0% found this document useful (0 votes)
41 views

Computer Networks MCQ

Uploaded by

Ashish Sachan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Computer Networks MCQ

Uploaded by

Ashish Sachan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Computer Networks (MCQs) focuses on Exam.

1. The IETF standards documents are called ________


a) RFC
b) RCF
c) ID
d) DFC

Answer: a
Explanation: RFC stands for Request For Comments and they are documents that describe
methods, behaviors, research, or innovations applicable to the working of the Internet.

2. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers
are ___________
a) Added
b) Removed
c) Rearranged
d) Modified

3. The structure or format of data is called ___________


a) Syntax
b) Semantics
c) Struct
d) Formatting

Answer: a
Explanation: The structure and format of data are defined using syntax. Semantics defines how
a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
In programming languages, syntax of the instructions plays a vital role in designing of the
program.

4. Communication between a computer and a keyboard involves ______________


transmission.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex

Answer: d
Explanation: In simplex transmission, data flows in single direction which in this case refers to
the data flowing from the keyboard to the computer. Another example would be of the mouse
where the data flows from the mouse to the computer only.

5. The first Network was called ________


a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
Answer: d
Explanation: ARPANET stands for Advanced Research Projects Agency Networks. It was the
first network to be implemented which used the TCP/IP protocol in the year 1969.

6. A _______ is the physical path over which a message travels.


a) Path
b) Medium
c) Protocol
d) Route

Answer: b
Explanation: Messages travel from sender to receiver via a physical path called the medium
using a set of methods/rules called protocol. Mediums can be guided (wired) or unguided
(wireless).

7. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC

Answer: c
Explanation: FCC is the abbreviation for Federal Communications Commission. FCC is
responsible for regulating all interstate communications originating or terminating in USA. It was
founded in the year 1934.

8. Which of this is not a network edge device?


a) PC
b) Smartphones
c) Servers
d) Switch

Answer: d
Explanation: Network edge devices refer to host systems, which can host applications like web
browser. A switch can’t operate as a host, but as a central device which can be used to manage
network communication.

9. A _________ set of rules that governs data communication.


a) Protocols
b) Standards
c) RFCs
d) Servers

Answer: a
Explanation: In communications, a protocol refers to a set of rules and regulations that allow a
network of nodes to transmit and receive information. Each layer in the network model has a
protocol set, for example, the transport layer has TCP and UDP protocols.
10. Three or more devices share a link in ________ connection.
a) Unipoint
b) Multipoint
c) Point to point
d) Simplex

Answer: b
Explanation: A multipoint communication is established when three or many network nodes are
connected to each other. Frame relay, Ethernet and ATM are some examples of multipoint
connections.

11. When collection of various computers seems a single coherent system to its client, then it is
called _________
a) computer network
b) distributed system
c) networking system
d) mail system

Answer: b
Explanation: A Computer network is defined as a collection of interconnected computers which
uses a single technology for connection.
A distributed system is also the same as computer network but the main difference is that the
whole collection of computers appears to its users as a single coherent system.
Example:- World wide web

12. Two devices are in network if __________


a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive

Answer: a
Explanation: A computer network, or data network, is a digital telecommunications network
which allows nodes to share resources. In computer networks, computing devices exchange
data with each other using connections between nodes. The nodes have certain processes
which enable them to share a specific type of data using a distinct protocol.

13. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network

Answer: d
Explanation: An overlay network is a computer network that is built on top of another network.
Some examples of an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer
Networks (P2P).
14. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or
receiving data or even routing the data to its destination. Routers, Computers and Smartphones
are some examples of network nodes.

15. Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network

Answer: a
Explanation: In a broadcast network, information is sent to all stations in a network whereas in a
multicast network the data or information is sent to a group of stations in the network. In unicast
network, information is sent to only one specific station. The broadcast address of the network is
the last assigned address of the network.

16. Bluetooth is an example of __________


a) personal area network
b) local area network
c) virtual private network
d) wide area network

Answer: a
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network
for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for
transmission.

17. A __________ is a device that forwards packets between networks by processing the
routing information included in the packet.
a) bridge
b) firewall
c) router
d) hub

Answer: c
Explanation: A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. They make use of
routing protocols like RIP to find the cheapest path to the destination.

18. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
Answer: b
Explanation: A protocol stack refers to a group of protocols that are running concurrently that
are employed for the implementation of network protocol suite. Each layer in the network model
has to use one specific protocol from the protocol stack.

19. Network congestion occurs _________


a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure

Answer: a
Explanation: Network congestion occurs when traffic in the network is more than the network
could handle. To avoid network congestion, the network management uses various open-loop
and closed-loop congestion control techniques.

20. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network

Answer: b
Explanation: A virtual private network extends a private network across a public network, and
enables users to send and receive data across shared or public networks as if their computing
devices were directly connected to the private network.VPN provides enhanced security and
online anonymity to users on the internet. It is also used to unblock websites which are
unavailable in certain regions.

Physical layer
1. The physical layer is concerned with ___________
a) bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) port to port delivery

Answer: a
Explanation: Physical layer deals with bit to bit delivery in networking. The data unit in the
physical layer is bits. Process to process delivery or the port to port delivery is dealt in the
transport layer. The various transmission mediums aid the physical layer in performing its
functions.

