Computer Networks MCQ Set 1
1. Term is used to place packet in its route to its destination is called
a) Delayed
b) Urgent
c) Forwarding
d) Delivering
Answer
Answer: c [Reason:] It is for transforming the message from source to destination with forward technique.
2. A second technique to reduce routing table and simplify searching process is called
a) Network-Specific Method
b) Network-Specific Motion
c) Network-Specific Maintaining
d) Network-Specific Membership
Answer
Answer: a [Reason:] It is the before method of the packet switching.
3. Next-Hop Method is used to reduce contents of a
a) Revolving table
b) Rotating Table
c) Routing Table
d) Re-allocate table
Answer
Answer: c [Reason:] This method is for creating the shortest distances.
4. Several techniques can make size of routing table manageable and also handle issues such as
a) Maturity
b) Error reporting
c) Tunneling
d) Security
Answer
Answer: d [Reason:] To visible only accessing sub networks.
5. Host-specific routing is used for purposes such as checking route or providing
a) Network Measures
b) Security Measures
c) Routing Measures
d) Delivery Measures
Answer
Answer: b [Reason:] Security measures.
6. In Unicast routing, if instability is between three nodes, stability cannot be
a) Stable
b) Reversed
c) Guaranteed
d) Forward
Answer
Answer: c [Reason:] It is only for unidirectional.
7. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a
a) Graph
b) Tree
c) Network
d) Link
Answer
Answer: a [Reason:] Graph technique is used for best node finding technic with shortest path algorithms.
8. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates
a) Gaps
b) Loops
c) Holes
d) Links
Answer
Answer: b [Reason:] Loops is for multicast routing.
9. RPF stands for
a) Reverse Path Forwarding
b) Reverse Path Failure
c) Reverse Packet Forwarding
d) Reverse Protocol Failure
Answer
Answer: a [Reason:] Reverse Path Forwarding.
10. LSP stands for
a) Link Stable Packet
b) Link State Packet
c) Link State Protocol
d) Link State Path
Answer
Answer: b [Reason:] Link State Packet
Computer Networks MCQ Set 2
1. Open Shortest Path First (OSPF) is also called as
a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) All of the mentioned
Answer
Answer: a [Reason:] Each OSPF router monitors the cost of the link to each of its neighbours and then floods the link state information to other routers in the network. hence it is called so.
2. The computation of the shortest path in OSPF is usually done by
a) Bellman-ford algorithm
b) Routing information protocol
c) Dijkstra’s algorithm
d) Distance vector routing
Answer
Answer: c [Reason:] Shortest path in OSPF is usually computed by Dijkstra’s algorithm.
3. Which of the following is false with respect to the features of OSPF
a) Support for fixed-length sunbathing by including the subnet mask in the routing message
b) More flexible link cost than can range from 1 to 65535
c) Use of designated router
d) Distribution of traffic over multiple paths that have equal cost to the destination
Answer
Answer: a [Reason:] Support for variable-length sunbathing by including the subnet mask in the routing message.
4. In OSPF, which protocol is used to discover neighbour routers automatically?
a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) Hello protocol
Answer
Answer: d [Reason:] Hello protocol is used to discover neighbour routers automatically.
5. Which of the following is not a type of OSPF packet?
a) Hello
b) Link-state request
c) Link-state response
d) Link-state ACK
Answer
Answer: c [Reason:] Five types of OSPF packets are: Hello, Database description, Link-state request, Link-state update, Link-state ACK.
6. Correct order of the operations of OSPF
1. Hello packets
2. Propagation of link-state information and building of routing tables
3. Establishing adjacencies and synchronisation database
a) 1-2-3
b) 1-3-2
c) 3-2-1
d) 2-1-3
Answer
Answer: b [Reason:] None.
7. In OSPF header, which field is used to detect errors in the packet?
a) Type
b) Area ID
c) Authentication type
d) Checksum
Answer
Answer: c [Reason:] Checksum field is used to detect errors.
