Computer Networks 1 MCQ CCE 23 24
Computer Networks 1 MCQ CCE 23 24
MCQ 2023/2024
1
7. Which of the following is an advantage of Bus topology?
a) Easy to use and construct
b) Easy to troubleshoot
c) Perform well in heavy traffic
d) All of the above
Answer: a
8. Which of the following is drawback of Bus topology?
a) Hard to troubleshoot
b) Centralized control.
c) If the central device fails, the whole network fails
d) Adding new devices is very hard
Answer: a
9. Which of the following is an advantage of Ring Topology?
a) Easy to troubleshoot
b) Heavy network traffic can slow the network
c) Equal access for all users
d) All of the above
Answer: a
10. When traffic becomes heavy, requests for new connections are refused in …….
a) Circuit Switching
b) Packet Switching
c) Both
d) None of Them
Answer: a
11. When Hub receives a packet it …….
a) broadcast the packet to all computers
b) Send it to the determined computer only
c) Block the packet
d) Can do both a&b
Answer: a
12. A device used to amplify the transmitted signal through the network
a. Switch
b. Bridge
c. Repeater
d. Hub
Answer: c
13. The physical address is a …….. Bit address
a. 48
b. 255
c. FF
2
d. 32
Answer: a
14. If we need to split a LAN into two separated segments, we need a ……...
a. Router
b. Repeater
c. Bridge
d. Splitter
Answer: c
15. Switches ….
a. Route the transmitted data to its destination
b. Broadcast the transmitted data to multiple destination
c. Forward the transmitted data to its destination
d. None of the mentioned above
Answer: c
16. A ………… recognizes the logical addresses.
a. Router
b. Repeater
c. Bridge
d. Switch
Answer: a
17. If we need to split a LAN because of collisions and limited bandwidth, we need a …...
a. Router
b. Repeater
c. bridge
d. splitter
Answer: c
18. ………… recognize the physical addresses.
a. routers
b. Switches
c. bridges
d. b& c
Answer: d
19. If we need to extend a LAN because the signal is very weak at the end of the line, we need a
a. Router
b. Repeater
c. bridge
d. splitter
Answer: b
20. The physical address is …….. Octets, while the logical address is …… octets.
a. 48, 32
3
b. 8, 6
c. FF, 255
d. 6, 4
Answer: d
21. A device used to provide connectivity between different LANs is …
a. Router
b. Repeater
c. bridge
d. splitter
Answer: a
22. The logical address is …….. Bits address.
a. 255
b. 48
c. FF
d. 32
Answer: d
4
d) None of the above
Answer: a
25. According to your previous answer, Which devices can be connected with this cable type?
I. Switch & Switch II. Switch & PC III. Router & PC IV. Router & Switch
a) I & II
b) II & III
c) II& III & IV
d) All of them
Answer: c
26. The suitable connection between a router and a switch is
a. Copper roll-over
b. Copper cross-over
c. Copper straight-through
d. None of the mentioned
Answer: c
27. The suitable connection between two switches is
a. Copper roll-over
b. Copper cross-over
c. Copper straight-through
d. None of the mentioned
Answer: b
28. The suitable connection for switches and router configuration is
a. Copper roll-over
b. Copper cross-over
c. Copper straight-through
d. None of the mentioned
Answer: a
5
a) Core
b) Cladding
c) Wire
d) Wave
Answer: b
31. The inner part called
a) Core
b) Cladding
c) Wire
d) Wave
Answer: a
32. …………… is a framework for network implementation and troubleshooting. Also divides
complex functions into simpler components.
a) Network Diagnosis system
b) Network Reference Model
c) Network Interface Card
d) All mentioned above
Answer: b
33. Reference models such as………..
a) OSI
b) TCP/IP
c) DoD
d) All mentioned above
Answer: d
34. …….. are a set of rules that define how devices and software should work to communicate
through computer networks.
