CS610 – Computer Network
------ Program sends a message to a remote computer and reports whether the computer
responds.
Ping
Ping
Traceroute
ICMP
Non of the given
responds.
Ping
Ping
Traceroute
ICMP
Non of the given
---------- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given
The term -------- is used to denote the definition of a packet used with a specific type of
network.
Packet
Frame
Data
None of the given
network.
Packet
Frame
Data
None of the given
Computer networks are often called -------------- because they use packet technology.
Ethernet
Switch networks
Packet networks
None of the given
-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given
Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
Ethernet
Switch networks
Packet networks
None of the given
-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given
Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
8 octets
8 bytes
8 bits
None of the given
8 octets
8 bytes
8 bits
None of the given
Formally named __________ informally known as the twisted pair Ethernet or TP
Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given
Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given
An interface for twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T
A bridges function in the _________ layers(s).
Physical (MAC)
Data link
Network
Physical (MAC) and Data link
A Bridge can ________
Filter a frame
Forward a frame
Extend a LAN
Do all the above
A Bridge forwards or filters a frame by comparing the information in its address table to
the frame's__________
Layer 2 source address
Source node's physical address
Layer 2 destination address
Layer 3 destination address
the frame's__________
Layer 2 source address
Source node's physical address
Layer 2 destination address
Layer 3 destination address
________ computes shortest paths in a graph by using weights on edges as a measure of
distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta's algorithm
Non of the given
distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta's algorithm
Non of the given
___________ is used for audio and video, since these have predefined maximum data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given
---------- is also called self healing network ATM
FDDI
Token Ring
None of the given
FDDI
Token Ring
None of the given
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given
Hardware that calculates a CRC uses two simple components.
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
The Ethernet standard specifies that frames are sent using the --------
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
When an application ------------ data, it makes a copy of the data available to all other computers on the network.
Select correct option:
Broadcasting
Multicasting
Unicasting
None of the given
LAN interface may use ---------- to copy frame data directly from main memory.
DMA
FDDI
CSMA/CD
None of the given
FDDI
CSMA/CD
None of the given
LAN and WAN are classified according to their.........
Select correct option:
Size
Connectivity
Medium
Mobility
Select correct option:
Size
Connectivity
Medium
Mobility
For how much time would other computers be in wait while one computer was transferring 56MB file with transmission speed of 56Kbps
Select correct option:
10 Sec
11 Sec
12 Sec
13 Sec
Select correct option:
10 Sec
11 Sec
12 Sec
13 Sec
A network uses _______ to arrange computers to be connected in a single closed loop.
Select correct option:
Star Topology
Dual Ring Topology
Ring Topology
Bus Topology
Select correct option:
Star Topology
Dual Ring Topology
Ring Topology
Bus Topology
CBR stands for…………….
Constant Byte Rate
Constant Bit Rate
Connection break Recovery
None of the above
The routing table in interior and exterior switches has which one of the following?
It should have next hop for each possible destination
The next hop in table must be on shortest path to destination
Both (a) and (b)
None of the above
Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Boot time routing
None of the above
Which one of the following is the responsibility of Djikstra' algorithm?
To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above
Routing table is used to keep the information about…………….
Destination
Medium of transmission
Routers used in network
All of the above
Frame relay is………………….
Connection oriented service
Connectionless service
It is typically ranges from 5Mbps to 1000Mbps.
None of the above
Which of the following is not a guided medium?
Twisted-pair
cable Fiber-optic
cable Atmosphere
Coaxial cable
Which of the following statement is wrong regarding PVC?
PVC last as long as the customer pay the periodic fee for its use.
Forwarding tables are automatically restored after pow er of equipment failure.
Forwarding table entries for PVC's are dynamically configured.
All of the above are wrong
Which of the following statement is true regarding ATM?
ATM is a single technology that is designed to meet the goals of both LANs and WANs.
ATM uses the concept of connection-oriented networking.
