Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

The network address of 172.16.0.0/19 provides how many subnets and hosts?(a) 7 subnets, 30 hosts each(b) 8 subnets, 8,190 hosts each(c) 8 subnets, 2,046 hosts each(d) 7 subnets, 2,046 hosts eachI have been asked this question in my homework.My question is from Designing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

Right CHOICE is (b) 8 subnets, 8,190 hosts each

For explanation: A CIDR ADDRESS of /19 is 255.255.224.0. This is a Class B address, so that is only 3 subnet BITS, but it PROVIDES 13 host bits, or 8 subnets, each with 8,190 hosts.

2.

What is the subnet id of a host with an IP address 172.16.66.0/21?(a) 172.16.36.0(b) 172.16.48.0(c) 172.16.64.0(d) 172.16.0.0This question was posed to me by my college professor while I was bunking the class.This is a very interesting question from Designing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

Right ANSWER is (c) 172.16.64.0

Easiest explanation: A /21 is 255.255.248.0, which means we have a block SIZE of 8 in the third octet, so we just count by 8 until we reach 66. The SUBNET in this question is 64.0. The next subnet is 72.0, so the BROADCAST address of the 64 subnet is 71.255.

3.

You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface?(a) 6(b) 8(c) 30(d) 32The question was posed to me during a job interview.My query is from Designing Subnet Masks topic in division TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (a) 6

Easy explanation: A /29 (255.255.255.248), regardless of the class of address, has only 3 host bits. Six hosts are the maximum number of hosts on this LAN, INCLUDING the router INTERFACE. Out of the 8 addresses POSSIBLE with the host bits, the first and the last address are for the subnet id and broadcast address respectively.

4.

If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?(a) 172.16.112.0(b) 172.16.0.0(c) 172.16.96.0(d) 172.16.255.0The question was asked in examination.Question is from Designing Subnet Masks in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct option is (a) 172.16.112.0

For explanation I would SAY: A /25 mask is 255.255.255.128. Used with a Class B NETWORK, the third and fourth octets are used for subnetting with a total of 9 subnet BITS, 8 bits in the third OCTET and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 128 is the next subne

5.

You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?(a) 2(b) 3(c) 4(d) 5I had been asked this question during a job interview.Question is taken from Designing Subnet Masks topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Correct answer is (d) 5

The explanation is: A 240 MASK is 4 subnet bits and provides 16 subnets, each with 14 hosts. We need more subnets, so LET’s add subnet bits. One more subnet bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 HOST bits (6 hosts per subnet). This is the best answer.

6.

You need to subnet a network into 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?(a) 255.255.255.192(b) 255.255.255.224(c) 255.255.255.240(d) 255.255.255.248The question was posed to me in exam.The doubt is from Designing Subnet Masks in division TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (b) 255.255.255.224

For explanation I WOULD say: You NEED 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 PROVIDES 16 subnets with 14 hosts which is less than 15, so this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30 hosts so this may work. The mask 255.255.255.192 provides 4 subnets, each with 60 hosts so this may work. Comparing both the possible masks, 255.255.255.224 provides the best answer.

7.

What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?(a) 14(b) 15(c) 16(d) 30I got this question in an online quiz.This question is from Designing Subnet Masks in section TCP/IP Protocol Suite of Computer Network

Answer»

Right answer is (d) 30

To explain I WOULD say: A /27 (255.255.255.224) is 3 BITS on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this MASK is used with a Class A, B, or C network address? Not at all. The number of host bits would NEVER change.

8.

_________ is another kind of fiber optic network with an active star for switching.(a) S/NET(b) SW/NET(c) NET/SW(d) FS/NETI got this question in an online interview.My enquiry is from Analyzing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (a) S/NET

Easy explanation: A 50-MBd active star fiber optical Local area NETWORK (LAN) and its optical combiner and mixing ROD splitter are presented. The limited power budget and relatively LARGE tapping losses of light wave technology, which limit the USE of fiber optics in tapped BUS LAN topologies, are examined and proven tolerable in optical star topologies.

9.

_________ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.(a) Ethernet(b) Fast Ethernet(c) Gigabit Ethernet(d) Gigabyte EthernetI have been asked this question by my school principal while I was bunking the class.Enquiry is from Analyzing Subnet Masks in chapter TCP/IP Protocol Suite of Computer Network

Answer»

The correct answer is (b) Fast ETHERNET

The explanation is: Fast Ethernet is a set of Ethernet STANDARDS which were INTRODUCED in 1995, that carry traffic at the nominal rate of 1000 Mbit/s. 100BASE-TX is the most COMMONLY used Fast Ethernet standard.

