In the name of ALLAH, the most beneficient, the most merciful

Computer Network (CS610)

Multiple Choice Questions (MCQs)

Objective Questions

  1. The Fast Ethernet hardware operates at a rate of ________.

    1. 10 Mbps
    2. 1000 Mbps
    3. 1000 bps
    4. 100 Mbps
  2. ________ cannot be extended arbitrarily far or to handle arbitrarily many computers.

    1. WAN
    2. LAN
    3. MAN
    4. LED
  3. The frame format of any LAN technology must consists of ________ and ________.

    1. Payload and CRC
    2. Payload and Frame type
    3. Frame header and pay load
    4. Frame header and CRC
  4. The topology each computer is connected to a central hub is called

    1. Ring topology
    2. Star topology
    3. Tree topology
    4. Mesh topology
  5. Which of the following cannot be used to extend a LAN?

    1. Repeaters
    2. Switches
    3. Routers
    4. Fiber Modems
  6. Point-to-point topology is

    1. Size Based
    2. Mobility Based
    3. Connectivity Based
    4. Medium Based
  7. ________ is a tool that sends a message to a remote computer and reports whether the computer responds.

    1. Ping
    2. Flag
    3. Fragment offset
    4. TCP
  8. ________ are more frequently being designed to allow specification of the quality of service required by users.

    1. Switch
    2. VPI
    3. VCI
    4. Networks
  9. A ________ is a special-purpose computer dedicated to the task of interconnecting networks.

    1. Router
    2. Bridge
    3. Switch
    4. None of the given
  10. NAT device stores state information in translation table.

    1. true
    2. false
  11. In ________ topology, if the switch goes down all the computers will be disconnected.

    1. Bus
    2. Ring
    3. Mesh
    4. Star
  12. Which type of network consists of wired computers in a university classroom?

    1. WAN
    2. LAN
    3. MAN
    4. PAN
  13. Bluetooth uses shared medium and ________ instead of coaxial cable.

    1. Radio waves
    2. Low frequency waves
    3. Micro waves
    4. Infrared waves
  14. The third field of the header consists of ___________ bit Ethernet frame type.

    1. 48
    2. 32
    3. 16
    4. 8
  15. Which of the following statement is true regarding ATM?

    1. It is a single technology for voice, video and data.
    2. It has low jitter and high capacity.
    3. It uses fixed size, small cells, 48 octet’s data.
    4. All of the above
  16. Which of the following is not a benefit of Source Independence?

    1. It allows fast and efficient routing.
    2. Packet switch need not hove complete information about all destinations.
    3. network functions even if topology changes.
    4. None of the given
  17. The sharing of a ________ among the workers in an office is a goal of resource sharing.

    1. Mouse
    2. Printer
    3. Keyboard
    4. Motherboard
  18. ________ and ________ are the two types of frame type.

    1. Internal and external
    2. Single and dual
    3. Implicit and explicit
    4. Multicast and broadcast
  19. In Direct point to point communication adding the Nth computer requires ________ new connections.

    1. (N^2 - N)/2
    2. N^2
    3. N(N - 1)
    4. N - 1
  20. Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included:

    1. Destination address
    2. Source address
    3. Rectifier
    4. Other delivery information
  21. Hardware that calculates a CRC uses two simple components ________.

    1. Shift register and XOR unit
    2. ANd unit and XOR unit
    3. Shift register and shift XOR unit
    4. Shift register & AND unit
  22. An interior switch is one with wich ________.

    1. Computers are attached.
    2. No computer is attached.
    3. Computers are attached internally.
    4. None of the above.
  23. If a small set of bits changes near a specific location due to lighting or electric motor starting nearby, this type of errors are called ________.

    1. Burst error
    2. Vertical error
    3. Parity Error
    4. Single bit error
  24. Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.

    1. true
    2. false
  25. SMDS is ________.

    1. Connectionless service
    2. Connection oriented service
    3. Used for delivering blocks of data
    4. None of the given
  26. The recent executed instruction ________ in temporal aspect of the locality of reference.

    1. won't be executed soon
    2. is temporarily not referenced
    3. will be wxwcuted soon again
    4. will be showing the final results
  27. Fragmentation when using ICMP for path MTU should be avoided.

    1. true
    2. false
  28. The Ethernet standard specifies that frames are sent using the ________ scheme.

    1. Differential Manchester
    2. Not Return to Zero (NRZ)
    3. Return to Zero (RZ)
    4. Manchester Encodind
  29. The ________ of errors is easier than the ________ of errors.

    1. correction, detection
    2. detection, correction
    3. correction, creation
    4. detection, manipulation
  30. Thick Ethernet also requires ________ to avoid signal reflectance.

