCP/IP model and OSI reference model. It deals with logical
communication between process. It is responsible for delivering a message between network host.
View Answer
Answer: a
Explanation: There are many protocols in transport layer. The most prominent are TCP and UDP. Some of the
other protocols are RDP, RUDP, SCTP, DCCP etc.
Computer Networks Questions & Answers – Topology
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Topology”.
a) Topology
b) Routing
c) Networking
View Answer
Answer: a
Explanation: Topology in networks is the structure or pattern in which each and every node in the network is
connected. There are many topologies in networking like bus, tree, ring, star, mesh, hybrid.
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Answer: a
Explanation: In star topology a main hub is present to which all other nodes of the network is connected. Every
data or information being transmitted or received in this topology has to pass through the hub. The hub directs
the data to its destination.
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Answer: d
Explanation: In bus topology, there is a single cable to which all the network nodes are connected. So whenever
a node tries to send a message or data to other nodes, this data passes through all other nodes in the network.
4. Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
View Answer
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical
area. These are used to connect cities, states or even countries.
a) LAN
b) WAN
c) MAN
View Answer
Answer: a
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects computers in a small
area such as schools, offices, residence etc.
6. Expand WAN?
View Answer
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical
area. These are used to connect cities, states or even countries. They can be connected through leased lines or
satellites.
a) Seconds
b) Frames
c) Packets
View Answer
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low
rate channel to a single high rate channel. For a certain time slot, the several channels could use the maximum
bandwidth.
advertisement
a) FDM
b) TDM
View Answer
Answer: a
Explanation: FDM is an abbreviation for Frequency Division Multiplexing. This technique is used when the
bandwidth of the channel is greater than the combined bandwidth of all the signals which are to be transmitted.
Computer Networks Questions & Answers – Multiplexing
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Multiplexing”.
1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
d) Duplexing
View Answer
Answer: b
Explanation: Multiplexing is a method using which one can send multiples signals through a shared medium at
the same time. This helps in using less resources and thus saving the cost of sending messages.
a) Packet switching
b) Circuit switching
c) Data switching
View Answer
Answer: b
Explanation: Circuit switching is a switching method by which one can obtain a physical path between end
points. Circuit switching method is also called a connection oriented network.
a) FDM
b) TDM
c) WDM
View Answer
Answer: b
Explanation: TDM abbreviation for Time DIvision Multiplexing is a method used for digital signals. Whereas
FDM and WDM abbreviation for Frequency DIvision Multiplexing and Wavelength Division Multiplexing are
used for analog signals.
4. If there are n signal sources of same data rate than TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n
View Answer
Answer: a
Explanation: When it comes to TDM, each and every slots are dedicated to the source.
5. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is
_________
a) 32kbps
b) 500bps
c) 500kbps
View Answer
Answer: a
6. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
View Answer
Answer: c
Explanation: There are instances when connection between two endpoints have been established, but no
communication or transfer of messages occur. This period of time is called silent period.
a) Efficiency
b) Privacy
c) Anti jamming
View Answer
Answer: d
Explanation: Multiplexing helps us to transfer our messages over a shared channel. This brings up the issue of
privacy and efficiency. Fortunately, Multiplexing has high efficiency and high privacy when implemented.
advertisement
8. In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of
the signal sources.
a) Greater than
b) Lesser than
c) Equal to
View Answer
Answer: a
Explanation: In TDM the transmission rate provided by the path that is multiplexed will always be greater than
the sum of transmission rates of the single sources.
a) Seconds
b) Frames
c) Packets
View Answer
Answer: b
Explanation: In TDM time is divided into a frame. These same frames are then divided into slots.
Computer Networks Questions & Answers – Delays and Loss
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Delays and Loss”.
1. Which of the following delay is faced by the packet in travelling from one end system to another ?
a) Propagation delay
b) Queuing delay
c) Transmission delay
View Answer
Answer: d
Explanation: None.
2. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is(in microseconds)
a) 3.2
b) 32
c) 0.32
d) 320
View Answer
Answer: a
3. The time required to examine the packet’s header and determine where to direct the packet is part of
a) Processing delay
b) Queuing delay
c) Transmission delay
View Answer
Answer: a
Explanation: None.
4. Traffic intensity is given by, where L = number of bits in the packet a = average rate R = transmission rate
a) La/R
b) LR/a
c) R/La
View Answer
Answer: a
Explanation: None.
5. In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps,
30Mbps, 40Mbps. The throughput is usually
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
View Answer
Answer: b
6. If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number
of routers between source and destination is
a) N/2
b) N
c) N-1
d) 2N
View Answer
Answer: c
Explanation: None.
View Answer
Answer: c
Explanation: None.
8. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the
following delays could be zero
a) Propogation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
View Answer
Answer: b
Explanation: None.
a) Packet length
c) Transmission rate
View Answer
Answer: b
a) Packet length
b) Transmission rate
c) Distance between the routers
View Answer
Answer: c
Explanation: Propagation delay is the time it takes a bit to propagate from one router to the next.
Computer Networks Questions & Answers – Network Attacks
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Network Attacks”.
a) Internet
b) Botnet
c) Telnet
d) D-net
View Answer
Answer: b
Explanation: None.
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
View Answer
Answer: d
Explanation: None.
3. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at
the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
View Answer
Answer: c
Explanation: None.
4. The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
View Answer
Answer: b
Explanation: None.
a) Active receiver
b) Passive receiver
View Answer
Answer: b
a) Wired environment
b) WiFi
c) Ethernet LAN
View Answer
Answer: d
Explanation: None.
b) TCP traffic
View Answer
Answer: a
Explanation: None.
advertisement
8. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the
following delays could be zero
a) Propogation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
View Answer
Answer: b
Explanation: None.
Computer Networks Questions & Answers – Physical Media
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Physical Media”.
b) Coaxial cable
c) Wireless LAN
d) Copper wire
View Answer
Answer: c
a) DSL
b) FTTP
c) HTTP
View Answer
Answer: a
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: Coaxial cable has an inner conductor surrounded by a insulating layer, which is surrounded by a
conducting shield. Coaxial cable is used to carry high frequency signals with low losses.
View Answer
Answer: d
Explanation: In fibre optics the transmission of information is in the form of light or photons. Due to all above
properties mentioned in options fibre optics can be submerged in water and are used at more risk environments.
5. If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) __________
a) n*39.8
b) n*51.8
c) 2n*51.8
View Answer
Answer: b
Explanation: The base unit of transmission rates in optical fibre is 51.8 Mbits/s. So an optical carrier represented
as OC-n has n*51.8 Mbits/s transmission speed. For eg. OC-3 has 3*51.8 Mbits/s speed.
a) 2
b) 3
c) 4
d) 1
View Answer
Answer: b
Explanation: The three types are those that operate over very short distance, those that operate in local areas,
those that operate in the wide area.
View Answer
Answer: d
Explanation: Radio channels can penetrate walls, can be used to provide connectivity to mobile users and can
also carry signals for long distances.
advertisement
View Answer
Answer: a
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Packet Switching &
Circuit Switching”.
a) Packet switched
b) Circuit switched
d) Line switched
View Answer
Answer: b
Explanation: Circuit switching is connection oriented switching technique. Whereas in the case of packet
switching, it is connectionless. Circuit switching is implemented in the Physical layer, whereas packet switching
is implemented in the Network layer.
View Answer
Answer: b
Explanation: The packet switch will not transmit the first bit to outbound link until it receives the entire packet.
3. If there are N routers from source to destination, a total end to end delay in sending packet P(L-> number of
bits in the packet R-> transmission rate)
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
View Answer
Answer: b
Explanation: The equation to find the end to end delay when no. of bits, transmission rate and no. of routers is
given by (N*L)/R.
4. What are the Methods to move data through a network of links and switches?
a) Packet switching
b) Circuit switching
c) Line switching
View Answer
Answer: d
Explanation: Packet switching and Circuit switching are two different types of switching methods used to
connect the multiple communicating devices with one another.
5. The resources needed for communication between end systems are reserved for the duration of the session
between end systems in ________
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
View Answer
Answer: b
Explanation: In circuit switching, a physical path between the sender and receiver is established. This path is
maintained until the connection is needed.
6. As the resouces are reserved between two communicating end systems in circuit switching, this is achieved
___________
a) authentication
c) reliability
Answer: b
Explanation: Circuit switching is connection oriented and is always implemented in the physical layer. Once a
path is set, all transmission occurs through the same path.
a) packet switching
b) circuit switching
c) line switching
d) frequency switching
View Answer
Answer: a
Explanation: In packet switching, the bits are received in out of order and need to be assembled at the receiver
end. Whereas in the case of Circuit switching, all the bits are received in order.
advertisement
c) Mail service
View Answer
Answer: d
Explanation: Network virtual terminal, mail service, file transfer, access and management are all services of an
application layer.
Computer Networks Questions & Answers – Application Layer – 1
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Application Layer –
1”.
a) HTTP
b) SMTP
c) FTP
d) TCP
View Answer
Answer: d
a) Packet
b) Message
c) Segment
d) Frame
View Answer
Answer: b
Explanation: For Application, Presentation and Session layers there is no data format for message. Message is
message as such in these three layers. But when it comes to Transport, Network, Data and Physical layer they
have data in format of segments, packets, frames and bits respectively.
a) Peer to peer
b) Client-server
c) HTTP
View Answer
Answer: d
4. Application developer has permission to decide the following on transport layer side
View Answer
Answer: c
Explanation: Application layer provides the interface between applications and the network. So application
developer can decide what transport layer to use and what should be its maximum buffer size.
a) End to end
b) Process to process
View Answer
Answer: a
Explanation: End to End service is provided in the application layer. Whereas process to process service is
provided at the transport layer.
6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
View Answer
Answer: c
Explanation: Because it can work with available throughput.
a) File transfer
b) File download
c) E-mail
d) Interactive games
View Answer
Answer: d
Explanation: File transfer, File download and Email are services provided by the application layer and there are
message and data oriented.
c) Mail service
View Answer
Answer: d
Explanation: The services provided by the application layer are network virtual terminal, file transfer, access and
management, mail services, directory services, various file and data operations.
9. To deliver a message to the correct application program running on a host, the _______ address must be
consulted.
a) IP
b) MAC
c) Port
View Answer
Answer: c
Explanation: IP address lets you know where the network is located. Whereas MAC address is a unique address
for every device. Port address identifies a process or service you want to carry on.
a) File transfer
b) File download
c) E-mail
d) Internet telephony
View Answer
Answer: d
advertisement
b) Timing
c) Security
View Answer
Answer: d
Explanation: The transport services that are provided to application are reliable data transfer, security and timing.
These are very important for proper end to end services.
a) SMTP
b) HTTP
c) FTP
d) SIP
View Answer
Answer: a
Explanation: Email uses various protocols like SMTP, IMAP and POP. The most prominent one used in
application layer is SMTP.
Computer Networks Questions & Answers – Application Layer – 2
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Application Layer –
2”.
View Answer
Answer: a
Explanation: Domain name system is the way the internet domain names are stored and translated to IP
addresses. The domain names systems matches the name of website to ip addresses of the website.
2. Which one of the following allows a user at one site to establish a connection to another site and then pass
keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) TCP
View Answer
Answer: c
Explanation: Telnet is used for accessing remote computers. Using telnet a user can access computer remotely.
With Telnet, you can log on as a regular user with whatever privileges you may have been granted to the specific
application and data on the computer.
c) rules for when and how processes send and respond to messages
Answer: d
Explanation: Application layer deals with the user interface, what message is to be sent or the message format,
syntax and semantics. A user has access to application layer for sending and receiving messages.
View Answer
Answer: a
Explanation: SMTP, abbreviation for Simple Mail Transfer Protocol is an application layer protocol. A client
who wishes to send a mail creates a TCP connection to the SMTP server and then sends the mail across the
connection.
a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
View Answer
Answer: a
Explanation: Base64 is used commonly in a number of applications including email via MIME, and storing
complex data in XML. Problem with sending normal binary data to a network is that bits can be misinterpreted
by underlying protocols, produce incorrect data at receiving node and that is why we use this code.
6. Which one of the following is an internet standard protocol for managing devices on IP network?
Answer: b
Explanation: SNMP is a set of protocols for network management and monitoring. This protocol is included in
the application layer. SNMP uses 7 protocol data units.
View Answer
Answer: c
Explanation: Resource reservation protocol is used in transport layer. It is designed to reserve resources across a
network for quality of service using the integrated services model.
8. Which protocol is a signaling communication protocol used for controlling multimedia communication
sessions?
View Answer
Answer: a
Explanation: SIP is a signaling protocol in which its function includes initiating, maintaining and terminating
real time sessions. SIP is used for signaling and controlling multimedia sessions.
a) Application layer protocols are used by both source and destination devices during a communication session
Answer: d
Explanation: HTTP is an application layer protocol. Whereas TCP is a transport layer protocol.
10. When displaying a web page, the application layer uses the _____________
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
View Answer
Answer: a
Explanation: HTTP is abbreviation for hypertext transfer protocol. It is the foundation of data communication for
world wide web. This protocol decides how the message is formatted and transmitted etc.
Computer Networks Questions & Answers – HTTP
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “HTTP”.
1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ________
a) 4
b) 1
c) 5
d) 7
View Answer
Answer: c
a) Persistent
b) Non-persistent
View Answer
Answer: a
Explanation: By default the http connection is issued with persistent connection. In persistent connection server
leaves connection open after sending response. As little as one RTT (Time for a small packet to travel from
client to server and back) is required for all referenced objects.
3. The time taken by a packet to travel from client to server and then back to the client is called __________
a) STT
b) RTT
c) PTT
d) JTT
View Answer
Answer: b
a) First
b) Second
c) Third
d) Fourth
View Answer
Answer: c
Explanation: In first step client sends a segment to establish a connection with the server. In the second the step
the client waits for the acknowledgement to be received from the server. After receiving the acknowledgement,
the client sends actual data in the third step.
5. In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs.
a) 2
b) 1
c) 4
d) 3
View Answer
Answer: b
Explanation: By default the http connection will be persistent connection. Hence it will take only 1 RTT to fetch
a webpage from a server.
a) Request line
b) Header line
c) Status line
d) Entity line
View Answer
Answer: a
Explanation: The line followed by request line are called header lines and status line is the initial part of response
message.
7. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
View Answer
Answer: a
Explanation: It is specified in the method field of request line in the HTTP request message.
8. The __________ method when used in the method field, leaves entity body empty.
a) POST
b) SEND
c) GET
d) PUT
View Answer
Answer: c
Explanation: There are two methods which help to request a response from a server. Those are GET and POST.
In GET method, the client requests data from server. In POST method the client submits data to be processed to
the server.
9. The HTTP response message leaves out the requested object when ____________ method is used
a) GET
b) POST
c) HEAD
d) PUT
View Answer
Answer: c
Explanation: HEAD method is much faster than GET method. In HEAD method much smaller amount of data is
transferred. The HEAD method asks only for information about a document and not for the document itself.
a) 200 OK
View Answer
Answer: d
advertisement
View Answer
Answer: a
Explanation: Web cache or also known as HTTP cache is a temporary storage where HTML pages and images
are stored temporarily so that server lag could be reduced.
View Answer
Answer: c
Explanation: The HTTP protocol requests the server of the website its trying to access so that it can store its
files, images etc. in cache memory. This request of asking the server for a document considering a specific
parameter is called conditional GET Request.
13. Which of the following is present in both an HTTP request line and a status line?
b) URL
c) Method
View Answer
Answer: a
Explanation: Status line is the the start line of an HTTP response. It contains the information such as the protocol
version, a status text, status code.
Computer Networks Questions & Answers – HTTP & FTP
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “HTTP & FTP”.
1. Multiple object can be sent over a TCP connection between client and server in
a) persistent HTTP
b) nonpersistent HTTP
View Answer
Answer: a
Explanation: None.
a) application layer
b) transport layer
c) network layer
View Answer
Answer: a
Explanation: None.
View Answer
Answer: a
Explanation: None.
4. HTTP client requests by establishing a __________ connection to a particular port on the server.
View Answer
Answer: b
Explanation: None.
5. In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
View Answer
Answer: a
Explanation: None.
a) 20
b) 21
c) 22
d) 23
View Answer
Answer: b
Explanation: None.
7. In FTP protocol, client contacts server using ____ as the transport protocol.
View Answer
Answer: a
Explanation: None.
8. In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
View Answer
Answer: b
Explanation: None.
View Answer
Answer: c
Explanation: None.
a) stream mode
b) block mode
c) compressed mode
Answer: d
Explanation: None.
Computer Networks Questions & Answers – SMTP – 2
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SMTP – 2”.
1. Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail
transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
View Answer
Answer:a
Explanation:None.
a) SMTPS
b) SSMTP
c) SNMP
View Answer
Answer:a
Explanation:None.
a) 22
b) 23
c) 24
d) 25
View Answer
Answer:d
Explanation:None.
a) smtp
View Answer
Answer:d
Explanation:None.
b) an SMTP extension
View Answer
Answer:b
Explanation:None.
6. An email client needs to know the _________ of its initial SMTP server.
a) IP address
b) MAC address
c) Url
View Answer
Answer:a
Explanation:None.
View Answer
Answer:d
Explanation:None.
8. SMTP defines
a) message transport
b) message encryption
c) message content
View Answer
Answer:a
Explanation:None.
9. Which one of the following is an SMTP server configured in such a way that anyone on the internet can send
e-mail through it?
View Answer
Answer:a
Explanation:None.
a) user’s terminal
b) user’s mailbox
c) both user’s terminal and mailbox
View Answer
Answer:c
Explanation:None.
Computer Networks Questions & Answers – DNS
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “DNS”.
a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
View Answer
Answer: a
Explanation: An entire hostname can have a maximum of 255 characters. Although each label must be from 1 to
63 characters long. Host name is actually a label that is given to a device in a network.
a) DNS updater
b) DNS resolver
c) DNS handler
View Answer
Answer: b
Explanation: DNS client also known as DNS resolver also known as DNS lookup helps to resolve DNS requests
using an external DNS server.
a) directly
c) it is not possible
View Answer
Answer: b
Explanation: Whenever a request is received at server from other domains, it handles this situation by contacting
remote DNS server.
b) hostname-to-address records
c) hostname aliases
View Answer
Answer: d
Explanation: Domain Name system not only deals with mapping IP addresses with the hostname but also deals
with exchange of information in the server.
5. If a server has no clue about where to find the address for a hostname then _______
View Answer
Answer: a
Explanation: Root name servers are actually very important and critical as they are the first step in translating
human readable hostnames into IP addresses for carrying out communication.
6. Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
View Answer
Answer: a
Explanation: Dynamic DNS or in short DDNS or DynDNS helps in automatically updating a name server in the
DNS. This does not require manual editing.
a) @
b) *
c) &
d) #
View Answer
Answer: b
Explanation: A wildcard DNS record matches requests to a non existent domain name. This wildcard DNS
record is specified by using asterisk “*” as the starting of a domain name.
8. The right to use a domain name is delegated by domain name registers which are accredited by _______
b) internet society
View Answer
Answer: d
Explanation: The ICANN (Internet Corporation for Assigned Names and Numbers) deals with IP address space
allocation, protocol identifier assignment, generic and country code Top Level domain name system
management (gTLD and ccTLD).
b) a single server
c) a single computer
View Answer
Answer: a
Explanation: A domain name system is maintained by a distributed database system. It is a collection of
multiple, logically interrelated databases distributed over a computer network.
View Answer
Answer: c
Explanation: It need not be that a single hostname will correspond to a ip address. For example facebook.com
and fb.com both correspond to same ip address. So there can be multiple hostnames for a single ip address.
Computer Networks Questions & Answers – SSH
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SSH”.
View Answer
Answer: d
Explanation: SSH provides high encryption and security features while communicating through a network. It is a
cryptographic network protocol.
b) windows
View Answer
Answer: c
Explanation: SSH isn’t confined to a certain network or operating system. It can be implemented over different
networks and on different operating systems.
a) public-key cryptography
b) private-key cryptography
View Answer
Answer: a
Explanation: Public encryption key is slower but more flexible. Every cryptographic security system requires a
private key for private access and a public key for location.
a) port 21
b) port 22
c) port 23
d) port 24
View Answer
Answer: b
Explanation: Port 22 is used for contacting ssh servers, used for file transfers (scp, sftp) and also port forwarding.
5. Which one of the following protocol can be used for login to a shell on a remote host except SSH?
a) telnet
b) rlogin
View Answer
Answer: c
a) SCP
b) SFTP
c) Rsync
View Answer
Answer: d
Explanation: SCP (Secure copy protocol), SFTP (SSH File Transfer Protocol) and Rsync all are file transfer
protocols which are used by SSH.
7. SSH-2 does not contain ______________
a) transport layer
c) physical layer
d) connection layer
View Answer
Answer: c
Explanation: SSH2 is a more secure, portable and efficient version of SSH that includes SFTP, which is
functionally similar to FTP, but is SSH2 encrypted.
8. Which one of the following feature was present in SSH protocol, version 1?
a) password changing
View Answer
Answer: d
Explanation: All of the mentioned features are provided by SSH-2 and that SSH-1 only provide strong
authentication and guarantee confidentiality.
a) RCP protocol
b) DHCP protocol
c) MGCP protocol
d) GCP protocol
View Answer
Answer: a
Explanation: RCP is the abbreviation for Rate Control Protocol is a congestion control algorithm for fast user
response times.
b) host based
c) password
View Answer
Answer: d
Explanation: SSH used public key authentication, Password authentication, Host based authentication, keyboard
authentication and authentication of servers.
Computer Networks Questions & Answers – DHCP
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “DHCP”.
a) IP address
b) MAC address
c) Url
View Answer
Answer: a
Explanation: We use DHCP to allow the hosts to acquire their ip addresses dynamically which is better than
visiting each and every host on the network and configure all of this information manually.
a) IPv6
b) IPv4
View Answer
Answer: c
Explanation: DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the hosts know about
the change dynamically, and hosts update their info themselves.
View Answer
Answer: d
Explanation: Whenever a DHCP server gets a request from a client it responds with a DHCP offer containing IP
address being offered, network mask offered, the amount of time that the client can use and keep it, the ip
address of the DHCP server making this offer.
View Answer
Answer: a
Explanation: The IP address offered to a client is only for a limited period of time. There is actually a certain
amount of time that the client can use and keep this IP address.
5. DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
View Answer
Answer: b
Explanation: 67 is the UDP port number that is used as the destination port of a server. Whereas UDP port
number 68 is used by the client.
a) dynamic allocation
b) automatic allocation
c) static allocation
View Answer
Answer: d
Explanation: When a host acquires multiple offers of IP addresses from different DHCP servers, the host will
broadcast a dhcp request identifying the server whose offer has been accepted.
7. DHCP client and servers on the same subnet communicate via _________
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
View Answer
Answer: a
Explanation: DHCP actually employs a connectionless service, which is provided by UDP, since TCP is
connection oriented. It is implemented with two UDP port numbers 67 and 68 for its operations.
8. After obtaining the IP address, to prevent the IP conflict the client may use _________
View Answer
Answer: c
Explanation: ARP abbreviation for address resolution protocol is used for mapping IP addresses to MAC
addresses that are present in the local network.
View Answer
Answer: a
Explanation: DHCP snooping is a security feature that is used in OS of a network in the layer 2. This technology
prevents unauthorized DHCP servers offering IP addresses to DHCP clients.
10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the
network.
a) MAC address
b) IP address
View Answer
Answer: c
Explanation: The DHCP snooping is done to prevent unauthorized IP addresses being offered by unauthorized
servers. This features allows only specific mac addresses and IP addresses to access the network.
Computer Networks Questions & Answers – IPSecurity
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPSecurity”.
a) Transport layer
b) Network layer
c) Application layer
d) Session layer
View Answer
Answer: b
Explanation: Network layer is used for transferring the data from transport layer to another layers.
a) Entire IP packet
b) IP header
c) IP payload
View Answer
Answer: a
View Answer
Answer: d
Explanation: AH, ESP, IKE.
a) Ethernet
b) Bluetooth
c) Wi-Fi
View Answer
Answer: c
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
View Answer
Answer: a
b) Wireless networks
View Answer
Answer:b
a) Browser security
b) Email security
c) FTP security
View Answer
Answer: b
advertisement
View Answer
Answer: a
Explanation: PGP encrypts data by using a block cipher called international data encryption algorithm.
9. When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
View Answer
Answer: c
Explanation: DNS spoofing is the phenomenon for the above mentioned transaction.
Computer Networks Questions & Answers – Virtual Private Networks
This set of Computer Networks Interview Questions and Answers focuses on “Virtual Private Networks”.
1. A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet,
creating a secure private connection.
a) VNP
b) VPN
c) VSN
d) VSPN
View Answer
Answer: b
a) Early 80’s
b) Late 80’s
c) Early 90’s
d) Late 90’s
View Answer
Answer: d
a) PPTP
b) IPsec
c) YMUM
d) L2TP
View Answer
Answer: c
Explanation: YNUM.
View Answer
Answer: d
View Answer
Answer: c
View Answer
Answer: c
b) IPX
c) Neither IP or IPX
d) Both IP or IPX
View Answer
Answer: d
a) IPsec
b) PPTP
c) PPP
d) L2TP
View Answer
Answer: a
a) Microsoft
b) Cisco
c) Blizzard Entertainment
d) IETF
View Answer
Answer: b
Explanation: Cisco is the second best company to design and make the computer networks.
10. Which layer of the OSI reference model does PPTP work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
View Answer
Answer: b
advertisement
11. Which layer of the OSI reference model does IPsec work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
View Answer
Answer: c
This set of Computer Networks Questions and Answers for Freshers focuses on “SMI”.
a) SAN Management
b) Data protection
c) Disk operation
View Answer
Answer: d
Explanation: SAN, Data protection and Disk operation are the main things of storage management.
a) Switch
b) RAID Arrays
c) Tape drives
View Answer
Answer: d
Explanation: switch, RAID arrays and tape drives are main storage devices.
a) SNMP
b) LDAP
c) POP3
d) MIB
View Answer
Answer: a
Explanation: Simple Network Management Protocol is for storage management.
4. Identify the difficulties the SAN administrator incur while dealing with diverse vendors
c) No single view
View Answer
Answer: d
Explanation: Proprietary management interfaces, multiple applications management and no single view are main
difficulties.
a) By using Zoning
View Answer
Answer: a
Explanation: By using Zoning, Storage administrators ensure secure access to storage devices.
a) Securities
b) Backups
c) Reporting
View Answer
Answer: d
Explanation: In storage management all necessities like security, backups and reporting facilities are included.