2. Which transmission media provides the highest transmission speed in a network?


a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable

Answer: c
Explanation: Fiber optics is considered to have the highest transmission speed among the all
mentioned above. The fiber optics transmission runs at 1000Mb/s. It is called as 1000Base-Lx
whereas IEEE standard for it is 802.3z. It is popularly used for modern day network connections
due to its high transmission rate.

3. Bits can be sent over guided and unguided media as analog signal by ___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation

Answer: a
Explanation: In analog modulation, digital low frequency baseband signal (digital bit stream) is
transmitted over a higher frequency. Whereas in digital modulation the only difference is that the
base band signal is of discrete amplitude level. The bits are represented by only two frequency
levels, one for high and one for low.

4. The portion of physical layer that interfaces with the media access control sublayer is called
___________
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) physical transport sublayer

Answer: a
Explanation: The portion of physical layer that interfaces with the medium access control
sublayer is Physical Signaling Sublayer. The main function of this layer is character encoding,
reception, decoding and performs optional isolation functions. It handles which media
connection the signal should be forwarded to physically.

5. The physical layer provides __________


a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned

Answer: d
Explanation: Anything dealing with a network cable or the standards in use – including pins,
connectors and the electric current used is dealt in the physical layer (Layer 1). Physical layer
deals with bit to bit delivery of the data aided by the various transmission mediums.

6. In asynchronous serial communication the physical layer provides ___________


a) start and stop signalling
b) flow control
c) both start & stop signalling and flow control
d) only start signalling

Answer: c
Explanation: In asynchronous serial communication, the communication is not synchronized by
clock signal. Instead of a start and stop signaling and flow control method is followed. Unlike
asynchronous serial communication, in synchronous serial communication a clock signal is
used for communication, so the start and stop method is not really required.
7. The physical layer is responsible for __________
a) line coding
b) channel coding
c) modulation
d) all of the mentioned

Answer: d
Explanation: The physical layer is responsible for line coding, channel coding and modulation
that is needed for the transmission of the information. The physical configuration including pins,
connectors and the electric current used is dealt in the physical layer based on the requirement
of the network application.

8. The physical layer translates logical communication requests from the ______ into hardware
specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer

Answer: a
Explanation: Physical layer accepts data or information from the data link layer and converts it
into hardware specific operations so as to transfer the message through physical cables. Some
examples of the cables used are optical fiber cables, twisted pair cables and co-axial cables.

9. A single channel is shared by multiple signals by ____________


a) analog modulation
b) digital modulation
c) multiplexing
d) phase modulation

Answer: c
Explanation: In communication and computer networks, the main goal is to share a scarce
resource. This is done by multiplexing, where multiple analog or digital signals are combined
into one signal over a shared medium. The multiple kinds of signals are designated by the
transport layer which is the layer present on a higher level than the physical layer.

10. Wireless transmission of signals can be done via ___________


a) radio waves
b) microwaves
c) infrared
d) all of the mentioned

Answer: d
Explanation: Wireless transmission is carried out by radio waves, microwaves and IR waves.
These waves range from 3 Khz to above 300 Ghz and are more suitable for wireless
transmission. Radio waves can penetrate through walls and are used in radio communications,
microwaves and infrared (IR) waves cannot penetrate through walls and are used for satellite
communications and device communications respectively.
Network Layer

1. The network layer is concerned with __________ of data.


a) bits
b) frames
c) packets
d) bytes

Answer: c
Explanation: In computer networks, the data from the application layer is sent to the transport
layer and is converted to segments. These segments are then transferred to the network layer
and these are called packets. These packets are then sent to data link layer where they are
encapsulated into frames. These frames are then transferred to physical layer where the frames
are converted to bits.

2. Which one of the following is not a function of network layer?


a) routing
b) inter-networking
c) congestion control
d) error control

Answer: d
Explanation: In the OSI model, network layer is the third layer and it provides data routing paths
for network communications. Error control is a function of the data link layer and the transport
layer.

3. A 4 byte IP address consists of __________


a) only network address
b) only host address
c) network address & host address
d) network address & MAC address

Answer: c
Explanation: An ip address which is 32 bits long, that means it is of 4 bytes and is composed of
a network and host portion and it depends on address class. The size of the host address and
network address depends upon the class of the address in classful IP addressing.

4. In virtual circuit network each packet contains ___________


a) full source and destination address
b) a short VC number
c) only source address
d) only destination address

Answer: b
Explanation: A short VC number also called as VCID (virtual circuit identifier) is a type of
identifier which is used to distinguish between several virtual circuits in a connection oriented
circuit switched network. Each virtual circuit is used to transfer data over a larger packet
switched network.
5. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned

Answer: d
Explanation: The routing algorithm is what decides where a packet should go next. There are
several routing techniques like shortest path algorithm, static and dynamic routing,
decentralized routing, distance vector routing, link state routing, Hierarchical routing etc. The
routing algorithms go hand in hand with the operations of all the routers in the networks. The
routers are the main participants in these algorithms.

6. Which of the following is not correct in relation to multi-destination routing?


a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers

Answer: c
Explanation: In multi-destination routing, there is more than one receiver and the route for each
destination which is contained in a list of destinations is to be found by the routing algorithm.
Multi-destination routing is also used in broadcasting.

7. A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree
b) spider structure
c) spider tree
d) special tree

Answer: a
Explanation: Spanning tree protocol (STP) is a network protocol that creates a loop free logical
topology for ethernet networks. It is a layer 2 protocol that runs on bridges and switches. The
main purpose of STP is to ensure that you do not create loops when you have redundant paths
in your network.

