Computer Networks Questions
Computer Networks Questions
Basics – 1
This set of Computer Networks Multiple Choice Questions & Answers (MCQs)
focuses on “Basics – 1”.
1. How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10
View Answer
Answer: a
Explanation: There are five layers in the Internet Protocol stack. The five layers
in Internet Protocol stack is Application, Transport, Network, Data link and
Physical layer. The internet protocol stack model is also called the TCP/IP model
and it’s used in modern Internet Communication.
2. The number of layers in ISO OSI reference model is __________
a) 5
b) 7
c) 6
d) 10
View Answer
Answer: b
Explanation: The seven layers in ISO OSI reference model is Application,
Presentation, Session, Transport, Network, Data link and Physical layer. OSI
stands for Open System Interconnect and it is a generalized model.
3. Which of the following layers is an addition to OSI model when compared with
TCP IP model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
View Answer
Answer: d
Explanation: The only difference between OSI model and TCP/IP model is that
the functions of Presentation and Session layer in the OSI model are handled by
the transport layer itself in TCP/IP. OSI is a generalized model and TCP/IP is an
application specific model.
advertisement
4. Application layer is implemented in ____________
a) End system
b) NIC
c) Ethernet
d) Packet transport
View Answer
Answer: a
Explanation: Not only application layer, but presentation layer, session layer and
transport layer are also implemented in the end system. The layers below are
implemented outside the end system, for example, the network layer is
implemented on the routers and the physical layer is implemented for the
medium.
5. Transport layer is implemented in ______________
a) End system
b) NIC
c) Ethernet
d) Signal transmission
View Answer
Answer: a
Explanation: Application, Presentation, Session and Transport layer are
implemented in the end system. The transport layer handles the process to
process delivery of the packet through ports.
Note: Join free Sanfoundry classes at Telegram or Youtube
6. The functionalities of the presentation layer include ____________
a) Data compression
b) Data encryption
c) Data description
d) All of the mentioned
View Answer
Answer: d
Explanation: Some functions of the presentation layer include character-code
translation, data conversion, data encryption and decryption, and data
translation. It connects the application layer with the layers below converting
the human readable text and media to machine readable format and vice-versa.
7. Delimiting and synchronization of data exchange is provided by __________
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
View Answer
Answer: b
Explanation: The session layer provides the mechanism for opening, closing and
managing a session between end-user application processes. The session layer
5 is responsible for establishing managing synchronizing and terminating
sessions. In TCP/IP protocol stack, the functions of the session layer are handled
by the transport layer itself and thus the session layer is missing from the TCP/IP
model.
8. In OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is _________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Answer: d
Explanation: In OSI reference model, the fifth layer is Session layer. Session
layer provides the mechanism for opening, closing and managing a session
between end-user application processes. In TCP/IP protocol stack, the functions
of the session layer are handled by the transport layer itself and thus the
session layer is missing from the TCP/IP model.
9. In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer
Answer: a
Explanation: In TCP/IP model, the fifth layer is application layer. When data is
sent from device A to device B, the 5th layer to receive data at B is application
layer. Application layer provides the interface between applications and the
network. The user interacts with only this layer.
10. In the OSI model, as a data packet moves from the lower to the upper
layers, headers are _______
a) Added
b) Removed
c) Rearranged
d) Randomized
View Answer
Answer: b
Explanation: In OSI reference model, when data packet moves from lower layers
to higher layer, headers get removed. Whereas when the data packet moves
from higher layer to lower layers, headers are added. These headers contain the
essential control information for the protocols used on the specific layer.
11. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model
View Answer
Answer: c
Explanation: One layer may use the information from another layer, for example
timestamp value. The information is contained in the header inserted by the
previous layer. The headers are added as the packet moves from higher layers
to the lower layers.
1. The data link layer takes the packets from _________ and encapsulates them
into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
View Answer
Answer: a
Explanation: In computer networks, the data from application layer is sent to
transport layer and is converted to segments. These segments are then
transferred to the network layer and these are called packets. These packets are
then sent to data link layer where they are encapsulated into frames. These
frames are then transferred to physical layer where the frames are converted to
bits. Error control and flow control data is inserted in the frames at the data link
layer.
2. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
View Answer
Answer: d
Explanation: Channel coding is the function of physical layer. Data link layer
mainly deals with framing, error control and flow control. Data link layer is the
layer where the packets are encapsulated into frames.
3. Which sublayer of the data link layer performs data link functions that depend
upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
View Answer
Answer: b
Explanation: Media access control (MAC) deals with transmission of data packets
to and from the network-interface card, and also to and from another remotely
shared channel. The MAC sublayer also prevents collision using protocols like
CSMA/CD.
advertisement
4. Header of a frame generally contains ______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
View Answer
Answer: d
Explanation: In a frame, the header is a part of the data that contains all the
required information about the transmission of the file. It contains information
like synchronization bytes, addresses, frame identifier etc. It also contains error
control information for reducing the errors in the transmitted frames.
