Computer Networks MCQ Number 01556

Computer Networks MCQ Set 1

1. Term is used to place packet in its route to its destination is called
a) Delayed
b) Urgent
c) Forwarding
d) Delivering

Answer

Answer: c [Reason:] It is for transforming the message from source to destination with forward technique.

2. A second technique to reduce routing table and simplify searching process is called
a) Network-Specific Method
b) Network-Specific Motion
c) Network-Specific Maintaining
d) Network-Specific Membership

Answer

Answer: a [Reason:] It is the before method of the packet switching.

3. Next-Hop Method is used to reduce contents of a
a) Revolving table
b) Rotating Table
c) Routing Table
d) Re-allocate table

Answer

Answer: c [Reason:] This method is for creating the shortest distances.

4. Several techniques can make size of routing table manageable and also handle issues such as
a) Maturity
b) Error reporting
c) Tunneling
d) Security

Answer

Answer: d [Reason:] To visible only accessing sub networks.

5. Host-specific routing is used for purposes such as checking route or providing
a) Network Measures
b) Security Measures
c) Routing Measures
d) Delivery Measures

Answer

Answer: b [Reason:] Security measures.

6. In Unicast routing, if instability is between three nodes, stability cannot be
a) Stable
b) Reversed
c) Guaranteed
d) Forward

Answer

Answer: c [Reason:] It is only for unidirectional.

7. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a
a) Graph
b) Tree
c) Network
d) Link

Answer

Answer: a [Reason:] Graph technique is used for best node finding technic with shortest path algorithms.

8. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates
a) Gaps
b) Loops
c) Holes
d) Links

Answer

Answer: b [Reason:] Loops is for multicast routing.

9. RPF stands for
a) Reverse Path Forwarding
b) Reverse Path Failure
c) Reverse Packet Forwarding
d) Reverse Protocol Failure

Answer

Answer: a [Reason:] Reverse Path Forwarding.

10. LSP stands for
a) Link Stable Packet
b) Link State Packet
c) Link State Protocol
d) Link State Path

Answer

Answer: b [Reason:] Link State Packet

Computer Networks MCQ Set 2

1. Open Shortest Path First (OSPF) is also called as
a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) All of the mentioned

Answer

Answer: a [Reason:] Each OSPF router monitors the cost of the link to each of its neighbours and then floods the link state information to other routers in the network. hence it is called so.

2. The computation of the shortest path in OSPF is usually done by
a) Bellman-ford algorithm
b) Routing information protocol
c) Dijkstra’s algorithm
d) Distance vector routing

Answer

Answer: c [Reason:] Shortest path in OSPF is usually computed by Dijkstra’s algorithm.

3. Which of the following is false with respect to the features of OSPF
a) Support for fixed-length sunbathing by including the subnet mask in the routing message
b) More flexible link cost than can range from 1 to 65535
c) Use of designated router
d) Distribution of traffic over multiple paths that have equal cost to the destination

Answer

Answer: a [Reason:] Support for variable-length sunbathing by including the subnet mask in the routing message.

4. In OSPF, which protocol is used to discover neighbour routers automatically?
a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) Hello protocol

Answer

Answer: d [Reason:] Hello protocol is used to discover neighbour routers automatically.

5. Which of the following is not a type of OSPF packet?
a) Hello
b) Link-state request
c) Link-state response
d) Link-state ACK

Answer

Answer: c [Reason:] Five types of OSPF packets are: Hello, Database description, Link-state request, Link-state update, Link-state ACK.

6. Correct order of the operations of OSPF
1. Hello packets
2. Propagation of link-state information and building of routing tables
3. Establishing adjacencies and synchronisation database

a) 1-2-3
b) 1-3-2
c) 3-2-1
d) 2-1-3

Answer

Answer: b [Reason:] None.

7. In OSPF header, which field is used to detect errors in the packet?
a) Type
b) Area ID
c) Authentication type
d) Checksum

Answer

Answer: c [Reason:] Checksum field is used to detect errors.

