Sie sind auf Seite 1von 30

CCNA Multiple Choice Questions and Answers

1.When are link-state packets sent to neighbors? 


A.every 30 seconds
 B.every 180 seconds
 C.after the holddown time expires
 D.when a link goes up or down
 E.when a routing loop occurs
ANS: D

2.Why is it difficult for routing loops to occur in networks that use link-state routing?
 A.Each router builds a simple view of the network based on hop count.
 B.Routers flood the network with LSAs to discover routing loops.
 C.Each router builds a complete and synchronized view of the network.
 D.Routers use hold-down timers to prevent routing loops.
ANS: C

3.What two statements correctly describe the link state routing process?
 A.all routers in the area have link state databases
 B.each router in the area floods LSPs to all neighbors
 C.LSPs use the reserved multicast address of 224.0.0.10 to reach neighbors
 D.routing loops are prevented by running the Diffusing Update Algorithm (DUAL).
 E.Reliable Transport Protocol (RTP). is the protocol used by for the delivery and reception of LSPs
ANS: A

4.What action does a link-state router take immediately upon receipt of an LSP from a neighboring
router?
 A.floods the LSP to neighbors
 B.calculates the SPF algorithm
 C.runs the Bellman-Ford algorithm
 D.computes the best path to the destination network
ANS: A

5.What two events will cause a link state router to send LSPs to all neighbors?
 A.30 second timer expires
 B.whenever the network topology changes
 C.immediately after the Bellman-Ford algorithm has run
 D.immediately after the DUAL FSM has built the topology database
 E.upon initial startup of router or routing protocol
ANS: E

6.Refer to the exhibit. What does JAX do with link-state packets from ORL?
 A.sends out its updated routing table to both ORL and BOS routers
 B.sends out the individual link-state packets out the interface connected to BOS
 C.queries BOS to see if it has a better route
 D.only adds it to the local routing table and performs no other actions
ANS: B

7.Which database or table must be identical on all link-state routers within an area in order to
construct an accurate SPF tree?
 A.routing table
 B.adjacency table
 C.link-state database
 D.neighbor table
 E.topology database
ANS: C
8.What feature do modern link-state protocols provide to minimize processing and memory
requirements?
A.splitting routing topologies into smaller areas
 B.assigning lower process priorities to route calculations
 C.using update timers to restrict routing updates
 D.strict split horizon rules to reduce routing table entries
ANS: A

9.What is the final step in the link state routing process?


 A.successors are placed into the routing table
 B.SPF computes best path to each destination network
 C.LSPs are flooded to all neighbors to converge the network
 D.DUAL algorithm is run to find best path to destination networks
ANS: B

10.What are two advantages of using a link-state routing protocol instead of a distance vector routing
protocol?
 A.The topology database eliminates the need for a routing table.
 B.Each router independently determines the route to each network.
 C.Link-state protocols require less router processor power than distance vector protocols
 D.After the inital LSP flooding, they generally require less bandwidth to communicate changes in a
topology.
 E.Frequent periodic updates are sent to minimize the number of incorrect routes in the topological
database.
ANS: D

11.Which algorithm is run by link-state routing protocols to calculate the shortest path to destination
networks?
 A.DUAL
 B.Dijkstra
 C.Bellman-Ford
 D.Diffie-Hellman
ANS: B

12.Which routers will router D receive hello packets?


 A.A and E
 B.B and C
 C.A, B, C, and E
 D.C only
ANS: B

13.What speeds up convergence in a network using link-state routing?


 A.updates triggered by network changes
 B.updates sent at regular intervals
 C.updates sent only to directly connected neighbors
 D.updates that include complete routing tables
ANS:  A

14.Refer to the exhibit. What kind of information would be seen in an LSP sent from router JAX to
router ATL?
 A.hop count
 B.uptime of the route
 C.cost of the link
 D.a list of all the routing protocols in use
ANS: C

15.Which two routing protocols use Dijkstra’s shortest path first algorithm?
 A.RIPv1
 B.RIPv2
 C.IS-IS
  D.BGP
 E.OSP
ANS: C,D

16.Refer to the exhibit. Router B receives a packet with a destination address of 10.16.1.97. What will
router B do?
 A.drop the packet
 B.forward the packet via the route to 10.16.1.0
 C.forward the packet via the route to 10.16.1.64
 D.use the default route
ANS:D

17.A network is converged and the routing tables are complete. When a packet needs to be
forwarded, what is the first criterion used to determine the best path in the routing table?
 A.the route with the smallest AD
 B.the route with the longest address and mask match to the destination
 C.the route with the highest bandwidth
 D.the route with the best combination of AD and lowest cost
ANS: B

18.Refer to the exhibit. Which statement correctly describes this network?


