Nothing Special   »   [go: up one dir, main page]

A) Syntax

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

1.

The structure or format of data is called ___________


a) Syntax
b) Semantics
c) Struct
d) Formatting
2. The first Network was called ________
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
3. A _______ is the physical path over which a message travels.
a) Path
b) Medium
c) Protocol
d) Route
4. A _________ set of rules that governs data communication.
a) Protocols
b) Standards
c) RFCs
d) Servers
5. Three or more devices share a link in ________ connection.
a) Unipoint
b) Multipoint
c) Point to point
d) Simplex
6. 1. The physical layer is concerned with ___________
a)bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) port to port delivery

7. 2. Which transmission media provides the highest transmission speed in a


network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
View Answer
8. Bits can be sent over guided and unguided media as analog signal by
___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation

9. Physical or logical arrangement of network is __________


a) Topology
b) Routing
c) Networking
d) Control
10. Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus

11. _______ topology requires a multipoint connection.


a) Star
b) Mesh
c) Ring
d) Bus

12. Data communication system spanning states, countries, or the whole world is
________
a) LAN
b) WAN
c) MAN
d) PAN
13. _____ is the multiplexing technique that shifts each signal to a different carrier
frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
14. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

15. Communication channel is shared by all the machines on the network in


________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network

16. Which of the following networks extends a private network across public
networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
17. When collection of various computers seems a single coherent system to its
client, then it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system
18. Two devices are in network if __________
a) a process in one device is able to exchange information with a process
in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive
19. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
20. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission
delay is ____________ (in microseconds)
a) 3.2
b) 32
c) 0.32
d) 320
21. The protocol data unit(PDU) for the application layer in the
Internet stack is
(A) Segment
(B) Datagram
(C) Message
(D) Frame
22. Which of the following terms is just the collection of networks that
can be joined together?
(A) Intranet
(B) Extranet
(C) Internet
(D) LAN

23.Which of the following device is used to connect two systems,


especially if the systems use different protocols?
(a) Repeater
(b) Gateway
(c) Bridge
(d) Hub

24.Which of the following commu nications modes support two way


traffic but in only one direction of a time?
(a) Simplex
(b) Half duplex
(c) Three quarters
(d) Full duplex

25.The slowest transmission speeds are those of


(a) Coaxial cable
(b) Twisted pair wire
(c) Fiber optic cable
(d) Microwave
23.
1. 1. Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
ANS:d
2. The packet of information at the application layer is called __________
a) Packet
b) Message
c) Segment
d) Frame
ANS:b
3. Which one of the following is an architecture paradigms?
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
ANS:d
4. Application developer has permission to decide the following on transport layer
side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
ANS:c
5. Application layer offers _______ service.
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
Ans:a
6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Ans:c
7. Pick the odd one out.
a) File transfer
b) File download
c) E-mail
d) Interactive games
Ans:d
8. Which of the following is an application layer service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
Ans:d

9. To deliver a message to the correct application program running on a host, the


_______ address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
Ans:c
10. Which is a time-sensitive service?
a) File transfer
b) File download
c) E-mail
d) Internet telephony
Ans:d
11. Transport services available to applications in one or another form _________
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
Ans:d
12. Electronic mail uses which Application layer protocol?
a) SMTP
b) HTTP
c) FTP
d) SIP
Ans:a
13. The ____________ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
Ans:a
14. Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) TCP
Ans:c
15. Application layer protocol defines ____________
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned
Ans:d
16. Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
Ans:a

17. Which one of the following is an internet standard protocol for managing devices
on IP network?
a) dynamic host configuration protocol
b) simple network management protocol
c) internet message access protocol
d) media gateway protocol
Ans:b
18. Which one of the following is not an application layer protocol?
a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol
Ans:c
19. Which one of the following is not correct?
a) Application layer protocols are used by both source and destination devices
during a communication session
b) HTTP is a session layer protocol
c) TCP is an application layer protocol
d) All of the mentioned\
Ans:a
20. The values GET, POST, HEAD etc are specified in ____________ of HTTP
message
a) Request line
b) Header line
c) Status line
d) Entity body
Ans:a
DCN UNIT- 3 MCQ
1. In TCP, sending and receiving data is done as _______
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
Answer: a
2. Which of the following is false with respect to TCP?
a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) Unreliable
Answer: d
3. TCP process may not write and read data at the same speed. So we need
__________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
Answer: b

