Question Bank 150 Questions Computer Networks
Question Bank 150 Questions Computer Networks
When collection of various computers seems a single coherent system to its client, then it is
called _________
a) computer network
b) distributed system
c) networking system
d) mail system
e) None of these
6. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
___________
a) Added
b) Removed
c) Rearranged
d) Modified
e) None of these
11. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
e) None of these
21. Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
d) PAN
e) None of these
26 As the data packet moves from the _______ layer down to the _______ layer, headers and a
trailer are added
a) Application
b) Physical
c) Network
d) Data Link
e) None of these
27 A network maintained without using wires is called ........ and ....... are the different types of
networking.
a) Metropolitan area network
b) Wide area network
c) Local area network
d) Personal area network
e) None of these
28. Network .................... refers to the layout in which various ………. of a network are
connected
a) Resources
b) Wireless Network
c) Topology
d) Components
e) None of these
29. A _____ is a device that forwards ………… between networks by processing the routing
information included in the packet.
a) Router
b) Firewall
c) Bridge
d) Packets
e) None of these
33. The types of data services offered by an LLC (Logical Link Control) layer are ___.
a) Connectionless which is fast and unreliable
b) Connection-Oriented which is slow and reliable
c) Both A & B.
d) None of the above
e) Security Decrement i.e., neither connectionless nor connection-oriented
37. The physical address to each machine is provided by which layer in an OSI reference model?
a) Physical layer
b) Data Link Layer
c) Network Layer
d) Transport Layer
e) None of the above
38. Choose the Protocols working in the Data Link Control Layer of OSI model below.
a) ATM (Asynchronous Transfer Mode), Frame Relay
b) HDLC (High-Level Data Link Control), SDLC (Synchronous Data Link Control)
c) ARP (Address Resolution Protocol), IEEE-802.3
d) All the above
e) None of the above
41. What is the meaning of Carrier Sense in CSMA (Carrier Sense Multiple Access)?
a) The ability to check the shared transmission medium whether it is being used by any other
node or not
b) The ability to restrict other nodes to access the shared medium
c) The ability to gain access to the shared medium
d) None of the Above
e) All of the Above
42. What happens in an Ethernet network implementing CSMA-CD when a collision is detected?
a) The station retransmits the frame again immediately
b) The station retransmits the lost frames after a delay
c) The station retransmits the all frames after a delay
d) The station aborts the whole transmission of data
e) None of the Above
48. An Aloha network uses an 18.2 kbps channel for sending message packets of 100 bits long
size. Calculate the maximum throughput.
a) 5999
b) 6900
c) 6027
d) 5027
e) None of the Above
49. On a simplex data link, which of the following is a possible error recovery technique?
a) Statistical TDM makes efficient use of the bandwidth only if the arrival pattern of the data
stream is probabilistic.
b) TDM requires the transmitter and receiver to be synchronized periodically.
c) Both A & B
d) Statistical TDM is efficient if the data stream is deterministic.
e) None of the Above
a) 1.89
b) 17.99
c) 18.999
d) 18.4
e) None of the Above
52. What is the size of the sender window in the Go Back N (ARQ) protocol?
a) 0
b) 1
c) 10
d) n
e) None of the Above
a) N = N / (2a + 2a)
b) N = N / (1 + 2a)
c) N = N * (2a + 2a)
d) N = N * (1 + 2a)
e) None of the Above
a) Physical address
b) Logical address
c) Source address
d) Destination address
e) None of the Above
55. Which among the following represents the objectives/requirements of Data Link Layer?
a) Frame Synchronization
b) Error & Flow Control
c) Both a & b
d) None of the above
e) Segmentation & Reassembly
56. When does the station B send a positive acknowledgement (ACK) to station A in Stop and
Wait protocol?
57. Which consequences are more likely to occur during the frame transmission in Stop -and-
Wait ARQ mechanism?
