Unit- 1 Quiz Computer network –Introduction
What is a computer network?
a) A collection of interconnected devices that communicate with each other
b) A single computer connected to the internet
c) A standalone system without any connection
d) None of the above
Which of the following is NOT a type of network?
a) LAN
b) WAN
c) PAN
d) CPU
What is the primary purpose of a network protocol?
a) To design websites
b) To establish communication rules between devices
c) To increase computer speed
d) To store data
Which device is used to connect multiple computers in a network?
a) Monitor
b) Router
c) Printer
d) Keyboard
Which of the following is an example of a Wide Area Network (WAN)?
a) Office network
b) Home Wi-Fi
c) The Internet
d) Bluetooth
A Local Area Network (LAN) typically covers:
a) A single building or campus
b) Multiple cities
c) Entire countries
d) The whole world
Which topology connects all devices to a central hub?
a) Bus
b) Star
c) Ring
d) Mesh
In the OSI model, which layer is responsible for data encryption?
a) Physical
b) Data Link
c) Presentation
d) Application
TCP stands for:
a) Transmission Control Protocol
b) Transfer Control Protocol
c) Transmission Communication Protocol
d) Transfer Communication Protocol
Which protocol is used for secure communication over the internet?
a) HTTP
b) FTP
c) HTTPS
d) SMTP
What does IP stand for in IP address?
a) Internet Protocol
b) Internal Protocol
c) Internet Procedure
d) Internal Procedure
Which device operates at the Data Link layer of the OSI model?
a) Router
b) Switch
c) Hub
d) Repeater
What is the function of a firewall in a network?
a) To connect multiple networks
b) To prevent unauthorized access
c) To store data
d) To manage IP addresses
Which protocol is used to send emails?
a) FTP
b) SMTP
c) HTTP
d) SNMP
What is the default port number for HTTP?
a) 21
b) 25
c) 80
d) 443
Which layer of the OSI model is responsible for routing?
a) Physical
b) Data Link
c) Network
d) Transport
What does DNS stand for?
a) Domain Name System
b) Digital Network Service
c) Data Name Server
d) Domain Network Service
Which protocol is used to transfer files between computers?
a) FTP
b) SMTP
c) SNMP
d) IMAP
What is the main advantage of fiber optic cables over copper cables?
a) Lower cost
b) Higher bandwidth and speed
c) Easier installation
d) More flexibility
Which of the following is a private IP address?
a) 192.168.1.1
b) 8.8.8.8
c) 172.217.16.14
d) 203.0.113.1
In networking, what does VPN stand for?
a) Virtual Private Network
b) Virtual Public Network
c) Variable Private Network
d) Variable Public Network
Which protocol is used for remote login to a computer?
a) FTP
b) Telnet
c) SMTP
d) SNMP
What is the purpose of a subnet mask?
a) To identify the network and host portions of an IP address
b) To assign IP addresses dynamically
c) To translate domain names to IP addresses
d) To encrypt data
Which layer of the OSI model establishes, manages, and terminates connections between
applications?
a) Session
b) Transport
c) Network
d) Data Link
What does MAC stand for in MAC address?
a) Media Access Control
b) Multiple Access Control
c) Media Application Control
d) Multiple Application Control
Which protocol is used to retrieve emails from a mail server?
a) SMTP
b) POP3
c) FTP
d) HTTP
What is the primary function of the Transport layer in the OSI model?
a) Data formatting
b) Data encryption
c) End-to-end communication and error handling
d) Physical addressing
Which device connects two different networks and directs data packets between them?
a) Switch
b) Router
c) Hub
d) Bridge
What is the main purpose of the ARP protocol?
a) To map IP addresses to MAC addresses
b) To assign IP addresses dynamically
c) To route data packets
d) To encrypt data
Which topology involves each device being connected to every other device?
a) Star
b) Bus
c) Ring
d) Mesh
What is the function of a proxy server?
a) To store data
b) To act as an intermediary between a client and a server
c) To manage IP addresses
d) To encrypt data
Which protocol is used to dynamically assign IP addresses to devices on a network?
a) DNS
b) DHCP
c) FTP
d) HTTP
What is the default port number for HTTPS?
a) 21
b) 25
c) 80
d) 443
Q1
What is the fundamental purpose of a computer network?
Sharing resources
Storing data
Performing calculations
Enhancing security
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q2
Which topology does the Internet resemble?
