0% found this document useful (0 votes)
126 views

Computer Network MCQ Questions

Uploaded by

27Preeti Desai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views

Computer Network MCQ Questions

Uploaded by

27Preeti Desai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

Computer Network GATE Questions with

Solutions
From The Computer Network Topic of the GATE CSE Question Paper

MCQ – Single Answer Computer Networks GATE Questions

1) What is the protocol data unit (PDU) for the application layer in the
Internet stack?

a. Frame

b. Datagram

c. Segment

d. Message

2) Which among this is not a client-server application?

a. Ping

b. Web-browsing

c. Internet Chat

d. Email

3) If an Internet Service Provider (ISP) has the following chunk of CIDR-


based IP addresses available with it:245.248.128.0/20 and the ISP wants
to give half of this chunk of address to Organization A, and a quarter to
Organization B, while retaining the remaining with itself. Then, which
among the following is a valid allocation of addresses to A and B?

a. 245.248.132.0/22 and 245.248.132.0/21

b. 245.248.136.0/21 and 245.248.128.0/22

c. 245.248.128.0/21 and 245.248.128.0/22

d. 245.248.136.0/22 and 245.248.132.0/21


4) The pairs of OSI protocol layer/sub-layer and its functionality are
given below, the INCORRECT pair from among these are:

a. Data Link Layer and Bit synchronization


b. Network Layer and Routing
c. Medium Access Control sub-layer and Channel sharing
d. Transport Layer and End-to-end process communication

5) A firewall is installed at the point where the secure internal network


and untrusted external network meet, which is also known as______

a. Secure point
b. Meeting point
c. Chock point
d. Firewall point
6) What does DHCP stand for?

a. Dynamic Host Configuration Protocol


b. Dynamic Host Configuration Provider
c. Digital Host Communication Provider
d. Digital Host Communication Protocol

7) The growth of congestion window occurs_____

a. Infinitely
b. Up to timeout
c. Up to threshold
d. Up to the size of receiver’s window

8) When was Aloha developed?

a. In 1990
b. In 1980
c. In 1970
d. In 1960
9) Which of these is a Transmission media that can be used in LAN?

a. fibre optics
b. coaxial cable
c. microwave
d. satellite

10) Which of these protocols given below uses UDP as transport protocol?

a. DNS
b. Telnet
c. HTTP
d. SMTP

11) LANs can be connected by a device known as ______

a. Ethernet card
b. Modems
c. Routers
d. Bridges

12) What is the bit rate In Ethernet when Manchester encoding is used?

a. Same as the baud rate


b. Twice the baud rate
c. Half the baud rate
d. None of these

13) What is slot time for gigabit Ethernet?

a. 0.612
b. 0.512
c. 0.412
d. 0.312

14) Radio waves are _____

a. directional
b. bidirectional
c. omnidirectional
d. unidirectional

15) The term that refers to the shortest unit and carries data elements
is______

a. Single element
b. Data carrier
c. Signal element
d. Both b and c

16) Which architecture is FTP built on?

a. P2P
b. Client-server
c. Both the above
d. None of these

17) What is the address resolution protocol (ARP) used for?

a. Finding the IP address of the default gateway


b. Finding the MAC address that corresponds to an IP address
c. Finding the IP address that corresponds to a MAC address
d. Finding the IP address from the DNS

18) Which of the following are not true characteristics of NetBEUI?

a. Fast for small networks to Self-tuning


b. Little configuration required
c. Routable
d. Highly customizable

19) Identify the correct option for the given assertion and reason

Assertion: In IEEE 802.3 is not suitable for client server application

Reason: In Ethernet, there is a restriction on minimum size.

a. Assertion and Reason, both are true

b. Assertion and reason are false

c. Assertion is true and reason is false

d. Assertion and reason are true, but this is not the correct reason for the
given assertion

20) Consider that a computer on a 10Mbps network is regulated by a


token bucket. The token bucket is filled at a rate of 2Mbps. It is initially
filled to capacity with 16 Megabits. What is the maximum duration for
which the computer can transmit at the full 10Mbps?
a. 8 seconds
b. 5 seconds
c. 2 seconds
d. 1.6 seconds
21) In Unicast Routing, we use shortest path tree method for finding
shortest path of the______

a. Nodes
b. Networks
c. Packets
d. Frames

22) Which is the network that provides high speed connectivity?

a. Internetwork
b. WAN
c. LAN
d. MAN
23) What is the maximum number of subnets and the maximum number
of hosts in each subnet, if the address of a class B host is to be split into
subnets with a 6-bit subnet number?

a. 64 subnets and 262142 hosts

b.62 subnets and 262142 hosts

c. 64 subnets and 1024 hosts

d. 62 subnets and 1022 hosts

24) Which of the following statements about HTTP are false?

a. HTTP describe the structure of web page


b. HTTP run over TCP
c. HTTP can be used to test the validity of hyper link test
d. HTTP allows information to be stored in url
25) What is an anticipated result from multi programming operations?

a. Handling of more jobs


b. Reduced computer idle time
c. Better scheduling of work
d. All of the above

26) What is the Network, in which every computer is capable of playing


the role of client, server or both at the same time?

a. dedicated server network


b. local area network
c. wide area network
d. peer-to-peer network

27) Match the following:

(P) SMTP (1) Application layer

(Q) BGP (2) Transport layer

(R) TCP (3) Data link layer

(S) PPP (4) Network layer

(5) Physical layer

(a) P – 2 Q – 1 R – 3 S – 5

(b) P – 1 Q – 4 R – 2 S – 5

(c) P – 1 Q – 4 R – 2 S – 3

(d) P – 2 Q – 4 R – 1 S – 3

28) If a CSMA/CD network that transmits data at a rate of 100 Mbps


(108 bits second) over a 1 km(kilometer) cable with no repeaters and the
minimum frame size required for this network is 1250 bytes, what is the
signal speed (km/sec) in the cable?

a. 16000
b. 20000
c. 10000
d. 8000

29) One of the header fields in an IP datagram is the Time to Live (TTL)
field. Which of these below given statements best explains the need for
this field?

(a) It can be used to reduce delays

(b) It can be used to optimize throughput

(c) It can be used to prioritize packets

(d) It can be used to prevent packet looping

30) A and B are the only two stations on an Ethernet. Each has a steady
queue of frames to send. Both A and B attempt to transmit a frame,
collide, and A wins the first back off race. At the end of this successful
transmission by A, both A and B attempt to transmit and collide. The
probability that A wins the second back off race is_____

a. 0.625
b. 0.75
c. 0.5
d. 1.0

31) In a packet switching network, packets are routed from source to


destination along a single path having two intermediate nodes. If the
message size is 24 bytes and each packet contains a header of 3 bytes,
then what is the optimum packet size?

a. 4
b. 6
c. 7
d. 9

32) Station B needs to send a message consisting of 9 packets to Station


C using a sliding window (window size 3) and go-back-n error control
strategy. All packets are ready and immediately available for
transmission. If every 5th packet that B transmits gets lost (but no acks
from C ever get lost), then what is the number of packets that B will
transmit for sending the message to C?
a. 14
b. 16
c. 12
d. 18
33) Which of the following assertions about the Internet Protocol (IP) is
False?

a. IP Packets from the same source to the same destination can take different
routes in the network
b. The packet source cannot set the route of an ongoing packets; the route is only
determined by the routing tables in the routers on the way
c. IP ensures that a packet is discarded if it is unable to reach its destination
within a given number of hops
d. It is possible for a computer to have multiple IP addresses

34) For an organization that has a class B network and wishes to form
subnets for 64 departments, what will the subnet mask be?

a. 255.255.64.0
b. 255.255.64.0
c. 255.255.128.0
d. 255.255.252.0

35) The message 11001001 is to be transmitted using the CRC polynomial


x^3 + 1 to protect it from errors. The message that should be transmitted
is______

a. 11001001011

b. 11001001000

c. 110010010011

d. 11001010

36) If two computers C1 and C2 are configured as follows and C1 has IP


address 203.197.2.53 and netmask 255.255.128.0, while C2 has IP address
203.197.75.201 and netmask 255.255.192.0, then which of the following
statements is true?

a. C2 assumes C1 is on the same network, but C1 assumes C2 is on a different


network
b. C1 assumes C2 is on the same network, but C2 assumes C1 is on a different
network
c. C1 and C2 both assume they are on different networks
d. C1 and C2 both assume they are on the same networks

37) Look at these three statements about link state and distance vector
routing protocols, for a large network with 500 network nodes and 4000
links

 [S1] The computational overhead in link state protocols is higher than in


distance vector protocols.
 [S2] A distance vector protocol (with split horizon) avoids persistent routing
loops, but not a link state protocol.
 [S3] After a topology change, a link state protocol will converge faster than a
distance vector protocol.

Which one of the following is correct about S1, S2, and S3?

a. S1, S2, and S3 are all false


b. S1, S2, and S3 are all true
c. S1 and S2 are true, but S3 is false
d. S1 and S3 are true, but S2 is false
38) Which of these functionalities should be implemented by a transport
protocol over and above the network protocol?

a. Detection of duplicate packets


b. End to end connectivity
c. Packet delivery in the correct order
d. Recovery from packet losses
39) If the length of a Broadcast LAN is 2 Km and it has 107 bps bandwidth
and uses CSMA/CD and the signal travels along the wire at 2108m/s, then
what is the minimum size of the packet?

a. 100 bytes
b. 200 bytes
c. 50 bytes
d. None of these

40) Which is one of the pairs of protocols given below from both the
protocols that can use multiple TCP connections between the same
client and the server?
a. HTTP, TELNET
b. HTTP, SMTP
c. FTP, SMTP
d. HTTP, FTP
41) What is the number of 8-bit characters that can be transmitted per
second over a 9600 baud serial communication link that use
asynchronous mode of transmission with 8 data bits, one start bit and
one parity bit?

a. 800
b. 600
c. 876
d. 1200

42) In the starting phase of TCP congestion control algorithm size of


congestion control window______

a. Increase Linearly
b. Does not increase
c. Increase exponentially
d. Increase
43) If a sender is employing public key Cryptography to send a secret
message to a receiver, which one of the following statements is true?

a. Sender encrypts using his own public key


b. Receiver decrypts using his own public key
c. Sender encrypts using receiver’s public key
d. Receiver decrypts using sender’s public key
44) If everyone in a group of N people want to communicate secretly with
the N – 1 others using symmetric key cryptographic system and the
communication between any two persons should not be decodable by
the others in the group, then what is the number of keys required in the
system as a whole to satisfy the confidentiality requirement?

a. N(N-1)
b. N(N-1) / 2
c. 2N
d. (N-1)2
45) Internetwork is made of five networks. Which are those?

a. Four LANs and One MAN


b. Four LANs and One WAN
c. Three LANs and Two WAN
d. Four MANs and One WAN

46) This is one of two protocols that let a network administrator


supervise and distribute IP addresses from a central point. It
automatically sends a new IP address when a computer is plugged into a
different place in the network.

a. UDP
b. TCP
c. TCPMAN
d. DHCP
47) A sender B sends a message m to receiver A, which is digitally signed
by B with its private key. In this scenario, one or more of the following
security violations can take place.

I. B can launch a birthday attack to replace m with a fraudulent message

II. A third party attacker can launch a birthday attack to replace m with a
fraudulent message

III. A can launch a birthday attack to replace m with a fraudulent


message

Which of the following are possible security violations?

a. I only
b. II only
c. II and III only
d. I and II only
48) Take the example of 1 Mbps error-free line, with the maximum frame
size of 1000 bits and new packets generated about 1 second apart .
Timeout interval is 10 m/sec if the special acknowledgement timer were
eliminated, unnecessary timeout would occur . In the scenario, how any
times average msg would have been transmitted?

a. Twice
b. Only once
c. Thrice
d. None of the above

49) _______ has the responsibility for Accounting functions.

a. Transport layer
b. Data link layer
c. Data layer
d. Network layer

50) In a class C address, if 3 bits are borrowed for subnetting of host ID


part, the total possible number of subnet masks are
_________________.

Geeks for Geeks


Consider a network using the pure ALOHA medium access control protocol,
where each frame is of length 1,000 bits. The channel transmission rate is 1
Mbps (=106 bits per second). The aggregate number of transmissions
across all the nodes (including new frame transmissions and
retransmitted frames due to collisions) is modelled as a Poisson process
with a rate of 1,000 frames per second. Throughput is defined as the
average number of frames successfully transmitted per second. The
throughput of the network (rounded to the nearest integer) is
______________ .

 130 to 140

 140 to 150

 120 to 130

 100 to 110

Discuss it

Question 2
Consider the cyclic redundancy check (CRC) based error detecting
scheme having the generator polynomial X3+X+1. Suppose the message
m4m3m2m1m0 = 11000 is to be transmitted. Check bits c2c1c0 are appended
at the end of the message by the transmitter using the above CRC
scheme. The transmitted bit string is denoted by m4m3m2m1m0c2c1c0. The
value of the checkbit sequence c2c1c0 is

 101

 110

 100

 111

Discuss it

Question 3

Consider a link with packet loss probability of 0.2. What is the expected
number of transmissions it would take to transfer 200 packets given that
the stop and wait protocol is used?

 125

 250

 225

 150

Discuss it

Question 4

Assume that Source S and Destination D are connected through an


intermediate router R. How many times a packet has to visit the network
layer and data link layer during a transmission from S to D?

 Network layer – 4 times, Data link layer – 4 times

 Network layer – 4 times, Data link layer – 6 times

 Network layer – 2 times, Data link layer – 4 times


 Network layer – 3 times, Data link layer – 4 times

Discuss it

Question 5

An Ethernet frame that is less than the IEEE 802.3 minimum length of 64
octets is called

 Short frame

 Small frame

 Mini frame

 Runt frame

Discuss it

Question 6

Which of the following protocols is an application layer protocol that


establishes, manages and terminates multimedia sessions ?

 Session Maintenance Protocol

 Real - time Streaming Protocol

 Real - time Transport Control Protocol

 Session Initiation Protocol

Discuss it

Question 7

What is the size of the ‘total length’ field in IPv4 datagram?

 4 bit

 8 bit

 16 bit

 32 bit
Discuss it

Question 8

A packet filtering firewall can

 deny certain users from accessing a service

 block worms and viruses from entering the network

 disallow some files from being accessed through FTP

 block some hosts from accessing the network

Discuss it

Question 9

Consider the set of activities related to e-mail A : Send an e-mail from a


mail client to mail server B : Download e-mail headers from mail box and
retrieve mails from server to a cache C : Checking e-mail through a web
browser The application level protocol used for each activity in the same
sequence is

 SMTP, HTTPS, IMAP

 SMTP, POP, IMAP

 SMTP, IMAP, HTTPS

 SMTP, IMAP, POP

Discuss it

Question 10

What is one advantage of setting up a DMZ(Demilitarized Zone) with two


firewalls?

 You can control where traffic goes in the three networks

 You can do stateful packet filtering

 You can do load balancing


 Improve network performance

Discuss it

The protocol data unit (PDU) for the application layer in the Internet stack is

 Segment

 Datagram

 Message

 Frame

Discuss it

Question 12

What is the maximum size of data that the application layer can pass on to
the TCP layer below?

 A

 B

 C

 D

Discuss it

Question 13
Match the following:

 (1)

 (2)

 (3)

 (4)

Discuss it

Question 14

A TCP server application is programmed to listen on port number P on host


S. A TCP client is connected to the TCP server over the network. Consider
that while the TCP connection was active, the server machine S crashed
and rebooted. Assume that the client does not use the TCP keepalive timer.
Which of the following behaviors is/are possible?

