June 10, 2018

Computer Networks - MCQS

Question
The following application layer protocol spec specifies support for both TCP and UDP at the transport layer:

a. DNS
b. FTP
c. Telnet
d. HTTP

The correct answer is: DNS

Question
The transport protocol on which SMTP runs is:

A. TCP
B. UDP
C. IP
D. None of the above

The correct answer is: TCP

Question
Which of the statements below does not apply to  Circuit Switched Networks?
a.  Can be implemented using Time Domain Multiplexing as well as  Frequency Domain Multiplexing
b. A call set up is required before the data can be sent from the source to the destination
c.  Dedicated resources used for transmission from source to destination
d.  Once a particular call has been set up between the source and destination,  data fragmented at the routers can be sent along different paths to the destination

The correct answer is:  Once a particular call has been set up between the source and destination,  data fragmented at the routers can be sent along different paths to the destination

Question
Among  the network topologies listed below, which  would be the preferred WAN design to implement for a company with  a hierarchical structure i.e. with main, regional and branch offices,  where information is exchanged  from main to regional to branch offices and vice-versa?a. Partial Mesh
b. Double-Ring
c. Tree
d. Ring

The correct answer is: Partial Mesh

Question
An organization’s LAN that connects the end systems of the users  to the edge router   is part of :
A. Network Edge Laye
B. Network Core Layer
C. Network Access  Layer
D. None

The correct answer is:     Network Access  Layer

Question
Applications that need to talk across a network uses __________ for communication with the end-node (destination)

a. Sockets
b. Semaphores 
c.  Message queues
d. Shared memory

The correct answer is: Sockets

Question
Which of the status codes  is returned as part of the HTTP Response if the requested content on the server is unchanged?

302
306
304
301

The correct answer is: 304

Question
Which one of the following statements is NOT  about HTTP cookies?
a. Cookies can be used to track the browsing pattern of a user at a particular site.
b. Cookies are a piece of code that has the potential to compromise the security of an Internet user.
c. Cookies get access to the client computer through an HTTP header.
d. Cookies have expiry time.

The correct answer is: Cookies are a piece of code that has the potential to compromise the security of an Internet user.

Question
DNS servers that give us access to DNS records to map the names of hosts to IP addresses are called:
A. TLD DNS servers
B. Authoritative DNS servers
C. Root DNS servers
D. Local DNS servers

a. C
b. B
c. D
d. A

The correct answer is: B

Question
What is the size of Urgent pointer in TCP segment

a. 24 bits
b. 8 bits
c.  32 bits
d.  16 bits

The correct answer is:  16 bits

Question
What is often needed for UDP functioning
a.  PPP and CHAP
b. DNS and SNMP
c.  Frame relay and X.25
d. SMTP and POP3

The correct answer is: DNS and SNMP

Question
Which of the following is/are example(s) of stateful application layer protocols?
(i)  HTTP
(ii) FTP
(iii) TCP
(iv) POP3
a. 1,3,4
b. 2,3
c. 1,2,3
d. 2,4

The correct answer is: 2,4

Question
Choose the right answer: DNS is used for:
i) Mail server aliasing
ii) Load distribution
iii) Host aliasing

a. i,iii
b. i,ii,iii
c. i,ii
d. iii,i

The correct answer is: i,ii,iii

Question
What is the major application of UDP

a.  Multimedia
b.  Scheduling
c.  Small office network
d.  LAN communication

The correct answer is:   Multimedia

Question
Error Control and Flow Control are responsibilities ofa.

a. data link and Physical Layer
b. data link and Transport Layer
c. data link and network Layers
d. Application and Presentation Layer

The correct answer isdata link and Transport Layer

Question
Which of the following statements regarding the Internet Structure is FALSE?
a.   Each Tier 2 or Regional ISP is a customer of  one or more Tier 1 ISPs
b.  A Tier 2 ISP cannot peer privately with one or more Tier-2 ISPs  
c.   A Tier 1 ISP  has a national or international coverage over a wide area, and has a network consisting of high end routers and  links with high bandwidth
d.   A Tier 3 or Local ISP may decide to be a direct customer of a  Tier 1 ISP

The correct answer is:  A Tier 2 ISP cannot peer privately with one or more Tier-2 ISPs 

Question
9.Which of the following applications uses peer-to-peer paradigm?
a.  FTP
b. Skype
c.  Email
d.  World-Wide-Web

The correct answer is: Skype

Question
Sequence the following actions for the interaction between a web browser and a web server.

