MCA MCQ Quiz Hub

Computer Network MCA Question MCQ Set 9

Choose a topic to test your knowledge and improve your MCA skills

Which of the following field in IPv4 datagram is not related to fragmentation?





✅ Correct Answer: 3

The TTL field has value 10. How many routers (max) can process this datagram?





✅ Correct Answer: 3

If the value in protocol field is 17, the transport layer protocol used is _______





✅ Correct Answer: 2

The data field cannot carry which of the following?





✅ Correct Answer: 3

What should be the flag value to indicate the last fragment?





✅ Correct Answer: 1

Which of these is not applicable for IP protocol?





✅ Correct Answer: 2

Which of the following demerits does Fragmentation have?





✅ Correct Answer: 4

Which field helps to check rearrangement of the fragments?





✅ Correct Answer: 1

In classless addressing, there are no classes but addresses are still granted in ______





✅ Correct Answer: 2

In IPv4 Addresses, classful addressing is replaced with ________





✅ Correct Answer: 1

First address in a block is used as network address that represents the ________





✅ Correct Answer: 3

In classful addressing, a large part of available addresses are ________





✅ Correct Answer: 3

Network addresses are a very important concept of ________





✅ Correct Answer: 3

Which of this is not a class of IP address?





✅ Correct Answer: 4

The size of an IP address in IPv6 is ______





✅ Correct Answer: 2

The header length of an IPv6 datagram is _______





✅ Correct Answer: 4

In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?





✅ Correct Answer: 3

IPv6 does not use _________ type of address.





✅ Correct Answer: 1

Which among the following features is present in IPv6 but not in IPv4?





✅ Correct Answer: 4

The _________ field determines the lifetime of IPv6 datagram





✅ Correct Answer: 1

Dual-stack approach refers to _________





✅ Correct Answer: 3

Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________





✅ Correct Answer: 2

Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______





✅ Correct Answer: 1

Which layer is responsible for process-to-process delivery?





✅ Correct Answer: 3

In process-to-process delivery, two processes communicate in which of the following methods?





✅ Correct Answer: 1

Multiple processes on destinations at transport layer are identified by _________





✅ Correct Answer: 2

Range of port numbers in Internet model is _______





✅ Correct Answer: 4

According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?





✅ Correct Answer: 4

The combination of an IP address and port number is called as ________





✅ Correct Answer: 1

Which of the following is false with respect to Connectionless service of transport layer protocol?





✅ Correct Answer: 2

In transport layer, Multiplexing is done at _______





✅ Correct Answer: 3

The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as _______





✅ Correct Answer: 4

Internet Control Message Protocol (ICMP) has been designed to compensate _____





✅ Correct Answer: 4

Header size of the ICMP message is _________





✅ Correct Answer: 1

During error reporting, ICMP always reports error messages to ________





✅ Correct Answer: 2

Which of these is not a type of error-reporting message?





✅ Correct Answer: 3

ICMP error message will not be generated for a datagram having a special address such as _______





✅ Correct Answer: 1

When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____ message back to the source host that initiated the datagram.





✅ Correct Answer: 1

The source-quench message in ICMP was designed to add a kind of _______ to the IP.





✅ Correct Answer: 2

In case of time exceeded error, when the datagram visits a router, the value of time to live field is ______





✅ Correct Answer: 4

Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.





✅ Correct Answer: 2

During debugging, we can use the ____________ program to find if a host is alive and responding.





✅ Correct Answer: 3

In windows _____ can be used to trace the route of the packet from the source to the destination.





✅ Correct Answer: 2

In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ________





✅ Correct Answer: 1

Which of the following is the broadcast address for a Class B network ID using the default subnetmask?





✅ Correct Answer: 3

You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?





✅ Correct Answer: 2

If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?





✅ Correct Answer: 3

The combination of _________ and __________ is often termed the local address of the local portion of the IP address.





✅ Correct Answer: 3

_____ implies that all subnets obtained from the same subnet mask.





✅ Correct Answer: 1

______ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.





✅ Correct Answer: 1