Computer Network MCQ Questions
Computer Network MCQ Questions
Solutions
From The Computer Network Topic of the GATE CSE Question Paper
1) What is the protocol data unit (PDU) for the application layer in the
Internet stack?
a. Frame
b. Datagram
c. Segment
d. Message
a. Ping
b. Web-browsing
c. Internet Chat
d. Email
a. Secure point
b. Meeting point
c. Chock point
d. Firewall point
6) What does DHCP stand for?
a. Infinitely
b. Up to timeout
c. Up to threshold
d. Up to the size of receiver’s window
a. In 1990
b. In 1980
c. In 1970
d. In 1960
9) Which of these is a Transmission media that can be used in LAN?
a. fibre optics
b. coaxial cable
c. microwave
d. satellite
10) Which of these protocols given below uses UDP as transport protocol?
a. DNS
b. Telnet
c. HTTP
d. SMTP
a. Ethernet card
b. Modems
c. Routers
d. Bridges
12) What is the bit rate In Ethernet when Manchester encoding is used?
a. 0.612
b. 0.512
c. 0.412
d. 0.312
a. directional
b. bidirectional
c. omnidirectional
d. unidirectional
15) The term that refers to the shortest unit and carries data elements
is______
a. Single element
b. Data carrier
c. Signal element
d. Both b and c
a. P2P
b. Client-server
c. Both the above
d. None of these
19) Identify the correct option for the given assertion and reason
d. Assertion and reason are true, but this is not the correct reason for the
given assertion
a. Nodes
b. Networks
c. Packets
d. Frames
a. Internetwork
b. WAN
c. LAN
d. MAN
23) What is the maximum number of subnets and the maximum number
of hosts in each subnet, if the address of a class B host is to be split into
subnets with a 6-bit subnet number?
(a) P – 2 Q – 1 R – 3 S – 5
(b) P – 1 Q – 4 R – 2 S – 5
(c) P – 1 Q – 4 R – 2 S – 3
(d) P – 2 Q – 4 R – 1 S – 3
a. 16000
b. 20000
c. 10000
d. 8000
29) One of the header fields in an IP datagram is the Time to Live (TTL)
field. Which of these below given statements best explains the need for
this field?
30) A and B are the only two stations on an Ethernet. Each has a steady
queue of frames to send. Both A and B attempt to transmit a frame,
collide, and A wins the first back off race. At the end of this successful
transmission by A, both A and B attempt to transmit and collide. The
probability that A wins the second back off race is_____
a. 0.625
b. 0.75
c. 0.5
d. 1.0
a. 4
b. 6
c. 7
d. 9
a. IP Packets from the same source to the same destination can take different
routes in the network
b. The packet source cannot set the route of an ongoing packets; the route is only
determined by the routing tables in the routers on the way
c. IP ensures that a packet is discarded if it is unable to reach its destination
within a given number of hops
d. It is possible for a computer to have multiple IP addresses
34) For an organization that has a class B network and wishes to form
subnets for 64 departments, what will the subnet mask be?
a. 255.255.64.0
b. 255.255.64.0
c. 255.255.128.0
d. 255.255.252.0
a. 11001001011
b. 11001001000
c. 110010010011
d. 11001010
37) Look at these three statements about link state and distance vector
routing protocols, for a large network with 500 network nodes and 4000
links
Which one of the following is correct about S1, S2, and S3?
a. 100 bytes
b. 200 bytes
c. 50 bytes
d. None of these
40) Which is one of the pairs of protocols given below from both the
protocols that can use multiple TCP connections between the same
client and the server?
a. HTTP, TELNET
b. HTTP, SMTP
c. FTP, SMTP
d. HTTP, FTP
41) What is the number of 8-bit characters that can be transmitted per
second over a 9600 baud serial communication link that use
asynchronous mode of transmission with 8 data bits, one start bit and
one parity bit?
a. 800
b. 600
c. 876
d. 1200
a. Increase Linearly
b. Does not increase
c. Increase exponentially
d. Increase
43) If a sender is employing public key Cryptography to send a secret
message to a receiver, which one of the following statements is true?
a. N(N-1)
b. N(N-1) / 2
c. 2N
d. (N-1)2
45) Internetwork is made of five networks. Which are those?
a. UDP
b. TCP
c. TCPMAN
d. DHCP
47) A sender B sends a message m to receiver A, which is digitally signed
by B with its private key. In this scenario, one or more of the following
security violations can take place.
