Compnetwork
Compnetwork
Compnetwork
6. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none the mentioned
View Answer
Answena
Explanation:None.
9. congestion occurs
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned
View Answer
Answena
Explanation:None.
10. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer
Answer: b
Explanation:None.
This set of Computer Networks Questions & Answers focuses on “Physical Media”.
1) Which of this is not a guided media ?
a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire
View Answer
Answer: c
Explanation: Wireless LAN is unguided media.
2) UTP is commonly used in
a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
View Answer
Answer: a
Explanation: Unshielded twisted pair(UTP) is commonly used in home access.
5. In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting
for the corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) none of the mentioned
View Answer
Answena
Explanation:None.
3. MAC address of
1) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
View Answer
Answend
Explanation:None.
4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission
parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
View Answer
Answena
Explanation:None.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64
octets is called
a) short frame
b) run frame
c) mini frame
d) man frame
View Answer
Answer: b
Explanation:None.
Answer: a
Explanation: None.
Answer: b
Explanation: The packet switch will not transmit the first bit to outbound link until it recieves the entire packet.
3) If there are N routers from source to destination, total end to end bits indelay in sending packet P(L->number of
the packet R-> transmission rate)
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
View Answer
Answer: b
Explanation: None.
5) The resources needed for communication between end systems are reserved for the duration of session
between end systems in
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
View Answer
Answer: b
Explanation: None.
6) As the resouces are reserved between two communicating end systems in circuit switching, this is achieved
a) authentication
Answer: b
Explanation: None.
a) Flags
b) Offset
c) TOS
d) Identifier
View Answer
Answer: c
Explanation: TOS-type of service identifies the type of packets.
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
View Answer
Answer: c
Explanation: TTL field is decremented by one each time the datagram is processed by a router.
4. If the value in protocol field is 17, the transport layer protocol used is
a) TCP
b) UDP
c) Either of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: For TCP it is 6.
Answer: a
Explanation: flag=0 indicates that it is the last fragment.
Answer: b
Explanation: Ip offers unreliable service.
Answer: b
Explanation: An IPv6 address is 128 bits long.
c) 30bytes
d) 40bytes
View Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the datagram.
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
View Answer
Answer: c
Explanation: This field enables to have different types of IP datagram.
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6.
Answer: a
Explanation: The Hop limit value is decremented by one by a router when the datagram is forwaded by the router. When the
value becomes zero the datagram is discarded.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by
intervening IPv4 routers. The best solution here is
a) use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
View Answer
Answer: b
Explanation: The IPv4 routers can form a tuunel.
9. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
View Answer
Answer: a
Explanation: Bits 96 to 127 in the datagram represents obfuscated IPv4 address.
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
View Answer
Answer: b
Explanation:None.
b) internet society
3. Internet access by transmitting digital data over the wires of a local telephone network is provided by
a) leased line
a) HTTP
b) DHCP
c) DNS
none the mentioned
View Answer
Answend
Explanation:None.
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
View Answer
Answenc
Explanation:None.
7. Internet works on
a) packet switching
b) circuit switching
8. Which one of the following is not an application layer protocol used in internet?
a) DHCP
b) IP
c) RPC
d) none of the mentioned
View Answer
Answena
Explanation:None.
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) none of the mentioned
View Answer
Answend
Explanation:None.
a) IP address
b) MAC address
c) url
d) none of the mentioned
View Answer
Answena
Explanation:None.
a) IPv6
b) IPv4
a) 66
b) 67
c) 68
d) 69
View Answer
Answer: b
Explanation:None.
a) dynamic allocation
b) automatic allocation
c) static allocation
b) UDP unicast
c) TCP broadcast
d) TCP unicast
View Answer
Answera
Explanation:None.
8. After obtaining the IP address, to prevent the IP conflict the client may use
10. If DHCP snooping is configured on a LAN switch, then clients having specific can access the
network.
a) MAC address
b) IP address
Answenc
Explanation:None.
