Data Communication MCQs | Interview Questions and Answers | Basic Computer Knowledge

1.

Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits

   A.) 96 to 127
   B.) 0 to 63
   C.) 80 to 95
   D.) 64 to 79

Answer: Option 'A'

96 to 127

DigitalOcean Referral Badge

2.

Working of the WAN generally involves?

   A.) ATM
   B.) Satellite
   C.) Frame delay
   D.) All of above

Answer: Option 'D'

All of above

DigitalOcean Referral Badge

3.

Which of the following is used for modulation and demodulation?

   A.) Modem
   B.) Multiplexer
   C.) Protocols
   D.) Gateway

Answer: Option 'B'

​Multiplexer

DigitalOcean Referral Badge

4.

In file transfer protocol, data transfer can be done in ______

   A.) stream mode
   B.) block mode
   C.) compressed mode
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned

DigitalOcean Referral Badge

5.

What is the other name of a LAN card?

   A.) Modem
   B.) NIC
   C.) Network connector
   D.) Internet card

Answer: Option 'B'

NIC

DigitalOcean Referral Badge

6.

In FTP protocol, client contacts server using ____ as the transport protocol.

   A.) transmission control protocol
   B.) user datagram protocol
   C.) datagram congestion control protocol
   D.) stream control transmission protocol

Answer: Option 'A'

transmission control protocol

DigitalOcean Referral Badge

7.

Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is

   A.) use dual-stack approach
   B.) No solution
   C.) Tunneling
   D.) Replace the system

Answer: Option 'C'

Tunneling

DigitalOcean Referral Badge

8.

These are the features present in IPv4 but not in IPv6.

   A.) Fragmentation
   B.) Header checksum
   C.) Options
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned

DigitalOcean Referral Badge

9.

Which field helps to check rearrangement of the fragments?

   A.) offset
   B.) TTL
   C.) flag
   D.) identifier

Answer: Option 'A'

offset

DigitalOcean Referral Badge

10.

If the value in protocol field is 17, the transport layer protocol used is ____

   A.) TCP
   B.) UDP
   C.) Either (a) or (b)
   D.) FTP

Answer: Option 'B'

UDP

DigitalOcean Referral Badge

11.

The conditional GET mechanism

   A.) Imposes conditions on the objects to be requested
   B.) Limits the number of response from a server
   C.) Helps to keep a cache upto date
   D.) All of the mentioned

Answer: Option 'C'

​Helps to keep a cache upto date

DigitalOcean Referral Badge

12.

Which of the following is present in both an HTTP request line and a status line?

   A.) HTTP version number
   B.) URL
   C.) Method
   D.) All of the mentioned

Answer: Option 'A'

HTTP version number

DigitalOcean Referral Badge

13.

Which of the following is not applicable for IP?

   A.) Error reporting
   B.) Handle addressing conventions
   C.) Datagram format
   D.) Packet handling conventions

Answer: Option 'A'

​Error reporting

DigitalOcean Referral Badge

14.

Which of the following field in IPv4 datagram is not related to fragmentation?

   A.) Flags
   B.) Offset
   C.) TOS
   D.) Identifier

Answer: Option 'C'

​TOS

DigitalOcean Referral Badge

15.

The TTL field has value 10. How many routers (max) can process this datagram?

   A.) 11
   B.) 10
   C.) 15
   D.) 14

Answer: Option 'B'

10

DigitalOcean Referral Badge

16.

Fragmentation has following demerits

   A.) complicates routers
   B.) open to DOS attack
   C.) overlapping of fragments
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned

DigitalOcean Referral Badge

17.

In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?

   A.) Fragmentation field
   B.) ToS field
   C.) Fast-switching
   D.) Option field

Answer: Option 'B'

​ToS field

DigitalOcean Referral Badge

18.

The header length of an IPv6 datagram is _____.

   A.) 40 bytes
   B.) 20 bytes
   C.) 10 bytes
   D.) 15 bytes

Answer: Option 'A'

​40 bytes

DigitalOcean Referral Badge

19.

Which of the following is not correct?

   A.) Web cache does not has its own disk space
   B.) Web cache might reduce the response time
   C.) Web cache can act both like server and client
   D.) Web cache contains copies of recently requested objects

Answer: Option 'A'

Web cache does not has its own disk space

DigitalOcean Referral Badge

20.

The HTTP response message leaves out the requested object when _____ method is used

   A.) GET
   B.) HEAD
   C.) POST
   D.) PUT

Answer: Option 'B'

HEAD

DigitalOcean Referral Badge

21.

Find the oddly matched HTTP status codes

   A.) 200 OK
   B.) 301 Moved permanently
   C.) 400 Bad Request
   D.) 304 Not Found

Answer: Option 'D'

304 Not Found

DigitalOcean Referral Badge

22.

The values GET, POST, HEAD etc are specified in ____ of HTTP message

   A.) Request line
   B.) Status line
   C.) Header line
   D.) Entity line

Answer: Option 'A'

Request line

DigitalOcean Referral Badge

23.

The first line of HTTP request message is called ____

   A.) Request line
   B.) Header line
   C.) Status line
   D.) Entity line

Answer: Option 'A'

​Request line

DigitalOcean Referral Badge

24.

In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.

   A.) 1
   B.) 2
   C.) 3
   D.) 4

Answer: Option 'A'

1

DigitalOcean Referral Badge

25.

The HTTP request message is sent in ____ part of three-way handshake.

   A.) First
   B.) Second
   C.) Third
   D.) Fourth

Answer: Option 'C'

​Third

DigitalOcean Referral Badge

26.