View Answer
Answer: d
Explanation: Identifying, Monitoring and Tracking are main tasks involved in SCM.
b) Breaks the old-style dependence on proprietary methods, trade secrets, and single providers
c) Builds a strong foundation on which others can quickly build and innovate
View Answer
Answer: d
b Acts as an interface between the various budding technologies and provide solution to manage various
environments
d) Both To promote interoperability among the management solution providers and Acts as an interface between
the various budding technologies and provide solution to manage various environments
View Answer
Answer: d
a) Java RMI
b) CIM-XML/HTTP
c) CORBA
d) .NET
View Answer
Answer: b
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SNMP”.
1. An application-level protocol in which a few manager stations control a set of agents is called
a) HTML
b) TCP
c) SNMP
d) SNMP/IP
View Answer
Answer: c
Explanation: An application-level protocol in which a few manager stations control a set of agents is called
SNMP.
a) 10 to 20 mbps
b) 20 to 30 mbps
c) 30 to 40 mbps
d) 40 to 50 mbps
View Answer
Answer: a
View Answer
Answer: a
a) Servers
b) IP
c) Protocols
d) Rules
View Answer
Answer: d
a) Management
b) Integration
c) Classification
d) Enhanced security
View Answer
Answer: d
Explanation: Enhanced security is the main difference between SNMPv3 and SNMPv2.
6. In Network Management System, a term that responsible for controlling access to network based on
predefined policy is called
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
View Answer
Answer: d
Explanation: A term that responsible for controlling access to network based on predefined policy is called
security management.
7. BER stands for
View Answer
Answer: a
8. Control of users’ access to network resources through charges are main responsibilities of
c) Accounting Management
d) Security Management
View Answer
Answer: c
Explanation: Control of users’ access to network resources through charges are main responsibilities of
accounting management.
a) TCP/IP protocol
b) UDP
c) SMTP
d) None
View Answer
Answer: a
Explanation: SNMP is a framework for managing devices in an internet using the TCP/IP protocol.
a) HTTP
b) SNMP
c) URL
d) MIB
View Answer
Answer: b
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Telnet – 1”.
a) Telnet
b) FTP
c) HTTP
View Answer
Answer: a
Explanation: None.
a) Character processing is done on the local system under the control of the remote system
b) Most text typed is immediately sent to the remote host for processing
c) All text is echoed locally, only completed lines are sent to the remote host
View Answer
Answer: b
Explanation: None.
a) Telnet
b) FTP
c) HTTP
View Answer
Answer: a
Explanation: None.
a) telnet//www.sanfoundry.com
b) telnet:www.sanfoundry.com
c) telnet://www.sanfoundry.com
d) telnet www.sanfoundry.com
View Answer
Answer: c
Explanation: None.
5. Telnet is a
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site
View Answer
Answer: c
Explanation: None.
View Answer
Answer: c
Explanation: None.
a) default mode
b) server mode
c) line mode
View Answer
Answer: c
Explanation: None.
advertisement
c) it is not possible
View Answer
Answer: a
Explanation: None.
Computer Networks Questions & Answers – Telnet – 2
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Telnet – 2”.
View Answer
Answer: c
Explanation: None.
View Answer
Answer: d
Explanation: None.
a) 4 bytes
b) 8 bytes
c) 16 bytes
d) 32 bytes
View Answer
Answer: b
Explanation: None.
a) windows
b) linux
c) mac
View Answer
Answer: a
Explanation: None.
a) 252
b) 253
c) 254
d) 255
View Answer
Answer: d
Explanation: None.
c) each character typed is aggregated into a word and then send to the server
View Answer
Answer: a
Explanation: None.
7. In telnet, the client echoes the character on the screen but does not send it until a whole line is completed in
a) default mode
c) character mode
c) server mode
View Answer
Answer: a
Explanation: None.
advertisement
View Answer
Answer: c
Explanation: None.
Computer Networks Questions & Answers – TCP-1
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “TCP-1”.
a) Connection-oriented
b) Process-to-process
View Answer
Answer: d
Explanation: TCP is a transport layer protocol, process-to-process, and creates a virtual connection between two
TCP’s.
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
View Answer
Answer: a
3. TCP process may not write and read data at the same speed. So we need __________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
View Answer
Answer: b
a) Packet
b) Buffer
c) Segment
d) Stack
View Answer
Answer: c
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
View Answer
Answer: a
Explanation: Data flow in both the directions at the same time during TCP communication hence, Full-duplex.
6. To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
View Answer
Answer: d
Explanation: Acknowledgment mechanism is used to check the safe and sound arrival of data.
b) Buffer number
c) Segment number
d) Acknowledgment
View Answer
Answer: a
Explanation: Sequence number and acknowledgement number field refers to byte number.
8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the
sequence number of the segment if all data is sent in only one segment.
a) 10000
b) 10001
c) 12001
d) 11001
View Answer
Answer: b
Explanation: The sequence number of each segment is the number of first byte carried in that segment.
9. Bytes of data being transferred in each connection are numbered by TCP. These numbers starts with a
a) Random number
b) Zero
c) One
View Answer
Answer: d
View Answer
Answer: c
Explanation: Acknowledgement field in a segment defines the number of next bytes to receive.
Computer Networks Questions & Answers – TCP-2
This set of Computer Networks Interview Questions and Answers for freshers focuses on “TCP – 2”.
1. The receiver of the data controls the amount of data that are to be sent by the sender is referred as
___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
View Answer
Answer: a
Explanation: Flow control is done to prevent the receiver from being overwhelmed with data.
a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits
View Answer
Answer: c
Explanation: The header is 20 bytes if there are no options and upto 60 bytes if it contains options.
a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronisation
View Answer
Answer: b
4. The server program tells its TCP that it is ready to accept a connection. This process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
View Answer
Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is started by the server.
5. The process of, A client that wishes to connect to an open server tells its TCP that it needs to be connected to
that particular server is ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
View Answer
Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and is done by the client once it
finds the open server.
6. In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
View Answer
Answer: c
Explanation: Here, both TCP’s transmit a SYNC+ACK segment to each other and one single connection is
established between them.
7. The situation when a malicious attacker sends a large number of SYNC segments to a server, pretending that
each of them is coming from a different client by faking the source IP address in the datagrams.
b) Active attack
c) Passive attack
d) Denial-of-service attack
View Answer
Answer: a
Explanation: This is the serious security problem during the connection establishment.
b) Active attack
c) Passive attack
d) Denial-of-service attack
View Answer
Answer: d
Explanation: During SYNC flooding the system collapses and denies service to every request.
9. Size of source and destination port address of TCP header respectively are ___________
View Answer
Answer: b
10. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
View Answer
Answer: b
Explanation: TCP header contains separate fields for sequence number and acknowledgment number. Its these
values that allow TCP to detect lost segments and in turn recover from that loss.
Computer Networks Questions & Answers – UDP
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “UDP”.
a) Connection-oriented
b) Unreliable
View Answer
Answer: a
a) String of characters
b) String of integers
View Answer
Answer: a
View Answer
Answer: d
Explanation: UDP is a simple protocol which provides demultiplexing and error checking.
a) More overload
b) Reliable
c) Less overload
d) Fast
View Answer
Answer: c
Explanation: UDP is an unreliable, connectionless transport layer protocol and uses minimum overload.
a) 161
b) 123
c) 162
d) 124
View Answer
Answer: b
Explanation: Port number used by Network Time Protocol with UDP is 123.
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
View Answer
Answer: a
a) NTP
b) Echo
c) Server
d) Client
View Answer
Answer: d
Explanation: If the source host is the client, the port number in most cases will be ephemeral port number.
b) Only data
c) Only checksum
View Answer
Answer: d
Explanation: Total length is the 16 bit field which contains the length of UDP header and the data.
View Answer
Answer: a
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP datagram the defines
the total length. There is another field in the IP datagram that defines the length of the header. So if we subtract
the length of a UDP datagram that is encapsulated in an IP datagram, we get the length of UDP user datagram.
10. The field used to detect errors over the entire user datagram is
a) UDP header
b) Checksum
c) Source port
d) Destination port
View Answer
Answer: b
Explanation: Checksum field is used to detect errors over the entire user datagram.
Computer Networks Questions & Answers – Congestion Control
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Congestion
Control”.
View Answer
Answer: a
View Answer
Answer: c
a) Packet is lost
b) Packet is corrupted
c) Packet is needed
View Answer
Answer: d
4. In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some
may have arrived safe. whereas in Selective Repeat window, tries to send ___________
View Answer
Answer: b
Explanation: In selective repeat window, packet that have lost or corrupted must be sent.
a) Sender
b) Receiver
c) Router
d) Switch
View Answer
Answer: c
View Answer
Answer: a
a) Admission policy
b) Backpressure
c) Forward signalling
d) Backward signalling
View Answer
Answer: b
Explanation: This is a node-to-node congestion control that starts with a node and propagates in opposite
direction of data flow to the source.
a) Congestion networks
View Answer
Answer: d
Explanation: In Virtual circuit networks, each node knows the upstream node from which a flow data is coming.
a) Explicit
b) Discard
c) Choke
d) Backpressure
View Answer
Answer: c
10. In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a
threshold.
a) Exponentially
b) Additively
c) Multiplicatively
View Answer
Answer: a
Explanation: In the slow-start algorithm, the size of the congestion window increases exponentially until it
reaches a threshold.
advertisement
11. In the congestion avoidance algorithm, the size of the congestion window increases ____________ until
congestion is detected.
a) Exponentially
b) Additively
c) Multiplicatively
View Answer
Answer: b
Explanation: In the congestion avoidance algorithm, the size of the congestion window increases additively until
congestion is detected.
Computer Networks Questions & Answers – Virtual Circuit
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Virtual Circuit”.
a) There are setup and teardown phases in addition to the data transfer phase
c) All packets follow the same path established during the connection
View Answer
Answer: d
2. The address that is unique in the scope of the network or internationally if the network is part of an
international network is called as
a) Global address
b) Network address
c) Physical address
d) IP address
View Answer
Answer: a
3. The Identifier that is used for data transfer in virtual circuit network is
a) Global address
c) Network identifier
d) IP identifier
View Answer
Answer: b
Explanation: Virtual circuit identifier is used for data transfer and has switch scope.
a) Setup phase
b) Datatransfer phase
c) Termination phase
d) Teardown phase
View Answer
Answer: c
View Answer
Answer: a
Explanation: Steps required in setup process are Setup request and acknowledgement.
6. During teardown phase, source after sending all the frames to destination sends……..to notify termination
a) Teardown response
b) Teardown request
c) Termination request
d) Termination response
View Answer
Answer: b
Explanation: Source after sending all the frames to destination sends teardown request to which, destination
sends teardown response.
7. Delay if, resource allocated during setup phase during data transfer is
a) Constant
View Answer
Answer: c
Explanation: If resource allocated during setup phase, delay is same for each packet.
a) Constant
View Answer
Answer: d
9. In virtual circuit network, delay times for setup and teardown respectively are
a) 1 and 1
b) 1 and 2
c) 2 and 1
d) 2 and 2
View Answer
Answer: a
10. In data transfer phase, the table contains how many columns?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: d
Explanation: Table has 4 columns. Port and VCI for both incoming and outgoing data.
Computer Networks Questions & Answers – ATM & Frame Relay
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “ATM & Frame
Relay”.
b) datagram networks
View Answer
Answer: a
View Answer
Answer: b
Explanation: None.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: b
Explanation: Three layers are physical layer, ATM layer and application adoption layer.
View Answer
Answer: c
Explanation: None.
a) 32 bytes
b) 48 bytes
c) 64 bytes
d) 128 bytes
View Answer
Answer: b
Explanation: None.
a) physical layer
c) network layer
d) transport layer
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
View Answer
Answer: d
Explanation: None.
c) for encryption
View Answer
Answer: a
Explanation: None.
a) FRAD assembles and disassembles the frames coming from other protocols
View Answer
Answer: a
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Frame Relay”.
a) LANs
b) WANs
c) MANs
d) Multipoint Networks
View Answer
Answer: b
View Answer
Answer: d
Explanation: Frame Relay networks offer an option calledVoice Over Frame Relay
a) Five
b) Seven
c) Nine
d) Ten
View Answer
Answer: c
Explanation: There are total features of Frame Relay are Nine.
4. Frame Relay does not provide flow or error control, they must be provided by the
View Answer
Answer: c
Explanation: Frame Relay does not provide flow or error control, they must be provided by theUpper Level
Protocol.
a) ADMs
b) UPSR
c) BLSR
d) SONET
View Answer
Answer: d
a) physical layer
c) network layer
d) transport layer
View Answer
Answer: b
Explanation: In data link layer error control header is the main thing for any packet transfer, so we use this layer
frame relay has error detection.
View Answer
Answer: a
Explanation: Virtual circuit identifier in frame relay is calleddata link connection identifier.
a) physical layer
View Answer
Answer: c
Explanation: Frame relay has only physical and data link layer for error detection in data link layer and for
conversion in physical layer.
c) both to increase the range of data link connection identifiers and for error detection
View Answer
Answer: a
Explanation: In frame relay networks, extended address is usedto increase the range of data link connection
identifiers.
a) FRAD assembles and disassembles the frames coming from other protocols
View Answer
Answer: a
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “World Wide Web”.
1. A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
View Answer
Answer: b
Explanation: None.
c) both is same every time whenever it displays and generates on demand by a program or a request from
browser
View Answer
Answer: b
Explanation: None.
View Answer
Answer: d
Explanation: None.
c) stream videos
View Answer
Answer: a
Explanation: None.
