Computer Networks Questions & Answers – Access Networks
This set of Computer Networks Questions & Answers focuses on “Access Networks”.
1) Which of this is not a constituent of residential
telephone line?
a)
A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed
downstream channel
d) None of the mentioned View Answer
Answer: c
Explanation: The third part is ordinary
two way telephone channel.
2)
In DSL telco provides
these services
a) Wired phone access
b) ISP
c) All of the
mentioned
d) None of the mentioned View Answer
Answer: c
Explanation: The same company
which provides phone
connection is also its ISP in DSL.
3)
The function of DSLAM is
a)
Convert analog signals
into digital signals
b) Convert digital
signals into analog signals
c) Amplify digital
signals
d) None of the mentioned View Answer
Answer: a
Explanation: The DSLAM located
in telco’s Central
Office does this function.
4)
The following term is not associted with DSL
a) DSLAM
b) CO
c) Splitter
d) CMTS View Answer
Answer: d
Explanation: Cable modem termination system is used in cable internet access.
5)
HFC contains
a) Fibre cable
b)
Coaxial cable
c) Both of the mentioned
d) None of the mentioned View Answer
Answer:
c Explanation: None.
6)
Choose the statement which is not applicable for cable internet
access
a) It is a shared
broadcast medium
b) It includes HFCs
c) Cable modem connects
home PC to Ethernet port
d) Analog
signal is converted to digital signal in DSLAM
View Answer
Answer: d
Explanation: In cable access
analog signal is converted to digital signal
by CMTS.
7)
Among the optical-distribution architectures that is essentially switched ehternet is
a) AON
b) PON
c) NON
d) None of the mentioned View Answer
Answer:a
Explanation: Active optical networks
are essentially switched
ehternets.
8)
StarBand provides
a) FTTH internet
access
b)
Cable access
c) Telephone access
d) Satellite
access View Answer
Answer:
d Explanation: None.
9)
Home Access is provided by
a)
DSL
b) FTTP
c) Cable
d) All of the mentioned
View Answer
Answer:
d Explanation: None.
10) ONT is connected to splitter using
a) High speed fibre cable
b)
HFC
c) Optical cable
d) None of the mentioned View Answer
Answer:
c Explanation: None.
11) These factors
affect transmission rate in DSL
a)
The gauge of the twisted-pair line
b) Degree of electrical interfernece
c) Shadow fading
d) Both
a and b View Answer
Answer: d
Explanation: Because DSL is made of twisted wire copper pair.
Computer Networks Questions &
Answers – Application Layer
This
set of Computer Networks Questions & Answers focuses
on “Application Layer”.
1)
This is not a application layer protocol
a) HTTP
b) SMTP
c) FTP
d) TCP
View Answer
Answer: d
Explanation: TCP is transport
layer protocol
2)
The packet of information at the application layer is called
a)
Packet
b) Message
c) Segment
d) Frame View Answer
Answer:
b Explanation: None.
3)
This is one of
the architecture paradigm
a) Peer to peer
b)
Client-server
c) HTTP
d) Both
a and b View Answer
Answer: d
Explanation: HTTP is a protocol.
4)
Application developer has permission to decide the following on transport layer side
a) Transport layer
protocol
b)
Maximum buffer size
c) Both of the mentioned
d) None of the mentioned View Answer
Answer:
c Explanation: None.
5) Application layer offers service
a)
End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned View Answer
Answer:
a Explanation: None.
6)
E-mail is
a) Loss-tolerant application
b)
Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned View Answer
Answer: c
Explanation: Because it can work with available throughput.
7)
Pick the odd one out
a) File transfer
b) File download
c) E-mail
d) Interactive games View Answer
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
8) Which of the following is an application layer service ?
a) Network virtual
terminal
b)
File transfer, access,
and management
c) Mail service
d) All of the mentioned
View Answer
Answer:
d Explanation: None.
9) To deliver
a message to the correct application program running on a host, the address
must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned View Answer
Answer:
c Explanation: None.
