Unit 3 Computer Network mcq Questions


1. The network layer is concerned with
__________ of data.
a. bits
b. frames
c. packets
d. bytes
Answer: Option(c)
2. Which one of the following is not a function
of network layer?
a. routing
b. inter-networking
c. congestion control
d. error control
Answer: Option(d)
3. In virtual circuit network each packet
contains ___________
a. full source and destination address
b. a short VC number
c. only source address
d. only destination address
Answer: Option(b)
4. Which of the following is not correct in
relation to multi-destination routing?
a. is same as broadcast routing
b. contains the list of all destinations
c. data is not sent by packets
d. there are multiple receivers
Answer: Option(c)
5. A 4 byte IP address consists of __________
a. only network address
b. only host address
c. network address & host address
d. network address & MAC address
Answer: Option(c)
6. Which of the following routing algorithms
can be used for network layer design?
a. shortest path algorithm
b. distance vector routing
c. link state routing
d. all of the mentioned
Answer: Option(b)
7. A subset of a network that includes all the
routers but contains no loops is called
________
a. spanning tree
b. spider structure
c. spider tree
d. special tree
Answer: Option(a)
8. Which one of the following algorithm is not
used for congestion control?
a. traffic aware routing
b. admission control
c. load shedding
d. routing information protocol
Answer: Option(d)
9. ICMP is primarily used for __________
a. error and diagnostic functions
b. addressing
c. forwarding
d. routing
Answer: Option(a)
10. The network layer contains which
hardware device?
a. Routers, Bridges
b. Bridges only
c. Bridges and switches
d. Routers, Bridges and Switches
Answer: Option(d)
11. Network layer protocol exits in _________
a. Host
b. Switches
c. Packets
d. Bridges
Answer: Option(a)
12. What are the common protocols associated
with the network layer?
a. Address Resolution Protocol
b. Reverse Address Resolution Protocol
c. Internet protocol
d. Neighbour Discovery Protocol
Answer: Option(c)
13. The network layer responds to request
from which layer?
a. Transport layer
b. Data layer
c. Application layer
d. Session layer
Answer: Option(a)
14. The network layer issues request to which
layer?
a. Transport layer
b. Data layer
c. Application layer
d. Session layer
Answer: Option(b)
15. What are called routers?
a. The devices that operates at session
layer
b. The devices that operates at data layer
c. The devices that operates at
application layer
d. The devices that operates at
network
Answer: Option(d)
16. ICMP stands for __________
a. Internet Coordinate Message Protocol
b. Internet Control Message Protocol
c. Interconnect Control Message
Protocol
d. Interconnect Coordinate Message
Protocol
Answer: Option(b)
17. Packets will be transferred in how many
types?
a. 5 types
b. 4 types
c. 2 types
d. 3 types
Answer: Option(d)
18. RIP stands for ________
a. Reduced Information Protocol
b. Routing Internet Protocol
c. Routing Information Protocol
d. Reduced Internet Protocol
Answer: Option(c)
19. DDP stands for _________
a. Datagram Delivery Protocol
b. Device Delivery Protocol
c. Datagram Device Protocol
d. Device Datagram Protocol
Answer: Option(a)
20. Which level is the network layer in the OSI
model?
a. Third level
b. Fourth level
c. Second level
d. Fifth layer
Answer: Option(a)
21. Which of the following is correct IPv4
address?
a. 124.201.3.1.52
b. 01.200.128.123
c. 300.142.210.64
d. 128.64.0.0
Answer: Option(d)
22. How many versions available of IP?
a. 6 version
b. 4 version
c. 2 version
d. 1 version
Answer: Option(c)
23. The term IPv4 stands for?
a. Internet Protocol Version 4
b. Internet Programming Version 4
c. International Programming Version 4
d. None of these
Answer: Option(a)
24. Which of the following IP address class is
Multicast?
a. Class A
b. Class B
c. Class C
d. Class D
Answer: Option(d)
25. Which form of byte assigning strategy is
adopted in class B type of network
corresponding to IP addresses?
a. Network.Node.Node.Node
b. Network.Network.Node.Node
c. Network.Network.Network.Node
d. Network.Node.Node.Node
Answer: Option(b)
26. On which factors do the size of block
depends in classless addressing?
a. Nature & size of an entity
b. Number of addresses
c. Availability of the address space
d. All of the above
Answer: Option(a)
27. The ability of a single network to span
multiple physical networks is known as
______
a. Subnetting
b. Masking
c. Fragmenting
d. Hopping
Answer: Option(a)
28. Which field/s of ICMPv6 packet header
has/have a provision of minimal integrity level
concerning to verification for ICMP
messages?
a. Type
b. Code
c. Checksum
d. All of the above
Answer: Option(c)
29. Which among the below stated datagram
discard code fields in ICMP is/are generated if
a router fails to forward a packet due to
administrative filtering?
a. Source Route Failed
b. Communication Administratively
Prohibited
c. Host Precedence Violation
d. Precedence Cut-off in Effect
Answer: Option(b)
30. What are the problems involved in an IP
Fragmentation Process?
A. Loss of any fragment results in
rejection of all datagrams
B. Management of buffer space is
essential to handle reassembly process
C. No necessity of initializing the timer
after the reception of initial fragment
D. Multiple attempts can be made to
recover ICMP error message due to
connection-oriented IP service
a. A & B
b. C & D
c. B& C
d. A & D
Answer: Option(a)
31. In an IPv4 datagram, the M bit is 0, the
value of HLEN is 10, the value of total length
is 400 and the fragment offset value is 300.
The position of the datagram, the sequence
numbers of the first and the last bytes of the
payload, respectively are
a. Last fragment, 2400 and 2789
b. First fragment, 2400 and 2759
c. Last fragment, 2400 and 2759
d. Middle fragment, 300 and 689
Answer: Option(c)
32. Consider a source computer(S) transmitting
a file of size 106 bits to a destination computer
(D)over a network of two routers (R1 and R2)
and three links(L1, L2, and L3). L1connects S
to R1; L2 connects R1 to R2; and L3 connects
R2 to D. Let each link be of length 100 km.
Assume signals travel over each link at a speed
of 108 meters per second. Assume that the link
bandwidth on each link is 1Mbps. Let the file
be broken down into 1000 packets each of size
1000 bits. Find the total sum of transmission
and propagation delays in transmitting the file
from S to D?
a. 1005 ms
b. 1010 ms
c. 3000 ms
d. 3003 ms
Answer: Option(a)
33. One of the header fields in an IP datagram
is the Time to Live (TTL) field. Which of the
following statements best explains the need for
this field?
a. It can be used to prioritize packets
b. It can be used to reduce delays
c. It can be used to optimize throughput
d. It can be used to prevent packet
looping
Answer: Option(d)
34. For which one of the following reasons
does Internet Protocol (IP) use the time-tolive (TTL) field in the IP datagram header?
a. Ensure packets reach destination
within that time
b. Discard packets that reach later than
that time
c. Prevent packets from looping
indefinitely
d. Limit the time for which a packet gets
queued in intermediate routers.
Answer: Option(c)
35. Which of the following statements is
TRUE?
a. Both Ethernet frame and IP packet
include checksum fields
b. Ethernet frame includes a checksum
field and IP packet includes a CRC
field
c. Ethernet frame includes a CRC
field and IP packet includes a
checksum field
d. Both Ethernet frame and IP packet
include CRC fields
Answer: Option(c)
36. Which of the following assertions is
FALSE about the Internet Protocol (IP)?
a. It is possible for a computer to have
multiple IP addresses
b. IP packets from the same source to the
same destination can take different
routes in the network
c. IP ensures that a packet is discarded if
it is unable to reach its destination
within a given number of hops
d. The packet source cannot set the
route of an outgoing packets; the
route is determined only by the
routing tables in the routers on the
way
Answer: Option(d)
37. An organization is granted the block
130.34.12.64/26. It needs to have 4 subnets.
Which of the following is not an address of
this organization?
a. 130.34.12.124
b. 130.34.12.89
c. 130.34.12.70
d. 130.34.12.132
Answer: Option(d)
38. An IP datagram of size 1000 bytes arrives
at a router. The router has to forward this
packet on a link whose MTU (maximum
transmission unit) is 100 bytes. Assume that
the size of the IP header is 20 bytes. The
number of fragments that the IP datagram will
be divided into for transmission is :
a. 10
b. 50
c. 12
d. 13
Answer: Option(d)
39. In an IPv4 datagram, the M bit is 0, the
value of HLEN is 10, the value of total length
is 400 and the fragment offset value is 300.
The position of the datagram, the sequence
numbers of the first and the last bytes of the
payload, respectively are
a. Last fragment, 2400 and 2789
b. First fragment, 2400 and 2759
c. Last fragment, 2400 and 2759
d. Middle fragment, 300 and 689
Answer: Option(c)
40. Dynamic routing protocol enable routers to
a. Dynamically discover and maintain
routes
b. Distribute routing updates to other
routers
c. Reach agreement with other routers
about the network topology
d. All of the above
Answer: Option(d)
41. When a host on network A sends a message
to a host on network B, which address does
the router look at?
a. Port
b. IP
c. Physical
d. Subnet mask
Answer: Option(b)
42. For n devices in a network, ________
number of duplex-mode links are required
for a mesh topology.
a. n(n + 1)
b. n (n – 1)
c. n(n + 1)/2
d. n(n – 1)/2
Answer: Option(d)
43. __________ is a bit-oriented protocol for
communication over point-to-point and
multipoint links.
a. Stop-and-wait
b. HDLC
c. Sliding window
d. Go-back-N
Answer: Option(c)
44. In Challenge-Response authentication the
claimant ________.
a. Proves that she knows the secret
without revealing it
b. Proves that she doesn’t know the
secret
c. Reveals the secret
d. Gives a challenge
Answer: Option(a)
45. An organization is granted the block
130.34.12.64/26. It needs to have 4 subnets.
