Kiet C N MCQ

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 123

Univ.

Roll No:

KIET Group of Institutions


(Department of Information Technology)
B. Tech, VIth Semester
Online CT-1 Examination, (2020-21) Even Semester
(Computer Networks) (KCS603)
Duration: 60 Minutes Max. Marks:100

NOTE:
1)Each question carries 2 marks.
2)Every correct answer has weightage of +2 marks and for every wrong answer-0.5 marks will be
deducted.

Q. No. Question Marks CO BL


What layer in the TCP/IP stack is equivalent to the Transport layer of 2 1 1
the OSI model?
1
a. Internet
b. Host to host
c. Network Access
d. Application

2 1 1
Length of Port address in TCP/IP is
2 a. 8 bit long
b. 4 bit long
c. 32 bit long
d. 16 bit long

2 1 1
TCP/IP layer is equivalent to combined Session, Presentation and
3 a. Transport layer
b. Network layer
c. Application layer
d. Physical layer
TCP/IP is extensively used model for the World Wide Web for 2 1 2
providing networkcommunications which are composed of layers
4 that work together.
a. 3
b. 6
c. 4
d. 7

2 1 2
A local telephone network is an example of a network.
5 a. Packet switched
b. Circuit switched
c. Bit switched
d. Line switched

2 1 2
The required resources for communication between end systems are
6 reserved for theduration of the session between end systems in
method.
a. Packet switched
b. Bit switched
c. Line switched
d. Circuit switched

2 1 2
In ……………. there is no resource allocation for a packet.
7 a. frame switching
b. message switching
c. circuit switching
d. datagram switching

2 1 2
A network is a cross between a circuit-switched network and a
8 datagram network. It has some characteristics of both.
a. virtual-circuit
b. packet-switched
c. None of the Given
d. frame-switched
2 1 1
The network layer in the Internet is designed as anetwork.
9 a. datagram
b. none
c. virtual-circuit
d. circuit-switched

2 1 1
A… ................ is an implementation of the same protocol in the
10 equivalent layer on aremote system.
a. Physical layer
b. peer
c. protocol stack
d. layer

State whether the following statements are true/false: 2 1 4

11 1) The standards of TCP/IP are published in a series of documents


called NFC.
2) A Protocol is an agreement between the communicating parties on
how communication is to proceed.
a. 1.F,2.T
b. 1.F, 2.F
c. 1.T, 2.T
d. 1.T, 2.F

Terminators are used intopology 2 1 1


12
a. Ring
b. Bus
c. Star
d. Mesh

……………are used for cellular phone, satellite, and wireless LAN 2 1 1


communications.
13
a. Microwaves
b. Radio waves
c. None of these
d. Infrared waves

The inner core of an optical fiber is in composition. 2 1 1

14 a. copper
b. liquid
c. glass or plastic
d. bimetallic
2 1 1
………….cable is used for voice and data communications.
15 a. Twisted-pair
b. None of These
c. Coaxial
d. Fiber-optic

…….are used for short-range communications such as those between 2 1 1


a PC and aperipheral device.
16
a. Radio waves
b. None of These
c. Microwaves
d. Infrared waves

17 2 1 1
……cables are composed of a glass or plastic inner core surrounded
by cladding,all encased in an outside jacket.
a. Fiber-optic
b. Coaxial
c. Shield Twisted Pair
d. Unshield Twisted-pair

Which of the following is not a guided medium? 2 1 1

18 a. twisted-pair cable
b. fiber-optic cable
c. coaxial cable
d. atmosphere

A group of computers and other devices connected together is called 2 1 2


19
…………….
a. Intranet
b. Network
c. None of these
d. Networking

Which of the following network is used to connect a number of 2 1 2


20
computers to eachother by cables in a single location?
a. LAN
b. Internet
c. WAN
d. MAN

The Internet addresses are ……….. bits in length in IPV4 addressing 2 1 2


21
scheme
a. 16
b. 64
c. 48
d. 32

22 The acronym OSI stands for in computer networking. 2 1 1


a. Open Systems Interconnection
b. Organization for Standards Institute
c. Organizing Systems Interconnection
d. Open Systems Interworking

23 2 1 1
In ------ topology cable is broken, networks get down.
a. Star
b. Mesh
c. Bus
d. Ring
24 2 1 1
Who developed standards for the OSI reference model?
a. ISO - International Standards Organization
b. ANSI - American National Standards Institute
c. IEEE - Institute of Electrical and Electronics Engineers
d. ACM - Association for Computing Machinery
25 2 1 1
How many layers are there in the OSI reference model of
networking?
a. 8
b. 7
c. 5
d. 4
26 Each layer of the OSI model receives services or data from a layer. 2 1 2
a. none
b. below and above layer both
c. above layer
d. below layer

27 A layer of the OSI model on one system communicates with the layer
2 of its1peer 2
system.
a. above
b. same
c. below
d. None

28 2 1 4
Choose the correct layer numbers and names of the OSI model
below.
a. Layer 3 - Network Layer, Layer 2 - Data Link Layer, Layer
1 - Physical Layer
b. Layer 7 - Application Layer, Layer 6 - Presentation Layer
c. Layer 5 - Session Layer, Layer 4 - Transport Layer
d. All given options
29 2 1 4
The layer that transmits data in the form of bit streams using
electrical and mechanicalsystems is in the OSI model.
a. Physical layer
b. Transport Layer
c. Network Layer
d. Data Link Layer
30 A device operating at network layer is called 2 1 1
a. Repeater
b. Router
c. Gateway
d. Bridge
31 2 1 1
The network topology that is bi-directional links between each
possible node.
a. Star
b. Mesh
c. Bus
d. Ring

32 A device operating at Physical layer is called 2 1 1


a. Repeater
b. Gateway
c. Router
d. Bridge

33 2 1 1
Multipoint topology is
a. Ring
b. Mesh
c. Bus
d. Star

34 2 1 1
In mesh topology, every device has a dedicated topology of
a. Point to point linking
b. Both a and b
c. Multipoint linking
d. None of given

35 Transmission media are usually categorized as . 2 1 1


a. Guided or Unguided
b. Determinate or Indeterminate
c. Fixed or Unfixed
d. Encryption or Decryption

36 2 1 1
Consists of 2 conductors twisted round each other.
a. Twisted pair cable
b. Fiber optic cable
c. Coaxial cable
d. Microwave

37 Transmission media lie below thelayer. 2 1 2


a. transport
b. application
c. physical
d. network

38 cable consists of an inner copper core and a second conducting outer 2 1 1


sheath.
a. Twisted-pair
b. Fiber-optic
c. Coaxial
d. Shielded twisted-pair

39 Attenuation and noise can impair a signal. 2 1 1


True
False
40 2 1 2
Error Control is an application layer service?
True
False

41 What are number of cable links required for the 4 devices connected 2 1 1
in mesh topology?

a. 3

b. 4

c. 6

d. 1
42 ------------------- is a set of rules governing the format and meaning of 2 1 2
the packets, or messages that are exchanged by the peer entities
within a layer.
a. Interface
b. Reference model
c. Protocol
d. None of these

43 In OSI model at which layer modulator/demodulators are used? 2 1 2


A. data link layer
B. network layer
C. session layer
D. physical Layer
44 Which of the following statements accurately describe the differences 2 1 4
between a hub and a switch? Check all that apply.
A. A switch remembers which devices are connected on each
interface, while a hub does not.
B. A hub is a physical layer device, and a switch is a data link
layer device.
C. A hub causes larger collision domains.
D. Hubs are more sophisticated versions of switches.

a. A,B

b. A,B,C

c. A,B,C,D

d. A,C,D

45 Which device uses logical addressing system? 2 1 2


a. Hub
b. Switch
c. Bridge
d. Router

46 MAC Address is the example of 2 1 1


a. Transport Layer
b. Data Link Layer
c. Application Layer
d. Physical Layer

47 A transmission mode that can transmit data in both the directions but 2 1 1
transmits in only one direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex

48 A communication between a computer and a keyboard involves 2 1 1


____________ transmission.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex

49 Telephone networks operate in this mode. 2 1 1


a) simplex
b) half duplex
c) full duplex
d) semi-duplex

50 Communication channel is shared by all the machines on the network 2 1 1


in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
51 The IETF standards documents that describe various protocols 2 1 1

applicable to the working of the Internet are called ________

a) RFC

b) RCF

c) ID

d) DFC
52 In the layer hierarchy as the data packet moves from the 2 1 1

upper to the lower layers, headers are ___________

a) Added

b) Removed

c) Rearranged

d) Modified
53 The first Network was called ________ 2 1 1

a) CNNET

b) NSFNET

c) ASAPNET

d) ARPANET
54 Three or more devices share a link in ________ connection. 2 1 2

a) Unipoint

b) Multipoint

c) Point to point

d) Simplex
55 Bluetooth is an example of __________ 2 1 2

a) personal area network

b) local area network

c) virtual private network

d) wide area network


56 A __________ is a device that forwards packets between 2 1 2

networks by processing the routing information included in

the packet.
a) bridge

b) firewall

c) router

d) hub
57 Which of the following layers is an addition to OSI model when 2 1 2

compared with TCP IP model?

a) Application layer

b) Presentation layer

c) Session layer

d) Session and Presentation layer


58 Application layer is implemented in ____________ 2 1 2

a) End system

b) NIC

c) Ethernet

d) Packet transport
59 The functionalities of the presentation layer include 2 1 1

____________

a) Data compression

b) Data encryption

c) Data description

d) All of the mentioned


60 Delimiting and synchronization of data exchange is provided 2 1 1

by __________

a) Application layer

b) Session layer

c) Transport layer

d) Link layer
61 In OSI model, when data is sent from device A to device B, the 2 1 4

5th layer to receive data at B is _________

a) Application layer
b) Transport layer

c) Link layer

d) Session layer
62 In the OSI model, as a data packet moves from the lower to 2 1 1

the upper layers, headers are _______

a) Added

b) Removed

c) Rearranged

d) Randomized
63 OSI stands for __________ 2 1 1

a) open system interconnection

b) operating system interface

c) optical service implementation

d) open service Internet


64 Which layer is responsible for process to process delivery in a 2 1 1

general network model?

a) network layer

b) transport layer

c) session layer

d) data link layer


65 Which address is used to identify a process on a host by the 2 1 1

transport layer?

a) physical address

b) logical address

c) port address

d) specific address
66 The physical layer is concerned with ___________ 2 1 1

a) bit-by-bit delivery

p) process to process delivery

c) application to application delivery


d) port to port delivery
67 Which transmission media provides the highest transmission 2 1 1

speed in a network?

a) coaxial cable

b) twisted pair cable

c) optical fiber

d) electrical cable
68 Transmission control protocol is 2 1 1
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) recievs data from application as a single stream
d) all of the mentioned

69 The physical layer provides __________ 2 1 2

a) mechanical specifications of electrical connectors and cables

b) electrical specification of transmission line signal level

c) specification for IR over optical fiber

d) all of the mentioned


70 The data link layer takes the packets from _________ and 2 1 2

encapsulates them into frames for transmission.

a) network layer

b) physical layer

c) transport layer

d) application layer
71 The network layer is concerned with __________ of data. 2 1 2

a) bits

b) frames

c) packets

d) bytes
72 Which one of the following is not a function of network layer? 2 1 1

a) routing

b) inter-networking
c) congestion control

d) error control
73 Which of the following are transport layer protocols used in 2 1 1

networking?

a) TCP and FTP

b) UDP and HTTP

c) TCP and UDP

d) HTTP and FTP


74 User datagram protocol is called connectionless because 2 1 1

_____________

a) all UDP packets are treated independently by transport

layer

b) it sends data as a stream of related packets

c) it is received in the same order as sent order

d) it sends data very quickly


75 Transmission control protocol ___________ 2 1 1

a) is a connection-oriented protocol

b) is a connectionless protocol

c) is a protocol working on application layer

d) all of the mentioned


76 What does WAN stand for? 2 1 2

Wide Area Network

World Area Network

Wide Arena Network

World Arena Network


77 An advantage of a network is 2 1 2
You can get hacked
You can share peripherals
You need to remember your password
All of the mentioned
78 Physical or logical arrangement of network is __________ 2 1 2

a) Topology

b) Routing

c) Networking

d) Control
79 Which network topology requires a central controller or hub? 2 1 1

a) Star

b) Mesh

c) Ring

d) Bus
80 Data communication system spanning states, countries, or the 2 1 1

whole world is ________

a) LAN

b) WAN

c) MAN

d) PAN
81 Data communication system within a building or campus 2 1 1

is________

a) LAN

b) WAN

c) MAN

d) PAN
82 Which of this is not a guided media? 2 1 1

a) Fiber optical cable

b) Coaxial cable

c) Wireless LAN

d) Copper wire
83 Fiber optics posses following properties __________ 2 1 1

a) Immune electromagnetic interference

b) Very less signal attenuation


c) Very hard to tap

d) All of the mentioned


84 Radio channels are attractive medium because __________ 2 1 1

a) Can penetrate walls

b) Connectivity can be given to mobile user

c) Can carry signals for long distance

d) All of the mentioned


85 A local telephone network is an example of a _______ network. 2 1 1

a) Packet switched

b) Circuit switched

c) Bit switched

d) Line switched
86 Most packet switches use this principle ____________ 2 1 2

a) Stop and wait

b) Store and forward

c) Store and wait

d) Stop and forward


87 The required resources for communication between end 2 1 1

systems are reserved for the duration of the session between

end systems in ________ method.

a) Packet switching

b) Circuit switching

c) Line switching

d) Frequency switching
88 As the resources are reserved between two communicating 2 1 1

end systems in circuit switching, ___________ is achieved.

a) authentication

b) guaranteed constant rate

c) reliability

d) store and forward


89 HTTP is ________ protocol. 2 1 2

a) application layer

b) transport layer

c) network layer

d) data link layer


90 FTP server listens for connection on which port number? 2 1 1

a) 18

b) 21

c) 22

d) 26
91 A network router joins two _________ together? 2 1 2

A. Computers

B. Switches

C. Networks

D. Gateway
92 What is the size of an IP address? 2 1 2
A. 64 bit
B. 128 bit
C. 16 bit
D. 32 bit
93 What is the difference between a switch and a hub? 2 1 4
A. Switches operate at physical layer while hubs operate at data link layer
B. Switches operate at data link layer while hubs operate at transport layer
C. Switches operate at data link layer while hubs operate at physical layer
D. Switches operate at transport layer while hubs operate at physical layer
94 The physical layer is concerned with the movement of _______ over the 2 1 2
physical medium.
A. programs
B. dialogs
C. protocols
D. Bits
95 IPv6 has _______ -bit addresses. 2 1 1
A. 32
B. 64
C. 128
D. Variable
96 Which of the following can be an Ethernet physical address? 2 1 1
A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. none of the above
97 What kind of transmission medium is most appropriate to 2 1 1
carry data in a computer network that is exposed to
electrical interferences?

a) Unshielded twisted pair


b) Optical fiber
c) Coaxial cable
d) Microwave

98 Which of the following cannot be used as a medium for 2 1 1


802.3 ethernet?

a) A thin coaxial cable


b) A twisted pair cable
c) A microwave link
d) A fiber optical cable

99 The protocol data unit(PDU) for the application layer 2 1 1


in the Internet stack is
(A) Segment
(B) Datagram
(C) Message/Data
(D) Frame
100 In datagram subnet new route is chosen ………………… 2 1 4
(A) for every packet sent
(B) for first and last packet sent
(C) only for the first packet
(D) for the packet which is not transmitted
BSNL land line telephone network is an example of a network.

A. Packet switched

B. Circuit switched

C. Bit switched

D. Line switched

ANSWER: B

Length of Port address in TCP/IP is

A. 8 bit long

B. 4 bit long

C. 32 bit long

D. 16 bit long

ANSWER: D

Who developed standards for the OSI reference model?

A. ISO

B. ANSI

C. IEEE

D. ACM

ANSWER: A

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
___________.

A. Added

B. Removed

C. Rearranged

D. Modified

ANSWER: A

What specifications does physical layer provides __________.

A. mechanical specifications of electrical connectors and cables


B. electrical specification of transmission line signal level

C. specification for IR over optical fiber

D. all of the mentioned

ANSWER: D

Protocols are?

A. Agreements on how communication components and DTE's are to communicate.

B. Logical communication channels for transferring data

C. Physical communication channels sued for transferring data

D. None of above

ANSWER: A

What is the purpose of using a Bridge in computer network?

A. to connect LANs

B. to separate LANs

C. to control Network Speed

D. All of the above

ANSWER: A

What is the benefit of the Networking?

A. File Sharing

B. Easier access to Resources

C. Easier Backups

D. All of the Above

ANSWER: D

Which of the following is not the Networking Devices?

A. Gateways

B. Unix

C. Routers

D. Firewalls
ANSWER: B

The _______ layer ensures reliable transmission on a single link

A. network

B. physical

C. data link

D. transport

ANSWER: C

The physical address to each machine is provided by which layer in an OSI reference model?

A. Physical layer

B. Data Link Layer

C. Network Layer

D. Transport Layer

ANSWER: B

The functions of a Logical Link Layer (LLC) are ___.

A. Error control

B. Flow control

C. Creating and managing the communication link between two devices with the help of the
Transport layer.

D. All the above

ANSWER: D

The types of Unguided transmission channel or media used for LAN are __.

A. Twisted Pair Cables

B. Coaxial Cables

C. Radio Waves

D. All the above

ANSWER: C
Delimiting and synchronization of data exchange is provided by __________

A. Application layer

B. Session layer

C. Transport layer

D. Link layer

ANSWER: B

A wireless fidelity is a form of wireless _____ network.

