University |Multiple Choice Questions|
Computer Network (CS 610)
[Errors and Omissions are Accepted]
1). A ---------- Relies on the hardware manufacturer to assign a unique physical address to each network interface.
- Static addressing scheme
- Configurable addressing scheme
- Dynamic addressing scheme
- None of the given
2). An interface for thin Ethernet must have an ____________ connector, and must enerate signals according to the_____________ specification.
- RJ-45, 10 Base T
- RJ-45, 10 Base 5
- BNC, 10 Base 2
- BNC, 10 Base T
3). A system with redundant bridges might have a problem with_______ in the system.
- Loop
- Filters
- Spanning Trees
- All given choices
4). A Bridge can ________
- Filter a frame
- Forward a frame
- Extend a LAN
- All
5). ________ is used for typical data applications (where the data rate may be unknown and bursty) and allows use of whatever bandwidth is available at a given time.
- Constant Bit Rate (CBR) service
- Variable Bit Rate (VBR) service
- Available Bit Rate (ABR) service
- None of the given
6). ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
- 21-bit
- 22-bit
- 23-bit
- 24-bit
7). ________ of TCP/IP layering model, corresponds to basic network hardware.
- Physical Layer
- Network Interface Layer
- Internet Layer
- Transport Layer
8). _________ places the boundary between the second and third octets
- Class A
- Class B
- Class C
- Class D
9). UDP and TCP are both_________ layer protocols
- Physical
- Data link
- Network
- Transport
10) Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________
- IP
- None of the given
- TCP
- UDP
11). _______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
- Physical Layer
- Network Interface Layer
- Internet Layer
- Transport Layer
12). ________identifies which application program on receiving computer should receive the data
- Logical address
- Source port
- Destination Port
- None of the given
13). ________ identifies the application program that sent the data.
- Destination Port
- Source port
- Logical address
- None of the given
14). Which of the following are interior routing protocols?
- RIP
- OSPF
- BGP
- RIP and OSPF
15). The Border Gateway Protocol (BGP) uses_________ for all communication
- UDP
- TCP
- Both UDP and TCP
- None of the given
16). __________measures distance in network hops, where each network between the source and destination counts as single hop.
- BGP
- OSPF
- RIP
- None of the given
17). OSPF is based on____
- Distance vector routing
- Link state routing
- Path vector routing
- Distance vector routing and Link state routing
18). _________ performs local multicast and uses IP-in-IP encapsulation to send multicast datagrams from one site on the Internet to another.
- Distance Vector Multicast Routing Protocol (DVMRP)
- Core Based Trees (CBT)
- Protocol Independent Multicast_ Sparse Mode (PIM-SM)
- Protocol Independent Multicast _ Dense Mode (PIM-DM)
19). The length of time required to send a variable length packet is variable and does not require a complicated interrupt scheme to detect completion of transmission.
- True
- False
20). NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base header.
- True
- False
21). Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
- True
- False
22). Address mask defines how many bits of address are in suffix.
- True
- False
23). A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
- True
- False
24). In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
- False
- True
25). The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
- Itself
- Prefix
- Suffix
- Mask
26). In which method of Address Resolution Protocol the protocol address independent of hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
- T, C
- D
- C
- T, D
27). In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
- T
- D
- C
- T, C
28). Reconstruction of original data gram is called reassembly.
- True
- False
29). A computer needs a complete stack of protocols to run either a client or a server.
- True
- False
30). TCP uses _______ mechanism to control the flow of data.
- Door
- Window
- Acknowledgment
- Retransmission
31). In Direct point to point communication adding the Nth computer requires------------ new connections.
- None of the given
- N 2
- N-1
- (N2 –N)/2
32). In -------------, network occupies the smaller area like a room a floor or a building
- LAN
- WAN
- MAN
- None of the given
33). The third field of the header consists of ------ bit Ethernet frame type.
- 48
- 32
- 16
- 8
34). The maximum size of an Ethernet segment is___________
- 250 meters
- 500 meters
- 700 meters
- None of the given
35). The network with Throughput T and Delay D has a total --------------- bits in transit at a time.
- D + T
- D – T
- D X T
- D / T
36). ___________ places the boundary between the first and second octets
- Class A
- Class B
- Class C
- Class D
37). Router detects datagram --------- than network MTU and then it splits into pieces and each piece is ----------than outbound network MTU.
- Larger, smaller
- Larger, larger
- Smaller, larger
- Smaller, smaller
38). Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction & operating system independent are the characteristics of ___________________
- TCP
- UDP
- IP
- None of the given
39). ----------- provides Application to application communication it also called end to end communication
- IP
- TCP
- RIP
- None of the given
40). A routing table contains_______
- The destination network ID
- The hop count to reach the network
- The router ID of the next hop
- All of the given
41). Which of the following protocols allows the sender and receiver to enforce polices.
