

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
301. |
Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them. |
A. | Half-trip time |
B. | Round-trip time |
C. | Travel time for the next router |
D. | Time to reach the destination/source |
Answer» C. Travel time for the next router | |
302. |
In case of time exceeded error, when the datagram visits a router, the value of time to live field is |
A. | Remains constant |
B. | Decremented by 2 |
C. | Incremented by 1 |
D. | Decremented by 1 |
Answer» E. | |
303. |
The source-quench message in ICMP was designed to add a kind of ____________ to the IP |
A. | Error control |
B. | Flow control |
C. | Router control |
D. | None of the mentioned |
Answer» C. Router control | |
304. |
When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram. |
A. | Destination unreachable |
B. | Source quench |
C. | Router error |
D. | Time exceeded |
Answer» B. Source quench | |
305. |
ICMP error message will not be generated for a datagram having a special address such as |
A. | 127.0.0.0 |
B. | 12.1.2 |
C. | 11.1 |
D. | 127 |
Answer» B. 12.1.2 | |
306. |
Which of these is not a type of error-reporting messages |
A. | Destination unreachable |
B. | Source quench |
C. | Router error |
D. | Time exceeded |
Answer» D. Time exceeded | |
307. |
During error reporting, ICMP always reports error messages to |
A. | Destination |
B. | Source |
C. | Next router |
D. | Previous router |
Answer» C. Next router | |
308. |
Header size of the ICMP message is |
A. | 8-bytes |
B. | 8-bits |
C. | 16-bytes |
D. | 16-bits |
Answer» B. 8-bits | |
309. |
Internet Control Message Protocol(ICMP) has designed to compensate |
A. | Error-reporting |
B. | Error-correction |
C. | Host and management queries |
D. | All of the mentioned |
Answer» E. | |
310. |
The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as |
A. | Delivery of packets |
B. | Error correction |
C. | Multiplexing |
D. | Demultiplexing |
Answer» E. | |
311. |
In transport layer, Multiplexing is done at |
A. | Channel |
B. | Receiver site |
C. | Sender site |
D. | Packet |
Answer» D. Packet | |
312. |
Correct order in the process of Connection-Oriented services is 1. Data transfer 2. Connection release 3. Connection establishment |
A. | 1-2-3 |
B. | 3-2-1 |
C. | 2-1-3 |
D. | 3-1-2 |
Answer» E. | |
313. |
Which of the following is false with respect to Connectionless service of transport layer protocol? |
A. | Packets are not numbered |
B. | Packets are not delayed |
C. | No acknowledgement |
D. | Packet may arrive out of sequence |
Answer» C. No acknowledgement | |
314. |
The combination of an IP address and port number is called as? |
A. | Socket address |
B. | Port address |
C. | MAC address |
D. | Host address |
Answer» B. Port address | |
315. |
According to Internet Assigned Numbers Authority(IANA), which of the following range is not part of port number? |
A. | Well-known ports |
B. | Registered ports |
C. | Dynamic ports |
D. | Static ports |
Answer» E. | |
316. |
Range of port numbers in Internet model is |
A. | 0 and 32,765(8-bit) |
B. | 0 and 32,765(16-bit) |
C. | 0 and 65,535(32-bit) |
D. | 0 and 65,535(16-bit) |
Answer» E. | |
317. |
Multiple processes on destinations at transport layer are identified by: |
A. | Mac address |
B. | Port number |
C. | Host number |
D. | Host address |
Answer» C. Host number | |
318. |
In process-to-process delivery, two processes communicate in which of the following methods? |
A. | Client/Server |
B. | Source/Destination |
C. | Message Transfer |
D. | None of the mentioned |
Answer» B. Source/Destination | |
319. |
Which layer is responsible for process-to-process delivery? |
A. | Physical layer |
B. | Network layer |
C. | Transport layer |
D. | Application layer |
Answer» D. Application layer | |
320. |
When IPV6 launched |
A. | June 2, 2012 |
B. | June 4, 2012 |
C. | June 5, 2012 |
D. | June 6, 2012 |
Answer» E. | |
321. |
Which statement(s) about IPv6 addresses are true? |
A. | Leading zeros are required |
B. | Two colons (::) are used to represent successive hexadecimal fields of zeros |
C. | Two colons (::) are used to separate fields |
D. | A single interface cannot have multiple IPv6 addresses of different types |
Answer» C. Two colons (::) are used to separate fields | |
322. |
In IPv6 addresses, addresses start with eight 0s are called |
A. | Unicast addresses |
B. | Multicast addresses |
C. | Any cast addresses |
D. | Reserved addresses |
Answer» E. | |
323. |
A few leftmost bits in each address of IPv6 address define its category is called |
A. | Prefix type |
B. | Postfix type |
C. | Reserved type |
D. | Local type |
Answer» B. Postfix type | |
324. |