Ring
Bus
Star
Mesh
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q3
What type of network covers a large geographical area, like a city, country, or the world?
LAN
MAN
WAN
PAN
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q4
Which device is used to connect different network segments in a computer network?
Repeater
Router
Bridge
Modem
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q5
What protocol is commonly used for transmitting web pages over the internet?
SMTP
FTP
HTTP
D
SNMP
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q6
Which layer of the OSI model ensures the error-free transmission of data?
Physical Layer
B
Data Link Layer
Network Layer
Transport Layer
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q7
In a computer network, what is the main function of the application layer?
A
To provide network services to the applications
To transmit data between network devices
To package data for transfer
To route data between networks
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q8
Which command can be used to view the current IP configuration of a device?
ipconfig
ifconfig
Both ipconfig and ifconfig
netstat
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q9
What is the result of executing the ping localhost command?
It sends ICMP echo requests to the local machine
It configures the local machine's IP address
It displays the routing table
It clears the DNS cache
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q10
If a computer is unable to access the Internet, but can communicate with local network devices,
what should be checked first?
Router configuration
Cable connections
Local firewall settings
DNS settings
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q11
A computer can ping IP addresses but not domain names.
What is likely the issue?
IP conflict
Router failure
DNS misconfiguration
Faulty Ethernet cable
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q12
Which layer of the OSI model is responsible for establishing, managing, and terminating
sessions between applications?
Session Layer
Transport Layer
C
Application Layer
Presentation Layer
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q13
What is the primary function of the Network Layer in the OSI model?
To provide data routing paths for network communication
B
To format data
To establish connections
To encode and decode data
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q14
In the TCP/IP model, which layer corresponds to the OSI model's Physical and Data Link layers?
Application
Transport
Internet
Network Interface
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q15
The process of encapsulation involves data moving from which layer to which layer?
Application to Physical
Physical to Application
Transport to Network
Network to Transport
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q16
Which OSI layer is responsible for error detection and correction at the destination?
Transport
Network
Data Link
Physical
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q17
What does the TCP/IP model's Internet layer do?
Manages end-to-end data communication sessions
Routes packets across networks
Formats data packets
Encodes and decodes data
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q18
Which protocol operates at the Transport Layer of the OSI model to ensure reliable
communication?
ICMP
IP
TCP
UDP
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q19
How does the Presentation Layer of the OSI model differ from the Application Layer?
It is responsible for session management
It deals with syntax and semantics of the information exchanged
It provides encryption and compression
D
It is not implemented in the TCP/IP model
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q20
What feature distinguishes TCP from UDP at the Transport Layer?
TCP is faster than UDP
B
TCP and UDP use different port numbers
TCP is connection-oriented while UDP is not
TCP uses IP but UDP does not
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q21
Which command can be used to display the current TCP/IP network configuration?
A
ipconfig /all
netstat -r
arp -a
tracert
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q22
What does the netstat command do?
Displays network connections, routing tables, and statistics
Configures network interfaces
Tests connectivity to a host
Manages firewall settings
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q23
Which command is used to test connectivity to a specific IP address and trace the path the
packets take?
ping
arp
tracert
nslookup
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q24
A device is unable to connect to any network. Which OSI layer should be investigated first?
Application
Presentation
Network
Physical
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q25
If a computer can connect to local devices but not to the Internet, what might be misconfigured?
IP address
Subnet mask
Default gateway
MAC address
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q26
A web application can send data but cannot receive.
What layer could be malfunctioning?
Application
Session
C
Transport
Presentation
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q27
What is the primary function of the MAC (Media Access Control) sublayer?
Frame delimiting
B
Error detection
Controlling access to the physical medium
Physical addressing
View Answer
Report a Problem!
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Comment
Bottom of Form
CancelSubmit
Top of Form
close
Bottom of Form
Report
Q28
What is the standard Ethernet frame size for most networks?
64 bytes to 1518 bytes
128 bytes to 1024 bytes
1500 bytes to 2000 bytes
100 bytes to 1500 bytes
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Q29
In Ethernet networks, what is the purpose of the collision detection mechanism?
To encrypt data
To compress data
C
To detect and manage when two devices try to send data simultaneously
To prioritize data
Top of Form
There is an error in the question
Answer seems to be wrong
Explanation is not understandable
Explanation lacks depth
Q30
Which Ethernet standard provides a speed of 1 Gbps?
