01. IP stands for
a. Internet Programmes
b. Internet Protocol
c. All of the above
d. None of the above.
Answer -b
02. The attaching the header to the received information, received from the higher layer before handing over to the next lower layer is called
a. Encryption
b. Encoding
c. encapsulation
d. None of the above.
Answer -b
03. No.of layers in TCP layers are
a. 4
b.2
c.2
d.7
Answer -a
04. In TCP layer, the application layer refers to
a. Higher level protocols
b. Lower level protocols
c. a & b
d. None
Answer -a
05. From the following which one is an example for application layer?
a. FTP
b. HTTP
c. a &b
d. None
Answer -a
06. SMTP is an example for
a. Transport layer
b. application layer
c. a & b
d. None
Answer -b
07. FTP stands for
a. File Transmission Protocol
b. File Transfer Protocol
c. File Transmission Programme
d. File Transfer Programme
Answer -a
08. SMTP stands for
a. Single Mail Transfer Protocol
b. Simple Main Transfer Protocol
c. a 7 b
d. None
Answer -b
09. TCP stands for
a. Transfer Control Protocol
b. Transmission Common Protocol
c. Transfer common Protocol
d. Transmission Control Protocol
Answer -d
10. UDP stands for
a. User Defined Protocol
b. User Datagram Protocol
c. A & b
d. None
Answer -b
11. …………………… layer is responsible for connecting two machines through internet
a. Internet layer
b. Application layer
c. a &b
d. None
Answer -a
12. Integrity of packets is guaranteed in ……………
a. IPV6
b.IPV4
c. IPV3
d. None
Answer -b
13. Integrity of packets is guaranteed through
a. IPV4
b. IPV6
c. checksum
d. None
Answer -c
14. IN IPV4, range of values is
a. 0 to 12
b. 0 to 15
c. a & b
d. None
Answer -b
15. The value used by IP in IPV4 is
a. 4
b.5
c. a&b
d. None
Answer -a
16. TTL stands for
a. Transmission Test Live
b. Time To Live
c. a & b
d. none
Answer -b
17. In IPV4, total length is
a. 16 Bytes filed
b. 16 Bit field
c. 32 bit field
d. None
Answer -b
18. In IPV4, the identification is
a. 16 Bytes field
b. 16 bit field
c. a & b
d. None
Answer -b
19. In IPV4, TTL lengths is
a. 8 byte field
b. 8 bit field
c. a & b
d. None
Answer -c
20. The current recommended default TTL for the IP is
a. 64
b. 32
c. a & b
d. None
Answer -a
21. In IPV4,protocol is
a. 8 field
b.16 field
c. 32 field
d. 16 Bit field
Answer -a
22. ……………field is used to identify the next higher layer protocol using the IP.
a. Protocol
b. TCP
c. a &b
d. None
Answer -a
23. In Protocol field, the value of TCP is
a. Equal to 6
b. equal to 17
c. a & b
d. None
Answer -a
24. The value of UDP in protocol field is
a. Equal to 6
b. equal to 17
c. a & b
d. None
Answer -b
25. In IPV4, checksum filed length is
a. 16 byte field
b. 16 bit field
c. a & b
d. None
Answer -b
26. In IPV4, the source address field lengths is
a. 32 byte field
b. 32 bit field
c. a & b
d. None
Answer -b
27. The source address field contains the following;
a. Network identifier
b. Host identifier
c. a & b
d. None
Answer -b
28. The protocol field is used to identify
a. The next higher layer protocol using the IP.
b. The next lower layer protocol using the IP.