In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called |
A. | Unspecified address |
B. | Loopback address |
C. | Compatible address |
D. | Mapped address |
Answer» C. Compatible address | |
325. |
A link local address of local addresses is used in an |
A. | Isolated router |
B. | Isolated mask |
C. | Isolated subnet |
D. | Isolated net |
Answer» D. Isolated net | |
326. |
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits |
A. | 96 to 127 |
B. | 0 to 63 |
C. | 80 to 95 |
D. | 64 to 79 |
Answer» B. 0 to 63 | |
327. |
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is |
A. | Use dual-stack approach |
B. | Tunneling |
C. | No solution |
D. | Replace the system |
Answer» C. No solution | |
328. |
Dual-stack approach refers to |
A. | Implementing Ipv4 with 2 stacks |
B. | Implementing Ipv6 with 2 stacks |
C. | Node has both IPv4 and IPv6 support |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
329. |
The _________ field determines the lifetime of IPv6 datagram |
A. | Hop limit |
B. | TTL |
C. | Next header |
D. | None of the mentioned |
Answer» B. TTL | |
330. |
These are the features present in IPv4 but not in IPv6. |
A. | Fragmentation |
B. | Header checksum |
C. | Options |
D. | All of the mentioned |
Answer» E. | |
331. |
IPv6 doesnot use _________ type of address |
A. | Broadcast |
B. | Multicast |
C. | Anycast |
D. | None of the mentioned |
Answer» B. Multicast | |
332. |
In the IPv6 header,the traffic class field is similar to which field in the IPv4 header? |
A. | Fragmentation field |
B. | Fast-switching |
C. | ToS field |
D. | Option field |
Answer» D. Option field | |
333. |
The header length of an IPv6 datagram is ___________ |
A. | 10bytes |
B. | 25bytes |
C. | 30bytes |
D. | 40bytes |
Answer» E. | |
334. |
The size of IP address in IPv6 is |
A. | 4bytes |
B. | 128bits |
C. | 8bytes |
D. | 100bits |
Answer» C. 8bytes | |
335. |
Which of this is not a class of IP address? |
A. | ClassE |
B. | ClassC |
C. | ClassD |
D. | ClassF |
Answer» E. | |
336. |
Network addresses are very important concepts of |
A. | Routing |
B. | Mask |
C. | IP Addressing |
D. | Classless Addressing |
Answer» D. Classless Addressing | |
337. |
In classful addressing, a large part of available addresses are |
A. | Organized |
B. | Blocked |
C. | Wasted |
D. | Communicated |
Answer» D. Communicated | |
338. |
First address in a block is used as network address that represents the |
A. | Class Network |
B. | Entity |
C. | Organization |
D. | Codes |
Answer» D. Codes | |
339. |
In IPv4 Addresses, classful addressing is replaced with |
A. | Classless Addressing |
B. | Classful Addressing |
C. | Classful Advertising |
D. | Classless Advertising |
Answer» B. Classful Addressing | |
340. |
n classless addressing, there are no classes but addresses are still granted in |
A. | IPs |
B. | Blocks |
C. | Codes |
D. | Sizes |
Answer» C. Codes | |
341. |
Which field helps to check rearrangement of the fragments? |
A. | offset |
B. | flag |
C. | ttl |
D. | identifer |
Answer» B. flag | |
342. |
Fragmentation has following demerits |
A. | complicates routers |
B. | open to DOS attack |
C. | overlapping of fragments. |
D. | all of the mentioned |
Answer» E. | |
343. |
Which of these is not applicable for IP protocol? |
A. | is connectionless |
B. | offer reliable service |
C. | offer unreliable service |
D. | none of the mentioned |
Answer» C. offer unreliable service | |
344. |
What should be the flag value to indicate the last fragment? |
A. | 0 |
B. | 1 |
C. | TTl value |
D. | None of the mentioned |
Answer» B. 1 | |
345. |
The data field can carry which of the following? |
A. | TCP segemnt |
B. | UDP segment |
C. | ICMP messages |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
346. |
If the value in protocol field is 17, the transport layer protocol used is _____________ |
A. | TCP |
B. | UDP |
C. | Either of the mentioned |
D. | None of the mentioned |
Answer» C. Either of the mentioned | |
347. |
The TTL field has value 10. How many routers (max) can process this datagram? |
A. | 11 |
B. | 5 |
C. | 10 |
D. | 1 |
Answer» D. 1 | |
348. |
Which of the following field in IPv4 datagram is not related to fragmentation? |
A. | Flags |
B. | Offset |
C. | TOS |
D. | Identifier |
Answer» D. Identifier | |
349. |
Which of the following is not applicable for IP? |
A. | Error reporting |
B. | Handle addressing conventions |
C. | Datagram format |
D. | Packet handling conventions |
Answer» B. Handle addressing conventions | |
350. |
AJAX stands for |
A. | asynchronous javascript and xml |
B. | advanced JSP and xml |
C. | asynchronous JSP and xml |
D. | advanced javascript and xml |
Answer» B. advanced JSP and xml | |