0% found this document useful (0 votes)
145 views16 pages

(MCQ) Computer Communication Networks - LMT6

The document contains a series of multiple choice questions about computer networking topics like IP addressing, TCP, UDP, and encapsulation. Specifically, it tests understanding of: - What types of packets IP, TCP, and UDP use (datagrams, segments, user datagrams) - How different packet types are encapsulated - IP address classes and their identifying bit patterns - TCP concepts like reliable data transfer using segments and acknowledgments - UDP being connectionless and unreliable compared to TCP

Uploaded by

raghad mejeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views16 pages

(MCQ) Computer Communication Networks - LMT6

The document contains a series of multiple choice questions about computer networking topics like IP addressing, TCP, UDP, and encapsulation. Specifically, it tests understanding of: - What types of packets IP, TCP, and UDP use (datagrams, segments, user datagrams) - How different packet types are encapsulated - IP address classes and their identifying bit patterns - TCP concepts like reliable data transfer using segments and acknowledgments - UDP being connectionless and unreliable compared to TCP

Uploaded by

raghad mejeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

Spend Less, Get More This Week ✨! After Diwali🧨Sale Is Live! Check Offers 🎁!!!   

Get Latest Exam Updates, Free Study m


Your Name

Your Branch
Year Of Engineering

[MCQ] Computer Communication Networks

Module 1

Module 01

Module 03

Module 04

Module 05

Module 06

 Module 06

1. An IP packet is called a _____________.


a. user datagram
b. segment
c. datagram
d. none of the above
answer: C. datagram

https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 1/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

2. A TCP packet is called a _____________.


a. user datagram
b. segment
c. datagram
d. none of the above
answer: B. segment

3. A UDP packet is called a _____________.


a. user datagram
b. segment
c. datagram
d. none of the above
answer: A. user datagram

4. An IP packet is encapsulated in a _____________.


a. data link frame
b. network layer packet
c. physical layer packet
d. none of the above
answer: A. data link frame

5. A TCP packet is encapsulated in a(n) _____________.


a. data link frame
b. IP datagram
c. physical layer packet
d. none of the above
answer: B. IP datagram

6. A UDP packet is encapsulated in a(n) _____________.


a. data link frame
b. IP datagram
c. physical layer packet
d. none of the above
answer: B. IP datagram

7. An ARP packet is encapsulated in a(n) _____________.


a. data link frame
b. IP datagram
c. physical layer packet
d. none of the above
answer: A. data link frame
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 2/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

8. A RARP packet is encapsulated in a(n) _____________.


a. data link frame
b. IP datagram
c. physical layer packet
d. none of the above
answer: A. data link frame

9. An ICMP packet is encapsulated in a(n) _____________.


a. data link frame
b. IP datagram
c. physical layer packet
d. none of the above
answer: B. IP datagram

10. An IGMP packet is encapsulated in a(n) _____________.


a. data link frame
b. IP datagram
c. physical layer packet
d. none of the above
answer: B. IP datagram

11. An application-layer packet is encapsulated in a(n) _____________.


a. data link frame
b. IP datagram
d. none of the above
answer: C. TCP or UDP packet

12. An IP address is _________ bits.


a. 24
b. 32
c. 48
d. none of the above
answer: B. 32

13. An IP address is _______ bytes in dotted decimal notation.


a. 3
b. 4
c. 5
d. none of the above
answer: B. 4

https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 3/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

14. A class B address starts with the _________bit(s).


a. 0
b. 10
c. 110
d. 1111
answer: B. 10

15. A class E address starts with the _________bit(s).


a. 0
b. 10
c. 1110
d. 1111
answer: D. 1111

16. A class C address starts with the _________bit(s).


a. 0
b. 10
c. 110
d. 1110
answer: C. 110

17. A class A address starts with the _________bit(s).


a. 0
b. 10
c. 1110
d. 1111
answer: A. 0

18. A class D address starts with the _________bit(s).


a. 0
b. 10
c. 1110
d. 1111
answer: C. 1110

19. What is the class of the address 227.78.19.21?


a. A
b. B
c. C
d. D
answer: D. D
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 4/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

20. What is the class of the address 130.8.119.1?


a. A
b. B
c. C
d. D
answer: B. B

21. Which of the following is false with respect to TCP?


a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) Unreliable
Answer: d
Explanation: TCP is a transport layer protocol that provides reliable and ordered delivery of
a stream of bytes between hosts communicating via an IP network.

