Explore topic-wise MCQs in Computer Networks.

This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks knowledge and support exam preparation. Choose a topic below to get started.

1.

In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ___________

A. 10101111 10100011
B. 01010000 01011100
C. 10101111 01011100
D. 01010000 10100011
Answer» B. 01010000 01011100
2.

In windows ____________ can be used to trace the route of the packet from the source to the destination.

A. traceroute
B. tracert
C. ping
D. locater
Answer» C. ping
3.

During debugging, we can use the ____________ program to find if a host is alive and responding.

A. traceroute
B. shell
C. ping
D. java
Answer» D. java
4.

Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.

A. Half-trip time
B. Round-trip time
C. Travel time for the next router
D. Time to reach the destination/source
Answer» C. Travel time for the next router
5.

In case of time exceeded error, when the datagram visits a router, the value of time to live field is _________

A. Remains constant
B. Decremented by 2
C. Incremented by 1
D. Decremented by 1
Answer» E.
6.

When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram.

A. Destination unreachable
B. Source quench
C. Router error
D. Time exceeded
Answer» B. Source quench
7.

ICMP error message will not be generated for a datagram having a special address such as _______

A. 127.0.0.0
B. 12.1.2
C. 11.1
D. 127
Answer» B. 12.1.2
8.

Internet Control Message Protocol (ICMP) has been designed to compensate _________

A. Error-reporting
B. Error-correction
C. Host and management queries
D. All of the mentioned
Answer» E.
9.

TWO_MACHINES_CAN_USE_THE_TIMESTAMP_REQUEST_AND_TIMESTAMP_REPLAY_MESSAGES_TO_DETERMINE_THE_____________NEEDED_FOR_AN_IP_DATAGRAM_TO_TRAVEL_BETWEEN_THEM.?$

A. Half-trip time
B. Round-trip time
C. Travel time for the next router
D. Time to reach the destination/source
Answer» C. Travel time for the next router
10.

In windows, ____________ can be used to trace the route of the packet from the source to the destination$

A. Traceroute
B. Tracert
C. Ping
D. Locater
Answer» C. Ping
11.

During debugging, we can use the ____________ program to find if a host is alive and responding$

A. Traceroute
B. Shell
C. Ping
D. Java
Answer» D. Java
12.

In case of time exceeded error, when the datagram visits a router, the value of time to live field i?

A. Remains constant
B. Decremented by 2
C. Incremented by 1
D. Decremented by 1
Answer» E.
13.

The source-quench message in ICMP was designed to add a kind of ____________ to the IP.

A. Error control
B. Flow control
C. Router control
D. None of the mentioned
Answer» C. Router control
14.

ICMP error message will not be generated for a datagram having a special address such as

A. 127.0.0.0
B. 12.1.2
C. 11.1
D. 127
Answer» B. 12.1.2
15.

During error reporting, ICMP always reports error messages to

A. Destination
B. Source
C. Next router
D. Previous router
Answer» C. Next router