COMPUTER NETWORKING
NETWORKING MCQ MOST IMPORTANT
QUESTIONS
- Total Questions: 150
- Duration: 40 minutes
- Type: Objective-type multiple choice
questions (MCQs)
- For all type of competitive
examination
- Questions Level: Engineering/Diploma level in Computer Science
Topics Covered:
|
1. What is a computer network?
a) A device used to display information on a computer screen
b) A collection of interconnected computers and devices that can communicate and share resources
c) A type of software used to create documents and presentations
d) The physical casing that protects a computer’s internal components
2. What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network
3. Which of the following is an example of Bluetooth?
a) wide area network
b) virtual private network
c) local area network
d) personal area network
4. Which of the following computer networks is built on the top of another network?
a) overlay network
b) prime network
c) prior network
d) chief network
5. What is the full form of OSI?
a) optical service implementation
b) open service Internet
c) open system interconnection
d) operating system interface
6. When a collection of various computers appears as a single coherent system to its clients, what is this called?
a) mail system
b) networking system
c) computer network
d) distributed system
7. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6
8. What are nodes in a computer network?
a) the computer that routes the data
b) the computer that terminates the data
c) the computer that originates the data
d) all of the mentioned
9. Which one of the following is not a function of network layer?
a) congestion control
b) error control
c) routing
d) inter-networking
10. The IETF standards documents are called ________
a) RFC
b) RCF
c) ID
d) DFC
11. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________
a) Added
b) Removed
c) Rearranged
d) Modified
12. he structure or format of data is called ___________
a) Syntax
b) Semantics
c) Struct
d) Formatting
13. Communication between a computer and a keyboard involves ______________ transmission.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
14. The first Network was called ________
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
15. A _______ is the physical path over which a message travels.
a) Path
b) Medium
c) Protocol
d) Route
16. Which of this is not a network edge device?
a) PC
b) Smartphones
c) Servers
d) Switch
17. A _________ set of rules that governs data communication.
a) Protocols
b) Standards
c) RFCs
d) Servers
18. Three or more devices share a link in ________ connection.
a) Unipoint
b) Multipoint
c) Point to point
d) Simplex
19. When collection of various computers seems a single coherent system to its client, then it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system
20. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
21. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
22. Bluetooth is an example of __________
a) personal area network
b) local area network
c) virtual private network
d) wide area network
23. A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
a) bridge
b) firewall
c) router
d) hub
24. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
25. Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure
26. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
27. The physical layer is concerned with ___________
a) bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) port to port delivery
28. Which transmission media provides the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
29. Bits can be sent over guided and unguided media as analog signal by ___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
30. The physical layer provides __________
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
31. In asynchronous serial communication the physical layer provides ___________
a) start and stop signalling
b) flow control
c) both start & stop signalling and flow control
d) only start signaling
32. The physical layer is responsible for __________
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
33. The physical layer translates logical communication requests from the ______ into hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
34. Wireless transmission of signals can be done via ___________
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
35. The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
36. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
37. Header of a frame generally contains ______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
38. CRC stands for __________
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
39. Which of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
40. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
41. The network layer is concerned with __________ of data.
a) bits
b) frames
c) packets
d) bytes
42. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) error control
43. A 4 byte IP address consists of __________
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
44. A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree
b) spider structure
c) spider tree
d) special tree
45. The network layer protocol for internet is __________
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol
46. ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing
47. Transport layer aggregates data from different applications into a single stream before passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
48. Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
49. Transmission control protocol ___________
a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
50. Socket-style API for windows is called ____________
a) wsock
b) winsock
c) wins
d) sockwi
51. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol
52. Transport layer protocols deals with ____________
a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication
53. Physical or logical arrangement of network is __________
a) Topology
b) Routing
c) Networking
d) Control
54. Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus
55. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
56. Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
d) PAN
57. Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) PAN
58. WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network
59. In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits
60. _____ is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
61. The three topologies associated with LANs are _________
a) Mesh, Tree and Bus topology
b) Tree, Circular and Ring topology
c) Bus, Ring and Star topology
d) Hybrid, Mesh and Star topology
62. A pseudo topology that combines a Star topology with either Ring or Bus topology is known as ___________
a) Router
b) Hub
c) Ethernet
d) Switches
63. The Tree topology is employed in network using ________
a) Brouters
b) LAN
c) Switches
d) WAN
64. ________ topology is a combination of two or more topologies.