10)
This is a time-sensitive service
a) File transfer
b) File download
c) E-mail
d) Internet telephony View Answer
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
11)
Transport services available to applications in one or another
form
a) Reliable data transfer
b)
Timing
c) Security
d) All of the mentioned
View Answer
Answer:
d Explanation: None.
12)
Electronic mail uses this Application layer protocol
a) SMTP
b)
HTTP
c) FTP
d)
SIP
View Answer
Answer:
a Explanation: None.
Computer Networks Questions &
Answers – HTTP
This
set of Computer Networks Questions
& Answers focuses
on “HTTP”.
1.
The number of objects in a Web page which consists of 4 jpeg images and HTML text is
a) 4
b) 1
c) 5
d) None of the mentioned View Answer
Answer: c
Explanation: 4 jpeg images
+ 1 base HTML file.
2.
The default connection type used by HTTP is
a) Persistent
b)
Non-persistent
c) Either of the mentioned
d) None of the mentioned View Answer
Answer:
a Explanation: None.
3.
The time taken by a packet to travel
from client to server and then back to
the client is called
a) STT
b)
RTT
c) PTT
d) None of the mentioned View Answer
Answer: b
Explanation: RTT stands for round-trip time.
4.
The HTTP request
message is sent in part of three-way handshake.
a) First
b)
Second
c) Third
d) None of the mentioned View Answer
Answer:
c Explanation: None.
5.
In the process of fetching a web page from a server
the HTTP request/response takes RTTs.
a)
2
b) 1
c) 4
d) 3
View Answer
Answer:
b Explanation: None.
6.
The first line of
HTTP request message is called
a) Request line
b)
Header line
c) Status line
d) Entity
line View Answer
Answer: a
Explanation: The line followed
by request line are called
header lines and status line is the initial part of response
message.
7.
The values GET, POST, HEAD etc are specified
in of
HTTP message
a) Request line
b)
Header line
c) Status line
d) Entity
body View Answer
Answer: a
Explanation: It is specified in the method field of request line in the HTTP request
message.
8.
The method when used in the method
field, leaves entity
body empty.
a) POST
b)
GET
c) Both of the mentioned
d) None of the mentioned View Answer
Answer:
b Explanation: None.
9.
The HTTP response
message leaves out the requested object when method is used
a)
GET
b) POST
c) HEAD
d) PUT
View Answer
Answer:
c Explanation: None.
10.
Find the oddly matched
HTTP status codes
a) 200 OK
b)
400 Bad Request
c) 301 Moved
permanently
d) 304 Not Found View Answer
Answer: d
Explanation: 404 Not Found.
11.
Which of the following is not correct
?
a) Web cache doesnt has its own disk
space
b) Web cache can act both like server and client
c) Web cache
might reduce the response time
d) Web
cache contains copies of recently requested objects View Answer
Answer:
a Explanation: None.
12.
The conditional
GET mechanism
a)
Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned View Answer
Answer:
c Explanation: None.
13.
Which of the following is present in both an HTTP request
line and a status line?
a)
HTTP version number
b) URL
c) Method
d) None of the mentioned View Answer
Answer:
a Explanation: None.
Computer Networks Questions &
Answers – Network Utilities
This
set of Computer Networks Questions
& Answers focuses
on “Network Utilities”.
1)
Ping can
a)
Measure round-trip time
b) Report packet
loss
c) Report latency
d) All of the mentioned
View Answer
Answer:
d Explanation: None.
2)
Ping sweep is a part of
a)
Traceroute
b) Nmap
c) Route
d) Ipconfig View Answer
Answer: b
Explanation: A ping sweep
is a method that can establish a range of IP addresses which map to live hosts
and are mostly
used by network scanning tools like nmap.
3)
ICMP is used in
a)
Ping
b) Traceroute
c) Ifconfig
d) Both
a and b View Answer
Answer:
d Explanation: None.
4) command is used to manipulate TCP/IP
routing table.
a)
route
b) Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer:
a Explanation: None.
5)
If you want to find the number of routers
between a source
and destination, the utility to be used is.
a) route
b)
Ipconfig
c) Ifconfig
d) Traceroute
View Answer
Answer:
d Explanation: None.
