Download as pdf
Download as pdf
You are on page 1of 20
Computer Networks Questions Latest Computer Networks MCQ Objective Questions CER ABR he lial Start Complete Exam Preparation aC a a eee ra Mock Tests Ext 5 Pann oe Clits aoe Download App Question 1: View this Question Online > Which of the following are types of interfaces in a Wi-Fi network? A. Client-to-client B, Client-to-access point C. Access point-to-router D. Router-to-router E. Client-to-router Choose the correct answer from thé options given below: 1. Aand.B Only? | A... Conly 3. Cand D Only 4. Dand E Only Answer (Detailed Solution Below) Option 2: B and C Only coaching India’s Super Teachers for all govt. exams Under One Roof Computer Networks Question 1 Detailed Solution The correct answer is B and ¢ Only © Key Points In a Wi-Fi network, the common t faces are! + Client-to-Access Point: This interface is between a Wi-Fi-enabled device wireless access point (AP). It allows the device to connect to the network. + Access Point-to-Router: This interface is between the wireless access po! enabling the AP to connect to the broader network or the internet. © Additional Information client) and a int and the router + Client-to-Client: While possible in ad-hoc or peer-to-peer Wi-Fi networks, itis not a standard interface in typical Wi-Fi networks. + Router-to-Router: This interface is more common in wired networks or in specialized wireless network configurations, not standard Wi-Fi. + Client-to-Router: Direct client-to-router interfaces are not typical in Wi-Fi networks; dients usually connect through an access point. ge Ie AP Rae) Start Complete Exam Preparation Carers, Pues fey aces Ds ciolnny resieacrg EY tizr) DB Download App Question 2: ee ee areas ce oe Vv SER e cee cee Oe AR ete eT ee 1, Data line 2. Physical 3. Transport 4. Network 5. Application Answer (Detailed Solution a Option 2 : Physical Compt ‘s Question 2 Detailed Solution ference between Switching Techniques are: Circuit Packet Message Switching | Switching | switching Connection- oriented because Connectionless dedicate because | Message first store then the path [Dynamic routing] forwarded to needed before| happens during] ensure jcommunication, |communication|Communication. Most efficient O High costly | switching | Less Costly Technique S Used in Better than | 2 telephone Used in intemet ircuit switching service. and less costly. Implemented implemented at] lat the physical] the network layer layer. Vn Important Point Physical Layer: Responsible for the physical connection between devices. Data-link layer: Responsible for reliable transfer of data frames from one node to another, connected by a physical layer. Network layer: It manages the delivery of individual data packets from source to destination through Routing, Transport layer: Responsible for the delivery of the center message from source host to a destination host. Here, Data is referred to es segments. Session layer: It establishes sessions between users end offers services like dialag control and synchronization Presentation layer: Monitors syntax and semantics of transmitted information through translation, compression, and encryption Application layer: Provides high-level application program Interface to user PPE aR ea Berl) Start Complete Exam Preparation RCC DR Sect alien pokes a Does cielnny resieacrd Exotic) Jownload App Question 3: View this Question Online > You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface? Answer (Detailed Solution Below) Option 1:6 Computer Networks Question 3 Detailed Solution The correct option is (1) 6 hosts Explanation:- Six hosts are the maximum number of hosts'on this LAN, including the router interface. @ key Points ~ + although your router may provide up to 250 IP addresses, this does not imply that 100 devices Shaan arn tie aha en i ares nature ot thie eon ine. + A router should have five different IP addresses and five different link-layer addresses. + Each IP address belongs to the set of addresses assigned to 2 network. + Each link-layer address also identifies the data-link layer connection’s router. * Onan Android device, slide down from the top of the screen and hit “internet” to locate your router's IP address. Then, on the right, hit the gear button to select your WiFi network. Finally, beside