0% found this document useful (0 votes)
49 views10 pages

Important Questions For Computer Networks Exam

The document contains a series of multiple-choice questions (MCQs) related to computer networks, covering topics such as network layers, protocols, transmission media, error detection, IP addressing, and network security. Each question is followed by the correct answer, providing a comprehensive review of fundamental concepts in networking. The content is structured in a way that facilitates learning and assessment for individuals studying computer networking.

Uploaded by

vishalmsk143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views10 pages

Important Questions For Computer Networks Exam

The document contains a series of multiple-choice questions (MCQs) related to computer networks, covering topics such as network layers, protocols, transmission media, error detection, IP addressing, and network security. Each question is followed by the correct answer, providing a comprehensive review of fundamental concepts in networking. The content is structured in a way that facilitates learning and assessment for individuals studying computer networking.

Uploaded by

vishalmsk143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Part-A (Additional 50 MCQs)

1. Introduction to Computer Networks

1. Which device operates at the Data Link Layer?


(a) Hub
(b) Switch
(c) Router
(d) Repeater
Ans: (b) Switch
2. A packet-switched network uses:
(a) Circuit switching
(b) Virtual circuits
(c) Datagram approach
(d) Both (b) and (c)
Ans: (d) Both (b) and (c)
3. Which of the following is NOT an advantage of computer networks?
(a) Resource sharing
(b) Fast communication
(c) Security risks
(d) Cost reduction
Ans: (c) Security risks
4. Which of the following is a valid IPv4 address?
(a) 256.168.10.1
(b) 192.168.300.2
(c) 172.16.254.1
(d) 500.10.1.5
Ans: (c) 172.16.254.1
5. The network layer is responsible for:
(a) Process-to-process communication
(b) Reliable data delivery
(c) Routing packets from source to destination
(d) Encryption and security
Ans: (c) Routing packets from source to destination

2. Network Models

6. In the OSI model, encryption is handled by which layer?


(a) Transport Layer
(b) Presentation Layer
(c) Data Link Layer
(d) Network Layer
Ans: (b) Presentation Layer
7. TCP/IP has how many layers?
(a) 5
(b) 7
(c) 4
(d) 6
Ans: (c) 4
8. Which protocol in the TCP/IP suite is responsible for email transmission?
(a) SMTP
(b) HTTP
(c) FTP
(d) DNS
Ans: (a) SMTP
9. The Application layer in the OSI model is equivalent to which layer in the TCP/IP
model?
(a) Transport Layer
(b) Internet Layer
(c) Host-to-Host Layer
(d) Application Layer
Ans: (d) Application Layer
10. Which of the following is NOT an Internet protocol?
(a) FTP
(b) SMTP
(c) SNMP
(d) HTML
Ans: (d) HTML

3. Physical Layer & Transmission Media

11. Which transmission media uses light for data transmission?


(a) Coaxial cable
(b) Twisted pair cable
(c) Optical fiber
(d) Microwave
Ans: (c) Optical fiber
12. The primary function of a repeater is to:
(a) Regenerate signals
(b) Filter traffic
(c) Assign IP addresses
(d) Encrypt data
Ans: (a) Regenerate signals
13. What is the maximum bandwidth of a twisted pair cable?
(a) 1 Mbps
(b) 10 Mbps
(c) 1 Gbps
(d) 10 Gbps
Ans: (d) 10 Gbps
14. Which of the following is an unguided transmission medium?
(a) Coaxial cable
(b) Twisted pair cable
(c) Microwave
(d) Optical fiber
Ans: (c) Microwave
15. The measure of how much data can be transmitted over a medium in a given time is
called:
(a) Latency
(b) Bandwidth
(c) Throughput
(d) Jitter
Ans: (b) Bandwidth

4. Data Link Layer & MAC Sublayer

16. What is the purpose of the Data Link Layer?


(a) Routing packets
(b) Error detection and correction
(c) Encrypting data
(d) Establishing end-to-end connections
Ans: (b) Error detection and correction
17. CSMA/CD is used in which type of network?
(a) Wireless networks
(b) Ethernet networks
(c) Token ring networks
(d) Fiber optic networks
Ans: (b) Ethernet networks
18. Which of the following is NOT an error detection method?
(a) Parity check
(b) CRC
(c) Checksum
(d) Subnetting
Ans: (d) Subnetting
19. In Stop-and-Wait protocol, how many frames are sent at a time?
(a) 1
(b) 2
(c) Multiple frames
(d) Continuous frames
Ans: (a) 1
20. What is the size of an Ethernet MAC address?
(a) 32 bits
(b) 48 bits
(c) 64 bits
(d) 128 bits
Ans: (b) 48 bits

