You are on page 1of 22

CS610-Computer Network

MCQs from Lecture No. 32 to Lecture No. 45

1) _______ Source is responsible for fragmentation.

A) IPV4
B) IPV6

Answer:
B) IPV6
Reference:
Lecture#32, Page#113

2) In IPV6 the 128 bit addresses unwidely in dotted decimal; requires ___ numbers.

A) 12
B) 14
C) 16
D) none of the given

Answer:
C) 16
Reference:
Lecure#32, Page#114

3) IPV6 128 bits address includes network prefix and _________.

A) Host Suffix
B) Host prefix
C) Source Prefix
D) none of the given

Answer:
A) Host Suffix
Reference:
Lecture#32, Page#114

4) _______ is used for single destination computer.

A) Multicast
B) Broadcast
C) unicast
D) none of the given

Answer:
C) unicast
Reference:
1
Lecture#32, Page#114

5) IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

A) 96
B) 100
C) 120
D) none of the given

Answer:
A) 96
Reference:
Lecture#32, Page#114

6) ________ is a type of address used for collection of computers with same prefix.

A) Cluster
B) unicast
C) Multicast
D) none of the given

Answer:
A) Cluster
Reference:
Lecture#32, Page#114

7) The process of learning the path MTU is known as path MTU discovery.

A) True
B) False

Answer:
A) True
Reference:
Lecture#32, Page#114

8) Which is not the type of error messages defined by ICMP?

A) Source quench
B) Time exceeded
C) Destination unreachable
D) none of the given

Answer:
D) none of the given
Reference:
Lecture#32, Page#115

2
9) The Network Layer Protocol ICMP stands for ___________

A) Instant Control Message Protocol


B) Internet Control Message Protocol
C) Initial Control Message Protocol
D) None of the given

Answer:
B) Internet Control Message Protocol
Reference:
Lecture#32, Page#115

10) __________ protocol provides error reporting mechanisms.

A) IGMP
B) SNMP
C) ICMP
D) none of the given

Answer:
C) ICMP
Reference:
Lecture#32, Page#115

11) Which protocol is used to test different tools.

A) ICMP
B) IGMP
C) TCP/IP
D) none of the given

Answer:
A) ICMP
Reference:
Lecture#33, Page#117

12) ICMP message transport is acted upon by getting ICMP ________ in IP.

A) De-encapsulated
B) Encapsulated
C) Segmented
D) none of the given

Answer:
B) Encapsulated
Reference:
Lecture#33, Page#117

3
13) ________ message is sent in response· to incoming datagrams with problems.

A) TCP/IP
B) IGMP
C) ICMP
D) none of the given

Answer:
C) ICMP
Reference:
Lecture#33, Page#117

14) There are ______ possibilities to detect the destination using Trace-route.

A) 1
B) 2
C) 3
D) None of the given

Answer:
B) 2
Reference:
Lecture#33, Page#118

15) Fragmentation when using ICMP for path MTU should be avoided.

A) True
B) False

Answer:
A) True
Reference:
Lecture#33, Page#118

16) The Source can configure outgoing datagram’s to avoid _________

A) Segmentation
B) Defragmentation
C) Fragmentation
D) None of the given

Answer:
C) Fragmentation
Reference:
Lecture#33, Page#118

4
17) The UDP stands for ________.

A) Universal Datagram Protocol


B) User Datagram Protocol
C) United Datagram Protocol
D) None of the given

Answer:
B) User Datagram Protocol
Reference:
Lecture#34, Page#119

18) UDP uses best-effort delivery service.

A) True
B) False

Answer:
A) True
Reference:
Lecture#34, Page#119

19) ______ provides computer to computer communication.

A) IP
B) TCP
C) ICMP
D) IGMP

Answer:
A) IP
Reference:
Lecture#34, Page#119

20) _______ is less complex and easy to understand.

A) TCP
B) UDP
C) IP
D) None of the given

Answer:
B) UDP
Reference:
Lecture#34, Page#120

5
21) Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary
interaction & operating system independent are the characteristics of _______________.

A) TCP
B) UDP
C) IP
D) None of the given

Answer:
B) UDP
Reference:
Lecture#34, Page#120

22) The Universal Datagram is not an end-to-end protocol.

A) True
B) False

Answer:
B) False
Reference:
Lecture#34, Page#120

23) UDP follows four types of interactions.

A) True
B) False

Answer:
A) True
Reference:
Lecture#34, Page#121

24) UDP packet is encapsulated in ________ datagram.