A. Browser requests a webpage using HTTP.
B. Browser establishes a TCP connection with the web server.
C. Server sends the requested webpage using HTTP.
D. Browser resolves the domain name using DNS.
a. 4,2,1,3
b. 2,3,4,1
c. 1,3,2,4
d. 1,2,3,4

The correct answer is: 4,2,1,3

Question
Suppose within your web browser you click on a link to obtain a Web  page. The IP address of the associated URL is cached in your local host, so a DNS lookup is not necessary to obtain the IP address.  Suppose that the webpage associated with the link contains exactly one object consisting of a small amount  of  HTML text, which references 10 very small objects on the same server. Let  RTT' denote the  RTT between  the local host and the server containing the object. Assuming zero transmission time of the object. How much time is needed to get the to retrieve the web page fully, in the following cases:

a. Non-persistent HTTP with no parallel TCP connections?
b. Persistent HTTP?

a. 20RTT', 3RTT'
b. 22RTT', 2RTT'
c. 22RTT', 3RTT'
d. 20RTT', 2RTT'

The correct answer is: 22RTT', 3RTT'

Question
Which of the following statements is ?

a.  Queuing delay depends on the congestion of the router
b. A  greater length of physical link will always lead to an increased  transmission delay
c.  Greater the bandwidth of the physical link, lesser is the propagation delay
d.  If the bandwidth remains the same,  the transmission delay  increases with the size of the packet

The correct answer is: A  greater length of physical link will always lead to an increased  transmission delay

Question
Collaborative Web and Semantic Web are also referred   as:
a.  Web 1.0  and Web 2.0 respectively
b.  Web 2.0 and Web 3.0 respectively
c.   Both  Web 2.0
d.  Both  Web 3.0

The correct answer is:  Web 2.0 and Web 3.0 respectively

Question
The time difference between the  instant at which a transport connection is requested and the instant at which it is confirmed is called as ........

a. Transit delay
b. Connection establishment delay
c.  Protection delay
d. Priority delay

The correct answer is: Transit delay

Question
Which  of the following statements regarding network devices is ?

a. Hubs operate at the data link layer
b. Repeaters  operate  at the physical layer
c. Switches may operate both at the data link and the network layer 
d. Bridges operate at the data link layer

The correct answer is: Hubs operate at the data link layer

Question
Which of the statements below about HTTP is ?

a.  Cookies are used to maintain state at sender/receiver over multiple connections
b. Compared to using a persistent connection,   a non-persistent connection  leads to more round trips between the client and server
c.  HTTP is basically a stateless protocol where the Web server does not maintain information about past requests from a client
d. If HTTP Version 1.1  is used,  connections between client and server are non-persistent by default

The correct answer is: If HTTP Version 1.1  is used, connections between client and server are   non-persistent by default

Question
What is the size of the checksum field of UDP Checksum

a.  32 bits
b. 16 bits
c. 24 bits
d. 8 bits

The correct answer is: 16 bits

Question
Which of the methods mentioned below is not a valid Request Header?

a. Set-Cookie
b. Host
c. If-Modified-Since
d. Accept-Language

The correct answer is:   Set-Cookie

Question
Which of the following request methods uploads the file enclosed in the entity body of the request to the path specified in the URL of the request line?

a. POST
b. PUT
c. GET
d. HEAD

The correct answer is: PUT

Question
Which of the following are the protocol data units at the Application and Network Layer respectively?
   
a. Segment, Packet
b. Message,  Segment
c. Message, Packet
d. Packet,  Segment

The correct answer is: Message, Packet

Question
What is the total size of source field of UDP Checksum

a. 16 bits
b. 24 bits
c. 32 bits
d. 8 bits

The correct answer is: 32 bits

Question
Which command provides  information about delay measurement from source to  destination?

a. Traceroute
b. Nslookup
c. Netstat
d. None


The correct answer is:  Traceroute




Question

Application developer has permission to decide the following on transport layer side



a) Transport layer protocol

b) Maximum buffer size

c) Both of the mentioned

d) None of the mentioned


a. d
b. c
c. a
d. b
The correct answer is: c

Question
Piggybacking protocol is a technique used for

1.ACKs.
2.NAKs.
3.both 1 and 2.
4.None.

a. 1
b. 4
c. 3
d. 2
The correct answer is: 3

Question
Mobile hosts encapsulates and ______________the packets to mobiles host’s care-of –address

a)binds
b)tunnels
c)fowards
d)None

a. b
b. d
c. a
d. c 
The correct answer is: b

Question
OSPF routing tables are calculated by using______________algorithm

a)Link sate routing
b)Dijkstra’s Algorithm
c)Distance vector routing
d)Prim’s algorithm

a. a
b. b
c. c
d. d
The correct answer is: b

Question
Which of this is not a guided media ?

a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire

a. d
b. a
c. c
d. b
The correct answer is: c

Question
BGP is an ________________system routing protocol

a)Autonomous
b)InterAutonomous
c)IntraAutonomous
d)None

a. a
b. b
c. c
d. d
The correct answer is: b

Question
When 2 or more bits in a data unit has been changed during the transmission, the error is called

a) random error
b) burst error
c) inverted error
d) none of the mentioned

a. a
b. d
c. c
d. b
The correct answer is: b

Question
In slow-start algorithm, size of congestion window increases exponentially until it reaches a

1.Frame Relay.
2.Congestion Relay.
3.Threshold.
4.IP.
Select one:
a. c
b. a
c. b
d. d
The correct answer is: c

Question
Which one of the following routing algorithm can be used for network layer design?

a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned

a. d
b. b
c. a
d. c
The correct answer is: d

Question
A mechanism to control amount and rate of traffic sent to network is called

