Unit 5 Computer Network mcq questions

Hey Guys, If you are preparing Computer Network for the AKTU exams, then These are the Important computer network mcq questions. so must go through these questions.

Note*: Do not depend only on these MCQ’s, Yes surely these questions help you in AKTU exams so do it first and after that if you have enough time, study all the core topics as well.

You can also check out these subjects as well: Data Compression, Machine learning, Image processing

Unit 5: Computer network MCQ questions

 

1. The ____ layer is the network dialog
controller.
a. network
b. transport
c. session
d. presentation
Answer: Option(c)
2. The ____ layer establishes, maintains, and
synchronizes the interaction between
communicating systems.
a. network
b. transport
c. session
d. presentation
Answer: Option(c)
3. The session layer lies between the
______layer and the presentation layer.
a. network
b. transport
c. data link
d. application
Answer: Option(b)
4. The _____ layer lies between the session
layer and he application layer.
a. network
b. transport
c. data link
d. presentation
Answer: Option(d)
5. The _____ layer uses data compression to
reduce the number of bits to be transmitted.
a. presentation
b. network
c. data link
d. application
Answer: Option(a)
6. The functionalities of the presentation layer
include ____________
a. Data compression
b. Data encryption
c. Data description
d. All of the mentioned
Answer: Option(d)
7. Encryption and decryption are functions of
which layer?
a. transport
b. session
c. application
d. presentation
Answer: Option(d)
8. Which of the following layers of the OSI
reference model is concerned with the syntax
of data exchanged between application
entities?
a. Presentation layer
b. Application layer
c. Transportation layer
d. Session layer
Answer: Option(a)
9. In respect of OSI model, LANs implement
a. lower two layers
b. all seven layers
c. upper five layers
d. None of the above
Answer: Option(b)
10. In OSI model, which of the following layer
transforms information from machine format
into that understandable by user
a. application
b. session
c. presentation
d. physical
Answer: Option(c)
11. Which network component/s is/are
involved in the Presentation layer of an OSI
model?
a. Gateway
b. Multiplexer & Oscilloscope
c. Amplifier & Hub
d. All of the above
Answer: Option(a)
12. Which OSI layer assumes responsibility
for managing network connections between
applications?
a. Network layer
b. Data link layer
c. Application layer
d. Session layer
Answer: Option(d)
13. The _______ layer ensures interoperability
between communicating devices through
transformation of data into a mutually agreed
upon format.
a. network
b. presentation
c. transport
d. data link
Answer: Option(b)
14. In OSI model, when data is sent from
device A to device B, the 5th layer to receive
data at B is _________
a. Application layer
b. Transport layer
c. Link layer
d. Session layer
Answer: Option(d)
15. Delimiting and synchronization of data
exchange is provided by __________
a. Application layer
b. Session layer
c. Transport layer
d. Link layer
Answer: Option(b)
16. Which of the following layers is an
addition to OSI model when compared with
TCP IP model?
a. Application layer
b. Presentation layer
c. Session layer
d. Session and Presentation layer
Answer: Option(d)
17. In the OSI model, as a data packet moves
from the lower to the upper layers, headers are
a. Added
b. Removed
c. Rearranged
d. Randomized
Answer: Option(b)
18. Which of the following statements can be
associated with OSI model?
a. A structured way to discuss and easier
update system components
b. One layer may duplicate lower layer
functionality
c. Functionality at one layer no way
requires information from another
layer
d. It is an application specific network
model
Answer: Option(b)
19. In OSI model, session layer is responsible
for
a. Recovery
b. Check pointing
c. Both a and b
d. None of the above
Answer: Option(c)
20. In which layer of OSI client send request
to the server?
a. Application layer
b. Presentation layer
c. Session layer
d. Transport layer
Answer: Option(c)
21. What is the main function of Session layer
in OSI model?
a. Defines how data is formatted
between the devices
b. Made physical connection between
server and client
c. Both a and b
d. None of the above
Answer: Option(a)
22. Sometimes, Session layer is also called
______ layer
a. Virtual layer
b. Port layer
c. Segmentation layer
d. Process layer
Answer: Option(b)
23. In which layer of OSI session is first check
and then data is transmitted
a. Application layer
b. Presentation layer
c. Session layer
d. Transport layer
Answer: Option(c)
24. Which of the following is the session layer
protocol or service?
a. SPDY
b. NetBIOS
c. PPTP
d. SAP
Answer: Option(c)
25. TELNET, FTP, SMTP, Protocols fall in
the following layer of OSI reference
model?
a. Transport layer
b. Internet layer
c. Network layer
d. Application layer
Answer: Option(d)
26. Which of the following is an application
layer service?
a. Remote log-in
b. File transfer and access
c. Mail service
d. All of the above
Answer: Option(d)
27. Which DNS client maps an address to a
name or a name to an address especially
when required by a host?
a. Resolver
b. Mapper
c. Primary Server
d. Secondary Server
Answer: Option(a)
28. Which application-level protocol plays a
crucial role in carrying out the data
definition and manipulation in addition to
X-500 features?
a. TCP
b. LDAP
c. FTP
d. None of the above
Answer: Option(b)
29. Which intermediaries are more likely to
get involved during the transfer function
of an e-mail system?
a. Storage and forwarding of e-mail for
certain addresses
b. Act as gateways to other e-mail or
messaging systems
c. Both a & b
d. None of the above
Answer: Option(c)
30. Which among the below specified
illustrations belongs to the category of
GUI based user agents?

