1. | When collection of various computers seems a single coherent system to its client, then it is called |
A. | computer network |
B. | distributed system |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» B. distributed system |
2. | Two devices are in network if |
A. | a process in one device is able to exchange information with a process in another device |
B. | a process is running on both devices |
C. | pids of the processes running of different devices are same |
D. | none of the mentioned |
Answer» A. a process in one device is able to exchange information with a process in another device |
3. | Which one of the following computer network is built on the top of another network? |
A. | prior network |
B. | chief network |
C. | prime network |
D. | overlay network |
Answer» D. overlay network |
4. | In computer network nodes are |
A. | the computer that originates the data |
B. | the computer that routes the data |
C. | the computer that terminates the data |
D. | all of the mentioned |
Answer» D. all of the mentioned |
5. | Communication channel is shared by all the machines on the network in |
A. | broadcast network |
B. | unicast network |
C. | multicast network |
D. | none of the mentioned |
Answer» A. broadcast network |
6. | Bluetooth is an example of |
A. | personal area network |
B. | local area network |
C. | virtual private network |
D. | none of the mentioned |
Answer» A. personal area network |
7. | A _____ is a device that forwards packets between networks by processing the routing information included in the packet. |
A. | bridge |
B. | firewall |
C. | router |
D. | all of the mentioned |
Answer» C. router |
8. | A list of protocols used by a system, one protocol per layer, is called |
A. | protocol architecture |
B. | protocol stack |
C. | protocol suit |
D. | none of the mentioned |
Answer» B. protocol stack |
9. | Network congestion occurs |
A. | in case of traffic overloading |
B. | when a system terminates |
C. | when connection between two nodes terminates |
D. | none of the mentioned |
Answer» A. in case of traffic overloading |
10. | Which one of the following extends a private network across public networks? |
A. | local area network |
B. | virtual private network |
C. | enterprise private network |
D. | storage area network |
Answer» B. virtual private network |
11. | OSI stands for |
A. | open system interconnection |
B. | operating system interface |
C. | optical service implementation |
D. | none of the mentioned |
Answer» A. open system interconnection view more info and meaning of OSI |
12. | The OSI model has ___ layers. |
A. | 4 |
B. | 5 |
C. | 6 |
D. | 7 |
Answer» D. 7 |
13. | TCP/IP model does not have ______ layer but OSI model have this layer. |
A. | session layer |
B. | presentation layer |
C. | application layer |
D. | both (a) and (b) |
Answer» D. both (a) and (b) |
14. | Which layer links the network support layers and user support layers |
A. | session layer |
B. | data link layer |
C. | transport layer |
D. | network layer |
Answer» C. transport layer |
15. | Which address is used in an internet employing the TCP/IP protocols? |
A. | physical address and logical address |
B. | port address |
C. | specific address |
D. | all of the mentioned |
Answer» D. all of the mentioned |
16. | TCP/IP model was developed _____ the OSI model. |
A. | prior to |
B. | after |
C. | simultaneous to |
D. | none of the mentioned |
Answer» A. prior to |
17. | Which layer is responsible for process to process delivery? |
A. | network layer |
B. | transport layer |
C. | session layer |
D. | data link layer |
Answer» B. transport layer |
18. | Which address identifies a process on a host? |
A. | physical address |
B. | logical address |
C. | port address |
D. | specific address |
Answer» C. port address |
19. | Which layer provides the services to user? |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | none of the mentioned |
Answer» A. application layer |
20. | Transmission data rate is decided by |
A. | network layer |
B. | physical layer |
C. | data link layer |
D. | transport layer |
Answer» B. physical layer |
21. | Which transmission media has the highest transmission speed in a network? |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | electrical cable |
Answer» C. optical fiber |
22. | Bits can be send over guided and unguided media as analog signal by |
A. | digital modulation |
B. | amplitude modulation |
C. | frequency modulation |
D. | phase modulation |
Answer» A. digital modulation |
23. | The portion of physical layer that interfaces with the media access control sublayer is called |
A. | physical signalling sublayer |
B. | physical data sublayer |
C. | physical address sublayer |
D. | none of the mentioned |
Answer» A. physical signalling sublayer |
24. | physical layer provides |
A. | mechanical specifications of electrical connectors and cables |
B. | electrical specification of transmission line signal level |
C. | specification for ir over optical fiber |
D. | all of the mentioned |
Answer» D. all of the mentioned |
26. | The physical layer is responsible for |
A. | line coding |
B. | channel coding |
C. | modulation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
27. | The physical layer translates logical communication requests from the ______ into hardware specific operations. |
A. | data link layer |
B. | network layer |
C. | trasnport layer |
D. | application layer |
Answer» A. data link layer |
28. | A single channel is shared by multiple signals by |
A. | analog modulation |
B. | digital modulation |
C. | multiplexing |
D. | none of the mentioned |
Answer» C. multiplexing |
29. | Wireless transmission can be done via |
A. | radio waves |
B. | microwaves |
C. | infrared |
D. | all of the mentioned |
Answer» D. all of the mentioned |
30. | The data link layer takes the packets from _____ and encapsulates them into frames for transmission. |
A. | network layer |
B. | physical layer |
C. | transport layer |
D. | application layer |
Answer» A. network layer |
31. | Which one of the following task is not done by data link layer? |
A. | framing |
B. | error control |
C. | flow control |
D. | channel coding |
Answer» D. channel coding |
32. | Which sublayer of the data link layer performs data link functions that depend upon the type of medium? |
A. | logical link control sublayer |
B. | media access control sublayer |
C. | network interface control sublayer |
D. | none of the mentioned |
Answer» B. media access control sublayer |
33. | Header of a frame generally contains |
A. | synchronization bytes |
B. | addresses |
C. | frame identifier |
D. | all of the mentioned |
Answer» D. all of the mentioned |
34. | Automatic repeat request error management mechanism is provided by |
A. | logical link control sublayer |
B. | media access control sublayer |
C. | network interface control sublayer |
D. | none of the mentioned |
Answer» A. logical link control sublayer |
35. | When 2 or more bits in a data unit has been changed during the transmission, the error is called |
A. | random error |
B. | burst error |
C. | inverted error |
D. | none of the mentioned |
Answer» B. burst error |
36. | CRC stands for |
A. | cyclic redundancy check |
B. | code repeat check |
C. | code redundancy check |
D. | cyclic repeat check |
Answer» A. cyclic redundancy check view more info and meaning of CRC |
37. | Which one of the following is a data link protocol? |
A. | ethernet |
B. | point to point protocol |
C. | hdlc |
D. | all of the mentioned |
Answer» D. all of the mentioned |
38. | Which one of the following is the multiple access protocol for channel access control? |
A. | csma/cd |
B. | csma/ca |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
39. | The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called |
A. | piggybacking |
B. | cyclic redundancy check |
C. | fletcher’s checksum |
D. | none of the mentioned |
Answer» A. piggybacking |
40. | The network layer concerns with |
A. | bits |
B. | frames |
C. | packets |
D. | none of the mentioned |
Answer» C. packets |
41. | Which one of the following is not a function of network layer? |
A. | routing |
B. | inter-networking |
C. | congestion control |
D. | none of the mentioned |
Answer» D. none of the mentioned |
42. | The 4 byte IP address consists of |
A. | network address |
B. | host address |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
43. | In virtual circuit network each packet contains |
A. | full source and destination address |
B. | a short vc number |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» B. a short vc number |
44. | Which one of the following routing algorithm can be used for network layer design? |
A. | shortest path algorithm |
B. | distance vector routing |
C. | link state routing |
D. | all of the mentioned |
Answer» D. all of the mentioned |
45. | Multidestination routing |
A. | is same as broadcast routing |
B. | contains the list of all destinations |
C. | data is not sent by packets |
D. | none of the mentioned |
Answer» C. data is not sent by packets |
46. | A subset of a network that includes all the routers but contains no loops is called |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | none of the mentioned |
Answer» A. spanning tree |
47. | Which one of the following algorithm is not used for congestion control? |
A. | traffic aware routing |
B. | admission control |
C. | load shedding |
D. | none of the mentioned |
Answer» D. none of the mentioned |
48. | The network layer protocol of internet is |
A. | ethernet |
B. | internet protocol |
C. | hypertext transfer protocol |
D. | none of the mentioned |
Answer» B. internet protocol |
49. | ICMP is primarily used for |
A. | error and diagnostic functions |
B. | addressing |
C. | forwarding |
D. | none of the mentioned |
Answer» A. error and diagnostic functions |
51. | Which one of the following is a transport layer protocol used in internet? |
A. | tcp |
B. | udp |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
52. | User datagram protocol is called connectionless because |
A. | all udp packets are treated independently by transport layer |
B. | it sends data as a stream of related packets |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. all udp packets are treated independently by transport layer |
53. | Transmission control protocol is |
A. | connection oriented protocol |
B. | uses a three way handshake to establish a connection |
C. | recievs data from application as a single stream |
D. | all of the mentioned |
Answer» D. all of the mentioned |
54. | An endpoint of an inter-process communication flow across a computer network is called |
A. | socket |
B. | pipe |
C. | port |
D. | none of the mentioned |
Answer» A. socket |
55. | Socket-style API for windows is called |
A. | wsock |
B. | winsock |
C. | wins |
D. | none of the mentioned |
Answer» B. winsock |
56. | Which one of the following is a version of UDP with congestion control? |
A. | datagram congestion control protocol |
B. | stream control transmission protocol |
C. | structured stream transport |
D. | none of the mentioned |
Answer» A. datagram congestion control protocol |
57. | A _____ is a TCP name for a transport service access point. |
A. | port |
B. | pipe |
C. | node |
D. | none of the mentioned |
Answer» A. port |
58. | Transport layer protocols deals with |
A. | application to application communication |
B. | process to process communication |
C. | node to node communication |
D. | none of the mentioned |
Answer» B. process to process communication |
59. | The ____ translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» A. domain name system |
60. | Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits |
A. | 96 to 127 |
B. | 0 to 63 |
C. | 80 to 95 |
D. | 64 to 79 |
Answer» A. 96 to 127 |
61. | Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? |
A. | http |
B. | ftp |
C. | telnet |
D. | none of the mentioned |
Answer» C. telnet |
62. | Application layer protocol defines |
A. | types of messages exchanged |
B. | message format, syntax and semantics |
C. | rules for when and how processes send and respond to messages |
D. | all of the mentioned |
Answer» D. all of the mentioned |
63. | Which one of the following protocol delivers/stores mail to reciever server? |
A. | simple mail transfer protocol |
B. | post office protocol |
C. | internet mail access protocol |
D. | hypertext transfer protocol |
Answer» A. simple mail transfer protocol |
64. | The ASCII encoding of binary data is called |
A. | base 64 encoding |
B. | base 32 encoding |
C. | base 16 encoding |
D. | base 8 encoding |
Answer» A. base 64 encoding |
65. | Which one of the following is an internet standard protocol for managing devices on IP network? |
A. | dynamic host configuration protocol |
B. | simple newtwork management protocol |
C. | internet message access protocol |
D. | media gateway protocol |
Answer» B. simple newtwork management protocol |
66. | Which one of the following is not an application layer protocol? |
A. | media gateway protocol |
B. | dynamic host configuration protocol |
C. | resource reservation protocol |
D. | session initiation protocol |
Answer» C. resource reservation protocol |
67. | Which protocol is a signalling communication protocol used for controlling multimedia communication sessions? |
A. | session initiation protocol |
B. | session modelling protocol |
C. | session maintenance protocol |
D. | none of the mentioned |
Answer» A. session initiation protocol |
68. | Which one of the following is not correct? |
A. | application layer protocols are used by both source and destination devices during a communication session |
B. | application layer protocols implemented on the source and destination host must match |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
69. | When displaying a web page, the application layer uses the |
A. | http protocol |
B. | ftp protocol |
C. | smtp protocol |
D. | none of the mentioned |
Answer» A. http protocol |
70. | The entire hostname has a maximum of |
A. | 255 characters |
B. | 127 characters |
C. | 63 characters |
D. | 31 characters |
Answer» A. 255 characters |
71. | A DNS client is called |
A. | dns updater |
B. | dns resolver |
C. | dns handler |
D. | none of the mentioned |
Answer» B. dns resolver |
72. | Servers handle requests for other domains |
A. | directly |
B. | by contacting remote dns server |
C. | it is not possible |
D. | none of the mentioned |
Answer» B. by contacting remote dns server |
73. | DNS database contains |
A. | name server records |
B. | hostname-to-address records |
C. | hostname aliases |
D. | all of the mentioned |
Answer» D. all of the mentioned |
74. | If a server has no clue about where to find the address for a hostname then |
A. | server asks to the root server |
B. | server asks to its adjcent server |
C. | request is not processed |
D. | none of the mentioned |
Answer» A. server asks to the root server |
76. | Wildcard domain names start with label |
A. | @ |
B. | * |
C. | & |
D. | # |
Answer» B. * |
77. | The right to use a domain name is delegated by domain name registers which are accredited by |
A. | internet architecture board |
B. | internet society |
C. | internet research task force |
D. | internet corporation for assigned names and numbers |
Answer» D. internet corporation for assigned names and numbers |
78. | The domain name system is maintained by |
A. | distributed database system |
B. | a single server |
C. | a single computer |
D. | none of the mentioned |
Answer» A. distributed database system |
79. | Which one of the following is not true? |
A. | multiple hostnames may correspond to a single ip address |
B. | a single hostname may correspond to many ip addresses |
