The document contains a series of multiple-choice questions (MCQs) related to computer networks, covering topics such as network layers, protocols, transmission media, error detection, IP addressing, and network security. Each question is followed by the correct answer, providing a comprehensive review of fundamental concepts in networking. The content is structured in a way that facilitates learning and assessment for individuals studying computer networking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
49 views10 pages
Important Questions For Computer Networks Exam
The document contains a series of multiple-choice questions (MCQs) related to computer networks, covering topics such as network layers, protocols, transmission media, error detection, IP addressing, and network security. Each question is followed by the correct answer, providing a comprehensive review of fundamental concepts in networking. The content is structured in a way that facilitates learning and assessment for individuals studying computer networking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10
Part-A (Additional 50 MCQs)
1. Introduction to Computer Networks
1. Which device operates at the Data Link Layer?
(a) Hub (b) Switch (c) Router (d) Repeater Ans: (b) Switch 2. A packet-switched network uses: (a) Circuit switching (b) Virtual circuits (c) Datagram approach (d) Both (b) and (c) Ans: (d) Both (b) and (c) 3. Which of the following is NOT an advantage of computer networks? (a) Resource sharing (b) Fast communication (c) Security risks (d) Cost reduction Ans: (c) Security risks 4. Which of the following is a valid IPv4 address? (a) 256.168.10.1 (b) 192.168.300.2 (c) 172.16.254.1 (d) 500.10.1.5 Ans: (c) 172.16.254.1 5. The network layer is responsible for: (a) Process-to-process communication (b) Reliable data delivery (c) Routing packets from source to destination (d) Encryption and security Ans: (c) Routing packets from source to destination
2. Network Models
6. In the OSI model, encryption is handled by which layer?
(a) Transport Layer (b) Presentation Layer (c) Data Link Layer (d) Network Layer Ans: (b) Presentation Layer 7. TCP/IP has how many layers? (a) 5 (b) 7 (c) 4 (d) 6 Ans: (c) 4 8. Which protocol in the TCP/IP suite is responsible for email transmission? (a) SMTP (b) HTTP (c) FTP (d) DNS Ans: (a) SMTP 9. The Application layer in the OSI model is equivalent to which layer in the TCP/IP model? (a) Transport Layer (b) Internet Layer (c) Host-to-Host Layer (d) Application Layer Ans: (d) Application Layer 10. Which of the following is NOT an Internet protocol? (a) FTP (b) SMTP (c) SNMP (d) HTML Ans: (d) HTML
3. Physical Layer & Transmission Media
11. Which transmission media uses light for data transmission?
(a) Coaxial cable (b) Twisted pair cable (c) Optical fiber (d) Microwave Ans: (c) Optical fiber 12. The primary function of a repeater is to: (a) Regenerate signals (b) Filter traffic (c) Assign IP addresses (d) Encrypt data Ans: (a) Regenerate signals 13. What is the maximum bandwidth of a twisted pair cable? (a) 1 Mbps (b) 10 Mbps (c) 1 Gbps (d) 10 Gbps Ans: (d) 10 Gbps 14. Which of the following is an unguided transmission medium? (a) Coaxial cable (b) Twisted pair cable (c) Microwave (d) Optical fiber Ans: (c) Microwave 15. The measure of how much data can be transmitted over a medium in a given time is called: (a) Latency (b) Bandwidth (c) Throughput (d) Jitter Ans: (b) Bandwidth
4. Data Link Layer & MAC Sublayer
16. What is the purpose of the Data Link Layer?
(a) Routing packets (b) Error detection and correction (c) Encrypting data (d) Establishing end-to-end connections Ans: (b) Error detection and correction 17. CSMA/CD is used in which type of network? (a) Wireless networks (b) Ethernet networks (c) Token ring networks (d) Fiber optic networks Ans: (b) Ethernet networks 18. Which of the following is NOT an error detection method? (a) Parity check (b) CRC (c) Checksum (d) Subnetting Ans: (d) Subnetting 19. In Stop-and-Wait protocol, how many frames are sent at a time? (a) 1 (b) 2 (c) Multiple frames (d) Continuous frames Ans: (a) 1 20. What is the size of an Ethernet MAC address? (a) 32 bits (b) 48 bits (c) 64 bits (d) 128 bits Ans: (b) 48 bits