II. A third party attacker can launch a birthday attack to replace m with a
fraudulent message
a. I only
b. II only
c. II and III only
d. I and II only
48) Take the example of 1 Mbps error-free line, with the maximum frame
size of 1000 bits and new packets generated about 1 second apart .
Timeout interval is 10 m/sec if the special acknowledgement timer were
eliminated, unnecessary timeout would occur . In the scenario, how any
times average msg would have been transmitted?
a. Twice
b. Only once
c. Thrice
d. None of the above
a. Transport layer
b. Data link layer
c. Data layer
d. Network layer
130 to 140
140 to 150
120 to 130
100 to 110
Discuss it
Question 2
Consider the cyclic redundancy check (CRC) based error detecting
scheme having the generator polynomial X3+X+1. Suppose the message
m4m3m2m1m0 = 11000 is to be transmitted. Check bits c2c1c0 are appended
at the end of the message by the transmitter using the above CRC
scheme. The transmitted bit string is denoted by m4m3m2m1m0c2c1c0. The
value of the checkbit sequence c2c1c0 is
101
110
100
111
Discuss it
Question 3
Consider a link with packet loss probability of 0.2. What is the expected
number of transmissions it would take to transfer 200 packets given that
the stop and wait protocol is used?
125
250
225
150
Discuss it
Question 4
Discuss it
Question 5
An Ethernet frame that is less than the IEEE 802.3 minimum length of 64
octets is called
Short frame
Small frame
Mini frame
Runt frame
Discuss it
Question 6
Discuss it
Question 7
4 bit
8 bit
16 bit
32 bit
Discuss it
Question 8
Discuss it
Question 9
Discuss it
Question 10
Discuss it
The protocol data unit (PDU) for the application layer in the Internet stack is
Segment
Datagram
Message
Frame
Discuss it
Question 12
What is the maximum size of data that the application layer can pass on to
the TCP layer below?
A
B
C
D
Discuss it
Question 13
Match the following:
(1)
(2)
(3)
(4)
Discuss it
Question 14
If the client sends a packet after the server reboot, it will receive a RST
segment
If the client sends a packet after the server reboot, it will receive a FIN
segment
Discuss it
Question 15
Secret communication
Discuss it
Question 16
Interface problem
Discuss it
Question 17
FIN
RST
SYN
PSH
Discuss it
Question 18
Four channels are multiplexed using TDM. If each channel sends 100
bytes/second and we multiplex 1 byte per channel, then the bit rate for the
link is __________.
400 bps
800 bps
1600 bps
3200 bps
Discuss it
Question 19
equal to
less than
greater than
Discuss it
Question 20
Question 21
1005 ms
1010 ms
3000 ms
3003 ms
Discuss it
Question 21 ‒ Explanation
See http://www.geeksforgeeks.org/computer-networks-set-2/
Question 22
Consider a network with five nodes, N1 to N5, as shown
(3, 2, 0, 2, 5)
(3, 2, 0, 2, 6)
(7, 2, 0, 2, 5)
(7, 2, 0, 2, 6)
Discuss it
Question 23
Consider the data given in above question. Suppose the weights of all
unused links in the previous question are changed to 2 and the distance
vector algorithm is used again until all routing tables stabilize. How many
links will now remain unused?
0
1
2
3
Discuss it
Question 24
131.16.0.0/12 3
131.28.0.0/14 5
131.19.0.0/16 2
131.22.0.0/15 1
The identifier of the output interface on which this packet will be forwarded
is ______.
1
2
3
5
Discuss it
Question 25
Two computers C1 and C2 are configured as follows. C1 has IP address
203.197.2.53 and netmask 255.255.128.0. C2 has IP address 203.197.75.201
and netmask 255.255.192.0. which one of the following statements is true?
Discuss it
Question 26
A Trojan horse is
Discuss it
Question 27
EETSICOOCYWMEKRONRU!LTWET
LTWETONRU!WMEKRCOOCYEETSI
ONRU!COOCYLTWETEETSIWMEKR
Discuss it
Question 28
5
8
12
16
Discuss it
Question 29
SHA-1 is a
encryption algorithm
decryption algorithm
Discuss it
Question 30
If there are N people in the world and are using secret key
encryption/decryption for privacy purpose, then number of secret keys
required will be:
N
(N - 1)
N (N - 1) / 2
N (N + 1) / 2
Encryption : X’s private key followed by Y’s private key. Decryption : X’s
public key followed by Y’s public key.
Encryption : X’s private key followed by Y’s public key; Decryption : X’s
public key followed by Y’s private key
Encryption : X’s private key followed by Y’s public key; Decryption : Y’s
private key followed by X’s public key.
