You are on page 1of 10

Question Bank

Computer Network

Unit 1

1. Which of the following communications modes support two-way traffic but in only
one direction of a time?
A. Bus network
B. Star network
C. Ring network
D. Point-to-point network
Answer Key : d

2.Which of the following communications modes support two-way traffic but in only one
direction of a time?
A. Simplex B. Half-duplex C. Three-quarters duplex D. Full duplex
Answer Key B
3.Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) physical layer
Answer Key a

4.A MODEM is connected in between a telephone line and a


A. Computer
B. Communication Adapter
C. Serial Port
D. Network
Answer Key A
5. Bluetooth is an example of
A. Personal area network
B. Local area network
C. Virtual private network
D. Wide area network
Answer Key : A

6.Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
Answer Key : d

7.TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer
Answer Key A

8.Which layer is responsible for process to process delivery in a general network model?
) network layer
b) transport layer
c) session layer
d) data link layer

Answer Key : B
Unit 2 & Unit 3

9. Header of a frame generally contains


a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned

Answer Key D
10 The data link layer takes the packets from _________ and encapsulates them into
frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
application layer
Answer Key a

11. The technique of temporarily delaying outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Answer Key a
12.Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
Answer Key D

13.if there is only one routing sequence for each source destination pair, the scheme is
known as …..
A. static routing
B. fixed alternative routing
C. standard routing
D. dynamic routing
Answer Key b

14.The Routing Information Protocol(RIP) is an intra domain routing based on


……..routing.
A. distance vector
B. link state
C. path vector
D. distance code
Answer key a

15.In ……. routing, the mask and the destination address are both 0.0.0.0 in routing table.
A. next-hop
B. host-specific
C. network-specific
D. default
Answer d

16.In OSPF, a ……… link is a network with several routers attached to it.
. point-to-point
B. transient
C. stub
D. multipoint
Answer B

17. ICMP is primarily used for __________


a) error and diagnostic functions
b) addressing
c) forwarding
d) routing
Answer Key a

18.Transmission data rate is decided by ____________


a) network layer
b) physical layer
c) data link layer
d) transport layer
Answer Key B

19.A _______ is the physical path over which a message travels.


) Path
b) Medium
c) Protocol
d) Route
Answer Key : b

20.Which sublayer of the data link layer performs data link functions that depend upon
the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
Answer Key B

21.What is the access point (AP) in a wireless LAN?


a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both device that allows wireless devices to connect to a wired network and wireless
devices itself
d) all the nodes in the network
Answer Key : a

22.Transmission control protocol _____


a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
Answer Key d

23.An endpoint of an inter-process communication flow across a computer network is


called
a) socket
b) pipe
c) port
d) machine
Answer Key a

24.Which of the following tasks is not done by data link layer?


a) framing
b) error control
c) flow control
d) channel coding
Answer Key d

25.Which of the following is a data link protocol?


ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
Answer Key : d

26. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer Key C

27.Automatic repeat request error management mechanism is provided by


a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
Answer Key a

Unit 4

28 Which of the following is a transport layer protocol?


a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
Answer Key A.

29.Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer
protocol for electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
Answer Key A

30 TDM, slots are further divided into ___


a) Seconds
b) Frames
c) Packets
d) Bits
Answer B

Identify the incorrect statement regarding FTP.


a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection
Answer Key C

31.Which among the following represents the objectives/requirements of Data Link


Layer?
a. Frame Synchronization
b. Error & Flow Control
c. Both a & b
d. None of the above
Answer Key

32. When does the station B send a positive acknowledgement (ACK) to station A in Stop
and Wait protocol?
a. only when no error occurs at the transmission level
b. when retransmission of old packet in a novel frame is necessary
c. only when station B receives frame with errors
d. all of the above
Answer Key c

33. Which provision can resolve / overcome the shortcomings associated with duplication
or failure condition of Stop and Wait Automatic Repeat Request protocol especially due
to loss of data frames or non-reception of acknowledgement?
a. Provision of sequence number in the header of message
b. Provision of checksum computation
c. Both a & b
d. None of the above
Answer key a