10.

Which of the following are Gigabit Ethernets?(a) 1000 BASE-SX(b) 1000 BASE-LX(c) 1000 BASE-CX(d) All of the mentionedI got this question in an interview for internship.The origin of the question is Analyzing Subnet Masks topic in section TCP/IP Protocol Suite of Computer Network

Answer»

The correct choice is (d) All of the mentioned

To elaborate: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for transmitting Ethernet FRAMES at a rate of a gigabit per SECOND (1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 STANDARD. It came into use beginning in 1999, gradually supplanting Fast Ethernet in wired local networks, as a RESULT of being considerably faster.

11.

__________ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.(a) FDDI(b) FDDT(c) FDDR(d) FOTRThis question was addressed to me in an online quiz.My question is based upon Analyzing Subnet Masks in section TCP/IP Protocol Suite of Computer Network

Answer»

Correct answer is (a) FDDI

Explanation: FDDI stands for Fiber DISTRIBUTED Data INTERFACE. It is a set of standards for fiber OPTIC token ring LANs RUNNING at 100 Mbps over distances up to 200 km in diameter and 1000 stations connected.

12.

State whether true or false.A connection oriented protocol can only use unicast addresses.The any cast service is included in IPV6.(a) True, True(b) True, False(c) False, True(d) False, FalseThis question was addressed to me during an interview.My question is taken from Analyzing Subnet Masks topic in division TCP/IP Protocol Suite of Computer Network

Answer»

The correct choice is (a) TRUE, True

Best explanation: In a CONNECTION oriented protocol, the host can only establish connection with another host on one unique CHANNEL, that’s why it can only use unicast addresses. In IPv6, there is an anycast address in IPv6 which ALLOWS sending messages to a group of devices but not all devices in a network.

13.

_________ implies that all subnets obtained from the same subnet mask.(a) Static subnetting(b) Dynamic subnetting(c) Variable length subnetting(d) Dynamic length subnettingThis question was posed to me in a national level competition.This question is from Analyzing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

Right answer is (a) STATIC SUBNETTING

To elaborate: Static subnetting is used when the REQUIREMENT is of same NUMBER of hosts in each subnet for the institution. The same subnet mask can be used to find the subnet id of each subnet. It is usually used to divide large networks into smaller parts.

14.

The combination of _________ and __________ is often termed the local address of the local portion of the IP address.(a) Network number and host number(b) Network number and subnet number(c) Subnet number and host number(d) Host numberI got this question in examination.My doubt stems from Analyzing Subnet Masks in chapter TCP/IP Protocol Suite of Computer Network

Answer»

The correct option is (c) SUBNET NUMBER and host number

The best explanation: It is termed as the local address because the address won’t be applicable outside the subnet. Sub networking is implemented for remote sensing in transparent WAY from that host which is contained in the sub NETWORK which called a local operation.

15.

If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?(a) 255.255.255.252(b) 255.255.255.255(c) 255.255.255.240(d) 255.255.255.248I have been asked this question in an interview for internship.This interesting question is from Analyzing Subnet Masks topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

The CORRECT CHOICE is (c) 255.255.255.240

To explain I would say: If you have eight networks and each requires 10 HOSTS, you would use the Class C mask of 255.255.255.240. Why? Because 240 in binary is 11110000, which means you have four subnet BITS and four HOST bits. Using our math, we’d get the following:

24-2=14 subnets

24-2=14 hosts.

16.

You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?(a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127(b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127(c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255(d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255I have been asked this question in an online interview.The doubt is from Analyzing Subnet Masks topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Right choice is (b) Class B, Subnet 172.16.13.0, BROADCAST address 172.16.13.127

Explanation: We know that the prefix 172 lies in class B (128 to 191) of IPv4 addresses. From the subnet mask, we get that the class is divided into 2 subnets: 172.16.13.0 to 172.16.13.127 and 172.16.13.128 to 172.16.13.255. The IP 172.16.13.5 lies in the first subnet. So the starting address 172.16.13.0 is the subnet address and LAST address 172.16.13.127 is the broadcast address.

17.

Which of the following is the broadcast address for a Class B network ID using the default subnetmask?(a) 172.16.10.255(b) 255.255.255.255(c) 172.16.255.255(d) 172.255.255.255I got this question in a job interview.The origin of the question is Analyzing Subnet Masks in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Right option is (c) 172.16.255.255

The explanation: In this CASE, the class B network ID is 172.16.0.0. We KNOW that the default mask of a class B network is 255.255.0.0. If we OR any address in a network with the complement of the default mask (0.0.255.255), we get the broadcast address of the network. In this case, the result of OR WOULD be 172.16.255.255.

