You are on page 1of 46

1. A topology that is responsible for describing the geometric 4.

4. A term that refers to the way in which the nodes of a network are
arrangement of components that make up the LAN. linked together.
a) Complex a) network
b) Physical b) topology
c) Logical c) connection
d) Incremental d) interconnectivity
View Answer View Answer

Answer: b Answer: b
Explanation: It is referred to as a physical LAN topology. LAN Explanation: Topology is a term that refers to the way in which the
stands for Local Area Network. nodes are connected. There are 4 major topology networks.

2. Bus is a type of topology. 5. A network comprising o multiple topologies.


a) True a) Complex
b) False b) Hybrid
View Answer c) Bus
d) Star
Answer: a View Answer
Explanation: The statement is true. Bus topology is an arrangement
where all nodes are interconnected using a single-cable. Answer: b
Explanation: A hybrid network consists of multiple topologies. It
3. _____ LAN topology describes the possible connections between can comprise a ring, a star and other topologies. We call this
pairs of networked end-points that can communicate. arrangement as a hybrid network.
a) Complex
b) Physical 6. The participating computers in a network are referred to as:
c) Logical a) Clients
d) Incremental b) Servers
View Answer c) Nodes
d) CPUs
Answer: c View Answer
Explanation: A logical LAN topology describes the possible
connections. LAN stands for Local Area Network. Answer: c
Explanation: They are referred to as the nodes. There are several
topologies designed for arrangements of these nodes like bus, star, d) Star
etc. View Answer

7. A topology that involves Tokens. Answer: c


a) Star Explanation: The correct option is Daisy chain. This simple
b) Ring approach uses ports on existing hubs for interconnecting the hubs.
c) Bus
d) Daisy Chaining 10. A piece of information which is sent along with the data to the
View Answer source computer.
a) data
Answer: b b) module
Explanation: Ring topology involves sending and receiving of data c) token
with the help of tokens. Ring started out as a simple peer-to-peer d) element
LAN topology. View Answer

8. A ____________WAN can be developed using leased private Answer: c


lines or any other transmission facility
a) Hybrids 1. Physical or logical arrangement of network is __________
b) peer-to-peer a) Topology
c) Two-tiered b) Routing
d) Three-tiered c) Networking
View Answer d) None of the mentioned
View Answer
Answer: b
Explanation: A peer-to-peer WAN topology is a relatively simple Answer: a
way of interconnecting a small number of sites. It has the least-cost Explanation: Topology in networks is the structure or pattern in
solution for WANs that contain a small number of internetworked which each and every node in the network is connected. There are
locations. many topologies in networking like bus, tree, ring, star, mesh,
hybrid.
9. A serially connected system of all the hubs of networks.
a) Bus 2. In which topology there is a central controller or hub?
b) Ring a) Star
c) Daisy chains b) Mesh
c) Ring
d) Bus network extends over a large geographical area. These are used to
View Answer connect cities, states or even countries.

Answer: a 5. Data communication system within a building or campus


Explanation: In star topology a main hub is present to which all is________
other nodes of the network is connected. Every data or information a) LAN
being transmitted or received in this topology has to pass through b) WAN
the hub. The hub directs the data to its destination. c) MAN
d) None of the mentioned
3. This topology requires multipoint connection View Answer
a) Star
b) Mesh Answer: a
c) Ring Explanation: LAN is an abbreviation for Local Area Network. This
d) Bus network interconnects computers in a small area such as schools,
View Answer offices, residence etc.

Answer: d 6. Expand WAN?


Explanation: In bus topology, there is a single cable to which all the a) World area network
network nodes are connected. So whenever a node tries to send a b) Wide area network
message or data to other nodes, this data passes through all other c) Web area network
nodes in the network. d) None of the mentioned
View Answer
4. Data communication system spanning states, countries, or the
whole world is ________ Answer: b
a) LAN Explanation: WAN is the abbreviation for Wide Area Network. This
b) WAN network extends over a large geographical area. These are used to
c) MAN connect cities, states or even countries. They can be connected
d) None of the mentioned through leased lines or satellites.
View Answer
7. In TDM, slots are further divided into __________
Answer: b a) Seconds
Explanation: WAN is the abbreviation for Wide Area Network. This b) Frames
c) Packets
d) None of the mentioned 3. Which of the transport layer protocols is connection-less?
View Answer
A) UDP B) TCP
Answer: b
Explanation: TDM is the abbreviation for Time division C) FTP D) Nvt
multiplexing. It is technique for combining several low rate channel 4. Which of the following applications allows a user to access
to a single high rate channel. For a certain time slot, the several and change remote files without actual transfer?
channels could use the maximum bandwidth.
A) DNS B) FTP
advertisement
C) NFS D) Telnet
8. Multiplexing technique that shifts each signal to a different carrier
frequency 5. The data unit in the TCP/IP data link layer called a …..
a) FDM
A) Message B) Segment
b) TDM
c) Both FDM & TDM C) Datagram D) Frame
d) None of the mentioned
View Answer 6. DNS can obtain the …………….. of host if its domain name is
known and vice versa.
Answer: a
A) Station address B) IP address
1. A network that needs human beings to manually route signals
is called…. C) Port address D) Checksum

A) Fiber Optic Network B) Bus Network 7. Which of the following OSI layers correspond to TCP/IP’s
application layer?
C) T-switched network D) Ring network
A) Application B) Presentation
2. TCP/IP …………….. layer corresponds to the OSI models to
three layers. C) Session D) All of the above

A) Application B) Presentation 8. Devices on one network can communicate with devices on


another network via a …….
C) Session D) Transport
A) File Server B) Utility Server
C) Printer Server D) Gateway A) Physical B) Data link

9. A communication device that combines transmissions from C) Transport D) Presentation


several I/O devices into one line is a
15. In a …………….topology, if there are n devices in a network,
A) Concentration B) Modifier each device has n-1 ports for cables.

C) Multiplexer D) Full duplex file A) Mesh B) Star

10. Which layers of the OSI determines the interface often C) Bus D) Ring
system with the user?
16. Another name for Usenet is
A) Network B) Application
A) Gopher B) Newsgroups
C) Data link D) Session
C) Browser D) CERN
11. Which of the following of the TCP/IP protocols is the used
for transferring files from one machine to another? 17. The standard suit of protocols used by the Internet,
Intranets, extra-nets and some other networks.
A) FTP C) SNMP
A) TCP/IP B) Protocol
B) SMTP D) Rpe
C) Open system D) Internet work processor
12. In which OSI layers does the FDDI protocol operate?
18. State whether the following is True or False.
A) Physical B) Data link
i) In bus topology, heavy Network traffic slows down the bus speed.
C) Network D) A and B
ii) It is multi-point configuration.
13. In FDDI, data normally travel on ………………
A) True, True B) True, False
A) The primary ring B) The Secondary ring
C) False, True D) False, False
C) Both rings D) Neither ring
19. Which of the following is the logical topology?
14. The …………layer of OSI model can use the trailer of the
A) Bus B) Tree
frame for error detection.
C) Star D) Both A and B 19. C) Bus
20. D) Both of A and B
20. Which of the following is/ are the drawbacks of Ring
Topology? 1. In mesh topology, relationship between one device and another is
…………..
A) Failure of one computer, can affect the whole network A) Primary to peer
B) Adding or removing the computers disturbs the network activity. B) Peer to primary
C) Primary to secondary
C) If the central hub fails, the whole network fails to operate. D) Peer to Peer