View Answer
Answer: c
Explanation: None.
a) sent from a website and stored in user’s web browser while a user is browsing a website
b) sent from user and stored in the server while a user is browsing a website
View Answer
Answer: a
Explanation: None.
7. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
View Answer
Answer: d
Explanation: None.
a) VBScript
b) ASP.NET
c) JSP
View Answer
Answer: a
Explanation: None.
View Answer
Answer: a
Explanation: None.
View Answer
Answer: a
Explanation: None.
Computer Networks Questions & Answers – IPv4
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPv4”.
a) Error reporting
c) Datagram format
View Answer
Answer: a
a) Flags
b) Offset
c) TOS
d) Identifier
View Answer
Answer: c
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.
4. If the value in protocol field is 17, the transport layer protocol used is _____________
a) TCP
b) UDP
View Answer
Answer: b
a) TCP segemnt
b) UDP segment
c) ICMP messages
View Answer
Answer: c
Explanation: Data field usually has tranaport layer segment, but it can also carry ICMP messages.
a) 0
b) 1
c) TTl value
View Answer
Answer: a
a) is connectionless
b) offer reliable service
View Answer
Answer: b
This set of Computer Networks Interview Questions and Answers for Experienced people focuses on “IPv4
Addressing”.
a) Connectionless
View Answer
Answer: b
a) Complicates routers
c) Overlapping of fragments
View Answer
Answer: d
Explanation: Fragmentation makes the implementation complex and also can create DOS attack.
a) Offset
b) Flag
c) TTL
d) Identifier
View Answer
Answer: a
Explanation: offset field specifies where the fragment fits in the original datagram.
4. In classless addressing, there are no classes but addresses are still granted in
a) IPs
b) Blocks
c) Codes
d) Sizes
View Answer
Answer: b
Explanation: In classless addressing, there are no classes but addresses are still granted in blocks.
a) Classless Addressing
b) Classful Addressing
c) Classful Advertising
d) Classless Advertising
View Answer
Answer: a
a) Class Network
b) Entity
c) Organization
d) Codes
View Answer
Answer: c
Explanation: First address in a block is used as network address that represents the organization.
b) Blocked
c) Wasted
d) Communicated
View Answer
Answer: c
advertisement
a) Routing
b) Mask
c) IP Addressing
d) Classless Addressing
View Answer
Answer: c
a) ClassE
b) ClassC
c) ClassD
d) ClassF
View Answer
Answer: d
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPv6”.
a) 4bytes
b) 128bits
c) 8bytes
d) 100bits
View Answer
Answer: b
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
View Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the
datagram.
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer
Answer: c
a) Broadcast
b) Multicast
c) Anycast
View Answer
Answer: a
a) Fragmentation
b) Header checksum
c) Options
View Answer
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6.
a) Hop limit
b) TTL
c) Next header
View Answer
Answer: a
Explanation: The Hop limit value is decremented by one by a router when the datagram is forwaded by the
router. When the value becomes zero the datagram is discarded.
7. Dual-stack approach refers to
View Answer
Answer: c
Explanation: Dual-stack is one of the approach used to support IPv6 in already existing systems.
advertisement
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by
intervening IPv4 routers. The best solution here is
b) Tunneling
c) No solution
View Answer
Answer: b
9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
View Answer
Answer: a
View Answer
Answer: c
Explanation: Dual-stack is one of the approach used to support IPv6 in already existing systems.
2. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by
intervening IPv4 routers. The best solution here is
b) Tunneling
c) No solution
View Answer
Answer: b
3. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
View Answer
Answer: a
a) Isolated router
b) Isolated mask
c) Isolated subnet
d) Isolated net
View Answer
Answer: c
Explanation: Isolated subnet is very huge sharing network area in this link local address of local addresses is
used.
5. In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into
network is called
a) Unspecified address
b) Loopback address
c) Compatible address
d) Mapped address
View Answer
Answer: b
Explanation: In subcategories of reserved address in IPv6, address that is used by a host to test itself without
going into network is called loop back address.
6. A few leftmost bits in each address of IPv6 address define its category is called
a) Prefix type
b) Postfix type
c) Reserved type
d) Local type
View Answer
Answer: a
Explanation: Prefix means bits in the IP address are placed in leftmost position.
a) Unicast addresses
b) Multicast addresses
d) Reserved addresses
View Answer
Answer: d
Explanation: In IPv6 address format the starting bits are specified with eight 0s called reserved address.
advertisement
b) Two colons (::) are used to represent successive hexadecimal fields of zeros
View Answer
Answer: b
Explanation: In order to shorten the written length of an IPv6 address, successive fields of zeros may be replaced
by double colons. In trying to shorten the address further, leading zeros may also be removed. Just as with IPv4,
a single device’s interface can have more than one address; with IPv6 there are more types of addresses and the
same rule applies. There can be link-local, global unicast, and multicast addresses all assigned to the same
interface.
a) June 2, 2012
b) June 4, 2012
c) June 5, 2012
d) June 6, 2012
View Answer
Answer: d
Explanation: None
Computer Networks Questions & Answers – P2P Applications
a) Physical layer
b) Network layer
c) Transport layer
d) Application layer
View Answer
Answer: c
a) Client/Server
b) Source/Destination
c) Message Transfer
View Answer
Answer: a
Explanation: The most common method used for this communication is Client/Server.
a) Mac address
b) Port number
c) Host number
d) Host address
View Answer
Answer: b
Explanation: Multiple processes on destinations are identified by transport layer address also called as port
number.
a) 0 and 32,765(8-bit)
b) 0 and 32,765(16-bit)
c) 0 and 65,535(32-bit)
d) 0 and 65,535(16-bit)
View Answer
Answer: d
5. According to Internet Assigned Numbers Authority(IANA), which of the following range is not a part of port
number?
a) Well-known ports
b) Registered ports
c) Dynamic ports
d) Static ports
View Answer
Answer: d
Explanation: IANA divided port number range in to three i.e., Well-known, Registered and Dynamic ports.
a) Socket address
b) Port address
c) MAC address
d) Host address
View Answer
Answer: a
7. Which of the following is false with respect to Connectionless service of transport layer protocol?
a) Packets are not numbered
c) No acknowledgement
View Answer
Answer: b
1. Data transfer
2. Connection release
3. Connection establishment
a) 1-2-3
b) 3-2-1
c) 2-1-3
d) 3-1-2
View Answer
Answer: d
Explanation: First connection should be established followed by data transfer and connection release.
a) Channel
b) Receiver site
c) Sender site
d) Packet
View Answer
Answer: c
a) Delivery of packets
b) Error correction
c) Multiplexing
d) Demultiplexing
View Answer
Answer: d
Explanation: Demultiplexing is the process of error checking and dropping of the header, delivering messages to
appropriate process based on port number.
Computer Networks Questions & Answers – ICMP
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “ICMP”.
a) Error-reporting
b) Error-correction
View Answer
Answer: d
a) 8-bytes
b) 8-bits
c) 16-bytes
d) 16-bits
View Answer
Answer: a
Explanation: ICMP message has 8-bytes header and variable size data section.
a) Destination
b) Source
c) Next router
d) Previous router
View Answer
Answer: b
Explanation: ICMP sends error message to the source because the datagram knows information about source and
destination IP address.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
View Answer
Answer: c
5. ICMP error message will not be generated for a datagram having a special address such as
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127
View Answer
Answer: a
Explanation: No ICMP error message will be generated for a datagram having a special address such as
127.0.0.0 or 0.0.0.0.
6. When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the
router or the host sends a ____________ message back to the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
View Answer
Answer: a
Explanation: Router sends destination unreachable message if the destination is not found.
7. The source-quench message in ICMP was designed to add a kind of ____________ to the IP.
a) Error control
b) Flow control
c) Router control
View Answer
Answer: b
Explanation: Firstly, it informs the source that the datagram has been discarded. secondly, it warns the source
that there is congestion in the network.
8. In case of time exceeded error, when the datagram visits a router, the value of time to live field is
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1
View Answer
Answer: d
Explanation: This field will be decremented by 1 at every router, and will be zero by the time it reaches source.
9. Two machines can use the timestamp request and timestamp replay messages to determine the ___________
needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
View Answer
Answer: b
Explanation: Router sends destination unreachable message if the destination is not found.
10. During debugging, we can use the ____________ program to find if a host is alive and responding
a) Traceroute
b) Shell
c) Ping
d) Java
View Answer
Answer: c
advertisement
11. In windows, ____________ can be used to trace the route of the packet from the source to the destination
a) Traceroute
b) Tracert
c) Ping
d) Locater
View Answer
Answer: b
12. In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
View Answer
Answer: a
This set of Computer Networks Quiz focuses on “Transition from IPV4 to IPV6”.
View Answer
Answer: a
Explanation: Due to huge number of systems on the internet, transition from IPv4 to IPv6 happens.
a) Dual stack
b) Tunnelling
c) Conversion
d) Header translation
View Answer
Answer: c
Explanation: Dual stack, tunnelling and header translation are the only three transition strategies.
3. To determine which version to use when sending a packet to a destination, the source host queries which of
the following?
a) Dual stack
c) Header information
View Answer
Answer: b
Explanation: Source host queries DNS to determine which version to use when sending a packet to a destination.
4. The strategy used when two computers using IPv6 want to communicate with each other and the packet must
pass through a region that uses IPv4 is
a) Dual stack
b) Header translation
c) Conversion
d) Tunnelling
View Answer
Answer: d
Explanation: Tunnelling is used when two computers using IPv6 want to communicate with each other and the
packet must pass through a region that uses IPv4.
1. IPv6 header
2. Payload
3. IPv4 header
a) 3-1-2
b) 3-2-1
c) 1-2-3
d) 1-3-2
View Answer
Answer: a
Explanation: In tunnel with IPv4 region, IPv6 packet will be encapsulated with IPv4 header.
6. ___________ is necessary when the sender wants to use IPv6, but the receiver does not understand IPv6.
a) Dual stack
b) Header translation
c) Conversion
d) Tunnelling
View Answer
Answer: b
Explanation: Header translation is used when the sender wants to use IPv6, but the receiver does not understand
IPv6.
a) IP address
b) Physical address
c) Mapped address
View Answer
Answer: c
advertisement
a) The IPv6 mapped address is changed to an IPv4 address by extracting the rightmost 32bits
View Answer
Answer: d
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IPV4 and IPV6
Comparision”.
a) Error reporting
c) Datagram format
d) Packet handling
View Answer
Answer: a
a) Flags
b) Offset
c) TOS
d) Identifier
View Answer
Answer: c
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.
4. If the value in protocol field is 17, the transport layer protocol used is _________
a) TCP
b) UDP
View Answer
Answer: b
a) offset
b) flag
c) ttl
d) identifier
View Answer
Answer: a
Explanation: Offset field specifies where the fragment fits in the original datagram.
a) 4bytes
b) 128bits
c) 8bytes
d) 100bits
View Answer
Answer: b
b) 25bytes
c) 30bytes
d) 40bytes
View Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the
datagram.
8. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field
View Answer
Answer: c
a) Broadcast
b) Multicast
c) Any cast
View Answer
Answer: a
10. Which are the features present in IPv4 but not in IPv6?
a) Fragmentation
b) Header checksum
c) Options
View Answer
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6.
Computer Networks Questions & Answers – Analyzing Subnet Masks
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Analyzing Subnet
Masks”.
1. Which of the following is the broadcast address for a Class B network ID using the default subnetmask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
View Answer
Answer: c
Explanation: This address is used for broadcast the class B network purpose
2. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address,
subnet address, and broadcast address?
View Answer
Answer: b
3. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248
View Answer
Answer: c
Explanation: If you have eight networks and each requires 10 hosts, you would use the Class C mask of
255.255.255.240. Why? Because 240 in binary is 11110000, which means you have four subnet bits and four
host bits. Using our math, we’d get the following:
24-2=14 subnets
24-2=14 hosts.
4. The combination of _________ and __________ is often termed the local address of the local portion of the IP
address.
d) Host number
View Answer
Answer: c
Explanation: Sub networking is implemented for remote sensing in transparent way from that a host contains the
sub network which called local operation.
5. _________ implies that all subnets obtained from the same subnet mask.
a) Static subnetting
b) Dynamic subnetting
View Answer
Answer: a
a) True, True
b) True, False
c) False, True
d) False, False
View Answer
Answer: a
7. __________ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000
stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR
View Answer
Answer: a
a) 1000 BASE-SX
b) 1000 BASE-LX
c) 1000 BASE-CX
View Answer
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing various
technologies for transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as
defined by the IEEE 802.3-2008 standard. It came into use beginning in 1999, gradually supplanting Fast
Ethernet in wired local networks, as a result of being considerably faster.
9. _________ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of
1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.
a) Ethernet
b) Fast Ethernet
c) Gigabit Ethernet
View Answer
Answer: b
10. _________ is another kind of fiber optic network with an active star for switching.
a) S/NET
b) SW/NET
c) NET/SW
d) FS/NET
View Answer
Answer: a
Explanation: A 50-MBd active star fiber optical Local area network (LAN) and its optical combiner and mixing
rod splitter are presented. The limited power budget and relatively large tapping losses of light wave technology,
which limit the use of fiber optics in tapped bus LAN topologies, are examined and proven tolerable in optical
star topologies.
