Você está na página 1de 21

Multiple Choice Questions of Computer Networking B.

Transport layer
1-1 Computer Network is C. Network layer
A. Collection of hardware components and computers D. Datalink layer
B. Interconnected by communication channels 2-3 _______ provides a connection-oriented reliable
C. Sharing of resources and information service for sending messages
D. All of the Above A. TCP
1-2 What is a Firewall in Computer Network? B. IP
A. The physical boundary of Network C. UDP
B. An operating System of Computer Network D. All of the above
C. A system designed to prevent unauthorized access 2-4 Which layers of the OSI model are host-to-host
D. A web browsing Software layers?
1-3 How many layers does OSI Reference Model has? A. Transport, Session, Persentation, Application
A. 4 B. Network, Transport, Session, Presentation
B. 5 C. Datalink, Network, Transport, Session
C. 6 D. Physical, Datalink, Network, Transport
D. 7 2-5 which of the following IP address class is Multicast
1-4 DHCP is the abbreviation of A. Class A
A. Dynamic Host Control Protocol B. Class B
B. Dynamic Host Configuration Protocol C. Class C
C. Dynamic Hyper Control Protocol D. Class D
D. Dynamic Hyper Configuration Protocol 2-6 which of the following is correct regarding Class B
1-5 IPV4 Address is Address of IP address
A. 8 bit A. Network bit – 14, Host bit – 16
B. 16 bit B. Network bit – 16, Host bit – 14
C. 32 bit C. Network bit – 18, Host bit – 16
D. 64 bit D. Network bit – 12, Host bit – 14
1-6 DNS is the abbreviation of 2-7 The last address of IP address represents
A. Dynamic Name System A. Unicast address
B. Dynamic Network System B. Network address
C. Domain Name System C. Broadcast address
D. Domain Network Service D. None of above
1-7 What is the meaning of Bandwidth in Network? 2-8 How many bits are there in the Ethernet address?
A. Transmission capacity of a communication channels A. 64 bits
B. Connected Computers in the Network B. 48 bits
C. Class of IP used in Network C. 32 bits
D. None of Above D. 16 bits
1-8 ADSL is the abbreviation of 2-9 How many layers are in the TCP/IP model?
A. Asymmetric Dual Subscriber Line A. 4 layers
B. Asymmetric Digital System Line B. 5 layers
C. Asymmetric Dual System Line C. 6 layers
D. Asymmetric Digital Subscriber Line D. 7 layers
1-9 What is the use of Bridge in Network? 2-10 Which of the following layer of OSI model also
A. to connect LANs called end-to-end layer?
B. to separate LANs A. Presentation layer
C. to control Network Speed B. Network layer
D. All of the above C. Session layer
1-10 Router operates in which layer of OSI Reference D. Transport layer
Model? Click Here for Answers
A. Layer 1 (Physical Layer) 1–C/2–D/3–A/4–A/5–D/6–A/7–C/8–B/
B. Layer 3 (Network Layer) 9 – A / 10 – D
C. Layer 4 (Transport Layer) Multiple Choice Questions of Computer Networking
D. Layer 7 (Application Layer) 3-1. Why IP Protocol is considered as unreliable?
Click Here for Answers A. A packet may be lost
1–D/2–C/3–D/4–B/5–C/6–C/7–A/8–D/ B. Packets may arrive out of order
9 – A / 10 – B C. Duplicate packets may be generated
Multiple Choice Questions of Computer Networking D. All of the above
2-1 Each IP packet must contain 3-2. What is the minimum header size of an IP packet?
A. Only Source address A. 16 bytes
B. Only Destination address B. 10 bytes
C. Source and Destination address C. 20 bytes
D. Source or Destination address D. 32 bytes
2-2 Bridge works in which layer of the OSI model? 3-3. Which of following provides reliable
A. Appliation layer communication?

1
A. TCP 4-4. Which of the following can be Software?
B. IP A. Routers
C. UDP B. Firewalls
D. All of the above C. Gateway
3-4. What is the address size of IPv6 ? D. Modems
A. 32 bit 4-5. What is the use of Ping command?
B. 64 bit A. To test a device on the network is reachable
C. 128 bit B. To test a hard disk fault
D. 256 bit C. To test a bug in a Application
3-5. What is the size of Network bits & Host bits of D. To test a Pinter Quality
Class A of IP address? 4-6. MAC Address is the example of
A. Network bits 7, Host bits 24 A. Transport Layer
B. Network bits 8, Host bits 24 B. Data Link Layer
C. Network bits 7, Host bits 23 C. Application Layer
D. Network bits 8, Host bits 23 D. Physical Layer
3-6. What does Router do in a network? 4-7. Routing tables of a router keeps track of
A. Forwards a packet to all outgoing links A. MAC Address Assignments
B. Forwards a packet to the next free outgoing link B. Port Assignments to network devices
C. Determines on which outing link a packet is to be C. Distribute IP address to network devices
forwarded D. Routes to use for forwarding data to its destination
D. Forwards a packet to all outgoing links except the 4-8. Layer-2 Switch is also called
originated link A. Multiport Hub
3-7. The Internet is an example of B. Multiport Switch
A. Cell switched network C. Multiport Bridge
B. circuit switched network D. Multiport NIC
C. Packet switched network 4-9. Difference between T568A and T568B is
D. All of above A. Difference in wire color
3-8. What does protocol defines? B. Difference in number of wires
A. Protocol defines what data is communicated. C. Just different length of wires
B. Protocol defines how data is communicated. D. Just different manufacturer standards
C. Protocol defines when data is communicated. 4-10. The meaning of Straight-through Cable is
D. All of above A. Four wire pairs connect to the same pin on each end
3-9. What is the uses of subnetting? B. The cable Which Directly connects Computer to
A. It divides one large network into several smaller ones Computer
B. It divides network into network classes C. Four wire pairs not twisted with each other
C. It speeds up the speed of network D. The cable which is not twisted
D. None of above Click Here for Answers
3-10. Repeater operates in which layer of the OSI 1–D/2–B/3–C/4–B/5–A/6–B/7–D/8–C/
model? 9 – D / 10 – A
A. Physical layer Multiple Choice Questions of Computer Networking
B. Data link layer 5-1 Which of the following is not the External Security
C. Network layer Threats?
D. Transport layer A. Front-door Threats
Click Here for Answers B. Back-door Threats
1–D/2–C/3–A/4–C/5–A/6–C/7–C/8–D/ C. Underground Threats
9 – A / 10 – A D. Denial of Service (DoS)
Multiple C===hoice Questions of Computer Networking 5-2 What is the Demilitarized Zone?
4-1. What is the benefit of the Networking? A. The area between firewall & connection to an
A. File Sharing external network
B. Easier access to Resources B. The area between ISP to Military area
C. Easier Backups C. The area surrounded by secured servers
D. All of the Above D. The area surrounded by the Military
4-2. Which of the following is not the Networking 5-3 What is the full form of RAID ?
Devices? A. Redundant Array of Independent Disks
A. Gateways B. Redundant Array of Important Disks
B. Linux C. Random Access of Independent Disks
C. Routers D. Random Access of Important Disks
D. Firewalls 5-4 What is the maximum header size of an IP packet?
4-3. What is the size of MAC Address? A. 32 bytes
A. 16-bits B. 64 bytes
B. 32-bits C. 30 bytes
C. 48-bits D. 60 bytes
D. 64-bits

