980+ Computer Networks Solved MCQs

201.

If you want to find the number of routers between a source and destination, the utility to be used is.

A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» D. traceroute
202.

Which of the following is related to ipconfig in Microsoft Windows ?

A. display all current tcp/ip network configuration values
B. modify dhcp settings
C. modify dns settings
D. all of the mentioned
Answer» D. all of the mentioned
203.

This allows to check if a domain is available for registration.

A. domain check
B. domain dossier
C. domain lookup
D. none of the mentioned
Answer» A. domain check
204.

Choose the wrong statement

A. nslookup is used to query a dns server for dns data
B. ping is used to check connectivity
C. pathping combines the functionality of ping with that of route
D. ifconfig can configure tcp/ip network interface parameters
Answer» C. pathping combines the functionality of ping with that of route
205.

Expansion of FTP is

A. fine transfer protocol
B. file transfer protocol
C. first transfer protocol
D. none of the mentioned
Answer» B. file transfer protocol
206.

FTP is built on _____ architecture

A. client-server
B. p2p
C. both of the mentioned
D. none of the mentioned
Answer» A. client-server
207.

FTP uses _____ parallel TCP connections to transfer a file

A. 1
B. 2
C. 3
D. 4
Answer» B. 2
208.

Identify the incorrect statement

A. ftp stands for file transfer protocol
B. ftp uses two parallel tcp connections
C. ftp sends its control information in-band
D. ftp sends exactly one file over the data connection
Answer» C. ftp sends its control information in-band
209.

If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is

A. 5
B. 10
C. 2
D. 6
Answer» D. 6
210.

FTP server

A. mantains state
B. is stateless
C. has single tcp connection for a file transfer
D. none of the mentioned
Answer» A. mantains state
211.

The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format

A. 8
B. 7
C. 3
D. 5
Answer» B. 7
212.

Find the FTP reply whose message is wrongly matched

A. 331 – username ok, password required
B. 425 – can’t open data connection
C. 452 – error writing file
D. 452 – can’t open data connection
Answer» D. 452 – can’t open data connection
213.

Mode of data transfer in FTP, where all the is left to TCP

A. stream mode
B. block mode
C. compressed mode
D. none of the mentioned
Answer» A. stream mode
214.

The password is sent to the server using _____ command

A. passwd
B. pass
C. password
D. none of the mentioned
Answer» B. pass
215.

The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______

A. 4
B. 1
C. 5
D. none of the mentioned
Answer» C. 5
216.

The default connection type used by HTTP is _____

A. persistent
B. non-persistent
C. either of the mentioned
D. none of the mentioned
Answer» A. persistent
217.

The time taken by a packet to travel from client to server and then back to the client is called ____

A. stt
B. rtt
C. ptt
D. none of the mentioned
Answer» B. rtt
218.

The HTTP request message is sent in ____ part of three-way handshake.

A. first
B. second
C. third
D. none of the mentioned
Answer» C. third
219.

In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.

A. 2
B. 1
C. 4
D. 3
Answer» B. 1
220.

The first line of HTTP request message is called ____

A. request line
B. header line
C. status line
D. entity line
Answer» A. request line
221.

The values GET, POST, HEAD etc are specified in ____ of HTTP message

A. request line
B. header line
C. status line
D. entity body
Answer» A. request line
222.

The ______ method when used in the method field, leaves entity body empty.

A. post
B. get
C. both of the mentioned
D. none of the mentioned
Answer» B. get
223.

The HTTP response message leaves out the requested object when _____ method is used

A. get
B. post
C. head
D. put
Answer» C. head
224.

Find the oddly matched HTTP status codes

A. 200 ok
B. 400 bad request
C. 301 moved permanently
D. 304 not found
Answer» D. 304 not found
225.

Which of the following is not correct ?

A. web cache doesnt has its own disk space
B. web cache can act both like server and client
C. web cache might reduce the response time
D. web cache contains copies of recently requested objects
Answer» A. web cache doesnt has its own disk space
226.