D) Both of A and B 2. The performance of data communications network depends on


…………..
Answers:
A) Number of users
B) The hardware and software
1. C) T-switched network C) The transmission
2. A) Application D) All of the above
3. A) UDP
3. Find out the OSI layer, which performs token management.
4. C) NFS
A) Network Layer
5. D) Frame
B) Transport Layer
6. B) IP address
C) Session Layer
7. D) All of the above
D) Presentation Layer
8. D) Gateway
9. C) Multiplexer 4. The name of the protocol which provides virtual terminal in
10. B) Application TCP/IP model is.
11. A) FTP A) Telnet
12. D) A and B B) SMTP
13. A) The primary ring C) HTTP
14. B) Data link
15. A) Mesh 5. The layer one of the OSI model is
16. B) Newsgroups A) Physical layer
17. A) TCP/IP B) Link layer
18. A) True, True
C) Router layer A) Internet
D) Broadcast layer B) Intranet
C) Network
6. What is the name of the network topology in which there are bi- D) LAN
directional links between each possible node?
A) Ring 11. Commercial networks providing access to the ………………. to
B) Star subscribers, and networks owned by commercial organizations for
C) Tree internal use that also have connections to the internet.
D) Mesh A) backbones
B) Network access points(NAPs)
7. What is the commonly used unit for measuring the speed of data C) Internet Exchange Points(IXPs)
transmission? D) All of the above
A) Bytes per second
B) Baud 12. The …………………… layer is provided by the program that
C) Bits per second uses TCP/IP for communication.
D) Both B and C A) Transport
B) Application
8. Which of the communication modes support two way traffic but C) Internetwork
in only once direction of a time? D) Network interface
A) Simplex
B) Half-duplex 13) The ………………….. layer Provides the end-to-end data
C) Three – quarter’s duplex transfer by delivering data from an application to its remote peer.
D) Full duplex A) Transport
B) Application
9. The loss in signal power as light travels down the fiber is called C) Internetwork
…………. D) Network interface
A) Attenuation
B) Propagation 14) …………….. provides connection-oriented reliable data
C) Scattering delivery, duplicate data suppression, congestion control, and flow
D) Interruption control.
10. ……………………. is an interconnection of networks that A) TCP
provide universal communication services over heterogeneous B) IP
physical networks.
C) UDP 14. A) TCP
D) ICMP 15. C) UDP
16. B) Internet protocol
15) ………………. is used by applications that need a fast transport
mechanism and can tolerate the loss of some data. 1. Which of the following is not the layer of TCP/IP protocol?
A) TCP A) Application Layer
B) IP B) Session Layer
C) UDP C) Transport Layer
D) ICMP D) Internetwork layer

16) ……………… is a connection-less protocol that does not 2. ………………. address use 7 bits for the <network> and 24 bits
assume reliability from lower layers, which does not provide for the <host> portion of the IP address.
reliability, flow control, or error recovery. A) Class A
A) Transmission control protocol B) Class B
B) Internet protocol C) Class C
C) User Datagram Protocol D) Class D
D) Simple Mail Transfer Protocol
3. …………. addresses are reserved for multi-casting.
Answers: A) Class B
B) Class C
1. D) Peer to Peer C) Class D
2. D) All of the above D) Class E
3. C) Session Layer
4. A) Telnet 4. State the following statement is true or false.
5. A) Physical layer i) In class B addresses a total of more than 1 billion addresses can be
6. D) Mesh formed.
7. B) Baud ii) Class E addresses are reserved for future or experimental use.
8. B) Half-duplex A) True, False
9. A) Attenuation B) True, True
10. A) Internet C) False, True
11. D) All of the above D) False, False
12. B) Application
13. A) Transport
5. Which of the following statement is true? C) Mesh LAN
i) An address with all bits 1 is interpreted as all networks or all D) All of the above
hosts.
ii) The class A network 128.0.0.0 is defined as the loopback 9. …………… is the predominant form of Fast Ethernet, and runs
network. over two pairs of category 5 or above cable.
A) i only A) 100 BASE-T
B) ii only B) 100 BASE-TX
C) Both A and B C) 100 BASE-T4
D) None of the above D) 100 BASE-T2

6. Which is not the Regional Internet Registers (RIR) of the 10. IEEE 802.3ab defines Gigabit Ethernet transmission over
following? unshielded twisted pair (UTP) category 5, 5e or 6 cabling known as
A) American Registry for Internet Numbers (ARIN) ………………..
B) Europeans Registry for Internet Numbers (ERIN) A) 1000 BASE-T
C) Reseaux IP Europeans (RIPE) B) 1000 BASE-SX
D) Asia Pacific Network Information Centre (APNIC) C) 1000 BASE-LX
D) 1000 BASE-CX
7. Match the following IEEE No to their corresponding Name for
IEEE 802 standards for LANs. Answers:
i) 802.3 a) WiFi 1. B) Session Layer
ii) 802.11 b) WiMa 2. A) Class A
iii) 802.15.1 c) Ethernet 3. C) Class D
iv) 802.16 d) Bluetooth 4. B) True, True
A) i-b, ii-c, iii-d, iv-a 5. A) i only
B) i-c, ii-d, iii-a, iv-b 6. B) Europeans ….. (ERIN)
C) i-c, ii-a, iii-d, iv-b 7. C) i-c, ii-a, iii-d, iv-b
D) i-b, ii-d, iii-c, iv-a 8. A) Star LAN
8. ……….. was the first step in the evolution of Ethernet from a 9. B) 100 BASE-TX
coaxial cable bus to hub managed, twisted pair network. 10. A) 1000 BASE-T
A) Star LAN
B) Ring LAN 1. ………………….. is a high performance fiber optic token ring
LAN running at 100 Mbps over distances upto 1000 stations
connected. 6. ………………….. implies that all subnets obtained from the
A) FDDI same subnet mask.
B) FDDT A) Static subnetting
C) FDDR B) Dynamic subnetting
D) FOTR C) Variable length subnetting
D) Both B and C
2. Which of the following are Gigabit Ethernet’s?
A) 1000 BASE-SX 7. State whether true or false.
B) 1000 BASE-LX i) A connection oriented protocol can only use unicast addresses.
C) 1000 BASE-CX ii) The anycast service is included in IPV6.
D) All of above A) True, True
B) True, False
3. ………………….. is a collective term for a number of Ethernet C) False, True
Standards that carry traffic at the nominal rate of 1000 Mbit/s D) False, False
against the original Ethernet speed of 10 Mbit/s.
A) Ethernet
B) Fast Ethernet 8. The most important and common protocols associated TCP/IP
C) Gigabit Ethernet internetwork layer are.
D) All of the above i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP)
iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration
4. …………… is another kind of fiber optic network with an active Protocol (DHCP)
star for switching. v) Address Resolution Protocol (ARP)
A) S/NET A) i, ii, iii and iv only
B) SW/NET B) i, iii, iv and v only
C) NET/SW C) ii, iii, iv and v only
D) FS/NET D) All i, ii, iii, iv and v
5. The combination of ……………. And ………….. is often termed 9. …………………….. is responsible for converting the higher
the local address of the local portion of the IP address. level protocol addresses (IP addresses) to physical network
A) Network number and host number addresses.
B) Network number and subnet number A) Address Resolution Protocol (ARP)
C) Subnet number and host number B) Reverse Address Resolution Protocol (RARP)
D) All of the above
C) Bootstrap Protocol (BOOTP) 2. FTP server listens to connections on port …………………….
D) Internet Control Message Protocol (ICMP) A) 19 and 20
B) 20 and 21
10. Which of the following is not a mechanism that DHCP supports C) 21 and 22
for IP address allocation? D) 20 and 22
A) Automatic allocation
B) Static allocation 3. Which of the following operations can be performed by using
C) Dynamic allocation FTP.
D) Manual allocation i) Connect to a remote host
ii) Select directory
Answers: iii) Define the transfer mode
1. A) FDDI iv) List file available
2. D) All of above A) i, and ii only
3. B) Fast Ethernet B) i, ii and iii only
4. A) S/NET C) ii, iii and iv only
5. C) Subnet . host number D) All i, ii, iii and iv
6. A) Static subnetting 4. A ………….. is a set of information that is exchanged between a
7. A) True, True client and web browser and a web server during an HTTP
8. D) All i, ii, iii, iv and v transaction.
9. A) Address …..(ARP) A) infoset
10. B) Static allocation B) clientinfo
1. The examples of Interior Gateway Protocols (IGP) are. C) cookie
i) Open Short Path First (OSPF) D) transkie
ii) Routing Information Protocol (RIP) 5. Match the following HTTP status code to their respective
iii) Border Gateway Protocol (BGP) definitions.
A) i only i) 400 a) OK
B) i, and ii only ii) 500 b) Not found
C) i and iii only iii) 200 c) Continue
D) All i, ii and iii iv) 100 d) Internal server error
A) i-b, ii-d, iii-a, iv-c
B) i-a, ii-b, iii-c, iv-d 10. A WAN typically spans a set of countries that have data rates
C) i-b, ii-c, iii-a, iv-d less than ……………. Mbps.
D) i-b, ii-a, iii-c, iv-d A) 2
B) 1
6. Loopback address ……………………. of IPv6 address is C) 4
equivalent to the IPV4 loopback address 127.0.0.1. D) 100
A) (: : 1)
B) (: : )
C) (: : 0)
D) (1 : : ) Answers:

