Skip to main content

COMPUTER NETWORKING NETWORKING MCQ MOST IMPORTANT QUESTIONS

                                                             @leearnineasyway

                         COMPUTER NETWORKING

    NETWORKING MCQ MOST IMPORTANT

QUESTIONS



 Overview of the Questions Pattern

  • Total Questions: 150
  • Duration: 40 minutes
  • Type: Objective-type multiple choice questions (MCQs)
  • For all type of competitive examination
  • Questions Level: Engineering/Diploma level in Computer Science

Topics Covered:

  • ·        Introduction
  • ·        OSI model
  • ·        Security
  • ·        OSI Layers
  • ·        TCP/IP protocol
  • ·        Networking
  • ·        Wired and wireless media
  • ·        Switching
  • ·        Protocols
  • ·        WWW & IP
  • ·        Routing
  • ·        Electronic mail & file transfer
  • ·        POP protocol & error detection
  • ·        SNMP
  • ·        Frame relay
  • ·        Network and technology

 




1. What is a computer network?

a) A device used to display information on a computer screen

b) A collection of interconnected computers and devices that can communicate and share resources

c) A type of software used to create documents and presentations

d) The physical casing that protects a computer’s internal components


 


 


 


2.          What is internet?

a) A network of interconnected local area networks

b) A collection of unrelated computers

c) Interconnection of wide area networks

d) A single network


 


 


 


3.          Which of the following is an example of Bluetooth?

a) wide area network

b) virtual private network

c) local area network

d) personal area network


 


 


 


4.          Which of the following computer networks is built on the top of another network?

a) overlay network

b) prime network

c) prior network

d) chief network


 


 


 


5.          What is the full form of OSI?

a) optical service implementation

b) open service Internet

c) open system interconnection

d) operating system interface


 


 


 


 


 


 


 


6.          When a collection of various computers appears as a single coherent system to its clients, what is this called?

a) mail system

b) networking system

c) computer network

d) distributed system


 


 


 


7.          How many layers are there in the ISO OSI reference model?

a) 7

b) 5

c) 4

d) 6


 


 


 


8.          What are nodes in a computer network?

a) the computer that routes the data

b) the computer that terminates the data

c) the computer that originates the data

d) all of the mentioned


 


 


 


9.          Which one of the following is not a function of network layer?

a) congestion control

b) error control

c) routing

d) inter-networking


 


10.       The IETF standards documents are called ________

a) RFC

b) RCF

c) ID

d) DFC


 


 


 


 


11.       In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________

a) Added

b) Removed

c) Rearranged

d) Modified


 


 


12.       he structure or format of data is called ___________

a) Syntax

b) Semantics

c) Struct

d) Formatting


 


 


13.       Communication between a computer and a keyboard involves ______________ transmission.

a) Automatic

b) Half-duplex

c) Full-duplex

d) Simplex


 


 


14.       The first Network was called ________

a) CNNET

b) NSFNET

c) ASAPNET

d) ARPANET


 


 


15.       A _______ is the physical path over which a message travels.

a) Path

b) Medium

c) Protocol

d) Route


 


 


 


16.       Which of this is not a network edge device?

a) PC

b) Smartphones

c) Servers

d) Switch


 


 


17.       A _________ set of rules that governs data communication.

a) Protocols

b) Standards

c) RFCs

d) Servers


 


 


 


18.       Three or more devices share a link in ________ connection.

a) Unipoint

b) Multipoint

c) Point to point

d) Simplex


 


 


19.       When collection of various computers seems a single coherent system to its client, then it is called _________

a) computer network

b) distributed system

c) networking system

d) mail system


 


 


 


20.       Which of the following computer networks is built on the top of another network?

a) prior network

b) chief network

c) prime network

d) overlay network


 


 


 


21.       In computer network nodes are _________

a) the computer that originates the data

b) the computer that routes the data

c) the computer that terminates the data

d) all of the mentioned


 