5. Automatic repeat request error management mechanism is provided by
________
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
View Answer
Answer: a
Explanation: The logical link control is a sublayer of data link layer whose main
function is to manage traffic, flow and error control. The automatic repeat
request error management mechanism is provided by the LLC when an error is
found in the received frame at the receiver’s end to inform the sender to re-
send the frame.
Subscribe Now: Computer Network Newsletter | Important Subjects
Newsletters
6. When 2 or more bits in a data unit has been changed during the transmission,
the error is called ____________
a) random error
b) burst error
c) inverted error
d) double error
View Answer
Answer: b
Explanation: When a single bit error occurs in a data, it is called single bit error.
When more than a single bit of data is corrupted or has error, it is called burst
error. If a single bit error occurs, the bit can be simply repaired by inverting it,
but in case of a burst error, the sender has to send the frame again.
7. CRC stands for __________
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
View Answer
Answer: a
Explanation: Cyclic redundancy check is a code that is added to a data which
helps us to identify any error that occurred during the transmission of the data.
CRC is only able to detect errors, not correct them. CRC is inserted in the frame
trailer.
8. Which of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
View Answer
Answer: d
Explanation: There are many data link layer protocols. Some of them are SDLC
(synchronous data link protocol), HDLC (High level data link control), SLIP (serial
line interface protocol), PPP (Point to point protocol) etc. These protocols are
used to provide the logical link control function of the Data Link Layer.
9. Which of the following is the multiple access protocol for channel access
control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
View Answer
Answer: c
Explanation: In CSMA/CD, it deals with detection of collision after collision has
occurred, whereas CSMA/CA deals with preventing collision. CSMA/CD is
abbreviation for Carrier Sensing Multiple Access/Collision detection. CSMA/CA is
abbreviation for Carrier Sensing Multiple Access/Collision Avoidance. These
protocols are used for efficient multiple channel access.
10. The technique of temporarily delaying outgoing acknowledgements so that
they can be hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
View Answer
Answer: a
Explanation: Piggybacking is a technique in which the acknowledgment is
temporarily delayed so as to be hooked with the next outgoing data frame. It
saves a lot of channel bandwidth as in non-piggybacking system, some
bandwidth is reserved for acknowledgement.
1. FDDI can cover a much larger geographical area than Token Ring on copper.
a) True
b) False
View Answer
Answer: a
Explanation: FDDI is a standard developed for transmitting data on optical
fibers. It uses a dual ring configuration. Thus, FDDI can cover much larger
geographical area than Token Ring on copper. It also has high bandwidth.
2. WANs are configured using the ______ or the ______ topology.
a) Bus, Tree
b) Mesh, Ring
c) Ring, Hybrid
d) Mesh, Tree
View Answer
Answer: d
Explanation: The topologies used for a WAN depends on its business
requirements, physical constraints and cost/benefit ratio. The commonly used
topologies for a WAN are hub-and-spoke, partial mesh, full mesh and ring.
3. FDDI stands for _________
a) Fiber Distributed Data Interface
b) First Digital Data Interface
c) Fast Data Distribution Index
d) Fiber Distributed Data Index
View Answer
Answer: a
Explanation: Fiber Distributed Data Interface (FDDI) is a set of ANSI (American
National Standards Institute) protocols. FDDI acts as a backbone network for
WANs. It also provides high bandwidth for transmission of digital signal data
through optical fiber cable.
advertisement
4. Ethernet protocol is specified by __________
a) IEEE 802.2 standard
b) IEEE 802.3 standard
c) IEEE 802.5 standard
d) IEEE 802.11 standard
View Answer
Answer: b
Explanation: IEEE 802.3 standard is for bus networks. IEEE 802.3 standard
defines the MAC layer and Physical layer of the Ethernet. Hence it forms the
foundation for specification of Ethernet protocol. IEEE 802.2 standard is used for
specifying logical link control above the Data Link Layer of the OSI model. IEEE
802.5 standard is used for Token-ring topology. IEEE 802.11 specifies the set of
protocols for implementing Wireless LAN (WLAN).
5. WAN differs from LAN in that it links networks that are geographically
separated by a short distance.
a) True
b) False
View Answer
Answer: b
Explanation: WAN differs from LAN in that it links networks that are
geographically separated by a long distance. Typically, the WAN link connects
nodes made up of switches, bridges and routers.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects.
Participate Now!
6. The Tree structure starts with a ______ node.
a) Prime
b) Chief
c) Beginner
d) Header
View Answer
Answer: d
Explanation: A Tree Structure or topology is a hierarchical way of representation
of devices in a network. It comprises of a parent node and several child nodes.
