Computer Network MCQs
Computer Network MCQs
Some important Computer Network MCQs are mentioned here.
The standard documents of IETF are called
A. RCF
B. ID
C. RFC
D. Both A and B
E. None of these
When the information packet moves from the higher to lower layers in layer hierarchy, headers are.
A. Removed
B. Rearranged
C. Modified
D. Added
E. None of these
The format of data is called
A. Semantics
B. Struck
C. Syntax
D .Both A and B
E. None of the mentioned
Computer and a keyboard involves¬_________________ transmission to communicate
A. Automatic
B. Simplex
C. Half-duplex
D. Full-duplex
E. None of these
The first Network
A. ARPANET
B. CNNET
C. NSFNET
D. ASAPNET
E. None of these
________ physical path is used to travel massages form one place to another
A. Path
B. Protocol
C. Route
D. Medium
E. None of these
Which of this is not a network edge device?
A. Switch
B. PC
C. Smartphones
D. Servers
E. None of these
A set of rules that governs data communication
A. Standards
B. RFCs
C. Protocols
D. None of these
E. Both A and B
In which connection, three or more devices share a link
A. Unipoint
B. Point to point
C. Multipoint
D. None of these
E. Both A and C
When a variety of varied PC’s work in a single coherent system to its consumer, then it’s known as
A. computer network
B. networking system
C. distributed system
D. Both A and B
E. none of the mentioned
Two devices are in network if
A. a process is running on both devices
B. PIDs of the processes running of various devices area unit same
C. a method in one device is in a position exchange data with a method in another device
D. None of these
E. Both A and B
Which network is built on the top of other networks?
A. overlay network
B. prior network
C. chief network
D. prime network
E. None of these
In computer network nodes are
A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
E. Both A and C
F. None of these
The communication channel is shared by all the machines on the network in
A. unicast network
B. multicast network
C. None of these
D. broadcast network
E. None of these
Bluetooth is an example of
A. local area network
B. virtual private network
C. personal area network
D. Both A and B
E. none of these
Which device is used to forward packets b/w networks by processing the information included in the packet?
A. Router
B. Bridge
C. Firewall
D. Hub
E. All of these
F. None of these
The number of protocols used by a system, one protocol per layer, is known as
A. Protocol architecture
B. Protocol suite
C. Protocol stack
D. None of these
E. All of these
F. Both A and C
Network congestion occurs when______
A. When a system terminates
B. When connection between two nodes terminates
C. None of the mentioned
D. In case of traffic overloading
E. None of these
F. All of these
Which network is used to extend a private network across public networks?
A. Local area network
B. Enterprise private network
C. Storage area network
D. Virtual private network
E. None of these
F. All of these
Which one is not used as a constituent of the residential telephone line?
A. A low-speed downstream channel
B. A high-speed downstream channel
C. A medium-speed downstream channel
D. None of these
E. All of these
DSL telco gives which services from the following
A. Wired phone access
B. ISP
C. None of the mentioned
D. All of the mentioned
_______ is the function of DSLAM is
A. Convert digital signals into analog signals
B. Convert analog signals into digital signals
C. Amplify digital signals
D. None of these
E. All of these
Which term is not associated with DSL
A. DSLAM
B. CMTS
C. CO
D. Splitter
E. All of these
F. None of these
HFC contains_______.
A. Fiber cable
B. Coaxial cable
C. Both Fiber cable and Coaxial cable
D. None of these
Which of the following statement is not applicable for cable internet access?
A. It is a shared broadcast medium
B. It includes HFCs
C. Analog signal is converted to digital signal in DSLAM
D. Cable modem connects home PC to Ethernet port
Among the optical-distribution architectures that are essentially switched Ethernet is
A. PON
B. NON
C. AON
D. None of these
E. All of these
StarBand provides
A. Satellite access
B. FTTH internet access
C. Cable access
D. Telephone access
E. None of these
Home Access is provided by
A. DSL
B. FTTP
C. Cable
D. All of these
E. None of these
ONT is connected to splitter using
A. Optical cable
B. High-speed fiber cable
C. HFC
D. None of these
E. All of these
Ans=A
There are ______ number of layers in the internet protocol stack.
A.6
B. 7
C. 5
D. None of these
E. All of these
Ans=C
How many layers are there in the ISO OSI reference model?
A. 5
B. 7
C. 6
D. 15
E. 9
F. None of these
This layer is associate degree addition to OSI model in comparison with the Transmission control protocol Information science model
A. Application layer
B. Presentation layer
C. Session layer
D. Both Session and Presentation layer
E. None of these
Application layer is implemented in
A. NIC
B. Ethernet
C. End system
D. None of these
E. All of these
5. The transport layer is implemented in
A. NIC
B. End system
C. Ethernet
D. None of these
E. All of these
The functionalities of the presentation layer include
A. Data compression
B. Data encryption
C. Data description
D. All of the mentioned
E. None of these
Delimiting and synchronization of data exchange is provided by
A. Application layer
B. Transport layer
C. Link-layer
D. Session layer
E. All of these
F. None of these
In the OSI model, when data is sent from device A to the device B, the 5th layer to receive data at B is
A. Application layer
B. Session layer
C. Link-layer
D. Transport layer
E. All of these
F. None of these
In TCP IP Model, once information is distributed from device A to devise B, the fifth layer to receive information at B is
A. Link layer
B. Transport layer
C. Application layer
D. Session layer
E. None of these
F. All of these
In the OSI model, as an information packet moves from the lower to the higher layers, headers can
A. Added
B. Rearranged
C. Removed
D. None of these
E. All of these
OSI stands for
A. Optical service implementation
B. Operating system interface
C. Open system interconnection
D. None of the mentioned
E. All of These
Who many layers are there in the OSI model
A. 7
B. 5
C. 6
D. 4
E. 9
F.12
OSI model has a layer which is not in the TCP/IP model.
A. Application layer
B. Transport layer
C. Session layer
D. None of these
E. All of these
________ layer links the user support and network layers .
A. Transport layer
B. Datalink layer
C. Session layer
D. Network layer
E. All of these
F. None of these
TCP/IP uses _____ address in an internet employing
A. Physical address and logical address
B. Port address
C. Specific address
D. All of these
E. None of these
TCP/IP model has developed _____ the OSI model.
A. Simultaneous to
B. After
C. Prior to
D. None of these
E. All of these
_____ layer is liable for a method to method delivery.
A. Network layer
B. Session layer
C. Transport layer
D. Datalink layer
E. All of these
F. None of these
The address which is used to identify a process on a host
A. physical address
B. port address
C. logical address
D. specific address
E. None of these
F. All of these
_____layer provides services to the user.
A. Presentation layer
B. Session layer
C. Application layer
D. None of these
E. All of these
ANS=C
The rate of transmission is decided by_____ layer.
A. Network layer
B. Transport layer
C. Datalink layer
D. Physical layer
E. None of these
F. All of these
_____ transmission media has the highest speed in the network.
A. Coaxial cable
B. Twisted pair cable
C. Optical fiber
D. Electrical cable
E. All of these
F. None of these
Ans=C
Which type of modulation is used to send data over guided and unguided media as an analog signal?
A. Frequency modulation
B. Amplitude modulation
C. Digital modulation
D. Phase modulation
E. All of these
F. None of these
The portion of the physical layer that interfaces with the media access management sub-layer are known as.
A. Physical signaling sub-layer
B. Physical data sub-layer
C. Physical address sub-layer
D. All of these
E. None of these
Ans=A
Physical layer provides
A. Mechanical specifications of electrical connectors and cables
B. Electrical specification of transmission line signal level
C. Specification for IR over optical fiber
D. All of these
E. Both A and B
F. None of these
In asynchronous serial communication, the physical layer provides
The physical layer provides____________ in Asynchronous serial communication.
A. Start and stop signaling
B. Flow control
C. Both A and B
D. None of the mentioned
Ans =C
The physical layer is responsible for
A. Line coding
B. Channel coding
C. Modulation
D. Both A and B
E. All of these
F. None of these
The physical layer interprets logical communication requests from the particular into hardware-specific operations.
A. Application layer
B. Network layer
C. Transport layer
D. Datalink layer
E. Both A and B
F. None of these
A single channel is shared by multiple signals by
A. Multiplexing
B. Digital modulation
C. Analog modulation
D. Both A and B
E. All of these
F. None of these
Which type of wave is used for wireless transmission?
A. Radio waves
B. Microwaves
C. Infrared
D. Both A and B
E. All of these
F. None of these
The data link layer is responsible for taking the packets from________ and encapsulating them into frames for transmission.
A. Physical layer
B. Network layer
C. Transport layer
D. Application layer
E. All of these
F. None of these
Datalink layer cannot perform _____ task.
A. framing
B. channel coding
C. flow control
D. error control
E. All of these
F. None of these
Which sub-layer of the information link layer performs circuit functions that depend on the kind of medium?
A. Media access control sublayer
B. Logical link control sublayer
C. Network interface control sublayer
D. Both A and B
E. All of these
F. None of these
The header of a frame generally contains
A. Synchronization bytes
B. Addresses
C. Frame identifier
D. Both A and C
E. All of these
F. None of these
When two or more bits in information has been changed during the transmission, the error is known as?
A. Random error
B. Inverted error
C. Burst error
D. Both A and B
E. All of these
F. None of these
CRC stands for
A. Code redundancy check
B. Code repeat check
C. Cyclic redundancy check
D. Cyclic repeat check
E. All of these
F. None of these
Which one among the subsequent may be a data link protocol?
A. Ethernet
B. Point to point protocol
C. HDLC
D. Both A and B
E. All of these
F. None of these
The network layer concerns with
A. Bits
B. Frames
C. Packets
D. Both A and B
E. All of these
F. None of these
Network layer does not contain________ function?
A. Routing
B. Inter-networking
C. Congestion control
D. Both A and C
E. All of these
F. None of these
Ans=F
The four-byte IP address consists of
A. Network address
B. Host address
C. Both A and B
D. All of these
F. None of these
Each packets contains________ in virtual circuit network.
A. Full source and destination address
B. Only destination address
C. Only source address
D. A short VC number
E. Both A and B
F. None of these
In network layer design which of the routing algorithm is used?
A. Shortest path algorithm
B. Distance vector routing
C. Link state routing
D. Both A and C
E. All of these
F. None of these
Multi-destination routing
A. Data is not sent by packets
B. Contains the list of all destinations
C. Is same as broadcast routing
D. Both B and C
E. All of these
D. None of these
O //A subset of a network that includes all the routers but contains no loops is called
a) spanning-tree
b) spider structure
c) spider tree
d) none of the mentioned
C// A subset of a network that includes all the routers but contains no loops is called
A. Spider tree
B. Spider structure
C. Spanning tree
D. Both A and B
E. All of these
F. None of these
For congestion control which algorithm is not used?
A. Traffic aware routing
B. Admission control
C. Load shedding
D. Both A and C
E. All of these
F. None of these
In internet the network layer protocol is_________
A. Ethernet
B. Hypertext transfer protocol
C. Internet protocol
D. Both A and B
E. All of these
F. None of these
ICMP is primarily used for
A. Error and diagnostic functions
B. Addressing
C. Forwarding
D. Both B and C
E. All of these
F. None of these
Ans=A
An endpoint of an inter-process communication flow across a computer network is called
A. Port
B. Pipe
C. Socket
D. Both A and B
E. All of these
F. None of these
windows socket-style API is know as________
A. sock
B. wins
C. Winsock
D. Both A and B
E. All of these
D. None of these
Which of the following is the TCP name of a transport service access point?
A. Node
B. Pipe
C. Port
D. Both A and C
E. All of these
F. None of these
Transport layer protocols deals with_________
A. Application to application communication
B. Node to node communication
C. The process to process communication
D. Both A and C
E. All of these
D. None of these
Physical or logical arrangement of the network is Called
A. Networking
B. Routing
C. Topology
D. Both A and C
E. All of these
F. None of these
In which topology there is a central controller or hub?
A. Bus
B. Mesh
C. Ring
D. Star
E. All of these
F. None of these
which of the following topology requires multipoint connection
A. Star
B. Bus
C. Ring
D. Mesh
E. All of these
F. None of these
which of the following Data communication system is responsible for spanning states, countries, or the whole world is ________
A. WAN
B. LAN
C. MAN
D. Both A and B
E. All of these
D. None of these
SET 2: Networking MCQs
1. Which of the following is provided IPSec designed security?
A. session layer
B. application layer
C. network layer
D. transport layer
E. All of these
F. None of these
2_____________of the tunnel mode IPsec protects
A. Entire IP packet
B. IP payload
C. IP header
D. None of the mentioned
E. All of these
F. None of these
3.Firewall works as a Network layer of____________.
A. packet filter
B. frame filter
C. both frame filter and packet filter
D. none of the mentioned
E. All of these
F. None of these
4.which of the following is used to WPA2 security in
A. ethernet
B. wi-fi
C. Bluetooth
D. none of the mentioned
E. All of these
F. Both A and B
5. Pretty good privacy (PGP) is used for __________.
A. browser security
B. FTP security
C. email security
D. none of the mentioned
E. All of these
F. Both A and B
6: Which of the following is Confidentiality with asymmetric-key cryptosystem has its own
A. Problems
B. Entities
C. Data
D. Problems
E. Translator
F. All of these
7: A message-digest SHA-l has
A. 820 bits
B. 160 bits
C. 512 bits
D. 628 bits
E. All of these
F. None of these
8: Service beyond Message authentication is a
A. Message Sending
B. Message Confidentiality
C. Message Integrity
D. Message Splashing
E. All of these
F. None of these
9: Document, receiver creates to check integrity of a message, to the_____________.
A. Finger Print
B. Hash-Table
C. HashTag
D. HyperText
E. All of these
F. None of these
10: which of the following is a digital signature needs a Private-key system
A. Shared-key system
B. Public-key system
C. All of them
D. All of these
E. None of these
11: which of the following is a correct Aberavationn MAC?
A. Message authentication cipher
B. Message authentication code
C. Message arbitrary connection
D. Message authentication control
E. All of these
F. None of these
12: which of the following is using for Message confidentiality
A. Asymmetric-Key
B. Cipher Text
C. Cipher
D. Symmetric-Key
E. All of these
F. None of these
13: Both document and fingerprint are to preserve the integrity of a document
A. Needed
B. Unimportant
C. Not Used
D. Not needed
E. All of these
F. None of these
14: When data were sent arrive at receiver exactly as they, its called
A. Message Confidentiality
B. Message Sending
C. Message Integrity
D. Message Splashing
E. All of these
F. None of these
15: Which one is the correct according to the Message digest needs to be
A. kept secret
B. public
C. private
D. alone
E. All of these
F. None of these
16: In Message Integrity the message digest needs to be ___________.
A. High
B. Secret
C. Low
D. Constant 0
E. All of these
F. None of these
17: Message confidentiality means that sender and receiver expect__________________.
A. Nonrepudiation
B. Integrity
C. Confidentiality
D. Authentication
E. All of these
F. None of these
18: Message are encrypted by the sender site and decrypted at the_______________.
A. Conferencing
B. Sender Site
C. Site
D. Receiver site
E. All of these
F. None of these
19: inverse of the Period is _______________.
A. Signals
B. Frequency
C. Phase
D. Amplitude
E. All of these
F. None of these
20: If the signal changes what is the effect of its frequency is:
A. Infinite
B. Zero
C. Maximum
D. All of these
E. None of these
Select the number of bit of a port address in TCP/IP.
A) 48
B) 32
C) 16
D) none of the above
E) both a and b
Answer: C) 16
Select a layer which performs encryption and decryption function In the OSI model,
A) application
B) session
C) presentation
D) transport
E) both a and b
Answer:(C) presentation
Select the model shows how the network functions of a computer ought to be organized.
A) OSI
B) CCITT
C) ISO
D) ANSI
E) All of these
Answer: A) OSI
Select the layer to make sure interoperability among communicating devices by the transformation of data into a mutually agreed-upon format.
A) network
B) data link
C) transport
D) presentation
E) both a and b
Choose the model is used for a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.
A) IP
B) UDP
C) TCP
D) none of the above
E) both a and b
Answer: B) UDP
Choose the organized, maintains, and synchronizes the interactions among connecting devices.
A) transport
B) physical
C) session
D) network
E) None of these
Answer: C) session
Which is the combination of hyperlinked documents on the internet forms?
(A) Mailing list
(B) E-mail system
(C) World Wide Web (WWW)
(D) Hypertext markup language
E) both a and b
Answer: (C) World Wide Web (WWW)
Select the way the location of a resource on the internet is given?
(A) Protocol
(B) ICQ
(C) E-mail address
(D) URL
E) All of these
Answer: (D) URL
Select the stands for HTTP
(A) Hyper terminal tracing program
(B) Hypertext tracing protocol
(C) Hypertext transfer program
(D) Hypertext transfer protocol
E) none of the above
Answer: (D) Hypertext transfer protocol
which computer used as a proxy server.
(A) acting as a backup
(B) with external access
(C) performing file handling
(D) accessing user permissions
E) both a and b
Answer: (B) with external access
Select the software that prevents external access to a system?
(A) Router
(B) Gateway
(C) Firewall
(D) Virus checker
E) both a and b
Answer: (C) Firewall
Select the standard interface for serial data transmission
(A) RS232C
(B) ASCII
(C) 2
(D) Centronics
E) both a and b
Answer: (A) RS232C
Choose the type of topology which is best for large businesses which should carefully control and manage the operation of distributed branch outlets.
(A) Star
(B) Local area
(C) Hierarchical
(D) Ring
E) both a and b
Answer: (A) Star
Select the transmission directions listed is not a legitimate channel
(A) Simplex
(B) Double Duplex
(C) Full Duplex
(D) Half Duplex
E) all of the above
Answer: (B) Double Duplex
More MCQs of Networking Internet and Web
MCQs collection of solved and repeated MCQs with answers for the preparation of competitive exams, admission test and job of PPSC, FPSC, UPSC, AP, APPSC, APSC, BPSC, PSC, GOA, GPSC, HPSC, HP, JKPSC, JPSC, KPSC, KERALAPSC, MPPSC, MPSC, MPSCMANIPUR, MPSC, NPSC, OPSC, RPSC, SPSCSKM, TNPSC, TSPSC, TPSC, UPPSC, UKPSC, SPSC, KPPSC, BPSC, AJKPSC ALPSC, NPSC, LPSC, SCPSC, DPSC, DCPSC, PSC, UPSC, WVPSC, PSCW, and WPSC.