This document provides 200+ computer networking multiple choice questions and answers to help freshers and experienced professionals prepare for networking exams. The questions cover topics like computer network protocols, networking devices, network layers, IP addressing, routing, and more. Sample questions are included for protocols like TCP, UDP, IP, ICMP, HTTP, and others as well as questions about network topologies, network devices like routers, switches and hubs, and network addressing schemes.
We are confident in the abilities of our 200-310 Exam we want you to feel confident as well dumps available for Designing for Cisco Internetwork Solutions visit@ https://www.troytec.com/200-310-exams.html
Module 5
Routing and Internetworking Address assignment for campus and enterprise
networks, Transmission/Stream data delivery to single and multiple
recipients. Logical addressing, Internet Protocol, Address mapping and Error reporting, Delivery and forwarding, Unicast and multicast routing protocol.
FPGA Implementation of LDPC Encoder for Terrestrial TelevisionAI Publications
The increasing data rates in digital television networks increase the demands on data capacity of the current transmission channels. Through new standards, the capacity of existing channels is increased with new methods of error correction coding and modulation. In this work, Low Density Parity Check (LDPC) codes are implemented for their error correcting capability. LDPC is a linear error correcting code. These linear error correcting codes are used for transmitting a message over a noisy transmission channel. LDPC codes are finding increasing use in applications requiring reliable and highly efficient information transfer over noisy channels. These codes are capable of performing near to Shannon limit performance and have low decoding complexity. LDPC uses parity check matrix for its encoding and decoding purpose. The main advantage of the parity check matrix is that it helps in detecting and correcting errors which is a very important advantage against noisy channels. This work presents the design and implementation of a LDPC encoder for transmission of digital terrestrial television according to the Chinese DTMB standard. The system is written in Verilog and is implemented on FPGA. The whole work is then verified with the help of Matlab modelling.
We are confident in the abilities of our 200-310 Exam we want you to feel confident as well dumps available for Designing for Cisco Internetwork Solutions visit@ https://www.troytec.com/200-310-exams.html
Module 5
Routing and Internetworking Address assignment for campus and enterprise
networks, Transmission/Stream data delivery to single and multiple
recipients. Logical addressing, Internet Protocol, Address mapping and Error reporting, Delivery and forwarding, Unicast and multicast routing protocol.
FPGA Implementation of LDPC Encoder for Terrestrial TelevisionAI Publications
The increasing data rates in digital television networks increase the demands on data capacity of the current transmission channels. Through new standards, the capacity of existing channels is increased with new methods of error correction coding and modulation. In this work, Low Density Parity Check (LDPC) codes are implemented for their error correcting capability. LDPC is a linear error correcting code. These linear error correcting codes are used for transmitting a message over a noisy transmission channel. LDPC codes are finding increasing use in applications requiring reliable and highly efficient information transfer over noisy channels. These codes are capable of performing near to Shannon limit performance and have low decoding complexity. LDPC uses parity check matrix for its encoding and decoding purpose. The main advantage of the parity check matrix is that it helps in detecting and correcting errors which is a very important advantage against noisy channels. This work presents the design and implementation of a LDPC encoder for transmission of digital terrestrial television according to the Chinese DTMB standard. The system is written in Verilog and is implemented on FPGA. The whole work is then verified with the help of Matlab modelling.
H.264/AVCis currently the most widely adopted video coding standard due to its high compression capability and flexibility. However, compressed videos are highly vulnerable to channel errors which may result in severe quality degradation of a video. This paper presentsa concealment aware Unequal Error Protection (UEP) scheme for H.264 video compression using Reed Solomon (RS) codes. The proposed UEP technique assigns a code rate to each Macroblock (MB) based on the type of concealment and a Concealment Dependent Index (CDI). Two interleaving techniques, namely Frame Level Interleaving (FLI) and Group Level Interleaving (GLI) have also been employed. Finally, prioritised concealment is applied in cases where error correction is beyond the capability of the RS decoder. Simulation results have demonstrated that the proposed framework provides an average gain of 2.96 dB over a scheme that used Equal Error Protection (EEP).
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
This is an overview of the kinds of Bit Error Rates (BER) you can expect when using particular error correction techniques over a nominal satellite communications link. A more extensive paper on the subject is available upon request.
Forward Bit Error Correction - Wireless Communications Surya Chandra
As a part of my final project for wireless communications, I created a Matlab simulation for correcting the corrupted data bits (due to noise) at the receiver end using coding techniques, such as, redundancy check, hamming (7,4) code, interleaving and convolutional coding.