A) IP
B) TCP
C) TCP/IP
D) None of the given
Answer:
A) IP
Reference:
Lecture#35, Page#122

6
25) Reliability is not the responsibility of the Transport layer.

A) True
B) False

Answer:
B) False
Reference:
Lecture#35, Page#123

26) TCP stands for __________.

A) Transport control protocol


B) Transmission control protocol
C) Terminal control protocol
D) none of the given

Answer:
B) Transmission control protocol
Reference:
Lecture#35, Page#123

27) TCP is a ________ protocol.

A) Point-to-Point
B) Multi-Point
C) Both (a) and (b)
D) None of the given

Answer:
A) Point-to-Point
Reference:
Lecture#35, Page#123

28) TCP connections are not called Virtual connections.

A) True
B) False

Answer:
B) False
Reference:
Lecture#35, Page#123

7
29) Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication,
Stream interface, Reliable connection startup and Graceful connection shutdown are the services
provided by__________

A) None of the given


B) TCP
C) UDP
D) IP

Answer:
B) TCP
Reference:
Lecture#35, Page#123

30) TCP provides reliable connection startup.

A) True
B) False

Answer:
A) True
Reference:
Lecture#35, Page#123

31) TCP provides _______ communication.

A) Half-duplex
B) Full-duplex
C) Both (a) and (b)
D) None of the given

Answer:
B) Full-duplex
Reference:
Lecture#35, Page#123

32) System rebooting is one of the major problems in the reliable delivery.

A) True
B) False

Answer:
A) True
Reference:
Lecture#35, Page#124

33) TCP achieves ________ by retransmission.

A) Efficiency
B) Accuracy

8
C) Reliability
D) none of the given
Answer:
C) Reliability
Reference:
Lecture#36, Page#125

34) The time for acknowledgement to arrive depends on _____________.

A) Distance to destination
B) Current traffic conditions
C) Both a and b
D) none of the given

Answer:
C) Both a and b
Reference:
Lecture#36, Page#125

35) _____ uses window mechanism to control the flow of data.

A) IP
B) UDP
C) TCP
D) none of the given
Answer:
C) TCP
Reference:
Lecture#36, Page#126

36) The maximum segment size of TCP flow control is _____.

A) 3000 octets
B) 2000 octets
C) 1000 octets
D) none of the given

Answer:
C) 1000 octets
Reference:
Lecture#36, Page#126

37) The amount of buffer space available at any time is called the window.

A) True
B) False

Answer:
A) True
Reference:

9
Lecture#36, Page#126

38) Network having short intervals has a large timeout and the network having large interval has
short timeout.

A) True
B) False

Answer:
B) False
Reference:
The network having short intervals has a short timeout and the network having large interval has
large timeout.
Lecture#36, Page#126

39) In 3-way handshake TCP requires to generate a random _______ sequence number.

A) 30 bit
B) 32 bit
C) 34 bit
D) none of the given

Answer:
B) 32 bit
Reference:
Lecture#36, Page#127

40) The goal of ________ is to avoid adding retransmissions to an already congested network.

A) packet control
B) congestion control
C) transmission control
D) None of the given
Answer:
B) congestion control
Reference:
Lecture#37, Page#128

41) TCP uses the term segment to refer to a _______.

A) packet
B) message
C) both (a) and (b)
D) None of the given

Answer:
B) message
Reference:
Lecture#37, Page#128

10
42) TCP uses ______ format for all messages.

A) single
B) double
C) multiple
D) None of the given

Answer:
A) single
Reference:
Lecture#37, Page#128

43) NAT stands for ___________

A) Network Address Translation


B) Network Address Transmission
C) Network Address Test
D) None of the given

Answer:
A) Network Address Translation
Reference:
Lecture#37, Page#128

44) It allows _________ computer(s) to share ________ IP address(s).

A) multiple, multiple
B) multiple, single
C) single, single
D) None of the given

Answer:
B) multiple, single
Reference:
NETWORK ADDRESS TRANSLATION:
Lecture#37, Page#128

45) The goal of _____________ is to avoid adding retransmissions to an already congested


network.

A) Packet control
B) congestion control
C) transmission control
D) None of the given

Answer:
B) congestion control
Reference:
Lecture#37, Page#128

11
46) Network Address Translation (NAT) requires device to perform packet translation.

A) True
B) False

Answer:
A) True
Reference:
Lecture#37, Page#128

47) A popular use of _______ is TCP Splicing. It interconnects two independent TCP connections
and performs segment rewriting.
A) NAT
B) NAPT
C) Twice NAT
D) All of these

Answer:
B) NAPT
Reference:
Lecture#38, Page#131

48) Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT
box is connected to Domain Name.

