Department of Hardware and Networking Service Level II
Multiple Choice Questions of Computer Networking 1. Computer Network is A. Collection of hardware components and computers C. Sharing of resources and information
B. Interconnected by communication channels D. All of the Above
2. What is a Firewall in Computer Network?
A. The physical boundary of Network C. A system designed to prevent unauthorized access
B. An operating System of Computer Network D. A web browsing Software
3. How many layers does OSI Reference Model has?
A. 4 C. 6
B. 5 D. 7
4. DHCP is the abbreviation of
A. Dynamic Host Control Protocol C. Dynamic Hyper Control Protocol
B. Dynamic Host Configuration Protocol D. Dynamic Hyper Configuration Protocol
5. IPV4 Address is A. 8 bit C. 32 bit
B. 16 bit D. 64 bit
6. DNS is the abbreviation of
A. Dynamic Name System C. Domain Name System
B. Dynamic Network System D. Domain Network Service
7. What is the meaning of Bandwidth in Network?
A. Transmission capacity of a communication C. Class of IP used in Network channels D. None of Above B. Connected Computers in the Network
8. ADSL is the abbreviation of
A. Asymmetric Dual Subscriber Line C. Asymmetric Dual System Line
B. Asymmetric Digital System Line D. Asymmetric Digital Subscriber Line
9. What is the use of Bridge in Network?
A. to connect LANs C. to control Network Speed
B. to separate LANs D. All of the above
10. Router operates in which layer of OSI Reference Model?
A. Layer 1 (Physical Layer) C. Layer 4 (Transport Layer)
B. Layer 3 (Network Layer) D. Layer 7 (Application Layer)
11. Each IP packet must contain
A. Only Source address C. Source and Destination address B. Only Destination address D. Source or Destination address 12. Bridge works in which layer of the OSI model? A. Application layer C. Network layer B. Transport layer D. Datalink layer
pg. 1 Prep by: Bilisa Sh.
DANDII BORU COLLEGE SHAMBU CAMPUS Department of Hardware and Networking Service Level II Multiple Choice Questions of Computer Networking 13. _______ provides a connection-oriented reliable service for sending messages A. TCP C. UDP B. IP D. All of the above 14. Which layers of the OSI model are host-to-host layers? A. Transport, Session, Presentation, Application C. Datalink, Network, Transport, Session B. Network, Transport, Session, Presentation D. Physical, Datalink, Network, Transport 15. Which of the following IP address class is Multicast A. Class A C. Class C B. Class B D. Class D 16. Which of the following is correct regarding Class B Address of IP address A. Network bit – 14, Host bit – 16 C. Network bit – 16, Host bit – 16 B. Network bit – 16, Host bit – 14 D. Network bit – 12, Host bit – 14 17. The last address of IP address represents A. Unicast address C. Broadcast address B. Network address D. None of above 18. How many bits are there in the Ethernet address? A. 64 bits C. 32 bits B. 48 bits D. 16 bits 19. How many layers are in the TCP/IP model? A. 4 layers C. 6 layers B. 5 layers D. 7 layers 20. Which of the following layer of OSI model also called end-to-end layer? A. Presentation layer C. Session layer B. Network layer D. Transport layer 21. Why IP Protocol is considered as unreliable? A. A packet may be lost C. Duplicate packets may be generated B. Packets may arrive out of order D. All of the above 22. What is the minimum header size of an IP packet? A. 16 bytes C. 20 bytes B. 10 bytes D. 32 bytes 23. Which of following provides reliable communication? A. TCP C. UDP B. IP D. All of the above 24. What is the address size of IPv6 ? A. 32 bit C. 128 bit B. 64 bit D. 256 bit 25. What is the size of Network bits & Host bits of Class A of IP address? A. Network bits 7, Host bits 24 C. Network bits 7, Host bits 23 B. Network bits 8, Host bits 24 D. Network bits 8, Host bits 23 26. What does Router do in a network? A. Forwards a packet to all outgoing links B. Forwards a packet to the next free outgoing link
pg. 2 Prep by: Bilisa Sh.