2
5-5 What is the size of Host bits in Class B of IP A. Class A includes Class B network
address? B. There are only two networks
A. 04 C. There are high & low class network
B. 08 D. There is no concept of class A, B, C networks
C. 16 6-6. What is the size of Source and Destination IP
D. 32 address in IP header?
5-6 What is the usable size of Network bits in Class B of A. 4 bits
IP address? B. 8 bits
A. 04 C. 16 bits
B. 08 D. 32 bits
C. 14 6-7. Which of the following is reliable communication?
D. 16 A. TCP
5-7 In which type of RAID, data is mirrored between B. IP
two disks. C. UPD
A. RAID 0 D. All of them
B. RAID 1 6-8. What is the typical range of Ephemeral ports?
C. RAID 2 A. 1 to 80
D. RAID 3 B. 1 to 1024
5-8 What do you mean by broadcasting in Networking? C. 80 to 8080
A. It means addressing a packet to all machine D. 1024 to 65535
B. It means addressing a packet to some machine 6-9. What is the purpose of the PSH flag in the TCP
C. It means addressing a packet to a particular machine header?
D. It means addressing a packet to except a particular A. Typically used to indicate end of message
machine B. Typically used to indicate beginning of message
5-9 Which of the following is/are Protocols of C. Typically used to push the message
Application? D. Typically used to indicate stop the message
A. FTP 6-10. What is the natural mask for a class C Network?
B. DNS A. 255.255.255.1
C. Telnet B. 255.255.255.0
D. All of above C. 255.255.255.254
5-10 Which of the following protocol is/are defined in D. 255.255.255.255
Transport layer? Click Here for Answers
A. FTP 1–C/2–A/3–A/4–B/5–D/6–D/7–A/8–D/
B. TCP 9 – A / 10 – B
C. UDP
D. B & C 1. When collection of various computers seems a single
Click Here for Answers coherent system to its
1–C/2–A/3–A/4–D/5–C/6–C/7–B/8–A/ client, then it is called
9 – D / 10 – D a) computer network
Multiple Choice Questions of Computer Networking b) distributed system
6-1. What is the IP Address range of APIPA? c) both (a) and (b)
A. 169.254.0.1 to 169.254.0.254 d) none of the mentioned
B. 169.254.0.1 to 169.254.0.255 View Answer
C. 169.254.0.1 to 169.254.255.254 Answer:b
D. 169.254.0.1 to 169.254.255.255 Explanation:None.
6-2. Which of the following is correct in VLSM? 2. Two devices are in network if
A. Can have subnets of different sizes a) a process in one device is able to exchange
B. Subnets must be in same size information with a process in
C. No required of subnet another device
D. All of above b) a process is running on both devices
6-3. What does the port number in a TCP connection c) PIDs of the processes running of different devices are
specify? same
A. It specifies the communication process on the two d) none of the mentioned
end systems View Answer
B. It specifies the quality of the data & connection Answer:a
C. It specify the size of data Explanation:None.
D. All of the above 3. Which one of the following computer network is built
6-4. The class-based addressing is also known as on the top of another
A. Modern Model network?
B. Classful Model a) prior network
C. Classless Model b) chief network
D. Heterogeneous Model c) prime network
6-5. Which of the following is correct in CIDR? d) overlay network

3
View Answer 1) Which of this is not a guided media ?
Answer:d a) Fiber optical cable
4. In computer network nodes are b) Coaxial cable
a) the computer that originates the data c) Wireless LAN
b) the computer that routes the data d) Copper wire
c) the computer that terminates the data View Answer
d) all of the mentioned Answer: c
View Answer Explanation: Wireless LAN is unguided media.
5. Communication channel is shared by all the machines 2) UTP is commonly used in
on the network in a) DSL
a) broadcast network b) FTTP
b) unicast network c) HTTP
c) multicast network d) None of the mentioned
d) none of the mentioned View Answer
View Answer Answer: a
Answer:a Explanation: Unshielded twisted pair(UTP) is commonly
Explanation:None. used in home access.
6. Bluetooth is an example of 3) Coaxial cable consists of _______ concentric copper
a) personal area network conductors.
b) local area network a) 1
c) virtual private network b) 2
d) none of the mentioned c) 3
View Answer d) 4
Answer:a View Answer
Explanation:None. Answer: b
7. A _____ is a device that forwards packets between Explanation: None.
networks by processing 4) Fiber optics posses following properties
the routing information included in the packet. a) Immune electromagnetic interference
a) bridge b) Very less signal attenuation
b) firewall c) Very hard to tap
c) router d) All of the mentioned
d) all of the mentioned View Answer
View Answer Answer: d
Answer:c Explanation: None.
Explanation:None. 5) If an Optical Carrier is represented as OC-n, generally
8. A list of protocols used by a system, one protocol per the link speed equals(in
layer, is called Mbps),
a) protocol architecture a) n*39.8
b) protocol stack b) n*51.8
c) protocol suit c) 2n*51.8
d) none of the mentioned d) None of the mentioned
View Answer View Answer
Answer:b Answer: b
Explanation:None. Explanation: None.
9. Network congestion occurs 6) Terrestrial radio channels are broadly classifed into
a) in case of traffic overloading _____ groups.
b) when a system terminates a) 2
c) when connection between two nodes terminates b) 3
d) none of the mentioned c) 4
View Answer d) 1
Answer:a View Answer
Explanation:None. Answer: b
10. Which one of the following extends a private Explanation: The three types are those that operate over
network across public networks? very short distance, those that operate in local areas,
a) local area network those that
b) virtual private network operate in the wide area.
c) enterprise private network 7) Radio channels are attractive medium because
d) storage area network a) Can penetrate walls
View Answer b) Connectivity can be given to mobile user
Answer:b c) Can carry signals for long distance
Explanation:None. d) All of the mentioned
This set of Computer Networks Questions & Answers View Answer
focuses on “Physical Media”. Answer: d