 A.they are dropped
 B.sent to default gateway
 C.forward out interface Serial0/0/1
 D.forward out interface FastEthernet 0/0
ANS: C

19.The following entry is displayed in the routing table: R 192.168.8.0/24 [120/2] via 192.168.4.1,
00:00:26, Serial0/0/1 What type of route is this?
 A.a level 1 parent route
 B.a level 1 supernet route
 C.a level 1 ultimate network route
 D.a level 2 child route
 E.a level 2 ultimate child route
ANS: C

20.What determines if the router implements a classless route lookup process?


 A.Child routes are present in the routing table.
 B.A classless routing protocol has been configured on the router.
 C.The command ip classless is enabled on the router.
 D.Multiple routes with different masks to the same destination are in the routing table.
 E.Routing table entries have a next-hop IP address and an exit interface for each child route.
ANS: C

21.Refer to the exhibit. How many routes in this output qualify for use as ultimate routes?
 A.3
 B.4
 C.5
 D.6
 E.7
ANS: E
22.Refer to the exhibit. Which statement correctly describes this network?
 A.EIGRP is being used
 B.There is at least one parent and one child route
 C.192.168.2.0, 192.168.3.0, and 192.168.4.0 networks are child routes
 D.Traffic going to 172.16.3.0 will be directed to s 0/0/1
ANS: B

23.Refer to the exhibit. What protocol was used to distribute the routing information for the network
172.16.1.4?
 A.RIPv1
 B.RIPv2
 C.EIGRP
 D.OSPF
ANS: B

24.Refer to the exhibit. What can be determined from this output?


 A.The router will have to perform recursive lookups to forward a packet destined for 192.168.2.213/24.
 B.The parent route for these networks was removed from the routing table.
 C.A route to 192.168.0.0/25 would be classified as a supernet route for the routes listed in the routing
table.
 D.All of the routes listed are network routes.
ANS: D

25.Refer to the exhibit. The graphic contains partial contents of the routing table on router E. Router E
is running version 12.3 of the IOS and is configured for default routing behavior. Router E receives a
packet to forward. Which route in the routing table will be searched first and why?
  A.172.16.1.0/25 because it is the first ultimate route
 B.0.0.0.0/0 because it is the lowest network number
 C.172.16.0.0/25 because it is the first level 1 route
 D.172.18.0.0/15 because it has the shortest mask
ANS: C

26.Refer to the exhibit. Router1 is running IOS version 12.2. What will the network administrator need
to do so that packets for unknown child routes of 172.16.0.0/24 will not be dropped?
 A.issue the ip default-network command
 B.use a classful routing protocol such as RIPv1
 C.enable either OSPF or ISIS as the routing protocol
 D.issue the ip classless command
 E.do nothing, ip classless is on by default
ANS: E

27.Refer to the exhibit. With the ip classless command issued, what will router R2 do with a packet
destined for host 172.16.4.234?
 A.drop the packet
 B.send packet out Serial 0/0/1
 C.send packet to network 0.0.0.0
 D.send packet out FastEthernet 0/0
ANS: B

28.A router has the following entries in its routing table:


S 192.168.0.0/24 [1/0] via 192.168.128.2
O 192.168.0.0/25 [110/2175] via 172.16.1.1, 00:02:15, FastEthernet0/1
D 192.168.0.0/25 [90/22455] via 172.16.2.2, 00:12:15, Serial0/0/0
R 192.168.0.0/26 [120/2] via 172.16.3.3, 00:00:15, Serial0/0/1
The router receives a packet that is destined for a host with the address 192.168.0.58.
Which route would this router use to forward the packet?
 A.the static route
 B.the OSPF route
 C.the EIGRP route
 D.the RIP route
ANS: D

29.Refer to the exhibit. What parent network will automatically be included in the routing table when
the three subnets are configured on Router1?
 A.172.16.0.0/16
 B.172.16.0.0/24
 C.172.16.0.0/30
 D.172.16.1.0/16
 E.172.16.1.0/24
ANS: A

30.Refer to the exhibit. What subnet mask will Router1 apply to child routes of the 172.16.0.0/24
network?  
  A.0.0.0.0
 B.255.255.0.0
 C.255.255.255.0
 D.255.255.255.255
ANS: C

1. Which one of the following is a Class C IP address?

10.10.14.118

135.23.112.57
191.200.199.199

204.67.118.54

Clear
   

Your Answer = 

Q2. You are asked to evolve a TCP/IP addressing scheme for your Organization. How many network
numbers (subnet number) must you allow when you design the network for your organization?

One subnet for each Host

One for each subnet, one for each WAN connection

One for each network card

One for each WAN connection only

Short answer:

One for each subnet, one for each WAN connection

3. You have an IP of 156.233.42.56 with a subnet mask of 7 bits. How many hosts and
subnets are possible assuming that subnet 0 is not used?

