IP concepts


01. IP stands for

a. Internet Programmes

b. Internet Protocol

c. All of the above

d. None of the above.

Answer -b


02. The attaching the header to the received information, received from the higher layer before handing over to the next lower layer is called

a. Encryption 

b. Encoding 

c. encapsulation 

d. None of the above.

Answer -b


03. No.of layers in TCP layers are

a. 4 

b.2 

c.2 

d.7

Answer -a


04. In TCP layer, the application layer refers to

a. Higher level protocols 

b. Lower level protocols 

c. a & b 

d. None

Answer -a


05. From the following which one is an example for application layer?

a. FTP 

b. HTTP 

c. a &b 

d. None

Answer -a


06. SMTP is an example for

a. Transport layer 

b. application layer 

c. a & b 

d. None

Answer -b


07. FTP stands for

a. File Transmission Protocol

b. File Transfer Protocol

c. File Transmission Programme

d. File Transfer Programme

Answer -a


08. SMTP stands for

a. Single Mail Transfer Protocol

b. Simple Main Transfer Protocol

c. a 7 b

d. None

Answer -b


09. TCP stands for

a. Transfer Control Protocol

b. Transmission Common Protocol

c. Transfer common Protocol

d. Transmission Control Protocol

Answer -d


10. UDP stands for

a. User Defined Protocol

b. User Datagram Protocol

c. A & b

d. None

Answer -b


11. …………………… layer is responsible for connecting two machines through internet

a. Internet layer

b. Application layer

c. a &b

d. None

Answer -a


12. Integrity of packets is guaranteed in ……………

a. IPV6

b.IPV4

c. IPV3

d. None

Answer -b


13. Integrity of packets is guaranteed through

a. IPV4

b. IPV6

c. checksum

d. None

Answer -c


14. IN IPV4, range of values is

a. 0 to 12

b. 0 to 15

c. a & b

d. None

Answer -b


15. The value used by IP in IPV4 is

a. 4

b.5

c. a&b

d. None

Answer -a


16. TTL stands for

a. Transmission Test Live

b. Time To Live

c. a & b

d. none

Answer -b


17. In IPV4, total length is

a. 16 Bytes filed

b. 16 Bit field

c. 32 bit field

d. None

Answer -b


18. In IPV4, the identification is

a. 16 Bytes field

b. 16 bit field

c. a & b

d. None

Answer -b


19. In IPV4, TTL lengths is

a. 8 byte field

b. 8 bit field

c. a & b

d. None

Answer -c


20. The current recommended default TTL for the IP is

a. 64

b. 32

c. a & b

d. None

Answer -a


21. In IPV4,protocol is

a. 8 field

b.16 field

c. 32 field

d. 16 Bit field

Answer -a


22. ……………field is used to identify the next higher layer protocol using the IP.

a. Protocol

b. TCP

c. a &b

d. None

Answer -a


23. In Protocol field, the value of TCP is

a. Equal to 6

b. equal to 17

c. a & b

d. None

Answer -a


24. The value of UDP in protocol field is

a. Equal to 6

b. equal to 17

c. a & b

d. None

Answer -b


25. In IPV4, checksum filed length is

a. 16 byte field

b. 16 bit field

c. a & b

d. None

Answer -b


26. In IPV4, the source address field lengths is

a. 32 byte field

b. 32 bit field

c. a & b

d. None

Answer -b


27. The source address field contains the following;

a. Network identifier

b. Host identifier

c. a & b

d. None

Answer -b


28. The protocol field is used to identify

a. The next higher layer protocol using the IP.

b. The next lower layer protocol using the IP.