4
Explanation: None. Answer:a
8) Geostationary satellites Explanation:None.
a) Are placed at a fixed point above the earth 7. Which one of the following is not used to generate
b) Rotate the earth about a fixed axis dynamic web pages?
c) Rotate the earth about a varying axis a) PHP
d) All of the mentioned b) ASP.NET
View Answer c) JSP
Answer: a d) none of the mentioned
Explanation: They are placed in orbit at 36,000km above View Answer
Earth’s surface. 8. An alternative of javascript on windows platform is
1. A piece of icon or image on a web page associated a) VBScript
with another webpage is b) ASP.NET
called c) JSP
a) url d) none of the mentioned
b) hyperlink View Answer
c) plugin Answer:a
d) none of the mentioned Explanation:None.
View Answer 9. What is document object model (DOM)?
Answer:b a) convention for representing and interacting with
Explanation:None. objects in html documents
2. Dynamic web page b) application programming interface
a) is same every time whenever it displays c) hierarchy of objects in ASP.NET
b) generates on demand by a program or a request from d) none of the mentioned
browser View Answer
c) both (a) and (b) Answer:a
d) none of the mentioned Explanation:None.
View Answer 10. AJAX stands for
Answer:b a) asynchronous javascript and xml
Explanation:None. b) advanced JSP and xml
3. What is a web browser? c) asynchronous JSP and xml
a) a program that can display a web page d) advanced javascript and xml
b) a program used to view html documents View Answer
c) it enables user to access the resources of internet Answer:a
d) all of the mentioned Explanation:None.
View Answer 1. Multiple object can be sent over a TCP connection
Answer:d between client and server
Explanation:None. in
4. Common gateway interface is used to a) persistent HTTP
a) generate executable files from web content by web b) nonpersistent HTTP
server c) both (a) and (b)
b) generate web pages d) none of the mentioned
c) stream videos View Answer
d) none of the mentioned Answer:a
View Answer Explanation:None.
Answer:a 2. HTTP is ________ protocol.
Explanation:None. a) application layer
5. URL stands for b) transport layer
a) unique reference label c) network layer
b) uniform reference label d) none of the mentioned
c) uniform resource locator View Answer
d) unique resource locator Answer:a
View Answer Explanation:None.
Answer:c 3. In the network HTTP resources are located by
Explanation:None. a) uniform resource identifier
6. A web cookie is a small piece of data b) unique resource locator
a) sent from a website and stored in user’s web browser c) unique resource identifier
while a user is browsing d) none of the mentioned
a website View Answer
b) sent from user and stored in the server while a user is Answer:a
browsing a website Explanation:None.
c) sent from root server to all servers 4. HTTP client requests by establishing a __________
d) none of the mentioned connection to a particular
View Answer port on the server.

5
a) user datagram protocol b) IP address
b) transmission control protocol c) both (a) and (b)
c) broader gateway protocol d) none of the mentioned
d) none of the mentioned View Answer
View Answer Answer:a
Answer:b Explanation:None.
Explanation:None. 2. What is stat frame delimeter (SFD) in ethernet frame?
5. In HTTP pipelining a) 10101010
a) multiple HTTP requests are sent on a single TCP b) 10101011
connection without waiting c) 00000000
for the corresponding responses d) 11111111
b) multiple HTTP requests can not be sent on a single View Answer
TCP connection Answer:b
c) multiple HTTP requests are sent in a queue on a single Explanation:None.
TCP connection 3. MAC address is of
d) none of the mentioned 1) 24 bits
View Answer b) 36 bits
Answer:a c) 42 bits
Explanation:None. d) 48 bits
6. FTP server listens for connection on port number View Answer
a) 20 Answer:d
b) 21 Explanation:None.
c) 22 4. What is autonegotiation?
d) 23 a) a procedure by which two connected devices choose
View Answer common transmission
Answer:b parameters
Explanation:None. b) a security algorithm
7. In FTP protocol, client contacts server using ____ as c) a routing algorithm
the transport protocol. d) none of the mentioned
a) transmission control protocol View Answer
b) user datagram protocol Answer:a
c) datagram congestion control protocol Explanation:None.
d) stream control transmission protocol 5. Ethernet in metropolitan area network (MAN) can be
View Answer used as
Answer:a a) pure ethernet
Explanation:None. b) ethernet over SDH
8. In which mode FTP, the client initiates both the c) ethernet over MPLS
control and data connections. d) all of the mentioned
a) active mode View Answer
b) passive mode Answer:d
c) both (a) and (b) Explanation:None.
d) none of the mentioned 6. A point-to-point protocol over ethernet is a network
View Answer protocol for
Answer:b a) encapsulating PPP frames inside ethernet frames
Explanation:None. b) encapsulating ehternet framse inside PPP frames
9. The file transfer protocol is built on c) for security of ethernet frames
a) data centric architecture d) for security of PPP frames
b) service oriented architecture View Answer
c) client server architecture Answer:a
d) none of the mentioned Explanation:None.
View Answer 7. High speed ethernet works on
Answer:c a) coaxial cable
Explanation:None. b) twisted pair cable
10. In file transfer protocol, data transfer can be done in c) optical fiber
a) stream mode d) none of the mentioned
b) block mode View Answer
c) compressed mode Answer:c
d) all of the mentioned Explanation:None.
View Answer 8. The maximum size of payload field in ethernet frame
Answer:d is
Explanation:None. a) 1000 bytes
1. Ethernet frame consists of b) 1200 bytes
a) MAC address c) 1300 bytes

6
d) 1500 bytes d) None of the mentioned
View Answer View Answer
Answer:d Answer: a
Explanation:None. Explanation: None.
9. What is interframe gap? 6) Expand WAN
a) idle time between frames a) World area network
b) idle time between frame bits b) Wide area network
c) idle time between packets c) Web area network
d) none of the mentioned d) None of the mentioned
View Answer View Answer
Answer:a Answer: b
Explanation:None. Explanation: None.
10. An ethernet frame that is less than the IEEE 802.3 Computer Networks Questions & Answers – Packet
minimum length of 64 Switching & Circuit
octets is called Switching
a) short frame This set of Computer Networks Questions & Answers
b) run frame focuses on “Packet Switching and Circuit Switching”.
c) mini frame 1) A local telephone network is an example of a _______
d) man frame network
View Answer a) Packet switched
Answer:b b) Circuit switched
Explanation:None. c) both of the mentioned
This set of Computer Networks Questions & Answers d) none of the mentioned
focuses on “Topology”. View Answer
1) Physical or logical arrangement of network is Answer: a
a) Topology Explanation: None.
b) Routing 2) Most packet switches use this principle
c) Networking a) Stop and wait
d) None of the mentioned b) Store and forward
View Answer c) Both of the mentioned
Answer: a d) None of the mentioned
Explanation: None. View Answer
2) In this topology there is a central controller or hub Answer: b
a) Star Explanation: The packet switch will not transmit the first
b) Mesh bit to outbound link until it recieves the entire packet.
c) Ring 3) If there are N routers from source to destination, total
d) Bus end to end delay in sending packet P(L->number of
View Answer bits in the packet R-> transmission rate)
Answer: a a) N
Explanation: None. b) (N*L)/R
3) This topology requires multipoint connection c) (2N*L)/R
a) Star d) L/R
b) Mesh View Answer
c) Ring Answer: b
d) Bus Explanation: None.
View Answer 4) Method(s) to move data through a network of links
Answer: d and switches
Explanation: None. a) Packet switching
4) Data communication system spanning states, b) Circuit switching
countries, or the whole world is c) Line switching
a) LAN d) Both a and b
b) WAN View Answer
c) MAN Answer: d
d) None of the mentioned Explanation: None.
View Answer 5) The resources needed for communication between
Answer: b end systems are reserved for the duration of session
Explanation:Wide area network(WAN) covers the whole between end systems in ________
of the world network. a) Packet switching
5) Data communication system within a building or b) Circuit switching
campus is c) Line switching
a) LAN d) Frequency switching
b) WAN View Answer
c) MAN Answer: b

