Computer Networks MCQ Set 1
1. An RPC (remote procedure call) is initiated by the
a) server
b) client
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: b [Reason:] None.
2. In RPC, while a server is processing the call, the client is blocked
a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) none of the mentioned
Answer
Answer: a [Reason:] None.
3. Remote procedure calls is
a) inter-process communication
b) a single process
c) a single thread
d) none of the mentioned
Answer
Answer: a [Reason:] None.
4. RPC allows a computer program to cause a subroutine to execute in
a) its own address space
b) another address space
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: b [Reason:] None.
5. RPC works between two processes. These processes must be
a) on the same computer
b) on different computers connected with a network
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: c [Reason:] None.
6. A remote procedure is uniquely identified by
a) program number
b) version number
c) procedure number
d) all of the mentioned
Answer
Answer: d [Reason:] None.
7. An RPC application requires
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned
Answer
Answer: d [Reason:] None.
8. RPC is used to
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: c [Reason:] None.
9. RPC is a
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) none of the mentioned
Answer
Answer: a [Reason:] None.
10. The local operating system on the server machine passes the incoming packets to the
a) server stub
b) client stub
c) client operating system
d) none of the mentioned
Answer
Answer: a [Reason:] None.
Computer Networks MCQ Set 2
1. Real-time transport protocol (RTP) is mostly used in
a) streaming media
b) video teleconference
c) television services
d) all of the mentioned
Answer
Answer: d [Reason:] None.
2. RTP is used to
a) carry the media stream
b) monitor transmission statistics of streams
c) monitor quality of service of streams
d) none of the mentioned
Answer
Answer: a [Reason:] None.
3. RTP provides the facility of jitter ____________
a) media stream
b) expansion
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: a [Reason:] None.
4. Which protocol provides the synchronization between media streams?
a) RTP
b) RTCP
c) RPC
d) None of the mentioned
Answer
Answer: b [Reason:] None.
5. An RTP session is established for
a) each media stream
b) all media streams
c) some predefined number of media streams
d) none of the mentioned
Answer
Answer: a [Reason:] None.
6. RTP can use
a) unprevileleged UDP ports
b) stream control transmission protocol
c) datagram congestion control protocol
d) all of the mentioned
Answer
Answer: d [Reason:] None.
7. Which one of the following multimedia formats can not be supported by RTP?
a) MPEG-4
b) MJPEG
c) MPEG
d) None of the mentioned
Answer
Answer: d [Reason:] None.
8. An RTP header has a minimum size of
a) 12 bytes
b) 16 bytes
c) 24 bytes
d) 32 bytes
Answer
Answer: a [Reason:] None.
9. Which one of the following is not correct?
a) RTCP provides canonical end-point identifiers to all session participants
b) RTCP reports are expected to be sent by all participants
c) Both (a) and (b)
d) None of the mentioned
Answer
Answer: d [Reason:] None.
10. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?
a) SRTP
b) RTCP
c) RCP
d) None of the mentioned
Answer
Answer: a [Reason:] None.
Computer Networks MCQ Set 3
1. IPSec is designed to provide the security at the
a) transport layer
b) network layer
c) application layer
d) session layer
Answer
Answer: b [Reason:] None.
2. In tunnel mode IPsec protects the
a) Entire IP packet
b) IP header
c) IP payload
d) None of the mentioned
Answer
Answer: a [Reason:] None.
3. Network layer firewall works as a
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: b [Reason:] None.
4. Network layer firewall has two sub-categories as
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) none of the mentioned
Answer
Answer: a [Reason:] None.
5. WPA2 is used for security in
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned
Answer
Answer: c [Reason:] None.
6. An attempt to make a computer resource unavailable to its intended users is called
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
Answer
Answer: a [Reason:] None.
7. Extensible authentication protocol is authentication framework frequently used in
a) wired personal area network
b) wireless networks
c) wired local area network
d) none of the mentioned
Answer
Answer: b [Reason:] None.
8. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned
Answer
Answer: b [Reason:] None.
9. PGP encrypts data by using a block cipher called
a) international data encryption algorithm
b) private data encryption algorithm
c) intrenet data encryption algorithm
d) none of the mentioned
Answer
Answer: a [Reason:] None.