A) False
B) True

Answer:
B) True
Reference:
Lecture#38, Page#131

49) Network Address and Port Translation (NAPT) is by far the most popular form of ________.

A) Network Address Transmission


B) Network Address Translation
C) Network Address Transformation
D) None of the given

Answer:
B) Network Address Translation
Reference:
Lecture#38, Page#131

50) NAPT stands for _________________

A) Network Address and Protocol Translation


B) Network Address and Port Translation
C) Network Address and Packet Translation
D) None of the given
12
Answer:
B) Network Address and Port Translation
Reference:
Lecture#38, Page#131

51) Basic NAT does not work well for communication initiated from the internet.

A) True
B) False

Answer:
A) True
Reference:
Lecture#38, Page#132

52) NAT software does not allow a PC to connect with the internet and act as a NAT device at the
same time.

A) True
B) False

Answer:
B) False
Reference:
NAT software allows a PC to connect with the Internet and act as a NAT device at the same time.
Lecture#38, Page#132

53) Twice NAT requires the DNS interact with the NAT device.

A) True
B) False

Answer:
A) True
Reference:
Lecture#38, Page#132

54) Twice NAT fails if an application uses the IP addresses instead of Domain Name.

A) True
B) False

Answer:
A) True
Reference:
Lecture#38, Page#132

13
55) Routing inserts or changes values in _______

A) MAC address
B) routing table
C) both (a) and (b)
D) None of the given

Answer:
B) routing table
Reference:
Lecture#39, Page#133

56) In dynamic routing, the routing table is initialized when system boots.

A) True
B) False

Answer:
A) True
Reference:
Lecture#39, Page#133

57) In IP routing, forwarding refers to _______ transfer.

A) packet
B) datagram
C) message
D) None of the given

Answer:
B) datagram
Reference:
Lecture#39, Page#133

58) In __________ routing, the table is initialized when system boots and there is no further
changes.

A) Dynamic
B) Static
C) Both (a) and (b)
D) None of the given

Answer:
B) Static
Reference:
Lecture#39, Page#133

14
59) Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes
of Internet Routing Protocol.

A) True
B) False

Answer:
A) True
Reference:
Lecture#40, Page#135

60) Autonomous System chooses a routing protocol to exchange routing information which is
passed before being summarized to another group.

A) True
B) False

Answer:
B) False
Reference:
Lecture#40, Page#135
Each Autonomous System chooses a routing protocol to exchange routing information which is
summarized before being passed to another group.

61) EGP stands for _______________.

A) Extension Gateway Protocol


B) Exterior Gateway Protocol
C) Explicit Gateway Protocol
D) none of the given

Answer:
B) Exterior Gateway Protocol
Reference:
Lecture#40, Page#135

62) Each autonomous system used to communicate among autonomous systems by chooses an
IGP.

A) True
B) False

Answer:
A) True
Reference:
Lecture#40, Page#136

15
63) ________ protocol uses distance vector algorithm.

A) IGP
B) BGP
C) RIP
D) none of the given

Answer:
C) RIP
Reference:
Lecture#40, Page#138

64) OSPF stands for _____________.

A) Open Shortest Path First Protocol


B) Open Source Path First Protocol
C) Open Secure Path First Protocol
D) none of the given

Answer:
A) Open Shortest Path First Protocol
Reference:
Lecture#41, Page#137

65) _________ is a current version of BGP.

A) 2
B) 3
C) 4
D) none of the given

Answer:
C) 4
Reference:
Lecture#41, Page#138

66) ____________ measures distance in network hops, where each network between the source
and destination counts as a single hop.

A) BGP
B) OSPF
C) RIP
D) None of these

Answer:
C) RIP
Reference:
Lecture#41, Page#138

16
67) Which of the following is an exterior routing protocol?

A) OSPF
B) RIP
C) BGP
D) RIP and OSPF

Answer:
C) BGP
Reference:
Lecture#41, Page#138

68) _______ includes a 32 -bits address mask with each address, which allows the
address to be classful, classless, or subnetted.

A) RIP
B) OSPF
C) BGP
D) None of the given

Answer:
B) OSPF
Reference:
Lecture#42, Page#140

69) Which of the following are interior routing protocols?