Computer Networks Questions & Answers - Access Networks
This set of Computer Networks Questions & Answers focuses on “Access Networks”.
Answer: c
Explanation: The third part is ordinary two way telephone channel.
a) DSLAM
b) CO
c) Splitter
d) CMTS
View Answer
Answer: d
Explanation: Cable modem termination system is used in cable internet access.
5) HFC contains
a) Fibre cable
b) Coaxial cable
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
6) Choose the statement which is not applicable for cable internet access
Answer: d
Explanation: In cable access analog signal is converted to digital signal by CMTS.
8) StarBand provides
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
View Answer
Answer: d
Explanation: None.
a) DSL
b) FTTP
c) Cable
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
Answer: c
Explanation: None.
a) bit-by-bit delivery
d) electrical cable
View Answer
Answenc
Explanation:None.
3. Bits can be send over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
View Answer
Answena
Explanation:None.
4. The portion of physical layer that interfaces with the media access control sublayer is called
b) flow control
b) channel coding
c) modulation
d) all of the mentioned
View Answer
Answend
Explanation:None.
8. The physical layer translates logical communication requests from the into hardware specific
operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
View Answer
Answena
Explanation:None.
a) analog modulation
b) digital modulation
c) multiplexing
d) none of the mentioned
View Answer
Answenc
Explanation:None.
a) radio waves
b) microwaves
c) infrared
b) frames
c) packets
none the mentioned
View Answer
Answenc
Explanation:None.
a) routing
b) inter-networking
c) congestion control
b) host address
c) both (a) and (b)
d) none of the mentioned
View Answer
Answenc
Explanation:None.
b) a short VC number
5. Which one the following routing algorithm can be used for network layer design?
a) shortest path algorithm
d) the mentioned
View Answer
Answer:d
Explanation:None.
6. Multidestination routing
7. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
8. Which one the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
Answend
Explanation:None.
9. The network layer protocol of internet is
a) ethernet
b) internet protocol
b) addressing
c) forwarding
d) none of the mentioned
View Answer
Answena
Explanation:None.
1. Transport layer aggregates data from different applications into a single stream before passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
View Answer
Answena
Explanation:None.
a) TCP
b) UDP
Answenc
Explanation:None.
3. User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream related packets
a) socket
b) pipe
c) port
d) none of the mentioned
View Answer
Answena
Explanation:None.
a) wsock
b) winsock
c) wins
d) none of the mentioned
View Answer
Answer: b
Explanation:None.
a) port
b) pipe
c) node
d) none the mentioned
View Answer
Answena
Explanation:None.
Answena
Explanation:None.
2. Which one of the following allows a user at one site to establish a connection to another site and then pass
keystrokes from local host remote host?
a) HTTP
b) FTP
c) telnet
d) none the mentioned
View Answer
Answenc
Explanation:None.
c) rules for when and how processes send and respond to messages
d) all of the mentioned
View Answer
Answend
Explanation:None.
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
View Answer
Answena
Explanation:None.
6. Which one of the following is an internet standard protocol for managing devices on IP network?
8. Which protocol is a signalling communication protocol used for controlling multimedia communication
sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) none of the mentioned
View Answer
Answena
Explanation:None.
10. When displaying web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
Answera
Explanation:None.
a) HTTP
b) SMTP
c) FTP
d) TCP
View Answer
Answer: d
Explanation: TCP is transport layer protocol
a) Packet
b) Message
c) Segment
d) Frame
View Answer
Answer: b
Explanation: None.
4) Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
6) E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
View Answer
Answer: c
Explanation: Because it can work with available throughput.
a) File transfer
b) File download
c) E-mail
d) Interactive games
View Answer
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
8) Which of the following is an application layer service ?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
9) To deliver a message to the correct application program running on a host, the address must be
consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
Answer: a
Explanation: None.