c. a & b
d. None
Answer -
29. The length of destination address is
a. 16 byte field
b. 16 bit field
c. 32 bit field
d. 32 byte filed
Answer -c
30. The selection by the IP of either UDP or TCP is based on the
a. Protocol number in the IP header
b. Protocol number in the TCP header
c. a & b
d. None
Answer -a
31. The source port number is a
a. 16 bit field
b. 16 byte field
c. 32 bit field
d. 32 byte field
Answer -a
32. The destination port number is a
a. 16 bit field
b. 16 byte field
c. 32 bit field
d. 32 byte field
Answer -a
33. The port number for the UDP echo server is
a. 7
b. 8
c. 69
d. None
Answer -a
34. The Port number for TFTP is
a. 7
b.8
c.69
d. None
Answer -c
35. TFTP stands for
a. Trival File Transmission Protocol
b. Trival File Transfer Protocol
c. a & b
d. None
Answer -b
36. The UDP message length field is a
a. 16 byte field
b. 16 bit field
c. 32 bit field
d. 32 byte field
Answer -b
37. The UDP message length field contains in the count of the total number of ……………….in the user datagram.
a. Octets
b. ones
c. binary
d. None
Answer -a
38. The minimum size length field of UDP message is
a. 8
b. 8 bit field
c. a & b
d. None
Answer -a
39. UDP checksum field must be set to…………..when not used
a. Zero
b. one
c. a &b
d. None
Answer -a
40. Which one is providing traditional circuit oriented data communications service to programmes?
a. UDP
b.TCP
c. a & b
d. None
Answer -b
41. Which of the following is connection oriented?
a. UDP
b. TCP
c. a & b
d. None
Answer -b
42. Which of the following is connection less oriented?
a. UDP
b.TCP
c. a & b
d. None
Answer -a
43. The sequence numbers in the TCP header is
a. 32 bytes
b. 32 bits
c. a & b
d. None
Answer -b
44. The sequence numbers in the TCP header for first time randomly generated by
a. System integrator
b. system
c. a & b
d. None
Answer -b
45. SN stands for
a. Signal to Noise
b. Sequence Number
c. Servicing number
d. None
Answer -b
46. The second sequence number is called
a. Expected Receive Sequence Number
b. Excepted Receive Sequence Number
c. Expected Remote Sequence Number
d. Excepted Remote Sequence Number
Answer -a
47. ERSN stands for
a. Expected Receive Sequence Number
b. Excepted Receive Sequence Number
c. Expected Remote Sequence Number
d. Excepted Remote Sequence Number
Answer -a
48. SSN stands for
a. Secondary Switching Number
b. Second Sequence Number
c. A 7 b
d. None
Answer -b
49. Second Sequence Number is also called as
a. Acknowledgement Number
b. Addressed Number
c. Access Number
d. None
Answer -a
50. AKN stands for
a. Acknowledgement Number
b. Addressed Number
c. Access number
d. None
Answer -a
51. The AKN is a
a. 32 bit field
b. 32 byte field
c. 16 bit field
d. 16 byte field
Answer -a
52. In TCP header length is a
a. 4 bit field
b. 4 byte field
c. 16 bit field
d. 16 byte field
Answer -a
53. In TCP, the window field is a
a. 16 bit field
b. 4 bit field
c. 16 byte field
d.4 bit field
Answer -a
54. ICMP stands for
a. Internet Common Message Protocol
b. Internet Control Message Protocol
c. Internet Consumer Message Protocol
d. Internet Consumer Meeting Protocol
Answer -b
55. ……………is used to report the error message back to the source.
a. ICMP
b.IMCP
c.IGMP
d. IPMC
Answer -a
56. From the following which is the correct statement?
a. FTP &SMTP are an example of application layer.
b. FTP & SMTP are an example of Transport layer.
c. FTP & SMTP are an example of Internet layer
d. FTP & SMTP are an example of Link layer.
Answer -a
57. The selection by the IP of……………………….. is based on the Protocol number in the IP header.
a. UDP
b. TCP
c. UDP or TCP
d. None
Answer -c
58. 16 bit field is the port number of
a. Source
b. destination
c. a & b
d. None
Answer -c
59. The port number 7 is for
a. UDP echo server
b. TCP
c. a& b
d.TFTP
Answer -a
60. 69 is the port number for
a. UDP echo server
b.TCP
c. a & b
d. TFTP
Answer -d
61. The -----------message length field contains a count of the total number of octets in the user datagram.
a. UDP
b. TCP
c. TFTP
d. None
Answer -a
62. …………………checksum field must be set to zero when not used.
