University |Multiple Choice Questions|

Computer Network (CS 610)

[Errors and Omissions are Accepted]



1). A ---------- Relies on the hardware manufacturer to assign a unique physical address to each network interface.
  • Static addressing scheme    
  • Configurable addressing scheme 
  • Dynamic addressing scheme 
  • None of the given 

2). An interface for thin Ethernet must have an ____________ connector, and must  enerate signals according to the_____________ specification.
  • RJ-45, 10 Base T 
  • RJ-45, 10 Base 5 
  • BNC, 10 Base 2
  • BNC, 10 Base T   

3). A system with redundant bridges might have a problem with_______ in the system.
  • Loop
  • Filters 
  • Spanning Trees
  • All given choices   

4).    A Bridge can ________
  • Filter a frame 
  • Forward a frame 
  • Extend a LAN 
  • All 

5). ________ is used for typical data applications (where the data rate may be unknown and bursty) and allows use of whatever bandwidth is available at a given time. 

  • Constant Bit Rate (CBR) service 
  • Variable Bit Rate (VBR) service 
  • Available Bit Rate (ABR) service
  • None of the given   

6). ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy. 
  • 21-bit 
  • 22-bit 
  • 23-bit 
  • 24-bit 

7). ________ of TCP/IP layering model, corresponds to basic network hardware.   
  • Physical Layer
  • Network Interface Layer 
  • Internet Layer 
  • Transport Layer  

8). _________ places the boundary between the second and third octets   
  • Class A 
  • Class B
  • Class C 
  • Class D   

9). UDP and TCP are both_________ layer protocols   
  • Physical 
  • Data link 
  • Network 
  • Transport

10)   Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________ 

  • IP 
  • None of the given 
  • TCP
  • UDP   

11). _______ protocols of TCP/IP layering model specify how to ensure reliable transfer.  
  • Physical Layer 
  • Network Interface Layer 
  • Internet Layer 
  • Transport Layer

12). ________identifies which application program on receiving computer should receive the data   
  • Logical address 
  • Source port 
  • Destination Port
  • None of the given   

13). ________ identifies the application program that sent the data.   
  • Destination Port 
  • Source port
  • Logical address 
  • None of the given   

14). Which of the following are interior routing protocols?   
  • RIP 
  • OSPF 
  • BGP 
  • RIP and OSPF

15). The Border Gateway Protocol (BGP) uses_________ for all communication   
  • UDP 
  • TCP
  • Both UDP and TCP 
  • None of the given   

16). __________measures distance in network hops, where each network between the source and destination counts as single hop.   
  • BGP 
  • OSPF 
  • RIP
  • None of the given   

17). OSPF is based on____   
  • Distance vector routing 
  • Link state routing
  • Path vector routing 
  • Distance vector routing and Link state routing   

18). _________ performs local multicast and uses IP-in-IP encapsulation to send multicast datagrams from one site on the Internet to another.   
  • Distance Vector Multicast Routing Protocol (DVMRP)
  • Core Based Trees (CBT) 
  • Protocol Independent Multicast_ Sparse Mode (PIM-SM) 
  • Protocol Independent Multicast _ Dense Mode (PIM-DM)   

19). The length of time required to send a variable length packet is variable and does not require a complicated interrupt scheme to detect completion of transmission.   
  • True       
  • False

20). NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base header.   
  • True
  • False   

21). Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.   
  • True
  • False
  
22). Address mask defines how many bits of address are in suffix.   
  • True 
  • False

23). A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks? 
  • True
  • False  

24). In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.   
  • False 
  • True  

25). The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.   
  • Itself
  • Prefix
  • Suffix 
  • Mask   

26). In which method of Address Resolution Protocol the protocol address independent of hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?  
  • T, C 
  • T, D 

27). In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange? 
  • C
  • T, C

28). Reconstruction of original data gram is called reassembly.   
  • True
  • False  

29).   A computer needs a complete stack of protocols to run either a client or a server.   
  • True
  • False   

30). TCP uses _______ mechanism to control the flow of data.   
  • Door 
  • Window
  • Acknowledgment 
  • Retransmission  

31). In Direct point to point communication adding the Nth computer requires------------ new connections.
  • None of the given  
  • N 2        
  • N-1    
  • (N2 –N)/2      

32). In -------------, network occupies the smaller area like a room a floor or a building  
  • LAN
  • WAN  
  • MAN  
  • None of the given  

33). The third field of the header consists of ------ bit Ethernet frame type.
  • 48 
  • 32  
  • 16
  • 8  

34). The maximum size of an Ethernet segment is___________
  • 250 meters        
  • 500 meters       
  • 700 meters  
  • None of the given  

35). The network with Throughput T and Delay D has a total --------------- bits in transit at a time.
  • D + T  
  • D – T        
  • D X T    
  • D / T  

36). ___________ places the boundary between the first and second octets
  • Class A           
  • Class B  
  • Class C  
  • Class D  

