Computer Network GATE Questions with
Solutions
From The Computer Network Topic of the GATE CSE Question Paper
MCQ – Single Answer Computer Networks GATE Questions
1) What is the protocol data unit (PDU) for the application layer in the
Internet stack?
a. Frame
b. Datagram
c. Segment
d. Message
2) Which among this is not a client-server application?
a. Ping
b. Web-browsing
c. Internet Chat
d. Email
3) If an Internet Service Provider (ISP) has the following chunk of CIDR-
based IP addresses available with it:245.248.128.0/20 and the ISP wants
to give half of this chunk of address to Organization A, and a quarter to
Organization B, while retaining the remaining with itself. Then, which
among the following is a valid allocation of addresses to A and B?
a. 245.248.132.0/22 and 245.248.132.0/21
b. 245.248.136.0/21 and 245.248.128.0/22
c. 245.248.128.0/21 and 245.248.128.0/22
d. 245.248.136.0/22 and 245.248.132.0/21
4) The pairs of OSI protocol layer/sub-layer and its functionality are
given below, the INCORRECT pair from among these are:
a. Data Link Layer and Bit synchronization
b. Network Layer and Routing
c. Medium Access Control sub-layer and Channel sharing
d. Transport Layer and End-to-end process communication
5) A firewall is installed at the point where the secure internal network
and untrusted external network meet, which is also known as______
a. Secure point
b. Meeting point
c. Chock point
d. Firewall point
6) What does DHCP stand for?
a. Dynamic Host Configuration Protocol
b. Dynamic Host Configuration Provider
c. Digital Host Communication Provider
d. Digital Host Communication Protocol
7) The growth of congestion window occurs_____
a. Infinitely
b. Up to timeout
c. Up to threshold
d. Up to the size of receiver’s window
8) When was Aloha developed?
a. In 1990
b. In 1980
c. In 1970
d. In 1960
9) Which of these is a Transmission media that can be used in LAN?
a. fibre optics
b. coaxial cable
c. microwave
d. satellite
10) Which of these protocols given below uses UDP as transport protocol?
a. DNS
b. Telnet
c. HTTP
d. SMTP
11) LANs can be connected by a device known as ______
a. Ethernet card
b. Modems
c. Routers
d. Bridges
12) What is the bit rate In Ethernet when Manchester encoding is used?
a. Same as the baud rate
b. Twice the baud rate
c. Half the baud rate
d. None of these
13) What is slot time for gigabit Ethernet?
a. 0.612
b. 0.512
c. 0.412
d. 0.312
14) Radio waves are _____
a. directional
b. bidirectional
c. omnidirectional
d. unidirectional
15) The term that refers to the shortest unit and carries data elements
is______
a. Single element
b. Data carrier
c. Signal element
d. Both b and c
16) Which architecture is FTP built on?
a. P2P
b. Client-server
c. Both the above
d. None of these
17) What is the address resolution protocol (ARP) used for?
a. Finding the IP address of the default gateway
b. Finding the MAC address that corresponds to an IP address
c. Finding the IP address that corresponds to a MAC address
d. Finding the IP address from the DNS
18) Which of the following are not true characteristics of NetBEUI?
a. Fast for small networks to Self-tuning
b. Little configuration required
c. Routable
d. Highly customizable
19) Identify the correct option for the given assertion and reason
Assertion: In IEEE 802.3 is not suitable for client server application
Reason: In Ethernet, there is a restriction on minimum size.
a. Assertion and Reason, both are true
b. Assertion and reason are false
c. Assertion is true and reason is false
d. Assertion and reason are true, but this is not the correct reason for the
given assertion
20) Consider that a computer on a 10Mbps network is regulated by a
token bucket. The token bucket is filled at a rate of 2Mbps. It is initially
filled to capacity with 16 Megabits. What is the maximum duration for
which the computer can transmit at the full 10Mbps?
a. 8 seconds
b. 5 seconds
c. 2 seconds
d. 1.6 seconds
21) In Unicast Routing, we use shortest path tree method for finding
shortest path of the______
a. Nodes
b. Networks
c. Packets
d. Frames
22) Which is the network that provides high speed connectivity?
a. Internetwork
b. WAN
c. LAN
d. MAN
23) What is the maximum number of subnets and the maximum number
of hosts in each subnet, if the address of a class B host is to be split into
subnets with a 6-bit subnet number?
a. 64 subnets and 262142 hosts
b.62 subnets and 262142 hosts
c. 64 subnets and 1024 hosts
d. 62 subnets and 1022 hosts
24) Which of the following statements about HTTP are false?
a. HTTP describe the structure of web page
b. HTTP run over TCP
c. HTTP can be used to test the validity of hyper link test
d. HTTP allows information to be stored in url
25) What is an anticipated result from multi programming operations?
a. Handling of more jobs
b. Reduced computer idle time
c. Better scheduling of work
d. All of the above
26) What is the Network, in which every computer is capable of playing
the role of client, server or both at the same time?
a. dedicated server network
b. local area network
c. wide area network
d. peer-to-peer network
27) Match the following:
(P) SMTP (1) Application layer
(Q) BGP (2) Transport layer
(R) TCP (3) Data link layer
(S) PPP (4) Network layer
(5) Physical layer
(a) P – 2 Q – 1 R – 3 S – 5
(b) P – 1 Q – 4 R – 2 S – 5
(c) P – 1 Q – 4 R – 2 S – 3
(d) P – 2 Q – 4 R – 1 S – 3
28) If a CSMA/CD network that transmits data at a rate of 100 Mbps
(108 bits second) over a 1 km(kilometer) cable with no repeaters and the
minimum frame size required for this network is 1250 bytes, what is the
signal speed (km/sec) in the cable?
a. 16000
b. 20000
c. 10000
d. 8000
29) One of the header fields in an IP datagram is the Time to Live (TTL)
field. Which of these below given statements best explains the need for
this field?