    1. Terminators
    2. Drop cable
    3. Transceivers
    4. AUI cable
  31. The information about ________ is kept in routing tables.

    1. Entries
    2. Destinations
    3. Source
    4. Packets
  32. Even parity can be used to check for ________ bit/bits of errors.

    1. 1
    2. 2
    3. 3
    4. 0
  33. ________ Source is responsible for fragmentation.

    1. IPV4
    2. IPV6
  34. ________ sends ICMP echo messages with increasing TTL.

    1. Ping
    2. Trace route
    3. Tracert
    4. none of the given
  35. Frame relay is ________.

    1. Connection oriented service
    2. Connectionless service
    3. It is typically ranges from 5Mbps to 1000Mbps
    4. None of the given
  36. According to a bridge performance, if both the source and destination are on the same segment.

    1. It forwards the frame to the other segment
    2. It does not forward the frame to the other segment
    3. It does not forward the frame to the same segment
    4. It forwards the frame to every other segment
  37. Which of the following remains same in the header of the packet in a datagram during the entire journey of the packet?

    1. Source Address
    2. Destination Address
    3. Next Node Address
    4. Checksum
  38. ________ encapsulates IP datagram as data area in hardware frame.

    1. Network Interface Layer
    2. Datalink Layer
    3. Network Layer
    4. None of the given
  39. Which of the following is called virtual channel?

    1. Connection in VCI
    2. Connection in ATM
    3. Connection in virtual circuit
    4. None of the above
  40. ________ is the most popular wiring scheme because of lowest cost.

    1. 5 Base T
    2. 10 Base T
    3. 100 Base T
    4. 1000 Base T
  41. Frames include additional information to detect/correct errors are insert by ________.

    1. Sender
    2. Receiver
    3. Network Devices
    4. Sender and Receiver
  42. Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.

    1. 8-bit
    2. 16-bit
    3. 32-bit
    4. 64-bit
  43. Which of the following is not a guided medium?

    1. Twisted-pair cable
    2. Fiber-optic cable
    3. Atmosphere
    4. Coaxial cable
  44. Which layer of the OSI Model directly communicates and controls the transmission medium:

    1. Transmission
    2. Physical
    3. Application
    4. Network
  45. The maximum cable length of a LAN is ________.

    1. Fixed
    2. Unlimited
    3. Fixed and Unlimited in different conditions
    4. None of these
  46. ATM offers high speed and ________ delay.

    1. High
    2. Low
    3. Moderate
    4. All of the above
  47. The mechanism extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _______ and bandwidth is very _______.

    1. Low, High
    2. High, Low
    3. High, High
    4. Low, Low
  48. The first automated tool required to see whether the given computer is online or not was

    1. Probing program
    2. PING program
    3. status program
    4. None of the above
  49. Twice NAT fails if an application uses the IP addresses instead of Domain Name.

    1. true
    2. false
  50. ATM header is about ________ of the cell.

    1. 100 %
    2. 10 %
    3. 20 %
    4. 50 %
  51. How many methods exist for computing routing table?

    1. 5
    2. 4
    3. 3
    4. 2
  52. We need packets rather than bits because ________.

    1. To compress the data
    2. Packets move faster
    3. Sender and receiver need to coordinate to detect transmission errors.
    4. Packets can only move between two terminals
  53. Which of the following technologies can extend the diameter of LAN medium?

    1. Fiber optic
    2. Repeaters
    3. Diameter of LAN medium is not extendable
    4. Both Fiber Optic and Repeaters
  54. To span long distances or many computers, networks must replace shared medium with _________.

    1. segment transformation
    2. fiber optices
    3. packet switches
    4. None of the above
  55. The physical addressing in a WAN is similar as in LAN in the way __________.

    1. The data is transmitted in packets equivalent to frames.
    2. Each packet has a format with header.
    3. The packet header includes destination and source addresses.
    4. All of the above
  56. EGPs stand for ________.

    1. Exterior Gateway Protocols
    2. External Gateway Protocols
    3. Extra Gateway Protocols
    4. None of the given
  57. As a result of ARPA research, the first network was established which was named as ________.

    1. ARPANET
    2. PACKET NETWORK
    3. ARPNET
    4. INTERNETWORKING
  58. If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each other at which speed they can communicate?

    1. 11 Megabit
    2. 100 Megabit
    3. 1 Gigabit
    4. 1.1 Gigabit
  59. NIC connection in a physical network is known as __________.

    1. LAN wiring scheme
    2. WAN wiring scheme
    3. Color wiring scheme
    4. None of above
  60. In 3-way handshake TCP requires to generate a random ________ sequence number.

    1. 30 bit
    2. 32 bit
    3. 34 bit
    4. none of the given
  61. ________ is a measure of the rate at which data can be sent through the network.