a. UDP
c. TCP
c. TFTP
d. None
Answer -a
63. ………….provides traditional circuit oriented data communications service to programs.
a. TCP
b.UDP
c.TFTP
d. None
Answer -a
64. ………….in the TCP header is 32 bits long
a. SN
b.SSM
c.AKN
d. ERSN
Answer -a
65. The ICMP is used to report
a. The error message back to the source.
b. The receipt of the message back to the source.
c. The error correction message back to the source.
d. None
Answer -a
66. ………….is the process of managing the rate of data transmission between two nodes to prevent a fast sender from out running a slow receiver.
a. Flow control
b. flow chart
c. a & b
d. None
Answer -a
67. To prevent…………the IP datagram contains a time to live that is set by the originator.
a. Routing protocol
b. routing loops
c. routing table
d. None
Answer -b
68. IGMP stands for
a. Internet Group Management Protocol
b. Internet Group Message Protocol
c. Internet Group Membership Protocol
d. None
Answer -a
69. …………… is a communications proposal used to manage the membership of internet protocol multicast group.
a. IGMP
b. ICMP
c. a & b
d. None
Answer -a
70. Each host on the internet is assigned a 32 bit integer address called its
a. Internet Address
b. IP address
c. a &b
d. None
Answer -c
71. Every IP address consists of ………….pairs
a. One
b. two
c. three
d. None
Answer -b
72. The IP address consists of
a. One identifying network
b. One identifying the host
c. a & b
c. None
Answer -c
73. IP address is referred to as the
a. Dotted decimal notation
b. Dotted decamical notation
c. a & b
d. None
Answer -a
74. Type of class of IP address are
a. One
b. two
c. 5
d. none
Answer -c
75. Class D IP address reserved for
a. IP multicasting
b. future use
c. Private IP
d. Public IP
Answer -a
76. Class E IP address reserved for
a. IP Multicasting
b. future use
c. Private IP
d. Public IP
Answer -b
77. Address beginning with…………….. are reserved for future use
a. 1010
b.1111
c.1110
d.a & b
Answer -b
78. Determine the class of IP address is by
a. Examining the first 4 bits of the IP address
b. Examining the first 5 bits of the IP address
c. a & b
d. None
Answer -a
79. Class A addresses begin with
a. 0XXX or 1 to 126 decimal
b. 10XX or 128 to 191 decimal
c. 110X or 192 to 223 decimal
d. 1110 or 224 to 239 decimal
Answer -a
80. Class B addresses begin with
a. 0XXX or 1 to 126 decimal
b. 10XX or 128 to 191 decimal
c. 110X or 192 to 223 decimal
d. 1110 or 224 to 239 decimal
Answer -b
81. Class C addresses begin with
a. 0XXX or 1 to 126 decimal
b. 10XX or 128 to 191 decimal
c. 110X or 192 to 223 decimal
d. 1110 or 224 to 239 decimal
Answer -c
82. Class D addresses begin with
a. 0XXX or 1 to 126 decimal
b. 10XX or 128 to 191 decimal
c. 110X or 192 to 223 decimal
d. 1110 or 224 to 239 decimal
Answer -d
83. Class E addresses begin with
a. 0XXX or 1 to 126 decimal
b. 10XX or 128 to 191 decimal
c. 110X or 192 to 223 decimal
d. 1111 or 240 to 254 decimal
Answer -d
84. Addresses beginning with 01111111 or 127 decimal are reserved for
a. Loop back
b. future use
c. a & b
d. None
Answer -a
85. IP address for internal testing on a local machine is
a. 127.0.0.1
b. 127,0,0,1
c. a & b
d. None
Answer -a
86. In class A which part of IP address belongs to the network ?
a. NNNNNNNN
b. NNNNHHHH
c.NHNHNHNH
d. None
Answer -a
87. In class A which part of IP address belongs to the host?
a. NNNNNNNN
b. b.HHHHHHHH
c. HHHHHHHH.HHHHHHHH.
d. None
Answer -c
88. In class B which part of IP address belongs to the network?
a. NNNNNNNN
b. NNNNNNNN.NNNNNNNN.