A) RIP
B) OSPF
C) BGP
D) RIP and OSPF

Answer:
D) RIP and OSPF
Reference:
https://www.metaswitch.com/knowledge-center/reference/what-is-routing-information-protocol-
rip#:~:text=The%20Routing%20Information%20Protocol%20(RIP,existing%20implementations%2
0in%20the%20field.
Lecture#42, Page#140

70) OSPF includes __________ address mask with each address.

A) 30Bit
B) 32Bit
C) 34Bit
D) none of the given

Answer:
B) 32Bit
Reference:
Lecture#42, Page#140

17
71) OSPF has designed as an Exterior Gateway Protocol used to pass routing information among
routers within an autonomous system.

A) True
B) False

Answer:
B) False
Reference:
OSPF has designed as an Interior Gateway Protocol used to pass routing information among
routers within an autonomous system.
Lecture#42, Page#140

72) OSPF is based on __________

A) Distance vector routing


B) Link state routing
C) Path vector routing
D) Distance vector routing and Link state routing

Answer:
B) Link state routing
Reference:
Lecture#42, Page#140

73) The computer uses _________ to inform Local router about the last application when it
leaves.

A) ICMP
B) IGMP
C) SNMP
D) None of the given

Answer:
B) IGMP
Reference:
Lecture#43, Page#142

74) A standard protocol exists that allows a host to inform a nearby router whenever the host
needs to join or leave a particular multicast group known as ______________.

A) IGMP
B) OSPF
C) BGP
D) None of the given

Answer:
A) IGMP
Reference:
Lecture#43, Page#142

18
75) A multicast routing scheme in which the protocol software builds a delivery tree from a
central point is called __________

A) Distance Vector Multicast Routing Protocol (DVMRP)


B) Core Based Tree (CBT)
C) Protocol Independent Multicast-Sparse Mode (PIM-SM)
D) Protocol Independent Multicast-Dense Mode (PIM-DM)

Answer:
B) Core Based Tree (CBT)
Reference:
Lecture#44, Page#144

76) UDP Provides connection-oriented service.

A) True
B) False

Answer:
A) False
Reference:
Lecture#45, Page#154

77) In TCP when a computer sends a segment, the _______ and ______ fields refer to incoming
data.

A) ACKNOWLEGE NUMBER, WINDOW


B) SEQUENCE NUMBER, WINDOW
C) ACKNOWLEGE NUMBER, SEQUENCE NUMBER
D) None of the given

Answer:
A) ACKNOWLEGE NUMBER, WINDOW

78) ______ identifies the application program that sent the data.

A) Destination Port
B) Source port
C) Logical address
D) None of the given
Answer:
B) Source port

79) A datagram cannot be larger than _________ of a network over which it is sent.

A) MTU
B) Size
C) IP header
D) None of the given

19
Answer:
A) MTU

80) TCP is a connectionless and reliable transport protocol.

A) True
B) False

Answer:
A) True
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#363

81) To save traffic, an EGP does not summarize routing information from an autonomous system
before passing it to another autonomous system.

A) True
B) False

Answer:
B) False
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#454

82) An area is _________

A) Part of an Autonomous System


B) Composed of at least two As’s
C) Another term of an internet
D) A collection stub area

Answer:
A) Part of an Autonomous System

83) We use the term ___________ to refer to a measure of the path that routing software uses
when choosing a route.

A) routing path
B) routing metric
C) routing
D) switching

Answer:
B) routing metric
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#455

20
84) ____________ uses distance vector approach to define routing.

A) BDP
B) OSPF
C) None of these
D) RIP

Answer:
D) RIP
Reference:
Google

85) A one-to-many communication between a source and a specific group of hosts is classified as
a ____ communication.

A) Unicast
B) Multicast
C) Broadcast
D) Unicast & Multicast

Answer:
B) Multicast
Reference:
Google

86) Which of the following protocols allows the sender and receiver to enforce polices.

A) RIP
B) OSPF
C) BGP
D) BGP and RIP

Answer:
C) BGP
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#457

87) The Border Gateway Protocol (BGP) uses __________ for all communication

A) UDP
B) TCP
C) UDP and TCP
D) None of the given

Answer:
B) TCP
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#457

21
88) _________ is used to attach two autonomous systems.

A) BGP
B) IGP
C) EGP
D) none of the given

Answer:
C) EGP
Reference:
https://www.ibm.com/docs/en/aix/7.2?topic=gateways-interior-exterior-routing

These MCQs are taken from Quiz No. 01 and Quiz No. 02 from Semester Fall 2020.
All MCQs are 100% correct with reference.

Prepared by Sahibzada Atif Ansari

Email Address: muhammadatifejaz416@gmail.com

22

You might also like