This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Transport Layer”. 1. Transport layer aggregates data from different applications into a single stream before passing it to ____________ a) network layer b) data link layer c) application layer d) physical layer Answer: a Explanation: The flow of data in the OSI model flows in following manner Application -> Presentation -> Session -> Transport -> Network -> Data Link -> Physical. Each and every layer has its own set of functions and protocols to ensure efficient network performance. 2. Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP Answer: c Explanation: Both TCP and UDP are transport layer protocol in networking. TCP is an abbreviation for Transmission Control Protocol and UDP is an abbreviation for User Datagram Protocol. TCP is connection oriented whereas UDP is connectionless. 3. User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly Answer: a Explanation: UDP is an alternative for TCP and it is used for those purposes where speed matters most whereas loss of data is not a problem. UDP is connectionless whereas TCP is connection oriented. 4. Transmission control protocol ___________ a) is a connection-oriented protocol b) uses a three way handshake to establish a connection c) receives data from application as a single stream d) all of the mentioned Answer: d Explanation: TCP provides reliable and ordered delivery of a stream of bytes between hosts communicating via an IP network. Major internet applications like www, email, file transfer etc rely on TCP. TCP is connection oriented and it is optimized for accurate delivery rather than timely delivery. 5. An endpoint of an inter-process communication flow across a computer network is called __________ a) socket b) pipe c) port d) machine Answer: a Explanation: Socket is one end point in a two way communication link in the network. TCP layer can identify the application that data is destined to be sent by using the port number that is bound to socket. 6. Socket-style API for windows is called ____________ a) wsock b) winsock c) wins d) sockwi Answer: b Explanation: Winsock is a programming interface which deals with input output requests for internet applications in windows OS. It defines how windows network software should access network services. 7. Which one of the following is a version of UDP with congestion control? a) datagram congestion control protocol b) stream control transmission protocol c) structured stream transport d) user congestion control protocol Answer: a Explanation: The datagram congestion control is a transport layer protocol which deals with reliable connection setup, teardown, congestion control, explicit congestion notification, and feature negotiation. It is used in modern day systems where there are really high chances of congestion. The protocol was last updated in the year 2008. 8. A _____ is a TCP name for a transport service access point. a) port b) pipe c) node d) protocol Answer: a Explanation: Just as the IP address identifies the computer, the network port identifies the application or service running on the computer. A port number is 16 bits. The combination of IP address preceded with the port number is called the socket address. 9. Transport layer protocols deals with ____________ a) application to application communication b) process to process communication c) node to node communication d) man to man communication Answer: b Explanation: Transport layer is 4th layer in TCP/IP model and OSI reference model. It deals with logical communication between process. It is responsible for delivering a message between network host. 10. Which of the following is a transport layer protocol? a) stream control transmission protocol b) internet control message protocol c) neighbor discovery protocol d) dynamic host configuration protocol Answer: a Explanation: The Stream Control Transmission Protocol (SCTP) is a transport layer protocol used in networking system where streams of data are to be continuously transmitted between two connected network nodes. Some of the other transport layer protocols are RDP, RUDP, TCP, DCCP, UDP etc. • Question 1 Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? answer choices The client randomly selects a source port number. The client sends a synchronization segment to begin the session. The client sets the window size for the session The client sends an ISN to the server to start the 3-way handshake. • Question 2 Which number or set of numbers represents a socket? answer choices 10.1.1.15 01-23-45-67-89-AB 21 192.168.1.1:80 • Question 3 Which transport layer feature is used to guarantee session establishment? answer choices UDP ACK flag TCP 3-way handshake TCP port number UDP sequence number • Question 4 What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in proper sequence? answer choices Session Transport Data link network • Question 5 What is an advantage of UDP over TCP? answer choices UDP communication is more reliable. UDP communication requires less overhead. UDP reorders segments that are received out of order. UDP acknowledges received data. • Question 6 T/F Multiplexing divides the data into smaller segments and enables communications from many different users to be interleaved answer choices True False • Question 7 T/F The Transport layer is responsible for managing reliability requirements of a conversation answer choices False True • Question 8 T/F UDP is also known as a best-effort delivery protocol answer choices True False • Question 9 T/F UDP