980+ Computer Networks Solved MCQs

601.

RPF stands for __________

A. reverse path forwarding
B. reverse path failure
C. reverse packet forwarding
D. reverse protocol failure
Answer» A. reverse path forwarding
602.

LSP stands for __________

A. link stable packet
B. link state packet
C. link state protocol
D. link state path
Answer» B. link state packet
603.

Network layer firewall works as a ________

A. frame filter
B. packet filter
C. signal filter
D. content filter
Answer» B. packet filter
604.

Network layer firewall has two sub-categories called ____________

A. stateful firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network firewall and data firewall
Answer» A. stateful firewall and stateless firewall
605.

WPA2 is used for security in _______

A. ethernet
B. bluetooth
C. wi-fi
D. e-mail
Answer» C. wi-fi
606.

Open Shortest Path First (OSPF) is also called as _____________

A. link state protocol
B. error-correction protocol
C. routing information protocol
D. border gateway protocol
Answer» A. link state protocol
607.

The computation of the shortest path in OSPF is usually done by ____________

A. bellman-ford algorithm
B. routing information protocol
C. dijkstra’s algorithm
D. distance vector routing
Answer» C. dijkstra’s algorithm
608.

In OSPF, which protocol is used to discover neighbour routers automatically?

A. link state protocol
B. error-correction protocol
C. routing information protocol
D. hello protocol
Answer» D. hello protocol
609.

Which of the following is not a type of OSPF packet?

A. hello
B. link-state request
C. link-state response
D. link-state ack
Answer» C. link-state response
Explanation: The five types of OSPF packets are: Hello, Database description, Linkstate
request, Link-state update, and Link-state ACK. There is no Link-state response
packet; the neighbor router sends a Link-state update packet as a response to the
Linkstate request packet if there is an update in the routing table.
610.

In OSPF header, which field is used to detect errors in the packet?

A. type
B. area id
C. authentication type
D. checksum
Answer» D. checksum
Explanation: The checksum field is used to detect errors. It makes sure that the data
portions that are being sent are all in integrity. It can detect duplicated bits. Once an
error is detected, the sender has to re-transmit the data as it won’t receive an
acknowledgment.
611.

The outcome of Dijkstra’s calculation is used to populate the __________

A. topology table
B. routing table
C. neighbor table
D. adjacency table
Answer» B. routing table
612.

What is the IP protocol number for OSPF packets?

A. 89
B. 86
C. 20
D. 76
Answer» A. 89
613.

Which packet is NOT an OSPF packet type?

A. lsu
B. lsr
C. dbd
D. query
Answer» D. query
614.

Which multicast address does the OSPF Hello protocol use?

A. 224.0.0.5
B. 224.0.0.6
C. 224.0.0.7
D. 224.0.0.8
Answer» A. 224.0.0.5
615.

DBD packets are involved during which two states?

A. exstart and exchange
B. loading and two-way
C. init and full
D. down and loading
Answer» A. exstart and exchange
616.

At which interval does OSPF refresh LSAs?

A. 10 seconds
B. 30 seconds
C. 30 minutes
D. 1 hour
Answer» D. 1 hour
617.

Which field is NOT a field within an OSPF packet header?

A. packet length
B. router id
C. authentication type
D. maxage time
Answer» D. maxage time
618.

Which two commands are required for basic OSPF configuration?

A. “[network mask] area [area-id]” and “router ospf [process-id]”
B. “[wildcard-mask] area [area-id]” and “[network mask] area [area-id]”
C. only “router ospf [process-id]”
D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”
Answer» D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”
619.

Which OSPF show command describes a list of OSPF adjacencies?

A. show ip ospf interface
B. show ip ospf
C. show ip route
D. show ip ospf neighbor
Answer» D. show ip ospf neighbor
620.

Datagram switching is done at which layer of OSI model?

A. network layer
B. physical layer
C. application layer
D. transport layer
Answer» A. network layer
621.

Packets in datagram switching are referred to as ________

A. switches
B. segments
C. datagrams
D. data-packets
Answer» C. datagrams
622.

Datagrams are routed to their destinations with the help of ________

A. switch table
B. segments table
C. datagram table
D. routing table
Answer» C. datagram table
623.

The main contents of the routing table in datagram networks are ___________

A. source and destination address
B. destination address and output port
C. source address and output port
D. input port and output port
Answer» B. destination address and output port
624.

Which of the following is true with respect to the delay in datagram networks?

A. delay is greater than in a virtual circuit network
B. each packet may experience a wait at a switch
C. delay is not uniform for the packets of a message
D. all of the mentioned
Answer» D. all of the mentioned
625.