Which of the following is not an address of
this organization?
a. 130.34.12.124
b. 130.34.12.89
c. 130.34.12.70
d. 130.34.12.132
Answer: Option(d)
46. A pure ALOHA Network transmits 200 bit
frames using a shared channel with 200
Kbps bandwidth. If the system (all stations
put together) produces 500 frames per
second, then the throughput of the system is
______.
a. 0.384
b. 0.184
c. 0.286
d. 0.58
Answer: Option(b)
47. IPv6 does not support which of the
following addressing modes?
a. unicast addressing
b. multicast addressing
c. broadcast addressing
d. anycast addressing
Answer: Option(c)
48. What is IP class and number of subnetworks if the subnet mask is 255.224.0.0?
a. Class A, 3
b. Class A, 8
c. Class B, 3
d. Class B, 32
Answer: Option(b)
49. Which of the following is not a congestion
policy at network layer?
a. Flow Control Policy
b. Packet Discard Policy
c. Packet Lifetime Management Policy
d. Routing Algorithm
Answer: Option(a)
50. A network with bandwidth of 10 Mbps can
pass only an average of 15,000 frames per
minute with each frame carrying an average
of 8,000 bits. What is the throughput of this
network?
a. 2 Mbps
b. 60 Mbps
c. 120 Mbps
d. 10 Mbps
51. Dynamic routing protocol enable routers to
a. Dynamically discover and maintain
routes
b. Distribute routing updates to other
routers
c. Reach agreement with other routers
about the network topology
d. All of the above
Answer: Option(d)
52. The address of a class B host is to be split
into subnets with a 6-bit subnet number.
What is the maximum number of subnets
and the maximum number of hosts in each
subnet?
a. 62 subnets and 262142 hosts.
b. 64 subnets and 262142 hosts.
c. 62 subnets and 1022 hosts.
d. 64 subnets and 1024 hosts
Answer: Option(c)
53. A network with bandwidth of 10 Mbps can
pass only an average of 12,000 frames per
minute with each frame carrying an average
of 10,000 bits. What is the throughput of
this network ?
a. 1 Mbps
b. 2 Mbps
c. 10 Mbps
d. 12 Mbps
Answer: Option(b)
54. Suppose transmission rate of a channel is
32 kbps. If there are ‘8’ routes from source
to destination and each packet p contains
8000 bits. Total end to end delay in sending
packet P is _____.
a. 2 sec
b. 3 sec
c. 4 sec
d. 1 sec
Answer: Option(a)

55. Which of the following routing technique /
techniques is / are used in distributed
systems ?
A. Fixed Routing
B. Virtual Routing
C. Dynamic Routing
a. A Only
b. A and B only
c. C only
d. All A,B,C
Answer: Option(a)
56. Consider the given network implementation
scenario. For the given classful NID
199.10.20.0/24, the requirement is to create
13 subnets. With given details, find the
range of first and last valid IP in 15th
subnet.
a. 199.10.20.208 to 199.10.20.222
b. 199.10.20.225 to 199.10.20.238
c. 199.10.20.193 to 199.10.20.206
d. Not of these
Answer: Option(b)
57. __________ do not take their decisions on
measurements or estimates of the current
traffic and topology.
a. Static algorithms
b. Adaptive algorithms
c. Non – adaptive algorithms
d. Recursive algorithms
Answer: Option(c)
58. A subnet has been assigned a subnet mask
of 255.255.255.192. What is the maximum
number of hosts that can belong to this
subnet?
a. 14
b. 30
c. 62
d. 126
Answer: Option(c)
59. In the TCP/IP protocol suite, which one of
the following is NOT part of the IP header?
a. Fragment Offset
b. Source IP address
c. Destination IP address
d. Destination port number
Answer: Option(d)
60. In the network 200.10.11.144/27, the fourth
octet (in decimal) of the last IP address of
the network which can be assigned to a host
is ________
a. 158
b. 255
c. 222
d. 223
Answer: Option(a)
61. Which one of the following fields of an IP
header is NOT modified by a typical IP
router?
a. Checksum
b. Source address
c. Time to Live (TTL)
d. Length
Answer: Option(b)
62. If a Company require 60 hosts then What is
the best possible subnet mask?
a. 255.255.255.0
b. 255.255.255.192
c. 255.255.225.224
d. 225.225.255.240
Answer: Option(b)
63. The address resolution protocol (ARP) is
used for
a. Finding the IP address from the DNS
b. Finding the IP address of the default
gateway
c. Finding the IP address that
corresponds to a MAC address
d. Finding the MAC address that
corresponds to an IP address

Leave a Comment

Your email address will not be published. Required fields are marked *