7. Unspecified address ………………….. of IPV6 address is 1. B) i, and ii only


equivalent to the IPV4 unspecified address 0.0.0.0. 2. B) 20 and 21
A) (: : 1) 3. D) All i, ii, iii and iv
B) (: : ) 4. C) cookie
C) (: : 0) 5. A) i-b, ii-d, iii-a, iv-c
D) (1 : : ) 6. A) (: : 1)
8. A simple cabling method, known as the ……………… topology 7. B) (: : )
allows about 30 computers on a maximum cable length of about 600 8. B) Bus
feet. 9. B) Mac sub layer
A) Ring 10. B) 1
B) Bus 1. In addresses for ………………. networks, the first 16 bits specify
C) Star a particular network, and the last 16 bits specify a particular host. A)
D) Mesh class A
9. The ……………… layer is responsible for resolving access to the B) class B
shared media or resources. C) class C
A) Physical D) class D2. The ………….. protocol is based on end to end delivery.
A) SMTP
B) Mac sub layer
B) TCP
C) Network
C) IP
D) Transport
D) SCTP
3. A/An ……………….. routing scheme is designed to enable B) network management
switches to react to changing traffic patterns on the network. C) call Information
A) static routing D) supervisory
B) fixed alternate routing 8. In …………………… a route is selected for each source-
C) adaptive routing destination pair of in the network.
D) dynamic routing A) flooding
B) variable routing
4. The IPV4 address is a ……………… address because it is C) fixed routing
assigned at the internet layer. D) random routing
A) logical
B) physical 9. In …………….. type of service, each frame sent over the
C) common connection is numbered and the data link layer guarantees that each
D) shared frame sent is indeed received.
A) connection less service
5. The ………………. layer provides a well defined service B) indirect link service
interface to the network layer, determining how the bits of the C) direct link service
physical layer are grouped into frames. D) connection oriented service
A) Data Link
B) Physical 10. In ……………….. deliver, packets of a message are logically
C) Network connected to one another.
D) Session A) connection less
B) indirect link
6. A distributed data processing configuration in which all activities C) direct link
must pass through a centrally located computer is called as D) connection oriented
…………
A) ring network Answers:
B) spider network
C) hierarchical network 1. In addresses for ………………. networks, the first 16 bits specify
D) data control network a particular network, and the last 16 bits specify a particular host.
B) class B
7. The …………… signals are used for the maintenance,
troubleshooting and overall operation of the network. 2. The ………….. protocol is based on end to end delivery.
A) address A) SMTP
3. A/An ……………….. routing scheme is designed to enable 2-1 Each IP packet must contain
switches to react to changing traffic patterns on the network. A. Only Source address
B. Only Destination address
C) adaptive routing C. Source and Destination address
D. Source or Destination address
4. The IPV4 address is a ……………… address because it is 2-2 Bridge works in which layer of the OSI model?
assigned at the internet layer. A. Appliation layer
B. Transport layer
A) logical C. Network layer
D. Datalink layer
5. The ………………. layer provides a well defined service 2-3 _______ provides a connection-oriented reliable service for
interface to the network layer, determining how the bits of the sending messages
physical layer are grouped into frames. A. TCP
B. IP
A) Data Link C. UDP
D. All of the above
6. A distributed data processing configuration in which all activities 2-4 Which layers of the OSI model are host-to-host layers?
must pass through a centrally located computer is called as A. Transport, Session, Persentation, Application
………… B. Network, Transport, Session, Presentation
C. Datalink, Network, Transport, Session
B) spider network D. Physical, Datalink, Network, Transport
2-5 Which of the following IP address class is Multicast
7. The …………… signals are used for the maintenance, A. Class A
troubleshooting and overall operation of the network. B. Class B
C. Class C
B) network management
D. Class D
2-6 Which of the following is correct regarding Class B Address of
8. In …………………… a route is selected for each source- IP address
destination pair of in the network. A. Network bit – 14, Host bit – 16
C) fixed routing B. Network bit – 16, Host bit – 14
C. Network bit – 18, Host bit – 16
9. In …………….. type of service, each frame sent over the D. Network bit – 12, Host bit – 14
2-7 The last address of IP address represents
connection is numbered and the data link layer guarantees that each A. Unicast address
frame sent is indeed received. B. Network address
D) connection oriented service C. Broadcast address
D. None of above
2-8 How many bits are there in the Ethernet address?
10. In ……………….. deliver, packets of a message are logically
A. 64 bits
connected to one another. B. 48 bits
D) connection oriented
C. 32 bits B. An operating System of Computer Network
D. 16 bits
2-9 How many layers are in the TCP/IP model? C. A system designed to prevent unauthorized access
A. 4 layers
B. 5 layers D. A web browsing Software
C. 6 layers
D. 7 layers
2-10 Which of the following layer of OSI model also called end-to-
1-3 How many layers does OSI Reference Model has?
end layer?
A. Presentation layer A. 4
B. Network layer
C. Session layer B. 5
D. Transport layer
C. 6
Click Here for Answers
D. 7
1 – C / 2 – D / 3 – A / 4 – A / 5 – D / 6 – A / 7 – C / 8 – B / 9 – A / 10 –
D 1-4 DHCP is the abbreviation of
1. When collection of various computers seems a single coherent
system to its client, then it is called A. Dynamic Host Control Protocol

a) computer network b) distributed system c) both (a) and (b) d) B. Dynamic Host Configuration Protocol
none of the mentioned
C. Dynamic Hyper Control Protocol
Answer:b Explanation:None.
D. Dynamic Hyper Configuration Protocol
1-1 Computer Network is
1-5 IPV4 Address is
A. Collection of hardware components and computers
A. 8 bit
B. Interconnected by communication channels
B. 16 bit
C. Sharing of resources and information
C. 32 bit
D. All of the Above
D. 64 bit
1-2 What is a Firewall in Computer Network?
1-6 DNS is the abbreviation of
A. The physical boundary of Network
A. Dynamic Name System 1-10 Router operates in which layer of OSI Reference Model?