Which of the following is false with respect to the datagram networks?

A. number of flows of packets are not limited
B. packets may not be in order at the destination
C. path is not reserved
D. delay is the same for all packets in a flow
Answer» D. delay is the same for all packets in a flow
626.

Network layer firewall works as a __________

A. frame filter
B. packet filter
C. content filter
D. virus filter
Answer» B. packet filter
627.

Network layer firewall has two sub-categories as _________

A. state full firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network layer firewall and session layer firewall
Answer» A. state full firewall and stateless firewall
628.

Which of the following is / are the types of firewall?

A. packet filtering firewall
B. dual homed gateway firewall
C. screen host firewall
D. dual host firewall
Answer» A. packet filtering firewall
629.

A proxy firewall filters at _________

A. physical layer
B. data link layer
C. network layer
D. application layer
Answer» D. application layer
630.

A packet filter firewall filters at __________

A. physical layer
B. data link layer
C. network layer or transport layer
D. application layer
Answer» C. network layer or transport layer
631.

What is one advantage of setting up a DMZ with two firewalls?

A. you can control where traffic goes in three networks
B. you can do stateful packet filtering
C. you can do load balancing
D. improved network performance
Answer» C. you can do load balancing
632.

A stateful firewall maintains a ___________ which is a list of active connections.

A. routing table
B. bridging table
C. state table
D. connection table
Answer» A. routing table
633.

Performance management is closely related to _________

A. proactive fault management
B. fault management
C. reactive fault management
D. preventive fault management
Answer» B. fault management
634.

Which of the following networks supports pipelining effect?

A. circuit-switched networks
B. message-switched networks
C. packet-switched networks
D. stream-switched networks
Answer» C. packet-switched networks
635.

MIB is a collection of groups of objects that can be managed by __________

A. smtp
B. udp
C. snmp
D. tcp/ip
Answer» C. snmp
636.

A network management system can be divided into ___________

A. three categories
B. five broad categories
C. seven broad categories
D. ten broad categories
Answer» B. five broad categories
637.

Ping can _________

A. measure round-trip time
B. report packet loss
C. report latency
D. all of the mentioned
Answer» D. all of the mentioned
638.

Ping sweep is a part of _________

A. traceroute
B. nmap
C. route
D. ipconfig
Answer» B. nmap
639.

ICMP is used in _________

A. ping
B. traceroute
C. ifconfig
D. both ping & traceroute
Answer» D. both ping & traceroute
640.

__________ command is used to manipulate TCP/IP routing table.

A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» A. route
641.

Which of the following is not related to ipconfig in Microsoft Windows?

A. display all current tcp/ip network configuration values
B. modify dhcp settings
C. modify dns settings
D. trace the routers in the path to destination
Answer» D. trace the routers in the path to destination
642.

__________ allows checking if a domain is available for registration.

A. domain check
B. domain dossier
C. domain lookup
D. domain registers
Answer» A. domain check
643.

Choose the wrong statement from the following.

A. nslookup is used to query a dns server for dns data
B. ping is used to check connectivity
C. pathping combines the functionality of ping with that of route
D. ifconfig can configure tcp/ip network interface parameters
Answer» C. pathping combines the functionality of ping with that of route
644.

Ethernet frame consists of ____________

A. mac address
B. ip address
C. default mask
D. network address
Answer» A. mac address
645.

What is start frame delimeter (SFD) in ethernet frame?

A. 10101010
B. 10101011
C. 00000000
D. 11111111
Answer» B. 10101011
646.

MAC address is of ___________

A. 24 bits
B. 36 bits
C. 42 bits
D. 48 bits
Answer» D. 48 bits
647.

Ethernet in metropolitan area network (MAN) can be used as ___________

A. pure ethernet
B. ethernet over sdh
C. ethernet over mpls
D. all of the mentioned
Answer» D. all of the mentioned
648.

A point-to-point protocol over ethernet is a network protocol for __________

A. encapsulating ppp frames inside ethernet frames
B. encapsulating ehternet framse inside ppp frames
C. for security of ethernet frames
D. for security of ppp frames
Answer» A. encapsulating ppp frames inside ethernet frames
649.

High speed ethernet works on _________

A. coaxial cable
B. twisted pair cable
C. optical fiber
D. unshielded twisted pair cable
Answer» C. optical fiber
650.

The maximum size of payload field in ethernet frame is __________

A. 1000 bytes
B. 1200 bytes
C. 1300 bytes
D. 1500 bytes
Answer» D. 1500 bytes
651.

What is interframe gap?