is a stateful protocol that keeps track of the state of the communication session answer choices False True • Question 10 POP3 port number is answer choices 23 110 161 80 • Question 11 HTTP/HTTPS port number answer choices 80 and 443 80 and 445 67 and 68 161 and 69 • Question 12 Which TCP header control bit is set on to terminate a TCP conversation answer choices UrG ACK PSH FIN • Question 13 What is assigned by the transport layer to identify an application or service answer choices Segment Packet Port IP Address • Question 14 Ephemeral Ports - also known as? answer choices Well-known Registered Dynamic or Private • Question 15 Who assigns Registered Ports answer choices ICANN IANA RIPE IETF • Question 16 What is the purpose of using a source port number in a TCP communication? answer choices to notify the remote device that the conversation is over to keep track of multiple conversations between devices to assemble the segments that arrived out of order to inquire for a non-received segment • Question 17 T/F Only one host needs to support SACK answer choices True False 1. Explain the main idea of UDP? The basic idea is for a source process to send a message to a port and for the destination process to receive the message from a port. 2. What are the different fields in pseudo header? · Protocol number · Source IP address · Destination IP addresses. 3. Define TCP? TCP guarantees the reliable, in order delivery of a stream of bytes. It is a fullduplex protocol, meaning that each TCP connection supports a pair of byte streams, one flowing in each direction. 4. Define Congestion Control? It involves preventing too much data from being injected into the network, thereby causing switches or links to become overloaded. Thus flow control is an end to an end issue, while congestion control is concerned with how hosts and networks interact. 5. State the two kinds of events trigger a state transition? · A segment arrives from the peer. · The local application process invokes an operation on TCP. 6. What is meant by segment? At the sending and receiving end of the transmission, TCP divides long transmissions into smaller data units and packages each into a frame called a segment. 7. What is meant by segmentation? When the size of the data unit received from the upper layer is too long for the network layer datagram or data link layer frame to handle, the transport protocol divides it into smaller usable blocks. The dividing process is called segmentation. 8. What is meant by Concatenation? The size of the data unit belonging to single sessions are so small that several can fit together into a single datagram or frame, the transport protocol combines them into a single data unit. The combining process is called concatenation. 9. What is rate based design? Rate- based design, in which the receiver tells the sender the rate-expressed in either bytes or packets per second – at which it is willing to accept incoming data. 10. Define Gateway. A device used to connect two separate networks that use different communication protocols. 11. What is meant by quality of service? The quality of service defines a set of attributes related to the performance of the connection. For each connection, the user can request a particular attribute each service class is associated with a set of attributes. 12. What are the two categories of QoS attributes? The two main categories are, · User Oriented · Network Oriented 13. List out the user related attributes? User related attributes are SCR – Sustainable Cell Rate PCR – Peak Cell Rate MCRMinimum Cell Rate CVDT – Cell Variation Delay Tolerance. 14. What are the networks related attributes? The network related attributes are, Cell loss ratio (CLR) Cell transfer delay (CTD) Cell delay variation (CDV) Cell error ratio (CER). 15. What is RED? Random Early Detection in each router is programmed to monitor its own queue length and when it detects that congestion is imminent, to notify the source to adjust its congestion window. 16. What are the three events involved in the connection? For security, the transport layer may create a connection between the two end ports. A connection is a single logical path between the source and destination that is associated with all packets in a message. Creating a connection involves three steps: · Connection establishment · Data transfer · Connection release 17.What is Silly Window Syndrome? If the sender or the receiver application program processes slowly and can send only 1 byte of data at a time, then the overhead is high.This is because to send one byte of data, 20 bytes of TCP header and 20 bytes of IP header are sent. This is called as silly window syndrome. 1. Transport layer aggregates data from different applications into a single stream before passing it to: • • • • A. network layer B. data link layer C. application layer D. physical layer 2. Which one of the following is a transport layer protocol used in internet? • • • • A. TCP B. UDP C. both (a) and (b) D. none of the mentioned 3. User datagram protocol is called connectionless because: • • • • A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. both (a) and (b) D. none of the mentioned 4. Transmission control protocol is: • A. connection oriented protocol • B. uses a three way handshake to establish a connection • C. recievs data from application as a single stream • D. All of the mentioned 5. An endpoint of an inter-process communication flow across a computer network is called: • • • • A. socket B. pipe C. port D. none of the