4. TCP groups a number of bytes together into a packet called _______


a) Packet
b) Buffer
c) Segment
d) Stack
Answer: c
5. Communication offered by TCP is ________
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
Answer: a
6. To achieve reliable transport in TCP, ___________ is used to check the safe and
sound arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
Answer: d
7. In segment header, sequence number and acknowledgement number fields refer
to _______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
Answer: a
8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent
in only one segment?
a) 10000
b) 10001
c) 12001
d) 11001
Answer: b
9. Bytes of data being transferred in each connection are numbered by TCP. These
numbers start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
Answer: d
10. The value of acknowledgement field in a segment defines _______
a) sequence number of the byte received previously
b) total number of bytes to receive
c) sequence number of the next byte to be received
d) sequence of zeros and ones
Answer: c
11. The receiver of the data controls the amount of data that are to be sent by the
sender is referred to as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
Answer: a
12. Size of TCP segment header ranges between ___________
a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits
Answer: c
13. Connection establishment in TCP is done by which mechanism?
a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronization
Answer: b
14. The sizes of source and destination port address in TCP header are
___________ respectively.
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
Answer: b
15. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
Answer: b
16. Which of the following is false with respect to UDP?
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
Answer: a

17. What is the main advantage of UDP?


a) More overload
b) Reliable
c) Low overhead
d) Fast
Answer: c
18. What is the header size of a UDP packet?
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
Answer: a
19. “Total length” field in UDP packet header is the length of _________
a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data
Answer: d.
20. Which is the correct expression for the length of UDP datagram?
a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
d) UDP length = UDP length + UDP header’s length
Answer: a
DCN Unit-IV Quiz

1. A 4 byte IP address consists of __________


a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
Answer: c
Explanation: An ip address which is 32 bits long, that means it is of 4 bytes and is
composed of a network and host portion and it depends on address class. The
size of the host address and network address depends upon the class of the
address in classful IP addressing.

2. In virtual circuit network each packet contains ___________


a) full source and destination address
b) a short VC number
c) only source address
d) only destination address
Answer: b
Explanation: A short VC number also called as VCID (virtual circuit identifier) is a
type of identifier which is used to distinguish between several virtual circuits in a
connection oriented circuit switched network. Each virtual circuit is used to
transfer data over a larger packet switched network.

3. Which of the following routing algorithms can be used for network layer
design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer: d
Explanation: The routing algorithm is what decides where a packet should go
next. There are several routing techniques like shortest path algorithm, static and
dynamic routing, decentralized routing, distance vector routing, link state routing,
Hierarchical routing etc. The routing algorithms go hand in hand with the
operations of all the routers in the networks. The routers are the main
participants in these algorithms.

4.The network layer protocol for internet is __________


a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol
Answer: b
Explanation: There are several protocols used in Network layer. Some of them are IP,
ICMP, CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer
and ethernet protocol is for data link layer.

5. ICMP is primarily used for __________


a) error and diagnostic functions
b) addressing
c) forwarding
d) routing

Answer: a
Explanation: ICMP abbreviation for Internet Control Message Protocol is used by
networking devices to send error messages and operational information indicating a
host or router cannot be reached. ICMP operates over the IP packet to provide error
reporting functionality as IP by itself cannot report errors.

