980+ Computer Networks Solved MCQs

501.

Frame Relay networks offer an option called _______

A. voice over for relay
B. voice over fine relay
C. voice on frame relay
D. voice over frame relay
Answer» D. voice over frame relay
502.

There are ________ total features of Frame Relay.

A. five
B. seven
C. nine
D. ten
Answer» C. nine
503.

Frame Relay deploys physical layer carriers such as _______

A. adms
B. upsr
C. blsr
D. sonet
Answer» D. sonet
504.

Frame relay provides error detection at the ______

A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» B. data link layer
505.

Virtual circuit identifier in frame relay is called _______

A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» A. data link connection identifier
506.

Frame relay has only _______

A. physical layer
B. data link layer
C. physical layer and data link layer
D. network layer and data link layer
Answer» C. physical layer and data link layer
507.

In frame relay networks, extended address is used ________

A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» A. to increase the range of data link connection identifiers
508.

Common gateway interface is used to _______

A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. download media files
Answer» A. generate executable files from web content by web server
509.

URL stands for ________

A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» C. uniform resource locator
510.

Which one of the following is not used to generate dynamic web pages?

A. php
B. asp.net
C. jsp
D. css
Answer» D. css
511.

An alternative to JavaScript on windows platform is _______

A. vbscript
B. asp.net
C. jsp
D. php
Answer» A. vbscript
512.

What is document object model (DOM)?

A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in asp.net
D. scripting language
Answer» A. convention for representing and interacting with objects in html documents
513.

AJAX stands for _______

A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Answer» A. asynchronous javascript and xml
514.

The data field cannot carry which of the following?

A. tcp segment
B. udp segment
C. icmp messages
D. smtp messages
Answer» C. icmp messages
515.

What should be the flag value to indicate the last fragment?

A. 0
B. 1
C. ttl value
D. protocol field value
Answer» A. 0
516.

Which of these is not applicable for IP protocol?

A. is connectionless
B. offer reliable service
C. offer unreliable service
D. does not offer error reporting
Answer» B. offer reliable service
517.

Which of these is not applicable for IP protocol?

A. connectionless
B. offer reliable service
C. offer unreliable service
D. does not offer error reporting
Answer» B. offer reliable service
518.

Which of the following demerits does Fragmentation have?

A. complicates routers
B. open to dos attack
C. overlapping of fragments
D. all of the mentioned
Answer» D. all of the mentioned
519.

Which field helps to check rearrangement of the fragments?

A. offset
B. flag
C. ttl
D. identifier
Answer» A. offset
520.

In classless addressing, there are no classes but addresses are still granted in ______

A. ips
B. blocks
C. codes
D. sizes
Answer» B. blocks
521.

In IPv4 Addresses, classful addressing is replaced with ________

A. classless addressing
B. classful addressing
C. classful advertising
D. classless advertising
Answer» A. classless addressing
522.

First address in a block is used as network address that represents the ________

A. class network
B. entity
C. organization
D. codes
Answer» C. organization
523.

In classful addressing, a large part of available addresses are ________

A. organized
B. blocked
C. wasted
D. communicated
Answer» C. wasted
524.

Network addresses are a very important concept of ________

A. routing
B. mask
C. ip addressing
D. classless addressing
Answer» C. ip addressing
525.

Which of this is not a class of IP address?

A. class e
B. class c
C. class d
D. class f
Answer» D. class f
526.

The header length of an IPv6 datagram is ___________

A. 10bytes
B. 25bytes
C. 30bytes
D. 40bytes
Answer» D. 40bytes
527.

IPv6 does not use _________ type of address.

A. broadcast
B. multicast
C. anycast
D. unicast
Answer» A. broadcast
528.

Which among the following features is present in IPv6 but not in IPv4?

A. fragmentation
B. header checksum
C. options
D. anycast address
Answer» D. anycast address
529.

The _________ field determines the lifetime of IPv6 datagram

A. hop limit
B. ttl
C. next header
D. type of traffic
Answer» A. hop limit
530.

Dual-stack approach refers to _________

A. implementing ipv4 with 2 stacks
B. implementing ipv6 with 2 stacks
C. node has both ipv4 and ipv6 support
D. implementing a mac address with 2 stacks
Answer» C. node has both ipv4 and ipv6 support
531.