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...IJCI JOURNAL
Fixed Broadband Wireless Access is a promising technology which can offer high speed data rate from transmitting end to customer end which can offer high speed text, voice, and video data. IEEE 802.16 WirelessMAN is a standard that specifies medium access control layer and a set of PHY layer to fixed and mobile BWA in broad range of frequencies and it supports equipment manufacturers due to its robust performance in multipath environment. Consequently WiMAX forum has adopted this version to develop the network world wide. In this paper the performance of IEEE 802.16 OFDM PHY Layer has been investigated by using the simulation model in Matlab. The Stanford University Interim (SUI) channel models are selected for the performance evaluation of this standard. The Ideal Channel estimation is considered in this work and the performance evaluation is observed in the basis of BER.
H.264/AVCis currently the most widely adopted video coding standard due to its high compression capability and flexibility. However, compressed videos are highly vulnerable to channel errors which may result in severe quality degradation of a video. This paper presentsa concealment aware Unequal Error Protection (UEP) scheme for H.264 video compression using Reed Solomon (RS) codes. The proposed UEP technique assigns a code rate to each Macroblock (MB) based on the type of concealment and a Concealment Dependent Index (CDI). Two interleaving techniques, namely Frame Level Interleaving (FLI) and Group Level Interleaving (GLI) have also been employed. Finally, prioritised concealment is applied in cases where error correction is beyond the capability of the RS decoder. Simulation results have demonstrated that the proposed framework provides an average gain of 2.96 dB over a scheme that used Equal Error Protection (EEP).
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
This is an overview of the kinds of Bit Error Rates (BER) you can expect when using particular error correction techniques over a nominal satellite communications link. A more extensive paper on the subject is available upon request.
Forward Bit Error Correction - Wireless Communications Surya Chandra
As a part of my final project for wireless communications, I created a Matlab simulation for correcting the corrupted data bits (due to noise) at the receiver end using coding techniques, such as, redundancy check, hamming (7,4) code, interleaving and convolutional coding.
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...IJCI JOURNAL
Fixed Broadband Wireless Access is a promising technology which can offer high speed data rate from transmitting end to customer end which can offer high speed text, voice, and video data. IEEE 802.16 WirelessMAN is a standard that specifies medium access control layer and a set of PHY layer to fixed and mobile BWA in broad range of frequencies and it supports equipment manufacturers due to its robust performance in multipath environment. Consequently WiMAX forum has adopted this version to develop the network world wide. In this paper the performance of IEEE 802.16 OFDM PHY Layer has been investigated by using the simulation model in Matlab. The Stanford University Interim (SUI) channel models are selected for the performance evaluation of this standard. The Ideal Channel estimation is considered in this work and the performance evaluation is observed in the basis of BER.
Computer Networks Multiple Choice Questions (MCQs) cover a wide range of topics related to the fundamental principles, protocols, and technologies that govern the communication and connectivity of computer systems. These questions are designed to test the knowledge and understanding of individuals in the field of computer networking. Below is a description outlining the common themes covered by MCQs in this domain:
Network Basics:
MCQs may assess the understanding of basic networking concepts such as nodes, links, topology, and communication models.
Questions might cover the differences between local area networks (LANs) and wide area networks (WANs), as well as their applications.
Protocols and Standards:
Questions often focus on network protocols, such as TCP/IP, HTTP, FTP, and their roles in data transmission.
Familiarity with networking standards and organizations like the IEEE and the Internet Engineering Task Force (IETF) is commonly tested.
Networking Devices:
MCQs may inquire about the functionality of networking devices like routers, switches, hubs, and their roles in network infrastructure.
Understanding the purpose and operation of devices like modems and gateways may also be examined.
IP Addressing and Subnetting:
Questions might cover topics related to IP addressing, subnetting, and the differences between IPv4 and IPv6.
Subnet masks, network classes, and CIDR notation could be focal points in these questions.
Data Link Layer and Switching:
Understanding the data link layer and its protocols (e.g., Ethernet) is often tested.
Questions may address concepts related to MAC addresses, switching techniques, and VLANs (Virtual Local Area Networks).
Routing and Routing Protocols:
Questions may assess knowledge of routing algorithms and protocols such as RIP, OSPF, and BGP.
Understanding the routing table, routing metrics, and the role of routers in forwarding data is essential.