Computer Networks Questions & Answers – Designing Subnet Masks
1.A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the
illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between
the hosts?
a) 1 only
b) 2 only
c) 3 and 4 only
d) 1 and 5 only
View Answer
Answer: d
Explanation: First, if you have two hosts directly connected, as shown in the graphic, then you need a crossover
cable. A straight-through cable won’t work. Second, the hosts have different masks, which puts them in different
subnets. The easy solution is just to set both masks to 255.255.255.0 (/24).
2. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the following can be valid
host IDs on the LAN interface attached to the router?
1. 172.16.1.100
2. 172.16.1.198
3. 172.16.2.255
4. 172.16.3.0
a) 1 only
b) 2 and 3 only
c) 3 and 4 only
d) None of the mentioned
View Answer
Answer: c
Explanation: The router’s IP address on the E0 interface is 172.16.2.1/23, which is 255.255.254.0. This makes
the third octet a block size of 2. The router’s interface is in the 2.0 subnet, and the broadcast address is 3.255
because the next subnet is 4.0. The valid host range is 2.1 through 3.254. The router is using the first valid host
address in the range.
a) 1 and 3
b) 2 and 4
c) 1, 2 and 4
d) 2, 3 and 4
View Answer
Answer: b
Explanation: The mask 255.255.254.0 (/23) used with a Class A address means that there are 15 subnet bits and
9 host bits. The block size in the third octet is 2 (256 – 254). So this makes the subnets in the interesting octet 0,
2, 4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast
address for the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.
4. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the
255.255.255.224 subnet mask?
a) 14
b) 15
c) 16
d) 30
View Answer
Answer: d
Explanation: A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts.
Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits
would never change.
5. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Wohich classful subnet mask
would you use
a) 255.255.255.192
b) 255.255.255.224
c) 255.255.255.240
d) 255.255.255.248
View Answer
Answer: b
Explanation: You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 provides 16 subnets
with 14 hosts-this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30 hosts. This is the
best answer.
6. You have a network that needs 29 subnets while maximizing the number of host addresses available on each
subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: d
Explanation: A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so
let’s add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3
host bits (6 hosts per subnet). This is the best answer.
7. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet
address of this host?
a) 172.16.112.0
b) 172.16.0.0
c) 172.16.96.0
d) 172.16.255.0
View Answer
Answer: a
Explanation: A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are used
for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only
1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0
subnet, which has a broadcast address of 127 since 128 is the next subnet
8. You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface,
how many hosts can have IP addresses on the LAN attached to the router interface?
a) 6
b) 8
c) 30
d) 32
View Answer
Answer: a
Explanation: A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits. Six hosts is the
maximum number of hosts on this LAN, including the router interface.
a) 172.16.36.0
b) 172.16.48.0
c) 172.16.64.0
d) 172.16.0.0
View Answer
Answer: c
Explanation: A /21 is 255.255.248.0, which means we have a block size of 8 in the third octet, so we just count
by 8 until we reach 66. The subnet in this question is 64.0. The next subnet is 72.0, so the broadcast address of
the 64 subnet is 71.255.
10. The network address of 172.16.0.0/19 provides how many subnets and hosts?
View Answer
Answer: b
Explanation: A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet bits, but
it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
Computer Networks Questions & Answers – Security In The Internet
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Security In The
Internet”.
a) transport layer
b) network layer
c) application layer
d) session layer
View Answer
Answer: b
Explanation: None.
a) Entire IP packet
b) IP header
c) IP payload
View Answer
Answer: a
Explanation: None.
a) frame filter
b) packet filter
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
a) ethernet
b) bluetooth
c) wi-fi
View Answer
Answer: c
Explanation: None.
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
View Answer
Answer: a
Explanation: None.
b) wireless networks
View Answer
Answer: b
Explanation: None.
a) browser security
b) email security
c) FTP security
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
View Answer
Answer: c
Explanation: None.
Computer Networks Questions & Answers – Packet Forwarding and Routing
This set of Computer Networks online test focuses on “Packet Forwarding and Routing”.
a) Delayed
b) Urgent
c) Forwarding
d) Delivering
View Answer
Answer: c
Explanation: It is for transforming the message from source to destination with forward technique.
2. A second technique to reduce routing table and simplify searching process is called
a) Network-Specific Method
b) Network-Specific Motion
c) Network-Specific Maintaining
d) Network-Specific Membership
View Answer
Answer: a
a) Revolving table
b) Rotating Table
c) Routing Table
d) Re-allocate table
View Answer
Answer: c
Explanation: This method is for creating the shortest distances.
4. Several techniques can make size of routing table manageable and also handle issues such as
a) Maturity
b) Error reporting
c) Tunneling
d) Security
View Answer
Answer: d
a) Network Measures
b) Security Measures
c) Routing Measures
d) Delivery Measures
View Answer
Answer: b
a) Stable
b) Reversed
c) Guaranteed
d) Forward
View Answer
Answer: c
a) Graph
b) Tree
c) Network
d) Link
View Answer
Answer: a
Explanation: Graph technique is used for best node finding technic with shortest path algorithms.
a) Gaps
b) Loops
c) Holes
d) Links
View Answer
Answer: b
View Answer
Answer: a
Answer: b
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Web Caching”.
View Answer
Answer: b
2. Which of the following protocol is used by Restful web services as a medium of communication between
client and server?
a) HTTP
b) FTP
c) Gopher
View Answer
Answer: a
Explanation: Restful web services make use of HTTP protocol as a medium of communication between client
and server.
3. Which of the following is a best practice to create a standard URI for a web service?
View Answer
Answer: C
a) OPTIONS
b) DELETE
c) POST
d) HEAD
View Answer
Answer: b
Explanation: DELETE operations should be idempotent, means their result will always same no matter how
many times these operations are invoked.
5. Which of the following directive of Cache Control Header of HTTP response indicates that resource is
cachable by only client and server?
a) Public
b) Private
c) Nocache/nostore
d) Maxage
View Answer
Answer: b
Explanation: Private directive indicates that resource is cachable by only client and server, no intermediary can
cache the resource.
6. Which of the following HTTP Status code means CREATED, when a resource is successful created using
POST or PUT request?
a) 200
b) 201
c) 204
d) 304
View Answer
Answer: b
Explanation: HTTP Status Code 201 means CREATED, when a resource is successful created using POST or
PUT request.
7. Which of the following annotation of JAX RS API is used to annotate a method used to create resource?
a) @Path
b) @GET
c) @PUT
d) @POST
View Answer
Answer: C
8. Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix
parameter in path?
a) @PathParam
b) @QueryParam
c) @MatrixParam
d) @HeaderParam
View Answer
Answer: c
Explanation: @MatrixParam – Binds the parameter passed to method to a HTTP matrix parameter in path.
9. In REST architecture, a REST Server simply provides access to resources and REST client accesses and
presents the resources.
a) False
b) True
View Answer
Answer: b
Explanation: In REST architecture, a REST Server simply provides access to resources and REST client accesses
and presents the resources.
10. POST operations should be idempotent.
a) True
b) False
View Answer
Answer: b
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Cookies”.
View Answer
Answer: b
Explanation: Cookies were originally designed for server side programming, and at the lowest level, they are
implemented as an extension to the HTTP protocol.
a) cookie
b) cookies
c) manipulate
View Answer
Answer: a
Explanation: There are no methods involved: cookies are queried, set, and deleted by reading and Writing the
cookie property of the Document object using specially formatted strings.
a) Non Volatile
b) Volatile
c) Intransient
d) Transient
View Answer
Answer: d
Explanation: Cookies are transient by default; the values they store last for the duration of the web browser
session but are lost when the user exits the browser.
a) Higherage
b) Increaseage
c) Maxage
d) Lifetime
View Answer
Answer: c
Explanation: If you want a cookie to last beyond a single browsing session, you must tell the browser how long
(in seconds) you would like it to retain the cookie by specifying a manage
attribute. If you specify a lifetime, the browser will store cookies in a file and delete them only once they expire.
a) Document Path
b) LocalStorage
c) SessionStorage
View Answer
Answer: d
Explanation: Cookie visibility is scoped by document origin as local Storage and session Storage are, and also by
document path.
6. Which of the following can be used to configure the scope of the Cookie visibility?
a) Path
b) Domain
View Answer
Answer: d
Explanation: The Cookie visibility scope is configurable through cookie attributes path and domain.
a) /
b) %
c) *
View Answer
Answer: a
Explanation: Setting the path of a cookie to “/” gives scoping like that of localStorage and also specifies that the
browser must transmit the cookie name and value to the server whenever it requests any web page on the site.
a) Bool
b) Secure
c) Lookup
d) Domain
View Answer
Answer: b
Explanation: The final cookie attribute is a boolean attribute named secure that specifies how cookie values are
transmitted over the network. By default, cookies are insecure, which means that they are transmitted over a
normal, insecure HTTP connection. If a cookie is marked secure, however, it is transmitted only when the
browser and server are connected via HTTPS or another secure protocol.
a) EncodeURIComponent()
b) EncodeURI()
c) EncodeComponent()
View Answer
Answer: a
Explanation: Cookie values cannot include semicolons, commas, or whitespace. For this reason, you may want
to use the core JavaScript global function encodeURIComponent() to encode the value before storing it in the
cookie.
a) 2 KB
b) 1 KB
c) 4 KB
d) 3 KB
View Answer
Answer: c
Explanation: Each cookie can hold upto only 4 KB. In practice, browsers allow many more than 300 cookies
total, but the 4 KB size limit may still be enforced by some.
Computer Networks Questions & Answers – Socket Programming
This set of Computer Networks Assessment Questions and Answers focuses on “Socket Programming”.
View Answer
Answer: b
2. Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given
Port Number?
c) Datagram Socket()
View Answer
Answer: b
Explanation: Datagram Socket (int port, Int Address address) is use data create a datagram socket.
a) IP address of Server
b) Port number
View Answer
Answer: c
4. The URL Connection class can be used to read and write data to the specified resource referred by the URL
a) True
b) False
View Answer
Answer: a
Explanation: The URL Connection class can be used to read and write data to the specified resource referred by
the URL.
5. Datagram is basically an information but there is no guarantee of its content, arrival or arrival time.
a) True
b) False
View Answer
Answer: a
Explanation: Datagram is basically an information but there is no guarantee of its content, arrival or arrival time.
a) Socket
b) IP Address
c) Protocol
d) MAC Address
View Answer
Answer: c
Explanation: TCP, FTP, Telnet, SMTP, POP etc. are examples of Protocol.
a) Socket
b) IP Address
c) Protocol
d) MAC Address
View Answer
Answer: b
8. The flush () method of Print Stream class flushes any un cleared buffers in memory
a) True
b) False
View Answer
Answer: a
Explanation: The flush () method of Print Stream class flushes any un cleared buffers in memory.
a) Datagram Socket
b) Datagram Packet
View Answer
Answer: c
Explanation: Datagram Socket, Datagram Packet are used for connection-less socket programming.
10. In Int Address class which method returns the host name of the IP Address?
View Answer
Answer: a
Explanation: In Int Address class public String get Hostname() method returns the host name of the IP Address.
Computer Networks Questions & Answers – Ports
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Ports”.
1. Multiple object can be sent over a TCP connection between client and server in
a) Persistent HTTP
b) Ponpersistent HTTP
View Answer
Answer: a
Explanation: hypertext transfer protocol is used for sending multiple objects over TCP connection.
a) Application layer
b) Transport layer
c) Network layer
View Answer
Answer: a
View Answer
Answer: a
Explanation: HTTP resources are located by uniform resource identifier.
4. HTTP client requests by establishing a __________ connection to a particular port on the server.
View Answer
Answer: b
Explanation:HTTP client requests by establishing TCP connection to a particular port on the server.
5. In HTTP pipelining
a) Multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
View Answer
Answer: a
Explanation: Multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding
responses in HTTP pipelining.
a) 20
b) 21
c) 22
d) 23
View Answer
Answer: b
7. In FTP protocol, client contacts server using _________ as the transport protocol.
a) Transmission control protocol
View Answer
Answer: a
8. In which mode FTP, the client initiates both the control and data connections.
a) Active mode
b) Passive mode
View Answer
Answer: b
Explanation: In passive mode the client initiates both the control and data connections.
View Answer
Answer: c
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Cryptography”.
b) encrypted message
c) both algorithm for performing encryption and decryption and encrypted message
View Answer
Answer: a
Explanation: None.
a) sender
b) receiver
View Answer
Answer: b
Explanation: None.
a) rsa algorithm
b) diffie-hellman algorithm
View Answer
Answer: c
Explanation: None.
a) transpositional ciphers
b) substitution ciphers
View Answer
Answer: a
Explanation: None.
a) block cipher
b) stream cipher
c) bit cipher
View Answer
Answer: a
Explanation: None.
6. Cryptanalysis is used
View Answer
Answer: a
Explanation: None.
7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
View Answer
Answer: b
Explanation: None.
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
View Answer
Answer: a
Explanation: None
View Answer
Answer: b
Explanation: None.
10. Cryptographic hash function takes an arbitrary block of data and returns
c) both fixed size bit string and variable size bit string
Answer: a
Explanation: None.
Computer Networks Questions & Answers – RIP v2
This set of Computer Networks Multiple Choice Questions & Answers focuses on “RIP v2”.
View Answer
Answer: b
Explanation: Classful routing means that all hosts in the internetwork use the same mask. Classless routing
means that you can use Variable Length Subnet Masks (VLSMs) and can also support discontinuous networking.
a) It sends back the protocol received from a router as a poison pill, which stops the regular updates. The use of
variable length subnet masks is permitted
b) It is information received from a router that can’t be sent back to the originating router.RIPv2 supports
classless routing
c) It prevents regular update messages from reinstating a route that has just come up
d) It describes when a router sets the metric for a downed link to infinity
View Answer
Answer: d
Explanation: When a network goes down, the distance-vector routing protocol initiates route poisoning by
advertising the network with a metric of 16, or unreachable.