c. a & b

d. None

Answer -


29. The length of destination address is

a. 16 byte field

b. 16 bit field

c. 32 bit field

d. 32 byte filed

Answer -c


30. The selection by the IP of either UDP or TCP is based on the

a. Protocol number in the IP header

b. Protocol number in the TCP header

c. a & b

d. None

Answer -a


31. The source port number is a

a. 16 bit field

b. 16 byte field

c. 32 bit field

d. 32 byte field

Answer -a


32. The destination port number is a

a. 16 bit field

b. 16 byte field

c. 32 bit field

d. 32 byte field

Answer -a


33. The port number for the UDP echo server is
a. 7

b. 8

c. 69

d. None

Answer -a


34. The Port number for TFTP is

a. 7

b.8

c.69

d. None

Answer -c


35. TFTP stands for

a. Trival File Transmission Protocol

b. Trival File Transfer Protocol

c. a & b

d. None

Answer -b


36. The UDP message length field is a

a. 16 byte field

b. 16 bit field

c. 32 bit field

d. 32 byte field

Answer -b


37. The UDP message length field contains in the count of the total number of ……………….in the user datagram.
a. Octets

b. ones

c. binary

d. None

Answer -a


38. The minimum size length field of UDP message is
a. 8

b. 8 bit field

c. a & b

d. None

Answer -a


39. UDP checksum field must be set to…………..when not used

a. Zero

b. one

c. a &b

d. None

Answer -a


40. Which one is providing traditional circuit oriented data communications service to programmes?

a. UDP

b.TCP

c. a & b

d. None

Answer -b


41. Which of the following is connection oriented?

a. UDP

b. TCP

c. a & b

d. None

Answer -b


42. Which of the following is connection less oriented?

a. UDP

b.TCP

c. a & b

d. None

Answer -a


43. The sequence numbers in the TCP header is

a. 32 bytes

b. 32 bits

c. a & b

d. None

Answer -b


44. The sequence numbers in the TCP header for first time randomly generated by

a. System integrator

b. system

c. a & b

d. None

Answer -b


45. SN stands for

a. Signal to Noise

b. Sequence Number

c. Servicing number

d. None

Answer -b


46. The second sequence number is called

a. Expected Receive Sequence Number

b. Excepted Receive Sequence Number

c. Expected Remote Sequence Number

d. Excepted Remote Sequence Number

Answer -a


47. ERSN stands for

a. Expected Receive Sequence Number

b. Excepted Receive Sequence Number

c. Expected Remote Sequence Number

d. Excepted Remote Sequence Number

Answer -a


48. SSN stands for

a. Secondary Switching Number

b. Second Sequence Number

c. A 7 b

d. None

Answer -b


49. Second Sequence Number is also called as

a. Acknowledgement Number

b. Addressed Number

c. Access Number

d. None

Answer -a


50. AKN stands for

a. Acknowledgement Number

b. Addressed Number

c. Access number

d. None

Answer -a


51. The AKN is a

a. 32 bit field

b. 32 byte field

c. 16 bit field

d. 16 byte field

Answer -a


52. In TCP header length is a

a. 4 bit field

b. 4 byte field

c. 16 bit field

d. 16 byte field

Answer -a


53. In TCP, the window field is a

a. 16 bit field

b. 4 bit field

c. 16 byte field

d.4 bit field

Answer -a


54. ICMP stands for

a. Internet Common Message Protocol

b. Internet Control Message Protocol

c. Internet Consumer Message Protocol

d. Internet Consumer Meeting Protocol

Answer -b


55. ……………is used to report the error message back to the source.

a. ICMP

b.IMCP

c.IGMP

d. IPMC

Answer -a


56. From the following which is the correct statement?

a. FTP &SMTP are an example of application layer.

b. FTP & SMTP are an example of Transport layer.

c. FTP & SMTP are an example of Internet layer

d. FTP & SMTP are an example of Link layer.

Answer -a


57. The selection by the IP of……………………….. is based on the Protocol number in the IP header.

a. UDP

b. TCP

c. UDP or TCP

d. None

Answer -c


58. 16 bit field is the port number of

a. Source

b. destination

c. a & b

d. None

Answer -c


59. The port number 7 is for

a. UDP echo server

b. TCP

c. a& b

d.TFTP

Answer -a


60. 69 is the port number for

a. UDP echo server

b.TCP

c. a & b

d. TFTP

Answer -d


61. The -----------message length field contains a count of the total number of octets in the user datagram.

a. UDP

b. TCP

c. TFTP

d. None

Answer -a


62. …………………checksum field must be set to zero when not used.