Wireless Networking:
Topics related to wireless communication standards (e.g., Wi-Fi), security protocols, and frequency bands may be covered.
Questions might address challenges and solutions in wireless networking environments.
Network Security:
MCQs may focus on security protocols, firewalls, encryption, and authentication mechanisms.
Understanding common security threats and countermeasures is typically part of these questions.
Network Management and Troubleshooting:
Questions may assess knowledge of network management protocols (e.g., SNMP) and troubleshooting techniques.
Understanding tools for monitoring, diagnosing, and resolving network issues is crucial.
Emerging Technologies:
Some MCQs may explore contemporary topics such as cloud computing, virtualization, and the Internet of Things (IoT) in the context of networking.
Unlock Success with Authentic Cisco CCNA 200-301 PDF Exam Dumpseducation
In your quest to conquer the Cisco CCNA 200-301 exam, authenticity is key. Accessing genuine and reliable study materials can make all the difference in your preparation journey. With our authentic Cisco CCNA 200-301 PDF exam dumps, you gain access to comprehensive resources designed to equip you with the knowledge and confidence needed to ace the exam. Our meticulously curated materials cover the breadth and depth of CCNA topics, ensuring that you are well-prepared to tackle the challenges of the certification exam head-on. Say goodbye to uncertainty and embrace the assurance of authenticity with our Cisco CCNA 200-301 PDF exam dumps.
H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Quest...PassquestionExamTrai
With the latest H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Questions from PassQuestion, you will have access to a wealth of valuable information covering all the essential exam topics, giving you the best possible chance of achieving a successful result.
Here you can find 1000's of Multiple Choice Questions(MCQs) of Computer Networks includes the MCQs of basic network theory with network definition, network models, connectivity and network addressing, introducton to OSI and TCP/IP network reference models, Layers of TCP/IP and OSI model with physical layer, data link layer, network layer, transport layer, session layer and application layer along with internet protocol, ICMP, ARP and Bootstrap protocol, types of routing protocol, Routing Information Protocol(RIP), Open Shortest Path First(OSPF), Border Gateway Protocol(BGP), User Datagram Protocol(UDP), File Transfer Protocol(FTP), Simple Mail Transfer Protocol(SMTP), Hyper Text Transfer Protocol(HTTP) and IPV6 addressing methods and also of Network security and Internet security.
Get actual exam material for ADVDESIGN exam. With the help of valid study dumps you can easily get prepared for your exam
Visit us: @ https://www.examarea.com/352-001-exams.html and pass 352-001 test with best grades
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.docssuserf63bd7
https://qidiantiku.com/solution-manual-for-guide-to-networking-essentials-8th-edition-by-greg-tomsho.shtml
name:Solution manual for Guide to Networking Essentials 8th Edition by Greg Tomsho
Edition:8th Edition
author:by Greg Tomsho
ISBN:ISBN: 9780357693919
type:solution manual
format:word/zip
All chapter include
Focusing on troubleshooting and computer networking technologies, it provides a comprehensive introduction to network protocols and network devices, including wireless and cybersecurity technologies.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
guildmasters guide to ravnica Dungeons & Dragons 5...
200+ [updated] computer networking mc qs and answers 2020
1. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 1/14
Home » NETWORKING Objective Questions » 200+ [UPDATED]
Computer Networking MCQs and Answers
200+ [UPDATED] Computer
Networking MCQs and Answers
Computer Networking multiple choice questions and answers PDF
for freshers and experienced
Computer Networking Objective Questions and Answers
1. What is the other types of OLAP apart from ROLAP?
A. HOLAP
B. MOLAP
C. DOLAP
D. Both a and b above
2. A network router joins two _________ together?
A. Computers
Search
Here for
Skill
Search...
HOME Interview Questions MCQs *LAB VIVA CLASS NOTES SEMINAR TOPICS
ONLINE TEST GATE CAT Internship ABOUT US Privacy Policy
7 recruiting metrics
Learn the 7 recruiting metrics with the power to transfo
TestGorilla
2. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 2/14
B. Switches
C. Networks
D. Gateway
3. Message Oriented Middleware allows general purpose
messages to be exchanged in a Client/Server system using
message queues.
A. True
B. False
4. Which of the following below is a loop back IP address?
A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
5. Ping command works on which protocol?
A. ICMP
B. TCP
C. IP
D. UDP
6. Transport layer of OSI model lies between Network and
___________ layer
A. Application
B. Data link
C. Session
D. Presentation
7. Which of the following protocols below work in
application layer?
