20 MCQ Of Computer Networks For IBPS IT Officer Exam

1)A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.
A)static
B)dynamic
C)active
D)none of the above

2)Active documents are sometimes referred to as _________ dynamic documents.
A)client-site
B)server-site
C)both a and b
D)none of the above

3)For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.
A)static
B)dynamic
C)active
D)none of the above

4)The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.
A)HEAD
B)POST
C)COPY
D)none of the above

5) ___________ is a technology that creates and handles dynamic documents.
A)GIC
B)CGI
C)GCI
D)none of the above

6)In a ___________connection, the server leaves the connection open for more requests after sending a response.
A)persistent
B)nonpersistent
C)both a and b
D)none of the above

7)In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.
A)request; response
B)response; request
C)response; status
D)none of the above

8)When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________.
A)two UAs, two pairs of MTAs, and a pair of MAAs
B)two UAs, and two pairs of MTAs
C)two UAs, two pairs of MTAs, and two pairs of MAAs
D)none of the above

9)The actual mail transfer is done through ____________.
A)UAs
B)MTAs
C)MAAs
D)none of the above

10)NVT uses two sets of characters, one for _____and one for __________.
A)sending; receiving
B)request; reply
C)data; control
D)none of the above

11)In FTP, ASCII, EBCDIC, and image define an attribute called _______.
A)file type
B) data structure
C)transmission mode
D)none of the above

12)The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server.
A)terminal driver
B)pseudoterminal driver
C)TELNET client
D)none of the above

13)For the control connection, FTP uses the __________ character set.
A)regular ASCII
B)EBCDIC
C)NVT ASCII
D)none of the above

14)In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server.
A)maximize throughput
B)minimize delay
C)minimize error
D)none of the above

15)When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
A)local
B)remote
C)temporary
D)none of the above

16)For control, NVT uses US ASCII characters with the highest order bit set to ______.
A)1
B)0
C)a or b
D)none of the above

17)The formal protocol that defines the MTA client and server in the Internet is called ___________.
A)SMTP
B)SNMP
C)TELNET
D)none of the above

18)In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client.
A)default
B)character
C)line
D)none of the above

19)SMTP is a __________protocol.
A)pull
B)push
C)both a and b
D)none of the above

20)During an FTP session the control connection is opened _______.
A)exactly once
B)exactly twice
C)as many times as necessary
D)none of the above

 

 




Computer Networks MCQ-5

1)Which of the following type of ICMP messages need to be encapsulated into an IP datagram
a)time exceeded
b)multicasting
c)echo reply
d)all of the above

2)Which layer deal with
1)File system transfer
2)Virtual terminals implementation
3)Inter process communication
a)Application
b)Presentation
c)Session
d)Transport

3)Which of the following error detection method consists of just one redundant bit per data unit?
a)Checksum
b)LRC
c)CRC
d)VRC

4)Adaptive or dynamic directory used in packet routing changes
a)within each user session
b)with each user session
c)at system generation time only
d)none of these

5)Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server?
a)RDP
b)RARP
c)RIP
d)X.25

6)How many digit of the DNIC(Data Network Identification Code) identify the country?
a)First Three
b)First Four
c)First Five
d)First Six

7)Start and stop bits do not contain an information, but are used in serial communication for
a)error detection
b)synchronization
c)error correction
d)slowing down the communication

8)The frame relay committed information rate represents
a)maximum data rate on the network
b)steady state data rate on the network
c)minimum data rate on the network
d) interface data rate

9)The………measures the number of lost or garbled messages as a fraction of the total sent in the sampling period.
a)Residual Error rate
b)Transfer failure probability
c)Connection release failure probability
d)Connection establishment failure probability

10)Which of the following TCP/IP protocol is used for the file transfer with minimal capability and minimal overhead?
a)RARP
b)FTP
c)TFTP
d)TELNET

 

Answers:
1)d
2)a
3)d
4)a
5)b
6)a
7)b
8)c
9)a
10)c




Computer Networks MCQ-4

1)In the Ethernet network, What method is used to access the media?
a)Demand priority
b)CSMA/CD
c)Polling
d)CSMA/CA
e)None of these

2)Which of the following Ethernet components is unique for each card created?
a)Frame Type
b)CRC Address
c)IRQ
d)MAC Address
e)None of these

3)ALOHA
a)is used for channel allocation problem
b)is use of data transfer
c)is buffering
d)all of the above
e)None of these

4)Which project 802 standard provides for a collision free protocol?
a)802.2
b)802.3
c)802.5
d)802.4
e)None of these

5)Unnumbering frame in HDLC are used for
a)Unnumbering a frame
b)Deleting a frame
c)System Management
dAdding frame
e)None of these

6)The store and forward mechanism is used in………………
a)Packet switching
b)Message switching
c)Circuit switching
d)Datagram switching
e)None of these

7)Which one is the least expensive that can support 100Mbps?
a)Coaxial
b)UTP
c)Fibre-optic
d)STP
e)None of these

8)Broadband uses
a)Manchester encoding
b)FSK encoding
c)ASK encoding
d)PSK encoding
e)None of these

9)In CRC Checking, the divisor is …………..the CRC
a)One bit less than
b)One bit more than
c)The same size as
d)These bits more than
e)None of these

10)In the 1-persistent approach when a station finds an idle line, it……………
a)Waits 1s before sending
b)It waits for a random amount of time
c)Its sends immediately
d)Its sends 0.1 sec before sending
e)None of these