 If the client was waiting to receive a packet, it may wait indefinitely

 The TCP server application on S can listen on P after reboot

 If the client sends a packet after the server reboot, it will receive a RST
segment

 If the client sends a packet after the server reboot, it will receive a FIN
segment
Discuss it

Question 15

SSL is not responsible for

 Mutual authentication of client & server

 Secret communication

 Data Integrity protection

 Error detection and correction

Discuss it

Question 16

Silly Window Syndrome is related to

 Error during transmission

 File transfer protocol

 Degrade in TCP performance

 Interface problem

Discuss it

Question 17

Which of the following control fields in TCP header is used to specify


whether the sender has no more data to transmit?

 FIN

 RST

 SYN

 PSH

Discuss it

Question 18
Four channels are multiplexed using TDM. If each channel sends 100
bytes/second and we multiplex 1 byte per channel, then the bit rate for the
link is __________.

 400 bps

 800 bps

 1600 bps

 3200 bps

Discuss it

Question 19

Optical fiber uses reflection to guide light through a channel, in which


angle of incidence is ________ the critical angle.

 equal to

 less than

 greater than

 less than or equal to

Discuss it

Question 20

Assume that source S and destination D are connected through two


intermediate routers labeled R. Determine how many times each packet
has to visit the network layer and the data link layer during a transmission
from S to D.

 Network layer – 4 times and Data link layer – 4 times

 Network layer – 4 times and Data link layer – 3 times


 Network layer – 4 times and Data link layer – 6 times

 Network layer – 2 times and Data link layer – 6 times

Question 21

Consider a source computer(S) transmitting a file of size 106 bits to a


destination computer(D)over a network of two routers (R1 and R2) and three
links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to R2; and L3 connects
R2 to D.Let each link be of length 100 km. Assume signals travel over each
link at a speed of 108 meters per second.Assume that the link bandwidth on
each link is 1Mbps. Let the file be broken down into 1000 packets each of
size 1000 bits. Find the total sum of transmission and propagation delays in
transmitting the file from S to D?

1005 ms

1010 ms

3000 ms

3003 ms

Discuss it

Question 21 ‒ Explanation

See http://www.geeksforgeeks.org/computer-networks-set-2/

Question 22
Consider a network with five nodes, N1 to N5, as shown

below. The network uses a Distance


Vector Routing protocol. Once the routes have stabilized, the distance
vectors at different nodes are as following. N1: (0, 1, 7, 8, 4) N2: (1, 0, 6, 7, 3)
N3: (7, 6, 0, 2, 6) N4: (8, 7, 2, 0, 4) N5: (4, 3, 6, 4, 0) Each distance vector is the
distance of the best known path at the instance to nodes, N1 to N5, where
the distance to itself is 0. Also, all links are symmetric and the cost is
identical in both directions. In each round, all nodes exchange their
distance vectors with their respective neighbors. Then all nodes update
their distance vectors. In between two rounds, any change in cost of a link
will cause the two incident nodes to change only that entry in their
distance vectors. 52. The cost of link N2-N3 reduces to 2(in both directions).
After the next round of updates, what will be the new distance vector at
node, N3.

 (3, 2, 0, 2, 5)

 (3, 2, 0, 2, 6)

 (7, 2, 0, 2, 5)

 (7, 2, 0, 2, 6)

Discuss it

Question 23

Consider the data given in above question. Suppose the weights of all
unused links in the previous question are changed to 2 and the distance
vector algorithm is used again until all routing tables stabilize. How many
links will now remain unused?

 0

 1

 2

 3

Discuss it

Question 24

Classless Inter-domain Routing (CIDR) receives a packet with address


131.23.151.76. The router’s routing table has the following entries:

Prefix Output Interface Identifier

131.16.0.0/12 3

131.28.0.0/14 5

131.19.0.0/16 2

131.22.0.0/15 1

The identifier of the output interface on which this packet will be forwarded
is ______.

 1

 2

 3

 5

Discuss it

Question 25
Two computers C1 and C2 are configured as follows. C1 has IP address
203.197.2.53 and netmask 255.255.128.0. C2 has IP address 203.197.75.201
and netmask 255.255.192.0. which one of the following statements is true?

 C1 and C2 both assume they are on the same network

 C2 assumes C1 is on same network, but C1 assumes C2 is on a


different network

 C1 assumes C2 is on same network, but C2 assumes C1 is on a


different network

 C1 and C2 both assume they are on different networks.

Discuss it

Question 26

A Trojan horse is

 A program that performs a legitimate function that is known to an


operating system or its user and also has a hidden component that
can be used for nefarious purposes like attacks on message security
or impersonation.

 A piece of code that can attach itself to other programs in the


system and spread to other systems when programs are copied or
transferred.

 A program that spreads to other computer systems by exploiting


security holes like weaknesses in facilities for creation of remote
processes

 All of the above

Discuss it

Question 27

In cryptography, the following uses transposition ciphers and the keyword


is LAYER. Encrypt the following message. (Spaces are omitted during
encryption) WELCOME TO NETWORK SECURITY !
 WMEKREETSILTWETCOOCYONRU!

 EETSICOOCYWMEKRONRU!LTWET

 LTWETONRU!WMEKRCOOCYEETSI

 ONRU!COOCYLTWETEETSIWMEKR

Discuss it

Question 28

The minimum positive integer p such that 3p modulo 17 = 1 is

 5

 8

 12

 16

Discuss it

Question 29

SHA-1 is a

 encryption algorithm

 decryption algorithm

 key exchange algorithm

 message digest function

Discuss it

Question 30

If there are N people in the world and are using secret key
encryption/decryption for privacy purpose, then number of secret keys
required will be:

 N
 (N - 1)

 N (N - 1) / 2

 N (N + 1) / 2

Using public key cryptography, X adds a digital signature σ to a message


M, encrypts (M,σ) and sends it to Y, where it is decrypted. Which one of the
following sequence of keys is used for operations?

 Encryption : X’s private key followed by Y’s private key. Decryption : X’s
public key followed by Y’s public key.

 Encryption : X’s private key followed by Y’s public key; Decryption : X’s
public key followed by Y’s private key

 Encryption : X’s private key followed by Y’s public key; Decryption : Y’s
private key followed by X’s public key.

 Encryption : X’s public key followed by Y’s private key; Decryption : Y’s
public key followed by X’s private key.

Discuss it

Question 32

Anarkali digitally signs a message and sends it to Salim. Verification of the


signature by Salim requires

 Anarkali’s public key.

 Salim’s public key.

 Salim’s private key.

 Anarkali’s private key.

Discuss it

Question 33

Suppose that everyone in a group of N people wants to communicate


secretly with the N–1 others using symmetric key cryptographic system.
The communication between any two persons should not be decodable by
the others in the group. The number of keys required in the system as a
whole to satisfy the confidentiality requirement is

 2N

 N(N – 1)

 N(N – 1)/2

 (N – 1)2

Discuss it

Question 34

How many bytes of data can be sent in 15 seconds over a serial link with
baud rate of 9600 in asynchronous mode with odd parity and two stop bits
in the frame?

 10,000 bytes

 12,000 bytes

 15,000 bytes

 27,000 bytes

Discuss it

Question 35

A firewall is to be configured to allow hosts in a private network to freely


open TCP connections and send packets on open connections. However, it
will only allow external hosts to send packets on existing open TCP
connections or connections that are being opened (by internal hosts) but
not allow them to open TCP connections to hosts in the private network. To
achieve this the minimum capability of the firewall should be that of

 A combinational circuit

 A finite automaton

 A pushdown automaton with one stack


 A pushdown automaton with two stacks

Discuss it

Question 36

An email contains a textual birthday greeting, a picture of a cake and a


song. The order is not important. What is the content-type?

 Multipart/mixed

 Multipart/parallel

 Multipart/digest

 Multipart/alternative

Discuss it

Question 37

Phase transition for each bit are used in

 Amplitude modulation

 Carrier modulation

 Manchester encoding

 NRZ encoding

Discuss it

Question 38

In networking, UTP stands for

 Unshielded T-connector port

 Unshielded twisted pair

 Unshielded terminating pair

 Unshielded transmission process

Discuss it
Question 39

Data is transmitted continuously at 2.048 Mbps rate for 10 hours and


received 512 bits errors. What is the bit error rate?

 6.9 e-9

 6.9 e-6

 69 e-9

 4 e-9

Discuss it

Question 40

The IEEE standard for WiMax technology is

 IEEE 802.16

 IEEE 802.36

 IEEE 812.16

 IEEE 806.16

Discuss it

Question 41

A T-switch is used to

 Control how messages are passed between computers

 Echo every character that is received

 Transmit characters one at a time

 Rearrange the connections between computing equipments

Discuss it

Question 42
Match the security protocols with the layers they are used in and choose
the correct code -

List−1List−2A.TLS1.PhysicalLayerB.WEP2.LinkLayerC.PGP3.NetworkLayerD.IPsec4
.TransportLayer5.ApplicationLayerList−1A.TLSB.WEPC.PGPD.IPsec
List−21.PhysicalLayer2.LinkLayer3.NetworkLayer4.TransportLayer5.Application
Layer

Codes-
ABCD(a)2513(b)5232(c)4253(d)5243 (a)(b)(c)(d)A2545B5222C1354D3233

 (d)

 (c)

 (b)

 (a)

Discuss it

Question 43

Range of IP Address from 224.0.0.0 to 239.255.255.255 are

 Reserved for loopback

 Reserved for broadcast

 Used for multicast packets


 Reserved for future addressing

Discuss it

Question 44

The network 198.78.41.0 is a

 Class A network

 Class B network

 Class C network

 Class D network

Discuss it

Question 45

What percentage(%) of the IPv4, IP address space do all class C addresses


consume?

 12.5%

 25%

 37.5%

 50%

Discuss it

Question 46

The default subnet mask for a class B network can be

 255.255.255.0

 255.0.0.0

 255.255.192.0

 255.255.0.0

Discuss it
Question 47

Consider the following routing table at an IP router

For each IP address in Group-I identify the correct choice of the next hop
from Group-II using the entries from the routing table above.

List-I List-II

A. 128.96.171.92 1. Interface 0

B. 128.96.167.151 2. Interface 1

C. 128.96.163.121 3. R2

D. 128.96.165.121 4. R3

5. R4

Codes:

ABCD

(a) 1 3 5 4

(b) 1 4 2 5

(c) 2 3 4 5

(d) 2 3 5 4

 a
 b

 c

 d

Discuss it

Question 48

In class B if subnet mask is 255.192.0.0 Total Number of networks than can


be joined

 32

 64

 16

 None of the Above

Discuss it

Question 49

If block contains 32 IP address which of the following is first address of the


block ?

 10.0.0.5

 10.0.0.16

 10.0.0.68

 10.0.0.160

Discuss it

Question 50

Which of the following IP address can be used in WAN?

 10.0.0.1

 172.16.0.10
 15.1.5.6

 None

Discuss it

Computer Network MCQ


1) Which of these is a standard interface for serial data transmission?