mentioned 6. Socket-style API for windows is called: • • • • A. wsock B. winsock C. wins D. none of the mentioned 7. Which one of the following is a version of UDP with congestion control? • • • • A. datagram congestion control protocol B. stream control transmission protocol C. structured stream transport D. none of the mentioned 8. A _____ is a TCP name for a transport service access point. • • • • A. port B. pipe C. node D. none of the mentioned 9. Transport layer protocols deals with: • • • • A. application to application communication B. process to process communication C. node to node communication D. none of the mentioned 10. Which one of the following is a transport layer protocol? • • • • A. stream control transmission protocol B. internet control message protocol C. neighbor discovery protocol D. dynamic host configuration protocol 1. An endpoint of an inter-process communication flow across a computer network is called A.) socket B.) pipe C.) port D.) none of these Answer: Option 'A' socket 2. Which one of the following is a transport layer protocol? A.) stream control transmission protocol B.) neighbor discovery protocol C.) internet control message protocol D.) dynamic host configuration protocol Answer: Option 'A' dynamic host configuration protocol 3. Transmission control protocol is A.) connection oriented protocol B.) uses a three way handshake to establish a connection C.) recievs data from application as a single stream D.) all of these Answer: Option 'D' all of these 4. Transport layer aggregates data from different applications into a single stream before passing it to A.) application layer B.) network layer C.) data link layer D.) physical layer Answer: Option 'B' network layer 5. Which one of the following is a transport layer protocol used in internet? A.) TCP B.) UDP C.) both (a) and (b) D.) none of these Answer: Option 'C' both (a) and (b) 1. Transport layer aggregates data from different applications into a single stream before passing it to A.) application layer B.) network layer C.) data link layer D.) physical layer Answer: Option 'B' network layer 2. Transmission control protocol is A.) connection oriented protocol B.) uses a three way handshake to establish a connection C.) recievs data from application as a single stream D.) all of these Answer: Option 'D' all of these 3. A _____ is a TCP name for a transport service access point. A.) pipe B.) port C.) node D.) none of these Answer: Option 'B' port 4. Socket-style API for windows is called A.) wsock B.) winsock C.) wins D.) None of these Answer: Option 'B' winsock 5. Which one of the following is a transport layer protocol used in internet? A.) TCP B.) UDP C.) both (a) and (b) D.) none of these Answer: Option 'C' both (a) and (b) 6. Transport layer protocols deals with A.) application to application communication B.) process to process communication C.) node to node communication D.) none of these Answer: Option 'B' process to process communication 7. Socket-style API for windows is called A.) wsock B.) winsock C.) wins D.) None of these Answer: Option 'B' winsock 8. User datagram protocol is called connectionless because A.) all UDP packets are treated independently by transport layer B.) it sends data as a stream of related packets C.) both (a) and (b) D.) None of these Answer: Option 'C' both (a) and (b) 9. A _____ is a TCP name for a transport service access point. A.) pipe B.) port C.) node D.) none of these Answer: Option 'B' port 10. Transport layer aggregates data from different applications into a single stream before passing it to A.) application layer B.) network layer C.) data link layer D.) physical layer Answer: Option 'B' network layer 11. User datagram protocol is called connectionless because A.) all UDP packets are treated independently by transport layer B.) it sends data as a stream of related packets C.) both (a) and (b) D.) None of these Answer: Option 'C' both (a) and (b) 1. Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this? • The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination. • The source decreases the window size to decrease the rate of transmission from the destination. • The destination decreases the window size. • The destination sends fewer acknowledgement messages in order to conserve bandwidth. Explanation: If the source determines that the TCP segments are either not being acknowledged or are not acknowledged in a timely manner, then it can reduce the number of bytes it sends before receiving an acknowledgment. This does not involve changing the window in the segment header. The source does not decrease the window that is sent in the segment header. The window in the segment header is adjusted by the destination host when it is receiving data faster than it can process it, not when network congestion is encountered. 2. Which two operations are provided by TCP but not by UDP? (Choose two.) • • • • • identifying the applications acknowledging received data tracking individual conversations retransmitting any unacknowledged data reconstructing data in the order received Explanation: Numbering and tracking data segments, acknowledging received data, and retransmitting any unacknowledged data are reliability operations to ensure that all of the data arrives at the destination. UDP does not provide reliability. Both TCP and UDP identify the applications and track individual conversations. UDP does not number data segments and reconstructs data in the order that it is received. 