These are branched out from the parent node. This parent node which forms the
origin of the structure is known as Header node.
7. In a Ring topology network, the data flows ________
a) in one direction only
b) away from the tokens on the ring
c) in several directions
d) in a direction where the computers in a network are fully functional
View Answer
Answer: a
Explanation: A circular data path is created in a Ring topology. In this type of
topology, the data packets travel from one device to the next until they reach
their destination. Each device in this topology is connected to two other devices
but they are not interconnected. This is the reason for data to travel in a single
direction.
8. In a network topology, when a data signal is transmitted, there are chances
that this signal may bounce back to the device that has already carried the
signal. In order to avoid this, we must use _____ at the end.
a) cap
b) beret
c) end cap
d) terminator
View Answer
Answer: d
Explanation: A terminator is a device attached to the end of a bus in a network
topology. The main objective of terminator is to absorb signals in order to avoid
the signal to reflect back. Signal reflections produce interference that causes
data loss.
9. Bridge is an example of a ________ device.
a) Peripheral
b) Network navigation
c) Storage
d) Central connecting
View Answer
Answer: b
Explanation: Navigation devices are used within an active topology to move
data around a network. It is required for communication and interaction
between devices in a network. Thus, Bridge is a Network navigation device.
10. Mesh topology is highly reliable.
a) True
b) False
View Answer
Answer: a
Explanation: The Mesh topology provides a redundant network as each node is
connected to every other node in the network. This feature makes it highly
reliable network topology compared to other topologies. If any device or link in
the network stops functioning, then there will be another path that will carry the
data signal.
1. The sharing of a medium and its link by two or more devices is called
_________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
View Answer
Answer: b
Explanation: Multiplexing is a method using which one can send multiples
signals through a shared medium at the same time. This helps in using less
resources and thus saving the cost of sending messages.
2. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
View Answer
Answer: b
Explanation: Circuit switching is a switching method by which one can obtain a
physical path between end points. Circuit switching method is also called a
connection oriented network. Two nodes must be physically and logically
connected to each other to create a circuit switching network.
3. Which multiplexing technique used to transmit digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
View Answer
Answer: b
Explanation: TDM abbreviation for Time Division Multiplexing is a method used
for digital signals. Whereas FDM and WDM abbreviation for Frequency Division
Multiplexing, and Wavelength Division Multiplexing, are used for analog signals.
TDM is used in applications like ISDN (Integrated Services Digital Network) and
PSTN (Public Switched Telephone Network).
advertisement
4. If there are n signal sources of same data rate, then the TDM link has _______
slots.
a) n
b) n/2
c) n*2
d) 2n
View Answer
Answer: a
Explanation: In TDM, the total unit of time is divided equally among all the signal
sources and each and every source has access to the complete channel
bandwidth during its allotted time slot. When the time slot of the source is not
active, it remains idle and waits for its slot to begin.
5. If link transmits 4000frames per second, and each slot has 8 bits, the
transmission rate of circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
View Answer
Answer: a
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
Subscribe Now: Computer Network Newsletter | Important Subjects
Newsletters
6. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period
View Answer
Answer: c
Explanation: There are instances when connection between two endpoints has
been established, but no communication or transfer of messages occurs. This
period of time is called silent period. The silent period ends when either of the
two endpoints starts the communication.
7. Multiplexing provides _________
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy
View Answer
Answer: d
Explanation: Multiplexing helps us to transfer our messages over a shared
channel. This brings up the issue of privacy and efficiency. Fortunately,
Multiplexing has high efficiency and high privacy when implemented because in
the implementation, the transport layer of the OSI network model handles the
function of multiplexing through interfaces called ports which provide the
required efficiency and privacy.
8. In TDM, the transmission rate of a multiplexed path is always _______ the sum
of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
View Answer
Answer: a
Explanation: In TDM the transmission rate provided by the path that is
multiplexed will always be greater than the sum of transmission rates of the
single sources. This happens because the transmission rate is provided to each
source only for a small period of time.
9. In TDM, slots are further divided into _________
a) Seconds
b) Frames
c) Packets
d) Bits
View Answer
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is
technique for combining several low rate channels to a single high rate channel.
For a certain time slot, the several channels could use the maximum bandwidth.
Each channel is inactive for a period of time too. Some other multiplexing
techniques are Frequency division multiplexing and Phase division multiplexing.
Computer Networks Questions & Answers –
Delays and Loss
This set of Computer Networks Multiple Choice Questions & Answers (MCQs)
focuses on “Delays and Loss”.
1. Which of the following delay is faced by the packet in travelling from one end
system to another?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned
View Answer
Answer: d
Explanation: When a packet has to travel from one end system to another, it
first faces the queuing delay when there are multiple packets which are to be
sent, then it faces the transmission delay to convert the packet into bits to be
transmitted, and then it faces the propagation delay to propagate the bits
through the physical medium.
2. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the
transmission delay is ____________ (in microseconds)
a) 3.2
b) 32
c) 0.32
d) 320
View Answer
Answer: a
Explanation: Transmission rate = length / transmission rate = 32/10 = 3.2
microseconds.
3. The time required to examine the packet’s header and determine where to
direct the packet is part of __________
a) Processing delay
b) Queuing delay
c) Transmission delay
d) Propagation delay
View Answer
Answer: a
Explanation: Processing delay is induced at a router’s or other network
processor’s end in the path of the packet and is caused by the time taken by the
processor to examine the packet’s header to decide the further path of the
packet.
advertisement
4. Given L = number of bits in the packet, a = average rate and R =
transmission rate. The Traffic intensity in the network is given by ____________
a) La/R
b) LR/a
c) R/La
d) Ra/L
View Answer
Answer: a
Explanation: Traffic Intensity = (Number of bits in packet * Average
Transmission rate)/Current Transmission rate.
5. In the transfer of file between server and client, if the transmission rates
along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually
___________
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
View Answer
Answer: b
Explanation: The throughput is generally the transmission rate of bottleneck
link.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects.
Participate Now!
6. If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non
congested network. The number of routers between source and destination is?
a) N/2
b) N
c) N-1
d) 2N
View Answer
Answer: c
Explanation: In the equation N (dproc + dtrans + dprop), N is the number of
checkpoints/stops that the packet makes as it reaches the destination. The
stops are made at each router and the final destination node. Now, since N =
number of routers + final node, then number of routers = N – final node. As we
know, there is only 1 final node in a path, thus, number of routers = N – 1.
Suppose, There is a path A->R1->R2->B for a packet where A is the source
node, B is the final node and R1 and R2 are routers. The total delay would be
given by N (dproc + dtrans + dprop) where N = 3, since the packet would stop
at R1, R2 and B. The number of routers here are 2, and (N – 1) is also 2.
7. The total nodal delay is given by ____________
a) dnodal = dproc – dqueue + dtrans + dprop
b) dnodal = dproc + dtrans – dqueue
c) dnodal = dproc + dqueue + dtrans + dprop
d) dnodal = dproc + dqueue – dtrans – dprop
View Answer
Answer: c
Explanation: The total node-to-node delay, that is, nodal delay is the sum of all,
the processing delay, queuing delay, transmission delay and propagation delay.
Ideally, the nodal delay must be low as possible for a better Quality of Service of
the network.
8. In a network, If P is the only packet being transmitted and there was no
earlier transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
View Answer
Answer: b
Explanation: Since there is no other packet to be transmitted, there is no need
for a queue. Therefore, the delay caused due to the queuing would be none i.e.
0.
9. Transmission delay does not depend on _____________
a) Packet length
b) Distance between the routers
c) Transmission rate
d) Bandwidth of medium
View Answer
Answer: b
Explanation: Transmission delay = packet length / transmission rate. The
transmission rate depends upon the bandwidth of the medium.
10. Propagation delay depends on ___________
a) Packet length
b) Transmission rate
c) Distance between the routers
d) Speed of the CPU
View Answer
Answer: c
Explanation: Propagation delay is caused when the packet is in its electric signal
form and is travelling through a medium (a wire or a electromagnetic wave).
Propagation delay is the time it takes a bit to propagate from one router to the
next. If the distance between the routers is increased, it will take longer time to
propagate, that is, there would be more propagation delay.
1. The number of objects in a Web page which consists of 4 jpeg images and
HTML text is ________
a) 4
b) 1
c) 5
d) 7
View Answer
Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
2. The default connection type used by HTTP is _________
a) Persistent
b) Non-persistent
c) Can be either persistent or non-persistent depending on connection request
d) None of the mentioned
View Answer
Answer: a
Explanation: By default the http connection is issued with persistent connection.
In persistent connection server leaves connection open after sending response.
As little as one RTT (Time for a small packet to travel from client to server and
back) is required for all referenced objects.
3. The time taken by a packet to travel from client to server and then back to
the client is called __________
a) STT
b) RTT
c) PTT
d) JTT
View Answer
Answer: b
Explanation: RTT stands for round-trip time.
advertisement
4. The HTTP request message is sent in _________ part of three-way handshake.
a) First
b) Second
c) Third
d) Fourth
View Answer
Answer: c
Explanation: In first step client sends a segment to establish a connection with
the server. In the second the step the client waits for the acknowledgement to
be received from the server. After receiving the acknowledgement, the client
sends actual data in the third step.
5. In the process of fetching a web page from a server the HTTP
request/response takes __________ RTTs.
a) 2
b) 1
c) 4
d) 3
View Answer
Answer: b
Explanation: By default the http connection will be persistent connection. Hence
it will take only 1 RTT to fetch a webpage from a server.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects.