a) Functions
b) Methods
c) Protocols
d) Algorithms
Answer: c
35. Web browser operates in Layer ……..
a) 7
b) 6
c) 5
d) 4
Answer: a
36. Layer ……… is responsible for presenting the data in the proper format.
a) 7
b) 6
c) 5
6
d) 4
Answer: b
37. Layer …….. ensures that all information required for opening a session is available.
a) 7
b) 6
c) 5
d) 4
Answer: c
38. Layer …….. is responsible for the segmentation of data
a) 7
b) 6
c) 5
d) 4
Answer: d
39. Layer …….. is responsible for end-to-end checks.
a) 7
b) 6
c) 5
d) 4
Answer: d
40. TCP & UDP are examples of layer ……..protocols.
a) 7
b) 6
c) 5
d) 4
Answer: d
41. Layer …….. is responsible for end-to-end delivery.
a) 4
b) 3
c) 2
d) 1
Answer: a
42. ………. is the process of selecting the best path to a desired destination.
a) Switching
b) Routing
c) Forwarding
d) Selection
Answer: b
43. Layer …….. is responsible for node-to-node delivery.
a) 4
7
b) 3
c) 2
d) 1
Answer: c
44. Layer …….. is responsible for Cable length, Cable type, Bit rate, and Voltage levels.
a) 4
b) 3
c) 2
d) 1
Answer: d
45. Which layer provides the services to the user?
a) application layer
b) session layer
c) presentation layer
d) physical layer
Answer: a
46. The transmission data rate is decided by …………….
a) network layer
b) physical layer
c) data link layer
d) transport layer
Answer: b
47. Network layer in OSI model called ……… in TCP/IP model
a) Internet
b) Router
c) Network access
d) Transport
Answer: a
48. The transport layer exists in …….
a) OSI model
b) TCP/IP model
c) Both of them
d) None of them
Answer: c
49. …….. is the Process of adding control information as it passes down through the layered
model.
a) Compression
b) Encapsulation
c) Encryption
d) Communication
Answer: b
8
50. Router operates in layer ………
a) 4
b) 3
c) 2
d) 1
Answer: b
51. Switch operates in layer ………
a) 4
b) 3
c) 2
d) 1
Answer: c
52. When sending data to the network, Data is sent through layers…..
a) 1-2-3-4-5-6-7
b) 1-2-4-3-5-6-7
c) 7-6-5-3-4-2-1
d) 7-6-5-4-3-2-1
Answer: d
53. When receiving data from the network, Data is received through layers…..
a) 1-2-3-4-5-6-7
b) 1-2-4-3-5-6-7
c) 7-6-5-3-4-2-1
d) 7-6-5-4-3-2-1
Answer: a
54. PDU is named segment in ………. Layer
a) Transport
b) Network
c) Data-link
d) Physical
Answer: a
55. PDU is named packet in ………. Layer
a) Transport
b) Network
c) Data-link
d) Physical
Answer: b
56. PDU is named frame in ………. Layer
a) Transport
b) Network
c) Data-link
d) Physical
9
Answer: c
57. PDU is named bits in ………. Layer
a) Transport
b) Network
c) Data-link
d) Physical
Answer: d
58. Source and Destination IPs are added in Layer …….. header
a) 4
b) 3
c) 2
d) 1
Answer: b
59. Source and Destination Mac addresses are added in Layer …….. header
a) 4
b) 3
c) 2
d) 1
Answer: c
60. Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
Answer: d
61. According to the following figure,
Y X DATA
10
63. Application layer protocol defines ……
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned above
Answer: d
64. …………… is the device requesting the information
a) Access Point
b) server
c) client
d) all mentioned above
Answer: c
65. ……………… is the device responding to the received requests.
a) Access point
b) server
c) client
d) all mentioned above
Answer: b
66. …………..used to resolve Internet names to IP addresses
a) DHCP
b) HTTP
c) DNS
d) Telnet
Answer: c
67. …………. used to provide remote access to servers and networking devices
a) DHCP
b) HTTP
c) DNS
d) Telnet
Answer: d
68. ………….. used to automatically assign an IP address, subnet mask, default gateway and
DNS server to a host
a) DHCP
b) HTTP
c) DNS
d) Telnet
Answer: a
69. ………….. used to transfer files that make up the Web pages of the World Wide Web
a) DHCP
b) HTTP
c) SMTP
11
d) Telnet
Answer: b
70. …………. used for interactive file transfer between systems
a) DHCP
b) HTTP
c) SMTP
d) FTP
Answer: d
71. ………….. used for the transfer of mail messages and attachments
a) DHCP
b) HTTP
c) SMTP
d) FTP
Answer: c
72. Which one of the following is not an application layer protocol?
a) Domain Name protocol
b) Dynamic host configuration protocol
c) Resource reservation protocol
d) File transfer protocol
Answer: c
73. The file transfer protocol is built on ……..
a) data-centric architecture
b) service oriented architecture
c) client-server architecture
d) none of the mentioned
Answer: c
74. Identify the correct order in which the following actions take place in an interaction
between a web browser and a web server.
