Ec8551 - Communication Networks MCQ
Ec8551 - Communication Networks MCQ
Ec8551 - Communication Networks MCQ
AND TECHNOLOGY,TIRUPATTUR
1
1. How many digits of the DNIC (Data Network Identification Code)
identify the country?
A. First three
B. First four
C. First five
D. First six
A. 802.2
B. 802.3
C. 802.5
D. 802.6
Ans: C. 802.5
3. The protocol data unit (PDU) for the application layer in the Internet
stack is
A. Segment
B. Datagram
C. Message
D. Frame
Ans: C. Message
A. Association
B. Disassociation
C. Error correction
D. Integration
A. Application layer
B. Transport layer
C. Network layer
D. None of above
3
CS8591 COMPUTER NETWORKS
D. All of above
D. All of above
4
CS8591 COMPUTER NETWORKS
A. network number
B. socket address
D. MAC address
A. TCP
B. IP
C. UPD
D. All of them
Ans: A. TCP
A. 04
B. 08
C. 16
D. 32
Ans: C. 16
16. Which of the following is not associated with the session layer?
A. Dialog control
B. Token management
D. Synchronization
5
CS8591 COMPUTER NETWORKS
C. reports error conditions to the original source, the source must relate errors to
individual application programs and take action to correct the problem
18. Your company has a LAN in its downtown office and has now set up a
LAN in the manufacturing plant in the suburbs. To enable everyone to
share data and resources between the two LANs, what type of device(s) are
needed to connect them? Choose the most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
Ans: D. Router
A. FTP
B. SNMP
C. SMTP
D. RPC
Ans: C. SMTP
6
CS8591 COMPUTER NETWORKS
A. hub
B. bridge
C. gateway
D. repeater
Ans: C. gateway
21. can detect burst error of length less than or equal to degree
of the polynomial and detects burst errors that affect odd number of bits.
A. Hamming Code
B. CRC
C. VRC
Ans: B. CRC
A. packet switched
B. circuit switched
C. message switched
D. None of these
7
CS8591 COMPUTER NETWORKS
24. Which one of the following routing algorithm can be used for network
layer design?
25. A subset of a network that includes all the routers but contains no
loops is called:
A. spanning tree
B. spider structure
C. spider tree
B. addressing
C. forwarding
8
CS8591 COMPUTER NETWORKS
A. socket
B. pipe
C. port
Ans: A. socket
A. port
B. pipe
C. node
Ans: A. port
9
CS8591 COMPUTER NETWORKS
33. When displaying a web page, the application layer uses the:
A. HTTP protocol
B. FTP protocol
C. SMTP protocol
A. File transfer
B. File download
C. E-mail
D. Internet telephony
10
CS8591 COMPUTER NETWORKS
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
A. Active receiver
B. Passive receiver
38. If 5 files are transferred from server A to client B in the same session.
The number of TCP connection between A and B is:
A. 5
B. 10
C. 2
D. 6
Ans: D. 6
11
CS8591 COMPUTER NETWORKS
B. The purpose of the jamming signal is to pad the frames that are smaller than
the minimum frame size.
C. A station continues to transmit the packet even after the collision is detected.
A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Ans: D. ARPANET
A. ITU-T
B. IEEE
C. FCC
12
CS8591 COMPUTER NETWORKS
D. ISOC
Ans: C. FCC
A. coaxial cable
C. optical fiber
D. electrical cable
A. Coaxial cable
C. Fiber-optic cable
D. Microwave
13
CS8591 COMPUTER NETWORKS
47. Which of the following to keep track of the individual units of data
(called packets) that a message is divided into for efficient routing through
the Internet.
48. The process of keeping addresses in memory for future use is called
A. Routing
B. Resolving
C. Caching
Ans: C. Caching
49. A small network making up the Internet and also having a small
numbers of computers within it is called
A. Host
B. Address
C. Subdomain
Ans: C. Subdomain
A. 1 kbps
14
CS8591 COMPUTER NETWORKS
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Ans: D. 10 kbps
Explanation:
B. zero
C. nonzero
Ans: B. zero
A. Intranets
B. Switching alternating
D. Extranets
Ans: A. Intranets
A. uploading
B. downloading
15
CS8591 COMPUTER NETWORKS
C. logging on
D. hangs on
Ans: A. uploading
54. FDDI is a
A. ring network
B. star network
C. mesh network
A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
Ans: C. 127.0.0.1
A. FSK; PSK
B. PSK; FSK
C. analog; digital
D. digital; analog
16
CS8591 COMPUTER NETWORKS
B. CERN
C. ARPA
D. Netscape
Ans: B. CERN
A. 99
B. 86
C. 80
D. 23
Ans: C. 80
59. The communication mode that supports data in both directions at the
same time is
A. simplex
B. half-duplex
C. full-duplex
D. multiplex
Ans: C. full-duplex
A. access control
B. addressing
17
CS8591 COMPUTER NETWORKS
A. digital-to-digital
B. digital-to-analog
C. analog-to-analog
D. analog-to-digital
Ans: B. digital-to-analog
A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Ans: D. 255.255.255.0
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
Ans: C. PING
A. Network Layer
C. Transport Layer
D. Application layer
A.16.4 %
B. 18.4 %
C. 7.4 %
D. 1 %
Ans: B. 18.4 %
D. all of these
Ans: C. All lines coming into a Hub must operate at a same speed.