a) Star
b) Hybrid
c) Bus
d) Ring
65. The two types of LAN deployed are __________ and ___________
a) Mesh based, Bus based
b) Hybrid based, Star based
c) Bus based, Ring based
d) Ring based, Tree based
66. Token Ring and FDDI configurations use the _________ topology.
a) ring
b) star
c) mesh
d) bus
67. Which protocol is most frequently used in Star topology?
a) Modem
b) Cable
c) DSL
d) Ethernet
68. WANs are configured using the ______ or the ______ topology.
a) Bus, Tree
b) Mesh, Ring
c) Ring, Hybrid
d) Mesh, Tree
69. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
70. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
71. Which multiplexing technique used to transmit digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
72. Which of this is not a guided media?
a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire
73. UTP is commonly used in __________
a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
74. Coaxial cable consists of _______ concentric copper conductors.
a) 1
b) 2
c) 3
d) 4
75. Terrestrial radio channels are broadly classifed into _____ groups.
a) 2
b) 3
c) 4
d) 1
76. A local telephone network is an example of a _______ network.
a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched
77. Most packet switches use this principle ____________
a) Stop and wait
b) Store and forward
c) Store and wait
d) Stop and forward
78. In _________ systems, resources are allocated on demand.
a) packet switching
b) circuit switching
c) line switching
d) frequency switching
79. Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
80. The packet of information at the application layer is called __________
a) Packet
b) Message
c) Segment
d) Frame
81. Which one of the following is an architecture paradigms?
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Serve
82. Application layer offers _______ service.
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
83. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
84. Pick the odd one out.
a) File transfer
b) File download
c) E-mail
d) Interactive games
85. To deliver a message to the correct application program running on a host, the _______ address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
