Computer Networks MCQ
Computer Networks MCQ
Answer: a
Explanation: RFC stands for Request For Comments and they are documents that describe
methods, behaviors, research, or innovations applicable to the working of the Internet.
2. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers
are ___________
a) Added
b) Removed
c) Rearranged
d) Modified
Answer: a
Explanation: The structure and format of data are defined using syntax. Semantics defines how
a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
In programming languages, syntax of the instructions plays a vital role in designing of the
program.
Answer: d
Explanation: In simplex transmission, data flows in single direction which in this case refers to
the data flowing from the keyboard to the computer. Another example would be of the mouse
where the data flows from the mouse to the computer only.
Answer: b
Explanation: Messages travel from sender to receiver via a physical path called the medium
using a set of methods/rules called protocol. Mediums can be guided (wired) or unguided
(wireless).
7. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
Answer: c
Explanation: FCC is the abbreviation for Federal Communications Commission. FCC is
responsible for regulating all interstate communications originating or terminating in USA. It was
founded in the year 1934.
Answer: d
Explanation: Network edge devices refer to host systems, which can host applications like web
browser. A switch can’t operate as a host, but as a central device which can be used to manage
network communication.
Answer: a
Explanation: In communications, a protocol refers to a set of rules and regulations that allow a
network of nodes to transmit and receive information. Each layer in the network model has a
protocol set, for example, the transport layer has TCP and UDP protocols.
10. Three or more devices share a link in ________ connection.
a) Unipoint
b) Multipoint
c) Point to point
d) Simplex
Answer: b
Explanation: A multipoint communication is established when three or many network nodes are
connected to each other. Frame relay, Ethernet and ATM are some examples of multipoint
connections.
11. When collection of various computers seems a single coherent system to its client, then it is
called _________
a) computer network
b) distributed system
c) networking system
d) mail system
Answer: b
Explanation: A Computer network is defined as a collection of interconnected computers which
uses a single technology for connection.
A distributed system is also the same as computer network but the main difference is that the
whole collection of computers appears to its users as a single coherent system.
Example:- World wide web
Answer: a
Explanation: A computer network, or data network, is a digital telecommunications network
which allows nodes to share resources. In computer networks, computing devices exchange
data with each other using connections between nodes. The nodes have certain processes
which enable them to share a specific type of data using a distinct protocol.
13. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
Answer: d
Explanation: An overlay network is a computer network that is built on top of another network.
Some examples of an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer
Networks (P2P).
14. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or
receiving data or even routing the data to its destination. Routers, Computers and Smartphones
are some examples of network nodes.
15. Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
Answer: a
Explanation: In a broadcast network, information is sent to all stations in a network whereas in a
multicast network the data or information is sent to a group of stations in the network. In unicast
network, information is sent to only one specific station. The broadcast address of the network is
the last assigned address of the network.
Answer: a
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network
for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for
transmission.
17. A __________ is a device that forwards packets between networks by processing the
routing information included in the packet.
a) bridge
b) firewall
c) router
d) hub
Answer: c
Explanation: A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. They make use of
routing protocols like RIP to find the cheapest path to the destination.
18. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
Answer: b
Explanation: A protocol stack refers to a group of protocols that are running concurrently that
are employed for the implementation of network protocol suite. Each layer in the network model
has to use one specific protocol from the protocol stack.
Answer: a
Explanation: Network congestion occurs when traffic in the network is more than the network
could handle. To avoid network congestion, the network management uses various open-loop
and closed-loop congestion control techniques.
20. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
Answer: b
Explanation: A virtual private network extends a private network across a public network, and
enables users to send and receive data across shared or public networks as if their computing
devices were directly connected to the private network.VPN provides enhanced security and
online anonymity to users on the internet. It is also used to unblock websites which are
unavailable in certain regions.
Physical layer
1. The physical layer is concerned with ___________
a) bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) port to port delivery
Answer: a
Explanation: Physical layer deals with bit to bit delivery in networking. The data unit in the
physical layer is bits. Process to process delivery or the port to port delivery is dealt in the
transport layer. The various transmission mediums aid the physical layer in performing its
functions.