58. Which ARQ mechanism deals with the transmission of only damaged or lost frames despite
the other multiple frames by increasing the efficiency & its utility in noisy channels?
a) Go-Back-N ARQ
b) Selective Repeat ARQ
c) Stop-and-Wait ARQ
d) All of the above
e) None of the above
59. Which category of HDLC frames undergoes error and flow control mechanisms by
comprising send and receive sequence numbers?
a) U-frames
b) I-frames
c) S-frames
d) All of the above
e) None of the above
60. What are the frames issued by the secondary station of HDLC, known as?
a) Link
b) Command
c) Response
d) None of the above
e) All of the above
61. A packet used for the transmission purpose is basically a combination of __________
a. group of bits
b. source & destination addresses
c. routing table
d. option b and c
e. none of the above
68. A subset of a network that includes all the routers but contains no loops is called ________
a. spanning tree
b. spider structure
c. spider tree
d. special tree
e. none of the above
69. Which of the following algorithm(s) is/are not used for congestion control?
a. traffic aware routing
b. admission control
c. load shedding
d. distance vector
e. link state
70. The ability of a single network to span multiple physical networks is known as ______
a. Subnetting
b. Masking
c. Fragmenting
d. Hopping
e. None of the above
73. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the
data field is 400 bytes?
a. 428
b. 407
c. 107
d. 427
e. none of the above
75. The TTL field has value 10. How many routers (max) can process this datagram?
a. 11
b. 5
c. 10
d. 1
e. 9
76. In IPv6, the _______ field in the base header restricts the lifetime of a datagram
a. version
b. next-header
c. hop limit
d. neighbor-advertisement
e. none of the above
79. In IPv4, class _______ has the greatest number of addresses in each block
a. A
b. B
c. C
d. D
e. none of the above
a. A- 4, B- 3, C- 2, D- 1
b. A- 2, B- 4, C- 1, D- 3
c. A- 3, B- 4, C- 1, D- 2
d. A- 1, B- 2, C- 3, D- 4
e. A- 4, B- 2, C- 3, D- 4
a. Nature of an entity
b. Size of an entity
c. Number of addresses
d. Availability of the address space
e. None of the above
87. In ________, each node maintains a vector (table) of minimum distances to every node.
a. path vector
b. distance vector
c. link state
d. flooding
e. None of the above
88. In distance vector routing, each node periodically shares its routing table with _________
and whenever there is a change.
a. every other node
b. its immediate neighbors
c. one neighbor
d. any two neighbors
e. None of the above
89. The Routing Information Protocol (RIP) is an intradomain routing based on _________
routing.
a. distance vector
b. link state
c. path vector
d. flooding
e. None of the above
90. The _________ routing uses the Dijkstra algorithm to build a routing table.
a. distance vector
b. link state
c. flooding
d. path vector
e. None of the above
91. Transport layer aggregates data from different applications into a single stream before
passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
e) None of the above
92. Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
e) None of the above
97. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
e) None of the above
101. The most important and common protocols associated TCP/IP internetwork layer are.
i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP)
iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP)
v) Address Resolution Protocol (ARP)
a) i, ii, iii, and iv only
b) ii, iii, iv and v only
c) i, iii, iv and v only
d) All i, ii, iii, iv and v only
e) None of the above
102. ........... is responsible for converting the higher-level protocol addresses to physical Network
Addresses.
a) Address Resolution Protocol (ARP)
b) Reverse Address Resolution Protocol (RARP)
c) Bootstrap Protocol (BOOTP)
d) Internet Control Message Protocol (ICMP)
e) None of the above
103. Which of the following is not a mechanism that DHCP supports for IP address allocation?
a) Automatic allocation
b) Static allocation
c) Dynamic allocation
d) Manual allocation
e) None of the above
104. Which mode of IPsec should you use to assure the security and confidentiality of data
within the same LAN?
a) AH transport mode
b) ESP transport mode
c) ESP tunnel mode
d) AH tunnel mode
e) None of the above
105. Which two types of encryption protocols can be used to secure the authentication of
computers using IPsec?
a) Kerberos V5
b) SHA
c) MD5
d) Both SHA and MD5
e) None of the above
106. Which two types of IPsec can be used to secure communications between two LANs?
a) AH tunnel mode
b) ESP tunnel mode
c) Both AH tunnel mode and ESP tunnel mode
d) ESP transport mode
e) None of the above
111. In computer security _______ means that computer system assets can be modified only by
authorized parities.
a) confidentiality
b) integrity
c) availability
d) authenticity
e) None of the above
114. The primary goal of the ...................... protocol is to provide a private channel between
communicating application, which ensures privacy of data authentication of the partners, and
integrity.