126 subnets and 510 hosts

128 subnets and 512 hosts

510 subnets and 126 hosts

512 subnets and 128 hosts

Short answer:
126 subnets and 510 hosts

4. You find that one of the serial interfaces on your router is not forwarding traffic. You have
given "show ip interfaces" command. In the response, you observed the following entries
against that interface:

Serial 0 is up, line protocol is down. What is the likely problem?

There is a problem at physical layer

There is a problem exchanging the routing information

The link was administratively down

There is a problem with the route both at physical and protocol layers

Short answer:

There is a problem exchanging the routing information

5. A client workstation is connected to a DHCP server through a switch and a router, The
client machine has been able to access the network resources without any problem.
However, after the recent configuration change on the DHCP server, the client workstation
is not able to access any network resources. What is the likely solution.

Clear arp cache on the router

Use ipconfig command with /release and /renew options

Reset switch MAC address table

Issue a tracert command to DHCP server

Short answer:

Use ipconfig command with /release and /renew options

6. Two sub layers of OSI Data Link layer are which of the following?

Logical Link Control, Data Link Control

Media Access Control, Physical Layer Control


Logical Link Control, Media Access Control

Data Link Control, Physical Layer Control

Short answer:

Logical Link Control, Media Access Control

Long answer:

The OSI model was designed to facilitate open specification for connecting to systems conforming to OSI
model. These systems are designed to be open for communication with almost any other system. OSI
model breaks down each functional layer so that overall design complexity could be lessened. OSI model
primarily consists of seven layers for the flow of information. This is shown in the figure below.

The Data Link Layer corresponds to layer 2 of OSI reference model. This layer is further divided into two
sub-layers:

1. Logical Link Control (LLC) sub-layer, and

2. Media Access Control (MAC) sub-layer.

The LLC sub-layer handles error control, flow control, framing, and MAC sub-layer addressing.

The MAC sub-layer is the lower of the two sub-layers of the Data Link layer.

MAC sub-layer handles access to shared media, such a Token passing or Ethernet.

7. Two sub layers of OSI Data Link layer are which of the following?
A.
1. Data Link Layer
Repeaters
B. Bridges 2. Network Layer
C. Routers 3. Physical Layer
A --->2, B--->3, C--->1

A--->3, B---->1, C---->2

A--->3,B----->2, C---->1

A---->1, B---->2, C---->3


Short answer:

A--->3, B---->1, C---->2

Long answer:

The most frequently used network devices may be categorized as repeaters, hubs, switches, and
routers. These devices let you connect computers, printers, and other devices to communicate with
each other.The medium that is used for communication is usually cable (optical or copper) and air (Wifi,
bluetooth, etc.).

A repeater is a basic device that simply amplifies the input signals and retransmits. It is used to extend
the range of a network segment.

For example, the range of a 10BaseT network segment is 100meters by default.If the end devices are at
a distance more than 100 meters, you will require a repeater so that the transmitted signals are received
at the destination device without losing any information.

A bridge/switch essentially forwards the frames that come from one port to other ports.A switch is used
to connect two or more network segments. A switch learns the physical addresses of sending devices by
reading the MAC address and mapping it to the port number through which the frame had arrived.

This way, it will quickly learn which MAC address belongs to which switch port, and stores the
information in a table (called MAC table). Then onwards, it will send aframe only to the port that
connects to the destination device (as specified in the frame). MAC addressesare layer-2 addresses.
Because a switch works on MAC addresses, we can classify switches as Layer-2 devices.

A router is used to route packets by connecting two or more networks together.They work at layer-3 of
the OSI model.They route packets based on the IP addresses where as a switch forwards packets based
on the MAC addresses. A router needs to disseminate an incoming packet down to its IP address and
route it to destination based on information available in its routing table.

Switches maintain a MAC table where as routers maintain a routing table. When a switch sends a
packet (usually called a frame when sent by a switch) it iscalled forwarding.A router reads the
destination IP address of the incoming packet, finds out which interface it needs to go to reach desired
destination (which may be several hops away) and routes the packet appropriately.

8. Match the following:


1.
A. Associated with Data Link Layer
Segments
2. Packets B. Associated with Network Layer
3. Frames C. Associated with Transport Layer
1--->A; 2---->C; 3 --->B

1--->C; 2---->A; 3 --->B

1--->C; 2---->B; 3 --->A

1--->A; 2---->B; 3 --->C

Short answer:

1--->C; 2---->B; 3 --->A

Long answer:

The terms “Frame”, “Packet”, and “Segment” are used frequently in TCP/IP framework to distinguish
between different layers of TCP/IP (or OSI).

An Ethernet "Frame" is the layer 2 frame that is received by the NIC (Network Interface Card) of your
computer for processing. A Frame typically contains MAC address or any physical address of the next
hop interface.