Both (a) and (b)
None of the above
Djikstra's algorithm is used to compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above
_________ is used to attach two autonomous systems.
Select correct option:
BGP
IGP
EGP
none of the given
Select correct option:
BGP
IGP
EGP
none of the given
Due to revolutionization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
False
Select correct option:
True
False
TTL stands for __________
Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given
Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given
IGPs stand for _________
Select correct option:
Internal Gateway Protocols
Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given
Select correct option:
Internal Gateway Protocols
Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given
_____________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given
Select correct option:
Logical address
Source port
Destination Port
None of the given
__________________encapsulates IP datagram as data area in hardware frame.
Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given
Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given
Class A mask is 255.0.0.0 which is used for ________________
Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
class A mask is 255.0.0.0 which is used for subnetting.
Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
class A mask is 255.0.0.0 which is used for subnetting.
NAT is not useful at a residence with Cable Modem or DSL connectivity.
Select correct option:
True
False
Select correct option:
True
False
Autonomous System chooses a routing protocol to exchange routing information which is passed before being summarized to another group.
Select correct option:
True
False
Select correct option:
True
False
______ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
Select correct option:
Network
Transport
Datalink
none of the given
The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given
The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False
Select correct option:
True
False
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five
Select correct option:
three
two
four
five
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
EGP stands for _________
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit
Select correct option:
16-bit
48-bit
64-bit
128-bit
Reliability is not the responsibility of the Transport layer.
Select correct option:
True
False
Select correct option:
True
False
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
Select correct option:
96
100
120
none of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False
Select correct option:
True
False
TCP uses the term segment to refer to a ________.
Select correct option:
packet
message
both (a) and (b)
None of the given
Select correct option:
packet
message
both (a) and (b)
None of the given
both a and b?
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False
Select correct option:
True
False
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
IP datagram can contains ________ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
Select correct option:
True
False
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
Select correct option:
IPV4
IPV6
Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given
Select correct option:
Traffic class
Flow label
Destination address
none of the given
_______ protocol uses three way handshake to begin a connection.
Select correct option:
UDP
TCP
IP
none of the given
Select correct option:
UDP
TCP
IP
none of the given
Typical internet routing uses uses a combination of two metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count
Question # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given
The routers within an autonomous system use a _____________ to exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False
Select correct option:
True
False
The Network Layer Protocol ICMP stands for____________
Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given
Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given
The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given
Select correct option:
18 years
20 years
22 years
none of given
TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False
In Direct point to point communication adding the Nth computer
requires___________ new connections.
N2
N-1
N2 –N)/2
None of the given
Most LANs that employ ring topology use an access mechanism known
as_______
ring topology use token passing for
synchronized access to the ring
Computers attached to an ether use ------ in which a computer waits for the
ether to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
FDDI can transmits data at a rate of ___________________
100 million bits per second
100 million bits per second
100 million bits per second
None of the given
________________ has advantages arisen from the size and ease of
computation.
CRC
Parity
Checksums
None of given
AUI cable connects from NIC to---------------
Select correct option:
BNC Connector
RJ-45 Connector
Transceiver
None of the above
As a result of ARPA research the first network was established which was named as Select correct option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWORK
A ---------- provides mechanism that automatically assignes a physical address to a station when the station first boots. Select correct option:
Static ad Configurable
addressing scheme
polygons are basically concave polygons that may have self-intersecting edges.
Complex
Hybrid
Convex
Convex and Hybrid
Dynamic addressing scheme
An ___________method, the network hardware designers specify how type
information is included in the frame and the value use to identify various frame Local Talk is a LAN technology that employs
Explicit frame type
Ideal frame type
Implicit frame type
None of the given
In Point-to-Point topology there are two topologies.
Ideal frame type
Implicit frame type
None of the given
In Point-to-Point topology there are two topologies.