34. Which consequences are more likely to occur during the frame transmission in Stop-
and-Wait ARQ mechanism?
a. Loss of frame or an acknowledgement
b. Delay in an acknowledgement
c. Normal operation
d. All of the above
Answer Key d
35. Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the
sliding window in the forward diretion?
a. Control Variables
b. Sender Sliding Window
c. Receiver Sliding Window
d. Resending of frames
Answer key b

36. Which ARQ mechanism deals with the transmission of only damaged or lost frames
despite the other multiple frames by increasing the efficiency & its utility in noisy
channels?
a. Go-Back-N ARQ
b. Selective Repeat ARQ
c. Stop-and-Wait ARQ
d. All of the above
Answer Key b

Unit 5

37 DHCP is used for ________


a) IPv6
b) IPv4
c) Both IPv6 and IPv4
d) None of the mentioned
Answer Key c

Which component is included in IP security?


a) Authentication Header (AH)
b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
d) All of the mentioned
Answer Key d
38.The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is
________
a) Stream mode
b) Block mode
c) Compressed mode
d) Message mode
Answer Key A

39.DNS database contains _


a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
Answer Key d
40 A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol
Answer a

41 The domain name system is maintained by


a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
Answer Key a

42. A proxy firewall filters at _


a) Physical layer
b) Data link layer
c) Network layer
d) Application layer
Answer Key D

43The application-level protocol in which a few manager stations control a set of agents
is called _
a) HTML
b) TCP
c) SNMP
d) SNMP/IP
Answer Key C

44.Which field helps to check rearrangement of the fragments?


a) Offset
b) Flag
c) TTL
d) Identifier

45. What are the frames issued by the secondary station of HDLC ,known as?
a. Link
b. Command
c. Response
d. None of the above
Answer c

46. Which operational mode/s of HDLC support/s the balanced configuration by


governing point-to-point link connectivity in addition to the primary as well as secondary
functions performed by the station?
a. NRM
b. ABM
c. Both a & b
d. None of the above
Answer b

47. Which category of HDLC frames undergoes error and flow control mechanisms by
comprising send and receive sequence numbers?
a. U-frames
b. I-frames
c. S-frames
d. All of the above
Answer a

48. Which type of S-frame in HDLC exhibit the correspondence of last three bits [N(R)]
by defining the negative acknowledgement (NAK) number with the code value of '01'?
a. Receive ready
b. Receive not ready
c. Reject
d. Selective Reject
c
49 . What are the functions of the transport layer?
a) Multiplexing/ Demultiplexing
b) Connection less Services
c) Connection oriented service
d) Congestion control
Answer a

50 Security based connection is provided by which layer?


a) Network layer
b) Session layer
c) Application layer
d) Transport layer
Answer d
51]What kind of task does the Token Bucket Algorithm do on the network?
A. Drops data packets.
B. Allows for varying output rates.
C. Give low priority to the data packets.
D. Doesn't manage the queue regulator
E. Ans-B
52] Which of the following is the most commonly used VoIP standard?
a) SDP
b) IMS
c) SIP
d) None of the mentioned
View Answer
Answer: b
53] The service of open loop congestion control technique is .......................
a.
monitor the system to detect when and where congestion occurs
b.
when to accept new traffic
c.
pass the information to places where action can be taken
d.
adjusting the system to correct the problem
Answer: when to accept new traffic
54] The token bucket can easily be implemented with a counter, initialized by
a. 0
b. 1
c. -1
d. -2

ANS 0
55] In Network Management System, maps track each piece of hardware
and its connection to the _________
a) IP Server
b) Domain
c) Network
d) Data
View Answer
Answer: c
56] Find the class of 129.6.8.4 address
57] First find netid and hoste Id of 129.6.8.4 address
58]FIND default mask for the address 98.0.46.201
59] The domain name system is maintained by--------------------

ANS - distributed database system


60] 2]. The technique of temporarily delaying outgoing acknowledgements so that they
can be hooked onto the next outgoing data frame is called ____________

ANS PIGGYBACKING
20]The Routing Information Protocol(RIP) is an intra domain routing based on
……..routing. ANS -Distance vector

You might also like