Answer: c
Explanation: Fiber optics is considered to have the highest transmission speed among the all
mentioned above. The fiber optics transmission runs at 1000Mb/s. It is called as 1000Base-Lx
whereas IEEE standard for it is 802.3z. It is popularly used for modern day network connections
due to its high transmission rate.
3. Bits can be sent over guided and unguided media as analog signal by ___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
Answer: a
Explanation: In analog modulation, digital low frequency baseband signal (digital bit stream) is
transmitted over a higher frequency. Whereas in digital modulation the only difference is that the
base band signal is of discrete amplitude level. The bits are represented by only two frequency
levels, one for high and one for low.
4. The portion of physical layer that interfaces with the media access control sublayer is called
___________
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) physical transport sublayer
Answer: a
Explanation: The portion of physical layer that interfaces with the medium access control
sublayer is Physical Signaling Sublayer. The main function of this layer is character encoding,
reception, decoding and performs optional isolation functions. It handles which media
connection the signal should be forwarded to physically.
Answer: d
Explanation: Anything dealing with a network cable or the standards in use – including pins,
connectors and the electric current used is dealt in the physical layer (Layer 1). Physical layer
deals with bit to bit delivery of the data aided by the various transmission mediums.
Answer: c
Explanation: In asynchronous serial communication, the communication is not synchronized by
clock signal. Instead of a start and stop signaling and flow control method is followed. Unlike
asynchronous serial communication, in synchronous serial communication a clock signal is
used for communication, so the start and stop method is not really required.
7. The physical layer is responsible for __________
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
Answer: d
Explanation: The physical layer is responsible for line coding, channel coding and modulation
that is needed for the transmission of the information. The physical configuration including pins,
connectors and the electric current used is dealt in the physical layer based on the requirement
of the network application.
8. The physical layer translates logical communication requests from the ______ into hardware
specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
Answer: a
Explanation: Physical layer accepts data or information from the data link layer and converts it
into hardware specific operations so as to transfer the message through physical cables. Some
examples of the cables used are optical fiber cables, twisted pair cables and co-axial cables.
Answer: c
Explanation: In communication and computer networks, the main goal is to share a scarce
resource. This is done by multiplexing, where multiple analog or digital signals are combined
into one signal over a shared medium. The multiple kinds of signals are designated by the
transport layer which is the layer present on a higher level than the physical layer.
Answer: d
Explanation: Wireless transmission is carried out by radio waves, microwaves and IR waves.
These waves range from 3 Khz to above 300 Ghz and are more suitable for wireless
transmission. Radio waves can penetrate through walls and are used in radio communications,
microwaves and infrared (IR) waves cannot penetrate through walls and are used for satellite
communications and device communications respectively.
Network Layer
Answer: c
Explanation: In computer networks, the data from the application layer is sent to the transport
layer and is converted to segments. These segments are then transferred to the network layer
and these are called packets. These packets are then sent to data link layer where they are
encapsulated into frames. These frames are then transferred to physical layer where the frames
are converted to bits.
Answer: d
Explanation: In the OSI model, network layer is the third layer and it provides data routing paths
for network communications. Error control is a function of the data link layer and the transport
layer.
Answer: c
Explanation: An ip address which is 32 bits long, that means it is of 4 bytes and is composed of
a network and host portion and it depends on address class. The size of the host address and
network address depends upon the class of the address in classful IP addressing.
Answer: b
Explanation: A short VC number also called as VCID (virtual circuit identifier) is a type of
identifier which is used to distinguish between several virtual circuits in a connection oriented
circuit switched network. Each virtual circuit is used to transfer data over a larger packet
switched network.
5. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer: d
Explanation: The routing algorithm is what decides where a packet should go next. There are
several routing techniques like shortest path algorithm, static and dynamic routing,
decentralized routing, distance vector routing, link state routing, Hierarchical routing etc. The
routing algorithms go hand in hand with the operations of all the routers in the networks. The
routers are the main participants in these algorithms.
Answer: c
Explanation: In multi-destination routing, there is more than one receiver and the route for each
destination which is contained in a list of destinations is to be found by the routing algorithm.
Multi-destination routing is also used in broadcasting.