c. NNNNNNNN.NNNNNNNN.NNNNNNNN.
d. None
Answer -b
89. In class B which part of IP address belongs to the host?
a. HHHHHHHH.
b. HHHHHHHH.HHHHHHHH
c. NNNNNNNN.NNNNNNNN.NNNNNNNN.
d. None
Answer -b
90. In class C which part of IP address belongs to the network?
a. NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH.
b. NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
c. NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
d. None
Answer -c
91. In class C which part of IP address belongs to the host?
a. NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
b. NNNNNNNN.NNNNNNNN.HHHHHHHH.NNNNNNNN
c. NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
d. None
Answer -a
92. Tick the IP address reserved for Private Network?
a. 10.0.0.0/8
b. 11.0.0.0/8
c. 10.0.0.0/32
d. 10.0.0.0/16
Answer -a
93. Tick the IP address reserved for Private Network?
a. 172.16.0.0/12
b. 172.16.0.0/16
c. 172.16.0.0/8
d. 172.16.0.0/32
Answer -a
94. Tick the IP address reserved for Private Netowrk?
a. 192.168.0.0/8
b. 192.168.0.0/16
c. 192.168.0.0/32
d. None
Answer -b
95. Reasons for subneting an IP network is
a. Use of different physical media
b. Preservation of address space
c. Security & to control the network traffic.
d.All the above
Answer -d
96. The most common reason for using subneting is
a. To control network traffic
b. To control speed of the bandwidth
c. a&b
d. None
Answer -a
97. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the
a. Network Address or Number
b. Network element c. a&b
d. None
Answer -a
98. In the subnet masking the network bits are represented by the
a. “0” s in the mask
b. “1” in the mask
c. a&b
d. None
Answer -b
99. In the subnet masking the host bits are represented by the
a. “0” s in the mask
b. “1” in the mask
c. a&b
d. None
Answer -a
100. The reason for using IPV6
a. Rapid exhaustion of IPV4 address space
b. Fulfill the future need of IP address
c. a&b
d. None
Answer -c
101. In IPV6,the address size was increased from
a. 32 to 126 bits
b. 32 bits to 128 bits
c.a&b
d. None
Answer -b
102. In IPV6 the address size is
a. 16 octets
b. 32 octets
c. a&b
d.None
Answer -a
103. The next generation of the internet protocol is
a. IPV4
b.IPV6
c.a&b
d.None
Answer -b
104. The replacement of IPV4 to IPV6 is aimed in the year
a. 1994
b.2000
c.1995
d.2010
Answer -c
105. VOIP stands for
a. Voice Over Internet Protocol
b. Value Over Internet Protocol
c. a&b
d.None
Answer -a
106. The function of physical layer is
a. Binary transmission
b. Access to media
c. Address and Best path
d. End to end connections.
Answer -a
107. The function of Data Link layer is
a. Binary transmission
b. Access to media
c. Address and Best path
d. End to end connections
Answer -b
108. The function of Network layer is
a. Binary transmission
b. b. Access to media
c. c.Address and Best path
d. End to end connections
Answer -c
109. The function of Transport Layer is
a. Binary transmission
b. b. Access to media
c. c.Address and Best path
d. End to end connections
Answer -d
110. The function of Session layer is
a. Internet communication
b. Data presentation
c. Network process to application
d. None
Answer -a
111. The function of presentation layer is
a. Inter host communication
b. Data presentation
c. Network process to application
d. None
Answer -b
112. The function of application layer is
a. Internet communication
b. Data presentation
c. Network process to application
d. None
Answer -c
113. In TCP/IP model total no.of layers are
a. 5
b.7
c. a&b
d.None
Answer -a
114. Flow control is the process of
a. Managing the rate of data transmission between two nodes to prevent a fast sender from out running a slow receiver.