7
Explanation: None. d) None of the mentioned
6) As the resouces are reserved between two View Answer
communicating end systems in circuit switching, this is Answer: c
achieved Explanation: Data field usually has tranaport layer
a) authentication segment, but it can also carry ICMP messages.
b) guaranteed constant rate 6. What should be the flag value to indicate the last
c) reliability fragment?
d) store and forward a) 0
View Answer b) 1
Answer: b c) TTl value
Explanation: None. d) None of the mentioned
7) In _________ resources are allocated on demand. View Answer
a) packet switching Answer: a
b) circuit switching Explanation: flag=0 indicates that it is the last fragment.
c) line switching 7. Which of these is not applicable for IP protocol?
d) frequency switching a) is connectionless
View Answer b) offer reliable service
Answer: a c) offer unreliable service
Explanation: In packet switching there is no reservation. d) None of the mentioned
Computer Networks Questions & Answers – IPv4 View Answer
This set of Computer Networks Questions & Answers Answer: b
focuses on “IPv4″. Explanation: Ip offers unreliable service.
1. Which of the following is not applicable for IP? 8. Fragmentation has following demerits
a) Error reporting a) complicates routers
b) Handle addressing conventions b) open to DOS attack
c) Datagram format c) overlapping of fragments.
d) Packet handling conventions d) All of the mentioned
View Answer View Answer
Answer: a Answer: d
Explanation: Error reporting is handled by ICMP. Explanation: Fragmentation makes the implementation
2. Which of the following field in IPv4 datagram is not complex and also can create DOS attack.
related to fragmentation? 9. Which field helps to check rearrangement of the
a) Flags fragments?
b) Offset a) offset
c) TOS b) flag
d) Identifier c) TTL
View Answer d) identifer
Answer: c View Answer
Explanation: TOS-type of service identifies the type of Answer: a
packets. Explanation: offset field specifies where the fragment
3. The TTL field has value 10. How many routers (max) fits in the original datagram.
can process this datagram? Computer Networks Questions & Answers – IPv6
a) 11 This set of Computer Networks Questions & Answers
b) 5 focuses on “IPv6″.
c) 10 1. The size of IP address in IPv6 is
d) 1 a) 4bytes
View Answer b) 128bits
Answer: c c) 8bytes
Explanation: TTL field is decremented by one each time d) 100bits
the datagram is processed by a router. View Answer
4. If the value in protocol field is 17, the transport layer Answer: b
protocol used is ____. Explanation: An IPv6 address is 128 bits long.
a) TCP 2. The header length of an IPv6 datagram is _____.
b) UDP a) 10bytes
c) Either of the mentioned b) 25bytes
d) None of the mentioned c) 30bytes
View Answer d) 40bytes
Answer: b View Answer
Explanation: For TCP it is 6. Answer: d
5. The data field can carry which of the following? Explanation: IPv6 datagram has fixed header length of
a) TCP segemnt 40bytes, which results is faster processing of the
b) UDP segment datagram.
c) ICMP messages

8
3. In the IPv6 header,the traffic class field is similar to c) 80 to 95
which field in the IPv4 header? d) 64 to 79
a) Fragmentation field View Answer
b) Fast-switching Answer: a
c) ToS field Explanation: Bits 96 to 127 in the datagram represents
d) Option field obfuscated 1Pv4 address.
View Answer Computer Networks Questions & Answers – Internet
Answer: c This section of our 1000+ Computer Networks MCQs
Explanation: This field enables to have different types of focuses on Internet.
IP datagram. 1. What is internet?
4. IPv6 doesnot use ______ type of address a) a single network
a) Broadcast b) a vast collection of different networks
b) Multicast c) interconnection of local area networks
c) Anycast d) none of the mentioned
d) None of the mentioned View Answer
View Answer Answer:b
Answer: a Explanation:None.
Explanation: Broadcast has been eliminated in IPv6. 2. To join the internet, the computer has to be
5. These are the features present in IPv4 but not in IPv6. connected to a
a) Fragmentation a) internet architecture board
b) Header checksum b) internet society
c) Options c) internet service provider
d) All of the mentioned d) none of the mentioned
View Answer View Answer
Answer: d Answer:c
Explanation: All the features are only present in IPv4 and Explanation:None.
not IPv6. 3. Internet access by transmitting digital data over the
6. The ____ field determines the lifetime of IPv6 wires of a local telephone network is provided by
datagram a) leased line
a) Hop limit b) digital subscriber line
b) TTL c) digital signal line
c) Next header d) none of the mentioned
d) None of the mentioned View Answer
View Answer Answer:b
Answer: a Explanation:None.
Explanation: The Hop limit value is decremented by one 4. ISP exchanges internet traffic between their networks
by a router when the datagram is forwaded by the by
router. When the a) internet exchange point
value becomes zero the datagram is discarded. b) subscriber end point
7. Dual-stack approach refers to c) ISP end point
a) Implementing Ipv4 with 2 stacks d) none of the mentioned
b) Implementing Ipv6 with 2 stacks View Answer
c) Node has both IPv4 and IPv6 support Answer:a
d) None of the mentioned Explanation:None.
View Answer 5. Which one of the following protocol is not used in
Answer: c internet?
Explanation: dual-stack is one of the approach used to a) HTTP
support IPv6 in already existing systems. b) DHCP
8. Suppose two IPv6 nodes want to interoperate using c) DNS
IPv6 datagrams but are connected to each other by d) none of the mentioned
intervening IPv4 routers. The best solution here is View Answer
a) use dual-stack approach Answer:d
b) Tunneling Explanation:None.
c) No solution 6. IPv6 addressed have a size of
d) Replace the system a) 32 bits
View Answer b) 64 bits
Answer: b c) 128 bits
Explanation: The IPv4 routers can form a tuunel. d) 265 bits
9. Teredo is an automatic tunneling technique. In each View Answer
client the obfuscated IPv4 address is represented by Answer:c
bits Explanation:None.
a) 96 to 127 7. Internet works on
b) 0 to 63 a) packet switching

9
b) circuit switching 4. IP assigned for a client by DHCP server is
c) both (a) and (b) a) for a limited period
d) none of the mentioned b) for unlimited period
View Answer c) not time dependent
Answer:a d) none of the mentioned
Explanation:None. View Answer
8. Which one of the following is not an application layer Answer:a
protocol used in internet? Explanation:None.
a) remote procedure call 5. DHCP uses UDP port ____ for sending data to the
b) internet relay chat server.
c) resource reservation protocol a) 66
d) none of the mentioned b) 67
View Answer c) 68
Answer:c d) 69
Explanation:None. View Answer
9. Which protocol assigns IP address to the client Answer:b
connected in the internet? Explanation:None.
a) DHCP 6. The DHCP server can provide the _______ of the IP
b) IP addresses.
c) RPC a) dynamic allocation
d) none of the mentioned b) automatic allocation
View Answer c) static allocation
Answer:a d) all of the mentioned
Explanation:None. View Answer
10. Which one of the following is not used in media Answer:d
access control? Explanation:None.
a) ethernet 7. DHCP client and servers on the same subnet
b) digital subscriber line communicate via
c) fiber distributed data interface a) UDP broadcast
d) none of the mentioned b) UDP unicast
View Answer c) TCP broadcast
Answer:d d) TCP unicast
Explanation:None. View Answer
Computer Networks Questions & Answers – DHCP Answer:a
This section of our 1000+ Computer Networks MCQs Explanation:None.
focuses on DHCP Protocol. 8. After obtaining the IP address, to prevent the IP
1. DHCP (dynamic host configuration protocol) provides conflict the client may use
_____ to the client. a) internet relay chat
a) IP address b) broader gateway protocol
b) MAC address c) address resolution protocol
c) url d) none of the mentioned
d) none of the mentioned View Answer
View Answer Answer:c
Answer:a Explanation:None.
Explanation:None. 9. What is DHCP snooping?
2. DHCP is used for a) techniques applied to ensure the security of an
a) IPv6 existing DHCP infrastructure
b) IPv4 b) encryption of the DHCP server requests
c) both (a) and (b) c) algorithm for DHCP
d) none of the mentioned d) none of the mentioned
View Answer View Answer
Answer:c Answer:a
Explanation:None. Explanation:None.
3. The DHCP server 10. If DHCP snooping is configured on a LAN switch, then
a) maintains a database of available IP addresses clients having specific ______ can access the
b) maintains the information about client configuration network.
parameters a) MAC address
c) grants a IP address when receives a request from a b) IP address
client c) both (a) and (b)
d) all of the mentioned d) none of the mentioned
View Answer View Answer
Answer:d Answer:c
Explanation:None. Explanation:None.