(a) It can be used to reduce delays
(b) It can be used to optimize throughput
(c) It can be used to prioritize packets
(d) It can be used to prevent packet looping
30) A and B are the only two stations on an Ethernet. Each has a steady
queue of frames to send. Both A and B attempt to transmit a frame,
collide, and A wins the first back off race. At the end of this successful
transmission by A, both A and B attempt to transmit and collide. The
probability that A wins the second back off race is_____
a. 0.625
b. 0.75
c. 0.5
d. 1.0
31) In a packet switching network, packets are routed from source to
destination along a single path having two intermediate nodes. If the
message size is 24 bytes and each packet contains a header of 3 bytes,
then what is the optimum packet size?
a. 4
b. 6
c. 7
d. 9
32) Station B needs to send a message consisting of 9 packets to Station
C using a sliding window (window size 3) and go-back-n error control
strategy. All packets are ready and immediately available for
transmission. If every 5th packet that B transmits gets lost (but no acks
from C ever get lost), then what is the number of packets that B will
transmit for sending the message to C?
a. 14
b. 16
c. 12
d. 18
33) Which of the following assertions about the Internet Protocol (IP) is
False?
a. IP Packets from the same source to the same destination can take different
routes in the network
b. The packet source cannot set the route of an ongoing packets; the route is only
determined by the routing tables in the routers on the way
c. IP ensures that a packet is discarded if it is unable to reach its destination
within a given number of hops
d. It is possible for a computer to have multiple IP addresses
34) For an organization that has a class B network and wishes to form
subnets for 64 departments, what will the subnet mask be?
a. 255.255.64.0
b. 255.255.64.0
c. 255.255.128.0
d. 255.255.252.0
35) The message 11001001 is to be transmitted using the CRC polynomial
x^3 + 1 to protect it from errors. The message that should be transmitted
is______
a. 11001001011
b. 11001001000
c. 110010010011
d. 11001010
36) If two computers C1 and C2 are configured as follows and C1 has IP
address 203.197.2.53 and netmask 255.255.128.0, while C2 has IP address
203.197.75.201 and netmask 255.255.192.0, then which of the following
statements is true?
a. C2 assumes C1 is on the same network, but C1 assumes C2 is on a different
network
b. C1 assumes C2 is on the same network, but C2 assumes C1 is on a different
network
c. C1 and C2 both assume they are on different networks
d. C1 and C2 both assume they are on the same networks
37) Look at these three statements about link state and distance vector
routing protocols, for a large network with 500 network nodes and 4000
links
[S1] The computational overhead in link state protocols is higher than in
distance vector protocols.
[S2] A distance vector protocol (with split horizon) avoids persistent routing
loops, but not a link state protocol.
[S3] After a topology change, a link state protocol will converge faster than a
distance vector protocol.
Which one of the following is correct about S1, S2, and S3?
a. S1, S2, and S3 are all false
b. S1, S2, and S3 are all true
c. S1 and S2 are true, but S3 is false
d. S1 and S3 are true, but S2 is false
38) Which of these functionalities should be implemented by a transport
protocol over and above the network protocol?
a. Detection of duplicate packets
b. End to end connectivity
c. Packet delivery in the correct order
d. Recovery from packet losses
39) If the length of a Broadcast LAN is 2 Km and it has 107 bps bandwidth
and uses CSMA/CD and the signal travels along the wire at 2108m/s, then
what is the minimum size of the packet?
a. 100 bytes
b. 200 bytes
c. 50 bytes
d. None of these
40) Which is one of the pairs of protocols given below from both the
protocols that can use multiple TCP connections between the same
client and the server?
a. HTTP, TELNET
b. HTTP, SMTP
c. FTP, SMTP
d. HTTP, FTP
41) What is the number of 8-bit characters that can be transmitted per
second over a 9600 baud serial communication link that use
asynchronous mode of transmission with 8 data bits, one start bit and
one parity bit?
a. 800
b. 600
c. 876
d. 1200
42) In the starting phase of TCP congestion control algorithm size of
congestion control window______
a. Increase Linearly
b. Does not increase
c. Increase exponentially
d. Increase
43) If a sender is employing public key Cryptography to send a secret
message to a receiver, which one of the following statements is true?
a. Sender encrypts using his own public key
b. Receiver decrypts using his own public key
c. Sender encrypts using receiver’s public key
d. Receiver decrypts using sender’s public key
44) If everyone in a group of N people want to communicate secretly with
the N – 1 others using symmetric key cryptographic system and the
communication between any two persons should not be decodable by
the others in the group, then what is the number of keys required in the
system as a whole to satisfy the confidentiality requirement?
a. N(N-1)
b. N(N-1) / 2
c. 2N
d. (N-1)2
45) Internetwork is made of five networks. Which are those?
a. Four LANs and One MAN
b. Four LANs and One WAN
c. Three LANs and Two WAN
d. Four MANs and One WAN
46) This is one of two protocols that let a network administrator
supervise and distribute IP addresses from a central point. It
automatically sends a new IP address when a computer is plugged into a
different place in the network.
a. UDP
b. TCP
c. TCPMAN
d. DHCP
47) A sender B sends a message m to receiver A, which is digitally signed
by B with its private key. In this scenario, one or more of the following
security violations can take place.
