R4RIN
Articles
Java 8
MCQS
MCA MCQ Quiz Hub
Computer Network MCA Question MCQ Set 9
Choose a topic to test your knowledge and improve your MCA skills
1. Which of the following field in IPv4 datagram is not related to fragmentation?
Flags
Offset
TOS
Identifier
2. The TTL field has value 10. How many routers (max) can process this datagram?
11
5
10
1
3. If the value in protocol field is 17, the transport layer protocol used is _______
TCP
UDP
ICMP
IGMP
4. The data field cannot carry which of the following?
TCP segment
UDP segment
ICMP messages
SMTP messages
5. What should be the flag value to indicate the last fragment?
0
1
TTl value
Protocol field value
6. Which of these is not applicable for IP protocol?
is connectionless
offer reliable service
offer unreliable service
does not offer error reporting
7. Which of the following demerits does Fragmentation have?
complicates routers
open to DOS attack
overlapping of fragments.
All of the mentioned
8. Which field helps to check rearrangement of the fragments?
offset
flag
ttl
identifer
9. In classless addressing, there are no classes but addresses are still granted in ______
IPs
Blocks
Codes
Sizes
10. In IPv4 Addresses, classful addressing is replaced with ________
Classless Addressing
Classful Addressing
Classful Advertising
Classless Advertising
11. First address in a block is used as network address that represents the ________
Class Network
Entity
Organization
Codes
12. In classful addressing, a large part of available addresses are ________
Organized
Blocked
Wasted
Communicated
13. Network addresses are a very important concept of ________
Routing
Mask
IP Addressing
Classless Addressing
14. Which of this is not a class of IP address?
Class E
Class C
Class D
Class F
15. The size of an IP address in IPv6 is ______
4 bytes
128 bits
8 bytes
100 bits
16. The header length of an IPv6 datagram is _______
10bytes
25bytes
30bytes
40bytes
17. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
Fragmentation field
Fast-switching
ToS field
Option field
18. IPv6 does not use _________ type of address.
broadcast
multicast
anycast
unicast
19. Which among the following features is present in IPv6 but not in IPv4?
Fragmentation
Header checksum
Options
Anycast address
20. The _________ field determines the lifetime of IPv6 datagram
Hop limit
TTL
Next header
Type of traffic
21. Dual-stack approach refers to _________
implementing Ipv4 with 2 stacks
implementing Ipv6 with 2 stacks
node has both IPv4 and IPv6 support
implementing a MAC address with 2 stacks
22. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________
Use dual-stack approach
Tunneling
No solution
Replace the system
23. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits ______
96 to 127
0 to 63
80 to 95
64 to 79
24. Which layer is responsible for process-to-process delivery?
Physical layer
Network layer
Transport layer
application layer
25. In process-to-process delivery, two processes communicate in which of the following methods?
Client/Server
Source/Destination
Message Transfer
Peer to Peer
26. Multiple processes on destinations at transport layer are identified by _________
Mac address
Port number
Host number
Host address
27. Range of port numbers in Internet model is _______
0 and 32,765(8-bit)
0 and 32,765(16-bit)
0 and 65,535(32-bit)
0 and 65,535(16-bit)
28. According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?
Well-known ports
Registered ports
Registered ports
Static ports
29. The combination of an IP address and port number is called as ________
Socket address
Port address
MAC address
Host address
30. Which of the following is false with respect to Connectionless service of transport layer protocol?
Packets are not numbered
Packets are not delayed
No acknowledgement
Packet may arrive out of sequence
31. In transport layer, Multiplexing is done at _______
Channel
Receiver site
Sender site
Packet
32. The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as _______
Delivery of packets
Error correction
Multiplexing
Demultiplexing
33. Internet Control Message Protocol (ICMP) has been designed to compensate _____
Error-reporting
Error-correction
Host and management queries
all of the mentioned
34. Header size of the ICMP message is _________
8-bytes
8-bits
16-bytes
16-bits
35. During error reporting, ICMP always reports error messages to ________
Destination
Source
Next router
Previous router
36. Which of these is not a type of error-reporting message?
Destination unreachable
Source quench
Router error
Time exceeded
37. ICMP error message will not be generated for a datagram having a special address such as _______
127.0.0.0
12.1.2
11.1
127
38. When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____ message back to the source host that initiated the datagram.
Destination unreachable
Source quench
Router error
Time exceeded
39. The source-quench message in ICMP was designed to add a kind of _______ to the IP.
error control
flow control
router control
switch control
40. In case of time exceeded error, when the datagram visits a router, the value of time to live field is ______
Remains constant
Decremented by 2
Incremented by 1
Decremented by 1
41. Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.
Half-trip time
Round-trip time
Travel time for the next router
Time to reach the destination/source
42. During debugging, we can use the ____________ program to find if a host is alive and responding.
traceroute
shell
ping
Java
43. In windows _____ can be used to trace the route of the packet from the source to the destination.
traceroute
tracert
ping
locater
44. In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ________
10101111 10100011
01010000 01011100
10101111 01011100
01010000 10100011
45. Which of the following is the broadcast address for a Class B network ID using the default subnetmask?
172.16.10.255
255.255.255.255
172.16.255.255
172.255.255.255
46. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?
Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
47. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
255.255.255.252
255.255.255.255
255.255.255.240
255.255.255.248
48. The combination of _________ and __________ is often termed the local address of the local portion of the IP address.
Network number and host number
Network number and subnet number
Subnet number and host number
Host number
49. _____ implies that all subnets obtained from the same subnet mask.
Static subnetting
Dynamic subnetting
Variable length subnetting
Dynamic length subnetting
50. ______ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.
FDDI
FDDT
FDDR
FOTR
Submit