C. | a single hostname may correspond to a single ip address |
D. | none of the mentioned |
Answer» C. a single hostname may correspond to a single ip address |
80. | Telnet protocol is used to establish a connection to |
A. | tcp port number 21 |
B. | tcp port number 22 |
C. | tcp port number 23 |
D. | tcp port number 24 |
Answer» C. tcp port number 23 |
81. | Which one of the following is not true? |
A. | telnet defines a network virtual terminal (nvt) standard |
B. | client programs interact with nvt |
C. | server translates nvt operations |
D. | none of the mentioned |
Answer» D. none of the mentioned |
82. | All telnet operations are sent as |
A. | 4 bytes |
B. | 8 bytes |
C. | 16 bytes |
D. | 32 bytes |
Answer» B. 8 bytes |
83. | AbsoluteTelnet is a telnet client for |
A. | windows |
B. | linux |
C. | mac |
D. | none of the mentioned |
Answer» A. windows |
84. | The decimal code of interpret as command (IAC) character is |
A. | 252 |
B. | 253 |
C. | 254 |
D. | 255 |
Answer» D. 255 |
85. | In character mode operation of telnet implementation |
A. | each character typed is sent by the client to the server |
B. | each character typed is discarded by the server |
C. | both (a) an (b) |
D. | none of the mentioned |
Answer» A. each character typed is sent by the client to the server |
86. | Which one of the following is not correct? |
A. | telnet is a general purpose client-server program |
B. | telnet lets user access an application on a remote computer |
C. | telnet can also be used for file transfer |
D. | none of the mentioned |
Answer» C. telnet can also be used for file transfer |
87. | Which operating mode of telnet is full duplex? |
A. | default mode |
B. | server mode |
C. | line mode |
D. | none of the mentioned |
Answer» C. line mode |
88. | If we want that a character be interpreted by the client instead of server |
A. | escape character has to be used |
B. | control functions has to be disabled |
C. | it is not possible |
D. | none of the mentioned |
Answer» A. escape character has to be used |
89. | Dynamic web page |
A. | is same every time whenever it displays |
B. | generates on demand by a program or a request from browser |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» B. generates on demand by a program or a request from browser |
90. | What is a web browser? |
A. | a program that can display a web page |
B. | a program used to view html documents |
C. | it enables user to access the resources of internet |
D. | all of the mentioned |
Answer» D. all of the mentioned |
91. | Common gateway interface is used to |
A. | generate executable files from web content by web server |
B. | generate web pages |
C. | stream videos |
D. | none of the mentioned |
Answer» A. generate executable files from web content by web server |
92. | URL stands for |
A. | unique reference label |
B. | uniform reference label |
C. | uniform resource locator |
D. | unique resource locator |
Answer» C. uniform resource locator view more info and meaning of URL |
93. | A web cookie is a small piece of data |
A. | sent from a website and stored in user’s web browser while a user is browsing a website |
B. | sent from user and stored in the server while a user is browsing a website |
C. | sent from root server to all servers |
D. | none of the mentioned |
Answer» A. sent from a website and stored in user’s web browser while a user is browsing a website |
94. | Which one of the following is not used to generate dynamic web pages? |
A. | php |
B. | asp.net |
C. | jsp |
D. | none of the mentioned |
Answer» D. none of the mentioned |
95. | An alternative of javascript on windows platform is |
A. | vbscript |
B. | asp.net |
C. | jsp |
D. | none of the mentioned |
Answer» A. vbscript |
96. | What is document object model (DOM)? |
A. | convention for representing and interacting with objects in html documents |
B. | application programming interface |
C. | hierarchy of objects in asp.net |
D. | none of the mentioned |
Answer» A. convention for representing and interacting with objects in html documents |
97. | AJAX stands for |
A. | asynchronous javascript and xml |
B. | advanced jsp and xml |
C. | asynchronous jsp and xml |
D. | advanced javascript and xml |
Answer» A. asynchronous javascript and xml view more info and meaning of AJAX |
98. | Multiple object can be sent over a TCP connection between client and server in |
A. | persistent http |
B. | nonpersistent http |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. persistent http |
99. | HTTP is ________ protocol. |
A. | application layer |
B. | transport layer |
C. | network layer |
D. | none of the mentioned |
Answer» A. application layer |
101. | HTTP client requests by establishing a __________ connection to a particular port on the server. |
A. | user datagram protocol |
B. | transmission control protocol |
C. | broader gateway protocol |
D. | none of the mentioned |
Answer» B. transmission control protocol |
102. | In HTTP pipelining |
A. | multiple http requests are sent on a single tcp connection without waiting for the corresponding responses |
B. | multiple http requests can not be sent on a single tcp connection |
C. | multiple http requests are sent in a queue on a single tcp connection |
D. | none of the mentioned |
Answer» A. multiple http requests are sent on a single tcp connection without waiting for the corresponding responses |
103. | FTP server listens for connection on port number |
A. | 20 |
B. | 21 |
C. | 22 |
D. | 23 |
Answer» B. 21 |
104. | In FTP protocol, client contacts server using ____ as the transport protocol. |
A. | transmission control protocol |
B. | user datagram protocol |
C. | datagram congestion control protocol |
D. | stream control transmission protocol |
Answer» A. transmission control protocol |
105. | In which mode FTP, the client initiates both the control and data connections. |
A. | active mode |
B. | passive mode |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» B. passive mode |
106. | The file transfer protocol is built on |
A. | data centric architecture |
B. | service oriented architecture |
C. | client server architecture |
D. | none of the mentioned |
Answer» C. client server architecture |
107. | In file transfer protocol, data transfer can be done in |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | all of the mentioned |
Answer» D. all of the mentioned |
108. | Ethernet frame consists of |
A. | mac address |
B. | ip address |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. mac address |
109. | What is stat frame delimeter (SFD) in ethernet frame? |
A. | 10101010 |
B. | 10101011 |
C. | 00000000 |
D. | 11111111 |
Answer» B. 10101011 |
110. | What is autonegotiation? |
A. | a procedure by which two connected devices choose common transmission parameters |
B. | a security algorithm |
C. | a routing algorithm |
D. | none of the mentioned |
Answer» A. a procedure by which two connected devices choose common transmission parameters |
111. | Ethernet in metropolitan area network (MAN) can be used as |
A. | pure ethernet |
B. | ethernet over sdh |
C. | ethernet over mpls |
D. | all of the mentioned |
Answer» D. all of the mentioned |
112. | A point-to-point protocol over ethernet is a network protocol for |
A. | encapsulating ppp frames inside ethernet frames |
B. | encapsulating ehternet framse inside ppp frames |
C. | for security of ethernet frames |
D. | for security of ppp frames |
Answer» A. encapsulating ppp frames inside ethernet frames |
113. | High speed ethernet works on |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | none of the mentioned |
Answer» C. optical fiber |
114. | The maximum size of payload field in ethernet frame is |
A. | 1000 bytes |
B. | 1200 bytes |
C. | 1300 bytes |
D. | 1500 bytes |
Answer» D. 1500 bytes |
115. | What is interframe gap? |
A. | idle time between frames |
B. | idle time between frame bits |
C. | idle time between packets |
D. | none of the mentioned |
Answer» A. idle time between frames |
116. | An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called |
A. | short frame |
B. | run frame |
C. | mini frame |
D. | man frame |
Answer» B. run frame |
117. | Which of this is not a constituent of residential telephone line? |
A. | a high-speed downstream channel |
B. | a medium-speed downstream channel |
C. | a low-speed downstream channel |
D. | none of the mentioned |
Answer» C. a low-speed downstream channel |
118. | In DSL telco provides these services |
A. | wired phone access |
B. | isp |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» C. all of the mentioned |
119. | The function of DSLAM is |
A. | convert analog signals into digital signals |
B. | convert digital signals into analog signals |
C. | amplify digital signals |
D. | none of the mentioned |
Answer» A. convert analog signals into digital signals |
120. | The following term is not associted with DSL |
A. | dslam |
B. | co |
C. | splitter |
D. | cmts |
Answer» D. cmts |
121. | HFC contains |
A. | fibre cable |
B. | coaxial cable |
C. | both of the mentioned |
D. | none of the mentioned |
Answer» C. both of the mentioned |
122. | Choose the statement which is not applicable for cable internet access |
A. | it is a shared broadcast medium |
B. | it includes hfcs |
C. | cable modem connects home pc to ethernet port |
D. | analog signal is converted to digital signal in dslam |
Answer» D. analog signal is converted to digital signal in dslam |
123. | Among the optical-distribution architectures that is essentially switched ehternet is |
A. | aon |
B. | pon |
C. | non |
D. | none of the mentioned |
Answer» A. aon |
124. | StarBand provides |
A. | ftth internet access |
B. | cable access |
C. | telephone access |
D. | satellite access |
Answer» D. satellite access |
126. | ONT is connected to splitter using |
A. | high speed fibre cable |
B. | hfc |
C. | optical cable |
D. | none of the mentioned |
Answer» C. optical cable |
127. | The sharing of a medium and its link by two or more devices is called _______ |
A. | fully duplexing |
B. | multiplexing |
C. | both a and b |
D. | none of the mentioned |
Answer» B. multiplexing |
128. | Multiplexing is used in _______ |
A. | packet switching |
B. | circuit switching |
C. | data switching |
D. | none of the mentioned |
Answer» B. circuit switching |
129. | Which multiplexing technique transmits digital signals ? |
A. | fdm |
B. | tdm |
C. | wdm |
D. | none of the mentioned |
Answer» B. tdm |
130. | If there are n signal sources of same data rate than TDM link has _______ slots |
A. | n |
B. | n/2 |
C. | n*2 |
D. | 2^n |
Answer» A. n |
131. | If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is |
A. | 32kbps |
B. | 500bps |
C. | 500kbps |
D. | none of the mentioned |
Answer» A. 32kbps |
132. | The state when dedicated signals are idle are called |
A. | death period |
B. | poison period |
C. | silent period |
D. | none of the mentioned |
Answer» C. silent period |
133. | Multiplexing can provide |
A. | efficiency |
B. | privacy |
C. | anti jamming |
D. | both a and b |
Answer» D. both a and b |
134. | In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources. |
A. | greater than |
B. | lesser than |
C. | equal to |
D. | equal to or greater than |
Answer» A. greater than |
135. | In TDM, slots are further divided into |
A. | seconds |
B. | frames |
C. | packets |
D. | none of the mentioned |
Answer» B. frames |
136. | Multiplexing technique that shifts each signal to a different carrier frequency |
A. | fdm |
B. | tdm |
C. | either a or b |
D. | both a and b |
Answer» A. fdm |
137. | Physical or logical arrangement of network is |
A. | topology |
B. | routing |
C. | networking |
D. | none of the mentioned |
Answer» A. topology |
138. | In this topology there is a central controller or hub |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» A. star |
139. | This topology requires multipoint connection |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» D. bus |
140. | Data communication system spanning states, countries, or the whole world is |
A. | lan |
B. | wan |
C. | man |
D. | none of the mentioned |
Answer» B. wan |
141. | Data communication system within a building or campus is |
A. | lan |
B. | wan |
C. | man |
D. | none of the mentioned |
Answer» A. lan |
142. | Expand WAN |
A. | world area network |
B. | wide area network |
C. | web area network |
D. | none of the mentioned |
Answer» B. wide area network |
143. | A local telephone network is an example of a _______ network |
A. | packet switched |
B. | circuit switched |
C. | both of the mentioned |
D. | none of the mentioned |
Answer» A. packet switched |
144. | Most packet switches use this principle |
A. | stop and wait |
B. | store and forward |
C. | both of the mentioned |
D. | none of the mentioned |
Answer» B. store and forward |
145. | If there are N routers from source to destination, total end to end delay in sending packet P(L->number of bits in the packet R-> transmission rate) |
A. | n |
B. | (n*l)/r |
C. | (2n*l)/r |
D. | l/r |
Answer» B. (n*l)/r |
146. | Method(s) to move data through a network of links and switches |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | both a and b |
Answer» D. both a and b |
147. | The resources needed for communication between end systems are reserved for the duration of session between end systems in ________ |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | frequency switching |
Answer» B. circuit switching |
148. | As the resouces are reserved between two communicating end systems in circuit switching, this is achieved |
A. | authentication |
B. | guaranteed constant rate |
C. | reliability |
D. | store and forward |
Answer» B. guaranteed constant rate |
149. | What is internet? |
A. | a single network |
B. | a vast collection of different networks |
C. | interconnection of local area networks |
D. | none of the mentioned |
Answer» B. a vast collection of different networks |
151. | Internet access by transmitting digital data over the wires of a local telephone network is provided by |
A. | leased line |
B. | digital subscriber line |
C. | digital signal line |
D. | none of the mentioned |
Answer» B. digital subscriber line |
152. | ISP exchanges internet traffic between their networks by |
A. | internet exchange point |
B. | subscriber end point |
C. | isp end point |
D. | none of the mentioned |
Answer» A. internet exchange point |
153. | Which one of the following protocol is not used in internet? |
A. | http |
B. | dhcp |
C. | dns |
D. | none of the mentioned |
Answer» D. none of the mentioned |
154. | IPv6 addressed have a size of |
A. | 32 bits |
B. | 64 bits |
C. | 128 bits |
D. | 265 bits |
Answer» C. 128 bits |
155. | Internet works on |
A. | packet switching |
B. | circuit switching |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. packet switching |
156. | Which one of the following is not an application layer protocol used in internet? |
A. | remote procedure call |
B. | internet relay chat |
C. | resource reservation protocol |
D. | none of the mentioned |
Answer» C. resource reservation protocol |
157. | Which protocol assigns IP address to the client connected in the internet? |
A. | dhcp |
B. | ip |
C. | rpc |
D. | none of the mentioned |
Answer» A. dhcp |
158. | Which one of the following is not used in media access control? |
A. | ethernet |
B. | digital subscriber line |
C. | fiber distributed data interface |
D. | none of the mentioned |
Answer» D. none of the mentioned |
159. | In cryptography, what is cipher? |
A. | algorithm for performing encryption and decryption |
B. | encrypted message |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. algorithm for performing encryption and decryption |