22. In TCP, sending and receiving data is done as _______


a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
Answer: a
Explanation: TCP provides stream oriented delivery between hosts communicating via an IP
network and there are no message boundaries. TCP can concatenate data from a number of
send () commands into one stream of data and still transmit it reliably.

23. TCP process may not write and read data at the same speed. So we need __________ for
storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
Answer: b
Explanation: A TCP receiver has a receive buffer that is used to store the unprocessed
incoming packets in case the sender is sending packets faster than the processing rate of
the received packets.

24. TCP groups a number of bytes together into a packet called _______
a) Packet
b) Buffer
c) Segment
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 5/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

d) Stack
Answer: c
Explanation: A segment may be collection of data from many send () statements. TCP
transmits each segment as a stream of bytes.

25. Communication offered by TCP is ________


a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
Answer: a
Explanation: Data can flow both the directions at the same time during a TCP
communication hence, it is full-duplex. This is the reason why TCP is used in systems that
require full-duplex operation such as e-mail systems.

26. To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
Answer: d
Explanation: Acknowledgment mechanism is used to check the safe and sound arrival of
data. The sender actively checks for acknowledgement from the receiver and once a specific
time period has passed, it retransmits the data.

27. In segment header, sequence number and acknowledgement number fields refer to
_______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment

28. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only
one segment?
a) 10000
b) 10001
c) 12001
d) 11001
Answer: b
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 6/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

Explanation: The sequence number given to first byte of a segment, with respect to its order
among the previous segments, is the sequence number of that segment.

29. Bytes of data being transferred in each connection are numbered by TCP. These
numbers start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
Answer: d
Explanation: One might expect the sequence number of the first byte in the stream to be 0,
or 1. But that does not happen in TCP, Instead, the sender has to choose an Initial Sequence
Number (ISN), which is basically a random 32 bit sequence of 0’s and 1’s, during the
connection handshake.

30. The value of acknowledgement field in a segment defines _______


a) sequence number of the byte received previously
b) total number of bytes to receive
c) sequence number of the next byte to be received
d) sequence of zeros and ones
Answer: c
Explanation: The acknowledgement field in a segment defines the sequence number of the
byte which is to be received next i.e. sequence number of byte that the sender should
transmit next.

31. Which of the following is false with respect to UDP?


a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
Answer: a
Explanation: UDP is an unreliable, connectionless transport layer protocol that provides
message-based data transmission. TCP is an example of connection-oriented protocols.

32. Return value of the UDP port “Chargen” is _______


a) String of characters
b) String of integers
c) Array of characters with integers
d) Array of zero’s and one’s
Answer: a
Explanation: Using Chargen with UDP on port 19, the server sends a UDP datagram
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 7/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

containing a random number of characters every time it receives a datagram from the
connecting host. The number of characters is between 0 and 512.

33. Beyond IP, UDP provides additional services such as _______


a) Routing and switching
b) Sending and receiving of packets
c) Multiplexing and demultiplexing
d) Demultiplexing and error checking
Answer: d
Explanation: De-multiplexing is the delivering of received segments to the correct
application layer processes at the recipients end using UDP. Error checking is done through
checksum in UDP.

34. What is the main advantage of UDP?


a) More overload
b) Reliable
c) Low overhead
d) Fast
Answer: c
Explanation: As UDP does not provide assurance of delivery of packet, reliability and other
services, the overhead taken to provide these services is reduced in UDP’s operation. Thus,
UDP provides low overhead, and higher speed.