Answers:
1)b
2)d
3)a
4)c
5)c
6)b
7)b
8)d
9)b
10)c




Computer Network MCQ-3

1)What kind of scheme is the HTTP protocol?
a)get/put
b)store/forward
c)queuing
d)search/return
e)request/response

2)Which of the following is used for integrity?
a)DES
b)Diffie-Hellman
c)SED
d)AES
e)MD5

3)Which tool is used to test serial and parallel ports?
a)high volt probe
b)cable scanner
c)loop backs(wrap plugs)
d)sniffer
e)None of these

4)TCP is
a)reliable connection oriented protocol
b)unreliable connection oriented protocol
c)reliable connection less protocol
d)unreliable connectionless protocol
e)None of these

5)What is the name of protocol used in eliminate loops?
a) Switching
b) ISL
c) Frame tagging
d) Spanning Tree Protocol
e) None of these

6)Print server uses ……..which is a buffer that holds before it is send to the printer
a)Queue
b)Spool
c)Node
d)Stack
e)None of these

7)If you want to locate the hardware address of a local device, which protocol would you use?
a)ARP
b)RARP
c)ICMP
d)PING
e)PONG

8)Which of the following function is not performed by TCP?
a)Flow Control
b)Sequencing
c)Error Checking
d)Subnetting
e)None of these

9)A communication medium where data are transformed into light pulses is
a)Coaxial Cable
b)Optical Fibre
c)Satellite
d)Twisted-pair Cable
e)Copper Cable

10)FDDI is 
a)Ring Network
b)Star Network
c)Mesh Network
d)Bus Based Network
e)None of these

Answers:
1)e
2)e
3)c
4)a
5)d
6)b
7)a
8)d
9)b
10)a




Computer Networks MCQ-2

 

 

 

1)Frame Relay

a)does not use error correction routine
b)is used by facsimile machines
c)uses error correction routines
d)does not work weel on the internet
e)is an outdated technology
2)At……… layer,TCP/IP defines two protocols: Transmission Control Protocol and User Datagram Protocol(UDP)
a)Transport Layer
b)Network Layer
c)Physical Layer
d)Application Layer
e)None of these
3)The ……..layer is the layer closest to transmission medium.
a)Transport
b)Network
c)Data Link
d)Physical
e)None of these
4)Which protocol does ping use?
a)TCP
b)ARP
c)ICMP
d)BootP
e)None of these
5)How many collision domains are created when you segment a network with a 12 port switch?
a)1
b)2
c)5
d)12
e)None of these
6)Synchronous optical network(SONET)
a)It provides away to multiplex digital channels together
b)It consists of switches, multiplexes and repeaters all connected by fiber
c)Sonet can be meshed but is often dual ring
d)All of the above
e)None of these
7)Packages are used
a)to avoid name collision
b)to determine the accessibility of variables
c)to fast retrieving
d)All of the above
e)None of these
8)What is main reason for OSI model creation
a)To create a layered model larger than the DoD model
b)Application developers can change only one layers protocol at a time
c)So different networks could communicate
d)Cisco could use the model
e)None of these
9)Which of the following forms does not describe parallel ATA devices
a)SCSI
b)IOE and DOE
c)IOE
d)DOE
e) ATA
10)Which of the following could be a legitimate Media Access Control Address
a)192.168.254.3
b)3FA2.4756.F9A3
c)A5514
d)C1.3A.77.5B
e)None of these
Answers:
1)a
2)a
3)d
4)c
5)d
6)d
7)a
8)c
9)a
10)d



Computer Networks MCQ-1

1)Common Gateway Interface(CGI) is which of the following?
a)An interface that accepts and returns a data that may be written in SQL
b)A small program that executes within other application and is stored on the server
c)A small program that executes within other application and is stored on the client.
d)A small program that executes within other application
e)An Interface that accepts and returns data that may be written in any language that produce executable file

2)………..is a standard for security that is inclined at the network or packet processing layer of network communications, as opposed to the application layer
a)Passive FTP
b)TCP
c)IPSec
d)S-HTTP
e)None of these

3)In addition to an internet connection, which of the following is needed to ?
a)Telnet client
b)Scanner
c)Mail Client
d)HP Client
e)Web Browser

4)Which amongst the following is not an advantage of distributed system?
a)Reliability
b)Incremental Growth
c)Resource Sharing
d)Low Cost
e)None of these

5)Link Encryption
a)is more secure than end to end encryption
b)is less secure than end to end encryption
c)cannot be used in public network
d)is used only to debug
e)None of these

6)Which of the following OSI level is more closely related to the physical communications facilities?
a)Application
b)Session
c)Network
d)Data link
e)None of these

7)Handshaking is 
a)Synchronous type
b)asynchronous
c)Sequential
d)All of the above
e)None of these

8)Which of the following is a variation of Frequency Division Multiplexing(FDM)?
a)Time Division Multiplexing(TDM)
b)Pulse Code Multiplexing(PCM)
c)Wavelength Division Multiplexing
d)All of above
e)None of these

9)What is ISL used for?
a)To allow an Ethernet interface to understand frame tags
b)To make two Ethernet interfaces appear as one
c)To connect an Ethernet switch with a high-speed core switch such as ATM
d)To allow simultaneous routing and switching
e)None of these

10)Which uses a Pre Shared Key that is more than 7 and less than 64 characters in length?
a)WPA-PSK
b)TKIP
c)AES
d)All of the above
e)None of these

Answers:
1)e
2)c
3)e
4)a
5)a
6)d
7)a
8)c
9)a
10)d