3. What is the TCP mechanism used in congestion avoidance? • • • • three-way handshake socket pair two-way handshake sliding window Explanation: TCP uses windows to attempt to manage the rate of transmission to the maximum flow that the network and destination device can support while minimizing loss and retransmissions. When overwhelmed with data, the destination can send a request to reduce the of the window. This congestion avoidance is called sliding windows. 4. What is a responsibility of transport layer protocols? • • • • providing network access tracking individual conversations determining the best path to forward a packet translating private IP addresses to public IP addresses Explanation: There are three main responsibilities for transport layer protocols TCP and UDP: • Tracking individual conversations • Segmenting data and reassembling segments • Identifying the applications 5. How does a networked server manage requests from multiple clients for different services? • • • • The server sends all requests through a default gateway. Each request is assigned source and destination port numbers. The server uses IP addresses to identify different services. Each request is tracked through the physical address of the client. Explanation: Each service provided by a server, such as email or file transfers, uses a specific port number. The source port number of a service request identifies the client that is requesting services. The destination port number identifies the specific service. Servers do not use address information to provide services. Routers and switches use addressing information to move traffic through the network. 6. Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two) • • • • • FTP DNS HTTP POP3 VoIP Explanation: Both DNS and VoIP use UDP to provide low overhead services within a network implementation. 7. What is the purpose of using a source port number in a TCP communication? • • • • to notify the remote device that the conversation is over to assemble the segments that arrived out of order to keep track of multiple conversations between devices to inquire for a nonreceived segment Explanation: The source port number in a segment header is used to keep track of multiple conversations between devices. It is also used to keep an open entry for the response from the server. The incorrect options are more related to flow control and guaranteed delivery. 8. Which number or set of numbers represents a socket? • • • • 01-23-45-67-89-AB 21 192.168.1.1:80 10.1.1.15 Explanation: A socket is defined by the combination of an IP address and a port number, and uniquely identifies a particular communication. 9. Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.) • • • • • • ACK FIN PSH RST SYN URG Explanation: TCP uses the SYN and ACK flags in order to establish connectivity between two network devices. 10. What happens if part of an FTP message is not delivered to the destination? • The message is lost because FTP does not use a reliable delivery method. • The FTP source host sends a query to the destination host. • The part of the FTP message that was lost is re-sent. • The entire FTP message is re-sent. Explanation: Because FTP uses TCP as its transport layer protocol, sequence and acknowledgment numbers will identify the missing segments, which will be re-sent to complete the message. 11. What type of applications are best suited for using UDP? • • • • applications that are sensitive to delay applications that need reliable delivery applications that require retransmission of lost segments applications that are sensitive to packet loss Explanation: UDP is not a connection-oriented protocol and does not provide retransmission, sequencing, or flow control mechanisms. It provides basic transport layer functions with a much lower overhead than TCP. Lower overhead makes UDP suitable for applications which are sensitive to delay. 12. Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? • • • • The client sets the window size for the session. The client sends an ISN to the server to start the 3-way handshake. The client randomly selects a source port number. The client sends a synchronization segment to begin the session. Explanation: Because a session does not have to be established for UDP, the client selects a random source port to begin a connection. The random port number selected is inserted into the source port field of the UDP header. 13. Which transport layer feature is used to guarantee session establishment? • • • • UDP ACK flag TCP 3-way handshake UDP sequence number TCP port number Explanation: TCP uses the 3-way handshake. UDP does not use this feature. The 3-way handshake ensures there is connectivity between the source and destination devices before transmission occurs. 14. What is the complete range of TCP and UDP well-known ports? • • • • 0 to 255 0 to 1023 256 – 1023 1024 – 49151 Explanation: There are three ranges of TCP and UDP ports. The well-know range of port numbers is from 0 – 1023. 15. What is a socket? • the combination of the source and destination IP address and source and destination Ethernet address • the combination of a source IP address and port number or a destination IP address and port number • the combination of the source and destination sequence and acknowledgment numbers • the combination of the source and destination sequence numbers and port numbers Explanation: A socket is a combination of the source IP address and source port or the destination IP address and the destination port number. Question 1 DHCP allows both manual and automatic assignment of IP addresses. True or False? True False • Question 2 In version field of IPv4 header, when machine is using some other version of IPv4 then datagram is Accepted Discarded Interpreted Interpreted incorrectly • Question 3 Network layer at source is responsible for creating a packet from data coming from another __________. Link Node Station Protocol • Question 4 Header of datagram in IPv4 has __________. 