The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______

   A.) 1
   B.) 3
   C.) 5
   D.) 4

Answer: Option 'C'

5

DigitalOcean Referral Badge

27.

Find the FTP reply whose message is wrongly matched

   A.) 331 – Username OK, password required
   B.) 425 – Can't open data connection
   C.) 452 – Error writing file
   D.) 452 – Can't open data connection

Answer: Option 'D'

452 – Can't open data connection

DigitalOcean Referral Badge

28.

The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format

   A.) 8
   B.) 7
   C.) 3
   D.) 5

Answer: Option 'B'

7

DigitalOcean Referral Badge

29.

If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is

   A.) 2
   B.) 4
   C.) 6
   D.) 10

Answer: Option 'C'

6

DigitalOcean Referral Badge

30.

Identify the incorrect statement

   A.) FTP stands for File Transfer Protocol
   B.) FTP sends exactly one file over the data connection
   C.) FTP sends its control information in-band
   D.) FTP uses two parallel TCP connections

Answer: Option 'C'

​FTP sends its control information in-band

DigitalOcean Referral Badge

31.

When the sender and the receiver of an email are on different systems, we need only ______ .

   A.) One MTA
   B.) Two UAs
   C.) Two UAs and one pair of MTAs
   D.) Two UAs and two pairs of MTAs

Answer: Option 'D'

Two UAs and two pairs of MTAs

DigitalOcean Referral Badge

32.

User agent does not support this

   A.) Composing messages
   B.) Reading messages
   C.) Replying messages
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned

DigitalOcean Referral Badge

33.

What is on-demand mail relay (ODMR)?

   A.) protocol for SMTP security
   B.) an SMTP extension
   C.) protocol for web pages
   D.) all of the mentioned

Answer: Option 'B'

​an SMTP extension

DigitalOcean Referral Badge

34.

A SMTP session may include

   A.) zero SMTP transaction
   B.) one SMTP transaction
   C.) more than one SMTP transaction
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned

DigitalOcean Referral Badge

35.

SMTP defines

   A.) message transport
   B.) message encryption
   C.) message content
   D.) all of the mentioned

Answer: Option 'A'

message transport

DigitalOcean Referral Badge

36.

In SMTP, the command to write receivers mail address is written with this command

   A.) SEND TO
   B.) MAIL TO
   C.) RCPT TO
   D.) EMAIL FOR

Answer: Option 'C'

​RCPT TO

DigitalOcean Referral Badge

37.

Typically the TCP port used by SMTP is

   A.) 25
   B.) 35
   C.) 10
   D.) 15

Answer: Option 'A'

25

DigitalOcean Referral Badge

38.

A session may include

   A.) Zero or more SMTP transactions
   B.) Exactly one SMTP transactions
   C.) Always more than one SMTP transactions
   D.) Number of SMTP transactions cannot be determined

Answer: Option 'A'

​Zero or more SMTP transactions

DigitalOcean Referral Badge

39.

Which one of the following protocol is used to receive mail messages?

   A.) SMTP
   B.) post office protocol
   C.) internet message access protocol
   D.) all of the mentioned

Answer: Option 'D'

​all of the mentioned

DigitalOcean Referral Badge

40.

SMTP uses the TCP port

   A.) 22
   B.) 23
   C.) 25
   D.) 24

Answer: Option 'C'

25

DigitalOcean Referral Badge

41.

Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.

   A.) TCP
   B.) UDP
   C.) DCCP
   D.) SCTP

Answer: Option 'A'

​TCP

DigitalOcean Referral Badge

42.

What is DHCP snooping?

   A.) techniques applied to ensure the security of an existing DHCP infrastructure
   B.) encryption of the DHCP server requests
   C.) algorithm for DHCP
   D.) all of the mentioned

Answer: Option 'A'

techniques applied to ensure the security of an existing DHCP infrastructure

DigitalOcean Referral Badge

43.

DHCP client and servers on the same subnet communicate via

   A.) UDP broadcast
   B.) UDP unicast
   C.) TCP broadcast
   D.) TCP unicast

Answer: Option 'A'

UDP broadcast

DigitalOcean Referral Badge

44.

The DHCP server can provide the _______ of the IP addresses.

   A.) dynamic allocation
   B.) static allocation
   C.) automatic allocation
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned

DigitalOcean Referral Badge

45.

DHCP uses UDP port ____ for sending data to the server.

   A.) 66
   B.) 67
   C.) 68
   D.) 69

Answer: Option 'B'

67

DigitalOcean Referral Badge

46.

Voice privacy in GSM cellular telephone protocol is provided by

   A.) b5/4 cipher
   B.) b5/6 cipher
   C.) A5/2 cipher
   D.) b5/8 cipher

Answer: Option 'C'

A5/2 cipher

DigitalOcean Referral Badge

47.

IPSec is designed to provide the security at the

   A.) transport layer
   B.) network layer
   C.) application layer
   D.) session layer

Answer: Option 'B'

network layer

DigitalOcean Referral Badge

48.

An attempt to make a computer resource unavailable to its intended users is called

   A.) virus attack
   B.) worms attack
   C.) denial-of-service attack
   D.) botnet process

Answer: Option 'C'

​denial-of-service attack

DigitalOcean Referral Badge

49.

In tunnel mode IPsec protects the

   A.) entire IP packet
   B.) IP payload
   C.) IP header
   D.) Either b or c

Answer: Option 'A'

entire IP packet

DigitalOcean Referral Badge

50.

Pretty good privacy (PGP) is used in

   A.) browser security
   B.) FTP security
   C.) email security
   D.) All of the above

Answer: Option 'C'

​email security

DigitalOcean Referral Badge

Data Communication MCQs Download Pdf