8. In OSPF database descriptor packet, if more database descriptor packet flows, ‘M’ field is set to
a) 1
b) 0
c) more
d) none
Answer
Answer: a [Reason:] M bit is set to 1.
9. In OSPF database descriptor packet, which field is used to indicate that the router is master
a) M
b) MS
c) I
d) Options
Answer
Answer: b [Reason:] MS bit is set if the router is master, otherwise slave.
10. In OSPF database descriptor packet, which field is used to detect a missing packet
a) LSA header
b) MS
c) Database descriptor sequence number
d) Options
Answer
Answer: c [Reason:] Sequence number field is used to detect a missing packet.
Computer Networks MCQ Set 3
1. Multiple object can be sent over a TCP connection between client and server in
a) Persistent HTTP
b) Ponpersistent HTTP
c) Both (a) and (b)
d) None of the mentioned
Answer
Answer: a [Reason:] hypertext transfer protocol is used for sending multiple objects over TCP connection.
2. HTTP is ________ protocol.
a) Application layer
b) Transport layer
c) Network layer
d) None of the mentioned
Answer
Answer: a [Reason:] HTTP works on application layer.
3. In the network HTTP resources are located by
a) Uniform resource identifier
b) Unique resource locator
c) Unique resource identifier
d) None of the mentioned
Answer
Answer: a [Reason:] HTTP resources are located by uniform resource identifier.
4. HTTP client requests by establishing a __________ connection to a particular port on the server.
a) User datagram protocol
b) Transmission control protocol
c) Broader gateway protocol
d) None of the mentioned
Answer
Answer: b [Reason:]HTTP client requests by establishing TCP connection to a particular port on the server.
5. In HTTP pipelining
a) Multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
b) Multiple HTTP requests cannot be sent on a single TCP connection
c) Multiple HTTP requests are sent in a queue on a single TCP connection
d) None of the mentioned
Answer
Answer: a [Reason:] Multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses in HTTP pipelining.
6. FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23
Answer
Answer: b [Reason:] 21 is the port number of FTP.
7. In FTP protocol, client contacts server using _________ as the transport protocol.
a) Transmission control protocol
b) User datagram protocol
c) Datagram congestion control protocol
d) Stream control transmission protocol
Answer
Answer: a [Reason:] Client contacts server using TCP as the transport protocol.
8. In which mode FTP, the client initiates both the control and data connections.
a) Active mode
b) Passive mode
c) Both (a) and (b)
d) None of the mentioned
Answer
Answer: b [Reason:] In passive mode the client initiates both the control and data connections.
9. The file transfer protocol is built on
a) Data centric architecture
b) Service oriented architecture
c) Client server architecture
d) None of the mentioned
Answer
Answer: c [Reason:] FTP is built on client server architecture.
10. In file transfer protocol, data transfer can be done in
a) Stream mode
b) Block mode
c) Compressed mode
d) All of the mentioned
Answer
Answer: d [Reason:] Data transfer can be done in stream, block and compressed modes.
Computer Networks MCQ Set 4
1. The main reason for transition from IPv4 to IPv6 is
a) Huge number of systems on the internet
b) Very low number of system on the internet
c) Providing standard address
d) None of the mentioned
Answer
Answer: a [Reason:] Due to huge number of systems on the internet, transition from IPv4 to IPv6 happens.
2. Which of the following is not a transition strategies?
a) Dual stack
b) Tunnelling
c) Conversion
d) Header translation
Answer
Answer: c [Reason:] Dual stack, tunnelling and header translation are the only three transition strategies.
3. To determine which version to use when sending a packet to a destination, the source host queries which of the following?
a) Dual stack
b) Domain Name Server
c) Header information
d) All of the mentioned
Answer
Answer: b [Reason:] Source host queries DNS to determine which version to use when sending a packet to a destination.
4. The strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4 is
a) Dual stack
b) Header translation
c) Conversion
d) Tunnelling
Answer
Answer: d [Reason:] Tunnelling is used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4.