- RIP
- OSPF
- BGP
- RIP and OSPF
42). __________measures distance in network hops, where each network between the source and destination counts as single hop.
- BGP
- OSPF
- RIP
- Non of these
43). _______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted.
- RIP
- OSPF
- BGP
- None of the given
44). One repeater ---------------, two repeaters --------------- the maximum cable length limitation.
- Double, triple
- Double, 4 time
- Half, triple
- Double, half
45). ICMP message transport is acted upon by getting ICMP encrypted in IP.
- True
- False
46). Like most application programs, a client and server use a transport protocol to communicate.
- True
- False
47). Mapping between a protocol address and a hardware address is called Address Resolution.
- True
- False
48). Address mask defines how many bits of address are in suffix?
- True
- False
49). A single networking technology is best for all needs.
- True
- False
- Clients
- Clients and servers
- Servers
- None of given
51). On of the design goals for unicast route propagation is __________.
- Consistency
- Inconsistency
- Stability
- Dynamic addressing
52). IPV6 address consists of ________
- 32 Bits
- 64 Bits
- 128 Bits
- none of the given
52). UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
- True
- False
53). In case TCP, retransmission, acknowledgment from a computer on LAN are expected to arrive within
- Seconds
- Micro seconds
- Milliseconds
- Nanoseconds
54). Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.
- True
- False
55). Please choose one A network uses a ------arranges for computers to be connected in a closed loop.
- Star Topology
- Ring Topology
- Bus Topology
- None of the given
56). Protocol addresses are abstractions provided by ___________.
- Hardware
- Software
- Operating system
- Internet
57). In Direct point to point communication adding the Nth computer requires------------ new connections.
58). In Point-to-Point topology there are two topologies.
59). In -------------, network occupies the smaller area like a room a floor or a building
60). Hardware that calculates a CRC uses two simple components.
61). CRC can detect more errors than a simple checksum.
62). The Gigabit Ethernet hardware operates at a rate of --------
63). Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
64). An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
- None of the given
- N2
- N-1
- (N2 –N)/2
58). In Point-to-Point topology there are two topologies.
- Tree and Ring
- Star and Ring
- Star and Tree
- None of the given
59). In -------------, network occupies the smaller area like a room a floor or a building
- LAN
- WAN
- MAN
- None of the given
60). Hardware that calculates a CRC uses two simple components.
- AND unit and XOR unit
- Shift register and XOR unit
- Shift register and AND unit
- None of the given
61). CRC can detect more errors than a simple checksum.
- True
- False
62). The Gigabit Ethernet hardware operates at a rate of --------
- 10 Mbps
- 100 Mbps
- 1000 Mbps
- None of the given
63). Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
- 10 Base 2
- 10 Base 5
- 10 Base T
- None of the given
64). An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
- RJ-45, 10 Base T
- RJ-45, 10 Base 5
- BNC, 10 Base 2
- BNC, 10 Base T
65). ________ computes shortest paths in a graph by using weights on edges as a measure of distance.
67). An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
68). The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
69). ___________ places the boundary between the first and second octets
70). ___________ places the boundary between the third and fourth octets.
71). ________ field of header indicates whether a datagram is a fragment or a complete datagram.
72). ______ provides connectionless service.
74). ICMP message transport is acted upon by getting ICMP encrypted in IP.
75). These packets serve same purpose on ________ as frames on ______
76). The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
77). Find the class of the address. 10100111 11011011 10001011 01101111
78). Find the class of the address: 11110011 10011011 11111011 00001111
79). Which method of Address Resolution Protocol requires hardware broadcast? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
80). Which method of Address Resolution Protocol resolution with minimum delay? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
81). In which method of Address Resolution Protocol the implimentation is more difficult? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
82). Propagation multicast routing information differs dramatically from unicast route propagation?
83). To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
84). In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
85). Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
86). UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
87). Reliability is the responsibility of the _________ layer
88). The time for acknowledgement to arrival of packet depends on.
89). FDDI can transmits data at a rate of ----------
91). An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
92). A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_________
93). Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
- Greedy algorithm
- Distance vector algorithm
- Dijksta’s algorithm
- Non of the given
- Connectionless service paradigm
- Connection-oriented service paradigm
- Both Connectionless and Connection-oriented service paradigm
- None of the given
67). An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
- 48-bit
- 32-bit
- 24-bit
- None of the given
68). The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
- prefix , suffix
- suffix , prefix
- suffix , suffix
- None of the given
69). ___________ places the boundary between the first and second octets
- Class A
- Class B
- Class C
- Class D
70). ___________ places the boundary between the third and fourth octets.
- Class A
- Class B
- Class C
- Class D
71). ________ field of header indicates whether a datagram is a fragment or a complete datagram.