7. A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree
b) spider structure
c) spider tree
d) special tree
Answer: a
Explanation: Spanning tree protocol (STP) is a network protocol that creates a loop free logical
topology for ethernet networks. It is a layer 2 protocol that runs on bridges and switches. The
main purpose of STP is to ensure that you do not create loops when you have redundant paths
in your network.
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
Answer: d
Explanation: The Routing Information Protocol (RIP) is used by the network layer for the
function of dynamic routing. Congestion control focuses on the flow of the traffic in the network
and uses algorithms like traffic aware routing, admission control and load shedding to deal with
congestion.
Answer: b
Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP,
CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet
protocol is for data link layer.
Answer: a
Explanation: ICMP abbreviation for Internet Control Message Protocol is used by networking
devices to send error messages and operational information indicating a host or router cannot
be reached. ICMP operates over the IP packet to provide error reporting functionality as IP by
itself cannot report errors.
1. The data link layer takes the packets from _________ and encapsulates them into frames for
transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Answer: a
Explanation: In computer networks, the data from application layer is sent to transport layer and
is converted to segments. These segments are then transferred to the network layer and these
are called packets. These packets are then sent to data link layer where they are encapsulated
into frames. These frames are then transferred to physical layer where the frames are converted
to bits. Error control and flow control data is inserted in the frames at the data link layer.
Answer: d
Explanation: Channel coding is the function of physical layer. Data link layer mainly deals with
framing, error control and flow control. Data link layer is the layer where the packets are
encapsulated into frames.
3. Which sublayer of the data link layer performs data link functions that depend upon the type
of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
Answer: b
Explanation: Media access control (MAC) deals with transmission of data packets to and from
the network-interface card, and also to and from another remotely shared channel. The MAC
sublayer also prevents collision using protocols like CSMA/CD.
Answer: d
Explanation: In a frame, the header is a part of the data that contains all the required information
about the transmission of the file. It contains information like synchronization bytes, addresses,
frame identifier etc. It also contains error control information for reducing the errors in the
transmitted frames.
Answer: a
Explanation: The logical link control is a sublayer of data link layer whose main function is to
manage traffic, flow and error control. The automatic repeat request error management
mechanism is provided by the LLC when an error is found in the received frame at the receiver’s
end to inform the sender to re-send the frame.
6. When 2 or more bits in a data unit has been changed during the transmission, the error is
called ____________
a) random error
b) burst error
c) inverted error
d) double error
Answer: b
Explanation: When a single bit error occurs in a data, it is called single bit error. When more
than a single bit of data is corrupted or has error, it is called burst error. If a single bit error
occurs, the bit can be simply repaired by inverting it, but in case of a burst error, the sender has
to send the frame again.
Answer: a
Explanation: Cyclic redundancy check is a code that is added to a data which helps us to
identify any error that occurred during the transmission of the data. CRC is only able to detect
errors, not correct them. CRC is inserted in the frame trailer.
Answer: d
Explanation: There are many data link layer protocols. Some of them are SDLC (synchronous
data link protocol), HDLC (High level data link control), SLIP (serial line interface protocol), PPP
(Point to point protocol) etc. These protocols are used to provide the logical link control function
of the Data Link Layer.
9. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer: c
Explanation: In CSMA/CD, it deals with detection of collision after collision has occurred,
whereas CSMA/CA deals with preventing collision. CSMA/CD is abbreviation for Carrier
Sensing Multiple Access/Collision detection. CSMA/CA is abbreviation for Carrier Sensing
Multiple Access/Collision Avoidance. These protocols are used for efficient multiple channel
access.
10. The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Answer: a
Explanation: Piggybacking is a technique in which the acknowledgment is temporarily delayed
so as to be hooked with the next outgoing data frame. It saves a lot of channel bandwidth as in
non-piggybacking system, some bandwidth is reserved for acknowledgement.
Transport layer
1. Transport layer aggregates data from different applications into a single stream before
passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer: a
Explanation: The flow of data in the OSI model flows in following manner Application ->
Presentation -> Session -> Transport -> Network -> Data Link -> Physical. Each and every layer
has its own set of functions and protocols to ensure efficient network performance.
Answer: c
Explanation: Both TCP and UDP are transport layer protocol in networking. TCP is an
abbreviation for Transmission Control Protocol and UDP is an abbreviation for User Datagram
Protocol. TCP is connection oriented whereas UDP is connectionless.
