McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .
1. |
When collection of various computers seems a single coherent system to its client, then it is called |
A. | computer network |
B. | distributed system |
C. | networking system |
D. | mail system |
Answer» B. distributed system | |
Explanation: a computer network is defined as a collection of interconnected computers which uses a single technology for connection. |
2. |
Two devices are in network if |
A. | a process in one device is able to exchange information with a process in another device |
B. | a process is running on both devices |
C. | pids of the processes running of different devices are same |
D. | a process is active and another is inactive |
Answer» A. a process in one device is able to exchange information with a process in another device | |
Explanation: a computer network, or data network, is a digital telecommunications network which allows nodes to share resources. in computer networks, computing devices exchange data with each other using connections between nodes. the nodes have certain processes which enable them to share a specific type of data using a distinct protocol. |
3. |
Which of the following computer networks is built on the top of another network? |
A. | prior network |
B. | chief network |
C. | prime network |
D. | overlay network |
Answer» D. overlay network | |
Explanation: an overlay network is a computer network that is built on top of another network. some examples of an overlay network are virtual private networks (vpn) and peer-to-peer networks (p2p). |
4. |
In computer network nodes are |
A. | the computer that originates the data |
B. | the computer that routes the data |
C. | the computer that terminates the data |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
Explanation: in a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to its destination. routers, computers and smartphones are some examples of network nodes. |
5. |
Communication channel is shared by all the machines on the network in |
A. | broadcast network |
B. | unicast network |
C. | multicast network |
D. | anycast network |
Answer» A. broadcast network | |
Explanation: in a broadcast network, information is sent to all stations in a network whereas in a multicast network the data or information is sent to a group of stations in the network. in unicast network, information is sent to only one specific station. the broadcast address of the network is the last assigned address of the network. |
6. |
Bluetooth is an example of |
A. | personal area network |
B. | local area network |
C. | virtual private network |
D. | wide area network |
Answer» A. personal area network | |
Explanation: bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. it operates on 2.45 ghz frequency band for transmission. |
7. |
A is a device that forwards packets between networks by processing the routing information included in the packet. |
A. | bridge |
B. | firewall |
C. | router |
D. | hub |
Answer» C. router | |
Explanation: a router is a networking device that forwards data packets between computer networks. routers perform the traffic directing functions on the internet. they make use of routing protocols like rip to find the cheapest path to the destination. |
8. |
A list of protocols used by a system, one protocol per layer, is called |
A. | protocol architecture |
B. | protocol stack |
C. | protocol suite |
D. | protocol system |
Answer» B. protocol stack | |
Explanation: a protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite. each layer in the network model has to use one specific protocol from the protocol stack. |
9. |
Network congestion occurs |
A. | in case of traffic overloading |
B. | when a system terminates |
C. | when connection between two nodes terminates |
D. | in case of transfer failure |
Answer» A. in case of traffic overloading | |
Explanation: network congestion occurs when traffic in the network is more than the network could handle. to avoid network congestion, the network management uses various open-loop and closed-loop congestion control techniques. |
10. |
Which of the following networks extends a private network across public networks? |
A. | local area network |
B. | virtual private network |
C. | enterprise private network |
D. | storage area network |
Answer» B. virtual private network | |
Explanation: a virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.vpn provides enhanced security and online anonymity to users on the internet. it is also used to unblock websites which are unavailable in certain regions. |
11. |
Physical or logical arrangement of network is |
A. | topology |
B. | routing |
C. | networking |
D. | control |
Answer» A. topology | |
Explanation: topology in networks is the structure or pattern in which each and every node in the network is connected. there are many topologies in networking like bus, tree, ring, star, mesh, and hybrid topology. there is no particular best topology and a suitable topology can be chosen based on the kind of application of the network . |