Gateway, you'll notice your router's IP address if you scroll down. + A message is broadcast to all hosts on a network using the 255 address, Just keep in mind that no one host can be assigned to the first and last addresses in any network or subnet. You should be able to assign IP addresses to 255 hosts at this point. eRe een ert OR ey ete Start Complete Exam Preparation }) Daily Live ba (Shes Doce coors EY tics Download App Question 4: View this Question Online > Suppose a CSMA / CD local Area Network of 1/Gbps is'there over a 1 km cable. If the imum frame size? signal speed in the cable is 2 x 105 km /'sec what will be the mi 1, 4000 2. 100000 3 -m 4. 10000 5. 1200 Answer (Detailed Solution Below) Option 4: 10000 Computer Networks Question 4 Detailed Solution Answer: Option 3 Concept: Minimum Frame size in CSMA/CD LAN to avoid collision =_2 « propagation delay x bandwidth Data: Length of the cable = 1 km ~ Bandwidth = 1 Gbps Signal speed = 2 x 10° km\sec Calculation: length of the cable __1km Propagation delay: “Gamat speed — = Daag = 0.000005 Minimum Frame size = 2 x 0.000005x 1 x 10° = 10000 bits India’s #1 Learning Platform Start Complete Exam Preparation @ Trusted by 1,86,00,449+ Student Pred co aces aie here Go ce Download App Question 5: View this Question Online > symmetric Key Cryptography uses stream cipher to encryptthe information. One of example of stream cipher: 1. SHA 2. RCA 3. MDS ~ 5. None of the above Answer (Detailed Solution Bolow) Option 2: RC4 Computer Networks Question 5 Detailed Solution The correct answer is option 2. Concept: symmetric Key Cryptography uses a stream cipher to encrypt the information. One example oft stream cipher is RC4. ( ss Stream cipher: Astream cipher is an encryption technique that encrypts and decrypts a’set quantity of data using a symmetric key. In contrast to an asymmetric cipher key, a symmetrie’Gipher,key is an encryption tool that may be used for both encryption and decryption, Rivest Cipher 4: + Rivest Cipher 4, often known as RC4, is’@ Stream’cipher that was developed in 1987. A stream cipher is a sort of encryptio a that’encrypts data one byte at a time. + RC4 isa stream cipher thath used in the Secure Socket Layer (SSL)/Transport Layer Security (TLS) protocols, the I 2.11 wireless LAN standard, and the Wi-Fi Security Protocol WEP (Wireless Equivalent Pratoco)) Hence the correct answer is RC4. &- Additional Information + Secure hashing algorithm (SHA) is an acronym for secure hashing algorithm, SHA is a hashing algorithm that is based on MDS. It is used to hash data and certificates. Using bitwise operations, modular additions, and compression functions, a hashing algorithm compresses the input data into smaller form that cannot be comprehended. + Blowfish is the first symmetric encryption algorithm created by Bruce Schneier in 1993. Symmetric encryption uses a single encryption key to both encrypt and decrypt data, Top Computer Networks MCQ Objective Questions & ro Tee amu Becituy Start Complete Exam Preparation Ree eon ra Gerad ee kaa rors Cress pec Download App ‘Question 6 View this Question Online > In computing, is a network security system that monitors and controls incoming and o \g network traffic based on predetermined security rules. 1. Spyware 2. Cookie 3. Spam 4. Firewall Answer (Detailed Solution Below) Option 4 : Firewall Computer Networks Question 6 Detailed Solution The correct answer is option 4) ie. wall. + A firewall is a type of computer-security system. + A firewall controls the fi jata from one computer or network to another and they are mainly intended to protect @fmiigdividual computer system or a network from being accessed by an intruder, especial/y vie the Intemet. Note: + Cookies are small files that are stored on a user's computer. They are designed to hold a modest amount of data specific to a particular client and website and can be accessed either by the web server or the client computer. + Spam is an undesired or illegal email message. + Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. sibel bdo oecccateas. Start Complete Exam Preparation Ar Pan Coed Mock Tests acid sc erro Extra) Download App Question 7 View this Question Online > Which among the following network topologies has the highest transmission speed? A) LAN B) WAN OMAN D) Both LAN and WAN have equal transmission speeds. Answer (Detailed Solution Below) Option 1:4 Computer Networks Question 7 Detailed Solution Option 4 is the correct answer: Local Area Network (LAN) has the highest transmission speed Network itype Features + The coverage area may be Batted t:o sonic bends) or a group of buildings. Local Area | * FOF eG: Devices at your home Network of office connected to each (van) other or with 2 common router. + Connections can be established either through Ethernet cables _ + Itinterconnects the computers/users located in a bigger geographical area as Matezpolitah compared to 2 LAN. Network + For eg: A chain of emergency man) response teams across a big city. + It covers the largest area as Wide Area compared to LAN and MAN. It Network can cover the whole country. wan) + The Internet is the best example of WAN. og c Perera reo) ORC eer Start Complete Exam Preparation Cee Cr Ga ie Download App Question 8 View this Quastion Online > What is the full form of LAN’ 1, Line Area NetWork 2 (in Bor 3. Local Area Network 4. Land Area Network Answer (Detailed Solution Below) Option 3: Local Area Network Computer Networks Question 8 Detailed Solution The correct answer is Local Area Network (LAN): > tenportant SoM, + Itis a computer network within a small geographical area, + ALAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. CR ABR heli) RCE eet Start Complete Exam Preparation Pred co aces Git Co bere Ga ec Download App ‘Question 9 View this Question Online > IPv6 addresses have a size of: 1, 64 bits 2. 128 bits 3. 256 bits ‘Answer (Detailed Solution Below) Option 2: 128 bits Computer Networks Question 9 Detailed Solution The correct answer is 128 bits. @ Key Points + An |Pv6 address has a size of 128 bits. + Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. + IPvS was developed by the Internet Engineering Task Force (IETF) to deal with the long- anticipated problem of IPv4 address exhaustion. + IPvé is intended to replace IPv4. ¥ + 1 Bytes is equal to 8 bit % IPv6 Base Header priority/ , s version (4) gg | flow label nab ian cise (20) — 4 Byte, next [hop payload length (16) | header | limit +54 Byte if , F source IP address (1 » \ —16Byte destination IP address (128) — '16Byte B Additional Information + IPv4 (Internet Protocol version 4) uses a 32-bit addressing scheme. + This means that [Pv4 addresses are composed of 32 binary bits, which are typically represented as four sets of decimal numbers separated by periods (e.g, 192.168.0.1). + Each decimal number in the address represents an 8-bit segment, also known as an octet, resulting in a total of four octets in an IPv4 address. x eee ane etal Recaro tr Start Complete Exam Preparation We aurs bare rae Get Preceocers ees Download App ‘Question 10 View this Question Online > Which 7 following protocols is known as the terminal emulation protocol? 1, HTTP 2. FTP 3. SMTP 4. TELNET Answer (Detailed Solution Below) Option 4: TELNET Computer Networks ong? Detailed Solution * TELNET is the terminal emulation protocol in a TCP/IP environment for the remote access of a terminal (client) to a server. + TELNET uses the TCP as the transport protocol to establish a connection between server and client. Teer cnc) “ayes Sela Mu CM CMe li cel) ical] Pon ol oe) Mock Test: Ds cielnry resieuccig Yr Download App Question 11 View this Question Online > which MBbshe following protocols is used for E-mail services? 1, HTTP. 3. SMTP 4. PPP Answer (Detailed Solution Below) Option 3: SMTP Computer Networks Question 11 Detailed Solution The correct answer is ~~ © Key Points + SMTP:- The Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail messages and attachments. + IP:- The intemet Protocol (IP) is a routable protocol responsible for IP addressing and the fragmentation and reassembly of packets. + UDP:- UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service. UDP is used when the amount of data to be transferred is small ieee anu Reet Start Complete Exam Preparation Rea tat ice: phe eens Does cielnny resieacrd Exotic) Download App Question 12 f View this Question Online > A computer virus is 4 1% im \ 2. Software 3. Bacteria 4. Freeware Answer (Detailed Solution Below) Option 2: Software Computer Networks Question 12 Detailed Solution Thecorrecvanswer sof + A computer virus is a malicious software that, when executed replicates itself by modifying other computer programs. * The full form of VIRUS is Vital Information Resources Under Seize because they replicate and multiply and use up computer memory processing power with fake repetitive commands. It causes the system to become slow and keeps hanging. eRe ae Pertti Eee. eee Start Complete Exam Preparation Loess Cree iee os xr) Gee pe Pare B® Download App ‘Question View this Question Online > Which of the following statements is true for network hub? 1. Ahub connects different stations in a private network. 2. It sends data packets to the intended recipient. 3. It contains two ports: one for input and other for output. 4. It works at the network layer. Answer (Detailed Solution Below) Option 1: A hub connects different stations in'a private network. Computer Networks A. Detailed Solution Anetwork hub is a hardware device for connecting multiple devices together and making them act asa single private network segment. It has multiple input/output (1/0) ports, in which a signal introduced at the input of any port appears at the output of every port except the original incoming. A hub works at the physical layer (layer 1) of the OSI model. India's #1 Learning Platform Ree DR eer Pea mC Me Cima erLe Laced) eo au Pah Git a On Download App Question 14 n View this Question Online > Which of the following internet service is appropriate to access the computer of your ~~ home? 1 Www. 2. IRC 3. FTP 4, Telnet Answer (Detailed Solution Below) Option 4: Telnet Computer Networks Question 14 Detailed Solution The correct answer is Telnet. © key Points + Any application that empowers users to remotely access another computer(no matter how far away) is called remote access. + Telnet is an application protocol that uses a Virtual terminal connection to offer bidirectional interactive text-oriented co: snication Over the Internet. + Telnet facilitates remote iaingn computer. + It also facilitates termina p purposes. + Telnet was developed in 1969. * Telnet allows users to execute various application programmes on a distant site and then transport the results back to their local computer. & Additional Information + The Hypertext Transfer Protocol (HTTP) is the backbone of the internet's data transfer. * Itisa stateless protocol, + Real-Time Protocol (RTP) is 2 protocol designed to handle real-time traffic (like audio and video) of the Internet. + File Transfer Protocol is a set of tules that govern how computers transfer files from one system to another over the internet Start Complete Exam Preparation Poa Pes 7) Mock Tests Gps pi aI icy Download App Question 15 ‘View this Question Online > Which of the following device is used to connect similar LAN with same protocols? 1. Gateways 2, Router 3. Switches ™ Answer (Detailed Solution Below) Option 4 : Bridges Computer Networks Question 15 Detailed Solution The correct answer is option 4. Concept: The bridge is used to connect similar LANs with the same protocols. A bridge operates at the data link layer. It is also used for interconnecting two LANs working on the same'proto6®l. It hes a single input and single output port, thus making it a 2 port device. A bridge must contain addressing and routing capability. A bridge is 2 network device that joins two or more LANs (local aréa networks) to build a larger LAN. Network bridging is the process of aggregating networks, A Bridge joins the various components to. make them appear as if they are all part of the same network. Hence the correct answer is ‘~~ a a Z“aeaaeaecoasaaeae Se + Switches are networking devices that operate at the OSI model's layer 2 or data link layer. They connect network devices and use packet switching to deliver, receive, and forward data packets or data frames across the network. A switch has a number of ports into which computers can be connected. + A router is a networking device that sends data packets from one computer network to another. On the Internet, routers are in charge of traffic direction. Data packets are used to send data over the intemet, such as a web page or an email. * A gateway is a network node that serves as a connection point between two networks that use distinct transmission protocols.

You might also like