1. ASCII

2. RS232C

3. 2

4. Centronics

Show Answer Workspace

2) Which type of topology is best suited for large businesses which must
carefully control and coordinate the operation of distributed branch
outlets?

1. Ring

2. Local area

3. Hierarchical

4. Star

Show Answer Workspace

3) Which of the following transmission directions listed is not a legitimate


channel?

1. Simplex

2. Half Duplex
3. Full Duplex

4. Double Duplex

Show Answer Workspace

4) "Parity bits" are used for which of the following purposes?

1. Encryption of data

2. To transmit faster

3. To detect errors

4. To identify the user

Show Answer Workspace

5) What kind of transmission medium is most appropriate to carry data in


a computer network that is exposed to electrical interferences?

1. Unshielded twisted pair

2. Optical fiber

3. Coaxial cable

4. Microwave

Show Answer Workspace

6) A collection of hyperlinked documents on the internet forms the ?.?

1. World Wide Web (WWW)

2. E-mail system

3. Mailing list

4. Hypertext markup language


Show Answer Workspace

7) The location of a resource on the internet is given by its?

1. Protocol

2. URL

3. E-mail address

4. ICQ

Show Answer Workspace

8) The term HTTP stands for?

1. Hyper terminal tracing program

2. Hypertext tracing protocol

3. Hypertext transfer protocol

4. Hypertext transfer program

Show Answer Workspace

9) A proxy server is used as the computer?

1. with external access

2. acting as a backup

3. performing file handling

4. accessing user permissions

Show Answer Workspace


10) Which one of the following would breach the integrity of a system?

1. Looking the room to prevent theft

2. Full access rights for all users

3. Fitting the system with an anti-theft device

4. Protecting the device against willful or accidental damage

Show Answer Workspace

11) Which software prevents the external access to a system?

1. Firewall

2. Gateway

3. Router

4. Virus checker

Show Answer Workspace

12) Which one of the following is a valid email address?

1. [email protected]

2. gmail.com

3. [email protected]

4. javatpoint@books

Show Answer Workspace

13) Which of the following best describes uploading information?

1. Sorting data on a disk drive


2. Sending information to a host computer

3. Receiving information from a host computer

4. Sorting data on a hard drive

Show Answer Workspace

14) Which one of the following is the most common internet protocol?

1. HTML

2. NetBEUI

3. TCP/IP

4. IPX/SPX

Show Answer Workspace

15) Software programs that allow you to legally copy files and give them
away at no cost are called which of the following?

1. Probe ware

2. Timeshare

3. Shareware

4. Public domain

Show Answer Workspace

16) The term FTP stands for?

1. File transfer program

2. File transmission protocol

3. File transfer protocol


4. File transfer protection

Show Answer Workspace

17) At what speed does tele-computed refer?

1. Interface speed

2. Cycles per second

3. Baud rate

4. Megabyte load

Show Answer Workspace

18) Which one of the following is not a network topology?

1. Star

2. Ring

3. Bus

4. Peer to Peer

Show Answer Workspace

19) The maximum length (in bytes) of an IPv4 datagram is?

1. 32

2. 1024

3. 65535

4. 512

Show Answer Workspace


20) Which of the following statements could be valid with respect to the
ICMP (Internet Control Message Protocol)?

1. It reports all errors which occur during transmission.

2. A redirect message is used when a router notices that a packet


seems to have been routed wrongly.

3. It informs routers when an incorrect path has been taken.

4. The "destination unreachable" type message is used when a router


cannot locate the destination.

Show Answer Workspace

21) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets.


Which of the following subnet masks can be used for the above
requirement?

1. 255.243.240

2. 255.255.0.0

3. 255.255.0

4. 255.255.255

Show Answer Workspace

22) When the mail server sends mail to other mail servers it becomes ___
?

1. SMTP client

2. SMTP server

3. Peer

4. Master
Show Answer Workspace

23) The length of an IPv6 address is?

1. 32 bits

2. 64 bits

3. 128 bits

4. 256 bits

Show Answer Workspace

24) Consider the following:

1. Twisted pair cables

2. Microwaves and Satellite Signals

3. Repeaters

4. Analog Transmissions

5. Fiber optics

Which of the above is consider as (a) signal transmission medium is data


communications?

1. (1) and (5)

2. (1) and (2)

3. (1) (2) and (5)

4. (1) (2) (3) and (5)

Show Answer Workspace

25) Which of the following address belongs class A?


1. 121.12.12.248

2. 130.12.12.248

3. 128.12.12.248

4. 129.12.12.248

Show Answer Workspace

26) Which of the following is correct IPv4 address?

1. 124.201.3.1.52

2. 01.200.128.123

3. 300.142.210.64

4. 10110011.32.16.8

5. 128.64.0.0

Show Answer Workspace

27) Which of the following IP addresses can be used as (a) loop-back


addresses?

1. 0.0.0.0

2. 127.0.0.1

3. 255.255.255.255

4. 0.255.255.255

Show Answer Workspace

28) The term WAN stands for?

1. Wide Area Net


2. Wide Access Network

3. Wide Area Network

4. Wide Access Net

Show Answer Workspace

29) Which of the following cannot be used as a medium for 802.3 ethernet?

1. A thin coaxial cable

2. A twisted pair cable

3. A microwave link

4. A fiber optical cable

Show Answer Workspace

30) What IP address class allocates 8 bits for the host identification part?