19
CS8591 COMPUTER NETWORKS
A. 192.166.200.50
B. 00056A:01A01A5CCA7FF60
72. What operates in the Data Link and the Network layer?
A. NIC
B. Bridge
C. Brouter
D. Router
Ans: C. Brouter
20
CS8591 COMPUTER NETWORKS
A. NFS
B. TELNET
C. TFTP
D. FTP
Ans: C. TFTP
A. X.3
B. X.21
C. X.25
D. X.75
Ans: B. X.21
A. Data link
B. Network
C. transport
D. Session
Ans: C. transport
A. transmitting computer
B. receiving computer
21
CS8591 COMPUTER NETWORKS
A. 1 - 126
B. 192 - 255
C. 192 - 223
D. 1 - 127
E. 128 – 191
Ans: A. 1 - 126
A. 128 - 255
B. 1 - 127
C. 192 - 223
D. 128 - 191
E. 127 – 191
22
CS8591 COMPUTER NETWORKS
B. a TCP/IP high level protocol for transferring files from one machine to
another
81. The 802.5 standard implements a way for preventing collisions on the
network. How are collisions prevented when using this standard?
A. CSMA/CD
B. Token passing
C. Collision detection
D. Time sharing
E. Switched repeaters
83. What OSI layer handles logical address to logical name resolution?
A. Transport
B. Physical
23
CS8591 COMPUTER NETWORKS
C. Presentation
D. Data Link
Ans: A. Transport
85. One of the header fields in an IP datagram is the Time to Live (TTL)
field. Which of the following statements best explains the need for this field?
86. Which of the following system calls results in the sending of SYN packets?
A. socket
B. bind
C. listen
D. connect
24
CS8591 COMPUTER NETWORKS
Ans: D. connect
87. In the slow start phase of the TCP congestion control algorithm, the size
of the congestion window
B. increases linearly
C. increases quadratically
D. increases exponentially
A. P – 2 Q – 1 R – 3 S – 5
B. P – 1 Q – 4 R – 2 S – 3
C. P – 1 Q – 4 R – 2 S – 5
D. P – 2 Q – 4 R – 1 S – 3
Ans: B. P – 1 Q – 4 R – 2 S – 3
89. What is the maximum size of data that the application layer can pass
on to the TCP layer below?
A. Any size
C. 2^16 bytes
D. 1500 bytes
25
CS8591 COMPUTER NETWORKS
A. 1.6 seconds
B. 2 seconds
C. 5 seconds
D. 8 seconds
Ans: B. 2 seconds
Explanation:
Tokens are added at the rate of r bytes/sec which is 2Mbps in the given
question.
91. In Ethernet when Manchester encoding is used, the bit rate is:
26
CS8591 COMPUTER NETWORKS
A. 12
B. 14
C. 16
D. 18
Ans: C. 16
Explanation:
Total 16 packets are sent. See following table for sequence of events. Since
go-back-n error control strategy is used, all packets after a lost packet are
sent again.
Sender Receiver
2 1
3 2
4 3
5 4
7 6
[Timeout for 5]
6 5
7 6
8
27
CS8591 COMPUTER NETWORKS
[Timeout for 7]
8 7
9 8
[Timeout for 9]
93. Determine the maximum length of the cable (in km) for transmitting
data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000
bits. Assume the signal speed in the cable to be 2,00,000 km/s.
A.1
B.2
C.2.5
D.5
Ans: B.2
Explanation:
94. Let G(x) be the generator polynomial used for CRC checking. What is
the condition that should be satisfied by G(x) to detect odd number of bits
in error?
28
B.G(x) does not divide 1+x^k, for any k not exceeding the frame length
C.1+x is a factor of G(x)
95. In serial data transmission, every byte of data is padded with a ‘0’
in the beginning and one or two ‘1’ s at the end of byte because
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
D. None of these
C. Packet switching requires more per packet processing than circuit switching
29
CS8591 COMPUTER NETWORKS
A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Ans: D. 5 bytes
Explanation:
A. Preamble
B. Post amble
C. Jam
Ans: C. Jam
100. What will be the efficiency of a Stop and Wait protocol, if the
transmission time for a frame is 20ns and the propagation time is 30ns?
A. 20%
B. 25%
C. 40%
D. 66%
Ans: B. 25%
30
CS8591 COMPUTER NETWORKS
101. What is the port number for (File Transfer Protocol - Control) FTP?
(A) 20
(B) 21
(C) 22
(D) 35
Ans : (B) 21
102. Port number for (Secure Shell) SSH?
(A) 20
(B) 21
(C) 25
(D) 22
Ans : (D) 22
103. In adaptive tree walk protocol we use ...................... and searching.
(A) Graph and Breadth First (B) Tree and Breadth First
(C) Graph and Depth First (D) Tree and Depth First
Ans : (D) Tree and Depth First
104 . A hub is used in ...... Ethernet.