160. | In asymmetric key cryptography, the private key is kept by |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | all the connected devices to the network |
Answer» B. receiver |
161. | Which one of the following algorithm is not used in asymmetric key cryptography? |
A. | rsa algorithm |
B. | diffie-hellman algorithm |
C. | electronic code book algorithm |
D. | none of the mentioned |
Answer» C. electronic code book algorithm |
162. | In cryptography, the order of the letters in a message is rearranged by |
A. | transpositional ciphers |
B. | substitution ciphers |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. transpositional ciphers |
163. | What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | none of the mentioned |
Answer» A. block cipher |
164. | Cryptanalysis is used |
A. | to find some insecurity in a cryptographic scheme |
B. | to increase the speed |
C. | to encrypt the data |
D. | none of the mentioned |
Answer» A. to find some insecurity in a cryptographic scheme |
165. | Which one of the following is a cryptographic protocol used to secure HTTP connection? |
A. | stream control transmission protocol (sctp) |
B. | transport layer security (tsl) |
C. | explicit congestion notification (ecn) |
D. | resource reservation protocol |
Answer» B. transport layer security (tsl) |
166. | Voice privacy in GSM cellular telephone protocol is provided by |
A. | a5/2 cipher |
B. | b5/4 cipher |
C. | b5/6 cipher |
D. | b5/8 cipher |
Answer» A. a5/2 cipher |
167. | ElGamal encryption system is |
A. | symmetric key encryption algorithm |
B. | asymmetric key encryption algorithm |
C. | not an encryption algorithm |
D. | none of the mentioned |
Answer» B. asymmetric key encryption algorithm |
168. | Cryptographic hash function takes an arbitrary block of data and returns |
A. | fixed size bit string |
B. | variable size bit string |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. fixed size bit string |
169. | The attackers a network of compromised devices known as |
A. | internet |
B. | botnet |
C. | telnet |
D. | d-net |
Answer» B. botnet |
170. | Which of the following is a form of DoS attack ? |
A. | vulnerability attack |
B. | bandwidth flooding |
C. | connection flooding |
D. | all of the mentioned |
Answer» D. all of the mentioned |
171. | The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host |
A. | vulnerability attack |
B. | bandwidth flooding |
C. | connection flooding |
D. | all of the mentioned |
Answer» C. connection flooding |
172. | The DoS attack is which the attacker sends deluge of packets to the targeted host |
A. | vulnerability attack |
B. | bandwidth flooding |
C. | connection flooding |
D. | all of the mentioned |
Answer» B. bandwidth flooding |
173. | Packet sniffers involve |
A. | active receiver |
B. | passive receiver |
C. | both of the mentioned |
D. | none of the mentioned |
Answer» B. passive receiver |
174. | Sniffers can be deployed in |
A. | wired environment |
B. | wifi |
C. | ethernet lan |
D. | all of the mentioned |
Answer» D. all of the mentioned |
176. | DHCP (dynamic host configuration protocol) provides _____ to the client. | |
A. | ip address | |
B. | mac address | |
C. | url | |
D. | none of the mentioned | |
Answer» A. ip address | ||
177. | DHCP is used for |
A. | ipv6 |
B. | ipv4 |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
178. | The DHCP server |
A. | maintains a database of available ip addresses |
B. | maintains the information about client configuration parameters |
C. | grants a ip address when receives a request from a client |
D. | all of the mentioned |
Answer» D. all of the mentioned |
179. | IP assigned for a client by DHCP server is |
A. | for a limited period |
B. | for unlimited period |
C. | not time dependent |
D. | none of the mentioned |
Answer» A. for a limited period |
180. | DHCP uses UDP port ____ for sending data to the server. |
A. | 66 |
B. | 67 |
C. | 68 |
D. | 69 |
Answer» B. 67 |
181. | The DHCP server can provide the _______ of the IP addresses. |
A. | dynamic allocation |
B. | automatic allocation |
C. | static allocation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
182. | DHCP client and servers on the same subnet communicate via |
A. | udp broadcast |
B. | udp unicast |
C. | tcp broadcast |
D. | tcp unicast |
Answer» A. udp broadcast |
183. | After obtaining the IP address, to prevent the IP conflict the client may use |
A. | internet relay chat |
B. | broader gateway protocol |
C. | address resolution protocol |
D. | none of the mentioned |
Answer» C. address resolution protocol |
184. | What is DHCP snooping? |
A. | techniques applied to ensure the security of an existing dhcp infrastructure |
B. | encryption of the dhcp server requests |
C. | algorithm for dhcp |
D. | none of the mentioned |
Answer» A. techniques applied to ensure the security of an existing dhcp infrastructure |
185. | If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network. |
A. | mac address |
B. | ip address |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» C. both (a) and (b) |
186. | Real-time transport protocol (RTP) is mostly used in |
A. | streaming media |
B. | video teleconference |
C. | television services |
D. | all of the mentioned |
Answer» D. all of the mentioned |
187. | RTP is used to |
A. | carry the media stream |
B. | monitor transmission statistics of streams |
C. | monitor quality of service of streams |
D. | none of the mentioned |
Answer» A. carry the media stream |
188. | RTP provides the facility of jitter ____ . |
A. | compensation |
B. | expansion |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. compensation |
189. | Which protocol provides the synchronization between media streams? |
A. | rtp |
B. | rtcp |
C. | rpc |
D. | none of the mentioned |
Answer» B. rtcp |
190. | An RTP session is established for |
A. | each media stream |
B. | all media streams |
C. | some predefined number of media streams |
D. | none of the mentioned |
Answer» A. each media stream |
191. | RTP can use |
A. | unprevileleged udp ports |
B. | stream control transmission protocol |
C. | datagram congestion control protocol |
D. | all of the mentioned |
Answer» D. all of the mentioned |
192. | Which one of the following multimedia formats can not be supported by RTP? |
A. | mpeg-4 |
B. | mjpeg |
C. | mpeg |
D. | none of the mentioned |
Answer» D. none of the mentioned |
193. | An RTP header has a minimum size of |
A. | 12 bytes |
B. | 16 bytes |
C. | 24 bytes |
D. | 32 bytes |
Answer» A. 12 bytes |
194. | Which one of the following is not correct? |
A. | rtcp provides canonical end-point identifiers to all session participants |
B. | rtcp reports are expected to be sent by all participants |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» D. none of the mentioned |
195. | Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data? |
A. | srtp |
B. | rtcp |
C. | rcp |
D. | none of the mentioned |
Answer» A. srtp |
196. | Ping can |
A. | measure round-trip time |
B. | report packet loss |
C. | report latency |
D. | all of the mentioned |
Answer» D. all of the mentioned |
197. | Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is |
A. | use dual-stack approach |
B. | tunneling |
C. | no solution |
D. | replace the system |
Answer» B. tunneling |
198. | Ping sweep is a part of |
A. | traceroute |
B. | nmap |
C. | route |
D. | ipconfig |
Answer» B. nmap |
199. | ICMP is used in |
A. | ping |
B. | traceroute |
C. | ifconfig |
D. | both a and b |
Answer» D. both a and b |
201. | If you want to find the number of routers between a source and destination, the utility to be used is. | |
A. | route | |
B. | ipconfig | |
C. | ifconfig | |
D. | traceroute | |
Answer» D. traceroute | ||
202. | Which of the following is related to ipconfig in Microsoft Windows ? |
A. | display all current tcp/ip network configuration values |
B. | modify dhcp settings |
C. | modify dns settings |
D. | all of the mentioned |
Answer» D. all of the mentioned |
203. | This allows to check if a domain is available for registration. |
A. | domain check |
B. | domain dossier |
C. | domain lookup |
D. | none of the mentioned |
Answer» A. domain check |
204. | Choose the wrong statement |
A. | nslookup is used to query a dns server for dns data |
B. | ping is used to check connectivity |
C. | pathping combines the functionality of ping with that of route |
D. | ifconfig can configure tcp/ip network interface parameters |
Answer» C. pathping combines the functionality of ping with that of route |
205. | Expansion of FTP is |
A. | fine transfer protocol |
B. | file transfer protocol |
C. | first transfer protocol |
D. | none of the mentioned |
Answer» B. file transfer protocol |
206. | FTP is built on _____ architecture |
A. | client-server |
B. | p2p |
C. | both of the mentioned |
D. | none of the mentioned |
Answer» A. client-server |
207. | FTP uses _____ parallel TCP connections to transfer a file |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» B. 2 |
208. | Identify the incorrect statement |
A. | ftp stands for file transfer protocol |
B. | ftp uses two parallel tcp connections |
C. | ftp sends its control information in-band |
D. | ftp sends exactly one file over the data connection |
Answer» C. ftp sends its control information in-band |
209. | If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is |
A. | 5 |
B. | 10 |
C. | 2 |
D. | 6 |
Answer» D. 6 |
210. | FTP server |
A. | mantains state |
B. | is stateless |
C. | has single tcp connection for a file transfer |
D. | none of the mentioned |
Answer» A. mantains state |
211. | The commands, from client to server, and replies, from server to client, are sent across the control connection in ____ bit ASCII format |
A. | 8 |
B. | 7 |
C. | 3 |
D. | 5 |
Answer» B. 7 |
212. | Find the FTP reply whose message is wrongly matched |
A. | 331 – username ok, password required |
B. | 425 – can’t open data connection |
C. | 452 – error writing file |
D. | 452 – can’t open data connection |
Answer» D. 452 – can’t open data connection |
213. | Mode of data transfer in FTP, where all the is left to TCP |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | none of the mentioned |
Answer» A. stream mode |
214. | The password is sent to the server using _____ command |
A. | passwd |
B. | pass |
C. | password |
D. | none of the mentioned |
Answer» B. pass |
215. | The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______ |
A. | 4 |
B. | 1 |
C. | 5 |
D. | none of the mentioned |
Answer» C. 5 |
216. | The default connection type used by HTTP is _____ |
A. | persistent |
B. | non-persistent |
C. | either of the mentioned |
D. | none of the mentioned |
Answer» A. persistent |
217. | The time taken by a packet to travel from client to server and then back to the client is called ____ |
A. | stt |
B. | rtt |
C. | ptt |
D. | none of the mentioned |
Answer» B. rtt |
218. | The HTTP request message is sent in ____ part of three-way handshake. |
A. | first |
B. | second |
C. | third |
D. | none of the mentioned |
Answer» C. third |
219. | In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs. |
A. | 2 |
B. | 1 |
C. | 4 |
D. | 3 |
Answer» B. 1 |
220. | The first line of HTTP request message is called ____ |
A. | request line |
B. | header line |
C. | status line |
D. | entity line |
Answer» A. request line |
221. | The values GET, POST, HEAD etc are specified in ____ of HTTP message |
A. | request line |
B. | header line |
C. | status line |
D. | entity body |
Answer» A. request line |
222. | The ______ method when used in the method field, leaves entity body empty. |
A. | post |
B. | get |
C. | both of the mentioned |
D. | none of the mentioned |
Answer» B. get |
223. | The HTTP response message leaves out the requested object when _____ method is used |
A. | get |
B. | post |
C. | head |
D. | put |
Answer» C. head |
224. | Find the oddly matched HTTP status codes |
A. | 200 ok |
B. | 400 bad request |
C. | 301 moved permanently |
D. | 304 not found |
Answer» D. 304 not found |
226. | The conditional GET mechanism |
A. | imposes conditions on the objects to be requested |
B. | limits the number of response from a server |
C. | helps to keep a cache upto date |
D. | none of the mentioned |
Answer» C. helps to keep a cache upto date |
227. | Which of the following is present in both an HTTP request line and a status line? |
A. | http version number |
B. | url |
C. | method |
D. | none of the mentioned |
Answer» A. http version number |
228. | Which of the following is not applicable for IP? |
A. | error reporting |
B. | handle addressing conventions |
C. | datagram format |
D. | packet handling conventions |
Answer» A. error reporting |
229. | Which of the following field in IPv4 datagram is not related to fragmentation? |
A. | flags |
B. | offset |
C. | tos |
D. | identifier |
Answer» C. tos |
230. | The TTL field has value 10. How many routers (max) can process this datagram? |
A. | 11 |
B. | 5 |
C. | 10 |
D. | 1 |
Answer» C. 10 |
231. | If the value in protocol field is 17, the transport layer protocol used is ____. |
A. | tcp |
B. | udp |
C. | either of the mentioned |
D. | none of the mentioned |
Answer» B. udp |
232. | The data field can carry which of the following? |
A. | tcp segemnt |
B. | udp segment |
C. | icmp messages |
D. | none of the mentioned |
Answer» C. icmp messages |
233. | What should be the flag value to indicate the last fragment? |
A. | 0 |
B. | 1 |
C. | ttl value |
D. | none of the mentioned |
Answer» A. 0 |
234. | Which of these is not applicable for IP protocol? |
A. | is connectionless |
B. | offer reliable service |
C. | offer unreliable service |
D. | none of the mentioned |
Answer» B. offer reliable service |
235. | Fragmentation has following demerits |
A. | complicates routers |
B. | open to dos attack |
C. | overlapping of fragments. |
D. | all of the mentioned |
Answer» D. all of the mentioned |
236. | Which field helps to check rearrangement of the fragments? |
A. | offset |
B. | flag |
C. | ttl |
D. | identifer |
Answer» A. offset |
237. | The size of IP address in IPv6 is |
A. | 4bytes |
B. | 128bits |
C. | 8bytes |
D. | 100bits |
Answer» B. 128bits |
238. | The header length of an IPv6 datagram is _____. |
A. | 10bytes |
B. | 25bytes |
C. | 30bytes |
D. | 40bytes |
Answer» D. 40bytes |
239. | In the IPv6 header,the traffic class field is similar to which field in the IPv4 header? |
A. | fragmentation field |
B. | fast-switching |
C. | tos field |
D. | option field |
Answer» C. tos field |
240. | IPv6 doesnot use ______ type of address |
A. | broadcast |
B. | multicast |
C. | anycast |
D. | none of the mentioned |
Answer» A. broadcast |
241. | These are the features present in IPv4 but not in IPv6. |
A. | fragmentation |
B. | header checksum |
C. | options |
D. | all of the mentioned |
Answer» D. all of the mentioned |
242. | The ____ field determines the lifetime of IPv6 datagram |
A. | hop limit |
B. | ttl |
C. | next header |
D. | none of the mentioned |
Answer» A. hop limit |
243. | Dual-stack approach refers to |
A. | implementing ipv4 with 2 stacks |
B. | implementing ipv6 with 2 stacks |
C. | node has both ipv4 and ipv6 support |
D. | none of the mentioned |
Answer» C. node has both ipv4 and ipv6 support |
244. | The operation of ____________ is based on signals which are multiplexed and added in time domain but they occupy different slots in frequency domain |
A. | fdm |
B. | tdm |
C. | wdm |
D. | mdm |
Answer» A. fdm |
245. | which of the following is not Guided transmission media |
A. | twisted pair cables |
B. | co-axial cables |
C. | infrared |
D. | fibre optics |
Answer» C. infrared |
246. | ____________ media is a communication medium which allows the data to get guided along it. |