Encryption : X’s public key followed by Y’s private key; Decryption : Y’s
public key followed by X’s private key.
Discuss it
Question 32
Discuss it
Question 33
2N
N(N – 1)
N(N – 1)/2
(N – 1)2
Discuss it
Question 34
How many bytes of data can be sent in 15 seconds over a serial link with
baud rate of 9600 in asynchronous mode with odd parity and two stop bits
in the frame?
10,000 bytes
12,000 bytes
15,000 bytes
27,000 bytes
Discuss it
Question 35
A combinational circuit
A finite automaton
Discuss it
Question 36
Multipart/mixed
Multipart/parallel
Multipart/digest
Multipart/alternative
Discuss it
Question 37
Amplitude modulation
Carrier modulation
Manchester encoding
NRZ encoding
Discuss it
Question 38
Discuss it
Question 39
6.9 e-9
6.9 e-6
69 e-9
4 e-9
Discuss it
Question 40
IEEE 802.16
IEEE 802.36
IEEE 812.16
IEEE 806.16
Discuss it
Question 41
A T-switch is used to
Discuss it
Question 42
Match the security protocols with the layers they are used in and choose
the correct code -
List−1List−2A.TLS1.PhysicalLayerB.WEP2.LinkLayerC.PGP3.NetworkLayerD.IPsec4
.TransportLayer5.ApplicationLayerList−1A.TLSB.WEPC.PGPD.IPsec
List−21.PhysicalLayer2.LinkLayer3.NetworkLayer4.TransportLayer5.Application
Layer
Codes-
ABCD(a)2513(b)5232(c)4253(d)5243 (a)(b)(c)(d)A2545B5222C1354D3233
(d)
(c)
(b)
(a)
Discuss it
Question 43
Discuss it
Question 44
Class A network
Class B network
Class C network
Class D network
Discuss it
Question 45
12.5%
25%
37.5%
50%
Discuss it
Question 46
255.255.255.0
255.0.0.0
255.255.192.0
255.255.0.0
Discuss it
Question 47
For each IP address in Group-I identify the correct choice of the next hop
from Group-II using the entries from the routing table above.
List-I List-II
A. 128.96.171.92 1. Interface 0
B. 128.96.167.151 2. Interface 1
C. 128.96.163.121 3. R2
D. 128.96.165.121 4. R3
5. R4
Codes:
ABCD
(a) 1 3 5 4
(b) 1 4 2 5
(c) 2 3 4 5
(d) 2 3 5 4
a
b
c
d
Discuss it
Question 48
32
64
16
Discuss it
Question 49
10.0.0.5
10.0.0.16
10.0.0.68
10.0.0.160
Discuss it
Question 50
10.0.0.1
172.16.0.10
15.1.5.6
None
Discuss it
1. ASCII
2. RS232C
3. 2
4. Centronics
2) Which type of topology is best suited for large businesses which must
carefully control and coordinate the operation of distributed branch
outlets?
1. Ring
2. Local area
3. Hierarchical
4. Star
1. Simplex
2. Half Duplex
3. Full Duplex
4. Double Duplex
1. Encryption of data
2. To transmit faster
3. To detect errors
2. Optical fiber
3. Coaxial cable
4. Microwave
2. E-mail system
3. Mailing list
1. Protocol
2. URL
3. E-mail address
4. ICQ
2. acting as a backup
1. Firewall
2. Gateway
3. Router
4. Virus checker
2. gmail.com
4. javatpoint@books
14) Which one of the following is the most common internet protocol?
1. HTML
2. NetBEUI
3. TCP/IP
4. IPX/SPX
15) Software programs that allow you to legally copy files and give them
away at no cost are called which of the following?
1. Probe ware
2. Timeshare
3. Shareware
4. Public domain
1. Interface speed
3. Baud rate
4. Megabyte load
1. Star
2. Ring
3. Bus
4. Peer to Peer
1. 32
2. 1024
3. 65535
4. 512
1. 255.243.240
2. 255.255.0.0
3. 255.255.0
4. 255.255.255
22) When the mail server sends mail to other mail servers it becomes ___
?
1. SMTP client
2. SMTP server
3. Peer
4. Master
Show Answer Workspace
1. 32 bits
2. 64 bits
3. 128 bits
4. 256 bits
3. Repeaters
4. Analog Transmissions
5. Fiber optics
2. 130.12.12.248
3. 128.12.12.248
4. 129.12.12.248
1. 124.201.3.1.52
2. 01.200.128.123
3. 300.142.210.64
4. 10110011.32.16.8
5. 128.64.0.0
1. 0.0.0.0
2. 127.0.0.1
3. 255.255.255.255
4. 0.255.255.255
29) Which of the following cannot be used as a medium for 802.3 ethernet?
