Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Computer Networks MCQ Set 1

1. Which of the following is true with respect to TCP
a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) All of the mentioned

View Answer

Answer: d [Reason:] TCP is a transport layer protocol, process-to-process, and creates a virtual connection between two TCP’s.

2. In TCP, sending and receiving data is done as
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets

View Answer

Answer: a [Reason:] In TCP, data is sent and received in terms of Stream of bytes.

3. TCP process may not write and read data at the same speed. So we need __________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks

View Answer

Answer: b [Reason:] TCP needs buffers for storage to overcome this problem.

4. TCP groups a number of bytes together into a packet called
a) Packet
b) Buffer
c) Segment
d) Stack

View Answer

Answer: c [Reason:] Segment is a grouping of number of bytes together into a packet.

5. Communication offered by TCP is
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte

View Answer

Answer: a [Reason:] Data flow in both the directions at the same time during TCP communication hence, Full-duplex.

6. To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment

View Answer

Answer: d [Reason:] Acknowledgment mechanism is used to check the safe and sound arrival of data.

7. In segment header, sequence number and acknowledgement number field refers to
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment

View Answer

Answer: a [Reason:] Sequence number and acknowledgement number field refers to byte number.

8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment.
a) 10000
b) 10001
c) 12001
d) 11001

View Answer

Answer: b [Reason:] The sequence number of each segment is the number of first byte carried in that segment.

9. Bytes of data being transferred in each connection are numbered by TCP. These numbers starts with a
a) Random number
b) Zero
c) One
d) Sequence of zero’s and one’s

View Answer

Answer: d [Reason:] These numbers starts with a random number.

10. The value of acknowledgement field in a segment defines
a) Number of previous bytes to receive
b) Total number of bytes to receive
c) Number of next bytes to receive
d) Sequence of zero’s and one’s

View Answer

Answer: c [Reason:] Acknowledgement field in a segment defines the number of next bytes to receive.

Computer Networks MCQ Set 2

1. Dual-stack approach refers to
a) Implementing Ipv4 with 2 stacks
b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
d) None of the mentioned

View Answer

Answer: c [Reason:] Dual-stack is one of the approach used to support IPv6 in already existing systems.

2. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is
a) Use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system

View Answer

Answer: b [Reason:] The IPv4 routers can form a tunnel.

3. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79

View Answer

Answer: a [Reason:] Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address.

4. A link local address of local addresses is used in an
a) Isolated router
b) Isolated mask
c) Isolated subnet
d) Isolated net

View Answer

Answer: c [Reason:] Isolated subnet is very huge sharing network area in this link local address of local addresses is used.

5. In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called
a) Unspecified address
b) Loopback address
c) Compatible address
d) Mapped address

View Answer

Answer: b [Reason:] In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called loop back address.

6. A few leftmost bits in each address of IPv6 address define its category is called
a) Prefix type
b) Postfix type
c) Reserved type
d) Local type

View Answer

Answer: a [Reason:] Prefix means bits in the IP address are placed in leftmost position.

7. In IPv6 addresses, addresses start with eight 0s are called
a) Unicast addresses
b) Multicast addresses
c) Any cast addresses
d) Reserved addresses

View Answer

Answer: d [Reason:] In IPv6 address format the starting bits are specified with eight 0s called reserved address.

8. Which statement(s) about IPv6 addresses are true?
a) Leading zeros are required
b) Two colons (::) are used to represent successive hexadecimal fields of zeros
c) Two colons (::) are used to separate fields
d) A single interface will have multiple IPv6 addresses of different types

View Answer

Answer: b, d [Reason:] In order to shorten the written length of an IPv6 address, successive fields of zeros may be replaced by double colons. In trying to shorten the address further, leading zeros may also be removed. Just as with IPv4, a single device’s interface can have more than one address; with IPv6 there are more types of addresses and the same rule applies. There can be link-local, global unicast, and multicast addresses all assigned to the same interface.

9. When IPV6 launched
a) June 2, 2012
b) June 4, 2012
c) June 5, 2012
d) June 6, 2012

View Answer

Answer: d [Reason:] None

Computer Networks MCQ Set 3

1. Which of the following is false with respect to UDP
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) All of the mentioned

View Answer

Answer: a [Reason:] UDP is an unreliable, connectionless transport layer protocol.

2. Return value of the UDP port “Chargen” is
a) String of characters
b) String of integers
c) Array of characters with integers
d) Array of zero’s and one’s

View Answer

Answer: a [Reason:] Chargen with port number 19 returns string of characters.

3. Beyond IP, TCP provides additional services such as
a) Routing and switching
b) Sending and receiving of packets
c) Multiplexing and demultiplexing
d) Demultiplexing and error checking

View Answer

Answer: d [Reason:] UDP is a simple protocol which provides demultiplexing and error checking.

4. The main advantage of UDP is
a) More overload
b) Reliable
c) Less overload
d) Fast

View Answer

Answer: c [Reason:] UDP is an unreliable, connectionless transport layer protocol and uses minimum overload.

5. Port number used by Network Time Protocol(NTP) with UDP is
a) 161
b) 123
c) 162
d) 124

View Answer

Answer: b [Reason:] Port number used by Network Time Protocol with UDP is 123.

6. what is the header size of UDP packet?
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes

View Answer

Answer: a [Reason:] The fixed size of the UDP packet header is 8 bytes.

7. The port number is “ephemeral port number”, if the source host is ……
a) NTP
b) Echo
c) Server
d) Client

View Answer

Answer: d [Reason:] If the source host is the client, the port number in most cases will be ephemeral port number.