A. LAN

B. MAN

C. WAN

D. None

ANSWER: A

The physical layer is concerned with ___________

A. bit-by-bit delivery

B. process to process delivery

C. application to application delivery

D. port to port delivery

ANSWER: A

The Token Ring implementation works on the __ mode.

A. Contention

B. Reservation

C. Round Robin

D. None

ANSWER: C

The physical layer provides __________

A. mechanical specifications of electrical connectors and cables

B. electrical specification of transmission line signal level


C. specification for IR over optical fiber

D. all of the mentioned

ANSWER: D

What does WAN stand for?

A. Wide Area Network

B. World Area Network

C. Wide Arena Network

D. World Arena Network

ANSWER: A

Header of a Layer two frame usually contain ______________

A. synchronization bytes

B. addresses

C. frame identifier

D. all of the mentioned

ANSWER: D

Automatic repeat request error management mechanism is provided by ________

A. logical link control sublayer

B. media access control sublayer

C. network interface control sublayer

D. application access control sublayer

ANSWER: A

When 2 or more bits in a data unit has been changed during the transmission, the error is called
____________

A. random error

B. burst error

C. inverted error

D. double error
ANSWER: B

The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto
the next outgoing data frame is called ____________

A. piggybacking

B. cyclic redundancy check

C. fletcher’s checksum

D. parity check

ANSWER: A

Which sublayer of the data link layer performs data link functions that depend upon the type of
medium?

A. logical link control sublayer

B. media access control sublayer

C. network interface control sublayer

D. error control sublayer

ANSWER: B

CRC stands for __________

A. cyclic redundancy check

B. code repeat check

C. code redundancy check

D. cyclic repeat check

ANSWER: A

Which of the following is the multiple access protocol for channel access control?

A. CSMA/CD

B. CSMA/CA

C. Both CSMA/CD & CSMA/CA

D. HDLC

ANSWER: C
The modes of a MAC to share a transmission medium are ___.

A. Round Robin

B. Reservation

C. Contention

D. All the above

ANSWER: A

Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a
LAN network?

A. ARQ Automatic Repeat Request

B. ARP Address Resolution Protocol

C. SLIP Serial Line Internet Protocol

D. PLIP Parallel Line Internet Protocol

ANSWER: B

The physical address to each machine is provided by which layer in an OSI reference model?

A. Physical layer

B. Data Link Layer

C. Network Layer

D. Transport Layer

ANSWER: B

The maximum length (in bytes) of an IPv4 datagram is?

A. 32

B. 1024

C. 65535

D. 512

ANSWER: C

What is the difference between a switch and a hub?

A. Switches operate at physical layer while hubs operate at data link layer
B. Switches operate at data link layer while hubs operate at transport layer

C. Switches operate at data link layer while hubs operate at physical layer

D. Switches operate at transport layer while hubs operate at physical layer

ANSWER: C

A simple parity-check code can detect __________ errors

A. an even-number of

B. two

C. no errors

D. an odd-number of

ANSWER: D

Which of the following can be an Ethernet physical address?

A. 01:02:01:2C:4B

B. 07:01:02:01:2C:4B:2C

C. 07:01:02:01:2C:4B

D. none of the above

ANSWER: C

Which error detection method uses one's complement arithmetic?

A. Simple parity check

B. Two-dimensional parity check

C. CRC

D. Checksum

ANSWER: D

In _______, collisions are avoided through the use of three strategies: the interframe space, the
contention window, and acknowledgments.

A. CSMA/CA

B. CSMA/CD

C. either (a) or (b)


D. both (a) and (b)

ANSWER: A

In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?

A. 0 to 63

B. 0 to 64

C. 1 to 63

D. 1 to 64

ANSWER: A

For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed

A. exactly 10

B. less than 10

C. more than 10

D. none of the above

ANSWER: A

HDLC is an acronym for _______

A. High-duplex line communication

B. High-level data link control

C. Half-duplex digital link combination

D. Host double-level circuit

ANSWER: B

In _______ framing, there is no need for defining the boundaries of frames.

A. fixed-size

B. variable-size

C. standard

D. none of the above

ANSWER: A
The network layer encapsulates the data into _______of data.

A. bits

B. frames

C. packets

D. bytes

ANSWER: C

One 4 byte IP address is subdivided into __________

A. only network address

B. only host address

C. network address & host address

D. network address & MAC address

ANSWER: C

In virtual circuit network each packet contains ___________

A. full source and destination address

B. a short VC number

C. only source address

D. only destination address

ANSWER: B

One subset of a network that includes all the routers but contains no loops is called ________

A. spanning tree

B. spider structure

C. spider tree

D. special tree

ANSWER: A

In IPv4 header, an HLEN value of decimal 10 means _______

A. there are 10 bytes of options

B. there are 40 bytes of options


C. there are 10 bytes in the header

D. there are 40 bytes in the header

ANSWER: D

An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true?

A. The do not fragment bit is set to 1 for all three datagrams.

B. The more fragment bit is set to 0 for all three datagrams

C. The identification field is the same for all three datagrams.

D. The offset field is the same for all three datagrams

ANSWER: C

The IPv4 header size _______

A. is 20 to 60 bytes long

B. is always 20 bytes long

C. is always 60 bytes long

D. depends on the MTU

ANSWER: A

In IPv6, options are inserted between the _________ and the ___________ data

A. base header; extension header

B. base header; upper-layer data

C. base header; frame header

D. none of the above

ANSWER: B

The static routing table is one _______

A. with manual entries

B. which is updated automatically

C. MAC entries

D. none of the above

ANSWER: A
The use of hierarchy in routing tables can ________ the size of the routing tables

A. reduce

B. increase

C. multiply

D. retain

ANSWER: A

In classless addressing,the netid length defines the _____________

A. prefix

B. hostid

C. mask

D. none of the above

ANSWER: C

We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are
called _________

A. datawords

B. blockwords

C. codewords

D. none of the above

ANSWER: C

In a block, the prefix length is /24; what is the mask?

A. 255.255.255.0

B. 255.255.242.0

C. 255.255.0.0

D. none of the above

ANSWER: A

The subset of a network that includes all the routers but contains no loops is called ________
A. spanning tree

B. spider structure

C. spider tree

D. special tree

ANSWER: A

The ________ between two words is the number of differences between corresponding bits

A. Hamming code

B. Hamming distance

C. Hamming rule

D. none of the above

ANSWER: B

An IPv6 address is _________ bits long

A. 32

B. 64

C. 128

D. none of the above

ANSWER: C

To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block
code must be _______

A. 5

B. 6

C. 11

D. none of the above

ANSWER: B

In IPv6, _______ address defines a single computer

A. a unicast

B. a multicast
C. an anycast

D. none of the above

ANSWER: A

The Dynamic routing table is one _______

A. with manual entries

B. which is updated automatically

C. MAC entries

D. none of the above

ANSWER: B

The _______ is a dynamic mapping protocol in which a physical address is found for a given logical
address.

A. ARP

B. RARP

C. both a and b

D. none of the above

ANSWER: B

Transport layer aggregates data from different applications into a single stream before passing it to
____________

A. network layer

B. data link layer

C. application layer

D. physical layer

ANSWER: A

Which of the following are used as transport layer protocols in networking?

A. TCP and FTP

B. UDP and HTTP

C. TCP and UDP

D. HTTP and FTP


ANSWER: C

User datagram protocol is called connectionless because _____________

A. all UDP packets are treated independently by transport layer

B. it sends data as a stream of related packets

C. it is received in the same order as sent order

D. it sends data very quickly

ANSWER: A

In open-loop control, policies are applied to __________

A. Remove after congestion occurs

B. Remove after sometime

C. Prevent before congestion occurs

D. Prevent before sending packets

ANSWER: C

In Go-Back-N window, when the timer of the packet times out, several packets have to be resent
even some may have arrived safe. Whereas in Selective Repeat window, the sender resends
___________

A. Packet which are not lost

B. Only those packets which are lost or corrupted

C. Packet from starting

D. All the packets

ANSWER: B

The technique in which a congested node stops receiving data from the immediate upstream node
or nodes is called as _______

A. Admission policy

B. Backpressure

C. Forward signaling

D. Backward signaling

ANSWER: B
Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the sliding window in the
forward diretion?

A. Control Variables

B. Sender Sliding Window

C. Receiver Sliding Window

D. Resending of frames

ANSWER: B

In a network, after the load reaches the capacity,throughput _______.

A. increases sharply

B. increases proportionally with the load

C. declines sharply

D. declines proportionally with the load

ANSWER: C

The packet sent by a node to the source to inform it of congestion is called _______

A. Explicit

B. Discard

C. Choke

D. Backpressure

ANSWER: C

Which is not a application layer protocol?

A. HTTP

B. SMTP

C. FTP

D. UDP

ANSWER: D

In a network, when the load is much less than the capacity of the network, the delay is _________
A. at a maximum

B. at a minimum

C. constant

D. none of the above

ANSWER: B

One of the responsibilities of the transport layer protocol is to create a ______ communication.

A. host-to-host

B. process-to-process

C. node-to-node

D. none of the above

ANSWER: B

Which of the following is a transport layer protocol?

A. stream control transmission protocol

B. internet control message protocol

C. neighbor discovery protocol

D. dynamic host configuration protocol

ANSWER: A

Transport layer protocols deals with ____________

A. application to application communication

B. process to process communication

C. node to node communication

D. man to man communication

ANSWER: B

Congestion in a network or internetwork occurs because routers and switches have _______.

A. tables

B. queues

C. crosspoints
D. none of the above

ANSWER: B

TCP and UDP are called ________

A. Application protocols

B. Session protocols

C. Transport protocols

D. Network protocols

ANSWER: C

In a network, when the load is below the capacity of the network, the throughput ______________

A. increases sharply

B. increases proportionally with the load

C. declines sharply

D. declines proportionally with the load

ANSWER: B

In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it
reaches a threshold

A. slow-start

B. congestion avoidance

C. congestion detection

D. none of the above

ANSWER: A

The protocol data unit PDU for the Transport layer in the Internet stack is

A. Segment

B. Datagram

C. Message/Data

D. Frame

ANSWER: A
In computer networks _________ is a characteristic that a flow needs where Lack of it means losing
a packet or acknowledgment, which entails retransmission.

A. Reliability

B. Delay

C. Jitter

D. Bandwidth

ANSWER: A

The Application layer offers _______ service.

A. End to end

B. Process to process

C. Both End to end and Process to process

D. None of the mentioned

ANSWER: A

Email is _________

A. Loss-tolerant application

B. Bandwidth-sensitive application

C. Elastic application

D. None of the mentioned

ANSWER: C

To deliver a message to the correct application program running on a host, the _______ address
must be consulted.

A. IP

B. MAC

C. Port

D. None of the mentioned

ANSWER: C

Which among the below specified illustrations belongs to the category of GUI based user agents?
A. mail

B. pine

C. Outlook

D. All of the above

ANSWER: C

Which DNS client maps an address to a name or a name to an address especially when required by a
host?

A. Resolver

B. Mapper

C. Primary Server

D. Secondary Server

ANSWER: A

What does HTTPS stands for?

A. Hyper Text Transmission Protocols

B. Hyper Text Tile Protocols

C. Hyper Text Transfer Protocol Secure

D. None

ANSWER: C

Which of the following protocol is used to retrieve emails?

A. SMTP

B. POP3

C. FTP

D. SNMP

ANSWER: B

FTP server listens for connection on port number

A. 20

B. 21
C. 22

D. 23

ANSWER: B

Which of the following is present in both an HTTP request line and a status line?

A. HTTP version number

B. URL

C. Method

D. None of the above

ANSWER: A

Typically the TCP port used by SMTP is

A. 25

B. 35

C. 50

D. 15

ANSWER: A

The _______ is a server whose zone consists of the whole tree.

A. domain server

B. zone server

C. root server

D. none of the above

ANSWER: C

Which is a time-sensitive service?

A. File transfer

B. File download

C. E-mail

D. Internet telephony

ANSWER: D
The local host and the remote host are defined using IP addresses. To define the processes, we need
second identifiers called ____________

A. UDP addresses

B. transport addresses

C. port addresses

D. none of the above

ANSWER: C

The _______ domains define registered hosts according to their general behavior.

A. generic

B. country

C. inverse

D. none of the above

ANSWER: A

Electronic mail uses which Application layer protocol?

A. SMTP

B. HTTP

C. FTP

D. SIP

ANSWER: A

In FTP, the well-known port ____ is used for the control connection and the well-known port
________ for the data connection

A. 21; 22

B. 21; 20

C. 20; 21

D. none of the above

ANSWER: B

When displaying a web page, the application layer uses the _____________
A. HTTP protocol

B. FTP protocol

C. SMTP protocol

D. TCP protocol

ANSWER: A

In ________ is a repository of information linked together from points all over the world.

A. The WWW

B. HTTP

C. HTML

D. none of the above

ANSWER: A

In ____________ is used to compress images.

A. MPEG

B. JPEG

C. either a or b

D. none of the above

ANSWER: B

The Caesar cipher is a _______cipher that has a key of 3.

A. transposition

B. killer

C. shift

D. none of the above

ANSWER: C
Computer Networks KCS-603

1. A group of computers and other devices connected together is called …………….

A. Network

B. Networking

C. Intranet

D. both b and c

ANSWER: A

2. Which of the following network is used to connect a number of computers to each other by
cables in a single location?

A. WAN

B. LAN

C. MAN

D. both b and c

ANSWER: B

3. Transmission Lines are also called as………………….

A. circuits

B. channels

C. trunks

D. circuits channels, or trunks

ANSWER: D

4. The Switching Elements are also called as ……….

A. host

B. subnet

C. Interface Message Processors (IMPs)

D. both a and b

ANSWER: C
5. The signal which has infinitely many levels of intensity over a period of time is called ………

A. digital signal

B. analog signal

C. both a and b

D. sound signal

ANSWER: A

6. The absolute value of a signal's highest intensity is called……….

A. Peak Amplitude

B. Frequency

C. Phase

D. Both a and c

ANSWER: A

7. The distance a simple signal can travel in one period is called …………

A. Wavelength

B. propagation speed

C. Frequency

D. both a and b

ANSWER: A

8. A noise where foreign signal enters the path of the transmitted signal is called ……

A. Impulse

B. Inter modulation

C. cross talk

D. both b and c

ANSWER: C

9. Which type of channel it is where the number of users are stable and the traffic is not
bursts?

A. static channel
B. dynamic channel

C. free channel

D. both a and c

ANSWER: A

10. With Slotted Aloha, a …………. sends out small clock tick packets to the outlying stations.

A. distributed clock

B. synchronized clock

C. centralized clock

D. Digital clock

ANSWER: C

11. If there is only one station with a packet to send, this guarantees that there will ………….. For
that packet.

A. never be a collision

B. be a collision

C. be an improvement

D. direction

ANSWER: A

12. The _______ layer provides a well defined service interface to the network layer,
determining how the bits of the physical layer are grouped into frames

A. Data Link

B. Physical

C. Network

D. Session

ANSWER: A

13. ________ is the process in which the receiver tries to guess the message by using redundant
bits

A. Connection-Oriented Service

B. Forward error correction


C. both a and b

D. Confirm

ANSWER: B

14. In ______ type of service, no connection is established before hand or afterwards.

A. Unacknowledged Connectionless Service

B. acknowledged Connectionless Service

C. point to point

D. both a and b

ANSWER: A

15. The range of sequence number which is the concern of the receiver is called the receive
sliding window.

A. receive sliding window.

B. sliding window

C. frame buffer

D. both a and b

ANSWER: A

16. Data Link Control Protocol (HDLC) is implemented at the ………

A. Data link layer

B. Network layer

C. transport layer

D. Physical layer

ANSWER: A

17. The maximum size of the window in a Sliding Window Protocol is _______

A. 2m – 1

B. 2m + 1

C. 2m

D. 2m-1
ANSWER: A

18. The _______ layer is the topmost layer in the subnet.

A. Network

B. application

C. transport

D. physical

ANSWER: A

19. The subnet gets increasingly loaded with packets causing increase in delay in the delivery of
packets, which can lead to more retransmission, and ultimately increasing more and more
traffic. This is a concept called as _________

A. blockage

B. Traffic jam.

C. Congestion

D. both a and b

ANSWER: C

20. ______ is a static algorithm in which every incoming packet is sent out on every outgoing
line except the one it arrives on. This method usually generates vast number of duplicate
packets..

A. Flooding

B. Wait and watch

C. congestion

D. both a and c

ANSWER: A

21. The Internet addresses are ______ bits in length in IPV4 addressing scheme

A. 16

B. 64

C. 32

D. 48
ANSWER: C

22. In addresses for _______ networks, the first 16 bits specify a particular network, and the last
16 bits specify a particular host.

A. class A

B. class C

C. class B

D. class D

ANSWER: C

23. The number of network segments on which the datagram is allowed to travel before a
router should discard it is called _______.

A. Time to Live (TTL)

B. Time to Die(TTD)

C. self recognition

D. both a and b

ANSWER: A

24. An application process is assigned a process identifier number (process ID), which is likely to
be _______ each time that process is started.