A. | transparent |
B. | cable |
C. | guided |
D. | glass |
Answer» C. guided |
247. | Presentation doesn’t perform ________ function |
A. | translation |
B. | transmission |
C. | encryption |
D. | compression |
Answer» B. transmission |
248. | Below layers are not present in TCP/IP layer. |
A. | application |
B. | presentation |
C. | transport |
D. | network |
Answer» B. presentation |
249. | Which of the following are not duties of Physical layer |
A. | bit rate control |
B. | multiplexing |
C. | error detection |
D. | circuit switching |
Answer» C. error detection |
251. | The data bit to be transmitted are broken into discrete __________ at the data link layer. | |
A. | frame | |
B. | stuff | |
C. | character | |
D. | data | |
Answer» A. frame | ||
252. | A standard mechanism provided by internet which helps in copying a file from one host to another is known as ________. |
A. | smtp |
B. | dns server |
C. | telnet |
D. | ftp |
Answer» D. ftp |
253. | Which one of the below is not an component of Internet mail system |
A. | user agent |
B. | smtp sender |
C. | smtp receiver |
D. | transfer agent |
Answer» D. transfer agent |
254. | How many layers are present in the Internet protocol stack (TCP/IP model)? |
A. | 5 |
B. | 7 |
C. | 6 |
D. | 10 |
Answer» A. 5 |
255. | Application layer is implemented in ____________ |
A. | end system |
B. | nic |
C. | ethernet |
D. | packet transport |
Answer» A. end system |
256. | Transport layer is implemented in ______________ |
A. | end system |
B. | nic |
C. | ethernet |
D. | signal transmission |
Answer» A. end system |
257. | The functionalities of the presentation layer include ____________ |
A. | data compression |
B. | data encryption |
C. | data description |
D. | all of the mentioned |
Answer» D. all of the mentioned |
258. | Delimiting and synchronization of data exchange is provided by __________ |
A. | application layer |
B. | session layer |
C. | transport layer |
D. | link layer |
Answer» B. session layer |
259. | Physical or logical arrangement of network is __________ |
A. | topology |
B. | routing |
C. | networking |
D. | control |
Answer» A. topology |
260. | Which network topology requires a central controller or hub? |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» A. star |
261. | Data communication system spanning states, countries, or the whole world is ________ |
A. | lan |
B. | wan |
C. | man |
D. | pan |
Answer» B. wan |
262. | Data communication system within a building or campus is________ |
A. | lan |
B. | wan |
C. | man |
D. | pan |
Answer» A. lan |
263. | Which of this is not a guided media? |
A. | fiber optical cable |
B. | coaxial cable |
C. | wireless lan |
D. | copper wire |
Answer» C. wireless lan |
264. | Coaxial cable consists of _______ concentric copper conductors. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» B. 2 |
265. | Fiber optics posses following properties __________ |
A. | immune electromagnetic interference |
B. | very less signal attenuation |
C. | very hard to tap |
D. | all of the mentioned |
Answer» D. all of the mentioned |
266. | If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) __________ |
A. | n*39.8 |
B. | n*51.8 |
C. | 2n*51.8 |
D. | none of the mentioned |
Answer» B. n*51.8 |
267. | Radio channels are attractive medium because __________ |
A. | can penetrate walls |
B. | connectivity can be given to mobile user |
C. | can carry signals for long distance |
D. | all of the mentioned |
Answer» D. all of the mentioned |
268. | Geostationary satellites ___________ |
A. | are placed at a fixed point above the earth |
B. | rotate the earth about a fixed axis |
C. | rotate the earth about a varying axis |
D. | all of the mentioned |
Answer» A. are placed at a fixed point above the earth |
269. | Bits can be sent over guided and unguided media as analog signal by ___________ |
A. | digital modulation |
B. | amplitude modulation |
C. | frequency modulation |
D. | phase modulation |
Answer» A. digital modulation |
270. | The physical layer provides __________ |
A. | mechanical specifications of electrical connectors and cables |
B. | electrical specification of transmission line signal level |
C. | specification for ir over optical fiber |
D. | all of the mentioned |
Answer» D. all of the mentioned |
271. | In asynchronous serial communication the physical layer provides ___________ |
A. | start and stop signalling |
B. | flow control |
C. | both start & stop signalling and flow control |
D. | only start signalling |
Answer» C. both start & stop signalling and flow control |
272. | The physical layer is responsible for __________ |
A. | line coding |
B. | channel coding |
C. | modulation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
273. | Wireless transmission of signals can be done via ___________ |
A. | radio waves |
B. | microwaves |
C. | infrared |
D. | all of the mentioned |
Answer» D. all of the mentioned |
274. | Transmission control protocol ___________ |
A. | is a connection-oriented protocol |
B. | uses a three way handshake to establish a connection |
C. | receives data from application as a single stream |
D. | all of the mentioned |
Answer» D. all of the mentioned |
276. | The network layer is concerned with __________ of data. |
A. | bits |
B. | frames |
C. | packets |
D. | bytes |
Answer» C. packets |
277. | Which one of the following is not a function of network layer? |
A. | routing |
B. | inter-networking |
C. | congestion control |
D. | error control |
Answer» D. error control |
278. | In virtual circuit network each packet contains ___________ |
A. | full source and destination address |
B. | a short vc number |
C. | only source address |
D. | only destination address |
Answer» B. a short vc number |
279. | Which of the following routing algorithms can be used for network layer design? |
A. | shortest path algorithm |
B. | distance vector routing |
C. | link state routing |
D. | all of the mentioned |
Answer» D. all of the mentioned |
280. | Which of the following is not correct in relation to multi-destination routing? |
A. | is same as broadcast routing |
B. | contains the list of all destinations |
C. | data is not sent by packets |
D. | there are multiple receivers |
Answer» C. data is not sent by packets |
281. | A subset of a network that includes all the routers but contains no loops is called ________ |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | special tree |
Answer» A. spanning tree |
282. | Which one of the following algorithm is not used for congestion control? |
A. | traffic aware routing |
B. | admission control |
C. | load shedding |
D. | routing information protocol |
Answer» D. routing information protocol |
283. | The network layer protocol for internet is __________ |
A. | ethernet |
B. | internet protocol |
C. | hypertext transfer protocol |
D. | file transfer protocol |
Answer» B. internet protocol |
284. | ICMP is primarily used for __________ |
A. | error and diagnostic functions |
B. | addressing |
C. | forwarding |
D. | routing |
Answer» A. error and diagnostic functions |
285. | Which of the following are transport layer protocols used in networking? |
A. | tcp and ftp |
B. | udp and http |
C. | tcp and udp |
D. | http and ftp |
Answer» C. tcp and udp |
286. | Which one of the following is a version of UDP with congestion control? |
A. | datagram congestion control protocol |
B. | stream control transmission protocol |
C. | structured stream transport |
D. | user congestion control protocol |
Answer» A. datagram congestion control protocol |
287. | A _____ is a TCP name for a transport service access point. |
A. | port |
B. | pipe |
C. | node |
D. | protocol |
Answer» A. port |
288. | Transport layer protocols deals with ____________ |
A. | application to application communication |
B. | process to process communication |
C. | node to node communication |
D. | man to man communication |
Answer» B. process to process communication |
289. | Which of the following is a transport layer protocol? |
A. | stream control transmission protocol |
B. | internet control message protocol |
C. | neighbor discovery protocol |
D. | dynamic host configuration protocol |
Answer» A. stream control transmission protocol |
290. | Which of the following computer networks is built on the top of another network? |
A. | prior network |
B. | chief network |
C. | prime network |
D. | overlay network |
Answer» D. overlay network |
291. | In computer network nodes are _________ |
A. | the computer that originates the data |
B. | the computer that routes the data |
C. | the computer that terminates the data |
D. | all of the mentioned |
Answer» D. all of the mentioned |
292. | Communication channel is shared by all the machines on the network in ________ |
A. | broadcast network |
B. | unicast network |
C. | multicast network |
D. | anycast network |
Answer» A. broadcast network |
293. | Bluetooth is an example of __________ |
A. | personal area network |
B. | local area network |
C. | virtual private network |
D. | wide area network |
Answer» A. personal area network |
294. | A list of protocols used by a system, one protocol per layer, is called ________ |
A. | protocol architecture |
B. | protocol stack |
C. | protocol suite |
D. | protocol system |
Answer» B. protocol stack |
295. | Network congestion occurs _________ |
A. | in case of traffic overloading |
B. | when a system terminates |
C. | when connection between two nodes terminates |
D. | in case of transfer failure |
Answer» A. in case of traffic overloading |
296. | Which of this is not a constituent of residential telephone line? |
A. | a high-speed downstream channel |
B. | a medium-speed downstream channel |
C. | a low-speed downstream channel |
D. | an ultra-high speed downstream channel |
Answer» C. a low-speed downstream channel |
297. | DSL telcos provide which of the following services? |
A. | wired phone access |
B. | isp |
C. | wired phone access and isp |
D. | network routing and isp |
Answer» C. wired phone access and isp |
298. | The function of DSLAM is to __________ |
A. | convert analog signals into digital signals |
B. | convert digital signals into analog signals |
C. | amplify digital signals |
D. | de-amplify digital signals |
Answer» A. convert analog signals into digital signals |
299. | Which of the following terms is not associated with DSL? |
A. | dslam |
B. | co |
C. | splitter |
D. | cmts |
Answer» D. cmts |
301. | Which of the following statements is not applicable for cable internet access? | |
A. | it is a shared broadcast medium | |
B. | it includes hfcs | |
C. | cable modem connects home pc to ethernet port | |
D. | analog signal is converted to digital signal in dslam | |
Answer» D. analog signal is converted to digital signal in dslam | ||
302. | StarBand provides __________ |
A. | ftth internet access |
B. | cable access |
C. | telephone access |
D. | satellite access |
Answer» D. satellite access |
303. | Home Access is provided by __________ |
A. | dsl |
B. | fttp |
C. | cable |
D. | all of the mentioned |
Answer» D. all of the mentioned |
304. | ONT is connected to splitter using _________ |
A. | high speed fibre cable |
B. | hfc |
C. | optical cable |
D. | twisted pair cable |
Answer» C. optical cable |
305. | Which of the following factors affect transmission rate in DSL? |
A. | the gauge of the twisted-pair line |
B. | degree of electrical interfernece |
C. | shadow fading |
D. | the gauge of the twisted-pair line and degree of electrical interference |
Answer» D. the gauge of the twisted-pair line and degree of electrical interference |
306. | The number of layers in ISO OSI reference model is __________ |
A. | 5 |
B. | 7 |
C. | 6 |
D. | 10 |
Answer» B. 7 |
307. | Which of the following statements can be associated with OSI model? |
A. | a structured way to and easier update system components |
B. | one layer may duplicate lower layer functionality |
C. | functionality at one layer no way requires information from another layer |
D. | it is an application specific network model |
Answer» C. functionality at one layer no way requires information from another layer |
308. | OSI stands for __________ |
A. | open system interconnection |
B. | operating system interface |
C. | optical service implementation |
D. | open service internet |
Answer» A. open system interconnection view more info and meaning of OSI |
309. | The number of layers in ISO OSI reference model is __________ |
A. | 4 |
B. | 5 |
C. | 6 |
D. | 7 |
Answer» D. 7 |
310. | TCP/IP model does not have ______ layer but OSI model have this layer. |
A. | session layer |
B. | transport layer |
C. | application layer |
D. | network layer |
Answer» A. session layer |
311. | Which layer is used to link the network support layers and user support layers? |
A. | session layer |
B. | data link layer |
C. | transport layer |
D. | network layer |
Answer» C. transport layer |
312. | Which address is used on the internet for employing the TCP/IP protocols? |
A. | physical address and logical address |
B. | port address |
C. | specific address |
D. | all of the mentioned |
Answer» D. all of the mentioned |
313. | TCP/IP model was developed _____ the OSI model. |
A. | prior to |
B. | after |
C. | simultaneous to |
D. | with no link to |
Answer» A. prior to |
314. | Which address is used to identify a process on a host by the transport layer? |
A. | physical address |
B. | logical address |
C. | port address |
D. | specific address |
Answer» C. port address |
315. | Which layer provides the services to user? |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | physical layer |
Answer» A. application layer |
316. | Transmission data rate is decided by ____________ |
A. | network layer |
B. | physical layer |
C. | data link layer |
D. | transport layer |
Answer» B. physical layer |
317. | Which transmission media provides the highest transmission speed in a network? |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | electrical cable |
Answer» C. optical fiber |
318. | A single channel is shared by multiple signals by ____________ |
A. | analog modulation |
B. | digital modulation |
C. | multiplexing |
D. | phase modulation |
Answer» C. multiplexing |
319. | Which of the following tasks is not done by data link layer? |
A. | framing |
B. | error control |
C. | flow control |
D. | channel coding |
Answer» D. channel coding |
320. | Header of a frame generally contains ______________ |
A. | synchronization bytes |
B. | addresses |
C. | frame identifier |
D. | all of the mentioned |
Answer» D. all of the mentioned |
321. | Automatic repeat request error management mechanism is provided by ________ |
A. | logical link control sublayer |
B. | media access control sublayer |
C. | network interface control sublayer |
D. | application access control sublayer |
Answer» A. logical link control sublayer |
322. | CRC stands for __________ |
A. | cyclic redundancy check |
B. | code repeat check |
C. | code redundancy check |
D. | cyclic repeat check |
Answer» A. cyclic redundancy check view more info and meaning of CRC |
323. | Which of the following is a data link protocol? |
A. | ethernet |
B. | point to point protocol |
C. | hdlc |
D. | all of the mentioned |
Answer» D. all of the mentioned |
324. | Which of the following is the multiple access protocol for channel access control? |
A. | csma/cd |
B. | csma/ca |
C. | both csma/cd & csma/ca |
D. | hdlc |
Answer» C. both csma/cd & csma/ca |
326. | User datagram protocol is called connectionless because _____________ |
A. | all udp packets are treated independently by transport layer |
B. | it sends data as a stream of related packets |
C. | it is received in the same order as sent order |
D. | it sends data very quickly |
