Kiet C N MCQ
Kiet C N MCQ
Kiet C N MCQ
Roll No:
NOTE:
1)Each question carries 2 marks.
2)Every correct answer has weightage of +2 marks and for every wrong answer-0.5 marks will be
deducted.
2 1 1
Length of Port address in TCP/IP is
2 a. 8 bit long
b. 4 bit long
c. 32 bit long
d. 16 bit long
2 1 1
TCP/IP layer is equivalent to combined Session, Presentation and
3 a. Transport layer
b. Network layer
c. Application layer
d. Physical layer
TCP/IP is extensively used model for the World Wide Web for 2 1 2
providing networkcommunications which are composed of layers
4 that work together.
a. 3
b. 6
c. 4
d. 7
2 1 2
A local telephone network is an example of a network.
5 a. Packet switched
b. Circuit switched
c. Bit switched
d. Line switched
2 1 2
The required resources for communication between end systems are
6 reserved for theduration of the session between end systems in
method.
a. Packet switched
b. Bit switched
c. Line switched
d. Circuit switched
2 1 2
In ……………. there is no resource allocation for a packet.
7 a. frame switching
b. message switching
c. circuit switching
d. datagram switching
2 1 2
A network is a cross between a circuit-switched network and a
8 datagram network. It has some characteristics of both.
a. virtual-circuit
b. packet-switched
c. None of the Given
d. frame-switched
2 1 1
The network layer in the Internet is designed as anetwork.
9 a. datagram
b. none
c. virtual-circuit
d. circuit-switched
2 1 1
A… ................ is an implementation of the same protocol in the
10 equivalent layer on aremote system.
a. Physical layer
b. peer
c. protocol stack
d. layer
14 a. copper
b. liquid
c. glass or plastic
d. bimetallic
2 1 1
………….cable is used for voice and data communications.
15 a. Twisted-pair
b. None of These
c. Coaxial
d. Fiber-optic
17 2 1 1
……cables are composed of a glass or plastic inner core surrounded
by cladding,all encased in an outside jacket.
a. Fiber-optic
b. Coaxial
c. Shield Twisted Pair
d. Unshield Twisted-pair
18 a. twisted-pair cable
b. fiber-optic cable
c. coaxial cable
d. atmosphere
23 2 1 1
In ------ topology cable is broken, networks get down.
a. Star
b. Mesh
c. Bus
d. Ring
24 2 1 1
Who developed standards for the OSI reference model?
a. ISO - International Standards Organization
b. ANSI - American National Standards Institute
c. IEEE - Institute of Electrical and Electronics Engineers
d. ACM - Association for Computing Machinery
25 2 1 1
How many layers are there in the OSI reference model of
networking?
a. 8
b. 7
c. 5
d. 4
26 Each layer of the OSI model receives services or data from a layer. 2 1 2
a. none
b. below and above layer both
c. above layer
d. below layer
27 A layer of the OSI model on one system communicates with the layer
2 of its1peer 2
system.
a. above
b. same
c. below
d. None
28 2 1 4
Choose the correct layer numbers and names of the OSI model
below.
a. Layer 3 - Network Layer, Layer 2 - Data Link Layer, Layer
1 - Physical Layer
b. Layer 7 - Application Layer, Layer 6 - Presentation Layer
c. Layer 5 - Session Layer, Layer 4 - Transport Layer
d. All given options
29 2 1 4
The layer that transmits data in the form of bit streams using
electrical and mechanicalsystems is in the OSI model.
a. Physical layer
b. Transport Layer
c. Network Layer
d. Data Link Layer
30 A device operating at network layer is called 2 1 1
a. Repeater
b. Router
c. Gateway
d. Bridge
31 2 1 1
The network topology that is bi-directional links between each
possible node.
a. Star
b. Mesh
c. Bus
d. Ring
33 2 1 1
Multipoint topology is
a. Ring
b. Mesh
c. Bus
d. Star
34 2 1 1
In mesh topology, every device has a dedicated topology of
a. Point to point linking
b. Both a and b
c. Multipoint linking
d. None of given
36 2 1 1
Consists of 2 conductors twisted round each other.
a. Twisted pair cable
b. Fiber optic cable
c. Coaxial cable
d. Microwave
41 What are number of cable links required for the 4 devices connected 2 1 1
in mesh topology?
a. 3
b. 4
c. 6
d. 1
42 ------------------- is a set of rules governing the format and meaning of 2 1 2
the packets, or messages that are exchanged by the peer entities
within a layer.
a. Interface
b. Reference model
c. Protocol
d. None of these
a. A,B
b. A,B,C
c. A,B,C,D
d. A,C,D
47 A transmission mode that can transmit data in both the directions but 2 1 1
transmits in only one direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
a) RFC
b) RCF
c) ID
d) DFC
52 In the layer hierarchy as the data packet moves from the 2 1 1
a) Added
b) Removed
c) Rearranged
d) Modified
53 The first Network was called ________ 2 1 1
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
54 Three or more devices share a link in ________ connection. 2 1 2
a) Unipoint
b) Multipoint
c) Point to point
d) Simplex
55 Bluetooth is an example of __________ 2 1 2
the packet.
a) bridge
b) firewall
c) router
d) hub
57 Which of the following layers is an addition to OSI model when 2 1 2
a) Application layer
b) Presentation layer
c) Session layer
a) End system
b) NIC
c) Ethernet
d) Packet transport
59 The functionalities of the presentation layer include 2 1 1
____________
a) Data compression
b) Data encryption
c) Data description
by __________
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
61 In OSI model, when data is sent from device A to device B, the 2 1 4
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
62 In the OSI model, as a data packet moves from the lower to 2 1 1
a) Added
b) Removed
c) Rearranged
d) Randomized
63 OSI stands for __________ 2 1 1
a) network layer
b) transport layer
c) session layer
transport layer?
a) physical address
b) logical address
c) port address
d) specific address
66 The physical layer is concerned with ___________ 2 1 1
a) bit-by-bit delivery
speed in a network?
a) coaxial cable
c) optical fiber
d) electrical cable
68 Transmission control protocol is 2 1 1
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) recievs data from application as a single stream
d) all of the mentioned
a) network layer
b) physical layer
c) transport layer
d) application layer
71 The network layer is concerned with __________ of data. 2 1 2
a) bits
b) frames
c) packets
d) bytes
72 Which one of the following is not a function of network layer? 2 1 1
a) routing
b) inter-networking
c) congestion control
d) error control
73 Which of the following are transport layer protocols used in 2 1 1
networking?
_____________
layer
a) is a connection-oriented protocol
b) is a connectionless protocol
a) Topology
b) Routing
c) Networking
d) Control
79 Which network topology requires a central controller or hub? 2 1 1
a) Star
b) Mesh
c) Ring
d) Bus
80 Data communication system spanning states, countries, or the 2 1 1
a) LAN
b) WAN
c) MAN
d) PAN
81 Data communication system within a building or campus 2 1 1
is________
a) LAN
b) WAN
c) MAN
d) PAN
82 Which of this is not a guided media? 2 1 1
b) Coaxial cable
c) Wireless LAN
d) Copper wire
83 Fiber optics posses following properties __________ 2 1 1
a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched
86 Most packet switches use this principle ____________ 2 1 2
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
88 As the resources are reserved between two communicating 2 1 1
a) authentication
c) reliability
a) application layer
b) transport layer
c) network layer
a) 18
b) 21
c) 22
d) 26
91 A network router joins two _________ together? 2 1 2
A. Computers
B. Switches
C. Networks
D. Gateway
92 What is the size of an IP address? 2 1 2
A. 64 bit
B. 128 bit
C. 16 bit
D. 32 bit
93 What is the difference between a switch and a hub? 2 1 4
A. Switches operate at physical layer while hubs operate at data link layer
B. Switches operate at data link layer while hubs operate at transport layer
C. Switches operate at data link layer while hubs operate at physical layer
D. Switches operate at transport layer while hubs operate at physical layer
94 The physical layer is concerned with the movement of _______ over the 2 1 2
physical medium.
A. programs
B. dialogs
C. protocols
D. Bits
95 IPv6 has _______ -bit addresses. 2 1 1
A. 32
B. 64
C. 128
D. Variable
96 Which of the following can be an Ethernet physical address? 2 1 1
A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. none of the above
97 What kind of transmission medium is most appropriate to 2 1 1
carry data in a computer network that is exposed to
electrical interferences?
A. Packet switched
B. Circuit switched
C. Bit switched
D. Line switched
ANSWER: B
A. 8 bit long
B. 4 bit long
C. 32 bit long
D. 16 bit long
ANSWER: D
A. ISO
B. ANSI
C. IEEE
D. ACM
ANSWER: A
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
___________.
A. Added
B. Removed
C. Rearranged
D. Modified
ANSWER: A
ANSWER: D
Protocols are?
D. None of above
ANSWER: A
A. to connect LANs
B. to separate LANs
ANSWER: A
A. File Sharing
C. Easier Backups
ANSWER: D
A. Gateways
B. Unix
C. Routers
D. Firewalls
ANSWER: B
A. network
B. physical
C. data link
D. transport
ANSWER: C
The physical address to each machine is provided by which layer in an OSI reference model?
A. Physical layer
C. Network Layer
D. Transport Layer
ANSWER: B
A. Error control
B. Flow control
C. Creating and managing the communication link between two devices with the help of the
Transport layer.