1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is
a) 4
b) 1
c) 5
d) None of the mentioned
View Answer
Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
a) Persistent
b) Non-persistent
c) Either of the mentioned
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
3. The time taken by a packet to travel from client to server and then back to the client is called
a) STT
b) RTT
c) PTT
d) None of the mentioned
View Answer
Answer: b
Explanation: RTT stands for round-trip time.
Answer: c
Explanation: None.
5. In the process of fetching a web page from a server the HTTP request/response takes RTTs.
a) 2
b) 1
c) 4
d) 3
View Answer
Answer: b
Explanation: None.
7. The values GET, POST, HEAD etc are specified in of HTTP message
a) Request line
b) Header line
c) Status line
d) Entity body
View Answer
Answer: a
Explanation: It is specified in the method field of request line in the HTTP request message.
8. The method when used in the method field, leaves entity body empty.
a) POST
b) GET
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
9. The HTTP response message leaves out the requested object when method is used
a) GET
b) POST
c) HEAD
d) PUT
View Answer
Answer: c
Explanation: None.
13. Which of the following is present in both an HTTP request line and a status line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
1) Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
3) ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b
View Answer
Answer: d
Explanation: None.
Answer: a
Explanation: None.
5) If you want to find the number of routers between a source and destination, the utility to be used is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer: d
Explanation: None.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
Answer: c
Explanation: Pathping combines the functionality of ping with that of traceroute (traced).
1) Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: None.
Answer: c
Explanation: FTP is out-of-band as it has separate control connection.
5) If 5 files are transfered from server A to client B in the same session. The number of TCP connection
between A and B is
a) 5
b) 10
c)2
d) 6
View Answer
Answer: d
Explanation: 1 control connection and other 5 for five file transfers.
6) FTP server
a) Mantains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
7) The commands, from client to server, and replies, from server to client, are sent across the control
connection in bit ASCII format
a) 8
b) 7
c) 3
d) 5
View Answer
Answer: b
Explanation: None.
Answer: d
Explanation: None.
Answer: d
Explanation: None.
3) The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at
the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: c
Explanation: None.
4)The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: b
Explanation: They donot inject packets into the channel.
6) Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
b) network layer
c) application layer
d) session layer
View Answer
Answer: b
Explanation:None.
c) IP payload
Answena
Explanation:None.
3. Network layer firewall works as a
a) frame filter
b) packet filter
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned
View Answer
Answenc
Explanation:None.
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
View Answer
Answena
Explanation:None.
b) wireless networks
c) wired local area network
d) none of the mentioned
View Answer
Answer: b
Explanation:None.
b) email security
c) FTP security
10.When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned
View Answer
Answenc
Explanation:None.
b) IP header
c) IP payload
d) none of the mentioned
View Answer
Answena
Explanation:None.
a) frame filter
b) packet filter
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer: b
Explanation:None.
a) ethernet
b) bluetooth
c) wi-fi
d) none of the mentioned
View Answer
Answenc
Explanation:None.
b) virus attack
c) worms attack
d) botnet process
View Answer
Answena
Explanation:None.
b) wireless networks
a) browser security
b) email security
c) FTP security
10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that
information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned
View Answer
Answenc
Explanation:None.
Answen a
Explanation:None.
Answen a
Explanation:None.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) none of the mentioned
View Answer
Answer: b
Explanation:None.
Answen a
Explanation:None.
Answen a
Explanation:None.
2. WiMAX provides
a) simplex communication
b) half duplex communication
c) full duplex communication
d) none of the mentioned
View Answer
Answenc
Explanation:None.
Answena
Explanation:None.
6. For encryption, WiMAX supports
a) advanced encryption standard
b) triple data encryption standard
c) both (a) and (b)
d) none of the mentioned
View Answer
Answenc
Explanation:None.
7. WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none of the mentioned
View Answer
Answenc
Explanation:None.
10. Which one of the following frequency is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
View Answer
Answer: b
Explanation:None.