Explore topic-wise MCQs in Computer Networks.

This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks knowledge and support exam preparation. Choose a topic below to get started.

1.

_________ does not provide reliable end to end communication.

A. TCP
B. UDP
C. Both TCP and UDP
D. Neither TCP nor UDP
Answer» C. Both TCP and UDP
2.

FCP stands for _________

A. Fiber Channel Protocol
B. Field Channel Protocol
C. Fast Channel Protocol
D. Fiber Carrying Protocol
Answer» B. Field Channel Protocol
3.

Congestion control can control traffic entry into a telecommunications network, so to avoid _________

A. Congestive connection
B. Connection collapse
C. Congestive collapse
D. Collapse congestive
Answer» D. Collapse congestive
4.

Transport layer is which layer in OSI model?

A. Fourth layer
B. Third layer
C. Second layer
D. Fifth layer
Answer» B. Third layer
5.

Transport layer receives data in the form of __________

A. Packets
B. Byte streams
C. Bits stream
D. Both packets and Byte stream
Answer» C. Bits stream
6.

Transport layer can identify the symptoms of overload nodes using _________

A. Flow control
B. Traffic control
C. Byte orientation
D. Data integrity
Answer» C. Byte orientation
7.

What are the functions of the transport layer?

A. Multiplexing/ Demultiplexing
B. Connection less Services
C. Connection oriented service
D. Congestion control
Answer» B. Connection less Services
8.

Transport layer protocols deals with ____________

A. application to application communication
B. process to process communication
C. node to node communication
D. man to man communication
Answer» C. node to node communication
9.

An endpoint of an inter-process communication flow across a computer network is called __________

A. socket
B. pipe
C. port
D. machine
Answer» B. pipe
10.

Which of the following are transport layer protocols used in networking?

A. TCP and FTP
B. UDP and HTTP
C. TCP and UDP
D. HTTP and FTP
Answer» D. HTTP and FTP
11.

Transport layer aggregates data from different applications into a single stream before passing it to ____________

A. network layer
B. data link layer
C. application layer
D. physical layer
Answer» B. data link layer
12.

TRANSPORT_LAYER_IS_WHICH_LAYER_IN_OSI_MODEL??$

A. Fourth layer
B. Third layer
C. Second layer
D. Fifth layer
Answer» B. Third layer
13.

WHICH_ONE_OF_THE_FOLLOWING_IS_A_TRANSPORT_LAYER_PROTOCOL??$

A. stream control transmission protocol
B. internet control message protocol
C. neighbor discovery protocol
D. dynamic host configuration protocol
Answer» B. internet control message protocol
14.

TRANSPORT_LAYER_RECEIVES_DATA_IN_THE_FORM_OF___________?$

A. Packets
B. Byte streams
C. Bits stream
D. Both packets and Byte stream
Answer» C. Bits stream
15.

TRANSPORT_LAYER_PROTOCOLS_DEALS_WITH?$

A. application to application communication
B. process to process communication
C. node to node communication
D. none of the mentioned
Answer» C. node to node communication
16.

Congestion control can control traffic entry into a telecommunications network, so to avoid _________$

A. Congestive connection
B. Connection collapse
C. Congestive collapse
D. Collapse congestive
Answer» D. Collapse congestive
17.

ARQ stands for __________

A. Automatic Repeat Request
B. Automatic Request Repeat
C. Application Repeat Request
D. Application Request Repeat
Answer» B. Automatic Request Repeat
18.

_________ do not provide end to end communication.

A. TCP
B. UDP
C. Both TCP and UDP
D. Neither TCP nor UDP
Answer» C. Both TCP and UDP
19.

UDP packets are called as _________

A. Segments
B. Checksum
C. Frames
D. Datagrams
Answer» E.
20.

Transport layer can identify the symptoms of overload nodes using ________?

A. Flow control
B. Traffic control
C. Byte orientation
D. Data integrity
Answer» C. Byte orientation
21.

A _____ is a TCP name for a transport service access point?

A. port
B. pipe
C. node
D. none of the mentioned
Answer» B. pipe
22.

Buffer overrun can be reduced by using what?

A. Traffic control
B. Flow control
C. Byte orientation
D. Data integrity
Answer» C. Byte orientation
23.

Using which method in transport layer data integrity can be ensured?

A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correcting codes
Answer» B. Repetition codes
24.

Socket-style API for windows is called

A. wsock
B. winsock
C. wins
D. none of the mentioned
Answer» C. wins
25.

TCP is the standard protocol with std no?

A. 5
B. 4
C. 7
D. 3
Answer» D. 3
26.

Security based connection is provided by which layer?

A. Network layer
B. Session layer
C. Application layer
D. Transport layer
Answer» E.
27.

Transmission control protocol is

A. connection oriented protocol
B. uses a three way handshake to establish a connection
C. recievs data from application as a single stream
D. all of the mentioned
Answer» E.
28.

TCP and UDP are called ________

A. Application protocols
B. Session protocols
C. Transport protocols
D. Network protocols
Answer» D. Network protocols
29.

User datagram protocol is called connectionless because

A. all UDP packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. it is received in the same order as sent order
D. none of the mentioned
Answer» B. it sends data as a stream of related packets
30.

Which services are provided by transport layer?

A. Error control
B. Connection service
C. Connection less service
D. Congestion control
Answer» B. Connection service