Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Computer Networks MCQ Set 1

1. Which statement is true regarding classless routing protocols?
a) The use of discontinuous networks is not allowed
b) The use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) RIPv2 supports classless routing

View Answer

Answer: b [Reason:] Classful routing means that all hosts in the internetwork use the same mask. Classless routing means that you can use Variable Length Subnet Masks (VLSMs) and can also support discontinuous networking.

2. What is route poisoning?
a) It sends back the protocol received from a router as a poison pill, which stops the regular updates. The use of variable length subnet masks is permitted
b) It is information received from a router that can’t be sent back to the originating router.RIPv2 supports classless routing
c) It prevents regular update messages from reinstating a route that has just come up
d) It describes when a router sets the metric for a downed link to infinity

View Answer

Answer: d [Reason:] When a network goes down, the distance-vector routing protocol initiates route poisoning by advertising the network with a metric of 16, or unreachable.

3. Which of the following is true regarding RIPv2?
a) It has a lower administrative distance than RIPv1
b) It converges faster than RIPv1
c) It has the same timers as RIPv1
d) It is harder to configure than RIPv1

View Answer

Answer: c [Reason:] RIPv2 is pretty much just like RIPv1. It has the same administrative distance and timers and is configured just like RIPv1.

4. Which of the situations might not require require multiple routing protocols in a network?
a) When a new Layer 2-only switch is added to the network
b) When you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) When there are host-based routers from multiple vendors

View Answer

Answer: a [Reason:] One routing protocol to another, routers from multiple vendors,host-based routers from multiple vendors.

5. Which two routing protocols can be redistributed into OSPF by a Cisco router?
a) IP EIGRP and AppleTalk EIGRP
b) AppleTalk EIGRP and RIPv2
c) RIPv2 and IP EIGRP
d) IPX RIP & AppleTalk EIGRP

View Answer

Answer: c [Reason:] IP EIGRP, RIPv2. These can be redistributed into OSPF by a Cisco router.

6. Which is a reason for avoiding doing route redistribution on two routers between the same two routing domains?
a) Higher cost of two routers
b) Routing feedback
c) Cisco IOS incompatibility
d) Not possible to use two routers

View Answer

Answer: b [Reason:] Routing feedback is a reason for avoiding doing route redistribution on two routers between the same two routing domains.

7. What does administrative distance rank?
a) Metrics
b) Sources of routing information
c) Router reliability
d) Best paths

View Answer

Answer: b [Reason:] Sources of routing information is the administrative distance rank.

8. Which protocol maintains neighbor adjacencies?
a) RIPv2 and EIGRP
b) IGRP and EIGRP
c) RIPv2
d) EIGRP

View Answer

Answer: c [Reason:] RIP V2 maintains neighbor adjacencies.

9. Which routing protocol implements the diffusing update algorithm?
a) IS-IS
b) IGRP
c) EIGRP
d) OSPF

View Answer

Answer: c [Reason:] EIGRProuting protocol implements the diffusing update algorithm.

10. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) All of the above

View Answer

Answer: b [Reason:] RIPv2protocol should you select if the network diameter is more than 17 hops.

Computer Networks MCQ Set 2

1. When collection of various computers seems a single coherent system to its client, then it is called
a) computer network
b) distributed system
c) networking system
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

2. Two devices are in network if
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

3. Which one of the following computer network is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network

View Answer

Answer: d [Reason:] None.

4. In computer network nodes are
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

View Answer

Answer: d [Reason:] None.

5. Communication channel is shared by all the machines on the network in
a) broadcast network
b) unicast network
c) multicast network
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

6. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

7. A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
a) bridge
b) firewall
c) router
d) all of the mentioned

View Answer

Answer: c [Reason:] None.

8. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suit
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

9. Network congestion occurs
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

10. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network

View Answer

Answer: b [Reason:] None.

Computer Networks MCQ Set 3

1. The ____________ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat

View Answer

Answer: a [Reason:] None.

2. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) None of the mentioned

View Answer

Answer: c [Reason:] None.

3. Application layer protocol defines
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned

View Answer

Answer: d [Reason:] None.

4. Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol

View Answer

Answer: a [Reason:] None.

5. The ASCII encoding of binary data is called
a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding

View Answer

Answer: a [Reason:] None.

6. Which one of the following is an internet standard protocol for managing devices on IP network?
a) dynamic host configuration protocol
b) simple newtwork management protocol
c) internet message access protocol
d) media gateway protocol

View Answer

Answer: b [Reason:] None.

7. Which one of the following is not an application layer protocol?
a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol

View Answer

Answer: c [Reason:] None.

8. Which protocol is a signalling communication protocol used for controlling multimedia communication sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

9. Which one of the following is not correct?
a) application layer protocols are used by both source and destination devices during a communication session
b) HTTP is a session layer protocol
c) TCP is an application layer protocol
d) All of the mentioned

View Answer

Answer: d [Reason:] None.

10. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) None of the mentioned

View Answer

Answer: a [Reason:] None.

Computer Networks MCQ Set 4

1. ATM and frame relay are
a) virtual circuit networks
b) datagram networks
c) virtual private networks
d) none of the mentioned

View Answer

Answer: a [Reason:] ATM stands for asynchronous transfer mode.

2. ATM uses the
a) asynchronous frequency division multiplexing
b) asynchronous time division multiplexing
c) asynchronous space division multiplexing
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

3. ATM standard defines _______ layers.
a) 2
b) 3
c) 4
d) 5

View Answer

Answer: b [Reason:] Three layers are physical layer, ATM layer and application adoption layer.

4. ATM can be used for
a) local area network
b) wide area network
c) any of local or wide area network
d) none of the mentioned

View Answer

Answer: c [Reason:] None.

5. An ATM cell has the payload field of
a) 32 bytes
b) 48 bytes
c) 64 bytes
d) 128 bytes

View Answer

Answer: b [Reason:] None.

6. Frame relay has error detection at the
a) physical layer
b) data link layer
c) network layer
d) transport layer

View Answer

Answer: b [Reason:] None.

7. Virtual circuit identifier in frame relay is called
a) data link connection identifier
b) frame relay identifier
c) cell relay identifier
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

8. Frame relay has
a) only physical layer
b) only data link layer
c) only network layer
d) both physical and data link layer

View Answer

Answer: d [Reason:] None.

9. In frame relay networks, extended address is used
a) to increase the range of data link connection identifiers
b) for error detection
c) for encryption
d) for error recovery

View Answer

Answer: a [Reason:] None.

10. What is FRAD in frame relay network?
a) FRAD assembles and disassembles the frames coming from other protocols
b) FRAD is used for modulation and demodulation
c) FRAD is used for error detection
d) None of the mentioned

View Answer

Answer: a [Reason:] FRAD stands for frame relay assembler/disassembler.

Computer Networks MCQ Set 5

1. The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer

View Answer

Answer: a [Reason:] None.

2. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding

View Answer

Answer: d [Reason:] None.

3. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

4. Header of a frame generally contains
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned

View Answer

Answer: d [Reason:] None.

5. Automatic repeat request error management mechanism is provided by
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned

View Answer

Answer: a [Reason:] None.

6. When 2 or more bits in a data unit has been changed during the transmission, the error is called
a) random error
b) burst error
c) inverted error
d) none of the mentioned

View Answer

Answer: b [Reason:] None.

7. CRC stands for
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check

View Answer

Answer: a [Reason:] None.

8. Which one of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned

View Answer

Answer: d [Reason:] None.

9. Which one of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) None of the mentioned

View Answer

Answer: c [Reason:] None.

10. The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned

View Answer

Answer: a [Reason:] None.