10
1) Which of this is not a constituent of residential Explanation: Active optical networks are essentially
telephone line? switched ehternets.
a) A high-speed downstream channel 8) StarBand provides
b) A medium-speed downstream channel a) FTTH internet access
c) A low-speed downstream channel b) Cable access
d) None of the mentioned c) Telephone access
View Answer d) Satellite access
Answer: c View Answer
Explanation: The third part is ordinary two way Answer: d
telephone channel. Explanation: None.
2) In DSL telco provides these services 9) Home Access is provided by
a) Wired phone access a) DSL
b) ISP b) FTTP
c) All of the mentioned c) Cable
d) None of the mentioned d) All of the mentioned
View Answer View Answer
Answer: c Answer: d
Explanation: The same company which provides phone Explanation: None.
connection is also its ISP in DSL. 10) ONT is connected to splitter using
3) The function of DSLAM is a) High speed fibre cable
a) Convert analog signals into digital signals b) HFC
b) Convert digital signals into analog signals c) Optical cable
c) Amplify digital signals d) None of the mentioned
d) None of the mentioned View Answer
View Answer Answer: c
Answer: a Explanation: None.
Explanation: The DSLAM located in telco’s Central Office 11) These factors affect transmission rate in DSL
does this function. a) The gauge of the twisted-pair line
4) The following term is not associted with DSL b) Degree of electrical interfernece
a) DSLAM c) Shadow fading
b) CO d) Both a and b
c) Splitter View Answer
d) CMTS Answer: d
View Answer Explanation: Because DSL is made of twisted wire
Answer: d copper pair.
Explanation: Cable modem termination system is used in Computer Networks Questions & Answers – Physical
cable internet access. Layer
5) HFC contains This section of our 1000+ Computer Networks MCQs
a) Fibre cable focuses on physical layer.
b) Coaxial cable 1. The physical layer concerns with
c) Both of the mentioned a) bit-by-bit delivery
d) None of the mentioned p) process to process delivery
View Answer c) application to application delivery
Answer: c d) none of the mentioned
Explanation: None. View Answer
6) Choose the statement which is not applicable for Answer:a
cable internet access Explanation:None.
a) It is a shared broadcast medium 2. Which transmission media has the highest
b) It includes HFCs transmission speed in a network?
c) Cable modem connects home PC to Ethernet port a) coaxial cable
d) Analog signal is converted to digital signal in DSLAM b) twisted pair cable
View Answer c) optical fiber
Answer: d d) electrical cable
Explanation: In cable access analog signal is converted to View Answer
digital signal by CMTS. Answer:c
7) Among the optical-distribution architectures that is Explanation:None.
essentially switched ehternet is 3. Bits can be send over guided and unguided media as
a) AON analog signal by
b) PON a) digital modulation
c) NON b) amplitude modulation
d) None of the mentioned c) frequency modulation
View Answer d) phase modulation
Answer:a View Answer

11
Answer:a Computer Networks Questions & Answers – Network
Explanation:None. Layer
4. The portion of physical layer that interfaces with the This section of our 1000+ Computer Networks MCQs
media access control sublayer is called focuses on network layer.
a) physical signalling sublayer 1. The network layer concerns with
b) physical data sublayer a) bits
c) physical address sublayer b) frames
d) none of the mentioned c) packets
View Answer d) none of the mentioned
Answer:a View Answer
Explanation:None. Answer:c
5. physical layer provides Explanation:None.
a) mechanical specifications of electrical connectors and 2. Which one of the following is not a function of
cables network layer?
b) electrical specification of transmission line signal level a) routing
c) specification for IR over optical fiber b) inter-networking
d) all of the mentioned c) congestion control
View Answer d) none of the mentioned
Answer:d View Answer
Explanation:None. Answer:d
6. In asynchronous serial communication the physical Explanation:None.
layer provides 3. The 4 byte IP address consists of
a) start and stop signalling a) network address
b) flow control b) host address
c) both (a) and (b) c) both (a) and (b)
d) none of the mentioned d) none of the mentioned
View Answer View Answer
Answer:c Answer:c
Explanation:None. Explanation:None.
7. The physical layer is responsible for 4. In virtual circuit network each packet contains
a) line coding a) full source and destination address
b) channel coding b) a short VC number
c) modulation c) both (a) and (b)
d) all of the mentioned d) none of the mentioned
View Answer View Answer
Answer:d Answer:b
Explanation:None. Explanation:None.
8. The physical layer translates logical communication 5. Which one of the following routing algorithm can be
requests from the ______ into hardware specific used for network layer design?
operations. a) shortest path algorithm
a) data link layer b) distance vector routing
b) network layer c) link state routing
c) trasnport layer d) all of the mentioned
d) application layer View Answer
View Answer Answer:d
Answer:a Explanation:None.
Explanation:None. 6. Multidestination routing
9. A single channel is shared by multiple signals by a) is same as broadcast routing
a) analog modulation b) contains the list of all destinations
b) digital modulation c) data is not sent by packets
c) multiplexing d) none of the mentioned
d) none of the mentioned View Answer
View Answer Answer:c
Answer:c Explanation:None.
Explanation:None. 7. A subset of a network that includes all the routers but
10. Wireless transmission can be done via contains no loops is called
a) radio waves a) spanning tree
b) microwaves b) spider structure
c) infrared c) spider tree
d) all of the mentioned d) none of the mentioned
View Answer View Answer
Answer:d Answer:a
Explanation:None. Explanation:None.

12
8. Which one of the following algorithm is not used for Answer:d
congestion control? Explanation:None.
a) traffic aware routing 5. An endpoint of an inter-process communication flow
b) admission control across a computer network is called
c) load shedding a) socket
d) none of the mentioned b) pipe
View Answer c) port
Answer:d d) none of the mentioned
Explanation:None. View Answer
9. The network layer protocol of internet is Answer:a
a) ethernet Explanation:None.
b) internet protocol 6. Socket-style API for windows is called
c) hypertext transfer protocol a) wsock
d) none of the mentioned b) winsock
View Answer c) wins
Answer:b d) none of the mentioned
Explanation:None. View Answer
10. ICMP is primarily used for Answer:b
a) error and diagnostic functions Explanation:None.
b) addressing 7. Which one of the following is a version of UDP with
c) forwarding congestion control?
d) none of the mentioned a) datagram congestion control protocol
View Answer b) stream control transmission protocol
Answer:a c) structured stream transport
Explanation:None. d) none of the mentioned
Computer Networks Questions & Answers – Transport View Answer
Layer Answer:a
This section of our 1000+ Computer Networks MCQs Explanation:None.
focuses transport layer. 8. A _____ is a TCP name for a transport service access
1. Transport layer aggregates data from different point.
applications into a single stream before passing it to a) port
a) network layer b) pipe
b) data link layer c) node
c) application layer d) none of the mentioned
d) physical layer View Answer
View Answer Answer:a
Answer:a Explanation:None.
Explanation:None. 9. Transport layer protocols deals with
2. Which one of the following is a transport layer a) application to application communication
protocol used in internet? b) process to process communication
a) TCP c) node to node communication
b) UDP d) none of the mentioned
c) both (a) and (b) View Answer
d) none of the mentioned Answer:b
View Answer Explanation:None.
Answer:c 10. Which one of the following is a transport layer
Explanation:None. protocol?
3. User datagram protocol is called connectionless a) stream control transmission protocol
because b) internet control message protocol
a) all UDP packets are treated independently by c) neighbor discovery protocol
transport layer d) dynamic host configuration protocol
b) it sends data as a stream of related packets View Answer
c) both (a) and (b) Answer:a
d) none of the mentioned Explanation:None.
View Answer Computer Networks Questions & Answers – Application
Answer:a Layer
Explanation:None. This section of our 1000+ Computer Networks MCQs
4. Transmission control protocol is focuses on application layer.
a) connection oriented protocol 1. The ____ translates internet domain and host names
b) uses a three way handshake to establish a connection to IP address.
c) recievs data from application as a single stream a) domain name system
d) all of the mentioned b) routing information protocol
View Answer c) network time protocol

13
d) internet relay chat c) session maintenance protocol
View Answer d) none of the mentioned
Answer:a View Answer
Explanation:None. Answer:a
2. Which one of the following allows a user at one site to Explanation:None.
establish a connection to another site and then pass 9. Which one of the following is not correct?
keystrokes from local host to remote host? a) application layer protocols are used by both source
a) HTTP and destination devices during a communication session
b) FTP b) application layer protocols implemented on the
c) telnet source and destination host must match
d) none of the mentioned c) both (a) and (b)
View Answer d) none of the mentioned
Answer:c View Answer
Explanation:None. Answer:c
3. Application layer protocol defines Explanation:None.
a) types of messages exchanged 10. When displaying a web page, the application layer
b) message format, syntax and semantics uses the
c) rules for when and how processes send and respond a) HTTP protocol
to messages b) FTP protocol
d) all of the mentioned c) SMTP protocol
View Answer d) none of the mentioned
Answer:d View Answer
Explanation:None. Answer:a
4. Which one of the following protocol delivers/stores Explanation:None.
mail to reciever server? Computer Networks Questions & Answers – Application
a) simple mail transfer protocol Layer
b) post office protocol This set of Computer Networks Questions & Answers
c) internet mail access protocol focuses on “Application Layer”.
d) hypertext transfer protocol 1) This is not a application layer protocol
View Answer a) HTTP
Answer:a b) SMTP
Explanation:None. c) FTP
5. The ASCII encoding of binary data is called d) TCP
a) base 64 encoding View Answer
b) base 32 encoding Answer: d
c) base 16 encoding Explanation: TCP is transport layer protocol
d) base 8 encoding 2) The packet of information at the application layer is
View Answer called
Answer:a a) Packet
Explanation:None. b) Message
6. Which one of the following is an internet standard c) Segment
protocol for managing devices on IP network? d) Frame
a) dynamic host configuration protocol View Answer
b) simple newtwork management protocol Answer: b
c) internet message access protocol Explanation: None.
d) media gateway protocol 3) This is one of the architecture paradigm
View Answer a) Peer to peer
Answer:b b) Client-server
Explanation:None. c) HTTP
7. Which one of the following is not an application layer d) Both a and b
protocol? View Answer
a) media gateway protocol Answer: d
b) dynamic host configuration protocol Explanation: HTTP is a protocol.
c) resource reservation protocol 4) Application developer has permission to decide the
d) session initiation protocol following on transport layer side
View Answer a) Transport layer protocol
Answer:c b) Maximum buffer size
Explanation:None. c) Both of the mentioned
8. Which protocol is a signalling communication protocol d) None of the mentioned
used for controlling multimedia communication View Answer
sessions? Answer: c
a) session initiation protocol Explanation: None.
b) session modelling protocol 5) Application layer offers _______ service

14
a) End to end a) SMTP
b) Process to process b) HTTP
c) Both of the mentioned c) FTP
d) None of the mentioned d) SIP
View Answer View Answer
Answer: a Answer: a
Explanation: None. Explanation: None.
6) E-mail is Computer Networks Questions & Answers – HTTP
a) Loss-tolerant application This set of Computer Networks Questions & Answers
b) Bandwidth-sensitive application focuses on “HTTP”.
c) Elastic application 1. The number of objects in a Web page which consists
d) None of the mentioned of 4 jpeg images and HTML text is ______
View Answer a) 4
Answer: c b) 1
Explanation: Because it can work with available c) 5
throughput. d) None of the mentioned
7) Pick the odd one out View Answer
a) File transfer Answer: c
b) File download Explanation: 4 jpeg images + 1 base HTML file.
c) E-mail 2. The default connection type used by HTTP is _____
d) Interactive games a) Persistent
View Answer b) Non-persistent
Answer: d c) Either of the mentioned
Explanation: Internet telephony is Loss-tolerant other d) None of the mentioned
applications are not. View Answer
8) Which of the following is an application layer service ? Answer: a
a) Network virtual terminal Explanation: None.
b) File transfer, access, and management 3. The time taken by a packet to travel from client to
c) Mail service server and then back to the client is called ____
d) All of the mentioned a) STT
View Answer b) RTT
Answer: d c) PTT
Explanation: None. d) None of the mentioned
9) To deliver a message to the correct application View Answer
program running on a host, the _______ address must Answer: b
be Explanation: RTT stands for round-trip time.
consulted 4. The HTTP request message is sent in ____ part of
a) IP three-way handshake.
b) MAC a) First
c) Port b) Second
d) None of the mentioned c) Third
View Answer d) None of the mentioned
Answer: c View Answer
Explanation: None. Answer: c
10) This is a time-sensitive service Explanation: None.
a) File transfer 5. In the process of fetching a web page from a server
b) File download the HTTP request/response takes ______ RTTs.
c) E-mail a) 2
d) Internet telephony b) 1
View Answer c) 4
Answer: d d) 3
Explanation: Internet telephony is Loss-tolerant other View Answer
applications are not. Answer: b
11) Transport services available to applications in one or Explanation: None.
another form 6. The first line of HTTP request message is called ____
a) Reliable data transfer a) Request line
b) Timing b) Header line
c) Security c) Status line
d) All of the mentioned d) Entity line
View Answer View Answer
Answer: d Answer: a
Explanation: None.
12) Electronic mail uses this Application layer protocol

15
Explanation: The line followed by request line are called Answer: a
header lines and status line is the initial part of response Explanation: None.
message. Computer Networks Questions & Answers – Network
7. The values GET, POST, HEAD etc are specified in ____ Utilities
of HTTP message This set of Computer Networks Questions & Answers
a) Request line focuses on “Network Utilities”.
b) Header line 1) Ping can
c) Status line a) Measure round-trip time
d) Entity body b) Report packet loss
View Answer c) Report latency
Answer: a d) All of the mentioned
Explanation: It is specified in the method field of request View Answer
line in the HTTP request message. Answer: d
8. The ______ method when used in the method field, Explanation: None.
leaves entity body empty. 2) Ping sweep is a part of
a) POST a) Traceroute
b) GET b) Nmap
c) Both of the mentioned c) Route
d) None of the mentioned d) Ipconfig
View Answer View Answer
Answer: b Answer: b
Explanation: None. Explanation: A ping sweep is a method that can establish
9. The HTTP response message leaves out the requested a range of IP addresses which map to live hosts and are
object when _____ method is used mostly
a) GET used by network scanning tools like nmap.
b) POST 3) ICMP is used in
c) HEAD a) Ping
d) PUT b) Traceroute
View Answer c) Ifconfig
Answer: c d) Both a and b
Explanation: None. View Answer
10. Find the oddly matched HTTP status codes Answer: d
a) 200 OK Explanation: None.
b) 400 Bad Request 4) _____ command is used to manipulate TCP/IP routing
c) 301 Moved permanently table.
d) 304 Not Found a) route
View Answer b) Ipconfig
Answer: d c) Ifconfig
Explanation: 404 Not Found. d) Traceroute
11. Which of the following is not correct ? View Answer
a) Web cache doesnt has its own disk space Answer: a
b) Web cache can act both like server and client Explanation: None.
c) Web cache might reduce the response time 5) If you want to find the number of routers between a
d) Web cache contains copies of recently requested source and destination, the utility to be used is.
objects a) route
View Answer b) Ipconfig
Answer: a c) Ifconfig
Explanation: None. d) Traceroute
12. The conditional GET mechanism View Answer
a) Imposes conditions on the objects to be requested Answer: d
b) Limits the number of response from a server Explanation: None.
c) Helps to keep a cache upto date 6) Which of the following is related to ipconfig in
d) None of the mentioned Microsoft Windows ?
View Answer a) Display all current TCP/IP network configuration
Answer: c values
Explanation: None. b) Modify DHCP settings
13. Which of the following is present in both an HTTP c) Modify DNS settings
request line and a status line? d) All of the mentioned
a) HTTP version number View Answer
b) URL Answer: d
c) Method Explanation: None.
d) None of the mentioned 7) This allows to check if a domain is available for
View Answer registration.

16
a) Domain Check Answer: d
b) Domain Dossier Explanation: 1 control connection and other 5 for five
c) Domain Lookup file transfers.
d) None of the mentioned 6) FTP server
View Answer a) Mantains state
Answer: a b) Is stateless
Explanation: None. c) Has single TCP connection for a file transfer
8) Choose the wrong statement d) None of the mentioned
a) Nslookup is used to query a DNS server for DNS data View Answer
b) Ping is used to check connectivity Answer: a
c) Pathping combines the functionality of ping with that Explanation: None.
of route 7) The commands, from client to server, and replies,
d) Ifconfig can configure TCP/IP network interface from server to client, are sent across the control
parameters connection in ____ bit ASCII format
View Answer a) 8
Answer: c b) 7
Explanation: Pathping combines the functionality of ping c) 3
with that of traceroute (tracert). d) 5
Computer Networks Questions & Answers – FTP View Answer
This set of Computer Networks Questions & Answers Answer: b
focuses on “FTP”. Explanation: None.
1) Expansion of FTP is 8) Find the FTP reply whose message is wrongly
a) Fine Transfer Protocol matched
b) File Transfer Protocol a) 331 – Username OK, password required
c) First Transfer Protocol b) 425 – Can’t open data connection
d) None of the mentioned c) 452 – Error writing file
View Answer d) 452 – Can’t open data connection
Answer: b View Answer
Explanation: None. Answer: d
2) FTP is built on _____ architecture Explanation: None.
a) Client-server 9) Mode of data transfer in FTP, where all the is left to
b) P2P TCP
c) Both of the mentioned a) Stream mode
d) None of the mentioned b) Block mode
View Answer c) Compressed mode
Answer: a d) None of the mentioned
Explanation: None. View Answer
3) FTP uses _____ parallel TCP connections to transfer a Answer: a
file Explanation: None.
a) 1 10) The password is sent to the server using _____
b) 2 command
c) 3 a) PASSWD
d) 4 b) PASS
View Answer c) PASSWORD
Answer: b d) None of the mentioned
Explanation: Control connection and data connection. View Answer
4) Identify the incorrect statement Answer: b
a) FTP stands for File Transfer Protocol Explanation: None.
b) FTP uses two parallel TCP connections Computer Networks Questions & Answers – Network
c) FTP sends its control information in-band Attacks
d) FTP sends exactly one file over the data connection This set of Computer Networks Questions & Answers
View Answer focuses on “Network Attacks”.
Answer: c 1) The attackers a network of compromised devices
Explanation: FTP is out-of-band as it has separate known as
control connection. a) Internet
5) If 5 files are transfered from server A to client B in the b) Botnet
same session. The number of TCP connection c) Telnet
between A and B is d) D-net
a) 5 View Answer
b) 10 Answer: b
c) 2 Explanation: None.
d) 6 2) Which of the following is a form of DoS attack ?
View Answer a) Vulnerability attack

17
b) Bandwidth flooding b) IP header
c) Connection flooding c) IP payload
d) All of the mentioned d) none of the mentioned
View Answer View Answer
Answer: d Answer:a
Explanation: None. Explanation:None.
3) The DoS attack is which the attacker establishes a 3. Network layer firewall works as a
large number of half-open or fully open TCP connections a) frame filter
at the target host b) packet filter
a) Vulnerability attack c) both (a) and (b)
b) Bandwidth flooding d) none of the mentioned
c) Connection flooding View Answer
d) All of the mentioned Answer:b
View Answer Explanation:None.
Answer: c 4. Network layer firewall has two sub-categories as
Explanation: None. a) stateful firewall and stateless firewall
4)The DoS attack is which the attacker sends deluge of b) bit oriented firewall and byte oriented firewall
packets to the targeted host c) frame firewall and packet firewall
a) Vulnerability attack d) none of the mentioned
b) Bandwidth flooding View Answer
c) Connection flooding Answer:a
d) All of the mentioned Explanation:None.
View Answer 5. WPA2 is used for security in
Answer: b a) ethernet
Explanation: None. b) bluetooth
5) Packet sniffers involve c) wi-fi
a) Active receiver d) none of the mentioned
b) Passive receiver View Answer
c) Both of the mentioned Answer:c
d) None of the mentioned Explanation:None.
View Answer 6. An attempt to make a computer resource unavailable
Answer: b to its intended users is called
Explanation: They donot inject packets into the channel. a) denial-of-service attack
6) Sniffers can be deployed in b) virus attack
a) Wired environment c) worms attack
b) WiFi d) botnet process
c) Ethernet LAN View Answer
d) All of the mentioned Answer:a
View Answer Explanation:None.
Answer: d 7. Extensible authentication protocol is authentication
Explanation: None. framework frequently used in
7) Firewalls are often configured to block a) wired personal area network
a) UDP traffic b) wireless networks
b) TCP traffic c) wired local area network
c) Both of the mentioned d) none of the mentioned
d) None of the mentioned View Answer
View Answer Answer:b
Answer: a Explanation:None.
Explanation: None. 8. Pretty good privacy (PGP) is used in
Computer Networks Questions & Answers – Security In a) browser security
The Internet b) email security
This section of our 1000+ Computer Networks MCQs c) FTP security
focuses on Security In The Internet. d) none of the mentioned
1. IPSec is designed to provide the security at the View Answer
a) transport layer Answer:b
b) network layer Explanation:None.
c) application layer 9. PGP encrypts data by using a block cipher called
d) session layer a) international data encryption algorithm
View Answer b) private data encryption algorithm
Answer:b c) intrenet data encryption algorithm
Explanation:None. d) none of the mentioned
2. In tunnel mode IPsec protects the View Answer
a) entire IP packet Answer:a