Answer» A. all udp packets are treated independently by transport layer |
327. | Socket-style API for windows is called ____________ |
A. | wsock |
B. | winsock |
C. | wins |
D. | sockwi |
Answer» B. winsock |
328. | _______ topology requires a multipoint connection. |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» D. bus |
329. | WAN stands for __________ |
A. | world area network |
B. | wide area network |
C. | web area network |
D. | web access network |
Answer» B. wide area network view more info and meaning of WAN |
330. | In TDM, slots are further divided into __________ |
A. | seconds |
B. | frames |
C. | packets |
D. | bits |
Answer» B. frames |
331. | The sharing of a medium and its link by two or more devices is called _________ |
A. | fully duplexing |
B. | multiplexing |
C. | micropleixng |
D. | duplexing |
Answer» B. multiplexing |
332. | Multiplexing is used in _______ |
A. | packet switching |
B. | circuit switching |
C. | data switching |
D. | packet & circuit switching |
Answer» B. circuit switching |
333. | Which multiplexing technique used to transmit digital signals? |
A. | fdm |
B. | tdm |
C. | wdm |
D. | fdm & wdm |
Answer» B. tdm |
334. | The state when dedicated signals are idle are called __________ |
A. | death period |
B. | poison period |
C. | silent period |
D. | stop period |
Answer» C. silent period |
335. | Multiplexing provides _________ |
A. | efficiency |
B. | privacy |
C. | anti jamming |
D. | both efficiency & privacy |
Answer» D. both efficiency & privacy |
336. | In TDM, slots are further divided into _________ |
A. | seconds |
B. | frames |
C. | packets |
D. | bits |
Answer» B. frames |
337. | The total nodal delay is given by ____________ |
A. | dnodal = dproc – dqueue + dtrans + dprop |
B. | dnodal = dproc + dtrans – dqueue |
C. | dnodal = dproc + dqueue + dtrans + dprop |
D. | dnodal = dproc + dqueue – dtrans – dprop |
Answer» C. dnodal = dproc + dqueue + dtrans + dprop |
338. | Transmission delay does not depend on _____________ |
A. | packet length |
B. | distance between the routers |
C. | transmission rate |
D. | bandwidth of medium |
Answer» B. distance between the routers |
339. | Propagation delay depends on ___________ |
A. | packet length |
B. | transmission rate |
C. | distance between the routers |
D. | speed of the cpu |
Answer» C. distance between the routers |
340. | _____________ allows LAN users to share computer programs and data. |
A. | communication server |
B. | print server |
C. | file server |
D. | network |
Answer» C. file server |
341. | With respect to physical media, STP cables stands for _________ |
A. | shielded twisted pair cable |
B. | spanning tree protocol cable |
C. | static transport protocol cable |
D. | shielded two power cable |
Answer» A. shielded twisted pair cable view more info and meaning of STP |
342. | What is the max length of the Shielded twisted pair cable? |
A. | 100 ft |
B. | 200 ft |
C. | 100 m |
D. | 200 m |
Answer» C. 100 m |
343. | What is the max data transfer rate of STP cables? |
A. | 10 mbps |
B. | 100 mbps |
C. | 1000 mbps |
D. | 10000 mbps |
Answer» B. 100 mbps |
344. | Which connector does the STP cable use? |
A. | bnc |
B. | rj-11 |
C. | rj-45 |
D. | rj-69 |
Answer» C. rj-45 |
345. | What is the central device in star topology? |
A. | stp server |
B. | hub/switch |
C. | pdc |
D. | router |
Answer» B. hub/switch |
346. | What is the max data transfer rate for optical fiber cable? |
A. | 10 mbps |
B. | 100 mbps |
C. | 1000 mbps |
D. | 10000 mbps |
Answer» D. 10000 mbps |
347. | Which of the following architecture uses the CSMA/CD access method? |
A. | arc net |
B. | ethernet |
C. | router |
D. | stp server |
Answer» B. ethernet |
348. | The attacker using a network of compromised devices is known as _____________ |
A. | internet |
B. | botnet |
C. | telnet |
D. | d-net |
Answer» B. botnet |
349. | Which of the following is a form of DoS attack? |
A. | vulnerability attack |
B. | bandwidth flooding |
C. | connection flooding |
D. | all of the mentioned |
Answer» D. all of the mentioned |
351. | Sniffers can be prevented by using _______________ | |
A. | wired environment | |
B. | wifi | |
C. | ethernet lan | |
D. | switched network | |
Answer» D. switched network | ||
352. | Firewalls are often configured to block ___________ |
A. | udp traffic |
B. | tcp traffic |
C. | sensitive traffic |
D. | best-effort traffic |
Answer» A. udp traffic |
353. | UTP is commonly used in __________ |
A. | dsl |
B. | fttp |
C. | http |
D. | none of the mentioned |
Answer» A. dsl |
354. | Terrestrial radio channels are broadly classifed into _____ groups. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 1 |
Answer» B. 3 |
355. | A local telephone network is an example of a _______ network. |
A. | packet switched |
B. | circuit switched |
C. | bit switched |
D. | line switched |
Answer» B. circuit switched |
356. | Most packet switches use this principle ____________ |
A. | stop and wait |
B. | store and forward |
C. | store and wait |
D. | stop and forward |
Answer» B. store and forward |
357. | What are the Methods to move data through a network of links and switches? |
A. | packet switching and line switching |
B. | circuit switching and line switching |
C. | line switching and bit switching |
D. | packet switching and circuit switching |
Answer» D. packet switching and circuit switching |
358. | In _________ systems, resources are allocated on demand. |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | frequency switching |
Answer» A. packet switching |
359. | Which of the following is not an application layer service? |
A. | network virtual terminal |
B. | file transfer, access, and management |
C. | mail service |
D. | error control |
Answer» D. error control |
360. | Which is not a application layer protocol? |
A. | http |
B. | smtp |
C. | ftp |
D. | tcp |
Answer» D. tcp |
361. | The packet of information at the application layer is called __________ |
A. | packet |
B. | message |
C. | segment |
D. | frame |
Answer» B. message |
362. | Which one of the following is an architecture paradigms? |
A. | peer to peer |
B. | client-server |
C. | http |
D. | both peer-to-peer & client-server |
Answer» D. both peer-to-peer & client-server |
363. | Application layer offers _______ service. |
A. | end to end |
B. | process to process |
C. | both end to end and process to process |
D. | none of the mentioned |
Answer» A. end to end |
364. | E-mail is _________ |
A. | loss-tolerant application |
B. | bandwidth-sensitive application |
C. | elastic application |
D. | none of the mentioned |
Answer» C. elastic application |
365. | Pick the odd one out. |
A. | file transfer |
B. | file download |
C. | |
D. | interactive games |
Answer» D. interactive games |
366. | Which of the following is an application layer service? |
A. | network virtual terminal |
B. | file transfer, access, and management |
C. | mail service |
D. | all of the mentioned |
Answer» D. all of the mentioned |
367. | Which is a time-sensitive service? |
A. | file transfer |
B. | file download |
C. | |
D. | internet telephony |
Answer» D. internet telephony |
368. | Transport services available to applications in one or another form _________ |
A. | reliable data transfer |
B. | timing |
C. | security |
D. | all of the mentioned |
Answer» D. all of the mentioned |
369. | Electronic mail uses which Application layer protocol? |
A. | smtp |
B. | http |
C. | ftp |
D. | sip |
Answer» A. smtp |
370. | The ____________ translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» A. domain name system |
371. | Application layer protocol defines ____________ |
A. | types of messages exchanged |
B. | message format, syntax and semantics |
C. | rules for when and how processes send and respond to messages |
D. | all of the mentioned |
Answer» D. all of the mentioned |
372. | When displaying a web page, the application layer uses the _____________ |
A. | http protocol |
B. | ftp protocol |
C. | smtp protocol |
D. | tcp protocol |
Answer» A. http protocol |
373. | The default connection type used by HTTP is _________ |
A. | persistent |
B. | non-persistent |
C. | can be either persistent or non-persistent depending on connection request |
D. | none of the mentioned |
Answer» A. persistent |
374. | The HTTP request message is sent in _________ part of three-way handshake. |
A. | first |
B. | second |
C. | third |
D. | fourth |
Answer» C. third |
376. | The __________ method when used in the method field, leaves entity body empty. |
A. | post |
B. | send |
C. | get |
D. | put |
Answer» C. get |
377. | Which of the following is not correct? |
A. | web cache doesnt has its own disk space |
B. | web cache can act both like server and client |
C. | web cache might reduce the response time |
D. | web cache contains copies of recently requested objects |
Answer» A. web cache doesnt has its own disk space |
378. | HTTP is ________ protocol. |
A. | application layer |
B. | transport layer |
C. | network layer |
D. | data link layer |
Answer» A. application layer |
379. | In the network HTTP resources are located by |
A. | uniform resource identifier |
B. | unique resource locator |
C. | unique resource identifier |
D. | union resource locator |
Answer» A. uniform resource identifier |
380. | FTP server listens for connection on port number ____________ |
A. | 20 |
B. | 21 |
C. | 22 |
D. | 23 |
Answer» B. 21 |
381. | The File Transfer Protocol is built on ______________ |
A. | data centric architecture |
B. | service oriented architecture |
C. | client server architecture |
D. | connection oriented architecture |
Answer» C. client server architecture |
382. | In File Transfer Protocol, data transfer cannot be done in ___________ |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | message mode |
Answer» D. message mode |
383. | Expansion of FTP is __________ |
A. | fine transfer protocol |
B. | file transfer protocol |
C. | first transfer protocol |
D. | fast transfer protocol |
Answer» B. file transfer protocol |
384. | FTP is built on _____ architecture. |
A. | client-server |
B. | p2p |
C. | data centric |
D. | service oriented |
Answer» A. client-server |
385. | FTP uses _________ parallel TCP connections to transfer a file. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» B. 2 |
386. | Identify the incorrect statement regarding FTP. |
A. | ftp stands for file transfer protocol |
B. | ftp uses two parallel tcp connections |
C. | ftp sends its control information in-band |
D. | ftp sends exactly one file over the data connection |
Answer» C. ftp sends its control information in-band |
387. | FTP server _____________ |
A. | maintains state information |
B. | is stateless |
C. | has single tcp connection for a file transfer |
D. | has udp connection for file transfer |
Answer» A. maintains state information |
388. | Find the FTP reply whose message is wrongly matched. |
A. | 331 – username ok, password required |
B. | 425 – can’t open data connection |
C. | 452 – error writing file |
D. | 452 – can’t open data connection |
Answer» D. 452 – can’t open data connection |
389. | The password is sent to the server using ________ command |
A. | passwd |
B. | pass |
C. | password |
D. | pword |
Answer» B. pass |
390. | When the mail server sends mail to other mail servers it becomes ____________ |
A. | smtp server |
B. | smtp client |
C. | peer |
D. | master |
Answer» B. smtp client |
391. | If you have to send multimedia data over SMTP it has to be encoded into _______ |
A. | binary |
B. | signal |
C. | ascii |
D. | hash |
Answer» C. ascii |
392. | The underlying Transport layer protocol used by SMTP is ________ |
A. | tcp |
B. | udp |
C. | either tcp or udp |
D. | imap |
Answer» A. tcp |
393. | Choose the statement which is wrong incase of SMTP? |
A. | it requires message to be in 7bit ascii format |
B. | it is a pull protocol |
C. | it transfers files from one mail server to another mail server |
D. | smtp is responsible for the transmission of the mail through the internet |
Answer» B. it is a pull protocol |
394. | Internet mail places each object in _________ |
A. | separate messages for each object |
B. | one message |
C. | varies with number of objects |
D. | multiple messages for each object |
Answer» B. one message |
395. | Typically the TCP port used by SMTP is _________ |
A. | 25 |
B. | 35 |
C. | 50 |
D. | 15 |
Answer» A. 25 |
396. | A session may include ________ |
A. | zero or more smtp transactions |
B. | exactly one smtp transactions |
C. | always more than one smtp transactions |
D. | number of smtp transactions cant be determined |
Answer» A. zero or more smtp transactions |
397. | Which of the following is an example of user agents for e-mail? |
A. | microsoft outlook |
B. | |
C. | |
D. | tumblr |
Answer» A. microsoft outlook |
398. | User agent does not support this ___________ |
A. | composing messages |
B. | reading messages |
C. | replying messages |
D. | routing messages |
Answer» D. routing messages |
399. | SMTP connections secured by SSL are known as _____________ |
A. | smtps |
B. | ssmtp |
C. | snmp |
D. | starttls |
Answer» A. smtps |
401. | Which one of the following protocol is used to receive mail messages? |
A. | smtp |
B. | post office protocol (pop) |
C. | internet message access protocol (imap) |
D. | ftp |
Answer» D. ftp |
402. | What is on-demand mail relay (ODMR)? |
A. | protocol for smtp security |
B. | an smtp extension |
C. | protocol for web pages |
D. | protocol for faster mail transfer |
Answer» B. an smtp extension |
403. | An email client needs to know the _________ of its initial SMTP server. |
A. | ip address |
B. | mac address |
C. | url |
D. | name |
Answer» A. ip address |
404. | An SMTP session may not include _______ |
A. | zero smtp transaction |
B. | one smtp transaction |
C. | more than one smtp transaction |
D. | one http transaction |
Answer» D. one http transaction |
405. | SMTP defines _______ |
A. | message transport |
B. | message encryption |
C. | message content |
D. | message password |
Answer» A. message transport |
406. | SMTP is not used to deliver messages to ______ |
A. | user’s terminal |
B. | user’s mailbox |
C. | user’s word processor |
D. | user’s email client |
Answer» C. user’s word processor |
407. | The entire hostname has a maximum of ___________ |
A. | 255 characters |
B. | 127 characters |
C. | 63 characters |
D. | 31 characters |
Answer» A. 255 characters |
408. | A DNS client is called _________ |
A. | dns updater |
B. | dns resolver |
C. | dns handler |
D. | none of the mentioned |
Answer» B. dns resolver |
409. | Servers handle requests for other domains _______ |
A. | directly |
B. | by contacting remote dns server |
C. | it is not possible |
D. | none of the mentioned |
Answer» B. by contacting remote dns server |
410. | DNS database contains _______ |
A. | name server records |
B. | hostname-to-address records |
C. | hostname aliases |
D. | all of the mentioned |
Answer» D. all of the mentioned |
411. | If a server has no clue about where to find the address for a hostname then _______ |
A. | server asks to the root server |
B. | server asks to its adjcent server |
C. | request is not processed |
D. | none of the mentioned |
Answer» A. server asks to the root server |
412. | Wildcard domain names start with label _______ |
A. | @ |
B. | * |
C. | & |
D. | # |
Answer» B. * |
413. | The domain name system is maintained by _______ |
A. | distributed database system |
B. | a single server |
C. | a single computer |
D. | none of the mentioned |
Answer» A. distributed database system |
414. | Secure shell (SSH) network protocol is used for __________ |
A. | secure data communication |
B. | remote command-line login |
C. | remote command execution |