The conditional GET mechanism

A. imposes conditions on the objects to be requested
B. limits the number of response from a server
C. helps to keep a cache upto date
D. none of the mentioned
Answer» C. helps to keep a cache upto date
227.

Which of the following is present in both an HTTP request line and a status line?

A. http version number
B. url
C. method
D. none of the mentioned
Answer» A. http version number
228.

Which of the following is not applicable for IP?

A. error reporting
B. handle addressing conventions
C. datagram format
D. packet handling conventions
Answer» A. error reporting
229.

Which of the following field in IPv4 datagram is not related to fragmentation?

A. flags
B. offset
C. tos
D. identifier
Answer» C. tos
230.

The TTL field has value 10. How many routers (max) can process this datagram?

A. 11
B. 5
C. 10
D. 1
Answer» C. 10
231.

If the value in protocol field is 17, the transport layer protocol used is ____.

A. tcp
B. udp
C. either of the mentioned
D. none of the mentioned
Answer» B. udp
232.

The data field can carry which of the following?

A. tcp segemnt
B. udp segment
C. icmp messages
D. none of the mentioned
Answer» C. icmp messages
233.

What should be the flag value to indicate the last fragment?

A. 0
B. 1
C. ttl value
D. none of the mentioned
Answer» A. 0
234.

Which of these is not applicable for IP protocol?

A. is connectionless
B. offer reliable service
C. offer unreliable service
D. none of the mentioned
Answer» B. offer reliable service
235.

Fragmentation has following demerits

A. complicates routers
B. open to dos attack
C. overlapping of fragments.
D. all of the mentioned
Answer» D. all of the mentioned
236.

Which field helps to check rearrangement of the fragments?

A. offset
B. flag
C. ttl
D. identifer
Answer» A. offset
237.

The size of IP address in IPv6 is

A. 4bytes
B. 128bits
C. 8bytes
D. 100bits
Answer» B. 128bits
238.

The header length of an IPv6 datagram is _____.

A. 10bytes
B. 25bytes
C. 30bytes
D. 40bytes
Answer» D. 40bytes
239.

In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?

A. fragmentation field
B. fast-switching
C. tos field
D. option field
Answer» C. tos field
240.

IPv6 doesnot use ______ type of address

A. broadcast
B. multicast
C. anycast
D. none of the mentioned
Answer» A. broadcast
241.

These are the features present in IPv4 but not in IPv6.

A. fragmentation
B. header checksum
C. options
D. all of the mentioned
Answer» D. all of the mentioned
242.

The ____ field determines the lifetime of IPv6 datagram

A. hop limit
B. ttl
C. next header
D. none of the mentioned
Answer» A. hop limit
243.

Dual-stack approach refers to

A. implementing ipv4 with 2 stacks
B. implementing ipv6 with 2 stacks
C. node has both ipv4 and ipv6 support
D. none of the mentioned
Answer» C. node has both ipv4 and ipv6 support
244.

The operation of ____________ is based on signals which are multiplexed and added in time domain but they occupy different slots in frequency domain

A. fdm
B. tdm
C. wdm
D. mdm
Answer» A. fdm
245.

which of the following is not Guided transmission media

A. twisted pair cables
B. co-axial cables
C. infrared
D. fibre optics
Answer» C. infrared
246.

____________ media is a communication medium which allows the data to get guided along it.

A. transparent
B. cable
C. guided
D. glass
Answer» C. guided
247.

Presentation doesn’t perform ________ function

A. translation
B. transmission
C. encryption
D. compression
Answer» B. transmission
248.

Below layers are not present in TCP/IP layer.

A. application
B. presentation
C. transport
D. network
Answer» B. presentation
249.

Which of the following are not duties of Physical layer

A. bit rate control
B. multiplexing
C. error detection
D. circuit switching
Answer» C. error detection
250.

A field in header is used to specify the number of characters in the frame.

A. start bit
B. character count
C. end bit
D. character stuffing
Answer» B. character count
251.

The data bit to be transmitted are broken into discrete __________ at the data link layer.