B. Dynamic Network System A. Layer 1 (Physical Layer)

C. Domain Name System B. Layer 3 (Network Layer)

D. Domain Network Service C. Layer 4 (Transport Layer)

1-7 What is the meaning of Bandwidth in Network? D. Layer 7 (Application Layer)

A. Transmission capacity of a communication channels Click Here for Answers

B. Connected Computers in the Network 1–D/2–C/3–D/4–B/5–C/6–C/7–A/8–D/9–A/


10 – B
C. Class of IP used in Network
Multiple Choice Questions of Computer Networking
D. None of Above
2-1 Each IP packet must contain
1-8 ADSL is the abbreviation of
A. Only Source address
A. Asymmetric Dual Subscriber Line
B. Only Destination address
B. Asymmetric Digital System Line
C. Source and Destination address
C. Asymmetric Dual System Line
D. Source or Destination address
D. Asymmetric Digital Subscriber Line
2-2 Bridge works in which layer of the OSI model?
1-9 What is the use of Bridge in Network?
A. Appliation layer
A. to connect LANs
B. Transport layer
B. to separate LANs
C. Network layer
C. to control Network Speed
D. Datalink layer
D. All of the above
2-3 _______ provides a connection-oriented reliable service for C. Network bit – 18, Host bit – 16
sending messages
D. Network bit – 12, Host bit – 14
A. TCP
2-7 The last address of IP address represents
B. IP
A. Unicast address
C. UDP
B. Network address
D. All of the above
C. Broadcast address
2-4 Which layers of the OSI model are host-to-host layers?
D. None of above
A. Transport, Session, Persentation, Application
2-8 How many bits are there in the Ethernet address?
B. Network, Transport, Session, Presentation
A. 64 bits
C. Datalink, Network, Transport, Session
B. 48 bits
D. Physical, Datalink, Network, Transport
C. 32 bits
2-5 Which of the following IP address class is Multicast
D. 16 bits
A. Class A
2-9 How many layers are in the TCP/IP model?
B. Class B
A. 4 layers
C. Class C
B. 5 layers
D. Class D
C. 6 layers
2-6 Which of the following is correct regarding Class B Address of
IP address D. 7 layers

A. Network bit – 14, Host bit – 16 2-10 Which of the following layer of OSI model also called end-to-
end layer?
B. Network bit – 16, Host bit – 14
A. Presentation layer
B. Network layer C. UDP

C. Session layer D. All of the above

D. Transport layer 3-4. What is the address size of IPv6 ?

Click Here for Answers A. 32 bit

1–C/2–D/3–A/4–A/5–D/6–A/7–C/8–B/9–A/ B. 64 bit
10 – D
C. 128 bit
Multiple Choice Questions of Computer Networking
D. 256 bit
3-1. Why IP Protocol is considered as unreliable?
3-5. What is the size of Network bits & Host bits of Class A of IP
A. A packet may be lost address?

B. Packets may arrive out of order A. Network bits 7, Host bits 24

C. Duplicate packets may be generated B. Network bits 8, Host bits 24

D. All of the above C. Network bits 7, Host bits 23

3-2. What is the minimum header size of an IP packet? D. Network bits 8, Host bits 23

A. 16 bytes 3-6. What does Router do in a network?

B. 10 bytes A. Forwards a packet to all outgoing links

C. 20 bytes B. Forwards a packet to the next free outgoing link

D. 32 bytes C. Determines on which outing link a packet is to be forwarded

3-3. Which of following provides reliable communication? D. Forwards a packet to all outgoing links except the originated link

A. TCP 3-7. The Internet is an example of

B. IP A. Cell switched network


B. circuit switched network 1–D/2–C/3–A/4–C/5–A/6–C/7–C/8–D/9–A/
10 – A
C. Packet switched network
1. OSI stands for
D. All of above a) open system interconnection
3-8. What does protocol defines? b) operating system interface
c) optical service implementation
A. Protocol defines what data is communicated. d) none of the mentioned
View Answer
B. Protocol defines how data is communicated.
Answer: a
C. Protocol defines when data is communicated.
Explanation: OSI is the abbreviation for Open System
D. All of above Interconnection. OSI model provides a structured plan on how
applications communicate over a network, which also helps us to
3-9. What is the uses of subnetting? have a structured plan for troubleshooting.
A. It divides one large network into several smaller ones 2. The OSI model has _______ layers.
a) 4
B. It divides network into network classes
b) 5
C. It speeds up the speed of network c) 6
d) 7
D. None of above View Answer
3-10. Repeater operates in which layer of the OSI model? Answer: d
A. Physical layer Explanation: In OSI reference model, there are 7 layers namely
Application, Presentation, Session, Transport, Network, Data Link
B. Data link layer and Physical layer.

C. Network layer 3. TCP/IP model does not have ______ layer but OSI model have
this layer.
D. Transport layer
a) session layer
Click Here for Answers b) transport layer
c) application layer
d) None of the mentioned and logical address, port address and specific address are employed
View Answer in both TCP/IP model and OSI model.

Answer: a 6. TCP/IP model was developed _____ the OSI model.