ANSWER: D
The types of Unguided transmission channel or media used for LAN are __.
B. Coaxial Cables
C. Radio Waves
ANSWER: C
Delimiting and synchronization of data exchange is provided by __________
A. Application layer
B. Session layer
C. Transport layer
D. Link layer
ANSWER: B
A. LAN
B. MAN
C. WAN
D. None
ANSWER: A
A. bit-by-bit delivery
ANSWER: A
A. Contention
B. Reservation
C. Round Robin
D. None
ANSWER: C
ANSWER: D
ANSWER: A
A. synchronization bytes
B. addresses
C. frame identifier
ANSWER: D
ANSWER: A
When 2 or more bits in a data unit has been changed during the transmission, the error is called
____________
A. random error
B. burst error
C. inverted error
D. double error
ANSWER: B
The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto
the next outgoing data frame is called ____________
A. piggybacking
C. fletcher’s checksum
D. parity check
ANSWER: A
Which sublayer of the data link layer performs data link functions that depend upon the type of
medium?
ANSWER: B
ANSWER: A
Which of the following is the multiple access protocol for channel access control?
A. CSMA/CD
B. CSMA/CA
D. HDLC
ANSWER: C
The modes of a MAC to share a transmission medium are ___.
A. Round Robin
B. Reservation
C. Contention
ANSWER: A
Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a
LAN network?
ANSWER: B
The physical address to each machine is provided by which layer in an OSI reference model?
A. Physical layer
C. Network Layer
D. Transport Layer
ANSWER: B
A. 32
B. 1024
C. 65535
D. 512
ANSWER: C
A. Switches operate at physical layer while hubs operate at data link layer
B. Switches operate at data link layer while hubs operate at transport layer
C. Switches operate at data link layer while hubs operate at physical layer
ANSWER: C
A. an even-number of
B. two
C. no errors
D. an odd-number of
ANSWER: D
A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
ANSWER: C
C. CRC
D. Checksum
ANSWER: D
In _______, collisions are avoided through the use of three strategies: the interframe space, the
contention window, and acknowledgments.
A. CSMA/CA
B. CSMA/CD
ANSWER: A
In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?
A. 0 to 63
B. 0 to 64
C. 1 to 63
D. 1 to 64
ANSWER: A
For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed
A. exactly 10
B. less than 10
C. more than 10
ANSWER: A
ANSWER: B
A. fixed-size
B. variable-size
C. standard
ANSWER: A
The network layer encapsulates the data into _______of data.
A. bits
B. frames
C. packets
D. bytes
ANSWER: C
ANSWER: C
B. a short VC number
ANSWER: B
One subset of a network that includes all the routers but contains no loops is called ________
A. spanning tree
B. spider structure
C. spider tree
D. special tree
ANSWER: A
ANSWER: D
An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true?
ANSWER: C
A. is 20 to 60 bytes long
ANSWER: A
In IPv6, options are inserted between the _________ and the ___________ data
ANSWER: B
C. MAC entries
ANSWER: A
The use of hierarchy in routing tables can ________ the size of the routing tables
A. reduce
B. increase
C. multiply
D. retain
ANSWER: A
A. prefix
B. hostid
C. mask
ANSWER: C
We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are
called _________
A. datawords
B. blockwords
C. codewords
ANSWER: C
A. 255.255.255.0
B. 255.255.242.0
C. 255.255.0.0
ANSWER: A
The subset of a network that includes all the routers but contains no loops is called ________
A. spanning tree
B. spider structure
C. spider tree
D. special tree
ANSWER: A
The ________ between two words is the number of differences between corresponding bits
A. Hamming code
B. Hamming distance
C. Hamming rule
ANSWER: B
A. 32
B. 64
C. 128
ANSWER: C
To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block
code must be _______
A. 5
B. 6
C. 11
ANSWER: B
A. a unicast
B. a multicast
C. an anycast
ANSWER: A
C. MAC entries
ANSWER: B
The _______ is a dynamic mapping protocol in which a physical address is found for a given logical
address.
A. ARP
B. RARP
C. both a and b
ANSWER: B
Transport layer aggregates data from different applications into a single stream before passing it to
____________
A. network layer
C. application layer
D. physical layer
ANSWER: A
ANSWER: A
ANSWER: C
In Go-Back-N window, when the timer of the packet times out, several packets have to be resent
even some may have arrived safe. Whereas in Selective Repeat window, the sender resends
___________
ANSWER: B
The technique in which a congested node stops receiving data from the immediate upstream node
or nodes is called as _______
A. Admission policy
B. Backpressure
C. Forward signaling
D. Backward signaling
ANSWER: B
Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the sliding window in the
forward diretion?
A. Control Variables
D. Resending of frames
ANSWER: B
A. increases sharply
C. declines sharply
ANSWER: C
The packet sent by a node to the source to inform it of congestion is called _______
A. Explicit
B. Discard
C. Choke
D. Backpressure
ANSWER: C
A. HTTP
B. SMTP
C. FTP
D. UDP
ANSWER: D
In a network, when the load is much less than the capacity of the network, the delay is _________
A. at a maximum
B. at a minimum
C. constant
ANSWER: B
One of the responsibilities of the transport layer protocol is to create a ______ communication.
A. host-to-host
B. process-to-process
C. node-to-node
ANSWER: B
ANSWER: A
ANSWER: B
Congestion in a network or internetwork occurs because routers and switches have _______.
A. tables
B. queues
C. crosspoints
D. none of the above
ANSWER: B
A. Application protocols
B. Session protocols
C. Transport protocols
D. Network protocols
ANSWER: C
In a network, when the load is below the capacity of the network, the throughput ______________
A. increases sharply
C. declines sharply
ANSWER: B
In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it
reaches a threshold
A. slow-start
B. congestion avoidance
C. congestion detection
ANSWER: A
The protocol data unit PDU for the Transport layer in the Internet stack is
A. Segment
B. Datagram
C. Message/Data
D. Frame
ANSWER: A
In computer networks _________ is a characteristic that a flow needs where Lack of it means losing
a packet or acknowledgment, which entails retransmission.
A. Reliability
B. Delay
C. Jitter
D. Bandwidth
ANSWER: A
A. End to end
B. Process to process
ANSWER: A
Email is _________
A. Loss-tolerant application
B. Bandwidth-sensitive application
C. Elastic application
ANSWER: C
To deliver a message to the correct application program running on a host, the _______ address
must be consulted.
A. IP
B. MAC
C. Port
ANSWER: C
Which among the below specified illustrations belongs to the category of GUI based user agents?
A. mail
B. pine
C. Outlook
ANSWER: C
Which DNS client maps an address to a name or a name to an address especially when required by a
host?
A. Resolver
B. Mapper
C. Primary Server
D. Secondary Server
ANSWER: A
D. None
ANSWER: C
A. SMTP
B. POP3
C. FTP
D. SNMP
ANSWER: B
A. 20
B. 21
C. 22
D. 23
ANSWER: B
Which of the following is present in both an HTTP request line and a status line?
B. URL
C. Method
ANSWER: A
A. 25
B. 35
C. 50
D. 15
ANSWER: A
A. domain server
B. zone server
C. root server
ANSWER: C
A. File transfer
B. File download
C. E-mail
D. Internet telephony
ANSWER: D
The local host and the remote host are defined using IP addresses. To define the processes, we need
second identifiers called ____________
A. UDP addresses
B. transport addresses
C. port addresses
ANSWER: C
The _______ domains define registered hosts according to their general behavior.
A. generic
B. country
C. inverse
ANSWER: A
A. SMTP
B. HTTP
C. FTP
D. SIP
ANSWER: A
In FTP, the well-known port ____ is used for the control connection and the well-known port
________ for the data connection
A. 21; 22
B. 21; 20
C. 20; 21
ANSWER: B
When displaying a web page, the application layer uses the _____________
A. HTTP protocol
B. FTP protocol
C. SMTP protocol
D. TCP protocol
ANSWER: A
In ________ is a repository of information linked together from points all over the world.
A. The WWW
B. HTTP
C. HTML
ANSWER: A
A. MPEG
B. JPEG
C. either a or b
ANSWER: B
A. transposition
B. killer
C. shift
ANSWER: C
Computer Networks KCS-603
A. Network
B. Networking
C. Intranet
D. both b and c
ANSWER: A
2. Which of the following network is used to connect a number of computers to each other by
cables in a single location?
A. WAN
B. LAN
C. MAN
D. both b and c
ANSWER: B
A. circuits
B. channels
C. trunks
ANSWER: D
A. host
B. subnet
D. both a and b
ANSWER: C
5. The signal which has infinitely many levels of intensity over a period of time is called ………
A. digital signal
B. analog signal
C. both a and b
D. sound signal
ANSWER: A
A. Peak Amplitude
B. Frequency
C. Phase
D. Both a and c
ANSWER: A
7. The distance a simple signal can travel in one period is called …………
A. Wavelength
B. propagation speed
C. Frequency
D. both a and b
ANSWER: A
8. A noise where foreign signal enters the path of the transmitted signal is called ……
A. Impulse
B. Inter modulation
C. cross talk
D. both b and c
ANSWER: C
9. Which type of channel it is where the number of users are stable and the traffic is not
bursts?