12. |
Which network topology requires a central controller or hub? |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» A. star | |
Explanation: in star topology, no computer is connected to another computer directly but all the computers are connected to a central hub. every message sent from a source computer goes through the hub and the hub then forwards the message only to the intended destination computer. |
13. |
topology requires a multipoint connection. |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» D. bus | |
Explanation: in bus topology, there is a single cable to which all the network nodes are connected. so whenever a node tries to |
14. |
Data communication system spanning states, countries, or the whole world is |
A. | lan |
B. | wan |
C. | man |
D. | pan |
Answer» B. wan | |
Explanation: wan is the abbreviation for wide area network. this network extends over a large geographical area. wans are used to connect cities, states or even countries. a wireless connection is required to build a wan. the best example of wan is the internet. |
15. |
Data communication system within a building or campus is |
A. | lan |
B. | wan |
C. | man |
D. | pan |
Answer» A. lan | |
Explanation: lan is an abbreviation for local area network. this network interconnects computers in a small area such as schools, offices, residence etc. it is the most versatile kind of data communication system where most of the computer network concepts can be visibly used. |
16. |
WAN stands for |
A. | world area network |
B. | wide area network |
C. | web area network |
D. | web access network |
Answer» B. wide area network | |
Explanation: wan is the abbreviation for wide area network. this network extends |
17. |
In TDM, slots are further divided into |
A. | seconds |
B. | frames |
C. | packets |
D. | bits |
Answer» B. frames | |
Explanation: tdm is the abbreviation for time division multiplexing. it is technique for combining several low rate channels to a single high rate channel. for a certain time slot, the several channels could use the maximum bandwidth. each channel is inactive for a period of time too. some other multiplexing techniques are frequency division multiplexing and phase division multiplexing. |
18. |
is the multiplexing technique that shifts each signal to a different carrier frequency. |
A. | fdm |
B. | tdm |
C. | both fdm & tdm |
D. | pdm |
Answer» A. fdm | |
Explanation: fdm is an abbreviation for frequency division multiplexing. this technique is used when the bandwidth of the channel is greater than the combined bandwidth of all the signals which are to be transmitted. the channel is active at all times unless a collision occurs with another channel trying to use the same frequency. some other multiplexing techniques are time division multiplexing and phase division multiplexing. |
19. |
What is internet? |
A. | a single network |
B. | a vast collection of different networks |
C. | interconnection of local area networks |
D. | interconnection of wide area networks |
Answer» B. a vast collection of different networks | |
Explanation: internet is nothing but an interconnected computer network providing a variety of communication facilities, consisting of a huge amount of small networks using standardized communication protocols. |
20. |
To join the internet, the computer has to be connected to a |
A. | internet architecture board |
B. | internet society |
C. | internet service provider |
D. | different computer |
Answer» C. internet service provider | |
Explanation: the isps (internet service providers) are the main agents through which every computer is connected to the internet. they are licensed to allot public ip addresses to its customers in order to connect them to the internet. |
21. |
Internet access by transmitting digital data over the wires of a local telephone network is provided by |
A. | leased line |
B. | digital subscriber line |
C. | digital signal line |
D. | digital leased line |
Answer» B. digital subscriber line | |
Explanation: dsl (digital subscriber line) is the technology designed to use the existing telephone lines to transport high-bandwidth data to service subscribers. dsl was used to allow the early users access to the internet and it provides dedicated, point-to-point, public network access. |
22. |
3 OVERVIEW OF INTERNET |
A. | internet exchange point |
B. | subscriber end point |
C. | isp end point |
D. | internet end point |
Answer» A. internet exchange point | |
Explanation: isps exchange internet traffic between their networks by using internet exchange points. isps and cdns are connected to each other at these physical locations are they help them provide better service to their customers. |
23. |
Which of the following protocols is used in the internet? |
A. | http |
B. | dhcp |
C. | dns |
D. | dns, http and dns |
Answer» D. dns, http and dns | |