8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol

Answer: d
Explanation: The Routing Information Protocol (RIP) is used by the network layer for the
function of dynamic routing. Congestion control focuses on the flow of the traffic in the network
and uses algorithms like traffic aware routing, admission control and load shedding to deal with
congestion.

9. The network layer protocol for internet is __________


a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol

Answer: b
Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP,
CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet
protocol is for data link layer.

10. ICMP is primarily used for __________


a) error and diagnostic functions
b) addressing
c) forwarding
d) routing

Answer: a
Explanation: ICMP abbreviation for Internet Control Message Protocol is used by networking
devices to send error messages and operational information indicating a host or router cannot
be reached. ICMP operates over the IP packet to provide error reporting functionality as IP by
itself cannot report errors.

Data link layer

1. The data link layer takes the packets from _________ and encapsulates them into frames for
transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer

Answer: a
Explanation: In computer networks, the data from application layer is sent to transport layer and
is converted to segments. These segments are then transferred to the network layer and these
are called packets. These packets are then sent to data link layer where they are encapsulated
into frames. These frames are then transferred to physical layer where the frames are converted
to bits. Error control and flow control data is inserted in the frames at the data link layer.

2. Which of the following tasks is not done by data link layer?


a) framing
b) error control
c) flow control
d) channel coding

Answer: d
Explanation: Channel coding is the function of physical layer. Data link layer mainly deals with
framing, error control and flow control. Data link layer is the layer where the packets are
encapsulated into frames.

3. Which sublayer of the data link layer performs data link functions that depend upon the type
of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer

Answer: b
Explanation: Media access control (MAC) deals with transmission of data packets to and from
the network-interface card, and also to and from another remotely shared channel. The MAC
sublayer also prevents collision using protocols like CSMA/CD.

4. Header of a frame generally contains ______________


a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned

Answer: d
Explanation: In a frame, the header is a part of the data that contains all the required information
about the transmission of the file. It contains information like synchronization bytes, addresses,
frame identifier etc. It also contains error control information for reducing the errors in the
transmitted frames.

5. Automatic repeat request error management mechanism is provided by ________


a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer

Answer: a
Explanation: The logical link control is a sublayer of data link layer whose main function is to
manage traffic, flow and error control. The automatic repeat request error management
mechanism is provided by the LLC when an error is found in the received frame at the receiver’s
end to inform the sender to re-send the frame.

6. When 2 or more bits in a data unit has been changed during the transmission, the error is
called ____________
a) random error
b) burst error
c) inverted error
d) double error

Answer: b
Explanation: When a single bit error occurs in a data, it is called single bit error. When more
than a single bit of data is corrupted or has error, it is called burst error. If a single bit error
occurs, the bit can be simply repaired by inverting it, but in case of a burst error, the sender has
to send the frame again.

7. CRC stands for __________


a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check

Answer: a
Explanation: Cyclic redundancy check is a code that is added to a data which helps us to
identify any error that occurred during the transmission of the data. CRC is only able to detect
errors, not correct them. CRC is inserted in the frame trailer.

8. Which of the following is a data link protocol?


a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned

Answer: d
Explanation: There are many data link layer protocols. Some of them are SDLC (synchronous
data link protocol), HDLC (High level data link control), SLIP (serial line interface protocol), PPP
(Point to point protocol) etc. These protocols are used to provide the logical link control function
of the Data Link Layer.

9. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC

Answer: c
Explanation: In CSMA/CD, it deals with detection of collision after collision has occurred,
whereas CSMA/CA deals with preventing collision. CSMA/CD is abbreviation for Carrier
Sensing Multiple Access/Collision detection. CSMA/CA is abbreviation for Carrier Sensing
Multiple Access/Collision Avoidance. These protocols are used for efficient multiple channel
access.

10. The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check

Answer: a
Explanation: Piggybacking is a technique in which the acknowledgment is temporarily delayed
so as to be hooked with the next outgoing data frame. It saves a lot of channel bandwidth as in
non-piggybacking system, some bandwidth is reserved for acknowledgement.
Transport layer
1. Transport layer aggregates data from different applications into a single stream before
passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer

Answer: a
Explanation: The flow of data in the OSI model flows in following manner Application ->
Presentation -> Session -> Transport -> Network -> Data Link -> Physical. Each and every layer
has its own set of functions and protocols to ensure efficient network performance.

2. Which of the following are transport layer protocols used in networking?


a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP

Answer: c
Explanation: Both TCP and UDP are transport layer protocol in networking. TCP is an
abbreviation for Transmission Control Protocol and UDP is an abbreviation for User Datagram
Protocol. TCP is connection oriented whereas UDP is connectionless.

3. User datagram protocol is called connectionless because _____________


a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly

Answer: a
Explanation: UDP is an alternative for TCP and it is used for those purposes where speed
matters most whereas loss of data is not a problem. UDP is connectionless whereas TCP is
connection oriented.

