(MCQ) Computer Communication Networks - LMT6
(MCQ) Computer Communication Networks - LMT6
Spend Less, Get More This Week ✨! After Diwali🧨Sale Is Live! Check Offers 🎁!!!
Your Branch
Year Of Engineering
Module 1
Module 01
Module 03
Module 04
Module 05
Module 06
Module 06
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 1/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 3/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT
23. TCP process may not write and read data at the same speed. So we need __________ for
storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
Answer: b
Explanation: A TCP receiver has a receive buffer that is used to store the unprocessed
incoming packets in case the sender is sending packets faster than the processing rate of
the received packets.
24. TCP groups a number of bytes together into a packet called _______
a) Packet
b) Buffer
c) Segment
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 5/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT
d) Stack
Answer: c
Explanation: A segment may be collection of data from many send () statements. TCP
transmits each segment as a stream of bytes.
26. To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
Answer: d
Explanation: Acknowledgment mechanism is used to check the safe and sound arrival of
data. The sender actively checks for acknowledgement from the receiver and once a specific
time period has passed, it retransmits the data.
27. In segment header, sequence number and acknowledgement number fields refer to
_______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
28. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only
one segment?
a) 10000
b) 10001
c) 12001
d) 11001
Answer: b
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 6/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT
Explanation: The sequence number given to first byte of a segment, with respect to its order
among the previous segments, is the sequence number of that segment.
29. Bytes of data being transferred in each connection are numbered by TCP. These
numbers start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
Answer: d
Explanation: One might expect the sequence number of the first byte in the stream to be 0,
or 1. But that does not happen in TCP, Instead, the sender has to choose an Initial Sequence
Number (ISN), which is basically a random 32 bit sequence of 0’s and 1’s, during the
connection handshake.
containing a random number of characters every time it receives a datagram from the
connecting host. The number of characters is between 0 and 512.
35. Port number used by Network Time Protocol (NTP) with UDP is ________
a) 161
b) 123
c) 162
d) 124
Answer: b
Explanation: The Network Time Protocol is a clock synchronization network protocol
implemented by using UDP port number 123 to send and receive time stamps.
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 8/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT
37. The port number is “ephemeral port number”, if the source host is _______
a) NTP
b) Echo
c) Server
d) Client
Answer: d
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in
Windows Operating System. Ephemeral port numbers are short-lived port numbers which
can be used for clients in a UDP system where there are temporary clients all the time.
38. “Total length” field in UDP packet header is the length of _________
a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data
Answer: d
Explanation: Total length is the 16 bit field which contains the length of UDP header and the
data. The maximum value of the Total length field and the maximum size of a UDP
datagram is 65,535 bytes (8 byte header + 65,527 bytes of data).
39. Which is the correct expression for the length of UDP datagram?
a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
d) UDP length = UDP length + UDP header’s length
Answer: a
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP
header that defines the total length of the IP packet. There is another field in the IP header
that defines the length of the header. So if we subtract the length of the IP header that is
encapsulated in the IP packet, we get the length of UDP datagram.
40. The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port
Answer: b
Explanation: Checksum field is used to detect errors over the entire user datagram. Though
it is not as efficient as CRC which is used in TCP, it gets the job done for the UDP datagram
as UDP doesn’t have to ensure the delivery of the packet.
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 9/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT
41. The receiver of the data controls the amount of data that are to be sent by the
sender is referred to as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
Answer: a
Explanation: Flow control is done to prevent the receiver from being overflowed with data. It
is done using various open-loop (prevention) methods and closed-loop (recovery) methods.
44. The server program tells its TCP that it is ready to accept a connection. This process is
called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is started by
the server. Then the Client picks an ISN (Initial Sequence Number) and synchronizes (shares)
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 10/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT
it with the Server requesting a connection. The Server acknowledges the clients ISN, and
then picks an ISN and synchronizes it with the Client. At last, the Client acknowledges the
servers ISN.
45. A client that wishes to connect to an open server tells its TCP that it needs to be
connected to that particular server. The process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and is done by
the client once it finds the open server and picks an ISN. The Server acknowledges the
clients request, and then picks an ISN and synchronizes it with the Client. At last, the Client
acknowledges the servers ISN.
46. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
Answer: c
Explanation: In simultaneous open situation, two nodes send an SYN signal to each other
and start a TCP connection. Here, both TCP nodes transmit a SYNC+ACK segment to each
other and a connection is established between them. This doesn’t happen usually, because
both sides have to know which port on the other side to send to.
47. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
Answer: a
Explanation: SYNC flooding attack is a form of Denial of Service attack. Due to the overflow
of SYNC segments sent to the server, the victims are not able to request for a connection to
the server, thus resulting in Denial of Service.
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 11/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT
48. SYNC flooding attack belongs to a type of security attack known as ___________
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
Answer: d
Explanation: During SYNC flooding the system collapses and denies service to every request,
making it a DoS attack. Some other DoS attacks are bandwidth flooding, connection flooding
and UDP flooding.
49. The sizes of source and destination port address in TCP header are ___________
respectively.
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
Answer: b
Explanation: All port addresses are of 16 bits and they specify the type of service being used
by the network entity. For example, port 21 is used for FTP connections and port 25 is used
for ICMP connections.
50. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
Answer: b
Explanation: TCP header contains separate fields for sequence number and
acknowledgment number. Comparing these values is what allows TCP to detect lost
segments and in turn recover from that loss. After detecting the lost segments, the recovery
may require retransmission of the lost segments of data.
B. link layer
C. network layer
D. transport layer.
answer: A
54. The ………. of TCP/IP protocol is responsible for figuring out how to get data to its
destination.
A. application layer
B. link layer
C. network layer
D. transport layer.
answer: C
6 ……… is the protocol that hides the underlying physical network by creating a virtual
network view.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
answer: A
58. Which of the following is not the name of Regional Internet Registries(RIR) to
administer the network number portion of IP address.
A. American Registry for Internet Numbers(ARIN)
B. Reseaux IP Europeans(RIPE)
C. Europeans Registry for Internet Numbers(ERIN)
D. Asia Pacific Network Information Center(APNIC)
answer: C
60. ………… addresses use 21 bits for the and 8 bits for the portion of the IP address for
TCP/IP network.
A. Class A
B. Class B
C. Class C
D. Class D
answer: C
62. ………. messages are never sent in response to datagrams with a broadcast or a
multicast destination address.
A. ICMP
B. ARP
C. IP
D. BOOTP
answer: A
63. TCP assigns a sequence number to each segment that is being sent. The sequence
number for each segment is the number of the ……. byte carried in that segment.
A. first
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 14/16
11/19/21, 11:00 AM [MCQ] Computer Communication Networks - LMT
B. last
C. middle
D. zero
answer: A
64. ………. is responsible for converting the higher-level protocol address (IP addresses) to
physical network addresses.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
answer: C
66. ……….. is a process-to-process protocol that adds only port addresses, checksum error
control, and length information to the data from the upper layer.
A. TCP
B. UDP
C. IP
D. ARP
answer: B
70). TCP/IP is a ………. hierarchical protocol suite developed before the OSI model.
A. seven-layer
B. five-layer
C. six-layer
D. four-layer
answer: B
/ Youtube Channel: https://www.youtube.com/channel/UCGFNZxMqKLsqWERX_N2f08Q
/lastmomenttuition
/ lastmomentdost
https://lastmomenttuitions.com/mcq-computer-communication-networks/#1618228421390-1ec5e1b9-826d 16/16