Answer: a
Explanation: UDP is an alternative for TCP and it is used for those purposes where speed
matters most whereas loss of data is not a problem. UDP is connectionless whereas TCP is
connection oriented.
Answer: d
Explanation: TCP provides reliable and ordered delivery of a stream of bytes between hosts
communicating via an IP network. Major internet applications like www, email, file transfer etc
rely on TCP. TCP is connection oriented and it is optimized for accurate delivery rather than
timely delivery.
5. An endpoint of an inter-process communication flow across a computer network is called
__________
a) socket
b) pipe
c) port
d) machine
Answer: a
Explanation: Socket is one end point in a two way communication link in the network. TCP layer
can identify the application that data is destined to be sent by using the port number that is
bound to socket.
Answer: b
Explanation: Winsock is a programming interface which deals with input output requests for
internet applications in windows OS. It defines how windows network software should access
network services.
Answer: a
Explanation: The datagram congestion control is a transport layer protocol which deals with
reliable connection setup, teardown, congestion control, explicit congestion notification, and
feature negotiation. It is used in modern day systems where there are really high chances of
congestion. The protocol was last updated in the year 2008.
Answer: a
Explanation: Just as the IP address identifies the computer, the network port identifies the
application or service running on the computer. A port number is 16 bits. The combination of IP
address preceded with the port number is called the socket address.
Answer: a
Explanation: The Stream Control Transmission Protocol (SCTP) is a transport layer protocol
used in networking system where streams of data are to be continuously transmitted between
two connected network nodes. Some of the other transport layer protocols are RDP, RUDP,
TCP, DCCP, UDP etc.
Answer: d
Explanation: TCP is a transport layer protocol that provides reliable and ordered delivery of a
stream of bytes between hosts communicating via an IP network.
Answer: a
Explanation: TCP provides stream oriented delivery between hosts communicating via an IP
network and there are no message boundaries. TCP can concatenate data from a number of
send () commands into one stream of data and still transmit it reliably.
3. TCP process may not write and read data at the same speed. So we need __________ for
storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
Answer: b
Explanation: A TCP receiver has a receive buffer that is used to store the unprocessed
incoming packets in case the sender is sending packets faster than the processing rate of the
received packets.
Answer: c
Explanation: A segment may be collection of data from many send () statements. TCP transmits
each segment as a stream of bytes.
Answer: a
Explanation: Data can flow both the directions at the same time during a TCP communication
hence, it is full-duplex. This is the reason why TCP is used in systems that require full-duplex
operation such as e-mail systems.
6. To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
Answer: d
Explanation: Acknowledgment mechanism is used to check the safe and sound arrival of data.
The sender actively checks for acknowledgement from the receiver and once a specific time
period has passed, it retransmits the data.
7. In segment header, sequence number and acknowledgement number fields refer to _______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
Answer: a
Explanation: As TCP has to ensure ordered delivery of packets, sequence number and
acknowledgement number are used to identify the byte number of the packet in the stream of
bytes being transmitted.
8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered
10001. What is the sequence number of the segment if all data is sent in only one segment?
a) 10000
b) 10001
c) 12001
d) 11001
Answer: b
Explanation: The sequence number given to first byte of a segment, with respect to its order
among the previous segments, is the sequence number of that segment.
9. Bytes of data being transferred in each connection are numbered by TCP. These numbers
start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
Answer: d
Explanation: One might expect the sequence number of the first byte in the stream to be 0, or 1.
But that does not happen in TCP, Instead, the sender has to choose an Initial Sequence
Number (ISN), which is basically a random 32 bit sequence of 0’s and 1’s, during the connection
handshake.
Answer: c
Explanation: The acknowledgement field in a segment defines the sequence number of the byte
which is to be received next i.e. sequence number of byte that the sender should transmit next.
1. The receiver of the data controls the amount of data that are to be sent by the sender is
referred to as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
Answer: a
Explanation: Flow control is done to prevent the receiver from being overflowed with data. It is
done using various open-loop (prevention) methods and closed-loop (recovery) methods.