a. UDP

c. TCP

c. TFTP

d. None

Answer -a


63. ………….provides traditional circuit oriented data communications service to programs.

a. TCP

b.UDP

c.TFTP

d. None

Answer -a


64. ………….in the TCP header is 32 bits long

a. SN

b.SSM

c.AKN

d. ERSN

Answer -a


65. The ICMP is used to report

a. The error message back to the source.

b. The receipt of the message back to the source.

c. The error correction message back to the source.

d. None

Answer -a


66. ………….is the process of managing the rate of data transmission between two nodes to prevent a fast sender from out running a slow receiver.

a. Flow control

b. flow chart

c. a & b

d. None

Answer -a


67. To prevent…………the IP datagram contains a time to live that is set by the originator.

a. Routing protocol

b. routing loops

c. routing table

d. None

Answer -b


68. IGMP stands for

a. Internet Group Management Protocol

b. Internet Group Message Protocol

c. Internet Group Membership Protocol

d. None

Answer -a


69. …………… is a communications proposal used to manage the membership of internet protocol multicast group.

a. IGMP

b. ICMP

c. a & b

d. None

Answer -a


70. Each host on the internet is assigned a 32 bit integer address called its

a. Internet Address

b. IP address

c. a &b

d. None

Answer -c


71. Every IP address consists of ………….pairs

a. One

b. two

c. three

d. None

Answer -b


72. The IP address consists of

a. One identifying network

b. One identifying the host

c. a & b

c. None

Answer -c


73. IP address is referred to as the

a. Dotted decimal notation

b. Dotted decamical notation

c. a & b

d. None

Answer -a


74. Type of class of IP address are

a. One

b. two

c. 5

d. none

Answer -c


75. Class D IP address reserved for

a. IP multicasting

b. future use

c. Private IP

d. Public IP

Answer -a


76. Class E IP address reserved for

a. IP Multicasting

b. future use

c. Private IP

d. Public IP

Answer -b


77. Address beginning with…………….. are reserved for future use

a. 1010

b.1111

c.1110

d.a & b

Answer -b


78. Determine the class of IP address is by

a. Examining the first 4 bits of the IP address

b. Examining the first 5 bits of the IP address

c. a & b

d. None

Answer -a


79. Class A addresses begin with

a. 0XXX or 1 to 126 decimal

b. 10XX or 128 to 191 decimal

c. 110X or 192 to 223 decimal

d. 1110 or 224 to 239 decimal

Answer -a


80. Class B addresses begin with

a. 0XXX or 1 to 126 decimal

b. 10XX or 128 to 191 decimal

c. 110X or 192 to 223 decimal

d. 1110 or 224 to 239 decimal

Answer -b


81. Class C addresses begin with

a. 0XXX or 1 to 126 decimal

b. 10XX or 128 to 191 decimal

c. 110X or 192 to 223 decimal

d. 1110 or 224 to 239 decimal

Answer -c


82. Class D addresses begin with

a. 0XXX or 1 to 126 decimal

b. 10XX or 128 to 191 decimal

c. 110X or 192 to 223 decimal

d. 1110 or 224 to 239 decimal

Answer -d


83. Class E addresses begin with

a. 0XXX or 1 to 126 decimal

b. 10XX or 128 to 191 decimal

c. 110X or 192 to 223 decimal

d. 1111 or 240 to 254 decimal

Answer -d


84. Addresses beginning with 01111111 or 127 decimal are reserved for

a. Loop back

b. future use

c. a & b

d. None

Answer -a


85. IP address for internal testing on a local machine is

a. 127.0.0.1

b. 127,0,0,1

c. a & b

d. None

Answer -a


86. In class A which part of IP address belongs to the network ?

a. NNNNNNNN

b. NNNNHHHH

c.NHNHNHNH

d. None

Answer -a


87. In class A which part of IP address belongs to the host?

a. NNNNNNNN

b. b.HHHHHHHH

c. HHHHHHHH.HHHHHHHH.

d. None

Answer -c


88. In class B which part of IP address belongs to the network?

a. NNNNNNNN

b. NNNNNNNN.NNNNNNNN.