18.

Which are the features present in IPv4 but not in IPv6?(a) Fragmentation(b) Header checksum(c) Options(d) Anycast addressThe question was asked in exam.My question is from IPV4 and IPV6 Comparision in section TCP/IP Protocol Suite of Computer Network

Answer» RIGHT choice is (d) Anycast ADDRESS

Easy explanation: There is an anycast address in IPv6 which allows sending messages to a group of DEVICES but not all devices in a network. Anycast address is not STANDARDIZED in IPv4.
19.

IPv6 does not use ________ type of address.(a) Broadcast(b) Multicast(c) Any cast(d) UnicastThis question was addressed to me in my homework.The query is from IPV4 and IPV6 Comparision in section TCP/IP Protocol Suite of Computer Network

Answer»

Right option is (a) Broadcast

To explain: There is no concept of broadcast ADDRESS in IPV6. Instead, there is an ANYCAST address in IPv6 which allows sending messages to a group of devices but not all devices in a network. Anycast address is not standardized in IPv4.

20.

In an IPv6 header, the traffic class field is similar to which field in the IPv4 header?(a) Fragmentation field(b) Fast switching(c) TOS field(d) Option fieldI had been asked this question during an interview for a job.My enquiry is from IPV4 and IPV6 Comparision in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Right answer is (c) TOS field

Best explanation: The TRAFFIC class field is USED to specify the priority of the IP packet which is a similar functionality to the TYPE of Service field in the IPv4 header. It’s an 8-bit field and its values are not defined in the RFC 2460.

21.

The header length of an IPv6 datagram is ___________(a) 10bytes(b) 25bytes(c) 30bytes(d) 40bytesI got this question during an online exam.I would like to ask this question from IPV4 and IPV6 Comparision topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

The correct OPTION is (d) 40bytes

Best explanation: IPV6 datagram has fixed header length of 40bytes, which results in faster processing of the datagram. There is one fixed header and optional headers which MAY or may not exist. The fixed header CONTAINS the mandatory essential information about the PACKET while the optional headers contain the optional “not that necessary” information.

22.

The size of an IP address in IPv6 is _________(a) 4bytes(b) 128bits(c) 8bytes(d) 100bitsI got this question during an interview.My question is based upon IPV4 and IPV6 Comparision in portion TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (b) 128bits

The best I can explain: An IPv6 address is 128 bits long. Therefore, 2^128 i.e. 340 undecillion UNIQUE addresses are available in IPv6. IPV4 has only 4 billion possible addresses and IPv6 WOULD be a brilliant alternative in CASE IPv4 runs out of possible NEW addresses.

23.

Which field helps to check rearrangement of the fragments?(a) offset(b) flag(c) ttl(d) identifierThe question was posed to me in a national level competition.This is a very interesting question from IPV4 and IPV6 Comparision topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Correct ANSWER is (a) offset

To explain: The FRAGMENT Offset field specifies where the fragment fits in the original DATAGRAM. The offset of the first fragment will ALWAYS be 0. The SIZE of the field (13 bits) is 3-bits shorter than the size of the total length field (16 bits).

24.

If the value in protocol field is 17, the transport layer protocol used is _________(a) TCP(b) UDP(c) ICMP(d) IGMPThis question was posed to me in an interview for internship.This intriguing question comes from IPV4 and IPV6 Comparision in division TCP/IP Protocol Suite of Computer Network

Answer»

Right choice is (b) UDP

Explanation: The protocol FIELD ENABLES the demultiplexing feature so that the IP protocol can be used to carry PAYLOADS of more than one protocol type. Its most used values are 17 and 6 for UDP and TCP respectively. ICMP and IGMP are network LAYER protocols.

25.

The TTL field has value 10. How many routers (max) can process this datagram?(a) 11(b) 5(c) 10(d) 1The question was asked in an interview for job.My doubt stems from IPV4 and IPV6 Comparision topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

The CORRECT option is (c) 10

Explanation: TTL stands for TIME to Live. This field SPECIFIES the life of the IP packet based on the number of HOPS it makes (Number of routers it GOES through). TTL field is decremented by one each time the datagram is processed by a router. When the value is 0, the packet is automatically destroyed.

26.

