InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The network address of 172.16.0.0/19 provides how many subnets and hosts?(a) 7 subnets, 30 hosts each(b) 8 subnets, 8,190 hosts each(c) 8 subnets, 2,046 hosts each(d) 7 subnets, 2,046 hosts eachI have been asked this question in my homework.My question is from Designing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network |
|
Answer» Right CHOICE is (b) 8 subnets, 8,190 hosts each |
|
| 2. |
What is the subnet id of a host with an IP address 172.16.66.0/21?(a) 172.16.36.0(b) 172.16.48.0(c) 172.16.64.0(d) 172.16.0.0This question was posed to me by my college professor while I was bunking the class.This is a very interesting question from Designing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network |
|
Answer» Right ANSWER is (c) 172.16.64.0 |
|
| 3. |
You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface?(a) 6(b) 8(c) 30(d) 32The question was posed to me during a job interview.My query is from Designing Subnet Masks topic in division TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct choice is (a) 6 |
|
| 4. |
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?(a) 172.16.112.0(b) 172.16.0.0(c) 172.16.96.0(d) 172.16.255.0The question was asked in examination.Question is from Designing Subnet Masks in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct option is (a) 172.16.112.0 |
|
| 5. |
You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?(a) 2(b) 3(c) 4(d) 5I had been asked this question during a job interview.Question is taken from Designing Subnet Masks topic in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct answer is (d) 5 |
|
| 6. |
You need to subnet a network into 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?(a) 255.255.255.192(b) 255.255.255.224(c) 255.255.255.240(d) 255.255.255.248The question was posed to me in exam.The doubt is from Designing Subnet Masks in division TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct choice is (b) 255.255.255.224 |
|
| 7. |
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?(a) 14(b) 15(c) 16(d) 30I got this question in an online quiz.This question is from Designing Subnet Masks in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Right answer is (d) 30 |
|
| 8. |
_________ is another kind of fiber optic network with an active star for switching.(a) S/NET(b) SW/NET(c) NET/SW(d) FS/NETI got this question in an online interview.My enquiry is from Analyzing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct choice is (a) S/NET |
|
| 9. |
_________ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.(a) Ethernet(b) Fast Ethernet(c) Gigabit Ethernet(d) Gigabyte EthernetI have been asked this question by my school principal while I was bunking the class.Enquiry is from Analyzing Subnet Masks in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct answer is (b) Fast ETHERNET |
|
| 10. |
Which of the following are Gigabit Ethernets?(a) 1000 BASE-SX(b) 1000 BASE-LX(c) 1000 BASE-CX(d) All of the mentionedI got this question in an interview for internship.The origin of the question is Analyzing Subnet Masks topic in section TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct choice is (d) All of the mentioned |
|
| 11. |
__________ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.(a) FDDI(b) FDDT(c) FDDR(d) FOTRThis question was addressed to me in an online quiz.My question is based upon Analyzing Subnet Masks in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct answer is (a) FDDI |
|
| 12. |
State whether true or false.A connection oriented protocol can only use unicast addresses.The any cast service is included in IPV6.(a) True, True(b) True, False(c) False, True(d) False, FalseThis question was addressed to me during an interview.My question is taken from Analyzing Subnet Masks topic in division TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct choice is (a) TRUE, True |
|
| 13. |
_________ implies that all subnets obtained from the same subnet mask.(a) Static subnetting(b) Dynamic subnetting(c) Variable length subnetting(d) Dynamic length subnettingThis question was posed to me in a national level competition.This question is from Analyzing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network |
|
Answer» Right answer is (a) STATIC SUBNETTING |
|
| 14. |
The combination of _________ and __________ is often termed the local address of the local portion of the IP address.(a) Network number and host number(b) Network number and subnet number(c) Subnet number and host number(d) Host numberI got this question in examination.My doubt stems from Analyzing Subnet Masks in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct option is (c) SUBNET NUMBER and host number |
|
| 15. |
If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?(a) 255.255.255.252(b) 255.255.255.255(c) 255.255.255.240(d) 255.255.255.248I have been asked this question in an interview for internship.This interesting question is from Analyzing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network |
|
Answer» The CORRECT CHOICE is (c) 255.255.255.240 |
|
| 16. |
You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?(a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127(b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127(c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255(d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255I have been asked this question in an online interview.The doubt is from Analyzing Subnet Masks topic in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Right choice is (b) Class B, Subnet 172.16.13.0, BROADCAST address 172.16.13.127 |
|
| 17. |
Which of the following is the broadcast address for a Class B network ID using the default subnetmask?(a) 172.16.10.255(b) 255.255.255.255(c) 172.16.255.255(d) 172.255.255.255I got this question in a job interview.The origin of the question is Analyzing Subnet Masks in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» Right option is (c) 172.16.255.255 |