1. Class A

2. Class B

3. Class C

4. Class D

Show Answer Workspace

31) The term IANA stands for?

1. Internet Assigned Numbers Authority

2. Internal Assigned Numbers Authority

3. Internet Associative Numbers Authoritative


4. Internal Associative Numbers Authority

Show Answer Workspace

32) How many versions available of IP?

1. 6 version

2. 4 version

3. 2 version

4. 1 version

Show Answer Workspace

33) Which layer of the TCP / IP stack corresponds to the OSI model
transport layer?

1. Host to host

2. Application

3. Internet

4. Network Access

Show Answer Workspace

34) An Aloha network uses an 18.2 kbps channel for sending message
packets of 100 bits long size. Calculate the maximum throughput.

1. 5999

2. 6900

3. 6027

4. 5027
Show Answer Workspace

35) On a simplex data link, which of the following is a possible error


recovery technique?

1. Backward error correction (BEC)

2. The use of hamming codes

3. Automatic Repeat Request (ARQ)

4. Downward error correction (DEC)

Show Answer Workspace

36) Which of the statement is correct with regard to Time Division


Multiplexing (TDM) and its variants?

1. Statistical TDM makes efficient use of the bandwidth only if the arrival
pattern of the data stream is probabilistic.

2. TDM requires the transmitter and receiver to be synchronized


periodically.

3. TDM performs efficiently if the arrival pattern of the data stream is


probabilistic.

4. Statistical TDM is efficient if the data stream is deterministic.

Show Answer Workspace

37) The term IPv4 stands for?

1. Internet Protocol Version 4

2. Internet Programming Version 4

3. International Programming Version 4


4. None of these

Show Answer Workspace

38) The term LAN stands for?

1. Local Area Net

2. Local Aera Network

3. Local Array Network

4. Local Array Net

Show Answer Workspace

39) Which of the through is share the data of two computer?

1. Library

2. Network

3. Grouping

4. Integrated system

Show Answer Workspace

40) In specific, if the systems use separate protocols, which one of the
following devices is used to link two systems?

1. Repeater

2. Gateway

3. Bridge

4. Hub

Show Answer Workspace


41) How many digits of the Data Network Identification Code (DNIC) identify
the country?

1. first three

2. first four

3. first five

4. first six

5. None of the above

Show Answer Workspace

42) Which of the following methods is used to broadcast two packets on


the medium at a time?

1. Collision

2. Synchronous

3. Asynchronous

4. None of the above

Show Answer Workspace

43) Which of the following is true with regard to the ping command?

1. Ping stands for Packet Internet Generator.

2. The ping command checks the port level connectivity between


source destinations end points.

3. Ping summarizes the packet loss and round-trip delay between two
IP end points.

4. The ping command activates the RARP protocol of the IP layer.


Show Answer Workspace

44) The private key in asymmetric key cryptography is kept by?

1. Sender

2. Receiver

3. Sender and Receiver

4. None of the these

Show Answer Workspace

45) Which of the following algorithms is not used in asymmetric-key


cryptography?

1. RSA algorithm

2. Diffie-Hellman algorithm

3. Electronic code book algorithm

4. None of the mentioned

Show Answer Workspace

46) In the cryptography, the sequence of the letters is rearranged by?

1. Transposition ciphers

2. Substitution ciphers

3. Both a and b

4. None of these

Show Answer Workspace


47) What is the maximum efficiency of pure aloha at G = 1/2?

1. 1.89

2. 17.99

3. 18.999

4. 18.4

Show Answer Workspace

48) What is the maximum efficiency of slotted aloha at G = 1?

1. 36.8

2. 35.8

3. 35.5

4. 37.8

Show Answer Workspace

49) Which of the following statement is true about error detection


techniques used on communications link?

1. Cyclic Redundancy Check (CRC) sequence can detect as well as


correct errors.

2. Error detection cannot be used on simplex links.

3. Hamming code can detect up to 3-bit errors.

4. All of the these

Show Answer Workspace


50) The correct order of corresponding OSI layers for having functionalities
of routing and reconciling machine representation differences with shared
access resolution and ASCII test protocol is?

1. Network, Physical, Transport, Data link

2. Network, Physical, Data link, Application

3. Network, Presentation, Data link, Application

4. Network, Presentation, Physical, Transport

Show Answer Workspace

Computer Network MCQ Part 2


1) In which of the following switching methods, the message is divided into
small packets?

1. Message switching

2. Packet switching

3. Virtual switching

4. None of the these

Show Answer Workspace

2) Which of the following switch methods creates a point-to-point physical


connection between two or more computers?

1. Message switching

2. Packet switching

3. Circuit switching
4. None of the these

Show Answer Workspace

3) What is the second name of the proxy server?

1. Proxy tools

2. Application proxy

3. Application-level gateway

4. All of the these

Show Answer Workspace

4) Which of the following servers allows LAN users to share data?

1. Data server

2. Point server

3. File server

4. Communication server

Show Answer Workspace

5) What is the total vulnerable time value of pure Aloha?

1. Tfr

2. 1/2 Tfr

3. 2 * Tfr

4. 4 * Tfr

Show Answer Workspace


6) How many fields are in the SMDS packet?

1. Two

2. Three

3. Four

4. Five

Show Answer Workspace

7) What is the maximum data transfer rate of the optical fiber wire?