A. Similar

B. smaller

C. different

D. larger

ANSWER: C

25. A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher-
level protocol or application program (process) it must deliver incoming messages

A. connection

B. UDP

C. port

D. TCP
ANSWER: C

26. A UDP datagram of _____ bytes is acceptable to all implementations

A. 516

B. 1024

C. 256

D. 512

ANSWER: A

27. The service access points in Session Layer are called ________________

A. Accessing point

B. activation point

C. Session Service Access Points

D. both a and b

ANSWER: C

28. Sessions are ended with ________ primitive

A. B-RELEASE. Request

B. R-RELEASE. request

C. S-RELEASE. request

D. A-RELEASE. request

ANSWER: C

29. A procedure included in the caller’s address space by the linker is known as ______.

A. local procedure

B. Universal procedure

C. addressing linker

D. both a and b

ANSWER: A

30. The ______ protocol is based on end-to-end delivery.


A. SCTP

B. TCP

C. SMTP

D. SCTP

ANSWER: C

31. The sender SMTP establishes a TCP connection with the destination SMTP and then waits for
the server to send a ____ Service ready message..

A. 420

B. 320

C. 220

D. 120

ANSWER: C

32. There is _____ number of standard content types in MIME

A. 7

B. 5

C. 9

D. 4

ANSWER: A

33. To avoid ambiguity, the names assigned to machines must be carefully selected from a
______ with complete control over the binding between the names and IP addresses

A. Table

B. look up table

C. name space

D. name table

ANSWER: C

34. A name in the _______ name space is a sequence of characters without structure

A. address

B. Doman
C. Flat

D. Both a and b

ANSWER: C

35. The ____ namespace is based on a hierarchical and logical tree structure

A. DNS

B. Address

C. table

D. both a and b

ANSWER: A

36. The ______ are programs that run on DNS clients and DNS servers and that create queries to
extract information from name servers.

A. transporter

B. distributers

C. Resolvers

D. both a and b

ANSWER: C

37. The next header t is an _____ field of Authentication Header that identifies the type of what
follows.

A. 16-bit

B. 64-bit

C. 8-bit

D. 32-bit

ANSWER: C

38. The client code recognizes the SSL request and establishes a connection through TCP port
____ to the SSL code on the server

A. 1023

B. 402

C. 443
D. 8080

ANSWER: C

39. A _____ should be considered as a means to divide the world into two or more networks:
one or more secure networks and one or more non-secure networks.

A. firewall

B. ESP

C. SSL

D. both a and b

ANSWER: A

40. The _______ is used to provide integrity check, authentication, and encryption to IP
datagram’s.

A. UDP

B. Transport layer

C. ESP

D. SSL

ANSWER: C

41. In most Wide Area Networks, the subnet consists of two distinct components: which are
they?

A. Transmission Lines and Switching Elements.

B. host and subnet

C. Transmission Lines and host

D. subnet and Switching Elements.

ANSWER: A

42. There are two types of designs for communication subnets: they are …………

A. Point-to-Point channels and Broadcast channels

B. packet-switched subnet and store-and-forward

C. Multicasting and Broadcasting

D. Point-to-Point channels and store-and-forward


ANSWER: A

43. The main hardware components of a graphics workstation are ……………

A. Thick coax, optical fiber

B. twisted pair , thin coax

C. twisted, optical fiber

D. Thick coax, Thin coax

ANSWER: D

44. S/NET is another kind of ………….network with an ………….for switching.

A. fiber optic, active star

B. active star , fiber optic

C. twisted cable, active network

D. active network, twisted cable

ANSWER: A

45. The Aloha protocol is an OSI _______ protocol for LAN networks with broadcast topology

A. layer 1

B. layer 4

C. layer 2

D. layer 3

ANSWER: C

46. Thus hamming code for the ASCII character “a” is given as ………………

A. 10111001111

B. 10111001000

C. 10111001001

D. 10111001

ANSWER: C

47. Coding schemes can be divided into two broad categories…………, ……………..
A. character coding, integer coding

B. hamming coding and block coding

C. Hamming coding and convolution coding

D. Block Coding and Convolution Coding.

ANSWER: D

48. The IP Control Protocol (IPCP) is the NCP for IP and is responsible for ………., …………., and
disabling the IP protocol on both ends of the point-to-point link.

A. Reframing , enabling

B. Deleting, reframing

C. configuring, enabling,

D. configuring, reframing

ANSWER: C

49. The _______ is a unidirectional protocol that has no flow or error control.

A. Simplest

B. Simplex

C. TCP/IP protocol

D. Simplest or Simplex

ANSWER: D

50. Flooding is also a……... algorithm, usually generates ………... of duplicate packets.

A. Static, vast number

B. dynamic , vast number

C. Static, less number

D. dynamic , less number

ANSWER: A

51. Distance Vector Routing is a……... routing algorithm, it consists of a data structure called a
………

A. Static , routing table

B. Dynamic, look-up table


C. Dynamic, routing table

D. Static, look-up table

ANSWER: C

52. Each IP address can identify the ………... or ………... of IP packets.

A. source, destination

B. length, size

C. source, length

D. Size , destination

ANSWER: A

53. In process to process delivery, an application process is assigned a ………….., which is likely to
be …………….each time that process is started

A. process identifier number , different

B. process identifier number, same

C. source, mixed

D. Source, similar

ANSWER: A

54. The Intel format is called ………... and the SPARC format is called ……………..

A. little endian, big endian,

B. big endian, little endian

C. open source, little endian

D. Big endian, open source

ANSWER: A

55. The Post Office Protocol is an ………... protocol with both client (sender/receiver) and
…………...functions

A. electronic mail, server (storage)

B. three layer , server

C. UDP, transfer

D. TCP, server
ANSWER: A

56. A zone is a contiguous portion of a ………….. of the DNS namespace whose database records
exist and are managed in a……….. DNS database file.

A. domain, particular

B. Class, particular

C. tree, local

D. Domain, every

ANSWER: A

57. The DNS server that received the initial ……... query checks it’s ………… is called…………...

A. Recursive, zones

B. simple, zones

C. simple, class

D. Recursive, class

ANSWER: A

58. The purpose of a proxy server is to control exchange of data between the two networks at
…………..instead of ………..

A. an application level , an IP level

B. network layer, physical layer

C. an application layer, physical layer

D. Network layer , an application layer

ANSWER: A

59. PGP is one of the protocols used to provide security at the ……….. It is designed to create
authenticated and confidential ……….

A. application layer, e-mails.

B. Network layer, packets

C. application layer, packets

D. network layer , e-mails

ANSWER: A
60. State weather the following statement is true or false for Internetwork layer. 1).Other
internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is
the least important protocol in this layer 3). The internetwork layer, also called the internet
layer or the network layer, provides the “virtual network”

A. 1. True, 2. true, 3. true

B. 1. true, 2. false, 3.true

C. 1. false, 2. false, 3. false

D. 1. true, 2. true, 3. false

ANSWER: B

61. State weather the following statement is true or false for ISDN – Integrated Services Digital
Network ISDN is an effort to standardize subscriber services, provide user/network
interfaces 2). the goal of ISDN is to form a Local area network that provides Peer-to-Peer
connectivity over digital media 3). It is a set of protocols that combines digital telephony and
data transport services

A. 1. True, 2. false, 3. true

B. 1. true, 2. false, 3. false

C. 1. false, 2. false, 3. false

D. 1. true, 2. true, 3. false

ANSWER: A

62. State weather the following statement is true or false for Token Bus 1).It is a linear or tree-
shaped cable onto which the stations are attached. 2). the token propagates around the
logical ring, with only the token holder being permitted to transmit frames 3). In this token
bus arrangement The physical order in which the stations are connected to the cable is very
important.

A. 1. False, 2. true, 3. true

B. 1. true, 2. false, 3. false

C. 1. false, 2. false, 3. false

D. 1. true, 2. true, 3. false

ANSWER: D

63. Find the transmitted code if the frame is (MSB) 1101011011 (LSB) and generator polynomial
is x4 + x + 1.
A. 1101011011 1110

B. 1101011111 1110

C. 1101011011 1111

D. 1101011011

ANSWER: A

64. State weather the following statement is true or false for Point-to-Point Protocol 1). It is still
in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of
asynchronous lines have long been the mainstay for data communications. 3). Point-to-Point
Protocol (PPP) is a network-specific standard protocol with STD number 51.

A. 1. True, 2. true, 3. true

B. 1. true, 2. false, 3. false

C. 1. false, 2. false, 3. false

D. 1. true, 2. false, 3. true

ANSWER: D

65. State weather the following statement is true or false for Hierarchical Routing 1). In
hierarchical routing, the routers are divided into regions. 2) Each router is having the idea
about internal structure of other regions 3). Two level hierarchies may be insufficient hence
it may be necessary to group the regions into clusters.

A. 1. True, 2. true, 3. true

B. 1. true, 2. false, 3. false

C. 1. false, 2. false, 3. false

D. 1. true, 2. false, 3. true

ANSWER: D

66. State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a
routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a
connectionless, unreliable datagram protocol. 3). An IPV6 packet consists of an IPV6 header
and an IPV6 payload.

A. 1. True, 2. true, 3. true

B. 1. true, 2. false, 3. false

C. 1. false, 2. false, 3. false

D. 1.false, 2. true, 3. true


ANSWER: A

67. State weather the following statement is true or false for Stream Control Transmission
Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new
transport protocol at the same layer as TCP and UDP. 3). SCTP is a new reliable, message
oriented transport layer protocol.

A. 1. True, 2. true, 3. true

B. 1. true, 2. false, 3. false

C. 1. false, 2. false, 3. false

D. 1.false, 2. true, 3. true

ANSWER: D

68. State weather the following statement is true or false for Exception Reporting 1). If the user
runs into trouble, this trouble can be reported to the peer using a S-U-EXCEPTION-REPORT.
request primitive. 2). Exception reporting does not only apply to user-detected errors 3). The
service provider can generate an S-P-EXCEPTION-REPORT.indication to notify the user about
internal problems within the session layer.

A. 1. True, 2. true, 3. true

B. 1. true, 2. false, 3. false

C. 1. false, 2. false, 3. false

D. 1.false, 2. true, 3. true

ANSWER: A

69. State weather the following statement is true or false for Multipurpose Internet Mail
Extensions 1).The general syntax for MIME header fields is not the same as that for RFC
2822. 2).MIME header field names are never significant, but the cases of field values can b.
3). A MIME-compliant message must contain a header field with the following verbatim text:
MIME-Version: 1.0

A. 1. True, 2. true, 3. true

B. 1. true, 2. false, 3. false

C. 1. false, 2. false, 3. false

D. 1.false, 2. true, 3. true

ANSWER: A
70. State weather the following statement is true or false for Sendmail. 1).Sendmail is a
command-line tool designed for most UNIX-like operating systems. 2).It define a method of
transferring mail, and acts as a client/server that supports multiple mail protocols 3).
Sendmail exists in both open source and proprietary software packages.

A. 1. True, 2. False, 3. true

B. 1. true, 2. false, 3. false

C. 1. false, 2. false, 3. false

D. 1. true, 2. true, 3. false

ANSWER: A

71. ………………...is a minimal protocol that allows isolated hosts to link via TCP/IP over the
telephone network and ………………..uses a proposed international standard for transmitting
HDLC over asynchronous lines.

A. LCP, PPP

B. PPP, LCP

C. SLIP, PPP

D. PPP, SLIP

ANSWER: C

72. NAT limits the use of ………………….. and ………………

A. encryption, authentication.

B. encryption, decryption

C. encapsulation, translation

D. authentication, verification

ANSWER: A

73. ……………………………. extends …………………………. to provide the full set of configuration


parameters defined in the Requirements for Internet Hosts RFC.

A. DHCP, BOOTP

B. BOOTP, DHCP

C. RARP, BOOTP

D. DHCP, RARP

ANSWER: A
74. SMTP is based on …………………………………..delivary, contacts on well known port
number……………………………

A. host to host, 23

B. host to host, 25

C. end to end , 23

D. end to end, 80

ANSWER: B

75. State whether the following statements are true / false: 1) A fully qualified domain name
starts with a specific host and ends with a top-level domain. 2) Domain names are always
written as fully qualified domain names.

A. 1.T, 2.T

B. 1.T, 2.F

C. 1.F, 2.T

D. 1.F, 2.F

ANSWER: B

76. The……………………command can determine which interface is used on a system from the
messages displayed on the console during a boot.

A. dmesg

B. traceroute

C. ifconfig

D. finger

ANSWER: A

77. The most basic function of ifconfig command is assigning the …………….. Address.

A. Physical address

B. Hardware address

C. MAC address

D. IP address

ANSWER: D

78. In the TCP/IP protocol architecture, the Network Access Layer includes
………………………………...layers of the OSI Reference Model.

A. presentation, session, application


B. physical, data link, network

C. data link, network

D. physical, data link

ANSWER: B

79. The …………………... option tells netstat to display the status of all configured network
interfaces.

A. -n

B. -i

C. either a or b

D. neither a nor b

ANSWER: B

80. SLIP stands for…………………………..

A. Syncronous Level Interface Protocol

B. Serial Line Interface Protocol

C. Syncronous Level Internet Protocol

D. Serial Line Internet Protocol

ANSWER: D

81. A ………………………... is constructed manually by the system administrator using the route
command.

A. static routing table

B. dynamic routing table

C. both a and b

D. neither a nor b

ANSWER: A

82. A ……………………….. is built from the information exchanged by routing protocols.

A. static routing table

B. dynamic routing table

C. both a and b
D. neither a nor b

ANSWER: B

83. Routes are built automatically by………………….., manually by the system administrator, or
dynamically by routing protocols.

A. route

B. traceroute

C. ifconfig

D. netstat

ANSWER: C

84. The limited capability of this routing table is easily verified with the ………………………...
command.

A. ping

B. traceroute

C. route

D. netstat

ANSWER: A

85. Find out the components of DHCP: 1) A protocol that delivers host-specific configuration
parameters from a server to a host. 2) The client determines its own hardware address; this
is normally in a ROM on the hardware. 3) A mechanism for the allocation of temporary or
permanent network addresses to hosts.

A. 1,2

B. 1,3

C. 2,3

D. 1,2,3

ANSWER: B

86. The newer technique uses a distributed database system called ………………….. to translate
names to addresses.

A. DNS

B. IP
C. ARP

D. Telnet

ANSWER: A

87. What is the loopback address of localhost?

A. 0.0.0.0

B. 127.0.0.1

C. 172.16.12.1

D. 255.0.0.0

ANSWER: C

88. IAHC stands for……………………………………

A. International Ad Hoc Committee

B. Internet Ad Hoc Committee

C. Intranet Ad Hoc Council

D. Intranet Ad Hoc Committee

ANSWER: A

89. …………………………………. converts a physical network address into an IP address.

A. ARP

B. RARP

C. DNS

D. DHCP

ANSWER: B

90. DHCP stands for………………………………..

A. Dynamic Host Control Protocol

B. Diskless Hosts Control protocol

C. Diskless Hosts Configuration protocol

D. Dynamic Host configuration Protocol

A.NSWER: D
91. The …………………... command can set or display the configuration values for a network
interface.

A. ping

B. traceroute

C. ifconfig

D. finger

ANSWER: C

92. The ………………………. protocol was originally developed as a mechanism to enable diskless
hosts to be remotely booted over a network as workstations.

A. RARP

B. ARP

C. DHCP

D. BOOTP

ANSWER: D

93. NAT stands for………………………..

A. Node access teminal

B. Node address Translation

C. Network address translation

D. Network address transmitter

ANSWER: C

94. The maximum length of a "thick" Ethernet cable is ………..

A. 100 meters

B. 200 meters

C. 500 meters

D. 1000meters

ANSWER: C

95. ………………... are needed to communicate with systems on other networks.


A. repeaters

B. amplifiers

C. Bridge

D. Gateways

ANSWER: D

96. The kernel configuration file is normally changed only when you wish to:

A. Produce a smaller, more efficient kernel by removing unneeded items.

B. Add a new device

C. Modify a system parameter

D. all of the above.

ANSWER: D

97. The …………… command customizes the kernel configuration and generates the files needed
to compile and link the kernel.

A. ping

B. ifconfig

C. make config

D. finger

ANSWER: C

98. In a kernel configuration feature, . if ……………...is selected, the dynamically loadable module
is loaded the first time a call is made to the kernel that requires the module.

A. "m"

B. "Y"

C. "n"

D. "r"

ANSWER: A

99. At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking
to the kernel.

A. CONFIG_IP_ACCT
B. CONFIG_INET

C. CONFIG_INET_PCTCP

D. CONFIG_IP_FORWARD

ANSWER: B

100. The function of IP adress is ………………………………………….

A. host identification

B. network interface identification

C. location addressing

D. all of the above

ANSWER: D
COMPUTER NETWORKS 2020-21

COMPUTER NETWORKS
Computer Networks
Course Outcome ( CO)
At the end of course , the student will be
able to understand
Explain basic concepts, OSI reference model, services and role of each layer of OSI model and
CO 1
TCP/IP, networks devices and transmission media, Analog and digital data transmission

CO 2 Apply channel allocation, framing, error and flow control techniques.


Describe the functions of Network Layer i.e. Logical addressing, subnetting & Routing
CO 3
Mechanism.

CO 4 Explain the different Transport Layer function i.e. Port addressing, Connection Management,
Error control and Flow control mechanism.

CO 5 Explain the functions offered by session and presentation layer and their Implementation.

