تواصل معنا

كورس جافا سوينج
كورس أختبار البرمجيات
الان ومجانا لمدة شهر اللهم ارفع عنا البلاء والوباء
كورس لغة الدارت والفلتر
عن المدونة
Mohon Aktifkan Javascript!Enable JavaScript

الثلاثاء، 9 يوليو 2019

Computer Networks Questions & Answers – ICMP MCQ أسئله شبكات بالأجابات الجزء السادس و الاربعون


Computer Networks Questions & Answers – ICMP 

1. Internet Control Message Protocol(ICMP) has designed to compensate
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned

Answer: d
Explanation: ICMP has been designed to address these issues.


2. Header size of the ICMP message is
a) 8-bytes
b) 8-bits
c) 16-bytes
d) 16-bits

Answer: a
Explanation: ICMP message has 8-bytes header and variable size data section.


3. During error reporting, ICMP always reports error messages to
a) Destination
b) Source
c) Next router
d) Previous router

Answer: b
Explanation: ICMP sends error message to the source because the datagram knows information about source and destination IP address.


4. Which of these is not a type of error-reporting messages
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded

Answer: c
Explanation: Router error is not a type of error-reporting messages in ICMP.


5. ICMP error message will not be generated for a datagram having a special address such as
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127

Answer: a
Explanation: No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.


6. When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded

Answer: a
Explanation: Router sends destination unreachable message if the destination is not found.


7. The source-quench message in ICMP was designed to add a kind of ____________ to the IP.
a) Error control
b) Flow control
c) Router control
d) None of the mentioned

Answer: b
Explanation: Firstly, it informs the source that the datagram has been discarded. secondly, it warns the source that there is congestion in the network.


8. In case of time exceeded error, when the datagram visits a router, the value of time to live field is
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1

Answer: d
Explanation: This field will be decremented by 1 at every router, and will be zero by the time it reaches source.


9. Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source

Answer: b
Explanation: Router sends destination unreachable message if the destination is not found.


10. During debugging, we can use the ____________ program to find if a host is alive and responding
a) Traceroute
b) Shell
c) Ping
d) Java

Answer: c
Explanation: Ping program is used to find if a host is alive and responding.



11. In windows, ____________ can be used to trace the route of the packet from the source to the destination
a) Traceroute
b) Tracert
c) Ping
d) Locater

Answer: b
Explanation: Tracert is used in case of windows, whereas Traceroute in UNIX.


12. In a simple echo-request message, the value of the sum is 01010000 01011100. Then, value of checksum is
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011

Answer: a
Explanation: Checksum is the compliment of the sum(exchange 0’s and 1’s).

تابع أسئلة الشبكات

ليست هناك تعليقات:

إرسال تعليق