980+ Computer Networks Solved MCQs

101.

HTTP client requests by establishing a __________ connection to a particular port on the server.

A. user datagram protocol
B. transmission control protocol
C. broader gateway protocol
D. none of the mentioned
Answer» B. transmission control protocol
102.

In HTTP pipelining

A. multiple http requests are sent on a single tcp connection without waiting for the corresponding responses
B. multiple http requests can not be sent on a single tcp connection
C. multiple http requests are sent in a queue on a single tcp connection
D. none of the mentioned
Answer» A. multiple http requests are sent on a single tcp connection without waiting for the corresponding responses
103.

FTP server listens for connection on port number

A. 20
B. 21
C. 22
D. 23
Answer» B. 21
104.

In FTP protocol, client contacts server using ____ as the transport protocol.

A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» A. transmission control protocol
105.

In which mode FTP, the client initiates both the control and data connections.

A. active mode
B. passive mode
C. both (a) and (b)
D. none of the mentioned
Answer» B. passive mode
106.

The file transfer protocol is built on

A. data centric architecture
B. service oriented architecture
C. client server architecture
D. none of the mentioned
Answer» C. client server architecture
107.

In file transfer protocol, data transfer can be done in

A. stream mode
B. block mode
C. compressed mode
D. all of the mentioned
Answer» D. all of the mentioned
108.

Ethernet frame consists of

A. mac address
B. ip address
C. both (a) and (b)
D. none of the mentioned
Answer» A. mac address
109.

What is stat frame delimeter (SFD) in ethernet frame?

A. 10101010
B. 10101011
C. 00000000
D. 11111111
Answer» B. 10101011
110.

What is autonegotiation?

A. a procedure by which two connected devices choose common transmission parameters
B. a security algorithm
C. a routing algorithm
D. none of the mentioned
Answer» A. a procedure by which two connected devices choose common transmission parameters
111.

Ethernet in metropolitan area network (MAN) can be used as

A. pure ethernet
B. ethernet over sdh
C. ethernet over mpls
D. all of the mentioned
Answer» D. all of the mentioned
112.

A point-to-point protocol over ethernet is a network protocol for

A. encapsulating ppp frames inside ethernet frames
B. encapsulating ehternet framse inside ppp frames
C. for security of ethernet frames
D. for security of ppp frames
Answer» A. encapsulating ppp frames inside ethernet frames
113.

High speed ethernet works on

A. coaxial cable
B. twisted pair cable
C. optical fiber
D. none of the mentioned
Answer» C. optical fiber
114.

The maximum size of payload field in ethernet frame is

A. 1000 bytes
B. 1200 bytes
C. 1300 bytes
D. 1500 bytes
Answer» D. 1500 bytes
115.

What is interframe gap?

A. idle time between frames
B. idle time between frame bits
C. idle time between packets
D. none of the mentioned
Answer» A. idle time between frames
116.

An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called

A. short frame
B. run frame
C. mini frame
D. man frame
Answer» B. run frame
117.

Which of this is not a constituent of residential telephone line?

A. a high-speed downstream channel
B. a medium-speed downstream channel
C. a low-speed downstream channel
D. none of the mentioned
Answer» C. a low-speed downstream channel
118.

In DSL telco provides these services

A. wired phone access
B. isp
C. all of the mentioned
D. none of the mentioned
Answer» C. all of the mentioned
119.

The function of DSLAM is

A. convert analog signals into digital signals
B. convert digital signals into analog signals
C. amplify digital signals
D. none of the mentioned
Answer» A. convert analog signals into digital signals
120.

The following term is not associted with DSL

A. dslam
B. co
C. splitter
D. cmts
Answer» D. cmts
121.

HFC contains

A. fibre cable
B. coaxial cable
C. both of the mentioned
D. none of the mentioned
Answer» C. both of the mentioned
122.

Choose the statement which is not applicable for cable internet access

A. it is a shared broadcast medium
B. it includes hfcs
C. cable modem connects home pc to ethernet port
D. analog signal is converted to digital signal in dslam
Answer» D. analog signal is converted to digital signal in dslam
123.