I. B can launch a birthday attack to replace m with a fraudulent message
II. A third party attacker can launch a birthday attack to replace m with a
fraudulent message
III. A can launch a birthday attack to replace m with a fraudulent
message
Which of the following are possible security violations?
a. I only
b. II only
c. II and III only
d. I and II only
48) Take the example of 1 Mbps error-free line, with the maximum frame
size of 1000 bits and new packets generated about 1 second apart .
Timeout interval is 10 m/sec if the special acknowledgement timer were
eliminated, unnecessary timeout would occur . In the scenario, how any
times average msg would have been transmitted?
a. Twice
b. Only once
c. Thrice
d. None of the above
49) _______ has the responsibility for Accounting functions.
a. Transport layer
b. Data link layer
c. Data layer
d. Network layer
50) In a class C address, if 3 bits are borrowed for subnetting of host ID
part, the total possible number of subnet masks are
_________________.
Geeks for Geeks
Consider a network using the pure ALOHA medium access control protocol,
where each frame is of length 1,000 bits. The channel transmission rate is 1
Mbps (=106 bits per second). The aggregate number of transmissions
across all the nodes (including new frame transmissions and
retransmitted frames due to collisions) is modelled as a Poisson process
with a rate of 1,000 frames per second. Throughput is defined as the
average number of frames successfully transmitted per second. The
throughput of the network (rounded to the nearest integer) is
______________ .
130 to 140
140 to 150
120 to 130
100 to 110
Discuss it
Question 2
Consider the cyclic redundancy check (CRC) based error detecting
scheme having the generator polynomial X3+X+1. Suppose the message
m4m3m2m1m0 = 11000 is to be transmitted. Check bits c2c1c0 are appended
at the end of the message by the transmitter using the above CRC
scheme. The transmitted bit string is denoted by m4m3m2m1m0c2c1c0. The
value of the checkbit sequence c2c1c0 is
101
110
100
111
Discuss it
Question 3
Consider a link with packet loss probability of 0.2. What is the expected
number of transmissions it would take to transfer 200 packets given that
the stop and wait protocol is used?
125
250
225
150
Discuss it
Question 4
Assume that Source S and Destination D are connected through an
intermediate router R. How many times a packet has to visit the network
layer and data link layer during a transmission from S to D?
Network layer – 4 times, Data link layer – 4 times
Network layer – 4 times, Data link layer – 6 times
Network layer – 2 times, Data link layer – 4 times
Network layer – 3 times, Data link layer – 4 times
Discuss it
Question 5
An Ethernet frame that is less than the IEEE 802.3 minimum length of 64
octets is called
Short frame
Small frame
Mini frame
Runt frame
Discuss it
Question 6
Which of the following protocols is an application layer protocol that
establishes, manages and terminates multimedia sessions ?
Session Maintenance Protocol
Real - time Streaming Protocol
Real - time Transport Control Protocol
Session Initiation Protocol
Discuss it
Question 7
What is the size of the ‘total length’ field in IPv4 datagram?
4 bit
8 bit
16 bit
32 bit
Discuss it
Question 8
A packet filtering firewall can
deny certain users from accessing a service
block worms and viruses from entering the network
disallow some files from being accessed through FTP
block some hosts from accessing the network
Discuss it
Question 9
Consider the set of activities related to e-mail A : Send an e-mail from a
mail client to mail server B : Download e-mail headers from mail box and
retrieve mails from server to a cache C : Checking e-mail through a web
browser The application level protocol used for each activity in the same
sequence is
SMTP, HTTPS, IMAP
SMTP, POP, IMAP
SMTP, IMAP, HTTPS
SMTP, IMAP, POP
Discuss it
Question 10
What is one advantage of setting up a DMZ(Demilitarized Zone) with two
firewalls?
You can control where traffic goes in the three networks
You can do stateful packet filtering
You can do load balancing
Improve network performance
Discuss it
The protocol data unit (PDU) for the application layer in the Internet stack is
Segment
Datagram
Message
Frame
Discuss it
Question 12
What is the maximum size of data that the application layer can pass on to
the TCP layer below?
A
B
C
D
Discuss it
Question 13
Match the following:
(1)
(2)
(3)
(4)
Discuss it
Question 14
A TCP server application is programmed to listen on port number P on host
S. A TCP client is connected to the TCP server over the network. Consider
that while the TCP connection was active, the server machine S crashed
and rebooted. Assume that the client does not use the TCP keepalive timer.
Which of the following behaviors is/are possible?
If the client was waiting to receive a packet, it may wait indefinitely
The TCP server application on S can listen on P after reboot
If the client sends a packet after the server reboot, it will receive a RST
segment
If the client sends a packet after the server reboot, it will receive a FIN
segment
Discuss it
Question 15
SSL is not responsible for
Mutual authentication of client & server
Secret communication
Data Integrity protection
Error detection and correction
Discuss it
Question 16
Silly Window Syndrome is related to
Error during transmission
File transfer protocol
Degrade in TCP performance
Interface problem
Discuss it
Question 17
Which of the following control fields in TCP header is used to specify
whether the sender has no more data to transmit?