Explanation: In OSI reference model, there are two layers which are a) prior to
not present in TCP/IP model. They are Presentation and Session b) after
layer. c) simultaneous to
d) none of the mentioned
4. Which layer links the network support layers and user support View Answer
layers
a) session layer Answer: a
b) data link layer Explanation: Several TCP/IP prototypes were developed at multiple
c) transport layer research centers between 1978 and 1983, whereas OSI reference
d) network layer model was developed in the year 1984.
View Answer
7. Which layer is responsible for process to process delivery?
Answer: c a) network layer
Explanation: Physical, data link and network layers are network b) transport layer
support layers and session, presentation and application layers are c) session layer
user support layers. d) data link layer
View Answer
5. Which address is used in an internet employing the TCP/IP
protocols? Answer: b
a) physical address and logical address Explanation: The role of Transport layer (Layer 4) is to establish a
b) port address logical end to end connection between two system in a network. The
c) specific address protocols used in Transport layer is TCP and UDP.
d) all of the mentioned
View Answer 8. Which address identifies a process on a host?
a) physical address
Answer: d b) logical address
Explanation: All of the mentioned above addresses are used in c) port address
TCP/IP protocol. All the addressing scheme, that is physical (MAC) d) specific address
View Answer
Answer: c networking. The data unit in the physical layer is bits. Process to
Explanation: A port number is a way to identify a specific process to process delivery is dealy in the transport layer.
which an Internet or other network message is to be forwarded when
it arrives at a server. 2. Which transmission media has the highest transmission speed in a
network?
9. Which layer provides the services to user? a) coaxial cable
a) application layer b) twisted pair cable
b) session layer c) optical fiber
c) presentation layer d) electrical cable
d) none of the mentioned View Answer
View Answer
Answer: c
Answer: a Explanation: Fibre optics is considered to have the highest
Explanation: In networking, a user mainly interacts with application transmission speed among the all mentioned above. The fibre optics
layer to create and send information to other computer or network. transmission runs at 1000Mb/s. It is called as 1000Base-Lx whereas
IEEE stndard for it is 802.3z.
10. Transmission data rate is decided by
a) network layer 3. Bits can be send over guided and unguided media as analog signal
b) physical layer by
c) data link layer a) digital modulation
d) transport layer b) amplitude modulation
View Answer c) frequency modulation
d) phase modulation
Answe1. The physical layer concerns with View Answer
a) bit-by-bit delivery
p) process to process delivery Answer: a
c) application to application delivery Explanation: In analog modulation, digital low frequency baseband
d) none of the mentioned signal (digital bitstream) are transmitted over a higher frequency.
View Answer Whereas in digital modulation the only difference is that the base
band signal is of discrete amplitude level.
Answer: a
Explanation: Physical layer deals with bit to bit delivery in 4. The portion of physical layer that interfaces with the media access
control sublayer is called
a) physical signalling sublayer communication is not synchronized by clock signal. Instead of a
b) physical data sublayer start and stop signaling and flow control method is followed.
c) physical address sublayer
d) none of the mentioned 7. The physical layer is responsible for
View Answer a) line coding
b) channel coding
Answer: a c) modulation
Explanation: The portion of physcial layer that interfaces with the d) all of the mentioned
medium access control sublayer is Physical Signaling Sublayer. The View Answer
main function of this layer is character encoding, reception,
decoding and performs optional isolation functions. Answer: d
Explanation: The physical layer is responsible for line coding,
5. physical layer provides channel coding and modulation that is needed for the transmission
a) mechanical specifications of electrical connectors and cables of the information.
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber 8. The physical layer translates logical communication requests from
d) all of the mentioned the ______ into hardware specific operations.
View Answer a) data link layer
b) network layer
Answer: d c) trasnport layer
Explanation: Anything dealing with a network cable or the standards d) application layer
in use – including pins, connectors and the electric current used is View Answer
dealt in the physical layer (Layer 1).
Answer: a
6. In asynchronous serial communication the physical layer provides Explanation: Physical layer accepts data or information from the
a) start and stop signalling data link layer and converts it into hardware specific operations so
b) flow control as to transfer the message through physical cables.
c) both start & stop signalling and flow control
d) none of the mentioned 9. A single channel is shared by multiple signals by
View Answer a) analog modulation
b) digital modulation
Answer: c c) multiplexing
Explanation: In asynchronous serial communication, the
d) none of the mentioned 2. Which one of the following task is not done by data link layer?
View Answer a) framing
b) error control
Answer: c c) flow control
Explanation: In communication and computer networks, the main d) channel coding
goal is to share a scarce resource. This is done by multiplexing, View Answer
where multiple analog or digital signals are combined into one
signal over a shared medium. Answer: d
Explanation: Channel coding is the function of physical layer. Data
10. Wireless transmission can be done via link layer mainly deals with framing, error control and flow control.
a) radio waves
b) microwaves 3. Which sublayer of the data link layer performs data link functions
c) infrared that depend upon the type of medium?
d) all of the mentioned a) logical link control sublayer
View Answer b) media access control sublayer
c) network interface control sublayer
A1. The data link layer takes the packets from _________ and d) none of the mentioned
encapsulates them into frames for transmission.
View Answer
a) network layer
b) physical layer Answer: b
c) transport layer Explanation: Media access control (MAC) deals with transmission
d) application layer of data packets to and from the network-interface card, and also to
View Answer and from another remotely shared channel.
Answer: a 4. Header of a frame generally contains
Explanation: In computer networks, the data from application layer a) synchronization bytes
is sent to transport layer and is converted to segments. These b) addresses
segments are then transferred to the network layer and these are c) frame identifier
called packets. These packets are then sent to data link layer where d) all of the mentioned
they are encapsulated into frames. These frames are then transferred View Answer
to physical layer where the frames are converted to bits.
Answer: d
Explanation: In computer networks, the header is a part of the data
that contains all the required information about the transmission of b) code repeat check
the file. It contains information like synchronization bytes, c) code redundancy check
addresses, frame identifier etc. d) cyclic repeat check
View Answer
5. Automatic repeat request error management mechanism is
provided by Answer: a
a) logical link control sublayer Explanation: Cyclic redundancy check is a code that is added to a
b) media access control sublayer data which helps us to identify any error that occurred during the
c) network interface control sublayer transmission of the data.
d) none of the mentioned
View Answer 8. Which one of the following is a data link protocol?
a) ethernet
Answer: a b) point to point protocol
Explanation: The logical link control is a sublayer of data link layer c) hdlc
whose main function is to manage traffic, flow and error control. d) all of the mentioned
This layer also acts as an interface between MAC layer and network View Answer
layer.
Answer: d
6. When 2 or more bits in a data unit has been changed during the Explanation: There are many data link layer protocols. Some of
transmission, the error is called them are SDLC (synchronous data link protocol), HDLC (High level
a) random error data link control), SLIP (serial line interface protocol), PPP (Point to
b) burst error point protocol) etc.
c) inverted error
d) none of the mentioned 9. Which one of the following is the multiple access protocol for
View Answer channel access control?
a) CSMA/CD
Answer: b b) CSMA/CA
Explanation: When a single bit error occurs in a data, it is called c) Both CSMA/CD & CSMA/CA
single bit error. When more than a single bit of data is corrupted or d) None of the mentioned
has error, it is called burst error. View Answer

7. CRC stands for Answer: c


a) cyclic redundancy check Explanation: In CSMA/CD, it deals with detection of collision after
collision has occurred. Whereas CSMA/CA deals with preventing b) inter-networking
collision. CSMA/CD is abbreviation for Carrier Sensing Multiple c) congestion control
Access/Collision detection. CSMA/CA is abbreviation for Carrier d) none of the mentioned
Sensing Multiple Access/Collision Avoidance. View Answer

10. The technique of temporarily delaying outgoing Answer: d


acknowledgements so that they can be hooked onto the next Explanation: In the OSI model, network layer is the third layer and it
outgoing data frame is called provides data routing paths for network communications.
a) piggybacking
b) cyclic redundancy check 3. The 4 byte IP address consists of
c) fletcher’s checksum a) network address
d) none of the mentioned b) host address
View Answer c) both network address & host address
d) none of the mentioned
Answer: a View Answer

1. The network layer concerns with Answer: c


a) bits Explanation: An ip address which is 32 bits long, that means it is of
b) frames 4 bytes and is composed of a network and host portion and it
c) packets depends on address class.
d) none of the mentioned
View Answer 4. In virtual circuit network each packet contains
a) full source and destination address
Answer: c b) a short VC number
Explanation: In computer networks, the data from the application c) only source address
layer is sent to the transport layer and is converted to segments. d) only destination address
These segments are then transferred to the network layer and these View Answer
are called packets. These packets are then sent to data link layer
where they are encapsulated into frames. These frames are then Answer: b
transferred to physical layer where the frames are converted to bits. Explanation: A short VC number also called as VCID (virtual circuit
identifier) is a type of identifier which is used to distinguish between
2. Which one of the following is not a function of network layer? several virtual circuits in a connection oriented circuit switched
a) routing network.
5. Which one of the following routing algorithm can be used for Answer: a
network layer design? Explanation: Spanning tree protocol (STP) is a network protocol that
a) shortest path algorithm creates a loop free logical topology for ethernet networks. It is a
b) distance vector routing layer 2 protocol that runs on bridges and switches. The main
c) link state routing purpose of STP is to ensure that you do not create loops when you
d) all of the mentioned have redundant paths in your network.
View Answer
8. Which one of the following algorithm is not used for congestion
Answer: d control?
Explanation: The routing algorithm is what decides where a packet a) traffic aware routing
should go next. There are several routing techniques like shortest b) admission control
path algorithm, static and dynamic routing, decentralized routing, c) load shedding
distance vector routing, link state routing, Hierarchical routing etc. d) none of the mentioned
View Answer
6. Multidestination routing
a) is same as broadcast routing Answer: d
b) contains the list of all destinations Explanation: None.
c) data is not sent by packets
d) none of the mentioned 9. The network layer protocol of internet is
View Answer a) ethernet
b) internet protocol
Answer: c c) hypertext transfer protocol
Explanation: None. d) none of the mentioned
View Answer
7. A subset of a network that includes all the routers but contains no
loops is called Answer: b
a) spanning tree Explanation: There are several protocols used in Network layer.
b) spider structure Some of them are IP, ICMP, CLNP, ARP, IPX, HRSP etc.
c) spider tree Hypertext transfer protocol is for application layer and ethernet
d) none of the mentioned protocol is for data link layer.
View Answer
10. ICMP is primarily used for
a) error and diagnostic functions
b) addressing 3. User datagram protocol is called connectionless because
c) forwarding a) all UDP packets are treated independently by transport layer
d) none of the mentioned b) it sends data as a stream of related packets
View Answer c) it is received in the same order as sent order
d) none of the mentioned
Answer: a View Answer
1. Transport layer aggregates data from different applications into a Answer: a
single stream before passing it to Explanation: UDP is an alternative for TCP and it is used for those
a) network layer purposes where speed matters most whereas loss of data is not a
b) data link layer problem. UDP is connectionless whereas TCP is connection
c) application layer oriented.
d) physical layer
View Answer 4. Transmission control protocol is
a) connection oriented protocol
Answer: a b) uses a three way handshake to establish a connection
Explanation: The flow of data in the OSI model flows in following c) recievs data from application as a single stream
manner Application -> Presentation -> Session -> Transport -> d) all of the mentioned
Network -> Data Link -> Physical. View Answer
2. Which one of the following is a transport layer protocol used in Answer: d
networking? Explanation: Major internet applications like www, email, file
a) TCP transfer etc rely on tcp. TCP is connection oriented and it is
b) UDP optimized for accurate delivery rather than timely delivery.
c) Both TCP and UDP It can incur long delays.
d) None of the mentioned
View Answer 5. An endpoint of an inter-process communication flow across a
computer network is called
Answer: c a) socket
Explanation: Both TCP and UDP are transport layer protocol in b) pipe
networking. TCP is an abbreviation for Transmission Control c) port
Protocol and UDP is an abbreviation for User Datagram Protocol. d) none of the mentioned
TCP is connection oriented whereas UDP is connectionless. View Answer
Answer: a 8. A _____ is a TCP name for a transport service access point.
Explanation: Socket is one end point in a two way communication a) port
link in the network. TCP layer can identify the application that data b) pipe
is destined to be sent by using the port number that is bound to c) node
socket. d) none of the mentioned
View Answer
6. Socket-style API for windows is called
a) wsock Answer: a
b) winsock Explanation: Just as the IP address identifies the computer, the
c) wins network port identifies the application or service running on the
d) none of the mentioned computer. A port number is 16 bits.
View Answer
9. Transport layer protocols deals with
Answer: b a) application to application communication
Explanation: Winsock is a programming interface which deals with b) process to process communication
input output requests for internet applications in windows OS. It c) node to node communication
defines how windows network software should access network d) none of the mentioned
services. View Answer

