Computer Networks MCQ Number 01550

Computer Networks MCQ Set 1

1. Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned

Answer

Answer: d [Reason:] None.

2. Ping sweep is a part of
a) Traceroute
b) Nmap
c) Route
d) Ipconfig

Answer

Answer: b [Reason:] A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are mostly used by network scanning tools like nmap.

3. ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both Ping & Traceroute

Answer

Answer: d [Reason:] None.

4. __________ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute

Answer

Answer: a [Reason:] None.

5. If you want to find the number of routers between a source and destination, the utility to be used is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute

Answer

Answer: d [Reason:] None.

6. Which of the following is related to ipconfig in Microsoft Windows ?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned

Answer

Answer: d [Reason:] None.

7. This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) None of the mentioned

Answer

Answer: a [Reason:] None.

8. Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters

Answer

Answer: c [Reason:] Pathping combines the functionality of ping with that of traceroute (tracert).

Computer Networks MCQ Set 2

1. The number of layers in Internet protocol stack
a) 5
b) 7
c) 6
d) None of the mentioned

Answer

Answer: a [Reason:] None.

2. The number of layers in ISO OSI reference model
a) 5
b) 7
c) 6
d) None of the mentioned

Answer

Answer: b [Reason:] None.

3. This layer is an addition to OSI model when compared with TCP IP model
a) Application layer
b) Presentation layer
c) Session layer
d) Both Session and Presentation layer

Answer

Answer: d [Reason:] None.

4. Application layer is implemented in
a) End system
b) NIC
c) Ethernet
d) None of the mentioned

Answer

Answer: a [Reason:] None.

5. Transport layer is implemented in
a) End system
b) NIC
c) Ethernet
d) None of the mentioned

Answer

Answer: a [Reason:] None.

6. The functionalities of presentation layer includes
a) Data compression
b) Data encryption
c) Data description
d) All of the mentioned

Answer

Answer: d [Reason:] None.

7. Delimiting and synchronization of data exchange is provided by
a) Application layer
b) Session layer
c) Transport layer
d) Link layer

Answer

Answer: b [Reason:] None.

8. In OSI model, when data is sent from device A to device B, the 5th layer to recieve data at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer

Answer

Answer: d [Reason:] None.

9. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer

Answer

Answer: a [Reason:] None.

10. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______
a) Added
b) Removed
c) Rearranged
d) None of the mentioned

Answer

Answer: b [Reason:] None.

11. Identify the statement which cannot be associated with OSI model
a) A structured way to discuss and easier update syatem components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) None of the mentioned

Answer

Answer: c [Reason:] One layer may use the information from another layer Ex: time stamp value.

Computer Networks MCQ Set 3

1. Physical or logical arrangement of network is
a) Topology
b) Routing
c) Networking
d) None of the mentioned

Answer

Answer: a [Reason:] None.

2. In this topology there is a central controller or hub
a) Star
b) Mesh
c) Ring
d) Bus

Answer

Answer: a [Reason:] None.

3. This topology requires multipoint connection
a) Star
b) Mesh
c) Ring
d) Bus

Answer

Answer: d [Reason:] None.

4. Data communication system spanning states, countries, or the whole world is
a) LAN
b) WAN
c) MAN
d) None of the mentioned

Answer

Answer: b [Reason:] Wide area network(WAN) covers the whole of the world network.

5. Data communication system within a building or campus is
a) LAN
b) WAN
c) MAN
d) None of the mentioned

Answer

Answer: a [Reason:] None.

6. Expand WAN
a) World area network
b) Wide area network
c) Web area network
d) None of the mentioned

Answer

Answer: b [Reason:] None.

7. In TDM, slots are further divided into
a) Seconds
b) Frames
c) Packets
d) None of the mentioned

Answer

Answer: b [Reason:] None.

8. Multiplexing technique that shifts each signal to a different carrier frequency
a) FDM
b) TDM
c) Both FDM & TDM
d) None of the mentioned

Answer

Answer: a [Reason:] FDM stands for Frequency division multiplexing.

Computer Networks MCQ Set 4

1. Which methods are commonly used in Server Socket class?
a) Public Output Stream get Output Stream ()
b) Public Socket accept ()
c) Public synchronized void close ()
d) None of the above

Answer

Answer: b [Reason:] Public Socket accept () used in Server Socket class.

2. Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?
a) Datagram Socket(int port)
b) Datagram Socket(int port, Int Address address)
c) Datagram Socket()
d) None of the above

Answer

Answer: b [Reason:] Datagram Socket (int port, Int Address address) is use data create a datagram socket.