A. frame
B. stuff
C. character
D. data
Answer» A. frame
252.

A standard mechanism provided by internet which helps in copying a file from one host to another is known as ________.

A. smtp
B. dns server
C. telnet
D. ftp
Answer» D. ftp
253.

Which one of the below is not an component of Internet mail system

A. user agent
B. smtp sender
C. smtp receiver
D. transfer agent
Answer» D. transfer agent
254.

How many layers are present in the Internet protocol stack (TCP/IP model)?

A. 5
B. 7
C. 6
D. 10
Answer» A. 5
255.

Application layer is implemented in ____________

A. end system
B. nic
C. ethernet
D. packet transport
Answer» A. end system
256.

Transport layer is implemented in ______________

A. end system
B. nic
C. ethernet
D. signal transmission
Answer» A. end system
257.

The functionalities of the presentation layer include ____________

A. data compression
B. data encryption
C. data description
D. all of the mentioned
Answer» D. all of the mentioned
258.

Delimiting and synchronization of data exchange is provided by __________

A. application layer
B. session layer
C. transport layer
D. link layer
Answer» B. session layer
259.

Physical or logical arrangement of network is __________

A. topology
B. routing
C. networking
D. control
Answer» A. topology
260.

Which network topology requires a central controller or hub?

A. star
B. mesh
C. ring
D. bus
Answer» A. star
261.

Data communication system spanning states, countries, or the whole world is ________

A. lan
B. wan
C. man
D. pan
Answer» B. wan
262.

Data communication system within a building or campus is________

A. lan
B. wan
C. man
D. pan
Answer» A. lan
263.

Which of this is not a guided media?

A. fiber optical cable
B. coaxial cable
C. wireless lan
D. copper wire
Answer» C. wireless lan
264.

Coaxial cable consists of _______ concentric copper conductors.

A. 1
B. 2
C. 3
D. 4
Answer» B. 2
265.

Fiber optics posses following properties __________

A. immune electromagnetic interference
B. very less signal attenuation
C. very hard to tap
D. all of the mentioned
Answer» D. all of the mentioned
266.

If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) __________

A. n*39.8
B. n*51.8
C. 2n*51.8
D. none of the mentioned
Answer» B. n*51.8
267.

Radio channels are attractive medium because __________

A. can penetrate walls
B. connectivity can be given to mobile user
C. can carry signals for long distance
D. all of the mentioned
Answer» D. all of the mentioned
268.

Geostationary satellites ___________

A. are placed at a fixed point above the earth
B. rotate the earth about a fixed axis
C. rotate the earth about a varying axis
D. all of the mentioned
Answer» A. are placed at a fixed point above the earth
269.

Bits can be sent over guided and unguided media as analog signal by ___________

A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Answer» A. digital modulation
270.

The physical layer provides __________

A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for ir over optical fiber
D. all of the mentioned
Answer» D. all of the mentioned
271.

In asynchronous serial communication the physical layer provides ___________

A. start and stop signalling
B. flow control
C. both start & stop signalling and flow control
D. only start signalling
Answer» C. both start & stop signalling and flow control
272.

The physical layer is responsible for __________

A. line coding
B. channel coding
C. modulation
D. all of the mentioned
Answer» D. all of the mentioned
273.

Wireless transmission of signals can be done via ___________

A. radio waves
B. microwaves
C. infrared
D. all of the mentioned
Answer» D. all of the mentioned
274.

Transmission control protocol ___________

A. is a connection-oriented protocol
B. uses a three way handshake to establish a connection
C. receives data from application as a single stream
D. all of the mentioned
Answer» D. all of the mentioned
275.

Datagram networks mainly refers to _________

A. connection oriented networks
B. connection less networks
C. telephone networks
D. internetwork
Answer» B. connection less networks
276.

The network layer is concerned with __________ of data.

A. bits
B. frames
C. packets
D. bytes
Answer» C. packets
277.

Which one of the following is not a function of network layer?