Answer: c
Explanation: The size of the header can be 20 bytes at a minimum if there are no options and
can go up to 60 bytes at maximum with 40 bytes in the options field. The header contains all the
control information required to ensure ordered, error-free and reliable delivery of the segment.
Answer: b
Explanation: A three-way handshake allows both, the server and the client to choose their Initial
Sequence Number and inform about it to the other party. This won’t be possible using the two-
way handshake mechanism.
4. The server program tells its TCP that it is ready to accept a connection. This process is called
___________
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is started by the
server. Then the Client picks an ISN (Initial Sequence Number) and synchronizes (shares) it
with the Server requesting a connection. The Server acknowledges the clients ISN, and then
picks an ISN and synchronizes it with the Client. At last, the Client acknowledges the servers
ISN.
5. A client that wishes to connect to an open server tells its TCP that it needs to be connected to
that particular server. The process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and is done by the
client once it finds the open server and picks an ISN. The Server acknowledges the clients
request, and then picks an ISN and synchronizes it with the Client. At last, the Client
acknowledges the servers ISN.
6. In Three-Way Handshaking process, the situation where both the TCP’s issue an active open
is ___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
Answer: c
Explanation: In simultaneous open situation, two nodes send an SYN signal to each other and
start a TCP connection. Here, both TCP nodes transmit a SYNC+ACK segment to each other
and a connection is established between them. This doesn’t happen usually, because both
sides have to know which port on the other side to send to.
7. A malicious attacker sends a large number of SYNC segments to a server, pretending that
each of them is coming from a different client by faking the source IP address in the datagram.
Which type of attack is being performed in this situation?
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
Answer: a
Explanation: SYNC flooding attack is a form of Denial of Service attack. Due to the overflow of
SYNC segments sent to the server, the victims are not able to request for a connection to the
server, thus resulting in Denial of Service.
Answer: d
Explanation: During SYNC flooding the system collapses and denies service to every request,
making it a DoS attack. Some other DoS attacks are bandwidth flooding, connection flooding
and UDP flooding.
9. The sizes of source and destination port address in TCP header are ___________
respectively.
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
Answer: b
Explanation: All port addresses are of 16 bits and they specify the type of service being used by
the network entity. For example, port 21 is used for FTP connections and port 25 is used for
ICMP connections.
10. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
Answer: b
Explanation: TCP header contains separate fields for sequence number and acknowledgment
number. Comparing these values is what allows TCP to detect lost segments and in turn
recover from that loss. After detecting the lost segments, the recovery may require
retransmission of the lost segments of data
UDP
Answer: a
Explanation: UDP is an unreliable, connectionless transport layer protocol that provides
message-based data transmission. TCP is an example of connection-oriented protocols.
Answer: a
Explanation: Using Chargen with UDP on port 19, the server sends a UDP datagram containing
a random number of characters every time it receives a datagram from the connecting host. The
number of characters is between 0 and 512.
Answer: d
Explanation: De-multiplexing is the delivering of received segments to the correct application
layer processes at the recipients end using UDP. Error checking is done through checksum in
UDP.
Answer: c
Explanation: As UDP does not provide assurance of delivery of packet, reliability and other
services, the overhead taken to provide these services is reduced in UDP’s operation. Thus,
UDP provides low overhead, and higher speed.
5. Port number used by Network Time Protocol (NTP) with UDP is ________
a) 161
b) 123
c) 162
d) 124
Answer: b
Explanation: The Network Time Protocol is a clock synchronization network protocol
implemented by using UDP port number 123 to send and receive time stamps.
Answer: a
Explanation: The fixed size of the UDP packet header is 8 bytes. It contains four two-byte fields:
Source port address, Destination port address, Length of packet, and checksum.
7. The port number is “ephemeral port number”, if the source host is _______
a) NTP
b) Echo
c) Server
d) Client
Answer: d
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in Windows
Operating System. Ephemeral port numbers are short-lived port numbers which can be used for
clients in a UDP system where there are temporary clients all the time.
Answer: d
Explanation: Total length is the 16 bit field which contains the length of UDP header and the
data. The maximum value of the Total length field and the maximum size of a UDP datagram is
65,535 bytes (8 byte header + 65,527 bytes of data).