A. static channel
B. dynamic channel
C. free channel
D. both a and c
ANSWER: A
10. With Slotted Aloha, a …………. sends out small clock tick packets to the outlying stations.
A. distributed clock
B. synchronized clock
C. centralized clock
D. Digital clock
ANSWER: C
11. If there is only one station with a packet to send, this guarantees that there will ………….. For
that packet.
A. never be a collision
B. be a collision
C. be an improvement
D. direction
ANSWER: A
12. The _______ layer provides a well defined service interface to the network layer,
determining how the bits of the physical layer are grouped into frames
A. Data Link
B. Physical
C. Network
D. Session
ANSWER: A
13. ________ is the process in which the receiver tries to guess the message by using redundant
bits
A. Connection-Oriented Service
D. Confirm
ANSWER: B
C. point to point
D. both a and b
ANSWER: A
15. The range of sequence number which is the concern of the receiver is called the receive
sliding window.
B. sliding window
C. frame buffer
D. both a and b
ANSWER: A
B. Network layer
C. transport layer
D. Physical layer
ANSWER: A
17. The maximum size of the window in a Sliding Window Protocol is _______
A. 2m – 1
B. 2m + 1
C. 2m
D. 2m-1
ANSWER: A
A. Network
B. application
C. transport
D. physical
ANSWER: A
19. The subnet gets increasingly loaded with packets causing increase in delay in the delivery of
packets, which can lead to more retransmission, and ultimately increasing more and more
traffic. This is a concept called as _________
A. blockage
B. Traffic jam.
C. Congestion
D. both a and b
ANSWER: C
20. ______ is a static algorithm in which every incoming packet is sent out on every outgoing
line except the one it arrives on. This method usually generates vast number of duplicate
packets..
A. Flooding
C. congestion
D. both a and c
ANSWER: A
21. The Internet addresses are ______ bits in length in IPV4 addressing scheme
A. 16
B. 64
C. 32
D. 48
ANSWER: C
22. In addresses for _______ networks, the first 16 bits specify a particular network, and the last
16 bits specify a particular host.
A. class A
B. class C
C. class B
D. class D
ANSWER: C
23. The number of network segments on which the datagram is allowed to travel before a
router should discard it is called _______.
B. Time to Die(TTD)
C. self recognition
D. both a and b
ANSWER: A
24. An application process is assigned a process identifier number (process ID), which is likely to
be _______ each time that process is started.
A. Similar
B. smaller
C. different
D. larger
ANSWER: C
25. A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher-
level protocol or application program (process) it must deliver incoming messages
A. connection
B. UDP
C. port
D. TCP
ANSWER: C
A. 516
B. 1024
C. 256
D. 512
ANSWER: A
27. The service access points in Session Layer are called ________________
A. Accessing point
B. activation point
D. both a and b
ANSWER: C
A. B-RELEASE. Request
B. R-RELEASE. request
C. S-RELEASE. request
D. A-RELEASE. request
ANSWER: C
29. A procedure included in the caller’s address space by the linker is known as ______.
A. local procedure
B. Universal procedure
C. addressing linker
D. both a and b
ANSWER: A
B. TCP
C. SMTP
D. SCTP
ANSWER: C
31. The sender SMTP establishes a TCP connection with the destination SMTP and then waits for
the server to send a ____ Service ready message..
A. 420
B. 320
C. 220
D. 120
ANSWER: C
A. 7
B. 5
C. 9
D. 4
ANSWER: A
33. To avoid ambiguity, the names assigned to machines must be carefully selected from a
______ with complete control over the binding between the names and IP addresses
A. Table
B. look up table
C. name space
D. name table
ANSWER: C
34. A name in the _______ name space is a sequence of characters without structure
A. address
B. Doman
C. Flat
D. Both a and b
ANSWER: C
35. The ____ namespace is based on a hierarchical and logical tree structure
A. DNS
B. Address
C. table
D. both a and b
ANSWER: A
36. The ______ are programs that run on DNS clients and DNS servers and that create queries to
extract information from name servers.
A. transporter
B. distributers
C. Resolvers
D. both a and b
ANSWER: C
37. The next header t is an _____ field of Authentication Header that identifies the type of what
follows.
A. 16-bit
B. 64-bit
C. 8-bit
D. 32-bit
ANSWER: C
38. The client code recognizes the SSL request and establishes a connection through TCP port
____ to the SSL code on the server
A. 1023
B. 402
C. 443
D. 8080
ANSWER: C
39. A _____ should be considered as a means to divide the world into two or more networks:
one or more secure networks and one or more non-secure networks.
A. firewall
B. ESP
C. SSL
D. both a and b
ANSWER: A
40. The _______ is used to provide integrity check, authentication, and encryption to IP
datagram’s.
A. UDP
B. Transport layer
C. ESP
D. SSL
ANSWER: C
41. In most Wide Area Networks, the subnet consists of two distinct components: which are
they?
ANSWER: A
42. There are two types of designs for communication subnets: they are …………
ANSWER: D
ANSWER: A
45. The Aloha protocol is an OSI _______ protocol for LAN networks with broadcast topology
A. layer 1
B. layer 4
C. layer 2
D. layer 3
ANSWER: C
46. Thus hamming code for the ASCII character “a” is given as ………………
A. 10111001111
B. 10111001000
C. 10111001001
D. 10111001
ANSWER: C
47. Coding schemes can be divided into two broad categories…………, ……………..
A. character coding, integer coding
ANSWER: D
48. The IP Control Protocol (IPCP) is the NCP for IP and is responsible for ………., …………., and
disabling the IP protocol on both ends of the point-to-point link.
A. Reframing , enabling
B. Deleting, reframing
C. configuring, enabling,
D. configuring, reframing
ANSWER: C
49. The _______ is a unidirectional protocol that has no flow or error control.
A. Simplest
B. Simplex
C. TCP/IP protocol
D. Simplest or Simplex
ANSWER: D
50. Flooding is also a……... algorithm, usually generates ………... of duplicate packets.
ANSWER: A
51. Distance Vector Routing is a……... routing algorithm, it consists of a data structure called a
………
ANSWER: C
A. source, destination
B. length, size
C. source, length
D. Size , destination
ANSWER: A
53. In process to process delivery, an application process is assigned a ………….., which is likely to
be …………….each time that process is started
C. source, mixed
D. Source, similar
ANSWER: A
54. The Intel format is called ………... and the SPARC format is called ……………..
ANSWER: A
55. The Post Office Protocol is an ………... protocol with both client (sender/receiver) and
…………...functions
C. UDP, transfer
D. TCP, server
ANSWER: A
56. A zone is a contiguous portion of a ………….. of the DNS namespace whose database records
exist and are managed in a……….. DNS database file.
A. domain, particular
B. Class, particular
C. tree, local
D. Domain, every
ANSWER: A
57. The DNS server that received the initial ……... query checks it’s ………… is called…………...
A. Recursive, zones
B. simple, zones
C. simple, class
D. Recursive, class
ANSWER: A
58. The purpose of a proxy server is to control exchange of data between the two networks at
…………..instead of ………..
ANSWER: A
59. PGP is one of the protocols used to provide security at the ……….. It is designed to create
authenticated and confidential ……….
ANSWER: A
60. State weather the following statement is true or false for Internetwork layer. 1).Other
internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is
the least important protocol in this layer 3). The internetwork layer, also called the internet
layer or the network layer, provides the “virtual network”
ANSWER: B
61. State weather the following statement is true or false for ISDN – Integrated Services Digital
Network ISDN is an effort to standardize subscriber services, provide user/network
interfaces 2). the goal of ISDN is to form a Local area network that provides Peer-to-Peer
connectivity over digital media 3). It is a set of protocols that combines digital telephony and
data transport services
ANSWER: A
62. State weather the following statement is true or false for Token Bus 1).It is a linear or tree-
shaped cable onto which the stations are attached. 2). the token propagates around the
logical ring, with only the token holder being permitted to transmit frames 3). In this token
bus arrangement The physical order in which the stations are connected to the cable is very
important.
ANSWER: D
63. Find the transmitted code if the frame is (MSB) 1101011011 (LSB) and generator polynomial
is x4 + x + 1.
A. 1101011011 1110
B. 1101011111 1110
C. 1101011011 1111
D. 1101011011
ANSWER: A
64. State weather the following statement is true or false for Point-to-Point Protocol 1). It is still
in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of
asynchronous lines have long been the mainstay for data communications. 3). Point-to-Point
Protocol (PPP) is a network-specific standard protocol with STD number 51.
ANSWER: D
65. State weather the following statement is true or false for Hierarchical Routing 1). In
hierarchical routing, the routers are divided into regions. 2) Each router is having the idea
about internal structure of other regions 3). Two level hierarchies may be insufficient hence
it may be necessary to group the regions into clusters.
ANSWER: D
66. State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a
routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a
connectionless, unreliable datagram protocol. 3). An IPV6 packet consists of an IPV6 header
and an IPV6 payload.
67. State weather the following statement is true or false for Stream Control Transmission
Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new
transport protocol at the same layer as TCP and UDP. 3). SCTP is a new reliable, message
oriented transport layer protocol.
ANSWER: D
68. State weather the following statement is true or false for Exception Reporting 1). If the user
runs into trouble, this trouble can be reported to the peer using a S-U-EXCEPTION-REPORT.
request primitive. 2). Exception reporting does not only apply to user-detected errors 3). The
service provider can generate an S-P-EXCEPTION-REPORT.indication to notify the user about
internal problems within the session layer.