0 to 20 bytes 20 to 40 bytes 20 to 60 bytes 20 to 80 bytes • Question 5 In IPv4, service type of service in header field, first 3 bits are called __________. Type of service Code bits Sync bits Precedence bits • Question 6 In IPv4, only thing encapsulated in a frame is _____. Unit Datagram Adresses Data Frame • Question 7 In Internetwork, network layer is responsible for _______. Host to User Link User to Host IP Host to Host Delivery Host to Server communication • Question 8 In IPv4, fragmented datagram's fragment size should have first byte number divisible by _________. 2 4 8 16 • Question 9 In IPv4 protocol, each datagram is handled ____________. independently dependently priority basis systematically • Question 10 IPv6 is designed to allow extension of the ___________. Protocol Routes DataSet Headers • Question 11 Dividing a network address into smaller networks can be called as ___________. encapsulation subnetting decapsulation fragmentation • Question 13 IPv6 consists of _____ bits. 32 64 128 256 • Question 14 IPv4 consists of ______ bits. 8 16 32 64 • Question 15 ICANN: Internet Corporation for Assigned Names and Numbers task: manages DNS allocates addresses both answer 1. The network layer concerns with: • • • • A. bits B. frames C. packets D. none of the mentioned 2. Which one of the following is not a function of network layer? • • • • A. routing B. inter-networking C. congestion control D. none of the mentioned 3. The 4 byte IP address consists of: • A. network address • B. host address • C. both (a) and (b) • D. none of the mentioned 4. In virtual circuit network each packet contains: • • • • A. full source and destination address B. a short VC number C. both (a) and (b) D. none of the mentioned 5. Which one of the following routing algorithm can be used for network layer design? • • • • A. shortest path algorithm B. distance vector routing C. link state routing D. all of the mentioned 6. Multidestination routing: • • • • A. is same as broadcast routing B. contains the list of all destinations C. data is not sent by packets D. none of the mentioned 7. A subset of a network that includes all the routers but contains no loops is called: • • • • A. spanning tree B. spider structure C. spider tree D. none of the mentioned 8. Which one of the following algorithm is not used for congestion control? • • • • A. traffic aware routing B. admission control C. load shedding D. none of the mentioned 9. The network layer protocol of internet is: • • • • A. ethernet B. internet protocol C. hypertext transfer protocol D. none of the mentioned 10. ICMP is primarily used for: • • • • A. error and diagnostic functions B. addressing C. forwarding D. none of the mentioned 1. The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes View Answer Answer: c Explanation: In computer networks, the data from the application layer is sent to the transport layer and is converted to segments. These segments are then transferred to the network layer and these are called packets. These packets are then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical layer where the frames are converted to bits. 2. Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control View Answer Answer: d Explanation: In the OSI model, network layer is the third layer and it provides data routing paths for network communications. Error control is a function of the data link layer and the transport layer. 3. A 4 byte IP address consists of __________ a) only network address b) only host address c) network address & host address d) network address & MAC address View Answer Answer: c Explanation: An ip address which is 32 bits long, that means it is of 4 bytes and is composed of a network and host portion and it depends on address class. The size of the host address and network address depends upon the class of the address in classful IP addressing. 4. In virtual circuit network each packet contains ___________ a) full source and destination address b) a short VC number c) only source address d) only destination address View Answer Answer: b Explanation: A short VC number also called as VCID (virtual circuit identifier) is a type of identifier which is used to distinguish between several virtual circuits in a connection oriented circuit switched network. Each virtual circuit is used to transfer data over a larger packet switched network. 5. Which of the following routing algorithms can be used for network layer design? a) shortest path algorithm b) distance vector routing c) link state routing d) all of the mentioned View Answer Answer: d Explanation: The routing algorithm is what decides where a packet should go next. There are several routing techniques like shortest path algorithm, static and dynamic routing, decentralized routing, distance vector routing, link state routing, Hierarchical routing etc. The routing algorithms go hand in hand with the operations of all the routers in the networks. The routers are the main participants in these algorithms. 