276
104.6k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

451.

Which one of the following is not true?

A. telnet defines a network virtual terminal (nvt) standard
B. client programs interact with nvt
C. server translates nvt operations
D. client can transfer files using to remote server using nvt
Answer» D. client can transfer files using to remote server using nvt
452.

All telnet operations are sent as ________

A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
Answer» B. 8 bits
453.

AbsoluteTelnet is a telnet client for _______ Operating system.

A. windows
B. linux
C. mac
D. ubuntu
Answer» A. windows
454.

The decimal code of Interpret as Command (IAC) character is _______

A. 252
B. 253
C. 254
D. 255
Answer» D. 255
455.

Which of the following is false with respect to TCP?

A. connection-oriented
B. process-to-process
C. transport layer protocol
D. unreliable
Answer» D. unreliable
456.

In TCP, sending and receiving data is done as _______

A. stream of bytes
B. sequence of characters
C. lines of data
D. packets
Answer» A. stream of bytes
457.

TCP groups a number of bytes together into a packet called _______

A. packet
B. buffer
C. segment
D. stack
Answer» C. segment
458.

Communication offered by TCP is ________

A. full-duplex
B. half-duplex
C. semi-duplex
D. byte by byte
Answer» A. full-duplex
459.

The value of acknowledgement field in a segment defines _______

A. sequence number of the byte received previously
B. total number of bytes to receive
C. sequence number of the next byte to be received
D. sequence of zeros and ones
Answer» C. sequence number of the next byte to be received
460.

Size of TCP segment header ranges between ___________

A. 16 and 32 bytes
B. 16 and 32 bits
C. 20 and 60 bytes
D. 20 and 60 bits
Answer» C. 20 and 60 bytes
461.

Connection establishment in TCP is done by which mechanism?

A. flow control
B. three-way handshaking
C. forwarding
D. synchronization
Answer» B. three-way handshaking
462.

SYNC flooding attack belongs to a type of security attack known as ___________

A. sync flooding attack
B. active attack
C. passive attack
D. denial-of-service attack
Answer» D. denial-of-service attack
463.

What allows TCP to detect lost segments and in turn recover from that loss?

A. sequence number
B. acknowledgment number
C. checksum
D. both sequence & acknowledgment number
Answer» B. acknowledgment number
464.

Which of the following is false with respect to UDP?

A. connection-oriented
B. unreliable
C. transport layer protocol
D. low overhead
Answer» A. connection-oriented
465.

Return value of the UDP port “Chargen” is _______

A. string of characters
B. string of integers
C. array of characters with integers
D. array of zero’s and one’s
Answer» A. string of characters
466.

Beyond IP, UDP provides additional services such as _______

A. routing and switching
B. sending and receiving of packets
C. multiplexing and demultiplexing
D. demultiplexing and error checking
Answer» D. demultiplexing and error checking
467.

What is the main advantage of UDP?

A. more overload
B. reliable
C. low overhead
D. fast
Answer» C. low overhead
468.

Port number used by Network Time Protocol (NTP) with UDP is ________

A. 161
B. 123
C. 162
D. 124
Answer» B. 123
469.

What is the header size of a UDP packet?

A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Answer» A. 8 bytes
470.

The port number is “ephemeral port number”, if the source host is _______

A. ntp
B. echo
C. server
D. client
Answer» D. client
471.

“Total length” field in UDP packet header is the length of _________

A. only udp header
B. only data
C. only checksum
D. udp header plus data
Answer» D. udp header plus data
472.

Which is the correct expression for the length of UDP datagram?

A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Answer» A. udp length = ip length – ip header’s length
473.

The ______ field is used to detect errors over the entire user datagram.

A. udp header
B. checksum
C. source port
D. destination port
Answer» B. checksum
474.

IPsec defines two protocols: _______ and ________

A. ah; ssl
B. pgp; esp
C. ah; esp
D. pgp; ssl
Answer» C. ah; esp
475.

IP Security operates in which layer of the OSI model?

A. network
B. transport
C. application
D. physical
Answer» A. network
476.

ESP does not provide ________

A. source authentication
B. data integrity
C. privacy
D. error control
Answer» D. error control
477.

Two broad categories of congestion control are

A. open-loop and closed-loop
B. open-control and closed-control
C. active control and passive control
D. active loop and passive loop
Answer» A. open-loop and closed-loop
478.

In open-loop control, policies are applied to __________

A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer» C. prevent before congestion occurs
479.

Retransmission of packets must not be done when _______

A. packet is lost
B. packet is corrupted
C. packet is needed
D. packet is error-free
Answer» D. packet is error-free
480.

Discarding policy is mainly done by _______

A. sender
B. receiver
C. router
D. switch
Answer» C. router
481.

Closed-Loop control mechanisms try to _________

A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer» A. remove after congestion occurs
482.

Backpressure technique can be applied only to _______

A. congestion networks
B. closed circuit networks
C. open circuit networks
D. virtual circuit networks
Answer» D. virtual circuit networks
483.

The packet sent by a node to the source to inform it of congestion is called _______

A. explicit
B. discard
C. choke
D. backpressure
Answer» C. choke
484.

Which of the following is not a characteristic of Virtual Circuit Network?

A. there are setup and teardown phases in addition to the data transfer phase
B. resources can be allocated during setup phase or on demand
C. all packets follow the same path established during the connection
D. virtual circuit network is implemented in application layer
Answer» D. virtual circuit network is implemented in application layer
485.

Which of the following is not a phase of virtual circuit network?

A. setup phase
B. data transfer phase
C. termination phase
D. teardown phase
Answer» C. termination phase
486.

Steps required in setup process are ___________

A. setup request and acknowledgement
B. setup request and setup response
C. setup request and setup termination
D. setup and termination steps
Answer» A. setup request and acknowledgement
487.

Delay of the resource allocated during setup phase during data transfer is ________

A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» C. same for each packet
488.

Delay of the resource allocated on demand during data transfer is ________

A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» D. different for each packet
489.

In data transfer phase, how many columns does the table contain?

A. 1
B. 2
C. 3
D. 4
Answer» D. 4
490.

ATM and frame relay are ________

A. virtual circuit networks
B. datagram networks
C. virtual private networks
D. virtual public networks
Answer» A. virtual circuit networks
491.

ATM uses _______________

A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. asynchronous amplitude division multiplexing
Answer» B. asynchronous time division multiplexing
492.

ATM standard defines _______ layers.

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
493.

ATM can be used for ________

A. local area network
B. wide area network
C. campus area network
D. networks covering any range
Answer» D. networks covering any range
494.

An ATM cell has the payload field of __________

A. 32 bytes
B. 48 bytes
C. 64 bytes
D. 128 bytes
Answer» B. 48 bytes
495.

Frame relay has error detection at the ______

A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» B. data link layer
496.

Virtual circuit identifier in frame relay is called ______

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» A. data link connection identifier
497.

Frame relay has _______

A. only physical layer
B. only data link layer
C. only network layer
D. both physical and data link layer
Answer» D. both physical and data link layer
498.

In frame relay networks, extended address is used _______

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» A. to increase the range of data link connection identifiers
499.

What is FRAD in frame relay network?

A. frad assembles and disassembles the frames coming from other protocols
B. frad is used for modulation and demodulation
C. frad is used for error detection
D. frad is used for error recovery
Answer» A. frad assembles and disassembles the frames coming from other protocols
500.

Frame Relay is cheaper than other _____

A. lans
B. wans
C. mans
D. multipoint networks
Answer» B. wans

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.