5. The correct format of packet in tunnel that uses IPv4 region is
1. IPv6 header
2. Payload
3. IPv4 header
a) 3-1-2
b) 3-2-1
c) 1-2-3
d) 1-3-2
Answer
Answer: a [Reason:] In tunnel with IPv4 region, IPv6 packet will be encapsulated with IPv4 header.
6. ___________ is necessary when the sender wants to use IPv6, but the receiver does not understand IPv6.
a) Dual stack
b) Header translation
c) Conversion
d) Tunnelling
Answer
Answer: b [Reason:] Header translation is used when the sender wants to use IPv6, but the receiver does not understand IPv6.
7. Header translation uses ___________ to translate an IPv6 address to an IPv4 address.
a) IP address
b) Physical address
c) Mapped address
d) Any of the mentioned
Answer
Answer: c [Reason:] Mapped address is used to translate an IPv6 address to an IPv4 address.
8. Which of the following is not the step in Header translation procedure?
a) The IPv6 mapped address is changed to an IPv4 address by extracting the rightmost 32bits
b) The value of the IPv6 priority field is discarded
c) The type of service field in IPv4 is set to zero
d) The IPv6 flow label is considered
Answer
Answer: d [Reason:] In header translation procedure, IPv6 flow label is ignored.
Computer Networks MCQ Set 5
1. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) Both a and b
Answer
Answer: a [Reason:] RIP v1 has network diameter is more than 17 hopes.
2. How often does a RIPv1 router broadcast its routing table by default?
a) Every 30 seconds
b) Every 60 seconds
c) Every 90 seconds
d) RIPv1 does not broadcast periodically
Answer
Answer: a [Reason:] Every 30 seconds RIPv1 router broadcast its routing table by default.
3. Which command displays RIP routing updates?
a) Show IP route
b) Debug IP rip
c) Show protocols
d) Debug IP route
Answer
Answer: b [Reason:] The debug IP rip command is used to show the Internet Protocol (IP) Routing Information Protocol (RIP) updates being sent and received on the router.
4. Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?
a) The updated information will be added to the existing routing table Debug IP rip
b) The update will be ignored and no further action will occur Debug IP route
c) The updated information will replace the existing routing table entry
d) The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence
Answer
Answer: b [Reason:] When a routing update is received by a router, the router first checks the administrative distance (AD) and always chooses the route with the lowest AD. However, if two routes are received and they both have the same AD, then the router will choose the one route with the lowest metrics, or in RIP’s case, hop count.
5. You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?
a) The route is 16 hops away Debug IP rip
b) The route has a delay of 16 microseconds Debug IP route
c) The route is inaccessible
d) The route is queued at 16 messages a second
Answer
Answer: c [Reason:] You cannot have 16 hops on a RIP network by default. If you receive a route advertised with a metric of 16, this means it is inaccessible.
6. Default administrative distance of Static Route
a) 0
b) 90
c) 100
d) 1
Answer
Answer: d [Reason:] 1 is the default administrative distance of Static Route.
7. Which protocol gives a full route table update every 30 seconds?
a) IEGRP
b) RIP
c) both of the mentioned
d) none of the mentioned
Answer
Answer: b [Reason:] RIP gives a full route table update every 30 seconds.
8. Default administrative distance of RIP
a) 0
b) 90
c) 120
d) 130
Answer
Answer: c [Reason:] Default administrative distance of RIP is 120.
9. Which statement is true regarding classless routing protocol?
a) The use of discontinuous networks is not allowed
b) Use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) IGRP supports classes routing within the same autonomous system
Answer
Answer: b [Reason:] Use of variable length subnet masks is permittedis true regarding classless routing protocol.
10. Where we should use default routing
a) On stub networks- which have only one exit path out of the network
b) Which have more than one exit path out of the network
c) Minimum five exit paths out of the network
d) None of the mentioned
Answer
Answer: a [Reason:] On stub networks- which have only one exit path out of the networkuse default routing.