4. Transmission control protocol ___________


a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned

Answer: d
Explanation: TCP provides reliable and ordered delivery of a stream of bytes between hosts
communicating via an IP network. Major internet applications like www, email, file transfer etc
rely on TCP. TCP is connection oriented and it is optimized for accurate delivery rather than
timely delivery.
5. An endpoint of an inter-process communication flow across a computer network is called
__________
a) socket
b) pipe
c) port
d) machine

Answer: a
Explanation: Socket is one end point in a two way communication link in the network. TCP layer
can identify the application that data is destined to be sent by using the port number that is
bound to socket.

6. Socket-style API for windows is called ____________


a) wsock
b) winsock
c) wins
d) sockwi

Answer: b
Explanation: Winsock is a programming interface which deals with input output requests for
internet applications in windows OS. It defines how windows network software should access
network services.

7. Which one of the following is a version of UDP with congestion control?


a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol

Answer: a
Explanation: The datagram congestion control is a transport layer protocol which deals with
reliable connection setup, teardown, congestion control, explicit congestion notification, and
feature negotiation. It is used in modern day systems where there are really high chances of
congestion. The protocol was last updated in the year 2008.

8. A _____ is a TCP name for a transport service access point.


a) port
b) pipe
c) node
d) protocol

Answer: a
Explanation: Just as the IP address identifies the computer, the network port identifies the
application or service running on the computer. A port number is 16 bits. The combination of IP
address preceded with the port number is called the socket address.

9. Transport layer protocols deals with ____________


a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication
Answer: b
Explanation: Transport layer is 4th layer in TCP/IP model and OSI reference model. It deals with
logical communication between process. It is responsible for delivering a message between
network host.

10. Which of the following is a transport layer protocol?


a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol

Answer: a
Explanation: The Stream Control Transmission Protocol (SCTP) is a transport layer protocol
used in networking system where streams of data are to be continuously transmitted between
two connected network nodes. Some of the other transport layer protocols are RDP, RUDP,
TCP, DCCP, UDP etc.

Transfer Layer TCP – 1

1 . Which of the following is false with respect to TCP?


a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) Unreliable

Answer: d
Explanation: TCP is a transport layer protocol that provides reliable and ordered delivery of a
stream of bytes between hosts communicating via an IP network.

2. In TCP, sending and receiving data is done as _______


a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets

Answer: a
Explanation: TCP provides stream oriented delivery between hosts communicating via an IP
network and there are no message boundaries. TCP can concatenate data from a number of
send () commands into one stream of data and still transmit it reliably.

3. TCP process may not write and read data at the same speed. So we need __________ for
storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
Answer: b
Explanation: A TCP receiver has a receive buffer that is used to store the unprocessed
incoming packets in case the sender is sending packets faster than the processing rate of the
received packets.

4. TCP groups a number of bytes together into a packet called _______


a) Packet
b) Buffer
c) Segment
d) Stack

Answer: c
Explanation: A segment may be collection of data from many send () statements. TCP transmits
each segment as a stream of bytes.

5. Communication offered by TCP is ________


a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte

Answer: a
Explanation: Data can flow both the directions at the same time during a TCP communication
hence, it is full-duplex. This is the reason why TCP is used in systems that require full-duplex
operation such as e-mail systems.

6. To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment

Answer: d
Explanation: Acknowledgment mechanism is used to check the safe and sound arrival of data.
The sender actively checks for acknowledgement from the receiver and once a specific time
period has passed, it retransmits the data.

7. In segment header, sequence number and acknowledgement number fields refer to _______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment

Answer: a
Explanation: As TCP has to ensure ordered delivery of packets, sequence number and
acknowledgement number are used to identify the byte number of the packet in the stream of
bytes being transmitted.
8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered
10001. What is the sequence number of the segment if all data is sent in only one segment?
a) 10000
b) 10001
c) 12001
d) 11001

Answer: b
Explanation: The sequence number given to first byte of a segment, with respect to its order
among the previous segments, is the sequence number of that segment.

9. Bytes of data being transferred in each connection are numbered by TCP. These numbers
start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s

Answer: d
Explanation: One might expect the sequence number of the first byte in the stream to be 0, or 1.
But that does not happen in TCP, Instead, the sender has to choose an Initial Sequence
Number (ISN), which is basically a random 32 bit sequence of 0’s and 1’s, during the connection
handshake.

10. The value of acknowledgement field in a segment defines _______


a) sequence number of the byte received previously
b) total number of bytes to receive
c) sequence number of the next byte to be received
d) sequence of zeros and ones

Answer: c
Explanation: The acknowledgement field in a segment defines the sequence number of the byte
which is to be received next i.e. sequence number of byte that the sender should transmit next.

Transfer Layer TCP – 2

1. The receiver of the data controls the amount of data that are to be sent by the sender is
referred to as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection

Answer: a
Explanation: Flow control is done to prevent the receiver from being overflowed with data. It is
done using various open-loop (prevention) methods and closed-loop (recovery) methods.

2. Size of TCP segment header ranges between ___________


a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits

Answer: c
Explanation: The size of the header can be 20 bytes at a minimum if there are no options and
can go up to 60 bytes at maximum with 40 bytes in the options field. The header contains all the
control information required to ensure ordered, error-free and reliable delivery of the segment.

3. Connection establishment in TCP is done by which mechanism?


a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronization

Answer: b
Explanation: A three-way handshake allows both, the server and the client to choose their Initial
Sequence Number and inform about it to the other party. This won’t be possible using the two-
way handshake mechanism.

