Data_Communication_and_Computer_Networks_Multiple_Choice_Questions
Data_Communication_and_Computer_Networks_Multiple_Choice_Questions
A. Transport layer
B. Physical layer
C. Network layer
D. Application layer
2. Which one of the following is not correct about packet switching and circuit switching?
C. The Internet
4. Which one of the following is not correct about POP3 and SMTP?
B. The Internet
6. Which one of the following is different from the other based on its role in computer network?
A. Routers
B. Network printer
C. Wireless access point
D. Hubs
7. Suppose you are administering a network and would like to know whether a computer in the
upstairs is connected to the network or not. Therefore, which command would you use?
8. At which layer of the OSI model devices such as switches and network interface cards (NIC)
are used
A. Transport layer
B. Network layer
D. Application layer
10. What is the purpose of a MAC (Media Access Control) address?
11. What is the purpose of DNS (Domain Name System) in computer networks?
14. Which networking device operates at the Data Link layer of the OSI model and filters traffic
based on MAC addresses?
A. Router
B. Switch
C. Hub
D. Bridge
15. What is a VLAN (Virtual Local Area Network) used for in networking?
18. What is the primary advantage of using IPv6 (Internet Protocol version 6) over IPv4?
22. What is the primary purpose of the Data Link layer in the OSI model?
26. Which two statements about the purpose of the OSI model are accurate? (Choose two)
27. Which of the following are related to the purposes of encapsulation and decapsulation?
(Choose all that apply)
A. Faster communication
28. Which of the following are specific network protocols? (Choose all that apply)
29. In the TCP/IP model, at which layer is the data unit referred to as a ―frame‖? (Choose one)
A. 00:00:0c:07:ac:01
B. ff:ff:ff:ff:ff:ff
C. 43:2e:08:00:00:0c
D. 00:00:0c:43:2e:08
E. 00:00:0c:ff:ff:f
A. Star network
B. Bus network
C. Ring network
D. Tree network
32. Into which geographical categories can networks be divided? (Choose all that apply)
B. Ethernet
C. Internet
33. LAN is typically limited to a range of how many kilometers? (Choose one)
A. 0.1 km
B. 1 km
C. 10 km
D. 100 km
E. 1000 km
34. In a global positioning system (GPS), which method does the satellite use to communicate
with the GPS receiver on the ground? (Choose one)
A. Simplex communication
B. Half-duplex communication
C. Full-duplex communication.
36. Which network service automatically assigns IP addresses to devices on the network?
A. DHCP
B. Telnet
C. DNS
D. traceroute
37. Which TCP segments will not be used in TCP three-way handshake? (Choose all that apply)
A. SYN
B. SYN+ACK
C. ACK
D. FIN
E. FIN+ACK
38. What process involves placing one PDU inside of another PDU?
A. encapsulation
B. encoding
C. segmentation
D. flow control
39. When a TCP module sends a TCP segment, which layer will subsequently process the TCP
segment to be sent? (Choose one)
A. Application layer
B. Transport layer
C. Network layer
40. A TCP host would indicate that it successfully received the packet with TCP sequence #800
and the 100 bytes of payload it was carrying, by sending ack# ______ back to the sender?
41. What ―mechanism‖ does TCP use to control the amount of traffic it receives?
A. Acknowledgements
C. Sequence numbering
D. Flags
42. A packet with sIP = 0.0.0.0 and dIP = 255.255.255.255 would most likely be associated
with…
A. an ARP request.
B. a DHCP request.
C. a DNS query.
A. IP ->MAC
B. IP -> name
C. MAC -> IP
D. name -> IP
44. A computer that is continually ―listening‖ on port 25, is most likely an…
45. What is the correct order of data encapsulation while one goes downwards from the top to
bottom of our hybrid five layer model?
46. Why is port number included in the TCP or UDP header of a datagram?
A. To indicate the correct router interface that should be used to forward a datagram
B. To identify which switch ports should receive or forward the datagram
C. To determine which Layer 3 protocol should be used to encapsulate the data
D. To enable a receiving host to forward the data to the appropriate application
E. To allow the receiving host to assemble the packet in the proper order
47. Which one of the following is the purpose of the TCP three-way handshake?
A. Sending echo requests from the source to the destination host to establish the presence of
the destination.
B. Determining the IP address of the destination host in preparation for data transfer
C. Requesting the destination to transfer a binary file to the source
D. Synchronizing window size and sequence numbers between source and destination in
preparation for data transfer
E. None of the above
48. Which features characterize the UDP transport layer protocol? (Choose Two)
A. Packet acknowledgment may reduce overhead traffic
B. Duplication control ensures error free delivery
C. Packets are not acknowledged which reduces overhead traffic and enhance performance.
D. Requires handshaking before transmission.
E. Encapsulate data into datagram to ensure end to end data integrity
49. Packets in one TCP connection can be distinguished from packets in another TCP
connection by:
50. A network administrator uses the ping command to check for points of failure in the network.
52. Which transport protocol allows real-time applications (e.g. video streaming) to send packets
without waiting for ACKs?