CO6 Explain the different protocols used at application layer i.e. HTTP, SNMP, SMTP, FTP,
TELNET and VPN.
DETAILED SYLLABUS

Unit Topic

Introductory Concepts: Goals and applications of networks, Categories of networks,


Organization of the Internet, ISP, Network structure and architecture (layering principles,
I services, protocols and standards), The OSI reference model, TCP/IP protocol suite, Network
devices and components.
Physical Layer:
Network topology design, Types of connections, Transmission media, Signal transmission and
encoding, Network performance and transmission impairments, Switching techniques and
multiplexing.
Link layer: Framing, Error Detection and Correction, Flow control (Elementary Data Link
II Protocols, Sliding Window protocols).
Medium Access Control and Local Area Networks: Channel allocation, Multiple access
protocols, LAN standards, Link layer switches & bridges (learning bridge and spanning tree
algorithms).
Network Layer: Point-to-point networks, Logical addressing, Basic internetworking (IP, CIDR,
ARP, RARP, DHCP, ICMP), Routing, forwarding and delivery, Static and dynamic routing,
III Routing algorithms and protocols, Congestion control algorithms, IPv6.
Transport Layer: Process-to-process delivery, Transport layer protocols (UDP and TCP),
Multiplexing, Connection management, Flow control and retransmission, Window management,
IV TCP Congestion control, Quality of service.
Application Layer: Domain Name System, World Wide Web and Hyper Text Transfer
V Protocol, Electronic mail, File Transfer Protocol, Remote login, Network management, Data
compression, Cryptography – basic concepts.

1 University Academy
COMPUTER NETWORKS 2020-21

COMPUTER NETWORKS
Solved MCQ
1. Unit-1 ………………………………………………..……………………………….3

2. Unit-II……………………………………………………...……….…………...…….8

3. Unit-III..……………………………………………………...…………..….....…... 16

4. Unit-IV...………………………..…….………………………………………..…….23

5. Unit-V..…………………………………………………..……….....................…….28

Practice Sets ……………………………………….………………………….……….35

2 University Academy
COMPUTER NETWORKS 2020-21

Unit-1

1. Which processes does TCP, but not UDP, b. Hub/switch


use? c. PDC
a. Windowing d. Router
b. Acknowledgements Answer: Option(b)
c. Both a and b 7. In OSI network architecture, the dialogue
d. Destination Port control and token management are
Answer: Option(c) responsibility of
a. session layer
2. SMTP is a protocol used in which layer? b. network layer
a. Application c. transport layer
b. Network d. data link layer
c. Physical Answer: Option(a)
d. Transport
Answer: Option(a) 8. In OSI network architecture, the routing is
performed by
3. Terminators are used in which topology? a. network layer
a. Bus b. data link layer
b. Star c. transport layer
c. Ring d. session layer
d. token ring Answer: Option(a)
Answer: Option(a)
9. Which of the following performs
4. In which topology, if a computer’s network modulation and demodulation?
cable is broken, whole network goes down. a. fiber optics
a. Ring b. satellite
b. Star c. coaxial cable
c. Bus d. Modem
d. token ring Answer: Option(d)
Answer: Option(c)
10. The process of converting analog signals
into digital signals so they can be processed by
5. For large networks, which topology is used? a receiving computer is referred to as
a. Bus a. modulation
b. Tree b. demodulation
c. Ring c. synchronizing
d. Mesh d. Digitizing
Answer: Option(b) Answer: Option(b)

6. What is the central device in star topology? 11. The protocol data unit (PDU) for the
a. STP server application layer in the Internet stack is?

3 University Academy
COMPUTER NETWORKS 2020-21

connected to the switch running 10Mbps half-


a. Datagram duplex as well. Find the bandwidth does each
b. Frame host have to the server?
c. Message a. 100 kbps
d. Segment b. 1 Mbps
Answer: Option(c) c. 2 Mbps
d. 10 Mbps
12. Which protocol does switch use at the Answer: Option(d)
layer 2 for finding MAC address?
17. While transferring files between server and
a. ICMP client, if the transmission rates along the path
b. UDP is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The
c. ARP throughput is usually
d. TCP a. 20Mbps
Answer: Option(c) b. 10Mbps
c. 40Mbps
d. 50Mbps
13. Which OSI layer adds a trailer during Answer: Option(b)
encapsulation of data?
18. Which is the additional layer to OSI model
a. Layer 3 when compared with TCP IP model?
b. Layer 4 a. Application layer
c. Layer 2 b. Presentation layer
d. Layer 5,6,7 c. Session layer
Answer: Option(d) d. Session and Presentation layer
Answer: Option(d)
14. Which of the following term describes
PDU encapsulated at Transport Layer? 19. Maximum data transfer rate of the optical
fiber is……….?
a. Frame a. 50 kbps
b. Packet b. 1000 kbps
c. Data c. 1000 Mbps
d. Segment d. None of the these
Answer: Option(d) Answer: Option(c)

15. Which protocol does HTTP (Hyper Text 20. A list of protocols used by a system, one
Transfer Protocol) - use for transferring web protocol per layer, is called ________
pages at the Transport layer a) protocol architecture
a. IP b) protocol stack
b. UDP c) protocol suite
c. TCP d) protocol system
d. ARP Answer: Option(b)
Answer: Option(c)
21. Connector RJ-45 contains?
16. There are 10 users plugged into a hub a. Two pins
running 10Mbps half-duplex.and a server b. Four pins

4 University Academy
COMPUTER NETWORKS 2020-21

c. Eight pins a. A thin coaxial cable


d. Ten pins b. A twisted pair cable
Answer: Option(c) c. A microwave link
d. A fiber optical cable
22. Which is not the legitimate transmission Answer: Option(c)
directions listed here?
a. Simplex 28. HTTP stands for?
b. Half Duplex a. Hyper terminal tracing program
c. Full Duplex b. Hypertext tracing protocol
d. Double Duplex c. Hypertext transfer protocol
Answer: Option(d) d. Hypertext transfer program
Answer: Option(c)
23. Which layer provides interface between
network support layers and user support 29. Find the best suitable topology for large
layers? businesses which must capable to control and
a. session layer coordinate the operation of distributed branch
b. data link layer outlets?
c. transport layer a. Ring
d. network layer b. Local area
Answer: Option(c) c. Hierarchical
d. Star
24. A set of rules that governs data Answer: Option(d)
communication is called
a. Protocols 30. Which mode of Communication occurs
b. Standards between a computer and a keyboard.
c. RFCs a. Automatic
d. Servers b. Half-duplex
Answer: Option(c) c. Full-duplex
d. Simplex
Answer: Option(d)
25. Which one is not a network topology?
a. Star 31. How many layers are present in the Internet
b. Ring
protocol stack (TCP/IP model)?
c. Bus
d. Peer to Peer a. 5
Answer: Option(d) b. 7
c. 6
26. Full form of OSI
a. open system interconnection d. 10
b. operating system interface Answer: Option(a)
c. optical service implementation
32. The number of layers in ISO OSI reference
d. open service Internet
Answer: Option(a) model is __________
a. 5
27. Identify the non suitable medium for 802.3 b. 7
ethernet?

5 University Academy
COMPUTER NETWORKS 2020-21

c. 6 c. Transport layer
d. 10 d. Link layer
Answer: b Answer: b
33. Which of the following layers is an addition 38. In OSI model, when data is sent from device
to OSI model when compared with TCP IP A to device B, the 5th layer to receive data at
model? B is _________
a. Application layer a. Application layer
b. Presentation layer b. Transport layer
c. Session layer c. Link layer
d. Session and Presentation layer d. Session layer
Answer: d Answer: d
39. In TCP IP Model, when data is sent from
34. Application layer is implemented in _______ device A to device B, the 5th layer to receive
a. End system data at B is ____________
b. NIC a. Application layer
c. Ethernet b. Transport layer
d. Packet transport c. Link layer
Answer: a d. Session layer
35. Transport layer is implemented in _________ Answer: a
a. End system 40. In the OSI model, as a data packet moves from
b. NIC the lower to the upper layers, headers are
c. Ethernet _______
d. Signal transmission a. Added
Answer: a b. Removed
36. The functionalities of the presentation layer c. Rearranged
include ____________ d. Randomized
a. Data compression Answer: b
b. Data encryption 41. Which of the following statements can be
c. Data description associated with OSI model?
d. All of the mentioned a. A structured way to discuss and easier
Answer: d update system components
37. Delimiting and synchronization of data b. One layer may duplicate lower layer
exchange is provided by __________ functionality
a. Application layer
b. Session layer

6 University Academy
COMPUTER NETWORKS 2020-21

c. Functionality at one layer no way a. mechanical specifications of


requires information from another electrical connectors and
cables
layer
b. electrical specification of
d. It is an application specific network transmission line signal level
model c. specification for IR over
optical fiber
Answer: c
d. all of the mentioned
42. The physical layer is concerned with Answer: Option(d)
___________ 47. In asynchronous serial
a. bit-by-bit delivery communication the physical layer
b. process to process delivery provides ___________
c. application to application delivery a. start and stop signalling
d. port to port delivery b. flow control
Answer: Option(a) c. both start & stop signalling
43. Which transmission media provides and flow control
the highest transmission speed in a d. only start signalling
network? Answer: Option(c)
a. coaxial cable
b. twisted pair cable 48. The physical layer is responsible for
c. optical fiber _____
d. electrical cable a) line coding
Answer: Option(c) b) channel coding
c) modulation
44. Bits can be sent over guided and d) all of the mentioned
unguided media as analog signal by Answer: Option(d)
___________ 49. The physical layer translates logical
a. digital modulation communication requests from the
b. amplitude modulation ______ into hardware specific
c. frequency modulation operations.
d. phase modulation a. data link layer
Answer: Option(a) b. network layer
c. trasnport layer
45. The portion of physical layer that d. application layer
interfaces with the media access Answer: Option(a)
control sublayer is called 50. A single channel is shared by multiple
___________ signals by _____
a. physical signalling sublayer a. analog modulation
b. physical data sublayer b. digital modulation
c. physical address sublayer c. multiplexing
d. physical transport sublayer d. phase modulation
Answer: Option(a) Answer: Option(c)
51. Wireless transmission of signals can
46. The physical layer provides be done via ___________
__________ a. radio waves
b. microwaves

7 University Academy
COMPUTER NETWORKS 2020-21

c. infrared
d. all of the mentioned
Answer: Option(d)

Unit-II
c. ARP (Address Resolution Protocol),
IEEE802.3
1. The two sublayers of a Data Link layer are d. All the above
a. LLC Logical Link Control Layer Answer: Option(d)
b. MAC Medium Access Control Layer
c. Both A and B
d. Data Layer 5. Which is the protocol that maps varying IP
Answer: Option(c) addresses to the Physical MAC Address of a
machine in a LAN network?
a. ARQ (Automatic Repeat Request)
2. The functions of a Logical Link Layer b. ARP (Address Resolution Protocol)
(LLC) are c. SLIP (Serial Line Internet Protocol)
a. Error control d. PLIP (Parallel Line Internet Protocol)
b. Flow control Answer: Option(b)
c. Creating and managing the
communication link between two 6. Which protocols adopted the standards of
devices with the help of the Transport HDLC (High Level Link Control) protocol?
layer. a. X.25 protocol as LAPB (Link Access
d. All the above Procedure Balanced, V.42 protocol as
Answer: Option(d) LAPM (Link Access Procedure for
Modems)
b. Frame Relay protocol as LAPF (Link
3. The types of data services offered by an Access Procedure for Frame Relay)
LLC (Logical Link Control) layer are c. ISDN (Integrated Services Digital
a. Connectionless which is fast and Network) protocol as LAPD (Link
unreliable Access Procedure on D channel)
b. Connection Oriented which is slow d. All the above
and reliable Answer: Option(d)
c. Both A and B
d. None 7. The Dialup connections to access the
Answer: Option(c) internet uses ___ protocol.
a. PPP (Point to Point protocol)
b. X.25 protocol
4. Choose the Protocols working in the Data c. PLIP protocol
Link Control Layer of OSI model below. d. None
a. ATM (Asynchronous Transfer Mode), Answer: Option(a)
Frame Relay
b. HDLC (High Level Data Link 8. Automatic repeat request error management
Control), SDLC (Synchronous Data mechanism is provided by ________
Link Control) a. logical link control sublayer
b. media access control sublayer
8 University Academy
COMPUTER NETWORKS 2020-21

c. network interface control sublayer 14. Which of the following is the multiple
d. application access control sublayer access protocol for channel access control?
Answer: Option(a) a. CSMA/CD
b. CSMA/CA
9. Header of a frame generally contains c. Both CSMA/CD & CSMA/CA
a. synchronization bytes d. HDLC
b. addresses Answer: Option(c)
c. frame identifier
d. all of the mentioned 15. The technique of temporarily delaying
Answer: Option(d) outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is
called ____________
10. Which sublayer of the data link layer a. piggybacking
performs data link functions that depend upon b. cyclic redundancy check
the type of medium? c. fletcher’s checksum
a. logical link control sublayer d. parity check
b. media access control sublayer Answer: Option(a)
c. network interface control sublayer
d. error control sublayer 16. Which of the following uses a very thin
Answer: Option(b) glass or plastic fiber through which pulses of
light travel?
11. CRC stands for __________
a. cyclic redundancy check a. Cat 1
b. code repeat check b. Optical fiber
c. code redundancy check c. Twisted pair
d. cyclic repeat check d. Coax
Answer: Option(a) Answer: Option(b)

17. When does the station B send a positive


12. When 2 or more bits in a data unit has been acknowledgement (ACK) to station A in Stop
changed during the transmission, the error is and Wait protocol?
called _____
a. random error a. only when no error occurs at the
b. burst error transmission level
c. inverted error b. when retransmission of old packet in a
d. double error novel frame is necessary
Answer: Option(b) c. only when station B receives frame
with errors
13. Which of the following is a data link d. all of the above
protocol? Answer: Option(a)
a. ethernet
b. point to point protocol 18. Which consequences are more likely to
c. hdlc occur during the frame transmission in
d. all of the mentioned StopandWait ARQ mechanism?
Answer: Option(d)
a. Loss of frame or an acknowledgement

9 University Academy
COMPUTER NETWORKS 2020-21

b. Delay in an acknowledgement a. NRM


c. Normal operation b. ABM
d. All of the above c. Both a & b
Answer: Option(d) d. None of the above
Answer: Option(b)
19. Which provision can resolve / overcome 23. Which category of HDLC frames
the shortcomings associated with duplication undergoes error and flow control mechanisms
or failure condition of Stop and Wait by comprising send and receive sequence
Automatic Repeat Request protocol especially numbers?
due to loss of data frames or non reception of a. Uframes
acknowledgement? b. Iframes
c. Sframes
a. Provision of sequence number in the d. All of the above
header of message Answer: Option(c)
b. Provision of checksum computation
c. Both a & b 24. Which type of Sframe in HDLC exhibit the
d. None of the above correspondence of last three bits [N(R)] by
Answer: Option(a) defining the negative acknowledgement
(NAK) number with the code value of '01'?
20. Which ARQ mechanism deals with the
transmission of only damaged or lost frames a. Receive ready
despite the other multiple frames by increasing b. Receive not ready
the efficiency & its utility in noisy channels? c. Reject
d. Selective Reject
a. GoBackN ARQ Answer: Option(c)
b. Selective Repeat ARQ
c. StopandWait ARQ
d. All of the above 25. Which among the following represents the
Answer: Option(b) objectives/requirements of Data Link Layer?

21. Which feature of Go Back N ARQ a. Frame Synchronization


mechanism possesses an ability to assign the b. Error & Flow Control
sliding window in the forward direction? c. Both a & b
d. None of the above
a. Control Variables Answer: Option(c)
b. Sender Sliding Window
c. Receiver Sliding Window 26. When does the station B send a positive
d. Resending of frames acknowledgement (ACK) to station A in Stop
Answer: Option(b) and Wait protocol?