D. | all of the mentioned |
Answer» D. all of the mentioned |
415. | SSH can be used in only _____________ |
A. | unix-like operating systems |
B. | windows |
C. | both unix-like and windows systems |
D. | none of the mentioned |
Answer» C. both unix-like and windows systems |
416. | SSH uses ___________ to authenticate the remote computer. |
A. | public-key cryptography |
B. | private-key cryptography |
C. | any of public-key or private-key |
D. | both public-key & private-key |
Answer» A. public-key cryptography |
417. | Which standard TCP port is assigned for contacting SSH servers? |
A. | port 21 |
B. | port 22 |
C. | port 23 |
D. | port 24 |
Answer» B. port 22 |
418. | Which one of the following is a file transfer protocol using SSH? |
A. | scp |
B. | sftp |
C. | rsync |
D. | all of the mentioned |
Answer» D. all of the mentioned |
419. | SSH-2 does not contain ______________ |
A. | transport layer |
B. | user authentication layer |
C. | physical layer |
D. | connection layer |
Answer» C. physical layer |
420. | Which one of the following feature was present in SSH protocol, version 1? |
A. | password changing |
B. | periodic replacement of session keys |
C. | support for public-key certificates |
D. | none of the mentioned |
Answer» D. none of the mentioned |
421. | SCP protocol is evolved from __________ over SSH. |
A. | rcp protocol |
B. | dhcp protocol |
C. | mgcp protocol |
D. | gcp protocol |
Answer» A. rcp protocol |
422. | Which one of the following authentication method is used by SSH? |
A. | public-key |
B. | host based |
C. | password |
D. | all of the mentioned |
Answer» D. all of the mentioned |
423. | DHCP (dynamic host configuration protocol) provides __________ to the client. |
A. | ip address |
B. | mac address |
C. | url |
D. | none of the mentioned |
Answer» A. ip address |
424. | DHCP is used for ________ |
A. | ipv6 |
B. | ipv4 |
C. | both ipv6 and ipv4 |
D. | none of the mentioned |
Answer» C. both ipv6 and ipv4 |
426. | IP assigned for a client by DHCP server is |
A. | for a limited period |
B. | for an unlimited period |
C. | not time dependent |
D. | none of the mentioned |
Answer» A. for a limited period |
427. | DHCP uses UDP port _________ for sending data to the server. |
A. | 66 |
B. | 67 |
C. | 68 |
D. | 69 |
Answer» B. 67 |
428. | DHCP client and servers on the same subnet communicate via _________ |
A. | udp broadcast |
B. | udp unicast |
C. | tcp broadcast |
D. | tcp unicast |
Answer» A. udp broadcast |
429. | WPA2 is used for security in _______ |
A. | ethernet |
B. | bluetooth |
C. | wi-fi |
D. | |
Answer» C. wi-fi |
430. | VPNs are financially speaking __________ |
A. | always more expensive than leased lines |
B. | always cheaper than leased lines |
C. | usually cheaper than leased lines |
D. | usually more expensive than leased lines |
Answer» C. usually cheaper than leased lines |
431. | Storage management comprises of _______________ |
A. | san management |
B. | data protection |
C. | disk operation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
432. | Which of the following is not a storage device? |
A. | switch |
B. | raid arrays |
C. | tape drives |
D. | hub |
Answer» D. hub |
433. | Which protocols are used for Storage management? |
A. | snmp |
B. | ldap |
C. | pop3 |
D. | mib |
Answer» A. snmp |
434. | How do Storage administrators ensure secure access to storage devices? |
A. | by using zoning |
B. | by putting a physical lock on the storage device |
C. | by keeping devices shutdown when not in use |
D. | by keeping devices when used |
Answer» A. by using zoning |
435. | Effective Storage management does not include __________ |
A. | security |
B. | backups |
C. | reporting |
D. | connection |
Answer» D. connection |
436. | SMI-S Standard uses which of the following? |
A. | java rmi |
B. | cim-xml/http |
C. | corba |
D. | .net |
Answer» B. cim-xml/http |
437. | Full duplex mode increases the capacity of each domain by ________ |
A. | 10 to 20 mbps |
B. | 20 to 30 mbps |
C. | 30 to 40 mbps |
D. | 40 to 50 mbps |
Answer» A. 10 to 20 mbps |
438. | Configuration management can be divided into which two subsystems? |
A. | reconfiguration and documentation |
B. | management and configuration |
C. | documentation and dialing up |
D. | configuration and dialing up |
Answer» A. reconfiguration and documentation |
439. | To use a Simple Network Management System, we need _______ |
A. | servers |
B. | ip |
C. | protocols |
D. | rules |
Answer» D. rules |
440. | The main difference between SNMPv3 and SNMPv2 is _______ |
A. | management |
B. | integration |
C. | classification |
D. | enhanced security |
Answer» D. enhanced security |
441. | BER stands for ________ |
A. | basic encoding rules |
B. | basic encoding resolver |
C. | basic encoding rotator |
D. | basic encoding router |
Answer» A. basic encoding rules view more info and meaning of BER |
442. | SNMP is the framework for managing devices in an internet using the ______ |
A. | tcp/ip protocol |
B. | udp |
C. | smtp |
D. | none |
Answer» A. tcp/ip protocol |
443. | Structure of Management Information (SMI), is the guideline of ________ |
A. | http |
B. | snmp |
C. | url |
D. | mib |
Answer» B. snmp |
444. | The application layer protocol used by a Telnet application is ________ |
A. | telnet |
B. | ftp |
C. | http |
D. | smtp |
Answer» A. telnet |
445. | _______ allows you to connect and login to a remote computer |
A. | telnet |
B. | ftp |
C. | http |
D. | smtp |
Answer» A. telnet |
446. | Telnet is used for _______ |
A. | television on net |
B. | network of telephones |
C. | remote login |
D. | teleshopping site |
Answer» C. remote login |
447. | Which one of the following is not correct? |
A. | telnet is a general purpose client-server program |
B. | telnet lets user access an application on a remote computer |
C. | telnet can also be used for file transfer |
D. | telnet can be used for remote login |
Answer» C. telnet can also be used for file transfer |
448. | Which operating mode of telnet is full duplex? |
A. | default mode |
B. | server mode |
C. | line mode |
D. | character mode |
Answer» C. line mode |
449. | If we want that a character be interpreted by the client instead of server _________ |
A. | interpret as command (iac) escape character has to be used |
B. | control functions has to be disabled |
C. | it is not possible |
D. | cli character has to be used |
Answer» A. interpret as command (iac) escape character has to be used |
451. | Which one of the following is not true? | |
A. | telnet defines a network virtual terminal (nvt) standard | |
B. | client programs interact with nvt | |
C. | server translates nvt operations | |
D. | client can transfer files using to remote server using nvt | |
Answer» D. client can transfer files using to remote server using nvt | ||
452. | All telnet operations are sent as ________ |
A. | 4 bits |
B. | 8 bits |
C. | 16 bits |
D. | 32 bits |
Answer» B. 8 bits |
453. | AbsoluteTelnet is a telnet client for _______ Operating system. |
A. | windows |
B. | linux |
C. | mac |
D. | ubuntu |
Answer» A. windows |
454. | The decimal code of Interpret as Command (IAC) character is _______ |
A. | 252 |
B. | 253 |
C. | 254 |
D. | 255 |
Answer» D. 255 |
455. | Which of the following is false with respect to TCP? |
A. | connection-oriented |
B. | process-to-process |
C. | transport layer protocol |
D. | unreliable |
Answer» D. unreliable |
456. | In TCP, sending and receiving data is done as _______ |
A. | stream of bytes |
B. | sequence of characters |
C. | lines of data |
D. | packets |
Answer» A. stream of bytes |
457. | TCP groups a number of bytes together into a packet called _______ |
A. | packet |
B. | buffer |
C. | segment |
D. | stack |
Answer» C. segment |
458. | Communication offered by TCP is ________ |
A. | full-duplex |
B. | half-duplex |
C. | semi-duplex |
D. | byte by byte |
Answer» A. full-duplex |
459. | The value of acknowledgement field in a segment defines _______ |
A. | sequence number of the byte received previously |
B. | total number of bytes to receive |
C. | sequence number of the next byte to be received |
D. | sequence of zeros and ones |
Answer» C. sequence number of the next byte to be received |
460. | Size of TCP segment header ranges between ___________ |
A. | 16 and 32 bytes |
B. | 16 and 32 bits |
C. | 20 and 60 bytes |
D. | 20 and 60 bits |
Answer» C. 20 and 60 bytes |
461. | Connection establishment in TCP is done by which mechanism? |
A. | flow control |
B. | three-way handshaking |
C. | forwarding |
D. | synchronization |
Answer» B. three-way handshaking |
462. | SYNC flooding attack belongs to a type of security attack known as ___________ |
A. | sync flooding attack |
B. | active attack |
C. | passive attack |
D. | denial-of-service attack |
Answer» D. denial-of-service attack |
463. | What allows TCP to detect lost segments and in turn recover from that loss? |
A. | sequence number |
B. | acknowledgment number |
C. | checksum |
D. | both sequence & acknowledgment number |
Answer» B. acknowledgment number |
464. | Which of the following is false with respect to UDP? |
A. | connection-oriented |
B. | unreliable |
C. | transport layer protocol |
D. | low overhead |
Answer» A. connection-oriented |
465. | Return value of the UDP port “Chargen” is _______ |
A. | string of characters |
B. | string of integers |
C. | array of characters with integers |
D. | array of zero’s and one’s |
Answer» A. string of characters |
466. | Beyond IP, UDP provides additional services such as _______ |
A. | routing and switching |
B. | sending and receiving of packets |
C. | multiplexing and demultiplexing |
D. | demultiplexing and error checking |
Answer» D. demultiplexing and error checking |
467. | What is the main advantage of UDP? |
A. | more overload |
B. | reliable |
C. | low overhead |
D. | fast |
Answer» C. low overhead |
468. | Port number used by Network Time Protocol (NTP) with UDP is ________ |
A. | 161 |
B. | 123 |
C. | 162 |
D. | 124 |
Answer» B. 123 |
469. | What is the header size of a UDP packet? |
A. | 8 bytes |
B. | 8 bits |
C. | 16 bytes |
D. | 124 bytes |
Answer» A. 8 bytes |
470. | The port number is “ephemeral port number”, if the source host is _______ |
A. | ntp |
B. | echo |
C. | server |
D. | client |
Answer» D. client |
471. | “Total length” field in UDP packet header is the length of _________ |
A. | only udp header |
B. | only data |
C. | only checksum |
D. | udp header plus data |
Answer» D. udp header plus data |
472. | Which is the correct expression for the length of UDP datagram? |
A. | udp length = ip length – ip header’s length |
B. | udp length = udp length – udp header’s length |
C. | udp length = ip length + ip header’s length |
D. | udp length = udp length + udp header’s length |
Answer» A. udp length = ip length – ip header’s length |
473. | The ______ field is used to detect errors over the entire user datagram. |
A. | udp header |
B. | checksum |
C. | source port |
D. | destination port |
Answer» B. checksum |
474. | IPsec defines two protocols: _______ and ________ |
A. | ah; ssl |
B. | pgp; esp |
C. | ah; esp |
D. | pgp; ssl |
Answer» C. ah; esp |
476. | ESP does not provide ________ | |
A. | source authentication | |
B. | data integrity | |
C. | privacy | |
D. | error control | |
Answer» D. error control | ||
477. | Two broad categories of congestion control are |
A. | open-loop and closed-loop |
B. | open-control and closed-control |
C. | active control and passive control |
D. | active loop and passive loop |
Answer» A. open-loop and closed-loop |
478. | In open-loop control, policies are applied to __________ |
A. | remove after congestion occurs |
B. | remove after sometime |
C. | prevent before congestion occurs |
D. | prevent before sending packets |
Answer» C. prevent before congestion occurs |
479. | Retransmission of packets must not be done when _______ |
A. | packet is lost |
B. | packet is corrupted |
C. | packet is needed |
D. | packet is error-free |
Answer» D. packet is error-free |
480. | Discarding policy is mainly done by _______ |
A. | sender |
B. | receiver |
C. | router |
D. | switch |
Answer» C. router |
481. | Closed-Loop control mechanisms try to _________ |
A. | remove after congestion occurs |
B. | remove after sometime |
C. | prevent before congestion occurs |
D. | prevent before sending packets |
Answer» A. remove after congestion occurs |
482. | Backpressure technique can be applied only to _______ |
A. | congestion networks |
B. | closed circuit networks |
C. | open circuit networks |
D. | virtual circuit networks |
Answer» D. virtual circuit networks |
483. | The packet sent by a node to the source to inform it of congestion is called _______ |
A. | explicit |
B. | discard |
C. | choke |
D. | backpressure |
Answer» C. choke |
484. | Which of the following is not a characteristic of Virtual Circuit Network? |
A. | there are setup and teardown phases in addition to the data transfer phase |
B. | resources can be allocated during setup phase or on demand |
C. | all packets follow the same path established during the connection |
D. | virtual circuit network is implemented in application layer |
Answer» D. virtual circuit network is implemented in application layer |
485. | Which of the following is not a phase of virtual circuit network? |
A. | setup phase |
B. | data transfer phase |
C. | termination phase |
D. | teardown phase |
Answer» C. termination phase |
486. | Steps required in setup process are ___________ |
A. | setup request and acknowledgement |
B. | setup request and setup response |
C. | setup request and setup termination |
D. | setup and termination steps |
Answer» A. setup request and acknowledgement |
487. | Delay of the resource allocated during setup phase during data transfer is ________ |
A. | constant |
B. | increases for each packet |
C. | same for each packet |
D. | different for each packet |
Answer» C. same for each packet |
488. | Delay of the resource allocated on demand during data transfer is ________ |
A. | constant |
B. | increases for each packet |
C. | same for each packet |
D. | different for each packet |
Answer» D. different for each packet |
489. | In data transfer phase, how many columns does the table contain? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» D. 4 |
490. | ATM and frame relay are ________ |
A. | virtual circuit networks |
B. | datagram networks |
C. | virtual private networks |
D. | virtual public networks |
Answer» A. virtual circuit networks |
491. | ATM uses _______________ |
A. | asynchronous frequency division multiplexing |
B. | asynchronous time division multiplexing |
C. | asynchronous space division multiplexing |
D. | asynchronous amplitude division multiplexing |
Answer» B. asynchronous time division multiplexing |
492. | ATM standard defines _______ layers. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 |
493. | ATM can be used for ________ |
A. | local area network |
B. | wide area network |
C. | campus area network |
D. | networks covering any range |
Answer» D. networks covering any range |
494. | An ATM cell has the payload field of __________ |
A. | 32 bytes |
B. | 48 bytes |
C. | 64 bytes |
D. | 128 bytes |
Answer» B. 48 bytes |
495. | Frame relay has error detection at the ______ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | transport layer |
Answer» B. data link layer |
496. | Virtual circuit identifier in frame relay is called ______ |
A. | data link connection identifier |
B. | frame relay identifier |
C. | cell relay identifier |
D. | circuit connection identifier |
Answer» A. data link connection identifier |
497. | Frame relay has _______ |
A. | only physical layer |
B. | only data link layer |
C. | only network layer |