1. 50 kbps

2. 1000 kbps

3. 1000 Mbps

4. None of the these

Show Answer Workspace

8) POTS network works on the principle of ________

1. Telephone switching

2. Proxy server

3. File system

4. Circuit system

Show Answer Workspace

9) Which of the following protocols is the bit-oriented protocol?


1. SSL

2. http

3. HDLC

4. All of the these

Show Answer Workspace

10) SLIP stands for _______

1. System line internet protocol

2. Serial line internet protocol

3. Signal line internet protocol

4. Signal internet protocol

Show Answer Workspace

11) The second port is used to ____________ in the two-port network.

1. Input terminal

2. Output terminal

3. Signal terminal

4. Bandwidth terminal

Show Answer Workspace

12) Which of the following layers does the HTTP protocol work on?

1. Physical layer

2. Data-link layer
3. Application layer

4. None of the these

Show Answer Workspace

13) Which of the following statement correct about the cipher in


cryptography?

1. It is a method for performing encryption and decryption

2. It is used to establish the network connection

3. It is a message event

4. All of the these

Show Answer Workspace

14) SONET stands for ______________.

1. Signal Operation Network

2. Synchronous Optical Network

3. System Optical Network

4. Signal Optical Network

Show Answer Workspace

15) How many layers does the SONET contain?

1. 2 layers

2. 3 layers

3. 4 layers

4. 5 layers
Show Answer Workspace

16) RAKE receiver designed for _____.

1. Multipath fading

2. Signals

3. Data network

4. Network connection

Show Answer Workspace

17) What is the formula of high rate in zigzag code?

1. J / (J * 1)

2. -Z / (1 + J)

3. Z * (1 + J)

4. J / (J + 1)

Show Answer Workspace

18) What is the size of the sender window in the Go Back N (ARQ) protocol?

1. 0

2. 1

3. 10

4. n

Show Answer Workspace


19) What is the efficiency of the Go back N (ARQ) protocol?

1. N = N / (2a + 2a)

2. N = N / (1 + 2a)

3. N = N * (2a + 2a)

4. N = N * (1 + 2a)

Show Answer Workspace

20) What is the size of the destination port in the UDP protocol?

1. 8 bits

2. 16 bits

3. 20 bits

4. 32 bits

Show Answer Workspace

21) What network utility uses the time-To-Live (TTL) field in the IP header to
elicit ICMP error messages?

1. Ping

2. Route

3. Traceroute

4. Ifconfig

Show Answer Workspace

22) A client of the DNS (Domain Name System) application is called


_____.
1. DNS server

2. DNS Name

3. DNS resolver

4. DNS inquirer

Show Answer Workspace

23) How many characters consist of the entire hostname?

1. 511 characters

2. 255 characters

3. 127 characters

4. 31 characters

Show Answer Workspace

24) During normal IP packet forwarding by a router, which of the following


fields of the IP header is updated?

1. Repeater

2. Source address

3. Destination address

4. Checksum

Show Answer Workspace

25) Which of the following statements is correct about the DWDM?

1. It can transmit data at very high speeds

2. It can transmit data at very slow speeds


3. DWSM stands for digital wave division multiplexing

4. None of the these

Show Answer Workspace

26) MAC address is also called ______.

1. Physical address

2. Logical address

3. Source address

4. Destination address

Show Answer Workspace

27) Which of the following addresses is 32-bit?

1. MAC address

2. Virtual address

3. Source address

4. Destination address

Show Answer Workspace

28) EDI stands for ____.

1. Electronic Data Interchange

2. Electronic Digital Internet

3. Electronic Digital Interchange

4. Electronic Data Internet


Show Answer Workspace

29) What is the maximum data transfer rate of the ISDN?

1. 1024 Mbps

2. 64 Mbps

3. 64 kbps

4. 1024 kbps

Show Answer Workspace

30) ARPANET stands for _______.

1. Advanced Recheck Projects Agency Internet

2. Advanced Recheck Projects Agency Network

3. Advanced Research Projects Agency Network

4. Advanced Research Projects Agency Internet

Show Answer Workspace

31) What is the size of the UDP header?

1. 8 bytes

2. 16 bytes

3. 20 bytes

4. 64 bytes

Show Answer Workspace


32) Which of the following protocols is the connection-less protocol?

1. UDP

2. TCP

3. IP

4. All of the these

Show Answer Workspace

33) Wildcard domain name labels begin with a ______.

1. .

2. 0

3. @

4. *

5. #

Show Answer Workspace

34) What is the maximum length of the STP wire?

1. 20 ft

2. 50 ft

3. 50 meters

4. 100 meters

Show Answer Workspace

35) Which network is suitable for a building?


1. WAN

2. LAN

3. MAN

4. PAN

Show Answer Workspace

36) ________ is a 2G mobile telecommunications based on the CDMA.

1. IS-95

2. ISO 1990

3. IS-97

4. None of the these

Show Answer Workspace

37) Which of the following statements is correct about IRC?

1. It sends the messages in virtual time

2. It is an application layer protocol

3. It works on the proxy model

4. All of the these

Show Answer Workspace

38) Which of the following devices is not a networking device?

1. Hub

2. Switch
3. Bridge

4. None of the these

Show Answer Workspace

39) Which of the following devices does not require power to forward the
signals?

1. Active hub

2. Passive hub

3. Repeater

4. Bridge

Show Answer Workspace

40) How many pins does RJ-45 contain?

1. Two

2. Four

3. Eight

4. Ten

Show Answer Workspace

You might also like