Data Communication MCQs | Interview Questions and Answers | Basic Computer Knowledge


Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits

   A.) 96 to 127
   B.) 0 to 63
   C.) 80 to 95
   D.) 64 to 79

Answer: Option 'A'

96 to 127


Working of the WAN generally involves?

   A.) ATM
   B.) Satellite
   C.) Frame delay
   D.) All of above

Answer: Option 'D'

All of above


Which of the following is used for modulation and demodulation?

   A.) Modem
   B.) Multiplexer
   C.) Protocols
   D.) Gateway

Answer: Option 'B'



In file transfer protocol, data transfer can be done in ______

   A.) stream mode
   B.) block mode
   C.) compressed mode
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned


What is the other name of a LAN card?

   A.) Modem
   B.) NIC
   C.) Network connector
   D.) Internet card

Answer: Option 'B'



In FTP protocol, client contacts server using ____ as the transport protocol.

   A.) transmission control protocol
   B.) user datagram protocol
   C.) datagram congestion control protocol
   D.) stream control transmission protocol

Answer: Option 'A'

transmission control protocol


Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is

   A.) use dual-stack approach
   B.) No solution
   C.) Tunneling
   D.) Replace the system

Answer: Option 'C'



These are the features present in IPv4 but not in IPv6.

   A.) Fragmentation
   B.) Header checksum
   C.) Options
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned


Which field helps to check rearrangement of the fragments?

   A.) offset
   B.) TTL
   C.) flag
   D.) identifier

Answer: Option 'A'



If the value in protocol field is 17, the transport layer protocol used is ____

   A.) TCP
   B.) UDP
   C.) Either (a) or (b)
   D.) FTP

Answer: Option 'B'



The conditional GET mechanism

   A.) Imposes conditions on the objects to be requested
   B.) Limits the number of response from a server
   C.) Helps to keep a cache upto date
   D.) All of the mentioned

Answer: Option 'C'

​Helps to keep a cache upto date


Which of the following is present in both an HTTP request line and a status line?

   A.) HTTP version number
   B.) URL
   C.) Method
   D.) All of the mentioned

Answer: Option 'A'

HTTP version number


Which of the following is not applicable for IP?

   A.) Error reporting
   B.) Handle addressing conventions
   C.) Datagram format
   D.) Packet handling conventions

Answer: Option 'A'

​Error reporting


Which of the following field in IPv4 datagram is not related to fragmentation?

   A.) Flags
   B.) Offset
   C.) TOS
   D.) Identifier

Answer: Option 'C'



The TTL field has value 10. How many routers (max) can process this datagram?

   A.) 11
   B.) 10
   C.) 15
   D.) 14

Answer: Option 'B'



Fragmentation has following demerits

   A.) complicates routers
   B.) open to DOS attack
   C.) overlapping of fragments
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned


In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?

   A.) Fragmentation field
   B.) ToS field
   C.) Fast-switching
   D.) Option field

Answer: Option 'B'

​ToS field


The header length of an IPv6 datagram is _____.

   A.) 40 bytes
   B.) 20 bytes
   C.) 10 bytes
   D.) 15 bytes

Answer: Option 'A'

​40 bytes


Which of the following is not correct?

   A.) Web cache does not has its own disk space
   B.) Web cache might reduce the response time
   C.) Web cache can act both like server and client
   D.) Web cache contains copies of recently requested objects

Answer: Option 'A'

Web cache does not has its own disk space


The HTTP response message leaves out the requested object when _____ method is used

   A.) GET
   B.) HEAD
   C.) POST
   D.) PUT

Answer: Option 'B'


Data Communication MCQs Download Pdf