4. The server program tells its TCP that it is ready to accept a connection. This process is called
___________
a) Active open
b) Active close
c) Passive close
d) Passive open

Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is started by the
server. Then the Client picks an ISN (Initial Sequence Number) and synchronizes (shares) it
with the Server requesting a connection. The Server acknowledges the clients ISN, and then
picks an ISN and synchronizes it with the Client. At last, the Client acknowledges the servers
ISN.

5. A client that wishes to connect to an open server tells its TCP that it needs to be connected to
that particular server. The process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open

Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and is done by the
client once it finds the open server and picks an ISN. The Server acknowledges the clients
request, and then picks an ISN and synchronizes it with the Client. At last, the Client
acknowledges the servers ISN.

6. In Three-Way Handshaking process, the situation where both the TCP’s issue an active open
is ___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close

Answer: c
Explanation: In simultaneous open situation, two nodes send an SYN signal to each other and
start a TCP connection. Here, both TCP nodes transmit a SYNC+ACK segment to each other
and a connection is established between them. This doesn’t happen usually, because both
sides have to know which port on the other side to send to.

7. A malicious attacker sends a large number of SYNC segments to a server, pretending that
each of them is coming from a different client by faking the source IP address in the datagram.
Which type of attack is being performed in this situation?
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack

Answer: a
Explanation: SYNC flooding attack is a form of Denial of Service attack. Due to the overflow of
SYNC segments sent to the server, the victims are not able to request for a connection to the
server, thus resulting in Denial of Service.

8. SYNC flooding attack belongs to a type of security attack known as ___________


a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack

Answer: d
Explanation: During SYNC flooding the system collapses and denies service to every request,
making it a DoS attack. Some other DoS attacks are bandwidth flooding, connection flooding
and UDP flooding.

9. The sizes of source and destination port address in TCP header are ___________
respectively.
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits

Answer: b
Explanation: All port addresses are of 16 bits and they specify the type of service being used by
the network entity. For example, port 21 is used for FTP connections and port 25 is used for
ICMP connections.

10. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number

Answer: b
Explanation: TCP header contains separate fields for sequence number and acknowledgment
number. Comparing these values is what allows TCP to detect lost segments and in turn
recover from that loss. After detecting the lost segments, the recovery may require
retransmission of the lost segments of data

UDP

1. Which of the following is false with respect to UDP?


a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead

Answer: a
Explanation: UDP is an unreliable, connectionless transport layer protocol that provides
message-based data transmission. TCP is an example of connection-oriented protocols.

2. Return value of the UDP port “Chargen” is _______


a) String of characters
b) String of integers
c) Array of characters with integers
d) Array of zero’s and one’s

Answer: a
Explanation: Using Chargen with UDP on port 19, the server sends a UDP datagram containing
a random number of characters every time it receives a datagram from the connecting host. The
number of characters is between 0 and 512.

3. Beyond IP, UDP provides additional services such as _______


a) Routing and switching
b) Sending and receiving of packets
c) Multiplexing and demultiplexing
d) Demultiplexing and error checking

Answer: d
Explanation: De-multiplexing is the delivering of received segments to the correct application
layer processes at the recipients end using UDP. Error checking is done through checksum in
UDP.

4. What is the main advantage of UDP?


a) More overload
b) Reliable
c) Low overhead
d) Fast

Answer: c
Explanation: As UDP does not provide assurance of delivery of packet, reliability and other
services, the overhead taken to provide these services is reduced in UDP’s operation. Thus,
UDP provides low overhead, and higher speed.

5. Port number used by Network Time Protocol (NTP) with UDP is ________
a) 161
b) 123
c) 162
d) 124

Answer: b
Explanation: The Network Time Protocol is a clock synchronization network protocol
implemented by using UDP port number 123 to send and receive time stamps.

6. What is the header size of a UDP packet?


a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes

Answer: a
Explanation: The fixed size of the UDP packet header is 8 bytes. It contains four two-byte fields:
Source port address, Destination port address, Length of packet, and checksum.

7. The port number is “ephemeral port number”, if the source host is _______
a) NTP
b) Echo
c) Server
d) Client

Answer: d
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in Windows
Operating System. Ephemeral port numbers are short-lived port numbers which can be used for
clients in a UDP system where there are temporary clients all the time.

8. “Total length” field in UDP packet header is the length of _________


a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data

Answer: d
Explanation: Total length is the 16 bit field which contains the length of UDP header and the
data. The maximum value of the Total length field and the maximum size of a UDP datagram is
65,535 bytes (8 byte header + 65,527 bytes of data).

9. Which is the correct expression for the length of UDP datagram?


a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
d) UDP length = UDP length + UDP header’s length

Answer: a
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP
header that defines the total length of the IP packet. There is another field in the IP header that
defines the length of the header. So if we subtract the length of the IP header that is
encapsulated in the IP packet, we get the length of UDP datagram.

10. The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port

Answer: b
Explanation: Checksum field is used to detect errors over the entire user datagram. Though it is
not as efficient as CRC which is used in TCP, it gets the job done for the UDP datagram as
UDP doesn’t have to ensure the delivery of the packet.

Application layer
1. Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP

Answer: d
Explanation: TCP is transport layer protocol.

2. The packet of information at the application layer is called __________


a) Packet
b) Message
c) Segment
d) Frame

Answer: b
Explanation: For Application, Presentation and Session layers there is no data format for
message. Message is message as such in these three layers. But when it comes to Transport,
Network, Data and Physical layer they have data in format of segments, packets, frames and
bits respectively.