5. Network Layer & Routing

21. The subnet mask 255.255.255.0 belongs to which class?


(a) Class A
(b) Class B
(c) Class C
(d) Class D
Ans: (c) Class C
22. In distance vector routing, information is exchanged:
(a) Periodically
(b) Only when changes occur
(c) Never
(d) At the beginning of each session
Ans: (a) Periodically
23. A router operates at which layer of the OSI model?
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
Ans: (c) Network Layer
24. Which routing algorithm uses the Bellman-Ford algorithm?
(a) Link-state routing
(b) Distance vector routing
(c) Hierarchical routing
(d) None of the above
Ans: (b) Distance vector routing
25. IPv6 addresses are:
(a) 32 bits
(b) 48 bits
(c) 64 bits
(d) 128 bits
Ans: (d) 128 bits

Part-B (Remaining 25 Important MCQs)


6. Transport Layer & Congestion Control
26. The main function of the transport layer is:
(a) Process-to-process communication
(b) Routing
(c) Error detection
(d) Data encryption
Ans: (a) Process-to-process communication
27. Which protocol provides reliable communication at the transport layer?
(a) UDP
(b) TCP
(c) IP
(d) ICMP
Ans: (b) TCP
28. In TCP, the three-way handshake consists of which steps?
(a) SYN, SYN-ACK, ACK
(b) SYN, ACK, FIN
(c) ACK, SYN, FIN
(d) SYN, SYN-ACK, FIN
Ans: (a) SYN, SYN-ACK, ACK
29. Which protocol is used for real-time video and voice communication?
(a) TCP
(b) UDP
(c) HTTP
(d) FTP
Ans: (b) UDP
30. Congestion control in TCP is achieved using:
(a) Slow start
(b) Congestion avoidance
(c) Fast recovery
(d) All of the above
Ans: (d) All of the above
31. The leaky bucket algorithm is used for:
(a) Flow control
(b) Error control
(c) Congestion control
(d) Routing
Ans: (c) Congestion control
32. Which of the following is NOT a function of TCP?
(a) Multiplexing
(b) Flow control
(c) Error detection
(d) IP addressing
Ans: (d) IP addressing
33. Which transport layer protocol does DNS use?
(a) TCP
(b) UDP
(c) Both TCP and UDP
(d) ICMP
Ans: (c) Both TCP and UDP
34. In the TCP header, the sequence number field is of how many bits?
(a) 8 bits
(b) 16 bits
(c) 32 bits
(d) 64 bits
Ans: (c) 32 bits
35. The maximum segment size (MSS) in TCP is determined by:
(a) Network Layer
(b) Data Link Layer
(c) Transport Layer
(d) Application Layer
Ans: (b) Data Link Layer

7. Application Layer & Network Security


36. Which protocol is used to transfer files over the internet?
(a) FTP
(b) HTTP
(c) SMTP
(d) DNS
Ans: (a) FTP
37. Which of the following is a connectionless protocol?
(a) TCP
(b) UDP
(c) FTP
(d) SMTP
Ans: (b) UDP
38. DNS resolves domain names to:
(a) MAC addresses
(b) IPv4 or IPv6 addresses
(c) Port numbers
(d) URLs
Ans: (b) IPv4 or IPv6 addresses
39. HTTPS provides security by using:
(a) SSL/TLS
(b) IPsec
(c) Firewalls
(d) None of the above
Ans: (a) SSL/TLS
40. SMTP is used for:
(a) Sending emails
(b) Receiving emails
(c) File transfers
(d) Web browsing
Ans: (a) Sending emails
41. Which of the following is NOT an email protocol?
(a) SMTP
(b) POP3
(c) IMAP
(d) FTP
Ans: (d) FTP
42. The default port number of HTTP is:
(a) 80
(b) 443
(c) 25
(d) 53
Ans: (a) 80
43. The default port number of HTTPS is:
(a) 80
(b) 443
(c) 25
(d) 21
Ans: (b) 443
44. Which security mechanism ensures that data is not altered during transmission?
(a) Authentication
(b) Confidentiality
(c) Integrity
(d) Non-repudiation
Ans: (c) Integrity
45. A firewall operates at which layer of the OSI model?
(a) Network Layer
(b) Transport Layer
(c) Data Link Layer
(d) Application Layer
Ans: (a) Network Layer