ANSWER: A
69. State weather the following statement is true or false for Multipurpose Internet Mail
Extensions 1).The general syntax for MIME header fields is not the same as that for RFC
2822. 2).MIME header field names are never significant, but the cases of field values can b.
3). A MIME-compliant message must contain a header field with the following verbatim text:
MIME-Version: 1.0
ANSWER: A
70. State weather the following statement is true or false for Sendmail. 1).Sendmail is a
command-line tool designed for most UNIX-like operating systems. 2).It define a method of
transferring mail, and acts as a client/server that supports multiple mail protocols 3).
Sendmail exists in both open source and proprietary software packages.
ANSWER: A
71. ………………...is a minimal protocol that allows isolated hosts to link via TCP/IP over the
telephone network and ………………..uses a proposed international standard for transmitting
HDLC over asynchronous lines.
A. LCP, PPP
B. PPP, LCP
C. SLIP, PPP
D. PPP, SLIP
ANSWER: C
A. encryption, authentication.
B. encryption, decryption
C. encapsulation, translation
D. authentication, verification
ANSWER: A
A. DHCP, BOOTP
B. BOOTP, DHCP
C. RARP, BOOTP
D. DHCP, RARP
ANSWER: A
74. SMTP is based on …………………………………..delivary, contacts on well known port
number……………………………
A. host to host, 23
B. host to host, 25
C. end to end , 23
D. end to end, 80
ANSWER: B
75. State whether the following statements are true / false: 1) A fully qualified domain name
starts with a specific host and ends with a top-level domain. 2) Domain names are always
written as fully qualified domain names.
A. 1.T, 2.T
B. 1.T, 2.F
C. 1.F, 2.T
D. 1.F, 2.F
ANSWER: B
76. The……………………command can determine which interface is used on a system from the
messages displayed on the console during a boot.
A. dmesg
B. traceroute
C. ifconfig
D. finger
ANSWER: A
77. The most basic function of ifconfig command is assigning the …………….. Address.
A. Physical address
B. Hardware address
C. MAC address
D. IP address
ANSWER: D
78. In the TCP/IP protocol architecture, the Network Access Layer includes
………………………………...layers of the OSI Reference Model.
ANSWER: B
79. The …………………... option tells netstat to display the status of all configured network
interfaces.
A. -n
B. -i
C. either a or b
D. neither a nor b
ANSWER: B
ANSWER: D
81. A ………………………... is constructed manually by the system administrator using the route
command.
C. both a and b
D. neither a nor b
ANSWER: A
C. both a and b
D. neither a nor b
ANSWER: B
83. Routes are built automatically by………………….., manually by the system administrator, or
dynamically by routing protocols.
A. route
B. traceroute
C. ifconfig
D. netstat
ANSWER: C
84. The limited capability of this routing table is easily verified with the ………………………...
command.
A. ping
B. traceroute
C. route
D. netstat
ANSWER: A
85. Find out the components of DHCP: 1) A protocol that delivers host-specific configuration
parameters from a server to a host. 2) The client determines its own hardware address; this
is normally in a ROM on the hardware. 3) A mechanism for the allocation of temporary or
permanent network addresses to hosts.
A. 1,2
B. 1,3
C. 2,3
D. 1,2,3
ANSWER: B
86. The newer technique uses a distributed database system called ………………….. to translate
names to addresses.
A. DNS
B. IP
C. ARP
D. Telnet
ANSWER: A
A. 0.0.0.0
B. 127.0.0.1
C. 172.16.12.1
D. 255.0.0.0
ANSWER: C
ANSWER: A
A. ARP
B. RARP
C. DNS
D. DHCP
ANSWER: B
A.NSWER: D
91. The …………………... command can set or display the configuration values for a network
interface.
A. ping
B. traceroute
C. ifconfig
D. finger
ANSWER: C
92. The ………………………. protocol was originally developed as a mechanism to enable diskless
hosts to be remotely booted over a network as workstations.
A. RARP
B. ARP
C. DHCP
D. BOOTP
ANSWER: D
ANSWER: C
A. 100 meters
B. 200 meters
C. 500 meters
D. 1000meters
ANSWER: C
B. amplifiers
C. Bridge
D. Gateways
ANSWER: D
96. The kernel configuration file is normally changed only when you wish to:
ANSWER: D
97. The …………… command customizes the kernel configuration and generates the files needed
to compile and link the kernel.
A. ping
B. ifconfig
C. make config
D. finger
ANSWER: C
98. In a kernel configuration feature, . if ……………...is selected, the dynamically loadable module
is loaded the first time a call is made to the kernel that requires the module.
A. "m"
B. "Y"
C. "n"
D. "r"
ANSWER: A
99. At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking
to the kernel.
A. CONFIG_IP_ACCT
B. CONFIG_INET
C. CONFIG_INET_PCTCP
D. CONFIG_IP_FORWARD
ANSWER: B
A. host identification
C. location addressing
ANSWER: D
COMPUTER NETWORKS 2020-21
COMPUTER NETWORKS
Computer Networks
Course Outcome ( CO)
At the end of course , the student will be
able to understand
Explain basic concepts, OSI reference model, services and role of each layer of OSI model and
CO 1
TCP/IP, networks devices and transmission media, Analog and digital data transmission
CO 4 Explain the different Transport Layer function i.e. Port addressing, Connection Management,
Error control and Flow control mechanism.
CO 5 Explain the functions offered by session and presentation layer and their Implementation.
CO6 Explain the different protocols used at application layer i.e. HTTP, SNMP, SMTP, FTP,
TELNET and VPN.
DETAILED SYLLABUS
Unit Topic
1 University Academy
COMPUTER NETWORKS 2020-21
COMPUTER NETWORKS
Solved MCQ
1. Unit-1 ………………………………………………..……………………………….3
2. Unit-II……………………………………………………...……….…………...…….8
3. Unit-III..……………………………………………………...…………..….....…... 16
4. Unit-IV...………………………..…….………………………………………..…….23
5. Unit-V..…………………………………………………..……….....................…….28
2 University Academy
COMPUTER NETWORKS 2020-21
Unit-1
6. What is the central device in star topology? 11. The protocol data unit (PDU) for the
a. STP server application layer in the Internet stack is?
3 University Academy
COMPUTER NETWORKS 2020-21
15. Which protocol does HTTP (Hyper Text 20. A list of protocols used by a system, one
Transfer Protocol) - use for transferring web protocol per layer, is called ________
pages at the Transport layer a) protocol architecture
a. IP b) protocol stack
b. UDP c) protocol suite
c. TCP d) protocol system
d. ARP Answer: Option(b)
Answer: Option(c)
21. Connector RJ-45 contains?
16. There are 10 users plugged into a hub a. Two pins
running 10Mbps half-duplex.and a server b. Four pins
4 University Academy
COMPUTER NETWORKS 2020-21
5 University Academy
COMPUTER NETWORKS 2020-21
c. 6 c. Transport layer
d. 10 d. Link layer
Answer: b Answer: b
33. Which of the following layers is an addition 38. In OSI model, when data is sent from device
to OSI model when compared with TCP IP A to device B, the 5th layer to receive data at
model? B is _________
a. Application layer a. Application layer
b. Presentation layer b. Transport layer
c. Session layer c. Link layer
d. Session and Presentation layer d. Session layer
Answer: d Answer: d
39. In TCP IP Model, when data is sent from
34. Application layer is implemented in _______ device A to device B, the 5th layer to receive
a. End system data at B is ____________
b. NIC a. Application layer
c. Ethernet b. Transport layer
d. Packet transport c. Link layer
Answer: a d. Session layer
35. Transport layer is implemented in _________ Answer: a
a. End system 40. In the OSI model, as a data packet moves from
b. NIC the lower to the upper layers, headers are
c. Ethernet _______
d. Signal transmission a. Added
Answer: a b. Removed
36. The functionalities of the presentation layer c. Rearranged
include ____________ d. Randomized
a. Data compression Answer: b
b. Data encryption 41. Which of the following statements can be
c. Data description associated with OSI model?
d. All of the mentioned a. A structured way to discuss and easier
Answer: d update system components
37. Delimiting and synchronization of data b. One layer may duplicate lower layer
exchange is provided by __________ functionality
a. Application layer
b. Session layer
6 University Academy
COMPUTER NETWORKS 2020-21
7 University Academy
COMPUTER NETWORKS 2020-21
c. infrared
d. all of the mentioned
Answer: Option(d)
Unit-II
c. ARP (Address Resolution Protocol),
IEEE802.3
1. The two sublayers of a Data Link layer are d. All the above
a. LLC Logical Link Control Layer Answer: Option(d)
b. MAC Medium Access Control Layer
c. Both A and B
d. Data Layer 5. Which is the protocol that maps varying IP
Answer: Option(c) addresses to the Physical MAC Address of a
machine in a LAN network?
a. ARQ (Automatic Repeat Request)
2. The functions of a Logical Link Layer b. ARP (Address Resolution Protocol)
(LLC) are c. SLIP (Serial Line Internet Protocol)
a. Error control d. PLIP (Parallel Line Internet Protocol)
b. Flow control Answer: Option(b)
c. Creating and managing the
communication link between two 6. Which protocols adopted the standards of
devices with the help of the Transport HDLC (High Level Link Control) protocol?