Participate Now!
6. The first line of HTTP request message is called _____________
a) Request line
b) Header line
c) Status line
d) Entity line
View Answer
Answer: a
Explanation: The line followed by request line are called header lines and status
line is the initial part of response message.
7. The values GET, POST, HEAD etc are specified in ____________ of HTTP
message
a) Request line
b) Header line
c) Status line
d) Entity body
View Answer
Answer: a
Explanation: It is specified in the method field of request line in the HTTP
request message.
8. The __________ method when used in the method field, leaves entity body
empty.
a) POST
b) SEND
c) GET
d) PUT
View Answer
Answer: c
Explanation: There are two methods which help to request a response from a
server. Those are GET and POST. In GET method, the client requests data from
server. In POST method the client submits data to be processed to the server.
9. The HTTP response message leaves out the requested object when
____________ method is used
a) GET
b) POST
c) HEAD
d) PUT
View Answer
Answer: c
Explanation: HEAD method is much faster than GET method. In HEAD method
much smaller amount of data is transferred. The HEAD method asks only for
information about a document and not for the document itself.
10. Find the oddly matched HTTP status codes
a) 200 OK
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found
View Answer
Answer: d
Explanation: 404 Not Found.
11. Which of the following is not correct?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects
View Answer
Answer: a
Explanation: Web cache or also known as HTTP cache is a temporary storage
where HTML pages and images are stored temporarily so that server lag could
be reduced.
12. The conditional GET mechanism
a) Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned
View Answer
Answer: c
Explanation: The HTTP protocol requests the server of the website its trying to
access so that it can store its files, images etc. in cache memory. This request of
asking the server for a document considering a specific parameter is called
conditional GET Request.
13. Which of the following is present in both an HTTP request line and a status
line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
View Answer
Answer: a
Explanation: Status line is the the start line of an HTTP response. It contains the
information such as the protocol version, a status text, status code.
1. Multiple objects can be sent over a TCP connection between client and server
in a persistent HTTP connection.
a) True
b) False
View Answer
Answer: a
Explanation: Persistent connections are kept active after completing transaction
so that multiple objects can be sent over the same TCP connection.
2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) data link layer
View Answer
Answer: a
Explanation: HTTP is an Application layer protocol used to define how messages
are formatted and transmitted through the World Wide Web.
3. In the network HTTP resources are located by
a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) union resource locator
View Answer
Answer: a
Explanation: The Uniform Resource Identifier is a name and locator for the
resource to be located by the HTTP. The URLs and URNs are derived through the
identifier.
advertisement
4. HTTP client requests by establishing a __________ connection to a particular
port on the server.
a) user datagram protocol
b) transmission control protocol
c) border gateway protocol
d) domain host control protocol
View Answer
Answer: b
Explanation: HTTP clients perform requests using a TCP connection, because the
TCP connection provides a more reliable service. UDP is not a reliable protocol,
border gateway protocol is used on top of TCP, while domain host control
protocol is a network layer protocol.
5. In HTTP pipelining ________________
a) multiple HTTP requests are sent on a single TCP connection without waiting
for the corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) multiple HTTP requests are sent at random on a single TCP connection
View Answer
Answer: a
Explanation: HTTP pipelining helps the client make multiple requests without
having to waiting for each response, thus saving a lot of time and bandwidth for
the client.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects.
Participate Now!
6. FTP server listens for connection on port number ____________
a) 20
b) 21
c) 22
d) 23
View Answer
Answer: b
Explanation: Port 20 is used for FTP data. Port 22 is used for SSH remote login.
Port 23 is used for TELNET.
7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
View Answer
Answer: a
Explanation: The clients use the Transmission Control Protocol for FTP as it’s
more reliable than UDP, DCCP, and SCTP, and reliability of file transfer is
required to be as high as possible for FTP.
8. In Active mode FTP, the client initiates both the control and data connections.
a) True
b) False
View Answer
Answer: b
Explanation: In Passive mode of FTP, the client initiates both data and control
connections, while in Active mode, the client initiates the control connection and
then the server initiates the data connection.
9. The File Transfer Protocol is built on ______________
a) data centric architecture
b) service oriented architecture
c) client server architecture
d) connection oriented architecture
View Answer
Answer: c
Explanation: The FTP connection includes a Server and a Client which wish to
share files. The server can have multiple clients at the same time while the
client communicates with only one server at a time.
10. In File Transfer Protocol, data transfer cannot be done in ___________
a) stream mode
b) block mode
c) compressed mode
d) message mode
View Answer
Answer: d
Explanation: In Stream mode, the data is transferred in a continuous stream. In
Block mode, data is transferred after being divided into smaller blocks. In
Compressed mode, data is transferred after being compressed using some
compression algorithm.