5. Network Layer & Routing
21. The subnet mask 255.255.255.0 belongs to which class?
(a) Class A (b) Class B (c) Class C (d) Class D Ans: (c) Class C 22. In distance vector routing, information is exchanged: (a) Periodically (b) Only when changes occur (c) Never (d) At the beginning of each session Ans: (a) Periodically 23. A router operates at which layer of the OSI model? (a) Physical Layer (b) Data Link Layer (c) Network Layer (d) Transport Layer Ans: (c) Network Layer 24. Which routing algorithm uses the Bellman-Ford algorithm? (a) Link-state routing (b) Distance vector routing (c) Hierarchical routing (d) None of the above Ans: (b) Distance vector routing 25. IPv6 addresses are: (a) 32 bits (b) 48 bits (c) 64 bits (d) 128 bits Ans: (d) 128 bits
Part-B (Remaining 25 Important MCQs)
6. Transport Layer & Congestion Control 26. The main function of the transport layer is: (a) Process-to-process communication (b) Routing (c) Error detection (d) Data encryption Ans: (a) Process-to-process communication 27. Which protocol provides reliable communication at the transport layer? (a) UDP (b) TCP (c) IP (d) ICMP Ans: (b) TCP 28. In TCP, the three-way handshake consists of which steps? (a) SYN, SYN-ACK, ACK (b) SYN, ACK, FIN (c) ACK, SYN, FIN (d) SYN, SYN-ACK, FIN Ans: (a) SYN, SYN-ACK, ACK 29. Which protocol is used for real-time video and voice communication? (a) TCP (b) UDP (c) HTTP (d) FTP Ans: (b) UDP 30. Congestion control in TCP is achieved using: (a) Slow start (b) Congestion avoidance (c) Fast recovery (d) All of the above Ans: (d) All of the above 31. The leaky bucket algorithm is used for: (a) Flow control (b) Error control (c) Congestion control (d) Routing Ans: (c) Congestion control 32. Which of the following is NOT a function of TCP? (a) Multiplexing (b) Flow control (c) Error detection (d) IP addressing Ans: (d) IP addressing 33. Which transport layer protocol does DNS use? (a) TCP (b) UDP (c) Both TCP and UDP (d) ICMP Ans: (c) Both TCP and UDP 34. In the TCP header, the sequence number field is of how many bits? (a) 8 bits (b) 16 bits (c) 32 bits (d) 64 bits Ans: (c) 32 bits 35. The maximum segment size (MSS) in TCP is determined by: (a) Network Layer (b) Data Link Layer (c) Transport Layer (d) Application Layer Ans: (b) Data Link Layer
7. Application Layer & Network Security
36. Which protocol is used to transfer files over the internet? (a) FTP (b) HTTP (c) SMTP (d) DNS Ans: (a) FTP 37. Which of the following is a connectionless protocol? (a) TCP (b) UDP (c) FTP (d) SMTP Ans: (b) UDP 38. DNS resolves domain names to: (a) MAC addresses (b) IPv4 or IPv6 addresses (c) Port numbers (d) URLs Ans: (b) IPv4 or IPv6 addresses 39. HTTPS provides security by using: (a) SSL/TLS (b) IPsec (c) Firewalls (d) None of the above Ans: (a) SSL/TLS 40. SMTP is used for: (a) Sending emails (b) Receiving emails (c) File transfers (d) Web browsing Ans: (a) Sending emails 41. Which of the following is NOT an email protocol? (a) SMTP (b) POP3 (c) IMAP (d) FTP Ans: (d) FTP 42. The default port number of HTTP is: (a) 80 (b) 443 (c) 25 (d) 53 Ans: (a) 80 43. The default port number of HTTPS is: (a) 80 (b) 443 (c) 25 (d) 21 Ans: (b) 443 44. Which security mechanism ensures that data is not altered during transmission? (a) Authentication (b) Confidentiality (c) Integrity (d) Non-repudiation Ans: (c) Integrity 45. A firewall operates at which layer of the OSI model? (a) Network Layer (b) Transport Layer (c) Data Link Layer (d) Application Layer Ans: (a) Network Layer
8. IPv6, Routing & Wireless Networks
