Networking MCQS Part 3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

a) Packet switching

b) Circuit switching
c) Line switching
d) Frequency switching
View Answer
Answer: b
Explanation: None.

6) As the resouces are reserved between two communicating end systems in circuit switching, this is achieved
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
View Answer
Answer: b
Explanation: None.

7) In _________ resources are allocated on demand.


a) packet switching
b) circuit switching
c) line switching
d) frequency switching
View Answer
Answer: a
Explanation: In packet switching there is no reservation.

Computer Networks Questions & Answers – IPv4


This set of Computer Networks Questions & Answers focuses on “IPv4″.

1. Which of the following is not applicable for IP?


a) Error reporting
b) Handle addressing conventions
c) Datagram format
d) Packet handling conventions
View Answer
Answer: a
Explanation: Error reporting is handled by ICMP.
2. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
View Answer
Answer: c
Explanation: TOS-type of service identifies the type of packets.

3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.

4. If the value in protocol field is 17, the transport layer protocol used is ____.
a) TCP
b) UDP
c) Either of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: For TCP it is 6.

5. The data field can carry which of the following?


a) TCP segemnt
b) UDP segment
c) ICMP messages
d) None of the mentioned
View Answer
Answer: c
Explanation: Data field usually has tranaport layer segment, but it can also carry ICMP messages.

6. What should be the flag value to indicate the last fragment?


a) 0
b) 1
c) TTl value
d) None of the mentioned
View Answer
Answer: a
Explanation: flag=0 indicates that it is the last fragment.

7. Which of these is not applicable for IP protocol?


a) is connectionless
b) offer reliable service
c) offer unreliable service
d) None of the mentioned
View Answer
Answer: b
Explanation: Ip offers unreliable service.

8. Fragmentation has following demerits


a) complicates routers
b) open to DOS attack
c) overlapping of fragments.
d) All of the mentioned
View Answer
Answer: d
Explanation: Fragmentation makes the implementation complex and also can create DOS attack.

9. Which field helps to check rearrangement of the fragments?


a) offset
b) flag
c) TTL
d) identifer
View Answer
Answer: a
Explanation: offset field specifies where the fragment fits in the original datagram.

Computer Networks Questions & Answers – IPv6


This set of Computer Networks Questions & Answers focuses on “IPv6″.

1. The size of IP address in IPv6 is


a) 4bytes
b) 128bits
c) 8bytes
d) 100bits
View Answer
Answer: b
Explanation: An IPv6 address is 128 bits long.

2. The header length of an IPv6 datagram is _____.


a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
View Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the datagram.

3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer
Answer: c
Explanation: This field enables to have different types of IP datagram.

4. IPv6 doesnot use ______ type of address


a) Broadcast
b) Multicast
c) Anycast
d) None of the mentioned
View Answer
Answer: a
Explanation: Broadcast has been eliminated in IPv6.

5. These are the features present in IPv4 but not in IPv6.


a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned
View Answer
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6.

6. The ____ field determines the lifetime of IPv6 datagram


a) Hop limit
b) TTL
c) Next header
d) None of the mentioned
View Answer
Answer: a
Explanation: The Hop limit value is decremented by one by a router when the datagram is forwaded by the router. When the
value becomes zero the datagram is discarded.

7. Dual-stack approach refers to


a) Implementing Ipv4 with 2 stacks
b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
d) None of the mentioned
View Answer
Answer: c
Explanation: dual-stack is one of the approach used to support IPv6 in already existing systems.

8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by
intervening IPv4 routers. The best solution here is
a) use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tuunel.

9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by
bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
View Answer
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.

Computer Networks Questions & Answers – Internet


This section of our 1000+ Computer Networks MCQs focuses on Internet.

1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
View Answer
Answer:b
Explanation:None.

2. To join the internet, the computer has to be connected to a


a) internet architecture board
b) internet society
c) internet service provider
d) none of the mentioned
View Answer
Answer:c
Explanation:None.

3. Internet access by transmitting digital data over the wires of a local telephone network is provided by
a) leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
View Answer
Answer:b
Explanation:None.

4. ISP exchanges internet traffic between their networks by


a) internet exchange point
b) subscriber end point
c) ISP end point
d) none of the mentioned
View Answer
Answer:a
Explanation:None.

5. Which one of the following protocol is not used in internet?


a) HTTP
b) DHCP
c) DNS
d) none of the mentioned
View Answer
Answer:d
Explanation:None.

6. IPv6 addressed have a size of


a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
View Answer
Answer:c
Explanation:None.

7. Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Explanation:None.

8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
View Answer
Answer:c
Explanation:None.

9. Which protocol assigns IP address to the client connected in the internet?


a) DHCP
b) IP
c) RPC
d) none of the mentioned
View Answer
Answer:a
Explanation:None.

10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) none of the mentioned
View Answer
Answer:d
Explanation:None.

Computer Networks Questions & Answers – DHCP


This section of our 1000+ Computer Networks MCQs focuses on DHCP Protocol.

1. DHCP (dynamic host configuration protocol) provides _____ to the client.


a) IP address
b) MAC address
c) url
d) none of the mentioned
View Answer
Answer:a
Explanation:None.

2. DHCP is used for


a) IPv6
b) IPv4
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.

3. The DHCP server


a) maintains a database of available IP addresses
b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client
d) all of the mentioned
View Answer
Answer:d
Explanation:None.

4. IP assigned for a client by DHCP server is


a) for a limited period
b) for unlimited period
c) not time dependent
d) none of the mentioned
View Answer
Answer:a
Explanation:None.

5. DHCP uses UDP port ____ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
View Answer
Answer:b
Explanation:None.

6. The DHCP server can provide the _______ of the IP addresses.


a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned
View Answer
Answer:d
Explanation:None.

7. DHCP client and servers on the same subnet communicate via


a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
View Answer
Answer:a
Explanation:None.

8. After obtaining the IP address, to prevent the IP conflict the client may use
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
View Answer
Answer:c
Explanation:None.

9. What is DHCP snooping?


a) techniques applied to ensure the security of an existing DHCP infrastructure
b) encryption of the DHCP server requests
c) algorithm for DHCP
d) none of the mentioned
View Answer
Answer:a
Explanation:None.

10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the
network.
a) MAC address
b) IP address
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation:None.
Computer Networks Questions & Answers – Access Networks
This set of Computer Networks Questions & Answers focuses on “Access Networks”.

1) Which of this is not a constituent of residential telephone line?


a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) None of the mentioned
View Answer
Answer: c
Explanation: The third part is ordinary two way telephone channel.

2) In DSL telco provides these services


a) Wired phone access
b) ISP
c) All of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: The same company which provides phone connection is also its ISP in DSL.

3) The function of DSLAM is


a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) None of the mentioned
View Answer
Answer: a
Explanation: The DSLAM located in telco’s Central Office does this function.

4) The following term is not associted with DSL


a) DSLAM
b) CO
c) Splitter
d) CMTS
View Answer
Answer: d
Explanation: Cable modem termination system is used in cable internet access.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy