276
104.6k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

801.

The functionalities of the presentation layerinclude

A. Data compression
B. Data encryption
C. Data description
D. All of the mentioned
Answer» D. All of the mentioned
802.

Delimiting and synchronization of data exchange is providedby

A. Application layer
B. Session layer
C. Transport layer
D. Link layer
Answer» B. Session layer
803.

In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is

A. Application layer
B. Transport layer
C. Link layer
D. Session layer
Answer» D. Session layer
804.

In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is

A. Application layer
B. Transport layer
C. Link layer
D. Session layer
Answer» A. Application layer
805.

Which layer is used to link the network support layers and user supportlayers?

A. Session layer
B. Data link layer
C. Transport layer
D. Network layer
Answer» C. Transport layer
806.

OSI standsfor

A. Open system interconnection
B. Operating system interface
C. Optical service implementation
D. Open service Internet
Answer» A. Open system interconnection
807.

Which Project 802 standard provides for a collision-free protocol?

A. 802.2
B. 802.3
C. 802.5
D. 802.6
Answer» C. 802.5
808.

The protocol data unit (PDU) for the application layer in the Internet stack is

A. Segment
B. Datagram
C. Message
D. Frame
Answer» C. Message
809.

What is a Firewall in Computer Network?

A. The physical boundary of Network
B. An operating System of Computer Network
C. A system designed to prevent unauthorized access
D. A web browsing Software
Answer» C. A system designed to prevent unauthorized access
810.

Which of the following services is not provided by wireless access point in 802.11 WLAN?

A. Association
B. Disassociation
C. Error correction
D. Integration
Answer» C. Error correction
811.

Bridge works in which layer of the OSI model?

A. Application layer
B. Transport layer
C. Network layer
D. Data link layer
Answer» D. Data link layer
812.

Why IP Protocol is considered as unreliable?

A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above
Answer» D. All of the above
813.

What are the uses of subnetting ?

A. It divides one large network into several smaller ones
B. It divides network into network classes
C. It speeds up the speed of network
D. None of above
Answer» A. It divides one large network into several smaller ones
814.

The Internet is an example of

A. Cell switched network
B. circuit switched network
C. Packet switched network
D. All of above
Answer» C. Packet switched network
815.

What does protocol defines?

A. Protocol defines what data is communicated.
B. Protocol defines how data is communicated.
C. Protocol defines when data is communicated.
D. All of above
Answer» D. All of above
816.

What is the use of Ping command?

A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in an Application
D. To test a Pinter Quality
Answer» A. To test a device on the network is reachable
817.

What is the Demilitarized Zone?

A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
Answer» A. The area between firewall & connection to an external network
818.

The combination of an IP address and a port number is known as.

A. network number
B. socket address
C. subnet mask number
D. MAC address
Answer» B. socket address
819.

Which of the following is reliable communication?

A. TCP
B. IP
C. UPD
D. All of them
Answer» A. TCP
820.

What is the size of Host bits in Class B of IP address?

A. 04
B. 08
C. 16
D. 32
Answer» C. 16
821.

Which of the following is not associated with the session layer?

A. Dialog control
B. Token management
C. Semantics of the information transmitted
D. Synchronization
Answer» C. Semantics of the information transmitted
822.

The Internet Control Message Protocol (ICMP)

A. allows gateways to send error a control messages to other gateways or hosts
B. provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another
C. reports error conditions to the original source, the source must relate errorsto individual application programs and take action to correct the problem
D. All of the above
Answer» A. allows gateways to send error a control messages to other gateways or hosts
823.

Your company has a LAN in its downtown office and has now set up aLAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.

A. Modem
B. Cable
C. Hub
D. Router
Answer» D. Router
824.

Which of the following TCP/IP protocol is used for transferringelectronic mail messages from one machine to another?

A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» C. SMTP
825.

Which of the following device is used to connect two systems, especiallyif the systems use different protocols?

A. hub
B. bridge
C. gateway
D. repeater
Answer» C. gateway
826.

can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» B. CRC
827.

The PSTN is an example of a............................. network.