8. In OSPF database descriptor packet, if more database descriptor packet flows, ‘M’ field is set to
a) 1
b) 0
c) more
d) none

Answer

Answer: a [Reason:] M bit is set to 1.

9. In OSPF database descriptor packet, which field is used to indicate that the router is master
a) M
b) MS
c) I
d) Options

Answer

Answer: b [Reason:] MS bit is set if the router is master, otherwise slave.

10. In OSPF database descriptor packet, which field is used to detect a missing packet
a) LSA header
b) MS
c) Database descriptor sequence number
d) Options

Answer

Answer: c [Reason:] Sequence number field is used to detect a missing packet.

Computer Networks MCQ Set 3

1. Multiple object can be sent over a TCP connection between client and server in
a) Persistent HTTP
b) Ponpersistent HTTP
c) Both (a) and (b)
d) None of the mentioned

Answer

Answer: a [Reason:] hypertext transfer protocol is used for sending multiple objects over TCP connection.

2. HTTP is ________ protocol.
a) Application layer
b) Transport layer
c) Network layer
d) None of the mentioned

Answer

Answer: a [Reason:] HTTP works on application layer.

3. In the network HTTP resources are located by
a) Uniform resource identifier
b) Unique resource locator
c) Unique resource identifier
d) None of the mentioned

Answer

Answer: a [Reason:] HTTP resources are located by uniform resource identifier.

4. HTTP client requests by establishing a __________ connection to a particular port on the server.
a) User datagram protocol
b) Transmission control protocol
c) Broader gateway protocol
d) None of the mentioned

Answer

Answer: b [Reason:]HTTP client requests by establishing TCP connection to a particular port on the server.

5. In HTTP pipelining
a) Multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
b) Multiple HTTP requests cannot be sent on a single TCP connection
c) Multiple HTTP requests are sent in a queue on a single TCP connection
d) None of the mentioned

Answer

Answer: a [Reason:] Multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses in HTTP pipelining.

6. FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23

Answer

Answer: b [Reason:] 21 is the port number of FTP.

7. In FTP protocol, client contacts server using _________ as the transport protocol.
a) Transmission control protocol
b) User datagram protocol
c) Datagram congestion control protocol
d) Stream control transmission protocol

Answer

Answer: a [Reason:] Client contacts server using TCP as the transport protocol.

8. In which mode FTP, the client initiates both the control and data connections.
a) Active mode
b) Passive mode
c) Both (a) and (b)
d) None of the mentioned

Answer

Answer: b [Reason:] In passive mode the client initiates both the control and data connections.

9. The file transfer protocol is built on
a) Data centric architecture
b) Service oriented architecture
c) Client server architecture
d) None of the mentioned

Answer

Answer: c [Reason:] FTP is built on client server architecture.

10. In file transfer protocol, data transfer can be done in
a) Stream mode
b) Block mode
c) Compressed mode
d) All of the mentioned

Answer

Answer: d [Reason:] Data transfer can be done in stream, block and compressed modes.

Computer Networks MCQ Set 4

1. The main reason for transition from IPv4 to IPv6 is
a) Huge number of systems on the internet
b) Very low number of system on the internet
c) Providing standard address
d) None of the mentioned

Answer

Answer: a [Reason:] Due to huge number of systems on the internet, transition from IPv4 to IPv6 happens.

2. Which of the following is not a transition strategies?
a) Dual stack
b) Tunnelling
c) Conversion
d) Header translation

Answer

Answer: c [Reason:] Dual stack, tunnelling and header translation are the only three transition strategies.

3. To determine which version to use when sending a packet to a destination, the source host queries which of the following?
a) Dual stack
b) Domain Name Server
c) Header information
d) All of the mentioned

Answer

Answer: b [Reason:] Source host queries DNS to determine which version to use when sending a packet to a destination.

4. The strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4 is
a) Dual stack
b) Header translation
c) Conversion
d) Tunnelling

Answer

Answer: d [Reason:] Tunnelling is used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4.