Which of the following field in IPv4 datagram is not related to fragmentation?(a) Flags(b) Offset(c) TOS(d) IdentifierThis question was posed to me in an interview.My query is from IPV4 and IPV6 Comparision topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Right option is (c) TOS

For EXPLANATION: TOS-type of service identifies the type of PACKETS. It is not related to FRAGMENTATION but is used to request specific treatment such as high throughput, high reliability or LOW latency for the IP packet depending upon the type of service it belongs to.

27.

Which of the following is not applicable for IP?(a) Error reporting(b) Handle addressing conventions(c) Datagram format(d) Packet handlingThis question was addressed to me during an interview for a job.My question comes from IPV4 and IPV6 Comparision in section TCP/IP Protocol Suite of Computer Network

Answer»

Correct answer is (a) Error REPORTING

For explanation I would say: The Internet PROTOCOL is the networking protocol that establishes the internet by RELAYING datagram across network BOUNDARIES. ICMP is a supporting protocol for IP which handles the Error Reporting functionality.

28.

Which of the following is not a step in the Header translation procedure?(a) The IPv6 mapped address is changed to an IPv4 address by extracting the rightmost 32bits(b) The value of the IPv6 priority field is discarded(c) The type of service field in IPv4 is set to zero(d) The IPv6 flow label is consideredI had been asked this question in an internship interview.I want to ask this question from Transition from IPV4 to IPV6 in chapter TCP/IP Protocol Suite of Computer Network

Answer»

The correct answer is (d) The IPv6 flow label is considered

For explanation: In the header translation procedure, first the IPv6 mapped address is changed to an IPV4 address by extracting the rightmost 32BITS, then the VALUE of the IPv6 priority FIELD is discarded, and finally the ToS field in the IPv4 header is set to zero. IPv6 flow label is ignored in the procedure.

29.

Header translation uses ___________ to translate an IPv6 address to an IPv4 address.(a) IP address(b) Physical address(c) Mapped address(d) MAC addressI have been asked this question in class test.I need to ask this question from Transition from IPV4 to IPV6 topic in section TCP/IP Protocol Suite of Computer Network

Answer»

The correct choice is (c) Mapped address

Easiest EXPLANATION: A mapped IPv6 address contains the IPv4 address in its LAST 32-bits and is preceded by 16 1S and 80 0S. It can be used to translate an IPv6 address to an IPv4 address.

30.

___________ is necessary when the sender wants to use IPv6, but the receiver does not understand IPv6.(a) Dual stack(b) Header translation(c) Conversion(d) TunnelingThe question was asked in an international level competition.This key question is from Transition from IPV4 to IPV6 topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Correct answer is (B) HEADER TRANSLATION

The EXPLANATION: Header translation is used when the SENDER wants to use IPv6, but the receiver does not understand IPv6. It is made possible through a Network Address Translation – Protocol Translation enabled device such as a gateway.

31.

The strategy used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4 is ______________(a) Dual stack(b) Header translation(c) Conversion(d) TunnelingThe question was asked in an interview for internship.My doubt stems from Transition from IPV4 to IPV6 topic in portion TCP/IP Protocol Suite of Computer Network

Answer»

Correct choice is (d) TUNNELING

Explanation: In tunneling, The IPv4 ROUTERS can FORM a tunnel in which at the SENDER’s side, the IPv6 datagram is encapsulated in to IPv4, and at the RECEIVER’s side of the tunnel, the IPv4 packet is stripped and the IPv6 packet is sent to the receiver.

32.

To determine which version to use when sending a packet to a destination, the source host queries which of the following?(a) Dual stack(b) Domain Name Server(c) Header information(d) Transport layerThis question was addressed to me in semester exam.My doubt stems from Transition from IPV4 to IPV6 in section TCP/IP Protocol Suite of Computer Network

Answer»

The correct answer is (b) Domain Name Server

Easy explanation: Source HOST queries DNS to DETERMINE which version to USE when sending a packet to a destination. The DNS contains both, the IPv4 and IPv6 addresses of the modern dual stack host SERVERS.

33.

Which of the following is not a transition strategy?(a) Dual stack(b) Tunneling(c) Conversion(d) Header translationI got this question in final exam.This intriguing question comes from Transition from IPV4 to IPV6 in section TCP/IP Protocol Suite of Computer Network

Answer»

Correct option is (C) Conversion

For EXPLANATION: As IPv4 addresses are of 32 bits and IPv6 addresses are of 128 bits, it is not possible to convert IPv4 address to IPv6 address. So, Dual stack, tunneling and header translation are the three strategies which might help in the TRANSITION from IPv4 to IPv6.