A. packet switched
B. circuit switched
C. message switched
D. None of these
Answer» B. circuit switched
828.

When and where RARP is used intentionally or effectively?

A. At the time of network booting where no space to store IP address (or diskless network) for address resolution.
B. In broadcasting to get IP address of Network.
C. To get the access in private network whenever it is required.
D. None of the above.
Answer» A. At the time of network booting where no space to store IP address (or diskless network) for address resolution.
829.

Which one of the following routing algorithm can be used for network layer design?

A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» D. all of the mentioned
830.

A subset of a network that includes all the routers but contains no loopsis called:

A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» A. spanning tree
831.

ICMP is primarily used for:

A. error and diagnostic functions
B. addressing
C. forwarding
D. none of the mentioned
Answer» A. error and diagnostic functions
832.

User datagram protocol is called connectionless because:

A. all UDP packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. both (a) and (b)
D. none of the mentioned
Answer» A. all UDP packets are treated independently by transport layer
833.

An endpoint of an inter-process communication flow across a computer network is called:

A. socket
B. pipe
C. port
D. none of the mentioned
Answer» A. socket
834.

A is a TCP name for a transport service access point.

A. port
B. pipe
C. node
D. none of the mentioned
Answer» A. port
835.

Which one of the following is a transport layer protocol?

A. stream control transmission protocol
B. internet control message protocol
C. neighbour discovery protocol
D. dynamic host configuration protocol
Answer» A. stream control transmission protocol
836.

Physical layer provides:

A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for IR over optical fiber
D. all of the mentioned
Answer» D. all of the mentioned
837.

The translates internet domain and host names to IP address.

A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» A. domain name system
838.

When displaying a web page, the application layer uses the:

A. HTTP protocol
B. FTP protocol
C. SMTP protocol
D. none of the mentioned
Answer» A. HTTP protocol
839.

This is a time-sensitive service:

A. File transfer
B. File download
C. E-mail
D. Internet telephony
Answer» D. Internet telephony
840.

Packet sniffers involve:

A. Active receiver
B. Passive receiver
C. Both of the mentioned
D. None of the mentioned
Answer» B. Passive receiver
841.

Identify the incorrect statement:

A. FTP stands for File Transfer Protocol
B. FTP uses two parallel TCP connections
C. FTP sends its control information in-band
D. FTP sends exactly one file over the data connection
Answer» C. FTP sends its control information in-band
842.

If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is:

A. 5
B. 10
C. 2
D. 6
Answer» D. 6
843.

Find the FTP reply whose message is wrongly matched:

A. 331 – Username OK, password required
B. 425 – Can’t open data connection
C. 452 – Error writing file
D. 452 – Can’t open data connection
Answer» D. 452 – Can’t open data connection
844.

In an Ethernet local area network, which one of the following statementsis TRUE?

A. A station stops to sense the channel once it starts transmitting a frame.
B. The purpose of the jamming signal is to pad the frames that are smallerthan the minimum frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retransmissions
Answer» D. The exponential back off mechanism reduces the probability of collision on retransmissions
845.

The first Network:

A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Answer» D. ARPANET
846.

Which organization has authority over interstate and international commerce in the communications field?

A. ITU-T
B. IEEE
C. FCC
D. ISOC
Answer» C. FCC
847.

Baud rate is:

A. number of signal changes per second
B. number of bits per second
C. number of bytes per second
D. number of ASCII characters per second
Answer» A. number of signal changes per second
848.

The slowest transmission speeds are those of

A. Coaxial cable
B. Twisted pair wire
C. Fiber-optic cable
D. Microwave
Answer» B. Twisted pair wire
849.

The performance of a data communication network depends on

A. The number of users
B. The transmission media
C. The hardware and software
D. All of the above
Answer» D. All of the above
850.

Which of the following to keep track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet.

A. Address Resolution Protocol (ARP)
B. Internet Protocol (IP)
C. Hypertext transfer Protocol (HTTP)
D. Transmission Control Protocol/Internet Protocol (TCP/IP)
Answer» D. Transmission Control Protocol/Internet Protocol (TCP/IP)

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.