An IP "Packet" is the information packet that contains the IP header, and includes all upper layer
protocol information. A Packet contains the logical address (also called IP address in TCP/IP) of source
and destination.

And, a TCP segment, encapsulates all higher-level protocols above it so that it is ready for transmission
over the network.

When a packet comes in to the NIC, the Datalink layer takes the "Frame", and removes the mac address
information, and forwards the "Packet" to the IP layer. The destination host, then removes the Packet
header and forwards the information “Segment” it to Transport layer for further processing. The
transport layer forwards the information to upper layers of the TCP stack for identification of the
application.

After TCP is processed, the TCP header is removed completely, and the data is sent to the application.

In general, a Frame is associated with Datalink Layer, a packet is associated with Network Layer, and a
segment is associated with Transport Layer. Note that the information is called with different names to
distinguish one TCP/IP layer from another.

10. Which of the following is true of a Switch?


Switches forward packets based on IP address.

Switches forward packets based on MAC address.

Switches forward packets based on IPX address.

Switches forward packets based on Layer3 protocol.

Short answer:

Switches forward packets based on MAC address

Long answer:

A bridge/switch essentially forwards the frames that come from one port to other ports. However, a
switch learns the physical addresses of sending devices by reading the MAC address and mapping it to
the port number through which the frame had arrived.

This way, it will quickly learn which MAC address belongs to which switch port,and stores the
information in a table (called MAC table). Then onwards, it will send a frame only to the port that
connects to the destination device (as specified in the frame).

A switch is used to connect two or more network segments.MAC addresses are layer-2 addresses.
Because a switch works on MAC addresses, we can classify switches as Layer-2 devices.

1) Which of the following is considered a broad band communication channel ?


a. coaxial cable
b. fiber optics cable
c. microwave circuits
d. all of above
Show/Hide Answer
Answer = D
2) Which of the following does not allow multiple uses or devices to share one communication
line?

a. doubleplexer
b. multiplexer
c. concentrator
d. controller
Show/Hide Answer
Answer = A
3) Which of the following is required to communicate between two computers ?

a. communications software
b. protocol
c. communication hardware
d. all of above including access to transmission medium
Show/Hide Answer
Answer = D
4)Which of the following is an advantage to using fiber optics data transmission ?

a. resistance to data theft


b. fast data transmission rate
c. low noise level
d. all of above
Show/Hide Answer
Answer = D
5)The interactive transmission of data within a time sharing system may be best suited to ?

a. simplex lines
b. half-duplex lines
c. full duplex lines
d. biflex-lines
Show/Hide Answer
Answer = B
6) The optical fiber trans-Atlantic cable TAT-14 includes a section from Bude, Cornwall to
Tucker ton, New Jersey. Determine the propagation delay if the route length is 6,254 km. ?

a. 31.98 ms
b. 3.198 ms.
c. 31.27 ms
d. 312.7 ms
Show/Hide Answer
Answer = C
7) Manchester encoding is principally designed to ?
a. ensure that the line remains unbalanced.
b. have more than one symbol per bit period.
c. increase the bandwidth of a signal transmitted on the medium
d. ensure that a transition occurs in the center of each bit period.
Show/Hide Answer
Answer = D
8) A router ?

a. forwards a packet to all outgoing links.


b. forwards a packet to all outgoing links, except the link upon which the packet originated
c. forwards a packet to the next free outgoing link
d. determines on which outgoing link a packet is to be forwarded.
Show/Hide Answer
Answer = D
9) Telephone systems may be classified as ?

a. simplex and symmetrical.


b. duplex and asymmetrical.
c. simplex and asymmetrical.
d. duplex and symmetrical.
Show/Hide Answer
Answer = D
10) Which of the following signal is not standard RS-232-C signal ?

a. VDR
b. RTS
c. CTS
d. DSR
Show/Hide Answer
Answer =A
1) Which of the following is not a type of Computer Network?

a. Local Area Network (LAN)


b. Personal Area Network (PAN)
c. Remote Area Network (RAN)
d. Metropolitan Area Network (MAN)
Show/Hide Answer
Answer = c
Explanation:The Types of Computer Networks are LAN, MAN, PAN, WAN, CAN but RAN
Remote Area Network is not a type of CN.

2) Full Form of NIC?

a. New Internet Connection


b. Network Interface Card
c. Network Interface Connection
d. Net Interface Card
Show/Hide Answer
Answer =B
Explanation: NIC is Network Interface Card Which is Used to Connect Computer to a Network.

3) Which of the following are type of Twisted Pair Cable?

a. Coaxial Cable
b. Shielded Twisted Pair (STP)
c. Unshielded Twisted Pair (UTP)
d. Only B and C
Show/Hide Answer
Answer = D
Explanation:STP and UTP are type of Twisted Pair Cable which are mostly used in all Networks.