3. The client in socket programming must know which information?
a) IP address of Server
b) Port number
c) Both A & B
d) None of the above

Answer

Answer: c [Reason:] The client in socket programming must know IP address of Server.

4. The URL Connection class can be used to read and write data to the specified resource referred by the URL
a) True
b) False

Answer

Answer: a [Reason:] The URL Connection class can be used to read and write data to the specified resource referred by the URL.

5. Datagram is basically an information but there is no guarantee of its content, arrival or arrival time.
a) True
b) False

Answer

Answer: a [Reason:] Datagram is basically an information but there is no guarantee of its content, arrival or arrival time.

6. TCP, FTP, Telnet, SMTP, POP etc. are examples of?
a) Socket
b) IP Address
c) Protocol
d) MAC Address

Answer

Answer: c [Reason:] TCP, FTP, Telnet, SMTP, POP etc. are examples of Protocol.

7. What does the java.net.InetAddress class represent?
a) Socket
b) IP Address
c) Protocol
d) MAC Address

Answer

Answer: b [Reason:] The java.net.InetAddress class represent IP Address.

8. The flush () method of Print Stream class flushes any un cleared buffers in memory
a) True
b) False

Answer

Answer: a [Reason:] The flush () method of Print Stream class flushes any un cleared buffers in memory.

9. Which classes are used for connection-less socket programming?
a) Datagram Socket
b) Datagram Packet
c) Both A & B
d) None of the above

Answer

Answer: c [Reason:] Datagram Socket, Datagram Packet are used for connection-less socket programming.

10. In Int Address class which method returns the host name of the IP Address?
a) Public String get Hostname()
b) Public String getHostAddress()
c) Public static IntAddress get Localhost()
d) None of the above

Answer

Answer: a [Reason:] In Int Address class public String get Hostname() method returns the host name of the IP Address.

Computer Networks MCQ Set 5

1. Both HDLC and PPP both are Data link layer protocols.
a) True
b) False

Answer

Answer: a [Reason:] Both HDLC and PPP both are Data link layer protocol.

2. Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?
a) LCP
b) NCP
c) Both a and b
d) TCP

Answer

Answer: c [Reason:] LCP and NCP are the PPP protocol provide for handling the capabilities of the connection/link on the network.

3. The PPP protocol
a) Is designed for simple links which transport packets between two peers
b) Is one of the protocols for making an Internet connection over a phone line
c) Both a & b
d) None of the mentioned

Answer

Answer: c [Reason:] The PPP protocolis designed for simple links which transport packets between two peers and one of the protocols for making an Internet connection over a phone line.

4. PPP provides the _______ layer in the TCP/IP suite.
a) Link
b) Network
c) Transport
d) Application

Answer

Answer: a [Reason:] PPP provides thelinklayer in the TCP/IP suite.

5. PPP consists of ________components
a) Three (encapsulating, the Domain Name system)
b) Three ( encapsulating ,a link control protocol ,NCP )
c) Two ( a link control protocol, Simple Network Control protocol)
d) None of the above

Answer

Answer: b [Reason:] PPP consists of three (encapsulating, a link control protocol, NCP)
Components.

6. The PPP encapsulation
a) Provides for multiplexing of different network-layer protocols
b) Requires framing to indicate the beginning and end of the encapsulation
c) Both a & b
d) None of the mentioned

Answer

Answer: a [Reason:] The PPP encapsulationprovides for multiplexing of different network-layer protocols.

7. A Link Control Protocol (LCP) is used for
a) Establishing ,configuring and testing the data-link connection
b) Establishing and configuring different network-layer protocols
c) Both a & b
d) None of the mentioned

Answer

Answer: a [Reason:] A Link Control Protocol (LCP) is used for establishing, configuring and testing the data-link connection.

8. A family of network control protocols (NCPs)
a) Are a series of independently defined protocols that provide a dynamic
b) Are a series of independently-defined protocols that encapsulate
c) Are a series of independently defined protocols that provide transparent
d) The same as NFS

Answer

Answer: b [Reason:] A family of network control protocols (NCPs)are a series of independently-defined protocols that encapsulate.

9. Choose one from the following
a) PPP can terminate the link at any time
b) PPP can terminate the link only during the link establishment phase
c) PPP can terminate the link during the authentication phase
d) None of the mentioned

Answer

Answer: a [Reason:] PPP can terminate the link at any time because it works on the data link layer protocol.

10. The link necessarily begins and ends with this phase. During this phase, the LCP automata will be in INITIAL or STARTING states
a) Link-termination phase
b) Link establishment phase
c) Authentication phase
d) Link dead phase

Answer

Answer: d [Reason:] The link necessarily begins and ends with this phase. During this phase, the LCP automata will be in INITIAL or STARTING states link dead phase.

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.