7. Which one of the following is a version of UDP with congestion Answer: b


control? Explanation: Transport layer is 4th layer in TCP/IP model and OSI
a) datagram congestion control protocol reference model. It deals with logical communication between
b) stream control transmission protocol process. It is responsible for delivering a message between network
c) structured stream transport host.
d) none of the mentioned
View Answer 10. Which one of the following is a transport layer protocol?
a) stream control transmission protocol
Answer: a b) internet control message protocol
Explanation: The datagram congestion control is a transport layer c) neighbor discovery protocol
protocol which deals with reliable connection setup, teardown, d) dynamic host configuration protocol
congestion control, explicit congestion notification, feature View Answer
negotiation.
Answer: a
1. Which is not a application layer protocol? Answer: d
a) HTTP Explanation: HTTP is a protocol.
b) SMTP
c) FTP 4. Application developer has permission to decide the following on
d) TCP transport layer side
View Answer a) Transport layer protocol
b) Maximum buffer size
Answer: d c) Both Transport layer protocol and Maximum buffer size
Explanation: TCP is transport layer protocol. d) None of the mentioned
View Answer
2. The packet of information at the application layer is called
__________ Answer: c
a) Packet Explanation: Application layer provides the interface between
b) Message applications and the network. So application developer can decide
c) Segment what transport layer to use and what should be its maximum buffer
d) Frame size.
View Answer
5. Application layer offers _______ service.
Answer: b a) End to end
Explanation: For Application, Presentation and Session layers there b) Process to process
is no data format for message. Message is message as such in these c) Both End to end and Process to process
three layers. But when it comes to Transport, Network, Data and d) None of the mentioned
Physical layer they have data in format of segments, packets, frames View Answer
and bits respectively.
Answer: a
3. Which one of the following is an architecture paradigms? Explanation: End to End service is provided in the application layer.
a) Peer to peer Whereas process to process service is provided at the transport layer.
b) Client-server
c) HTTP 6. E-mail is _________
d) Both Peer-to-Peer & Client-Server a) Loss-tolerant application
View Answer b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned c) Port
View Answer d) None of the mentioned
View Answer
Answer: c
Explanation: Because it can work with available throughput. Answer: c
Explanation: IP address lets you know where the network is located.
7. Pick the odd one out. Whereas MAC address is a unique address for every device. Port
a) File transfer address identifies a process or service you want to carry on.
b) File download
c) E-mail 10. Which is a time-sensitive service?
d) Interactive games a) File transfer
View Answer b) File download
c) E-mail
Answer: d d) Internet telephony
Explanation: File transfer, File download and Email are services View Answer
provided by the application layer and there are message and data
oriented. Answer: d

8. Which of the following is an application layer service? 1. The ____________ translates internet domain and host names to
a) Network virtual terminal IP address.
b) File transfer, access, and management a) domain name system
c) Mail service b) routing information protocol
d) All of the mentioned c) network time protocol
View Answer d) internet relay chat
View Answer
Answer: d
Explanation: The services provided by the application layer are Answer: a
network virtual terminal, file transfer, access and management, mail Explanation: Domain name system is the way the internet domain
services, directory services, various file and data operations. names are stored and translated to IP addresses. The domain names
systems matches the name of website to ip addresses of the website.
9. To deliver a message to the correct application program running
on a host, the _______ address must be consulted. 2. Which one of the following allows a user at one site to establish a
a) IP connection to another site and then pass keystrokes from local host
b) MAC to remote host?
a) HTTP Answer: a
b) FTP Explanation: SMTP, abbreviation for Simple Mail Transfer Protocol
c) Telnet is an application layer protocol. A client who wishes to send a mail
d) TCP creates a TCP connection to the SMTP server and then sends the
View Answer mail across the connection.

Answer: c 5. The ASCII encoding of binary data is called


Explanation: Telnet is used for accessing remote computers. Using a) base 64 encoding
telnet a user can access computer remotely. With Telnet, you can log b) base 32 encoding
on as a regular user with whatever privileges you may have been c) base 16 encoding
granted to the specific application and data on the computer. d) base 8 encoding
View Answer
3. Application layer protocol defines ____________
a) types of messages exchanged Answer: a
b) message format, syntax and semantics Explanation: Base64 is used commonly in a number of applications
c) rules for when and how processes send and respond to messages including email via MIME, and storing complex data in XML.
d) all of the mentioned Problem with sending normal binary data to a network is that bits
View Answer can be misinterpreted by underlying protocols, produce incorrect
data at receiving node and that is why we use this code.
Answer: d
Explanation: Application layer deals with the user interface, what 6. Which one of the following is an internet standard protocol for
message is to be sent or the message format, syntax and semantics. managing devices on IP network?
A user has access to application layer for sending and receiving a) dynamic host configuration protocol
messages. b) simple network management protocol
c) internet message access protocol
4. Which one of the following protocol delivers/stores mail to d) media gateway protocol
reciever server? View Answer
a) simple mail transfer protocol
b) post office protocol Answer: b
c) internet mail access protocol Explanation: SNMP is a set of protocols for network management
d) hypertext transfer protocol and monitoring. This protocol is included in the application layer.
View Answer SNMP uses 7 protocol data units.
7. Which one of the following is not an application layer protocol? Answer: d
a) media gateway protocol Explanation: HTTP is an application layer protocol. Whereas TCP is
b) dynamic host configuration protocol a transport layer protocol.
c) resource reservation protocol
d) session initiation protocol 10. When displaying a web page, the application layer uses the
View Answer _____________
a) HTTP protocol
Answer: c b) FTP protocol
Explanation: Resource reservation protocol is used in transport c) SMTP protocol
layer. It is designed to reserve resources across a network for quality d) TCP protocol
of service using the integrated services model. View Answer

