Chapterwise MCQ Questions
Chapterwise MCQ Questions
1 Network Layer
1. The network layer concerns with
a) bits
b) frames
c) packets
d) none of the mentioned
Answer:c
Answer:d
Answer:c
Answer:b
5. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer:d
6. Multidestination routing
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) none of the mentioned
Answer:c
7. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
Answer:a
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
Answer:d
1. Transport layer aggregates data from different applications into a single stream before passing it
to
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer:a
2. Which one of the following allows a user at one site to establish a connection to another site and
then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) telnet
d) none of the mentioned
Answer:c
6. Which one of the following is an internet standard protocol for managing devices on IP network?
a) dynamic host configuration protocol
b) simple newtwork management protocol
c) internet message access protocol
d) media gateway protocol
Answer:b
10. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) none of the mentioned
Answer:a
15. If a server has no clue about where to find the address for a hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Answer:a
16. Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Answer:a.
18. The right to use a domain name is delegated by domain name registers which are accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Answer:d
21. A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
d) none of the mentioned
Answer:b
34) Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
Answer: c
36) E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c
Explanation: Because it can work with available throughput.
39) To deliver a message to the correct application program running on a host, the _______ address
must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
Answer:a
7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
Answer:b
10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
Answer:a
Answer:A