|
| 18. |
Which are the features present in IPv4 but not in IPv6?(a) Fragmentation(b) Header checksum(c) Options(d) Anycast addressThe question was asked in exam.My question is from IPV4 and IPV6 Comparision in section TCP/IP Protocol Suite of Computer Network |
|
Answer» RIGHT choice is (d) Anycast ADDRESS Easy explanation: There is an anycast address in IPv6 which allows sending messages to a group of DEVICES but not all devices in a network. Anycast address is not STANDARDIZED in IPv4. |
|
| 19. |
IPv6 does not use ________ type of address.(a) Broadcast(b) Multicast(c) Any cast(d) UnicastThis question was addressed to me in my homework.The query is from IPV4 and IPV6 Comparision in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Right option is (a) Broadcast |
|
| 20. |
In an IPv6 header, the traffic class field is similar to which field in the IPv4 header?(a) Fragmentation field(b) Fast switching(c) TOS field(d) Option fieldI had been asked this question during an interview for a job.My enquiry is from IPV4 and IPV6 Comparision in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» Right answer is (c) TOS field |
|
| 21. |
The header length of an IPv6 datagram is ___________(a) 10bytes(b) 25bytes(c) 30bytes(d) 40bytesI got this question during an online exam.I would like to ask this question from IPV4 and IPV6 Comparision topic in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct OPTION is (d) 40bytes |
|
| 22. |
The size of an IP address in IPv6 is _________(a) 4bytes(b) 128bits(c) 8bytes(d) 100bitsI got this question during an interview.My question is based upon IPV4 and IPV6 Comparision in portion TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct choice is (b) 128bits |
|
| 23. |
Which field helps to check rearrangement of the fragments?(a) offset(b) flag(c) ttl(d) identifierThe question was posed to me in a national level competition.This is a very interesting question from IPV4 and IPV6 Comparision topic in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct ANSWER is (a) offset |
|
| 24. |
If the value in protocol field is 17, the transport layer protocol used is _________(a) TCP(b) UDP(c) ICMP(d) IGMPThis question was posed to me in an interview for internship.This intriguing question comes from IPV4 and IPV6 Comparision in division TCP/IP Protocol Suite of Computer Network |
|
Answer» Right choice is (b) UDP |
|
| 25. |
The TTL field has value 10. How many routers (max) can process this datagram?(a) 11(b) 5(c) 10(d) 1The question was asked in an interview for job.My doubt stems from IPV4 and IPV6 Comparision topic in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» The CORRECT option is (c) 10 |
|
| 26. |
Which of the following field in IPv4 datagram is not related to fragmentation?(a) Flags(b) Offset(c) TOS(d) IdentifierThis question was posed to me in an interview.My query is from IPV4 and IPV6 Comparision topic in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» Right option is (c) TOS |
|
| 27. |
Which of the following is not applicable for IP?(a) Error reporting(b) Handle addressing conventions(c) Datagram format(d) Packet handlingThis question was addressed to me during an interview for a job.My question comes from IPV4 and IPV6 Comparision in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct answer is (a) Error REPORTING |
|
| 28. |
Which of the following is not a step in the Header translation procedure?(a) The IPv6 mapped address is changed to an IPv4 address by extracting the rightmost 32bits(b) The value of the IPv6 priority field is discarded(c) The type of service field in IPv4 is set to zero(d) The IPv6 flow label is consideredI had been asked this question in an internship interview.I want to ask this question from Transition from IPV4 to IPV6 in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct answer is (d) The IPv6 flow label is considered |
|
| 29. |
Header translation uses ___________ to translate an IPv6 address to an IPv4 address.(a) IP address(b) Physical address(c) Mapped address(d) MAC addressI have been asked this question in class test.I need to ask this question from Transition from IPV4 to IPV6 topic in section TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct choice is (c) Mapped address |
|
| 30. |
___________ is necessary when the sender wants to use IPv6, but the receiver does not understand IPv6.(a) Dual stack(b) Header translation(c) Conversion(d) TunnelingThe question was asked in an international level competition.This key question is from Transition from IPV4 to IPV6 topic in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct answer is (B) HEADER TRANSLATION |
|
| 31. |
The strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4 is ______________(a) Dual stack(b) Header translation(c) Conversion(d) TunnelingThe question was asked in an interview for internship.My doubt stems from Transition from IPV4 to IPV6 topic in portion TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct choice is (d) TUNNELING |
|
| 32. |
To determine which version to use when sending a packet to a destination, the source host queries which of the following?(a) Dual stack(b) Domain Name Server(c) Header information(d) Transport layerThis question was addressed to me in semester exam.My doubt stems from Transition from IPV4 to IPV6 in section TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct answer is (b) Domain Name Server |
|
| 33. |
Which of the following is not a transition strategy?(a) Dual stack(b) Tunneling(c) Conversion(d) Header translationI got this question in final exam.This intriguing question comes from Transition from IPV4 to IPV6 in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct option is (C) Conversion |
|
| 34. |
The main reason for transition from IPv4 to IPv6 is _________(a) Huge number of systems on the internet(b) Very low number of system on the internet(c) Providing standard address(d) To provide faster internetI have been asked this question in examination.The doubt is from Transition from IPV4 to IPV6 topic in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Right option is (a) Huge number of SYSTEMS on the internet |