3. Which one of the following is an architecture paradigms?


a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server

Answer: d
Explanation: HTTP is a protocol.
4. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned

Answer: c
Explanation: Application layer provides the interface between applications and the network. So
application developer can decide what transport layer to use and what should be its maximum
buffer size.

5. Application layer offers _______ service.


a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned

Answer: a
Explanation: End to End service is provided in the application layer. Whereas process to
process service is provided at the transport layer.

6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned

Answer: c
Explanation: Because it can work with available throughput.

7. Pick the odd one out.


a) File transfer
b) File download
c) E-mail
d) Interactive games

Answer: d
Explanation: File transfer, File download and Email are services provided by the application
layer and there are message and data oriented.

8. Which of the following is an application layer service?


a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned

Answer: d
Explanation: The services provided by the application layer are network virtual terminal, file
transfer, access and management, mail services, directory services, various file and data
operations.
9. To deliver a message to the correct application program running on a host, the _______
address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned

Answer: c
Explanation: IP address lets you know where the network is located. Whereas MAC address is
a unique address for every device. Port address identifies a process or service you want to
carry on.

10. Which is a time-sensitive service?


a) File transfer
b) File download
c) E-mail
d) Internet telephony

Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.

11. Transport services available to applications in one or another form _________


a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned

Answer: d
Explanation: The transport services that are provided to application are reliable data transfer,
security and timing. These are very important for proper end to end services.

12. Electronic mail uses which Application layer protocol?


a) SMTP
b) HTTP
c) FTP
d) SIP

Answer: a
Explanation: Email uses various protocols like SMTP, IMAP and POP. The most prominent one
used in application layer is SMTP.

Multiplexing

1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing

Answer: b
Explanation: Multiplexing is a method using which one can send multiples signals through a
shared medium at the same time. This helps in using less resources and thus saving the cost of
sending messages.

2. Multiplexing is used in _______


a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching

Answer: b
Explanation: Circuit switching is a switching method by which one can obtain a physical path
between end points. Circuit switching method is also called a connection oriented network. Two
nodes must be physically and logically connected to each other to create a circuit switching
network.

3. Which multiplexing technique used to transmit digital signals?


a) FDM
b) TDM
c) WDM
d) FDM & WDM

Answer: b
Explanation: TDM abbreviation for Time Division Multiplexing is a method used for digital
signals. Whereas FDM and WDM abbreviation for Frequency Division Multiplexing, and
Wavelength Division Multiplexing, are used for analog signals. TDM is used in applications like
ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network).

4. If there are n signal sources of same data rate, then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n

Answer: a
Explanation: In TDM, the total unit of time is divided equally among all the signal sources and
each and every source has access to the complete channel bandwidth during its allotted time
slot. When the time slot of the source is not active, it remains idle and waits for its slot to begin.

5. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of
circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps

Answer: a
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps

Subscribe Computer Network Newsletter

6. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period

Answer: c
Explanation: There are instances when connection between two endpoints has been
established, but no communication or transfer of messages occurs. This period of time is called
silent period. The silent period ends when either of the two endpoints starts the communication.

7. Multiplexing provides _________


a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy

Answer: d
Explanation: Multiplexing helps us to transfer our messages over a shared channel. This brings
up the issue of privacy and efficiency. Fortunately, Multiplexing has high efficiency and high
privacy when implemented because in the implementation, the transport layer of the OSI
network model handles the function of multiplexing through interfaces called ports which provide
the required efficiency and privacy.

8. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the
transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than

Answer: a
Explanation: In TDM the transmission rate provided by the path that is multiplexed will always
be greater than the sum of transmission rates of the single sources. This happens because the
transmission rate is provided to each source only for a small period of time.

9. In TDM, slots are further divided into _________


a) Seconds
b) Frames
c) Packets
d) Bits

Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining
several low rate channels to a single high rate channel. For a certain time slot, the several
channels could use the maximum bandwidth. Each channel is inactive for a period of time too.
Some other multiplexing techniques are Frequency division multiplexing and Phase division
multiplexing.

Topology

1. Physical or logical arrangement of network is __________


a) Topology
b) Routing
c) Networking
d) Control

Answer: a
Explanation: Topology in networks is the structure or pattern in which each and every node in
the network is connected. There are many topologies in networking like bus, tree, ring, star,
mesh, and hybrid topology. There is no particular best topology and a suitable topology can be
chosen based on the kind of application of the network .

2. Which network topology requires a central controller or hub?


a) Star
b) Mesh
c) Ring
d) Bus

Answer: a
Explanation: In star topology, no computer is connected to another computer directly but all the
computers are connected to a central hub. Every message sent from a source computer goes
through the hub and the hub then forwards the message only to the intended destination
computer.

3. _______ topology requires a multipoint connection.


a) Star
b) Mesh
c) Ring
d) Bus

Answer: d
Explanation: In bus topology, there is a single cable to which all the network nodes are
connected. So whenever a node tries to send a message or data to other nodes, this data
passes through all other nodes in the network through the cable. It is really simple to install but
it’s not secure enough to be used in most of the computer network applications.

4. Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
d) PAN

Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large
geographical area. WANs are used to connect cities, states or even countries. A wireless
connection is required to build a WAN. The best example of WAN is the Internet.