FIN
RST
SYN
PSH
Discuss it
Question 18
Four channels are multiplexed using TDM. If each channel sends 100
bytes/second and we multiplex 1 byte per channel, then the bit rate for the
link is __________.
400 bps
800 bps
1600 bps
3200 bps
Discuss it
Question 19
Optical fiber uses reflection to guide light through a channel, in which
angle of incidence is ________ the critical angle.
equal to
less than
greater than
less than or equal to
Discuss it
Question 20
Assume that source S and destination D are connected through two
intermediate routers labeled R. Determine how many times each packet
has to visit the network layer and the data link layer during a transmission
from S to D.
Network layer – 4 times and Data link layer – 4 times
Network layer – 4 times and Data link layer – 3 times
Network layer – 4 times and Data link layer – 6 times
Network layer – 2 times and Data link layer – 6 times
Question 21
Consider a source computer(S) transmitting a file of size 106 bits to a
destination computer(D)over a network of two routers (R1 and R2) and three
links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to R2; and L3 connects
R2 to D.Let each link be of length 100 km. Assume signals travel over each
link at a speed of 108 meters per second.Assume that the link bandwidth on
each link is 1Mbps. Let the file be broken down into 1000 packets each of
size 1000 bits. Find the total sum of transmission and propagation delays in
transmitting the file from S to D?
1005 ms
1010 ms
3000 ms
3003 ms
Discuss it
Question 21 ‒ Explanation
See http://www.geeksforgeeks.org/computer-networks-set-2/
Question 22
Consider a network with five nodes, N1 to N5, as shown
below. The network uses a Distance
Vector Routing protocol. Once the routes have stabilized, the distance
vectors at different nodes are as following. N1: (0, 1, 7, 8, 4) N2: (1, 0, 6, 7, 3)
N3: (7, 6, 0, 2, 6) N4: (8, 7, 2, 0, 4) N5: (4, 3, 6, 4, 0) Each distance vector is the
distance of the best known path at the instance to nodes, N1 to N5, where
the distance to itself is 0. Also, all links are symmetric and the cost is
identical in both directions. In each round, all nodes exchange their
distance vectors with their respective neighbors. Then all nodes update
their distance vectors. In between two rounds, any change in cost of a link
will cause the two incident nodes to change only that entry in their
distance vectors. 52. The cost of link N2-N3 reduces to 2(in both directions).
After the next round of updates, what will be the new distance vector at
node, N3.
(3, 2, 0, 2, 5)
(3, 2, 0, 2, 6)
(7, 2, 0, 2, 5)
(7, 2, 0, 2, 6)
Discuss it
Question 23
Consider the data given in above question. Suppose the weights of all
unused links in the previous question are changed to 2 and the distance
vector algorithm is used again until all routing tables stabilize. How many
links will now remain unused?
0
1
2
3
Discuss it
Question 24
Classless Inter-domain Routing (CIDR) receives a packet with address
131.23.151.76. The router’s routing table has the following entries:
Prefix Output Interface Identifier
131.16.0.0/12 3
131.28.0.0/14 5
131.19.0.0/16 2
131.22.0.0/15 1
The identifier of the output interface on which this packet will be forwarded
is ______.
1
2
3
5
Discuss it
Question 25
Two computers C1 and C2 are configured as follows. C1 has IP address
203.197.2.53 and netmask 255.255.128.0. C2 has IP address 203.197.75.201
and netmask 255.255.192.0. which one of the following statements is true?
C1 and C2 both assume they are on the same network
C2 assumes C1 is on same network, but C1 assumes C2 is on a
different network
C1 assumes C2 is on same network, but C2 assumes C1 is on a
different network
C1 and C2 both assume they are on different networks.
Discuss it
Question 26
A Trojan horse is
A program that performs a legitimate function that is known to an
operating system or its user and also has a hidden component that
can be used for nefarious purposes like attacks on message security
or impersonation.
A piece of code that can attach itself to other programs in the
system and spread to other systems when programs are copied or
transferred.
A program that spreads to other computer systems by exploiting
security holes like weaknesses in facilities for creation of remote
processes
All of the above
Discuss it
Question 27
In cryptography, the following uses transposition ciphers and the keyword
is LAYER. Encrypt the following message. (Spaces are omitted during
encryption) WELCOME TO NETWORK SECURITY !
WMEKREETSILTWETCOOCYONRU!
EETSICOOCYWMEKRONRU!LTWET
LTWETONRU!WMEKRCOOCYEETSI
ONRU!COOCYLTWETEETSIWMEKR
Discuss it
Question 28
The minimum positive integer p such that 3p modulo 17 = 1 is
5
8
12
16
Discuss it
Question 29
SHA-1 is a
encryption algorithm
decryption algorithm
key exchange algorithm
message digest function
Discuss it
Question 30
If there are N people in the world and are using secret key
encryption/decryption for privacy purpose, then number of secret keys
required will be:
N
(N - 1)
N (N - 1) / 2
N (N + 1) / 2
Using public key cryptography, X adds a digital signature σ to a message
M, encrypts (M,σ) and sends it to Y, where it is decrypted. Which one of the
following sequence of keys is used for operations?