10BaseT
100BaseTX
1000BaseT
10GBaseT
Which protocol is used to retrieve emails from a mail server?
a) SMTP
b) POP3
c) FTP
d) HTTP
What is the primary function of the Transport layer in the OSI model?
a) Data formatting
b) Data encryption
c) End-to-end communication and error handling
d) Physical addressing
Which device connects two different networks and directs data packets between them?
a) Switch
b) Router
c) Hub
d) Bridge
What is the main purpose of the ARP protocol?
a) To map IP addresses to MAC addresses
b) To assign IP addresses dynamically
c) To route data packets
d) To encrypt data
Which topology involves each device being connected to every other device?
a) Star
b) Bus
c) Ring
d) Mesh
What is the function of a proxy server?
a) To store data
b) To act as an intermediary between a client and a server
c) To manage IP addresses
d) To encrypt data
Which protocol is used to dynamically assign IP addresses to devices on a network?
a) DNS
b) DHCP
c) FTP
d) HTTP
What is the default port number for HTTPS?
a) 21
b) 25
c) 80
d) 443
Which layer of the OSI model is responsible for error detection and correction?
a) Physical
b) Data Link
c) Network
d) Transport
What does NAT stand for in networking?
a) Network Address Translation
b) Network Access Transmission
c) Network Application Testing
d) Network Address Transmission
Which protocol is used to securely transfer files over a network?
a) FTP
b) SFTP
c) HTTP
d) SMTP
In IPv4 addressing, how many bits are used for an IP address?
a) 32
b) 64
c) 128
d) 256
Which device operates at the Physical layer of the OSI model?
a) Router
b) Switch
c) Hub
d) Bridge
What is the main function of the Network layer in the OSI model?
a) Data encryption
b) Path determination and logical addressing
c) Physical addressing
d) Data formatting
Which protocol is used for network device management and monitoring?
a) SNMP
b) SMTP
c) FTP
d) HTTP
What is the purpose of the ICMP protocol?
a) To transfer files
b) To send error messages and operational information
c) To manage email transmission
d) To encrypt data
Which of the following is a connection-oriented protocol?
a) UDP
b) TCP
c) IP
d) ICMP
What does SSL stand for?
a) Secure Socket Layer
b) Secure System Layer
c) System Socket Layer
d) Secure Service Layer
Which protocol is commonly used for voice and video transmission over IP networks?
a) FTP
b) RTP
c) HTTP
d) SMTP
What is the primary purpose of a VLAN?
a) To increase network speed
b) To segment a network into logical groups
c) To connect different networks
d) To encrypt data
Which layer of the OSI model is responsible for data compression?
a) Physical
b) Data Link
c) Presentation
d) Application
What is the function of a gateway in a network?
a) To connect networks using different protocols
b) To amplify signals
c) To filter traffic
d) To store data
Which protocol is used to resolve IP addresses to domain names?
a) DNS
b) DHCP
c) ARP
d) FTP
What is the maximum length of a CAT5e Ethernet cable segment?
a) 50 meters
b) 100 meters
c) 150 meters
d) 200 meters
Which of the following is a class A IP address?
a) 192.168.1.1
b) 172.16.0.1
c) 10.0.0.1
d) 224.0.0.1
What does MTU stand for in networking?
a) Maximum Transmission Unit
b) Minimum Transmission Unit
c) Medium Transmission Unit
d) Maximum Transfer Unit
Which protocol is used for remote desktop access?
a) FTP
b) RDP
c) SMTP
d) SNMP
What is the primary function of a load balancer in a network?
a) To distribute incoming network traffic across multiple servers
b) To store data
c) To encrypt data
d) To monitor network performance
Which layer of the OSI model handles flow control?
a) Physical
b) Data Link
c) Network
d) Transport
What is the purpose of a demilitarized zone (DMZ) in network security?
a) To encrypt data
b) To separate an internal network from untrusted external networks
c) To store data
d) To manage IP addresses
Which protocol is used to synchronize time across devices on a network?
a) FTP
b) NTP
c) SMTP
d) SNMP
What is the default port number for Telnet?
a) 21
b) 22
c) 23
d) 25
Unit- 1 Quiz Computer network –physical layer
The Physical Layer is primarily concerned with:
a) Application-to-application communication
b) Process-to-process communication
c) Bit-by-bit delivery
d) Frame-to-frame delivery
Which transmission medium offers the highest data transmission speed?