8. Which protocol is a signaling communication protocol used for Answer: a


controlling multimedia communication sessions?
a) session initiation protocol 1. What layer in the TCP/IP stack is equivalent to the Transport
b) session modelling protocol layer of the OSI model?
c) session maintenance protocol a) Application
d) resource reservation protocol b) Host to host
View Answer c) Internet
d) Network Access
Answer: a View Answer
Explanation: SIP is a signaling protocol in which its function
includes initiating, maintaining and terminating real time sessions. Answer: b
SIP is used for signaling and controlling multimedia sessions. Explanation: The four layers of the TCP/IP stack (also called the
DoD model) are Application/Process, Host-to-Host, Internet, and
9. Which one of the following is not correct? Network Access. The Host-to-Host layer is equivalent to the
a) Application layer protocols are used by both source and Transport layer of the OSI model.
destination devices during a communication session
b) HTTP is a session layer protocol 2. You want to implement a mechanism that automates the IP
c) TCP is an application layer protocol configuration, including IP address, subnet mask, default gateway,
d) All of the mentioned and DNS information. Which protocol will you use to accomplish
View Answer this?
a) SMTP
b) SNMP Answer: d
c) DHCP Explanation: DNS and some other services work on both TCP and
d) ARP the UDP protocols. DNS uses TCP for zone exchanges between
View Answer servers and UDP when a client is trying to resolve a hostname to an
IP address.
Answer: c
Explanation: Dynamic Host Configuration Protocol (DHCP) is used 5. Length of Port address in TCP/IP is _________
to provide IP information to hosts on your network. DHCP can a) 4bit long
provide a lot of information, but the most common is IP address, b) 16bit long
subnet mask, default gateway, and DNS information. c) 32bit long
d) 8 bit long
3. The DoD model (also called the TCP/IP stack) has four layers. View Answer
Which layer of the DoD model is equivalent to the Network layer of
the OSI model? Answer: b
a) Application Explanation: TCP and UDP port numbers are 16 bits in length. So,
b) Host to host valid port numbers can theoretically take on values from 0 to
c) Internet 65,535. These values are divided into ranges for different purposes,
d) Network Access with certain ports reserved for particular uses.
View Answer
6. TCP/IP layer is equivalent to combined Session, Presentation and
Answer: c ______
Explanation: The four layers of the DoD model are a) Network layer
Application/Process, Host-to-Host, Internet, and Network Access. b) Application layer
The Internet layer is equivalent to the Network layer of the OSI c) Transport layer
model. d) Physical layer
View Answer
4. Which of the following protocols uses both TCP and UDP?
a) FTP Answer: b
b) SMTP Explanation: TCP/IP network model is a hierarchical protocol made
c) Telnet up of interactive modules, each of which provides a specific
d) DNS functionality; however, the modules are not necessarily
View Answer interdependent. It is equivalent to combined session, presentation
and application layer.
7. How many levels of addressing is provided in TCP/IP protocol? Answer: a
a) One Explanation: In 1983, TCP/IP protocols replaced NCP (Network
b) Two Control Program) as the ARPANET’s principal protocol. And
c) Three ARPANET then became one component of the early Internet. The
d) Four starting point for host-to-host communication on the ARPANET in
View Answer 1969 was the 1822 protocol, which defined the transmission of
messages to an IMP.
Answer: d
Explanation: Four levels of addresses are used in an internet 10. A device operating at network layer is called ____
employing the TCP/IP protocols. They are physical (link) addresses, a) Router
logical (IP) addresses, port addresses, and specific addresses. b) Equalizer
c) Bridge
8. Virtual terminal protocol is an example of _______ d) Repeater
a) Network layer View Answer
b) Application layer
c) Transport layer Answer: a
d) Physical layer Explanation: A router is a networking device that forwards data
View Answer packets between computer networks. Routers perform the traffic
directing functions on the Internet. It supports different network
Answer: b layer transmission standards. Each network interface is used to
Explanation: In open systems, a virtual terminal (VT) is an enable data packets to be forwarded from one transmission system to
application service. It allows host terminals on a multi-user network another.
to interact with other hosts regardless of terminal type and
characteristics. advertisement

9. TCP/IP is related to _______ 11. A device operating at network layer is called ____
a) ARPANET a) Router
b) OSI b) Equalizer
c) DECNET c) Bridge
d) ALOHA d) Repeater
View Answer View Answer

Answer: d
1) TCP is a ………. protocol. D. transport layer.

A. stream-oriented 5) TCP is a(n) ……….. transport protocol.

B. message-oriented A. protocol delivery

C. block-oriented B. reliable

D. packet-oriented C. best-effort delivery

2) Which of the following is not the layer of TCP/IP protocol. D. effortless delivery

A. Physical layer 6) ……… is the protocol that hides the underlying physical network
by creating a virtual network view.
B. link layer
A. Internet Protocol(IP)
C. network layer
B. Internet Control Message Protocol(ICMP)
D. transport layer.
C. Address Resolution Protocol(ARP)
3) TCP groups a number of bytes together into a packet called a ….
D. Bootstrap Protocol(BOOTP)
A. user datagram
7) To use the services of UDP, we need ……… socket addresses.
B. segment
A. four
C. datagram
B. two
D. packet
C. three
4) The ………. of TCP/IP protocol is responsible for figuring out
how to get data to its destination. D. four

A. application layer 8) Which of the following is not the name of Regional Internet
Registries(RIR) to administer the network number portion of IP
B. link layer address.
C. network layer A. American Registry for Internet Numbers(ARIN)
B. Reseaux IP Europeans(RIPE) 12) ………. messages are never sent in response to datagrams with a
broadcast or a multicast destination address.
C. Europeans Registry for Internet Numbers(ERIN)
A. ICMP
D. Asia Pacific Network Information Center(APNIC)
B. ARP
9) UDP packets are called …….
C. IP
A. user datagrams
D. BOOTP
B. segments
13) TCP assigns a sequence number to each segment that is being
C. frames sent. The sequence number for each segment is number of the …….
D. packets byte carried in that segment.

10) ………… addresses use 21 bits for the and 8 bits for the portion A. first
of the IP address for TCP/IP network. B. last
A. Class A C. middle
B. Class B D. zero
C. Class C 14) ………. is responsible for converting the higher level protocol
D. Class D address (IP addresses) to physical network addresses.

11) UDP packets have fixed-size header of ………. bytes. A. Internet Protocol(IP)

A. 16 B. Internet Control Message Protocol(ICMP)

B. 8 C. Address Resolution Protocol(ARP)

C. 32 D. Bootstrap Protocol(BOOTP)

D. 64 15) UDP and TCP are both ……… layer protocols.

A. data link
B. network 19) When the IP layer of a receiving host receives a datagram, …..

C. transport A. delivery is complete

D. interface B. a transport layer protocol takes over

16) ……….. is a process-to-process protocol that adds only port C. a header is added
addresses, checksum error control, and length information to the
data from upper layer. D. a session layer protocol takes over

A. TCP 20) TCP/IP is a ………. hierarchical protocol suite developed before


the OSI model.
B. UDP
A. seven-layer
C. IP
B. five-layer
D. ARP
C. six-layer
17) Which of the following functions does UDP perform?
D. four-layer
A. Process-to-process communication
Answers:
B. Host-to-host communication

C. End-to-end reliable data delivery


1) A. stream-oriented
D. Interface-to-interface communication. 2) A. Physical layer
3) B. segment
18) A port address in TCP/IP is ………bits long. 4) C. network layer
A. 32 5) B. reliable
6) A. Internet Protocol(IP)
B. 48 7) B. two
8) C. Europeans Registry for Internet Numbers(ERIN)
C. 16
9) A. user datagrams
D. 64 10) C. Class C
11) B. 8
12) A. ICMP B. Connection-oriented delivery
13) A. first
14) C. Address Resolution Protocol(ARP) C. Data control
15) C. transport D. None of the above
16) B. UDP
17) A. Process-to-process communication 4) ………. provides a framework for passing configuration
18) C. 16 information to hosts on a TCP/IP network.
19) B. a transport layer protocol takes over
A. Dynamic Host Configuration Protocol(DHCP)
20) B. five-layer
B. Address Resolution Protocol(ARP)
1) UDP needs the ……….. address to deliver the user datagram to
the correct application process C. Internet Protocol(IP)
A. port D. Internet Control Message Protocol(ICMP)
B. application 5) The source port address on the UDP user datagram header defines
………
C. internet
A. the sending computer
D. intranet
B. the receiving computer
2) The …….. was originally developed as a mechanism to enable
disk-less hosts to be remotely booted over a network as C. the process running on the sending computer
workstations, routers, terminal concentrators and so on.
D. the process running on the receiving computer
A. ICMP
6) The mechanisms supported by DHCP for IP address allocation on
B. BOOTP a TCP/IP network is/are …
C. UDP A. Automatic allocation
D. ARP B. Dynamic allocation
3) Which of the following does UDP guarantee? C. Manual allocation
A. Flow control D. All of th above
7) UDP is called a ………. transport protocol. C. UDP