34.

The main reason for transition from IPv4 to IPv6 is _________(a) Huge number of systems on the internet(b) Very low number of system on the internet(c) Providing standard address(d) To provide faster internetI have been asked this question in examination.The doubt is from Transition from IPV4 to IPV6 topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Right option is (a) Huge number of SYSTEMS on the internet

The best explanation: Due to huge number of systems on the internet and the lower number of available addresses on IPv4, TRANSITION from IPv4 to IPv6 needs to happen. IPv4 provides around 4 billion unique IP addresses whereas IPv6 provides over 340 undecillion unique IP addresses.

35.

In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is ___________(a) 10101111 10100011(b) 01010000 01011100(c) 10101111 01011100(d) 01010000 10100011The question was asked in an interview for job.Question is from ICMP topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Right OPTION is (a) 10101111 10100011

The explanation is: The sender side adds the bits of the fragmented packet to FIND a sum. CHECKSUM is the compliment of the sum (exchange 0’s and 1’s). The receiver then has to verify the checksum by adding the bits of the received packet to ensure that the packet is error-free.

36.

In windows____________ can be used to trace the route of the packet from the source to the destination.(a) traceroute(b) tracert(c) ping(d) locaterI got this question in my homework.This is a very interesting question from ICMP in section TCP/IP Protocol Suite of Computer Network

Answer»

Right option is (b) tracert

Best explanation: Tracert is USED in case of windows, whereas Traceroute in UNIX. Tracert is a program used to FIND the shortest route to the destination IP. The ROUTER sends destination unreachable MESSAGE if a path to the destination IP is not found.

37.

During debugging, we can use the ____________ program to find if a host is alive and responding.(a) traceroute(b) shell(c) ping(d) javaThis question was addressed to me in an online interview.My question is based upon ICMP in section TCP/IP Protocol Suite of Computer Network

Answer»

Correct option is (c) ping

To explain I WOULD SAY: Ping program is USED to find if a host is alive and responding. It is to be entered into a command LINE with the syntax “ping (IP address)” to be executed. Traceroute is a program used to find the shortest ROUTE to the destination IP.

38.

Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.(a) Half-trip time(b) Round-trip time(c) Travel time for the next router(d) Time to reach the destination/sourceThis question was posed to me during an interview.My question is based upon ICMP in section TCP/IP Protocol Suite of Computer Network

Answer»

Right OPTION is (b) Round-trip time

The best I can explain: The round-trip time refers to the total time TAKEN combining the time taken for a packet sent from a source to reach a destination and the time taken the acknowledgement sent by the destination to reach the source. The Router sends destination unreachable MESSAGE if the destination is not found.

39.

In case of time exceeded error, when the datagram visits a router, the value of time to live field is _________(a) Remains constant(b) Decremented by 2(c) Incremented by 1(d) Decremented by 1I had been asked this question by my school principal while I was bunking the class.The query is from ICMP in division TCP/IP Protocol Suite of Computer Network

Answer»

Right answer is (d) DECREMENTED by 1

To elaborate: This field will be decremented by 1 at EVERY router, and will be zero by the time it reaches source. This error reporting message is TYPE 11 and is USED to prevent the router from travelling forever in CASE some unknown path anomaly occurs.

40.

The source-quench message in ICMP was designed to add a kind of ____________ to the IP.(a) error control(b) flow control(c) router control(d) switch controlI had been asked this question during an online exam.My question is from ICMP topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Right OPTION is (b) flow control

To explain I would SAY: Firstly, it informs the source that the datagram has been discarded. Secondly, it WARNS the source that there is congestion in the network. It’s type 4 error reporting message after which the source is expected to REDUCE the flow of packets.

41.

When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram.(a) Destination unreachable(b) Source quench(c) Router error(d) Time exceededThis question was posed to me during a job interview.I'd like to ask this question from ICMP in portion TCP/IP Protocol Suite of Computer Network

Answer»

Correct option is (a) Destination UNREACHABLE

Easiest explanation: Router sends destination unreachable message if the destination is not found. Destination unreachable is type 3 error reporting message. It is INVOKED when the router can’t FIND a path to the intended destination to FORWARD the PACKET through.

42.

ICMP error message will not be generated for a datagram having a special address such as _______(a) 127.0.0.0(b) 12.1.2(c) 11.1(d) 127I had been asked this question in a job interview.The origin of the question is ICMP in section TCP/IP Protocol Suite of Computer Network

Answer» CORRECT option is (a) 127.0.0.0

Easy explanation: 127.0.0.0 is a special address KNOWN as the loopback address which is used for testing PURPOSE of a machine without actually communicating with a network. Thus no error REPORTING message will be generated for such special ADDRESSES.
43.