a) Coaxial cable
b) Twisted pair cable
c) Optical fiber
d) Wireless
In the OSI model, the Physical Layer is responsible for:
a) Error detection and correction
b) Routing and forwarding
c) Defining hardware specifications
d) Session management
Which of the following is NOT a function of the Physical Layer?
a) Bit synchronization
b) Circuit switching
c) Packet sequencing
d) Modulation
The term "baud rate" refers to:
a) The number of bits transmitted per second
b) The number of signal units transmitted per second
c) The frequency of the signal
d) The bandwidth of the channel
Which device operates solely at the Physical Layer?
a) Router
b) Switch
c) Hub
d) Bridge
The Physical Layer deals with the transmission of:
a) Frames
b) Packets
c) Bits
d) Segments
Which of the following is a characteristic of UTP (Unshielded Twisted Pair) cables?
a) High immunity to electromagnetic interference
b) Consists of a single solid wire
c) Contains multiple twisted pairs without shielding
d) Utilizes light for data transmission
In fiber optic communication, the core of the fiber is made of:
a) Copper
b) Plastic or glass
c) Aluminum
d) Steel
The process of converting digital signals into analog signals for transmission over analog
mediums is called:
a) Demodulation
b) Multiplexing
c) Modulation
d) Encoding
Which of the following connectors is commonly used with coaxial cables?
a) RJ45
b) BNC
c) SC
d) LC
The maximum length of a standard Ethernet (10Base-T) cable segment is:
a) 50 meters
b) 100 meters
c) 200 meters
d) 500 meters
Which modulation technique involves varying the amplitude of the carrier signal?
a) Frequency Modulation (FM)
b) Phase Modulation (PM)
c) Amplitude Modulation (AM)
d) Quadrature Amplitude Modulation (QAM)
In wireless communication, the term "attenuation" refers to:
a) The increase in signal strength
b) The delay of signal transmission
c) The reduction in signal strength
d) The reflection of signals
Which of the following is a type of guided transmission medium?
a) Microwave
b) Satellite
c) Optical fiber
d) Radio wave
The Physical Layer provides services to which layer of the OSI model?
a) Data Link Layer
b) Network Layer
c) Transport Layer
d) Application Layer
In the context of the Physical Layer, "throughput" refers to:
a) The time taken for a signal to travel from sender to receiver
b) The number of bits transmitted successfully per unit time
c) The delay between data transmission and reception
d) The error rate of the transmission
Which of the following is NOT a standard for wireless communication?
a) IEEE 802.3
b) IEEE 802.11
c) Bluetooth
d) Zigbee
The term "full-duplex" in data transmission means:
a) Data can only be transmitted in one direction
b) Data transmission is alternated between two directions
c) Data can be transmitted in both directions simultaneously
d) Multiple devices share the same transmission medium
Which of the following encoding schemes uses two voltage levels to represent binary 0
and 1, with no neutral or zero voltage level?
a) Non-Return to Zero (NRZ)
b) Manchester Encoding
c) Bipolar Encoding
d) Differential Manchester Encoding
In the context of the Physical Layer, "bandwidth" refers to:
a) The range of frequencies that a transmission medium can carry
b) The amount of data that can be stored
c) The delay in data transmission
d) The error rate of the transmission
Which of the following is a disadvantage of using coaxial cables?
a) High susceptibility to electromagnetic interference
b) Limited bandwidth compared to twisted pair cables
c) Bulkiness and difficulty in installation
d) High cost compared to optical fibers
The term "latency" in network communication refers to:
a) The amount of data transmitted per second
b) The time delay between the transmission and reception of a signal
c) The strength of the transmitted signal
d) The error rate in data transmission
Which of the following devices is used to regenerate and amplify signals in a network to
extend the transmission distance?
a) Router
b) Switch
c) Repeater
d) Gateway
In the OSI model, which layer is responsible for converting data into electrical, optical,
or radio signals?
a) Data Link Layer
b) Network Layer
c) Transport Layer
d) Physical Layer
Which type of multiplexing allows multiple analog signals to be combined into one
signal over a shared medium?
a) Time Division Multiplexing (TDM)
b) Frequency Division Multiplexing (FDM)
c) Code Division Multiplexing (CDM)
d) Space Division Multiplexing (SDM)
Unit-3 Quiz Computer network –Network Layer
The primary responsibility of the Network Layer is:
a) Data encryption and decryption
b) End-to-end communication and error correction
c) Routing packets from the source to the destination across multiple networks
d) Managing hardware addresses and error detection
Which protocol operates at the Network Layer of the OSI model?
