Explore topic-wise MCQs in Computer Networks.

This section includes 29 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks knowledge and support exam preparation. Choose a topic below to get started.

1.

The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________

A. piggybacking
B. cyclic redundancy check
C. fletcher’s checksum
D. parity check
Answer» B. cyclic redundancy check
2.

When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________

A. random error
B. burst error
C. inverted error
D. double error
Answer» C. inverted error
3.

The data link layer takes the packets from _________ and encapsulates them into frames for transmission.

A. network layer
B. physical layer
C. transport layer
D. application layer
Answer» B. physical layer
4.

Home broadband connections that work on DSL (Digital Subscriber Line) use ___ protocol.

A. PPPoE (PPP over Ethernet)
B. PPPoA (PPP over ATM)
C. Bridge protocol
D. All the above
Answer» E.
5.

The Dial-up connections to access the internet uses ___ protocol.

A. PPP (Point to Point protocol)
B. X.25 protocol
C. PLIP protocol
D. None
Answer» B. X.25 protocol
6.

Which protocols adopted the standards of HDLC (High-Level Link Control) protocol?

A. X.25 protocol as LAPB (Link Access Procedure Balanced), V.42 protocol as LAPM (Link Access Procedure for Modems)
B. Frame Relay protocol as LAPF (Link Access Procedure for Frame Relay)
C. ISDN (Integrated Services Digital Network) protocol as LAPD (Link Access Procedure on D-channel)
D. All the above
Answer» E.
7.

Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network?

A. ARQ (Automatic Repeat Request)
B. ARP (Address Resolution Protocol)
C. SLIP (Serial Line Internet Protocol)
D. PLIP (Parallel Line Internet Protocol)
Answer» C. SLIP (Serial Line Internet Protocol)
8.

Choose the Protocols used in the Data Link Control layer of OSI model below?

A. SLIP (Serial Line Internet Protocol), CSLIP(Compressed SLIP), PLIP (Parallel Line Internet Protocol)
B. PPP (Point to Point Protocol)
C. X.25, ITU-T G.hn DLL
D. All the above
Answer» E.
9.

Choose the Protocols working in the Data Link Control Layer of OSI model below.

A. ATM (Asynchronous Transfer Mode), Frame Relay
B. HDLC (High-Level Data Link Control), SDLC (Synchronous Data Link Control)
C. ARP (Address Resolution Protocol), IEEE-802.3
D. All the above
Answer» E.
10.

The physical address to each machine is provided by which layer in an OSI reference model?

A. Physical layer
B. Data Link Layer
C. Network Layer
D. Transport Layer
Answer» C. Network Layer
11.

A Token Ring implementation works on the __ mode.

A. Contention
B. Reservation
C. Round Robin
D. None
Answer» D. None
12.

The contention mode of MAC implementation is best suited for __ traffic.

A. Low
B. Medium
C. High
D. Very High
Answer» B. Medium
13.

In a Contention mode of MAC implementation, different stations can have different priorities set by the admin. State TRUE/FALSE.

A. TRUE
B. FALSE
C. -
D. -
Answer» B. FALSE
14.

In a contention mode of MAC implementation, each station in the network ___ data at the same time whether a collision occurs or not.

A. can transmit
B. can not transmit
C. -
D. -
Answer» B. can not transmit
15.

In Reservation mode of MAC, each station in the network ___ a time slot for a finite or infinite amount of time to access the shared medium.

A. should reserve
B. need not reserve
C. -
D. -
Answer» B. need not reserve
16.

In Round-robin mode of MAC, each station gets ___ priority whether access to the medium is needed or not.

A. different
B. equal
C. -
D. -
Answer» C. -
17.

The modes of a MAC to share a transmission medium are ___.

A. Round Robin
B. Reservation
C. Contention
D. All the above
Answer» E.
18.

The types of Medium Access Control are ___.

A. Centrally Access Control
B. Distributed Access Control
C. Both option-A and option-B
D. None
Answer» D. None
19.

Every Computer or an Internet device has a unique MAC address. State TRUE/FALSE.

A. TRUE
B. FALSE
C. -
D. -
Answer» B. FALSE
20.

Which is the layer that is responsible for sharing the physical media (transmission medium) among many computers or devices?

A. LLC (Logical Link Control) layer
B. MAC (Medium Access Control) layer
C. -
D. -
Answer» C. -
21.

The types of data services offered by an LLC (Logical Link Control) layer are ___.

A. Connectionless which is fast and unreliable
B. Connection-Oriented which is slow and reliable
C. Both OptionA and optionB.
D. None
Answer» D. None
22.

The functions of a Logical Link Layer (LLC) are ___.

A. Error control
B. Flow control
C. Creating and managing the communication link between two devices with the help of the Transport layer.
D. All the above
Answer» E.
23.

Which is the sub-layer that accepts frames from the upper layer that is Network Layer?

A. LLC (Logical Link Control Layer)
B. MAC (Medium Access Control) layer
C. -
D. -
Answer» B. MAC (Medium Access Control) layer
24.

The two sub-layers of a Data Link layer are ___.

A. LLC - Logical Link Control Layer
B. MAC - Medium Access Control Layer
C. Both A and B
D. Data Layer
Answer» D. Data Layer
25.

A Data Link Layer converts a packet of data into __ finally.

A. Frames
B. Bits
C. -
D. -
Answer» C. -
26.

WHICH_ONE_OF_THE_FOLLOWING_IS_THE_MULTIPLE_ACCESS_PROTOCOL_FOR_CHANNEL_ACCESS_CONTROL??$

A. CSMA/CD
B. CSMA/CA
C. Both CSMA/CD & CSMA/CA
D. None of the mentioned
Answer» D. None of the mentioned
27.

The_technique_of_temporarily_delaying_outgoing_acknowledgements_so_that_they_can_be_hooked_onto_the_next_outgoing_data_frame_is_called$

A. piggybacking
B. cyclic redundancy check
C. fletcher’s checksum
D. none of the mentioned
Answer» B. cyclic redundancy check
28.

CRC stands for

A. cyclic redundancy check
B. code repeat check
C. code redundancy check
D. cyclic repeat check
Answer» B. code repeat check
29.

Which one of the following task is not done by data link layer?

A. framing
B. error control
C. flow control
D. channel coding
Answer» E.