c. NNNNNNNN.NNNNNNNN.NNNNNNNN.

d. None

Answer -b


89. In class B which part of IP address belongs to the host?

a. HHHHHHHH.

b. HHHHHHHH.HHHHHHHH

c. NNNNNNNN.NNNNNNNN.NNNNNNNN.

d. None

Answer -b


90. In class C which part of IP address belongs to the network?

a. NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH.

b. NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH

c. NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH

d. None

Answer -c


91. In class C which part of IP address belongs to the host?

a. NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH

b. NNNNNNNN.NNNNNNNN.HHHHHHHH.NNNNNNNN

c. NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH

d. None

Answer -a


92. Tick the IP address reserved for Private Network?

a. 10.0.0.0/8

b. 11.0.0.0/8

c. 10.0.0.0/32

d. 10.0.0.0/16

Answer -a


93. Tick the IP address reserved for Private Network?

a. 172.16.0.0/12

b. 172.16.0.0/16

c. 172.16.0.0/8

d. 172.16.0.0/32

Answer -a


94. Tick the IP address reserved for Private Netowrk?

a. 192.168.0.0/8

b. 192.168.0.0/16

c. 192.168.0.0/32

d. None

Answer -b


95. Reasons for subneting an IP network is

a. Use of different physical media

b. Preservation of address space

c. Security & to control the network traffic.

d.All the above

Answer -d


96. The most common reason for using subneting is

a. To control network traffic

b. To control speed of the bandwidth

c. a&b

d. None

Answer -a


97. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the

a. Network Address or Number

b. Network element c. a&b

d. None

Answer -a


98. In the subnet masking the network bits are represented by the

a. “0” s in the mask

b. “1” in the mask

c. a&b

d. None

Answer -b


99. In the subnet masking the host bits are represented by the

a. “0” s in the mask

b. “1” in the mask

c. a&b

d. None

Answer -a


100. The reason for using IPV6

a. Rapid exhaustion of IPV4 address space

b. Fulfill the future need of IP address

c. a&b

d. None

Answer -c


101. In IPV6,the address size was increased from

a. 32 to 126 bits

b. 32 bits to 128 bits

c.a&b

d. None

Answer -b


102. In IPV6 the address size is

a. 16 octets

b. 32 octets

c. a&b

d.None

Answer -a


103. The next generation of the internet protocol is

a. IPV4

b.IPV6

c.a&b

d.None

Answer -b


104. The replacement of IPV4 to IPV6 is aimed in the year

a. 1994

b.2000

c.1995

d.2010

Answer -c


105. VOIP stands for

a. Voice Over Internet Protocol

b. Value Over Internet Protocol

c. a&b

d.None

Answer -a


106. The function of physical layer is

a. Binary transmission

b.  Access to media

c. Address and Best path

d. End to end connections.

Answer -a


107. The function of Data Link layer is

a. Binary transmission

b.  Access to media

c. Address and Best path

d. End to end connections

Answer -b


108. The function of Network layer is

a. Binary transmission

b. b. Access to media

c. c.Address and Best path

d. End to end connections

Answer -c


109. The function of Transport Layer is

a. Binary transmission

b. b. Access to media

c. c.Address and Best path

d. End to end connections

Answer -d


110. The function of Session layer is

a. Internet communication

b. Data presentation

c. Network process to application

d. None

Answer -a


111. The function of presentation layer is

a. Inter host communication

b. Data presentation

c. Network process to application

d. None

Answer -b


112. The function of application layer is

a. Internet communication

b. Data presentation

c. Network process to application

d. None

Answer -c


113. In TCP/IP model total no.of layers are

a. 5

b.7

c. a&b

d.None

Answer -a


114. Flow control is the process of

a. Managing the rate of data transmission between two nodes to prevent a fast sender from out running a slow receiver.