A. POP
B. PPP
C. FTP
D. Both a and d above
8. What is the port number for HTTP?
A. 25
B. 80
3. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 3/14
C. 21
D. 65
9. IP4 is more commonly used than IPv6?
A. True
B. False
10. From the options below, which suits best for MODEM?
A. a device that modulates an analog carrier signal to encode digital
information
B. a device that modulates a digital carrier signal to encode analog
information
C. a device that modulates an analog carrier signal to decode digital
information
D. a device that modulates a digital carrier signal to decode analog
information
11. What is the size of an IP address?
A. 64 bit
B. 128 bit
C. 16 bit
D. 32 bit
12. MAC addresses are also known as?
A. Hardware address
B. Physical address
Made-in-China.com Products
Made-in-China.com
4. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 4/14
C. both A and B above
D. IP address
Ans: C
13. A network point that provides entrance into another
network is called as ___________
A. Node
B. Gateway
C. Switch
D. Router
Ans: B
14. UDP is an unreliabe protocol.
A. True
B. False
Ans: A
15. A stream socket provides _________ communications
between a client and server
A. One way
B. Two way
Ans: B
16. Token Ring is a data link technology for ?
A. WAN
B. MAN
C. LAN
D. both a and b above
Ans: C
17. Which of the following protocol below are suited for
email retrieval?
A. POP3
B. IMAP
C. FTP
D. Both a and b above
Ans: D
5. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 5/14
18. TELNET used _________ protocol for data connection
A. TCP
B. UDP
C. IP
D. DHCP
Ans: A
19. 10Base5, 10Base2, 10BaseT are types of?
A. Internet
B. LAN
C. Ethernet
D. Cables
Ans: C
20. The process of assigning IP address for specific times
to the various hosts by DHCP is called as?
A. Lend
B. sublease
C. let
D. Lease
Ans: D
21. What is the full form of URL?
A. Uniform routing locator
B. Uniform Resource locator
C. Universal Resource locator
D. Uniform router locator
Ans: B
22. __________ is a standard suite of protocols used for
packet switching across computer networks.
A. x.22
B. x.23
C. x.25
D. x.26
Ans: C
23. What is the full form of CAN?
A. Campus Area Network
6. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 6/14
B. Cluster Area Network
C. Control Area network
D. both A and B
Ans: D
24. Which of the following below is/are capability of ICMP
protocol?
A. Report package count
B. Report network congestion
C. Both b and d
D. Report availability of remote hosts
Ans: C
25. ARP works on Ethernet networks.
A. False
B. True
Ans: B
26. _______ assigns a unique number to each IP network
adapter called the MAC address.
A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Both B and C above
Ans: A
27. Piconets in blue tooth a minimum of two and a
maximum of ____________ Bluetooth peer devices.
A. five
B. eight
C. nine
D. four
Ans: B
28. Dynamic addressing doesn’t allow many devices to
share limited address space on a network
A. True
B. False
Ans: B
7. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 7/14
29. NAT stands for _____ .
A. network address transformer
B. network address translator
C. network address translation
D. Both B and C above
Ans: C
30. Which of the following is true for secure shell
tunneling?
A. To set up an SSH tunnel, one configures an SSH client to forward a
specified local port
B. SSH tunnels provide a means to not bypass firewalls
C. All SSH clients support dynamic port forwarding
D. Both A and B
Ans: A
31. Which of the following below are secure VPN
protocols?
A. UDP
B. TCP
C. SSTP
D. Both B and C
Ans: D
32. What is the difference between a switch and a hub?
A. Switches operate at physical layer while hubs operate at data link
layer
B. Switches operate at data link layer while hubs operate at transport
layer
C. Switches operate at data link layer while hubs operate at physical
layer
D. Switches operate at transport layer while hubs operate at physical
layer
Ans: C
33. When computers in a network listen and receive the
signal, it is termed as active toplogy
A. True
8. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 8/14
B. False
Ans: A
34. In 10base2, 10base5, what does 2 and 5 stand for?
A. Speed in mbps
B. Number of segments
C. Length of segment
D. Size of segment
Ans: B
35. ______is added to data packet for error detection.
A. checksum bit
B. error bit
C. parity bit
Ans: C
36. ALL IP addresses are divided into network address and
host address
A. True
B. False
Ans: A
37. How can we examine the current routing tables in
command prompt?