1. When the mail server sends mail to other mail servers it becomes ____________
a) SMTP server
b) SMTP client
c) Peer
d) Master
View Answer
Answer: b
Explanation: SMTP clients are the entities that send mails to other mail servers.
The SMTP servers cannot send independent mails to other SMTP servers as an
SMTP server. There are no masters or peers in SMTP as it is based on the client-
server architecture.
2. If you have to send multimedia data over SMTP it has to be encoded into
_______
a) Binary
b) Signal
c) ASCII
d) Hash
View Answer
Answer: c
Explanation: Since only 7-bit ASCII codes are transmitted through SMTP, it is
mandatory to convert binary multimedia data to 7-bit ASCII before it is sent
using SMTP.
3. Expansion of SMTP is ________
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
View Answer
Answer: a
Explanation: SMTP or Simple Mail Transfer Protocol is an application layer
protocol used to transport e-mails over the Internet. Only 7-bit ASCII codes can
be sent using SMTP.
advertisement
4. In SMTP, the command to write receiver’s mail address is written with the
command _______
a) SEND TO
b) RCPT TO
c) MAIL TO
d) RCVR TO
View Answer
Answer: b
Explanation: RCPT TO command is followed by the recipient’s mail address to
specify where or to whom the mail is going to through the internet. If there is
more than one receiver, the command is repeated for each address continually.
5. The underlying Transport layer protocol used by SMTP is ________
a) TCP
b) UDP
c) Either TCP or UDP
d) IMAP
View Answer
Answer: a
Explanation: TCP is a reliable protocol, and Reliability is a mandatory
requirement in e-mail transmission using SMTP.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects.
Participate Now!
6. Choose the statement which is wrong incase of SMTP?
a) It requires message to be in 7bit ASCII format
b) It is a pull protocol
c) It transfers files from one mail server to another mail server
d) SMTP is responsible for the transmission of the mail through the internet
View Answer
Answer: b
Explanation: In SMTP, the sending mail server pushes the mail to receiving mail
server hence it is push protocol. In a pull protocol such as HTTP, the receiver
pulls the resource from the sending server.
7. Internet mail places each object in _________
a) Separate messages for each object
b) One message
c) Varies with number of objects
d) Multiple messages for each object
View Answer
Answer: b
Explanation: It places all objects into one message as it wouldn’t be efficient
enough if there are different messages for each object. The objects include the
text and all the multimedia to be sent.
8. Typically the TCP port used by SMTP is _________
a) 25
b) 35
c) 50
d) 15
View Answer
Answer: a
Explanation: The ports 15, 35 and 50 are all UDP ports and SMTP only uses TCP
port 25 for reliability.
9. A session may include ________
a) Zero or more SMTP transactions
b) Exactly one SMTP transactions
c) Always more than one SMTP transactions
d) Number of SMTP transactions cant be determined
View Answer
Answer: a
Explanation: An SMTP session consists of SMTP transactions only even if no
transactions have been performed. But no transactions in the session might
mean that the session is inactive or is just initiated.
10. Which of the following is an example of user agents for e-mail?
a) Microsoft Outlook
b) Facebook
c) Google
d) Tumblr
View Answer
Answer: a
Explanation: Among the options, only Microsoft Outlook is an e-mail agent.
Google is a search engine and Facebook, and Tumblr are social networking
platforms. Gmail and Alpine are some other examples of e-mail agent.
11. When the sender and the receiver of an email are on different systems, we
need only _________
a) One MTA
b) Two UAs
c) Two UAs and one MTA
d) Two UAs and two MTAs
View Answer
Answer: d
Explanation: The sender’s User Agent (UA) submits the message to a Message
Transfer Agent (MTA). Then the MTA sends the message to another MTA i.e. a
mail relay. Then the receiver receives the message from the mail relay
whenever it is available.
12. User agent does not support this ___________
a) Composing messages
b) Reading messages
c) Replying messages
d) Routing messages
View Answer
Answer: d
Explanation: The user agent is basically a software program that allows the user
to send, and receive e-mail messages. Routing of the message is done by the
Message Transfer Agent
1. Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer
protocol for electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
View Answer
Answer: a
Explanation: Since TCP is a reliable protocol, it’s more efficient to use TCP
protocol for e-mail transfer. TCP also provides more security than other
transport layer protocols.
2. SMTP connections secured by SSL are known as _____________
a) SMTPS
b) SSMTP
c) SNMP
d) STARTTLS
View Answer
Answer: a
Explanation: SSMTP is a simple mail transfer program to send mail from a local
PC to a mail host. SNMP is a network management protocol. STARTTLS
connections are secured by TLS.