8. IPv6, Routing & Wireless Networks


46. IPv6 uses how many bits for addressing?
(a) 32
(b) 64
(c) 128
(d) 256
Ans: (c) 128
47. Which protocol is used to automatically assign IP addresses?
(a) DNS
(b) DHCP
(c) FTP
(d) ARP
Ans: (b) DHCP
48. Which protocol is used in wireless networks for authentication?
(a) WPA
(b) WEP
(c) 802.1X
(d) All of the above
Ans: (d) All of the above
49. Which type of network topology has a central hub connecting all nodes?
(a) Ring
(b) Star
(c) Bus
(d) Mesh
Ans: (b) Star
50. What is the main advantage of IPv6 over IPv4?
(a) Larger address space
(b) Faster transmission
(c) More security
(d) Requires less memory
Ans: (a) Larger address space
9. Network Layers & Protocols
51. Which of the following layers in the OSI model is responsible for encryption and decryption?
(a) Network Layer
(b) Transport Layer
(c) Presentation Layer
(d) Application Layer
Ans: (c) Presentation Layer
52. Which layer in the OSI model deals with end-to-end communication?
(a) Network Layer
(b) Data Link Layer
(c) Transport Layer
(d) Session Layer
Ans: (c) Transport Layer
53. Which protocol works at the Data Link Layer?
(a) IP
(b) TCP
(c) ARP
(d) UDP
Ans: (c) ARP
54. In which layer of the OSI model does routing take place?
(a) Data Link Layer
(b) Transport Layer
(c) Network Layer
(d) Application Layer
Ans: (c) Network Layer
55. The first step in the DHCP process is:
(a) DHCP Offer
(b) DHCP Discover
(c) DHCP Request
(d) DHCP Acknowledgment
Ans: (b) DHCP Discover

10. Transmission Media & Error Detection


56. Which transmission media has the highest data transmission speed?
(a) Twisted pair cable
(b) Coaxial cable
(c) Fiber optic cable
(d) Satellite link
Ans: (c) Fiber optic cable
57. Which error detection method uses parity bits?
(a) Checksum
(b) CRC
(c) Hamming Code
(d) Parity Check
Ans: (d) Parity Check
58. Which of the following is not a type of guided transmission media?
(a) Coaxial cable
(b) Fiber optic cable
(c) Microwave
(d) Twisted pair cable
Ans: (c) Microwave
59. The primary advantage of using optical fiber over copper cables is:
(a) Cost-effectiveness
(b) Higher bandwidth and less signal loss
(c) Easy installation
(d) More flexible
Ans: (b) Higher bandwidth and less signal loss
60. Which type of error detection technique is used in Ethernet frames?
(a) Hamming Code
(b) CRC
(c) Parity Check
(d) Checksum
Ans: (b) CRC

11. IP Addressing & Subnetting


61. What is the default subnet mask for a Class C IP address?
(a) 255.255.0.0
(b) 255.255.255.0
(c) 255.0.0.0
(d) 255.255.255.255
Ans: (b) 255.255.255.0
62. What is the maximum number of hosts in a Class B network?
(a) 65,534
(b) 32,766
(c) 16,384
(d) 8,192
Ans: (a) 65,534
63. Which IPv6 address type is similar to IPv4 private addresses?
(a) Global Unicast
(b) Link-Local
(c) Unique Local
(d) Multicast
Ans: (c) Unique Local
64. Which address is used in a Loopback test in IPv4?
(a) 127.0.0.1
(b) 192.168.1.1
(c) 255.255.255.255
(d) 0.0.0.0
Ans: (a) 127.0.0.1
65. IPv6 addresses are represented in:
(a) Binary
(b) Decimal
(c) Hexadecimal
(d) Octal
Ans: (c) Hexadecimal

12. Network Security & Cryptography


66. Which cryptographic method uses a single key for encryption and decryption?
(a) Symmetric-key cryptography
(b) Asymmetric-key cryptography
(c) Public-key cryptography
(d) Hashing
Ans: (a) Symmetric-key cryptography
67. Which algorithm is used for public-key encryption?
(a) AES
(b) DES
(c) RSA
(d) SHA
Ans: (c) RSA
68. Which of the following is a firewall technology?
(a) Packet Filtering
(b) Circuit-Level Gateway
(c) Proxy Server
(d) All of the above
Ans: (d) All of the above
69. IPSec is used to provide security in which layer of the OSI model?
(a) Transport Layer
(b) Network Layer
(c) Application Layer
(d) Data Link Layer
Ans: (b) Network Layer
70. Which attack is used to guess passwords by trying all possible combinations?
(a) Phishing
(b) Brute Force Attack
(c) DoS Attack
(d) Spoofing
Ans: (b) Brute Force Attack

13. Wireless Networks & IoT


71. Which Wi-Fi standard operates in the 5 GHz band?
(a) 802.11a
(b) 802.11b
(c) 802.11g
(d) 802.11n
Ans: (a) 802.11a
72. The term "Internet of Things (IoT)" refers to:
(a) Interconnected physical devices
(b) Cloud computing
(c) Smart home devices only
(d) Virtual reality
Ans: (a) Interconnected physical devices
73. What is the range of a Bluetooth connection?
(a) 10m
(b) 100m
(c) 500m
(d) 1km
Ans: (b) 100m
74. In wireless networks, CSMA/CA is used for:
(a) Collision Detection
(b) Collision Avoidance
(c) Routing
(d) Authentication
Ans: (b) Collision Avoidance
75. Which of the following is a Low-power IoT protocol?
(a) Wi-Fi
(b) Zigbee
(c) Ethernet
(d) DSL
Ans: (b) Zigbee

You might also like