(A) 10Base 5 (B) 10Base 2
(C) 10Base – T (D) 10Base – F
Ans : (C) 10Base – T
105. HTTP is the acronym of ...............
(A) Hyper Text Transfer Protocol
(B) Hyper Test Transfer Protocol
(C) Hyper Text Transport Protocol
(D) Hyper Text Transport Program
Ans : (A) Hyper Text Transfer Protocol
106. Protocol used for electronic mail?
(A) TELNET (B) NNTP
(C) HTTP (D) SMTP
Ans : (D) SMTP
31
107. Minimum number of DNS name servers, each domain should posses?
(A) 1 (B) 2
(C) 3 (D) 4
Ans : (C) 3
108. To map a name onto an IP address, an application program calls a
library procedure called the ......................
(A) Scheduler (B) Resolver
(C) Mapper (D) Encoder
Ans : (B) Resolver
109. DNS represents . structure.
(A) bus (B) loop
(C) tree (D) ring
Ans: (C) tree
110. The generic domain for non profit organizations?
(A) com (B) edu
(C) org (D) net
Ans: (C) org
111. When the resolver gives a domain name to DNS, what it gets back are
the .....................
associated with that name.
(A) Resource records (B) IP records
(C) Ethernet address (D) Port number
Ans: (A) Resource records
112. In e-mail system, .....allow people to read and send e-mails.
(A) message transfer agent (B) user agent
(C) browser agent (D) server agent
Ans : (B) user agent
113. In e-mail system,...... move the message from the source to the
destination.
(A) user agent (B) browser agent
32
(C) Message transfer agent (D) server agent
Ans : (C) Message transfer agent
114. In cryptography the following uses transposition ciphers and the keyword
is LAYER. Encrypt the following message (spaces are omitted during
encryption) WELCOME TO NETWORK SECURITY!
(A) WMEKREETSILTWETCOOCYONRU!
(B) EETSICOOCYWMEKRONRU!LTWET
(C) LTWETONRU!WMEKRCOOCYEETSI
(D) ONRU!COOCYLTWETEETSIWMEKR
Ans : (B) EETSICOOCYWMEKRONRU!LTWET
115. The FIN bit in the TCP header represents .................
(A) establish connection (B) release a connection
(C) data transfer (D) None of these
Ans : (B) release a connection
116. Connections are established in TCP by means of ..............
(A) Three way handshake (B) Two way handshake
(C) One way handshake (D) Full duplex
Ans : (A) Three way handshake
117. The TCP exchange data in the form of ................
(A) Fragments (B) Segments
(C) Codes (D) Blocks
Ans : (B) Segments
118. TCP connection is .... stream.
(A) Byte (B) Bit
(C) Message (D) packet
Ans : (A) Byte
119. Port numbers below 1024 are called .................
(A) special ports (B) original ports
(C) used ports (D) well known ports
Ans : (B) original ports
33
120. The protocol that runs on the port number 25 is .................
(A) TFTP (B) FTP
(C) SMTP (D) NNTP
Ans : (C) SMTP
121. The length of the TCP segment header is .................
(A) 10 byte (B) 20 byte
(C) 30 byte (D) 40 byte
Ans : (B) 20 byte
122. The DNS name space is divided into non overlapping ......................
(A) regions (B) blocks
(C) divisions (D) zones
Ans : (D) zones
123. What is the port number for (Trivial File Transfer Protocol) TFTP?
(A) 65 (B) 67
(C) 63 (D) 69
Ans : (D) 69
124. HDLC is an acronym for ....................
(A) high - duplex line communication
(B) high -level data link control
(C) half - duplex digital link combination
(D) Host double level circuit
Ans : (B) high -level data link control
125. To translate the message semantics from one format to other,is used.
(A) application gateway (B) transport gateway
(C) session gateway (D) network gateway
Ans : (A) application gateway
126. The routing algorithm within each network is ..................
(A) Routing information protocol (B) Exterior gateway protocol
(C) Interior gateway protocol (D) Middle gateway protocol
Ans : (C) Interior gateway protocol
34
127. Decryption and Encryption of data are the responsibility of which of the
following layer?
(A) Session layer (B) Network layer
(C) Transport layer (D) Presentation layer
Ans : (D) Presentation layer
128. The components in the domain name space are separated by ....................
(A) Comma (B) Dot
(C) Colon (D) Semi colon
Ans : (B) Dot
129. What type of addressing is specifically used by the transport layer?
(A) station address (B) application program port address
(C) dialog address (D) network address
Ans : (B) application program port address
130. In ATM network . message is used by a source host to set up a connection.
(A) SET UP (B) Call PROCEEDING
(C) CONNECT (D) RELEASE
Ans : (A) SET UP
35