a. mail
b. pine
c. Outlook & Netscape
d. All of the above
Answer: Option(c)
31. Which phase/s of POP3 allow/s an user
agent to retrieve the messages as well as
to mark the messages for deletion
purpose?
a. Authorization Phase
b. Transaction Phase
c. Update Phase
d. All of the above
Answer: Option(b)
32. Consider the assertions given below.
Which among them prove to be beneficial
for Persistent HTTP connections?
A. Reduction in latency over the subsequent requests
B. Pipeline-oriented connection over the
requests and responses
C. Increase in number of packets due to
TCP opens
D. Prevention in opening and closing of
some TCP connections
a. A & B
b. C & D
c. A & C
d. B & B
Answer: Option(a)
33. Which URL method of HTTP performs
similar function as that of PUT method
only with an exception of request
comprising a list of differences that
exhibit the necessity to get implemented
in the existing file?
a. POST
b. GET
c. PATCH
d. OPTION
Answer: Option(c)
34. Which language in WWW specifies a
web’s way by describing threedimensional objects?
a. HTML
b. VRML
c. XML
d. UML
Answer: Option(b)
35. Which field of cookie in WWW
represents the server’s directory structure
by identifying the utilization of part
associated with server’s file tree?
a. Domain
b. Path
c. Content
d. Secure
Answer: Option(b)
36. Which among the below mentioned
protocols provides a mechanism of
acquiring an IP address without manual
intervention in addition to plug and play
type of networking?
a. BOOTP
b. DHCP
c. Both a & b
d. None of the above
Answer: Option(b)
37. Which of the following layers of the OSI
model is responsible for user interaction?
a.Layer 4
b.Layer 5
c.Layer 6
d.Layer 7
Answer: Option(d)
38. What occurs in the session layer?
a.Data compression and encryption
b.MAC address are handled
c.binary to decimal conversion
d.sessions are created
Answer: Option(d)
39. Which of the following is/are the
important applications of the application
layer?
a.Electronic mail
b.World Wide Web
c.USENET
d.All of the above
Answer: Option(d)
40. The TCP/IP …………corresponds to the
combined session, presentation, and
application layers of the OSI model.
a.session layer
b.presentation layer
c.application layer
d.None of the above
Answer: Option(c)
41. The ……… protocol is based on end-toend delivery.
a. SMTP
b. TCP
c. IP
d. SCTP
Answer: Option(a)
42. The well-known port of the SMTP server
is …….
a. 110
b. 25
c. 50
d. 20
Answer: Option(b)
43. In the SMTP header field_____ is a
summary of the message being sent which
is specified by the sender.
a. Reply-to
b. Return-path
c. Subject
d. From
Answer: Option(c)
44. In the SMTP herder field_____ is added
by the final transport system that delivers
the mail.
a. Reply-to
b. Return-path
c. Subject
d. From
Answer: Option(b)
45. In SMTP mail transaction flow, the
sender SMTP establishes a TCP
connection with the destination SMTP
and then waits for the server to send a
……….
a. 220 service ready message
b. 421 service not available message
c. Both of the above
d. None of the above
Answer: Option(c)
46. In the MIME header field____describes
how the object within the body is to be
interpreted.
a. content-type
b. content-transfer-encoding
c. content-description
d. content-id
Answer: Option(a)
47. In the MIME header field, ____describes
how the object within the body was
encoded in order that it be included in the
message using a mail-safe form.
a. content-type
b. content-transfer-encoding
c. content-description
d. content-id
Answer: Option(b)
48. In a/an ………… of DNS resolver, the
queried name server can return the best
answer it currently has back to the DNS
resolver.
a. Recursive queries
b. Iterative queries
c. Reverse queries
d. Inverse queries
Answer: Option(b)
49. The TCP/IP _______ layer is equivalent
to the combined session, presentation, and
application layers of the OSI model.
a.data link
b.network
c.physical
d.application
Answer: Option(d)
50. In TCP IP Model, when data is sent from