5. Data communication system within a building or campus is________


a) LAN
b) WAN
c) MAN
d) PAN

Answer: a
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects
computers in a small area such as schools, offices, residence etc. It is the most versatile kind of
data communication system where most of the computer network concepts can be visibly used.

Subscribe Computer Network Newsletter

6. WAN stands for __________


a) World area network
b) Wide area network
c) Web area network
d) Web access network

Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large
geographical area. These are used to connect cities, states or even countries. They can be
connected through leased lines or satellites.

Packet Switching & Circuit Switching

1. A local telephone network is an example of a _______ network.


a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched

Answer: b
Explanation: Circuit switching is connection oriented switching technique, whereas in the case
of packet switching, it is connectionless. Circuit switching is implemented in the Physical layer,
whereas packet switching is implemented in the Network layer. Internet too is based on the
concept of circuit switching.

2. Most packet switches use this principle ____________


a) Stop and wait
b) Store and forward
c) Store and wait
d) Stop and forward

Answer: b
Explanation: The packet switch will not transmit the first bit to outbound link until it receives the
entire packet. If the entire packet is not received and the time-out period expires, the packet
switch will inform the sender to resend the part of packet or the entire packet based on the
algorithm being used.

3. If there are N routers from source to destination, the total end to end delay in sending packet
P(L-> number of bits in the packet R-> transmission rate) is equal to ______________
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R

Answer: b
Explanation: The equation to find the end to end delay when no. of bits, transmission rate and
no. of routers is given by (N*L)/R. The total end to end delay, that is, nodal delay is the sum of
all, the processing delay, queuing delay, transmission delay and propagation delay.

4. What are the Methods to move data through a network of links and switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching

Answer: d
Explanation: Packet switching and Circuit switching are two different types of switching methods
used to connect the multiple communicating devices with one another. Packet switching is used
in conventional LAN systems and circuit switching is used in telephonic systems.

5. The required resources for communication between end systems are reserved for the
duration of the session between end systems in ________ method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching

Answer: b
Explanation: In circuit switching, a physical path between the sender and receiver is
established. This path is maintained until the connection is needed. Circuit switching is
implemented in the Physical layer and is used in telephonic systems.

Subscribe Computer Network Newsletter

6. As the resources are reserved between two communicating end systems in circuit switching,
___________ is achieved.
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward

Answer: b
Explanation: Circuit switching is connection oriented and is always implemented in the physical
layer. Once a path is set, all transmission occurs through the same path. It is used since the
early times in telephonic systems.

7. In _________ systems, resources are allocated on demand.


a) packet switching
b) circuit switching
c) line switching
d) frequency switching

Answer: a
Explanation: In packet switching, the bits are received in out of order and need to be assembled
at the receiver end, whereas in the case of Circuit switching, all the bits are received in order. All
transmissions may not occur through the same path in case of packet switching.

8. Which of the following is not an application layer service?


a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) Error control

Answer: d
Explanation: Application layer is the topmost layer in the OSI model. Network virtual terminal,
mail service, file transfer, access and management are all services of the application layer. It
uses protocols like HTTP, FTP, and DNS etc. to provide these services.

RPC
1. An RPC (remote procedure call) is initiated by the _________
a) server
b) client
c) client after the sever
d) a third party

Answer: b
Explanation: Remote Procedure Call is a method used for constructing distributed, client-server
applications based on extending the conventional local procedure calling where the client
initiates an RPC to start a connection process.

2. In RPC, while a server is processing the call, the client is blocked ________
a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) unless the server is disconnected

Answer: a
Explanation: While the server is processing the call i.e. looking through the specifications, the
client is blocked, unless the client sends an asynchronous request to the server for another
operation.

3. A remote procedure call is _______


a) inter-process communication
b) a single process
c) a single thread
d) a single stream

Answer: a
Explanation: Remote procedure calls is a form of inter-process communication where the client
initiates an RPC to start a connection process. It is used to construct distributed, client-server
applications.

4. RPC allows a computer program to cause a subroutine to execute in _________


a) its own address space
b) another address space
c) both its own address space and another address space
d) applications address space

Answer: b
Explanation: RPC allows a computer program to cause a subroutine to execute in another
address space which is usually the servers address space in a conventional client-server
network.

5. RPC works between two processes. These processes must be ____________


a) on the same computer
b) on different computers connected with a network
c) on the same computer and also on different computers connected with a network
d) on none of the computers

Answer: c
Explanation: For the operation of RPC between two processes, it is mandatory that the
processes are present on the same computer and also on different computers connected with
its network.

Subscribe Computer Network Newsletter

6. A remote procedure is uniquely identified by _________


a) program number
b) version number
c) procedure number
d) all of the mentioned

Answer: d
Explanation: Each remote procedure can be uniquely identified by the program number, version
number and the procedure number in the networks scope. The identifiers can be used to control
the remote procedure by parties involved in the process.

7. An RPC application requires _________


a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned

Answer: d
Explanation: The RPC technique for constructing distributed, client-server applications based on
extending the conventional local procedure calling. It requires a client program, a server
program and specific protocol for client server communication to build the system.

8. RPC is used to _________


a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) establish a server on remote machine that can respond to queries and retrieve information by
calling a query
d) to secure the client

Answer: c
Explanation: RPC or Remote Procedure Call is used to establish a server on remote machine
that can respond to queries and to retrieve information by calling a query by other computers.

