Computer Networks Questions & Answers – ICMP
1. Internet Control Message
Protocol(ICMP) has designed to compensate
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned
Answer: d
Explanation: ICMP has been designed to address these issues.
Explanation: ICMP has been designed to address these issues.
2. Header size of the ICMP message
is
a) 8-bytes
b) 8-bits
c) 16-bytes
d) 16-bits
a) 8-bytes
b) 8-bits
c) 16-bytes
d) 16-bits
Answer: a
Explanation: ICMP message has 8-bytes header and variable size data section.
Explanation: ICMP message has 8-bytes header and variable size data section.
3. During error reporting, ICMP
always reports error messages to
a) Destination
b) Source
c) Next router
d) Previous router
a) Destination
b) Source
c) Next router
d) Previous router
Answer: b
Explanation: ICMP sends error message to the source because the datagram knows information about source and destination IP address.
Explanation: ICMP sends error message to the source because the datagram knows information about source and destination IP address.
4. Which of these is not a type of
error-reporting messages
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
Answer: c
Explanation: Router error is not a type of error-reporting messages in ICMP.
Explanation: Router error is not a type of error-reporting messages in ICMP.
5. ICMP error message will not be
generated for a datagram having a special address such as
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127
Answer: a
Explanation: No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.
Explanation: No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.
6. When a router cannot route a
datagram or host cannot deliver a datagram, the datagram is discarded and the
router or the host sends a ____________ message back to the source host that
initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
Answer: a
Explanation: Router sends destination unreachable message if the destination is not found.
Explanation: Router sends destination unreachable message if the destination is not found.
7. The source-quench message in ICMP
was designed to add a kind of ____________ to the IP.
a) Error control
b) Flow control
c) Router control
d) None of the mentioned
a) Error control
b) Flow control
c) Router control
d) None of the mentioned
Answer: b
Explanation: Firstly, it informs the source that the datagram has been discarded. secondly, it warns the source that there is congestion in the network.
Explanation: Firstly, it informs the source that the datagram has been discarded. secondly, it warns the source that there is congestion in the network.
8. In case of time exceeded error,
when the datagram visits a router, the value of time to live field is
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1
Answer: d
Explanation: This field will be decremented by 1 at every router, and will be zero by the time it reaches source.
Explanation: This field will be decremented by 1 at every router, and will be zero by the time it reaches source.
9. Two machines can use the
timestamp request and timestamp replay messages to determine the ___________
needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source
Answer: b
Explanation: Router sends destination unreachable message if the destination is not found.
Explanation: Router sends destination unreachable message if the destination is not found.
10. During debugging, we can use the
____________ program to find if a host is alive and responding
a) Traceroute
b) Shell
c) Ping
d) Java
a) Traceroute
b) Shell
c) Ping
d) Java
Answer: c
Explanation: Ping program is used to find if a host is alive and responding.
Explanation: Ping program is used to find if a host is alive and responding.
11. In windows, ____________ can be
used to trace the route of the packet from the source to the destination
a) Traceroute
b) Tracert
c) Ping
d) Locater
a) Traceroute
b) Tracert
c) Ping
d) Locater
Answer: b
Explanation: Tracert is used in case of windows, whereas Traceroute in UNIX.
Explanation: Tracert is used in case of windows, whereas Traceroute in UNIX.
12. In a simple echo-request
message, the value of the sum is 01010000 01011100. Then, value of checksum is
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
Answer: a
Explanation: Checksum is the compliment of the sum(exchange 0’s and 1’s).
Explanation: Checksum is the compliment of the sum(exchange 0’s and 1’s).
تابع أسئلة الشبكات
ليست هناك تعليقات:
إرسال تعليق