Among the optical-distribution architectures that is essentially switched ehternet is

A. aon
B. pon
C. non
D. none of the mentioned
Answer» A. aon
124.

StarBand provides

A. ftth internet access
B. cable access
C. telephone access
D. satellite access
Answer» D. satellite access
125.

Home Access is provided by

A. dsl
B. fttp
C. cable
D. all of the mentioned
Answer» D. all of the mentioned
126.

ONT is connected to splitter using

A. high speed fibre cable
B. hfc
C. optical cable
D. none of the mentioned
Answer» C. optical cable
127.

The sharing of a medium and its link by two or more devices is called _______

A. fully duplexing
B. multiplexing
C. both a and b
D. none of the mentioned
Answer» B. multiplexing
128.

Multiplexing is used in _______

A. packet switching
B. circuit switching
C. data switching
D. none of the mentioned
Answer» B. circuit switching
129.

Which multiplexing technique transmits digital signals ?

A. fdm
B. tdm
C. wdm
D. none of the mentioned
Answer» B. tdm
130.

If there are n signal sources of same data rate than TDM link has _______ slots

A. n
B. n/2
C. n*2
D. 2^n
Answer» A. n
131.

If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is

A. 32kbps
B. 500bps
C. 500kbps
D. none of the mentioned
Answer» A. 32kbps
132.

The state when dedicated signals are idle are called

A. death period
B. poison period
C. silent period
D. none of the mentioned
Answer» C. silent period
133.

Multiplexing can provide

A. efficiency
B. privacy
C. anti jamming
D. both a and b
Answer» D. both a and b
134.

In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources.

A. greater than
B. lesser than
C. equal to
D. equal to or greater than
Answer» A. greater than
135.

In TDM, slots are further divided into

A. seconds
B. frames
C. packets
D. none of the mentioned
Answer» B. frames
136.

Multiplexing technique that shifts each signal to a different carrier frequency

A. fdm
B. tdm
C. either a or b
D. both a and b
Answer» A. fdm
137.

Physical or logical arrangement of network is

A. topology
B. routing
C. networking
D. none of the mentioned
Answer» A. topology
138.

In this topology there is a central controller or hub

A. star
B. mesh
C. ring
D. bus
Answer» A. star
139.

This topology requires multipoint connection

A. star
B. mesh
C. ring
D. bus
Answer» D. bus
140.

Data communication system spanning states, countries, or the whole world is

A. lan
B. wan
C. man
D. none of the mentioned
Answer» B. wan
141.

Data communication system within a building or campus is

A. lan
B. wan
C. man
D. none of the mentioned
Answer» A. lan
142.

Expand WAN

A. world area network
B. wide area network
C. web area network
D. none of the mentioned
Answer» B. wide area network
143.

A local telephone network is an example of a _______ network

A. packet switched
B. circuit switched
C. both of the mentioned
D. none of the mentioned
Answer» B. circuit switched
144.

Most packet switches use this principle

A. stop and wait
B. store and forward
C. both of the mentioned
D. none of the mentioned
Answer» B. store and forward
145.

If there are N routers from source to destination, total end to end delay in sending packet P(L->number of bits in the packet R-> transmission rate)

A. n
B. (n*l)/r
C. (2n*l)/r
D. l/r
Answer» B. (n*l)/r
146.

Method(s) to move data through a network of links and switches

A. packet switching
B. circuit switching
C. line switching
D. both a and b
Answer» D. both a and b
147.

The resources needed for communication between end systems are reserved for the duration of session between end systems in ________

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» B. circuit switching
148.

As the resouces are reserved between two communicating end systems in circuit switching, this is achieved

A. authentication
B. guaranteed constant rate
C. reliability
D. store and forward
Answer» B. guaranteed constant rate
149.