a) SSL
b) ESP
c) TSL
d) PSL
e) None of the above
115. The ................is used to provide integrity check, authentication and encryption to IP
datagram.
a) SSL
b) ESP
c) TSL
d) PSL
e) None of the above
118. At the lower layer of SSL, a protocol for transferring data using a variety of predefined
cipher and authentication combinations called the ……………….
a) SSL handshake protocol
b) SSL authentication protocol
c) SSL record protocol
d) SSL cipher protocol
e) None of the above
119. While initiating SSL session, the client code recognizes the SSL request and establishes a
connection through TCP Part ................. to the SSL code on the server.
a) 420
b) 1032
c) 443
d) 322
e) None of the above
120. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption
keys, called the …………………
a) SSL handshake protocol
b) SSL authentication protocol
c) SSL record protocol
d) SSL cipher protocol
e) None of the above
126. Which of the following layers is an addition to OSI model when compared with TCP IP
model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
e) None of the mentioned
130. Which one of the following is an internet standard protocol for managing devices on IP
network?
a) dynamic host configuration protocol
b) simple network management protocol
c) internet message access protocol
d) media gateway protocol
e) None of the mentioned
131. When displaying a web page, the application layer uses the _____________
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
e) None of the mentioned
132. Which one of the following allows a user at one site to establish a connection to another site
and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) TCP
e) None of these
133. Which one of the following protocols delivers/stores mail to receiver server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
e) None of these
135. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
e) None of these
140. When the mail server sends mail to other mail servers it becomes ____________
a) SMTP server
b) SMTP client
c) Peer
d) Master
e) None of these
141. If you have to send multimedia data over SMTP it has to be encoded into _______
a) Binary
b) Signal
c) ASCII
d) Hash
e) None of these
146. When the sender and the receiver of an email are on different systems, we need only
_________
a) One MTA
b) Two UAs
c) Two UAs and one MTA
d) Two UAs and two MTAs
e) None of these
149. Identify the correct order in which the following actions take place in an interaction
between a web browser and a web server.
The web browser requests a webpage using HTTP.
The web browser establishes a TCP connection with the web server.
The web server sends the requested webpage using HTTP.
The web browser resolves the domain name using DNS.
A)4,2,1,3
B)1,2,3,4
C)4,1,2,3
D)2,4,1,3
e) None of these
150. Which phase/s of POP3 allow/s a user agent to retrieve the messages as well as to mark the
messages for deletion purpose?
a. Authorization Phase
b. Transaction Phase
c. Update Phase
d. All of the above
e) None of these
Answers:
1. B
2. A
3. D
4. A
5. A
6. A
7. A
8. D
9. D
10. B
11. C
12. D
13. A
14. D
15. C
16. D
17. C
18. D
19. A
20. D
21. B
22. A
23. B
24. B
25. B
26. A, B
27. B, C
28. C, D
29. A, D
30. A, B, C
31. C
32. D
33. C
34. D
35. D
36. C
37. B
38. D
39. B
40. C
41. A
42. B
43. D
44. D
45. A
46. D
47. A
48. C
49. B
50. C
51. D
52. D
53. B
54. A
55.C
56. A
57. C
58. B
59. C
60. C
61. A, B
62. D
63. C
64. B, D
65. B
66. C
67. A
68. A
69. D, E
70. A
71. A, B
72. A
73. A
74. D
75. C
76. C
77. D
78. B
79. A
80. B
81. D
82. C
83. A, B
84. D
85. A, B
86. B
87. B
88. B
89. A
90. B
91. A
92. C
93. A
94. D
95. A
96. B
97. A
98. A
99. B
100. A
101. D
102. A
103. B
104. B
105. D
106. C
107. A
108. C
109. A
110. D
111. B
112. C
113. B
114. A
115. B
116. C
117. A
118. C
119. C
120. A
121. D
122. D
123. D
124. D
125. A
126. D
127. A
128. D
129. D
130. B
131. A
132. C
133. A
134. B
135. A
136. C
137. B
138. B
139. A
140. B
141. C
142. A
143. B
144. A
145. A
146. D
147. D
148. C
149. A
150. B