Which of these is not a type of error-reporting message?(a) Destination unreachable(b) Source quench(c) Router error(d) Time exceededI have been asked this question during an internship interview.I'm obligated to ask this question of ICMP topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Right option is (c) Router error

To explain I would say: Router error is not a type of error-reporting message in ICMP. The type of error reporting message is specified in the ICMP header. Destination UNREACHABLE is type 3 error message, source quench is type 4, and TIME exceeded is type 11 error message.

44.

During error reporting, ICMP always reports error messages to ________(a) Destination(b) Source(c) Next router(d) Previous routerI have been asked this question by my school teacher while I was bunking the class.I would like to ask this question from ICMP in division TCP/IP Protocol Suite of Computer Network

Answer»

The correct answer is (b) Source

Easiest explanation: ICMP NOTIFIES the source about the ERROR when an error is detected because the datagram KNOWS information about source and destination IP address. The source can then RETRANSMIT the data again or TRY to correct those errors.

45.

Header size of the ICMP message is _________(a) 8-bytes(b) 8-bits(c) 16-bytes(d) 16-bitsThe question was posed to me at a job interview.This intriguing question originated from ICMP in section TCP/IP Protocol Suite of Computer Network

Answer»

Right option is (a) 8-bytes

To explain I WOULD say: An ICMP message has an 8-byte header and a variable size data section. Out of the 8 bytes, the first 4 bytes are of a fixed format having the TYPE, code and checksum FIELDS and the next 4 bytes depend upon the type of the message.

46.

Internet Control Message Protocol (ICMP) has been designed to compensate _________(a) Error-reporting(b) Error-correction(c) Host and management queries(d) All of the mentionedI have been asked this question during an interview.My enquiry is from ICMP in section TCP/IP Protocol Suite of Computer Network

Answer»

The CORRECT option is (d) All of the mentioned

For explanation: IP by itself does not provide the FEATURES of ERROR reporting or error correction. So, to address these issues a network layer protocol called Internet Control Message Protocol is used. ICMP operates over the IP PACKET to provide error reporting functionality.

47.

The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as _______(a) Delivery of packets(b) Error correction(c) Multiplexing(d) DemultiplexingThis question was addressed to me in an interview.My question is taken from P2P Applications in section TCP/IP Protocol Suite of Computer Network

Answer»

The correct answer is (d) Demultiplexing

Easiest explanation: Demultiplexing is the process of error checking and dropping of the header, delivering messages to appropriate process BASED on port number. The transport layer does this on the receiver’s end after the PACKET is received and TAKES help of the header attached by the sender’s SIDE transport layer during multiplexing.

48.

In transport layer, Multiplexing is done at _________(a) Channel(b) Receiver site(c) Sender site(d) PacketI got this question by my school principal while I was bunking the class.I need to ask this question from P2P Applications topic in chapter TCP/IP Protocol Suite of Computer Network

Answer»

Right CHOICE is (c) Sender site

The best I can explain: At the sender’s side, there are multiple processes which may want to SEND packets. But there is only one transport layer protocol like TCP or UDP working at a TIME. So the transport layer protocol GETS the messages from these processes and separates them with different port numbers. This PROCESS is called multiplexing and it is done before sending packets to the receivers side.

49.

Which of the following is false with respect to Connectionless service of transport layer protocol?(a) Packets are not numbered(b) Packets are not delayed(c) No acknowledgement(d) Packet may arrive out of sequenceI got this question by my college professor while I was bunking the class.This intriguing question comes from P2P Applications topic in section TCP/IP Protocol Suite of Computer Network

Answer»

Right choice is (b) Packets are not delayed

For explanation I would SAY: There is a high probability in connectionless services like UDP that the packet GETS delayed or lost because there is no connection made between the TWO END nodes. No connection means that there is no UNIQUE pathway for the packets to travel.

50.

The combination of an IP address and port number is called as ________(a) Socket address(b) Port address(c) MAC address(d) Host addressThe question was posed to me in an internship interview.My enquiry is from P2P Applications in portion TCP/IP Protocol Suite of Computer Network

Answer»

Right option is (a) Socket address

Best EXPLANATION: Socket address is the combination of an IP address and a PORT NUMBER and it is used to define the client-end and server-end PROCESSES uniquely.