Answer: c
Explanation: RIPv2 is pretty much just like RIPv1. It has the same administrative distance and timers and is
configured just like RIPv1.
4. Which of the situations might not require require multiple routing protocols in a network?
View Answer
Answer: a
Explanation: One routing protocol to another, routers from multiple vendors,host-based routers from multiple
vendors.
5. Which two routing protocols can be redistributed into OSPF by a Cisco router?
View Answer
Answer: c
Explanation: IP EIGRP, RIPv2. These can be redistributed into OSPF by a Cisco router.
6. Which is a reason for avoiding doing route redistribution on two routers between the same two routing
domains?
b) Routing feedback
View Answer
Answer: b
Explanation: Routing feedback is a reason for avoiding doing route redistribution on two routers between the
same two routing domains.
a) Metrics
c) Router reliability
d) Best paths
View Answer
Answer: b
c) RIPv2
d) EIGRP
View Answer
Answer: c
a) IS-IS
b) IGRP
c) EIGRP
d) OSPF
View Answer
Answer: c
Explanation: EIGRProuting protocol implements the diffusing update algorithm.
10. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
View Answer
Answer: b
Explanation: RIPv2protocol should you select if the network diameter is more than 17 hops.
10. In file transfer protocol, data transfer can be done in
a) Stream mode
b) Block mode
c) Compressed mode
View Answer
Answer: d
Explanation: Data transfer can be done in stream, block and compressed modes.
Computer Networks Questions & Answers – RIP v1
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RIP v1”.
1. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
View Answer
Answer: a
2. How often does a RIPv1 router broadcast its routing table by default?
a) Every 30 seconds
b) Every 60 seconds
c) Every 90 seconds
View Answer
Answer: a
Explanation: Every 30 seconds RIPv1 router broadcast its routing table by default.
a) Show IP route
b) Debug IP rip
c) Show protocols
d) Debug IP route
View Answer
Answer: b
Explanation: The debug IP rip command is used to show the Internet Protocol (IP) Routing Information Protocol
(RIP) updates being sent and received on the router.
4. Two connected routers are configured with RIP routing. What will be the result when a router receives a
routing update that contains a higher-cost path to a network already in its routing table?
a) The updated information will be added to the existing routing table Debug IP rip
b) The update will be ignored and no further action will occur Debug IP route
c) The updated information will replace the existing routing table entry
d) The existing routing table entry will be deleted from the routing table and all routers will exchange routing
updates to reach convergence
View Answer
Answer: b
Explanation: When a routing update is received by a router, the router first checks the administrative distance
(AD) and always chooses the route with the lowest AD. However, if two routes are received and they both have
the same AD, then the router will choose the one route with the lowest metrics, or in RIP’s case, hop count.
5. You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric
of 16. What does this mean?
View Answer
Answer: c
Explanation: You cannot have 16 hops on a RIP network by default. If you receive a route advertised with a
metric of 16, this means it is inaccessible.
a) 0
b) 90
c) 100
d) 1
View Answer
Answer: d
a) IEGRP
b) RIP
View Answer
Answer: b
a) 0
b) 90
c) 120
d) 130
View Answer
Answer: c
View Answer
Answer: b
Explanation: Use of variable length subnet masks is permittedis true regarding classless routing protocol.
b) Which have more than one exit path out of the network
View Answer
Answer: a
Explanation: On stub networks- which have only one exit path out of the networkuse default routing.
Computer Networks Questions & Answers – IP Routing
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “IP Routing”.
1. Which type of Ethernet framing is used for TCP/IP and DEC net?
a) Ethernet 802.3
b) Ethernet 802.2
c) Ethernet II
d) Ethernet SNAP
View Answer
Answer: c
Explanation: Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet 802.2 is used withNetWare
3.12 and later plus OSI routing, Ethernet II is used with TCP/IP and DEC net,and Ethernet SNAP is used with
TCP/IP and AppleTalk.
2. You are a system administrator on a NetWare network, you are runningNetWare 4.11 and you cannot
communicate with your router. What is the likelyproblem?
View Answer
Answer: a
Explanation: The default encapsulation on Cisco routers is Novell Ethernet_802.3 and NetWare 3.12and later
defaults to 802.2 encapsulation, 3.11 and earlier defaults to 802.3.
3. NetWare IPX addressing uses a network number and a node number. Which statement is not true?
a) The network address is administratively assigned and can be up to 16 hexadecimal digits long
d) If the MAC address is used as the node address, then IPX eliminates the use of ARP
View Answer
Answer: b
Explanation: The network address can be up to 16 hexadecimal digits in length. The node number is
12hexadecimal digits. The node address is usually the MAC address. An example IPXaddress is
4a1d.0000.0c56.de33. The network part is 4a1d. The node part is0000.0c56.de33. The network number is
assigned by the system administrator of theNovell network.
4. Which NetWare protocol works on layer 3–network layer—of the OSI model?
a) IPX
b) NCP
c) SPX
d) NetBIOS
View Answer
Answer: a
Explanation: IPX (Internetwork Packet Exchange) is a NetWare network layer 3 protocol used fortransferring
information on LANs.
a) NLSP
b) RIP
c) SAP
d) NCP
View Answer
Answer: a
Explanation: NetWare Link Services Protocol (NLSP) provides link-state routing. SAP (Service Advertisement
Protocol) advertises network services. NCP (NetWare Core Protocol)provides client-to-server connections and
applications. RIP is a distance vector routingprotocol.
6. As a system administrator, you want to debug IGRP but are worried that the
“debug IP IGRP transaction” command will flood the console. What is the command
View Answer
Answer: d
Explanation: The “debug IP IGRP events” is used to only display a summary of IGRP routing information. You
can append an IP address onto either command to see only the IGRP
c) It disables RIP
View Answer
Answer: a
Explanation: It isolates network 10.0.0.0 and 172.68.7.0 and associates autonomous systems 109 and71 with
IGRP. IGRP does not disable RIP, both can be used at the same time.
8. The “IPX delay number” command will allow an administrator to change the
a) For LAN interfaces, one tick; for WAN interfaces, six ticks
b) For LAN interfaces, six ticks; for WAN interfaces, one tick
c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks
d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
View Answer
Answer: a
Explanation: The default is–for LAN interfaces, one tick; for WAN interfaces, six ticks
9. As a system administrator, you need to set up one Ethernet interface on the Cisco
router to allow for both sap and Novell-ether encapsulations. Which set of
c) Interface Ethernet 0.1 IPX encapsulation Novell-ether interface Ethernet 0.2 IPX
encapsulation sap
View Answer
Answer: d
Explanation: The following commands setup the sub interfaces to allow for two types of encapsulation:interface
Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface Ethernet0.2 IPX encapsulation sap IPX
network 6c.
a) It enables load sharing on 2 paths if the paths are equal metric paths
d) It enables load sharing on 2 paths if the paths are unequal metric paths
View Answer
Answer: a
Explanation: It enables load sharing on 2 paths if the paths are equal metric paths. The default is 1 pathand the
maximum is 512 paths.
11. You want to enable both arpa and snap encapsulation on one router interface.
a) The interface can handle multiple encapsulation types with no extra configuration
View Answer
Answer: b
Explanation: To assign multiple network numbers, you usually use sub interfaces. A sample configuration
follows: IPXEthernet 0.1 IPX encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation
sap ipx network 6c
a) False
b) True
View Answer
Answer: a
Explanation: GNS is Novell’s protocol to Get Nearest Server. If there is a server on the local network,that server
will respond. If there isn’t, the Cisco router has to be configured to forward theGNS SAP.
advertisement
13. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers
a) Each router builds its own SAP table and forwards that every 60 seconds
View Answer
Answer: a
Explanation: Cisco routers build SAP tables and forward the table every 60 seconds. All SAPs can’t befiltered
even with 4.x since NDS and time synchronization uses SAPs.
14. Novell’s implementation of RIP updates routing tables every _________ seconds.
a) 60
b) 90
c) 10
d) 30
View Answer
Answer: a
Explanation: Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every 10 seconds, routers
ARP every 60 seconds, IGRP signal every 90 seconds, and Banyan VINES signals every 90 seconds.
15. In Novell’s use of RIP, there are two metrics used to make routing decisions.
View Answer
Answer: a
Explanation: It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if hops are equal,then it
uses an administratively assigned tiebreaker.
Computer Networks Questions & Answers – STP
This set of Computer Networks Questions and Answers for Campus interviews focuses on “STP”.
a) Communication server
b) Print server
c) File server
d) Network
View Answer
Answer: c
Explanation: File server allows LAN users to share computer programs and data.
View Answer
Answer: a
3. A standalone program that has been modified to work on a LAN by including concurrency controls such as
file and record locking is an example of ___________
c) Groupware
View Answer
Answer: a
Explanation: A standalone program that has been modified to work on a LAN by including concurrency controls
such as file and record locking is an example of LAN intrinsic software.
4. The __________ portion of LAN management software restricts access, records user activities and audit data
etc.
a) Configuration management
b) Security management
c) Performance management
View Answer
Answer: b
Explanation: The Security management portion of LAN management software restricts access, records user
activities and audit data etc.
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
View Answer
Answer: d
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
View Answer
Answer: b
Explanation: 100 mbps is the max data capacity of STP.
a) BNC
b) RJ-11
c) RJ-45
d) RJ-69
View Answer
Answer: c
a) STP server
b) Hub/switch
c) PDC
d) Router
View Answer
Answer: b
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
View Answer
Answer: c
Explanation: 1000 mbps is max data capacity for optical fiber cable.
a) ARC net
b) Ethernet
c) Router
d) STP server
View Answer
Answer: b
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “EIGRP”.
a) Yes
b) No
View Answer
Answer: a
a) K-values
b) Bandwidth only
c) Hop Count
d) Delay only
View Answer
Answer: a
a) VLSM/subnetting
b) Auto summary
View Answer
Answer: d
c) 15s
d) 180s
View Answer
Answer: a
Explanation: EIGRP send the hello message after every5 seconds (LAN), 60 seconds (WAN).
a) 90
b) 170
c) 110
d) 91
View Answer
Answer: a
a) Delay
b) Bandwidth
c) MTU
View Answer
Answer: d
Explanation: The EIGRP metric values are Delay, Bandwidth, and MTU.
7. For default gateway you will use which of following command on Cisco router?
a) IP default network
b) IP default gateway
c) IP default route
d) Default network
View Answer
Answer: a
a) 90
b) 170
c) 110
d) 100
View Answer
Answer: b
a) SPF
b) DUAL
c) Linkstat
d) Dikstraalgo
View Answer
Answer: b
Explanation: EIGRP uses the DUAL algorithm for finding shortest path.
10. In EIGRP best path is known as the successor, where as backup path is known as __________
a) Feasible successor
b) Back-up route
c) Default route
View Answer
Answer: a
This set of Basic Computer Networks Questions and Answers focuses on “PPP”.
1. Both HDLC and PPP both are Data link layer protocols.
a) True
b) False
View Answer
Answer: a
Explanation: Both HDLC and PPP both are Data link layer protocol.
2. Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the
network?
a) LCP
b) NCP
d) TCP
View Answer
a) Is designed for simple links which transport packets between two peers
b) Is one of the protocols for making an Internet connection over a phone line
c) Both Is designed for simple links which transport packets between two peers & Is one of the protocols for
making an Internet connection over a phone line
View Answer
Answer: c
Explanation: The PPP protocolis designed for simple links which transport packets between two peers and one of
the protocols for making an Internet connection over a phone line.
b) Network
c) Transport
d) Application
View Answer
Answer: a
View Answer
Answer: b
Components.
View Answer
Answer: a
View Answer
Answer: a
Explanation: A Link Control Protocol (LCP) is used for establishing, configuring and testing the data-link
connection.
View Answer
Answer: b
Explanation: A family of network control protocols (NCPs)are a series of independently-defined protocols that
encapsulate.
b) PPP can terminate the link only during the link establishment phase
View Answer
Answer: a
Explanation: PPP can terminate the link at any time because it works on the data link layer protocol.
10. The link necessarily begins and ends with this phase. During this phase, the LCP automata will be in
INITIAL or STARTING states
a) Link-termination phase
c) Authentication phase
d) Link dead phase
View Answer
Answer: d
Explanation: The link necessarily begins and ends with this phase. During this phase, the LCP automata will be
in INITIAL or STARTING states link dead phase.
Computer Networks Questions & Answers – Intrusion Detection Systems
This set of Computer Networks Questions and Answers for Entrance exams focuses on “Intrusion Detection
Systems”.
View Answer
Answer: c
Explanation: Once a protocol has been built and a behavior defined, the engine can scale more quickly and easily
than the signature-based model because a new signature does not have to be created for every attack and
potential variant.
a) An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent
legitimate network traffic or behavior
b) An alert that indicates nefarious activity on a system that is not running on the network
d) Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent
legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not
running on the network
View Answer
Answer: d
Explanation: A false positive is any alert that indicates nefarious activity on a system that, upon further
inspection, turns out to represent legitimate network traffic or behavior.
3. One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the
firewall is the most productive placement?
View Answer
Answer: a
Explanation: There are legitimate political, budgetary and research reasons to want to see all the “attacks”
against your connection, but given the care and feeding any IDS requires, do yourself a favor and keep your
NIDS sensors on the inside of the firewall.