4) _________ Supports Data Rate Upto 1000 Mbps Gigabyte Ethernet.

a. CAT 1
b. Thinnet
c. CAT 5
d. CAT 5e
Show/Hide Answer
Answer = D
Explanation: CAT 5e is also Know As 1000 Mbps Gigabyte Ethernet and Supports Data Rate
Upto 1000 Mbps.

5) Which Color Coding of Cable is Used to Connect Similar Devices?

a. Straight Cable
b. Cross Over Cable
c. Serial Cable
d. All of Above.
Show/Hide Answer
Answer = B
Explanation: Cross Over Color Coding of UTP Cable is Used to connect Similar Devices like HUB
to HUB, PC to PC, Switch To Switch.
6) HUB is a _________ Device and Switch is a ________ Device.

a. Unicast, Multicast
b. Malticast, Unicast
c. Broadcast, Unicast
d. None of Above
Show/Hide Answer
Answer = C
Explanation: Hub is a Broadcasting Device and Switch is a Unicasting Device because Switch
have Memory Element to Store MAC Address.
7) Switch is a Device of _________ Layer of OSI Model.

a. Network Layer
b. Data Link Layer
c. Application Layer
d. Session Layer
Show/Hide Answer
Answer = B
Explanation: Switches Operate On Th Second Layer of OSI Model That is Data Link Layer.

8) Star Topology is Based On a Central Device that can be __________ ?

a. HUB
b. Switch
c. Only A
d. Both A and B
Show/Hide Answer
Answer = D
Explanation: HUB and Switch are used in Star Type Networks.

9) TCP/IP is also well known as _______.

a. OSI Model
b. TCP Model
c. DOD Model
d. Network Model
Show/Hide Answer
Answer = C
Explanation: TCP/IP Model is also known as DOD model.

10) IPX/SPX is used in ______________.

a. Novell's Netware Network


b. Mac - Macintosh
c. Apple
d. Microsoft
Show/Hide Answer
Answer = A
Explanation: IPX/SPX - Internet Packet Exchanger/Sequenced Package Exchanger is used in
Novell's Netware Network.
1) The collection of communication lines and routers is called
a. LAN
b. MAN
c. WAN
d. Communication Subnet
Show/Hide Answer
Answer = D

2) In the IEEE standards 802.5 standard is also called ?


a. Ethernet
b. Token Bus
c. Wireless Token Area Network
d. Token Ring
Show/Hide Answer
Answer = D
Explanation: In the IEEE standards 802.5 standard is also called Token Ring

3) _________ have a single communication channel that is shared by all the users on the


network. ?
a. Point-to-Point
b. Broadcast Network
c. Protocol
d. PAN
Show/Hide Answer
Answer = B
Explanation: Broadcast Network Have Single Communication channel.

4)A Wireless Access Point Behaves in a similar manner to that of a master-slave operation ?


a. True
b. False
Show/Hide Answer
Answer = True

5) Which of the following is an advantage to using fiber optics data transmission?


a. resistance to data theft
b. fast data transmission rate
c. low noise level
d. all of above
Show/Hide Answer
Answer = D

6) Which of the following is required to communicate between two computers?


a. communications software
b. protocol
c. communication hardware
d. all of above including access to transmission medium
Show/Hide Answer
Answer = D

7) Which of the following types of channels moves data relatively slowly?


a. wide band channel
b. voice band channel
c. narrow band channel
d. all of above
Show/Hide Answer
Answer = C

8) A protocol is a set of rules governing a time sequence of events that must take place ?
a. between peers
b. between an interface
c. between modems
d. across an interface
Show/Hide Answer
Answer = A

9) Which of the following transmission systems provide the highest data rate to


in individual device?
a. computer bus
b. telephone lines
c. voice and mode
d. lease lines
Show/Hide Answer
Answer = A

10) Communiction circuits that transmit data in both directions but not at the same time are
operating in
a. a simplex mode
b. a half duplex mode
c. a full duplex mode
d. an asynchronous mode
Show/Hide Answer
Answer = B
                                
Following are the Multiple choice questions on Computer Networks based on the UGC - NET
Syllabus 

1) The area of coverage of satellite radio beam is known as... ?

a. Footprint
b. Circular polarization
c. Beam width
d. Identity
e. None of Above
Show/Hide Answer
Answer = A 
Explanation:No explanation for this question.
2) Coaxial cable has conductors with ?

a. Equal resistance
b. The same diameter
c. Both A and B
d. A common axis
e. None of these
Show/Hide Answer
Answer = D 
Explanation: Coaxial cables has two type of conductors one is inner and other is outer that has
common axis.