 


 


 


 


22.       Bluetooth is an example of __________

a) personal area network

b) local area network

c) virtual private network

d) wide area network


 


 


23.       A __________ is a device that forwards packets between networks by processing the routing information included in the packet.

a) bridge

b) firewall

c) router

d) hub


 


 


 


 


24.       A list of protocols used by a system, one protocol per layer, is called ________

a) protocol architecture

b) protocol stack

c) protocol suite

d) protocol system


 


 


25.       Network congestion occurs _________

a) in case of traffic overloading

b) when a system terminates

c) when connection between two nodes terminates

d) in case of transfer failure


 


 


 


26.       Which of the following networks extends a private network across public networks?

a) local area network

b) virtual private network

c) enterprise private network

d) storage area network


 


 


 


 


 


27.       The physical layer is concerned with ___________

a) bit-by-bit delivery

b) process to process delivery

c) application to application delivery

d) port to port delivery


 


 


 


28.       Which transmission media provides the highest transmission speed in a network?

a) coaxial cable

b) twisted pair cable

c) optical fiber

d) electrical cable


 


 


 


29.       Bits can be sent over guided and unguided media as analog signal by ___________

a) digital modulation

b) amplitude modulation

c) frequency modulation

d) phase modulation


 


 


 


30.       The physical layer provides __________

a) mechanical specifications of electrical connectors and cables

b) electrical specification of transmission line signal level

c) specification for IR over optical fiber

d) all of the mentioned


 


31.       In asynchronous serial communication the physical layer provides ___________

a) start and stop signalling

b) flow control

c) both start & stop signalling and flow control

d) only start signaling


 


 


32.       The physical layer is responsible for __________

a) line coding

b) channel coding

c) modulation

d) all of the mentioned


 


33.       The physical layer translates logical communication requests from the ______ into hardware specific operations.

a) data link layer

b) network layer

c) trasnport layer

d) application layer


 


 


 


34.       Wireless transmission of signals can be done via ___________

a) radio waves

b) microwaves

c) infrared

d) all of the mentioned


 


35.       The data link layer takes the packets from _________ and encapsulates them into frames for transmission.

a) network layer

b) physical layer

c) transport layer

d) application layer


 


36.       Which of the following tasks is not done by data link layer?

a) framing

b) error control

c) flow control

d) channel coding


 


 


 


 


 


37.       Header of a frame generally contains ______________

a) synchronization bytes

b) addresses

c) frame identifier

d) all of the mentioned


 


 


38.       CRC stands for __________

a) cyclic redundancy check

b) code repeat check

c) code redundancy check

d) cyclic repeat check


 


 


39.       Which of the following is a data link protocol?

a) ethernet

b) point to point protocol

c) hdlc

d) all of the mentioned


 


 


40.       Which of the following is the multiple access protocol for channel access control?

a) CSMA/CD

b) CSMA/CA

c) Both CSMA/CD & CSMA/CA

d) HDLC


 


 


41.       The network layer is concerned with __________ of data.

a) bits

b) frames

c) packets

d) bytes


 


42.       Which one of the following is not a function of network layer?

a) routing

b) inter-networking

c) congestion control

d) error control


43.       A 4 byte IP address consists of __________

a) only network address

b) only host address

c) network address & host address

d) network address & MAC address


 


 


44.       A subset of a network that includes all the routers but contains no loops is called ________

a) spanning tree

b) spider structure

c) spider tree

d) special tree


 


45.       The network layer protocol for internet is __________

a) ethernet

b) internet protocol

c) hypertext transfer protocol

d) file transfer protocol


 


 


 


46.       ICMP is primarily used for __________

a) error and diagnostic functions

b) addressing

c) forwarding

d) routing


 


47.       Transport layer aggregates data from different applications into a single stream before passing it to ____________

a) network layer

b) data link layer

c) application layer

d) physical layer


 


 


 