Encryption : X’s private key followed by Y’s private key. Decryption : X’s
public key followed by Y’s public key.
Encryption : X’s private key followed by Y’s public key; Decryption : X’s
public key followed by Y’s private key
Encryption : X’s private key followed by Y’s public key; Decryption : Y’s
private key followed by X’s public key.
Encryption : X’s public key followed by Y’s private key; Decryption : Y’s
public key followed by X’s private key.
Discuss it
Question 32
Anarkali digitally signs a message and sends it to Salim. Verification of the
signature by Salim requires
Anarkali’s public key.
Salim’s public key.
Salim’s private key.
Anarkali’s private key.
Discuss it
Question 33
Suppose that everyone in a group of N people wants to communicate
secretly with the N–1 others using symmetric key cryptographic system.
The communication between any two persons should not be decodable by
the others in the group. The number of keys required in the system as a
whole to satisfy the confidentiality requirement is
2N
N(N – 1)
N(N – 1)/2
(N – 1)2
Discuss it
Question 34
How many bytes of data can be sent in 15 seconds over a serial link with
baud rate of 9600 in asynchronous mode with odd parity and two stop bits
in the frame?
10,000 bytes
12,000 bytes
15,000 bytes
27,000 bytes
Discuss it
Question 35
A firewall is to be configured to allow hosts in a private network to freely
open TCP connections and send packets on open connections. However, it
will only allow external hosts to send packets on existing open TCP
connections or connections that are being opened (by internal hosts) but
not allow them to open TCP connections to hosts in the private network. To
achieve this the minimum capability of the firewall should be that of
A combinational circuit
A finite automaton
A pushdown automaton with one stack
A pushdown automaton with two stacks
Discuss it
Question 36
An email contains a textual birthday greeting, a picture of a cake and a
song. The order is not important. What is the content-type?
Multipart/mixed
Multipart/parallel
Multipart/digest
Multipart/alternative
Discuss it
Question 37
Phase transition for each bit are used in
Amplitude modulation
Carrier modulation
Manchester encoding
NRZ encoding
Discuss it
Question 38
In networking, UTP stands for
Unshielded T-connector port
Unshielded twisted pair
Unshielded terminating pair
Unshielded transmission process
Discuss it
Question 39
Data is transmitted continuously at 2.048 Mbps rate for 10 hours and
received 512 bits errors. What is the bit error rate?
6.9 e-9
6.9 e-6
69 e-9
4 e-9
Discuss it
Question 40
The IEEE standard for WiMax technology is
IEEE 802.16
IEEE 802.36
IEEE 812.16
IEEE 806.16
Discuss it
Question 41
A T-switch is used to
Control how messages are passed between computers
Echo every character that is received
Transmit characters one at a time
Rearrange the connections between computing equipments
Discuss it
Question 42
Match the security protocols with the layers they are used in and choose
the correct code -
List−1List−2A.TLS1.PhysicalLayerB.WEP2.LinkLayerC.PGP3.NetworkLayerD.IPsec4
.TransportLayer5.ApplicationLayerList−1A.TLSB.WEPC.PGPD.IPsec
List−21.PhysicalLayer2.LinkLayer3.NetworkLayer4.TransportLayer5.Application
Layer
Codes-
ABCD(a)2513(b)5232(c)4253(d)5243 (a)(b)(c)(d)A2545B5222C1354D3233
(d)
(c)
(b)
(a)
Discuss it
Question 43
Range of IP Address from 224.0.0.0 to 239.255.255.255 are
Reserved for loopback
Reserved for broadcast
Used for multicast packets
Reserved for future addressing
Discuss it
Question 44
The network 198.78.41.0 is a
Class A network
Class B network
Class C network
Class D network
Discuss it
Question 45
What percentage(%) of the IPv4, IP address space do all class C addresses
consume?
12.5%
25%
37.5%
50%
Discuss it
Question 46
The default subnet mask for a class B network can be
255.255.255.0
255.0.0.0
255.255.192.0
255.255.0.0
Discuss it
Question 47
Consider the following routing table at an IP router
For each IP address in Group-I identify the correct choice of the next hop
from Group-II using the entries from the routing table above.
List-I List-II
A. 128.96.171.92 1. Interface 0
B. 128.96.167.151 2. Interface 1
C. 128.96.163.121 3. R2
D. 128.96.165.121 4. R3
5. R4
Codes:
ABCD
(a) 1 3 5 4
(b) 1 4 2 5
(c) 2 3 4 5
(d) 2 3 5 4
a
b
c
d
Discuss it
Question 48
In class B if subnet mask is 255.192.0.0 Total Number of networks than can
be joined
32
64
16
None of the Above
Discuss it
Question 49
If block contains 32 IP address which of the following is first address of the
block ?
10.0.0.5
10.0.0.16
10.0.0.68
10.0.0.160
Discuss it
Question 50
Which of the following IP address can be used in WAN?
10.0.0.1
172.16.0.10
15.1.5.6
None
Discuss it
Computer Network MCQ
1) Which of these is a standard interface for serial data transmission?
1. ASCII
2. RS232C
3. 2
4. Centronics
Show Answer Workspace
2) Which type of topology is best suited for large businesses which must
carefully control and coordinate the operation of distributed branch
outlets?