What is internet?

A. a single network
B. a vast collection of different networks
C. interconnection of local area networks
D. none of the mentioned
Answer» B. a vast collection of different networks
150.

To join the internet, the computer has to be connected to a

A. internet architecture board
B. internet society
C. internet service provider
D. none of the mentioned
Answer» C. internet service provider
151.

Internet access by transmitting digital data over the wires of a local telephone network is provided by

A. leased line
B. digital subscriber line
C. digital signal line
D. none of the mentioned
Answer» B. digital subscriber line
152.

ISP exchanges internet traffic between their networks by

A. internet exchange point
B. subscriber end point
C. isp end point
D. none of the mentioned
Answer» A. internet exchange point
153.

Which one of the following protocol is not used in internet?

A. http
B. dhcp
C. dns
D. none of the mentioned
Answer» D. none of the mentioned
154.

IPv6 addressed have a size of

A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Answer» C. 128 bits
155.

Internet works on

A. packet switching
B. circuit switching
C. both (a) and (b)
D. none of the mentioned
Answer» A. packet switching
156.

Which one of the following is not an application layer protocol used in internet?

A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. none of the mentioned
Answer» C. resource reservation protocol
157.

Which protocol assigns IP address to the client connected in the internet?

A. dhcp
B. ip
C. rpc
D. none of the mentioned
Answer» A. dhcp
158.

Which one of the following is not used in media access control?

A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. none of the mentioned
Answer» D. none of the mentioned
159.

In cryptography, what is cipher?

A. algorithm for performing encryption and decryption
B. encrypted message
C. both (a) and (b)
D. none of the mentioned
Answer» A. algorithm for performing encryption and decryption
160.

In asymmetric key cryptography, the private key is kept by

A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» B. receiver
161.

Which one of the following algorithm is not used in asymmetric key cryptography?

A. rsa algorithm
B. diffie-hellman algorithm
C. electronic code book algorithm
D. none of the mentioned
Answer» C. electronic code book algorithm
162.

In cryptography, the order of the letters in a message is rearranged by

A. transpositional ciphers
B. substitution ciphers
C. both (a) and (b)
D. none of the mentioned
Answer» A. transpositional ciphers
163.

What is data encryption standard (DES)?

A. block cipher
B. stream cipher
C. bit cipher
D. none of the mentioned
Answer» A. block cipher
164.

Cryptanalysis is used

A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. none of the mentioned
Answer» A. to find some insecurity in a cryptographic scheme
165.

Which one of the following is a cryptographic protocol used to secure HTTP connection?

A. stream control transmission protocol (sctp)
B. transport layer security (tsl)
C. explicit congestion notification (ecn)
D. resource reservation protocol
Answer» B. transport layer security (tsl)
166.

Voice privacy in GSM cellular telephone protocol is provided by

A. a5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Answer» A. a5/2 cipher
167.

ElGamal encryption system is

A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. none of the mentioned
Answer» B. asymmetric key encryption algorithm
168.

Cryptographic hash function takes an arbitrary block of data and returns

A. fixed size bit string
B. variable size bit string
C. both (a) and (b)
D. none of the mentioned
Answer» A. fixed size bit string
169.

The attackers a network of compromised devices known as

A. internet
B. botnet
C. telnet
D. d-net
Answer» B. botnet
170.

Which of the following is a form of DoS attack ?

A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» D. all of the mentioned
171.

The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» C. connection flooding
172.

The DoS attack is which the attacker sends deluge of packets to the targeted host

A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» B. bandwidth flooding
173.

Packet sniffers involve

A. active receiver
B. passive receiver
C. both of the mentioned
D. none of the mentioned
Answer» B. passive receiver
174.