6) Which of the following is related to ipconfig
in Microsoft Windows ?
a)
Display all current
TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned
View Answer
Answer:
d Explanation: None.
7)
This allows to check if a domain is available for registration.
a) Domain Check
b)
Domain Dossier
c) Domain Lookup
d) None of the mentioned View Answer
Answer:
a Explanation: None.
8)
Choose the wrong
statement
a)
Nslookup is used to query
a DNS server for DNS data
b) Ping is used
to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP
network interface parameters View Answer
Answer: c
Explanation: Pathping combines the functionality of ping with that of traceroute (tracert).
Computer Networks Questions &
Answers – FTP
This
set of Computer Networks Questions
& Answers focuses
on “FTP”.
1)
Expansion of FTP is
a) Fine Transfer
Protocol
b)
File Transfer Protocol
c) First Transfer
Protocol
d) None of the mentioned View Answer
Answer:
b Explanation: None.
2) FTP is built on architecture
a)
Client-server
b) P2P
c) Both of the mentioned
d) None of the mentioned View Answer
Answer:
a Explanation: None.
3) FTP uses parallel TCP connections to transfer
a file
a) 1
b)
2
c) 3
d)
4
View Answer
Answer: b
Explanation: Control connection and data connection.
4)
Identify the incorrect statement
a) FTP stands
for File Transfer
Protocol
b)
FTP uses two parallel TCP connections
c) FTP sends its
control information in-band
d) FTP
sends exactly one file over the data connection View Answer
Answer: c
Explanation: FTP is out-of-band as it has separate control
connection.
5) If 5 files are transfered from server A to client
B in the same session. The number of TCP connection between A and B is
a) 5
b)
10
c) 2
d)
6
View Answer
Answer: d
Explanation: 1 control connection and other 5 for five file transfers.
6)
FTP server
a)
Mantains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned View Answer
Answer:
a Explanation: None.
7) The commands,
from client to server, and replies, from server to client, are sent across the control connection in bit ASCII format
a) 8
b)
7
c) 3
d)
5
View Answer
Answer:
b Explanation: None.
8)
Find the FTP reply whose message is wrongly matched
a)
331 – Username
OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing
file
d) 452
– Can’t open data connection View Answer
Answer:
d Explanation: None.
9)
Mode of data transfer in FTP, where all the is left to TCP
a) Stream mode
b)
Block mode
c) Compressed mode
d) None of the mentioned View Answer
Answer:
a Explanation: None.
10)
The password is sent to the server
using command
a) PASSWD
b) PASS
c) PASSWORD
d) None of the mentioned View Answer
Answer:
b Explanation: None.
Computer Networks Questions &
Answers – Network Attacks
This
set of Computer Networks Questions
& Answers focuses
on “Network Attacks”.
1)
The attackers a network of compromised devices known as
a) Internet
b)
Botnet
c) Telnet
d) D-net View Answer
Answer:
b Explanation: None.
2) Which of the following
is a form of DoS
attack ?
a)
Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer:
d Explanation:
None.
3) The
DoS attack is which the attacker establishes a large number of half-open or
fully open TCP connections at the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer:
c Explanation: None.
4) The DoS attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b)
Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer
Answer:
b Explanation: None.
5)
Packet sniffers involve
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned View Answer
Answer: b
Explanation: They donot inject
packets into the channel.
6)
Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
View Answer
Answer:
d Explanation: None.
7)
Firewalls are often configured to block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned View Answer
Answer:
a Explanation: None.
Computer Networks Questions &
Answers – Wireless LAN
This
section of our 1000+ Computer
Networks MCQs focuses
on Wireless LAN.
1. What is the
access point (AP) in wireless
LAN?
a)
device that allows
wireless devices to connect to a wired network
b) wireless devices
itself
c) both (a) and (b)
d) none
of the mentioned View Answer
Answer:a Explanation:None.
2. In wireless
ad-hoc network
a)
access point is not required
b) access point is must
c) nodes are not required
d) none
of the mentioned View Answer
Answer:a Explanation:None.
