242
97.7k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

751.

is a standard suite of protocols used for packet switching across computer networks.

A. x.22
B. x.23
C. x.25
D. x.26
Answer» C. x.25
752.

What is the full form of CAN?

A. Campus Area Network
B. Cluster Area Network
C. Control Area network
D. both A and B
Answer» D. both A and B
753.

Which of the following below is/are the capability of ICMP protocol?

A. Report package count
B. Report network congestion
C. Both band d
D. Report availability of remote hosts
Answer» C. Both band d
754.

ARP works on Ethernet networks.

A. False
B. True
C. none
D. other
Answer» B. True
755.

assigns a unique number to each IP network adapter called the MAC address.

A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Both B and C above
Answer» A. Media Access Control
756.

Piconets in the blue tooth a minimum of two and amaximum of Bluetooth peer devices.

A. five
B. eight
C. nine
D. four
Answer» B. eight
757.

Dynamic addressing doesn’t allow many devices To share limited address space on a network

A. True
B. False
C. none
D. other
Answer» B. False
758.

NAT stands for .

A. network address transformer
B. network address translator
C. network address translation
D. Both B and C above
Answer» C. network address translation
759.

Which of the following is true for secure shell tunneling?

A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port
B. SSH tunnels provide a means to not bypassfirewalls
C. All SSH clients support dynamic port forwarding
D. Both A and B
Answer» A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port
760.

Which of the following below are secure VPN protocols?

A. UDP
B. TCP
C. SSTP
D. Both B and C
Answer» D. Both B and C
761.

What is the difference between a switch and a hub?

A. Switches operate at the physical layer while hubs operate at the data link layer
B. Switches operate at the data link layer while hubs operate at the transport layer
C. Switches operate at the data link layer while hubs operate at the physical layer
D. Switches operate at the transport layer while hubs operate at the physical layer
Answer» C. Switches operate at the data link layer while hubs operate at the physical layer
762.

When computers in a network listen and receive the signal, it is termed as active toplogy

A. True
B. False
C. none
D. other
Answer» A. True
763.

In 10base2, 10base5, what do 2 and 5 stand for?

A. Speed in Mbps
B. Number of segments
C. Length of segment
D. Size of segment
Answer» B. Number of segments
764.

is added to data packet for error detection.

A. checksum bit
B. error bit
C. parity bit
D. other
Answer» C. parity bit
765.

ALL IP addresses are divided into a network address and host address

A. True
B. False
C. none
D. other
Answer» A. True
766.

How can we examine the current routing tables in command prompt?

A. using route start
B. using net start
C. using net stat
D. either a or b
Answer» C. using net stat
767.

Both ping and tracert are used to find If the computer is in the network.

A. True
B. False
C. none
D. other
Answer» B. False
768.

What is the difference between ring and bustopology?

A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable
B. In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable
C. In the bus, all nodes are connected with another in a loop while instar they are connected to a centralbnode
D. In Bus all nodes are connected with another loop while instar they are connected to a central cable
Answer» A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable
769.

MAC addressing works in data link layer while IP addressing works in the network layer.

A. True
B. False
C. none
D. other
Answer» A. True
770.

A packet whose destination is outside the local TCP/IP network segment is sentto the _.

A. File server
B. Default gateway
C. DNS server
D. DHCP server
Answer» B. Default gateway
771.

Why was the OSI model developed?

A. manufacturers disliked the TCP/IP protocol suite
B. the rate of data transfer was increasing exponentially
C. standards were needed to allow any two systems to communicate
D. none of the above
Answer» C. standards were needed to allow any two systems to communicate
772.

Which piece of information is not vital for a computer in a TCP/IP network?

A. IP address
B. Default gateway
C. Subnet Mask
D. DNS server
Answer» D. DNS server
773.

The physical layer is concerned with the movement of over the physical medium.

A. programs
B. dialogs
C. protocols
D. Bits
Answer» D. Bits
774.

Which protocol below operates at the network layer in the OSI model?