46. IPv6 uses how many bits for addressing? (a) 32 (b) 64 (c) 128 (d) 256 Ans: (c) 128 47. Which protocol is used to automatically assign IP addresses? (a) DNS (b) DHCP (c) FTP (d) ARP Ans: (b) DHCP 48. Which protocol is used in wireless networks for authentication? (a) WPA (b) WEP (c) 802.1X (d) All of the above Ans: (d) All of the above 49. Which type of network topology has a central hub connecting all nodes? (a) Ring (b) Star (c) Bus (d) Mesh Ans: (b) Star 50. What is the main advantage of IPv6 over IPv4? (a) Larger address space (b) Faster transmission (c) More security (d) Requires less memory Ans: (a) Larger address space 9. Network Layers & Protocols 51. Which of the following layers in the OSI model is responsible for encryption and decryption? (a) Network Layer (b) Transport Layer (c) Presentation Layer (d) Application Layer Ans: (c) Presentation Layer 52. Which layer in the OSI model deals with end-to-end communication? (a) Network Layer (b) Data Link Layer (c) Transport Layer (d) Session Layer Ans: (c) Transport Layer 53. Which protocol works at the Data Link Layer? (a) IP (b) TCP (c) ARP (d) UDP Ans: (c) ARP 54. In which layer of the OSI model does routing take place? (a) Data Link Layer (b) Transport Layer (c) Network Layer (d) Application Layer Ans: (c) Network Layer 55. The first step in the DHCP process is: (a) DHCP Offer (b) DHCP Discover (c) DHCP Request (d) DHCP Acknowledgment Ans: (b) DHCP Discover
10. Transmission Media & Error Detection
56. Which transmission media has the highest data transmission speed? (a) Twisted pair cable (b) Coaxial cable (c) Fiber optic cable (d) Satellite link Ans: (c) Fiber optic cable 57. Which error detection method uses parity bits? (a) Checksum (b) CRC (c) Hamming Code (d) Parity Check Ans: (d) Parity Check 58. Which of the following is not a type of guided transmission media? (a) Coaxial cable (b) Fiber optic cable (c) Microwave (d) Twisted pair cable Ans: (c) Microwave 59. The primary advantage of using optical fiber over copper cables is: (a) Cost-effectiveness (b) Higher bandwidth and less signal loss (c) Easy installation (d) More flexible Ans: (b) Higher bandwidth and less signal loss 60. Which type of error detection technique is used in Ethernet frames? (a) Hamming Code (b) CRC (c) Parity Check (d) Checksum Ans: (b) CRC
11. IP Addressing & Subnetting
61. What is the default subnet mask for a Class C IP address? (a) 255.255.0.0 (b) 255.255.255.0 (c) 255.0.0.0 (d) 255.255.255.255 Ans: (b) 255.255.255.0 62. What is the maximum number of hosts in a Class B network? (a) 65,534 (b) 32,766 (c) 16,384 (d) 8,192 Ans: (a) 65,534 63. Which IPv6 address type is similar to IPv4 private addresses? (a) Global Unicast (b) Link-Local (c) Unique Local (d) Multicast Ans: (c) Unique Local 64. Which address is used in a Loopback test in IPv4? (a) 127.0.0.1 (b) 192.168.1.1 (c) 255.255.255.255 (d) 0.0.0.0 Ans: (a) 127.0.0.1 65. IPv6 addresses are represented in: (a) Binary (b) Decimal (c) Hexadecimal (d) Octal Ans: (c) Hexadecimal
12. Network Security & Cryptography
66. Which cryptographic method uses a single key for encryption and decryption? (a) Symmetric-key cryptography (b) Asymmetric-key cryptography (c) Public-key cryptography (d) Hashing Ans: (a) Symmetric-key cryptography 67. Which algorithm is used for public-key encryption? (a) AES (b) DES (c) RSA (d) SHA Ans: (c) RSA 68. Which of the following is a firewall technology? (a) Packet Filtering (b) Circuit-Level Gateway (c) Proxy Server (d) All of the above Ans: (d) All of the above 69. IPSec is used to provide security in which layer of the OSI model? (a) Transport Layer (b) Network Layer (c) Application Layer (d) Data Link Layer Ans: (b) Network Layer 70. Which attack is used to guess passwords by trying all possible combinations? (a) Phishing (b) Brute Force Attack (c) DoS Attack (d) Spoofing Ans: (b) Brute Force Attack
13. Wireless Networks & IoT
71. Which Wi-Fi standard operates in the 5 GHz band? (a) 802.11a (b) 802.11b (c) 802.11g (d) 802.11n Ans: (a) 802.11a 72. The term "Internet of Things (IoT)" refers to: (a) Interconnected physical devices (b) Cloud computing (c) Smart home devices only (d) Virtual reality Ans: (a) Interconnected physical devices 73. What is the range of a Bluetooth connection? (a) 10m (b) 100m (c) 500m (d) 1km Ans: (b) 100m 74. In wireless networks, CSMA/CA is used for: (a) Collision Detection (b) Collision Avoidance (c) Routing (d) Authentication Ans: (b) Collision Avoidance 75. Which of the following is a Low-power IoT protocol? (a) Wi-Fi (b) Zigbee (c) Ethernet (d) DSL Ans: (b) Zigbee