device A to device B, the 5th layer to
receive data at B is ____________
a.Application layer
b.Transport layer
c.Link layer
d.Session layer
Answer: Option(a)
51. Which layer provides the services to user?
a.application layer
b.session layer
c.presentation layer
d.physical layer
Answer: Option(a)
52. Application layer protocol defines ____
a.types of messages exchanged
b.message format, syntax and semantics
c.rules for when and how processes send
and respond to messages
d.all of the mentioned
Answer: Option(d)
53. Which one of the following allows a user
at one site to establish a connection to
another site and then pass keystrokes
from local host to remote host?
a.HTTP
b.FTP
c.Telnet
d.TCP
Answer: Option(c)
54. The ASCII encoding of binary data is
called
a. base 64 encoding
b. base 32 encoding
c. base 16 encoding
d. base 8 encoding
Answer: Option(a)
55. Consider different activities related to
email:
m1: Send an email from a mail client to a mail
server
m2: Download an email from mailbox server
to a mail client
m3: Checking email in a web browser
Which is the application level protocol used in
each activity?
a. m1: HTTP m2: SMTP m3: POP
b. m1: SMTP m2: FTP m3: HTTP
c. m1: SMTP m2: POP m3: HTTP
d. m1: POP m2: SMTP m3: IMAP
Answer: Option(c)
56. Identify the correct order in which the
following actions take place in an
interaction between a web browser and a
web server.
1. The web browser requests a
webpage using HTTP.
2. The web browser establishes a TCP
connection with the web server.
3. The web server sends the requested
webpage using HTTP.
4. The web browser resolves the
domain name using DNS.
a. 4,2,1,3
b. 1,2,3,4
c. 4,1,2,3
d. 2,4,1,3
Answer: Option(a)
57. In one of the pairs of protocols given
below, both the protocols can use
multiple TCP connections between the
same client and the server. Which one is
that?
a. HTTP, FTP
b. HTTP, TELNET
c. FTP, SMTP
d. HTTP, SMTP
Answer: Option(a)
58. Which one of the following statements is
NOT correct about HTTP cookies?
a. A cookies is a piece of code that has
the potential to compromise the
security of an Internet user
b. A cookie gains entry to the user’s
work area through an HTTP header
c. A cookie has an expiry date and time
d. Cookies can be used to track the
browsing pattern of a user at a
particular site
Answer: Option(a)
59. Which of the following is/are example(s)
of stateful application layer protocols?
(i) HTTP
(ii) FTP
(iii) TCP
(iv) POP3
a. (i) and (ii) only
b. (ii) and (iii) only
c. (ii) and (iv) only
d. (iv) only
Answer: Option(c)
60. Which of the following protocol is used
for transferring electronic mail messages
from one machine to another?
a. TELNET
b. FTP
c. SNMP
d. SMTP
Answer: Option(d)
61. Which of the following protocols is used
by email server to maintain a central
repository that can be accessed from any
machine ?
a. POP3
b. IMAP
c. SMTP
d. DMSP
Answer: Option(b)
62. A packet filtering firewall can
a. deny certain users from accessing a
service
b. block worms and viruses from
entering the network
c. disallow some files from being
accessed through FTP
d. block some hosts from accessing the
network
Answer: Option(d)
63. Which of the following protocols is an
application layer protocol that establishes,
manages and terminates multimedia
sessions ?
a. Session Maintenance Protocol
b. Real – time Streaming Protocol
c. Real – time Transport Control Protocol
d. Session Initiation Protocol
Answer: Option(d)
64. What is the size of the ‘total length’ field
in IPv4 datagram?
a. 4 bit
b. 8 bit
c. 16 bit
d. 32 bit
Answer: Option(c)
65. What is one advantage of setting up a
DMZ(Demilitarized Zone) with two
firewalls?
a. You can control where traffic goes
in the three networks
b. You can do stateful packet filtering
c. You can do load balancing
d. Improve network performance
Answer: Option(a)

 

Leave a Comment

Your email address will not be published. Required fields are marked *