Answer: a
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP
header that defines the total length of the IP packet. There is another field in the IP header that
defines the length of the header. So if we subtract the length of the IP header that is
encapsulated in the IP packet, we get the length of UDP datagram.
10. The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port
Answer: b
Explanation: Checksum field is used to detect errors over the entire user datagram. Though it is
not as efficient as CRC which is used in TCP, it gets the job done for the UDP datagram as
UDP doesn’t have to ensure the delivery of the packet.
Application layer
1. Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
Answer: d
Explanation: TCP is transport layer protocol.
Answer: b
Explanation: For Application, Presentation and Session layers there is no data format for
message. Message is message as such in these three layers. But when it comes to Transport,
Network, Data and Physical layer they have data in format of segments, packets, frames and
bits respectively.
Answer: d
Explanation: HTTP is a protocol.
4. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
Answer: c
Explanation: Application layer provides the interface between applications and the network. So
application developer can decide what transport layer to use and what should be its maximum
buffer size.
Answer: a
Explanation: End to End service is provided in the application layer. Whereas process to
process service is provided at the transport layer.
6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c
Explanation: Because it can work with available throughput.
Answer: d
Explanation: File transfer, File download and Email are services provided by the application
layer and there are message and data oriented.
Answer: d
Explanation: The services provided by the application layer are network virtual terminal, file
transfer, access and management, mail services, directory services, various file and data
operations.
9. To deliver a message to the correct application program running on a host, the _______
address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c
Explanation: IP address lets you know where the network is located. Whereas MAC address is
a unique address for every device. Port address identifies a process or service you want to
carry on.
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
Answer: d
Explanation: The transport services that are provided to application are reliable data transfer,
security and timing. These are very important for proper end to end services.
Answer: a
Explanation: Email uses various protocols like SMTP, IMAP and POP. The most prominent one
used in application layer is SMTP.
Multiplexing
1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
Answer: b
Explanation: Multiplexing is a method using which one can send multiples signals through a
shared medium at the same time. This helps in using less resources and thus saving the cost of
sending messages.
Answer: b
Explanation: Circuit switching is a switching method by which one can obtain a physical path
between end points. Circuit switching method is also called a connection oriented network. Two
nodes must be physically and logically connected to each other to create a circuit switching
network.
Answer: b
Explanation: TDM abbreviation for Time Division Multiplexing is a method used for digital
signals. Whereas FDM and WDM abbreviation for Frequency Division Multiplexing, and
Wavelength Division Multiplexing, are used for analog signals. TDM is used in applications like
ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network).
4. If there are n signal sources of same data rate, then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n
Answer: a
Explanation: In TDM, the total unit of time is divided equally among all the signal sources and
each and every source has access to the complete channel bandwidth during its allotted time
slot. When the time slot of the source is not active, it remains idle and waits for its slot to begin.
5. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of
circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
Answer: a
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
6. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period
Answer: c
Explanation: There are instances when connection between two endpoints has been
established, but no communication or transfer of messages occurs. This period of time is called
silent period. The silent period ends when either of the two endpoints starts the communication.
Answer: d
Explanation: Multiplexing helps us to transfer our messages over a shared channel. This brings
up the issue of privacy and efficiency. Fortunately, Multiplexing has high efficiency and high
privacy when implemented because in the implementation, the transport layer of the OSI
network model handles the function of multiplexing through interfaces called ports which provide
the required efficiency and privacy.
8. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the
transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
Answer: a
Explanation: In TDM the transmission rate provided by the path that is multiplexed will always
be greater than the sum of transmission rates of the single sources. This happens because the
transmission rate is provided to each source only for a small period of time.
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining
several low rate channels to a single high rate channel. For a certain time slot, the several
channels could use the maximum bandwidth. Each channel is inactive for a period of time too.
Some other multiplexing techniques are Frequency division multiplexing and Phase division
multiplexing.
Topology
Answer: a
Explanation: Topology in networks is the structure or pattern in which each and every node in
the network is connected. There are many topologies in networking like bus, tree, ring, star,
mesh, and hybrid topology. There is no particular best topology and a suitable topology can be
chosen based on the kind of application of the network .
Answer: a
Explanation: In star topology, no computer is connected to another computer directly but all the
computers are connected to a central hub. Every message sent from a source computer goes
through the hub and the hub then forwards the message only to the intended destination
computer.