a) Transmission Control Protocol (TCP)
b) Internet Protocol (IP)
c) User Datagram Protocol (UDP)
d) Hypertext Transfer Protocol (HTTP)
In the OSI model, the Network Layer is which layer?
a) Second
b) Third
c) Fourth
d) Fifth
The process of determining the best path for data to travel from source to destination is
known as:
a) Switching
b) Routing
c) Bridging
d) Filtering
Which of the following is NOT a function of the Network Layer?
a) Path determination
b) Logical addressing
c) Error detection and correction
d) Packet forwarding
The protocol responsible for mapping IP addresses to MAC addresses is:
a) Address Resolution Protocol (ARP)
b) Internet Control Message Protocol (ICMP)
c) Dynamic Host Configuration Protocol (DHCP)
d) Domain Name System (DNS)
Which routing algorithm uses the Bellman-Ford algorithm to calculate paths?
a) Link State Routing
b) Distance Vector Routing
c) Path Vector Routing
d) Hybrid Routing
In IPv4 addressing, a subnet mask of 255.255.255.0 indicates how many possible host
addresses?
a) 254
b) 256
c) 510
d) 512
The protocol used to report errors and operational information in an IP network is:
a) Internet Control Message Protocol (ICMP)
b) Transmission Control Protocol (TCP)
c) User Datagram Protocol (UDP)
d) Simple Network Management Protocol (SNMP)
Which of the following is a characteristic of the IPv6 protocol?
a) 32-bit address space
b) Fragmentation performed by both sender and routers
c) No checksum field in the header
d) Broadcast addressing
The process of dividing an IP address space into smaller segments is known as:
a) Supernetting
b) Subnetting
c) Multicasting
d) Broadcasting
Which protocol is used to dynamically assign IP addresses to hosts in a network?
a) Domain Name System (DNS)
b) Dynamic Host Configuration Protocol (DHCP)
c) Address Resolution Protocol (ARP)
d) Internet Control Message Protocol (ICMP)
In the context of routing, what does the term "convergence" refer to?
a) The time it takes for a router to forward a packet
b) The process of routers updating their routing tables and reaching a consistent state
c) The method of combining multiple routes into one
d) The technique of reducing routing loops
Which of the following is a distance-vector routing protocol?
a) Open Shortest Path First (OSPF)
b) Border Gateway Protocol (BGP)
c) Routing Information Protocol (RIP)
d) Intermediate System to Intermediate System (IS-IS)
The term "MTU" stands for:
a) Maximum Transmission Unit
b) Minimum Transmission Unit
c) Maximum Transfer Utility
d) Minimum Transfer Utility
In IPv4, the loopback address is:
a) 127.0.0.1
b) 192.168.0.1
c) 10.0.0.1
d) 169.254.0.1
Which field in the IPv4 header is used to prevent packets from looping indefinitely?
a) Time to Live (TTL)
b) Header Checksum
c) Protocol
d) Fragment Offset
The process of aggregating multiple IP networks into a single advertisement is known
as:
a) Subnetting
b) Supernetting
c) Multicasting
d) Anycasting
Which of the following is a link-state routing protocol?
a) Routing Information Protocol (RIP)
b) Open Shortest Path First (OSPF)
c) Border Gateway Protocol (BGP)
d) Exterior Gateway Protocol (EGP)
In IPv6, the address ::1 is equivalent to which IPv4 address?
a) 0.0.0.0
b) 127.0.0.1
c) 192.168.1.1
d) 255.255.255.255
The protocol that provides a virtual circuit service at the Network Layer is:
a) Transmission Control Protocol (TCP)
b) User Datagram Protocol (UDP)
c) Internet Protocol (IP)
d) X.25
Which of the following IP address classes provides a maximum of 254 host addresses
per network ID?
a) Class A
b) Class B
c) Class C
d) Class D
The process of determining which path a packet should take through a network is
called:
a) Switching
b) Routing
c) Bridging
d) Filtering
In the context of IP addressing, CIDR stands for:
a) Classless Inter-Domain Routing
b) Classful Internet Domain Routing
c) Connectionless Internet Datagram Routing
d) Connection-Oriented Inter-Domain Routing
Which protocol is used to discover the MAC address of a host given its IP address?