22. Which operational mode/s of HDLC a. only when no error occurs at the
support/s the balanced configuration by transmission level
governing point to point link connectivity in b. when retransmission of old packet in a
addition to the primary as well as secondary novel frame is necessary
functions performed by the station? c. only when station B receives frame
with errors

10 University Academy
COMPUTER NETWORKS 2020-21

d. all of the above b. 2


Answer: Option(a) c. 2.5
27. For pure ALOHA, the maximum channel d. 5
utilization is Answer: Option(b)
a. 100% 32. Let G(x) be the generator polynomial used
b. 50% for CRC checking. What is the condition that
c. 36% should be satisfied by G(x) to detect odd
d. 18% number of bits in error?
Answer: Option(d) a. G(x) contains more than two terms
b. G(x) does not divide 1+x^k, for any k
28. The program used to determine the round not exceeding the frame length
trip delay between a workstation and a c. 1+x is a factor of G(x)
destination address is d. G(x) has an odd number of terms
Answer: Option(c)
a. Tracert
b. Traceroute 33. In Ethernet when Manchester encoding is
c. Ping used, the bit rate is:
d. Pop a. Half the baud rate.
Answer: Option(b) b. Twice the baud rate.
c. Same as the baud rate.
29. What is the difference between the d. None of the above
Ethernet frame preamble field and the IEEE Answer: Option(a)
802.3 preamble and start of frame Delimiter
fields? 34. In a token ring network the transmission
speed is 10^7 bps and the propagation
a. 1 byte speed is 200 metres/micro second. The 1-
b. 1 bit bit delay in this network is equivalent to:
c. 4 bit a. 500 metres of cable.
d. 16 bit b. 200 metres of cable.
Answer: Option(a) c. 20 metres of cable.
d. 50 metres of cable
30. Which of the following approaches to Answer: Option(c)
switching share networks resource?
35. The message 11001001 is to be transmitted
a. Circuit switching using the CRC polynomial x^3 + 1 to
b. Packet switching protect it from errors. The message that
c. Both A and B should be transmitted is:
d. None of these a. 11001001000
Answer: Option(b) b. 11001001011
c. 11001010
31. Determine the maximum length of the d. 110010010011
cable (in km) for transmitting data at a rate of Answer: Option(b)
500 Mbps in an Ethernet LAN with frames of 36. The distance between two stations M and N
size 10,000 bits. Assume the signal speed in is L kilometers. All frames are K bits long.
the cable to be 2,00,000 km/s. The propagation delay per kilometer is t
a. 1 seconds. Let R bits/second be the channel

11 University Academy
COMPUTER NETWORKS 2020-21

capacity. Assuming that processing delay is d. 512


negligible, the minimum number of bits for Answer: Option(c)
the sequence number field in a frame for 40. How many 8-bit characters can be
maximum utilization, when the sliding transmitted per second over a 9600 baud
window protocol used is: serial communication link using
asynchronous mode of transmission with
one start bit, eight data bits, two stop bits,
and one parity bit ?
a. 600
b. 800
c. 876
a. A d. 1200
b. B Answer: Option(b)
c. C 41. Consider a CSMA/CD network that
d. D transmits data at a rate of 100 Mbps (108 bits
per second) over a 1 km (kilometre) cable
Answer: Option(c) with no repeaters. If the minimum frame size
37. A bit-stuffing based framing protocol uses required for this network is 1250 bytes, what
an 8-bit delimiter pattern of 01111110. If the is the signal speed (km/sec) in the cable?
output bit-string after stuffing is a. 8000
01111100101, then the input bit-string is b. 10000
a. 0111110100 c. 16000
b. 0111110101 d. 20000
c. 0111111101 Answer: Option(d)
d. 0111111111 42. Which one of the following statements is
Answer: Option(b) FALSE?
38. Station A uses 32 byte packets to transmit a. Packet switching leads to better
messages to Station B using a sliding utilization of bandwidth resources than
window protocol. The round trip delay circuit switching.
between A and B is 80 milliseconds and the b. Packet switching results in less
bottleneck bandwidth on the path between A variation in delay than circuit
and B is 128 kbps. What is the optimal switching.
window size that A should use? c. Packet switching requires more per
a. 20 packet processing than circuit
b. 40 switching
c. 160 d. Packet switching can lead to
d. 320 reordering unlike in circuit switching
Answer: Option(b)
Answer: Option(b)
39. Suppose the round trip propagation delay for
a 10 Mbps Ethernet having 48-bit jamming 43. Which of the following statements is TRUE
signal is 46.4 ms. The minimum frame size about CSMA/CD
is a. IEEE 802.11 wireless LAN
a. 94 runs CSMA/CD protocol
b. 416 b. Ethernet is not based on
c. 464 CSMA/CD protocol

12 University Academy
COMPUTER NETWORKS 2020-21

c. CSMA/CD is not suitable for Answer: Option(b)


a high propagation delay
network like satellite network 47. The minimum frame size required for a
d. There is no contention in a CSMA/CD based computer network
CSMA/CD network running at 1 Gbps on a 200m cable with a
Answer: Option(c) link speed of 2 × 108m/s is
44. A sender uses the Stop-and-Wait ARQ a. 125 bytes
protocol for reliable transmission of frames. b. 250 bytes
Frames are of size 1000 bytes and the c. 500 bytes
transmission rate at the sender is 80 Kbps d. None of these
(1Kbps = 1000 bits/second). Size of an Answer: Option(b)
acknowledgement is 100 bytes and the
transmission rate at the receiver is 8 Kbps.
The one-way propagation delay is 100 48. Suppose that the one-way propagation delay
milliseconds. Assuming no frame is lost, the for a 100 Mbps Ethernet having 48-bit
sender throughput is __________ jamming signal is 1.04 micro-seconds. The
bytes/second. minimum frame size in bits is:
a. 2500
b. 2000 a. 112
c. 1500 b. 160
d. 500 c. 208
Answer: Option(a) d. 256
Answer: Option(d)
45. In an Ethernet local area network, which one 49. Which of the following statement is False
of the following statements is TRUE ? about the efficiency of the given channel?
a. A station stops to sense the channel a. If we want to send big packets on the
once it starts transmitting a frame. channel, then Stop and Wait is good
b. The purpose of the jamming signal is choice.
to pad the frames that are smaller than b. If length of packet increases,
the minimum frame size. efficiency of channel also increases.
c. A station continues to transmit the c. Distance between sender and
packet even after the collision is receiver is directly proportional to
detected. efficiency of channel.
d. The exponential backoff mechanism d. Efficient might be less if capacity of
reduces the probability of collision channel is high
on retransmissions
Answer: Option(d) Answer: Option(c)

46. How many bytes of data can be sent in 15 50. Consider a link with packet loss probability
seconds over a serial link with baud rate of of 0.2. What is the expected number of
9600 in asynchronous mode with odd parity transmissions it would take to transfer 200
and two stop bits in the frame? packets given that the stop and wait protocol
a. 10,000 bytes is used?
b. 12,000 bytes a. 125
c. 15,000 bytes b. 250
d. 27,000 bytes c. 225

13 University Academy
COMPUTER NETWORKS 2020-21

d. 150 Answer: Option(b)


Answer: Option(b)

51. Which of the following devices takes data


sent from one network device and forwards
it to the destination node based on MAC 56. Match the following
address ?
a. Hub
b. Modem
c. Switch
d. Gateway
Answer: Option(c)
52. In Ethernet CSMA/CD, the special bit
sequence transmitted by media access
management to handle collision is called
a. Preamble
b. Postamble
c. Jam a. (1)
d. None of the above b. (2)
Answer: Option(c) c. (3)
d. (4)
53. Let C be a binary linear code with minimum Answer: Option(a)
distance 2t + 1 then it can correct upto _____
bits of error. 57. If the frame to be transmitted is 1101011011
a. t + 1 and the CRC polynomial to be used for
b. t generating checksum is x4+ x + 1, then what
c. t - 2 is the transmitted frame?
d. t / 2 a. 11010110111011
Answer: Option(b) b. 11010110111101
54. In CRC if the data unit is 100111001 and the c. 11010110111110
divisor is 1011 then what is dividend at the d. 11010110111001
receiver? Answer: Option(c)
a. 100111001101
b. 100111001011 58. What will be the efficiency of a Stop and
c. 100111001 Wait protocol, if the transmission time for a
d. 100111001110 frame is 20ns and the propagation time is
Answer: Option(b) 30ns?
a. 20%
55. A certain population of ALOHA users b. 25%
manages to generate 70 request/sec. If the c. 40%
time is slotted in units of 50 msec, then d. 66%
channel load would be Answer: Option(b)
a. 4.25
b. 3.5 59. Bit stuffing refers to
c. 350 a. inserting a 0 in user stream
d. 450 to differentiate it with a flag

14 University Academy
COMPUTER NETWORKS 2020-21

b. inserting a 0 in flag stream to


avoid ambiguity
c. appending a nipple to the flag
sequence
d. appending a nipple to the use
data stream
Answer: Option(a)

60. _______ can detect burst error of length less


than or equal to degree of the polynomial
and detects burst errors that affect odd
number of bits.
a. Hamming Code
b. CRC
c. VRC
d. None of the above
Answer: Option(b)

15 University Academy
COMPUTER NETWORKS 2020-21

Unit-III
Answer: Option(c)
1. The network layer is concerned with
__________ of data.

a. bits
b. frames 6. Which of the following routing algorithms
c. packets can be used for network layer design?
d. bytes a. shortest path algorithm
Answer: Option(c) b. distance vector routing
2. Which one of the following is not a function
c. link state routing
of network layer? d. all of the mentioned
a. routing Answer: Option(b)
b. inter-networking 7. A subset of a network that includes all the
c. congestion control routers but contains no loops is called
d. error control ________
Answer: Option(d) a. spanning tree
b. spider structure
3. In virtual circuit network each packet c. spider tree
contains ___________ d. special tree
Answer: Option(a)
a. full source and destination address 8. Which one of the following algorithm is not
b. a short VC number used for congestion control?
c. only source address
d. only destination address a. traffic aware routing
Answer: Option(b) b. admission control
c. load shedding
d. routing information protocol
4. Which of the following is not correct in Answer: Option(d)
relation to multi-destination routing?

a. is same as broadcast routing 9. ICMP is primarily used for __________


b. contains the list of all destinations
c. data is not sent by packets a. error and diagnostic functions
d. there are multiple receivers b. addressing
Answer: Option(c) c. forwarding
d. routing
5. A 4 byte IP address consists of __________ Answer: Option(a)
10. The network layer contains which
a. only network address hardware device?
b. only host address
c. network address & host address a. Routers, Bridges
d. network address & MAC address b. Bridges only

16 University Academy
COMPUTER NETWORKS 2020-21

c. Bridges and switches d. The devices that operates at


d. Routers, Bridges and Switches network
Answer: Option(d) Answer: Option(d)
11. Network layer protocol exits in _________ 16. ICMP stands for __________

a. Host a. Internet Coordinate Message Protocol


b. Switches b. Internet Control Message Protocol
c. Packets c. Interconnect Control Message
d. Bridges Protocol
Answer: Option(a) d. Interconnect Coordinate Message
Protocol
Answer: Option(b)
12. What are the common protocols associated 17. Packets will be transferred in how many
with the network layer? types?
a. Address Resolution Protocol a. 5 types
b. Reverse Address Resolution Protocol b. 4 types
c. Internet protocol c. 2 types
d. Neighbour Discovery Protocol d. 3 types
Answer: Option(c) Answer: Option(d)
18. RIP stands for ________
13. The network layer responds to request a. Reduced Information Protocol
from which layer? b. Routing Internet Protocol
a. Transport layer c. Routing Information Protocol
b. Data layer d. Reduced Internet Protocol
c. Application layer Answer: Option(c)
19. DDP stands for _________
d. Session layer
Answer: Option(a) a. Datagram Delivery Protocol
b. Device Delivery Protocol
c. Datagram Device Protocol
14. The network layer issues request to which
layer? d. Device Datagram Protocol
Answer: Option(a)
a. Transport layer 20. Which level is the network layer in the OSI
b. Data layer model?
c. Application layer
d. Session layer a. Third level
Answer: Option(b) b. Fourth level
c. Second level
d. Fifth layer
15. What are called routers? Answer: Option(a)
21. Which of the following is correct IPv4
a. The devices that operates at session address?
layer
b. The devices that operates at data layer a. 124.201.3.1.52
c. The devices that operates at b. 01.200.128.123
application layer c. 300.142.210.64

17 University Academy
COMPUTER NETWORKS 2020-21

d. 128.64.0.0 b. Masking
Answer: Option(d) c. Fragmenting
22. How many versions available of IP? d. Hopping
Answer: Option(a)
a. 6 version
b. 4 version
c. 2 version 28. Which field/s of ICMPv6 packet header
d. 1 version has/have a provision of minimal integrity level
Answer: Option(c) concerning to verification for ICMP
23. The term IPv4 stands for? messages?

a. Internet Protocol Version 4 a. Type


b. Internet Programming Version 4 b. Code
c. International Programming Version 4 c. Checksum
d. None of these d. All of the above
Answer: Option(a) Answer: Option(c)
24. Which of the following IP address class is
Multicast?
29. Which among the below stated datagram
a. Class A discard code fields in ICMP is/are generated if
b. Class B a router fails to forward a packet due to
c. Class C administrative filtering?
d. Class D
Answer: Option(d) a. Source Route Failed
25. Which form of byte assigning strategy is b. Communication Administratively
adopted in class B type of network Prohibited
corresponding to IP addresses? c. Host Precedence Violation
d. Precedence Cut-off in Effect
a. Network.Node.Node.Node Answer: Option(b)
b. Network.Network.Node.Node 30. What are the problems involved in an IP
c. Network.Network.Network.Node Fragmentation Process?
d. Network.Node.Node.Node
Answer: Option(b) A. Loss of any fragment results in
26. On which factors do the size of block rejection of all datagrams
depends in classless addressing? B. Management of buffer space is
essential to handle reassembly process
a. Nature & size of an entity C. No necessity of initializing the timer
b. Number of addresses after the reception of initial fragment
c. Availability of the address space D. Multiple attempts can be made to
d. All of the above recover ICMP error message due to
Answer: Option(a) connection-oriented IP service

a. A & B
27. The ability of a single network to span
multiple physical networks is known as b. C & D
______ c. B& C
a. Subnetting
d. A & D

18 University Academy
COMPUTER NETWORKS 2020-21

Answer: Option(a) 34. For which one of the following reasons


does Internet Protocol (IP) use the time-to-
31. In an IPv4 datagram, the M bit is 0, the live (TTL) field in the IP datagram header?
value of HLEN is 10, the value of total length
is 400 and the fragment offset value is 300. a. Ensure packets reach destination
The position of the datagram, the sequence within that time
numbers of the first and the last bytes of the b. Discard packets that reach later than
payload, respectively are that time
c. Prevent packets from looping
a. Last fragment, 2400 and 2789 indefinitely
b. First fragment, 2400 and 2759 d. Limit the time for which a packet gets
c. Last fragment, 2400 and 2759 queued in intermediate routers.
d. Middle fragment, 300 and 689 Answer: Option(c)
Answer: Option(c) 35. Which of the following statements is
32. Consider a source computer(S) transmitting TRUE?
a file of size 106 bits to a destination computer
(D)over a network of two routers (R1 and R2) a. Both Ethernet frame and IP packet
and three links(L1, L2, and L3). L1connects S include checksum fields
to R1; L2 connects R1 to R2; and L3 connects b. Ethernet frame includes a checksum
R2 to D. Let each link be of length 100 km. field and IP packet includes a CRC
Assume signals travel over each link at a speed field
of 108 meters per second. Assume that the link c. Ethernet frame includes a CRC
bandwidth on each link is 1Mbps. Let the file field and IP packet includes a
be broken down into 1000 packets each of size checksum field
1000 bits. Find the total sum of transmission d. Both Ethernet frame and IP packet
and propagation delays in transmitting the file include CRC fields
from S to D? Answer: Option(c)

a. 1005 ms
b. 1010 ms 36. Which of the following assertions is
c. 3000 ms FALSE about the Internet Protocol (IP)?
d. 3003 ms
Answer: Option(a) a. It is possible for a computer to have
multiple IP addresses
33. One of the header fields in an IP datagram b. IP packets from the same source to the
is the Time to Live (TTL) field. Which of the same destination can take different
following statements best explains the need for routes in the network
this field? c. IP ensures that a packet is discarded if
it is unable to reach its destination
a. It can be used to prioritize packets within a given number of hops
b. It can be used to reduce delays d. The packet source cannot set the
c. It can be used to optimize throughput route of an outgoing packets; the
d. It can be used to prevent packet route is determined only by the
looping routing tables in the routers on the
Answer: Option(d) way
Answer: Option(d)

19 University Academy
COMPUTER NETWORKS 2020-21

37. An organization is granted the block c. Reach agreement with other routers
130.34.12.64/26. It needs to have 4 subnets. about the network topology
Which of the following is not an address of d. All of the above
this organization? Answer: Option(d)

a. 130.34.12.124
b. 130.34.12.89 41. When a host on network A sends a message
c. 130.34.12.70 to a host on network B, which address does
d. 130.34.12.132 the router look at?
Answer: Option(d) a. Port
b. IP
38. An IP datagram of size 1000 bytes arrives c. Physical
at a router. The router has to forward this d. Subnet mask
packet on a link whose MTU (maximum Answer: Option(b)
transmission unit) is 100 bytes. Assume that 42. For n devices in a network, ________
the size of the IP header is 20 bytes. The number of duplex-mode links are required
number of fragments that the IP datagram will for a mesh topology.
be divided into for transmission is : a. n(n + 1)
b. n (n – 1)
a. 10 c. n(n + 1)/2
b. 50 d. n(n – 1)/2
c. 12 Answer: Option(d)
d. 13 43. __________ is a bit-oriented protocol for
communication over point-to-point and
Answer: Option(d) multipoint links.
a. Stop-and-wait
b. HDLC
39. In an IPv4 datagram, the M bit is 0, the
c. Sliding window
value of HLEN is 10, the value of total length
d. Go-back-N
is 400 and the fragment offset value is 300.
Answer: Option(c)
The position of the datagram, the sequence
44. In Challenge-Response authentication the
numbers of the first and the last bytes of the
claimant ________.
payload, respectively are
a. Proves that she knows the secret
a. Last fragment, 2400 and 2789 without revealing it
b. First fragment, 2400 and 2759 b. Proves that she doesn’t know the
c. Last fragment, 2400 and 2759 secret
d. Middle fragment, 300 and 689 c. Reveals the secret
Answer: Option(c) d. Gives a challenge
Answer: Option(a)
45. An organization is granted the block
40. Dynamic routing protocol enable routers to 130.34.12.64/26. It needs to have 4 subnets.
Which of the following is not an address of
a. Dynamically discover and maintain
this organization?
routes
a. 130.34.12.124
b. Distribute routing updates to other
b. 130.34.12.89
routers
c. 130.34.12.70

