Computer Network Questions & Answers | CN | MCQ

Computer Network | CN | MCQ

Question 1
Automatic repeat request error management mechanism is provided by
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Select one:
a. d
b. a
c. b
d. c

Feedback
The correct answer is: a

Question 2
If there are N routers from source to destination, total end to end delay in sending packet P
(L->number of bits in the packet R-> transmission rate)
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
Select one:
a. d
b. c
c. b
d. a
Feedback
The correct answer is: b

Question 3
Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Select one:
a. a
b. b
c. c
d. d
Feedback
The correct answer is: d

Question 4
The metric in RIP is called ______________
a)cost
b)hop count
c)distance
d)count
Select one:
a. a
b. b
Feedback
The correct answer is: b

Question 5
Which one of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) HDLC
d) all of the mentioned
Select one:
a. c
b. a
c. b
d. d
Feedback
The correct answer is: d

Question 6
In Congestion Control, packet is put at end of input queue while waiting to be
1. Checked.
2. Entered.
3. Reached.
4.Controlled
Select one:
a. 2
b. 1
c. 3
d. 4
Feedback
The correct answer is: 1

Question 7
In MobileIP _____________address indicates the network number and thus identifies the mobile node’s point of attachment with respect to the network topology
a)System address
b)IP address
c)Care-off address
d)Home address
Select one:
a. a
b. c
c. d
d. b
Feedback
The correct answer is: c

Question 8
A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
Select one:
a. c
b. b
c. a
d. d
Feedback
The correct answer is: a

Question 9
The data link layer takes the packets from _____ and encapsulates them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Select one:
a. c
b. a
c. d
d. b
Feedback
The correct answer is: a

Question 10
In slow-start algorithm, size of congestion window increases exponentially until it reaches a
1. Frame Relay.
2. Congestion Relay.
3. Threshold.
4.IP.
Select one:
a. b
b. a
c. d
d. c
Feedback
The correct answer is: c

Question 11
The OSPF protocol allows the administrator to assign a cost,called the ______________
a)cost
b)metric
c)distance
d)count
Select one:
a. a
b. c
c. b
d. d
Feedback
The correct answer is: b

Question 12
Which one of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) both (a) and (b)
d) none of the mentioned
Select one:
a. a
b. b
c. d
d. C
Feedback
The correct answer is: C

Question 13
Mobile hosts encapsulates and ______________the packets to mobiles host’s care-of –address
a)binds
b)tunnels
c)fowards
d)None
Select one:
a. c
b. b
c. a
d. d
Feedback
The correct answer is: b

Question 14
Which of these is not applicable for IP protocol?
a) is connectionless
b) offer reliable service
c) offer unreliable service
d) None of the mentioned
Select one:
a. a
b. b
c. c
d. d
Feedback
The correct answer is: b

Question 15
Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
Select one:
a. b
b. a
c. d
d. c
Feedback
The correct answer is: c

Question 16
Header of a frame generally contains
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
Select one:
a. b
b. d
c. c
d. a
Feedback
The correct answer is: d

Question 17
MAC addresses are for which layer
a. Network
b. Application
c. Data Link
d.Physical
Select one:
a. c
b. b
c. d
d. a
Feedback
The correct answer is: c

Question 18
Application layer offers _______ service
a) End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned
Select one:
a. c
b. b
c. a
d. d
Feedback
The correct answer is: a

Question 19
Which sub layer of the data link layer performs data link functions that depend upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Select one:
a. d
b. a
c. b
d. c
Feedback
The correct answer is: b

Question 20
Which of the following is congestion control algorithm?
a. leaky bucket
b. token bucket
c. Resource respondes
d. all of above
Select one:
a. b
b. d
c. c
d. a
Feedback
The correct answer is: d

Question 21
Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
Select one:
a. d
b. b
c. c
d. a
Feedback
The correct answer is: d

Question 22
Which protocol is used for dynamically assigning IP addresses to hosts on a LAN
a. ARP
b. RARP
c. TCP/IP
d. DHCP
Select one:
a. a
b. c
c. b
d. d
Feedback
The correct answer is: d

Question 23
The triplet that contains the home address, care-of address, and registration lifetime is called a _______________ for the mobile node
a)binding
b) registration
c)Unique Number
d)Network address
Select one:
a. c
b. a
c. b
d. d
Feedback
The correct answer is: a

Question 24
A mechanism to control amount and rate of traffic sent to network is called
1. Traffic Congestion.
2. Traffic Flow.
3. Traffic Data.
4.Traffic Shaping
Select one:
a. 2
b. 4
c. 1
d. 3
Feedback
The correct answer is: 4

Question 25
CRC stands for
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Select one:
a. a
b. d
c. c
d. b
Feedback
The correct answer is: a

Question 26
ICMP is primarily used for
a) error and diagnostic functions
b) addressing
c) forwarding
d) none of the mentioned
Select one:
a. c
b. b
c. a
d. d
Feedback
The correct answer is: a

Question 27
This is one of the architecture paradigm
a) Peer to peer
b) Client-server
c) HTTP
d) Both a and b
Select one:
a. c
b. b
c. a
d. d
Feedback
The correct answer is: d

Question 28
Piggybacking protocol is a technique used for
1. ACKs.
2. NAKs.
3. both 1 and 2.
4.None.
Select one:
a. 2
b. 4
c. 1
d. 3
Feedback
The correct answer is: 3

Question 29
The network layer protocol of internet is
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) none of the mentioned
Select one:
a. a
b. d
c. c
d. b
Feedback
The correct answer is: b

Question 30
MobileIP is built on ____________protocol
a)ICMP
b) IP
c)UDP
d)TCP
Select one:
a. d
b. b
c. a
d. c
Feedback
The correct answer is: b