A. idle time between frames
B. idle time between frame bits
C. idle time between packets
D. idle time between networks
Answer» A. idle time between frames
652.

In wireless ad-hoc network _________

A. access point is not required
B. access point is must
C. nodes are not required
D. all nodes are access points
Answer» A. access point is not required
653.

In wireless distribution system __________

A. multiple access point are inter-connected with each other
B. there is no access point
C. only one access point exists
D. access points are not required
Answer» A. multiple access point are inter-connected with each other
654.

A wireless network interface controller can work in _______

A. infrastructure mode
B. ad-hoc mode
C. both infrastructure mode and ad-hoc mode
D. wds mode
Answer» C. both infrastructure mode and ad-hoc mode
655.

In wireless network an extended service set is a set of ________

A. connected basic service sets
B. all stations
C. all access points
D. connected access points
Answer» A. connected basic service sets
656.

Mostly ________ is used in wireless LAN.

A. time division multiplexing
B. orthogonal frequency division multiplexing
C. space division multiplexing
D. channel division multiplexing
Answer» B. orthogonal frequency division multiplexing
657.

Which one of the following event is not possible in wireless LAN?

A. collision detection
B. acknowledgement of data frames
C. multi-mode data transmission
D. connection to wired networks
Answer» A. collision detection
658.

What is Wired Equivalent Privacy (WEP)?

A. security algorithm for ethernet
B. security algorithm for wireless networks
C. security algorithm for usb communication
D. security algorithm for emails
Answer» B. security algorithm for wireless networks
659.

What is WPA?

A. wi-fi protected access
B. wired protected access
C. wired process access
D. wi-fi process access
Answer» A. wi-fi protected access
660.

What is internet?

A. a single network
B. a vast collection of different networks
C. interconnection of local area networks
D. interconnection of wide area networks
Answer» B. a vast collection of different networks
661.

To join the internet, the computer has to be connected to a _________

A. internet architecture board
B. internet society
C. internet service provider
D. different computer
Answer» C. internet service provider
662.

ISP exchanges internet traffic between their networks by __________

A. internet exchange point
B. subscriber end point
C. isp end point
D. internet end point
Answer» A. internet exchange point
663.

Which of the following protocols is used in the internet?

A. http
B. dhcp
C. dns
D. dns, http and dns
Answer» D. dns, http and dns
664.

The size of an IP address in IPv6 is _________

A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Answer» C. 128 bits
Explanation: an ipv6 address is 128 bits long. therefore, 2128 i.e. 340 undecillion addresses are possible in ipv6. ipv4 has only 4 billion possible addresses and ipv6 would be a brilliant alternative in case ipv4 runs out of possible new addresses.
665.

Internet works on _______

A. packet switching
B. circuit switching
C. both packet switching and circuit switching
D. data switching
Answer» A. packet switching
666.

Which one of the following is not an application layer protocol used in internet?

A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. local procedure call
Answer» C. resource reservation protocol
667.

Which protocol assigns IP address to the client connected in the internet?

A. dhcp
B. ip
C. rpc
D. rsvp
Answer» A. dhcp
668.

Which one of the following is not used in media access control?

A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. packet switching
Answer» D. packet switching
669.

An interconnected collection of piconet is called ___________

A. scatternet
B. micronet
C. mininet
D. multinet
Answer» A. scatternet
670.

In a piconet, there can be up to ________ parked nodes in the network.

A. 63
B. 127
C. 255
D. 511
Answer» C. 255
671.

Bluetooth is the wireless technology for __________

A. local area network
B. personal area network
C. metropolitan area network
D. wide area network
Answer» B. personal area network
672.

Bluetooth uses __________

A. frequency hopping spread spectrum
B. orthogonal frequency division multiplexing
C. time division multiplexing
D. channel division multiplexing
Answer» A. frequency hopping spread spectrum
673.

What is A2DP (advanced audio distribution profile)?

A. a bluetooth profile for streaming audio
B. a bluetooth profile for streaming video
C. a bluetooth profile for security
D. a bluetooth profile for file management
Answer» A. a bluetooth profile for streaming audio
674.

In a piconet, one master device ________

A. can not be slave
B. can be slave in another piconet
C. can be slave in the same piconet
D. can be master in another piconet
Answer» B. can be slave in another piconet
675.

Bluetooth transceiver devices operate in ______ band.