- FLAGS
- FLAGMENT OFFSET
- IDENTIFICATION
- None of the given
72). ______ provides connectionless service.
- TCP
- UDP
- IP
- None of the given
- BGP
- OSPF
- RIP
- None of the given
74). ICMP message transport is acted upon by getting ICMP encrypted in IP.
- True
- False
75). These packets serve same purpose on ________ as frames on ______
- Intranet, LAN
- Internet, WAN
- Intranet, WAN
- Internet, LAN
76). The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
- Itself
- Prefix
- Suffix
- Mask
77). Find the class of the address. 10100111 11011011 10001011 01101111
- A
- B
- E
- C
78). Find the class of the address: 11110011 10011011 11111011 00001111
- A
- C
- E
- B
79). Which method of Address Resolution Protocol requires hardware broadcast? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
- D
- T
- C
- T, D
80). Which method of Address Resolution Protocol resolution with minimum delay? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
- T, D
- C
- T
- T, C
81). In which method of Address Resolution Protocol the implimentation is more difficult? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
- T, C
- T
- C
- D
82). Propagation multicast routing information differs dramatically from unicast route propagation?
- True
- False
83). To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
- True
- False
84). In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
- Anycast
- Unicast
- Multicast
- Non of the given
85). Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
- Unicast
- Anycast
- Multicast
- Non of the given
86). UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
- True
- False
87). Reliability is the responsibility of the _________ layer
- Network
- Datalink
- Transport
- Application
88). The time for acknowledgement to arrival of packet depends on.
- Distance to destination and Current traffic conditions
- Current traffic conditions
- Distance to destination
- Non of these
89). FDDI can transmits data at a rate of ----------
- 100 million bits per second
- 10 million bits per second
- 1000 million bits per second
- None of the given
- Ethernet
- Switch networks
- Packet networks
- None of the given
91). An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
- Explicit frame type
- Ideal frame type
- Implicit frame type
- None of the given
92). A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_________
- Layer 2 source address
- Source node’s physical address
- Layer 2 destination address
- Layer 3 destination address
93). Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
- Hierarchal address
- Default route
- Shortest path
- None of the given
94). ________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.
96). Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source address
97). ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
98). The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.
99). To save traffic, an EGP does not summarize routing information from the autonomous system before passing it to another autonomous system.
100). Which of the following is a correct representation of the IPv6?
101). The number of connections needed for N computer in direct point to point communication is equal to:
102). When an application--------------- data, it makes a copy of the data available to all other computers on the network.
103). Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
105). The process of using a routing table to select a next hop for a given datagram is called_________
106). A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called__________
107). Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.
108). ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
109). End-to-end delivery service is connection oriented.
110). In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
111). Which method of Address Resolution Protocol is useful with any hardware? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
112). We use the term _______ to refer to a measure of the path that routing software use when choosing a route.
- IP
- UDP
- TCP
- None of the given
- Flood-and –Prune
- Configuration-and -Tunneling
- Core-Based Discovery
- None of the given
96). Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source address
- 3
- 2
- 1
- 0
97). ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
- 32, 48
- 24, 32
- 32, 64
- 32, 128
98). The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.
- True
- False
99). To save traffic, an EGP does not summarize routing information from the autonomous system before passing it to another autonomous system.
- True
- False
100). Which of the following is a correct representation of the IPv6?
- 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
- 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255
- 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
- 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255
101). The number of connections needed for N computer in direct point to point communication is equal to:
- (N2 –N)/2
- N(N- 1)
- N2
- None of the given
102). When an application--------------- data, it makes a copy of the data available to all other computers on the network.
- Broadcasting
- Multicasting
- Unicasting
- None of the given
103). Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
- 64
- 48
- 32
- 8
- TCP
- UDP
- IP
- None of the given
105). The process of using a routing table to select a next hop for a given datagram is called_________
- Encapsulation
- Reassembling
- Routing or forwarding
- None of the given
106). A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called__________
- Distance Vector Multicast Routing Protocol (DVMRP)
- Core Based Trees (CBT)
- Protocol Independent Multicast_ Sparse Mode (PIM-SM)
- Protocol Independent Multicast _ Dense Mode (PIM-DM)
107). Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.
- postfix, Infix
- non of these
- Infix, prefix
- prefix, suffix
108). ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
- 32, 48
- 24, 32
- 32, 64
- 32, 128
109). End-to-end delivery service is connection oriented.
- True
- False
110). In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
- False
- True
111). Which method of Address Resolution Protocol is useful with any hardware? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
- T
- C
- D
- C, D
112). We use the term _______ to refer to a measure of the path that routing software use when choosing a route.
- Routing path
- Routing metric
- Routing
- Switching
No comments:
Post a Comment