0% found this document useful (0 votes)
8 views

Computer Networking 60 Questions

Uploaded by

mireko430
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Computer Networking 60 Questions

Uploaded by

mireko430
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

DANDII BORU COLLEGE SHAMBU CAMPUS

Department of Hardware and Networking Service Level II


Multiple Choice Questions of Computer Networking
1. Computer Network is
A. Collection of hardware components and computers C. Sharing of resources and information

B. Interconnected by communication channels D. All of the Above

2. What is a Firewall in Computer Network?


A. The physical boundary of Network C. A system designed to prevent unauthorized access

B. An operating System of Computer Network D. A web browsing Software

3. How many layers does OSI Reference Model has?


A. 4 C. 6

B. 5 D. 7

4. DHCP is the abbreviation of


A. Dynamic Host Control Protocol C. Dynamic Hyper Control Protocol

B. Dynamic Host Configuration Protocol D. Dynamic Hyper Configuration Protocol

5. IPV4 Address is
A. 8 bit C. 32 bit

B. 16 bit D. 64 bit

6. DNS is the abbreviation of


A. Dynamic Name System C. Domain Name System

B. Dynamic Network System D. Domain Network Service

7. What is the meaning of Bandwidth in Network?


A. Transmission capacity of a communication C. Class of IP used in Network
channels D. None of Above
B. Connected Computers in the Network

8. ADSL is the abbreviation of


A. Asymmetric Dual Subscriber Line C. Asymmetric Dual System Line

B. Asymmetric Digital System Line D. Asymmetric Digital Subscriber Line

9. What is the use of Bridge in Network?


A. to connect LANs C. to control Network Speed

B. to separate LANs D. All of the above

10. Router operates in which layer of OSI Reference Model?


A. Layer 1 (Physical Layer) C. Layer 4 (Transport Layer)

B. Layer 3 (Network Layer) D. Layer 7 (Application Layer)

11. Each IP packet must contain


A. Only Source address C. Source and Destination address
B. Only Destination address D. Source or Destination address
12. Bridge works in which layer of the OSI model?
A. Application layer C. Network layer
B. Transport layer D. Datalink layer

pg. 1 Prep by: Bilisa Sh.


DANDII BORU COLLEGE SHAMBU CAMPUS
Department of Hardware and Networking Service Level II
Multiple Choice Questions of Computer Networking
13. _______ provides a connection-oriented reliable service for sending messages
A. TCP C. UDP
B. IP D. All of the above
14. Which layers of the OSI model are host-to-host layers?
A. Transport, Session, Presentation, Application C. Datalink, Network, Transport, Session
B. Network, Transport, Session, Presentation D. Physical, Datalink, Network, Transport
15. Which of the following IP address class is Multicast
A. Class A C. Class C
B. Class B D. Class D
16. Which of the following is correct regarding Class B Address of IP address
A. Network bit – 14, Host bit – 16 C. Network bit – 16, Host bit – 16
B. Network bit – 16, Host bit – 14 D. Network bit – 12, Host bit – 14
17. The last address of IP address represents
A. Unicast address C. Broadcast address
B. Network address D. None of above
18. How many bits are there in the Ethernet address?
A. 64 bits C. 32 bits
B. 48 bits D. 16 bits
19. How many layers are in the TCP/IP model?
A. 4 layers C. 6 layers
B. 5 layers D. 7 layers
20. Which of the following layer of OSI model also called end-to-end layer?
A. Presentation layer C. Session layer
B. Network layer D. Transport layer
21. Why IP Protocol is considered as unreliable?
A. A packet may be lost C. Duplicate packets may be generated
B. Packets may arrive out of order D. All of the above
22. What is the minimum header size of an IP packet?
A. 16 bytes C. 20 bytes
B. 10 bytes D. 32 bytes
23. Which of following provides reliable communication?
A. TCP C. UDP
B. IP D. All of the above
24. What is the address size of IPv6 ?
A. 32 bit C. 128 bit
B. 64 bit D. 256 bit
25. What is the size of Network bits & Host bits of Class A of IP address?
A. Network bits 7, Host bits 24 C. Network bits 7, Host bits 23
B. Network bits 8, Host bits 24 D. Network bits 8, Host bits 23
26. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link

pg. 2 Prep by: Bilisa Sh.


