MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 301. |
Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them. |
| A. | Half-trip time |
| B. | Round-trip time |
| C. | Travel time for the next router |
| D. | Time to reach the destination/source |
| Answer» C. Travel time for the next router | |
| 302. |
In case of time exceeded error, when the datagram visits a router, the value of time to live field is |
| A. | Remains constant |
| B. | Decremented by 2 |
| C. | Incremented by 1 |
| D. | Decremented by 1 |
| Answer» E. | |
| 303. |
The source-quench message in ICMP was designed to add a kind of ____________ to the IP |
| A. | Error control |
| B. | Flow control |
| C. | Router control |
| D. | None of the mentioned |
| Answer» C. Router control | |
| 304. |
When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram. |
| A. | Destination unreachable |
| B. | Source quench |
| C. | Router error |
| D. | Time exceeded |
| Answer» B. Source quench | |
| 305. |
ICMP error message will not be generated for a datagram having a special address such as |
| A. | 127.0.0.0 |
| B. | 12.1.2 |
| C. | 11.1 |
| D. | 127 |
| Answer» B. 12.1.2 | |
| 306. |
Which of these is not a type of error-reporting messages |
| A. | Destination unreachable |
| B. | Source quench |
| C. | Router error |
| D. | Time exceeded |
| Answer» D. Time exceeded | |
| 307. |
During error reporting, ICMP always reports error messages to |
| A. | Destination |
| B. | Source |
| C. | Next router |
| D. | Previous router |
| Answer» C. Next router | |
| 308. |
Header size of the ICMP message is |
| A. | 8-bytes |
| B. | 8-bits |
| C. | 16-bytes |
| D. | 16-bits |
| Answer» B. 8-bits | |
| 309. |
Internet Control Message Protocol(ICMP) has designed to compensate |
| A. | Error-reporting |
| B. | Error-correction |
| C. | Host and management queries |
| D. | All of the mentioned |
| Answer» E. | |
| 310. |
The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as |
| A. | Delivery of packets |
| B. | Error correction |
| C. | Multiplexing |
| D. | Demultiplexing |
| Answer» E. | |
| 311. |
In transport layer, Multiplexing is done at |
| A. | Channel |
| B. | Receiver site |
| C. | Sender site |
| D. | Packet |
| Answer» D. Packet | |
| 312. |
Correct order in the process of Connection-Oriented services is 1. Data transfer 2. Connection release 3. Connection establishment |
| A. | 1-2-3 |
| B. | 3-2-1 |
| C. | 2-1-3 |
| D. | 3-1-2 |
| Answer» E. | |
| 313. |
Which of the following is false with respect to Connectionless service of transport layer protocol? |
| A. | Packets are not numbered |
| B. | Packets are not delayed |
| C. | No acknowledgement |
| D. | Packet may arrive out of sequence |
| Answer» C. No acknowledgement | |
| 314. |
The combination of an IP address and port number is called as? |
| A. | Socket address |
| B. | Port address |
| C. | MAC address |
| D. | Host address |
| Answer» B. Port address | |
| 315. |
According to Internet Assigned Numbers Authority(IANA), which of the following range is not part of port number? |
| A. | Well-known ports |
| B. | Registered ports |
| C. | Dynamic ports |
| D. | Static ports |
| Answer» E. | |
| 316. |
Range of port numbers in Internet model is |
| A. | 0 and 32,765(8-bit) |
| B. | 0 and 32,765(16-bit) |
| C. | 0 and 65,535(32-bit) |
| D. | 0 and 65,535(16-bit) |
| Answer» E. | |
| 317. |
Multiple processes on destinations at transport layer are identified by: |
| A. | Mac address |
| B. | Port number |
| C. | Host number |
| D. | Host address |
| Answer» C. Host number | |
| 318. |
In process-to-process delivery, two processes communicate in which of the following methods? |
| A. | Client/Server |
| B. | Source/Destination |
| C. | Message Transfer |
| D. | None of the mentioned |
| Answer» B. Source/Destination | |
| 319. |
Which layer is responsible for process-to-process delivery? |
| A. | Physical layer |
| B. | Network layer |
| C. | Transport layer |
| D. | Application layer |
| Answer» D. Application layer | |
| 320. |
When IPV6 launched |
| A. | June 2, 2012 |
| B. | June 4, 2012 |
| C. | June 5, 2012 |
| D. | June 6, 2012 |
| Answer» E. | |
| 321. |
Which statement(s) about IPv6 addresses are true? |
| A. | Leading zeros are required |
| B. | Two colons (::) are used to represent successive hexadecimal fields of zeros |
| C. | Two colons (::) are used to separate fields |
| D. | A single interface cannot have multiple IPv6 addresses of different types |
| Answer» C. Two colons (::) are used to separate fields | |
| 322. |
In IPv6 addresses, addresses start with eight 0s are called |
| A. | Unicast addresses |
| B. | Multicast addresses |
| C. | Any cast addresses |
| D. | Reserved addresses |
| Answer» E. | |
| 323. |
A few leftmost bits in each address of IPv6 address define its category is called |
| A. | Prefix type |
| B. | Postfix type |
| C. | Reserved type |
| D. | Local type |
| Answer» B. Postfix type | |
| 324. |