Sniffers can be deployed in

A. wired environment
B. wifi
C. ethernet lan
D. all of the mentioned
Answer» D. all of the mentioned
175.

Firewalls are often configured to block

A. udp traffic
B. tcp traffic
C. both of the mentioned
D. none of the mentioned
Answer» A. udp traffic
176.

DHCP (dynamic host configuration protocol) provides _____ to the client.

A. ip address
B. mac address
C. url
D. none of the mentioned
Answer» A. ip address
177.

DHCP is used for

A. ipv6
B. ipv4
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
178.

The DHCP server

A. maintains a database of available ip addresses
B. maintains the information about client configuration parameters
C. grants a ip address when receives a request from a client
D. all of the mentioned
Answer» D. all of the mentioned
179.

IP assigned for a client by DHCP server is

A. for a limited period
B. for unlimited period
C. not time dependent
D. none of the mentioned
Answer» A. for a limited period
180.

DHCP uses UDP port ____ for sending data to the server.

A. 66
B. 67
C. 68
D. 69
Answer» B. 67
181.

The DHCP server can provide the _______ of the IP addresses.

A. dynamic allocation
B. automatic allocation
C. static allocation
D. all of the mentioned
Answer» D. all of the mentioned
182.

DHCP client and servers on the same subnet communicate via

A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
Answer» A. udp broadcast
183.

After obtaining the IP address, to prevent the IP conflict the client may use

A. internet relay chat
B. broader gateway protocol
C. address resolution protocol
D. none of the mentioned
Answer» C. address resolution protocol
184.

What is DHCP snooping?

A. techniques applied to ensure the security of an existing dhcp infrastructure
B. encryption of the dhcp server requests
C. algorithm for dhcp
D. none of the mentioned
Answer» A. techniques applied to ensure the security of an existing dhcp infrastructure
185.

If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.

A. mac address
B. ip address
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
186.

Real-time transport protocol (RTP) is mostly used in

A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer» D. all of the mentioned
187.

RTP is used to

A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. none of the mentioned
Answer» A. carry the media stream
188.

RTP provides the facility of jitter ____ .

A. compensation
B. expansion
C. both (a) and (b)
D. none of the mentioned
Answer» A. compensation
189.

Which protocol provides the synchronization between media streams?

A. rtp
B. rtcp
C. rpc
D. none of the mentioned
Answer» B. rtcp
190.

An RTP session is established for

A. each media stream
B. all media streams
C. some predefined number of media streams
D. none of the mentioned
Answer» A. each media stream
191.

RTP can use

A. unprevileleged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer» D. all of the mentioned
192.

Which one of the following multimedia formats can not be supported by RTP?

A. mpeg-4
B. mjpeg
C. mpeg
D. none of the mentioned
Answer» D. none of the mentioned
193.

An RTP header has a minimum size of

A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer» A. 12 bytes
194.

Which one of the following is not correct?

A. rtcp provides canonical end-point identifiers to all session participants
B. rtcp reports are expected to be sent by all participants
C. both (a) and (b)
D. none of the mentioned
Answer» D. none of the mentioned
195.

Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?

A. srtp
B. rtcp
C. rcp
D. none of the mentioned
Answer» A. srtp
196.

Ping can

A. measure round-trip time
B. report packet loss
C. report latency
D. all of the mentioned
Answer» D. all of the mentioned
197.

Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is

A. use dual-stack approach
B. tunneling
C. no solution
D. replace the system
Answer» B. tunneling
198.

Ping sweep is a part of

A. traceroute
B. nmap
C. route
D. ipconfig
Answer» B. nmap
199.

ICMP is used in

A. ping
B. traceroute
C. ifconfig
D. both a and b
Answer» D. both a and b
200.

_____ command is used to manipulate TCP/IP routing table.

A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» A. route
Tags
  • Question and answers in Computer Networks,
  • Computer Networks multiple choice questions and answers,
  • Computer Networks Important MCQs,
  • Solved MCQs for Computer Networks,
  • Computer Networks MCQs with answers PDF download