276
104.6k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

351.

Sniffers can be prevented by using _______________

A. wired environment
B. wifi
C. ethernet lan
D. switched network
Answer» D. switched network
352.

Firewalls are often configured to block ___________

A. udp traffic
B. tcp traffic
C. sensitive traffic
D. best-effort traffic
Answer» A. udp traffic
353.

UTP is commonly used in __________

A. dsl
B. fttp
C. http
D. none of the mentioned
Answer» A. dsl
354.

Terrestrial radio channels are broadly classifed into _____ groups.

A. 2
B. 3
C. 4
D. 1
Answer» B. 3
355.

A local telephone network is an example of a _______ network.

A. packet switched
B. circuit switched
C. bit switched
D. line switched
Answer» B. circuit switched
356.

Most packet switches use this principle ____________

A. stop and wait
B. store and forward
C. store and wait
D. stop and forward
Answer» B. store and forward
357.

What are the Methods to move data through a network of links and switches?

A. packet switching and line switching
B. circuit switching and line switching
C. line switching and bit switching
D. packet switching and circuit switching
Answer» D. packet switching and circuit switching
358.

In _________ systems, resources are allocated on demand.

A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» A. packet switching
359.

Which of the following is not an application layer service?

A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. error control
Answer» D. error control
360.

Which is not a application layer protocol?

A. http
B. smtp
C. ftp
D. tcp
Answer» D. tcp
361.

The packet of information at the application layer is called __________

A. packet
B. message
C. segment
D. frame
Answer» B. message
362.

Which one of the following is an architecture paradigms?

A. peer to peer
B. client-server
C. http
D. both peer-to-peer & client-server
Answer» D. both peer-to-peer & client-server
363.

Application layer offers _______ service.

A. end to end
B. process to process
C. both end to end and process to process
D. none of the mentioned
Answer» A. end to end
364.

E-mail is _________

A. loss-tolerant application
B. bandwidth-sensitive application
C. elastic application
D. none of the mentioned
Answer» C. elastic application
365.

Pick the odd one out.

A. file transfer
B. file download
C. e-mail
D. interactive games
Answer» D. interactive games
366.

Which of the following is an application layer service?

A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. all of the mentioned
Answer» D. all of the mentioned
367.

Which is a time-sensitive service?

A. file transfer
B. file download
C. e-mail
D. internet telephony
Answer» D. internet telephony
368.

Transport services available to applications in one or another form _________

A. reliable data transfer
B. timing
C. security
D. all of the mentioned
Answer» D. all of the mentioned
369.

Electronic mail uses which Application layer protocol?

A. smtp
B. http
C. ftp
D. sip
Answer» A. smtp
370.

The ____________ translates internet domain and host names to IP address.

A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» A. domain name system
371.

Application layer protocol defines ____________

A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of the mentioned
Answer» D. all of the mentioned
372.

When displaying a web page, the application layer uses the _____________

A. http protocol
B. ftp protocol
C. smtp protocol
D. tcp protocol
Answer» A. http protocol
373.

The default connection type used by HTTP is _________

A. persistent
B. non-persistent
C. can be either persistent or non-persistent depending on connection request
D. none of the mentioned
Answer» A. persistent
374.

The HTTP request message is sent in _________ part of three-way handshake.

A. first
B. second
C. third
D. fourth
Answer» C. third
375.

The first line of HTTP request message is called _____________

A. request line
B. header line
C. status line
D. entity line
Answer» A. request line
376.

The __________ method when used in the method field, leaves entity body empty.

A. post
B. send
C. get
D. put
Answer» C. get
377.

Which of the following is not correct?

A. web cache doesnt has its own disk space
B. web cache can act both like server and client
C. web cache might reduce the response time
D. web cache contains copies of recently requested objects
Answer» A. web cache doesnt has its own disk space
378.

HTTP is ________ protocol.

A. application layer
B. transport layer
C. network layer
D. data link layer
Answer» A. application layer
379.

In the network HTTP resources are located by

A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Answer» A. uniform resource identifier
380.

FTP server listens for connection on port number ____________

A. 20
B. 21
C. 22
D. 23
Answer» B. 21
381.

The File Transfer Protocol is built on ______________

A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Answer» C. client server architecture
382.

In File Transfer Protocol, data transfer cannot be done in ___________

A. stream mode
B. block mode
C. compressed mode
D. message mode
Answer» D. message mode
383.

Expansion of FTP is __________

A. fine transfer protocol
B. file transfer protocol
C. first transfer protocol
D. fast transfer protocol
Answer» B. file transfer protocol
384.

FTP is built on _____ architecture.

A. client-server
B. p2p
C. data centric
D. service oriented
Answer» A. client-server
385.

FTP uses _________ parallel TCP connections to transfer a file.

A. 1
B. 2
C. 3
D. 4
Answer» B. 2
386.

Identify the incorrect statement regarding FTP.

A. ftp stands for file transfer protocol
B. ftp uses two parallel tcp connections
C. ftp sends its control information in-band
D. ftp sends exactly one file over the data connection
Answer» C. ftp sends its control information in-band
387.

FTP server _____________

A. maintains state information
B. is stateless
C. has single tcp connection for a file transfer
D. has udp connection for file transfer
Answer» A. maintains state information
388.

Find the FTP reply whose message is wrongly matched.

A. 331 – username ok, password required
B. 425 – can’t open data connection
C. 452 – error writing file
D. 452 – can’t open data connection
Answer» D. 452 – can’t open data connection
389.

The password is sent to the server using ________ command

A. passwd
B. pass
C. password
D. pword
Answer» B. pass
390.

When the mail server sends mail to other mail servers it becomes ____________

A. smtp server
B. smtp client
C. peer
D. master
Answer» B. smtp client
391.

If you have to send multimedia data over SMTP it has to be encoded into _______

A. binary
B. signal
C. ascii
D. hash
Answer» C. ascii
392.

The underlying Transport layer protocol used by SMTP is ________

A. tcp
B. udp
C. either tcp or udp
D. imap
Answer» A. tcp
393.

Choose the statement which is wrong incase of SMTP?

A. it requires message to be in 7bit ascii format
B. it is a pull protocol
C. it transfers files from one mail server to another mail server
D. smtp is responsible for the transmission of the mail through the internet
Answer» B. it is a pull protocol
394.

Internet mail places each object in _________

A. separate messages for each object
B. one message
C. varies with number of objects
D. multiple messages for each object
Answer» B. one message
395.

Typically the TCP port used by SMTP is _________

A. 25
B. 35
C. 50
D. 15
Answer» A. 25
396.

A session may include ________

A. zero or more smtp transactions
B. exactly one smtp transactions
C. always more than one smtp transactions
D. number of smtp transactions cant be determined
Answer» A. zero or more smtp transactions
397.

Which of the following is an example of user agents for e-mail?

A. microsoft outlook
B. facebook
C. google
D. tumblr
Answer» A. microsoft outlook
398.

User agent does not support this ___________

A. composing messages
B. reading messages
C. replying messages
D. routing messages
Answer» D. routing messages
399.

SMTP connections secured by SSL are known as _____________

A. smtps
B. ssmtp
C. snmp
D. starttls
Answer» A. smtps
400.

SMTP uses which of the following TCP port?

A. 22
B. 23
C. 21
D. 25
Answer» D. 25

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.