6.In IPV4 header,a HLEN value of decimal 10 means________

a)40 bytes of options

b)10 bytes of options

c)40 bytes in the header

d)10 bytes in the header

Ans:C

7.In IPV4,What is needed to determine the number of the last byte of a fragment?

a)the first byte of the datagram is byte 800

b)the datagram is 100 bytes in size

c)the first byte of the datagram is byte 100

d)the dAtagram has not been fragmented

Ans:a

8.The ______ protocol is the transmission mechanism used by TCP/IP suite

a)ARP

b)RARP

c)IP
d)None of the above

Ans:C

9.IPV6 allows _____ security provisions than IPV4

a)less

b)more

c)the same level

d)None of the above

Ans:b

10.Which one of the following is the most common internet protocol?

a)HTML

b)TCP/IP

c)DHCP

d)SNMP

Ans:b

11.The maximum length (in bytes) of an IPV4 datagram is _____

a)1024

b)65535

c)32

d)12

Ans:b

12. The IP network 192.168.50.0 is to be divided into 10 equal sized subnets.


Which of the following subnet masks can be used for the above requirement?

a. 255.243.240

b. 255.255.0.0

c. 255.255.255

d. 255.255.0
Ans:d

13. The length of an IPv6 address is?

a. 32 bits

b. 64 bits

c. 128 bits

d. 256 bits

Ans:c

14. Which of the following address belongs class A?

a. 121.12.12.248

b. 130.12.12.248

c. 128.12.12.248

d. 129.12.12.248

Ans:a

15. What IP address class allocates 8 bits for the host identification part?

a. Class A

b. Class B

c. Class C

d. Class D

Ans:C

16. The term IANA stands for?

a. Internal Assigned Numbers Authority

b. Internet Assigned Numbers Authority

c. Internet Associative Numbers Authoritative

d. Internal Associative Numbers Authority


Ans:b

17. How many versions available of IP?

a. 6 version

b. 4 version

c. 2 version

d. 1 version

Ans:c

18.The flag field that does fragmentation of IPV4 fragment is the ____

a)2 bit field

b)3 bit field

c)4 bit field

d)5 bit field

Ans:b

19.Internet is also known as

a)datagram node

b)datagram network

c)datagram link

d)datagram internet

Ans:b

20. The ……… protocol allows the administrator to assign a cost, called the metric, to each
route.
A. OSPF
B. RIP
C. BGP
D. BBGP