a) Address Resolution Protocol (ARP)
b) Reverse Address Resolution Protocol (RARP)
c) Internet Control Message Protocol (ICMP)
d) Dynamic Host Configuration Protocol (DHCP)
The primary purpose of the Network Layer is to:
a) Provide error-free delivery of data
b) Establish, manage, and terminate sessions
c) Move packets from the source to the destination
d) Format data for presentation
The Data Link Layer of the OSI model is responsible for:
a) Routing packets between devices
b) Establishing, maintaining, and terminating sessions
c) Node-to-node data transfer and error detection
d) Application-to-application communication
Which of the following is a sublayer of the Data Link Layer?
a) Network Control Protocol
b) Logical Link Control
c) Transmission Control Protocol
d) User Datagram Protocol
The process of dividing a data stream into smaller units called frames is known as:
a) Segmentation
b) Packetizing
c) Framing
d) Encapsulation
Which protocol is used for error detection by adding a trailer to the frame?
a) Cyclic Redundancy Check (CRC)
b) Internet Control Message Protocol (ICMP)
c) Address Resolution Protocol (ARP)
d) Dynamic Host Configuration Protocol (DHCP)
In the Data Link Layer, flow control is achieved using:
a) Sliding window protocol
b) Routing algorithms
c) Encryption techniques
d) Domain Name System (DNS)
Which of the following is NOT a function of the Data Link Layer?
a) Error detection and correction
b) Flow control
c) Path determination
d) Frame synchronization
The MAC (Media Access Control) address is used to:
a) Identify devices at the Network Layer
b) Identify devices at the Data Link Layer
c) Identify devices at the Transport Layer
d) Identify devices at the Application Layer
Which of the following is a Data Link Layer protocol?
a) Ethernet
b) IP
c) TCP
d) HTTP
In a token ring network, the token passing mechanism is used to:
a) Detect errors in frames
b) Control access to the shared medium
c) Route packets between networks
d) Encrypt data for security
The Point-to-Point Protocol (PPP) operates at which layer of the OSI model?
a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer
Which error detection method involves adding parity bits to data?
a) Checksum
b) Cyclic Redundancy Check (CRC)
c) Parity Check
d) Hamming Code
In the context of the Data Link Layer, ARQ stands for:
a) Automatic Repeat Query
b) Automatic Routing Query
c) Asynchronous Repeat Query
d) Asynchronous Routing Query
Which of the following is a flow control protocol used in the Data Link Layer?
a) Stop-and-Wait
b) Distance Vector Routing
c) Link State Routing
d) Open Shortest Path First (OSPF)
The High-Level Data Link Control (HDLC) protocol is an example of:
a) A connectionless protocol
b) A connection-oriented protocol
c) A routing protocol
d) An application layer protocol
In Ethernet networks, the CSMA/CD protocol is used to:
a) Detect and correct errors in frames
b) Control access to the shared medium
c) Route packets between networks
d) Encrypt data for security
Which of the following is a characteristic of the Logical Link Control (LLC) sublayer?
a) Provides MAC addressing
b) Manages protocol multiplexing
c) Handles physical signaling
d) Controls access to the transmission medium
The process of adding headers and trailers to data is known as:
a) Encapsulation
b) Decapsulation
c) Fragmentation
d) Segmentation
In the context of the Data Link Layer, FCS stands for:
a) Frame Control Sequence
b) Frame Check Sequence
c) Flow Control Sequence
d) File Control Sequence
Which of the following is an example of a Data Link Layer device?
a) Router
b) Switch
c) Hub
d) Repeater
The term "bit stuffing" refers to:
a) Adding extra bits to data to ensure proper framing
b) Removing erroneous bits from data
c) Compressing data to save bandwidth
d) Encrypting data for security
In a sliding window protocol, the window size refers to:
a) The number of bits transmitted per second
b) The number of frames that can be sent without acknowledgment
c) The size of each frame in bytes
d) The time interval between frame transmissions
Which of the following is a method of error correction used in the Data Link Layer?
a) Parity Check
b) Checksum
c) Hamming Code
d) Cyclic Redundancy Check (CRC)
The Address Resolution Protocol (ARP) is used to:
a) Map IP addresses to MAC addresses
b) Map MAC addresses to IP addresses
c) Resolve domain names to IP addresses
d) Resolve IP addresses to domain names
In the context of Ethernet, a collision domain is:
a) A network segment where data packets can collide
b) A network segment where broadcasts are propagated
c) A network segment isolated by routers
d) A network segment isolated by switches
Which of the following is a characteristic of the MAC sublayer?