3) What protects the coaxial cable from noise ?

a. Inner conductor
b. Outer conductor
c. Diameter of cable
d. Insulating material
Show/Hide Answer
Answer = B 
Explanation:The outer conductor is covered in protective plastic sheath. This shielding of
coaxial cable give it a good combination of high bandwidth and excellent noise immunity.

4) Error detection at the data link level is achieved by ?

a. Bit stuffing
b. Hamming codes
c. Cyclic Redundancy codes
d. Equalization
e. None of above
Show/Hide Answer
Answer = A 
Explanation:Bit stuffing also known as positive justification is the insertion of non-information
bits into data.

5) MAN refers to ?

a. Mega Area Network
b. Metropolitan Area Network
c. Mini Area Network
d. Medium Area Network
Show/Hide Answer
Answer = B 
Explanation: A metropolitan area network covers a city. The best example is the cable
television network available in cities.
6) Which of the following layer is not in OSI model ?

a. physical layer
b. internet layer
c. network layer
d. transport layer
Show/Hide Answer
Answer =B
Explanation: The OSI model has total 7 layers out of which internet layer is not a part of OSI
model.
7) Nyquist Theorem to calculate data rate is ?

a. 2H log2 V bits/sec
b. H log2 V bits/sec
c. Hlog2 (1+S/N)
d. 2H log2 (1+s/n)
Show/Hide Answer
Answer = A  
Explanation:No explanation

8) Copper wire is an example of ?

a. Guided Transmission Media


b. Unguided Transmission Media
c. Group Media
d. None of these
Show/Hide Answer
Answer = A 
Explanation:Copper wires comes under the Guided Media. Coaxial cables consist of the stiff
copper wire as a core.

9) Iridium and Dysprosium projects, proposed by Motorola are related to ?

a. Geosynchronous satellite
b. Wavelength
c. Low orbit satellite
d. ISDN
Show/Hide Answer
Answer = C 
Explanation:Moving down in altitude, we come to LEO satellites. Due to their rapid motion,
large numbers of them are needed for a complete system.

10) Which of the following is a type of fragmentation ?

a. Transparent
b. Non transparent
c. Both A and B
d. None of these
Show/Hide Answer
Answer = C 
Explanation:Fragmentation is used to break up the packets into fragments. It is of two types :
Transparent and Non transparent.

Following are the Multiple choice questions on Computer Networks based on the UGC - NET
Syllabus 
 
1) Collection of interconnected networks sometimes called ?

a. Internet
b. Wireless network
c. Mobile Network
d. None of these
Show/Hide Answer
Answer = A 
Explanation: Internet is not a single network but network of networks.

2) Which of the following is wrong example of network layer ?

a. X.25 Level 2-ISO


b. Source Routing and Domain Naming Usenet
c. Internet Protocol(IP) - ARPANET
d. X-25 Packet Level Prrotocol (PLP) - ISO
e. None of these
Show/Hide Answer
Answer = A 
Explanation: X.25 is an ITU - T standard that specifies an interface between a host system and
a packet switching network.
3) Mobile computers and personal digital assistant (PDAs) are the examples of ?

a. Radio broadcasting
b. Wireless network
c. Geosynchronous
d. LAN
Show/Hide Answer
Answer = B 
Explanation: Personal Digital Assistant also known as palmtop computers is a mobile device
that functions as the personal  information manager, mostly access internet through Wi - Fi or
wireless wide area network

4) ATM (Asynchronous Transfer Mode) is fundamentally a....... technology?

a. Circuit switching
b. Packet switching
c. Narrow band
d. None of these
Show/Hide Answer
Answer = B 
Explanation:ATM is a cell switching and multiplexing technology that combines the features of
circuit switching with packet switching. Like X.25 and frame relay ATM defines the interaction
between the user equipment and network.

5) Which of the following is a variation of Frequency Division Multiplexing (FDM) ?

a. Time Division Multiplexing(TDM)
b. Pulse Code Multiplexing(PCM)
c. Wavelength Division Multiplexing(WDM)
d. None of these
Show/Hide Answer
Answer = C 
Explanation:The WDM is commonly applied on the optical carrier while FDM is applied on the
radio carrier. Since wavelength and frequency are tied together through a simple directly
inverse relationship, the two terms actually describe the same concept.