Answer: d
Explanation: In bus topology, there is a single cable to which all the network nodes are
connected. So whenever a node tries to send a message or data to other nodes, this data
passes through all other nodes in the network through the cable. It is really simple to install but
it’s not secure enough to be used in most of the computer network applications.
4. Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
d) PAN
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large
geographical area. WANs are used to connect cities, states or even countries. A wireless
connection is required to build a WAN. The best example of WAN is the Internet.
Answer: a
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects
computers in a small area such as schools, offices, residence etc. It is the most versatile kind of
data communication system where most of the computer network concepts can be visibly used.
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large
geographical area. These are used to connect cities, states or even countries. They can be
connected through leased lines or satellites.
Answer: b
Explanation: Circuit switching is connection oriented switching technique, whereas in the case
of packet switching, it is connectionless. Circuit switching is implemented in the Physical layer,
whereas packet switching is implemented in the Network layer. Internet too is based on the
concept of circuit switching.
Answer: b
Explanation: The packet switch will not transmit the first bit to outbound link until it receives the
entire packet. If the entire packet is not received and the time-out period expires, the packet
switch will inform the sender to resend the part of packet or the entire packet based on the
algorithm being used.
3. If there are N routers from source to destination, the total end to end delay in sending packet
P(L-> number of bits in the packet R-> transmission rate) is equal to ______________
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
Answer: b
Explanation: The equation to find the end to end delay when no. of bits, transmission rate and
no. of routers is given by (N*L)/R. The total end to end delay, that is, nodal delay is the sum of
all, the processing delay, queuing delay, transmission delay and propagation delay.
4. What are the Methods to move data through a network of links and switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching
Answer: d
Explanation: Packet switching and Circuit switching are two different types of switching methods
used to connect the multiple communicating devices with one another. Packet switching is used
in conventional LAN systems and circuit switching is used in telephonic systems.
5. The required resources for communication between end systems are reserved for the
duration of the session between end systems in ________ method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
Answer: b
Explanation: In circuit switching, a physical path between the sender and receiver is
established. This path is maintained until the connection is needed. Circuit switching is
implemented in the Physical layer and is used in telephonic systems.
6. As the resources are reserved between two communicating end systems in circuit switching,
___________ is achieved.
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
Answer: b
Explanation: Circuit switching is connection oriented and is always implemented in the physical
layer. Once a path is set, all transmission occurs through the same path. It is used since the
early times in telephonic systems.
Answer: a
Explanation: In packet switching, the bits are received in out of order and need to be assembled
at the receiver end, whereas in the case of Circuit switching, all the bits are received in order. All
transmissions may not occur through the same path in case of packet switching.
Answer: d
Explanation: Application layer is the topmost layer in the OSI model. Network virtual terminal,
mail service, file transfer, access and management are all services of the application layer. It
uses protocols like HTTP, FTP, and DNS etc. to provide these services.
RPC
1. An RPC (remote procedure call) is initiated by the _________
a) server
b) client
c) client after the sever
d) a third party
Answer: b
Explanation: Remote Procedure Call is a method used for constructing distributed, client-server
applications based on extending the conventional local procedure calling where the client
initiates an RPC to start a connection process.
2. In RPC, while a server is processing the call, the client is blocked ________
a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) unless the server is disconnected
Answer: a
Explanation: While the server is processing the call i.e. looking through the specifications, the
client is blocked, unless the client sends an asynchronous request to the server for another
operation.
Answer: a
Explanation: Remote procedure calls is a form of inter-process communication where the client
initiates an RPC to start a connection process. It is used to construct distributed, client-server
applications.
Answer: b
Explanation: RPC allows a computer program to cause a subroutine to execute in another
address space which is usually the servers address space in a conventional client-server
network.
Answer: c
Explanation: For the operation of RPC between two processes, it is mandatory that the
processes are present on the same computer and also on different computers connected with
its network.
Answer: d
Explanation: Each remote procedure can be uniquely identified by the program number, version
number and the procedure number in the networks scope. The identifiers can be used to control
the remote procedure by parties involved in the process.
Answer: d
Explanation: The RPC technique for constructing distributed, client-server applications based on
extending the conventional local procedure calling. It requires a client program, a server
program and specific protocol for client server communication to build the system.
