MCA/Computer Network MCA Question MCQ Set 9 Sample Test,Sample questions

Question:
 According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?

1. Well-known ports

2. Registered ports

3. Registered ports

4.Static ports


Question:
 If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?

1. 255.255.255.252

2.255.255.255.255

3. 255.255.255.240

4.255.255.255.248


Question:
 In IPv4 Addresses, classful addressing is replaced with ________

1. Classless Addressing

2.Classful Addressing

3.Classful Advertising

4.Classless Advertising


Question:
 Internet Control Message Protocol (ICMP) has been designed to compensate _____

1.Error-reporting

2.Error-correction

3.Host and management queries

4.all of the mentioned


Question:
 The TTL field has value 10. How many routers (max) can process this datagram?

1.11

2. 5

3.10

4.1


Question:
 Which of the following is the broadcast address for a Class B network ID using the default subnetmask?

1.172.16.10.255

2.255.255.255.255

3.172.16.255.255

4.172.255.255.255


Question:
Dual-stack approach refers to _________

1. implementing Ipv4 with 2 stacks

2.implementing Ipv6 with 2 stacks

3.node has both IPv4 and IPv6 support

4.implementing a MAC address with 2 stacks


Question:
During debugging, we can use the ____________ program to find if a host is alive and responding.

1. traceroute

2.shell

3.ping

4.Java


Question:
During error reporting, ICMP always reports error messages to ________

1.Destination

2. Source

3.Next router

4. Previous router


Question:
First address in a block is used as network address that represents the ________

1. Class Network

2.Entity

3. Organization

4.Codes


Question:
Header size of the ICMP message is _________

1. 8-bytes

2.8-bits

3.16-bytes

4.16-bits


Question:
ICMP error message will not be generated for a datagram having a special address such as _______

1.127.0.0.0

2.12.1.2

3.11.1

4.127


Question:
If the value in protocol field is 17, the transport layer protocol used is _______

1.TCP

2.UDP

3.ICMP

4.IGMP


Question:
In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ________

1.10101111 10100011

2. 01010000 01011100

3.10101111 01011100

4. 01010000 10100011


Question:
In case of time exceeded error, when the datagram visits a router, the value of time to live field is ______

1.Remains constant

2.Decremented by 2

3. Incremented by 1

4. Decremented by 1


Question:
In classful addressing, a large part of available addresses are ________

1. Organized

2.Blocked

3. Wasted

4.Communicated


Question:
In classless addressing, there are no classes but addresses are still granted in ______

1. IPs

2. Blocks

3.Codes

4.Sizes


Question:
In process-to-process delivery, two processes communicate in which of the following methods?

1.Client/Server

2.Source/Destination

3.Message Transfer

4.Peer to Peer


Question:
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?

1.Fragmentation field

2.Fast-switching

3.ToS field

4.Option field


Question:
In transport layer, Multiplexing is done at _______

1.Channel

2.Receiver site

3.Sender site

4. Packet


Question:
In windows _____ can be used to trace the route of the packet from the source to the destination.

1.traceroute

2.tracert

3.ping

4.locater


Question:
IPv6 does not use _________ type of address.

1.broadcast

2.multicast

3. anycast

4. unicast


Question:
Multiple processes on destinations at transport layer are identified by _________

1. Mac address

2.Port number

3.Host number

4.Host address


Question:
Network addresses are a very important concept of ________

1.Routing

2.Mask

3.IP Addressing

4. Classless Addressing


Question:
Range of port numbers in Internet model is _______

1.0 and 32,765(8-bit)

2.0 and 32,765(16-bit)

3. 0 and 65,535(32-bit)

4.0 and 65,535(16-bit)


Question:
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________

1.Use dual-stack approach

2.Tunneling

3.No solution

4.Replace the system


Question:
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______

1.96 to 127

2.0 to 63

3.80 to 95

4.64 to 79


Question:
The combination of an IP address and port number is called as ________

1.Socket address

2. Port address

3.MAC address

4.Host address


Question:
The combination of _________ and __________ is often termed the local address of the local portion of the IP address.

1. Network number and host number

2. Network number and subnet number

3. Subnet number and host number

4. Host number


Question:
The data field cannot carry which of the following?

1.TCP segment

2.UDP segment

3.ICMP messages

4. SMTP messages


Question:
The header length of an IPv6 datagram is _______

1.10bytes

2.25bytes

3.30bytes

4.40bytes


Question:
The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as _______

1. Delivery of packets

2.Error correction

3. Multiplexing

4.Demultiplexing


Question:
The size of an IP address in IPv6 is ______

1.4 bytes

2.128 bits

3.8 bytes

4. 100 bits


Question:
The source-quench message in ICMP was designed to add a kind of _______ to the IP.

1.error control

2. flow control

3. router control

4.switch control


Question:
The _________ field determines the lifetime of IPv6 datagram

1.Hop limit

2. TTL

3.Next header

4.Type of traffic


Question:
Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.

1.Half-trip time

2.Round-trip time

3. Travel time for the next router

4.Time to reach the destination/source


Question:
What should be the flag value to indicate the last fragment?

1.0

2.1

3.TTl value

4. Protocol field value


Question:
When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____ message back to the source host that initiated the datagram.

1. Destination unreachable

2.Source quench

3.Router error

4. Time exceeded


Question:
Which among the following features is present in IPv6 but not in IPv4?

1.Fragmentation

2.Header checksum

3.Options

4.Anycast address


Question:
Which field helps to check rearrangement of the fragments?

1.offset

2.flag

3. ttl

4.identifer


Question:
Which layer is responsible for process-to-process delivery?

1.Physical layer

2.Network layer

3.Transport layer

4.application layer


Question:
Which of the following demerits does Fragmentation have?

1.complicates routers

2. open to DOS attack

3.overlapping of fragments.

4. All of the mentioned


Question:
Which of the following field in IPv4 datagram is not related to fragmentation?

1. Flags

2.Offset

3. TOS

4.Identifier


Question:
Which of the following is false with respect to Connectionless service of transport layer protocol?

1. Packets are not numbered

2.Packets are not delayed

3.No acknowledgement

4.Packet may arrive out of sequence


Question:
Which of these is not a type of error-reporting message?

1. Destination unreachable

2.Source quench

3.Router error

4. Time exceeded


Question:
Which of these is not applicable for IP protocol?

1. is connectionless

2.offer reliable service

3.offer unreliable service

4.does not offer error reporting


Question:
Which of this is not a class of IP address?

1.Class E

2.Class C

3.Class D

4. Class F


Question:
You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?

1.Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127

2.Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127

3. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255

4.Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255


Question:
_____ implies that all subnets obtained from the same subnet mask.

1. Static subnetting

2.Dynamic subnetting

3.Variable length subnetting

4. Dynamic length subnetting


Question:
______ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.

1.FDDI

2.FDDT

3.FDDR

4.FOTR


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!