A link local address of local addresses is used in an _______

A. isolated router
B. isolated mask
C. isolated subnet
D. isolated net
Answer» C. isolated subnet
532.

In IPv6 addresses, addresses that start with eight 0s are called ________

A. unicast addresses
B. multicast addresses
C. any cast addresses
D. reserved addresses
Answer» D. reserved addresses
533.

Which statement(s) about IPv6 addresses are true?

A. leading zeros are required
B. two colons (::) are used to represent successive hexadecimal fields of zeros
C. two colons (::) are used to separate fields
D. a single interface cannot have multiple ipv6 addresses of different types
Answer» B. two colons (::) are used to represent successive hexadecimal fields of zeros
534.

When was IPv6 launched?

A. june 2, 2012
B. june 4, 2012
C. june 5, 2012
D. june 6, 2012
Answer» D. june 6, 2012
535.

Which layer is responsible for process-to-process delivery?

A. physical layer
B. network layer
C. transport layer
D. application layer
Answer» C. transport layer
536.

Multiple processes on destinations at transport layer are identified by __________

A. mac address
B. port number
C. host number
D. host address
Answer» B. port number
537.

Range of port numbers in Internet model is __________

A. 0 and 32,765(8-bit)
B. 0 and 32,765(16-bit)
C. 0 and 65,535(32-bit)
D. 0 and 65,535(16-bit)
Answer» D. 0 and 65,535(16-bit)
538.

The combination of an IP address and port number is called as ________

A. socket address
B. port address
C. mac address
D. host address
Answer» A. socket address
539.

In transport layer, Multiplexing is done at _________

A. channel
B. receiver site
C. sender site
D. packet
Answer» C. sender site
540.

Header size of the ICMP message is _________

A. 8-bytes
B. 8-bits
C. 16-bytes
D. 16-bits
Answer» A. 8-bytes
541.

During error reporting, ICMP always reports error messages to ________

A. destination
B. source
C. next router
D. previous router
Answer» B. source
542.

Which of these is not a type of error-reporting message?

A. destination unreachable
B. source quench
C. router error
D. time exceeded
Answer» C. router error
543.

The main reason for transition from IPv4 to IPv6 is _________

A. huge number of systems on the internet
B. very low number of system on the internet
C. providing standard address
D. to provide faster internet
Answer» A. huge number of systems on the internet
544.

Which of the following is not a transition strategy?

A. dual stack
B. tunneling
C. conversion
D. header translation
Answer» C. conversion
545.

Which of the following is not applicable for IP?

A. error reporting
B. handle addressing conventions
C. datagram format
D. packet handling
Answer» A. error reporting
546.

If the value in protocol field is 17, the transport layer protocol used is _________

A. tcp
B. udp
C. icmp
D. igmp
Answer» B. udp
547.

In an IPv6 header, the traffic class field is similar to which field in the IPv4 header?

A. fragmentation field
B. fast switching
C. tos field
D. option field
Answer» C. tos field
548.

IPv6 does not use ________ type of address.

A. broadcast
B. multicast
C. any cast
D. unicast
Answer» A. broadcast
549.

Which are the features present in IPv4 but not in IPv6?

A. fragmentation
B. header checksum
C. options
D. anycast address
Answer» D. anycast address
550.

_________ implies that all subnets obtained from the same subnet mask.

A. static subnetting
B. dynamic subnetting
C. variable length subnetting
D. dynamic length subnetting
Answer» A. static subnetting
551.

Which of the following are Gigabit Ethernets?

A. 1000 base-sx
B. 1000 base-lx
C. 1000 base-cx
D. all of the mentioned
Answer» D. all of the mentioned
552.

_________ is another kind of fiber optic network with an active star for switching.

A. s/net
B. sw/net
C. net/sw
D. fs/net
Answer» A. s/net
553.

What is the subnet id of a host with an IP address 172.16.66.0/21?

A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer» C. 172.16.64.0
554.

The network address of 172.16.0.0/19 provides how many subnets and hosts?