5. The correct format of packet in tunnel that uses IPv4 region is
1. IPv6 header
2. Payload
3. IPv4 header
a) 3-1-2
b) 3-2-1
c) 1-2-3
d) 1-3-2

Answer

Answer: a [Reason:] In tunnel with IPv4 region, IPv6 packet will be encapsulated with IPv4 header.

6. ___________ is necessary when the sender wants to use IPv6, but the receiver does not understand IPv6.
a) Dual stack
b) Header translation
c) Conversion
d) Tunnelling

Answer

Answer: b [Reason:] Header translation is used when the sender wants to use IPv6, but the receiver does not understand IPv6.

7. Header translation uses ___________ to translate an IPv6 address to an IPv4 address.
a) IP address
b) Physical address
c) Mapped address
d) Any of the mentioned

Answer

Answer: c [Reason:] Mapped address is used to translate an IPv6 address to an IPv4 address.

8. Which of the following is not the step in Header translation procedure?
a) The IPv6 mapped address is changed to an IPv4 address by extracting the rightmost 32bits
b) The value of the IPv6 priority field is discarded
c) The type of service field in IPv4 is set to zero
d) The IPv6 flow label is considered

Answer

Answer: d [Reason:] In header translation procedure, IPv6 flow label is ignored.

Computer Networks MCQ Set 5

1. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) Both a and b

Answer

Answer: a [Reason:] RIP v1 has network diameter is more than 17 hopes.

2. How often does a RIPv1 router broadcast its routing table by default?
a) Every 30 seconds
b) Every 60 seconds
c) Every 90 seconds
d) RIPv1 does not broadcast periodically

Answer

Answer: a [Reason:] Every 30 seconds RIPv1 router broadcast its routing table by default.

3. Which command displays RIP routing updates?
a) Show IP route
b) Debug IP rip
c) Show protocols
d) Debug IP route

Answer

Answer: b [Reason:] The debug IP rip command is used to show the Internet Protocol (IP) Routing Information Protocol (RIP) updates being sent and received on the router.

4. Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?
a) The updated information will be added to the existing routing table Debug IP rip
b) The update will be ignored and no further action will occur Debug IP route
c) The updated information will replace the existing routing table entry
d) The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence

Answer

Answer: b [Reason:] When a routing update is received by a router, the router first checks the administrative distance (AD) and always chooses the route with the lowest AD. However, if two routes are received and they both have the same AD, then the router will choose the one route with the lowest metrics, or in RIP’s case, hop count.

5. You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?
a) The route is 16 hops away Debug IP rip
b) The route has a delay of 16 microseconds Debug IP route
c) The route is inaccessible
d) The route is queued at 16 messages a second

Answer

Answer: c [Reason:] You cannot have 16 hops on a RIP network by default. If you receive a route advertised with a metric of 16, this means it is inaccessible.

6. Default administrative distance of Static Route
a) 0
b) 90
c) 100
d) 1

Answer

Answer: d [Reason:] 1 is the default administrative distance of Static Route.

7. Which protocol gives a full route table update every 30 seconds?
a) IEGRP
b) RIP
c) both of the mentioned
d) none of the mentioned

Answer

Answer: b [Reason:] RIP gives a full route table update every 30 seconds.

8. Default administrative distance of RIP
a) 0
b) 90
c) 120
d) 130

Answer

Answer: c [Reason:] Default administrative distance of RIP is 120.

9. Which statement is true regarding classless routing protocol?
a) The use of discontinuous networks is not allowed
b) Use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) IGRP supports classes routing within the same autonomous system

Answer

Answer: b [Reason:] Use of variable length subnet masks is permittedis true regarding classless routing protocol.

10. Where we should use default routing
a) On stub networks- which have only one exit path out of the network
b) Which have more than one exit path out of the network
c) Minimum five exit paths out of the network
d) None of the mentioned

Answer

Answer: a [Reason:] On stub networks- which have only one exit path out of the networkuse default routing.

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.