6. Which of the following is not correct in relation to multi-destination routing? a) is same as broadcast routing b) contains the list of all destinations c) data is not sent by packets d) there are multiple receivers View Answer Answer: c Explanation: In multi-destination routing, there is more than one receiver and the route for each destination which is contained in a list of destinations is to be found by the routing algorithm. Multi-destination routing is also used in broadcasting. 7. A subset of a network that includes all the routers but contains no loops is called ________ a) spanning tree b) spider structure c) spider tree d) special tree View Answer Answer: a Explanation: Spanning tree protocol (STP) is a network protocol that creates a loop free logical topology for ethernet networks. It is a layer 2 protocol that runs on bridges and switches. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network. 8. Which one of the following algorithm is not used for congestion control? a) traffic aware routing b) admission control c) load shedding d) routing information protocol View Answer Answer: d Explanation: The Routing Information Protocol (RIP) is used by the network layer for the function of dynamic routing. Congestion control focuses on the flow of the traffic in the network and uses algorithms like traffic aware routing, admission control and load shedding to deal with congestion. 9. The network layer protocol for internet is __________ a) ethernet b) internet protocol c) hypertext transfer protocol d) file transfer protocol View Answer Answer: b Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP, CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet protocol is for data link layer. 10. ICMP is primarily used for __________ a) error and diagnostic functions b) addressing c) forwarding d) routing View Answer Answer: a Explanation: ICMP abbreviation for Internet Control Message Protocol is used by networking devices to send error messages and operational information indicating a host or router cannot be reached. ICMP operates over the IP packet to provide error reporting functionality as IP by itself cannot report errors. 1. Which level is the network layer in the OSI model? a) Third level b) Fourth level c) Second level d) Fifth layer View Answer Answer: a Explanation: The network layer is the third level of the open system interconnection model and the layer that provides data routing paths for network communication. 2. Data in network layer is transferred in the form of ____________ a) Layers b) Packets c) Bytes d) Bits View Answer Answer: b Explanation: Data is transferred in the form of packets via logical network paths in an ordered format controlled by the network layer. 3. The network layer is considered as the _______ of the network layer. a) backbone b) packets c) bytes d) bits View Answer Answer: a Explanation: The network layer is considered as the backbone of the network layer. It selects and manages the best logical path for data transfer between nodes. 4. The network layer contains which hardware device? a) Routers, Bridges b) Bridges only c) Bridges and switches d) Routers, Bridges and Switches View Answer Answer: d Explanation: This layer contains hardware devices such as routers, bridges, firewalls, and switches, but it actually creates a logical image of the most efficient communication rout and implements it with a physical medium. 5. Network layer protocol exits in _________ a) Host b) Switches c) Packets d) Bridges View Answer Answer: a Explanation: Network layer protocols exits in every host or router. The router examines the header fields of all the IP packets that pass through it. 6. What are the common protocols associated with the network layer? a) Address Resolution Protocol b) Reverse Address Resolution Protocol c) Internet protocol d) Neighbour Discovery Protocol View Answer Answer: c Explanation: Internet protocol and Netware IPX/SPX are the most common protocols associated with the network layer. 7. The network layer responds to request from which layer? a) Transport layer b) Data layer c) Application layer d) Session layer View Answer Answer: a Explanation: In OSI model, we are having 7 layers in which the network layer responds to request from the layer above it called Transport Layer. 8. The network layer issues request to which layer? a) Transport layer b) Data layer c) Application layer d) Session layer View Answer Answer: b Explanation: In OSI model, we are having 7 layers in which the network layer issues request to the layer below it called Data Link Layer. 9. IP is connectionless. a) True b) False View Answer Answer: a Explanation: IP is connectionless, is that a data packet can travel from a sender to a receiver without the recipient having to send an acknowledgment connection-oriented protocols exits at other, higher layers of the OSI model. 10. Does network layer in TCP/IP and OSI Model are same. a) True b) False View Answer Answer: b Explanation: The TCP/IP Internet layer is in fact only a subset of functionality of the network layer. It describes only one type of network architecture, the Internet. 11. What are called routers? a) The devices that operates at session layer b) The devices that operates at data layer c) The devices that operates at application layer d) The devices that operates at network View Answer Answer: d Explanation: The network interconnection devices that operate at the network layer are usually called routes, which at this point should hopefully come as no surprise to you. 12. ICMP stands for __________ a) Internet Coordinate Message Protocol b) Internet Control Message Protocol c) Interconnect Control Message Protocol d) Interconnect Coordinate Message Protocol View Answer Answer: b Explanation: The Internet Protocol is the key network layer protocol that implements the TCP/IP Protocol suites. Since IP is the protocol that provides the mechanism for delivering datagrams, between devices, it is designed to be relatively basic, and to function with few “bell and whistles”. 