18
Explanation:None. Explanation:None.
10. When a DNS server accepts and uses incorrect 7. Extensible authentication protocol is authentication
information from a host that has no authority giving that framework frequently used in
information, then it is called a) wired personal area network
a) DNS lookup b) wireless networks
b) DNS hijacking c) wired local area network
c) DNS spoofing d) none of the mentioned
d) none of the mentioned View Answer
View Answer Answer:b
Answer:c Explanation:None.
Explanation:None. 8. Pretty good privacy (PGP) is used in
Computer Networks Questions & Answers – Security In a) browser security
The Internet b) email security
This section of our 1000+ Computer Networks MCQs c) FTP security
focuses on Security In The Internet. d) none of the mentioned
1. IPSec is designed to provide the security at the View Answer
a) transport layer Answer:b
b) network layer Explanation:None.
c) application layer 9. PGP encrypts data by using a block cipher called
d) session layer a) international data encryption algorithm
View Answer b) private data encryption algorithm
Answer:b c) intrenet data encryption algorithm
Explanation:None. d) none of the mentioned
2. In tunnel mode IPsec protects the View Answer
a) entire IP packet Answer:a
b) IP header Explanation:None.
c) IP payload 10. When a DNS server accepts and uses incorrect
d) none of the mentioned information from a host that has no authority giving that
View Answer information, then it is called
Answer:a a) DNS lookup
Explanation:None. b) DNS hijacking
3. Network layer firewall works as a c) DNS spoofing
a) frame filter d) none of the mentioned
b) packet filter View Answer
c) both (a) and (b) Answer:c
d) none of the mentioned Explanation:None.
View Answer Computer Networks Questions & Answers – Wireless
Answer:b LAN
Explanation:None. This section of our 1000+ Computer Networks MCQs
4. Network layer firewall has two sub-categories as focuses on Wireless LAN.
a) stateful firewall and stateless firewall 1. What is the access point (AP) in wireless LAN?
b) bit oriented firewall and byte oriented firewall a) device that allows wireless devices to connect to a
c) frame firewall and packet firewall wired network
d) none of the mentioned b) wireless devices itself
View Answer c) both (a) and (b)
Answer:a d) none of the mentioned
Explanation:None. View Answer
5. WPA2 is used for security in Answer:a
a) ethernet Explanation:None.
b) bluetooth 2. In wireless ad-hoc network
c) wi-fi a) access point is not required
d) none of the mentioned b) access point is must
View Answer c) nodes are not required
Answer:c d) none of the mentioned
Explanation:None. View Answer
6. An attempt to make a computer resource unavailable Answer:a
to its intended users is called Explanation:None.
a) denial-of-service attack 3. Which multiple access technique is used by IEEE
b) virus attack 802.11 standard for wireless LAN?
c) worms attack a) CDMA
d) botnet process b) CSMA/CA
View Answer c) ALOHA
Answer:a d) none of the mentioned

19
View Answer This section of our 1000+ Computer Networks MCQs
Answer:b focuses on WiMAX.
Explanation:None. 1. WiMAX stands for
4. In wireless distribution system a) wireless maximum communication
a) multiple access point are inter-connected with each b) worldwide interoperability for microwave access
other c) worldwide international standard for microwave
b) there is no access point access
c) only one access point exists d) none of the mentioned
d) none of the mentioned View Answer
View Answer Answer:b
Answer:a Explanation:None.
Explanation:None. 2. WiMAX provides
5. A wireless network interface controller can work in a) simplex communication
a) infrastructure mode b) half duplex communication
b) ad-hoc mode c) full duplex communication
c) both (a) and (b) d) none of the mentioned
d) none of the mentioned View Answer
View Answer Answer:c
Answer:c Explanation:None.
Explanation:In infrastructure mode WNIC needs access 3. WiMAX uses the
point but in ad-hoc mode access point is not required. a) orthogonal frequency division multiplexing
6. In wireless network an extended service set is a set of b) time division multiplexing
a) connected basic service sets c) space division multiplexing
b) all stations d) all of the mentioned
c) all access points View Answer
d) none of the mentioned Answer:a
View Answer Explanation:None.
Answer:a 4. Which one of the following modulation scheme is
Explanation:None. supported by WiMAX?
7. Mostly ________ is used in wireless LAN. a) binary phase shift keying modulation
a) time division multiplexing b) quadrature phase shift keying modulation
b) orthogonal frequency division multiplexing c) quadrature amplitude modulation
c) space division multiplexing d) all of the mentioned
d) none of the mentioned View Answer
View Answer Answer:d
Answer:b Explanation:None.
Explanation:None. 5. WiMAX MAC layer provides an interface between
8. Which one of the following event is not possible in a) higher transport layers and physical layer
wireless LAN. b) application layer and network layer
a) collision detection c) data link layer and network layer
b) Acknowledgement of data frames d) none of the mentioned
c) multi-mode data transmission View Answer
d) none of the mentioned Answer:a
View Answer Explanation:None.
Answer:a 6. For encryption, WiMAX supports
Explanation:None. a) advanced encryption standard
9. What is Wired Equivalent Privacy (WEP) ? b) triple data encryption standard
a) security algorithm for ethernet c) both (a) and (b)
b) security algorithm for wireless networks d) none of the mentioned
c) security algorithm for usb communication View Answer
d) none of the mentioned Answer:c
View Answer Explanation:None.
Answer:b 7. WiMAX provides
Explanation:None. a) VoIP services
10. What is WPA? b) IPTV services
a) wi-fi protected access c) both (a) and (b)
b) wired protected access d) none of the mentioned
c) wired process access View Answer
d) wi-fi process access Answer:c
View Answer Explanation:None.
Answer:a 8. Devices that provide the connectivity to a WiMAX
Explanation:None. network are known as
Computer Networks Questions & Answers – WiMAX a) subscriber stations

20
b) base stations
c) gateway
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
9. WiMAX is mostly used for
a) local area network
b) metropolitan area network
c) personal area network
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
10. Which one of the following frequency is not used in
WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
View Answer
Answer:b
Explanation:None.

21

Você também pode gostar