35. Port number used by Network Time Protocol (NTP) with UDP is ________
a) 161
b) 123
c) 162
d) 124
Answer: b
Explanation: The Network Time Protocol is a clock synchronization network protocol
implemented by using UDP port number 123 to send and receive time stamps.

36. What is the header size of a UDP packet?


a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
Answer: a
Explanation: The fixed size of the UDP packet header is 8 bytes. It contains four two-byte
fields: Source port address, Destination port address, Length of packet, and checksum.

https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 8/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

37. The port number is “ephemeral port number”, if the source host is _______
a) NTP
b) Echo
c) Server
d) Client
Answer: d
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in
Windows Operating System. Ephemeral port numbers are short-lived port numbers which
can be used for clients in a UDP system where there are temporary clients all the time.

38. “Total length” field in UDP packet header is the length of _________
a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data
Answer: d
Explanation: Total length is the 16 bit field which contains the length of UDP header and the
data. The maximum value of the Total length field and the maximum size of a UDP
datagram is 65,535 bytes (8 byte header + 65,527 bytes of data).

39. Which is the correct expression for the length of UDP datagram?
a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
d) UDP length = UDP length + UDP header’s length
Answer: a
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP
header that defines the total length of the IP packet. There is another field in the IP header
that defines the length of the header. So if we subtract the length of the IP header that is
encapsulated in the IP packet, we get the length of UDP datagram.

40. The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port
Answer: b
Explanation: Checksum field is used to detect errors over the entire user datagram. Though
it is not as efficient as CRC which is used in TCP, it gets the job done for the UDP datagram
as UDP doesn’t have to ensure the delivery of the packet.

https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 9/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

41. The receiver of the data controls the amount of data that are to be sent by the
sender is referred to as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
Answer: a
Explanation: Flow control is done to prevent the receiver from being overflowed with data. It
is done using various open-loop (prevention) methods and closed-loop (recovery) methods.

42. Size of TCP segment header ranges between ___________


a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits
Answer: c
Explanation: The size of the header can be 20 bytes at a minimum if there are no options
and can go up to 60 bytes at maximum with 40 bytes in the options field. The header
contains all the control information required to ensure ordered, error-free and reliable
delivery of the segment.

43. Connection establishment in TCP is done by which mechanism?


a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronization
Answer: b
Explanation: A three-way handshake allows both, the server and the client to choose their
Initial Sequence Number and inform about it to the other party. This won’t be possible using
the two-way handshake mechanism.

44. The server program tells its TCP that it is ready to accept a connection. This process is
called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is started by
the server. Then the Client picks an ISN (Initial Sequence Number) and synchronizes (shares)

https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 10/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

it with the Server requesting a connection. The Server acknowledges the clients ISN, and
then picks an ISN and synchronizes it with the Client. At last, the Client acknowledges the
servers ISN.

45. A client that wishes to connect to an open server tells its TCP that it needs to be
connected to that particular server. The process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and is done by
the client once it finds the open server and picks an ISN. The Server acknowledges the
clients request, and then picks an ISN and synchronizes it with the Client. At last, the Client
acknowledges the servers ISN.

46. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
Answer: c
Explanation: In simultaneous open situation, two nodes send an SYN signal to each other
and start a TCP connection. Here, both TCP nodes transmit a SYNC+ACK segment to each
other and a connection is established between them. This doesn’t happen usually, because
both sides have to know which port on the other side to send to.

47. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
Answer: a
Explanation: SYNC flooding attack is a form of Denial of Service attack. Due to the overflow
of SYNC segments sent to the server, the victims are not able to request for a connection to
the server, thus resulting in Denial of Service.

https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 11/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

48. SYNC flooding attack belongs to a type of security attack known as ___________
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
Answer: d
Explanation: During SYNC flooding the system collapses and denies service to every request,
making it a DoS attack. Some other DoS attacks are bandwidth flooding, connection flooding
and UDP flooding.