View Answer
Answer: c
Explanation: “Shadow honeypots,” as researchers call them, share all the same characteristics of protected
applications running on both the server and client side of a network and operate in conjunction with an ADS.
a) Application layer
b) Network layer
c) Transport layer
View Answer
Answer: d
Explanation: Most commercial IDSes generate signatures at the network and transport layers.
6. An IDS follows a two-step process consisting of a passive component and an active component. Which of the
following is part of the active component?
b) Mechanisms put in place to reenact known methods of attack and record system responses
c) Inspection of system to detect policy violations
View Answer
Answer: b
Explanation: Second component of mechanisms are set in place to reenact known methods of attack and to
record system responses.
b) Attack-definition file
View Answer
Answer: b
Explanation: IDSes work in a manner similar to modern antivirus technology. They are constantly updated with
attack-definition files (signatures) that describe each type of known malicious activity.
8. “Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?
a) Application layer
b) Network layer
c) Session layer
View Answer
Answer: d
Explanation: Nemean automatically generates “semantics-aware” signatures based on traffic at the session and
application layers.
9. Which of the following is used to provide a baseline measure for comparison of IDSes?
View Answer
Answer: a
Explanation: As the sensitivity of systems may cause the false positive/negative rates to vary, it’s critical to have
some common measure that may be applied across the board.
d) They scan network traffic or packets to identify matches with attack-definition files
View Answer
Answer: d
Explanation: They are constantly updated with attack-definition files (signatures) that describe each type of
known malicious activity. They then scan network traffic for packets that match the signatures, and then raise
alerts to security administrators.
Computer Networks Questions & Answers – RPC
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RPC”.
a) server
b) client
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
a) inter-process communication
b) a single process
c) a single thread
View Answer
Answer: a
Explanation: None.
View Answer
Answer: b
Explanation: None.
c) both on the same computer and on different computers connected with a network
View Answer
Answer: c
Explanation: None.
a) program number
b) version number
c) procedure number
View Answer
Answer: d
Explanation: None.
c) a server program
View Answer
Answer: d
Explanation: None.
8. RPC is used to
c) both establish a server on remote machine that can respond to queries and retrieve information by calling a
query
View Answer
Answer: c
Explanation: None.
9. RPC is a
a) synchronous operation
b) asynchronous operation
View Answer
Answer: a
Explanation: None.
10. The local operating system on the server machine passes the incoming packets to the
a) server stub
b) client stub
View Answer
Answer: a
Explanation: None.
Computer Networks Questions & Answers – RTP
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “RTP”.
a) streaming media
b) video teleconference
c) television services
View Answer
Answer: d
Explanation: None.
2. RTP is used to
View Answer
Answer: a
Explanation: None.
a) media stream
b) expansion
View Answer
Answer: a
Explanation: None.
a) RTP
b) RTCP
c) RPC
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
View Answer
Answer: d
Explanation: None.
7. Which one of the following multimedia formats can not be supported by RTP?
a) MPEG-4
b) MJPEG
c) MPEG
View Answer
Answer: d
Explanation: None.
a) 12 bytes
b) 16 bytes
c) 24 bytes
d) 32 bytes
View Answer
Answer: a
Explanation: None.
c) RTCP itself does not provide any flow encryption or authentication methods
View Answer
Answer: d
Explanation: None.
10. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload
data?
a) SRTP
b) RTCP
c) RCP
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
Computer Networks Questions & Answers – SONET
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “SONET”.
View Answer
Answer: a
Explanation: None.
a) 51.84 Mbps
b) 155.52 Mbps
c) 466.56 Mbps
View Answer
Answer: a
Explanation: None.
View Answer
Answer: b
Explanation: None.
4. The photonic layer of the SONET is similar to the __________ of OSI model.
a) network layer
c) physical layer
View Answer
Answer: c
Explanation: None.
a) 2000 frames
b) 4000 frames
c) 8000 frames
d) 16000 frames
View Answer
Answer: c
Explanation: None.
a) frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame
View Answer
Answer: d
Explanation: None.
a) point-to-point
b) multi-point
View Answer
Answer: c
Explanation: None.
a) line layer
b) section layer
c) photonic layer
d) path layer
View Answer
Answer: a
Explanation: None.
a) one ring
b) two rings
c) three rings
d) four rings
View Answer
Answer: b
Explanation: One ring is used as the working ring and other as the protection ring.
c) both sdh is similar standard to SONET developed by ITU-T and synchronous digital hierarchy
Answer: c
Explanation: None.
Computer Networks Questions & Answers – WiMAX
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “WiMAX”.
View Answer
Answer: b
Explanation: None.
2. WiMAX provides
a) simplex communication
View Answer
Answer: c
Explanation: None.
View Answer
Answer: a
Explanation: None.
View Answer
Answer: d
Explanation: None.
View Answer
Answer: a
Explanation: None.
View Answer
Answer: c
Explanation: None.
7. WiMAX provides
a) VoIP services
b) IPTV services
View Answer
Answer: c
Explanation: None.
a) subscriber stations
b) base stations
c) gateway
View Answer
Answer: a
Explanation: None.
View Answer
Answer: b
Explanation: None.
10. Which one of the following frequency is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
View Answer
Answer: b
Explanation: None.
Computer Networks Questions & Answers – Bluetooth
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Bluetooth”.
a) scatternet
b) micronet
c) mininet
View Answer
Answer: a
Explanation: Piconet is the basic unit of bluetooth system having a master node and upto seven active slave
nodes.
a) 63
b) 127
c) 255
d) 511
View Answer
Answer: c
Explanation: None.
View Answer
Answer: b
Explanation: None.
4. Bluetooth uses
View Answer
Answer: a
Explanation: None.
5. Unauthorised access of information from a wireless device through a bluetooth connection is called
a) bluemaking
b) bluesnarfing
c) bluestring
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
a) point-to-point connections
b) point-to-multipoint connection
View Answer
Answer: c
Explanation: None.
a) 10 piconets
b) 20 piconets
c) 30 piconets
d) 40 piconets
View Answer
Answer: a
Explanation: None.
Computer Networks Questions & Answers – Internet
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Internet”.
1. What is internet?
a) a single network
View Answer
Answer: b
Explanation: None.
b) internet society
View Answer
Answer: c
Explanation: None.
3. Internet access by transmitting digital data over the wires of a local telephone network is provided by
a) leased line
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
a) HTTP
b) DHCP
c) DNS
View Answer
Answer: d
Explanation: None.
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
View Answer
Answer: c
Explanation: None.
7. Internet works on
a) packet switching
b) circuit switching
View Answer
8. Which one of the following is not an application layer protocol used in internet?
View Answer
Answer: c
Explanation: None.
a) DHCP
b) IP
c) RPC
View Answer
Answer: a
Explanation: None.
10. Which one of the following is not used in media access control?
a) ethernet
View Answer
Answer: d
Explanation: None.
Computer Networks Questions & Answers – Wireless LAN
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Wireless LAN”.
c) both device that allows wireless devices to connect to a wired network and wireless devices itself
View Answer
Answer: a
Explanation: None.
View Answer
Answer: a
Explanation: None.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
a) infrastructure mode
b) ad-hoc mode
View Answer
Answer: c
Explanation: In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.
b) all stations
View Answer
Answer: a
Explanation: None.
View Answer
Answer: b
Explanation: None.
a) collision detection
View Answer
Answer: a
Explanation: None.
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Computer Networks Questions & Answers – Ethernet
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Ethernet”.
a) MAC address
b) IP address
View Answer
Answer: a
Explanation: None.
a) 10101010
b) 10101011
c) 00000000
d) 11111111
View Answer
Answer: b
Explanation: None.
3. MAC address is of
1) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
View Answer
Answer: d
Explanation: None.
4. What is autonegotiation?
b) a security algorithm
c) a routing algorithm
View Answer
Answer: a
Explanation: None.
a) pure ethernet
View Answer
Answer: d
Explanation: None.
View Answer
Answer: a
Explanation: None.
a) coaxial cable
b) twisted pair cable
c) optical fiber
View Answer
Answer: c
Explanation: None.
a) 1000 bytes
b) 1200 bytes
c) 1300 bytes
d) 1500 bytes
View Answer
Answer: d
Explanation: None.
View Answer
Answer: a
Explanation: None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called
a) short frame
b) run frame
c) mini frame
d) man frame
View Answer
Answer: b
Explanation: None.
Computer Networks Questions & Answers – Network Utilities
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Network Utilities”.
1. Ping can
c) Report latency
View Answer
Answer: d
Explanation: None.
a) Traceroute
b) Nmap
c) Route
d) Ipconfig
View Answer
Answer: b
Explanation: A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are
mostly used by network scanning tools like nmap.
3. ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
View Answer
Answer: d
Explanation: None.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer: a
Explanation: None.
5. If you want to find the number of routers between a source and destination, the utility to be used is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer: d
Explanation: None.
View Answer
Answer: d
Explanation: None.
b) Domain Dossier
c) Domain Lookup
View Answer
Answer: a
Explanation: None.
advertisement
View Answer
Answer: c
Explanation: Pathping combines the functionality of ping with that of traceroute (tracert).
Computer Networks Questions & Answers – Network Management
a) Documents
b) Components
c) Servers
d) Entities
View Answer
Answer: b
Explanation: Complex networks today are made up of hundreds and sometimes thousands of components.
b) Fault management
View Answer
Answer: b
a) Documentation
b) Information
c) Servers
d) Entity
View Answer
Answer: a
Explanation: Documentation is the other type of configuration management.
4. In Network Management System, a term that responsible for controlling access to network based on
predefined policy is called
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
View Answer
Answer: d
Explanation: In Network Management System, a term that responsible for controlling access to network based on
predefined policy is called security management.
5. Control of users’ access to network resources through charges are main responsibilities of
c) Accounting Management
d) Security Management
View Answer
Answer: c
Explanation: Control of users’ access to network resources through charges are main responsibilities of
accounting management.
6. The physical connection between an end point and a switch or between two switches is
a) Transmission path
b) Virtual path
c) Virtual circuit
View Answer
Answer: a
Explanation:bThe physical connection between an end point and a switch or between two switches is
transmission path.
a) Circuit-switched networks
b) Message-switched networks
c) Packet-switched networks
View Answer
Answer: c
8. In Network Management System, maps track each piece of hardware and its connection to the
a) IP Server
b) Domain
c) Network
d) Data
View Answer
Answer: c
a) SMTP
b) UDP
c) SNMP
d) TCP/IP
View Answer
Answer: c
Explanation: Simple network management controls the group of objects in management interface base.
View Answer
Answer: b
• Fault Management
• Configuration Management
• Accounting (Administration)
• Performance Management
• Security Management.
Computer Networks Questions & Answers – Firewalls
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Firewalls”.
a) Frame filter
b) Packet filter
View Answer
Answer: b
Explanation: As you know, firewalls are available as hardware appliances, as software-only, or a combination of
the two. In every case, the purpose of a firewall is to isolate your trusted internal network (or your personal PC)
from the dangers of unknown resources on the Internet and other network connections that may be harmful. The
firewall prevents unauthorized access to your internal, trusted network from outside threats.
View Answer
Answer: a
Explanation: Most network layer firewalls can operate as stateful or stateless firewalls, creating two
subcategories of the standard network layer firewall. Stateful firewalls have the advantage of being able to track
packets over a period of time for greater analysis and accuracy — but they require more memory and operate
more slowly. Stateless firewalls do not analyze past traffic and can be useful for systems where speed is more
important than security, or for systems that have very specific and limited needs. For example, a computer that
only needs to connect to a particular backup server does not need the extra security of a stateful firewall.
3. A firewall is installed at the point where the secure internal network and untrusted external network meet
which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
View Answer
Answer: a
Explanation: A firewall can be a PC, a router, a midrange, a mainframe, a UNIX workstation, or a combination
of these that determines which information or services can be accessed from the outside and who is permitted to
use the information and services from outside. Generally, a firewall is installed at the point where the secure
internal network and untrusted external network meet, which is also known as a chokepoint.
View Answer
Answer: a
Explanation: A firewall can be a PC, a midrange, a mainframe, a UNIX workstation, a router, or combination of
these. Depending on the requirements, a firewall can consist of one or more of the following functional
components: Packet-filtering router
a) Physical layer
c) Network layer
d) Application layer
View Answer
Answer: d
Explanation: The application firewall is typically built to control all network traffic on any layer up to the
application layer. It is able to control applications or services specifically, unlike a stateful network firewall,
which is – without additional software – unable to control network traffic regarding a specific application. There
are two primary categories of application firewalls, network-based application firewalls and host-based
application firewalls.
a) Physical layer
d) Application layer
View Answer
Answer: c
Explanation: In computing, a firewall is a network security system that monitors and controls the incoming and
outgoing network traffic based on predetermined security rules.[1] A firewall typically establishes a barrier
between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not
to be secure or trusted.[2] Firewalls are often categorized as either network firewalls or host-based firewalls.
View Answer
Answer: c
Explanation: In a topology with a single firewall serving both internal and external users (LAN and WAN), it
acts as a shared resource for these two zones.