Answer: c
Explanation: RPC or Remote Procedure Call is used to establish a server on remote machine
that can respond to queries and to retrieve information by calling a query by other computers.
9. RPC is a _________
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) channel specific operation
Answer: a
Explanation: RPC is a synchronous operation where the remote machine works in sync with the
other machines to act as a server that can respond to queries called by the other machines.
10. The local operating system on the server machine passes the incoming packets to the
___________
a) server stub
b) client stub
c) client operating system
d) client process
Answer: a
Explanation: The local operating system on the server machine passes the incoming packets to
the server stub which then processes the packets which contain the queries from the client
machines for retrieving information.
DHCP
1. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned
Answer: a
Explanation: We use DHCP to allow the hosts to acquire their ip addresses dynamically which is
better than visiting each and every host on the network and configure all of this information
manually.
Answer: c
Explanation: DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the
hosts know about the change dynamically, and hosts update their info themselves.
Answer: d
Explanation: Whenever a DHCP server gets a request from a client it responds with a DHCP
offer containing IP address being offered, network mask offered, the amount of time that the
client can use and keep it, the ip address of the DHCP server making this offer.
Answer: a
Explanation: The IP address offered to a client is only for a limited period of time. There is
actually a certain amount of time that the client can use and keep this IP address.
5. DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
Answer: b
Explanation: 67 is the UDP port number that is used as the destination port of a server.
Whereas UDP port number 68 is used by the client.
Answer: d
Explanation: When a host acquires multiple offers of IP addresses from different DHCP servers,
the host will broadcast a dhcp request identifying the server whose offer has been accepted.
7. DHCP client and servers on the same subnet communicate via _________
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
Answer: a
Explanation: DHCP actually employs a connectionless service, which is provided by UDP, since
TCP is connection oriented. It is implemented with two UDP port numbers 67 and 68 for its
operations.
8. After obtaining the IP address, to prevent the IP conflict the client may use _________
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
Answer: c
Explanation: ARP abbreviation for address resolution protocol is used for mapping IP addresses
to MAC addresses that are present in the local network.
Answer: a
Explanation: DHCP snooping is a security feature that is used in OS of a network in the layer 2.
This technology prevents unauthorized DHCP servers offering IP addresses to DHCP clients.
10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can
access the network.
a) MAC address
b) IP address
c) Both MAC address and IP address
d) None of the mentioned
Answer: c
Explanation: The DHCP snooping is done to prevent unauthorized IP addresses being offered
by unauthorized servers. This features allows only specific mac addresses and IP addresses to
access the network.
DNS
Answer: a
Explanation: An entire hostname can have a maximum of 255 characters. Although each label
must be from 1 to 63 characters long. Host name is actually a label that is given to a device in a
network.
Answer: b
Explanation: Whenever a request is received at server from other domains, it handles this
situation by contacting remote DNS server.
Answer: d
Explanation: Domain Name system not only deals with mapping IP addresses with the
hostname but also deals with exchange of information in the server.
5. If a server has no clue about where to find the address for a hostname then _______
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Answer: a
Explanation: Root name servers are actually very important and critical as they are the first step
in translating human readable hostnames into IP addresses for carrying out communication.
6. Which one of the following allows client to update their DNS entry as their IP address
change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Answer: a
Explanation: Dynamic DNS or in short DDNS or DynDNS helps in automatically updating a
name server in the DNS. This does not require manual editing.
Answer: b
Explanation: A wildcard DNS record matches requests to a non existent domain name. This
wildcard DNS record is specified by using asterisk “*” as the starting of a domain name.
8. The right to use a domain name is delegated by domain name registers which are accredited
by _______
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Answer: d
Explanation: The ICANN (Internet Corporation for Assigned Names and Numbers) deals with IP
address space allocation, protocol identifier assignment
Answer: a
Explanation: A domain name system is maintained by a distributed database system. It is a
collection of multiple, logically interrelated databases distributed over a computer network.
Answer: c
Explanation: It need not be that a single hostname will correspond to a ip address. For example
facebook.com and fb.com both correspond to same ip address. So there can be multiple
hostnames for a single ip address.