9. RPC is a _________
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) channel specific operation
Answer: a
Explanation: RPC is a synchronous operation where the remote machine works in sync with the
other machines to act as a server that can respond to queries called by the other machines.

10. The local operating system on the server machine passes the incoming packets to the
___________
a) server stub
b) client stub
c) client operating system
d) client process

Answer: a
Explanation: The local operating system on the server machine passes the incoming packets to
the server stub which then processes the packets which contain the queries from the client
machines for retrieving information.

DHCP
1. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned

Answer: a
Explanation: We use DHCP to allow the hosts to acquire their ip addresses dynamically which is
better than visiting each and every host on the network and configure all of this information
manually.

2. DHCP is used for ________


a) IPv6
b) IPv4
c) Both IPv6 and IPv4
d) None of the mentioned

Answer: c
Explanation: DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the
hosts know about the change dynamically, and hosts update their info themselves.

3. The DHCP server _________


a) maintains a database of available IP addresses
b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client
d) all of the mentioned

Answer: d
Explanation: Whenever a DHCP server gets a request from a client it responds with a DHCP
offer containing IP address being offered, network mask offered, the amount of time that the
client can use and keep it, the ip address of the DHCP server making this offer.

4. IP assigned for a client by DHCP server is


a) for a limited period
b) for an unlimited period
c) not time dependent
d) none of the mentioned

Answer: a
Explanation: The IP address offered to a client is only for a limited period of time. There is
actually a certain amount of time that the client can use and keep this IP address.

5. DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69

Answer: b
Explanation: 67 is the UDP port number that is used as the destination port of a server.
Whereas UDP port number 68 is used by the client.

Subscribe Computer Network Newsletter

6. The DHCP server can provide the _______ of the IP addresses.


a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned

Answer: d
Explanation: When a host acquires multiple offers of IP addresses from different DHCP servers,
the host will broadcast a dhcp request identifying the server whose offer has been accepted.

7. DHCP client and servers on the same subnet communicate via _________
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast

Answer: a
Explanation: DHCP actually employs a connectionless service, which is provided by UDP, since
TCP is connection oriented. It is implemented with two UDP port numbers 67 and 68 for its
operations.

8. After obtaining the IP address, to prevent the IP conflict the client may use _________
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned

Answer: c
Explanation: ARP abbreviation for address resolution protocol is used for mapping IP addresses
to MAC addresses that are present in the local network.

9. What is DHCP snooping?


a) techniques applied to ensure the security of an existing DHCP infrastructure
b) encryption of the DHCP server requests
c) algorithm for DHCP
d) none of the mentioned

Answer: a
Explanation: DHCP snooping is a security feature that is used in OS of a network in the layer 2.
This technology prevents unauthorized DHCP servers offering IP addresses to DHCP clients.

10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can
access the network.
a) MAC address
b) IP address
c) Both MAC address and IP address
d) None of the mentioned

Answer: c
Explanation: The DHCP snooping is done to prevent unauthorized IP addresses being offered
by unauthorized servers. This features allows only specific mac addresses and IP addresses to
access the network.

DNS

1. The entire hostname has a maximum of ___________


a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters

Answer: a
Explanation: An entire hostname can have a maximum of 255 characters. Although each label
must be from 1 to 63 characters long. Host name is actually a label that is given to a device in a
network.

2. A DNS client is called _________


a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
Answer: b
Explanation: DNS client also known as DNS resolver also known as DNS lookup helps to
resolve DNS requests using an external DNS server.

3. Servers handle requests for other domains _______


a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned

Answer: b
Explanation: Whenever a request is received at server from other domains, it handles this
situation by contacting remote DNS server.

4. DNS database contains _______


a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned

Answer: d
Explanation: Domain Name system not only deals with mapping IP addresses with the
hostname but also deals with exchange of information in the server.

5. If a server has no clue about where to find the address for a hostname then _______
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned

Answer: a
Explanation: Root name servers are actually very important and critical as they are the first step
in translating human readable hostnames into IP addresses for carrying out communication.

Subscribe Computer Network Newsletter

6. Which one of the following allows client to update their DNS entry as their IP address
change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned

Answer: a
Explanation: Dynamic DNS or in short DDNS or DynDNS helps in automatically updating a
name server in the DNS. This does not require manual editing.

7. Wildcard domain names start with label _______


a) @
b) *
c) &
d) #

Answer: b
Explanation: A wildcard DNS record matches requests to a non existent domain name. This
wildcard DNS record is specified by using asterisk “*” as the starting of a domain name.

8. The right to use a domain name is delegated by domain name registers which are accredited
by _______
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers

Answer: d
Explanation: The ICANN (Internet Corporation for Assigned Names and Numbers) deals with IP
address space allocation, protocol identifier assignment

9. The domain name system is maintained by _______


a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned

Answer: a
Explanation: A domain name system is maintained by a distributed database system. It is a
collection of multiple, logically interrelated databases distributed over a computer network.

10. Which one of the following is not true?


a) multiple hostnames may correspond to a single IP address
b) a single hostname may correspond to many IP addresses
c) a single hostname may correspond to a single IP address
d) none of the mentioned

Answer: c
Explanation: It need not be that a single hostname will correspond to a ip address. For example
facebook.com and fb.com both correspond to same ip address. So there can be multiple
hostnames for a single ip address.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy