<<< Computer Networks(1) 2023/2024 >>>
QB #2
1. The term LAN stands for?
a) Local Area Net
b) Local Area Network
c) Local Array Network
d) Local Array Net
Answer: b
2. In which of the following switching methods, the message is divided into small packets?
a) Message switching
b) Packet switching
c) Virtual switching
d) None of the these
Answer: b
3. Which of the following switching methods creates a point-to-point physical connection
between two or more computers?
a) Message switching
b) Packet switching
c) Circuit switching
d) None of the mentioned
Answer: c
4. What kind of transmission medium is most appropriate to carry data in a computer
network that is exposed to electrical interferences?
a) Unshielded twisted pair
b) Optical fiber
c) Coaxial cable
d) None of the mentioned
Answer: b
5. Which one of the following is not a network topology?
a) Star
b) Ring
c) Bus
d) Peer to Peer
Answer: d
1
6. ………… example of Application layer protocols
a) HTTP
b) DHCP
c) SMTP
d) All of the above
Answer: d
2. …………used to resolve Internet names to IP addresses.
a) DNS
b) FTP
c) HTTP
d) SMTP
Answer: a
3. ………..used to transfer files that make up the Web pages of the World Wide Web.
a) DNS
b) FTP
c) HTTP
d) SMTP
Answer: c
4. ……….. used for the transfer of mail messages and attachments.
a) DNS
b) FTP
c) HTTP
d) SMTP
Answer: d
5. …………. is used to provide remote access to servers and networking devices.
a) FTP
b) Telnet
c) SMTP
d) DNS
Answer: b
6. ………… used for interactive file transfer between systems.
a) FTP
b) Telnet
c) SMTP
d) DNS
2
Answer: a
7. When the mail server sends mail to other mail servers it becomes ?
a) SMTP client
b) SMTP server
c) Peer
d) Master
Answer: a
8. Which of the following layers does the HTTP protocol work on?
a) Physical layer
b) Data-link layer
c) Application layer
d) None of the these
Answer: c
9. A client of the DNS (Domain Name System) application is called?
a) DNS server
b) DNS Name
c) DNS resolver
d) DNS inquirer
Answer: c
10. ……….. are software programs used by people to communicate over the network.
a) Networking models
b) Network Applications
c) Networking Protocols
d) All of the above
Answer: b
11. DNS client programs used to look up DNS name information.
a) Resolver
b) Queries
c) Searcher
d) IP address
Answer: a
12. …………… command displays all of the cached DNS entries on a Windows XP or 2000
computer system.
a) ipconfig/displaydns
b) ipconfigure/displaydns
3
c) ip_config/display_dns
d) ipconfigure/display_dns
Answer: a
13. Responsible for domains such as .com, edu, org, .net, .uk, jp, fr
a) Local DNS server
b) TLD server
c) DHCP server
d) None of the above
Answer: b
14. DHCP allows a host to obtain ……….. dynamically when it connects to the network.
a) MAC address
b) IP address
c) Serial number
d) Both a & b
Answer: b
15. DHCP servers can be ………
a) Server on LAN
b) Router
c) Server at ISP
d) All of the above
Answer: d
16. …………. protocol offers an alternate and secure method for server access. Stronger
authentication and encrypts data
a) HTTP
b) UDP
c) SSH
d) TCP
Answer: c
17. ………………. used to run programs on remote systems, log in to other systems, and move
files from one system to another,
a) FTP
b) DNS
c) DHCP
d) Telnet
Answer: d
4
18. Displays requested Web page and provides navigational and configuration features.
a) Browser
b) Server
c) URL
d) Cash
Answer: a
19. The role of the Transport Layer is/are
a) segmentation of data
b) error detection
c) Multiplexing of upper layer application using port numbers
d) All of the above
Answer: d
20. ………… is a numerical value that identifies the application associated with the data.
a) IP address
b) Port number
c) Protocol
d) Domain name
Answer: b
21. ………… is/are TCP protocol properties
a) Fast
b) Resend lost data
c) Low overhead
d) All of the above
Answer: b
22. ………… is UDP protocol property
a) Reliable
b) Fast
c) Acknowledge data
d) High overhead
Answer: b
23. Reliability of the system is done in transport layer by …………..
a) Tracking transmitted data
b) acknowledging received data
c) retransmitting any missing data
5
d) All of the above
Answer: d
24. ………… is/are disadvantage of reliability process in transport layer
a) Missing some data
b) Overhead
c) Tracking data
d) All of the above
Answer: b
25. TCP Header is ………. Bytes
a) 8
b) 10
c) 16
d) 20
Answer: d
26. UDP Header is ………… bytes.
a) 8
b) 10
c) 16
d) 20
Answer: a
27. TCP is ………….. overhead than UDP
a) Lower
b) Higher
c) Equal
d) No answer
Answer: b
28. To close a TCP connection gracefully, applications use the …………. Flag.
a) FIN
b) END
c) TERMINATE
d) CLOSE
Answer: a
29. Example of connectionless protocol is/are ………..
a) TCP
6
b) UDP
c) SMTP
d) All of the above
Answer: b
30. Application that uses TCP is/are …………
a) Voice over IP (VoIP)
b) Video Streaming
c) E-mail
d) All of the above
Answer: c
31. Application that uses UDP is/are …………..
a) DNS
b) DHCP
c) FTP
d) All of the above
Answer: d
32. TCP protocol manages connection between 2 devices by ……..
a) acknowledgements
b) Error correction.
c) Flow control
d) All of the above
Answer: d
33. Transport layer basic processes include the following expect…….
a) Segmentation
b) Multiplexing
c) Error detection
d) None of the mentioned
Answer: d
34. ………… provides the means to both send and receive data when running multiple
applications concurrently on a computer.
a) Segmentation
b) Flow control
c) Error detection
d) None of the mentioned
Answer: a
7
35. …………..refers to a set of procedures used to restrict the amount of data that the sender
can send before waiting for acknowledgment.
a) Segmentation
b) Flow control
c) Error detection
d) None of the mentioned
Answer: b
36. …………. is used in the layer four header to indicate to which application that piece of data
is associated.
a) Serial number
b) Port number
c) IP address
d) MAC address
Answer: b
37. Assigning ……………… for each application cause multiple application data streams to be
multiplexed through each protocol simultaneously.
a) IP address
b) Serial number
c) MAC address
d) Port number
Answer: d
38. Transport layer aggregates data from different applications into a single stream before
passing it to ……..
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer: a
39. User datagram protocol is called connectionless because ……
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) all mentioned above
Answer: a
8
40. ……. provides a way to adjust the number of segments transmitted before the sender
expects an acknowledgment
a) ACK. number
b) Offset
c) Flags
d) Window size
Answer: d
41. ……Indicates that the data was received successfully
a) ACK. number
b) Offset
c) Flags
d) Window size
Answer: a
42. The ……………. flag synchronizes sequence numbers to initiate a TCP connection. While
the ……………. flag indicates the end of data transmission to finish a TCP connection.
a) SEQ, ACK
b) SYN, ACK
c) SYN,FIN
d) FIN, SYN
Answer: c
43. The Dynamic Host Configuration Protocol (DHCP) is connection-oriented application
protocol?
a) True
b) False
Answer: b
44. The total amount of UDP traffic found on a typical network is often relatively low. It does
not consume network’s resources.
a) True
b) False
Answer: a
45. The following are Network layer basic processes expect….
a) Logical addressing
b) Routing
c) De-encapsulation
d) Multiplexing
9
Answer: d
46. The process of selecting paths for and directing packets toward their destination is known
as…
a) Forwarding
b) Routing
c) Directing
d) Switching
Answer: b
47. A 4 byte IP address consists of ……
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
Answer: c
48. The following protocols are Network layer protocols except…..
a) ICMP
b) IPV4
c) PPP
d) ARP
Answer: c
49. ………… is used for mapping a network address to a physical address like an
Ethernet/MAC address.
a) IP
b) IPX
c) ICMP
d) ARP
Answer: d
50. Any IP header consists of the following expect….
a) SYN
b) TTL
c) Source IP address
d) Destination IP address
Answer: a
51. What is the purpose of the Destination address, Source address, and network layer header
in the data?
10
a) To provide information about the physical location of the devices.
b) To provide information about the data payload.
c) To provide information about the source and destination of the packet and the network layer
header information.
d) To facilitate error checking in the transport layer.
Answer: c
52. The header of an IP packet does not include fields for reliable data delivery.
a) True
b) False
Answer : a
53. The network layer considers the maximum size of PDU that each medium can transport,
which referred to as….
a) ICMP
b) MTU
c) SMTP
d) TTL
Answer: b
54. The length of an IPv6 address is?
a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
Answer: c
55. The maximum length including headers (in bytes) of an IPv4 datagram is?
a) 32
b) 1024
c) 65535
d) 512
Answer: c
56. …………..is an 8-bit binary value that indicates the remaining "life" of the packet before
discarding from the network
a) ICMP
b) MTU
c) SMTP
11
d) TTL
Answer: d
57. During packet forwarding by a router, which of the following fields of the IP header is
updated?
a) Repeater
b) Source address
c) Destination address
d) Checksum
Answer: d
58. ……………. is a special address used to send data to all hosts in the network.
a) Network address
b) Broadcast address
c) Host address
d) Subnet Mask
Answer: b
59. The addresses assigned to the end devices in the network.
a) Network address
b) Broadcast address
c) Host address
d) Subnet Mask
Answer: c
60. How many versions available of IP?
a) Six versions
b) Four versions
c) Two versions
d) One version
Answer: c
61. The term IPv4 stands for?
a) Internet Protocol Version 4
b) Internet Programming Version 4
c) International Programming Version 4
d) None of these
Answer: a
62. ………….used to define the Network portion and Host portion, consists of 32 Contiguous
set of 1’s followed by a contiguous set of 0’s
12
a) Network address
b) Broadcast address
c) Host address
d) Subnet Mask
Answer: d
63. The first IP address in which all host part bits = 0
a) Network address
b) Subnet mask
c) Broadcast address
d) Multicast address
Answer: a
64. In the subnet mask the network portion is defined by ………
a) 1
b) 0
c) 1 or 0
d) Undefined
Answer: a
65. The IP address [Link]/8 associates with class …….
a) A
b) B
c) C
d) D
Answer: a
66. The IP address [Link]/16 associates with class …….
a) A
b) B
c) C
d) D
Answer: b
67. The IP address [Link]/24 associates with class …….
a) A
b) B
c) C
d) D
Answer: c
13
68. Which of the following IP addresses can be used as (a) loop-back addresses?
a) [Link]
b) [Link]
c) [Link]
d) [Link]
Answer: b
69. What is the binary representation of Class C?
a) 00110000 - 01111111
b) 11000000 - 11011111
c) 11100000 - 11111111
d) 10000000 - 10111111
Answer: b
70. What IP address class allocates 8 bits for the host identification part?
a) Class A
b) Class B
c) Class C
d) Class D
Answer: c
71. Who typically has Class A addresses?
a) Small businesses and startups.
b) Home users and individuals.
c) Large organizations such as the military, government agencies, universities, and large
corporations.
d) Internet Service Providers (ISPs).
Answer: c
72. The value of the first octet determines the network portion and the host portion.
a) Class domain IP addressing
b) Classless IP addressing
c) Classful IP addressing
d) CIDR IP addressing
Answer: c
73. Which of the following IP addresses belong to class A?
a) [Link]
b) [Link]
c) [Link]
14
d) [Link]
Answer: a
74. A special address used to send data to all hosts in the network
a) Network address
b) Subnet mask
c) Broadcast address
d) Multicast address
Answer: c
75. ……..used to define network portion and host portion
a) Network address
b) Subnet mask
c) Broadcast address
d) Multicast address
Answer: b
76. The last IP address in the network which all host part bits = 1
a) Network address
b) Subnet mask
c) Broadcast address
d) Multicast address
Answer: c
77. The process of sending a packet from one host to a selected group of hosts
a) Networking
b) Sub-netting
c) Broadcasting
d) Multicasting
Answer: d
78. When hosts want to direct traffic to themselves they use…
a) Loopback address
b) Unicast address
c) Broadcast address
d) Multicast address
Answer: a
79. The default mask of the class C is
a) [Link]
15
b) [Link]
c) [Link]
d) [Link]
Answer: c
80. The IP address [Link] is classified into class ………..
a) A
b) B
c) C
d) D
Answer: b
81. The Broadcast address of [Link] is ………..
a) [Link]
b) [Link]
c) [Link]
d) [Link]
Answer: b
82. The first usable address for [Link] ‘s Network is
a) [Link]
b) [Link]
c) [Link]
d) [Link]
Answer: d
83. Maximum total number of hosts in [Link] ‘s Network is
a) 2^24
b) 2^24 - 2
c) 2^16
d) 2^16 - 2
Answer: d
84. The method of assigning addresses outside the standard classes structure called
a) Classless inter domain routing
b) Classful inter domain routing
c) Connection inter domain routing
d) None of the mentioned above
Answer: a
16
85. CIDR of 28 has which of the following masks?
a) [Link]
b) [Link]
c) [Link]
d) [Link]
Answer: c
86. CIDR of 18 has which of the following masks?
a) [Link]
b) [Link]
c) [Link]
d) [Link]
Answer: b
87. CIDR of 14 has which of the following masks?
a) [Link]
b) [Link]
c) [Link]
d) [Link]
Answer: a
88. The network address of the following IPV4 address [Link] /13 is…….
a) [Link]/13
b) [Link]/13
c) [Link]/13
d) [Link]/13
Answer: b
89. The network address of the following IPV4 address [Link] /19 is…….
a) [Link] /19
b) [Link] /19
c) [Link] /19
d) [Link] /19
Answer: a
90. The Broadcast address of the network that contain the following IPV4 address
[Link] /16 is…….
a) [Link]/16
b) [Link]/16
c) [Link]/16
17
d) [Link]/16
Answer: a
91. The Broadcast address of the network that contain the following IPV4 address [Link]
/29 is…….
a) [Link]/29
b) [Link] /29
c) [Link]/29
d) [Link]/29
Answer: c
92. The process of dividing a single IP address range into multiple address ranges is…..
a) Sub-netting
b) Networking
c) broadcasting
d) Multicasting
Answer: a
93. The network address is of [Link]/11 is ……
a) [Link] /11
b) [Link] /11
c) [Link] /11
d) [Link] /11
Answer: b
94. Broadcast address of [Link]/11 ‘s network is ……
a) [Link] /11
b) [Link] /11
c) [Link] /11
d) [Link] /11
Answer: c
95. Maximum number of hosts in [Link]/11’s network is ….
a) 2^8 -2
b) 2^16 -2
c) 2^21 -2
d) 2^24 -2
Answer: c
96. Last usable address in90.165.11.193/11’s network is …...
18
a) [Link] /11
b) [Link] /11
c) [Link] /11
d) [Link] /11
Answer: c
97. Which of the following falls under sub-netting benefits?
a) Resources utilization
b) Simple management
c) Performance optimization
d) All mentioned above
Answer: d
98. The next subnet of the subnet that contain the following IPV4 address [Link] /20
is…….
a) [Link] /20
b) [Link] /20
c) [Link] /20
d) [Link] /20
Answer: b
99. The next subnet of the subnet that contain the following IPV4 address [Link] /26
is…….
a) [Link] /26
b) [Link] /26
c) [Link] /26
d) [Link] /26
Answer: c
100. The first usable IPV4 address of the network that contain the following address
[Link] /27 is…….
a) [Link] /27
b) [Link] /27
c) [Link] /27
d) [Link] /27
Answer: b
101. The last valid IPV4 address of the network that contain the following address
[Link] /25 is…….
a) [Link]/25
19
b) [Link] /25
c) [Link] /25
d) [Link] /25
Answer: d
102. Which is true about the IP address [Link]?
a) It is a Class A address.
b) It has a default mask of [Link].
c) It is a broadcast address.
d) All mentioned above
Answer: b
103. The subnet mask for sub-netting [Link] network, in order to support 8000 hosts
on each sub-network is
a) [Link]
b) [Link]
c) [Link]
d) [Link]
Answer: d
104. Given network address [Link] /24 ً.What prefix length should be used for 5
subnets with at least 25 hosts per subnet?
a) 30
b) 28
c) 27
d) 25
Answer: c
105. Given network address [Link] /16 what prefix length should be used for 50
subnets with at least 1000 hosts per subnet?
a) 24
b) 23
c) 22
d) 21
Answer: c
106. After dividing the [Link] /16 into subnets of 2000 hosts each, how many
available subnets are there?
a) 64
b) 32
20
c) 16
d) 11
Answer: b
107. After dividing the [Link] /16 into subnets of 500 hosts each, how many available
subnets are there?
a) 9
b) 32
c) 64
d) 128
Answer: d
108. The network [Link] is to be divided into 10 equal sized subnets. Which of the
following subnet masks can be used for the above requirement?
a) [Link]
b) [Link]
c) [Link]
d) [Link]
Answer: c
109. After dividing [Link] /16 into four subnets of equal size, which is the following, is
the broadcast address of the third subnet?
a) [Link]/16
b) [Link]/16
c) [Link]/16
d) None of the mentioned above
Answer: c
110. …………… is used for the location of special services/devices for which the address
is not known or when a host needs to provide information to all the hosts on the network.
a) Unicasting transmission
b) Broadcasting transmission
c) Multicasting transmission
d) All mentioned above
Answer: b
111. ………… is designed to conserve the bandwidth of the IPv4 network by allowing a
host to send a single packet to a selected set of hosts.
a) Unicasting transmission
b) Broadcasting transmission
21
c) Multicasting transmission
d) All mentioned above
Answer: c
112. Blocks of addresses that are used in networks that require limited or no Internet
access.
a) private addresses
b) public addresses
c) multicast addresses
d) host addresses
Answer: a
113. Block of addresses is designed to be used in the hosts that are publicly accessible
from the Internet.
a) private addresses
b) public addresses
c) multicast addresses
d) host addresses
Answer: b
114. The process of translating private addresses to public addresses.
a) PAT
b) NAT
c) MAT
d) None of the mentioned
Answer: b
115. …….. Allows the hosts in the network to "borrow" a public address for
communicating to outside networks.
a) Network Address Translation
b) Port Address Translation
c) Mac Address Translation
d) IP Address Translation
Answer: a
22