3. SMTP uses which of the following TCP port?
a) 22
b) 23
c) 21
d) 25
View Answer
Answer: d
Explanation: Port 21 is used for FTP control connection, port 22 is used by SSH,
and port 23 is used by TELNET.
advertisement
4. Which of the following protocol is not used to receive mail messages?
a) SMTP
b) Post Office Protocol (POP)
c) Internet Message Access Protocol (IMAP)
d) FTP
View Answer
Answer: d
Explanation: FTP is used to share files. SMTP, POP and IMAP are the protocols
used to send and receive mails on the internet.
5. What is on-demand mail relay (ODMR)?
a) protocol for SMTP security
b) an SMTP extension
c) protocol for web pages
d) protocol for faster mail transfer
View Answer
Answer: b
Explanation: ODMR is an extension to SMTP, in which mails are relayed to the
receivers after they are authenticated. It allows only the authorized receivers to
receive the mail.
Note: Join free Sanfoundry classes at Telegram or Youtube
6. An email client needs to know the _________ of its initial SMTP server.
a) IP address
b) MAC address
c) URL
d) Name
View Answer
Answer: a
Explanation: The client needs to know the IP of its initial SMTP server as it has to
send the mail first to that server and then the server forwards the mail ahead on
behalf of the user.
7. An SMTP session may not include _______
a) zero SMTP transaction
b) one SMTP transaction
c) more than one SMTP transaction
d) one HTTP transaction
View Answer
Answer: d
Explanation: An SMTP session can only include SMTP transactions regardless the
number. Any other protocol’s transaction is not included in an SMTP session.
8. SMTP defines _______
a) message transport
b) message encryption
c) message content
d) message password
View Answer
Answer: a
Explanation: As the name suggests, Simple Mail Transfer Protocol is only
responsible for “how” the message is transferred i.e. Transport of the message.
Other protocols such as TCP are used to provide other services like encryption
for the messages.
9. Which one of the following is an SMTP server configured in such a way that
anyone on the internet can send e-mail through it?
a) open mail relay
b) wide mail reception
c) open mail reception
d) short mail reception
View Answer
Answer: a
Explanation: Anyone can send an e-mail through an Open Mail Relay server so it
acted like a free relay for email agents to forward their mails through. Open Mail
Relays are now unpopular because they can be used by attackers to perform
man-in-the-middle attacks.
10. SMTP is not used to deliver messages to ______
a) user’s terminal
b) user’s mailbox
c) user’s word processor
d) user’s email client
View Answer
Answer: c
Explanation: SMTP can only be used to send messages to user’s terminal, email
client or mailbox. A stand-alone word processor cannot be connected to a
network, so it won’t be possible to deliver messages to it.
1. The receiver of the data controls the amount of data that are to be sent by
the sender is referred to as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
View Answer
Answer: a
Explanation: Flow control is done to prevent the receiver from being overflowed
with data. It is done using various open-loop (prevention) methods and closed-
loop (recovery) methods.
2. Size of TCP segment header ranges between ___________
a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits
View Answer
Answer: c
Explanation: The size of the header can be 20 bytes at a minimum if there are
no options and can go up to 60 bytes at maximum with 40 bytes in the options
field. The header contains all the control information required to ensure ordered,
error-free and reliable delivery of the segment.
3. Connection establishment in TCP is done by which mechanism?
a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronization
View Answer
Answer: b
Explanation: A three-way handshake allows both, the server and the client to
choose their Initial Sequence Number and inform about it to the other party.
This won’t be possible using the two-way handshake mechanism.
advertisement
4. The server program tells its TCP that it is ready to accept a connection. This
process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
View Answer
Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is
started by the server. Then the Client picks an ISN (Initial Sequence Number)
and synchronizes (shares) it with the Server requesting a connection. The Server
acknowledges the clients ISN, and then picks an ISN and synchronizes it with the
Client. At last, the Client acknowledges the servers ISN.
5. A client that wishes to connect to an open server tells its TCP that it needs to
be connected to that particular server. The process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
View Answer
Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and
is done by the client once it finds the open server and picks an ISN. The Server
acknowledges the clients request, and then picks an ISN and synchronizes it
with the Client. At last, the Client acknowledges the servers ISN.
Subscribe Now: Computer Network Newsletter | Important Subjects
Newsletters
6. In Three-Way Handshaking process, the situation where both the TCP’s issue
an active open is ___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
View Answer
Answer: c
Explanation: In simultaneous open situation, two nodes send an SYN signal to
each other and start a TCP connection. Here, both TCP nodes transmit a
SYNC+ACK segment to each other and a connection is established between
them. This doesn’t happen usually, because both sides have to know which port
on the other side to send to.
7. A malicious attacker sends a large number of SYNC segments to a server,
pretending that each of them is coming from a different client by faking the
source IP address in the datagram. Which type of attack is being performed in
this situation?