DANDII BORU COLLEGE SHAMBU CAMPUS
Department of Hardware and Networking Service Level II
Multiple Choice Questions of Computer Networking
Determines on which outing link a packet is to be forwarded
C.
D. Forwards a packet to all outgoing links except the originated link
27. The Internet is an example of
A. Cell switched network C. Packet switched network
B. circuit switched network D. All of above
28. What does protocol defines?
A. Protocol defines what data is communicated. C. Protocol defines when data is communicated.
B. Protocol defines how data is communicated. D. All of above
29. What is the uses of subnetting?
A. It divides one large network into several smaller ones C. It speeds up the speed of network
B. It divides network into network classes D. None of above
30. Repeater operates in which layer of the OSI model?
A. Physical layer C. Network layer
B. Data link layer D. Transport layer
31. What is the benefit of the Networking?
File Sharing
A. C. Easier Backups
B. Easier access to Resources D. All of the Above
32. Which of the following is not the Networking Devices?
A. Gateways C. Routers
B. Linux D. Firewalls
33. What is the size of MAC Address?
A. 16-bits C. 48-bits
B. 32-bits D. 64-bits
34. Which of the following can be Software?
A. Routers C. Gateway
B. Firewalls D. Modems
35. What is the use of Ping command?
A. To test a device on the network is reachable C. To test a bug in a Application
B. To test a hard disk fault D. To test a Pinter Quality
36. MAC Address is the example of
A. Transport Layer C. Application Layer
B. Data Link Layer D. Physical Layer
37. Routing tables of a router keeps track of
A. MAC Address Assignments C. Distribute IP address to network devices
B. Port Assignments to network devices D. Routes to use for forwarding data to its destination
38. Layer-2 Switch is also called
A. Multiport Hub C. Multiport Bridge
B. Multiport Switch D. Multiport NIC
39. Difference between T568A and T568B is
A. Difference in wire color C. Just different length of wires
B. Difference in number of wires D. Just different manufacturer standards

pg. 3 Prep by: Bilisa Sh.


DANDII BORU COLLEGE SHAMBU CAMPUS
Department of Hardware and Networking Service Level II
Multiple Choice Questions of Computer Networking
40. The meaning of Straight-through Cable is
A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted
41. Which of the following is not the External Security Threats?
A. Front-door Threats C. Underground Threats
B. Back-door Threats D. Denial of Service (DoS)
42. What is the Demilitarized Zone?
A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
43. What is the full form of RAID ?
A. Redundant Array of Independent Disks C. Random Access of Independent Disks
B. Redundant Array of Important Disks D. Random Access of Important Disks
44. What is the maximum header size of an IP packet?
A. 32 bytes C. 30 bytes
B. 64 bytes D. 60 bytes
45. What is the size of Host bits in Class B of IP address?
A. 04 C. 16
B. 08 D. 32
46. What is the usable size of Network bits in Class B of IP address?
A. 04 C. 14
B. 08 D. 16
47. In which type of RAID, data is mirrored between two disks.
A. RAID 0 C. RAID 2
B. RAID 1 D. RAID 3
48. What do you mean by broadcasting in Networking?
A. It means addressing a packet to all machine
B. It means addressing a packet to some machine
C. It means addressing a packet to a particular machine
D. It means addressing a packet to except a particular machine
49. Which of the following is/are Protocols of Application?
A. FTP C. Telnet
B. DNS D. All of above
50. Which of the following protocol is/are defined in Transport layer?
A. FTP C. UDP
B. TCP D. B & C
51. What is the IP Address range of APIPA?
A. 169.254.0.1 to 169.254.0.254 C. 169.254.0.1 to 169.254.255.254
B. 169.254.0.1 to 169.254.0.255 D. 169.254.0.1 to 169.254.255.255

pg. 4 Prep by: Bilisa Sh.


DANDII BORU COLLEGE SHAMBU CAMPUS
Department of Hardware and Networking Service Level II
Multiple Choice Questions of Computer Networking
52. Which of the following is correct in VLSM?
A. Can have subnets of different sizes C. No required of subnet
B. Subnets must be in same size D. All of above
53. What does the port number in a TCP connection specify?
A. It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above
54. The class-based addressing is also known as
A. Modern Model C. Classless Model
B. Classful Model D. Heterogeneous Model
55. Which of the following is correct in CIDR?
A. Class A includes Class B network C. There are high & low class network
B. There are only two networks D. There is no concept of class A, B, C networks
56. What is the size of Source and Destination IP address in IP header?
A. 4 bits C. 16 bits
B. 8 bits D. 32 bits
57. Which of the following is reliable communication?
A. TCP C. UPD
B. IP D. All of them
58. What is the typical range of Ephemeral ports?
A. 1 to 80 C. 80 to 8080
B. 1 to 1024 D. 1024 to 65535
59. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message C. Typically used to push the message
B. Typically used to indicate beginning of message D. Typically used to indicate stop the message
60. What is the natural mask for a class C Network?
A. 255.255.255.1 C. 255.255.255.254
B. 255.255.255.0 D. 255.255.255.255

pg. 5 Prep by: Bilisa Sh.

You might also like