242
97.5k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

151.

Internet access by transmitting digital data over the wires of a local telephone network is provided by

A. leased line
B. digital subscriber line
C. digital signal line
D. none of the mentioned
Answer» B. digital subscriber line
152.

ISP exchanges internet traffic between their networks by

A. internet exchange point
B. subscriber end point
C. isp end point
D. none of the mentioned
Answer» A. internet exchange point
153.

Which one of the following protocol is not used in internet?

A. http
B. dhcp
C. dns
D. none of the mentioned
Answer» D. none of the mentioned
154.

IPv6 addressed have a size of

A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Answer» C. 128 bits
155.

Internet works on

A. packet switching
B. circuit switching
C. both (a) and (b)
D. none of the mentioned
Answer» A. packet switching
156.

Which one of the following is not an application layer protocol used in internet?

A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. none of the mentioned
Answer» C. resource reservation protocol
157.

Which protocol assigns IP address to the client connected in the internet?

A. dhcp
B. ip
C. rpc
D. none of the mentioned
Answer» A. dhcp
158.

Which one of the following is not used in media access control?

A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. none of the mentioned
Answer» D. none of the mentioned
159.

In cryptography, what is cipher?

A. algorithm for performing encryption and decryption
B. encrypted message
C. both (a) and (b)
D. none of the mentioned
Answer» A. algorithm for performing encryption and decryption
160.

In asymmetric key cryptography, the private key is kept by

A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» B. receiver
161.

Which one of the following algorithm is not used in asymmetric key cryptography?

A. rsa algorithm
B. diffie-hellman algorithm
C. electronic code book algorithm
D. none of the mentioned
Answer» C. electronic code book algorithm
162.

In cryptography, the order of the letters in a message is rearranged by

A. transpositional ciphers
B. substitution ciphers
C. both (a) and (b)
D. none of the mentioned
Answer» A. transpositional ciphers
163.

What is data encryption standard (DES)?

A. block cipher
B. stream cipher
C. bit cipher
D. none of the mentioned
Answer» A. block cipher
164.

Cryptanalysis is used

A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. none of the mentioned
Answer» A. to find some insecurity in a cryptographic scheme
165.

Which one of the following is a cryptographic protocol used to secure HTTP connection?

A. stream control transmission protocol (sctp)
B. transport layer security (tsl)
C. explicit congestion notification (ecn)
D. resource reservation protocol
Answer» B. transport layer security (tsl)
166.

Voice privacy in GSM cellular telephone protocol is provided by

A. a5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Answer» A. a5/2 cipher
167.

ElGamal encryption system is

A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. none of the mentioned
Answer» B. asymmetric key encryption algorithm
168.

Cryptographic hash function takes an arbitrary block of data and returns

A. fixed size bit string
B. variable size bit string
C. both (a) and (b)
D. none of the mentioned
Answer» A. fixed size bit string
169.

The attackers a network of compromised devices known as

A. internet
B. botnet
C. telnet
D. d-net
Answer» B. botnet
170.

Which of the following is a form of DoS attack ?

A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» D. all of the mentioned
171.

The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» C. connection flooding
172.

The DoS attack is which the attacker sends deluge of packets to the targeted host

A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» B. bandwidth flooding
173.

Packet sniffers involve

A. active receiver
B. passive receiver
C. both of the mentioned
D. none of the mentioned
Answer» B. passive receiver
174.

Sniffers can be deployed in

A. wired environment
B. wifi
C. ethernet lan
D. all of the mentioned
Answer» D. all of the mentioned
175.

Firewalls are often configured to block

A. udp traffic
B. tcp traffic
C. both of the mentioned
D. none of the mentioned
Answer» A. udp traffic
176.

DHCP (dynamic host configuration protocol) provides _____ to the client.

A. ip address
B. mac address
C. url
D. none of the mentioned
Answer» A. ip address
177.

DHCP is used for

A. ipv6
B. ipv4
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
178.

The DHCP server

A. maintains a database of available ip addresses
B. maintains the information about client configuration parameters
C. grants a ip address when receives a request from a client
D. all of the mentioned
Answer» D. all of the mentioned
179.

IP assigned for a client by DHCP server is

A. for a limited period
B. for unlimited period
C. not time dependent
D. none of the mentioned
Answer» A. for a limited period
180.

DHCP uses UDP port ____ for sending data to the server.

A. 66
B. 67
C. 68
D. 69
Answer» B. 67
181.

The DHCP server can provide the _______ of the IP addresses.

A. dynamic allocation
B. automatic allocation
C. static allocation
D. all of the mentioned
Answer» D. all of the mentioned
182.

DHCP client and servers on the same subnet communicate via

A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
Answer» A. udp broadcast
183.

After obtaining the IP address, to prevent the IP conflict the client may use

A. internet relay chat
B. broader gateway protocol
C. address resolution protocol
D. none of the mentioned
Answer» C. address resolution protocol
184.

What is DHCP snooping?

A. techniques applied to ensure the security of an existing dhcp infrastructure
B. encryption of the dhcp server requests
C. algorithm for dhcp
D. none of the mentioned
Answer» A. techniques applied to ensure the security of an existing dhcp infrastructure
185.

If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.

A. mac address
B. ip address
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
186.

Real-time transport protocol (RTP) is mostly used in

A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer» D. all of the mentioned
187.

RTP is used to

A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. none of the mentioned
Answer» A. carry the media stream
188.

RTP provides the facility of jitter ____ .

A. compensation
B. expansion
C. both (a) and (b)
D. none of the mentioned
Answer» A. compensation
189.

Which protocol provides the synchronization between media streams?

A. rtp
B. rtcp
C. rpc
D. none of the mentioned
Answer» B. rtcp
190.

An RTP session is established for

A. each media stream
B. all media streams
C. some predefined number of media streams
D. none of the mentioned
Answer» A. each media stream
191.

RTP can use

A. unprevileleged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer» D. all of the mentioned
192.

Which one of the following multimedia formats can not be supported by RTP?

A. mpeg-4
B. mjpeg
C. mpeg
D. none of the mentioned
Answer» D. none of the mentioned
193.

An RTP header has a minimum size of

A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer» A. 12 bytes
194.

Which one of the following is not correct?

A. rtcp provides canonical end-point identifiers to all session participants
B. rtcp reports are expected to be sent by all participants
C. both (a) and (b)
D. none of the mentioned
Answer» D. none of the mentioned
195.

Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?

A. srtp
B. rtcp
C. rcp
D. none of the mentioned
Answer» A. srtp
196.

Ping can

A. measure round-trip time
B. report packet loss
C. report latency
D. all of the mentioned
Answer» D. all of the mentioned
197.

Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is

A. use dual-stack approach
B. tunneling
C. no solution
D. replace the system
Answer» B. tunneling
198.

Ping sweep is a part of

A. traceroute
B. nmap
C. route
D. ipconfig
Answer» B. nmap
199.

ICMP is used in

A. ping
B. traceroute
C. ifconfig
D. both a and b
Answer» D. both a and b
200.

_____ command is used to manipulate TCP/IP routing table.

A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» A. route

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.