Tree and Ring
Star and Ring
Star and Tree
None of the given
The topology each computer is connected to a central hub is called
Select correct option:
Ring topology
Star topology
Tree topology
Mesh topology
The basic responsibility of NIC is ---------------- Select correct option:
To access medium
Network To resource allocation
To access memory
All of above
Currently the original Ethernet hardware operates at a rate of --------
Select correct option:
10 Mbps
100 Mbps
1000 Mbps
3 Mbps
The Gigabit Ethernet hardware operates at a rate of_________
10 Mbps
100 Mbps
1000 Mbps
The number of connections needed for N computer in direct point to point
communication is equal to:
(N2-N)/2
N (N-1)
N2
None of the given
The length of the format of hardware address is
Select correct option:
One to ten bytes
One to five bytes
One to six bytes
None of the given
Star topolgy is the kind of
Tree topology
Point-to-point topolgy
Broadcast topolgy
Ring topology
Local Talk is a LAN technology that employs________
Local Talk is a LAN technology that employs________
Bus topology
Ring topology
Star topology
None of the given
The network occupies larger areas like cities & countries is called
Select correct option:
LAN
WAN
MAN
All of the above
Computer networks are classified by.......factors
2
3
4
5
Computers attached to an ethernet use ________in which a computer waits for
the other to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
none of the given
Point-to-point topology is
Size Based
Mobility Based
Connectivity Based
Medium Based
NIC connection in a physical network is known as--------------------
Select correct option:
LAN wiring scheme
WAN wiring scheme
Color wiring
None of above
A_______ relies on the hardware manufacturer to assign a unique physical
address to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given
The main functions of NIC are ---------------------
CRC Error
correction Address
recognition
All of above
FDDI can transmits data at a rate of ___________________
100 million bits per second
100 million bits per second
100 million bits per second
None of the given
Wireless LAN use the -------- as a media access method
Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA
A_______ relies on the hardware manufacturer to assign a unique physical
address to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given
Wireless LAN use the -------- as a media access method
Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA
According to their size there are............classifications of networks.
Select correct option:
2
3
4
5
As a result of ARPA research the first network was established which was named as Select correct option:
As a result of ARPA research the first network was established which was named as Select correct option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWOR
---------- performs the matching between destination address and MAC address of machine.
Select correct option:
Hardware address
LAN interface
DMA
None of above
An ___________method, the network hardware designers specify how type
information is included in the frame and the value use to identify various frame
types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given
The demand of sharing is very high because many computers need to use the shared networks.
Select correct option:
WAN networks
Shared networks
Unshared networks
LAN networks
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:
broadcast network
Thick Ethernet is known as------------------ Select correct option:
10 base 5
10 base T
10 base 100
10 base 1
The first automated tool required to see whether the given computer is online or not was
Select correct option:
Probing program
PING program
status program
None of the above
The basic responsibility of NIC is ----------------
Select correct option:
To access medium/network
To resource allocation
To access memory
All of above
No error detection scheme is perfect because transmission errors can affect _________.
Select correct option:
Data
Additional Information
Additional information & data
Transmission medium
-------------- has advantages arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing
The third field of the header consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology
Hardware that calculates a CRC uses two simple components.
Select correct option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
Fixed network is a type of networks which is classified with respect to the...........factor
Select correct option:
Size
Connectivity
Medium
Mobility
Network interface card acts like a (an) -----------
Select correct option:
Input/output device
Input device
Output device
All of above
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
The Gigabit Ethernet hardware operates at a rate of ________
10 Mbps
100 Mbps
1000 Mbps
None of the given
A network uses ------------ if all computers attach to a central point
Select correct option:
Ring Topology
Star Topology
Hub Topology
Bus Topology
---------- is also called self healing network
Select correct option:
ATM
FDDI
Token Ring
None of the given
---------- which is designed to help detect transmissions errors, send one extra bit of information with each character.
Select correct option:
Checksum
CRC
Parity
VRC
Hardware addresses must be ---------- on a LAN.
Select correct option:
Common
Unique
A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network
--------------
Whole stuff is up-to-date and covered whole MCQ's.
ReplyDeleteI found 5 MCQs WOW!
ReplyDelete