Explanation: http is used to browse all the websites on the world wide web, dhcp is used to allot ips automatically to the users on the internet, and dns is used to connect the users to the host servers on the internet based on the domain name. |
24. |
Internet works on |
A. | packet switching |
B. | circuit switching |
C. | both packet switching and circuit switching |
D. | data switching |
Answer» A. packet switching | |
Explanation: packet switching is the method based on which the internet works. packet switching features delivery of packets of data between devices over a shared network. |
25. |
Which one of the following is not an application layer protocol used in internet? |
A. | remote procedure call |
B. | internet relay chat |
C. | resource reservation protocol |
D. | local procedure call |
Answer» C. resource reservation protocol | |
Explanation: resource reservation protocol is a transport layer protocol used on the internet. it operates over ipv4 and ipv6 and is designed to reserve resources required by the network layer protocols. |
26. |
Which protocol assigns IP address to the client connected in the internet? |
A. | dhcp |
B. | ip |
C. | rpc |
D. | rsvp |
Answer» A. dhcp | |
Explanation: dhcp stands for domain host control protocol. it is responsible to remotely assign ip address to the clients connected to the internet. the server that performs this fuction is called the dhcp server. |
27. |
Which one of the following is not used in media access control? |
A. | ethernet |
B. | digital subscriber line |
C. | fiber distributed data interface |
D. | packet switching |
Answer» D. packet switching | |
Explanation: packet switching is not really related to media access control as it just features delivery of packets of data between devices over a shared network. internet is actually based on packet switching. |
28. |
Which level is the network layer in the OSI model? |
A. | third level |
B. | fourth level |
C. | second level |
D. | fifth layer |
Answer» A. third level | |
Explanation: the network layer is the third level of the open system interconnection model and the layer that provides data routing paths for network communication. |
29. |
Data in network layer is transferred in the form of |
A. | layers |
B. | packets |
C. | bytes |
D. | bits |
Answer» B. packets | |
Explanation: data is transferred in the form of packets via logical network paths in an ordered format controlled by the network layer. |
30. |
The network layer contains which hardware device? |
A. | routers, bridges |
B. | bridges only |
C. | bridges and switches |
D. | routers, bridges and switches |
Answer» D. routers, bridges and switches | |
Explanation: this layer contains hardware devices such as routers, bridges, firewalls, and switches, but it actually creates a logical image of the most efficient communication rout and implements it with a physical medium. |
31. |
Network layer protocol exits in |
A. | host |
B. | switches |
C. | packets |
D. | bridges |
Answer» A. host | |
Explanation: network layer protocols exits in every host or router. the router examines the header fields of all the ip packets that pass through it. |
32. |
What are the common protocols associated with the network layer? |
A. | address resolution protocol |
B. | reverse address resolution protocol |
C. | internet protocol |
D. | neighbour discovery protocol |
Answer» C. internet protocol | |
Explanation: internet protocol and netware ipx/spx are the most common protocols associated with the network layer. |
33. |
The network layer responds to request from which layer? |
A. | transport layer |
B. | data layer |
C. | application layer |
D. | session layer |
Answer» A. transport layer | |
Explanation: in osi model, we are having 7 layers in which the network layer responds to request from the layer above it called transport layer. |
34. |
The network layer issues request to which layer? |
A. | transport layer |
B. | data layer |
C. | application layer |
D. | session layer |
Answer» B. data layer | |
Explanation: in osi model, we are having 7 layers in which the network layer issues request to the layer below it called data link layer. |
35. |
IP is connectionless. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: ip is connectionless, is that a data packet can travel from a sender to a receiver without the recipient having to send an acknowledgment connection-oriented protocols exits at other, higher layers of the osi model. |
36. |
Does network layer in TCP/IP and OSI Model are same. |
A. | true |
B. | false |
Answer» B. false | |
Explanation: the tcp/ip internet layer is in fact only a subset of functionality of the network layer. it describes only one type of network architecture, the internet. |
37. |
What are called routers? |
A. | the devices that operates at session layer |
B. | the devices that operates at data layer |
C. | the devices that operates at application layer |
D. | the devices that operates at network |
Answer» D. the devices that operates at network | |
Explanation: the network interconnection devices that operate at the network layer are usually called routes, which at this point should hopefully come as no surprise to you. |