a) Provides error detection and correction
b) Manages logical addressing
c) Controls access to the physical transmission medium
d) Establishes end-to-end connections
In a wireless network, the Data Link Layer uses which protocol for media access
control?
a) CSMA/CD
b) CSMA/CA
c) Token Passing
d) Polling
Unit- 4 Quiz Computer network- Transport
Layer
The primary function of the Transport Layer is to:
a) Route data packets between devices
b) Provide end-to-end communication and error control
c) Manage hardware addressing
d) Handle physical signal transmission
Which of the following protocols operates at the Transport Layer?
a) Internet Protocol (IP)
b) Transmission Control Protocol (TCP)
c) Address Resolution Protocol (ARP)
d) Internet Control Message Protocol (ICMP)
The Transport Layer is which layer in the OSI model?
a) Third
b) Fourth
c) Fifth
d) Sixth
Which Transport Layer protocol provides a connection-oriented service?
a) User Datagram Protocol (UDP)
b) Transmission Control Protocol (TCP)
c) Internet Protocol (IP)
d) Hypertext Transfer Protocol (HTTP)
The process of combining data from multiple applications into a single stream is known
as:
a) Demultiplexing
b) Multiplexing
c) Encapsulation
d) Segmentation
In TCP, the three-way handshake is used to:
a) Terminate a connection
b) Establish a connection
c) Flow control
d) Error detection
Which field in the TCP header is used for flow control?
a) Sequence Number
b) Acknowledgment Number
c) Window Size
d) Urgent Pointer
UDP is considered a connectionless protocol because:
a) It establishes a connection before data transfer
b) It does not guarantee delivery of data
c) It provides error correction
d) It uses a three-way handshake
The term "port number" in the Transport Layer is used to:
a) Identify the physical port on a device
b) Specify the process or service on the destination device
c) Indicate the IP address of a device
d) Determine the MAC address of a device
Which of the following is a well-known port number for HTTP?
a) 20
b) 21
c) 80
d) 443
In TCP, the mechanism used to control congestion is known as:
a) Flow control
b) Error control
c) Congestion control
d) Multiplexing
The UDP header includes which of the following fields?
a) Sequence Number
b) Acknowledgment Number
c) Checksum
d) Window Size
Which of the following applications would most likely use UDP?
a) File Transfer Protocol (FTP)
b) Email (SMTP)
c) Video streaming
d) Web browsing (HTTP)
In the context of TCP, what does MSS stand for?
a) Maximum Segment Size
b) Minimum Segment Size
c) Maximum Service Size
d) Minimum Service Size
The process of dividing a message into smaller units for transmission is called:
a) Encapsulation
b) Segmentation
c) Multiplexing
d) Demultiplexing
Which Transport Layer protocol provides error detection but not error correction?
a) TCP
b) UDP
c) IP
d) ICMP
In TCP, the term "window size" refers to:
a) The size of the data packet
b) The amount of data that can be sent without acknowledgment
c) The size of the header
d) The number of simultaneous connections
The term "socket" in networking refers to:
a) A physical connector
b) A combination of IP address and port number
c) A type of firewall
d) A network protocol
Which of the following is NOT a feature of TCP?
a) Connection-oriented communication
b) Flow control
c) Congestion control
d) Broadcast transmission
In the context of TCP, the "urgent pointer" field is used to:
a) Indicate the end of the data stream
b) Prioritize certain data
c) Acknowledge received data
d) Control the flow of data
Which protocol provides a connectionless service at the Transport Layer?
a) TCP
b) UDP
c) IP
d) ICMP
The term "handshake" in networking refers to:
a) The process of terminating a connection
b) The process of establishing a connection
c) Data encryption
d) Error detection
In TCP, the "sequence number" field is used to:
a) Identify the port number
b) Indicate the order of data bytes
c) Specify the IP address
d) Determine the window size
Which of the following is a characteristic of UDP?
a) Guaranteed delivery
b) Connection-oriented
c) Low overhead
d) Flow control
The "checksum" field in the Transport Layer is used for:
a) Flow control
b) Error detection
c) Congestion control
d) Data encryption
In TCP, the "FIN" flag is used to:
a) Establish a connection
b) Terminate a connection
c) Synchronize sequence numbers
d) Indicate urgent data
Which of the following protocols is used for reliable data transfer?
