IBPS IT Officer MCQ – 34 (Networking)

Networking one among the most important SECTIONS in IBPS IT Officer. Here are the Questions based on Networking System.

Networking MCQ 1
Networking MCQ 2
Networking MCQ 3
Networking MCQ 4
NetWorking MCQ 5

TOPIC: TCP/IP 

1. A value of 6 in the protocol field of the IP header represents:
a. An embedded protocol of ICMP follows the IP header
b. An embedded protocol of UDP follows the IP header
c. An embedded protocol of TCP follows the IP header
d. An embedded protocol of TCP precedes the IP header

Answer
Answer: (c)

2. IP fragmentation occurs when:
a. The receiver is not ready for all the data from the sender
b. When there are more bytes in the IP packet than the size of the Maximum Transmission Unit of all links from sender to receiver
c. When there are more bytes in the IP packet than the size of the receiving TCP window
d. When there are more bytes in the payload that follows the IP header than the size of the Maximum Transmission Unit of all links from the sender to receiver

Answer
Answer: (b)

3. Some of the fields in an IPv4 packet that are used by the receiver to reassemble associated fragments are:
a. The IP identification field to identify all associated fragments, the More Fragment bit to indicate whether or not more fragments follow the current one, and the fragment offset to indicate where a particular fragment falls in relation to other fragments
b. The IP identification field to identify all associated fragments, the More Fragment bit to indicate whether or not more fragments follow the current one, and the Time to Live to expire missing fragments
c. The IP identification field to identify all associated fragments, the More Fragment bit to indicate whether or not more fragments follow the current one, and the TCP checksum to discard corrupted fragments
d. The IP identification field to identify all associated fragments, the More Fragment bit to indicate whether or not more fragments follow the current one,the IP options to route all fragments through the same intermediate routers

Answer
Answer: (a)

4. The Time to Live (TTL) field/valuefound in the IP header are used to:
a. Make sure all associated fragments arrive with a given window of time
b. Expire TCP segments in transit when the TTL value becomes 0
c. Flush DNS records from cache when the TTL value is exceeded
d. Expire IP packets in transit when the TTL value becomes 0

Answer
Answer: (d)

5. What is the purpose of the IP checksum?
a. To make sure that data in the entire packet is not corrupted in transit
b. To make sure that data in the IP header is not corrupted in transit
c. To make sure that data in the Ethernet frame is not corrupted in transit
d. To make sure that data in the embedded protocol is not corrupted in transit

Answer
Answer: (b)

6. What is a common use of DNS?
a. Resolution of a MAC address to an IP address
b. Resolution of an IP address to a MAC address
c. Resolution of a port number to a port service
d. Resolution of a host name to an IP address

Answer
Answer: (d)

7. What is a typical response from a host that receives a UDP packet on a nonͲlistening port?
a. A UDP reset flag set to the sender
b. A UDP FIN flag set to the sender
c. An ICMP port unreachable message to the sender
d. A UDP port unreachable message to the sender

Answer
Answer: (c)

8. Suppose a SYN packet is spoofed using a real IP address and then sent to a server that responds with a SYN/ACK to the actual IP address.How does the real IP address respond?
a. With an acknowledgement since it did not send the SYN
b. With a reset since it did not send the SYN
c. With a duplicate SYN since it did not send the SYN
d. With a TTL of 0 since it did not send the SYN

Answer
Answer: (b)

9. What are some differences between IPv4 and IPV6?
a. They are the same except the IP version number in the IP header is different
b. The IPv6 addresses are 4 times larger and some of the fields/functionality previously in the IPv4 header are now in IPv6 extension headers
c. IPv6 allows more than 255 embedded protocols
d. IPv6 packets are automatically encrypted while IPv4 are not

Answer
Answer: (b)

10. Suppose you had a tool that allowed you to craft an ICMP echo request over Ethernet, but you needed to tell the tool how to compose the request layer by layer in the proper order. How would you order the different layers?
a. Ethernet header, followed by IP header, followed by ICMP header, followed by optional ICMP data
b. IP header, followed by Ethernet header, followed by ICMP header, followed by optional ICMP data
c. The order is unimportant ^ craft them in any order and the TCP/IP stack will properly assemble them before sending
d. The Ethernet header must be first, and the order of the IP header, ICMP header, and data is unimportant since the TCP/IP stack will properly order assemble them before sending

Answer
Answer: (a)