1. Ring
2. Local area
3. Hierarchical
4. Star
Show Answer Workspace
3) Which of the following transmission directions listed is not a legitimate
channel?
1. Simplex
2. Half Duplex
3. Full Duplex
4. Double Duplex
Show Answer Workspace
4) "Parity bits" are used for which of the following purposes?
1. Encryption of data
2. To transmit faster
3. To detect errors
4. To identify the user
Show Answer Workspace
5) What kind of transmission medium is most appropriate to carry data in
a computer network that is exposed to electrical interferences?
1. Unshielded twisted pair
2. Optical fiber
3. Coaxial cable
4. Microwave
Show Answer Workspace
6) A collection of hyperlinked documents on the internet forms the ?.?
1. World Wide Web (WWW)
2. E-mail system
3. Mailing list
4. Hypertext markup language
Show Answer Workspace
7) The location of a resource on the internet is given by its?
1. Protocol
2. URL
3. E-mail address
4. ICQ
Show Answer Workspace
8) The term HTTP stands for?
1. Hyper terminal tracing program
2. Hypertext tracing protocol
3. Hypertext transfer protocol
4. Hypertext transfer program
Show Answer Workspace
9) A proxy server is used as the computer?
1. with external access
2. acting as a backup
3. performing file handling
4. accessing user permissions
Show Answer Workspace
10) Which one of the following would breach the integrity of a system?
1. Looking the room to prevent theft
2. Full access rights for all users
3. Fitting the system with an anti-theft device
4. Protecting the device against willful or accidental damage
Show Answer Workspace
11) Which software prevents the external access to a system?
1. Firewall
2. Gateway
3. Router
4. Virus checker
Show Answer Workspace
12) Which one of the following is a valid email address?
1. [email protected]
2. gmail.com
3. [email protected]
4. javatpoint@books
Show Answer Workspace
13) Which of the following best describes uploading information?
1. Sorting data on a disk drive
2. Sending information to a host computer
3. Receiving information from a host computer
4. Sorting data on a hard drive
Show Answer Workspace
14) Which one of the following is the most common internet protocol?
1. HTML
2. NetBEUI
3. TCP/IP
4. IPX/SPX
Show Answer Workspace
15) Software programs that allow you to legally copy files and give them
away at no cost are called which of the following?
1. Probe ware
2. Timeshare
3. Shareware
4. Public domain
Show Answer Workspace
16) The term FTP stands for?
1. File transfer program
2. File transmission protocol
3. File transfer protocol
4. File transfer protection
Show Answer Workspace
17) At what speed does tele-computed refer?
1. Interface speed
2. Cycles per second
3. Baud rate
4. Megabyte load
Show Answer Workspace
18) Which one of the following is not a network topology?
1. Star
2. Ring
3. Bus
4. Peer to Peer
Show Answer Workspace
19) The maximum length (in bytes) of an IPv4 datagram is?
1. 32
2. 1024
3. 65535
4. 512
Show Answer Workspace
20) Which of the following statements could be valid with respect to the
ICMP (Internet Control Message Protocol)?
1. It reports all errors which occur during transmission.
2. A redirect message is used when a router notices that a packet
seems to have been routed wrongly.
3. It informs routers when an incorrect path has been taken.
4. The "destination unreachable" type message is used when a router
cannot locate the destination.
Show Answer Workspace
21) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets.
Which of the following subnet masks can be used for the above
requirement?
1. 255.243.240
2. 255.255.0.0
3. 255.255.0
4. 255.255.255
Show Answer Workspace
22) When the mail server sends mail to other mail servers it becomes ___
?
1. SMTP client
2. SMTP server
3. Peer
4. Master
Show Answer Workspace
23) The length of an IPv6 address is?
1. 32 bits
2. 64 bits
3. 128 bits
4. 256 bits
Show Answer Workspace
24) Consider the following:
1. Twisted pair cables
2. Microwaves and Satellite Signals
3. Repeaters
4. Analog Transmissions
5. Fiber optics
Which of the above is consider as (a) signal transmission medium is data
communications?
1. (1) and (5)
2. (1) and (2)
3. (1) (2) and (5)
4. (1) (2) (3) and (5)
Show Answer Workspace
25) Which of the following address belongs class A?
1. 121.12.12.248
2. 130.12.12.248
3. 128.12.12.248
4. 129.12.12.248
Show Answer Workspace
26) Which of the following is correct IPv4 address?
1. 124.201.3.1.52
2. 01.200.128.123
3. 300.142.210.64
4. 10110011.32.16.8
5. 128.64.0.0
Show Answer Workspace
27) Which of the following IP addresses can be used as (a) loop-back
addresses?
1. 0.0.0.0
2. 127.0.0.1
3. 255.255.255.255
4. 0.255.255.255
Show Answer Workspace
28) The term WAN stands for?
1. Wide Area Net
2. Wide Access Network
3. Wide Area Network
4. Wide Access Net
Show Answer Workspace
29) Which of the following cannot be used as a medium for 802.3 ethernet?
1. A thin coaxial cable
2. A twisted pair cable
3. A microwave link
4. A fiber optical cable
Show Answer Workspace
30) What IP address class allocates 8 bits for the host identification part?
1. Class A
2. Class B
3. Class C
4. Class D
Show Answer Workspace
31) The term IANA stands for?