3. Which multiple
access technique is used by IEEE 802.11
standard for wireless
LAN?
a) CDMA
b)
CSMA/CA
c) ALOHA
d) none
of the mentioned View Answer
Answer:b Explanation:None.
4. In wireless
distribution system
a)
multiple access point are
inter-connected with each other
b) there is no access
point
c) only one access point
exists
d) none
of the mentioned View Answer
Answer:a Explanation:None.
5. A wireless
network interface controller can work in
a) infrastructure mode
b)
ad-hoc mode
c) both (a) and (b)
d) none
of the mentioned View Answer
Answer:c
Explanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.
6. In wireless
network an extended
service set is a set of
a) connected basic service
sets
b)
all stations
c) all access
points
d) none
of the mentioned View Answer
Answer:a Explanation:None.
7.
Mostly is used in wireless LAN.
a)
time division multiplexing
b) orthogonal frequency division multiplexing
c) space division
multiplexing
d) none
of the mentioned View Answer
Answer:b Explanation:None.
8. Which one of the following event is not possible in wireless
LAN.
a)
collision detection
b) Acknowledgement of data
frames
c) multi-mode data transmission
d) none
of the mentioned View Answer
Answer:a Explanation:None.
9. What is Wired Equivalent Privacy (WEP) ?
a) security algorithm for ethernet
b)
security algorithm for wireless networks
c) security algorithm for usb communication
d) none
of the mentioned View Answer
Answer:b Explanation:None.
10.
What is WPA?
a) wi-fi protected
access
b) wired protected
access
c) wired process
access
d) wi-fi
process access View Answer
Answer:a Explanation:None.
Computer Networks Questions &
Answers – WiMAX
This
section of our 1000+ Computer
Networks MCQs focuses
on WiMAX.
1. WiMAX stands for
a) wireless maximum
communication
b)
worldwide interoperability for microwave access
c) worldwide international standard for microwave access
d) none
of the mentioned View Answer
Answer:b Explanation:None.
2. WiMAX provides
a)
simplex communication
b) half duplex
communication
c) full duplex
communication
d) none
of the mentioned View Answer
Answer:c Explanation:None.
3. WiMAX uses the
a) orthogonal frequency division multiplexing
b)
time division multiplexing
c) space division
multiplexing
d) all
of the mentioned View Answer
Answer:a Explanation:None.
4. Which one of the following modulation scheme is supported by WiMAX?
a) binary phase
shift keying modulation
b) quadrature phase shift keying
modulation
c) quadrature amplitude modulation
d) all
of the mentioned View Answer
Answer:d Explanation:None.
5. WiMAX MAC layer provides an interface between
a)
higher transport layers and physical
layer
b) application layer and network
layer
c) data link layer and network layer
d) none
of the mentioned View Answer
Answer:a Explanation:None.
6. For encryption, WiMAX supports
a) advanced encryption standard
b)
triple data encryption standard
c) both (a) and (b)
d) none
of the mentioned View Answer
Answer:c Explanation:None.
7. WiMAX provides
a) VoIP services
b) IPTV services
c) both (a) and (b)
d) none
of the mentioned View Answer
Answer:c Explanation:None.
8. Devices that provide the connectivity to a WiMAX
network are known as
a) subscriber stations
b) base stations
c) gateway
d) none
of the mentioned View Answer
Answer:a Explanation:None.
9. WiMAX is mostly used for
a)
local area network
b) metropolitan area network
c) personal area network
d) none
of the mentioned View Answer
Answer:b Explanation:None.
10. Which one of the following frequency
is not used in WiMAX for communication?
a) 2.3 GHz
b)
2.4 GHz
c) 2.5 GHz
d) 3.5
GHz View Answer
Answer:b Explanation:None
यदि आप पिछले या फिर Next --- Daily use English Sentence बाले पोस्ट को पढना चाहते हैं, तो नीचे दिए गए link पर click करके पढें ।
Thanks for reading Computer Networks Questions & Answers – Packet Switching & Circuit Switching
You are reading the newest post
0 Comments