38. |
ICMP stands for |
A. | internet coordinate message protocol |
B. | internet control message protocol |
C. | interconnect control message protocol |
D. | interconnect coordinate message protocol |
Answer» B. internet control message protocol | |
Explanation: the internet protocol is the key network layer protocol that implements the tcp/ip protocol suites. since ip is the protocol that provides the mechanism for delivering datagrams, between devices, it is designed to be relatively basic, and to function with few “bell and whistles”. |
39. |
Packets will be transferred in how many types? |
A. | 5 types |
B. | 4 types |
C. | 2 types |
D. | 3 types |
Answer» D. 3 types | |
Explanation: routing deals with determining how packet will routed (transferred) from source to destination. it can of three types : 1. static |
40. |
DDP stands for |
A. | datagram delivery protocol |
B. | device delivery protocol |
C. | datagram device protocol |
D. | device datagram protocol |
Answer» A. datagram delivery protocol | |
Explanation: datagram delivery protocol is a member of the appletalk networking protocol suite. its main responsibility is for socket to socket delivery of datagram over an appletalk network. |
41. |
RIP stands for |
A. | reduced information protocol |
B. | routing internet protocol |
C. | routing information protocol |
D. | reduced internet protocol |
Answer» C. routing information protocol | |
Explanation: the routing information protocol is one of the oldest distance vector routing protocols which employ the hop count as a routing metric. |
42. |
The model is 7-layer architecture where each layer is having some specific functionality to perform. |
A. | tcp/ip |
B. | cloud |
C. | osi |
D. | ois |
Answer» C. osi | |
Explanation: the osi model is 7-layer architecture where each layer is having some specific functionality to perform. all these layers work in collaboration for transmitting the data from 1 person to another worldwide. |
43. |
The full form of OSI is OSI model is |
A. | open systems interconnection |
B. | open software interconnection |
C. | open systems internet |
D. | open software internet |
Answer» A. open systems interconnection | |
Explanation: the osi model is 7-layer architecture where each layer is having some specific functionality to perform. all these layers work in collaboration for transmitting the data from 1 person to another worldwide. |
44. |
Which of the following is not physical layer vulnerability? |
A. | physical theft of data & hardware |
B. | physical damage or destruction of data & hardware |
C. | unauthorized network access |
D. | keystroke & other input logging |
Answer» C. unauthorized network access | |
Explanation: unauthorized network access is |
45. |
In layer, vulnerabilities are directly associated with physical access to networks and hardware. |
A. | physical |
B. | data-link |
C. | network |
D. | application |
Answer» A. physical | |
Explanation: in the physical layer, vulnerabilities are directly associated with physical access to networks and hardware such as unauthorised network access, damage or destruction of data & hardware and keystroke & other input logging. |
46. |
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. other such issues are unauthorised network access, damage or destruction of data & hardware and keystroke & other input logging. |
47. |
Which of the following is not a vulnerability of the data-link layer? |
A. | mac address spoofing |
B. | vlan circumvention |
C. | switches may be forced for flooding traffic to all vlan ports |
D. | overloading of transport-layer mechanisms |
Answer» D. overloading of transport-layer mechanisms | |
Explanation: mac address spoofing, vlan circumvention and switches may be |
48. |
is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls. |
A. | vlan attack |
B. | vlan circumvention |
C. | vlan compromisation method |
D. | data-link evading |
Answer» B. vlan circumvention | |
Explanation: vlan circumvention is data- link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls implemented using subnets and firewalls. |
49. |
may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN. |
A. | switches |
B. | routers |
C. | hubs |
D. | repeaters |
Answer» A. switches | |
Explanation: switches may be forced for flooding traffic to all vlan ports allowing interception of data through any device that are connected to a vlan. it is a vulnerability of data link layer. |
50. |
Which of the following is not a vulnerability of the network layer? |
A. | route spoofing |
B. | identity & resource id vulnerability |
C. | ip address spoofing |
D. | weak or non-existent authentication |
Answer» D. weak or non-existent authentication | |
Explanation: weak or non-existent authentication is a vulnerability of the session layer. route spoofing, identity & resource id vulnerability & ip address spoofing are examples of network layer vulnerability. |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.