6) One security method is encryption. But encryption does nothing to keep digital pests and
hackers out. To accomplish this goal, we need ?

a. Router
b. Bridges
c. Hubs
d. Firewalls
Show/Hide Answer
Answer = D
Explanation: Main objective of firewall is to control the incoming and outgoing network traffic
by analyzing the data packets and determining whether it should be allowed through or not,
based on a predetermined rule set.
7) HTTP refers to  ?

a. Hyper Text Transfer Protocol


b. Hyper Text Transmission Protocol
c. Hyper Text Tie Protocol
d. None of these
Show/Hide Answer
Answer = A 
Explanation:No explanation

8) Why was the OSI developed ?

a. Manufacturers disliked the TCP/IP protocol


b. The rate of data transfer was increasing exponentially
c. Standards were needed to allow any two systems to communicate
d. None of these
Show/Hide Answer
Answer = C 
Explanation:OSI was an effort to standardize the networking that was started in 1977

9) Auto dialing allows ?

a. You to dial up phone numbers by typing them on the keyboard


b. A personal computer to answer incoming calls without human assistance
c. Both A and B
d. None of above
Show/Hide Answer
Answer = A 
Explanation:Auto dialer is an electronic device or software that automatically dials the
telephone numbers.

10) Sending a file from your personal computer's primary memory or disk to another
computer is called ?

a. uploading
b. hang on
c. logging on
d. downloading
e. None of these
Show/Hide Answer
Answer = A 
Explanation: Uploading refers to sending data from local system to remote system such as
server or client.
Following are the Multiple choice questions on Computer Networks based on the UGC - NET
Syllabus , TET exams , and all other competitive exams.
 
1) Which of the following is a congestion control algorithm?

a. The leaky bucket


b. Token bucket
c. Resource Respondez sil vous plait protocol
d. All of above
Show/Hide Answer
Answer = D 
Explanation: No Explanation 
2) Which of the following is a function of e-mail system ?

a. Mosaic
b. Netscape
c. Internet Explorer
d. All of above
Show/Hide Answer
Answer = D 
Explanation: No Explanation 
3) Demodulation is the process of ?

a. converting digital signals to analog signals


b. converting analog signals to digital signals
c. dividing the high-speed signals into frequency bands
d. combining many low speed signals into one high speed channel
e. None of above
Show/Hide Answer
Answer = B 
Explanation: No Explanation 
4) Bulletin board system ?

a. is a public access message system


b. converts digital signals to analog signals
c. is a modem capable of accepting commands
d. converts digital signals to analog signals
e. None of above
Show/Hide Answer
Answer = A 
Explanation: No Explanation 
5) An information utility can offer a user ?

a. instant bonds and stock quotations


b. news stories from wire services
c. Complete airline schedules for all domestic flights
d. All of above
e. None of above
Show/Hide Answer
Answer = D 
Explanation: No Explanation 
6) A network that requires human intervention of route signals is called a ?

a. bus network
b. ring network
c. star network
d. T- switched network
e. None of above
Show/Hide Answer
Answer = D 
Explanation: No Explanation 
7) In OSI network architecture, the dialogue control and token management are
responsibilities of ?

a. session layer
b. network layer
c. transport layer
d. data link layer
e. none of above
Show/Hide Answer
Answer = A 
Explanation: No  Explanation 
8) What is the main function of transport layer ?

a. node to node delivery


b. process to process message delivery
c. synchronization
d. updating and maintenance of routing tables
Show/Hide Answer
Answer = B 
Explanation: No Explanation 
9) Which of the following is an important characteristics of LAN ?

a. application independent interface


b. low cost access for low bandwidth channels
c. unlimited expansion
d. parallel transmission
e. None of above
Show/Hide Answer
Answer = A 
Explanation: No Explanation 
10) To deliver a message to the correct application program running on a host, the .... address
must be consulted ?

a. port
b. physical
c. IP
d. None
Show/Hide Answer
Answer = A 
Explanation: No Explanation 

Following are the multiple choice question on Computer Network related concepts that are
useful for the competitive exams like UGC-NET Exam, TET Exams etc.
 
1) A network that requires human intervention of route signals is called a ?
a. Bus network
b. Ring netwkork
c. Star network
d. T-switched network
e. None of above
Show/Hide Answer
Answer = D 
Explanation: No Explanation

2)  Which layer functions as liaison between user support layers and network support layers ?
a. network layer
b. physical layer
c. transport layer
d. session layer
Show/Hide Answer
Answer = C 
Explanation: Transport Layer functions as liaison between user support layers (Application,
Presentation and Session) and network support layers (Network, Data Link and Physical)

3) If digital data rate of 9600 bps is encoded using 8-level phase shift keying method, the
modulation rate is?

a. 1200 bands
b. 3200 bands
c. 4800 bands
d. 9600 bands
e. None of above
Show/Hide Answer
Answer = C 
Explanation: Add Explanation in comments!!!