b. Managing the network elements
c. a&b
d.None
Answer -a
115. To prevent routing loops, the IP datagram contains a
a. TTL
b. FTP
c. Routing table
d. None
Answer -a
116. IGMP is a communication protocol used to manage
a. The membership of internet protocol multicast group
b. Run the routing table
c.a&b
d.None
Answer -a
117. To prevent routing loops, the --------------contains a time to live that is set by a Originator.
a. IP datagram
b.UDP
c.TCP/IP
d. None
Answer -a
118. Class D IP address reserved for
a. IP Multicasting
b. future use
c. a & b
d. None
Answer -a
119. Class E IP address reserved for
a. IP Multicasting
b. future use
c. a&b
d. None
Answer -b
120. 0xxx or 1 to 126 decimal IP address belongs to
a. Class A address
b. class b address
c. class c address
d. None
Answer -a
121. 10xx or 128 to 191 decimal address belongs to
a. Class A address
b. class b address
c. Class c address
d. None
Answer -b
122. 110x, or 192 to 223 decimal IP address belongs to
a. Class A address
b. class c
d. Class E
d. None
Answer -b
123. 1110 or 224 to 239 decimal IP address belongs to
a. Class A
b. Class c
c. class D
d. class E
Answer -c
124. 1111 or 240 to 254 decimal IP address belongs to
a. Class A
b. Class E
c. class D
d. Class E
Answer -d
125. 01111111 or 127 decimal are reserved for
a. Loop back
b. Internal testing
c. a & b
d. None
Answer -a
126. 127.0.0.1 IP address belongs to
a. Loop back
b. Internal testing
c. a & b
d. None
Answer -b
127. 10.0.0.0/8 IP address belongs to
a. Public network
b. Private network
c. a & b
d. None
Answer -b
128. 172.16.0.0/12 IP address belongs to
a. Public network
b. Private network
c. a & b
d. None
Answer -b
129. 192.168.0.0/16 IP address belongs to
a. Public network
b. Private network
c. a&b
d. None
Answer -b
130. State which statement is correct.:
a. In the subnet masking, the network bits are represented by the 1s in host bits and 0s in the mask
b. In the subnet masking the network bits are represented by the 1s in the mask and the host bits are represented by 0s.
c. a &b
d. None
Answer -b
131. Binary transmission function belongs to
a. Network layer
b. Data layer
c. Physical layer
d. presentation layer
Answer -c
132. Access to media function belongs to
a. Network layer
b. data layer
c. Physical layer
d. Session layer
Answer -b
133. Address & best path function belongs to
a. Network layer
b. Data line layer
c. transport layer
d. Session layer
Answer -a
134. End to end connection function belongs to
a. Physical layer
c. Network layer
c. Transport layer
d. Session layer
Answer -c
135. Interhost communication function belongs to
a. Data link layer
b. Session layer
c. Data presentation
d. None
Answer -b
136. Data presentation function belongs to
a. Network layer
b. Data link layer
c. Presentation layer
d. None
Answer -c
137. Network Process to applications function belongs to
a. Application layer
b. network layer
c. Physical layer
d. None
Answer -a
138. 5 layers belongs to
a. TCP
b/TCP/IP
c. OSI
d. None
Answer -b
139. Internet layer is …………….for reliable transmission
a. Responsible
b. Not responsible
c. a&b
d. None
Answer -b
140. The function of providing reliability of service is the duty of ……………protocols.
a. Lower level
b. Higher level
c. a&b
d. None
Answer -b
141. The function of providing reliability of service is done by the ………….in the transport layer.
a. TCP
b. IP
c. Network
d. None
Answer -a
142. The datagram consists of……………..
a. Header
b. data
c. a&b
d. None
Answer -c
143. In IPV4, the ………….is used to identify the number of octets in entire datagram
a. Total length field
b. Protocol
c. a&b
d. None
Answer -a
144. In IPV4, the range of total length field is between
a. 0&65,535 octets
b. 0&65353 octets
c. a&b
d. None
Answer -a
145. In IPV4, the datagram typically is contained in ……. Frame
a. Ethernet
b. E1
c.a&b
d. None
Answer -a
146. In IPV4, the size of the datagram usually will be less than………..octets.
a. 1500
b.1600
c. 1700
d. None
Answer -a