48.       Which of the following are transport layer protocols used in networking?

a) TCP and FTP

b) UDP and HTTP

c) TCP and UDP

d) HTTP and FTP


 


49.       Transmission control protocol ___________

a) is a connection-oriented protocol

b) uses a three way handshake to establish a connection

c) receives data from application as a single stream

d) all of the mentioned


 


 


50.       Socket-style API for windows is called ____________

a) wsock

b) winsock

c) wins

d) sockwi


 


 


51.       A _____ is a TCP name for a transport service access point.

a) port

b) pipe

c) node

d) protocol


 


 


52.       Transport layer protocols deals with ____________

a) application to application communication

b) process to process communication

c) node to node communication

d) man to man communication


 


 


53.       Physical or logical arrangement of network is __________

a) Topology

b) Routing

c) Networking

d) Control


 


 


 


54.       Which network topology requires a central controller or hub?

a) Star

b) Mesh

c) Ring

d) Bus


 


55.       _______ topology requires a multipoint connection.

a) Star

b) Mesh

c) Ring

d) Bus


 


 


56.       Data communication system spanning states, countries, or the whole world is ________

a) LAN

b) WAN

c) MAN

d) PAN


 


57.       Data communication system within a building or campus is________

a) LAN

b) WAN

c) MAN

d) PAN


 


 


 


58.       WAN stands for __________

a) World area network

b) Wide area network

c) Web area network

d) Web access network


 


 


59.       In TDM, slots are further divided into __________

a) Seconds

b) Frames

c) Packets

d) Bits


 


 


60.       _____ is the multiplexing technique that shifts each signal to a different carrier frequency.

a) FDM

b) TDM

c) Both FDM & TDM

d) PDM


 


 


61.       The three topologies associated with LANs are _________

a) Mesh, Tree and Bus topology

b) Tree, Circular and Ring topology

c) Bus, Ring and Star topology

d) Hybrid, Mesh and Star topology


 


 


62.       A pseudo topology that combines a Star topology with either Ring or Bus topology is known as ___________

a) Router

b) Hub

c) Ethernet

d) Switches


 


63.       The Tree topology is employed in network using ________

a) Brouters

b) LAN

c) Switches

d) WAN


 


64.       ________ topology is a combination of two or more topologies.

a) Star

b) Hybrid

c) Bus

d) Ring


 


 


65.       The two types of LAN deployed are __________ and ___________

a) Mesh based, Bus based

b) Hybrid based, Star based

c) Bus based, Ring based

d) Ring based, Tree based


 


66.       Token Ring and FDDI configurations use the _________ topology.

a) ring

b) star

c) mesh

d) bus


 


67.       Which protocol is most frequently used in Star topology?

a) Modem

b) Cable

c) DSL

d) Ethernet


 


 


68.       WANs are configured using the ______ or the ______ topology.

a) Bus, Tree

b) Mesh, Ring

c) Ring, Hybrid

d) Mesh, Tree


69.       The sharing of a medium and its link by two or more devices is called _________

a) Fully duplexing

b) Multiplexing

c) Micropleixng

d) Duplexing


 


 


70.       Multiplexing is used in _______

a) Packet switching

b) Circuit switching

c) Data switching

d) Packet & Circuit switching


 


71.       Which multiplexing technique used to transmit digital signals?

a) FDM

b) TDM

c) WDM

d) FDM & WDM


 


72.       Which of this is not a guided media?

a) Fiber optical cable

b) Coaxial cable

c) Wireless LAN

d) Copper wire


 


 


73.       UTP is commonly used in __________

a) DSL

b) FTTP

c) HTTP

d) None of the mentioned


 


 


74.       Coaxial cable consists of _______ concentric copper conductors.

a) 1

b) 2

c) 3

d) 4


 


75.       Terrestrial radio channels are broadly classifed into _____ groups.

a) 2

b) 3

c) 4

d) 1


 


 