Traffic Congestion.
Traffic Flow.
Traffic Data.
4.Traffic Shaping
Select one:
a. 2
b. 3
c. 1
d. 4
The correct answer is: 4

Question
Which protocol is used for dynamically assigning IP addresses  to hosts on a LAN

a. ARP
b.RARP
c. TCP/IP
d.DHCP

a. a
b. d
c. b
d. c
The correct answer is: d

Question
MobileIP is built on ____________protocol

a)ICMP
b)IP
c)UDP
d)TCP

a. b
b. a
c. c
d. d
The correct answer is: b

Question
12) The packet of information at the application layer is called

a) Packet
b) Message
c) Segment
d) Frame

a. a
b. c
c. b
d. d
The correct answer is: b

Question
Header of a frame generally contains

a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned

a. c
b. a
c. b
d. d
The correct answer is: d

Question
Which of the following is congestion control algorithm?

a. leaky bucket
b. token bucket
c. Resource respondes
d. all of above

a. b
b. a
c. d
d. c
The correct answer is: d

Question
The network layer protocol of internet is

a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) none of the mentioned

a. b
b. d
c. c
d. a
The correct answer is: b

Question
The data link layer takes the packets from _____ and encapsulates them into frames for transmission.

a) network layer
b) physical layer
c) transport layer
d) application layer

a. c
b. b
c. a
d. d
The correct answer is: a

Question
A subset of a network that includes all the routers but contains no loops is called

a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned

a. d
b. c
c. a
d. b
The correct answer is: a

Question
Which one of the following task is not done by data link layer?

a) framing
b) error control
c) flow control
d) channel coding

a. d
b. a
c. c
d. b
The correct answer is: d

Question
The triplet that contains the home address, care-of address, and registration lifetime is called a _______________ for the mobile node

a)binding
b) registration
c)Unique Number
d)Network address

a. a
b. d
c. c
d. b
The correct answer is: a

Question
ICMP is primarily used for

a) error and diagnostic functions
b) addressing
c) forwarding
d) none of the mentioned

a. c
b. a
c. d
d. b
The correct answer is: a

Question
This is one of the architecture paradigm

a) Peer to peer
b) Client-server
c) HTTP
d) Both a and b

a. b
b. c
c. a
d. d
The correct answer is: d

Question
MAC addresses are  for which layer

a. Network
b.Application
c. Data Link
d.Physical
Select one:
a. c
b. d
c. a
d. b
The correct answer is: c

Question
OSPF is based on which routing technique

a)Link state routing protocol
b)Distance vector routing protocol
c)Both a & b
d)Path Vector protocol

a. b
b. a
c. c
d. d

The correct answer is: a

Question
In MobileIP _____________address indicates the network number and thus identifies the mobile node's point of attachment with respect to the network topology

a)System address
b)IP address
c)Care-off address
d)Home address
Select one:
a. d
b. c
c. b
d. a
The correct answer is: c

Question
A VLAN

a.Can be defined on a single switch
b.Can span multiple switches
c.Can be used across bridges
d. None of the above
Select one:
a. a
b. c
c. d
d. b

The correct answer is: b

Question
Application layer offers _______ service

a) End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned

a. a
b. c
c. d
d. b

The correct answer is: a

Question
The metric in RIP is called ______________

a)cost
b)hop count
c)distance
d)count

The correct answer is: b

Question
In Congestion Control, packet is put at end of input queue while waiting to be

Checked.
Entered.
Reached.
4.Controlled

Select one:
a. 2
b. 1
c. 3
d. 4

The correct answer is: 1

Question
CRC stands for

a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check

a. d
b. b
c. c
d. a
The correct answer is: a

Question
Consider a situation where user wants to fetch/transfer the data of size 1MB across a 1 Gbps network with a total transfer time of 108ms. What is the effective through put.

Select one:

a. 1Gbps
b. 84.1 Mbps
c. 74.1Mbps
d. 108 Mpbs

The correct answer is: 74.1Mbps

Question

If arrival rate (in bits) to link exceeds transmission rate of link for a period of time
Select one:
a. Nothing will happen
b. packets will queue, wait to be transmitted on link
c. packets can be dropped (lost) if memory (buffer) fills up
d. Both a and b

The correct answer is: Both a and b

Question
Which of the following is an example of a real-time application on a network

Select one:
a. Videoconferencing
b. Internet Radio
c. File Transfer
d. Email

The correct answer is: Videoconferencing

Question
Which of the following represents a multicast message

Select one:
a. Message sent to www.hotmail.com
b. Message sent to Mr. Computer’s email
c. Message sent to all the computers of your organisations network. 

d.Message sent to all the computers in the accounts department on your network

The correct answer isMessage sent to all the computers in the accounts department on your network

Question
Which is correct description of Latency

Select one:
a. Latency = Propagation + Queue + Transmit
b. Latency = Propagation
c. Latency = Propagation + Queue
d. Latency = Propagation + Transmit

The correct answer is: Latency = Propagation + Queue + Transmit