In subcategories of reserved address in IPv6, address that is used by a host to test itself without going into network is called |
| A. | Unspecified address |
| B. | Loopback address |
| C. | Compatible address |
| D. | Mapped address |
| Answer» C. Compatible address | |
| 325. |
A link local address of local addresses is used in an |
| A. | Isolated router |
| B. | Isolated mask |
| C. | Isolated subnet |
| D. | Isolated net |
| Answer» D. Isolated net | |
| 326. |
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits |
| A. | 96 to 127 |
| B. | 0 to 63 |
| C. | 80 to 95 |
| D. | 64 to 79 |
| Answer» B. 0 to 63 | |
| 327. |
Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is |
| A. | Use dual-stack approach |
| B. | Tunneling |
| C. | No solution |
| D. | Replace the system |
| Answer» C. No solution | |
| 328. |
Dual-stack approach refers to |
| A. | Implementing Ipv4 with 2 stacks |
| B. | Implementing Ipv6 with 2 stacks |
| C. | Node has both IPv4 and IPv6 support |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 329. |
The _________ field determines the lifetime of IPv6 datagram |
| A. | Hop limit |
| B. | TTL |
| C. | Next header |
| D. | None of the mentioned |
| Answer» B. TTL | |
| 330. |
These are the features present in IPv4 but not in IPv6. |
| A. | Fragmentation |
| B. | Header checksum |
| C. | Options |
| D. | All of the mentioned |
| Answer» E. | |
| 331. |
IPv6 doesnot use _________ type of address |
| A. | Broadcast |
| B. | Multicast |
| C. | Anycast |
| D. | None of the mentioned |
| Answer» B. Multicast | |
| 332. |
In the IPv6 header,the traffic class field is similar to which field in the IPv4 header? |
| A. | Fragmentation field |
| B. | Fast-switching |
| C. | ToS field |
| D. | Option field |
| Answer» D. Option field | |
| 333. |
The header length of an IPv6 datagram is ___________ |
| A. | 10bytes |
| B. | 25bytes |
| C. | 30bytes |
| D. | 40bytes |
| Answer» E. | |
| 334. |
The size of IP address in IPv6 is |
| A. | 4bytes |
| B. | 128bits |
| C. | 8bytes |
| D. | 100bits |
| Answer» C. 8bytes | |
| 335. |
Which of this is not a class of IP address? |
| A. | ClassE |
| B. | ClassC |
| C. | ClassD |
| D. | ClassF |
| Answer» E. | |
| 336. |
Network addresses are very important concepts of |
| A. | Routing |
| B. | Mask |
| C. | IP Addressing |
| D. | Classless Addressing |
| Answer» D. Classless Addressing | |
| 337. |
In classful addressing, a large part of available addresses are |
| A. | Organized |
| B. | Blocked |
| C. | Wasted |
| D. | Communicated |
| Answer» D. Communicated | |
| 338. |
First address in a block is used as network address that represents the |
| A. | Class Network |
| B. | Entity |
| C. | Organization |
| D. | Codes |
| Answer» D. Codes | |
| 339. |
In IPv4 Addresses, classful addressing is replaced with |
| A. | Classless Addressing |
| B. | Classful Addressing |
| C. | Classful Advertising |
| D. | Classless Advertising |
| Answer» B. Classful Addressing | |
| 340. |
n classless addressing, there are no classes but addresses are still granted in |
| A. | IPs |
| B. | Blocks |
| C. | Codes |
| D. | Sizes |
| Answer» C. Codes | |
| 341. |
Which field helps to check rearrangement of the fragments? |
| A. | offset |
| B. | flag |
| C. | ttl |
| D. | identifer |
| Answer» B. flag | |
| 342. |
Fragmentation has following demerits |
| A. | complicates routers |
| B. | open to DOS attack |
| C. | overlapping of fragments. |
| D. | all of the mentioned |
| Answer» E. | |
| 343. |
Which of these is not applicable for IP protocol? |
| A. | is connectionless |
| B. | offer reliable service |
| C. | offer unreliable service |
| D. | none of the mentioned |
| Answer» C. offer unreliable service | |
| 344. |
What should be the flag value to indicate the last fragment? |
| A. | 0 |
| B. | 1 |
| C. | TTl value |
| D. | None of the mentioned |
| Answer» B. 1 | |
| 345. |
The data field can carry which of the following? |
| A. | TCP segemnt |
| B. | UDP segment |
| C. | ICMP messages |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 346. |
If the value in protocol field is 17, the transport layer protocol used is _____________ |
| A. | TCP |
| B. | UDP |
| C. | Either of the mentioned |
| D. | None of the mentioned |
| Answer» C. Either of the mentioned | |
| 347. |
The TTL field has value 10. How many routers (max) can process this datagram? |
| A. | 11 |
| B. | 5 |
| C. | 10 |
| D. | 1 |
| Answer» D. 1 | |
| 348. |
Which of the following field in IPv4 datagram is not related to fragmentation? |
| A. | Flags |
| B. | Offset |
| C. | TOS |
| D. | Identifier |
| Answer» D. Identifier | |
| 349. |
Which of the following is not applicable for IP? |
| A. | Error reporting |
| B. | Handle addressing conventions |
| C. | Datagram format |
| D. | Packet handling conventions |
| Answer» B. Handle addressing conventions | |
| 350. |
AJAX stands for |
| A. | asynchronous javascript and xml |
| B. | advanced JSP and xml |
| C. | asynchronous JSP and xml |
| D. | advanced javascript and xml |
| Answer» B. advanced JSP and xml | |