276
104.6k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

51.

Which one of the following is a transport layer protocol used in internet?

A. tcp
B. udp
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
52.

User datagram protocol is called connectionless because

A. all udp packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. both (a) and (b)
D. none of the mentioned
Answer» A. all udp packets are treated independently by transport layer
53.

Transmission control protocol is

A. connection oriented protocol
B. uses a three way handshake to establish a connection
C. recievs data from application as a single stream
D. all of the mentioned
Answer» D. all of the mentioned
54.

An endpoint of an inter-process communication flow across a computer network is called

A. socket
B. pipe
C. port
D. none of the mentioned
Answer» A. socket
55.

Socket-style API for windows is called

A. wsock
B. winsock
C. wins
D. none of the mentioned
Answer» B. winsock
56.

Which one of the following is a version of UDP with congestion control?

A. datagram congestion control protocol
B. stream control transmission protocol
C. structured stream transport
D. none of the mentioned
Answer» A. datagram congestion control protocol
57.

A _____ is a TCP name for a transport service access point.

A. port
B. pipe
C. node
D. none of the mentioned
Answer» A. port
58.

Transport layer protocols deals with

A. application to application communication
B. process to process communication
C. node to node communication
D. none of the mentioned
Answer» B. process to process communication
59.

The ____ translates internet domain and host names to IP address.

A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» A. domain name system
60.

Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits

A. 96 to 127
B. 0 to 63
C. 80 to 95
D. 64 to 79
Answer» A. 96 to 127
61.

Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?

A. http
B. ftp
C. telnet
D. none of the mentioned
Answer» C. telnet
62.

Application layer protocol defines

A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of the mentioned
Answer» D. all of the mentioned
63.

Which one of the following protocol delivers/stores mail to reciever server?

A. simple mail transfer protocol
B. post office protocol
C. internet mail access protocol
D. hypertext transfer protocol
Answer» A. simple mail transfer protocol
64.

The ASCII encoding of binary data is called

A. base 64 encoding
B. base 32 encoding
C. base 16 encoding
D. base 8 encoding
Answer» A. base 64 encoding
65.

Which one of the following is an internet standard protocol for managing devices on IP network?

A. dynamic host configuration protocol
B. simple newtwork management protocol
C. internet message access protocol
D. media gateway protocol
Answer» B. simple newtwork management protocol
66.

Which one of the following is not an application layer protocol?

A. media gateway protocol
B. dynamic host configuration protocol
C. resource reservation protocol
D. session initiation protocol
Answer» C. resource reservation protocol
67.

Which protocol is a signalling communication protocol used for controlling multimedia communication sessions?

A. session initiation protocol
B. session modelling protocol
C. session maintenance protocol
D. none of the mentioned
Answer» A. session initiation protocol
68.

Which one of the following is not correct?

A. application layer protocols are used by both source and destination devices during a communication session
B. application layer protocols implemented on the source and destination host must match
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
69.

When displaying a web page, the application layer uses the

A. http protocol
B. ftp protocol
C. smtp protocol
D. none of the mentioned
Answer» A. http protocol
70.

The entire hostname has a maximum of

A. 255 characters
B. 127 characters
C. 63 characters
D. 31 characters
Answer» A. 255 characters
71.

A DNS client is called

A. dns updater
B. dns resolver
C. dns handler
D. none of the mentioned
Answer» B. dns resolver
72.

Servers handle requests for other domains

A. directly
B. by contacting remote dns server
C. it is not possible
D. none of the mentioned
Answer» B. by contacting remote dns server
73.

DNS database contains

A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer» D. all of the mentioned
74.

If a server has no clue about where to find the address for a hostname then

A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer» A. server asks to the root server
75.

Which one of the following allows client to update their DNS entry as their IP address change?