A. 2.4 ghz ism
B. 2.5 ghz ism
C. 2.6 ghz ism
D. 2.7 ghz ism
Answer» A. 2.4 ghz ism
676.

Bluetooth supports _______

A. point-to-point connections
B. point-to-multipoint connection
C. both point-to-point connections and point-to-multipoint connection
D. multipoint to point connection
Answer» C. both point-to-point connections and point-to-multipoint connection
677.

A scatternet can have maximum __________

A. 10 piconets
B. 20 piconets
C. 30 piconets
D. 40 piconets
Answer» A. 10 piconets
678.

WiMAX stands for ___________

A. wireless maximum communication
B. worldwide interoperability for microwave access
C. worldwide international standard for microwave access
D. wireless internet maximum communication
Answer» B. worldwide interoperability for microwave access
679.

WiMAX provides ________

A. simplex communication
B. half duplex communication
C. full duplex communication
D. no communication
Answer» C. full duplex communication
680.

WiMAX uses the _________

A. orthogonal frequency division multiplexing
B. time division multiplexing
C. space division multiplexing
D. channel division multiplexing
Answer» A. orthogonal frequency division multiplexing
681.

Which of the following modulation schemes is supported by WiMAX?

A. binary phase shift keying modulation
B. quadrature phase shift keying modulation
C. quadrature amplitude modulation
D. all of the mentioned
Answer» D. all of the mentioned
682.

WiMAX MAC layer provides an interface between ___________

A. higher transport layers and physical layer
B. application layer and network layer
C. data link layer and network layer
D. session layer and application layer
Answer» A. higher transport layers and physical layer
683.

For encryption, WiMAX supports _______

A. advanced encryption standard
B. triple data encryption standard
C. advanced encryption standard and triple data encryption standard
D. double data encryption standard
Answer» C. advanced encryption standard and triple data encryption standard
684.

WiMAX provides _______

A. voip services
B. iptv services
C. both voip and iptv services
D. no iptv services
Answer» C. both voip and iptv services
685.

WiMAX is mostly used for __________

A. local area network
B. metropolitan area network
C. personal area network
D. wide area network
Answer» B. metropolitan area network
686.

Which of the following frequencies is not used in WiMAX for communication?

A. 2.3 ghz
B. 2.4 ghz
C. 2.5 ghz
D. 3.5 ghz
Answer» B. 2.4 ghz
687.

SONET stands for ___________

A. synchronous optical network
B. synchronous operational network
C. stream optical network
D. shell operational network
Answer» A. synchronous optical network
688.

In SONET, STS-1 level of electrical signalling has the data rate of _________

A. 51.84 mbps
B. 155.52 mbps
C. 2488.320 mbps
D. 622.080 mbps
Answer» A. 51.84 mbps
689.

The path layer of SONET is responsible for the movement of a signal _________

A. from its optical source to its optical destination
B. across a physical line
C. across a physical section
D. back to its optical source
Answer» B. across a physical line
690.

The photonic layer of the SONET is similar to the __________ of OSI model.

A. network layer
B. data link layer
C. physical layer
D. transport layer
Answer» C. physical layer
691.

In SONET, each synchronous transfer signal STS-n is composed of __________

A. 2000 frames
B. 4000 frames
C. 8000 frames
D. 16000 frames
Answer» C. 8000 frames
692.

A linear SONET network can be ________

A. point-to-point
B. multi-point
C. both point-to-point and multi-point
D. single point
Answer» C. both point-to-point and multi-point
693.

Automatic protection switching in linear network is defined at the _______

A. line layer
B. section layer
C. photonic layer
D. path layer
Answer» A. line layer
694.

A unidirectional path switching ring is a network with __________

A. one ring
B. two rings
C. three rings
D. four rings
Answer» B. two rings
695.

Real-time transport protocol (RTP) is mostly used in _________

A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer» D. all of the mentioned
696.

RTP is used to ________

A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. secure the stream
Answer» A. carry the media stream
697.

RTP provides the facility of jitter ____________

A. media stream
B. expansion
C. media modification
D. security
Answer» A. media stream
698.

Which protocol provides the synchronization between media streams?

A. rtp
B. rtcp
C. rpc
D. rtct
Answer» B. rtcp
699.

An RTP session is established for ____________

A. each media stream
B. all media streams
C. some predefined number of media streams
D. no media stream
Answer» A. each media stream
700.

RTP can use __________

A. unprevileleged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer» D. all of the mentioned
Tags
Question and answers in Computer Networks, Computer Networks multiple choice questions and answers, Computer Networks Important MCQs, Solved MCQs for Computer Networks, Computer Networks MCQs with answers PDF download