Ans:a
DCN UNIT-V MCQ

1) A Data Link Layer converts a packet of data into __


finally.
A) Frames
B) Bits
C) -
D) -
Answer [=]
B
Explanation:
Yes. The data link layer takes packets from Network Layer and
converts to Bits before handing over to the Physical layer.
2) The two sub-layers of a Data Link layer are ___.
A) LLC - Logical Link Control Layer
B) MAC - Medium Access Control Layer
C) Both A and B
D) Data Layer
Answer [=]
C
Explanation:
LLC (Logical Link Control) layer and MAC (Medium Access
Control) layer
3) Which is the sub-layer that accepts frames from the
upper layer that is Network Layer?
A) LLC (Logical Link Control Layer)
B) MAC (Medium Access Control) layer
C) -
D) -
Answer [=]
A
Explanation:
The LLC layer receives frames the Network layer. It is topology
independent.
4) The functions of a Logical Link Layer (LLC) are
___.
A) Error control
B) Flow control
C) Creating and managing the communication link between two devices
with the help of the Transport layer.
D) All the above
Answer [=]
D
5) The types of data services offered by an LLC
(Logical Link Control) layer are ___.
A) Connectionless which is fast and unreliable
B) Connection-Oriented which is slow and reliable
C) Both OptionA and optionB.
D) None
Answer [=]
C
6) Which is the layer that is responsible for sharing
the physical media (transmission medium) among many
computers or devices?
A) LLC (Logical Link Control) layer
B) MAC (Medium Access Control) layer
C) -
D) -
Answer [=]
B
Explanation:
Medium Access Control (MAC) layer which is a sub-layer of the LLC
(Logical Link Control) layer actually shares the physical transmission
medium among many devices.
7) Every Computer or an Internet device has a unique
MAC address. State TRUE/FALSE.
A) TRUE
B) FALSE
C) -
D) -
Answer [=]
A
Explanation:
The manufacturers of internet accessing devices hard code
unique MAC addresses into each device.
8) The types of Medium Access Control are ___.
A) Centrally Access Control
B) Distributed Access Control
C) Both option-A and option-B
D) None
Answer [=]
C
9) The modes of a MAC to share a transmission medium
are ___.
A) Round Robin
B) Reservation
C) Contention
D) All the above
Answer [=]
D
Explanation:
Round Robin, Reservation and Contention are the three modes of
sharing the access medium used by MAC protocol.
10) In Round-robin mode of MAC, each station gets ___
priority whether access to the medium is needed or
not.
A) different
B) equal
C) -
D) -
Answer [=]
B
Explanation:
Each station will get an equal opportunity to use the shared medium
like the cable connecting two or more stations.
11) In Reservation mode of MAC, each station in the
network ___ a time slot for a finite or infinite
amount of time to access the shared medium.
A) should reserve
B) need not reserve
C) -
D) -
Answer [=]
A
Explanation:
Whichever station reserves a time-slot first, it will get full access to the
medium. The remaining stations simply wait and poll continuously for
next time reservation token.
12) In a contention mode of MAC implementation, each
station in the network ___ data at the same time
whether a collision occurs or not.
A) can transmit
B) can not transmit
C) -
D) -
Answer [=]
A
13) In a Contention mode of MAC implementation,
different stations can have different priorities set
by the admin. State TRUE/FALSE.
A) TRUE
B) FALSE
C) -
D) -
Answer [=]
A
Explanation:
All stations in the equal priority group compete again to transmit data
simultaneously without thinking about collisions or bottlenecks or
congestions.
14) The contention mode of MAC implementation is best
suited for __ traffic.
A) Low
B) Medium
C) High
D) Very High
Answer [=]
A
Explanation:
Low traffic LAN networks can use this Contention mode.
15) A Token Ring implementation works on the __ mode.
A) Contention
B) Reservation
C) Round Robin
D) None
Answer [=]
C
Explanation:
Any station that possesses the token has access to the medium to
transfer data. Once the data transfer is completed, the token is free to
be acquired by any other station.
16) The physical address to each machine is provided
by which layer in an OSI reference model?
A) Physical layer
B) Data Link Layer
C) Network Layer
D) Transport Layer
Answer [=]
B
Explanation:
The sub-layer of Data Link Control Layer, MAC (Medium Access
Control) layer, provides the physical address like MAC address.
17) Choose the Protocols working in the Data Link
Control Layer of OSI model below.
A) ATM (Asynchronous Transfer Mode), Frame Relay
B) HDLC (High-Level Data Link Control), SDLC (Synchronous Data
Link Control)
C) ARP (Address Resolution Protocol), IEEE-802.3
D) All the above
Answer [=]
D
18) Choose the Protocols used in the Data Link Control
layer of OSI model below?
A) SLIP (Serial Line Internet Protocol), CSLIP(Compressed SLIP), PLIP
(Parallel Line Internet Protocol)
B) PPP (Point to Point Protocol)
C) X.25, ITU-T G.hn DLL
D) All the above
Answer [=]
D
Explanation:
All the above
19) Which is the protocol that maps varying IP
addresses to the Physical MAC Address of a machine in
a LAN network?
A) ARQ (Automatic Repeat Request)
B) ARP (Address Resolution Protocol)
C) SLIP (Serial Line Internet Protocol)
D) PLIP (Parallel Line Internet Protocol)
Answer [=]
B
Explanation:
ARP protocol operates in between Network Layer and Data Link
Layer and it tries to locate the physical machine in the network.
20) Which protocols adopted the standards of HDLC
(High-Level Link Control) protocol?
A) X.25 protocol as LAPB (Link Access Procedure Balanced), V.42
protocol as LAPM (Link Access Procedure for Modems)
B) Frame Relay protocol as LAPF (Link Access Procedure for Frame
Relay)
C) ISDN (Integrated Services Digital Network) protocol as LAPD (Link
Access Procedure on D-channel)
D) All the above
Answer [=]
D

You might also like