37). Router detects datagram --------- than network MTU and then it splits into pieces and each piece is ----------than outbound network MTU.
  • Larger, smaller 
  • Larger, larger  
  • Smaller, larger  
  • Smaller, smaller  

38). Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction & operating system independent are the characteristics of ___________________
  • TCP        
  • UDP 
  • IP  
  • None of the given    

39). ----------- provides Application to application communication it also called end to end communication
  • IP        
  • TCP 
  • RIP  
  • None of the given  

40). A routing table contains_______
  • The destination network ID  
  • The hop count to reach the network        
  • The router ID of the next hop
  • All of the given  

41). Which of the following protocols allows the sender and receiver to enforce polices.
  • RIP  
  • OSPF        
  • BGP     
  • RIP and OSPF  

42). __________measures distance in network hops, where each network between the source and destination counts as single hop.
  • BGP  
  • OSPF        
  • RIP   
  • Non of these  

43). _______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted.
  • RIP        
  • OSPF 
  • BGP  
  • None of the given 

44). One repeater ---------------, two repeaters --------------- the maximum cable length limitation.
  • Double, triple    
  • Double, 4 time  
  • Half, triple  
  • Double, half  

45). ICMP message transport is acted upon by getting ICMP encrypted in IP.  
  • True 
  • False  

46). Like most application programs, a client and server use a transport protocol to communicate.    
  • True   
  • False  

47). Mapping between a protocol address and a hardware address is called Address Resolution.
  • True  
  • False  

48). Address mask defines how many bits of address are in suffix?     
  • True        
  • False      

49). A single networking technology is best for all needs.    
  • True        
  • False    
 50). Information can flow in either or both direction between
  • Clients              
  • Clients and servers
  • Servers  
  • None of given  

51). On of the design goals for unicast route propagation is __________.
  • Consistency  
  • Inconsistency              
  • Stability
  • Dynamic addressing  

52). IPV6 address consists of ________
  • 32 Bits  
  • 64 Bits              
  • 128 Bits
  • none of the given  

52). UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.          
  • True
  • False    

53). In case TCP, retransmission, acknowledgment from a computer on LAN are expected to arrive within
  • Seconds  
  • Micro seconds  
  • Milliseconds  
  • Nanoseconds 

54). Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.           
  • True
  • False  

55). Please choose one  A network uses a ------arranges for computers to be connected in a closed loop.
  • Star Topology             
  • Ring Topology
  • Bus Topology  
  • None of the given  

56). Protocol addresses are abstractions provided by ___________.  
  • Hardware              
  • Software
  • Operating system  
  • Internet 
57). In Direct point to point communication adding the Nth computer requires------------ new connections.
  • None of the given 
  • N2 
  • N-1
  • (N2 –N)/2      

58). In Point-to-Point topology there are two topologies.
  • Tree and Ring 
  • Star and Ring 
  • Star and Tree
  • None of the given 

59). In -------------, network occupies the smaller area like a room a floor or a building   
  • LAN
  • WAN  
  • MAN 
  • None of the given 

60). Hardware that calculates a CRC uses two simple components.
  • AND unit and XOR unit 
  • Shift register and XOR unit 
  • Shift register and AND unit 
  • None of the given   

61). CRC can detect more errors than a simple checksum.
  • True   
  • False 

62). The Gigabit Ethernet hardware operates at a rate of --------
  • 10 Mbps 
  • 100 Mbps 
  • 1000 Mbps
  • None of the given  

63). Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
  • 10 Base 2 
  • 10 Base 5 
  • 10 Base T
  • None of the given  

64). An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
  • RJ-45, 10 Base T 
  • RJ-45, 10 Base 5 
  • BNC, 10 Base 2
  • BNC, 10 Base T 
65). ________ computes shortest paths in a graph by using weights on edges as a measure of distance.
  • Greedy algorithm 
  • Distance vector algorithm 
  • Dijksta’s algorithm
  • Non of the given 
66). Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.



  • Connectionless service paradigm
  • Connection-oriented service paradigm 
  • Both Connectionless and Connection-oriented service paradigm 
  • None of the given 

67). An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
  • 48-bit 
  • 32-bit 
  • 24-bit 
  • None of the given  

68). The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
  • prefix , suffix
  • suffix , prefix 
  • suffix , suffix 
  • None of the given  

69). ___________ places the boundary between the first and second octets
  • Class A
  • Class B 
  • Class C 
  • Class D 

 70). ___________ places the boundary between the third and fourth octets.
  • Class A 
  • Class B 
  • Class C
  • Class D  

71). ________ field of header indicates whether a datagram is a fragment or a complete datagram. 
  • FLAGS 
  • FLAGMENT OFFSET 
  • IDENTIFICATION 
  • None of the given 

72). ______ provides connectionless service.   
  • TCP 
  • UDP
  • IP 
  • None of the given 
73). ____________ uses distance vector approach to define routing
  • BGP 
  • OSPF 
  • RIP        
  • None of the given 