A. using routestart
B. using netstart
C. using netstat
D. either a or b
Ans: C
38. Both ping and tracert are used to find If the computer
is in network.
A. True
B. False
Ans: B
39. What is the difference between ring and bus topology?
A. In Ring all nodes are connected with another in a loop while in bus
they are connected to a central cable
9. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 9/14
B. In Ring all nodes are connected with another loop while in bus
they are connected to a central cable
C. In bus all nodes are connected with another in a loop while in star
they are connected to a central node
D. In Bus all nodes are connected with another loop while in star they
are connected to a central cable
Ans: A
40. MAC addressing works in data link layer while IP
addressing works in network layer.
A. True
B. False
Ans: A
41. A packet whose destination is outside the local TCP/IP
network segment is sent to the ____ .
A. File server
B. Default gateway
C. DNS server
D. DHCP server
Ans: B
42. Why was the OSI model developed?
A. manufacturers disliked the TCP/IP protocol suite
B. the rate of data transfer was increasing exponentially
C. standards were needed to allow any two systems to communicate
D. none of the above
Ans: C
43. Which piece of information is not vital for a computer
in a TCP/IP network?
A. IP address
B. Default gateway
C. Subnet Mask
D. DNS server
Ans: D
44. The physical layer is concerned with the movement of
_______ over the physical medium.
10. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 10/14
A. programs
B. dialogs
C. protocols
D. Bits
Ans: D
45. Which protocol below operates at the network layer in
the OSI model?
A. IP
B. ICMP
C. RARP
D. All of the above
Ans: D
46. In the OSI model, as a data packet moves from the
lower to the upper layers, headers are _______.
A. added
B. removed
C. rearranged
D. Modified
Ans: B
47. Session layer of the OSI model provides
A. Data representation
B. Dialog control
C. Remote job execution
D. Creating logical connections
Ans: B
48. IPv6 has _______ -bit addresses.
A. 32
B. 64
C. 128
D. Variable
Ans: C
49. Which one of the following functionalities isn’t
provided by TCP?
A. Flow control
11. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 11/14
B. Addressing
C. Retransmission of packets as required
D. Proper sequencing of the packets
Ans: B
50. Which of the following can be an Ethernet physical
address?
A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. none of the above
Ans: C
51. An IP address contains________ bits ?
A. 8
B. 16
C. 32
D. 64
Ans: C
52. Which routing protocol below is used by exterior
routers between the autonomous systems?
A. RIP
B. IGRP
C. OSPF
D. BGP
Ans: D
53. Which of the IP headers decides when the packet
should be discarded?
A. Fragment control
B. TTL
C. Checksum
D. Header length
Ans: B
54. Which IP address is reserved for software loop-back?
A. 224.x.x.x
B. 127.x.x.x
12. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 12/14
C. 0.0.0.0
D. 255.255.255.255
Ans: B
55. What is the network ID for a computer whose IP
address is 190.148.64.23?
A. 190
B. 190.148
C. 190.148.64
D. None of the above
Ans: B
56. Which port is reserved for use of the SMTP protocol?
A. 21
B. 23
C. 25
D. 53
Ans: C
57. Which one of the folowings is a connectionless
protocol?
A. UDP
B. Ethernet
C. IPX
D. All of the above
Ans: D
58. Which application below uses the UDP protocol?
A. DNS
B. TFTP
C. RIP
D. All of the above
Ans: C
59. Howmany IP addresses can be assigned to hosts in a C-
class networksegment with a subnet mask of
255.255.255.192?
A. 62
B. 126
13. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 13/14
C. 192
D. 254
Ans: A
60. Which of the folowings is not a direct implication of
subnet masks in TCP/IP networks?
A. Reduce network traffic
B. Increase network security
C. Assignment of more IP addresses
D. Better network management
Ans: C
14. 12/4/2020 200+ [UPDATED] Computer Networking MCQs and Answers 2020
https://engineeringinterviewquestions.com/networking-mcqs/ 14/14
Search...
Copyright 2020 , Engineering Interview Questions.com , Theme by Engineering|| Privacy Policy|| Terms and Conditions||
ABOUT US|| Contact US||
Engineering interview questions,Mcqs,Objective Questions,Class Lecture Notes,Seminor topics,Lab Viva Pdf PPT Doc Book
free download. Most Asked Technical Basic CIVIL | Mechanical | CSE | EEE | ECE | IT | Chemical | Medical MBBS Jobs
Online Quiz Tests for Freshers Experienced.