8. What tells a firewall how to reassemble a data stream that has been divided into packets?
View Answer
Answer: a
Explanation: source routing future.
a) Routing table
b) Bridging table
c) State table
d) Connection table
View Answer
Answer: a
10. A firewall needs to be __________ so that it can grow with the network it protects
a) Robust
b) Expansive
c) Fast
d) Scalable
View Answer
Answer: b
This set of Computer Networks Questions and Answers for Aptitude test focuses on “Datagram Networks”.
a) Network layer
b) Physical layer
c) Application layer
d) Transport layer
View Answer
Answer: a
a) Switches
b) Segments
c) Datagrams
d) Data-packets
View Answer
Answer: c
Explanation: As the name suggests, in datagram switching packets are called as datagrams.
c) Telephone networks
d) Internetwork
View Answer
Answer: b
Explanation: The switch does not keep the information about the connection state, hence it is connection less.
a) Switch table
b) Segments table
c) Datagram table
d) Routing table
View Answer
Answer: c
View Answer
Answer: b
Explanation: Routing table contains destination address and output port to route the packets to their destinations.
6. Which of the following remains same in the header of the packet in a datagram network during the entire
journey of the packet?
a) Destination address
b) Source address
c) Checksum
d) Padding
View Answer
Answer: a
Explanation: Destination address remains same in the header during the entire journey of the packet.
7. Which of the following is true with respect to the delay in datagram networks?
a) Delay is greater than in a virtual circuit network
View Answer
Answer: d
Explanation: All the options are true with respect to the delay in datagram networks.
8. During datagram switching, the packets are placed in __________ to wait until the given transmission line
becomes available.
a) Stack
b) Queue
c) Hash
d) Routing table
View Answer
Answer: b
Explanation: Packets are stored in queue during delay and are served as first in first out.
9. The probability of the error in a transmitted block _________ with the length of the block
a) Remains same
b) Decreases
c) Increases
View Answer
Answer: c
Explanation: Probability of the error in a transmitted block increases with the length of the block.
10. Which of the following is true with respect to the datagram networks?
View Answer
Answer: d
Explanation: All are the facts with respect to the datagram networks.
omputer Networks Questions & Answers – OSPF Configuration
1. An OSPF router receives an LSA, the router checks its sequence number, and this
number matches the sequence number of the LSA that the receiving router already has.
View Answer
Answer: a
Explanation: An OSPF router receives an LSA, the router checks its sequence number, and this number matches
the sequence number of the LSA that the receiving router already has Ignores the LSA.
2. An OSPF router receives an LSA. The router checks its sequence number and finds that
this number is higher than the sequence number it already has. Which two tasks does
View Answer
Answer: b
Explanation: An OSPF router receives an LSA. The router checks its sequence number and finds that this
number is higher than the sequence number Adds it to the database, Floods the LSA to the other routers.
3. An OSPF router receives an LSA. The router checks its sequence number and finds that
this number is lower than the sequence number it already has. What does the router do
View Answer
Answer: c
Explanation: An OSPF router receives an LSA. The router checks its sequence number and finds that this
number is lower than the sequence number sends newer LSU update to source router.
4. Each LSA has its own age timer. By default, how long does an LSA wait before requiring an update?
a) 30 seconds
b) 1 minute
c) 30 minutes
d) 1 hour
View Answer
5. Distance vector protocols use the concept of split horizon, but link-state routing protocols, such as OSPF, do
not.
a) True
b) False
View Answer
Answer: b
Explanation: Distance vector protocols use the concept of split horizon, but link-state routing protocols, such as
OSPF, do not use this.
a) Topology table
b) Routing table
c) Neighbor table
d) Adjacency table
View Answer
Answer: b
Explanation: The outcome of Dijkstra’s calculation is used to populate the Routing table.
a) 89
b) 86
c) 20
d) 76
View Answer
Answer: a
a) LSU
b) LSR
c) DBD
d) Query
View Answer
Answer: d
a) 224.0.0.5
b) 224.0.0.6
c) 224.0.0.7
d) 224.0.0.8
View Answer
Answer: a
Explanation: 224.0.0.5 is the multicast address does the OSPF Hello protocol use.
10. The Hello protocol sends periodic updates to ensure that a neighbor relationship is maintained between
adjacent routers.
a) True
b) False
View Answer
Answer: a
Explanation: The Hello protocol sends periodic updates to ensure that a neighbor relationship is maintained
between adjacent routers.
a) Exstart
b) Loading
c) Exchange
d) Two-way
View Answer
Answer: a
Explanation: DBD packets are involved during which two states Exstart, Exchange.
a) 10 seconds
b) 30 seconds
c) 30 minutes
d) 1 hour
View Answer
Answer: d
Explanation: None.
Computer Networks Questions & Answers – OSPF
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “OSPF”.
b) Error-correction protocol
View Answer
Answer: a
Explanation: Each OSPF router monitors the cost of the link to each of its neighbours and then floods the link
state information to other routers in the network.
a) Bellman-ford algorithm
c) Dijkstra’s algorithm
View Answer
Answer: c
Explanation: Shortest path in OSPF is usually computed by Dijkstra’s algorithm. It was proposed by Edsger W.
Dijkstra in the year 1956. This algorithm computes the shortest path between nodes.
a) Support for fixed-length sunbathing by including the subnet mask in the routing message
d) Distribution of traffic over multiple paths that have equal cost to the destination
View Answer
Answer: a
Explanation: Support for variable-length sunbathing by including the subnet mask in the routing message.
b) Error-correction protocol
d) Hello protocol
View Answer
Answer: d
Explanation: Hello protocol is used to discover neighbour routers automatically. It makes sure that the
communication between neighbors are bidirectional.
a) Hello
b) Link-state request
c) Link-state response
d) Link-state ACK
View Answer
Answer: c
Explanation: Five types of OSPF packets are: Hello, Database description, Link-state request, Link-state update,
Link-state ACK.
1 – Hello packets
a) 1-2-3
b) 1-3-2
c) 3-2-1
d) 2-1-3
View Answer
Answer: b
Explanation: OSPF first implements a hello protocol. Then it later on tries to establish synchronisation with
database. Later on building of routing tables is done.
a) Type
b) Area ID
c) Authentication type
d) Checksum
View Answer
Answer: d
Explanation: Checksum field is used to detect errors. It makes sure that the data portions that are being sent are
all in integrity. It can detect duplicated bits.
8. In OSPF database descriptor packet, if more database descriptor packet flows, ‘M’ field is set to
____________
a) 1
b) 0
c) more
d) none
View Answer
Answer: a
9. In OSPF database descriptor packet, which field is used to indicate that the router is master?
a) M
b) MS
c) I
d) Options
View Answer
Answer: b
Explanation: M bit is set to 1. These packets are exchanged when an adjacency is being initialized. Master sends
these packets called polls to slave, and then slave sends back acknowledgments.
10. In OSPF database descriptor packet, which field is used to detect a missing packet?
a) LSA header
b) MS
d) Options
View Answer
Answer: c
Explanation: Sequence number field is used to detect a missing packet. LSA is abbreviation for link state
advertisement. LSA is the main communication means for OSPF.
Computer Networks Questions & Answers – Intrusion Detection Systems
This set of Computer Networks Questions and Answers for Entrance exams focuses on “Intrusion Detection
Systems”.
View Answer
Answer: c
Explanation: Once a protocol has been built and a behavior defined, the engine can scale more quickly and easily
than the signature-based model because a new signature does not have to be created for every attack and
potential variant.
a) An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent
legitimate network traffic or behavior
b) An alert that indicates nefarious activity on a system that is not running on the network
d) Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent
legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not
running on the network
View Answer
Answer: d
Explanation: A false positive is any alert that indicates nefarious activity on a system that, upon further
inspection, turns out to represent legitimate network traffic or behavior.
3. One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the
firewall is the most productive placement?
View Answer
Answer: a
Explanation: There are legitimate political, budgetary and research reasons to want to see all the “attacks”
against your connection, but given the care and feeding any IDS requires, do yourself a favor and keep your
NIDS sensors on the inside of the firewall.
View Answer
Answer: c
Explanation: “Shadow honeypots,” as researchers call them, share all the same characteristics of protected
applications running on both the server and client side of a network and operate in conjunction with an ADS.
a) Application layer
b) Network layer
c) Transport layer
View Answer
Answer: d
Explanation: Most commercial IDSes generate signatures at the network and transport layers.
6. An IDS follows a two-step process consisting of a passive component and an active component. Which of the
following is part of the active component?
b) Mechanisms put in place to reenact known methods of attack and record system responses
c) Inspection of system to detect policy violations
View Answer
Answer: b
Explanation: Second component of mechanisms are set in place to reenact known methods of attack and to
record system responses.
b) Attack-definition file
View Answer
Answer: b
Explanation: IDSes work in a manner similar to modern antivirus technology. They are constantly updated with
attack-definition files (signatures) that describe each type of known malicious activity.
8. “Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?
a) Application layer
b) Network layer
c) Session layer
View Answer
Answer: d
Explanation: Nemean automatically generates “semantics-aware” signatures based on traffic at the session and
application layers.
9. Which of the following is used to provide a baseline measure for comparison of IDSes?
View Answer
Answer: a
Explanation: As the sensitivity of systems may cause the false positive/negative rates to vary, it’s critical to have
some common measure that may be applied across the board.
d) They scan network traffic or packets to identify matches with attack-definition files
View Answer
Answer: d
Explanation: They are constantly updated with attack-definition files (signatures) that describe each type of
known malicious activity. They then scan network traffic for packets that match the signatures, and then raise
alerts to security administrators.
Computer Networks Questions & Answers – PPP
This set of Basic Computer Networks Questions and Answers focuses on “PPP”.
1. Both HDLC and PPP both are Data link layer protocols.
a) True
b) False
View Answer
Answer: a
Explanation: Both HDLC and PPP both are Data link layer protocol.
2. Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the
network?
a) LCP
b) NCP
d) TCP
View Answer
Answer: c
Explanation: LCP and NCP are the PPP protocol provide for handling the capabilities of the connection/link on
the network.
a) Is designed for simple links which transport packets between two peers
b) Is one of the protocols for making an Internet connection over a phone line
c) Both Is designed for simple links which transport packets between two peers & Is one of the protocols for
making an Internet connection over a phone line
View Answer
Answer: c
Explanation: The PPP protocolis designed for simple links which transport packets between two peers and one of
the protocols for making an Internet connection over a phone line.
a) Link
b) Network
c) Transport
d) Application
View Answer
Answer: a
View Answer
Answer: b
Components.
View Answer
Answer: a
View Answer
Answer: a
Explanation: A Link Control Protocol (LCP) is used for establishing, configuring and testing the data-link
connection.
View Answer
Answer: b
Explanation: A family of network control protocols (NCPs)are a series of independently-defined protocols that
encapsulate.
b) PPP can terminate the link only during the link establishment phase
View Answer
Answer: a
Explanation: PPP can terminate the link at any time because it works on the data link layer protocol.
10. The link necessarily begins and ends with this phase. During this phase, the LCP automata will be in
INITIAL or STARTING states
a) Link-termination phase
c) Authentication phase
View Answer
Answer: d
Explanation: The link necessarily begins and ends with this phase. During this phase, the LCP automata will be
in INITIAL or STARTING states link dead phase.
Computer Networks Questions & Answers – EIGRP
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “EIGRP”.
a) Yes
b) No
View Answer
Answer: a
a) K-values
b) Bandwidth only
c) Hop Count
d) Delay only
View Answer
Answer: a
a) VLSM/subnetting
b) Auto summary
View Answer
Answer: d
c) 15s
d) 180s
View Answer
Answer: a
Explanation: EIGRP send the hello message after every5 seconds (LAN), 60 seconds (WAN).
a) 90
b) 170
c) 110
d) 91
View Answer
Answer: a
a) Delay
b) Bandwidth
c) MTU
View Answer
Answer: d
Explanation: The EIGRP metric values are Delay, Bandwidth, and MTU.
7. For default gateway you will use which of following command on Cisco router?
a) IP default network
b) IP default gateway
c) IP default route
d) Default network
View Answer
Answer: a
a) 90
b) 170
c) 110
d) 100
View Answer
Answer: b
a) SPF
b) DUAL
c) Linkstat
d) Dikstraalgo
View Answer
Answer: b
Explanation: EIGRP uses the DUAL algorithm for finding shortest path.
10. In EIGRP best path is known as the successor, where as backup path is known as __________
a) Feasible successor
b) Back-up route
c) Default route
View Answer
Answer: a
This set of Computer Networks Questions and Answers for Campus interviews focuses on “STP”.
a) Communication server
b) Print server
c) File server
d) Network
View Answer
Answer: c
Explanation: File server allows LAN users to share computer programs and data.
View Answer
Answer: a
3. A standalone program that has been modified to work on a LAN by including concurrency controls such as
file and record locking is an example of ___________
c) Groupware
View Answer
Answer: a
Explanation: A standalone program that has been modified to work on a LAN by including concurrency controls
such as file and record locking is an example of LAN intrinsic software.
4. The __________ portion of LAN management software restricts access, records user activities and audit data
etc.
a) Configuration management
b) Security management
c) Performance management
View Answer
Answer: b
Explanation: The Security management portion of LAN management software restricts access, records user
activities and audit data etc.
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
View Answer
Answer: d
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
View Answer
Answer: b
Explanation: 100 mbps is the max data capacity of STP.
a) BNC
b) RJ-11
c) RJ-45
d) RJ-69
View Answer
Answer: c
a) STP server
b) Hub/switch
c) PDC
d) Router
View Answer
Answer: b
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
View Answer
Answer: c
Explanation: 1000 mbps is max data capacity for optical fiber cable.
a) ARC net
b) Ethernet
c) Router
d) STP server
View Answer
Answer: b