60 TOP Real Time Computer Networking Multiple choice Questions and Answers pdf download

Read the most frequently asked 60 top Computer Networking multiple choice questions and answers PDF for freshers and experienced

Computer Networking Objective type Questions and Answers List


1. What is the other types of OLAP apart from ROLAP?
A. HOLAP
B. MOLAP
C. DOLAP
D. Both a and b above
Ans: B

2. A network router joins two _________ together?
A. Computers
B. Switches
C. Networks
D. Gateway
Ans: C

3. Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues.
A. True
B. False
Ans: A

4. Which of the following below is a loop back IP address?
A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
Ans: D

5. Ping command works on which protocol?
A. ICMP
B. TCP
C. IP
D. UDP
Ans: A

6. Transport layer of OSI model lies between Network and ___________ layer
A. Application
B. Data link
C. Session
D. Presentation
Ans: C

7. Which of the following protocols below work in application layer?
A. POP
B. PPP
C. FTP
D. Both a and d above
Ans: D

8. What is the port number for HTTP?
A. 25
B. 80
C. 21
D. 65
Ans: B

9. IP4 is more commonly used than IPv6?
A. True
B. False
Ans: A

10. From the options below, which suits best for MODEM?
A. a device that modulates an analog carrier signal to encode digital information
B. a device that modulates a digital carrier signal to encode analog information
C. a device that modulates an analog carrier signal to decode digital information
D. a device that modulates a digital carrier signal to decode analog information
Ans: A

11. WHat is the size of an IP address?
A. 64 bit
B. 128 bit
C. 16 bit
D. 32 bit
Ans: D

12. MAC addresses are also known as?
A. Hardware address
B. Physical address
C. both and b above
D. IP address
Ans: C

13. A network point that provides entrance into another network is called as ___________
A. Node
B. Gateway
C. Switch
D. Router
Ans: B

14. UDP is an unreliabe protocol.
A. True
B. False
Ans: A

15. A stream socket provides _________ communications between a client and server
A. One way
B. Two way
Ans: B

16. Token Ring is a data link technology for ?
A. WAN
B. MAN
C. LAN
D. both a and b above
Ans: C

17. Which of the following protocol below are suited for email retrieval?
A. POP3
B. IMAP
C. FTP
D. Both and b above
Ans: D

18. TELNET used _________ protocol for data connection
A. TCP
B. UDP
C. IP
D. DHCP
Ans: A

19. 10Base5, 10Base2, 10BaseT are types of?
A. Internet
B. LAN
C. Ethernet
D. Cables
Ans: C

20. The process of assigning IP address for specific times to the various hosts by DHCP is called as?
A. Lend
B. sublease
C. let
D. Lease
Ans: D

21. What is the full form of URL?
A. Uniform routing locator
B. Uniform Resource locator
C. Universal Resource locator
D. Uniform router locator
Ans: B

22. __________ is a standard suite of protocols used for packet switching across computer networks.
A. x.22
B. x.23
C. x.25
D. x.26
Ans: C

23. What is the full form of CAN?
A. Campus Area Network
B. Cluster Area Network
C. Control Area network
D. both A and B
Ans: D

24. Which of the following below is/are capability of ICMP protocol?
A. Report package count
B. Report network congestion
C. Both b and d
D. Report availability of remote hosts
Ans: C

25. ARP works on Ethernet networks.
A. False
B. True
Ans: B

26. _______ assigns a unique number to each IP network adapter called the MAC address.
A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Both B and C above
Ans: A

27. Piconets in blue tooth a minimum of two and a maximum of ____________ Bluetooth peer devices.
A. five
B. eight
C. nine
D. four
Ans: B

28. Dynamic addressing doesn’t allow many devices to share limited address space on a network
A. True
B. False
Ans: B

29. NAT stands for _____ .
A. network address transformer
B. network address translator
C. network address translation
D. Both B and C above
Ans: C

30. Which of the following is true for secure shell tunneling?
A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port
B. SSH tunnels provide a means to not bypass firewalls
C. All SSH clients support dynamic port forwarding
D. Both A and B
Ans: A

31. Which of the following below are secure VPN protocols?
A. UDP
B. TCP
C. SSTP
D. Both B and C
Ans: D

32. What is the difference between a switch and a hub?
A. Switches operate at physical layer while hubs operate at data link layer
B. Switches operate at data link layer while hubs operate at transport layer
C. Switches operate at data link layer while hubs operate at physical layer
D. Switches operate at transport layer while hubs operate at physical layer
Ans: C

33. When computers in a network listen and receive the signal, it is termed as active toplogy
A. True
B. False
Ans: A

34. In 10base2, 10base5, what does 2 and 5 stand for?
A. Speed in mbps
B. Number of segments
C. Length of segment
D. Size of segment
Ans: B

35. ______is added to data packet for error detection.
A. checksum bit
B. error bit
C. parity bit
Ans: C

36. ALL IP addresses are divided into network address and host address
A. True
B. False
Ans: A
37. How can we examine the current routing tables in command prompt?
A. using routestart
B. using netstart
C. using netstat
D. either a or b
Ans: C

38. Both ping and tracert are used to find If the computer is in network.
A. True
B. False
Ans: B

39. What is the difference between ring and bus topology?
A. In Ring all nodes are connected with another in a loop while in bus they are connected to a central cable
B. In Ring all nodes are connected with another loop while in bus they are connected to a central cable
C. In bus all nodes are connected with another in a loop while in star they are connected to a central node
D. In Bus all nodes are connected with another loop while in star they are connected to a central cable
Ans: A

40. MAC addressing works in data link layer while IP addressing works in network layer.
A. True
B. False
Ans: A

41. A packet whose destination is outside the local TCP/IP network segment is sent to the ____ .
A. File server
B. Default gateway
C. DNS server
D. DHCP server
Ans: B

42. Why was the OSI model developed?
A. manufacturers disliked the TCP/IP protocol suite
B. the rate of data transfer was increasing exponentially
C. standards were needed to allow any two systems to communicate
D. none of the above
Ans: C

43. Which piece of information is not vital for a computer in a TCP/IP network?
A. IP address
B. Default gateway
C. Subnet Mask
D. DNS server
Ans: D

44. The physical layer is concerned with the movement of _______ over the physical medium.
A. programs
B. dialogs
C. protocols
D. Bits
Ans: D

45. Which protocol below operates at the network layer in the OSI model?
A. IP
B. ICMP
C. RARP
D. All of the above
Ans: D

46. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.
A. added
B. removed
C. rearranged
D. Modified
Ans: B

47. Session layer of the OSI model provides
A. Data representation
B. Dialog control
C. Remote job execution
D. Creating logical connections
Ans: B

48. IPv6 has _______ -bit addresses.
A. 32
B. 64
C. 128
D. Variable
Ans: C

49. Which one of the following functionalities isn\’t provided by TCP?
A. Flow control
B. Addressing
C. Retransmission of packets as required
D. Proper sequencing of the packets
Ans: B

50. Which of the following can be an Ethernet physical address?
A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. none of the above
Ans: C

51. An IP address contains________ bits ?
A. 8
B. 16
C. 32
D. 64
Ans: C

52. Which routing protocol below is used by exterior routers between the autonomous systems?
A. RIP
B. IGRP
C. OSPF
D. BGP
Ans: D

53. Which of the IP headers decides when the packet should be discarded?
A. Fragment control
B. TTL
C. Checksum
D. Header length
Ans: B

54. Which IP address is reserved for software loop-back?
A. 224.x.x.x
B. 127.x.x.x
C. 0.0.0.0
D. 255.255.255.255
Ans: B

55. What is the network ID for a computer whose IP address is 190.148.64.23?
A. 190
B. 190.148
C. 190.148.64
D. None of the above
Ans: B

56. Which port is reserved for use of the SMTP protocol?
A. 21
B. 23
C. 25
D. 53
Ans: C

57. Which one of the folowings is a connectionless protocol?
A. UDP
B. Ethernet
C. IPX
D. All of the above
Ans: D

58. Which application below uses the UDP protocol?
A. DNS
B. TFTP
C. RIP
D. All of the above
Ans: C

59. Howmany IP addresses can be assigned to hosts in a C-class networksegment with a subnet mask of 255.255.255.192?
A. 62
B. 126
C. 192
D. 254
Ans: A

60. Which of the folowings is not a direct implication of subnet masks in TCP/IP networks?
A. Reduce network traffic
B. Increase network security
C. Assignment of more IP addresses
D. Better network management

Ans: C

Leave a Reply

Your email address will not be published. Required fields are marked *