8. “Total length” field in UDP packet header is the length of
a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data

View Answer

Answer: d [Reason:] Total length is the 16 bit field which contains the length of UDP header and the data.

9. Correct expression for UDP user datagram length is
a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
d) UDP length = UDP length + UDP header’s length

View Answer

Answer: a [Reason:] A user datagram is encapsulated in an IP datagram. There is a field in the IP datagram the defines the total length. There is another field in the IP datagram that defines the length of the header. So if we subtract the length of a UDP datagram that is encapsulated in an IP datagram, we get the length of UDP user datagram.

10. The field used to detect errors over the entire user datagram is
a) UDP header
b) Checksum
c) Source port
d) Destination port

View Answer

Answer: b [Reason:] Checksum field is used to detect errors over the entire user datagram.

Computer Networks MCQ Set 4

1. Which of the following is not a characteristic of Virtual Circuit Network?
a) There are setup and teardown phases in addition to the data transfer phase
b) Resources can be allocated during setup phase or on demand
c) All packets follow the same path established during the connection
d) Virtual circuit network is implemented in application layer

View Answer

Answer: d [Reason:] Virtual circuit network is normally implemented in datalink layer.

2. The address that is unique in the scope of the network or internationally if the network is part of an international network is called as
a) Global address
b) Network address
c) Physical address
d) IP address

View Answer

Answer: a [Reason:] This address is used to create a virtual circuit identifier.

3. The Identifier that is used for data transfer in virtual circuit network is
a) Global address
b) Virtual circuit identifier
c) Network identifier
d) IP identifier

View Answer

Answer: b [Reason:] Virtual circuit identifier is used for data transfer and has switch scope.

4. Which of the following is not a phase of virtual circuit network?
a) Setup phase
b) Datatransfer phase
c) Termination phase
d) Teardown phase

View Answer

Answer: c [Reason:] Virtual circuit network does not contain termination phase.

5. Steps required in setup process are
a) Setup request and acknowledgement
b) Setup request and setup response
c) Setup request and setup termination
d) Setup and termination steps

View Answer

Answer: a [Reason:] Steps required in setup process are Setup request and acknowledgement.

6. During teardown phase, source after sending all the frames to destination sends……..to notify termination
a) Teardown response
b) Teardown request
c) Termination request
d) Termination response

View Answer

Answer: b [Reason:] Source after sending all the frames to destination sends teardown request to which, destination sends teardown response.

7. Delay if, resource allocated during setup phase during data transfer is
a) Constant
b) Increases for each packet
c) Same for each packet
d) Different for each packet

View Answer

Answer: c [Reason:] If resource allocated during setup phase, delay is same for each packet.

8. Delay if, resource allocated on demand during data transfer is
a) Constant
b) Increases for each packet
c) Same for each packet
d) Different for each packet

View Answer

Answer: d [Reason:] If resource allocated on demand, delay is different for each packet.

9. In virtual circuit network, delay times for setup and teardown respectively are
a) 1 and 1
b) 1 and 2
c) 2 and 1
d) 2 and 2

View Answer

Answer: a [Reason:] Delay time for setup and teardown is one each.

10. In data transfer phase, the table contains how many columns?
a) 1
b) 2
c) 3
d) 4

View Answer

Answer: d [Reason:] Table has 4 columns. Port and VCI for both incoming and outgoing data.

Computer Networks MCQ Set 5

1. What REST stands for?
a) Represent State Transfer
b) Representational State Transfer
c) Represent State Transfer
d) None of the mentioned

View Answer

Answer: b [Reason:] REST stands for Representational State Transfer.

2. Which of the following protocol is used by Restful web services as a medium of communication between client and server?
a) HTTP
b) FTP
c) Gopher
d) None of the mentioned

View Answer

Answer: a [Reason:] Restful web services make use of HTTP protocol as a medium of communication between client and server.

3. Which of the following is a best practice to create a standard URI for a web service?
a) Maintain Backward Compatibility
b) Use HTTP Verb
c) Both of the mentioned
d) None of the mentioned

View Answer

Answer: C [Reason:] Both of the above options are correct.

4. Which of the following HTTP method should be idempotent in nature?
a) OPTIONS
b) DELETE
c) POST
d) HEAD

View Answer

Answer: b [Reason:] DELETE operations should be idempotent, means their result will always same no matter how many times these operations are invoked.

5. Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?
a) Public
b) Private
c) Nocache/nostore
d) Maxage

View Answer

Answer: b [Reason:] Private directive indicates that resource is cachable by only client and server, no intermediary can cache the resource.

6. Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?
a) 200
b) 201
c) 204
d) 304

View Answer

Answer: b [Reason:] HTTP Status Code 201 means CREATED, when a resource is successful created using POST or PUT request.

7. Which of the following annotation of JAX RS API is used to annotate a method used to create resource?
a) @Path
b) @GET
c) @PUT
d) @POST

View Answer

Answer: C [Reason:] @PUT – HTTP Get request, used to create resource.

8. Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?
a) @PathParam
b) @QueryParam
c) @MatrixParam
d) @HeaderParam

View Answer

Answer: c [Reason:] @MatrixParam – Binds the parameter passed to method to a HTTP matrix parameter in path.

9. In REST architecture, a REST Server simply provides access to resources and REST client accesses and presents the resources.
a) False
b) True

View Answer

Answer: b [Reason:] In REST architecture, a REST Server simply provides access to resources and REST client accesses and presents the resources.

10. POST operations should be idempotent.
a) True
b) False

View Answer

Answer: b [Reason:] POST operation can cause different result.