74). ICMP message transport is acted upon by getting ICMP encrypted in IP. 
  • True
  • False    

75). These packets serve same purpose on ________ as frames on ______ 
  • Intranet, LAN 
  • Internet, WAN 
  • Intranet, WAN 
  • Internet, LAN

76). The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.  
  • Itself
  • Prefix 
  • Suffix 
  • Mask 

77). Find the class of the address. 10100111 11011011 10001011 01101111 
  • B
  • C   

78). Find the class of the address: 11110011 10011011 11111011 00001111  
  • E     
  • B   

79). Which method of Address Resolution Protocol requires hardware broadcast? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange? 
  • D
  • T, D   

80). Which method of Address Resolution Protocol resolution with minimum delay? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
  • T, D 
  • C
  • T, C  

81). In which method of Address Resolution Protocol the implimentation is more difficult? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
  • T, C 

82). Propagation multicast routing information differs dramatically from unicast route propagation? 
  • True
  • False 

83). To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
  • True 
  • False

84). In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
  • Anycast 
  • Unicast 
  • Multicast 
  • Non of the given

85). Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
  • Unicast 
  • Anycast 
  • Multicast
  • Non of the given   

86). UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries. 
  • True
  • False   

87). Reliability is the responsibility of the _________ layer
  • Network 
  • Datalink 
  • Transport
  • Application  

88). The time for acknowledgement to arrival of packet depends on.
  • Distance to destination and Current traffic conditions
  • Current traffic conditions 
  • Distance to destination 
  • Non of these   

89). FDDI can transmits data at a rate of ----------
  • 100 million bits per second
  • 10 million bits per second 
  • 1000 million bits per second 
  • None of the given  
90). Computer networks are often called -------------- because they use packet technology.         
  •  Ethernet        
  •  Switch networks        
  •  Packet networks   
  •  None of the given   

91). An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.        
  •  Explicit frame type          
  •  Ideal frame type         
  •  Implicit frame type         
  •  None of the given  

92). A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_________         
  •  Layer 2 source address        
  •  Source node’s physical address        
  •  Layer 2 destination address            
  •  Layer 3 destination address   

93). Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________          
  •  Hierarchal address         
  •  Default route           
  •  Shortest path      
  •  None of the given
 
94). ________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.          
  •  IP        
  •  UDP        
  •  TCP              
  •  None of the given   
 95). _______    is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.         
  •  Flood-and –Prune        
  •  Configuration-and -Tunneling        
  •  Core-Based Discovery        
  •  None of the given   

96). Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source address         
  •  3        
  •  2        
  •  1        
  •  0    

97). ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.       
  •  32, 48      
  •  24, 32        
  •  32, 64        
  •  32, 128   

98). The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.       
  • True     
  • False    

99). To save traffic, an EGP does not summarize routing information from the autonomous system before passing it to another autonomous system.       
  • True        
  • False 

100). Which of the following is a correct representation of the IPv6?       
  •  105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255     
  •  105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255         
  •  105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256        
  •  105.220.136.100.255.255.255.255.0.0.18.128.140.10.255  

101). The number of connections needed for N computer in direct point to point communication is equal to:   
  •  (N2 –N)/2                  
  •  N(N- 1)        
  •  N2        
  •  None of the given  

102). When an application--------------- data, it makes a copy of the data available to all other computers on the network.        
  •  Broadcasting                    
  •  Multicasting        
  •  Unicasting        
  •  None of the given 

103). Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.        
  •  64        
  •  48            
  •  32        
  •  8  
104). Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary interaction and operating system independent are the characteristics of _____________. 
  •  TCP        
  •  UDP    
  •  IP        
  •  None of the given  

105). The process of using a routing table to select a next hop for a given datagram is called_________        
  •  Encapsulation        
  •  Reassembling        
  •  Routing or forwarding           
  •  None of the given   

106). A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called__________        
  •  Distance Vector Multicast Routing Protocol (DVMRP)        
  •  Core Based Trees (CBT)                 
  •  Protocol Independent Multicast_ Sparse Mode (PIM-SM)        
  •  Protocol Independent Multicast _ Dense Mode (PIM-DM)  

107). Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.        
  •  postfix, Infix        
  •  non of these        
  •  Infix, prefix        
  •  prefix, suffix        

108). ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.        
  •  32, 48              
  •  24, 32        
  •  32, 64        
  •  32, 128  

109). End-to-end delivery service is connection oriented.   
  •  True        
  •  False                 

110). In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.        
  •  False        
  •  True         

111). Which method of Address Resolution Protocol is useful with any hardware? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?        
  •  T                          
  •  C        
  •  D        
  •  C, D

112). We use the term _______ to refer to a measure of the path that routing software use when choosing a route.        
  •  Routing path        
  •  Routing metric        
  •  Routing                  
  • Switching


No comments:

Post a Comment