20 University Academy
COMPUTER NETWORKS 2020-21

d. 130.34.12.132 d. 10 Mbps
Answer: Option(d)
51. Dynamic routing protocol enable routers to
46. A pure ALOHA Network transmits 200 bit a. Dynamically discover and maintain
frames using a shared channel with 200 routes
Kbps bandwidth. If the system (all stations b. Distribute routing updates to other
put together) produces 500 frames per routers
second, then the throughput of the system is c. Reach agreement with other routers
______. about the network topology
a. 0.384 d. All of the above
b. 0.184
c. 0.286 Answer: Option(d)
d. 0.58 52. The address of a class B host is to be split
Answer: Option(b) into subnets with a 6-bit subnet number.
47. IPv6 does not support which of the What is the maximum number of subnets
following addressing modes? and the maximum number of hosts in each
a. unicast addressing subnet?
b. multicast addressing a. 62 subnets and 262142 hosts.
c. broadcast addressing b. 64 subnets and 262142 hosts.
d. anycast addressing c. 62 subnets and 1022 hosts.
d. 64 subnets and 1024 hosts
Answer: Option(c)
Answer: Option(c)
48. What is IP class and number of sub-
networks if the subnet mask is 255.224.0.0? 53. A network with bandwidth of 10 Mbps can
a. Class A, 3 pass only an average of 12,000 frames per
b. Class A, 8 minute with each frame carrying an average
c. Class B, 3 of 10,000 bits. What is the throughput of
d. Class B, 32 this network ?
a. 1 Mbps
Answer: Option(b) b. 2 Mbps
49. Which of the following is not a congestion c. 10 Mbps
policy at network layer? d. 12 Mbps
a. Flow Control Policy Answer: Option(b)
b. Packet Discard Policy 54. Suppose transmission rate of a channel is
c. Packet Lifetime Management Policy 32 kbps. If there are ‘8’ routes from source
d. Routing Algorithm to destination and each packet p contains
Answer: Option(a) 8000 bits. Total end to end delay in sending
50. A network with bandwidth of 10 Mbps can packet P is _____.
pass only an average of 15,000 frames per a. 2 sec
minute with each frame carrying an average b. 3 sec
of 8,000 bits. What is the throughput of this c. 4 sec
network? d. 1 sec
a. 2 Mbps Answer: Option(a)
b. 60 Mbps
c. 120 Mbps

21 University Academy
COMPUTER NETWORKS 2020-21

55. Which of the following routing technique / 59. In the TCP/IP protocol suite, which one of
techniques is / are used in distributed the following is NOT part of the IP header?
systems ? a. Fragment Offset
A. Fixed Routing b. Source IP address
B. Virtual Routing c. Destination IP address
C. Dynamic Routing d. Destination port number

Answer: Option(d)
a. A Only 60. In the network 200.10.11.144/27, the fourth
b. A and B only octet (in decimal) of the last IP address of
c. C only the network which can be assigned to a host
d. All A,B,C is ________
a. 158
Answer: Option(a) b. 255
56. Consider the given network implementation c. 222
scenario. For the given classful NID d. 223
199.10.20.0/24, the requirement is to create Answer: Option(a)
13 subnets. With given details, find the
range of first and last valid IP in 15th 61. Which one of the following fields of an IP
subnet. header is NOT modified by a typical IP
a. 199.10.20.208 to 199.10.20.222 router?
b. 199.10.20.225 to 199.10.20.238 a. Checksum
c. 199.10.20.193 to 199.10.20.206 b. Source address
d. Not of these c. Time to Live (TTL)
d. Length
Answer: Option(b) Answer: Option(b)

57. __________ do not take their decisions on 62. If a Company require 60 hosts then What is
measurements or estimates of the current the best possible subnet mask?
traffic and topology. a. 255.255.255.0
a. Static algorithms b. 255.255.255.192
b. Adaptive algorithms c. 255.255.225.224
c. Non - adaptive algorithms d. 225.225.255.240
d. Recursive algorithms Answer: Option(b)
Answer: Option(c)
63. The address resolution protocol (ARP) is
58. A subnet has been assigned a subnet mask used for
of 255.255.255.192. What is the maximum a. Finding the IP address from the DNS
number of hosts that can belong to this b. Finding the IP address of the default
subnet? gateway
a. 14 c. Finding the IP address that
b. 30 corresponds to a MAC address
c. 62 d. Finding the MAC address that
d. 126 corresponds to an IP address
Answer: Option(c)
Answer: Option(d)

22 University Academy
COMPUTER NETWORKS 2020-21

Unit-IV

1. Transport layer aggregates data from c. wins


different applications into a single stream d. sockwi
before passing it to ____________ Answer: Option(d)
6. An endpoint of an inter-process
a. network layer communication flow across a computer
b. data link layer network is called
c. application layer
d. physical layer a. socket
Answer: Option(a) b. pipe
2. Which of the following are transport layer c. port
protocols used in networking? d. machine
Answer: Option(a)
a. TCP and FTP
b. UDP and HTTP 7. Which one of the following is a version of
c. TCP and UDP UDP with congestion control?
d. HTTP and FTP
Answer: Option(c) a. datagram congestion control
3. User datagram protocol is called protocol
connectionless because _____________ b. stream control transmission protocol
c. structured stream transport
a. all UDP packets are treated d. user congestion control protocol
independently by transport layer Answer: Option(a)
b. it sends data as a stream of related
packets 8. A _____ is a TCP name for a transport
c. it is received in the same order as sent service access point.
order a. port
d. it sends data very quickly b. pipe
Answer: Option(a) c. node
4. Transmission control protocol ___________ d. protocol
a. is a connection-oriented protocol Answer: Option(a)
b. uses a three way handshake to 9. Transport layer protocols deals with _____
establish a connection
c. receives data from application as a a. application to application
single stream communication
d. all of the mentioned b. process to process communication
Answer: Option(d) c. node to node communication
5. Socket-style API for windows is called d. man to man communication
____________ Answer: Option(b)

a. wsock 10. Which of the following is a transport layer


b. winsock protocol?
23 University Academy
COMPUTER NETWORKS 2020-21

a. stream control transmission 17. Buffer overrun can be reduced by using


protocol what?
b. internet control message protocol a. Traffic control
c. neighbor discovery protocol b. Flow control
d. dynamic host configuration protocol c. Byte orientation
Answer: Option(a) d. Data integrity
11. What are the functions of the transport Answer: Option(b)
layer? 18. Transport layer can identify the symptoms
a. Multiplexing/ Demultiplexing of overload nodes using _________
b. Connection less Services a. Flow control
c. Connection oriented service b. Traffic control
d. Congestion control c. Byte orientation
Answer: Option(a) d. Data integrity
12. Which services are provided by transport Answer: Option(b)
layer? 19. Transport layer is which layer in OSI
a. Error control model?
b. Connection service a. Fourth layer
c. Connection less service b. Third layer
d. Congestion control c. Second layer
Answer: Option(a) d. Fifth layer\
13. TCP and UDP are called ________ Answer: Option(a)
a. Application protocols 20. Congestion control can control traffic entry
b. Session protocols into a telecommunications network, so to
c. Transport protocols avoid _________
d. Network protocols a. Congestive connection
Answer: Option(c) b. Connection collapse
14. Security based connection is provided by c. Congestive collapse
which layer? d. Collapse congestive
a. Network layer Answer: Option(c)
b. Session layer 21. FCP stands for _________
c. Application layer a. Fiber Channel Protocol
d. Transport layer b. Field Channel Protocol
Answer: Option(d) c. Fast Channel Protocol
15. TCP is the standard protocol with std no? d. Fiber Carrying Protocol
a. 5 Answer: Option(a)
b. 4 22. UDP packets are called as _________
c. 7 a. Segments
d. 3 b. Checksum
Answer: Option(c) c. Frames
16. Using which method in transport layer data d. Datagrams
integrity can be ensured? Answer: Option(d)
a. Checksum
b. Repetition codes 23._________ does not provide reliable end to
c. Cyclic redundancy checks end communication.
d. Error correcting codes a. TCP
Answer: Option(a) b. UDP

24 University Academy
COMPUTER NETWORKS 2020-21

c. Both TCP and UDP c. stop incoming traffic from a specific


d. Neither TCP nor UDP IP address but allow outgoing traffic
Answer: Option(b) to the same IP address
24. ARQ stands for __________ d. block TCP traffic from a specific
a. Automatic Repeat Request user on a multi-user system during
b. Automatic Request Repeat 9:00PM and 5:00AM
c. Application Repeat Request Answer: Option(d)
d. Application Request Repeat
Answer: Option(a) 29. Which of the following system calls results
25. The transport layer protocols used for real in the sending of SYN packets?
time multimedia, file transfer, DNS and email, a. socket
respectively are: b. bind
a. TCP, UDP, UDP and TCP c. listen
b. UDP, TCP, TCP and UDP d. connect
c. UDP, TCP, UDP and TCP Answer: Option(d)
d. TCP, UDP, TCP and UDP
Answer: Option(c) 30. In the slow start phase of the TCP
26. Which of the following transport layer congestion control algorithm, the size of the
protocols is used to support electronic mail? congestion window

a. SMTP a. does not increase


b. IP b. increases linearly
c. TCP c. increases quadratically
d. UDP d. increases exponentially
Answer: Option(c) Answer: Option(d)
27. Consider an instance of TCP’s Additive
Increase Multiplicative Decrease (AIMD) 31. Which one of the following uses UDP as
algorithm where the window size at the start of the transport protocol?
the slow start phase is 2 MSS and the a. HTTP
threshold at the start of the first transmission is b. Telnet
8 MSS. Assume that a timeout occurs during c. DNS
the fifth transmission. Find the congestion d. SMTP
window size at the end of the tenth Answer: Option(c)
transmission.
a. 8 MSS 32. the maximum window size for data
b. 14 MSS transmission using the selective reject
c. 7 MSS protocol with n-bit frame sequence
d. 12 MSS numbers is:
Answer: Option(c) a. 2^n
28. A layer-4 firewall (a device that can look b. 2^(n-1)
at all protocol headers up to the transport c. 2^n – 1
layer) CANNOT d. 2^(n-2)
a. block entire HTTP traffic during Answer: Option(b)
9:00PM and 5 :0OAM 33. Which of the following is NOT true about
b. block all ICMP traffic User Datagram Protocol in transport layer?

25 University Academy
COMPUTER NETWORKS 2020-21

a. Works well in unidirectional Answer: Option(c)


communication, suitable for broadcast
information. 37. Suppose there are n stations in a slotted
b. It does three way handshake before LAN. Each station attempts to transmit
sending datagrams with a probability P in each time slot. The
c. It provides datagrams, suitable for probability that only one station transmits
modeling other protocols such as in IP in a given slot is _______.
tunneling or Remote Procedure Call
and the Network File System
d. The lack of retransmission delays a. nP(1 – P)n – 1
makes it suitable for real-time b. nP
applications c. P(1 – P)n – 1
d. nP(1 – P)n – 1
Answer: Option(b) Answer: Option(a)
34. Identify the correct order in which a server 38. What is the maximum size of data that the
process must invoke the function calls application layer can pass on to the TCP
accept, bind, listen, and recv according to layer below?
UNIX socket API a. Any size
a. listen, accept, bind recv b. 216 bytes - size of TCP header
b. bind, listen, accept, recv c. 216 bytes
c. bind, accept, listen, recv d. 1500
d. accept, listen, bind, recv Answer: Option(a)
Answer: Option(b)
39. An ACK number of 1000 in TCP always
35. Consider the following statements. means that
I. TCP connections are full duplex. a. 999 bytes have been successfully
II. TCP has no option for selective received
acknowledgment b. 1000 bytes have been successfully
III. TCP connections are message received
streams. c. 1001 bytes have been successfully
a. Only I is correct received
b. Only I and II are correct d. None of the above
c. Only II and III are correct Answer: Option(d)
d. All of I, II and III are correct
40. Suppose you are browsing the world wide
Answer: Option(a) web using a web browser and trying to
access the web servers. What is the
36. Generally TCP is reliable and UDP is not underlying protocol and port number that
reliable. DNS which has to be reliable uses are being used?
UDP because a. UDP, 80
a. UDP is slower b. TCP, 80
b. DNS servers has to keep connections c. TCP, 25
c. DNS requests are generally very d. UDP, 25
small and fit well within UDP Answer: Option(b)
segments
d. None of these

26 University Academy
COMPUTER NETWORKS 2020-21

41. If link transmits 4000 frames per second


and each slot has 8 bits, the transmission 46. The maximum payload of a TCP segment
rate of circuit of this TDM is ______. is:
a. 64 Kbps a. 65,535
b. 32 Mbps b. 65,515
c. 32 Kbps c. 65,495
d. 64 MbpS d. 65,475
Answer: Option(c) Answer: Option(c)

42. Which algorithm is used to shape the bursty 47. Silly Window Syndrome is related to
traffic into a fixed rate traffic by averaging a. Error during transmission
the data rate? b. File transfer protocol
a. solid bucket algorithm c. Degrade in TCP performance
b. spanning tree algorithm d. Interface problem
c. hocken helm algorithm
d. leaky bucket algorithm Answer: Option(c)
Answer: Option(d)
48. SSL is not responsible for
43. Four channels are multiplexed using TDM. a. Mutual authentication of client &
If each channel sends 100 bytes/second and server
we multiplex 1 byte per channel, then the b. Secret communication
bit rate for the link is __________. c. Data Integrity protection
a. 400 bps d. Error detection and correction
b. 800 bps Answer: Option(d)
c. 1600 bps 49. Which of the following is not a field in
d. 3200 bps TCP header?
Answer: Option(d) a. Sequence number
44. A device is sending out data at the rate of b. Fragment offset
2000 bps. How long does it take to send a c. Checksum
file of 1,00,000 characters ? d. Window size
a. 50 Answer: Option(b)
b. 200 50. To guarantee correction of upto t errors, the
c. 400 minimum Hamming distance d min in a
d. 800 block code must be ________.
Answer: Option(c) a. t+1
45. The TCP sliding window b. t−2
c. 2t−1
a. can be used to control the flow of d. 2t+1
information Answer: Option(d)
b. always occurs when the field value is
0
c. always occurs when the field value is
1
d. occurs horizontally

Answer: Option(a)

27 University Academy
COMPUTER NETWORKS 2020-21

Unit-V
1. The ____ layer is the network dialog
controller. 6. The functionalities of the presentation layer
a. network include ____________
b. transport a. Data compression
c. session b. Data encryption
d. presentation c. Data description
Answer: Option(c) d. All of the mentioned
Answer: Option(d)
2. The ____ layer establishes, maintains, and
synchronizes the interaction between 7. Encryption and decryption are functions of
communicating systems. which layer?
a. network a. transport
b. transport b. session
c. session c. application
d. presentation d. presentation
Answer: Option(c) Answer: Option(d)

3. The session layer lies between the 8. Which of the following layers of the OSI
______layer and the presentation layer. reference model is concerned with the syntax
a. network of data exchanged between application
b. transport entities?
c. data link a. Presentation layer
d. application b. Application layer
Answer: Option(b) c. Transportation layer
d. Session layer
4. The _____ layer lies between the session Answer: Option(a)
layer and he application layer.
a. network 9. In respect of OSI model, LANs implement
b. transport a. lower two layers
c. data link b. all seven layers
d. presentation c. upper five layers
Answer: Option(d) d. None of the above
Answer: Option(b)
5. The _____ layer uses data compression to
reduce the number of bits to be transmitted.
a. presentation 10. In OSI model, which of the following layer
b. network transforms information from machine format
c. data link into that understandable by user
d. application a. application
Answer: Option(a) b. session

28 University Academy
COMPUTER NETWORKS 2020-21

c. presentation c. Transport layer


d. physical d. Link layer
Answer: Option(c) Answer: Option(b)

11. Which network component/s is/are 16. Which of the following layers is an
involved in the Presentation layer of an OSI addition to OSI model when compared with
model? TCP IP model?
a. Gateway a. Application layer
b. Multiplexer & Oscilloscope b. Presentation layer
c. Amplifier & Hub c. Session layer
d. All of the above d. Session and Presentation layer
Answer: Option(a) Answer: Option(d)

12. Which OSI layer assumes responsibility 17. In the OSI model, as a data packet moves
for managing network connections between from the lower to the upper layers, headers are
applications? a. Added
a. Network layer b. Removed
b. Data link layer c. Rearranged
c. Application layer d. Randomized
d. Session layer Answer: Option(b)
Answer: Option(d)
18. Which of the following statements can be
13. The _______ layer ensures interoperability associated with OSI model?
between communicating devices through a. A structured way to discuss and easier
transformation of data into a mutually agreed update system components
upon format. b. One layer may duplicate lower layer
functionality
a. network c. Functionality at one layer no way
b. presentation requires information from another
c. transport layer
d. data link d. It is an application specific network
Answer: Option(b) model
Answer: Option(b)
14. In OSI model, when data is sent from
device A to device B, the 5th layer to receive 19. In OSI model, session layer is responsible
data at B is _________ for
a. Application layer a. Recovery
b. Transport layer b. Check pointing
c. Link layer c. Both a and b
d. Session layer d. None of the above
Answer: Option(d) Answer: Option(c)

15. Delimiting and synchronization of data 20. In which layer of OSI client send request
exchange is provided by __________ to the server?
a. Application layer a. Application layer
b. Session layer b. Presentation layer

29 University Academy
COMPUTER NETWORKS 2020-21

c. Session layer Answer: Option(d)


d. Transport layer
Answer: Option(c) 26. Which of the following is an application
layer service?
21. What is the main function of Session layer a. Remote log-in
in OSI model? b. File transfer and access
a. Defines how data is formatted c. Mail service
between the devices d. All of the above
b. Made physical connection between Answer: Option(d)
server and client
c. Both a and b 27. Which DNS client maps an address to a
d. None of the above name or a name to an address especially
Answer: Option(a) when required by a host?

