This post contains very important MCQ's for Computer networks & security to prepare your interviews and exams easily...
Computer Networking and security important MCQ's for preparing interviews & exams - Part 2
Q.no 1. Radio channels are attractive medium because
A : Can penetrate walls
B : Connectivity can be given to mobile user
C : Can carry signals for long distance
D : All of the mentioned
Answer:- D : All of the mentioned
Q.no 2. Bridge works in which layer of the OSI model?
A : Appliation layer
B : Transport layer
C : Network layer
D : Datalink layer
Answer:- D : Datalink layer
Q.no 3. Which of the following address belongs class A?
A : 121.12.12.248
B : 130.12.12.248
C : 128.12.12.248
D : 129.12.12.248
Answer:- A : 121.12.12.248
Q.no 4. _____ is the multiplexing technique that shifts each signal to a different
carrier frequency.
A : FDM
B : TDM
C : Both FDM & TDM
D : PDM
Answer:- A : FDM
Q.no 5. Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same netmask N. Which of the
values of N given below should not be used if A and B should belong to the same network?
A : 255.255.255.0
B : 255.255.255.128
C : 255.255.255.192
D : 255.255.255.224
Answer:- D : 255.255.255.224
Q.no 6. What does Router do in a network?
A : Forwards a packet to all outgoing links
B : Forwards a packet to the next free outgoing link
C : Determines on which outing link a packet is to be forwarded
D : Forwards a packet to all outgoing links except the originated link
Answer:- C : Determines on which outing link a packet is to be forwarded
Q.no 7. In sliding window protocol, the send window can slide one or more slots when valid ____ arrives.
A : bit
B : request
C : flag
D : acknowledgement
Answer:- D : acknowledgement
Q.no 8. Which Strategies used by CSMA with collision avoidance
A : 1500 bytes , 46 bytes
B : 46 bytes, 1500 bytes
C : 64 bytes, 1518 bytes
D : 512 bits, 12144 bytes
Answer:- B : 46 bytes, 1500 bytes
Q.no 9. In byte stuffing (or character stuffing), a special byte known as _____ is added to the data section of the frame when there is a character with the same
pattern as the flag.
A : excuse character
B : entry character
C : exit character
D : escape character
Answer:- D : escape character
Computer Networking and security (CN&S) important MCQ's for preparing exams - Part 2
Q.no 10. ARQ stands for _____
A : Automatic repeat request
B : Automatic repeat quantization
C : Acknowledgement repeat request
D : Automatic resend request
Answer:- A : Automatic repeat request
Q.no 11. Which one of the following is not correct?
A : RTCP provides canonical end-point identifiers to all session participants
B : RTCP reports are expected to be sent by all participants
C : RTCP itself does not provide any flow encryption or authentication methods
D : RTCP handles the actual data delivery
Answer:- D : RTCP handles the actual data delivery
Q.no 12. In File Transfer Protocol, data transfer cannot be done in __________
A : stream mode
B : block mode
C : compressed mode
D : message mode
Answer:- D : message mode
Q.no 13. In the network HTTP resources are located by __________
A : Uniform resource identifier
B : Unique resource locator
C : Unique resource identifier
D : Union resource locator
Answer:- A : Uniform resource identifier
Q.no 14. In HDLC which frames are used to transport user data and control
information relating to user data (piggybacking)?
A : S-Frames
B : I-Frames
C : V-frames
D : U-Frame
Answer:- B : I-Frames
Q.no 15. In FTP protocol, client contacts server using ____ as the transport protocol.
A : transmission control protocol
B : user datagram protocol
C : datagram congestion control protocol
D : stream control transmission protocol
Answer:- A : transmission control protocol
Q.no 16. How many different type of server exist?
A : Only one
B : Two
C : Three
D : Four
Answer:- D : Four
Q.no 17. Which one of the following is not an application layer protocol?
A : media gateway protocol
B : dynamic host configuration protocol
C : resource reservation protocol
D : session initiation protocol
Answer:- C : resource reservation protocol
Q.no 18. What is the use of Ping command?
A : To test a device on the network is reachable
B : To test a hard disk fault
C : To test a bug in a Application
D : To test a Pinter Quality
Answer:- A : To test a device on the network is reachable
Q.no 19. Which of the following layer of OSI model also called end-to-end layer?
A : Presentation layer
B : Network layer
C : Session layer
D : Transport layer
Answer:- D : Transport layer
Q.no 20. The frame transmission and collision detection is a continuous process which method is used for this condition
A : Idle,Captured the channel and sending its Frame, collision detection
B : Captured the channel and sending its Frame,Idle, collision detection
C : Idle, collision detection,Captured the channel and sending its Frame
D : Captured the channel and sending its Frame, collision detection,Idle
Answer:- B : Captured the channel and sending its Frame,Idle, collision detection