Computer Networks Questions & Answers - Basics - 1
Computer Networks Questions & Answers - Basics - 1
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Basics – 1”.
Answer: a
Explanation: Request For Comments.
2. In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are
a) Added
b) Removed
c) Rearranged
d) Modified
View Answer
Answer: a
Explanation: Every layer adds its own header to the packet from previous layer.
Answer: a
Explanation: Semantics defines how a particular pattern to be interpreted, and what
action is to be taken based on that interpretation.
Answer: d
Explanation: Data flows in single direction.
5. The first Network
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
View Answer
Answer: d
Explanation: None.
Answer: b
Explanation: Message travel from sender to reciever via a medium using a protocol.
7. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
View Answer
Answer: c
Explanation: None.
Answer: d
Explanation: Network egde devices refer to host systems, which can host applications
like web browser.
Answer: b
Explanation: None.
1. When collection of various computers seems a single coherent system to its client,
then it is called
a) computer network
b) distributed system
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
3. Which one of the following computer network is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
View Answer
Answer: d
Explanation: None.
Answer: d
Explanation: None.
6. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
10. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer
Answer: b
Explanation: None.
Answer: c
Explanation: The third part is ordinary two way telephone channel.
Answer: c
Explanation: The same company which provides phone connection is also its ISP in
DSL.
Answer: a
Explanation: The DSLAM located in telco’s Central Office does this function.
Answer: d
Explanation: Cable modem termination system is used in cable internet access.
5. HFC contains
a) Fibre cable
b) Coaxial cable
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
6. Choose the statement which is not applicable for cable internet access
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
View Answer
Answer: d
Explanation: In cable access analog signal is converted to digital signal by CMTS.
Answer:a
Explanation: Active optical networks are essentially switched ehternets.
8. StarBand provides
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
View Answer
Answer: d
Explanation: None.
Answer: d
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: Because DSL is made of twisted wire copper pair.
Computer Networks Questions & Answers – Reference Models –
2
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Reference Models – 2”.
Answer: a
Explanation: None.
Answer: d
Explanation: None.
3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) presentation layer
c) application layer
d) both (a) and (b)
View Answer
Answer: d
Explanation: None.
4. Which layer links the network support layers and user support layers
a) session layer
b) data link layer
c) transport layer
d) network layer
View Answer
Answer: c
Explanation: Physical, data link and network layers are network support layers and
session, presentation and application layers are user support layers.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
3. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
View Answer
Answer: a
Explanation: None.
4. The portion of physical layer that interfaces with the media access control sublayer is
called
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: d
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
8. The physical layer translates logical communication requests from the ______ into
hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
View Answer
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
1. The data link layer takes the packets from _________ and encapsulates them into
frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
View Answer
Answer: a
Explanation: None.
2. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
View Answer
Answer: d
Explanation: None.
3. Which sublayer of the data link layer performs data link functions that depend upon
the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
6. When 2 or more bits in a data unit has been changed during the transmission, the
error is called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: d
Explanation: None.
9. Which one of the following is the multiple access protocol for channel access
control?
a) CSMA/CD
b) CSMA/CA
c) Both (a) and (b)
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Computer Networks Questions & Answers – Network Layer
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Network Layer”.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
Answer: c
Explanation: None.
5. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
6. Multidestination routing
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
7. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
1. Transport layer aggregates data from different applications into a single stream before
passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
View Answer
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
8. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
2. In this topology there is a central controller or hub
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Answer: a
Explanation: None.
Answer: d
Explanation: None.
Answer: b
Explanation: Wide area network(WAN) covers the whole of the world network.
Answer: a
Explanation: None.
6. Expand WAN
a) World area network
b) Wide area network
c) Web area network
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: FDM stands for Frequency division multiplexing.
1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Both a and b
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: b
Explanation: None.
3. Which multiplexing technique transmits digital signals ?
a) FDM
b) TDM
c) WDM
d) None of the mentioned
View Answer
Answer: b
Explanation: FDM and WDM are used in analog signals.
4. If there are n signal sources of same data rate than TDM link has _______ slots
a) n
b) n/2
c) n*2
d) 2n
View Answer
Answer: a
Explanation: Each slot is dedicated to one of the source.
5. If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate
of circuit this TDM is
a) 32kbps
b) 500bps
c) 500kbps
d) None of the mentioned
View Answer
Answer: a
Explanation: Transmission rate= frame rate * number os bits in a slot.
Answer: c
Explanation: None.
8. In TDM, the transmission rate of the multiplexed path is usually _______ the sum of
the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
View Answer
Answer: a
Explanation: None.
Answer: b
Explanation: None.
10. Multiplexing technique that shifts each signal to a different carrier frequency
a) FDM
b) TDM
c) Either a or b
d) Both a and b
View Answer
Answer: a
Explanation: FDM stands for Frequency division multiplexing.
1. Which of the following delay is faced by the packet in travelling from one end system
to another ?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
2. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission
delay is(in milliseconds)
a) 3.2
b) 32
c) 0.32
d) None of the mentioned
View Answer
Answer: a
Explanation: Transmission rate = length / transmission rate = 32/10 = 3.2milli seconds.
3. The time required to examine the packet’s header and determine where to direct the
packet is part of
a) Processing delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned
View Answer
Answer: a
Explanation: None.
4. Traffic intensity is given by, where L = number of bits in the packet a = average rate
R = transmission rate
a) La/R
b) LR/a
c) R/La
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
5. In the transfer of file between server and client, if the transmission rates along the
path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
View Answer
Answer: b
Explanation: The throughput is generally the transmission rate of bottleneck link.
6. If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non
congested network. The number of routers between source and destination is
a) N/2
b) N
c) N-1
d) 2N
View Answer
Answer: c
Explanation: None.
Answer: c
Explanation: None.
8. In a network, If P is the only packet being transmitted and there was no earlier
transmission, which of the following delays could be zero
a) Propogation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
View Answer
Answer: b
Explanation: None.
Answer: b
Explanation: Transmission delay = packet length / transmission rate
Answer: b
Explanation: None.
Answer: d
Explanation: None.
3. The DoS attack is which the attacker establishes a large number of half-open or fully
open TCP connections at the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: c
Explanation: None.
4. The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: b
Explanation: They donot inject packets into the channel.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
8. In a network, If P is the only packet being transmitted and there was no earlier
transmission, which of the following delays could be zero
a) Propogation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
View Answer
Answer: b
Explanation: None.
Computer Networks Questions & Answers – Packet Switching &
Circuit Switching
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Packet Switching & Circuit Switching”.
Answer: a
Explanation: None.
Answer: b
Explanation: The packet switch will not transmit the first bit to outbound link until it
recieves the entire packet.
3. If there are N routers from source to destination, total end to end delay in sending
packet P(L->number of bits in the packet R-> transmission rate)
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
View Answer
Answer: b
Explanation: None.
Answer: d
Explanation: None.
5. The resources needed for communication between end systems are reserved for the
duration of session between end systems in ________
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
View Answer
Answer: b
Explanation: None.
6. As the resouces are reserved between two communicating end systems in circuit
switching, this is achieved
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: In packet switching there is no reservation.
Answer: d
Explanation: None.
Answer: d
Explanation: TCP is transport layer protocol
Answer: b
Explanation: None.
Answer: d
Explanation: HTTP is a protocol.
4. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
6. E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
View Answer
Answer: c
Explanation: Because it can work with available throughput.
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
Answer: d
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
2. Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
6. Which one of the following is an internet standard protocol for managing devices on
IP network?
a) dynamic host configuration protocol
b) simple newtwork management protocol
c) internet message access protocol
d) media gateway protocol
View Answer
Answer: b
Explanation: None.
7. Which one of the following is not an application layer protocol?
a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol
View Answer
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
10. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
Answer: a
Explanation: None.
3. The time taken by a packet to travel from client to server and then back to the client is
called __________
a) STT
b) RTT
c) PTT
d) None of the mentioned
View Answer
Answer: b
Explanation: RTT stands for round-trip time.
Answer: c
Explanation: None.
5. In the process of fetching a web page from a server the HTTP request/response takes
__________ RTTs.
a) 2
b) 1
c) 4
d) 3
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: The line followed by request line are called header lines and status line is
the initial part of response message.
7. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
View Answer
Answer: a
Explanation: It is specified in the method field of request line in the HTTP request
message.
8. The __________ method when used in the method field, leaves entity body empty.
a) POST
b) GET
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
9. The HTTP response message leaves out the requested object when ____________
method is used
a) GET
b) POST
c) HEAD
d) PUT
View Answer
Answer: c
Explanation: None.
Answer: d
Explanation: 404 Not Found.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
13. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
5. In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: b
Explanation: None.
7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
View Answer
Answer: a
Explanation: None.
8. In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
1. Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: Control connection and data connection.
5. If 5 files are transfered from server A to client B in the same session. The number of
TCP connection between A and B is
a) 5
b) 10
c) 2
d) 6
View Answer
Answer: d
Explanation: 1 control connection and other 5 for five file transfers.
6. FTP server
a) Mantains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
7. The commands, from client to server, and replies, from server to client, are sent
across the control connection in ________ bit ASCII format
a) 8
b) 7
c) 3
d) 5
View Answer
Answer: b
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
1. When the mail server sends mail to other mail servers it becomes ____________
a) SMTP server
b) SMTP client
c) Peer
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
2. If you have to send multimedia data over SMTP it has to be encoded into
a) Binary
b) Signal
c) ASCII
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
3. Expansion of SMTP is
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
View Answer
Answer: a
Explanation: None.
4. In SMTP, the command to write recievers mail adress is written with this command
a) SEND TO
b) RCPT TO
c) MAIL TO
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: The sending mail server pushes the mail to receiving mail server hence it
is push protocol.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
11. When the sender and the receiver of an email are on different systems, we need only
_________
a) One MTA
b) Two UAs
c) Two UAs and one pair of MTAs
d) Two UAs and two pairs of MTAs
View Answer
Answer: d
Explanation: None.
Answer: d
Explanation: None.
1. Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer
protocol for electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
View Answer
Answer:a
Explanation:None.
Answer:a
Explanation:None.
Answer:d
Explanation:None.
Answer:d
Explanation:None.
Answer:b
Explanation:None.
6. An email client needs to know the _________ of its initial SMTP server.
a) IP address
b) MAC address
c) Url
d) None of the mentioned
View Answer
Answer:a
Explanation:None.
Answer:d
Explanation:None.
8. SMTP defines
a) message transport
b) message encryption
c) message content
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
9. Which one of the following is an SMTP server configured in such a way that anyone
on the internet can send e-mail through it?
a) open mail relay
b) wide mail reception
c) open mail reception
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
Answer:c
Explanation:None.
Answer:a
Explanation: None.
Answer:b
Explanation: None.
Answer:b
Explanation: None.
Answer:d
Explanation: None.
5. If a server has no clue about where to find the address for a hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
View Answer
Answer:a
Explanation: None.
6. Which one of the following allows client to update their DNS entry as their IP
address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
View Answer
Answer:a
Explanation: None.
8. The right to use a domain name is delegated by domain name registers which are
accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
View Answer
Answer:d
Explanation: None.
Answer:a
Explanation: None.
Answer:c
Explanation: None.
Answer:c
Explanation: None.
Answer:a
Explanation: None.
Answer:b
Explanation: None.
5. Which one of the following protocol can be used for login to a shell on a remote host
except SSH?
a) telnet
b) rlogin
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:c
Explanation: SSH is more secured then telnet and rlogin.
Answer:d
Explanation: None.
Answer:c
Explanation: None.
8. Which one of the following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned
View Answer
Answer:d
Explanation: None.
Answer:a
Explanation: None.
Answer:d
Explanation: None.
Computer Networks Questions & Answers – DHCP
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “DHCP”.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
5. DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
View Answer
Answer: b
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
8. After obtaining the IP address, to prevent the IP conflict the client may use
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
10. If DHCP snooping is configured on a LAN switch, then clients having specific
______ can access the network.
a) MAC address
b) IP address
c) Both (a) and (b)
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: b
Explanation: Network layer is used for transferring the data from transport layer to
another layers.
Answer: a
Explanation: It is nothing but adding control bits to the packets.
Answer: d
Explanation: AH, ESP, IKE.