A. dynamic dns
B. mail transfer agent
C. authoritative name server
D. none of the mentioned
Answer» A. dynamic dns
76.

Wildcard domain names start with label

A. @
B. *
C. &
D. #
Answer» B. *
77.

The right to use a domain name is delegated by domain name registers which are accredited by

A. internet architecture board
B. internet society
C. internet research task force
D. internet corporation for assigned names and numbers
Answer» D. internet corporation for assigned names and numbers
78.

The domain name system is maintained by

A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer» A. distributed database system
79.

Which one of the following is not true?

A. multiple hostnames may correspond to a single ip address
B. a single hostname may correspond to many ip addresses
C. a single hostname may correspond to a single ip address
D. none of the mentioned
Answer» C. a single hostname may correspond to a single ip address
80.

Telnet protocol is used to establish a connection to

A. tcp port number 21
B. tcp port number 22
C. tcp port number 23
D. tcp port number 24
Answer» C. tcp port number 23
81.

Which one of the following is not true?

A. telnet defines a network virtual terminal (nvt) standard
B. client programs interact with nvt
C. server translates nvt operations
D. none of the mentioned
Answer» D. none of the mentioned
82.

All telnet operations are sent as

A. 4 bytes
B. 8 bytes
C. 16 bytes
D. 32 bytes
Answer» B. 8 bytes
83.

AbsoluteTelnet is a telnet client for

A. windows
B. linux
C. mac
D. none of the mentioned
Answer» A. windows
84.

The decimal code of interpret as command (IAC) character is

A. 252
B. 253
C. 254
D. 255
Answer» D. 255
85.

In character mode operation of telnet implementation

A. each character typed is sent by the client to the server
B. each character typed is discarded by the server
C. both (a) an (b)
D. none of the mentioned
Answer» A. each character typed is sent by the client to the server
86.

Which one of the following is not correct?

A. telnet is a general purpose client-server program
B. telnet lets user access an application on a remote computer
C. telnet can also be used for file transfer
D. none of the mentioned
Answer» C. telnet can also be used for file transfer
87.

Which operating mode of telnet is full duplex?

A. default mode
B. server mode
C. line mode
D. none of the mentioned
Answer» C. line mode
88.

If we want that a character be interpreted by the client instead of server

A. escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. none of the mentioned
Answer» A. escape character has to be used
89.

Dynamic web page

A. is same every time whenever it displays
B. generates on demand by a program or a request from browser
C. both (a) and (b)
D. none of the mentioned
Answer» B. generates on demand by a program or a request from browser
90.

What is a web browser?

A. a program that can display a web page
B. a program used to view html documents
C. it enables user to access the resources of internet
D. all of the mentioned
Answer» D. all of the mentioned
91.

Common gateway interface is used to

A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. none of the mentioned
Answer» A. generate executable files from web content by web server
92.

URL stands for

A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» C. uniform resource locator
93.

A web cookie is a small piece of data

A. sent from a website and stored in user’s web browser while a user is browsing a website
B. sent from user and stored in the server while a user is browsing a website
C. sent from root server to all servers
D. none of the mentioned
Answer» A. sent from a website and stored in user’s web browser while a user is browsing a website
94.

Which one of the following is not used to generate dynamic web pages?

A. php
B. asp.net
C. jsp
D. none of the mentioned
Answer» D. none of the mentioned
95.

An alternative of javascript on windows platform is

A. vbscript
B. asp.net
C. jsp
D. none of the mentioned
Answer» A. vbscript
96.

What is document object model (DOM)?

A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in asp.net
D. none of the mentioned
Answer» A. convention for representing and interacting with objects in html documents
97.

AJAX stands for

A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Answer» A. asynchronous javascript and xml
98.

Multiple object can be sent over a TCP connection between client and server in

A. persistent http
B. nonpersistent http
C. both (a) and (b)
D. none of the mentioned
Answer» A. persistent http
99.

HTTP is ________ protocol.

A. application layer
B. transport layer
C. network layer
D. none of the mentioned
Answer» A. application layer
100.

In the network HTTP resources are located by

A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. none of the mentioned
Answer» A. uniform resource identifier

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.