3. A microwave link
30) What IP address class allocates 8 bits for the host identification part?
1. Class A
2. Class B
3. Class C
4. Class D
1. 6 version
2. 4 version
3. 2 version
4. 1 version
33) Which layer of the TCP / IP stack corresponds to the OSI model
transport layer?
1. Host to host
2. Application
3. Internet
4. Network Access
34) An Aloha network uses an 18.2 kbps channel for sending message
packets of 100 bits long size. Calculate the maximum throughput.
1. 5999
2. 6900
3. 6027
4. 5027
Show Answer Workspace
1. Statistical TDM makes efficient use of the bandwidth only if the arrival
pattern of the data stream is probabilistic.
1. Library
2. Network
3. Grouping
4. Integrated system
40) In specific, if the systems use separate protocols, which one of the
following devices is used to link two systems?
1. Repeater
2. Gateway
3. Bridge
4. Hub
1. first three
2. first four
3. first five
4. first six
1. Collision
2. Synchronous
3. Asynchronous
43) Which of the following is true with regard to the ping command?
3. Ping summarizes the packet loss and round-trip delay between two
IP end points.
1. Sender
2. Receiver
1. RSA algorithm
2. Diffie-Hellman algorithm
1. Transposition ciphers
2. Substitution ciphers
3. Both a and b
4. None of these
1. 1.89
2. 17.99
3. 18.999
4. 18.4
1. 36.8
2. 35.8
3. 35.5
4. 37.8
1. Message switching
2. Packet switching
3. Virtual switching
1. Message switching
2. Packet switching
3. Circuit switching
4. None of the these
1. Proxy tools
2. Application proxy
3. Application-level gateway
1. Data server
2. Point server
3. File server
4. Communication server
1. Tfr
2. 1/2 Tfr
3. 2 * Tfr
4. 4 * Tfr
1. Two
2. Three
3. Four
4. Five
7) What is the maximum data transfer rate of the optical fiber wire?
1. 50 kbps
2. 1000 kbps
3. 1000 Mbps
1. Telephone switching
2. Proxy server
3. File system
4. Circuit system
2. http
3. HDLC
1. Input terminal
2. Output terminal
3. Signal terminal
4. Bandwidth terminal
12) Which of the following layers does the HTTP protocol work on?
1. Physical layer
2. Data-link layer
3. Application layer
3. It is a message event
1. 2 layers
2. 3 layers
3. 4 layers
4. 5 layers
Show Answer Workspace
1. Multipath fading
2. Signals
3. Data network
4. Network connection
1. J / (J * 1)
2. -Z / (1 + J)
3. Z * (1 + J)
4. J / (J + 1)
18) What is the size of the sender window in the Go Back N (ARQ) protocol?
1. 0
2. 1
3. 10
4. n
1. N = N / (2a + 2a)
2. N = N / (1 + 2a)
3. N = N * (2a + 2a)
4. N = N * (1 + 2a)
20) What is the size of the destination port in the UDP protocol?
1. 8 bits
2. 16 bits
3. 20 bits
4. 32 bits
21) What network utility uses the time-To-Live (TTL) field in the IP header to
elicit ICMP error messages?
1. Ping
2. Route
3. Traceroute
4. Ifconfig
2. DNS Name
3. DNS resolver
4. DNS inquirer
1. 511 characters
2. 255 characters
3. 127 characters
4. 31 characters
1. Repeater
2. Source address
3. Destination address
4. Checksum
1. Physical address
2. Logical address
3. Source address
4. Destination address
1. MAC address
2. Virtual address
3. Source address
4. Destination address
1. 1024 Mbps
2. 64 Mbps
3. 64 kbps
4. 1024 kbps
1. 8 bytes
2. 16 bytes
3. 20 bytes
4. 64 bytes
1. UDP
2. TCP
3. IP
1. .
2. 0
3. @
4. *
5. #
1. 20 ft
2. 50 ft
3. 50 meters
4. 100 meters
2. LAN
3. MAN
4. PAN
1. IS-95
2. ISO 1990
3. IS-97
1. Hub
2. Switch
3. Bridge
39) Which of the following devices does not require power to forward the
signals?
1. Active hub
2. Passive hub
3. Repeater
4. Bridge
1. Two
2. Four
3. Eight
4. Ten