Answer: c
Explanation: WPA2 is best with Wi-Fi connection.
Answer: a
Explanation: Denial of service attack.
Answer:b
Explanation:Most data transfer is with wireless networks.
Answer: b
Explanation: PGP is at email security.
9. PGP encrypts data by using a block cipher called
a) International data encryption algorithm
b) Private data encryption algorithm
c) Internet data encryption algorithm
d) None of the mentioned
View Answer
Answer: a
Explanation: PGP encrypts data by using a block cipher called international data
encryption algorithm.
10. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
View Answer
Answer: c
Explanation: DNS spoofing is the phenomenon for the above mentioned transaction.
Answer: b
Explanation: VIRTUAL PACKET NETWORK.
Answer: d
Explanation: LATE 90’S.
3. What protocol is NOT used in the operation of a VPN?
a) PPTP
b) IPsec
c) YMUM
d) L2TP
View Answer
Answer: c
Explanation: YNUM.
Answer: d
Explanation: virtual packet network is not a backbone of the internet.
Answer: c
Explanation: Because it is secured with the IP address.
Answer: c
Explanation: It is very cheap.
Answer: d
Explanation: Data roming layer.
Answer: a
Explanation: It is the security type of the IPsec.
Answer: b
Explanation: Cisco is the second best company to design and make the computer
networks.
10. Which layer of the OSI reference model does PPTP work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
View Answer
Answer: b
Explanation: Presentation layer.
11. Which layer of the OSI reference model does IPsec work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
View Answer
Answer: c
Explanation: Session layer.
Answer: d
Explanation: SAN, Data protection and Disk operation are the main things of storage
management.
Answer: d
Explanation: switch, RAID arrays and tape drives are main storage devices.
Answer: a
Explanation: Simple Network Management Protocol is for storage management.
4. Identify the difficulties the SAN administrator incur while dealing with diverse
vendors
a) Proprietary management interfaces
b) Multiple applications to manage storage in the data center
c) No single view
d) All of the mentioned
View Answer
Answer: d
Explanation: Proprietary management interfaces, multiple applications management and
no single view are main difficulties.
Answer: a
Explanation: By using Zoning, Storage administrators ensure secure access to storage
devices.
Answer: d
Explanation: In storage management all necessities like security, backups and reporting
facilities are included.
Answer: d
Explanation: Identifying, Monitoring and Tracking are main tasks involved in SCM.
Answer: d
Explanation: Driver software, old style dependence and strong foundation.
Answer: d
Explanation: Promote interoperability and interface between various buildings.
Answer: b
Explanation: CIM-XML/HTTP is a SMI-S standard.
Computer Networks Questions & Answers – SNMP
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “SNMP”.
Answer: c
Explanation: An application-level protocol in which a few manager stations control a set
of agents is called SNMP.
Answer: a
Explanation: 10 to 20 mbps capacity increased on each domain in full duplex mode.
Answer: a
Explanation: Reconfiguration and documentation are two subsystems of configuration
management.
Answer: d
Explanation: To use Simple Network Management System (SNMP), we need rules.
Answer: d
Explanation: Enhanced security is the main difference between SNMPv3 and SNMPv2.
Answer: d
Explanation: A term that responsible for controlling access to network based on
predefined policy is called security management.
Answer: a
Explanation: Basic encoding rules.
Answer: c
Explanation: Control of users’ access to network resources through charges are main
responsibilities of accounting management.
Answer: a
Explanation: SNMP is a framework for managing devices in an internet using the
TCP/IP protocol.
10. Structure of Management Information (SMI), is guideline of
a) HTTP
b) SNMP
c) URL
d) MIB
View Answer
Answer: b
Explanation: SMI is guidelines of SNMP.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: c
Explanation: None.
5. Telnet is a
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site
View Answer
Answer: c
Explanation: None.
Answer: c
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
7. In telnet, the client echoes the character on the screen but does not send it until a
whole line is completed in
a) default mode
c) character mode
c) server mode
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Computer Networks Questions & Answers – TCP-1
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “TCP-1”.
Answer: d
Explanation: TCP is a transport layer protocol, process-to-process, and creates a virtual
connection between two TCP’s.
Answer: a
Explanation: In TCP, data is sent and received in terms of Stream of bytes.
3. TCP process may not write and read data at the same speed. So we need __________
for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
View Answer
Answer: b
Explanation: TCP needs buffers for storage to overcome this problem.
Answer: c
Explanation: Segment is a grouping of number of bytes together into a packet.
Answer: a
Explanation: Data flow in both the directions at the same time during TCP
communication hence, Full-duplex.
6. To achieve reliable transport in TCP, ___________ is used to check the safe and
sound arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
View Answer
Answer: d
Explanation: Acknowledgment mechanism is used to check the safe and sound arrival of
data.
Answer: a
Explanation: Sequence number and acknowledgement number field refers to byte
number.
8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only
one segment.
a) 10000
b) 10001
c) 12001
d) 11001
View Answer
Answer: b
Explanation: The sequence number of each segment is the number of first byte carried
in that segment.
9. Bytes of data being transferred in each connection are numbered by TCP. These
numbers starts with a
a) Random number
b) Zero
c) One
d) Sequence of zero’s and one’s
View Answer
Answer: d
Explanation: These numbers starts with a random number.
Answer: c
Explanation: Acknowledgement field in a segment defines the number of next bytes to
receive.
1. The receiver of the data controls the amount of data that are to be sent by the sender
is referred as
a) Flow control
b) Error control
c) Congestion control
d) Error detection
View Answer
Answer: a
Explanation: Flow control is done to prevent the receiver from being overwhelmed with
data.
Answer: c
Explanation: The header is 20 bytes if there are no options and upto 60 bytes if it
contains options.
Answer: b
Explanation: Three-Way Handshaking is used to connect between client and server.
4. The server program tells its TCP that it is ready to accept a connection. This process
is called
a) Active open
b) Active close
c) Passive close
d) Passive open
View Answer
Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is started
by the server.
5. The process of, A client that wishes to connect to an open server tells its TCP that it
needs to be connected to that particular server is
a) Active open
b) Active close
c) Passive close
d) Passive open
View Answer
Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and is done
by the client once it finds the open server.
6. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
View Answer
Answer: c
Explanation: Here, both TCP’s transmit a SYNC+ACK segment to each other and one
single connection is established between them.
7. The situation when a malicious attacker sends a large number of SYNC segments to a
server, pretending that each of them is coming from a different client by faking the
source IP address in the datagrams
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
View Answer
Answer: a
Explanation: This is the serious security problem during the connection establishment.
Answer: d
Explanation: During SYNC flooding the system collapses and denies service to every
request.
9. Size of source and destination port address of TCP header respectively are
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
View Answer
Answer: b
Explanation: Size of source and destination ports must be 32-bits.
Answer: b
Explanation: Three-Way Handshaking is used to terminate the connection between
client and server.
Answer: a
Explanation: UDP is an unreliable, connectionless transport layer protocol.
2. Return value of the UDP port “Chargen” is
a) String of characters
b) String of integers
c) Array of characters with integers
d) Array of zero’s and one’s
View Answer
Answer: a
Explanation: Chargen with port number 19 returns string of characters.
Answer: d
Explanation: UDP is a simple protocol which provides demultiplexing and error
checking.
Answer: c
Explanation: UDP is an unreliable, connectionless transport layer protocol and uses
minimum overload.
Answer: b
Explanation: Port number used by Network Time Protocol with UDP is 123.
Answer: a
Explanation: The fixed size of the UDP packet header is 8 bytes.
7. The port number is “ephemeral port number”, if the source host is ……
a) NTP
b) Echo
c) Server
d) Client
View Answer
Answer: d
Explanation: If the source host is the client, the port number in most cases will be
ephemeral port number.
Answer: d
Explanation: Total length is the 16 bit field which contains the length of UDP header
and the data.
Answer: a
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the
IP datagram the defines the total length. There is another field in the IP datagram that
defines the length of the header. So if we subtract the length of a UDP datagram that is
encapsulated in an IP datagram, we get the length of UDP user datagram.
10. The field used to detect errors over the entire user datagram is
a) UDP header
b) Checksum
c) Source port
d) Destination port
View Answer
Answer: b
Explanation: Checksum field is used to detect errors over the entire user datagram.
Answer: b
Explanation: ESP transport mode should be used to ensure the integrity and
confidentiality of data that is exchanged within the same LAN.
2. Which two types of encryption protocols can be used to secure the authentication of
computers using IPsec?
a) Kerberos V5
b) Certificates
c) SHA
d) MD5
View Answer
Answer: c, d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not
an encryption protocol; therefore, answer A is incorrect. Certificates are a type of
authentication that can be used with IPsec, not an encryption protocol; therefore, answer
B is incorrect.
3. Which two types of IPsec can be used to secure communications between two LANs?
a) AH tunnel mode
b) ESP tunnel mode
c) AH transport mode
d) ESP transport mode
View Answer
Answer: a, b
Explanation: A tunnel mode IPsec should be used. Option c is for data transfer purpose,
option d is for integrity & confidentiality purpose.
Answer: a
Explanation: It provides integrity checking and anti-reply security.
Answer: c
Explanation: Authentication header and Encryption security payload.
Answer: a
Explanation: Network layer is mainly used for security purpose, so IPsec in mainly
operates in network layer.
7. ESP provides
a) source authentication
b) data integrity
c) privacy
d) all of the mentioned
View Answer
Answer: d
Explanation: Encrypted security payload provides source, data integrity and privacy.
8. In computer security… means that computer system assets can be modified only by
authorized parities.
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
View Answer
Answer: b
Explanation: Integrity means that computer system assets can be modified only by
authorized parities.
Answer: a
Explanation: Confidentiality means that the information in a computer system only be
accessible for reading by authorized parities.
10. Which of the following organizations is primarily concerned with military
encryption systems?
a) NSA
b) NIST
c) IEEE
d) ITU
View Answer
Answer: a
Explanation: The NSA is primarily responsible for military encryption systems. The
NSA designs, evaluates, and implements encryption systems for the military and
government agencies with high security needs.
Answer: a
Explanation: These are two types of congestion control.
Answer: c
Explanation: Policies are applied to prevent congestion before it occurs.
Answer: d
Explanation: Retransmission should be done on account of any of the above cases.
4. In Go-Back-N window, when the timer of the packet times out, several packets have
to be resent even some may have arrived safe. whereas in Selective Repeat window,
tries to send ___________
a) Packet that have not lost
b) Packet that have lost or corrupted
c) Packet from starting
d) All the packets
View Answer
Answer: b
Explanation: In selective repeat window, packet that have lost or corrupted must be sent.
Answer: c
Explanation: This is done by the routers to prevent congestion.
Answer: a
Explanation: Policies are applied to remove congestion after it occurs.
7. The technique in which a congested node stops receiving data from the immediate
upstream node or nodes is called as
a) Admission policy
b) Backpressure
c) Forward signalling
d) Backward signalling
View Answer
Answer: b
Explanation: This is a node-to-node congestion control that starts with a node and
propagates in opposite direction of data flow to the source.
Answer: c
Explanation: Choke packet is sent by a node to the source to inform it of congestion.
10. In the slow-start algorithm, the size of the congestion window increases
__________ until it reaches a threshold.
a) Exponentially
b) Additively
c) Multiplicatively
d) None of the mentioned
View Answer
Answer: a
Explanation: In the slow-start algorithm, the size of the congestion window increases
exponentially until it reaches a threshold.
11. In the congestion avoidance algorithm, the size of the congestion window increases
____________ until congestion is detected.
a) Exponentially
b) Additively
c) Multiplicatively
d) None of the mentioned
View Answer
Answer: b
Explanation: In the congestion avoidance algorithm, the size of the congestion window
increases additively until congestion is detected.
2. The address that is unique in the scope of the network or internationally if the
network is part of an international network is called as
a) Global address
b) Network address
c) Physical address
d) IP address
View Answer
Answer: a
Explanation: This address is used to create a virtual circuit identifier.
3. The Identifier that is used for data transfer in virtual circuit network is
a) Global address
b) Virtual circuit identifier
c) Network identifier
d) IP identifier
View Answer
Answer: b
Explanation: Virtual circuit identifier is used for data transfer and has switch scope.
Answer: c
Explanation: Virtual circuit network does not contain termination phase.
Answer: a
Explanation: Steps required in setup process are Setup request and acknowledgement.
6. During teardown phase, source after sending all the frames to destination
sends……..to notify termination
a) Teardown response
b) Teardown request
c) Termination request
d) Termination response
View Answer
Answer: b
Explanation: Source after sending all the frames to destination sends teardown request
to which, destination sends teardown response.
7. Delay if, resource allocated during setup phase during data transfer is
a) Constant
b) Increases for each packet
c) Same for each packet
d) Different for each packet
View Answer
Answer: c
Explanation: If resource allocated during setup phase, delay is same for each packet.
Answer: d
Explanation: If resource allocated on demand, delay is different for each packet.
9. In virtual circuit network, delay times for setup and teardown respectively are
a) 1 and 1
b) 1 and 2
c) 2 and 1
d) 2 and 2
View Answer
Answer: a
Explanation: Delay time for setup and teardown is one each.
10. In data transfer phase, the table contains how many columns?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: d
Explanation: Table has 4 columns. Port and VCI for both incoming and outgoing data.
Answer: a
Explanation: ATM stands for asynchronous transfer mode.
Answer: b
Explanation: None.
Answer: b
Explanation: Three layers are physical layer, ATM layer and application adoption layer.
Answer: c
Explanation: None.
Answer: b
Explanation: None.
6. Frame relay has error detection at the
a) physical layer
b) data link layer
c) network layer
d) transport layer
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: Frame Relay is very cheap than other WANs.
Answer: d
Explanation: Frame Relay networks offer an option calledVoice Over Frame Relay
Answer: c
Explanation: There are total features of Frame Relay are Nine.
4. Frame Relay does not provide flow or error control, they must be provided by the
a) Lower Level Protocol
b) High Level Protocol
c) Upper Level Protocol
d) Downward Level Protocol
View Answer
Answer: c
Explanation: Frame Relay does not provide flow or error control, they must be provided
by theUpper Level Protocol.
5. Frame Relay deploys physical layer carriers such as
a) ADMs
b) UPSR
c) BLSR
d) SONET
View Answer
Answer: d
Explanation: Frame Relay deploys physical layer carriers such asSONET.
Answer: b
Explanation: In data link layer error control header is the main thing for any packet
transfer, so we use this layer frame relay has error detection.
Answer: a
Explanation: Virtual circuit identifier in frame relay is calleddata link connection
identifier.
Answer: c
Explanation: Frame relay has only physical and data link layer for error detection in
data link layer and for conversion in physical layer.
Answer: a
Explanation: FRAD stands for frame relay assembler/disassembler.
1. A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
7. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) None of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: Error reporting is handled by ICMP.
Answer: c
Explanation: TOS-type of service identifies the type of packets.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a
router.
4. If the value in protocol field is 17, the transport layer protocol used is
_____________
a) TCP
b) UDP
c) Either of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: For TCP it is 6.
Answer: c
Explanation: Data field usually has tranaport layer segment, but it can also carry ICMP
messages.
Answer: b
Explanation: Ip offers unreliable service.
Answer: d
Explanation: Fragmentation makes the implementation complex and also can create
DOS attack.
Answer: a
Explanation: Offset field specifies where the fragment fits in the original datagram.
Answer: d
Explanation: Fragmentation makes the implementation complex and also can create
DOS attack.
Answer: a
Explanation: offset field specifies where the fragment fits in the original datagram.
4. In classless addressing, there are no classes but addresses are still granted in
a) IPs
b) Blocks
c) Codes
d) Sizes
View Answer
Answer: b
Explanation: In classless addressing, there are no classes but addresses are still granted
in blocks.
Answer: a
Explanation: Classful addressing is replaced with classless addressing.
Answer: c
Explanation: In classful addressing, a large part of available addresses are wasted.
Answer: c
Explanation: Network addresses are very important concepts of IP addressing.
Answer: d
Explanation: Class F is not a class of IP addressing.
Answer: b
Explanation: An IPv6 address is 128 bits long.
2. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
View Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster
processing of the datagram.
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer
Answer: c
Explanation: This field enables to have different types of IP datagram.
Answer: a
Explanation: Broadcast has been eliminated in IPv6.
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6.
Answer: c
Explanation: Dual-stack is one of the approach used to support IPv6 in already existing
systems.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected
to each other by intervening IPv4 routers. The best solution here is
a) Use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tuunel.
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.
Answer: c
Explanation: Dual-stack is one of the approach used to support IPv6 in already existing
systems.
2. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected
to each other by intervening IPv4 routers. The best solution here is
a) Use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tunnel.
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.
Answer: c
Explanation: Isolated subnet is very huge sharing network area in this link local address
of local addresses is used.
Answer: b
Explanation: In subcategories of reserved address in IPv6, address that is used by a host
to test itself without going into network is called loop back address.
6. A few leftmost bits in each address of IPv6 address define its category is called
a) Prefix type
b) Postfix type
c) Reserved type
d) Local type
View Answer
Answer: a
Explanation: Prefix means bits in the IP address are placed in leftmost position.
Answer: d
Explanation: In IPv6 address format the starting bits are specified with eight 0s called
reserved address.
Answer: b, d
Explanation: In order to shorten the written length of an IPv6 address, successive fields
of zeros may be replaced by double colons. In trying to shorten the address further,
leading zeros may also be removed. Just as with IPv4, a single device’s interface can
have more than one address; with IPv6 there are more types of addresses and the same
rule applies. There can be link-local, global unicast, and multicast addresses all assigned
to the same interface.
Answer: d
Explanation: None
Answer: c
Explanation: Transport layer is responsible for process-to-process delivery.
Answer: a
Explanation: The most common method used for this communication is Client/Server.
Answer: b
Explanation: Multiple processes on destinations are identified by transport layer address
also called as port number.
Answer: d
Explanation: Port numbers are 16-bit integers between 0 and 65,535.
Answer: a
Explanation: Socket address is the combination of an IP address and port number.
Answer: b
Explanation: Packets in this method may be delayed or lost.
Answer: d
Explanation: First connection should be established followed by data transfer and
connection release.
Answer: c
Explanation: Multiplexing is done before sending packets at sender site.
10. The process of error checking and dropping of the header, delivering messages to
appropriate process based on port number is called as
a) Delivery of packets
b) Error correction
c) Multiplexing
d) Demultiplexing
View Answer
Answer: d
Explanation: Demultiplexing is the process of error checking and dropping of the
header, delivering messages to appropriate process based on port number.
Answer: d
Explanation: ICMP has been designed to address these issues.
Answer: a
Explanation: ICMP message has 8-bytes header and variable size data section.
Answer: b
Explanation: ICMP sends error message to the source because the datagram knows
information about source and destination IP address.
5. ICMP error message will not be generated for a datagram having a special address
such as
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127
View Answer
Answer: a
Explanation: No ICMP error message will be generated for a datagram having a special
address such as 127.0.0.0 or 0.0.0.0.
6. When a router cannot route a datagram or host cannot deliver a datagram, the
datagram is discarded and the router or the host sends a ____________ message back to
the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
View Answer
Answer: a
Explanation: Router sends destination unreachable message if the destination is not
found.
Answer: b
Explanation: Firstly, it informs the source that the datagram has been discarded.
secondly, it warns the source that there is congestion in the network.
8. In case of time exceeded error, when the datagram visits a router, the value of time to
live field is
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1
View Answer
Answer: d
Explanation: This field will be decremented by 1 at every router, and will be zero by the
time it reaches source.
9. Two machines can use the timestamp request and timestamp replay messages to
determine the ___________ needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source
View Answer
Answer: b
Explanation: Router sends destination unreachable message if the destination is not
found.
10. During debugging, we can use the ____________ program to find if a host is alive
and responding
a) Traceroute
b) Shell
c) Ping
d) Java
View Answer
Answer: c
Explanation: Ping program is used to find if a host is alive and responding.
11. In windows, ____________ can be used to trace the route of the packet from the
source to the destination
a) Traceroute
b) Tracert
c) Ping
d) Locater
View Answer
Answer: b
Explanation: Tracert is used in case of windows, whereas Traceroute in UNIX.
12. In a simple echo-request message, the value of the sum is 01010000 01011100.
Then, value of checksum is
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
View Answer
Answer: a
Explanation: Checksum is the compliment of the sum(exchange 0’s and 1’s).
Answer: a
Explanation: Due to huge number of systems on the internet, transition from IPv4 to
IPv6 happens.
Answer: c
Explanation: Dual stack, tunnelling and header translation are the only three transition
strategies.
3. To determine which version to use when sending a packet to a destination, the source
host queries which of the following?
a) Dual stack
b) Domain Name Server
c) Header information
d) All of the mentioned
View Answer
Answer: b
Explanation: Source host queries DNS to determine which version to use when sending
a packet to a destination.
4. The strategy used when two computers using IPv6 want to communicate with each
other and the packet must pass through a region that uses IPv4 is
a) Dual stack
b) Header translation
c) Conversion
d) Tunnelling
View Answer
Answer: d
Explanation: Tunnelling is used when two computers using IPv6 want to communicate
with each other and the packet must pass through a region that uses IPv4.
Answer: a
Explanation: In tunnel with IPv4 region, IPv6 packet will be encapsulated with IPv4
header.
6. ___________ is necessary when the sender wants to use IPv6, but the receiver does
not understand IPv6.
a) Dual stack
b) Header translation
c) Conversion
d) Tunnelling
View Answer
Answer: b
Explanation: Header translation is used when the sender wants to use IPv6, but the
receiver does not understand IPv6.
Answer: c
Explanation: Mapped address is used to translate an IPv6 address to an IPv4 address.
Answer: d
Explanation: In header translation procedure, IPv6 flow label is ignored.
Answer: a
Explanation: Error reporting is handled by ICMP.
Answer: c
Explanation: TOS type of service identifies the type of packets.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a
router.
4. If the value in protocol field is 17, the transport layer protocol used is _________
a) TCP
b) UDP
c) Either of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: For TCP it is 6.
Answer: a
Explanation: Offset field specifies where the fragment fits in the original datagram.
Answer: b
Explanation: An IPv6 address is 128 bits long.
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster
processing of the datagram.
8. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field
View Answer
Answer: c
Explanation: This field enables to have different types of IP datagram.
Answer: a
Explanation: Broadcast has been eliminated in IPv6.
10. Which are the features present in IPv4 but not in IPv6?
a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned
View Answer
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6.
Computer Networks Questions & Answers – Analyzing Subnet
Masks
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Analyzing Subnet Masks”.
1. Which of the following is the broadcast address for a Class B network ID using the
default subnetmask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
View Answer
Answer: c
Explanation: This address is used for broadcast the class B network purpose
Answer: b
Explanation: Class B is the address of IP code 172.16.13.5
3. If you wanted to have 12 subnets with a Class C network ID, which subnet mask
would you use?
a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248
View Answer
Answer: c
Explanation: If you have eight networks and each requires 10 hosts, you would use the
Class C mask of 255.255.255.240. Why? Because 240 in binary is 11110000, which
means you have four subnet bits and four host bits. Using our math, we’d get the
following:
24-2=14 subnets
24-2=14 hosts.
4. The combination of _________ and __________ is often termed the local address of
the local portion of the IP address.
a) Network number and host number
b) Network number and subnet number
c) Subnet number and host number
d) Host number
View Answer
Answer: c
Explanation: Sub networking is implemented for remote sensing in transparent way
from that a host contains the sub network which called local operation.
5. _________ implies that all subnets obtained from the same subnet mask.
a) Static subnetting
b) Dynamic subnetting
c) Variable length subnetting
d) Both B and C
View Answer
Answer: a
Explanation: Static sub network.
Answer: a
Explanation: A connection oriented protocol can only use unicast addresses.
The any cast service is included in IPV6.
7. __________ is a high performance fiber optic token ring LAN running at 100 Mbps
over distances upto 1000 stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR
View Answer
Answer: a
Explanation: FIBER DISTRIBUTED DATA INTERFACE
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term
describing various technologies for transmitting Ethernet frames at a rate of a gigabit
per second (1,000,000,000 bits per second), as defined by the IEEE 802.3-2008
standard. It came into use beginning in 1999, gradually supplanting Fast Ethernet in
wired local networks, as a result of being considerably faster.
9. _________ is a collective term for a number of Ethernet Standards that carry traffic at
the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.
a) Ethernet
b) Fast Ethernet
c) Gigabit Ethernet
d) All of the mentioned
View Answer
Answer: b
Explanation: Fast Ethernet
10. _________ is another kind of fiber optic network with an active star for switching.
a) S/NET
b) SW/NET
c) NET/SW
d) FS/NET
View Answer
Answer: a
Explanation: A 50-MBd active star fiber optical Local area network (LAN) and its
optical combiner and mixing rod splitter are presented. The limited power budget and
relatively large tapping losses of light wave technology, which limit the use of fiber
optics in tapped bus LAN topologies, are examined and proven tolerable in optical star
topologies.
1.A network administrator is connecting hosts A and B directly through their Ethernet
interfaces, as shown in the illustration. Ping attempts between the hosts are
unsuccessful. What can be done to provide connectivity between the hosts?
Answer: d
Explanation: First, if you have two hosts directly connected, as shown in the graphic,
then you need a crossover cable. A straight-through cable won’t work. Second, the hosts
have different masks, which puts them in different subnets. The easy solution is just to
set both masks to 255.255.255.0 (/24).
2. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the
following can be valid host IDs on the LAN interface attached to the router?
1. 172.16.1.100
2. 172.16.1.198
3. 172.16.2.255
4. 172.16.3.0
a) 1 only
b) 2 and 3 only
c) 3 and 4 only
d) None of the mentioned
View Answer
Answer: c
Explanation: The router’s IP address on the E0 interface is 172.16.2.1/23, which is
255.255.254.0. This makes the third octet a block size of 2. The router’s interface is in
the 2.0 subnet, and the broadcast address is 3.255 because the next subnet is 4.0. The
valid host range is 2.1 through 3.254. The router is using the first valid host address in
the range.
Answer: b
Explanation: The mask 255.255.254.0 (/23) used with a Class A address means that
there are 15 subnet bits and 9 host bits. The block size in the third octet is 2 (256 – 254).
So this makes the subnets in the interesting octet 0, 2, 4, 6, etc., all the way to 254. The
host 10.16.3.65 is in the 2.0 subnet. The next subnet is 4.0, so the broadcast address for
the 2.0 subnet is 3.255. The valid host addresses are 2.1 through 3.254.
4. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
a) 14
b) 15
c) 16
d) 30
View Answer
Answer: d
Explanation: A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8
subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C
network address? Not at all. The number of host bits would never change.
5. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Wohich
classful subnet mask would you use
a) 255.255.255.192
b) 255.255.255.224
c) 255.255.255.240
d) 255.255.255.248
View Answer
Answer: b
Explanation: You need 5 subnets, each with at least 16 hosts. The mask
255.255.255.240 provides 16 subnets with 14 hosts-this will not work. The mask
255.255.255.224 provides 8 subnets, each with 30 hosts. This is the best answer.
6. You have a network that needs 29 subnets while maximizing the number of host
addresses available on each subnet. How many bits must you borrow from the host field
to provide the correct subnet mask?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: d
Explanation: A 240 mask is 4 subnet bits and provides 16 subnets, each with 14 hosts.
We need more subnets, so let’s add subnet bits. One more subnet bit would be a 248
mask. This provides 5 subnet bits (32 subnets) with 3 host bits (6 hosts per subnet). This
is the best answer.
Answer: a
Explanation: A /25 mask is 255.255.255.128. Used with a Class B network, the third
and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third
octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is
either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet,
which has a broadcast address of 127 since 128 is the next subnet
8. You have an interface on a router with the IP address of 192.168.192.10/29. Including
the router interface, how many hosts can have IP addresses on the LAN attached to the
router interface?
a) 6
b) 8
c) 30
d) 32
View Answer
Answer: a
Explanation: A /29 (255.255.255.248), regardless of the class of address, has only 3 host
bits. Six hosts is the maximum number of hosts on this LAN, including the router
interface.
Answer: c
Explanation: A /21 is 255.255.248.0, which means we have a block size of 8 in the third
octet, so we just count by 8 until we reach 66. The subnet in this question is 64.0. The
next subnet is 72.0, so the broadcast address of the 64 subnet is 71.255.
10. The network address of 172.16.0.0/19 provides how many subnets and hosts?
a) 7 subnets, 30 hosts each
b) 8 subnets, 8,190 hosts each
c) 8 subnets, 2,046 hosts each
d) 7 subnets, 2,046 hosts each
View Answer
Answer: b
Explanation: A CIDR address of /19 is 255.255.224.0. This is a Class B address, so that
is only 3 subnet bits, but it provides 13 host bits, or 8 subnets, each with 8,190 hosts.
1. Which type of Ethernet framing is used for TCP/IP and DEC net?
a) Ethernet 802.3
b) Ethernet 802.2
c) Ethernet II
d) Ethernet SNAP
View Answer
Answer: c
Explanation: Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet
802.2 is used withNetWare 3.12 and later plus OSI routing, Ethernet II is used with
TCP/IP and DEC net,and Ethernet SNAP is used with TCP/IP and AppleTalk.
2. You are a system administrator on a NetWare network, you are runningNetWare 4.11
and you cannot communicate with your router. What is the likelyproblem?
a) NetWare 4.11 defaults to 802.2 encapsulation
b) NetWare 4.11 defaults to 802.3 encapsulation
c) Cisco routers only work with NetWare 3.11
d) NetWare 3.11 defaults to 802.2 encapsulation
View Answer
Answer: a
Explanation: The default encapsulation on Cisco routers is Novell Ethernet_802.3 and
NetWare 3.12and later defaults to 802.2 encapsulation, 3.11 and earlier defaults to
802.3.
Answer: a, c & d
Explanation: The network address can be up to 16 hexadecimal digits in length. The
node number is 12hexadecimal digits. The node address is usually the MAC address. An
example IPXaddress is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part
is0000.0c56.de33. The network number is assigned by the system administrator of
theNovell network.
4. Which NetWare protocol works on layer 3–network layer—of the OSI model?
a) IPX
b) NCP
c) SPX
d) NetBIOS
View Answer
Answer: a
Explanation: IPX (Internetwork Packet Exchange) is a NetWare network layer 3
protocol used fortransferring information on LANs.
6. As a system administrator, you want to debug IGRP but are worried that the
“debug IP IGRP transaction” command will flood the console. What is the command
that you should use?
a) Debug IP IGRP event
b) Debug IP IGRP-events
c) Debug IP IGRP summary
d) Debug IP IGRP events
View Answer
Answer: d
Explanation: The “debug IP IGRP events” is used to only display a summary of IGRP
routing information. You can append an IP address onto either command to see only the
IGRP
updates from a neighbor.
Answer: a
Explanation: It isolates network 10.0.0.0 and 172.68.7.0 and associates autonomous
systems 109 and71 with IGRP. IGRP does not disable RIP, both can be used at the same
time.
8. The “IPX delay number” command will allow an administrator to change the
default settings. What are the default settings?
a) For LAN interfaces, one tick; for WAN interfaces, six ticks
b) For LAN interfaces, six ticks; for WAN interfaces, one tick
c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks
d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
View Answer
Answer: a
Explanation: The default is–for LAN interfaces, one tick; for WAN interfaces, six ticks
9. As a system administrator, you need to set up one Ethernet interface on the Cisco
router to allow for both sap and Novell-ether encapsulations. Which set of
commands will accomplish this?
a) Interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e interface
Ethernet 0.2 IPX network 6c
b) Interface Ethernet 0 IPX encapsulation Novell-ether IPX network 9e interface
Ethernet 0 IPX encapsulation sap IPX network 6c
c) Interface Ethernet 0.1 IPX encapsulation Novell-ether interface Ethernet 0.2 IPX
encapsulation sap
d) Interface Ethernet 0.1ipx encapsulation Novell-ether IPX network 9e interface
Ethernet 0.2 IPX encapsulation sap IPX network 6c
View Answer
Answer: d
Explanation: The following commands setup the sub interfaces to allow for two types of
encapsulation:interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e
interface Ethernet0.2 IPX encapsulation sap IPX network 6c.
Answer: a
Explanation: It enables load sharing on 2 paths if the paths are equal metric paths. The
default is 1 pathand the maximum is 512 paths.
11. You want to enable both arpa and snap encapsulation on one router interface.
How do you do this?
a) The interface can handle multiple encapsulation types with no extra configuration
b) Assign two network numbers, one for each encapsulation type
c) Enable Novell-ether to run multiple encapsulation types
d) Both arpa and snap are enabled by default so you don’t have to configure anything
View Answer
Answer: b
Explanation: To assign multiple network numbers, you usually use sub interfaces. A
sample configuration follows: IPXEthernet 0.1 IPX encapsulation novell-ether ipx
network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
Answer: a
Explanation: GNS is Novell’s protocol to Get Nearest Server. If there is a server on the
local network,that server will respond. If there isn’t, the Cisco router has to be
configured to forward theGNS SAP.
13. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers
do not forward them. How are services advertised to other networks?
a) Each router builds its own SAP table and forwards that every 60 seconds
b) Each router assigns a service number and broadcasts that
c) SAPs aren’t necessary with Cisco routers
d) Cisco routers filter out all SAPs
View Answer
Answer: a
Explanation: Cisco routers build SAP tables and forward the table every 60 seconds. All
SAPs can’t befiltered even with 4.x since NDS and time synchronization uses SAPs.
14. Novell’s implementation of RIP updates routing tables every _________ seconds.
a) 60
b) 90
c) 10
d) 30
View Answer
Answer: a
Explanation: Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is
every 10 seconds, routers ARP every 60 seconds, IGRP signal every 90 seconds, and
Banyan VINES signals every 90 seconds.
15. In Novell’s use of RIP, there are two metrics used to make routing decisions.
Select the two metrics.
a) Ticks
b) Hops
c) Loops
d) Counts
View Answer
Answer: a& b
Explanation: It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if
hops are equal,then it uses an administratively assigned tiebreaker.
1. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) Both a and b
View Answer
Answer: a
Explanation: RIP v1 has network diameter is more than 17 hopes.
2. How often does a RIPv1 router broadcast its routing table by default?
a) Every 30 seconds
b) Every 60 seconds
c) Every 90 seconds
d) RIPv1 does not broadcast periodically
View Answer
Answer: a
Explanation: Every 30 seconds RIPv1 router broadcast its routing table by default.
Answer: b
Explanation: The debug IP rip command is used to show the Internet Protocol (IP)
Routing Information Protocol (RIP) updates being sent and received on the router.
4. Two connected routers are configured with RIP routing. What will be the result when
a router receives a routing update that contains a higher-cost path to a network already
in its routing table?
a) The updated information will be added to the existing routing table Debug IP rip
b) The update will be ignored and no further action will occur Debug IP route
c) The updated information will replace the existing routing table entry
d) The existing routing table entry will be deleted from the routing table and all routers
will exchange routing updates to reach convergence
View Answer
Answer: b
Explanation: When a routing update is received by a router, the router first checks the
administrative distance (AD) and always chooses the route with the lowest AD.
However, if two routes are received and they both have the same AD, then the router
will choose the one route with the lowest metrics, or in RIP’s case, hop count.
5. You type debug IP rip on your router console and see that 172.16.10.0 is being
advertised to you with a metric of 16. What does this mean?
a) The route is 16 hops away Debug IP rip
b) The route has a delay of 16 microseconds Debug IP route
c) The route is inaccessible
d) The route is queued at 16 messages a second
View Answer
Answer: c
Explanation: You cannot have 16 hops on a RIP network by default. If you receive a
route advertised with a metric of 16, this means it is inaccessible.
Answer: d
Explanation: 1 is the default administrative distance of Static Route.
7. Which protocol gives a full route table update every 30 seconds?
a) IEGRP
b) RIP
c) both of the mentioned
d) none of the mentioned
View Answer
Answer: b
Explanation: RIP gives a full route table update every 30 seconds.
Answer: c
Explanation: Default administrative distance of RIP is 120.
Answer: b
Explanation: Use of variable length subnet masks is permittedis true regarding classless
routing protocol.
Answer: a
Explanation: On stub networks- which have only one exit path out of the networkuse
default routing.
Answer: b
Explanation: Classful routing means that all hosts in the internetwork use the same
mask. Classless routing means that you can use Variable Length Subnet Masks
(VLSMs) and can also support discontinuous networking.
Answer: d
Explanation: When a network goes down, the distance-vector routing protocol initiates
route poisoning by advertising the network with a metric of 16, or unreachable.
Answer: c
Explanation: RIPv2 is pretty much just like RIPv1. It has the same administrative
distance and timers and is configured just like RIPv1.
Answer: b, c, d
Explanation: One routing protocol to another, routers from multiple vendors,host-based
routers from multiple vendors.
5. Which two routing protocols can be redistributed into OSPF by a Cisco router?
a) IP EIGRP
b) AppleTalk EIGRP
c) RIPv2
d) IPX RIP
View Answer
Answer: a, c
Explanation: IP EIGRP, RIPv2. These can be redistributed into OSPF by a Cisco router.
6. Which is a reason for avoiding doing route redistribution on two routers between the
same two routing domains?
a) Higher cost of two routers
b) Routing feedback
c) Cisco IOS incompatibility
d) Not possible to use two routers
View Answer
Answer: b
Explanation: Routing feedback is a reason for avoiding doing route redistribution on
two routers between the same two routing domains.
Answer: b
Explanation: Sources of routing information is the administrative distance rank.
Answer: c
Explanation: RIP V2 maintains neighbor adjacencies.
Answer: c
Explanation: EIGRProuting protocol implements the diffusing update algorithm.
10. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) All of the above
View Answer
Answer: b
Explanation: RIPv2protocol should you select if the network diameter is more than 17
hops.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None
Answer: b
Explanation: None.
10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
1. Multiple object can be sent over a TCP connection between client and server in
a) Persistent HTTP
b) Ponpersistent HTTP
c) Both (a) and (b)
d) None of the mentioned
View Answer
Answer: a
Explanation: hypertext transfer protocol is used for sending multiple objects over TCP
connection.
Answer: a
Explanation: HTTP works on application layer.
Answer: a
Explanation: HTTP resources are located by uniform resource identifier.
Answer: b
Explanation:HTTP client requests by establishing TCP connection to a particular port on
the server.
5. In HTTP pipelining
a) Multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
b) Multiple HTTP requests cannot be sent on a single TCP connection
c) Multiple HTTP requests are sent in a queue on a single TCP connection
d) None of the mentioned
View Answer
Answer: a
Explanation: Multiple HTTP requests are sent on a single TCP connection without
waiting for the corresponding responses in HTTP pipelining.
Answer: b
Explanation: 21 is the port number of FTP.
7. In FTP protocol, client contacts server using _________ as the transport protocol.
a) Transmission control protocol
b) User datagram protocol
c) Datagram congestion control protocol
d) Stream control transmission protocol
View Answer
Answer: a
Explanation: Client contacts server using TCP as the transport protocol.
8. In which mode FTP, the client initiates both the control and data connections.
a) Active mode
b) Passive mode
c) Both (a) and (b)
d) None of the mentioned
View Answer
Answer: b
Explanation: In passive mode the client initiates both the control and data connections.
Answer: c
Explanation: FTP is built on client server architecture.
Answer: d
Explanation: Data transfer can be done in stream, block and compressed modes.
Answer: b
Explanation: Public Socket accept () used in Server Socket class.
2. Which constructor of Datagram Socket class is used to create a datagram socket and
binds it with the given Port Number?
a) Datagram Socket(int port)
b) Datagram Socket(int port, Int Address address)
c) Datagram Socket()
d) None of the above
View Answer
Answer: b
Explanation: Datagram Socket (int port, Int Address address) is use data create a
datagram socket.
Answer: c
Explanation: The client in socket programming must know IP address of Server.
4. The URL Connection class can be used to read and write data to the specified
resource referred by the URL
a) True
b) False
View Answer
Answer: a
Explanation: The URL Connection class can be used to read and write data to the
specified resource referred by the URL.
Answer: a
Explanation: Datagram is basically an information but there is no guarantee of its
content, arrival or arrival time.
Answer: c
Explanation: TCP, FTP, Telnet, SMTP, POP etc. are examples of Protocol.
8. The flush () method of Print Stream class flushes any un cleared buffers in memory
a) True
b) False
View Answer
Answer: a
Explanation: The flush () method of Print Stream class flushes any un cleared buffers in
memory.
Answer: c
Explanation: Datagram Socket, Datagram Packet are used for connection-less socket
programming.
10. In Int Address class which method returns the host name of the IP Address?
a) Public String get Hostname()
b) Public String getHostAddress()
c) Public static IntAddress get Localhost()
d) None of the above
View Answer
Answer: a
Explanation: In Int Address class public String get Hostname() method returns the host
name of the IP Address.
Answer: b
Explanation: Cookies were originally designed for server side programming, and at the
lowest level, they are implemented as an extension to the HTTP protocol.
2. The Cookie manipulation is done using which property?
a) cookie
b) cookies
c) manipulate
d) none of the mentioned
View Answer
Answer: a
Explanation: There are no methods involved: cookies are queried, set, and deleted by
reading and Writing the cookie property of the Document object using specially
formatted strings.
Answer: d
Explanation: Cookies are transient by default; the values they store last for the duration
of the web browser session but are lost when the user exits the browser.
Answer: c
Explanation: If you want a cookie to last beyond a single browsing session, you must
tell the browser how long (in seconds) you would like it to retain the cookie by
specifying a manage
attribute. If you specify a lifetime, the browser will store cookies in a file and delete
them only once they expire.
Answer: d
Explanation: Cookie visibility is scoped by document origin as local Storage and
session Storage are, and also by document path.
6. Which of the following can be used to configure the scope of the Cookie visibility?
a) Path
b) Domain
c) Both a and b
d) None of the mentioned
View Answer
Answer: d
Explanation: The Cookie visibility scope is configurable through cookie attributes path
and domain.
Answer: a
Explanation: Setting the path of a cookie to “/” gives scoping like that of localStorage
and also specifies that the browser must transmit the cookie name and value to the
server whenever it requests any web page on the site.
Answer: b
Explanation: The final cookie attribute is a boolean attribute named secure that specifies
how cookie values are transmitted over the network. By default, cookies are insecure,
which means that they are transmitted over a normal, insecure HTTP connection. If a
cookie is marked secure, however, it is transmitted only when the browser and server
are connected via HTTPS or another secure protocol.
Answer: a
Explanation: Cookie values cannot include semicolons, commas, or whitespace. For this
reason, you may want to use the core JavaScript global function
encodeURIComponent() to encode the value before storing it in the cookie.
Answer: c
Explanation: Each cookie can hold upto only 4 KB. In practice, browsers allow many
more than 300 cookies total, but the 4 KB size limit may still be enforced by some.
Answer: b
Explanation: REST stands for Representational State Transfer.
Answer: a
Explanation: Restful web services make use of HTTP protocol as a medium of
communication between client and server.
3. Which of the following is a best practice to create a standard URI for a web service?
a) Maintain Backward Compatibility
b) Use HTTP Verb
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: C
Explanation: Both of the above options are correct.
Answer: b
Explanation: Private directive indicates that resource is cachable by only client and
server, no intermediary can cache the resource.
6. Which of the following HTTP Status code means CREATED, when a resource is
successful created using POST or PUT request?
a) 200
b) 201
c) 204
d) 304
View Answer
Answer: b
Explanation: HTTP Status Code 201 means CREATED, when a resource is successful
created using POST or PUT request.
7. Which of the following annotation of JAX RS API is used to annotate a method used
to create resource?
a) @Path
b) @GET
c) @PUT
d) @POST
View Answer
Answer: C
Explanation: @PUT – HTTP Get request, used to create resource.
8. Which of the following annotation of JAX RS API binds the parameter passed to
method to a HTTP matrix parameter in path?
a) @PathParam
b) @QueryParam
c) @MatrixParam
d) @HeaderParam
View Answer
Answer: c
Explanation: @MatrixParam – Binds the parameter passed to method to a HTTP matrix
parameter in path.
9. In REST architecture, a REST Server simply provides access to resources and REST
client accesses and presents the resources.
a) False
b) True
View Answer
Answer: b
Explanation: In REST architecture, a REST Server simply provides access to resources
and REST client accesses and presents the resources.
Answer: b
Explanation: POST operation can cause different result.
This set of Computer Networks online test focuses on “Packet Forwarding and
Routing”.
Answer: c
Explanation: It is for transforming the message from source to destination with forward
technique.
2. A second technique to reduce routing table and simplify searching process is called
a) Network-Specific Method
b) Network-Specific Motion
c) Network-Specific Maintaining
d) Network-Specific Membership
View Answer
Answer: a
Explanation: It is the before method of the packet switching.
4. Several techniques can make size of routing table manageable and also handle issues
such as
a) Maturity
b) Error reporting
c) Tunneling
d) Security
View Answer
Answer: d
Explanation: To visible only accessing sub networks.
Answer: b
Explanation: Security measures.
Answer: c
Explanation: It is only for unidirectional.
Answer: a
Explanation: Graph technique is used for best node finding technic with shortest path
algorithms.
Answer: a
Explanation: Reverse Path Forwarding.
Answer: b
Explanation: Link State Packet
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Security In The Internet”.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
8. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
10. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “OSPF”.
Answer: a
Explanation: Each OSPF router monitors the cost of the link to each of its neighbours
and then floods the link state information to other routers in the network. hence it is
called so.
Answer: c
Explanation: Shortest path in OSPF is usually computed by Dijkstra’s algorithm.
Answer: a
Explanation: Support for variable-length sunbathing by including the subnet mask in the
routing message.
Answer: d
Explanation: Hello protocol is used to discover neighbour routers automatically.
Answer: c
Explanation: Five types of OSPF packets are: Hello, Database description, Link-state
request, Link-state update, Link-state ACK.
a) 1-2-3
b) 1-3-2
c) 3-2-1
d) 2-1-3
View Answer
Answer: b
Explanation: None.
Answer: c
Explanation: Checksum field is used to detect errors.
8. In OSPF database descriptor packet, if more database descriptor packet flows, ‘M’
field is set to
a) 1
b) 0
c) more
d) none
View Answer
Answer: a
Explanation: M bit is set to 1.
9. In OSPF database descriptor packet, which field is used to indicate that the router is
master
a) M
b) MS
c) I
d) Options
View Answer
Answer: b
Explanation: MS bit is set if the router is master, otherwise slave.
10. In OSPF database descriptor packet, which field is used to detect a missing packet
a) LSA header
b) MS
c) Database descriptor sequence number
d) Options
View Answer
Answer: c
Explanation: Sequence number field is used to detect a missing packet.
1. An OSPF router receives an LSA, the router checks its sequence number, and this
number matches the sequence number of the LSA that the receiving router already has.
What does the receiving router do with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
View Answer
Answer: a
Explanation: An OSPF router receives an LSA, the router checks its sequence number,
and this number matches the sequence number of the LSA that the receiving router
already has Ignores the LSA.
2. An OSPF router receives an LSA. The router checks its sequence number and finds
that
this number is higher than the sequence number it already has. Which two tasks does
the router perform with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
View Answer
Answer: b
Explanation: An OSPF router receives an LSA. The router checks its sequence number
and finds that this number is higher than the sequence number Adds it to the database,
Floods the LSA to the other routers.
3. An OSPF router receives an LSA. The router checks its sequence number and finds
that
this number is lower than the sequence number it already has. What does the router do
with the LSA?
a) ignores the LSA
b) adds it to the database
c) sends newer LSU update to source router
d) floods the LSA to the other routers
View Answer
Answer: c
Explanation: An OSPF router receives an LSA. The router checks its sequence number
and finds that this number is lower than the sequence number sends newer LSU update
to source router.
4. Each LSA has its own age timer. By default, how long does an LSA wait before
requiring an update?
a) 30 seconds
b) 1 minute
c) 30 minutes
d) 1 hour
View Answer
Answer: c
Explanation: Each LSA has its own age timer. By default, 30 minutes does an LSA wait
before requiring an update.
5. Distance vector protocols use the concept of split horizon, but link-state routing
protocols, such as OSPF, do not.
a) True
b) False
View Answer
Answer: b
Explanation: Distance vector protocols use the concept of split horizon, but link-state
routing protocols, such as OSPF, do not use this.
Answer: b
Explanation: The outcome of Dijkstra’s calculation is used to populate the Routing
table.
Answer: a
Explanation: 89 is the IP protocol number for OSPF packets.
Answer: d
Explanation: Query packet is NOT an OSPF packet type.
Answer: a
Explanation: 224.0.0.5 is the multicast address does the OSPF Hello protocol use.
10. The Hello protocol sends periodic updates to ensure that a neighbor relationship is
maintained between adjacent routers.
a) True
b) False
View Answer
Answer: a
Explanation: The Hello protocol sends periodic updates to ensure that a neighbor
relationship is maintained between adjacent routers.
Answer: a
Explanation: DBD packets are involved during which two states Exstart, Exchange.
Answer: d
Explanation: None.
Answer: d
Explanation: Maxage timeis NOT a field within an OSPF packet header.
14. Which two commands are required for basic OSPF configuration?
a) Network ip-address mask area area-id
b) Network ip-address wildcard-mask area area-id
c) Router ospf process-id
d) IP router ospf
View Answer
Answer: b, c
Explanation: Network ip-address wildcard-mask area area-id, Router ospf process-id are
required for basic OSPF configuration.
15. Which OSPF show command describes a list of OSPF adjacencies?
a) Show ipospf interface
b) Show ipospf
c) Show ip route
d) Show ipospf neighbor
View Answer
Answer: d
Explanation: Show ipospf neighborOSPF show command describes a list of OSPF
adjacencies.
This set of Computer Networks Questions and Answers for Aptitude test focuses on
“Datagram Networks”.
Answer: a
Explanation: Datagram switching is normally done at network layer.
Answer: c
Explanation: As the name suggests, in datagram switching packets are called as
datagrams.
Answer: b
Explanation: The switch does not keep the information about the connection state,
hence it is connection less.
Answer: c
Explanation: Routing table is used to route the packets to their destinations.
Answer: b
Explanation: Routing table contains destination address and output port to route the
packets to their destinations.
6. Which of the following remains same in the header of the packet in a datagram
network during the entire journey of the packet?
a) Destination address
b) Source address
c) Checksum
d) Padding
View Answer
Answer: a
Explanation: Destination address remains same in the header during the entire journey
of the packet.
7. Which of the following is true with respect to the delay in datagram networks?
a) Delay is greater than in a virtual circuit network
b) Each packet may experience a wait at a switch
c) Delay is not uniform for the packets of a message
d) All of the mentioned
View Answer
Answer: d
Explanation: All the options are true with respect to the delay in datagram networks.
8. During datagram switching, the packets are placed in __________ to wait until the
given transmission line becomes available.
a) Stack
b) Queue
c) Hash
d) Routing table
View Answer
Answer: b
Explanation: Packets are stored in queue during delay and are served as first in first out.
9. The probability of the error in a transmitted block _________ with the length of the
block
a) Remains same
b) Decreases
c) Increases
d) None of the mentioned
View Answer
Answer: c
Explanation: Probability of the error in a transmitted block increases with the length of
the block.
10. Which of the following is true with respect to the datagram networks?
a) Number of flows of packets are not limited
b) Packets may not be in order at the destination
c) Path is not reserved
d) All of the mentioned
View Answer
Answer: d
Explanation: All are the facts with respect to the datagram networks.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Firewalls”.
Answer: b
Explanation: As you know, firewalls are available as hardware appliances, as software-
only, or a combination of the two. In every case, the purpose of a firewall is to isolate
your trusted internal network (or your personal PC) from the dangers of unknown
resources on the Internet and other network connections that may be harmful. The
firewall prevents unauthorized access to your internal, trusted network from outside
threats.
Answer: a
Explanation: Most network layer firewalls can operate as stateful or stateless firewalls,
creating two subcategories of the standard network layer firewall. Stateful firewalls
have the advantage of being able to track packets over a period of time for greater
analysis and accuracy — but they require more memory and operate more slowly.
Stateless firewalls do not analyze past traffic and can be useful for systems where speed
is more important than security, or for systems that have very specific and limited needs.
For example, a computer that only needs to connect to a particular backup server does
not need the extra security of a stateful firewall.
3. A firewall is installed at the point where the secure internal network and untrusted
external network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
View Answer
Answer: a
Explanation: A firewall can be a PC, a router, a midrange, a mainframe, a UNIX
workstation, or a combination of these that determines which information or services
can be accessed from the outside and who is permitted to use the information and
services from outside. Generally, a firewall is installed at the point where the secure
internal network and untrusted external network meet, which is also known as a
chokepoint.
Answer: a
Explanation: A firewall can be a PC, a midrange, a mainframe, a UNIX workstation, a
router, or combination of these. Depending on the requirements, a firewall can consist
of one or more of the following functional components: Packet-filtering router
Answer: d
Explanation: The application firewall is typically built to control all network traffic on
any layer up to the application layer. It is able to control applications or services
specifically, unlike a stateful network firewall, which is – without additional software –
unable to control network traffic regarding a specific application. There are two primary
categories of application firewalls, network-based application firewalls and host-based
application firewalls.
Answer: c
Explanation: In computing, a firewall is a network security system that monitors and
controls the incoming and outgoing network traffic based on predetermined security
rules.[1] A firewall typically establishes a barrier between a trusted, secure internal
network and another outside network, such as the Internet, that is assumed not to be
secure or trusted.[2] Firewalls are often categorized as either network firewalls or host-
based firewalls.
Answer: c
Explanation: In a topology with a single firewall serving both internal and external users
(LAN and WAN), it acts as a shared resource for these two zones.
8. What tells a firewall how to reassemble a data stream that has been divided into
packets?
a) The source routing future
b) The number in the header’s identification field
c) The destination IP address
d) The header checksum field in the packet header
View Answer
Answer: a
Explanation: source routing future.
Answer: a
Explanation: Routing table with best performance
10. A firewall needs to be __________ so that it can grow with the network it protects
a) Robust
b) Expansive
c) Fast
d) Scalable
View Answer
Answer: b
Explanation: Expansive to block the fake subscribers.
Computer Networks Questions & Answers – Network Management
Answer: b
Explanation: Complex networks today are made up of hundreds and sometimes
thousands of components.
Answer: b
Explanation: Fault management is called the performance management.
Answer: a
Explanation: Documentation is the other type of configuration management.
Answer: d
Explanation: In Network Management System, a term that responsible for controlling
access to network based on predefined policy is called security management.
Answer: c
Explanation: Control of users’ access to network resources through charges are main
responsibilities of accounting management.
6. The physical connection between an end point and a switch or between two switches
is
a) Transmission path
b) Virtual path
c) Virtual circuit
d) None of the mentioned
View Answer
Answer: a
Explanation:bThe physical connection between an end point and a switch or between
two switches is transmission path.
Answer: c
Explanation: Packet switched network is most preferred for pipelining process.
8. In Network Management System, maps track each piece of hardware and its
connection to the
a) IP Server
b) Domain
c) Network
d) Data
View Answer
Answer: c
Explanation: Network is main thing in connecting different entities in a place.
Answer: c
Explanation: Simple network management controls the group of objects in management
interface base.
10. A network management system can be divided into
a) three categories
b) five broad categories
c) seven broad categories
d) ten broad categories
View Answer
Answer: b
Explanation: Five broad categories are
• Fault Management
• Configuration Management
• Accounting (Administration)
• Performance Management
• Security Management.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Ethernet”.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
3. MAC address is of
1) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
View Answer
Answer: d
Explanation: None.
4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission
parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
a) short frame
b) run frame
c) mini frame
d) man frame
View Answer
Answer: b
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Network Utilities”.
1. Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: b
Explanation: A ping sweep is a method that can establish a range of IP addresses which
map to live hosts and are mostly used by network scanning tools like nmap.
3. ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b
View Answer
Answer: d
Explanation: None.
Answer: a
Explanation: None.
5. If you want to find the number of routers between a source and destination, the utility
to be used is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer: d
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: Pathping combines the functionality of ping with that of traceroute
(tracert).
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Wireless LAN”.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) None of the mentioned
View Answer
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “SONET”.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
4. The photonic layer of the SONET is similar to the __________ of OSI model.
a) network layer
b) data link layer
c) physical layer
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: c
Explanation: None.
6. Which one of the following is not true about SONET?
a) frames of lower rate can be synchronously time-division multiplexed into a higher-
rate frame
b) multiplexing is synchronous TDM
c) all clocks in the network are locked to a master clock
d) none of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: One ring is used as the working ring and other as the protection ring.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Internet”.
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: c
Explanation: None.
3. Internet access by transmitting digital data over the wires of a local telephone
network is provided by
a) leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
5. Which one of the following protocol is not used in internet?
a) HTTP
b) DHCP
c) DNS
d) None of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: c
Explanation: None.
7. Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) none of the mentioned
View Answer
Answer: d
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Bluetooth”.
Answer: a
Explanation: Piconet is the basic unit of bluetooth system having a master node and
upto seven active slave nodes.
Answer: c
Explanation: None.
Answer: b
Explanation: None.
4. Bluetooth uses
a) frequency hoping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “WiMAX”.
Answer: b
Explanation: None.
2. WiMAX provides
a) simplex communication
b) half duplex communication
c) full duplex communication
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
3. WiMAX uses the
a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) all of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
7. WiMAX provides
a) VoIP services
b) IPTV services
c) Both (a) and (b)
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
10. Which one of the following frequency is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
View Answer
Answer: b
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “RTP”.
Answer: d
Explanation: None.
2. RTP is used to
a) carry the media stream
b) monitor transmission statistics of streams
c) monitor quality of service of streams
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
7. Which one of the following multimedia formats can not be supported by RTP?
a) MPEG-4
b) MJPEG
c) MPEG
d) None of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: d
Explanation: None.
10. Which protocol defines a profile of RTP that provides cryptographic services for the
transfer of payload data?
a) SRTP
b) RTCP
c) RCP
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “RPC”.
1. An RPC (remote procedure call) is initiated by the
a) server
b) client
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: d
Explanation: None.
Answer: d
Explanation: None.
8. RPC is used to
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
9. RPC is a
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
10. The local operating system on the server machine passes the incoming packets to the
a) server stub
b) client stub
c) client operating system
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
This set of Computer Networks Questions and Answers for Entrance exams focuses on
“Intrusion Detection Systems”.
Answer: c
Explanation: Once a protocol has been built and a behavior defined, the engine can
scale more quickly and easily than the signature-based model because a new signature
does not have to be created for every attack and potential variant.
Answer: d
Explanation: A false positive is any alert that indicates nefarious activity on a system
that, upon further inspection, turns out to represent legitimate network traffic or
behavior.
3. One of the most obvious places to put an IDS sensor is near the firewall. Where
exactly in relation to the firewall is the most productive placement?
a) Inside the firewall
b) Outside the firewall
c) Both inside and outside the firewall
d) Neither inside the firewall nor outside the firewall.
View Answer
Answer: a
Explanation: There are legitimate political, budgetary and research reasons to want to
see all the “attacks” against your connection, but given the care and feeding any IDS
requires, do yourself a favor and keep your NIDS sensors on the inside of the firewall.
Answer: c
Explanation: “Shadow honeypots,” as researchers call them, share all the same
characteristics of protected applications running on both the server and client side of a
network and operate in conjunction with an ADS.
Answer: b, d
Explanation: Most commercial IDSes generate signatures at the network and transport
layers.
Answer: b
Explanation: Second component of mechanisms are set in place to reenact known
methods of attack and to record system responses.
Answer: b
Explanation: IDSes work in a manner similar to modern antivirus technology. They are
constantly updated with attack-definition files (signatures) that describe each type of
known malicious activity.
Answer: a, c
Explanation: Nemean automatically generates “semantics-aware” signatures based on
traffic at the session and application layers.
Answer: a
Explanation: As the sensitivity of systems may cause the false positive/negative rates to
vary, it’s critical to have some common measure that may be applied across the board.
Answer: d
Explanation: They are constantly updated with attack-definition files (signatures) that
describe each type of known malicious activity. They then scan network traffic for
packets that match the signatures, and then raise alerts to security administrators.
This set of Basic Computer Networks Questions and Answers focuses on “PPP”.
1. Both HDLC and PPP both are Data link layer protocols.
a) True
b) False
View Answer
Answer: a
Explanation: Both HDLC and PPP both are Data link layer protocol.
2. Which protocol does the PPP protocol provide for handling the capabilities of the
connection/link on the network?
a) LCP
b) NCP
c) Both a and b
d) TCP
View Answer
Answer: c
Explanation: LCP and NCP are the PPP protocol provide for handling the capabilities of
the connection/link on the network.
Answer: c
Explanation: The PPP protocolis designed for simple links which transport packets
between two peers and one of the protocols for making an Internet connection over a
phone line.
Answer: a
Explanation: PPP provides thelinklayer in the TCP/IP suite.
Answer: b
Explanation: PPP consists of three (encapsulating, a link control protocol, NCP)
Components.
Answer: a
Explanation: The PPP encapsulationprovides for multiplexing of different network-layer
protocols.
Answer: a
Explanation: A Link Control Protocol (LCP) is used for establishing, configuring and
testing the data-link connection.
Answer: b
Explanation: A family of network control protocols (NCPs)are a series of
independently-defined protocols that encapsulate.
Answer: a
Explanation: PPP can terminate the link at any time because it works on the data link
layer protocol.
10. The link necessarily begins and ends with this phase. During this phase, the LCP
automata will be in INITIAL or STARTING states
a) Link-termination phase
b) Link establishment phase
c) Authentication phase
d) Link dead phase
View Answer
Answer: d
Explanation: The link necessarily begins and ends with this phase. During this phase,
the LCP automata will be in INITIAL or STARTING states link dead phase.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “EIGRP”.
Answer
Explanation: EIGRP metric is K-values.
Answer: a, b, c
Explanation: VLSM/subnetting, Auto summary, Unequal cast load balancing.
Answer: a
Explanation: EIGRP send the hello message after every5 seconds (LAN), 60 seconds
(WAN).
Answer: a
Explanation: Administrative distance for internal EIGRP is 90.
7. For default gateway you will use which of following command on Cisco router?
a) IP default network
b) IP default gateway
c) IP default route
d) Default network
View Answer
Answer: a
Explanation: IP default network command used in default gateway in Cisco router.
Answer: b
Explanation: Administrative distance for external EIGRP route is 170.
Answer: b
Explanation: EIGRP uses the DUAL algorithm for finding shortest path.
10. In EIGRP best path is known as the successor, where as backup path is known as
__________
a) Feasible successor
b) Back-up route
c) Default route
d) There is no backup route in EIGRP
View Answer
Answer: a
Explanation: Feasible successor is the backup path.
This set of Computer Networks Questions and Answers for Campus interviews focuses
on “STP”.
Answer: c
Explanation: File server allows LAN users to share computer programs and data.
Answer: a
Explanation: STP stands for Shielded twisted pair cable.
Answer: a
Explanation: A standalone program that has been modified to work on a LAN by
including concurrency controls such as file and record locking is an example of LAN
intrinsic software.
4. The __________ portion of LAN management software restricts access, records user
activities and audit data etc.
a) Configuration management
b) Security management
c) Performance management
d) None of the mentioned
View Answer
Answer: b
Explanation: The Security management portion of LAN management software restricts
access, records user activities and audit data etc.
Answer: d
Explanation: 200m is the max cable length of STP.
6. What is the max data capacity of STP?
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
View Answer
Answer: b
Explanation: 100 mbps is the max data capacity of STP.
Answer: c
Explanation: RJ-45 is used for STP cable.
Answer: b
Explanation: Hub/switch is the central device in star topology.
Answer: c
Explanation: 1000 mbps is max data capacity for optical fiber cable.
Answer: b
Explanation: Ethernet uses CSMA/CD access method.
Computer Networks Questions & Answers – Packet Forwarding and Routing
This set of Computer Networks online test focuses on “Packet Forwarding and
Routing”.
Answer: c
Explanation: It is for transforming the message from source to destination with forward
technique.
2. A second technique to reduce routing table and simplify searching process is called
a) Network-Specific Method
b) Network-Specific Motion
c) Network-Specific Maintaining
d) Network-Specific Membership
View Answer
Answer: a
Explanation: It is the before method of the packet switching.
Answer: c
Explanation: This method is for creating the shortest distances.
4. Several techniques can make size of routing table manageable and also handle issues
such as
a) Maturity
b) Error reporting
c) Tunneling
d) Security
View Answer
Answer: d
Explanation: To visible only accessing sub networks.
Answer: b
Explanation: Security measures.
Answer: c
Explanation: It is only for unidirectional.
Answer: a
Explanation: Graph technique is used for best node finding technic with shortest path
algorithms.
Answer: b
Explanation: Loops is for multicast routing.
Answer: a
Explanation: Reverse Path Forwarding.
Answer: b
Explanation: Link State Packet
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Security In The Internet”.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
10. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “OSPF”.
Answer: a
Explanation: Each OSPF router monitors the cost of the link to each of its neighbours
and then floods the link state information to other routers in the network. hence it is
called so.
Answer: c
Explanation: Shortest path in OSPF is usually computed by Dijkstra’s algorithm.
Answer: d
Explanation: Hello protocol is used to discover neighbour routers automatically.
Answer: c
Explanation: Five types of OSPF packets are: Hello, Database description, Link-state
request, Link-state update, Link-state ACK.
a) 1-2-3
b) 1-3-2
c) 3-2-1
d) 2-1-3
View Answer
Answer: b
Explanation: None.
Answer: c
Explanation: Checksum field is used to detect errors.
8. In OSPF database descriptor packet, if more database descriptor packet flows, ‘M’
field is set to
a) 1
b) 0
c) more
d) none
View Answer
Answer: a
Explanation: M bit is set to 1.
9. In OSPF database descriptor packet, which field is used to indicate that the router is
master
a) M
b) MS
c) I
d) Options
View Answer
Answer: b
Explanation: MS bit is set if the router is master, otherwise slave.
10. In OSPF database descriptor packet, which field is used to detect a missing packet
a) LSA header
b) MS
c) Database descriptor sequence number
d) Options
View Answer
Answer: c
Explanation: Sequence number field is used to detect a missing packet.
1. An OSPF router receives an LSA, the router checks its sequence number, and this
number matches the sequence number of the LSA that the receiving router already has.
What does the receiving router do with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
View Answer
Answer: a
Explanation: An OSPF router receives an LSA, the router checks its sequence number,
and this number matches the sequence number of the LSA that the receiving router
already has Ignores the LSA.
2. An OSPF router receives an LSA. The router checks its sequence number and finds
that
this number is higher than the sequence number it already has. Which two tasks does
the router perform with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
View Answer
Answer: b
Explanation: An OSPF router receives an LSA. The router checks its sequence number
and finds that this number is higher than the sequence number Adds it to the database,
Floods the LSA to the other routers.
3. An OSPF router receives an LSA. The router checks its sequence number and finds
that
this number is lower than the sequence number it already has. What does the router do
with the LSA?
a) ignores the LSA
b) adds it to the database
c) sends newer LSU update to source router
d) floods the LSA to the other routers
View Answer
Answer: c
Explanation: An OSPF router receives an LSA. The router checks its sequence number
and finds that this number is lower than the sequence number sends newer LSU update
to source router.
4. Each LSA has its own age timer. By default, how long does an LSA wait before
requiring an update?
a) 30 seconds
b) 1 minute
c) 30 minutes
d) 1 hour
View Answer
Answer: c
Explanation: Each LSA has its own age timer. By default, 30 minutes does an LSA wait
before requiring an update.
5. Distance vector protocols use the concept of split horizon, but link-state routing
protocols, such as OSPF, do not.
a) True
b) False
View Answer
Answer: b
Explanation: Distance vector protocols use the concept of split horizon, but link-state
routing protocols, such as OSPF, do not use this.
Answer: b
Explanation: The outcome of Dijkstra’s calculation is used to populate the Routing
table.
Answer: a
Explanation: 89 is the IP protocol number for OSPF packets.
Answer: d
Explanation: Query packet is NOT an OSPF packet type.
Answer: a
Explanation: 224.0.0.5 is the multicast address does the OSPF Hello protocol use.
10. The Hello protocol sends periodic updates to ensure that a neighbor relationship is
maintained between adjacent routers.
a) True
b) False
View Answer
Answer: a
Explanation: The Hello protocol sends periodic updates to ensure that a neighbor
relationship is maintained between adjacent routers.
Answer: a
Explanation: DBD packets are involved during which two states Exstart, Exchange.
Answer: d
Explanation: None.
Answer: d
Explanation: Maxage timeis NOT a field within an OSPF packet header.
14. Which two commands are required for basic OSPF configuration?
a) Network ip-address mask area area-id
b) Network ip-address wildcard-mask area area-id
c) Router ospf process-id
d) IP router ospf
View Answer
Answer: b, c
Explanation: Network ip-address wildcard-mask area area-id, Router ospf process-id are
required for basic OSPF configuration.
Answer: d
Explanation: Show ipospf neighborOSPF show command describes a list of OSPF
adjacencies.
Computer Networks Questions & Answers – Datagram Networks
This set of Computer Networks Questions and Answers for Aptitude test focuses on
“Datagram Networks”.
Answer: a
Explanation: Datagram switching is normally done at network layer.
Answer: c
Explanation: As the name suggests, in datagram switching packets are called as
datagrams.
Answer: b
Explanation: The switch does not keep the information about the connection state,
hence it is connection less.
Answer: c
Explanation: Routing table is used to route the packets to their destinations.
Answer: b
Explanation: Routing table contains destination address and output port to route the
packets to their destinations.
6. Which of the following remains same in the header of the packet in a datagram
network during the entire journey of the packet?
a) Destination address
b) Source address
c) Checksum
d) Padding
View Answer
Answer: a
Explanation: Destination address remains same in the header during the entire journey
of the packet.
7. Which of the following is true with respect to the delay in datagram networks?
a) Delay is greater than in a virtual circuit network
b) Each packet may experience a wait at a switch
c) Delay is not uniform for the packets of a message
d) All of the mentioned
View Answer
Answer: d
Explanation: All the options are true with respect to the delay in datagram networks.
8. During datagram switching, the packets are placed in __________ to wait until the
given transmission line becomes available.
a) Stack
b) Queue
c) Hash
d) Routing table
View Answer
Answer: b
Explanation: Packets are stored in queue during delay and are served as first in first out.
9. The probability of the error in a transmitted block _________ with the length of the
block
a) Remains same
b) Decreases
c) Increases
d) None of the mentioned
View Answer
Answer: c
Explanation: Probability of the error in a transmitted block increases with the length of
the block.
10. Which of the following is true with respect to the datagram networks?
a) Number of flows of packets are not limited
b) Packets may not be in order at the destination
c) Path is not reserved
d) All of the mentioned
View Answer
Answer: d
Explanation: All are the facts with respect to the datagram networks.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Firewalls”.
Answer: b
Explanation: As you know, firewalls are available as hardware appliances, as software-
only, or a combination of the two. In every case, the purpose of a firewall is to isolate
your trusted internal network (or your personal PC) from the dangers of unknown
resources on the Internet and other network connections that may be harmful. The
firewall prevents unauthorized access to your internal, trusted network from outside
threats.
Answer: a
Explanation: Most network layer firewalls can operate as stateful or stateless firewalls,
creating two subcategories of the standard network layer firewall. Stateful firewalls
have the advantage of being able to track packets over a period of time for greater
analysis and accuracy — but they require more memory and operate more slowly.
Stateless firewalls do not analyze past traffic and can be useful for systems where speed
is more important than security, or for systems that have very specific and limited needs.
For example, a computer that only needs to connect to a particular backup server does
not need the extra security of a stateful firewall.
3. A firewall is installed at the point where the secure internal network and untrusted
external network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
View Answer
Answer: a
Explanation: A firewall can be a PC, a router, a midrange, a mainframe, a UNIX
workstation, or a combination of these that determines which information or services
can be accessed from the outside and who is permitted to use the information and
services from outside. Generally, a firewall is installed at the point where the secure
internal network and untrusted external network meet, which is also known as a
chokepoint.
Answer: a
Explanation: A firewall can be a PC, a midrange, a mainframe, a UNIX workstation, a
router, or combination of these. Depending on the requirements, a firewall can consist
of one or more of the following functional components: Packet-filtering router
Answer: d
Explanation: The application firewall is typically built to control all network traffic on
any layer up to the application layer. It is able to control applications or services
specifically, unlike a stateful network firewall, which is – without additional software –
unable to control network traffic regarding a specific application. There are two primary
categories of application firewalls, network-based application firewalls and host-based
application firewalls.
Answer: c
Explanation: In computing, a firewall is a network security system that monitors and
controls the incoming and outgoing network traffic based on predetermined security
rules.[1] A firewall typically establishes a barrier between a trusted, secure internal
network and another outside network, such as the Internet, that is assumed not to be
secure or trusted.[2] Firewalls are often categorized as either network firewalls or host-
based firewalls.
7. What is one advantage of setting up a DMZ with two firewalls?
a) You can control where traffic goes in three networks
b) You can do stateful packet filtering
c) You can do load balancing
d) Improved network performance
View Answer
Answer: c
Explanation: In a topology with a single firewall serving both internal and external users
(LAN and WAN), it acts as a shared resource for these two zones.
8. What tells a firewall how to reassemble a data stream that has been divided into
packets?
a) The source routing future
b) The number in the header’s identification field
c) The destination IP address
d) The header checksum field in the packet header
View Answer
Answer: a
Explanation: source routing future.
Answer: a
Explanation: Routing table with best performance
10. A firewall needs to be __________ so that it can grow with the network it protects
a) Robust
b) Expansive
c) Fast
d) Scalable
View Answer
Answer: b
Explanation: Expansive to block the fake subscribers.
Answer: b
Explanation: Fault management is called the performance management.
Answer: a
Explanation: Documentation is the other type of configuration management.
Answer: d
Explanation: In Network Management System, a term that responsible for controlling
access to network based on predefined policy is called security management.
Answer: c
Explanation: Control of users’ access to network resources through charges are main
responsibilities of accounting management.
6. The physical connection between an end point and a switch or between two switches
is
a) Transmission path
b) Virtual path
c) Virtual circuit
d) None of the mentioned
View Answer
Answer: a
Explanation:bThe physical connection between an end point and a switch or between
two switches is transmission path.
Answer: c
Explanation: Packet switched network is most preferred for pipelining process.
8. In Network Management System, maps track each piece of hardware and its
connection to the
a) IP Server
b) Domain
c) Network
d) Data
View Answer
Answer: c
Explanation: Network is main thing in connecting different entities in a place.
Answer: c
Explanation: Simple network management controls the group of objects in management
interface base.
Answer: b
Explanation: Five broad categories are
• Fault Management
• Configuration Management
• Accounting (Administration)
• Performance Management
• Security Management.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Ethernet”.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
3. MAC address is of
1) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
View Answer
Answer: d
Explanation: None.
4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission
parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
5. Ethernet in metropolitan area network (MAN) can be used as
a) pure ethernet
b) ethernet over SDH
c) ethernet over MPLS
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
a) short frame
b) run frame
c) mini frame
d) man frame
View Answer
Answer: b
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Network Utilities”.
1. Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: b
Explanation: A ping sweep is a method that can establish a range of IP addresses which
map to live hosts and are mostly used by network scanning tools like nmap.
3. ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b
View Answer
Answer: d
Explanation: None.
Answer: a
Explanation: None.
5. If you want to find the number of routers between a source and destination, the utility
to be used is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer: d
Explanation: None.
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: Pathping combines the functionality of ping with that of traceroute
(tracert).
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Wireless LAN”.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) None of the mentioned
View Answer
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “SONET”.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
4. The photonic layer of the SONET is similar to the __________ of OSI model.
a) network layer
b) data link layer
c) physical layer
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
7. A linear SONET network can be
a) point-to-point
b) multi-point
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: One ring is used as the working ring and other as the protection ring.
Answer: c
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Internet”.
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: c
Explanation: None.
3. Internet access by transmitting digital data over the wires of a local telephone
network is provided by
a) leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: d
Explanation: None.
6. IPv6 addressed have a size of
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
View Answer
Answer: c
Explanation: None.
7. Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
8. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: a
Explanation: None.
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) none of the mentioned
View Answer
Answer: d
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Bluetooth”.
Answer: a
Explanation: Piconet is the basic unit of bluetooth system having a master node and
upto seven active slave nodes.
Answer: c
Explanation: None.
Answer: b
Explanation: None.
4. Bluetooth uses
a) frequency hoping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
5. Unauthorised access of information from a wireless device through a bluetooth
connection is called
a) bluemaking
b) bluesnarfing
c) bluestring
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: a
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “WiMAX”.
Answer: b
Explanation: None.
2. WiMAX provides
a) simplex communication
b) half duplex communication
c) full duplex communication
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: a
Explanation: None.
4. Which one of the following modulation scheme is supported by WiMAX?
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: None.
7. WiMAX provides
a) VoIP services
b) IPTV services
c) Both (a) and (b)
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: b
Explanation: None.
10. Which one of the following frequency is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
View Answer
Answer: b
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “RTP”.
Answer: d
Explanation: None.
2. RTP is used to
a) carry the media stream
b) monitor transmission statistics of streams
c) monitor quality of service of streams
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
3. RTP provides the facility of jitter ____________
a) media stream
b) expansion
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: d
Explanation: None.
7. Which one of the following multimedia formats can not be supported by RTP?
a) MPEG-4
b) MJPEG
c) MPEG
d) None of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: a
Explanation: None.
Answer: d
Explanation: None.
10. Which protocol defines a profile of RTP that provides cryptographic services for the
transfer of payload data?
a) SRTP
b) RTCP
c) RCP
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “RPC”.
Answer: b
Explanation: None.
2. In RPC, while a server is processing the call, the client is blocked
a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: a
Explanation: None.
Answer: b
Explanation: None.
Answer: c
Explanation: None.
Answer: d
Explanation: None.
8. RPC is used to
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
9. RPC is a
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
10. The local operating system on the server machine passes the incoming packets to the
a) server stub
b) client stub
c) client operating system
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
Computer Networks Questions & Answers – Intrusion Detection Systems
This set of Computer Networks Questions and Answers for Entrance exams focuses on
“Intrusion Detection Systems”.
Answer: c
Explanation: Once a protocol has been built and a behavior defined, the engine can
scale more quickly and easily than the signature-based model because a new signature
does not have to be created for every attack and potential variant.
Answer: d
Explanation: A false positive is any alert that indicates nefarious activity on a system
that, upon further inspection, turns out to represent legitimate network traffic or
behavior.
3. One of the most obvious places to put an IDS sensor is near the firewall. Where
exactly in relation to the firewall is the most productive placement?
a) Inside the firewall
b) Outside the firewall
c) Both inside and outside the firewall
d) Neither inside the firewall nor outside the firewall.
View Answer
Answer: a
Explanation: There are legitimate political, budgetary and research reasons to want to
see all the “attacks” against your connection, but given the care and feeding any IDS
requires, do yourself a favor and keep your NIDS sensors on the inside of the firewall.
Answer: b, d
Explanation: Most commercial IDSes generate signatures at the network and transport
layers.
Answer: b
Explanation: Second component of mechanisms are set in place to reenact known
methods of attack and to record system responses.
Answer: b
Explanation: IDSes work in a manner similar to modern antivirus technology. They are
constantly updated with attack-definition files (signatures) that describe each type of
known malicious activity.
Answer: a, c
Explanation: Nemean automatically generates “semantics-aware” signatures based on
traffic at the session and application layers.
9. Which of the following is used to provide a baseline measure for comparison of
IDSes?
a) Crossover error rate
b) False negative rate
c) False positive rate
d) Bit error rate
View Answer
Answer: a
Explanation: As the sensitivity of systems may cause the false positive/negative rates to
vary, it’s critical to have some common measure that may be applied across the board.
Answer: d
Explanation: They are constantly updated with attack-definition files (signatures) that
describe each type of known malicious activity. They then scan network traffic for
packets that match the signatures, and then raise alerts to security administrators.
This set of Basic Computer Networks Questions and Answers focuses on “PPP”.
1. Both HDLC and PPP both are Data link layer protocols.
a) True
b) False
View Answer
Answer: a
Explanation: Both HDLC and PPP both are Data link layer protocol.
2. Which protocol does the PPP protocol provide for handling the capabilities of the
connection/link on the network?
a) LCP
b) NCP
c) Both a and b
d) TCP
View Answer
Answer: c
Explanation: LCP and NCP are the PPP protocol provide for handling the capabilities of
the connection/link on the network.
Answer: c
Explanation: The PPP protocolis designed for simple links which transport packets
between two peers and one of the protocols for making an Internet connection over a
phone line.
Answer: a
Explanation: PPP provides thelinklayer in the TCP/IP suite.
Answer: b
Explanation: PPP consists of three (encapsulating, a link control protocol, NCP)
Components.
Answer: a
Explanation: The PPP encapsulationprovides for multiplexing of different network-layer
protocols.
Answer: a
Explanation: A Link Control Protocol (LCP) is used for establishing, configuring and
testing the data-link connection.
8. A family of network control protocols (NCPs)
a) Are a series of independently defined protocols that provide a dynamic
b) Are a series of independently-defined protocols that encapsulate
c) Are a series of independently defined protocols that provide transparent
d) The same as NFS
View Answer
Answer: b
Explanation: A family of network control protocols (NCPs)are a series of
independently-defined protocols that encapsulate.
Answer: a
Explanation: PPP can terminate the link at any time because it works on the data link
layer protocol.
10. The link necessarily begins and ends with this phase. During this phase, the LCP
automata will be in INITIAL or STARTING states
a) Link-termination phase
b) Link establishment phase
c) Authentication phase
d) Link dead phase
View Answer
Answer: d
Explanation: The link necessarily begins and ends with this phase. During this phase,
the LCP automata will be in INITIAL or STARTING states link dead phase.
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “EIGRP”.
Answer: a
Explanation: EIGRP is a routing Protocol design by Cisco.
Answer
Explanation: EIGRP metric is K-values.
Answer: a, b, c
Explanation: VLSM/subnetting, Auto summary, Unequal cast load balancing.
Answer: a
Explanation: EIGRP send the hello message after every5 seconds (LAN), 60 seconds
(WAN).
Answer: a
Explanation: Administrative distance for internal EIGRP is 90.
Answer: a, b, d
Explanation: The EIGRP metric values are Delay, Bandwidth, and MTU.
7. For default gateway you will use which of following command on Cisco router?
a) IP default network
b) IP default gateway
c) IP default route
d) Default network
View Answer
Answer: a
Explanation: IP default network command used in default gateway in Cisco router.
Answer: b
Explanation: Administrative distance for external EIGRP route is 170.
Answer: b
Explanation: EIGRP uses the DUAL algorithm for finding shortest path.
10. In EIGRP best path is known as the successor, where as backup path is known as
__________
a) Feasible successor
b) Back-up route
c) Default route
d) There is no backup route in EIGRP
View Answer
Answer: a
Explanation: Feasible successor is the backup path.
This set of Computer Networks Questions and Answers for Campus interviews focuses
on “STP”.
Answer: c
Explanation: File server allows LAN users to share computer programs and data.
2. STP stands for
a) Shielded twisted pair cable
b) Spanning tree protocol
c) Static transport protocol
d) None of the mentioned
View Answer
Answer: a
Explanation: STP stands for Shielded twisted pair cable.
Answer: a
Explanation: A standalone program that has been modified to work on a LAN by
including concurrency controls such as file and record locking is an example of LAN
intrinsic software.
4. The __________ portion of LAN management software restricts access, records user
activities and audit data etc.
a) Configuration management
b) Security management
c) Performance management
d) None of the mentioned
View Answer
Answer: b
Explanation: The Security management portion of LAN management software restricts
access, records user activities and audit data etc.
Answer: d
Explanation: 200m is the max cable length of STP.
Answer: c
Explanation: RJ-45 is used for STP cable.
Answer: b
Explanation: Hub/switch is the central device in star topology.
Answer: c
Explanation: 1000 mbps is max data capacity for optical fiber cable.
Answer: b
Explanation: Ethernet uses CSMA/CD access method.