1. The web browser requests a webpage using HTTP.
2. The web browser establishes a TCP connection with the web server.
3. The web server sends the requested webpage using HTTP.
4. The web browser resolves the domain name using DNS.
a) 4,2,1,3
b) 1,2,3,4
c) 4,1,2,3
d) 2,4,1,3
Answer: a
75. Identify the correct order in which the following actions take place in an interaction
between a client and a DHCP server.
1. The client broadcasts a DHCP request message (can I use 10.0.0.1?)
12
2. The client broadcasts a DHCP discover message (could anyone give me an IP?).
3. The DHCP server replies with a DHCP offer message (do you want to use 10.0.0.1?).
4. The DHCP server replies with a DHCP Acknowledgement message (yes you can).
a) 4,2,1,3
b) 1,2,3,4
c) 4,1,2,3
d) 2,3,1,4
Answer: d
76. Ping can ……….
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the above
Answer: d
77. DNS uses a ………… to resolve the names associated with any IP address.
a) Centralized server
b) Local server
c) distributed set of servers
d) all mentioned above
Answer: c
78. Which one of the following is not correct regarding telent?
a) telnet lets users access an application on a remote compute
b) A connection using Telnet is called a Virtual Terminal (VTY) session
c) telnet can be used for file transfer
d) Telnet supports user authentication, but does not encrypt data.
Answer: c
79. In FTP, the client contacts the server using …………. as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
Answer: a
80. …………… is responsible for the overall end-to-end transfer of application data.
a) Application layer
b) Presentation layer
c) Session layer
d) Transport layer
Answer: d
81. The main functions of the transport protocol are…..
a) Tracking the individual communication between applications on the source and destination hosts.
b) Segmenting/ reassembling data and managing each piece.
13
c) Identifying the different applications.
d) All mentioned above
Answer: d
82. Which one of the following is not a transport layer protocol?
a) User datagram protocol
b) Transmission control protocol
c) Session initiation protocol
d) None of the mentioned
Answer: c
83. Both UDP and TCP run on top of the ………
a) Session layer
b) Internet protocol
c) Transport layer
d) a & c
Answer: b
84. TCP protocol divides the transferred data into ……….., while UDP protocol divides it into
…..
a) segments, packets
b) packets, segments
c) segments, datagrams
d) datagrams, segments
Answer: c
85. …………. provides the means to both send and receive data when running multiple
applications concurrently on a computer.
a) Data fragmentation
b) Data encapsulation
c) Data de-encapsulation
d) Data segmentation
Answer: d
86. ……… is a numerical value that identifies the application associated with the data.
a) Port number
b) IP address
c) MAC address
d) All mentioned above
Answer: a
87. TCP protocol provides the following except……
a) Connection oriented transmission
b) Low overhead
c) Reliable delivery
d) Ordered data reconstruction
Answer: b
14
88. UDP protocol provides the following except……
a) Connectionless transmission
b) Low overhead
c) Reliable delivery
d) Delivers data as it arrives
Answer: c
89. In networking terms, ………. means ensuring that each piece of data that the source sends
arrives at the destination
a) Availability
b) Interoperability
c) Maintainability
d) Reliability
Answer: d
90. The following applications utilize the UDP expect……….
a) Domain name system
b) Emails
c) Voice over IP
d) Online games
Answer: b
91. The following applications utilize the TCP expect……….
a) Routing Information protocol
b) File transfer
c) Web browser
d) Email
Answer: a
15
94. The equivalent decimal presentation of the following IP address is……
1100 0000 . 1010 1000. 0000 1000 . 1111 0000
a) 192.16.24.340
b) 129.16.8.224
c) 192.168.8.240
d) 129.168.8.224
Answer: c
95. The maximum decimal number that could present an octet of an IP address is…..
a) FF
b) 32
c) 255
d) 48
Answer: c
16
100. Which of the following commands is utilized to confirm if the given PC with an IP
address is connected to the network?
a) Ring
b) Sing
c) Bing
d) Ding
Answer: c
17