a) UDP
b) TCP
c) IP
d) ICMP
The "ACK" flag in the TCP header indicates:
a) Acknowledgment of received data
b) Request for connection termination
c) Synchronization of sequence numbers
d) Presence of urgent data
In the context of TCP, "flow control" is achieved using:
a) Sequence numbers
b) Acknowledgments
c) Window size
d) Checksum
50 mcq Quiz Computer network – Application Layer
Which of the following is an Application Layer protocol?
a) IP
b) TCP
c) HTTP
d) Ethernet
The primary function of the Application Layer is to:
a) Provide end-to-end communication
b) Facilitate user interaction with network services
c) Route data packets between devices
d) Manage physical transmission of data
Which protocol is used for transferring files over the Internet?
a) SMTP
b) FTP
c) DNS
d) SNMP
The Domain Name System (DNS) translates:
a) IP addresses to domain names
b) Domain names to IP addresses
c) MAC addresses to IP addresses
d) IP addresses to MAC addresses
Which of the following protocols is used for sending and receiving email?
a) HTTP
b) FTP
c) SMTP
d) SNMP
The Hypertext Transfer Protocol (HTTP) operates over which port number?
a) 21
b) 22
c) 80
d) 443
Which protocol is used for secure communication over the Internet?
a) HTTP
b) HTTPS
c) FTP
d) SMTP
The Simple Mail Transfer Protocol (SMTP) operates over which port number?
a) 21
b) 22
c) 25
d) 110
Which of the following is a connectionless protocol at the Application Layer?
a) FTP
b) HTTP
c) DNS
d) SMTP
The File Transfer Protocol (FTP) operates over which port numbers?
a) 20 and 21
b) 21 and 22
c) 22 and 23
d) 23 and 25
Which protocol is used for remote login to another computer?
a) FTP
b) Telnet
c) SMTP
d) SNMP
The Simple Network Management Protocol (SNMP) is used for:
a) Managing network devices
b) Transferring files
c) Sending emails
d) Resolving domain names
Which of the following protocols is used for secure email communication?
a) SMTP
b) POP3
c) IMAP
d) S/MIME
The Hypertext Transfer Protocol Secure (HTTPS) operates over which port number?
a) 80
b) 443
c) 21
d) 22
Which protocol is used for retrieving email from a server?
a) SMTP
b) POP3
c) IMAP
d) SNMP
The Internet Message Access Protocol (IMAP) allows:
a) Sending emails
b) Retrieving emails
c) Managing network devices
d) Resolving domain names
Which of the following is a stateful protocol?
a) HTTP
b) FTP
c) DNS
d) SMTP
The Dynamic Host Configuration Protocol (DHCP) is used for:
a) Assigning IP addresses to devices
b) Resolving domain names
c) Managing network devices
d) Sending emails
Which protocol is used for network time synchronization?
a) SNMP
b) NTP
c) FTP
d) SMTP
The Telnet protocol operates over which port number?
a) 21
b) 22
c) 23
d) 25
Which of the following protocols is used for secure remote login?
a) Telnet
b) SSH
c) FTP
d) SMTP
The Simple Network Management Protocol (SNMP) operates over which port number?
a) 161
b) 162
c) 80
d) 443
Which protocol is used for sending and receiving instant messages?
a) SMTP
b) XMPP
c) FTP
d) SNMP
The Post Office Protocol version 3 (POP3) operates over which port number?
a) 21
b) 22
c) 23
d) 110
Which protocol is used for transferring hypertext documents over the Internet?
a) FTP
b) HTTP
c) SMTP
d) SNMP
The Internet Control Message Protocol (ICMP) is used for:
a) Sending emails
b) Managing network devices
c) Error reporting and diagnostics
d) Resolving domain names
Which protocol is used for secure file transfer over the Internet?
a) FTP
b) SFTP
c) SMTP
d) SNMP
The Domain Name System (DNS) operates over which port number?
a) 53
b) 80
c) 443
d) 21
Which protocol is used for sending and receiving emails with attachments?
a) SMTP
b) POP3
c) IMAP
d) MIME
The Hypertext Transfer Protocol (HTTP) operates over which port number?
a) 21
b) 22
c) 23
d) 80
Which protocol is used for secure email communication?
a) SMTP
b) POP3
c) IMAP
d) S/MIME
The Simple Mail Transfer Protocol (SMTP) operates over which port number?
a) 21
b) 22
c) 25
d) 110
Which protocol is used for transferring files over the Internet?
a) SMTP
b) FTP
c) DNS
d) SNMP