76.       A local telephone network is an example of a _______ network.

a) Packet switched

b) Circuit switched

c) Bit switched

d) Line switched


 


 


77.       Most packet switches use this principle ____________

a) Stop and wait

b) Store and forward

c) Store and wait

d) Stop and forward


 


 


78.       In _________ systems, resources are allocated on demand.

a) packet switching

b) circuit switching

c) line switching

d) frequency switching


 


 


79.       Which is not a application layer protocol?

a) HTTP

b) SMTP

c) FTP

d) TCP


 


80.       The packet of information at the application layer is called __________

a) Packet

b) Message

c) Segment

d) Frame


 


 


81.       Which one of the following is an architecture paradigms?

a) Peer to peer

b) Client-server

c) HTTP

d) Both Peer-to-Peer & Client-Serve


 


82.       Application layer offers _______ service.

a) End to end

b) Process to process

c) Both End to end and Process to process

d) None of the mentioned


 


 


83.       E-mail is _________

a) Loss-tolerant application

b) Bandwidth-sensitive application

c) Elastic application

d) None of the mentioned


 


 


84.       Pick the odd one out.

a) File transfer

b) File download

c) E-mail

d) Interactive games


 


85.       To deliver a message to the correct application program running on a host, the _______ address must be consulted.

a) IP

b) MAC

c) Port

d) None of the mentioned


 


 


86.       Which is a time-sensitive service?

a) File transfer

b) File download

c) E-mail

d) Internet telephony


 


87.       Electronic mail uses which Application layer protocol?

a) SMTP

b) HTTP

c) FTP

d) SIP


 


88.       Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?

a) HTTP

b) FTP

c) Telnet

d) TCP


 


 


89.       The ASCII encoding of binary data is called

a) base 64 encoding

b) base 32 encoding

c) base 16 encoding

d) base 8 encoding


 


90.       When displaying a web page, the application layer uses the _____________

a) HTTP protocol

b) FTP protocol

c) SMTP protocol

d) TCP protocol


 


91.       The number of objects in a Web page which consists of 4 jpeg images and HTML text is ________

a) 4

b) 1

c) 5

d) 7


 


 


92.       The default connection type used by HTTP is _________

a) Persistent

b) Non-persistent

c) Can be either persistent or non-persistent depending on connection request

d) None of the mentioned


 


93.       The time taken by a packet to travel from client to server and then back to the client is called __________

a) STT

b) RTT

c) PTT

d) JTT


 


 


94.       The HTTP request message is sent in _________ part of three-way handshake.

a) First

b) Second

c) Third

d) Fourth


 


95.       The first line of HTTP request message is called _____________

a) Request line

b) Header line

c) Status line

d) Entity line


 


 


 


96.       The values GET, POST, HEAD etc are specified in ____________ of HTTP message

a) Request line

b) Header line

c) Status line

d) Entity body


 


97.       HTTP is ________ protocol.

a) application layer

b) transport layer

c) network layer

d) data link layer


 


98.       In the network HTTP resources are located by

a) uniform resource identifier

b) unique resource locator

c) unique resource identifier

d) union resource locator


 


 


99.       FTP server listens for connection on port number ____________

a) 20

b) 21

c) 22

d) 23


 


100.    In File Transfer Protocol, data transfer cannot be done in ___________

a) stream mode

b) block mode

c) compressed mode

d) message mod


 


 


101.    Expansion of FTP is __________

a) Fine Transfer Protocol

b) File Transfer Protocol

c) First Transfer Protocol

d) Fast Transfer Protocol


 


102.    FTP is built on _____ architecture.

a) Client-server

b) P2P

c) Data centric

d) Service oriented


 


 


103.    FTP server _____________

a) Maintains state information

b) Is stateless

c) Has single TCP connection for a file transfer

d) Has UDP connection for file transfer


 


 


104.    The password is sent to the server using ________ command.

a) PASSWD

b) PASS

c) PASSWORD

d) PWORD


 