A. 7 subnets, 30 hosts each
B. 8 subnets, 8,190 hosts each
C. 8 subnets, 2,046 hosts each
D. 7 subnets, 2,046 hosts each
Answer» B. 8 subnets, 8,190 hosts each
555.

Which type of Ethernet framing is used for TCP/IP and DEC net?

A. ethernet 802.3
B. ethernet 802.2
C. ethernet ii
D. ethernet snap
Answer» C. ethernet ii
556.

Which NetWare protocol works on layer 3–network layer—of the OSI model?

A. ipx
B. ncp
C. spx
D. netbios
Answer» A. ipx
557.

Which NetWare protocol provides link-state routing?

A. nlsp
B. rip
C. sap
D. ncp
Answer» A. nlsp
558.

0.0.0 router IGRP 109 network 172.68.7.0

A. it isolates networks 10.0.0.0 and 172.68.7.0
B. it loads igrp for networks 109 and 71
C. it disables rip
D. it disables all routing protocols
Answer» A. it isolates networks 10.0.0.0 and 172.68.7.0
559.

What does the “IPX maximum-paths 2” command accomplish?

A. it enables load sharing on 2 paths if the paths are equal metric paths
B. it sets up routing to go to network 2
C. it is the default for cisco ipx load sharing
D. it enables load sharing on 2 paths if the paths are unequal metric paths
Answer» A. it enables load sharing on 2 paths if the paths are equal metric paths
560.

Novell’s implementation of RIP updates routing tables every _________ seconds.

A. 60
B. 90
C. 10
D. 30
Answer» A. 60
561.

Which protocol should you select if the network diameter is more than 17 hops?

A. ripv1
B. ripv2
C. eigrp
D. both ripv1 and ripv2
Answer» A. ripv1
562.

How often does a RIPv1 router broadcast its routing table by default?

A. every 30 seconds
B. every 60 seconds
C. every 90 seconds
D. ripv1 does not broadcast periodically
Answer» A. every 30 seconds
563.

Which command displays RIP routing updates?

A. show ip route
B. debug ip rip
C. show protocols
D. debug ip route
Answer» B. debug ip rip
564.

Default administrative distance of a static route is ________

A. 0
B. 90
C. 100
D. 1
Answer» D. 1
565.

Which protocol gives a full route table update every 30 seconds?

A. iegrp
B. rip
C. icmp
D. ip
Answer» B. rip
566.

_________ is the default administrative distance of RIP.

A. 0
B. 90
C. 120
D. 130
Answer» C. 120
567.

Which statement is true regarding classless routing protocol?

A. the use of discontinuous networks is not allowed
B. use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
D. igrp supports classes routing within the same autonomous system
Answer» B. use of variable length subnet masks is permitted
568.

Where should we use default routing?

A. on stub networks- which have only one exit path out of the network
B. which have more than one exit path out of the network
C. minimum five exit paths out of the network
D. maximum five exit paths out of the network
Answer» A. on stub networks- which have only one exit path out of the network
569.

Which statement is true regarding classless routing protocols?

A. the use of discontinuous networks is not allowed
B. the use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
D. ripv2 supports classless routing
Answer» B. the use of variable length subnet masks is permitted
570.

Which of the following is true regarding RIPv2?

A. it has a lower administrative distance than ripv1
B. it converges faster than ripv1
C. it has the same timers as ripv1
D. it is harder to configure than ripv1
Answer» C. it has the same timers as ripv1
571.

Which of the situations might not require multiple routing protocols in a network?

A. when a new layer 2-only switch is added to the network
B. when you are migrating from one routing protocol to another
C. when you are using routers from multiple vendors
D. when there are host-based routers from multiple vendors
Answer» A. when a new layer 2-only switch is added to the network
572.

Which two routing protocols can be redistributed into OSPF by a Cisco router?

A. ip eigrp and appletalk eigrp
B. appletalk eigrp and ripv2
C. ripv2 and ip eigrp
D. ipx rip & appletalk eigrp
Answer» C. ripv2 and ip eigrp
573.

What does administrative distance rank?

A. metrics
B. sources of routing information
C. router reliability
D. best paths
Answer» B. sources of routing information
574.

