This post contains very important MCQ's for Computer networks & security to prepare your interviews and exams easily...
Computer Networking and security important MCQ's for preparing interviews & exams - Part 1
Q.no 1. Which Method can be used for to reduce the collision but canot eliminate it
A : Listen before talk
B : Listen after talk
C : Sense after transmit
D : Sense before talk
Answer:- A : Listen before talk
Q.no 2. _______ topology requires a multipoint connection.
A : Star
B : Mesh
C : Ring
D : Bus
Answer:- D : Bus
Q.no 3. When a host on network A sends a message to a host on network B, which
address does the router look at?
A : Port
B : IP
C : Physical
D : Subnet Mask
Answer:- B : IP
Q.no 4. Which one of the following is an internet standard protocol for managing devices on IP network?
A : dynamic host configuration protocol
B : simple network management protocol
C : internet message access protocol
D : media gateway protocol
Answer:- B : simple network management protocol
Q.no 5. Application layer protocol defines ____________
A : types of messages exchanged
B : message unformatted
C : Message Request and Response
D : Message Syntax and Sementics
Answer:- A : types of messages exchanged
Q.no 6. In pure Aloha what is maximum number of retransmission attempts if frame get congested in the channel
A : Two half
B : One Half
C : Three half
D : Four half
Answer:- B : One Half
Q.no 7. In Slotted Aloha, the vulnerable time is reduced to ______ equal to the frame transmission time
A : Pure Aloha
B : Slotted Aloha
C : CSMA
D : FDMA
Answer:- C : CSMA
Q.no 8. The protocol which is used for defining the legal request and replies is called ______ .
A : FTP
B : SMTP
C : TCP
D : HTTP
Answer:- D : HTTP
Q.no 9. Name server designated as the recipient of forwarded queries is known as _____
A : Class B
B : Class c
C : Forwarder
D : Class D
Answer:- C : Forwarder
Q.no 10. The client in socket programming must know which information?
A : IP address of Server
B : Port number
C : Both IP address of Server & Port number
D : Only its own IP address
Answer:- C : Both IP address of Server & Port number
Computer Networking and security important MCQ's - Part 1
Q.no 11. In TCP, sending and receiving data is done as _______
A : Stream of bytes
B : Sequence of characters
C : Lines of data
D : Packets
Answer:- A : Stream of bytes
Q.no 12. Routing tables of a router keeps track of
A : MAC Address Assignments
B : Port Assignments to network devices
C : Distribute IP address to network devices
D : Routes to use for forwarding data to its destination
Answer:- D : Routes to use for forwarding data to its destination
Q.no 13. Modulator and demodulator as combinely is known as –
A : Modulus
B : Modem
C : Mod switch
D : Mod access
Answer:- B : Modem
Q.no 14. Which network is able to connect to each computer through a common central line?
A : Bus
B : Star
C : router
D : WAN
Answer:- A : Bus
Q.no 15. AODV stands for
A : Ad hoc On-Demand Distance Vector
B : Advance ondemand distance vector
C : Advance on distance vector
D : All of these
Answer:- A : Ad hoc On-Demand Distance Vector
Q.no 16. When the mail server sends mail to other mail servers it becomes ____________
A : SMTP server
B : SMTP client
C : Peer
D : Master
Answer:- B : SMTP client
Q.no 17. Ipv6 is how many bits long
A : 32
B : 48
C : 128
D : 16
Answer:- C : 128
Q.no 18. RTP provides the facility of jitter ____________
A : media stream
B : expansion
C : media modification
D : security
Answer:- A : media stream
Q.no 19. A simple protocol used for fetching email from a mail box is
A : POP3
B : IMAP
C : SMTP
D : POP2
Answer:- A : POP3
Q.no 20. HDLC protocol resides in ____ layer
A : Data Link Layer
B : Application Layer
C : Transport Layer
D : Network Layer
Answer:- A : Data Link Layer