13. Packets will be transferred in how many types? a) 5 types b) 4 types c) 2 types d) 3 types View Answer Answer: d Explanation: Routing deals with determining how packet will routed (transferred) from source to destination. It can of three types : 1. Static 2. Dynamic 3. Semi Dynamic. 14. DDP stands for _________ a) Datagram Delivery Protocol b) Device Delivery Protocol c) Datagram Device Protocol d) Device Datagram Protocol View Answer Answer: a Explanation: Datagram Delivery Protocol is a member of the AppleTalk networking protocol suite. Its main responsibility is for socket to socket delivery of datagram over an AppleTalk network. 15. RIP stands for ________ a) Reduced Information Protocol b) Routing Internet Protocol c) Routing Information Protocol d) Reduced Internet Protocol View Answer Answer: c Explanation: The Routing Information Protocol is one of the oldest distance vector routing protocols which employ the hop count as a routing metric. Question 1 Q. Which of the following are network layer protocols? IPv6 TCP UDP HTTP • Question 2 Q. Which of the following is a characteristics of IP? Ensure reliable end to end data transmission Collisions are avoided in different transmission media Sender doesn’t know if the receiver is listening or the message arrived on time It provides information on the amounts of memory installed, what IOS images was loaded during boot and more • Question 3 Q. Why is IPv6 preferred over IPv4? Better performance in terms of subnetting Increased address space Support higher transmission speed Suitable for both wired and wireless networks • Question 4 Q. What is the purpose of default gateway? Enable routers to send packets using the default routes Default gateways are layer 2 switches which forward packets to routers A list of gateways for linking wired to wireless networks Hosts will use the default gateway when sending packets to remote networks. • Question 5 Q. What is the command to display host routing tables? show ip route netstat -r arp -a show run • Question 6 Q. What is the "C" routes in Cisco Routing table? Information on: how the route was learned, its trustworthiness and rating Identifies a directly-connected network, automatically created when an interface is configured with an IP address and activated. Identifies that this is a local interface. This is the IPv4 address of the interface on the router. Indicated the routes which are configured by users. • Question 7 Q. What is the boot up sequence of a router? POST, Load IOS, Load Startup, Bootstrap Loader POST, Bootstrap Loader, Load IOS, Load Startup Bootstrap Loader, Load IOS, POST, Load Startup Load IOS, Load Startup, POST, Bootstrap Loader • Question 8 Q. What is the purpose of show ip route? Displays statistics for all routes on the device Displays the contents of the IPv4 routing table stored in RAM Displays the IPv6 routes for all interfaces on a router Show how the content of routes stored in NVRAM • Question 9 Q. How do you configure the default gateway of a switch? ip default gateway ip route 0.0.0.0 0.0.0.0 <interface> ip default-gateway default ip-gateway • Question 10 Q. What is Routing? to take the large network and filter it, without changing the size of the network. to check messages are sent to the right device. the process of finding a path on which data can pass from source to destination provide optional services to an application developer 1. Which one of the following routing algorithm can be used for network layer design? A.) shortest path algorithm B.) distance vector routing C.) link state routing D.) all of these Answer: Option 'D' all of these 2. Which one of the following is not a function of network layer? A.) routing B.) inter-networking C.) congestion control D.) none of these Answer: Option 'D' none of these 3. The network layer protocol of internet is A.) internet protocol B.) ethernet C.) hypertext transfer protocol D.) none of these Answer: Option 'A' internet protocol 4. In virtual circuit network each packet contains A.) full source and destination address B.) a short VC number C.) both (a) and (b) D.) None of these Answer: Option 'B' a short VC number 5. Which one of the following algorithm is not used for congestion control? A.) traffic aware routing B.) admission control C.) load shedding D.) None of these Answer: Option 'D' None of these 6. ICMP is primarily used for A.) error and diagnostic functions B.) addressing C.) forwarding D.) none of these Answer: Option 'A' error and diagnostic functions 7. Which one of the following is not a function of network layer? A.) routing B.) inter-networking C.) congestion control D.) none of these Answer: Option 'D' none of these 8. In virtual circuit network each packet contains A.) full source and destination address B.) a short VC number C.) both (a) and (b) D.) None of these Answer: Option 'B' a short VC number 9. The 4 byte IP address consists of A.) network address B.) host address C.) both (a) and (b) D.) none of the mentioned Answer: Option 'C' both (a) and (b) 10. The network layer concerns with A.) frames B.) bits C.) packets D.) none of these Answer: Option 'C' packets