22. Sometimes, Session layer is also called a. Resolver


______ layer b. Mapper
c. Primary Server
a. Virtual layer d. Secondary Server
b. Port layer Answer: Option(a)
c. Segmentation layer
d. Process layer 28. Which application-level protocol plays a
Answer: Option(b) crucial role in carrying out the data
definition and manipulation in addition to
23. In which layer of OSI session is first check X-500 features?
and then data is transmitted
a. TCP
a. Application layer b. LDAP
b. Presentation layer c. FTP
c. Session layer d. None of the above
d. Transport layer Answer: Option(b)
Answer: Option(c)
29. Which intermediaries are more likely to
24. Which of the following is the session layer get involved during the transfer function
protocol or service? of an e-mail system?
a. SPDY
b. NetBIOS a. Storage and forwarding of e-mail for
c. PPTP certain addresses
d. SAP b. Act as gateways to other e-mail or
Answer: Option(c) messaging systems
25. TELNET, FTP, SMTP, Protocols fall in c. Both a & b
the following layer of OSI reference d. None of the above
model? Answer: Option(c)
a. Transport layer 30. Which among the below specified
b. Internet layer illustrations belongs to the category of
c. Network layer GUI based user agents?
d. Application layer

30 University Academy
COMPUTER NETWORKS 2020-21

a. mail d. OPTION
b. pine Answer: Option(c)
c. Outlook & Netscape 34. Which language in WWW specifies a
d. All of the above web's way by describing three-
Answer: Option(c) dimensional objects?
a. HTML
31. Which phase/s of POP3 allow/s an user b. VRML
agent to retrieve the messages as well as c. XML
to mark the messages for deletion d. UML
purpose? Answer: Option(b)
35. Which field of cookie in WWW
a. Authorization Phase represents the server's directory structure
b. Transaction Phase by identifying the utilization of part
c. Update Phase associated with server's file tree?
d. All of the above
Answer: Option(b) a. Domain
b. Path
32. Consider the assertions given below. c. Content
Which among them prove to be beneficial d. Secure
for Persistent HTTP connections? Answer: Option(b)

A. Reduction in latency over the sub- 36. Which among the below mentioned
sequent requests protocols provides a mechanism of
B. Pipeline-oriented connection over the acquiring an IP address without manual
requests and responses intervention in addition to plug and play
C. Increase in number of packets due to type of networking?
TCP opens
D. Prevention in opening and closing of a. BOOTP
some TCP connections b. DHCP
c. Both a & b
a. A & B d. None of the above
b. C & D Answer: Option(b)
c. A & C
d. B & B 37. Which of the following layers of the OSI
Answer: Option(a) model is responsible for user interaction?
a. Layer 4
33. Which URL method of HTTP performs b. Layer 5
similar function as that of PUT method c. Layer 6
only with an exception of request d.Layer 7
comprising a list of differences that Answer: Option(d)
exhibit the necessity to get implemented
in the existing file? 38. What occurs in the session layer?
a. Data compression and encryption
a. POST b. MAC address are handled
b. GET c. binary to decimal conversion
c. PATCH d.sessions are created

31 University Academy
COMPUTER NETWORKS 2020-21

Answer: Option(d) 44. In the SMTP herder field_____ is added


by the final transport system that delivers
39. Which of the following is/are the the mail.
important applications of the application a. Reply-to
layer? b. Return-path
a. Electronic mail c. Subject
b. World Wide Web d. From
c. USENET Answer: Option(b)
d.All of the above
Answer: Option(d)
40. The TCP/IP …………corresponds to the 45. In SMTP mail transaction flow, the
combined session, presentation, and sender SMTP establishes a TCP
application layers of the OSI model. connection with the destination SMTP
a. session layer and then waits for the server to send a
b. presentation layer ……….
c. application layer a. 220 service ready message
d. None of the above b. 421 service not available message
Answer: Option(c) c. Both of the above
d. None of the above
41. The ……… protocol is based on end-to- Answer: Option(c)
end delivery.
a. SMTP 46. In the MIME header field____describes
b. TCP how the object within the body is to be
c. IP interpreted.
d. SCTP a. content-type
Answer: Option(a) b. content-transfer-encoding
c. content-description
42. The well-known port of the SMTP server d. content-id
is ……. Answer: Option(a)
a. 110
b. 25 47. In the MIME header field, ____describes
c. 50 how the object within the body was
d. 20 encoded in order that it be included in the
Answer: Option(b) message using a mail-safe form.
a. content-type
b. content-transfer-encoding
43. In the SMTP header field_____ is a c. content-description
summary of the message being sent which d. content-id
is specified by the sender. Answer: Option(b)
a. Reply-to
b. Return-path 48. In a/an ………… of DNS resolver, the
c. Subject queried name server can return the best
d. From answer it currently has back to the DNS
Answer: Option(c) resolver.
a. Recursive queries
b. Iterative queries

32 University Academy
COMPUTER NETWORKS 2020-21

c. Reverse queries 54. The ASCII encoding of binary data is


d. Inverse queries called
Answer: Option(b) a. base 64 encoding
49. The TCP/IP _______ layer is equivalent b. base 32 encoding
to the combined session, presentation, and c. base 16 encoding
application layers of the OSI model. d. base 8 encoding
a. data link Answer: Option(a)
b. network
c. physical 55. Consider different activities related to
d.application email:
Answer: Option(d) m1: Send an email from a mail client to a mail
server
50. In TCP IP Model, when data is sent from m2: Download an email from mailbox server
device A to device B, the 5th layer to to a mail client
receive data at B is ____________ m3: Checking email in a web browser
a. Application layer Which is the application level protocol used in
b. Transport layer each activity?
c. Link layer a. m1: HTTP m2: SMTP m3: POP
d. Session layer b. m1: SMTP m2: FTP m3: HTTP
Answer: Option(a) c. m1: SMTP m2: POP m3: HTTP
d. m1: POP m2: SMTP m3: IMAP
51. Which layer provides the services to user?
a. application layer Answer: Option(c)
b. session layer
c. presentation layer 56. Identify the correct order in which the
d. physical layer following actions take place in an
Answer: Option(a) interaction between a web browser and a
web server.
52. Application layer protocol defines ____ 1. The web browser requests a
a. types of messages exchanged webpage using HTTP.
b. message format, syntax and semantics 2. The web browser establishes a TCP
c. rules for when and how processes send connection with the web server.
and respond to messages 3. The web server sends the requested
d.all of the mentioned webpage using HTTP.
Answer: Option(d) 4. The web browser resolves the
domain name using DNS.
53. Which one of the following allows a user a. 4,2,1,3
at one site to establish a connection to b. 1,2,3,4
another site and then pass keystrokes c. 4,1,2,3
from local host to remote host? d. 2,4,1,3
a. HTTP
b. FTP Answer: Option(a)
c. Telnet
d. TCP 57. In one of the pairs of protocols given
Answer: Option(c) below, both the protocols can use
multiple TCP connections between the

33 University Academy
COMPUTER NETWORKS 2020-21

same client and the server. Which one is


that? 61. Which of the following protocols is used
a. HTTP, FTP by email server to maintain a central
b. HTTP, TELNET repository that can be accessed from any
c. FTP, SMTP machine ?
d. HTTP, SMTP a. POP3
Answer: Option(a) b. IMAP
c. SMTP
d. DMSP
Answer: Option(b)
58. Which one of the following statements is 62. A packet filtering firewall can
NOT correct about HTTP cookies? a. deny certain users from accessing a
a. A cookies is a piece of code that has service
the potential to compromise the b. block worms and viruses from
security of an Internet user entering the network
b. A cookie gains entry to the user’s c. disallow some files from being
work area through an HTTP header accessed through FTP
c. A cookie has an expiry date and time d. block some hosts from accessing the
d. Cookies can be used to track the network
browsing pattern of a user at a
particular site Answer: Option(d)

Answer: Option(a) 63. Which of the following protocols is an


59. Which of the following is/are example(s) application layer protocol that establishes,
of stateful application layer protocols? manages and terminates multimedia
(i) HTTP sessions ?
(ii) FTP a. Session Maintenance Protocol
(iii) TCP b. Real - time Streaming Protocol
(iv) POP3 c. Real - time Transport Control Protocol
d. Session Initiation Protocol
a. (i) and (ii) only Answer: Option(d)
b. (ii) and (iii) only
c. (ii) and (iv) only 64. What is the size of the ‘total length’ field
d. (iv) only in IPv4 datagram?
a. 4 bit
Answer: Option(c) b. 8 bit
c. 16 bit
60. Which of the following protocol is used d. 32 bit
for transferring electronic mail messages Answer: Option(c)
from one machine to another?
a. TELNET 65. What is one advantage of setting up a
b. FTP DMZ(Demilitarized Zone) with two
c. SNMP firewalls?
d. SMTP a. You can control where traffic goes
in the three networks
Answer: Option(d) b. You can do stateful packet filtering

34 University Academy
COMPUTER NETWORKS 2020-21

c. You can do load balancing


d. Improve network performance
Answer: Option(a)

Practice Set
Set-1
1. The computer network is D) Fiber Distributed Data Interface
A) Network computer with cable 8. Which of the following is an application
B) Network computer without cable layer service?
C) Both of the above
A) Network virtual terminal
D) None of the above
B) File transfer, access and management
2. FDDI used which type of physical
C) Mail service
topology?
D) All of the above
A) Bus 9. Which is the main function of transport
B) Ring layer?
C) Star
A) Node to node delivery
D) Tree
B) End to end delivery
3. FTP stands for
C) Synchronization
A) File transfer protocol d) Updating and maintaining routing tables
B) File transmission protocol 10. The .............. layer change bits onto
C) Form transfer protocol electromagnetic signals.
D) Form transmission protocol A) Physical
4. Ethernet system uses which of the
B) Transport
following technology.
C) Data Link
A) Bus D) Presentation
B) Ring 11. In mesh topology, relationship between
C) Star one device and another is ..............
D) Tree A) Primary to peer
5. Which of the following are the network B) Peer to primary
services?
C) Primary to secondary
A) File service D) Peer to Peer
B) Print service 12. The performance of data communications
C) Database service network depends on ..............
D) All of the above A) Number of users
6. If all devices are connected to a central
B) The hardware and software
hub, then topology is called
C) The transmission
A) Bus Topology D) All of the above
B) Ring Topology 13. Find out the OSI layer, which performs
C) Star Topology token management.
D) Tree Topology A) Network Layer
7. FDDI stands for
B) Transport Layer
A) Fiber Distributed Data Interface C) Session Layer
B) Fiber Data Distributed Interface D) Presentation Layer
C) Fiber Dual Distributed Interface
35 University Academy
COMPUTER NETWORKS 2020-21

14. The name of the protocol which provides


virtual terminal in TCP/IP model is. Answers:
A) Telnet 1. C) Both of the above
B) SMTP 2. B) Ring
C) HTTP 3. A) File transfer protocol
15. The layer one of the OSI model is 4. A) Bus
5. D) All of the above
A) Physical layer
6. C) Star Topology
B) Link layer
7. A) Fiber Distributed Data
C) Router layer
Interface
D) Broadcast layer
8. C) Mail service
16. What is the name of the network
9. B) End to end delivery
topology in which there are bi-
10. A) Physical
directional links between each possible
11. D) Peer to Peer
node?
12. D) All of the above
A) Ring
13. C) Session Layer
B) Star
14. A) Telnet
C) Tree
15. A) Physical layer
D) Mesh 16. D) Mesh
17. What is the commonly used unit for 17. B) Baud
measuring the speed of data 18. B) Half-duplex
transmission? 19. A) Attenuation
A) Bytes per second 20. A) FTP
B) Baud
C) Bits per second
D) Both B and C
18. Which of the communication modes
support two way traffic but in only once
direction of a time?
A) Simplex
B) Half-duplex
C) Three - quarter's duplex
D) Full duplex
19. The loss in signal power as light travels
down the fiber is called .............
A) Attenuation
B) Propagation
C) Scattering
D) Interruption
20. Which of the following TCP/IP protocols
is used for transferring files form one
machine to another.
A) FTP
B) SNMP
C) SMTP
D) RPC
36 University Academy
COMPUTER NETWORKS 2020-21

Set-2
1. A network that needs human 7. Which of the following OSI
beings to manually route signals is layers correspond to TCP/IP's
called.... application layer?
A) Fiber Optic Network A) Application
B) Bus Network B) IP Address
C) T-switched network C) Session
D) Ring network D) All of the above
2. TCP/IP layer corresponds to
the OSI models to three layers. 8. Devices on one network can
A) Application communicate with devices on another
B) Presentation network via a .......
C) Session A) File Server
D) Transport B) Utility Server
3. Which of the transport layer C) Printer Server
protocols is connectionless? D) Gateway
A) UDP 9. A communication device that
B) TCP combines transmissions from several
C) FTP I/O devices into one line is a
D) Nvt A) Concentrator
4. Which of the following B) Modifier
applications allows a user to access C) Multiplexer
and change remote files without actual D) Full duplex file
transfer? 10. Which layers of the OSI
A) DNS determines the interface often system
B) FTP with the user?
C) NFS A) Network
D) Telnet B) Application
5. The data unit in the TCP/IP C) Data link
layer called a ..... D) Session
A) Message 11. Which of the following of the
B) Segment TCP/IP protocols is the used for
C) Datagram transferring files from one machine to
D) Frame another?
6. DNS can obtain the of A) FTP
host if its domain name is known and B) C) SNMP
vice versa. C) SMTP
A) Station address D) D) Rpe
B) IP address 12. In which OSI layers does the
C) Port address FDDI protocol operate?
D) Checksum A) Physical

37 University Academy
COMPUTER NETWORKS 2020-21

B) Data link 19. Which of the following is the


C) Network logical topology?
D) A and B A) Bus
13. In FDDI, data normally travel B) Tree
on .................. C) Star
D) Both A and B
A) The primary ring 20. Which of the following is/ are
B) The Secondary ring the drawbacks of Ring Topology?
C) Both rings A) Failure of one computer, can
D) Neither ring affect the whole network
14. The layer of OSI model B) Adding or removing the
can use the trailer of the frame for computers disturbs the network
error detection. activity.
A) Physical C) If the central hub fails, the
B) Data link whole network fails to operate.
C) Transport D) Both of A and B
D) Presentation
15. In a topology, if there are
n devices in a network, each device Answer
has n-1 ports for cables. 1. C) T-switched network
A) Mesh 2. A) Application
B) Star 3. A) UDP
C) Bus 4. C) NFS
D) Ring 5. D) Frame
16. Another name for Usenet is 6. B) IP address
A) Gopher 7. D) All of the above
B) Newsgroups 8. D) Gateway
C) Browser 9. C) Multiplexer
D) CERN 10. B) Application
17. The standard suit of protocols 11. A) FTP
used by the Internet, Intranets, 12. D) A and B
extranets and some other networks. 13. A) The primary ring
A) TCP/IP 14. A) Physical
B) Protocol 15. A) Mesh
C) Open system 16. B) Newsgroups
D) Internet work processor 17. A) TCP/IP
18. State whether the following is 18. A) True, True
True or False. 19. C) Star
i) In bus topology, heavy 20. D) Both of A and B
Network traffic slows down the bus
speed.
ii) It is multipoint configuration.
A) True, True
B) B) True, False
C) False, True
D) False, False

38 University Academy
COMPUTER NETWORKS 2020-21

Set-3
c. Both A and B
1. Which of the following is not the layer d. None of the above
of TCP/IP protocol?
a. Application Layer
b. Session Layer 6. Which is not the Regional Internet
c. Transport Layer Registers (RIR) of the following?
d. Internetwork layer a. American Registry for Internet
2. address use 7 bits for the <network> Numbers (ARIN)
and 24 bits for the <host> portion of b. Europeans Registry for
the IP Internet Numbers (ERIN)
a. address. c. Reseaux IP Europeans (RIPE)
b. Class A d. Asia Pacific Network
c. Class B Information Centre (APNIC)
d. Class C 7. Match the following IEEE No to their
e. Class D corresponding Name for IEEE 802
3. addresses are reserved for standards for LANs.
multicasting. i) 802.3 a) WiFi
a. Class B ii) 802.11 b) WiMa
b. Class C iii) 802.15.1 c) Ethernet
c. Class D iv) 802.16 d) Bluetooth
d. Class E a. i-b, ii-c, iii-d, iv-a
4. State the following statement is true or b. i-c, ii-d, iii-a, iv-b
false. c. i-c, ii-a, iii-d, iv-b
I. In class B addresses a total of d. i-b, ii-d, iii-c, iv-a
more than 1 billion addresses 8. was the first step in the evolution of
can be formed. Ethernet from a coaxial cable bus to
II. Class E addresses are reserved hub managed, twisted pair network.
for future or experimental use. a. Star LAN
a. True, False b. Ring LAN
b. True, True c. Mesh LAN
c. False, True d. All of the above
d. False, False 9. is the predominant form of Fast
5. Which of the following statement is Ethernet, and runs over two pairs of
true? category 5 or above cable.
I. An address with all bits 1 is a. 100 BASE-T
interpreted as all networks or all hosts. b. 100 BASE-TX
II. The class A network 128.0.0.0 is c. 100 BASE-T4
defined as the loopback network. d. 100 BASE-T2
a. i only 10. IEEE 802.3ab defines Gigabit
b. ii only Ethernet transmission over unshielded