A) 110 B) 90 C) 80 D) 49
57. What are two characteristics shared by TCP and UDP? (Choose two.)
58. The purpose of the Protocol Number field in the IP header is:
A) Indicate the lower layer (data link) protocol that the data is intended for
C) Indicate the next higher layer protocol that the data is intended for
(c) To provide a means for the receiver to govern the amount of data sent by the sender.
(a) To map IP addresses to MAC addresses (c) To switch traffic to all available interfaces
(b) To propagate broadcast message (d) To find paths from one network or subnet to another
(a) Bit Stuffing (b) Cyclic Redundancy Code (c) Hamming Code (d) Equalization
63. Which value that is contained in an IPv4 header field, is decremented by each router that
receives a packet?
(a) Header Length (b) Differentiated services (c) Time-to-live (d) Fragment Offset
64. Start and stop bits are used in serial communication for
(a) Error detection (b) Error correction (c) Synchronization (d) Slowing down the communication
(a) 64 Bytes (b) 46 Bytes (c) 1500 Bytes (d) 1518 Bytes
(a) Class A (b) Class B (c) Class C (d) Class D (e) Class E
67. Which IPv4 class of provides the highest number of host addresses per network
(a) Class A (b) Class B (c) Class C (d) Class D (e) Class E
68. Your company has a LAN in its downtown office and has now set up a LAN in the
manufacturing plant in the suburbs. To enable everyone to share data and resources between
the two LANs, what type of device(s) are needed to connect them? Choose the most correct
answer.
(c) carrying data between processes that are running on source and destination hosts
70. Which of the following summation operations is performed on the bits to check an error-
detecting code?
(a) Frame check sequence (b) Error detecting code (c) Checksum (d) flow control
(a) The IP address (b) The TCP address (c) The subnet mask (d) The default gateway
(a) 192 – 255 (b) 192 – 223 (c) 192 – 226 (d) 128 – 191 (e) 1 - 126
74. Ethernet networks can be cabled in a number of topologies, depending on what works best in
each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the
best answer as to why Ethernet becomes less efficient as size increases.
75. The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI
model. A number of standards were agreed upon during that time. Which of the following is
the standard for Ethernet?
(a) 802.2 (b) 802.3 (c) 802.4 (d) 802.5 (e) 802.6
76. A medium access control technique for multiple access transmission media is
(a) Slotted Aloha (b) CSMA/CA (c) CSMA/CD (d) TDMA (e) FDMA
78. Which subnet would include the address 192.168.1.96 as a usable host address?
79. IEEE project 802 divides the data link layer into an upper ________ sub-layer and a lower
______ sub-layer
(a) HDLC, PDU (b) PDU, HDLC (c) MAC, LLC (d) LLC, MAC
80. On a VLSM network, which mask should you use on point-to-point WAN links in order to
reduce the waste of IP addresses?
81. What is the difference between an Ethernet hub and an Ethernet switch?
(a) A switch can be used in a star topology; a hub cannot be used in a star topology.
(b) A switch forwards frames to other stations; a hub does not forward frames.
(c) A switch is used to send IP datagrams; a hub does not send IP datagrams.
(d) A hub always sends a frame to all stations; a switch may send a frame to a specific
station.
82. Consider Stop-and-Wait, Go-Back-N and Selective-Reject ARQ protocols. Which statement
is true?
(a) Go-Back-N will always be more efficient than Stop-and-Wait and Selective-Reject.
(c) In Go-Back-N the sender may send multiple frames before waiting for an ACK; in Selective-
Reject the sender must wait for an ACK after sending a single frame.
(d) Selective-Reject uses sequences numbers, whereas Go-Back-N and Stop-and-Wait do not.
(a) 1 Mb/s (b) 10 Mb/s (c) 54 Mb/s (d) 100 Mb/s (e) 1000 Mb/s
(d) Switches are complex because they must process every piece of data
(e) A larger delay (than datagram packet switching) will always occur when transferring the
same amount of data
85. Compared to other common topologies in LANs (such as bus, mesh, ring), which of the
following is a disadvantage of using a star topology for LAN?
87. Which protocol provides flow control, error control and connection management:
90. A model for communication systems consists of the following components (the list must be
in the correct order):
91. Which protocol maps domain specific addresses into logical addresses
92. The standard suit of protocols used by the Internet, intranets, extranets, and some other
networks
93. Information systems with common hardware, software, and network standards that provide
easy access for end users and networked computer systems, Select the best fit for answer.
96. Which of the following TCP/IP protocol is used for remote terminal connection service?