A. IP
B. ICMP
C. RARP
D. All of the above
Answer» D. All of the above
775.

In the OSI model, as a data packet moves from the lower to the upper layers, headers are .

A. added
B. removed
C. rearranged
D. Modified
Answer» B. removed
776.

Session layer of the OSI model provides

A. Data representation
B. Dialog control
C. Remote job execution
D. Creating logical connections
Answer» B. Dialog control
777.

IPv6 has -bit addresses.

A. 32
B. 64
C. 128
D. Variable
Answer» C. 128
778.

Which one of the following functionalities aren’t provided by TCP?

A. Flow control
B. Addressing
C. Retransmission of packets as required
D. Proper sequencing of the packets
Answer» B. Addressing
779.

Which of the following can be an Ethernet physical address?

A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. none of the above
Answer» C. 07:01:02:01:2C:4B
780.

An IP address contains bits ?

A. 8
B. 16
C. 32
D. 64
Answer» C. 32
781.

Which routing protocol below is used by exterior routers between the autonomoussystems?

A. RIP
B. IGRP
C. OSPF
D. BGP
Answer» D. BGP
782.

Which of the IP headers decides when the packet should be discarded?

A. Fragment control
B. TTL
C. Checksum
D. Header length
Answer» B. TTL
783.

Which IP address is reserved for software loop-back?

A. 224.x.x.x
B. 127.x.x.x
C. 0.0.0.0
D. 255.255.255.255
Answer» B. 127.x.x.x
784.

What is the network ID for a computer whose IP address is190.148.64.23?

A. 190
B. 190.148
C. 190.148.64
D. None of the above
Answer» B. 190.148
785.

Which port is reserved for use of the SMTP protocol?

A. 21
B. 23
C. 25
D. 53
Answer» C. 25
786.

Which one of the followings is a connectionless protocol?

A. UDP
B. Ethernet
C. IPX
D. All of the above
Answer» D. All of the above
787.

Which application below uses the UDP protocol?

A. DNS
B. TFTP
C. RIP
D. All of the above
Answer» C. RIP
788.

How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192?

A. 62
B. 126
C. 192
D. 254
Answer» A. 62
789.

Which of the followings is not a direct implication of subnet masks in TCP/IP networks?

A. Reduce network traffic
B. Increase network security
C. Assignment of more IP addresses
D. Better network management
Answer» C. Assignment of more IP addresses
790.

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are

A. Added
B. Removed
C. Rearranged
D. Modified
Answer» A. Added
791.

The structure or format of data is called

A. Syntax
B. Semantics
C. Struct
D. Formatting
Answer» A. Syntax
792.

Communication between a computer and a keyboard involves transmission.

A. Automatic
B. Half-duplex
C. Full-duplex
D. Simplex
Answer» D. Simplex
793.

The first Network was called

A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Answer» D. ARPANET
794.

A set of rules that governs data communication.

A. Protocols
B. Standards
C. RFCs
D. Servers
Answer» A. Protocols
795.

Communication channel is shared by all the machines on the networkin

A. Broadcast network
B. Unicast network
C. Multicast network
D. Anycast network
Answer» A. Broadcast network
796.

A is a device that forwards packets between networks by processing the routing information included in the packet.

A. Bridge
B. Firewall
C. Router
D. Hub
Answer» C. Router
797.

Network congestion occurs

A. In case of traffic overloading
B. When a system terminates
C. When connection between two nodes terminates
D. In case of transfer failure
Answer» A. In case of traffic overloading
798.

Which of the following networks extends a private network across public networks?

A. Local area network
B. Virtual private network
C. Enterprise private network
D. Storage area network
Answer» B. Virtual private network
799.

The number of layers in ISO OSI reference model is

A. 5
B. 7
C. 6
D. 10
Answer» B. 7
800.

Which of the following layers is an addition to OSI model when compared with TCP IPmodel?

A. Application layer
B. Presentation layer
C. Session layer
D. Session and Presentation layer
Answer» D. Session and Presentation layer

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.