|
| 35. |
In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ___________(a) 10101111 10100011(b) 01010000 01011100(c) 10101111 01011100(d) 01010000 10100011The question was asked in an interview for job.Question is from ICMP topic in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Right OPTION is (a) 10101111 10100011 |
|
| 36. |
In windows____________ can be used to trace the route of the packet from the source to the destination.(a) traceroute(b) tracert(c) ping(d) locaterI got this question in my homework.This is a very interesting question from ICMP in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Right option is (b) tracert |
|
| 37. |
During debugging, we can use the ____________ program to find if a host is alive and responding.(a) traceroute(b) shell(c) ping(d) javaThis question was addressed to me in an online interview.My question is based upon ICMP in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct option is (c) ping |
|
| 38. |
Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.(a) Half-trip time(b) Round-trip time(c) Travel time for the next router(d) Time to reach the destination/sourceThis question was posed to me during an interview.My question is based upon ICMP in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Right OPTION is (b) Round-trip time |
|
| 39. |
In case of time exceeded error, when the datagram visits a router, the value of time to live field is _________(a) Remains constant(b) Decremented by 2(c) Incremented by 1(d) Decremented by 1I had been asked this question by my school principal while I was bunking the class.The query is from ICMP in division TCP/IP Protocol Suite of Computer Network |
|
Answer» Right answer is (d) DECREMENTED by 1 |
|
| 40. |
The source-quench message in ICMP was designed to add a kind of ____________ to the IP.(a) error control(b) flow control(c) router control(d) switch controlI had been asked this question during an online exam.My question is from ICMP topic in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» Right OPTION is (b) flow control |
|
| 41. |
When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram.(a) Destination unreachable(b) Source quench(c) Router error(d) Time exceededThis question was posed to me during a job interview.I'd like to ask this question from ICMP in portion TCP/IP Protocol Suite of Computer Network |
|
Answer» Correct option is (a) Destination UNREACHABLE |
|
| 42. |
ICMP error message will not be generated for a datagram having a special address such as _______(a) 127.0.0.0(b) 12.1.2(c) 11.1(d) 127I had been asked this question in a job interview.The origin of the question is ICMP in section TCP/IP Protocol Suite of Computer Network |
|
Answer» CORRECT option is (a) 127.0.0.0 Easy explanation: 127.0.0.0 is a special address KNOWN as the loopback address which is used for testing PURPOSE of a machine without actually communicating with a network. Thus no error REPORTING message will be generated for such special ADDRESSES. |
|
| 43. |
Which of these is not a type of error-reporting message?(a) Destination unreachable(b) Source quench(c) Router error(d) Time exceededI have been asked this question during an internship interview.I'm obligated to ask this question of ICMP topic in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» Right option is (c) Router error |
|
| 44. |
During error reporting, ICMP always reports error messages to ________(a) Destination(b) Source(c) Next router(d) Previous routerI have been asked this question by my school teacher while I was bunking the class.I would like to ask this question from ICMP in division TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct answer is (b) Source |
|
| 45. |
Header size of the ICMP message is _________(a) 8-bytes(b) 8-bits(c) 16-bytes(d) 16-bitsThe question was posed to me at a job interview.This intriguing question originated from ICMP in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Right option is (a) 8-bytes |
|
| 46. |
Internet Control Message Protocol (ICMP) has been designed to compensate _________(a) Error-reporting(b) Error-correction(c) Host and management queries(d) All of the mentionedI have been asked this question during an interview.My enquiry is from ICMP in section TCP/IP Protocol Suite of Computer Network |
|
Answer» The CORRECT option is (d) All of the mentioned |
|
| 47. |
The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as _______(a) Delivery of packets(b) Error correction(c) Multiplexing(d) DemultiplexingThis question was addressed to me in an interview.My question is taken from P2P Applications in section TCP/IP Protocol Suite of Computer Network |
|
Answer» The correct answer is (d) Demultiplexing |
|
| 48. |
In transport layer, Multiplexing is done at _________(a) Channel(b) Receiver site(c) Sender site(d) PacketI got this question by my school principal while I was bunking the class.I need to ask this question from P2P Applications topic in chapter TCP/IP Protocol Suite of Computer Network |
|
Answer» Right CHOICE is (c) Sender site |
|
| 49. |
Which of the following is false with respect to Connectionless service of transport layer protocol?(a) Packets are not numbered(b) Packets are not delayed(c) No acknowledgement(d) Packet may arrive out of sequenceI got this question by my college professor while I was bunking the class.This intriguing question comes from P2P Applications topic in section TCP/IP Protocol Suite of Computer Network |
|
Answer» Right choice is (b) Packets are not delayed |
|
| 50. |
The combination of an IP address and port number is called as ________(a) Socket address(b) Port address(c) MAC address(d) Host addressThe question was posed to me in an internship interview.My enquiry is from P2P Applications in portion TCP/IP Protocol Suite of Computer Network |
|
Answer» Right option is (a) Socket address |
|