D. | both physical and data link layer |
Answer» D. both physical and data link layer |
498. | In frame relay networks, extended address is used _______ |
A. | to increase the range of data link connection identifiers |
B. | for error detection |
C. | for encryption |
D. | for error recovery |
Answer» A. to increase the range of data link connection identifiers |
499. | What is FRAD in frame relay network? |
A. | frad assembles and disassembles the frames coming from other protocols |
B. | frad is used for modulation and demodulation |
C. | frad is used for error detection |
D. | frad is used for error recovery |
Answer» A. frad assembles and disassembles the frames coming from other protocols |
501. | Frame Relay networks offer an option called _______ |
A. | voice over for relay |
B. | voice over fine relay |
C. | voice on frame relay |
D. | voice over frame relay |
Answer» D. voice over frame relay |
502. | There are ________ total features of Frame Relay. |
A. | five |
B. | seven |
C. | nine |
D. | ten |
Answer» C. nine |
503. | Frame Relay deploys physical layer carriers such as _______ |
A. | adms |
B. | upsr |
C. | blsr |
D. | sonet |
Answer» D. sonet |
504. | Frame relay provides error detection at the ______ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | transport layer |
Answer» B. data link layer |
505. | Virtual circuit identifier in frame relay is called _______ |
A. | data link connection identifier |
B. | frame relay identifier |
C. | cell relay identifier |
D. | circuit connection identifier |
Answer» A. data link connection identifier |
506. | Frame relay has only _______ |
A. | physical layer |
B. | data link layer |
C. | physical layer and data link layer |
D. | network layer and data link layer |
Answer» C. physical layer and data link layer |
507. | In frame relay networks, extended address is used ________ |
A. | to increase the range of data link connection identifiers |
B. | for error detection |
C. | for encryption |
D. | for error recovery |
Answer» A. to increase the range of data link connection identifiers |
508. | Common gateway interface is used to _______ |
A. | generate executable files from web content by web server |
B. | generate web pages |
C. | stream videos |
D. | download media files |
Answer» A. generate executable files from web content by web server |
509. | URL stands for ________ |
A. | unique reference label |
B. | uniform reference label |
C. | uniform resource locator |
D. | unique resource locator |
Answer» C. uniform resource locator view more info and meaning of URL |
510. | Which one of the following is not used to generate dynamic web pages? |
A. | php |
B. | asp.net |
C. | jsp |
D. | css |
Answer» D. css |
511. | An alternative to JavaScript on windows platform is _______ |
A. | vbscript |
B. | asp.net |
C. | jsp |
D. | php |
Answer» A. vbscript |
512. | What is document object model (DOM)? |
A. | convention for representing and interacting with objects in html documents |
B. | application programming interface |
C. | hierarchy of objects in asp.net |
D. | scripting language |
Answer» A. convention for representing and interacting with objects in html documents |
513. | AJAX stands for _______ |
A. | asynchronous javascript and xml |
B. | advanced jsp and xml |
C. | asynchronous jsp and xml |
D. | advanced javascript and xml |
Answer» A. asynchronous javascript and xml view more info and meaning of AJAX |
514. | The data field cannot carry which of the following? |
A. | tcp segment |
B. | udp segment |
C. | icmp messages |
D. | smtp messages |
Answer» C. icmp messages |
515. | What should be the flag value to indicate the last fragment? |
A. | 0 |
B. | 1 |
C. | ttl value |
D. | protocol field value |
Answer» A. 0 |
516. | Which of these is not applicable for IP protocol? |
A. | is connectionless |
B. | offer reliable service |
C. | offer unreliable service |
D. | does not offer error reporting |
Answer» B. offer reliable service |
517. | Which of these is not applicable for IP protocol? |
A. | connectionless |
B. | offer reliable service |
C. | offer unreliable service |
D. | does not offer error reporting |
Answer» B. offer reliable service |
518. | Which of the following demerits does Fragmentation have? |
A. | complicates routers |
B. | open to dos attack |
C. | overlapping of fragments |
D. | all of the mentioned |
Answer» D. all of the mentioned |
519. | Which field helps to check rearrangement of the fragments? |
A. | offset |
B. | flag |
C. | ttl |
D. | identifier |
Answer» A. offset |
520. | In classless addressing, there are no classes but addresses are still granted in ______ |
A. | ips |
B. | blocks |
C. | codes |
D. | sizes |
Answer» B. blocks |
521. | In IPv4 Addresses, classful addressing is replaced with ________ |
A. | classless addressing |
B. | classful addressing |
C. | classful advertising |
D. | classless advertising |
Answer» A. classless addressing |
522. | First address in a block is used as network address that represents the ________ |
A. | class network |
B. | entity |
C. | organization |
D. | codes |
Answer» C. organization |
523. | In classful addressing, a large part of available addresses are ________ |
A. | organized |
B. | blocked |
C. | wasted |
D. | communicated |
Answer» C. wasted |
524. | Network addresses are a very important concept of ________ |
A. | routing |
B. | mask |
C. | ip addressing |
D. | classless addressing |
Answer» C. ip addressing |
526. | The header length of an IPv6 datagram is ___________ |
A. | 10bytes |
B. | 25bytes |
C. | 30bytes |
D. | 40bytes |
Answer» D. 40bytes |
527. | IPv6 does not use _________ type of address. |
A. | broadcast |
B. | multicast |
C. | anycast |
D. | unicast |
Answer» A. broadcast |
528. | Which among the following features is present in IPv6 but not in IPv4? |
A. | fragmentation |
B. | header checksum |
C. | options |
D. | anycast address |
Answer» D. anycast address |
529. | The _________ field determines the lifetime of IPv6 datagram |
A. | hop limit |
B. | ttl |
C. | next header |
D. | type of traffic |
Answer» A. hop limit |
530. | Dual-stack approach refers to _________ |
A. | implementing ipv4 with 2 stacks |
B. | implementing ipv6 with 2 stacks |
C. | node has both ipv4 and ipv6 support |
D. | implementing a mac address with 2 stacks |
Answer» C. node has both ipv4 and ipv6 support |
531. | A link local address of local addresses is used in an _______ |
A. | isolated router |
B. | isolated mask |
C. | isolated subnet |
D. | isolated net |
Answer» C. isolated subnet |
532. | In IPv6 addresses, addresses that start with eight 0s are called ________ |
A. | unicast addresses |
B. | multicast addresses |
C. | any cast addresses |
D. | reserved addresses |
Answer» D. reserved addresses |
533. | Which statement(s) about IPv6 addresses are true? |
A. | leading zeros are required |
B. | two colons (::) are used to represent successive hexadecimal fields of zeros |
C. | two colons (::) are used to separate fields |
D. | a single interface cannot have multiple ipv6 addresses of different types |
Answer» B. two colons (::) are used to represent successive hexadecimal fields of zeros |
534. | When was IPv6 launched? |
A. | june 2, 2012 |
B. | june 4, 2012 |
C. | june 5, 2012 |
D. | june 6, 2012 |
Answer» D. june 6, 2012 |
535. | Which layer is responsible for process-to-process delivery? |
A. | physical layer |
B. | network layer |
C. | transport layer |
D. | application layer |
Answer» C. transport layer |
536. | Multiple processes on destinations at transport layer are identified by __________ |
A. | mac address |
B. | port number |
C. | host number |
D. | host address |
Answer» B. port number |
537. | Range of port numbers in Internet model is __________ |
A. | 0 and 32,765(8-bit) |
B. | 0 and 32,765(16-bit) |
C. | 0 and 65,535(32-bit) |
D. | 0 and 65,535(16-bit) |
Answer» D. 0 and 65,535(16-bit) |
538. | The combination of an IP address and port number is called as ________ |
A. | socket address |
B. | port address |
C. | mac address |
D. | host address |
Answer» A. socket address |
539. | In transport layer, Multiplexing is done at _________ |
A. | channel |
B. | receiver site |
C. | sender site |
D. | packet |
Answer» C. sender site |
540. | Header size of the ICMP message is _________ |
A. | 8-bytes |
B. | 8-bits |
C. | 16-bytes |
D. | 16-bits |
Answer» A. 8-bytes |
541. | During error reporting, ICMP always reports error messages to ________ |
A. | destination |
B. | source |
C. | next router |
D. | previous router |
Answer» B. source |
542. | Which of these is not a type of error-reporting message? |
A. | destination unreachable |
B. | source quench |
C. | router error |
D. | time exceeded |
Answer» C. router error |
543. | The main reason for transition from IPv4 to IPv6 is _________ |
A. | huge number of systems on the internet |
B. | very low number of system on the internet |
C. | providing standard address |
D. | to provide faster internet |
Answer» A. huge number of systems on the internet |
544. | Which of the following is not a transition strategy? |
A. | dual stack |
B. | tunneling |
C. | conversion |
D. | header translation |
Answer» C. conversion |
545. | Which of the following is not applicable for IP? |
A. | error reporting |
B. | handle addressing conventions |
C. | datagram format |
D. | packet handling |
Answer» A. error reporting |
546. | If the value in protocol field is 17, the transport layer protocol used is _________ |
A. | tcp |
B. | udp |
C. | icmp |
D. | igmp |
Answer» B. udp |
547. | In an IPv6 header, the traffic class field is similar to which field in the IPv4 header? |
A. | fragmentation field |
B. | fast switching |
C. | tos field |
D. | option field |
Answer» C. tos field |
548. | IPv6 does not use ________ type of address. |
A. | broadcast |
B. | multicast |
C. | any cast |
D. | unicast |
Answer» A. broadcast |
549. | Which are the features present in IPv4 but not in IPv6? |
A. | fragmentation |
B. | header checksum |
C. | options |
D. | anycast address |
Answer» D. anycast address |
551. | Which of the following are Gigabit Ethernets? | |
A. | 1000 base-sx | |
B. | 1000 base-lx | |
C. | 1000 base-cx | |
D. | all of the mentioned | |
Answer» D. all of the mentioned | ||
552. | _________ is another kind of fiber optic network with an active star for switching. |
A. | s/net |
B. | sw/net |
C. | net/sw |
D. | fs/net |
Answer» A. s/net |
553. | What is the subnet id of a host with an IP address 172.16.66.0/21? |
A. | 172.16.36.0 |
B. | 172.16.48.0 |
C. | 172.16.64.0 |
D. | 172.16.0.0 |
Answer» C. 172.16.64.0 |
554. | The network address of 172.16.0.0/19 provides how many subnets and hosts? |
A. | 7 subnets, 30 hosts each |
B. | 8 subnets, 8,190 hosts each |
C. | 8 subnets, 2,046 hosts each |
D. | 7 subnets, 2,046 hosts each |
Answer» B. 8 subnets, 8,190 hosts each |
555. | Which type of Ethernet framing is used for TCP/IP and DEC net? |
A. | ethernet 802.3 |
B. | ethernet 802.2 |
C. | ethernet ii |
D. | ethernet snap |
Answer» C. ethernet ii |
556. | Which NetWare protocol works on layer 3–network layer—of the OSI model? |
A. | ipx |
B. | ncp |
C. | spx |
D. | netbios |
Answer» A. ipx |
557. | Which NetWare protocol provides link-state routing? |
A. | nlsp |
B. | rip |
C. | sap |
D. | ncp |
Answer» A. nlsp |
558. | 0.0.0 router IGRP 109 network 172.68.7.0 |
A. | it isolates networks 10.0.0.0 and 172.68.7.0 |
B. | it loads igrp for networks 109 and 71 |
C. | it disables rip |
D. | it disables all routing protocols |
Answer» A. it isolates networks 10.0.0.0 and 172.68.7.0 |
559. | What does the “IPX maximum-paths 2” command accomplish? |
A. | it enables load sharing on 2 paths if the paths are equal metric paths |
B. | it sets up routing to go to network 2 |
C. | it is the default for cisco ipx load sharing |
D. | it enables load sharing on 2 paths if the paths are unequal metric paths |
Answer» A. it enables load sharing on 2 paths if the paths are equal metric paths |
560. | Novell’s implementation of RIP updates routing tables every _________ seconds. |
A. | 60 |
B. | 90 |
C. | 10 |
D. | 30 |
Answer» A. 60 |
561. | Which protocol should you select if the network diameter is more than 17 hops? |
A. | ripv1 |
B. | ripv2 |
C. | eigrp |
D. | both ripv1 and ripv2 |
Answer» A. ripv1 |
562. | How often does a RIPv1 router broadcast its routing table by default? |
A. | every 30 seconds |
B. | every 60 seconds |
C. | every 90 seconds |
D. | ripv1 does not broadcast periodically |
Answer» A. every 30 seconds |
563. | Which command displays RIP routing updates? |
A. | show ip route |
B. | debug ip rip |
C. | show protocols |
D. | debug ip route |
Answer» B. debug ip rip |
564. | Default administrative distance of a static route is ________ |
A. | 0 |
B. | 90 |
C. | 100 |
D. | 1 |
Answer» D. 1 |
565. | Which protocol gives a full route table update every 30 seconds? |
A. | iegrp |
B. | rip |
C. | icmp |
D. | ip |
Answer» B. rip |
566. | _________ is the default administrative distance of RIP. |
A. | 0 |
B. | 90 |
C. | 120 |
D. | 130 |
Answer» C. 120 |
567. | Which statement is true regarding classless routing protocol? |
A. | the use of discontinuous networks is not allowed |
B. | use of variable length subnet masks is permitted |
C. | ripv1 is a classless routing protocol |
D. | igrp supports classes routing within the same autonomous system |
Answer» B. use of variable length subnet masks is permitted |
568. | Where should we use default routing? |
A. | on stub networks- which have only one exit path out of the network |
B. | which have more than one exit path out of the network |
C. | minimum five exit paths out of the network |
D. | maximum five exit paths out of the network |
Answer» A. on stub networks- which have only one exit path out of the network |
569. | Which statement is true regarding classless routing protocols? |
A. | the use of discontinuous networks is not allowed |
B. | the use of variable length subnet masks is permitted |
C. | ripv1 is a classless routing protocol |
D. | ripv2 supports classless routing |
Answer» B. the use of variable length subnet masks is permitted |
570. | Which of the following is true regarding RIPv2? |
A. | it has a lower administrative distance than ripv1 |
B. | it converges faster than ripv1 |
C. | it has the same timers as ripv1 |
D. | it is harder to configure than ripv1 |
Answer» C. it has the same timers as ripv1 |
571. | Which of the situations might not require multiple routing protocols in a network? |
A. | when a new layer 2-only switch is added to the network |
B. | when you are migrating from one routing protocol to another |
C. | when you are using routers from multiple vendors |
D. | when there are host-based routers from multiple vendors |
Answer» A. when a new layer 2-only switch is added to the network |
572. | Which two routing protocols can be redistributed into OSPF by a Cisco router? |
A. | ip eigrp and appletalk eigrp |
B. | appletalk eigrp and ripv2 |
C. | ripv2 and ip eigrp |
D. | ipx rip & appletalk eigrp |
Answer» C. ripv2 and ip eigrp |
573. | What does administrative distance rank? |
A. | metrics |
B. | sources of routing information |
C. | router reliability |
D. | best paths |
Answer» B. sources of routing information |
574. | Which protocol maintains neighbor adjacencies? |
A. | ripv2 and eigrp |
B. | igrp and eigrp |
C. | ripv2 |
D. | eigrp |
Answer» C. ripv2 |
576. | Which protocol should you select if the network diameter is more than 17 hops? |
A. | ripv1 |
B. | ripv2 |
C. | eigrp |
D. | ospf |
Answer» B. ripv2 |
577. | In the network HTTP resources are located by __________ |
A. | uniform resource identifier |
B. | unique resource locator |
C. | unique resource identifier |
D. | union resource locator |