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
View Answer
Answer: a
Explanation: SYNC flooding attack is a form of Denial of Service attack. Due to
the overflow of SYNC segments sent to the server, the victims are not able to
request for a connection to the server, thus resulting in Denial of Service.
8. SYNC flooding attack belongs to a type of security attack known as
___________
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
View Answer
Answer: d
Explanation: During SYNC flooding the system collapses and denies service to
every request, making it a DoS attack. Some other DoS attacks are bandwidth
flooding, connection flooding and UDP flooding.
9. The sizes of source and destination port address in TCP header are ___________
respectively.
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
View Answer
Answer: b
Explanation: All port addresses are of 16 bits and they specify the type of
service being used by the network entity. For example, port 21 is used for FTP
connections and port 25 is used for ICMP connections.
10. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
View Answer
Answer: b
Explanation: TCP header contains separate fields for sequence number and
acknowledgment number. Comparing these values is what allows TCP to detect
lost segments and in turn recover from that loss. After detecting the lost
segments, the recovery may require retransmission of the lost segments of
data.
1. Which mode of IPsec should you use to assure the security and confidentiality
of data within the same LAN?
a) AH transport mode
b) ESP transport mode
c) ESP tunnel mode
d) AH tunnel mode
View Answer
Answer: b
Explanation: ESP transport mode should be used to ensure the integrity and
confidentiality of data that is exchanged within the same LAN. ESP tunnel mode
is comparatively more secure and should be used to assure the security of the
data within different LANs.
2. Which two types of encryption protocols can be used to secure the
authentication of computers using IPsec?
a) Kerberos V5
b) SHA
c) MD5
d) Both SHA and MD5
View Answer
Answer: d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication
protocol, not an encryption protocol; therefore, answer A is incorrect.
Certificates are a type of authentication that can be used with IPsec, not an
encryption protocol; therefore, answer B is incorrect.
3. Which two types of IPsec can be used to secure communications between two
LANs?
a) AH tunnel mode
b) ESP tunnel mode
c) Both AH tunnel mode and ESP tunnel mode
d) ESP transport mode
View Answer
Answer: c
Explanation: The AH and ESP tunnel mode IPSec should be used for data
transfer purpose, option d is for integrity & confidentiality purpose. Tunnel mode
provides security for the entire original IP packet unlike transport mode which is
not as secure as it only encrypts the data portion and not the whole packet.
advertisement
4. ______ provides authentication at the IP level.
a) AH
b) ESP
c) PGP
d) SSL
View Answer
Answer: a
Explanation: The Authentication Header (AH) authenticates the origin of data,
and guarantees the integrity of the information that’s being sent using IPSec. It
also provides anti-reply security.
5. IPsec defines two protocols: _______ and ________
a) AH; SSL
b) PGP; ESP
c) AH; ESP
d) PGP; SSL
View Answer
Answer: c
Explanation: AH ensures that there is no retransmission of data from an
unauthorized source, and protects against data tampering. ESP provides with
content protection and ensures that there is integrity and confidentiality for the
message.
Subscribe Now: Computer Network Newsletter | Important Subjects
Newsletters
6. IP Security operates in which layer of the OSI model?
a) Network
b) Transport
c) Application
d) Physical
View Answer
Answer: a
Explanation: IPSec is a set of protocols used to provide authentication, data
integrity and confidentiality between two machines in an IP network. In the
TCP/IP model, it provides security at the IP layer i.e. the network layer.
7. ESP does not provide ________
a) source authentication
b) data integrity
c) privacy
d) error control
View Answer
Answer: d
Explanation: The ESP provides data confidentiality, integrity and authentication.
It provides confidentiality through encryption. ESP can operate in two modes,
transport mode and tunnel mode.
8. In computer security _______ means that computer system assets can be
modified only by authorized parities.
a) confidentiality
b) integrity
c) availability
d) authenticity
View Answer
Answer: b
Explanation: Integrity means that computer system assets can be modified only
by authorized parities. Confidentiality means that the assets can only be
accessed by authorized parties. Availability refers to the accessibility of the
resource to the authorized parties. Authenticity means that the asset is not
unethically changed.
9. In computer security _______ means that the information in a computer
system only be accessible for reading by authorized parities.
a) confidentiality
b) integrity
c) availability
d) authenticity
View Answer
Answer: a
Explanation: Confidentiality means that the assets can only be accessed by
authorized parties. Integrity means that computer system assets can be
modified only by authorized parities. Availability refers to the accessibility of the
resource to the authorized parties. Authenticity means that the asset is not
unethically changed.
10. Which of the following organizations is primarily concerned with military
encryption systems?
a) NSA
b) NIST
c) IEEE
d) ITU
View Answer
Answer: a
Explanation: The NSA is primarily responsible for military encryption systems.
The NSA designs evaluates, and implements encryption systems for the military
and government agencies with high security needs.