Which protocol maintains neighbor adjacencies?

A. ripv2 and eigrp
B. igrp and eigrp
C. ripv2
D. eigrp
Answer» C. ripv2
575.

Which routing protocol implements the diffusing update algorithm?

A. is-is
B. igrp
C. eigrp
D. ospf
Answer» C. eigrp
576.

Which protocol should you select if the network diameter is more than 17 hops?

A. ripv1
B. ripv2
C. eigrp
D. ospf
Answer» B. ripv2
577.

In the network HTTP resources are located by __________

A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Answer» A. uniform resource identifier
578.

FTP server listens for connection on which port number?

A. 20
B. 21
C. 22
D. 23
Answer» B. 21
579.

In FTP protocol, a client contacts a server using ______ as the transport protocol.

A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» A. transmission control protocol
580.

The File Transfer Protocol is built on __________

A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Answer» C. client server architecture
581.

In File Transfer Protocol, data transfer cannot be done in __________

A. stream mode
B. block mode
C. compressed mode
D. message mode
Answer» D. message mode
582.

Which methods are commonly used in Server Socket class?

A. public output stream get output stream ()
B. public socket accept ()
C. public synchronized void close ()
D. public void connect ()
Answer» B. public socket accept ()
583.

The client in socket programming must know which information?

A. ip address of server
B. port number
C. both ip address of server & port number
D. only its own ip address
Answer» C. both ip address of server & port number
584.

TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________

A. socket
B. ip address
C. protocol
D. mac address
Answer» C. protocol
585.

What does the java.net.InetAddress class represent?

A. socket
B. ip address
C. protocol
D. mac address
Answer» B. ip address
586.

Which classes are used for connection-less socket programming?

A. datagram socket
B. datagram packet
C. both datagram socket & datagram packet
D. server socket
Answer» C. both datagram socket & datagram packet
587.

In Inet Address class, which method returns the host name of the IP Address?

A. public string get hostname()
B. public string gethostaddress()
C. public static inetaddress get localhost()
D. public getbyname()
Answer» A. public string get hostname()
588.

Cookies were originally designed for ____________

A. client side programming
B. server side programming
C. both client side programming and server side programming
D. socket programming
Answer» B. server side programming
589.

The Cookie manipulation is done using which property?

A. cookie
B. cookies
C. manipulate
D. manipulate cookie
Answer» A. cookie
590.

Which of the following explains Cookies nature?

A. non volatile
B. volatile
C. intransient
D. transient
Answer» D. transient
591.

Which attribute is used to extend the lifetime of a cookie?

A. higher-age
B. increase-age
C. max-age
D. lifetime
Answer» C. max-age
592.

Which of the following defines the Cookie visibility?

A. document path
B. localstorage
C. sessionstorage
D. all of the mentioned
Answer» D. all of the mentioned
593.

Which of the following can be used to configure the scope of the Cookie visibility?

A. path
B. domain
C. both path and domain
D. server
Answer» D. server
594.

How can you set a Cookie visibility scope to local Storage?

A. /
B. %
C. *
D. #
Answer» A. /
595.

Which of the following is a Boolean cookie attribute?

A. bool
B. secure
C. lookup
D. domain
Answer» B. secure
596.

What is the constraint on the data per cookie?

A. 2 kb
B. 1 kb
C. 4 kb
D. 3 kb
Answer» C. 4 kb
597.

What does REST stand for?

A. represent state transfer
B. representational state transfer
C. representing state transfer
D. representation state transfer
Answer» B. representational state transfer
598.

Which of the following HTTP methods should be idempotent in nature?

A. options
B. delete
C. post
D. head
Answer» B. delete
599.

Next-Hop Method is used to reduce contents of a _________

A. revolving table
B. rotating table
C. routing table
D. re-allocate table
Answer» C. routing table
600.

In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________

A. graph
B. tree
C. network
D. link
Answer» A. graph
Tags
  • Question and answers in Computer Networks,
  • Computer Networks multiple choice questions and answers,
  • Computer Networks Important MCQs,
  • Solved MCQs for Computer Networks,
  • Computer Networks MCQs with answers PDF download