 


105.    When the mail server sends mail to other mail servers it becomes ____________

a) SMTP server

b) SMTP client

c) Peer

d) Master


 


106.    Expansion of SMTP is ________

a) Simple Mail Transfer Protocol

b) Simple Message Transfer Protocol

c) Simple Mail Transmission Protocol

d) Simple Message Transmission Protocol


 


 


 


107.    Typically the TCP port used by SMTP is _________

a) 25

b) 35

c) 50

d) 15


 


108.    The entire hostname has a maximum of ___________

a) 255 characters

b) 127 characters

c) 63 characters

d) 31 characters


 


109.    A DNS client is called _________

a) DNS updater

b) DNS resolver

c) DNS handler

d) none of the mentioned


 


110.    DHCP (dynamic host configuration protocol) provides __________ to the client.

a) IP address

b) MAC address

c) Url

d) None of the mentioned


 


 


111.    DHCP is used for ________

a) IPv6

b) IPv4

c) Both IPv6 and IPv4

d) None of the mentioned


 


112.    DHCP uses UDP port _________ for sending data to the server.

a) 66

b) 67

c) 68

d) 69


 


113.    When were VPNs introduced into the commercial world?

a) Early 80’s

b) Late 80’s

c) Early 90’s

d) Late 90’s


 


 


 


114.    The application-level protocol in which a few manager stations control a set of agents is called ______

a) HTML

b) TCP

c) SNMP

d) SNMP/IP


 


115.    To use a Simple Network Management System, we need _______

a) Servers

b) IP

c) Protocols

d) Rules


 


116.    The application layer protocol used by a Telnet application is ________

a) Telnet

b) FTP

c) HTTP

d) SMTP


 


117.    _______ allows you to connect and login to a remote computer

a) Telnet

b) FTP

c) HTTP

d) SMTP


 


118.    Telnet is used for _______

a) Television on net

b) Network of Telephones

c) Remote Login

d) Teleshopping site


 


 


 


119.    Telnet protocol is used to establish a connection to __________

a) TCP port number 21

b) TCP port number 22

c) TCP port number 23

d) TCP port number 25


 


120.    Which of the following is false with respect to TCP?

a) Connection-oriented

b) Process-to-process

c) Transport layer protocol

d) Unreliable


 


121.    TCP process may not write and read data at the same speed. So we need __________ for storage.

a) Packets

b) Buffers

c) Segments

d) Stacks


 


122.    TCP groups a number of bytes together into a packet called _______

a) Packet

b) Buffer

c) Segment

d) Stack


 


123.    Communication offered by TCP is ________

a) Full-duplex

b) Half-duplex

c) Semi-duplex

d) Byte by byte


 


 


 


124.    Size of TCP segment header ranges between ___________

a) 16 and 32 bytes

b) 16 and 32 bits

c) 20 and 60 bytes

d) 20 and 60 bits


 


125.    Which of the following is false with respect to UDP?

a) Connection-oriented

b) Unreliable

c) Transport layer protocol

d) Low overhead


 


126.    What is the main advantage of UDP?

a) More overload

b) Reliable

c) Low overhead

d) Fast


 


127.    What is the header size of a UDP packet?

a) 8 bytes

b) 8 bits

c) 16 bytes

d) 124 bytes


 


128.    A piece of icon or image on a web page associated with another webpage is called ______

a) url

b) hyperlink

c) plugin

d) extension


 


 


 


129.    What is a web browser?

a) a program that can display a web page

b) a program used to view html documents

c) it enables user to access the resources of internet

d) all of the mentioned


 


130.    In classless addressing, there are no classes but addresses are still granted in ______

a) IPs

b) Blocks

c) Codes

d) Sizes


 


131.    In IPv4 Addresses, classful addressing is replaced with ________

a) Classless Addressing

b) Classful Addressing

c) Classful Advertising

d) Classless Advertising


 