    1. Throughput
    2. Propagation delay
    3. Access delay
    4. Switching delay
  62. The ________ field of Ethernet frame has the purpose of receiver synchronization.

    1. Preamble
    2. Frame Type
    3. Data
    4. CRC
  63. Due to revolutionalization of IP-V6 the speed has increased from ________.

    1. 56kbps to 512kbps
    2. 512kbps to 1gbps
    3. 56kbps to 1gbps
    4. none of the given
  64. VBR stands for __________.

    1. Virtual Bit Rate
    2. Virtual Byte Rate
    3. Variable Byte Redundancy
    4. Variable Bit Rate
  65. According to size, there are ________ classifications of networks.

    1. 2
    2. 3
    3. 4
    4. 5
  66. LAN interface uses ________ to copy frame data directly from main memory.

    1. DMA
    2. FDDI
    3. Hard disk
    4. Flash
  67. Which of the following is a benefit of source independence?

    1. It allows fast and efficient routing.
    2. Packet switch do not need to have complete information about all destinations
    3. Network functions even if topology changes
    4. All of the above
  68. In FDDI, in case of a station failure, remaining stations loop back and ________.

    1. Re-route data through spare ring
    2. Data frames are discarded
    3. Re-transmit data through the same ring
    4. Collision will occur
  69. What will be the bandwidth rate for older, low-speed network, and analog telephones?

    1. 16 MHz
    2. 20 MHz
    3. 24 MHz
    4. 30 MHz
  70. ________ is less complex and easy to understand.

    1. TCP
    2. UDP
    3. IP
    4. None of the given
  71. Which multiplexing technique shifts each signal to a different carrier frequency?

    1. TDM
    2. FDM
    3. Both a and b
    4. None of the above
  72. ________ protocol uses three way handshake to begin a connection.

    1. UDP
    2. TCP
    3. IP
    4. none of the given
  73. Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.

    1. true
    2. false
  74. The number of connections needed for 8 computers in direct point to point communication is equal to ________.

    1. 28
    2. 8
    3. 7
    4. 26
  75. In ________ all computers are attached to a central hub.

    1. Star Topology
    2. Bus Topology
    3. Hub Topology
    4. Ring Topology
  76. The network occupies larger areas like cities & countries is called

    1. LAN
    2. WAN
    3. MAN
    4. All of the above
  77. Each computer in LAN is identified by a physical address, usually imprinted on the ________.

    1. Router
    2. Switch
    3. Network Interface Card
    4. Modem
  78. The switch that has computers attached with it is called ________ switch.

    1. Exterior
    2. Interior
    3. Packet
    4. Front
  79. ________ places the boundary between the second and third octets

    1. Class A
    2. Class B
    3. Class C
    4. Class D
  80. SMDS is ________.

    1. Connectionless service
    2. Connection oriented service
    3. Used for delivering blocks of data
    4. None of the given
  81. The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.

    1. Djikstra
    2. Shortest path first
    3. Vector distance
    4. Distributed Spanning Tree
  82. The length of time required to send a variable length packet is ________.

    1. 5 seconds
    2. Variable
    3. Constant
    4. Fix
  83. In CSMA, if simultaneous transmission occurs, the ________ interfere with each other and this phenomenon is called collision.

    1. Computers
    2. Network
    3. Frames
    4. Cable wires
  84. When an application _________ data, it makes a copy of the data available to all other computers on the network.

    1. Broadcasting
    2. Multicasting
    3. Unicasting
    4. None of the given
  85. ________ is standard wireless LAN that uses radio signals at 2.4HHz.

    1. IEEE 803.16
    2. IEEE 802.3
    3. IEEE 802.15
    4. IEEE 802.11
  86. If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called ________.

    1. collision
    2. delayed transmission
    3. packet loss
    4. coordination
  87. In a ping command result, time denotes the ________.

    1. TLT
    2. BRT
    3. TTL
    4. RTT
  88. IPV6 128 bits address includes network prefix and ________

    1. Host Suffix
    2. Host prefix
    3. Source Prefix
    4. none of the given
  89. Physical Addressing is a WAN is similar to LAN as each packet has format with ________.

    1. Header
    2. Title
    3. Frame
    4. Address
  90. The protocol address of the next hop must be _____________ to an equivalent hardware address before a packet can be sent.

    1. Encrypted
    2. Decrypted
    3. Translated
    4. Non of these
  91. ________ is inflexible.

    1. Routing
    2. Searching
    3. Processing
    4. Static routing
  92. Missing ________ in a frame format indicates receiving computer missed beginning of the message.

    1. soh
    2. eoh
    3. eot
    4. sot
  93. Which multiplexing technique transmits analog signals?

    1. FDM
    2. TDM
    3. WDM
    4. Both (a) and (c)