A. routing
B. inter-networking
C. congestion control
D. error control
Answer» D. error control
278.

In virtual circuit network each packet contains ___________

A. full source and destination address
B. a short vc number
C. only source address
D. only destination address
Answer» B. a short vc number
279.

Which of the following routing algorithms can be used for network layer design?

A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» D. all of the mentioned
280.

Which of the following is not correct in relation to multi-destination routing?

A. is same as broadcast routing
B. contains the list of all destinations
C. data is not sent by packets
D. there are multiple receivers
Answer» C. data is not sent by packets
281.

A subset of a network that includes all the routers but contains no loops is called ________

A. spanning tree
B. spider structure
C. spider tree
D. special tree
Answer» A. spanning tree
282.

Which one of the following algorithm is not used for congestion control?

A. traffic aware routing
B. admission control
C. load shedding
D. routing information protocol
Answer» D. routing information protocol
283.

The network layer protocol for internet is __________

A. ethernet
B. internet protocol
C. hypertext transfer protocol
D. file transfer protocol
Answer» B. internet protocol
284.

ICMP is primarily used for __________

A. error and diagnostic functions
B. addressing
C. forwarding
D. routing
Answer» A. error and diagnostic functions
285.

Which of the following are transport layer protocols used in networking?

A. tcp and ftp
B. udp and http
C. tcp and udp
D. http and ftp
Answer» C. tcp and udp
286.

Which one of the following is a version of UDP with congestion control?

A. datagram congestion control protocol
B. stream control transmission protocol
C. structured stream transport
D. user congestion control protocol
Answer» A. datagram congestion control protocol
287.

A _____ is a TCP name for a transport service access point.

A. port
B. pipe
C. node
D. protocol
Answer» A. port
288.

Transport layer protocols deals with ____________

A. application to application communication
B. process to process communication
C. node to node communication
D. man to man communication
Answer» B. process to process communication
289.

Which of the following is a transport layer protocol?

A. stream control transmission protocol
B. internet control message protocol
C. neighbor discovery protocol
D. dynamic host configuration protocol
Answer» A. stream control transmission protocol
290.

Which of the following computer networks is built on the top of another network?

A. prior network
B. chief network
C. prime network
D. overlay network
Answer» D. overlay network
291.

In computer network nodes are _________

A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
Answer» D. all of the mentioned
292.

Communication channel is shared by all the machines on the network in ________

A. broadcast network
B. unicast network
C. multicast network
D. anycast network
Answer» A. broadcast network
293.

Bluetooth is an example of __________

A. personal area network
B. local area network
C. virtual private network
D. wide area network
Answer» A. personal area network
294.

A list of protocols used by a system, one protocol per layer, is called ________

A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Answer» B. protocol stack
295.

Network congestion occurs _________

A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. in case of transfer failure
Answer» A. in case of traffic overloading
296.

Which of this is not a constituent of residential telephone line?

A. a high-speed downstream channel
B. a medium-speed downstream channel
C. a low-speed downstream channel
D. an ultra-high speed downstream channel
Answer» C. a low-speed downstream channel
297.

DSL telcos provide which of the following services?

A. wired phone access
B. isp
C. wired phone access and isp
D. network routing and isp
Answer» C. wired phone access and isp
298.

The function of DSLAM is to __________

A. convert analog signals into digital signals
B. convert digital signals into analog signals
C. amplify digital signals
D. de-amplify digital signals
Answer» A. convert analog signals into digital signals
299.

Which of the following terms is not associated with DSL?

A. dslam
B. co
C. splitter
D. cmts
Answer» D. cmts
300.

HFC contains _______

A. fibre cable
B. coaxial cable
C. a combination of fibre cable and coaxial cable
D. twisted pair cable
Answer» C. a combination of fibre cable and coaxial cable
Tags
Question and answers in Computer Networks, Computer Networks multiple choice questions and answers, Computer Networks Important MCQs, Solved MCQs for Computer Networks, Computer Networks MCQs with answers PDF download