layer. a. X.25 protocol as LAPB (Link Access
d. All the above Procedure Balanced, V.42 protocol as
Answer: Option(d) LAPM (Link Access Procedure for
Modems)
b. Frame Relay protocol as LAPF (Link
3. The types of data services offered by an Access Procedure for Frame Relay)
LLC (Logical Link Control) layer are c. ISDN (Integrated Services Digital
a. Connectionless which is fast and Network) protocol as LAPD (Link
unreliable Access Procedure on D channel)
b. Connection Oriented which is slow d. All the above
and reliable Answer: Option(d)
c. Both A and B
d. None 7. The Dialup connections to access the
Answer: Option(c) internet uses ___ protocol.
a. PPP (Point to Point protocol)
b. X.25 protocol
4. Choose the Protocols working in the Data c. PLIP protocol
Link Control Layer of OSI model below. d. None
a. ATM (Asynchronous Transfer Mode), Answer: Option(a)
Frame Relay
b. HDLC (High Level Data Link 8. Automatic repeat request error management
Control), SDLC (Synchronous Data mechanism is provided by ________
Link Control) a. logical link control sublayer
b. media access control sublayer
8 University Academy
COMPUTER NETWORKS 2020-21
c. network interface control sublayer 14. Which of the following is the multiple
d. application access control sublayer access protocol for channel access control?
Answer: Option(a) a. CSMA/CD
b. CSMA/CA
9. Header of a frame generally contains c. Both CSMA/CD & CSMA/CA
a. synchronization bytes d. HDLC
b. addresses Answer: Option(c)
c. frame identifier
d. all of the mentioned 15. The technique of temporarily delaying
Answer: Option(d) outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is
called ____________
10. Which sublayer of the data link layer a. piggybacking
performs data link functions that depend upon b. cyclic redundancy check
the type of medium? c. fletcher’s checksum
a. logical link control sublayer d. parity check
b. media access control sublayer Answer: Option(a)
c. network interface control sublayer
d. error control sublayer 16. Which of the following uses a very thin
Answer: Option(b) glass or plastic fiber through which pulses of
light travel?
11. CRC stands for __________
a. cyclic redundancy check a. Cat 1
b. code repeat check b. Optical fiber
c. code redundancy check c. Twisted pair
d. cyclic repeat check d. Coax
Answer: Option(a) Answer: Option(b)
9 University Academy
COMPUTER NETWORKS 2020-21
22. Which operational mode/s of HDLC a. only when no error occurs at the
support/s the balanced configuration by transmission level
governing point to point link connectivity in b. when retransmission of old packet in a
addition to the primary as well as secondary novel frame is necessary
functions performed by the station? c. only when station B receives frame
with errors
10 University Academy
COMPUTER NETWORKS 2020-21
11 University Academy
COMPUTER NETWORKS 2020-21
12 University Academy
COMPUTER NETWORKS 2020-21
46. How many bytes of data can be sent in 15 50. Consider a link with packet loss probability
seconds over a serial link with baud rate of of 0.2. What is the expected number of
9600 in asynchronous mode with odd parity transmissions it would take to transfer 200
and two stop bits in the frame? packets given that the stop and wait protocol
a. 10,000 bytes is used?
b. 12,000 bytes a. 125
c. 15,000 bytes b. 250
d. 27,000 bytes c. 225
13 University Academy
COMPUTER NETWORKS 2020-21
14 University Academy
COMPUTER NETWORKS 2020-21
15 University Academy
COMPUTER NETWORKS 2020-21
Unit-III
Answer: Option(c)
1. The network layer is concerned with
__________ of data.
a. bits
b. frames 6. Which of the following routing algorithms
c. packets can be used for network layer design?
d. bytes a. shortest path algorithm
Answer: Option(c) b. distance vector routing
2. Which one of the following is not a function
c. link state routing
of network layer? d. all of the mentioned
a. routing Answer: Option(b)
b. inter-networking 7. A subset of a network that includes all the
c. congestion control routers but contains no loops is called
d. error control ________
Answer: Option(d) a. spanning tree
b. spider structure
3. In virtual circuit network each packet c. spider tree
contains ___________ d. special tree
Answer: Option(a)
a. full source and destination address 8. Which one of the following algorithm is not
b. a short VC number used for congestion control?
c. only source address
d. only destination address a. traffic aware routing
Answer: Option(b) b. admission control
c. load shedding
d. routing information protocol
4. Which of the following is not correct in Answer: Option(d)
relation to multi-destination routing?
16 University Academy
COMPUTER NETWORKS 2020-21
17 University Academy
COMPUTER NETWORKS 2020-21
d. 128.64.0.0 b. Masking
Answer: Option(d) c. Fragmenting
22. How many versions available of IP? d. Hopping
Answer: Option(a)
a. 6 version
b. 4 version
c. 2 version 28. Which field/s of ICMPv6 packet header
d. 1 version has/have a provision of minimal integrity level
Answer: Option(c) concerning to verification for ICMP
23. The term IPv4 stands for? messages?
a. A & B
27. The ability of a single network to span
multiple physical networks is known as b. C & D
______ c. B& C
a. Subnetting
d. A & D
18 University Academy
COMPUTER NETWORKS 2020-21
a. 1005 ms
b. 1010 ms 36. Which of the following assertions is
c. 3000 ms FALSE about the Internet Protocol (IP)?
d. 3003 ms
Answer: Option(a) a. It is possible for a computer to have
multiple IP addresses
33. One of the header fields in an IP datagram b. IP packets from the same source to the
is the Time to Live (TTL) field. Which of the same destination can take different
following statements best explains the need for routes in the network
this field? c. IP ensures that a packet is discarded if
it is unable to reach its destination
a. It can be used to prioritize packets within a given number of hops
b. It can be used to reduce delays d. The packet source cannot set the
c. It can be used to optimize throughput route of an outgoing packets; the
d. It can be used to prevent packet route is determined only by the
looping routing tables in the routers on the
Answer: Option(d) way
Answer: Option(d)
19 University Academy
COMPUTER NETWORKS 2020-21
37. An organization is granted the block c. Reach agreement with other routers
130.34.12.64/26. It needs to have 4 subnets. about the network topology
Which of the following is not an address of d. All of the above
this organization? Answer: Option(d)
a. 130.34.12.124
b. 130.34.12.89 41. When a host on network A sends a message
c. 130.34.12.70 to a host on network B, which address does
d. 130.34.12.132 the router look at?
Answer: Option(d) a. Port
b. IP
38. An IP datagram of size 1000 bytes arrives c. Physical
at a router. The router has to forward this d. Subnet mask
packet on a link whose MTU (maximum Answer: Option(b)
transmission unit) is 100 bytes. Assume that 42. For n devices in a network, ________
the size of the IP header is 20 bytes. The number of duplex-mode links are required
number of fragments that the IP datagram will for a mesh topology.
be divided into for transmission is : a. n(n + 1)
b. n (n – 1)
a. 10 c. n(n + 1)/2
b. 50 d. n(n – 1)/2
c. 12 Answer: Option(d)
d. 13 43. __________ is a bit-oriented protocol for
communication over point-to-point and
Answer: Option(d) multipoint links.
a. Stop-and-wait
b. HDLC
39. In an IPv4 datagram, the M bit is 0, the
c. Sliding window
value of HLEN is 10, the value of total length
d. Go-back-N
is 400 and the fragment offset value is 300.
Answer: Option(c)
The position of the datagram, the sequence
44. In Challenge-Response authentication the
numbers of the first and the last bytes of the
claimant ________.
payload, respectively are
a. Proves that she knows the secret
a. Last fragment, 2400 and 2789 without revealing it
b. First fragment, 2400 and 2759 b. Proves that she doesn’t know the
c. Last fragment, 2400 and 2759 secret
d. Middle fragment, 300 and 689 c. Reveals the secret
Answer: Option(c) d. Gives a challenge
Answer: Option(a)
45. An organization is granted the block
40. Dynamic routing protocol enable routers to 130.34.12.64/26. It needs to have 4 subnets.
Which of the following is not an address of
a. Dynamically discover and maintain
this organization?
routes
a. 130.34.12.124
b. Distribute routing updates to other
b. 130.34.12.89
routers
c. 130.34.12.70
20 University Academy
COMPUTER NETWORKS 2020-21
d. 130.34.12.132 d. 10 Mbps
Answer: Option(d)
51. Dynamic routing protocol enable routers to
46. A pure ALOHA Network transmits 200 bit a. Dynamically discover and maintain
frames using a shared channel with 200 routes
Kbps bandwidth. If the system (all stations b. Distribute routing updates to other
put together) produces 500 frames per routers
second, then the throughput of the system is c. Reach agreement with other routers
______. about the network topology
a. 0.384 d. All of the above
b. 0.184
c. 0.286 Answer: Option(d)
d. 0.58 52. The address of a class B host is to be split
Answer: Option(b) into subnets with a 6-bit subnet number.
47. IPv6 does not support which of the What is the maximum number of subnets
following addressing modes? and the maximum number of hosts in each
a. unicast addressing subnet?
b. multicast addressing a. 62 subnets and 262142 hosts.
c. broadcast addressing b. 64 subnets and 262142 hosts.
d. anycast addressing c. 62 subnets and 1022 hosts.
d. 64 subnets and 1024 hosts
Answer: Option(c)
Answer: Option(c)
48. What is IP class and number of sub-
networks if the subnet mask is 255.224.0.0? 53. A network with bandwidth of 10 Mbps can
a. Class A, 3 pass only an average of 12,000 frames per
b. Class A, 8 minute with each frame carrying an average
c. Class B, 3 of 10,000 bits. What is the throughput of
d. Class B, 32 this network ?
a. 1 Mbps
Answer: Option(b) b. 2 Mbps
49. Which of the following is not a congestion c. 10 Mbps
policy at network layer? d. 12 Mbps
a. Flow Control Policy Answer: Option(b)
b. Packet Discard Policy 54. Suppose transmission rate of a channel is
c. Packet Lifetime Management Policy 32 kbps. If there are ‘8’ routes from source
d. Routing Algorithm to destination and each packet p contains
Answer: Option(a) 8000 bits. Total end to end delay in sending
50. A network with bandwidth of 10 Mbps can packet P is _____.
pass only an average of 15,000 frames per a. 2 sec
minute with each frame carrying an average b. 3 sec
of 8,000 bits. What is the throughput of this c. 4 sec
network? d. 1 sec
a. 2 Mbps Answer: Option(a)
b. 60 Mbps
c. 120 Mbps
21 University Academy
COMPUTER NETWORKS 2020-21
55. Which of the following routing technique / 59. In the TCP/IP protocol suite, which one of
techniques is / are used in distributed the following is NOT part of the IP header?
systems ? a. Fragment Offset
A. Fixed Routing b. Source IP address
B. Virtual Routing c. Destination IP address
C. Dynamic Routing d. Destination port number
Answer: Option(d)
a. A Only 60. In the network 200.10.11.144/27, the fourth
b. A and B only octet (in decimal) of the last IP address of
c. C only the network which can be assigned to a host
d. All A,B,C is ________
a. 158
Answer: Option(a) b. 255
56. Consider the given network implementation c. 222
scenario. For the given classful NID d. 223
199.10.20.0/24, the requirement is to create Answer: Option(a)
13 subnets. With given details, find the
range of first and last valid IP in 15th 61. Which one of the following fields of an IP
subnet. header is NOT modified by a typical IP
a. 199.10.20.208 to 199.10.20.222 router?
b. 199.10.20.225 to 199.10.20.238 a. Checksum
c. 199.10.20.193 to 199.10.20.206 b. Source address
d. Not of these c. Time to Live (TTL)
d. Length
Answer: Option(b) Answer: Option(b)
57. __________ do not take their decisions on 62. If a Company require 60 hosts then What is
measurements or estimates of the current the best possible subnet mask?
traffic and topology. a. 255.255.255.0
a. Static algorithms b. 255.255.255.192
b. Adaptive algorithms c. 255.255.225.224
c. Non - adaptive algorithms d. 225.225.255.240
d. Recursive algorithms Answer: Option(b)
Answer: Option(c)
63. The address resolution protocol (ARP) is
58. A subnet has been assigned a subnet mask used for
of 255.255.255.192. What is the maximum a. Finding the IP address from the DNS
number of hosts that can belong to this b. Finding the IP address of the default
subnet? gateway
a. 14 c. Finding the IP address that
b. 30 corresponds to a MAC address
c. 62 d. Finding the MAC address that
d. 126 corresponds to an IP address
Answer: Option(c)
Answer: Option(d)
22 University Academy
COMPUTER NETWORKS 2020-21
Unit-IV
24 University Academy
COMPUTER NETWORKS 2020-21
25 University Academy
COMPUTER NETWORKS 2020-21
26 University Academy
COMPUTER NETWORKS 2020-21
42. Which algorithm is used to shape the bursty 47. Silly Window Syndrome is related to
traffic into a fixed rate traffic by averaging a. Error during transmission
the data rate? b. File transfer protocol
a. solid bucket algorithm c. Degrade in TCP performance
b. spanning tree algorithm d. Interface problem
c. hocken helm algorithm
d. leaky bucket algorithm Answer: Option(c)
Answer: Option(d)
48. SSL is not responsible for
43. Four channels are multiplexed using TDM. a. Mutual authentication of client &
If each channel sends 100 bytes/second and server
we multiplex 1 byte per channel, then the b. Secret communication
bit rate for the link is __________. c. Data Integrity protection
a. 400 bps d. Error detection and correction
b. 800 bps Answer: Option(d)
c. 1600 bps 49. Which of the following is not a field in
d. 3200 bps TCP header?
Answer: Option(d) a. Sequence number
44. A device is sending out data at the rate of b. Fragment offset
2000 bps. How long does it take to send a c. Checksum
file of 1,00,000 characters ? d. Window size
a. 50 Answer: Option(b)
b. 200 50. To guarantee correction of upto t errors, the
c. 400 minimum Hamming distance d min in a
d. 800 block code must be ________.
Answer: Option(c) a. t+1
45. The TCP sliding window b. t−2
c. 2t−1
a. can be used to control the flow of d. 2t+1
information Answer: Option(d)
b. always occurs when the field value is
0
c. always occurs when the field value is
1
d. occurs horizontally
Answer: Option(a)
27 University Academy
COMPUTER NETWORKS 2020-21
Unit-V
1. The ____ layer is the network dialog
controller. 6. The functionalities of the presentation layer
a. network include ____________
b. transport a. Data compression
c. session b. Data encryption
d. presentation c. Data description
Answer: Option(c) d. All of the mentioned
Answer: Option(d)
2. The ____ layer establishes, maintains, and
synchronizes the interaction between 7. Encryption and decryption are functions of
communicating systems. which layer?
a. network a. transport
b. transport b. session
c. session c. application
d. presentation d. presentation
Answer: Option(c) Answer: Option(d)
3. The session layer lies between the 8. Which of the following layers of the OSI
______layer and the presentation layer. reference model is concerned with the syntax
a. network of data exchanged between application
b. transport entities?
c. data link a. Presentation layer
d. application b. Application layer
Answer: Option(b) c. Transportation layer
d. Session layer
4. The _____ layer lies between the session Answer: Option(a)
layer and he application layer.
a. network 9. In respect of OSI model, LANs implement
b. transport a. lower two layers
c. data link b. all seven layers
d. presentation c. upper five layers
Answer: Option(d) d. None of the above
Answer: Option(b)
5. The _____ layer uses data compression to
reduce the number of bits to be transmitted.
a. presentation 10. In OSI model, which of the following layer
b. network transforms information from machine format
c. data link into that understandable by user
d. application a. application
Answer: Option(a) b. session
28 University Academy
COMPUTER NETWORKS 2020-21
11. Which network component/s is/are 16. Which of the following layers is an
involved in the Presentation layer of an OSI addition to OSI model when compared with
model? TCP IP model?
a. Gateway a. Application layer
b. Multiplexer & Oscilloscope b. Presentation layer
c. Amplifier & Hub c. Session layer
d. All of the above d. Session and Presentation layer
Answer: Option(a) Answer: Option(d)
12. Which OSI layer assumes responsibility 17. In the OSI model, as a data packet moves
for managing network connections between from the lower to the upper layers, headers are
applications? a. Added
a. Network layer b. Removed
b. Data link layer c. Rearranged
c. Application layer d. Randomized
d. Session layer Answer: Option(b)
Answer: Option(d)
18. Which of the following statements can be
13. The _______ layer ensures interoperability associated with OSI model?
between communicating devices through a. A structured way to discuss and easier
transformation of data into a mutually agreed update system components
upon format. b. One layer may duplicate lower layer
functionality
a. network c. Functionality at one layer no way
b. presentation requires information from another
c. transport layer
d. data link d. It is an application specific network
Answer: Option(b) model
Answer: Option(b)
14. In OSI model, when data is sent from
device A to device B, the 5th layer to receive 19. In OSI model, session layer is responsible
data at B is _________ for
a. Application layer a. Recovery
b. Transport layer b. Check pointing
c. Link layer c. Both a and b
d. Session layer d. None of the above
Answer: Option(d) Answer: Option(c)
15. Delimiting and synchronization of data 20. In which layer of OSI client send request
exchange is provided by __________ to the server?
a. Application layer a. Application layer
b. Session layer b. Presentation layer
29 University Academy
COMPUTER NETWORKS 2020-21
30 University Academy
COMPUTER NETWORKS 2020-21
a. mail d. OPTION
b. pine Answer: Option(c)
c. Outlook & Netscape 34. Which language in WWW specifies a
d. All of the above web's way by describing three-
Answer: Option(c) dimensional objects?
a. HTML
31. Which phase/s of POP3 allow/s an user b. VRML
agent to retrieve the messages as well as c. XML
to mark the messages for deletion d. UML
purpose? Answer: Option(b)
35. Which field of cookie in WWW
a. Authorization Phase represents the server's directory structure
b. Transaction Phase by identifying the utilization of part
c. Update Phase associated with server's file tree?
d. All of the above
Answer: Option(b) a. Domain
b. Path
32. Consider the assertions given below. c. Content
Which among them prove to be beneficial d. Secure
for Persistent HTTP connections? Answer: Option(b)
A. Reduction in latency over the sub- 36. Which among the below mentioned
sequent requests protocols provides a mechanism of
B. Pipeline-oriented connection over the acquiring an IP address without manual
requests and responses intervention in addition to plug and play
C. Increase in number of packets due to type of networking?
TCP opens
D. Prevention in opening and closing of a. BOOTP
some TCP connections b. DHCP
c. Both a & b
a. A & B d. None of the above
b. C & D Answer: Option(b)
c. A & C
d. B & B 37. Which of the following layers of the OSI
Answer: Option(a) model is responsible for user interaction?
a. Layer 4
33. Which URL method of HTTP performs b. Layer 5
similar function as that of PUT method c. Layer 6
only with an exception of request d.Layer 7
comprising a list of differences that Answer: Option(d)
exhibit the necessity to get implemented
in the existing file? 38. What occurs in the session layer?
a. Data compression and encryption
a. POST b. MAC address are handled
b. GET c. binary to decimal conversion
c. PATCH d.sessions are created
31 University Academy
COMPUTER NETWORKS 2020-21
32 University Academy
COMPUTER NETWORKS 2020-21
33 University Academy
COMPUTER NETWORKS 2020-21
34 University Academy
COMPUTER NETWORKS 2020-21
Practice Set
Set-1
1. The computer network is D) Fiber Distributed Data Interface
A) Network computer with cable 8. Which of the following is an application
B) Network computer without cable layer service?
C) Both of the above
A) Network virtual terminal
D) None of the above
B) File transfer, access and management
2. FDDI used which type of physical
C) Mail service
topology?
D) All of the above
A) Bus 9. Which is the main function of transport
B) Ring layer?
C) Star
A) Node to node delivery
D) Tree
B) End to end delivery
3. FTP stands for
C) Synchronization
A) File transfer protocol d) Updating and maintaining routing tables
B) File transmission protocol 10. The .............. layer change bits onto
C) Form transfer protocol electromagnetic signals.
D) Form transmission protocol A) Physical
4. Ethernet system uses which of the
B) Transport
following technology.
C) Data Link
A) Bus D) Presentation
B) Ring 11. In mesh topology, relationship between
C) Star one device and another is ..............
D) Tree A) Primary to peer
5. Which of the following are the network B) Peer to primary
services?
C) Primary to secondary
A) File service D) Peer to Peer
B) Print service 12. The performance of data communications
C) Database service network depends on ..............
D) All of the above A) Number of users
6. If all devices are connected to a central
B) The hardware and software
hub, then topology is called
C) The transmission
A) Bus Topology D) All of the above
B) Ring Topology 13. Find out the OSI layer, which performs
C) Star Topology token management.
D) Tree Topology A) Network Layer
7. FDDI stands for
B) Transport Layer
A) Fiber Distributed Data Interface C) Session Layer
B) Fiber Data Distributed Interface D) Presentation Layer
C) Fiber Dual Distributed Interface
35 University Academy
COMPUTER NETWORKS 2020-21
Set-2
1. A network that needs human 7. Which of the following OSI
beings to manually route signals is layers correspond to TCP/IP's
called.... application layer?
A) Fiber Optic Network A) Application
B) Bus Network B) IP Address
C) T-switched network C) Session
D) Ring network D) All of the above
2. TCP/IP layer corresponds to
the OSI models to three layers. 8. Devices on one network can
A) Application communicate with devices on another
B) Presentation network via a .......
C) Session A) File Server
D) Transport B) Utility Server
3. Which of the transport layer C) Printer Server
protocols is connectionless? D) Gateway
A) UDP 9. A communication device that
B) TCP combines transmissions from several
C) FTP I/O devices into one line is a
D) Nvt A) Concentrator
4. Which of the following B) Modifier
applications allows a user to access C) Multiplexer
and change remote files without actual D) Full duplex file
transfer? 10. Which layers of the OSI
A) DNS determines the interface often system
B) FTP with the user?
C) NFS A) Network
D) Telnet B) Application
5. The data unit in the TCP/IP C) Data link
layer called a ..... D) Session
A) Message 11. Which of the following of the
B) Segment TCP/IP protocols is the used for
C) Datagram transferring files from one machine to
D) Frame another?
6. DNS can obtain the of A) FTP
host if its domain name is known and B) C) SNMP
vice versa. C) SMTP
A) Station address D) D) Rpe
B) IP address 12. In which OSI layers does the
C) Port address FDDI protocol operate?
D) Checksum A) Physical
37 University Academy
COMPUTER NETWORKS 2020-21
38 University Academy
COMPUTER NETWORKS 2020-21
Set-3
c. Both A and B
1. Which of the following is not the layer d. None of the above
of TCP/IP protocol?
a. Application Layer
b. Session Layer 6. Which is not the Regional Internet
c. Transport Layer Registers (RIR) of the following?
d. Internetwork layer a. American Registry for Internet
2. address use 7 bits for the <network> Numbers (ARIN)
and 24 bits for the <host> portion of b. Europeans Registry for
the IP Internet Numbers (ERIN)
a. address. c. Reseaux IP Europeans (RIPE)
b. Class A d. Asia Pacific Network
c. Class B Information Centre (APNIC)
d. Class C 7. Match the following IEEE No to their
e. Class D corresponding Name for IEEE 802
3. addresses are reserved for standards for LANs.
multicasting. i) 802.3 a) WiFi
a. Class B ii) 802.11 b) WiMa
b. Class C iii) 802.15.1 c) Ethernet
c. Class D iv) 802.16 d) Bluetooth
d. Class E a. i-b, ii-c, iii-d, iv-a
4. State the following statement is true or b. i-c, ii-d, iii-a, iv-b
false. c. i-c, ii-a, iii-d, iv-b
I. In class B addresses a total of d. i-b, ii-d, iii-c, iv-a
more than 1 billion addresses 8. was the first step in the evolution of
can be formed. Ethernet from a coaxial cable bus to
II. Class E addresses are reserved hub managed, twisted pair network.
for future or experimental use. a. Star LAN
a. True, False b. Ring LAN
b. True, True c. Mesh LAN
c. False, True d. All of the above
d. False, False 9. is the predominant form of Fast
5. Which of the following statement is Ethernet, and runs over two pairs of
true? category 5 or above cable.
I. An address with all bits 1 is a. 100 BASE-T
interpreted as all networks or all hosts. b. 100 BASE-TX
II. The class A network 128.0.0.0 is c. 100 BASE-T4
defined as the loopback network. d. 100 BASE-T2
a. i only 10. IEEE 802.3ab defines Gigabit
b. ii only Ethernet transmission over unshielded
39 University Academy
COMPUTER NETWORKS 2020-21
40 University Academy
COMPUTER NETWORKS 2020-21
d. Manual allocation
Answer:
1. B) Session Layer
2. A) Class A
3. C) Class D
4. B) True, True
5. A) i only
6. B) Europeans (ERIN)
7. C) i-c, ii-a, iii-d, iv-b
8. A) Star LAN
9. B) 100 BASE-TX
10. A) 1000 BASE-T
11. A) FDDI
12. D) All of the above
13. B) Fast Ethernet
14. A) S/NET
15. C) Subnet... number.
16. B) True, True
17. A) Static subnetting
18. D) All i, ii, iii, iv and v only
19. A) Address Protocol (ARP)
20. B) Static allocation
41 University Academy
COMPUTER NETWORKS 2020-21
Set-4
1. Which server computer that is d. all of above
configured to serve file transfer and storage,
data migration, file updates
synchronization? 5. Which of the following is not email
a. FTP Server. service?
b. Database Server a. Hotmail
c. File Server b. Gmail
d. None of above c. Yahoo
d. None of above
2. Which of the following is responsible
for approving standards and allocating 6. Which of the following application is
resources in the Internet? required to read your email in
a. Internet Architecture Board (IAB) Hotmail?
b. Internet Engineering Task Force (IETF) a. A computer with browser and internet
c. InterNIC connection
d. None of above b. Outlook Express or Microsoft Outlook
c. Eudora Pro
3. Which body in Internet provides the d. All of above
registration services to Internet
community? 7. Tim Berners Lee is credited for the
a. Internet Architecture Board (IAB) creation of
b. Internet Engineering Task Force (IETF) a. Web email system
c. InterNIC b. world wide web
d. None of above c. File Transfer Protocol
d. All of above
4. Which of the following is considered a
broad band communication 8. Error control is needed at the transport
channel? layer because of potential errors occurring
a. coaxial cable _____.
b. fiber optics cable a. from transmission line noise
c. microwave circuits b. in routers
42 University Academy
COMPUTER NETWORKS 2020-21
Answers
1.c
2.a
3.c
4.d
5.c
6.a
7.b
8.b
9.d
10.c
43 University Academy
COMPUTER NETWORKS 2020-21
Set-5
1. What is the powerful, centralized b. Internet Engineering Task Force
computer system that performs data (IETF)
storage and processing tasks on behalf c. InterNIC
of clients and other network devices ? d. None of above
a. Client
b. Host computer 5. Which body in Internet
c. Terminal provides the registration services to
d. Network Internet community?
a. Internet Architecture Board
2. A self-sufficient computer that (IAB)
acts as both a server and a client is b. Internet Engineering Task Force
known as (IETF)
a. Host c. InterNIC
b. Client d. None of above
c. Server
d. Peer 6. Who is responsible for
discussing and investigating the
3. A server computer that is operational and technical problems of
configured to serve file transfer and Internet?
storage, data migration, file updates a. Internet Architecture Board
synchronization is (IAB)
a. FTP Server b. Internet Engineering Task Force
b. Database Server (IETF)
c. File Server c. InterNIC
d. None of above d. None of above
4. Which of the following is 7. Which is the channel handle
responsible for approving standards moderate data volumes in transmission
and allocating resources in the rate between 110 to 9600 bps?