A. connection-oriented, unreliable D. ARP

B. connectionless, reliable

C. connectionless, unreliable
11) UDP is an acronym for …………
D. connection, reliable
A. User Delivery Protocol
8) DHCP in TCP/IP network assigns an IP address for a limited
period of time. Such a network address is called a …… B. User Datagram Procedure

A. lease C. User Datagram Protocol

B. limited network D. User Delivery Procedure

C. timed network 12) ………… is where users typically interact with the TCP/IP
network.
D. assigned network
A. Link layer
9) UDP does not add anything to the services of IP except for
providing ………. communication. B. Network layer

A. node to node C. Transport layer

B. process to process D. Application layer

C. host to host 13) The local host and the remote host are defined using IP
addresses. To define the processes, we need second identifiers called
D. interface to interface ………
10) The use of ……… allows centralized configuration of multiple A. UDP addresses
clients.
B. transport addresses
A. ICMP
C. port addresses
B. BOOTP
D. TCP addresses B. multiplexing

14) The …………. is responsible for communicating with the actual C. demultiplexing
network hardware.
D. data control
A. Link layer
18) ………. provides full transport layer services to applications.
B. Network layer
A. TCP
C. Transport layer
B. UDP
D. Application layer
C. IP
15) UDP packets are encapsulated in …….
D. ARP
A. an Ethernet frame
19) UDP uses …… to handle incoming user datagrams that go to
B. an TCP segment different processes on the same host.

C. an IP datagram A. flow control

D. an Ethernet packets B. multiplexing

16) ………… is the protocol suite for the current Internet. C. demultiplexing

A. TCP/IP D. data control

B. NCP 20) In the sending computer, UDP receives a data unit from the
……… layer.
C. UDP
A. application
D. ACM
B. transport
17) UDP uses …….. to handle outgoing user datagrams from
multiple processes on one host. C. IP

A. flow control D. interface


Answers: 19) C. demultiplexing

1) A. port 20) A. application

2) B. BOOTP 1. When the angle of incidence is ____________ the critical angle,


the light beam bends along the interface.
3) D. None of the above
A) less than
4) A. Dynamic Host Configuration Protocol(DHCP)
B) equal to
5) C. the process running on the sending computer
C) more than
6) D. All of th above
D) none of the above
7) C. connectionless, unreliable
View Answer:
8) A. lease
Answer: Option B
9) B. process to process
2. Transmission media lie below the __________ layer.
10) B. BOOTP
A) application
11) C. User Datagram Protocol
B) transport
12) D. Application layer
C) network
13) C. port addresses
D) physical
14) A. Link layer
View Answer:
15) C. an IP datagram
Answer: Option D
16) A. TCP/IP
3. _________ cable consists of an inner copper core and a second
17) B. multiplexing conducting outer sheath.
18) A. TCP
A) Twisted-pair Answer: Option A

B) Shielded twisted-pair 6. _________ are used for cellular phone, satellite, and wireless
LAN communications.
C) Coaxial
A) Radio waves
D) Fiber-optic
B) Infrared waves
View Answer:
C) Microwaves
Answer: Option C
D) none of the above
4. __________ consists of a central conductor and a shield.
View Answer:
A) Twisted-pair
Answer: Option C
B) Coaxial
7. The inner core of an optical fiber is _________ in composition.
C) Fiber-optic
A) copper
D) none of the above
B) glass or plastic
View Answer:
C) bimetallic
Answer: Option B
D) liquid
5. _______ cable can carry signals of higher frequency ranges than
_______ cable. View Answer:

A) Coaxial; twisted-pair Answer: Option B

B) Twisted-pair; fiber-optic 8. What is the major factor that makes coaxial cable less susceptible
to noise than twisted-pair cable?
C) Coaxial; fiber-optic
A) insulating material
D) none of the above
B) inner conductor
View Answer:
C) diameter of cable

D) outer conductor A) Twisted-pair

View Answer: B) Coaxial

Answer: Option D C) Fiber-optic

9. Signals with a frequency below 2 MHz use _______ propagation. D) none of the above

A) line-of-sight View Answer:

B) sky Answer: Option A

C) ground 12. In fiber optics, the signal is __________ waves.

D) none of the above A) radio

View Answer: B) light

Answer: Option C C) infrared

10. In an optical fiber, the inner core is _________ the cladding. D) very low-frequency

A) less dense than View Answer:

B) denser than Answer: Option B

C) the same density as 13. Signals with a frequency above 30 MHz use
_______propagation.
D) another name for
A) line-of-sight
View Answer:
B) sky
Answer: Option B
C) ground
11. ________ cable consists of two insulated copper wires twisted
together. D) none of the above
View Answer: C) Fiber-optic

Answer: Option A D) none of the above

14. A parabolic dish antenna is a(n) ___________ antenna. View Answer:

A) unidirectional Answer: Option A

B) bidirectional 17. Signals with a frequency between 2 MHz and 30 MHz use
_______ propagation.
C) omnidirectional
A) ground
D) horn
B) line-of-sight
View Answer:
C) sky
Answer: Option A
D) none of the above
15. A(n) _______ medium provides a physical conduit from one
device to another. View Answer:

A) unguided Answer: Option C

B) guided 18. Transmission media are usually categorized as ___________.

C) either (a) or (b) A) determinate or indeterminate

D) none of the above B) fixed or unfixed

View Answer: C) guided or unguided

Answer: Option B D) metallic or nonmetallic

16. ________ cable is used for voice and data communications. View Answer:

A) Twisted-pair Answer: Option C

B) Coaxial
19. ________ are used for short-range communications such as D) none of the above
those between a PC and a peripheral device.
View Answer:
A) Radio waves
Answer: Option C
B) Infrared waves
22. Which of the following primarily uses guided media?
C) Microwaves
A) radio broadcasting
D) none of the above
B) satellite communications
View Answer:
C) local telephone system
Answer: Option B
D) cellular telephone system
20. _________ media transport electromagnetic waves without the
use of a physical conductor. View Answer:

A) Guided Answer: Option C

B) Unguided 23. When a beam of light travels through media of two different
densities, if the angle of incidence is greater than the critical angle,
C) Either (a) or (b) _______ occurs.

D) None of the above A) refraction

View Answer: B) reflection

Answer: Option B C) criticism

21. ________ cables are composed of a glass or plastic inner core D) incidence
surrounded by cladding, all encased in an outside jacket.
View Answer:
A) Twisted-pair
Answer: Option B
B) Coaxial

C) Fiber-optic
D) none of the above

24. Which of the following is not a guided medium? View Answer:

A) fiber-optic cable Answer: Option C

B) coaxial cable 27. Radio waves are _________.

C) twisted-pair cable A) unidirectional

D) atmosphere B) omnidirectional

View Answer: C) bidirectional

Answer: Option D D) none of the above

25. Microwaves are _________. View Answer:

A) omnidirectional Answer: Option B

B) bidirectional 28. In a fiber-optic cable, the signal is propagated along the inner
core by __________.
C) unidirectional
A) refraction
D) none of the above
B) reflection
View Answer:
C) modulation
Answer: Option C
D) none of the above
26. ________ cables carry data signals in the form of light.
View Answer:
A) Twisted-pair
Answer: Option B
B) Coaxial

C) Fiber-optic

You might also like