49. The sizes of source and destination port address in TCP header are ___________
respectively.
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
Answer: b
Explanation: All port addresses are of 16 bits and they specify the type of service being used
by the network entity. For example, port 21 is used for FTP connections and port 25 is used
for ICMP connections.

50. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
Answer: b
Explanation: TCP header contains separate fields for sequence number and
acknowledgment number. Comparing these values is what allows TCP to detect lost
segments and in turn recover from that loss. After detecting the lost segments, the recovery
may require retransmission of the lost segments of data.

51. TCP is a ………. protocol.


A. stream-oriented
B. message-oriented
C. block-oriented
D. packet-oriented
answer: A

52. Which of the following is not the layer of TCP/IP protocol.


A. Physical layer
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 12/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

B. link layer
C. network layer
D. transport layer.
answer: A

53.TCP groups a number of bytes together into a packet called a ….


A. user datagram
B. segment
C. datagram
D. packet
answer: B

54. The ………. of TCP/IP protocol is responsible for figuring out how to get data to its
destination.
A. application layer
B. link layer
C. network layer
D. transport layer.
answer: C

55. TCP is a(n) ……….. transport protocol.


A. protocol delivery
B. reliable
C. best-effort delivery
D. effortless delivery
answer: B

6 ……… is the protocol that hides the underlying physical network by creating a virtual
network view.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
answer: A

57. To use the services of UDP, we need ……… socket addresses.


A. four
B. two
C. three
D. four
answer: C
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 13/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

58. Which of the following is not the name of Regional Internet Registries(RIR) to
administer the network number portion of IP address.
A. American Registry for Internet Numbers(ARIN)
B. Reseaux IP Europeans(RIPE)
C. Europeans Registry for Internet Numbers(ERIN)
D. Asia Pacific Network Information Center(APNIC)
answer:  C

59. UDP packets are called …….


A. user datagrams
B. segments
C. frames
D. packets
answer:A

60. ………… addresses use 21 bits for the and 8 bits for the portion of the IP address for
TCP/IP network.
A. Class A
B. Class B
C. Class C
D. Class D
answer: C

61. UDP packets have a fixed-size header of ………. bytes.


A. 16
B. 8
C. 32
D. 64
answer:B

62. ………. messages are never sent in response to datagrams with a broadcast or a
multicast destination address.
A. ICMP
B. ARP
C. IP
D. BOOTP
answer: A

63. TCP assigns a sequence number to each segment that is being sent. The sequence
number for each segment is the number of the ……. byte carried in that segment.
A. first
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 14/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

B. last
C. middle
D. zero
answer: A

64. ………. is responsible for converting the higher-level protocol address (IP addresses) to
physical network addresses.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
answer: C

65. UDP and TCP are both ……… layer protocols.


A. data link
B. network
C. transport
D. interface
answer: C

66. ……….. is a process-to-process protocol that adds only port addresses, checksum error
control, and length information to the data from the upper layer.
A. TCP
B. UDP
C. IP
D. ARP
answer: B

67. Which of the following functions does UDP perform?


A. Process-to-process communication
B. Host-to-host communication
C. End-to-end reliable data delivery
D. Interface-to-interface communication.
answer: A

68. A port address in TCP/IP is ………bits long.


A. 32
B. 48
C. 16
D. 64
answer: C
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 15/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT

69.B When the IP layer of a receiving host receives a datagram, …..


A. delivery is complete
B. a transport layer protocol takes over
C. a header is added
D. a session layer protocol takes over

70). TCP/IP is a ………. hierarchical protocol suite developed before the OSI model.
A. seven-layer
B. five-layer
C. six-layer
D. four-layer
answer: B

Prepare For Your Placements: https://lastmomenttuitions.com/courses/placement-preparation/

/ Youtube Channel: https://www.youtube.com/channel/UCGFNZxMqKLsqWERX_N2f08Q

Follow For Latest Updates, Study Tips & More Content!

/lastmomenttuition

/ Last Moment Tuitions

/ lastmomentdost

https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 16/16

You might also like