b. Managing the network elements

c. a&b

d.None

Answer -a


115. To prevent routing loops, the IP datagram contains a

a. TTL

b. FTP

c. Routing table

d. None

Answer -a


116. IGMP is a communication protocol used to manage

a. The membership of internet protocol multicast group

b. Run the routing table

c.a&b

d.None

Answer -a


117. To prevent routing loops, the --------------contains a time to live that is set by a Originator.

a. IP datagram

b.UDP

c.TCP/IP

d. None

Answer -a


118. Class D IP address reserved for

a. IP Multicasting

b. future use

c. a & b

d. None

Answer -a


119. Class E IP address reserved for

a. IP Multicasting

b. future use

c. a&b

d. None

Answer -b


120. 0xxx or 1 to 126 decimal IP address belongs to

a. Class A address

b. class b address

c. class c address

d. None

Answer -a


121. 10xx or 128 to 191 decimal address belongs to

a. Class A address

b. class b address

c. Class c address

d. None

Answer -b


122. 110x, or 192 to 223 decimal IP address belongs to

a. Class A address

b. class c

d. Class E

d. None

Answer -b


123. 1110 or 224 to 239 decimal IP address belongs to

a. Class A

b. Class c

c. class D

d. class E

Answer -c


124. 1111 or 240 to 254 decimal IP address belongs to

a. Class A

b. Class E

c. class D

d. Class E

Answer -d


125. 01111111 or 127 decimal are reserved for

a. Loop back

b. Internal testing

c. a & b

d. None

Answer -a


126. 127.0.0.1 IP address belongs to

a. Loop back

b. Internal testing

c. a & b

d. None

Answer -b


127. 10.0.0.0/8 IP address belongs to

a. Public network

b. Private network

c. a & b

d. None

Answer -b


128. 172.16.0.0/12 IP address belongs to

a. Public network

b. Private network

c. a & b

d. None

Answer -b


129. 192.168.0.0/16 IP address belongs to

a. Public network

b. Private network

c. a&b

d. None

Answer -b


130. State which statement is correct.:

a. In the subnet masking, the network bits are represented by the 1s in host bits and 0s in the mask

b. In the subnet masking the network bits are represented by the 1s in the mask and the host bits are represented by 0s.

c. a &b

d. None

Answer -b


131. Binary transmission function belongs to

a. Network layer

b. Data layer

c. Physical layer

d. presentation layer

Answer -c


132. Access to media function belongs to

a. Network layer

b. data layer

c. Physical layer

d. Session layer

Answer -b


133. Address & best path function belongs to

a. Network layer

b. Data line layer

c. transport layer

d. Session layer

Answer -a


134. End to end connection function belongs to

a. Physical layer

c. Network layer

c. Transport layer

d. Session layer

Answer -c


135. Interhost communication function belongs to

a. Data link layer

b. Session layer

c. Data presentation

d. None

Answer -b


136. Data presentation function belongs to

a. Network layer

b. Data link layer

c. Presentation layer

d. None

Answer -c


137. Network Process to applications function belongs to

a. Application layer

b. network layer

c. Physical layer

d. None

Answer -a


138. 5 layers belongs to

a. TCP

b/TCP/IP

c. OSI

d. None

Answer -b


139. Internet layer is …………….for reliable transmission

a. Responsible

b. Not responsible

c. a&b

d. None

Answer -b


140. The function of providing reliability of service is the duty of ……………protocols.

a. Lower level

b. Higher level

c. a&b

d. None

Answer -b


141. The function of providing reliability of service is done by the ………….in the transport layer.

a. TCP

b. IP

c. Network

d. None

Answer -a


142. The datagram consists of……………..

a. Header

b. data

c. a&b

d. None

Answer -c


143. In IPV4, the ………….is used to identify the number of octets in entire datagram

a. Total length field

b. Protocol

c. a&b

d. None

Answer -a


144. In IPV4, the range of total length field is between

a. 0&65,535 octets

b. 0&65353 octets

c. a&b

d. None

Answer -a


145. In IPV4, the datagram typically is contained in ……. Frame

a. Ethernet

b. E1

c.a&b

d. None

Answer -a


146. In IPV4, the size of the datagram usually will be less than………..octets.

a. 1500

b.1600

c. 1700

d. None

Answer -a