4)  Maximum data rate of a channel for a noiseless 3-KHz binary channel is?


a. 3000 bps
b. 6000 bps
c. 1500 bps
d. None of above
Show/Hide Answer
Answer =  B
Explanation: Explanation 4

5) If the bit string 0111101111101111110 is subjected to bit stuffing for the flag string
01111110, the output string is ?
a. 011110111110011111010
b. 01111011111011111100
c. 01111011111011111010
d. 0111101111101111110
Show/Hide Answer
Answer = A 
Explanation: No Explanation

6)  Which of the following is not a standard RS-232C signal ?


a. RTS
b. CTS
c. DSR
d. VDR
Show/Hide Answer
Answer = D 
Explanation:No Explanation

7) In Ethernet CSMS/CD the special bit sequence transmitted by the media access


management for collision handling is called as  ?
a. preamble
b. postamble
c. jam
d. None of above
Show/Hide Answer
Answer = C 
Explanation: No Explanation 
8) HDLC is ?
a. bit oriented
b. Code transparent
c. Code dependent
d. None of above
e. A and B
Show/Hide Answer
Answer = D 
Explanation: No Explanation 
9) Which of the following are non-polling system ?
a. TDMA
b. stop & wait
c. Xon/Xoff
d. Continuous ARQ
e. A and C
Show/Hide Answer
Answer = E 
Explanation: No Explanation
10) Adaptive or dynamic directory used in packet routing changes  ?
a. within each user session
b. with each user session
c. at system generation times only
d. Both A and B
Show/Hide Answer
Answer = A 
Explanation: No Explanation 
Tags: Computer Networks multiple choice questions with answers, Objective type questions on
computer networks with answers, networking MCQ's, Computer network mcqs, UGC-NET exam
preparation, TET exams preparation, multiple choice questions on computer networks , Teacher
eligibility test, TET Exams preparation.

1) Which protocol working at the Transport layer provides a connectionless service


between hosts?
a. IP
b. ARP
c. TCP
d. UDP
Show/Hide Answer
Answer = D
Explanation: User Datagram Protocol is used at the Transport layer to provide a connectionless
service.
2) Which protocol works at the Transport layer and provides virtual circuits between hosts?

a. IP
b. ARP
c. TCP
d. UDP
Show/Hide Answer
Answer = C
Explanation: Transmission Control Protocol sets up a virtual circuit before transmitting any
data. This creates a reliable session and is known as a connection-oriented session.
3) Which protocol works at the Internet layer and provides a connection service between
hosts?

a. IP
b. ARP
c. TCP
d. UDP
Show/Hide Answer
Answer = A
Explanation: Internet Protocol is used to address hosts and route packets through the
internetwork. The question does not refer to a connection-oriented service, which is different
from a plain connection service.
4) If a host broadcasts a frame that includes a source and destination hardware address, and
its purpose is to assign IP addresses to itself, which protocol at the Network layer does the
host use?

a. RARP
b. ARPA
c. ICMP
d. TCP
e. IPX
Show/Hide Answer
Answer = A
Explanation: Reverse ARP is used to find an IP address from a known hardware address.
5) If a router interface is congested, which protocol in the IP suite is used to tell neighbor
routers?

a. RARP
b. ARP
c. ICMP
d. IP
e. TCP
Show/Hide Answer
Answer = C
Explanation: Internet Control Message Protocol (ICMP) is used to send redirects back to an
originating router.
6) What is the valid host range the IP address 172.16.10.22 255.255.255.240 is a part of? 

a. 172.16.10.20 through 172.16.10.22


b. 172.16.10.1 through 172.16.10.255
c. 172.16.10.16 through 172.16.10.23
d. 172.16.10.17 through 172.16.10.31
e. 172.16.10.17 through 172.16.10.30
Show/Hide Answer
Answer = E
Explanation: First start by using the 256 mask, which in this case is 256–240=16. The first
subnet is 16; the second subnet is 32. This host must be in the 16 subnet; the broadcast
address is 31 and the valid host range is 17–30.
7) What range of addresses can be used in the first octet of a Class B network address?

a. 1-126
b. 1-127
c. 128-190
d. 128-191
e. 129-192
f. 192-220
Show/Hide Answer
Answer = D
Explanation: A Class B network is defined in the first octet with the numbers 128–191.
8) What range of addresses can be used in the first octet of a Class C address?

a. 1-127
b. 129-192
c. 203-234
d. 192-223
Show/Hide Answer
Answer = D
Explanation: A Class C network is defined in the first octet with the numbers 192-223.
9) How many bytes is an Ethernet address?

a. 3
b. 4
c. 5
d. 6
e. 7
f. 8
g. 16
Show/Hide Answer
Answer = D
Explanation: An Ethernet (MAC) address is 6 bytes long (48 bits).
10) What protocol is used to find the hardware address of a local device?

a. RARP
b. ARP
c. IP
d. ICMP
e. BootP
Show/Hide Answer
Answer = B
Explanation: Address Resolution Protocol (ARP) is used to find the hardware address from a
known IP address.

Das könnte Ihnen auch gefallen