Internet? a. Narrowband channel
a. Internet Architecture Board b. Voice band channel
(IAB) c. Broadband channel
44 University Academy
COMPUTER NETWORKS 2020-21
Answers
1.b
2.d
3.c
4.a
5.c
6.b
7.b
8.c
45 University Academy
COMPUTER NETWORKS 2020-21
Set-6
1. A group of computers connected c. microwave transmission
together to communicate and share d. none of above
resources is known as
a. A computer network 5. The interactive transmission
b. A server of data within a time sharing system
c. A client may be best suited to
d. Authentication a. simplex lines
b. half-duplex lines
2. A high speed, high capacity c. full duplex lines
transmission medium that can carry d. biflex-lines
signals from multiple independent
network carrier is 6. Who owns and governs the
a. Narrowband channel Internet?
b. Voice band channel a. IAB
c. Broadband channel b. IETF
d. None of above c. InterNIC
d. None of above
3. A channel handle moderate
data volumes in transmission rate 7. Who is responsible for
between 110 to 9600 bps is discussing and investigating the
a. Narrowband channel operational and technical problems of
b. Voice band channel Internet?
c. Broadband channel a. Internet Architecture Board
d. None of above (IAB)
b. Internet Engineering Task Force
4. A form of wireless (IETF)
transmission in which signals are sent c. InterNIC
via pulses of infrared light d. None of above
a. radio networking
b. infrared transmission 8. Website is a collection of
46 University Academy
COMPUTER NETWORKS 2020-21
a. HTML documents
b. Graphics file
c. audio and video files
d. All of above
Answers
1.a
2.c
3.b
4.b
5.c
6.d
7.b
8.d
9.b
10.b
47 University Academy
COMPUTER NETWORKS 2020-21
Set-7
5.c 9.d
6.c 10.b
7.d
8.b
Set-8
1. A computer circuit board installed in c. microwave transmission
a computer so that it can be connected to a d. none of above
network?
a. NIC
b. Switch 7. A communications device that
c. RJ45 combines transmissions from several I/O
d. Hub devices into one line is a?
a. concentrator
2. A NIC card can be used for? b. modifier
a. FDDI c. multiplexer
b. Ethernet d. full-duplex line
c. Microwave
d. WiFi 8. UTP cable has ___ pair of wires in
it?
3. Which of the following is unbound a. 3
transmission media? b. 4
a. UTP c. 5
b. Co-axial d. 6
c. Microwave
d. Fiber Optics 9. Which of the following might not be
present in a computer network?
4. Which of the following memories a. NIC
needs refresh? b. Switch
a. SRAM c. MODEM
b. DRAM d. NOS
c. ROM
d. All of above 10. To connect two networks of similar
systems you will use a
5. What is the set of information that a. Bridge
defines the status of resources allocated to a b. Gateway
process? c. Router
a. Process control d. Any of above
b. ALU
c. Register Unit Answers
d. Process description 1.a
2.b
6. A form of wireless transmission in which 3.c
signals are sent via pulses of infrared light? 4.b
a. radio networking 5.d
b. infrared transmission 6.b
49 University Academy
COMPUTER NETWORKS 2020-21
7.c 9.c
8.b 10.a
Set -9
1. Which data communication method is c. 100 picowatts
used to transmit the data over a serial d. 10 miliwatts
communication link?
a. simplex
b. half-duplex 7. The synchronous modems are more
c. full-duplex costly than the asynchronous modems because
d. b and c a. they produce large volume of data
b. they contain clock recovery circuits
2. What is the minimum number of wires c. they transmit the data with stop and start
needed to send data over a serial bits
communication link layer? d. they operate with a larger bandwidth
a. 1
b. 2 8. Which of the following statement is
c. 4 correct?
d. 6 a. terminal section of a synchronous
3. Which of the following types of modem contains the scrambler
channels moves data relatively slowly? b. receiver section of a synchronous modem
a. wide band channel contains the scrambler
b. voice band challen c. transmission section of a synchronous
c. narrow band channel modem contains the scrambler
d. None of these d. control section of a synchronous modem
contains the scrambler
4. Most data communications involving
telegraph lines use: 9. In a synchronous modem, the digital-
a. simplex lines to-analog converter transmits signal to the
b. wideband channel a. equilizer
c. narrowband channel b. modulator
d. dialed service c. demodulator
d. terminal
5. A communications device that
combines transmissions from several I/O 10. Which of the following
devices into one line is a communications lines is best suited to
a. concentrator interactive processing applications?
b. modifier a. narrow band channel
c. multiplexer b. simplex lines
d. full-duplex line c. full duplex lines
d. mixed band channels
6. How much power (roughly) a light Answers
emitting diode can couple into an optical 1.c
fiber? 2.b
a. 100 microwatts 3.c
b. 440 microwatts 4.c
50 University Academy
COMPUTER NETWORKS 2020-21
5.c 8.c
6.a 9.a
7.b 10.c
Set-10
1. The interactive transmission of data b. multiplexer
within a time sharing system may be best c. concentrator
suited to d. controller
a. simplex lines 6. Which of the following signal is not
b. half-duplex lines standard RS-232-C signal?
c. full duplex lines a. VDR
d. biflex-lines b. RTS
c. CTS
2. Which of the following statement is d. DSR
incorrect?
a. The difference between synchronous and 7. Which of the following statement is
asynchronous transmission is the clocking incorrect?
derived from the data in synchronous a. Multiplexers are designed to accept data
transmission. from several I/O devices and transmit a unified
b. Half duplex line is a communication line stream of data on one communication line
in which data can move in two directions, but b. HDLC is a standard synchronous
not at the same time. communication protocol.
c. Teleprocessing combines c. RTS/CTS is the way the DTE indicates
telecommunications and DP techniques in that it is ready to transmit data and the way the
online activities DCW indicates that it is ready to accept data
d. Batch processing is the prefered d. RTS/CTS is the way the terminal
processing mode for telecommunication indicates ringing
operation.
8. Which of the following is an
3. Which of hte following is considered a advantage to using fiber optics data
broad band communication channel? transmission?
a. coaxial cable a. resistance to data theft
b. fiber optics cable b. fast data transmission rate
c. microwave circuits c. low noise level
d. all of above d. all of above
9. Which of the following is required to
4. Which of the following is not a communicate between two computers?
transmission medium? a. communications software
a. telephone lines b. protocol
b. coaxial cables c. communication hardware
c. modem d. all of above including access to
d. microwave systems transmission medium
5. Which of the following does not allow 10. The transmission signal coding
multiple uses or devices to share one method of TI carrier is called
communication line? a. Bipolar
a. doubleplexer b. NRZ
51 University Academy
COMPUTER NETWORKS 2020-21
c. Manchester
d. Binary
Answers
1.b
2.d
3.d
4.c
5.a
6.a
7.d
8.d
9.d
10.a
52 University Academy
COMPUTER NETWORKS 2020-21
Set-11
1. Why IP Protocol is considered as d. Forwards a packet to all outgoing links
unreliable? except the originated link
a. A packet may be lost
b. Packets may arrive out of order 7. The Internet is an example of
c. Duplicate packets may be generated a. Cell switched network
d. All of the above b. circuit switched network
c. Packet switched network
2. What is the minimum header size of d. All of above
an IP packet?
a. 16 bytes
b. 10 bytes 8. What does protocol defines?
c. 20 bytes a. Protocol defines what data is
d. 32 bytes communicated.
b. Protocol defines how data is
3. Which of following provides reliable communicated.
communication? c. Protocol defines when data is
a. TCP communicated.
b. IP d. All of above
c. UDP
d. All of the above 9. What is the uses of subnetting?
a. It divides one large network into several
4. What is the address size of IPv6 ? smaller ones
a. 32 bit b. It divides network into network classes
b. 64 bit c. It speeds up the speed of network
c. 128 bit d. None of above
d. 256 bit
5. What is the size of Network bits & 10. Repeater operates in which layer of
Host bits of Class A of IP address? the OSI model?
a. Network bits 7, Host bits 24 a. Physical layer
b. Network bits 8, Host bits 24 b. Data link layer
c. Network bits 7, Host bits 23 c. Network layer
d. Network bits 8, Host bits 23 d. Transport layer
53 University Academy
COMPUTER NETWORKS 2020-21
7.c
8.d
9.a
10.a
Set-12
1. Each IP packet must contain c. Network bit - 18, Host bit -16
a. Only Source address d. Network bit- 12, Host bit - 14
b. Only Destination address
c. Source and Destination address
d. Source or Destination address 7. The last address of IP address
represents
2. Bridge works in which layer of the a. Unicast address
OSI model? b. Network address
a. Appliation layer c. Broadcast address
b. Transport layer d. None of above
c. Network layer
d. Datalink layer
54 University Academy
COMPUTER NETWORKS 2020-21
3.a 8.b
4.a 9.a
5.d 10.d
6.a
7.c
55 University Academy