10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) None of the mentioned
Answer
Answer: c [Reason:] None.
Computer Networks MCQ Set 4
1. An application-level protocol in which a few manager stations control a set of agents is called
a) HTML
b) TCP
c) SNMP
d) SNMP/IP
Answer
Answer: c [Reason:] An application-level protocol in which a few manager stations control a set of agents is called SNMP.
2. Full duplex mode increases capacity of each domain from
a) 10 to 20 mbps
b) 20 to 30 mbps
c) 30 to 40 mbps
d) 40 to 50 mbps
Answer
Answer: a [Reason:] 10 to 20 mbps capacity increased on each domain in full duplex mode.
3. Configuration management can be divided into two subsystems those are
a) Reconfiguration and documentation
b) Management and configuration
c) Documentation and dialing up
d) Both a and c
Answer
Answer: a [Reason:] Reconfiguration and documentation are two subsystems of configuration management.
4. To use Simple Network Management System (SNMP), we need
a) Servers
b) IP
c) Protocols
d) Rules
Answer
Answer: d [Reason:] To use Simple Network Management System (SNMP), we need rules.
5. Main difference between SNMPv3 and SNMPv2 is the
a) Management
b) Integration
c) Classification
d) Enhanced security
Answer
Answer: d [Reason:] Enhanced security is the main difference between SNMPv3 and SNMPv2.
6. In Network Management System, a term that responsible for controlling access to network based on predefined policy is called
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
Answer
Answer: d [Reason:] A term that responsible for controlling access to network based on predefined policy is called security management.
7. BER stands for
a) Basic Encoding Rules
b) Basic Encoding Resolver
c) Basic Encoding Rotator
d) Basic Encoding Router
Answer
Answer: a [Reason:] Basic encoding rules.
8. Control of users’ access to network resources through charges are main responsibilities of
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
Answer
Answer: c [Reason:] Control of users’ access to network resources through charges are main responsibilities of accounting management.
9. SNMP is a framework for managing devices in an internet using the
a) TCP/IP protocol
b) UDP
c) SMTP
d) None
Answer
Answer: a [Reason:] SNMP is a framework for managing devices in an internet using the TCP/IP protocol.
10. Structure of Management Information (SMI), is guideline of
a) HTTP
b) SNMP
c) URL
d) MIB
Answer
Answer: b [Reason:] SMI is guidelines of SNMP.
Computer Networks MCQ Set 5
1. SONET stands for
a) synchronous optical network
b) synchronous operational network
c) stream optical network
d) shell operational network
Answer
Answer: a [Reason:] None.
2. In SONET, STS-1 level of electrical signalling has the data rate of
a) 51.84 Mbps
b) 155.52 Mbps
c) 466.56 Mbps
d) none of the mentioned
Answer
Answer: a [Reason:] None.
3. The path layer of SONET is responsible for the movement of a signal
a) from its optical source to its optical destination
b) across a physical line
c) across a physical section
d) none of the mentioned
Answer
Answer: b [Reason:] None.
4. The photonic layer of the SONET is similar to the __________ of OSI model.
a) network layer
b) data link layer
c) physical layer
d) none of the mentioned
Answer
Answer: c [Reason:] None.
5. In SONET, each synchronous transfer signal STS-n is composed of
a) 2000 frames
b) 4000 frames
c) 8000 frames
d) 16000 frames
Answer
Answer: c [Reason:] None.
6. Which one of the following is not true about SONET?
a) frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame
b) multiplexing is synchronous TDM
c) all clocks in the network are locked to a master clock
d) none of the mentioned
Answer
Answer: d [Reason:] None.
7. A linear SONET network can be
a) point-to-point
b) multi-point
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: c [Reason:] None.
8. Automatic protection switching in linear network is defined at the
a) line layer
b) section layer
c) photonic layer
d) path layer
Answer
Answer: a [Reason:] None.
9. A unidirectional path switching ring is a network with
a) one ring
b) two rings
c) three rings
d) four rings
Answer
Answer: b [Reason:] One ring is used as the working ring and other as the protection ring.
10. What is SDH?
a) sdh is similar standard to SONET developed by ITU-T
b) synchronous digital hierarchy
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: c [Reason:] None.