DANDII BORU COLLEGE SHAMBU CAMPUS Department of Hardware and Networking Service Level II Multiple Choice Questions of Computer Networking Determines on which outing link a packet is to be forwarded C. D. Forwards a packet to all outgoing links except the originated link 27. The Internet is an example of A. Cell switched network C. Packet switched network B. circuit switched network D. All of above 28. What does protocol defines? A. Protocol defines what data is communicated. C. Protocol defines when data is communicated. B. Protocol defines how data is communicated. D. All of above 29. What is the uses of subnetting? A. It divides one large network into several smaller ones C. It speeds up the speed of network B. It divides network into network classes D. None of above 30. Repeater operates in which layer of the OSI model? A. Physical layer C. Network layer B. Data link layer D. Transport layer 31. What is the benefit of the Networking? File Sharing A. C. Easier Backups B. Easier access to Resources D. All of the Above 32. Which of the following is not the Networking Devices? A. Gateways C. Routers B. Linux D. Firewalls 33. What is the size of MAC Address? A. 16-bits C. 48-bits B. 32-bits D. 64-bits 34. Which of the following can be Software? A. Routers C. Gateway B. Firewalls D. Modems 35. What is the use of Ping command? A. To test a device on the network is reachable C. To test a bug in a Application B. To test a hard disk fault D. To test a Pinter Quality 36. MAC Address is the example of A. Transport Layer C. Application Layer B. Data Link Layer D. Physical Layer 37. Routing tables of a router keeps track of A. MAC Address Assignments C. Distribute IP address to network devices B. Port Assignments to network devices D. Routes to use for forwarding data to its destination 38. Layer-2 Switch is also called A. Multiport Hub C. Multiport Bridge B. Multiport Switch D. Multiport NIC 39. Difference between T568A and T568B is A. Difference in wire color C. Just different length of wires B. Difference in number of wires D. Just different manufacturer standards
pg. 3 Prep by: Bilisa Sh.
DANDII BORU COLLEGE SHAMBU CAMPUS Department of Hardware and Networking Service Level II Multiple Choice Questions of Computer Networking 40. The meaning of Straight-through Cable is A. Four wire pairs connect to the same pin on each end B. The cable Which Directly connects Computer to Computer C. Four wire pairs not twisted with each other D. The cable which is not twisted 41. Which of the following is not the External Security Threats? A. Front-door Threats C. Underground Threats B. Back-door Threats D. Denial of Service (DoS) 42. What is the Demilitarized Zone? A. The area between firewall & connection to an external network B. The area between ISP to Military area C. The area surrounded by secured servers D. The area surrounded by the Military 43. What is the full form of RAID ? A. Redundant Array of Independent Disks C. Random Access of Independent Disks B. Redundant Array of Important Disks D. Random Access of Important Disks 44. What is the maximum header size of an IP packet? A. 32 bytes C. 30 bytes B. 64 bytes D. 60 bytes 45. What is the size of Host bits in Class B of IP address? A. 04 C. 16 B. 08 D. 32 46. What is the usable size of Network bits in Class B of IP address? A. 04 C. 14 B. 08 D. 16 47. In which type of RAID, data is mirrored between two disks. A. RAID 0 C. RAID 2 B. RAID 1 D. RAID 3 48. What do you mean by broadcasting in Networking? A. It means addressing a packet to all machine B. It means addressing a packet to some machine C. It means addressing a packet to a particular machine D. It means addressing a packet to except a particular machine 49. Which of the following is/are Protocols of Application? A. FTP C. Telnet B. DNS D. All of above 50. Which of the following protocol is/are defined in Transport layer? A. FTP C. UDP B. TCP D. B & C 51. What is the IP Address range of APIPA? A. 169.254.0.1 to 169.254.0.254 C. 169.254.0.1 to 169.254.255.254 B. 169.254.0.1 to 169.254.0.255 D. 169.254.0.1 to 169.254.255.255
pg. 4 Prep by: Bilisa Sh.
DANDII BORU COLLEGE SHAMBU CAMPUS Department of Hardware and Networking Service Level II Multiple Choice Questions of Computer Networking 52. Which of the following is correct in VLSM? A. Can have subnets of different sizes C. No required of subnet B. Subnets must be in same size D. All of above 53. What does the port number in a TCP connection specify? A. It specifies the communication process on the two end systems B. It specifies the quality of the data & connection C. It specify the size of data D. All of the above 54. The class-based addressing is also known as A. Modern Model C. Classless Model B. Classful Model D. Heterogeneous Model 55. Which of the following is correct in CIDR? A. Class A includes Class B network C. There are high & low class network B. There are only two networks D. There is no concept of class A, B, C networks 56. What is the size of Source and Destination IP address in IP header? A. 4 bits C. 16 bits B. 8 bits D. 32 bits 57. Which of the following is reliable communication? A. TCP C. UPD B. IP D. All of them 58. What is the typical range of Ephemeral ports? A. 1 to 80 C. 80 to 8080 B. 1 to 1024 D. 1024 to 65535 59. What is the purpose of the PSH flag in the TCP header? A. Typically used to indicate end of message C. Typically used to push the message B. Typically used to indicate beginning of message D. Typically used to indicate stop the message 60. What is the natural mask for a class C Network? A. 255.255.255.1 C. 255.255.255.254 B. 255.255.255.0 D. 255.255.255.255