Computer Network MCQs

By: Prof. Fazal Rehman Shamil | Whatsapp:+923028700085

Computer Network MCQs

Some important Computer Network MCQs are mentioned here.

The standard documents of IETF are called
A. RCF
B. ID
C. RFC
D. Both A and B
E. None of these

Answer - Click Here:
C
When the information packet moves from the higher to lower layers in layer hierarchy, headers are.
A. Removed
B. Rearranged
C. Modified
D. Added
E. None of these
Answer - Click Here:
D
The format of data is called
A. Semantics
B. Struck
C. Syntax
D .Both A and B
E. None of the mentioned
Answer - Click Here:
C
Computer and a keyboard involves¬_________________ transmission to communicate
A. Automatic
B. Simplex
C. Half-duplex
D. Full-duplex
E. None of these
Answer - Click Here:
B
The first Network
A. ARPANET
B. CNNET
C. NSFNET
D. ASAPNET
E. None of these
Answer - Click Here:
A
________ physical path is used to travel massages form one place to another
A. Path
B. Protocol
C. Route
D. Medium
E. None of these
Answer - Click Here:
D
Which of this is not a network edge device?
A. Switch
B. PC
C. Smartphones
D. Servers
E. None of these
Answer - Click Here:
A
A set of rules that governs data communication
A. Standards
B. RFCs
C. Protocols
D. None of these
E. Both A and B
Answer - Click Here:
C

In which connection, three or more devices share a link
A. Unipoint
B. Point to point
C. Multipoint
D. None of these
E. Both A and C

Answer - Click Here:
C
When a variety of varied PC’s work in a single coherent system to its consumer, then it’s known as
A. computer network
B. networking system
C. distributed system
D. Both A and B
E. none of the mentioned
Answer - Click Here:
C
Two devices are in network if
A. a process is running on both devices
B. PIDs of the processes running of various devices area unit same
C. a method in one device is in a position exchange data with a method in another device
D. None of these
E. Both A and B
Answer - Click Here:
C
Which network is built on the top of other networks?
A. overlay network
B. prior network
C. chief network
D. prime network
E. None of these
Answer - Click Here:
A
In computer network nodes are
A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
E. Both A and C
F. None of these
Answer - Click Here:
D
The communication channel is shared by all the machines on the network in
A. unicast network
B. multicast network
C. None of these
D. broadcast network
E. None of these
Answer - Click Here:
D
Bluetooth is an example of
A. local area network
B. virtual private network
C. personal area network
D. Both A and B
E. none of these
Answer - Click Here:
C
Which device is used to forward packets b/w networks by processing the information included in the packet?
A. Router
B. Bridge
C. Firewall
D. Hub
E. All of these
F. None of these
Answer - Click Here:
A
The number of protocols used by a system, one protocol per layer, is known as
A. Protocol architecture
B. Protocol suite
C. Protocol stack
D. None of these
E. All of these
F. Both A and C
Answer - Click Here:
C
Network congestion occurs when______
A. When a system terminates
B. When connection between two nodes terminates
C. None of the mentioned
D. In case of traffic overloading
E. None of these
F. All of these
Answer - Click Here:
D
Which network is used to extend a private network across public networks?
A. Local area network
B. Enterprise private network
C. Storage area network
D. Virtual private network
E. None of these
F. All of these
Answer - Click Here:
D
Which one is not used as a constituent of the residential telephone line?
A. A low-speed downstream channel
B. A high-speed downstream channel
C. A medium-speed downstream channel
D. None of these
E. All of these
Answer - Click Here:
A
DSL telco gives which services from the following
A. Wired phone access
B. ISP
C. None of the mentioned
D. All of the mentioned
Answer - Click Here:
D
_______ is the function of DSLAM is
A. Convert digital signals into analog signals
B. Convert analog signals into digital signals
C. Amplify digital signals
D. None of these
E. All of these
Answer - Click Here:
B
Which term is not associated with DSL
A. DSLAM
B. CMTS
C. CO
D. Splitter
E. All of these
F. None of these
Answer - Click Here:
B
HFC contains_______.
A. Fiber cable
B. Coaxial cable
C. Both Fiber cable and Coaxial cable
D. None of these
Answer - Click Here:
B
Which of the following statement is not applicable for cable internet access?
A. It is a shared broadcast medium
B. It includes HFCs
C. Analog signal is converted to digital signal in DSLAM
D. Cable modem connects home PC to Ethernet port
Answer - Click Here:
C
Among the optical-distribution architectures that are essentially switched Ethernet is
A. PON
B. NON
C. AON
D. None of these
E. All of these
Answer - Click Here:
C
StarBand provides
A. Satellite access
B. FTTH internet access
C. Cable access
D. Telephone access
E. None of these
Answer - Click Here:
A
Home Access is provided by
A. DSL
B. FTTP
C. Cable
D. All of these
E. None of these
Answer - Click Here:
D
ONT is connected to splitter using
A. Optical cable
B. High-speed fiber cable
C. HFC
D. None of these
E. All of these
Answer - Click Here:
A
Ans=A
There are ______ number of layers in the internet protocol stack.
A.6
B. 7
C. 5
D. None of these
E. All of these
Answer - Click Here:
C
Ans=C
How many layers are there in the ISO OSI reference model?
A. 5
B. 7
C. 6
D. 15
E. 9
F. None of these
Answer - Click Here:
B
This layer is associate degree addition to OSI model in comparison with the Transmission control protocol Information science model
A. Application layer
B. Presentation layer
C. Session layer
D. Both Session and Presentation layer
E. None of these
Answer - Click Here:
D
Application layer is implemented in
A. NIC
B. Ethernet
C. End system
D. None of these
E. All of these
Answer - Click Here:
C
5. The transport layer is implemented in
A. NIC
B. End system
C. Ethernet
D. None of these
E. All of these
Answer - Click Here:
B
The functionalities of the presentation layer include
A. Data compression
B. Data encryption
C. Data description
D. All of the mentioned
E. None of these
Answer - Click Here:
D
Delimiting and synchronization of data exchange is provided by
A. Application layer
B. Transport layer
C. Link-layer
D. Session layer
E. All of these
F. None of these
Answer - Click Here:
D
In the OSI model, when data is sent from device A to the  device B, the 5th layer to receive data at B is
A. Application layer
B. Session layer
C. Link-layer
D. Transport layer
E. All of these
F. None of these
Answer - Click Here:
B
In TCP IP Model, once information is distributed from device A to devise B, the fifth layer to receive information at B is
A. Link layer
B. Transport layer
C. Application layer
D. Session layer
E. None of these
F. All of these
Answer - Click Here:
C
In the OSI model, as an information packet moves from the lower to the higher layers, headers can
A. Added
B. Rearranged
C. Removed
D. None of these
E. All of these
Answer - Click Here:
C
OSI stands for
A. Optical service implementation
B. Operating system interface
C. Open system interconnection
D. None of the mentioned
E. All of These
Answer - Click Here:
C
Who many layers are there in the OSI model
A. 7
B. 5
C. 6
D. 4
E. 9
F.12
Answer - Click Here:
A
OSI model has a layer which is not in the TCP/IP model.
A. Application layer
B. Transport layer
C. Session layer
D. None of these
E. All of these
Answer - Click Here:
C
________ layer links the user support and network layers .
A. Transport layer
B. Datalink layer
C. Session layer
D. Network layer
E. All of these
F. None of these
Answer - Click Here:
A
TCP/IP uses _____ address in an internet employing
A. Physical address and logical address
B. Port address
C. Specific address
D. All of these
E. None of these
Answer - Click Here:
D
TCP/IP model has developed _____ the OSI model.
A. Simultaneous to
B. After
C. Prior to
D. None of these
E. All of these
Answer - Click Here:
C
_____ layer is liable for a method to method delivery.
A. Network layer
B. Session layer
C. Transport layer
D. Datalink layer
E. All of these
F. None of these
Answer - Click Here:
C
The address which is used to identify a process on a host
A. physical address
B. port address
C. logical address
D. specific address
E. None of these
F. All of these
Answer - Click Here:
B
_____layer provides services to the user.
A. Presentation layer
B. Session layer
C. Application layer
D. None of these
E. All of these
Answer - Click Here:
C
ANS=C
The rate of transmission is decided by_____ layer.
A. Network layer
B. Transport layer
C. Datalink layer
D. Physical layer
E. None of these
F. All of these
Answer - Click Here:
D
_____ transmission media has the highest speed in the network.
A. Coaxial cable
B. Twisted pair cable
C. Optical fiber
D. Electrical cable
E. All of these
F. None of these
Answer - Click Here:
C
Ans=C
Which type of modulation is used to send data over guided and unguided media as an analog signal?
A. Frequency modulation
B. Amplitude modulation
C. Digital modulation
D. Phase modulation
E. All of these
F. None of these
Answer - Click Here:
C
The portion of the physical layer that interfaces with the media access management sub-layer are known as.
A. Physical signaling sub-layer
B. Physical data sub-layer
C. Physical address sub-layer
D. All of these
E. None of these
Answer - Click Here:
A
Ans=A
Physical layer provides
A. Mechanical specifications of electrical connectors and cables
B. Electrical specification of transmission line signal level
C. Specification for IR over optical fiber
D. All of these
E. Both A and B
F. None of these
Answer - Click Here:
D
In asynchronous serial communication, the physical layer provides
The physical layer provides____________ in Asynchronous serial communication.
A. Start and stop signaling
B. Flow control
C. Both A and B
D. None of the mentioned
Answer - Click Here:
C
Ans =C
The physical layer is responsible for
A. Line coding
B. Channel coding
C. Modulation
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
E
The physical layer interprets logical communication requests from the particular into hardware-specific operations.
A. Application layer
B. Network layer
C. Transport layer
D. Datalink layer
E. Both A and B
F. None of these
Answer - Click Here:
D
A single channel is shared by multiple signals by
A. Multiplexing
B. Digital modulation
C. Analog modulation
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
A
Which type of wave is used for wireless transmission?
A. Radio waves
B. Microwaves
C. Infrared
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
E
The data link layer is responsible for taking the packets from________ and encapsulating them into frames for transmission.
A. Physical layer
B. Network layer
C. Transport layer
D. Application layer
E. All of these
F. None of these
Answer - Click Here:
B
Datalink layer cannot perform _____ task.
A. framing
B. channel coding
C. flow control
D. error control
E. All of these
F. None of these
Answer - Click Here:
B
Which sub-layer of the information link layer performs circuit functions that depend on the kind of medium?
A. Media access control sublayer
B. Logical link control sublayer
C. Network interface control sublayer
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
A
The header of a frame generally contains
A. Synchronization bytes
B. Addresses
C. Frame identifier
D. Both A and C
E. All of these
F. None of these
Answer - Click Here:
E
When two or more bits in information has been changed during the transmission, the error is known as?
A. Random error
B. Inverted error
C. Burst error
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
C
CRC stands for
A. Code redundancy check
B. Code repeat check
C. Cyclic redundancy check
D. Cyclic repeat check
E. All of these
F. None of these
Answer - Click Here:
C
Which one among the subsequent may be a data link protocol?
A. Ethernet
B. Point to point protocol
C. HDLC
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
E
The network layer concerns with
A. Bits
B. Frames
C. Packets
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
C
Network layer does not contain________ function?
A. Routing
B. Inter-networking
C. Congestion control
D. Both A and C
E. All of these
F. None of these
Answer - Click Here:
F
Ans=F
The four-byte IP address consists of
A. Network address
B. Host address
C. Both A and B
D. All of these
F. None of these
Answer - Click Here:
C
Each packets contains________ in virtual circuit network.
A. Full source and destination address
B. Only destination address
C. Only source address
D. A short VC number
E. Both A and B
F. None of these
Answer - Click Here:
D
In network layer design which of the routing algorithm is used?
A. Shortest path algorithm
B. Distance vector routing
C. Link state routing
D. Both A and C
E. All of these
F. None of these
Answer - Click Here:
E
Multi-destination routing
A. Data is not sent by packets
B. Contains the list of all destinations
C. Is same as broadcast routing
D. Both B and C
E. All of these
D. None of these
Answer - Click Here:
A
O //A subset of a network that includes all the routers but contains no loops is called
a) spanning-tree
b) spider structure
c) spider tree
d) none of the mentioned
C// A subset of a network that includes all the routers but contains no loops is called
A. Spider tree
B. Spider structure
C. Spanning tree
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
C
For congestion control which algorithm is not used?
A. Traffic aware routing
B. Admission control
C. Load shedding
D. Both A and C
E. All of these
F. None of these
Answer - Click Here:
F
In internet the network layer protocol is_________
A. Ethernet
B. Hypertext transfer protocol
C. Internet protocol
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
C
ICMP is primarily used for
A. Error and diagnostic functions
B. Addressing
C. Forwarding
D. Both B and C
E. All of these
F. None of these
Answer - Click Here:
A
Ans=A
An endpoint of an inter-process communication flow across a computer network is called
A. Port
B. Pipe
C. Socket
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
C
windows socket-style API is know as________
A. sock
B. wins
C. Winsock
D. Both A and B
E. All of these
D. None of these
Answer - Click Here:
C
Which of the following is the TCP name of a transport service access point?
A. Node
B. Pipe
C. Port
D. Both A and C
E. All of these
F. None of these
Answer - Click Here:
C
Transport layer protocols deals with_________
A. Application to application communication
B. Node to node communication
C. The process to process communication
D. Both A and C
E. All of these
D. None of these
Answer - Click Here:
C
Physical or logical arrangement of the network is Called
A. Networking
B. Routing
C. Topology
D. Both A and C
E. All of these
F. None of these
Answer - Click Here:
C
In which topology there is a central controller or hub?
A. Bus
B. Mesh
C. Ring
D. Star
E. All of these
F. None of these
Answer - Click Here:
D
which of the following topology requires multipoint connection
A. Star
B. Bus
C. Ring
D. Mesh
E. All of these
F. None of these
Answer - Click Here:
B
which of the following Data communication system is responsible for spanning states, countries, or the whole world is ________
A. WAN
B. LAN
C. MAN
D. Both A and B
E. All of these
D. None of these
Answer - Click Here:
A

SET 2: Networking MCQs

1. Which of the following is provided IPSec designed security?
A. session layer
B. application layer
C.  network layer
D.  transport layer
E. All of these
F. None of these

Answer - Click Here:
C

2_____________of the tunnel mode IPsec protects
A. Entire IP packet
B.  IP payload
C. IP header
D.  None of the mentioned
E. All of these
F. None of these

Answer - Click Here:
C

3.Firewall works as a Network layer of____________.
A.  packet filter
B. frame filter
C. both frame filter and packet filter
D. none of the mentioned
E. All of these
F. None of these

Answer - Click Here:
C

4.which of the following is used to WPA2 security in
A. ethernet
B. wi-fi
C. Bluetooth

D. none of the mentioned
E. All of these
F. Both A and B

Answer - Click Here:
B

5. Pretty good privacy (PGP) is used for __________.
A. browser security
B. FTP security
C. email security
D. none of the mentioned
E. All of these
F. Both A and B

Answer - Click Here:
C

6: Which of the following is Confidentiality with asymmetric-key cryptosystem has its own
A. Problems
B. Entities
C. Data
D. Problems
E. Translator
F. All of these

Answer - Click Here:
A

7: A message-digest SHA-l has
A. 820 bits
B. 160 bits
C. 512 bits
D. 628 bits
E. All of these
F. None of these
Answer - Click Here:
B

8: Service beyond Message authentication is a
A. Message Sending
B. Message Confidentiality
C. Message Integrity
D. Message Splashing
E. All of these
F. None of these
Answer - Click Here:
C

9: Document, receiver creates to check integrity of a message, to the_____________.
A. Finger Print
B. Hash-Table
C. HashTag
D. HyperText
E. All of these
F. None of these

Answer - Click Here:
C

10: which of the following is a digital signature needs a Private-key system
A. Shared-key system
B. Public-key system
C. All of them
D. All of these
E. None of these
Answer - Click Here:
B

11: which of the following is a correct Aberavationn MAC?
A. Message authentication cipher
B. Message authentication code
C. Message arbitrary connection
D. Message authentication control
E. All of these
F. None of these

Answer - Click Here:
B

12: which of the following is using for Message confidentiality
A. Asymmetric-Key
B. Cipher Text
C. Cipher
D. Symmetric-Key
E. All of these
F. None of these
Answer - Click Here:
A

13: Both document and fingerprint are to preserve the integrity of a document
A. Needed
B. Unimportant
C. Not Used
D. Not needed
E. All of these
F. None of these
Answer - Click Here:
A

14: When data were sent arrive at receiver exactly as they, its called
A. Message Confidentiality
B. Message Sending
C. Message Integrity
D. Message Splashing
E. All of these
F. None of these
Answer - Click Here:
C

15: Which one is the correct according to the Message digest needs to be
A. kept secret
B. public
C. private
D. alone
E. All of these
F. None of these
Answer - Click Here:
A

16: In Message Integrity the message digest needs to be ___________.
A. High
B. Secret
C. Low
D. Constant 0
E. All of these
F. None of these

Answer - Click Here:
B

17: Message confidentiality means that sender and receiver expect__________________.
A. Nonrepudiation
B. Integrity
C. Confidentiality
D. Authentication
E. All of these
F. None of these
Answer - Click Here:
C

18: Message are encrypted by the sender site and decrypted at the_______________.
A. Conferencing
B. Sender Site
C. Site
D. Receiver site
E. All of these
F. None of these

Answer - Click Here:
D

19: inverse of the Period is _______________.
A. Signals
B. Frequency
C. Phase
D. Amplitude
E. All of these
F. None of these
Answer - Click Here:
B

20: If the signal changes what is the effect of its frequency is:
A. Infinite
B. Zero
C. Maximum
D. All of these
E. None of these
Answer - Click Here:
B


Topic Covered

Computer Network MCQs.