1. Internet Assigned Numbers Authority
2. Internal Assigned Numbers Authority
3. Internet Associative Numbers Authoritative
4. Internal Associative Numbers Authority
Show Answer Workspace
32) How many versions available of IP?
1. 6 version
2. 4 version
3. 2 version
4. 1 version
Show Answer Workspace
33) Which layer of the TCP / IP stack corresponds to the OSI model
transport layer?
1. Host to host
2. Application
3. Internet
4. Network Access
Show Answer Workspace
34) An Aloha network uses an 18.2 kbps channel for sending message
packets of 100 bits long size. Calculate the maximum throughput.
1. 5999
2. 6900
3. 6027
4. 5027
Show Answer Workspace
35) On a simplex data link, which of the following is a possible error
recovery technique?
1. Backward error correction (BEC)
2. The use of hamming codes
3. Automatic Repeat Request (ARQ)
4. Downward error correction (DEC)
Show Answer Workspace
36) Which of the statement is correct with regard to Time Division
Multiplexing (TDM) and its variants?
1. Statistical TDM makes efficient use of the bandwidth only if the arrival
pattern of the data stream is probabilistic.
2. TDM requires the transmitter and receiver to be synchronized
periodically.
3. TDM performs efficiently if the arrival pattern of the data stream is
probabilistic.
4. Statistical TDM is efficient if the data stream is deterministic.
Show Answer Workspace
37) The term IPv4 stands for?
1. Internet Protocol Version 4
2. Internet Programming Version 4
3. International Programming Version 4
4. None of these
Show Answer Workspace
38) The term LAN stands for?
1. Local Area Net
2. Local Aera Network
3. Local Array Network
4. Local Array Net
Show Answer Workspace
39) Which of the through is share the data of two computer?
1. Library
2. Network
3. Grouping
4. Integrated system
Show Answer Workspace
40) In specific, if the systems use separate protocols, which one of the
following devices is used to link two systems?
1. Repeater
2. Gateway
3. Bridge
4. Hub
Show Answer Workspace
41) How many digits of the Data Network Identification Code (DNIC) identify
the country?
1. first three
2. first four
3. first five
4. first six
5. None of the above
Show Answer Workspace
42) Which of the following methods is used to broadcast two packets on
the medium at a time?
1. Collision
2. Synchronous
3. Asynchronous
4. None of the above
Show Answer Workspace
43) Which of the following is true with regard to the ping command?
1. Ping stands for Packet Internet Generator.
2. The ping command checks the port level connectivity between
source destinations end points.
3. Ping summarizes the packet loss and round-trip delay between two
IP end points.
4. The ping command activates the RARP protocol of the IP layer.
Show Answer Workspace
44) The private key in asymmetric key cryptography is kept by?
1. Sender
2. Receiver
3. Sender and Receiver
4. None of the these
Show Answer Workspace
45) Which of the following algorithms is not used in asymmetric-key
cryptography?
1. RSA algorithm
2. Diffie-Hellman algorithm
3. Electronic code book algorithm
4. None of the mentioned
Show Answer Workspace
46) In the cryptography, the sequence of the letters is rearranged by?
1. Transposition ciphers
2. Substitution ciphers
3. Both a and b
4. None of these
Show Answer Workspace
47) What is the maximum efficiency of pure aloha at G = 1/2?
1. 1.89
2. 17.99
3. 18.999
4. 18.4
Show Answer Workspace
48) What is the maximum efficiency of slotted aloha at G = 1?
1. 36.8
2. 35.8
3. 35.5
4. 37.8
Show Answer Workspace
49) Which of the following statement is true about error detection
techniques used on communications link?
1. Cyclic Redundancy Check (CRC) sequence can detect as well as
correct errors.
2. Error detection cannot be used on simplex links.
3. Hamming code can detect up to 3-bit errors.
4. All of the these
Show Answer Workspace
50) The correct order of corresponding OSI layers for having functionalities
of routing and reconciling machine representation differences with shared
access resolution and ASCII test protocol is?
1. Network, Physical, Transport, Data link
2. Network, Physical, Data link, Application
3. Network, Presentation, Data link, Application
4. Network, Presentation, Physical, Transport
Show Answer Workspace
Computer Network MCQ Part 2
1) In which of the following switching methods, the message is divided into
small packets?
1. Message switching
2. Packet switching
3. Virtual switching
4. None of the these
Show Answer Workspace
2) Which of the following switch methods creates a point-to-point physical
connection between two or more computers?
1. Message switching
2. Packet switching
3. Circuit switching
4. None of the these
Show Answer Workspace
3) What is the second name of the proxy server?
1. Proxy tools
2. Application proxy
3. Application-level gateway
4. All of the these
Show Answer Workspace
4) Which of the following servers allows LAN users to share data?
1. Data server
2. Point server
3. File server
4. Communication server
Show Answer Workspace
5) What is the total vulnerable time value of pure Aloha?
1. Tfr
2. 1/2 Tfr
3. 2 * Tfr
4. 4 * Tfr
Show Answer Workspace
6) How many fields are in the SMDS packet?
1. Two
2. Three
3. Four
4. Five
Show Answer Workspace
7) What is the maximum data transfer rate of the optical fiber wire?
1. 50 kbps
2. 1000 kbps
3. 1000 Mbps
4. None of the these
Show Answer Workspace
8) POTS network works on the principle of ________
1. Telephone switching
2. Proxy server
3. File system
4. Circuit system
Show Answer Workspace
9) Which of the following protocols is the bit-oriented protocol?