132.    In classful addressing, a large part of available addresses are ________

a) Organized

b) Blocked

c) Wasted

d) Communicated


 


133.    Network addresses are a very important concept of ________

a) Routing

b) Mask

c) IP Addressing

d) Classless Addressing


 


 


 


134.    Which of this is not a class of IP address?

a) Class E

b) Class C

c) Class D

d) Class F


 


135.    The size of an IP address in IPv6 is _________

a) 4 bytes

b) 128 bits

c) 8 bytes

d) 100 bits


 


136.    The header length of an IPv6 datagram is ___________

a) 10bytes

b) 25bytes

c) 30bytes

d) 40bytes


 


137.    Which mail access protocol is used for sending emails across the internet?

a) POP3

b) SMTP

c) IMAP

d) MAPI


 


138.    The default port number of SMTP is _________

a) 25

b) 110

c) 2525

d) 143


 


 


 


139.    HTTP is ________ protocol.

a) application layer

b) transport layer

c) network layer

d) data link layer


 


140.    In the network HTTP resources are located by __________

a) Uniform resource identifier

b) Unique resource locator

c) Unique resource identifier

d) Union resource locator


 


141.    FTP server listens for connection on which port number?

a) 20

b) 21

c) 22

d) 23


 


142.    In File Transfer Protocol, data transfer cannot be done in __________

a) stream mode

b) block mode

c) compressed mode

d) message mode


 


143.    Network layer firewall works as a __________

a) Frame filter

b) Packet filter

c) Content filter

d) Virus filter


 


 


 


 


 


144.    A proxy firewall filters at _________

a) Physical layer

b) Data link layer

c) Network layer

d) Application layer


 


145.    A packet filter firewall filters at __________

a) Physical layer

b) Data link layer

c) Network layer or Transport layer

d) Application layer


 


146.    A stateful firewall maintains a ___________ which is a list of active connections.

a) Routing table

b) Bridging table

c) State table

d) Connection table


 


147.    Which of the following is not a name for MAC(Media Access Control) in data link layer?

a) Burned-in-address

b) Hardware address

c) Physical address

d) Logical address


 


148.    What is the size of MAC address in medium access control sub layer?

a) 48 bytes

b) 48 bits

c) 32 bits

d) 32 bytes


 


 


 


149.    Ethernet frame consists of ____________

a) MAC address

b) IP address

c) Default mask

d) Network address


 


 


 


150.    To use a Simple Network Management System, we need _______

a) Servers

b) IP

c) Protocols

d) Rules



THANK YOU FOR WATCHING THIS VIDEO

WRITE DOWN NEXT TOPICS IN COMMENT BOX

LIKE, SHARE AND SUBSCRIBE TO US @LEARNINEASYWAY

SEE YOU IN NEXT VIDEO!


Comments

Popular posts from this blog

ISRO VSSC TECHNICAL ASSISTANT COMPUTER SCIENCE SYLLABUS

📘 ISRO VSSC Technical Assistant (Computer Science) – Complete Syllabus 2025 Based on Official Previous Year Question Papers The Indian Space Research Organisation (ISRO), through the Vikram Sarabhai Space Centre (VSSC), conducts recruitment for the post of Technical Assistant (Computer Science) . Candidates preparing for this exam often face one major challenge — lack of a clear, officially published syllabus. To bridge that gap, we have carefully analyzed two official VSSC question papers (Advt. No. 335 and Post No. 1546) to give you a complete, detailed, and exam-accurate syllabus. 🧠 Overview of the Exam Pattern Total Questions : 80 Duration : 90 minutes Type : Objective-type multiple choice questions (MCQs) Negative Marking : 0.25 marks deducted for one wrong question Syllabus Level : Engineering/Diploma level in Computer Science Download previous year questions--- https://drive.google.com/file/d/1J0H-UyzbWyDey7xMMCFQdZenbkpKqqYz/view?usp=shari...