39 University Academy
COMPUTER NETWORKS 2020-21

twisted pair (UTP) category 5, 5e or 6 I. A connection oriented protocol can


cabling known as .................... only use unicast addresses.
a. 1000 BASE-T II. The any cast service is included in
b. 1000 BASE-SX IPV6.
c. 1000 BASE-LX a. True, False
d. 1000 BASE-CX b. True, True
11. is a high performance fiber optic token c. False, True
ring LAN running at 100 Mbps over d. False, False
distances up to 1000 stations 17. implies that all subnets obtained from
connected. the same network use the subnet mask.
a. FDDI a. Static subnetting
b. FDDT b. Dynamic Subnetting
c. FDDR c. Variable length subnetting
d. FOTR d. Both B and C
12. Which of the following are Gigabit
Ethernets? 18. The most important and common
a. 1000 BASE-SX protocols associated TCP/IP
b. 1000 BASE-LX internetwork layer are.
c. 1000 BASE-CX i) Internet Protocol (IP)
d. All of the above ii) Internet Control Message Protocol
13. is a collective term for a number of (ICMP)
Ethernet Standards that carry traffic at iii) Bootstrap Protocol (BOOTP)
the nominal rate of 1000 Mbits/s iv) Dynamic Host Configuration
against the original Ethernet speed of Protocol (DHCP)
10 Mbit/s. v) Address Resolution Protocol
a. Ethernet (ARP)
b. Fast Ethernet a. i, ii, iii, and iv only
c. Gigabit Ethernet b. ii, iii, iv and v only
d. All of the above c. i, iii, iv and v only
14. is another kind of fiber optic network d. All i, ii, iii, iv and v only
with active star for switching. 19. ........... is responsible for converting
a. S/NET the higher level protocol addresses to
b. SW/NET physical Network Addresses.
c. NET/SW a. Address Resolution Protocol
d. FS/NET (ARP)
15. The combination of ........... and is b. Reverse Address Resolution
often termed the local address or the Protocol (RARP)
local portion of the IP Address. c. Bootstrap Protocol (BOOTP)
a. Network number and host d. Internet Control Message
number Protocol (ICMP)
b. Network number and subnet 20. Which of the following is not a
number mechanism that DHCP supports for IP
c. Subnet number and host address allocation?
number. a. Automatic allocation
d. All of the above b. Static allocation
16. State whether true or false. c. Dynamic allocation

40 University Academy
COMPUTER NETWORKS 2020-21

d. Manual allocation

Answer:
1. B) Session Layer
2. A) Class A
3. C) Class D
4. B) True, True
5. A) i only
6. B) Europeans (ERIN)
7. C) i-c, ii-a, iii-d, iv-b
8. A) Star LAN
9. B) 100 BASE-TX
10. A) 1000 BASE-T
11. A) FDDI
12. D) All of the above
13. B) Fast Ethernet
14. A) S/NET
15. C) Subnet... number.
16. B) True, True
17. A) Static subnetting
18. D) All i, ii, iii, iv and v only
19. A) Address Protocol (ARP)
20. B) Static allocation

41 University Academy
COMPUTER NETWORKS 2020-21

Set-4
1. Which server computer that is d. all of above
configured to serve file transfer and storage,
data migration, file updates
synchronization? 5. Which of the following is not email
a. FTP Server. service?
b. Database Server a. Hotmail
c. File Server b. Gmail
d. None of above c. Yahoo
d. None of above
2. Which of the following is responsible
for approving standards and allocating 6. Which of the following application is
resources in the Internet? required to read your email in
a. Internet Architecture Board (IAB) Hotmail?
b. Internet Engineering Task Force (IETF) a. A computer with browser and internet
c. InterNIC connection
d. None of above b. Outlook Express or Microsoft Outlook
c. Eudora Pro
3. Which body in Internet provides the d. All of above
registration services to Internet
community? 7. Tim Berners Lee is credited for the
a. Internet Architecture Board (IAB) creation of
b. Internet Engineering Task Force (IETF) a. Web email system
c. InterNIC b. world wide web
d. None of above c. File Transfer Protocol
d. All of above
4. Which of the following is considered a
broad band communication 8. Error control is needed at the transport
channel? layer because of potential errors occurring
a. coaxial cable _____.
b. fiber optics cable a. from transmission line noise
c. microwave circuits b. in routers

42 University Academy
COMPUTER NETWORKS 2020-21

c. from out-of-sequence delivery


d. from packet losses

9. Which of the following is not a


standard synchronous communication
protocol?
a. SDLC
b. SMTP
c. SLIP
d. PAS

10. The network layer, in reference to the


OSI model, provide
a. data link procedures that provide for the
exchange of data via frames that can be
sent and received
b. the interface between the X.25 network
and packet mode device
c. the virtual circuit interface to packet-
switched service
d. All of the above

Answers
1.c
2.a
3.c
4.d
5.c
6.a
7.b
8.b
9.d
10.c

43 University Academy
COMPUTER NETWORKS 2020-21

Set-5
1. What is the powerful, centralized b. Internet Engineering Task Force
computer system that performs data (IETF)
storage and processing tasks on behalf c. InterNIC
of clients and other network devices ? d. None of above
a. Client
b. Host computer 5. Which body in Internet
c. Terminal provides the registration services to
d. Network Internet community?
a. Internet Architecture Board
2. A self-sufficient computer that (IAB)
acts as both a server and a client is b. Internet Engineering Task Force
known as (IETF)
a. Host c. InterNIC
b. Client d. None of above
c. Server
d. Peer 6. Who is responsible for
discussing and investigating the
3. A server computer that is operational and technical problems of
configured to serve file transfer and Internet?
storage, data migration, file updates a. Internet Architecture Board
synchronization is (IAB)
a. FTP Server b. Internet Engineering Task Force
b. Database Server (IETF)
c. File Server c. InterNIC
d. None of above d. None of above
4. Which of the following is 7. Which is the channel handle
responsible for approving standards moderate data volumes in transmission
and allocating resources in the rate between 110 to 9600 bps?
Internet? a. Narrowband channel
a. Internet Architecture Board b. Voice band channel
(IAB) c. Broadband channel

44 University Academy
COMPUTER NETWORKS 2020-21

d. None of abover 9.a


8. A high speed, high capacity 10.a
transmission medium that can carry
signals from multiple independent
network carrier is?
a. Narrowband channel
b. Voice band channel
c. Broadband channel
d. None of above

9. The internet was developed by


US
a. Department of Defense
b. Department of Electronics
c. Department of Commerce
d. None of above

10. A user can get files from


another computer by using
a. File Transfer Protocol
b. TCP/IP
c. Internet Protocol
d. None of above

Answers
1.b
2.d
3.c
4.a
5.c
6.b
7.b
8.c

45 University Academy
COMPUTER NETWORKS 2020-21

Set-6
1. A group of computers connected c. microwave transmission
together to communicate and share d. none of above
resources is known as
a. A computer network 5. The interactive transmission
b. A server of data within a time sharing system
c. A client may be best suited to
d. Authentication a. simplex lines
b. half-duplex lines
2. A high speed, high capacity c. full duplex lines
transmission medium that can carry d. biflex-lines
signals from multiple independent
network carrier is 6. Who owns and governs the
a. Narrowband channel Internet?
b. Voice band channel a. IAB
c. Broadband channel b. IETF
d. None of above c. InterNIC
d. None of above
3. A channel handle moderate
data volumes in transmission rate 7. Who is responsible for
between 110 to 9600 bps is discussing and investigating the
a. Narrowband channel operational and technical problems of
b. Voice band channel Internet?
c. Broadband channel a. Internet Architecture Board
d. None of above (IAB)
b. Internet Engineering Task Force
4. A form of wireless (IETF)
transmission in which signals are sent c. InterNIC
via pulses of infrared light d. None of above
a. radio networking
b. infrared transmission 8. Website is a collection of

46 University Academy
COMPUTER NETWORKS 2020-21

a. HTML documents
b. Graphics file
c. audio and video files
d. All of above

9. A network computer that


shares resources with and responds to
reqests from other computer is known
as
a. client
b. server
c. terminal
d. key

10. ____ protocol is built into


most popular e-mail products such as
Eudora and Outlook Express:
a. SMTP
b. POP
c. HTTP
d. FTP

Answers
1.a
2.c
3.b
4.b
5.c
6.d
7.b
8.d
9.b
10.b

47 University Academy
COMPUTER NETWORKS 2020-21

Set-7

1. Which protocol is used to b. Client / Server Network


transfer web pages? c. Peer-to-Peer Network
a. TCP/IP d. All of above
b. SMTP
c. POP3 7. Which of the following
d. HTTP network covers the largest
geographical area?
2. Which protocol is used to send a. PAN
email? b. LAN
a. SMTP c. MAN
b. POP d. WAN
c. HTTP 8. Router operates in which layer
d. FTP of OSI Reference Model?
a) Layer 1 (Physical Layer)
3. A self-sufficient computer that b) Layer 3 (Network Layer)
acts as both a server and a client is c) Layer 4 (Transport Layer)
known as d) Layer 7 (Application Layer)
a. Host
b. Client 9. Which of the following
c. Server performs modulation and
d. Peer demodulation?
a. fiber optics
4. What is the use of Bridge in b. satellite
Network? c. coaxial cable
a. to connect LANs d. modem
b. to separate LANs
c. to control Network Speed 10. The process of converting
d. All of the above analog signals into digital signals so
they can be processed by a receiving
5. A network model where there computer is referred to as:
is no server computer is a. modulation
a. Centralized Network b. demodulation
b. Client / Server Network c. synchronizing
c. Peer-to-Peer Network d. digitizing
d. All of above Answers
1.d
6. The network model is 2.a
sometimes called workgroup is 3.d
a. Centralized Network 4.a
48 University Academy
COMPUTER NETWORKS 2020-21

5.c 9.d
6.c 10.b
7.d
8.b

Set-8
1. A computer circuit board installed in c. microwave transmission
a computer so that it can be connected to a d. none of above
network?
a. NIC
b. Switch 7. A communications device that
c. RJ45 combines transmissions from several I/O
d. Hub devices into one line is a?
a. concentrator
2. A NIC card can be used for? b. modifier
a. FDDI c. multiplexer
b. Ethernet d. full-duplex line
c. Microwave
d. WiFi 8. UTP cable has ___ pair of wires in
it?
3. Which of the following is unbound a. 3
transmission media? b. 4
a. UTP c. 5
b. Co-axial d. 6
c. Microwave
d. Fiber Optics 9. Which of the following might not be
present in a computer network?
4. Which of the following memories a. NIC
needs refresh? b. Switch
a. SRAM c. MODEM
b. DRAM d. NOS
c. ROM
d. All of above 10. To connect two networks of similar
systems you will use a
5. What is the set of information that a. Bridge
defines the status of resources allocated to a b. Gateway
process? c. Router
a. Process control d. Any of above
b. ALU
c. Register Unit Answers
d. Process description 1.a
2.b
6. A form of wireless transmission in which 3.c
signals are sent via pulses of infrared light? 4.b
a. radio networking 5.d
b. infrared transmission 6.b

49 University Academy
COMPUTER NETWORKS 2020-21

7.c 9.c
8.b 10.a

Set -9
1. Which data communication method is c. 100 picowatts
used to transmit the data over a serial d. 10 miliwatts
communication link?
a. simplex
b. half-duplex 7. The synchronous modems are more
c. full-duplex costly than the asynchronous modems because
d. b and c a. they produce large volume of data
b. they contain clock recovery circuits
2. What is the minimum number of wires c. they transmit the data with stop and start
needed to send data over a serial bits
communication link layer? d. they operate with a larger bandwidth
a. 1
b. 2 8. Which of the following statement is
c. 4 correct?
d. 6 a. terminal section of a synchronous
3. Which of the following types of modem contains the scrambler
channels moves data relatively slowly? b. receiver section of a synchronous modem
a. wide band channel contains the scrambler
b. voice band challen c. transmission section of a synchronous
c. narrow band channel modem contains the scrambler
d. None of these d. control section of a synchronous modem
contains the scrambler
4. Most data communications involving
telegraph lines use: 9. In a synchronous modem, the digital-
a. simplex lines to-analog converter transmits signal to the
b. wideband channel a. equilizer
c. narrowband channel b. modulator
d. dialed service c. demodulator
d. terminal
5. A communications device that
combines transmissions from several I/O 10. Which of the following
devices into one line is a communications lines is best suited to
a. concentrator interactive processing applications?
b. modifier a. narrow band channel
c. multiplexer b. simplex lines
d. full-duplex line c. full duplex lines
d. mixed band channels
6. How much power (roughly) a light Answers
emitting diode can couple into an optical 1.c
fiber? 2.b
a. 100 microwatts 3.c
b. 440 microwatts 4.c

50 University Academy
COMPUTER NETWORKS 2020-21

5.c 8.c
6.a 9.a
7.b 10.c
Set-10
1. The interactive transmission of data b. multiplexer
within a time sharing system may be best c. concentrator
suited to d. controller
a. simplex lines 6. Which of the following signal is not
b. half-duplex lines standard RS-232-C signal?
c. full duplex lines a. VDR
d. biflex-lines b. RTS
c. CTS
2. Which of the following statement is d. DSR
incorrect?
a. The difference between synchronous and 7. Which of the following statement is
asynchronous transmission is the clocking incorrect?
derived from the data in synchronous a. Multiplexers are designed to accept data
transmission. from several I/O devices and transmit a unified
b. Half duplex line is a communication line stream of data on one communication line
in which data can move in two directions, but b. HDLC is a standard synchronous
not at the same time. communication protocol.
c. Teleprocessing combines c. RTS/CTS is the way the DTE indicates
telecommunications and DP techniques in that it is ready to transmit data and the way the
online activities DCW indicates that it is ready to accept data
d. Batch processing is the prefered d. RTS/CTS is the way the terminal
processing mode for telecommunication indicates ringing
operation.
8. Which of the following is an
3. Which of hte following is considered a advantage to using fiber optics data
broad band communication channel? transmission?
a. coaxial cable a. resistance to data theft
b. fiber optics cable b. fast data transmission rate
c. microwave circuits c. low noise level
d. all of above d. all of above
9. Which of the following is required to
4. Which of the following is not a communicate between two computers?
transmission medium? a. communications software
a. telephone lines b. protocol
b. coaxial cables c. communication hardware
c. modem d. all of above including access to
d. microwave systems transmission medium

5. Which of the following does not allow 10. The transmission signal coding
multiple uses or devices to share one method of TI carrier is called
communication line? a. Bipolar
a. doubleplexer b. NRZ

51 University Academy
COMPUTER NETWORKS 2020-21

c. Manchester
d. Binary

Answers
1.b
2.d
3.d
4.c
5.a
6.a
7.d
8.d
9.d
10.a

52 University Academy
COMPUTER NETWORKS 2020-21

Set-11
1. Why IP Protocol is considered as d. Forwards a packet to all outgoing links
unreliable? except the originated link
a. A packet may be lost
b. Packets may arrive out of order 7. The Internet is an example of
c. Duplicate packets may be generated a. Cell switched network
d. All of the above b. circuit switched network
c. Packet switched network
2. What is the minimum header size of d. All of above
an IP packet?
a. 16 bytes
b. 10 bytes 8. What does protocol defines?
c. 20 bytes a. Protocol defines what data is
d. 32 bytes communicated.
b. Protocol defines how data is
3. Which of following provides reliable communicated.
communication? c. Protocol defines when data is
a. TCP communicated.
b. IP d. All of above
c. UDP
d. All of the above 9. What is the uses of subnetting?
a. It divides one large network into several
4. What is the address size of IPv6 ? smaller ones
a. 32 bit b. It divides network into network classes
b. 64 bit c. It speeds up the speed of network
c. 128 bit d. None of above
d. 256 bit

5. What is the size of Network bits & 10. Repeater operates in which layer of
Host bits of Class A of IP address? the OSI model?
a. Network bits 7, Host bits 24 a. Physical layer
b. Network bits 8, Host bits 24 b. Data link layer
c. Network bits 7, Host bits 23 c. Network layer
d. Network bits 8, Host bits 23 d. Transport layer

6. What does Router do in a network? Answers


a. Forwards a packet to all outgoing links 1.d
b. Forwards a packet to the next free 2.c
outgoing link 3.a
c. Determines on which outing link a 4.c
packet is to be forwarded 5.a
6.c

53 University Academy
COMPUTER NETWORKS 2020-21

7.c
8.d
9.a
10.a
Set-12
1. Each IP packet must contain c. Network bit - 18, Host bit -16
a. Only Source address d. Network bit- 12, Host bit - 14
b. Only Destination address
c. Source and Destination address
d. Source or Destination address 7. The last address of IP address
represents
2. Bridge works in which layer of the a. Unicast address
OSI model? b. Network address
a. Appliation layer c. Broadcast address
b. Transport layer d. None of above
c. Network layer
d. Datalink layer

3. _______ provides a connection- 8. How many bits are there in the


oriented reliable service for sending messages Ethernet address?
a. TCP a. 64 bits
b. IP b. 48 bits
c. UDP c. 32 bits
d. All of the above d. 16 bits

4. Which layers of the OSI model are


host-to-host layers? 9. How many layers are in the TCP/IP
a. Transport, Session, Persentation, model?
Application a. 4 layers
b. Network, Transport, Session, b. 5 layers
Presentation c. 6 layers
c. Datalink, Network, Transport, Session d. 7 layers
d. Physical, Datalink, Network, Transport

5. Which of the following IP address


class is Multicast 10. Which of the following layer of OSI
a. Class A model also called end-to-end layer?
b. Class B a. Presentation layer
c. Class C b. Network layer
d. Class D c. Session layer
d. Transport layer

6. Which of the following is correct Answers


regarding Class B Address of IP address
a. Network bit -14, Host bit - 16 1.c
b. Network bit -16, Host bit -14 2.d

54 University Academy
COMPUTER NETWORKS 2020-21

3.a 8.b
4.a 9.a
5.d 10.d
6.a
7.c

Online Practice Link


https://examradar.com/data-communication-networking-mcqs-set-1/
https://www.sanfoundry.com/computer-network-questions-answers/

55 University Academy

You might also like