0% found this document useful (0 votes)
10 views19 pages

Chapterwise MCQ Questions

Uploaded by

Ashay Vairat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views19 pages

Chapterwise MCQ Questions

Uploaded by

Ashay Vairat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Chp.

1 Network Layer
1. The network layer concerns with
a) bits
b) frames
c) packets
d) none of the mentioned
Answer:c

2. Which one of the following is not a function of network layer?


a) routing
b) inter-networking
c) congestion control
d) none of the mentioned

Answer:d

3. The 4 byte IP address consists of


a) network address
b) host address
c) both (a) and (b)
d) none of the mentioned

Answer:c

4. In virtual circuit network each packet contains


a) full source and destination address
b) a short VC number
c) both (a) and (b)
d) none of the mentioned

Answer:b

5. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned

Answer:d
6. Multidestination routing
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) none of the mentioned
Answer:c

7. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
Answer:a

8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
Answer:d

9. The network layer protocol of internet is


a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) none of the mentioned
Answer:b.

10. ICMP is primarily used for


a) error and diagnostic functions
b) addressing
c) forwarding
d) none of the mentioned
Answer:a
Chp.4 Transport Layer

1. Transport layer aggregates data from different applications into a single stream before passing it
to
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer:a

2. Which one of the following is a transport layer protocol used in internet?


a) TCP
b) UDP
c) both (a) and (b)
d) none of the mentioned
Answer:c

3. User datagram protocol is called connectionless because


a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) both (a) and (b)
d) none of the mentioned
Answer:a.

4. Transmission control protocol is


a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) recievs data from application as a single stream
d) all of the mentioned
Answer:d

5. An endpoint of an inter-process communication flow across a computer network is called


a) socket
b) pipe
c) port
d) none of the mentioned
Answer:a

6. Socket-style API for windows is called


a) wsock
b) winsock
c) wins
d) none of the mentioned
Answer:b

7. Which one of the following is a version of UDP with congestion control?


a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) none of the mentioned
Answer:a

8. A _____ is a TCP name for a transport service access point.


a) port
b) pipe
c) node
d) none of the mentioned
Answer:a

9. Transport layer protocols deals with


a) application to application communication
b) process to process communication
c) node to node communication
d) none of the mentioned
Answer:b

10. Which one of the following is a transport layer protocol?


a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
Answer:a
Chp.5 Application Layer

1. The ____ translates internet domain and host names to IP address.


a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
Answer:a

2. Which one of the following allows a user at one site to establish a connection to another site and
then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) telnet
d) none of the mentioned
Answer:c

3. Application layer protocol defines


a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned
Answer:d

4. Which one of the following protocol delivers/stores mail to reciever server?


a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
Answer:a

5. The ASCII encoding of binary data is called


a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
Answer:a

6. Which one of the following is an internet standard protocol for managing devices on IP network?
a) dynamic host configuration protocol
b) simple newtwork management protocol
c) internet message access protocol
d) media gateway protocol
Answer:b

7. Which one of the following is not an application layer protocol?


a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol
Answer:c

8. Which protocol is a signalling communication protocol used for controlling multimedia


communication sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) none of the mentioned
Answer:a

9. Which one of the following is not correct?


a) application layer protocols are used by both source and destination devices during a
communication session
b) application layer protocols implemented on the source and destination host must match
c) both (a) and (b)
d) none of the mentioned
Answer:c

10. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) none of the mentioned
Answer:a

11. The entire hostname has a maximum of


a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
Answer:a

12. A DNS client is called


a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
Answer:b

13. Servers handle requests for other domains


a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
Answer:b.

14. DNS database contains


a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
Answer:d

15. If a server has no clue about where to find the address for a hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Answer:a
16. Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Answer:a.

17. Wildcard domain names start with label


a) @
b) *
c) &
d) #
Answer:b

18. The right to use a domain name is delegated by domain name registers which are accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Answer:d

19. The domain name system is maintained by


a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
Answer:a

20. Which one of the following is not true?


a) multiple hostnames may correspond to a single IP address
b) a single hostname may correspond to many IP addresses
c) a single hostname may correspond to a single IP address
d) none of the mentioned
Answer:c

21. A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
d) none of the mentioned
Answer:b

22. Dynamic web page


a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
c) both (a) and (b)
d) none of the mentioned
Answer:b

23. What is a web browser?


a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned
Answer:d

24. Common gateway interface is used to


a) generate executable files from web content by web server
b) generate web pages
c) stream videos
d) none of the mentioned
Answer:a

25. URL stands for


a) unique reference label
b) uniform reference label
c) uniform resource locator
d) unique resource locator
Answer:c

26. A web cookie is a small piece of data


a) sent from a website and stored in user’s web browser while a user is browsing a website
b) sent from user and stored in the server while a user is browsing a website
c) sent from root server to all servers
d) none of the mentioned
Answer:a
27. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) none of the mentioned
Answer:d

28. An alternative of javascript on windows platform is


a) VBScript
b) ASP.NET
c) JSP
d) none of the mentioned
Answer:a

29. What is document object model (DOM)?


a) convention for representing and interacting with objects in html documents
b) application programming interface
c) hierarchy of objects in ASP.NET
d) none of the mentioned
Answer:a

30. AJAX stands for


a) asynchronous javascript and xml
b) advanced JSP and xml
c) asynchronous JSP and xml
d) advanced javascript and xml
Answer:a

31) This is not a application layer protocol


a) HTTP
b) SMTP
c) FTP
d) TCP
Answer: d
Explanation: TCP is transport layer protocol

32) The packet of information at the application layer is called


a) Packet
b) Message
c) Segment
d) Frame
Answer: b

33) This is one of the architecture paradigm


a) Peer to peer
b) Client-server
c) HTTP
d) Both a and b
Answer: d
Explanation: HTTP is a protocol.

34) Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
Answer: c

35) Application layer offers _______ service


a) End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned
Answer: a

36) E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c
Explanation: Because it can work with available throughput.

37) Pick the odd one out


a) File transfer
b) File download
c) E-mail
d) Interactive games
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.

38) Which of the following is an application layer service ?


a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
Answer: d

39) To deliver a message to the correct application program running on a host, the _______ address
must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c

40) This is a time-sensitive service


a) File transfer
b) File download
c) E-mail
d) Internet telephony
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.

41) Transport services available to applications in one or another form


a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
Answer: d

42) Electronic mail uses this Application layer protocol


a) SMTP
b) HTTP
c) FTP
d) SIP
Answer: a

Chp.6 Network Security


1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both (a) and (b)
d) none of the mentioned
Answer:a

2. In asymmetric key cryptography, the private key is kept by


a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
Answer:b
3. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) RSA algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
Answer:c

4. In cryptography, the order of the letters in a message is rearranged by


a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
Answer:a

5. What is data encryption standard (DES)?


a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
Answer:a

6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
Answer:a

7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
Answer:b

8. Voice privacy in GSM cellular telephone protocol is provided by


a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
Answer:a

9. ElGamal encryption system is


a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned
Answer:b

10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
Answer:a

11. Encryption and decryption provide secrecy, or confidentiality, but not


1. Authentication
2. Integrity
3. Keys
4. Frames
Answer: B
12. A digital signature needs a
1. private-key system
2. shared-key system
3. public-key system
4. All of them
Answer:C
13. A sender must not be able to deny sending a message that he or she, in fact, did send, is known
as
1. Message Nonrepudiation
2. Message Integrity
3. Message Confidentiality
4. Message Sending
Answer:A
14. Message confidentiality is using
1. Cipher Text
2. Cipher
3. Symmetric-Key
4. Asymmetric-Key
Answer:D
15. Message confidentiality or privacy means that sender and receiver expect
1. Integrity
2. Confidentiality
3. Authentication
4. Nonrepudiation
Answer:B
16. When data must arrive at receiver exactly as they were sent, its called
1. Message Confidentiality
2. Message Integrity
3. Message Splashing
4. Message Sending
Answer:B
17. Message must be encrypted at sender site and decrypted at the
1. Sender Site
2. Site
3. Receiver site
4. Conferencing
Answer:C

Chapter 2. IPV4 and IPV6 adresses


1. Address space of IPv4 is
1. 4294967296
2. 4294965796
3. 4266496296
4. 6294967296
Answer:A
2. IPv4 address is displayed as
1. 4 bits
2. 8 bits
3. 16 bits
4. 32 bits
Answer:D
3. IPv6 has a much larger address space of
1. 2*16
2. 2*128
3. 2*32
4. 2*8
Answer:B
4. Global and local addressing are types of
1. WAN network
2. local area circuit network
3. virtual-circuit network
4. MAN network
Answer:C
5. Dotted-decimal notation of 10000001 00001011 00001011 11101111 would be
1. 193.131.27.255
2. 129.11.11.239
3. 192.168.10.9
4. 172.16.11.3
Answer:B
6. In IPv4 Addresses, classful addressing is replaced with
1. Classless Addressing
2. Classful Addressing
3. Classful Advertising
4. Classless Advertising

Answer:A

Chp. 3 Congestion control and Qos

1. In Quality Service, Jitter is variation in delay for packets belonging to the


1. Same Flow
2. Data Flow
3. Protocol Flow
4. IP Flow
Answer:A
2. A packet which is sent by a node to source to inform it of congestion is called
1. Congestion Packet
2. Change Packet
3. Choke Packet
4. Control Packet
Answer:C
3. Token bucket allows bursty traffic to regulated at
1. maximum rate
2. minimum rate
3. both
4. None
Answer:A
4. A flow of data needs resources such as a buffer, bandwidth and
1. CPU time
2. CPU Unit
3. CPU Processor
4. CPU Control
Answer:A

5. In Congestion Control and Quality of Services, our main focus is on


1. Data Protocol
2. Data Layer
3. Data Congestion
4. Data Traffic
Answer:D
6. In Integrated Services, receivers, not sender, make reservation in
1. CPU
2. STCP
3. RSVP
4. IP
Answer:C
7. ABR stands for
1. Average Bit Rate
2. Available Bit Rate
3. Available Byte Rate
4. Average Byte Rate
Answer:B
8. A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the
1. Data Rate
2. Average Rate
3. Traffic Rate
4. Traffic Shaping
Answer:A

You might also like