Question No: 1 ( Marks: 1 ) - Please choose one
In Point-to-Point topology there are two topologies.
► Tree and Ring
► Star and Ring
► Star
and Tree
► None of the given
Question No: 2 ( Marks: 1 ) - Please choose one
------ Program sends a message to a remote computer and reports whether the computer responds.
► Ping
► Traceroute
► ICMP
► Non of the given
Question No: 3 ( Marks: 1 ) - Please choose one
------ has no way to determine the cause of the problem.
► ICMP
► Non of the given
► Ping
► Trace route
Question No: 4 ( Marks: 1 ) - Please choose one
The term----- ------- refers to the general concept of a small block of data
► Packet
► Frame
► Data
► None of the given
Question No: 5 ( Marks: 1 ) - Please choose one
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
► Parity
► Checksums
► CRC
► None of given
Question No: 6 ( Marks: 1 ) - Please choose one
Local Talk is a LAN technology that employs -------------
► Bus topology
► Ring topology
► None of the given
► Star topology
Question No: 7 ( Marks: 1 ) - Please choose one
Most LANs that employ ring topology use an access mechanism known as-------
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
► None of the given
Question No: 8 ( Marks: 1 ) - Please choose one
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
► 64
► 48
► 32
► 8
Question No: 9 ( Marks: 1 ) - Please choose one
Formally named __________ informally known as the thick wire Ethernet or Thick net.
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
NAT device stores state information in translation table.
Select correct option:
True
False
A _____________ address-binding table is used for each physical network.
Select correct option:
new
similar
separate
old
Fragmentation when using ICMP for path MTU should be avoided.
Select correct option:
True
False
Static routing
_______ can be used to propagate information about remote networks.
Select correct option:
Dynamic routing
Static routing
Address resolution
None of the given
TCP stands for _______
Select correct option:
Transport control protocol
Transmission control protocol
The Universal Datagram Protocol is not an end-to-end protocol.
Select correct option:
True
False
For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False
Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix
Select correct option:
True
False
which is not the type of error messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given
Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
HEADER LEN field gives size of extention header.
Select correct option:
False
True
is a ____ protocol.
Select correct option:
Point-to-Point
Multi-Point
Both (a) and (b)
None of the given
CP
NAT device stores state information in translation table.
Select correct option:
True
False
Postfix defines how much of address used to identify network.
Select correct option:
True
False
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of______ possible sizes.
Select correct option:
three
two
four
five
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame
Twice NAT allows a site to run servers.
Select correct option:
True
False
The maximum segment size of TCP flow control is_________
Select correct option:
3000 octets
2000 octets
1000 octets
none of the given
In IP routing, forwarding refers to ____ transfer.
Select correct option:
packet
datagram message
None of the given
There are _____ possibilities to detect the destination using Trace-route
Select correct option:
1
2
3
None of the given
dynamic routing, the routing table is initialized when system boots.
Select correct option:
True
False
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
Dotted decimal represents each octet in ______ and uses a dot to separate octets.
Select correct option:
binary
decimal
hexadecimal
Octal
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
In IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers.
Select correct option:
12
14
16
none of the given
______ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
IPV6 address consists of ______
Select correct option:
32 Bits
64 Bits
128 Bits
none of the given
The IP class scheme does not divide the______ address space into equal size class and the classes do not contain the same number of networks.
Select correct option:
16-bit
32-bit
48-bit
64-bit
A datagram cannot be larger than ______ of a network over which it is sent.
Select correct option:
MTU
Size
IP header
None of the given
An Internet Address (IP address) is a unique ________ binary number assigned to a host and used for all communication with host
Select correct option:
48-bit
32-bit
24-bit
None of the given
IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False
Due to revolutionalization of IP-V6 the speed has increased from_____
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
_______uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given
window mechanism
Question No: 10 ( Marks: 1 ) - Please choose one
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
UPD is operating system independent.
Select correct option:
True
False
A________ is a special-purpose computer dedicated to the task of interconnecting networks.
Select correct option:
Router
Bridge
Switch
None of the given
Network having short intervals has a large timeout and the network having large interval has short timeout.
Select correct option:
True
False
_________ places the boundary between the first and second octets
Select correct option:
Class A
Class B
Class C
Class D
Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix
Select correct option:
True
False
There are three standard implementations to improve computational efficiency: Hashing, Direct Indexing and InDirect Indexing
True
False
IPV6 128 bits address includes network prefix and ______
Select correct option:
Host Suffix
Host prefix
Source Prefix
none of the given
ICMP message transport is acted upon by getting ICMP_______ in IP.
Select correct option:
De-encapsulated
Encapsulated
Segmented
none of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.
Select correct option:
True
False
Twice NAT allows a site to run servers.
Select correct option:
True
False
Preliminary version of IP was called _________.
Select correct option:
IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False
_________ uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given
The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.
Select correct option:
True
False
Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given
The Source can configure outgoing datagram’s to avoid _________
Select correct option:
Segmentation
Defragmentation
Fragmentation
None of the given
The time for acknowledgement to arrive depends on __________
Select correct option:
Distance to destination
Current traffic conditions
Both a and b
none of the given
which is not the type of error messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given
Preliminary version of IP was called _________.
Select correct option:
IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
HEADER LEN field gives size of extention header.
Select correct option:
False
True
_______ shows senders preference for low latency, high Reliability.
Select correct option:
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False
________ field of header indicates whether a datagram is a fragment or a complete datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATIONNo.3
None of the given (not sure) Page 105
In ______________, the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.
Select correct option:
Address Resolution
Table Lookup
Message Exchange
Closed-form Computation Page 94
Postfix defines how much of address used to identify network.
Select correct option:
True
False
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGSNo.4
FRAGMENT OFFSET
IDENTIFICATION
None of the given (not sure) Page 105
H.LEN shows the header length in units of ____ Bits
Select correct option:
34
32 Page 105
30
None of the given
In Closed-form computation, the protocol address assigned to a computer is chosen carefully so
that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.
Select correct option:
arithmetic
XOR
Shift
XNORNo.5
For _____________, information about forwarding is stored in a routing table, which is initialized atsystem initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless Page 120
both a and b
none of the given
CS610 Computer Networks 1. Which of the following statement is true regarding Jitter?
Jitter is used for variance in transmission delays.
Jitter can occur when a packet is delayed.
Jitter is significance for voice, video and data.
All of the above
CS610 Computer Networks 2. The maximum cable length of a LAN is _____
Fixed
Unlimited
Fixed and Unlimited in different conditions
None of these
CS610 Computer Networks 3. Jitter is significance for ------------------
Voice
Video
Data
All of above
CS610 Computer Networks 4.The routing table contains information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above
CS610 Computer Networks 5. Which of the following is called virtual channel?
Connection in VCI
Connection in ATM
Connection in virtual circuit
None of the above
CS610 Computer Networks 6. If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
3
2
1
0
CS610 Computer Networks 7. Frame forwarding of a bridge is based on _________.Layer 3 source address
Layer 3 destination address
Layer 2 destination address
Layer 2 Source address
CS610 Computer Networks 8. The process of forwarding the packets of information is called…………….
Routing
Switching
Communication
None of the above
CS610 Computer Networks 9. Which one of the following is a property of static routing?
It is inflexible
It is done at boot time
It has low network overload
All of the above
CS610 Computer Networks 10. According to a bridges Performance, if both the sauces and destination are on the same segment
It forward the frame to the other segment
It does not forward the frame to the other segment
It does not forward the frame to the same segment
It forwards the frame to every other segment