86. Which is a time-sensitive service?
a) File transfer
b) File download
c) E-mail
d) Internet telephony
87. Electronic mail uses which Application layer protocol?
a) SMTP
b) HTTP
c) FTP
d) SIP
88. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) TCP
89. The ASCII encoding of binary data is called
a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
90. When displaying a web page, the application layer uses the _____________
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
91. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ________
a) 4
b) 1
c) 5
d) 7
92. The default connection type used by HTTP is _________
a) Persistent
b) Non-persistent
c) Can be either persistent or non-persistent depending on connection request
d) None of the mentioned
93. The time taken by a packet to travel from client to server and then back to the client is called __________
a) STT
b) RTT
c) PTT
d) JTT
94. The HTTP request message is sent in _________ part of three-way handshake.
a) First
b) Second
c) Third
d) Fourth
95. The first line of HTTP request message is called _____________
a) Request line
b) Header line
c) Status line
d) Entity line
96. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
97. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) data link layer
98. In the network HTTP resources are located by
a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) union resource locator
99. FTP server listens for connection on port number ____________
a) 20
b) 21
c) 22
d) 23
100. In File Transfer Protocol, data transfer cannot be done in ___________
a) stream mode
b) block mode
c) compressed mode
d) message mod
101. Expansion of FTP is __________
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) Fast Transfer Protocol
102. FTP is built on _____ architecture.
a) Client-server
b) P2P
c) Data centric
d) Service oriented
103. FTP server _____________
a) Maintains state information
b) Is stateless
c) Has single TCP connection for a file transfer
d) Has UDP connection for file transfer
104. The password is sent to the server using ________ command.
a) PASSWD
b) PASS
c) PASSWORD
d) PWORD
105. When the mail server sends mail to other mail servers it becomes ____________
a) SMTP server
b) SMTP client
c) Peer
d) Master
106. Expansion of SMTP is ________
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
107. Typically the TCP port used by SMTP is _________
a) 25
b) 35
c) 50
d) 15
108. The entire hostname has a maximum of ___________
a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
109. A DNS client is called _________
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
110. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned
111. DHCP is used for ________
a) IPv6
b) IPv4
c) Both IPv6 and IPv4
d) None of the mentioned
112. DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
113. When were VPNs introduced into the commercial world?
a) Early 80’s
b) Late 80’s
c) Early 90’s
d) Late 90’s
114. The application-level protocol in which a few manager stations control a set of agents is called ______
a) HTML
b) TCP
c) SNMP
d) SNMP/IP
115. To use a Simple Network Management System, we need _______
a) Servers
b) IP
c) Protocols
d) Rules
116. The application layer protocol used by a Telnet application is ________
a) Telnet
b) FTP
c) HTTP
d) SMTP
117. _______ allows you to connect and login to a remote computer
a) Telnet
b) FTP
c) HTTP
d) SMTP
118. Telnet is used for _______
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site
119. Telnet protocol is used to establish a connection to __________
a) TCP port number 21
b) TCP port number 22
c) TCP port number 23
d) TCP port number 25
120. Which of the following is false with respect to TCP?
a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) Unreliable
121. TCP process may not write and read data at the same speed. So we need __________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
122. TCP groups a number of bytes together into a packet called _______
a) Packet
b) Buffer
c) Segment
d) Stack
123. Communication offered by TCP is ________
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
124. Size of TCP segment header ranges between ___________
a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits
125. Which of the following is false with respect to UDP?
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
126. What is the main advantage of UDP?
a) More overload
b) Reliable
c) Low overhead
d) Fast
127. What is the header size of a UDP packet?
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
128. A piece of icon or image on a web page associated with another webpage is called ______
a) url
b) hyperlink
c) plugin
d) extension
129. What is a web browser?
a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned
130. In classless addressing, there are no classes but addresses are still granted in ______
a) IPs
b) Blocks
c) Codes
d) Sizes
131. In IPv4 Addresses, classful addressing is replaced with ________
a) Classless Addressing
b) Classful Addressing
c) Classful Advertising
d) Classless Advertising
132. In classful addressing, a large part of available addresses are ________
a) Organized
b) Blocked
c) Wasted
d) Communicated
133. Network addresses are a very important concept of ________
a) Routing
b) Mask
c) IP Addressing
d) Classless Addressing
134. Which of this is not a class of IP address?
a) Class E
b) Class C
c) Class D
d) Class F
135. The size of an IP address in IPv6 is _________
a) 4 bytes
b) 128 bits
c) 8 bytes
d) 100 bits
136. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
137. Which mail access protocol is used for sending emails across the internet?
a) POP3
b) SMTP
c) IMAP
d) MAPI
138. The default port number of SMTP is _________
a) 25
b) 110
c) 2525
d) 143
139. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) data link layer
140. In the network HTTP resources are located by __________
a) Uniform resource identifier
b) Unique resource locator
c) Unique resource identifier
d) Union resource locator
141. FTP server listens for connection on which port number?
a) 20
b) 21
c) 22
d) 23
142. In File Transfer Protocol, data transfer cannot be done in __________
a) stream mode
b) block mode
c) compressed mode
d) message mode
143. Network layer firewall works as a __________
a) Frame filter
b) Packet filter
c) Content filter
d) Virus filter
144. A proxy firewall filters at _________
a) Physical layer
b) Data link layer
c) Network layer
d) Application layer
145. A packet filter firewall filters at __________
a) Physical layer
b) Data link layer
c) Network layer or Transport layer
d) Application layer
146. A stateful firewall maintains a ___________ which is a list of active connections.
a) Routing table
b) Bridging table
c) State table
d) Connection table
147. Which of the following is not a name for MAC(Media Access Control) in data link layer?
a) Burned-in-address
b) Hardware address
c) Physical address
d) Logical address
148. What is the size of MAC address in medium access control sub layer?
a) 48 bytes
b) 48 bits
c) 32 bits
d) 32 bytes
149. Ethernet frame consists of ____________
a) MAC address
b) IP address
c) Default mask
d) Network address
150. To use a Simple Network Management System, we need _______
a) Servers
b) IP
c) Protocols
d) Rules
THANK YOU FOR WATCHING THIS
VIDEO
WRITE DOWN NEXT TOPICS IN
COMMENT BOX
LIKE, SHARE AND SUBSCRIBE
TO US @LEARNINEASYWAY
SEE YOU IN NEXT VIDEO!
Comments
Post a Comment