1. SSL
2. http
3. HDLC
4. All of the these
Show Answer Workspace
10) SLIP stands for _______
1. System line internet protocol
2. Serial line internet protocol
3. Signal line internet protocol
4. Signal internet protocol
Show Answer Workspace
11) The second port is used to ____________ in the two-port network.
1. Input terminal
2. Output terminal
3. Signal terminal
4. Bandwidth terminal
Show Answer Workspace
12) Which of the following layers does the HTTP protocol work on?
1. Physical layer
2. Data-link layer
3. Application layer
4. None of the these
Show Answer Workspace
13) Which of the following statement correct about the cipher in
cryptography?
1. It is a method for performing encryption and decryption
2. It is used to establish the network connection
3. It is a message event
4. All of the these
Show Answer Workspace
14) SONET stands for ______________.
1. Signal Operation Network
2. Synchronous Optical Network
3. System Optical Network
4. Signal Optical Network
Show Answer Workspace
15) How many layers does the SONET contain?
1. 2 layers
2. 3 layers
3. 4 layers
4. 5 layers
Show Answer Workspace
16) RAKE receiver designed for _____.
1. Multipath fading
2. Signals
3. Data network
4. Network connection
Show Answer Workspace
17) What is the formula of high rate in zigzag code?
1. J / (J * 1)
2. -Z / (1 + J)
3. Z * (1 + J)
4. J / (J + 1)
Show Answer Workspace
18) What is the size of the sender window in the Go Back N (ARQ) protocol?
1. 0
2. 1
3. 10
4. n
Show Answer Workspace
19) What is the efficiency of the Go back N (ARQ) protocol?
1. N = N / (2a + 2a)
2. N = N / (1 + 2a)
3. N = N * (2a + 2a)
4. N = N * (1 + 2a)
Show Answer Workspace
20) What is the size of the destination port in the UDP protocol?
1. 8 bits
2. 16 bits
3. 20 bits
4. 32 bits
Show Answer Workspace
21) What network utility uses the time-To-Live (TTL) field in the IP header to
elicit ICMP error messages?
1. Ping
2. Route
3. Traceroute
4. Ifconfig
Show Answer Workspace
22) A client of the DNS (Domain Name System) application is called
_____.
1. DNS server
2. DNS Name
3. DNS resolver
4. DNS inquirer
Show Answer Workspace
23) How many characters consist of the entire hostname?
1. 511 characters
2. 255 characters
3. 127 characters
4. 31 characters
Show Answer Workspace
24) During normal IP packet forwarding by a router, which of the following
fields of the IP header is updated?
1. Repeater
2. Source address
3. Destination address
4. Checksum
Show Answer Workspace
25) Which of the following statements is correct about the DWDM?
1. It can transmit data at very high speeds
2. It can transmit data at very slow speeds
3. DWSM stands for digital wave division multiplexing
4. None of the these
Show Answer Workspace
26) MAC address is also called ______.
1. Physical address
2. Logical address
3. Source address
4. Destination address
Show Answer Workspace
27) Which of the following addresses is 32-bit?
1. MAC address
2. Virtual address
3. Source address
4. Destination address
Show Answer Workspace
28) EDI stands for ____.
1. Electronic Data Interchange
2. Electronic Digital Internet
3. Electronic Digital Interchange
4. Electronic Data Internet
Show Answer Workspace
29) What is the maximum data transfer rate of the ISDN?
1. 1024 Mbps
2. 64 Mbps
3. 64 kbps
4. 1024 kbps
Show Answer Workspace
30) ARPANET stands for _______.
1. Advanced Recheck Projects Agency Internet
2. Advanced Recheck Projects Agency Network
3. Advanced Research Projects Agency Network
4. Advanced Research Projects Agency Internet
Show Answer Workspace
31) What is the size of the UDP header?
1. 8 bytes
2. 16 bytes
3. 20 bytes
4. 64 bytes
Show Answer Workspace
32) Which of the following protocols is the connection-less protocol?
1. UDP
2. TCP
3. IP
4. All of the these
Show Answer Workspace
33) Wildcard domain name labels begin with a ______.
1. .
2. 0
3. @
4. *
5. #
Show Answer Workspace
34) What is the maximum length of the STP wire?
1. 20 ft
2. 50 ft
3. 50 meters
4. 100 meters
Show Answer Workspace
35) Which network is suitable for a building?
1. WAN
2. LAN
3. MAN
4. PAN
Show Answer Workspace
36) ________ is a 2G mobile telecommunications based on the CDMA.
1. IS-95
2. ISO 1990
3. IS-97
4. None of the these
Show Answer Workspace
37) Which of the following statements is correct about IRC?
1. It sends the messages in virtual time
2. It is an application layer protocol
3. It works on the proxy model
4. All of the these
Show Answer Workspace
38) Which of the following devices is not a networking device?
1. Hub
2. Switch
3. Bridge
4. None of the these
Show Answer Workspace
39) Which of the following devices does not require power to forward the
signals?
1. Active hub
2. Passive hub
3. Repeater
4. Bridge
Show Answer Workspace
40) How many pins does RJ-45 contain?
1. Two
2. Four
3. Eight
4. Ten
Show Answer Workspace