Answer» A. uniform resource identifier |
578. | FTP server listens for connection on which port number? |
A. | 20 |
B. | 21 |
C. | 22 |
D. | 23 |
Answer» B. 21 |
579. | In FTP protocol, a client contacts a server using ______ as the transport protocol. |
A. | transmission control protocol |
B. | user datagram protocol |
C. | datagram congestion control protocol |
D. | stream control transmission protocol |
Answer» A. transmission control protocol |
580. | The File Transfer Protocol is built on __________ |
A. | data centric architecture |
B. | service oriented architecture |
C. | client server architecture |
D. | connection oriented architecture |
Answer» C. client server architecture |
581. | In File Transfer Protocol, data transfer cannot be done in __________ |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | message mode |
Answer» D. message mode |
582. | Which methods are commonly used in Server Socket class? |
A. | public output stream get output stream () |
B. | public socket accept () |
C. | public synchronized void close () |
D. | public void connect () |
Answer» B. public socket accept () |
583. | The client in socket programming must know which information? |
A. | ip address of server |
B. | port number |
C. | both ip address of server & port number |
D. | only its own ip address |
Answer» C. both ip address of server & port number |
584. | TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________ |
A. | socket |
B. | ip address |
C. | protocol |
D. | mac address |
Answer» C. protocol |
585. | What does the java.net.InetAddress class represent? |
A. | socket |
B. | ip address |
C. | protocol |
D. | mac address |
Answer» B. ip address |
586. | Which classes are used for connection-less socket programming? |
A. | datagram socket |
B. | datagram packet |
C. | both datagram socket & datagram packet |
D. | server socket |
Answer» C. both datagram socket & datagram packet |
587. | In Inet Address class, which method returns the host name of the IP Address? |
A. | public string get hostname() |
B. | public string gethostaddress() |
C. | public static inetaddress get localhost() |
D. | public getbyname() |
Answer» A. public string get hostname() |
588. | Cookies were originally designed for ____________ |
A. | client side programming |
B. | server side programming |
C. | both client side programming and server side programming |
D. | socket programming |
Answer» B. server side programming |
589. | The Cookie manipulation is done using which property? |
A. | cookie |
B. | cookies |
C. | manipulate |
D. | manipulate cookie |
Answer» A. cookie |
590. | Which of the following explains Cookies nature? |
A. | non volatile |
B. | volatile |
C. | intransient |
D. | transient |
Answer» D. transient |
591. | Which attribute is used to extend the lifetime of a cookie? |
A. | higher-age |
B. | increase-age |
C. | max-age |
D. | lifetime |
Answer» C. max-age |
592. | Which of the following defines the Cookie visibility? |
A. | document path |
B. | localstorage |
C. | sessionstorage |
D. | all of the mentioned |
Answer» D. all of the mentioned |
593. | Which of the following can be used to configure the scope of the Cookie visibility? |
A. | path |
B. | domain |
C. | both path and domain |
D. | server |
Answer» D. server |
594. | How can you set a Cookie visibility scope to local Storage? |
A. | / |
B. | % |
C. | * |
D. | # |
Answer» A. / |
595. | Which of the following is a Boolean cookie attribute? |
A. | bool |
B. | secure |
C. | lookup |
D. | domain |
Answer» B. secure |
596. | What is the constraint on the data per cookie? |
A. | 2 kb |
B. | 1 kb |
C. | 4 kb |
D. | 3 kb |
Answer» C. 4 kb |
597. | What does REST stand for? |
A. | represent state transfer |
B. | representational state transfer |
C. | representing state transfer |
D. | representation state transfer |
Answer» B. representational state transfer |
598. | Which of the following HTTP methods should be idempotent in nature? |
A. | options |
B. | delete |
C. | post |
D. | head |
Answer» B. delete |
599. | Next-Hop Method is used to reduce contents of a _________ |
A. | revolving table |
B. | rotating table |
C. | routing table |
D. | re-allocate table |
Answer» C. routing table |
601. | RPF stands for __________ |
A. | reverse path forwarding |
B. | reverse path failure |
C. | reverse packet forwarding |
D. | reverse protocol failure |
Answer» A. reverse path forwarding view more info and meaning of RPF |
602. | LSP stands for __________ |
A. | link stable packet |
B. | link state packet |
C. | link state protocol |
D. | link state path |
Answer» B. link state packet view more info and meaning of LSP |
603. | Network layer firewall works as a ________ |
A. | frame filter |
B. | packet filter |
C. | signal filter |
D. | content filter |
Answer» B. packet filter |
604. | Network layer firewall has two sub-categories called ____________ |
A. | stateful firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network firewall and data firewall |
Answer» A. stateful firewall and stateless firewall |
605. | WPA2 is used for security in _______ |
A. | ethernet |
B. | bluetooth |
C. | wi-fi |
D. | |
Answer» C. wi-fi |
606. | Open Shortest Path First (OSPF) is also called as _____________ |
A. | link state protocol |
B. | error-correction protocol |
C. | routing information protocol |
D. | border gateway protocol |
Answer» A. link state protocol |
607. | The computation of the shortest path in OSPF is usually done by ____________ |
A. | bellman-ford algorithm |
B. | routing information protocol |
C. | dijkstra’s algorithm |
D. | distance vector routing |
Answer» C. dijkstra’s algorithm |
608. | In OSPF, which protocol is used to discover neighbour routers automatically? |
A. | link state protocol |
B. | error-correction protocol |
C. | routing information protocol |
D. | hello protocol |
Answer» D. hello protocol |
609. | Which of the following is not a type of OSPF packet? |
A. | hello |
B. | link-state request |
C. | link-state response |
D. | link-state ack |
Answer» C. link-state response | |
Explanation: The five types of OSPF packets are: Hello, Database description, Linkstate request, Link-state update, and Link-state ACK. There is no Link-state response packet; the neighbor router sends a Link-state update packet as a response to the Linkstate request packet if there is an update in the routing table. |
610. | In OSPF header, which field is used to detect errors in the packet? |
A. | type |
B. | area id |
C. | authentication type |
D. | checksum |
Answer» D. checksum | |
Explanation: The checksum field is used to detect errors. It makes sure that the data portions that are being sent are all in integrity. It can detect duplicated bits. Once an error is detected, the sender has to re-transmit the data as it won’t receive an acknowledgment. |
611. | The outcome of Dijkstra’s calculation is used to populate the __________ |
A. | topology table |
B. | routing table |
C. | neighbor table |
D. | adjacency table |
Answer» B. routing table |
612. | What is the IP protocol number for OSPF packets? |
A. | 89 |
B. | 86 |
C. | 20 |
D. | 76 |
Answer» A. 89 |
613. | Which packet is NOT an OSPF packet type? |
A. | lsu |
B. | lsr |
C. | dbd |
D. | query |
Answer» D. query |
614. | Which multicast address does the OSPF Hello protocol use? |
A. | 224.0.0.5 |
B. | 224.0.0.6 |
C. | 224.0.0.7 |
D. | 224.0.0.8 |
Answer» A. 224.0.0.5 |
615. | DBD packets are involved during which two states? |
A. | exstart and exchange |
B. | loading and two-way |
C. | init and full |
D. | down and loading |
Answer» A. exstart and exchange |
616. | At which interval does OSPF refresh LSAs? |
A. | 10 seconds |
B. | 30 seconds |
C. | 30 minutes |
D. | 1 hour |
Answer» D. 1 hour |
617. | Which field is NOT a field within an OSPF packet header? |
A. | packet length |
B. | router id |
C. | authentication type |
D. | maxage time |
Answer» D. maxage time |
618. | Which two commands are required for basic OSPF configuration? |
A. | “[network mask] area [area-id]” and “router ospf [process-id]” |
B. | “[wildcard-mask] area [area-id]” and “[network mask] area [area-id]” |
C. | only “router ospf [process-id]” |
D. | “[wildcard-mask] area [area-id]” and “router ospf [process-id]” |
Answer» D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]” |
619. | Which OSPF show command describes a list of OSPF adjacencies? |
A. | show ip ospf interface |
B. | show ip ospf |
C. | show ip route |
D. | show ip ospf neighbor |
Answer» D. show ip ospf neighbor |
620. | Datagram switching is done at which layer of OSI model? |
A. | network layer |
B. | physical layer |
C. | application layer |
D. | transport layer |
Answer» A. network layer |
621. | Packets in datagram switching are referred to as ________ |
A. | switches |
B. | segments |
C. | datagrams |
D. | data-packets |
Answer» C. datagrams |
622. | Datagrams are routed to their destinations with the help of ________ |
A. | switch table |
B. | segments table |
C. | datagram table |
D. | routing table |
Answer» C. datagram table |
623. | The main contents of the routing table in datagram networks are ___________ |
A. | source and destination address |
B. | destination address and output port |
C. | source address and output port |
D. | input port and output port |
Answer» B. destination address and output port |
624. | Which of the following is true with respect to the delay in datagram networks? |
A. | delay is greater than in a virtual circuit network |
B. | each packet may experience a wait at a switch |
C. | delay is not uniform for the packets of a message |
D. | all of the mentioned |
Answer» D. all of the mentioned |
626. | Network layer firewall works as a __________ |
A. | frame filter |
B. | packet filter |
C. | content filter |
D. | virus filter |
Answer» B. packet filter |
627. | Network layer firewall has two sub-categories as _________ |
A. | state full firewall and stateless firewall |
B. | bit oriented firewall and byte oriented firewall |
C. | frame firewall and packet firewall |
D. | network layer firewall and session layer firewall |
Answer» A. state full firewall and stateless firewall |
628. | Which of the following is / are the types of firewall? |
A. | packet filtering firewall |
B. | dual homed gateway firewall |
C. | screen host firewall |
D. | dual host firewall |
Answer» A. packet filtering firewall |
629. | A proxy firewall filters at _________ |
A. | physical layer |
B. | data link layer |
C. | network layer |
D. | application layer |
Answer» D. application layer |
630. | A packet filter firewall filters at __________ |
A. | physical layer |
B. | data link layer |
C. | network layer or transport layer |
D. | application layer |
Answer» C. network layer or transport layer |
631. | What is one advantage of setting up a DMZ with two firewalls? |
A. | you can control where traffic goes in three networks |
B. | you can do stateful packet filtering |
C. | you can do load balancing |
D. | improved network performance |
Answer» C. you can do load balancing |
632. | A stateful firewall maintains a ___________ which is a list of active connections. |
A. | routing table |
B. | bridging table |
C. | state table |
D. | connection table |
Answer» A. routing table |
633. | Performance management is closely related to _________ |
A. | proactive fault management |
B. | fault management |
C. | reactive fault management |
D. | preventive fault management |
Answer» B. fault management |
634. | Which of the following networks supports pipelining effect? |
A. | circuit-switched networks |
B. | message-switched networks |
C. | packet-switched networks |
D. | stream-switched networks |
Answer» C. packet-switched networks |
635. | MIB is a collection of groups of objects that can be managed by __________ |
A. | smtp |
B. | udp |
C. | snmp |
D. | tcp/ip |
Answer» C. snmp |
636. | A network management system can be divided into ___________ |
A. | three categories |
B. | five broad categories |
C. | seven broad categories |
D. | ten broad categories |
Answer» B. five broad categories |
637. | Ping can _________ |
A. | measure round-trip time |
B. | report packet loss |
C. | report latency |
D. | all of the mentioned |
Answer» D. all of the mentioned |
638. | Ping sweep is a part of _________ |
A. | traceroute |
B. | nmap |
C. | route |
D. | ipconfig |
Answer» B. nmap |
639. | ICMP is used in _________ |
A. | ping |
B. | traceroute |
C. | ifconfig |
D. | both ping & traceroute |
Answer» D. both ping & traceroute |
640. | __________ command is used to manipulate TCP/IP routing table. |
A. | route |
B. | ipconfig |
C. | ifconfig |
D. | traceroute |
Answer» A. route |
641. | Which of the following is not related to ipconfig in Microsoft Windows? |
A. | display all current tcp/ip network configuration values |
B. | modify dhcp settings |
C. | modify dns settings |
D. | trace the routers in the path to destination |
Answer» D. trace the routers in the path to destination |
642. | __________ allows checking if a domain is available for registration. |
A. | domain check |
B. | domain dossier |
C. | domain lookup |
D. | domain registers |
Answer» A. domain check |
643. | Choose the wrong statement from the following. |
A. | nslookup is used to query a dns server for dns data |
B. | ping is used to check connectivity |
C. | pathping combines the functionality of ping with that of route |
D. | ifconfig can configure tcp/ip network interface parameters |
Answer» C. pathping combines the functionality of ping with that of route |
644. | Ethernet frame consists of ____________ |
A. | mac address |
B. | ip address |
C. | default mask |
D. | network address |
Answer» A. mac address |
645. | What is start frame delimeter (SFD) in ethernet frame? |
A. | 10101010 |
B. | 10101011 |
C. | 00000000 |
D. | 11111111 |
Answer» B. 10101011 |
646. | MAC address is of ___________ |
A. | 24 bits |
B. | 36 bits |
C. | 42 bits |
D. | 48 bits |
Answer» D. 48 bits |
647. | Ethernet in metropolitan area network (MAN) can be used as ___________ |
A. | pure ethernet |
B. | ethernet over sdh |
C. | ethernet over mpls |
D. | all of the mentioned |
Answer» D. all of the mentioned |
648. | A point-to-point protocol over ethernet is a network protocol for __________ |
A. | encapsulating ppp frames inside ethernet frames |
B. | encapsulating ehternet framse inside ppp frames |
C. | for security of ethernet frames |
D. | for security of ppp frames |
Answer» A. encapsulating ppp frames inside ethernet frames |
649. | High speed ethernet works on _________ |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | unshielded twisted pair cable |
Answer» C. optical fiber |
651. | What is interframe gap? |
A. | idle time between frames |
B. | idle time between frame bits |
C. | idle time between packets |
D. | idle time between networks |
Answer» A. idle time between frames |
652. | In wireless ad-hoc network _________ |
A. | access point is not required |
B. | access point is must |
C. | nodes are not required |
D. | all nodes are access points |
Answer» A. access point is not required |
653. | In wireless distribution system __________ |
A. | multiple access point are inter-connected with each other |
B. | there is no access point |
C. | only one access point exists |
D. | access points are not required |
Answer» A. multiple access point are inter-connected with each other |
654. | A wireless network interface controller can work in _______ |
A. | infrastructure mode |
B. | ad-hoc mode |
C. | both infrastructure mode and ad-hoc mode |
D. | wds mode |
Answer» C. both infrastructure mode and ad-hoc mode |
655. | In wireless network an extended service set is a set of ________ |
A. | connected basic service sets |
B. | all stations |
C. | all access points |
D. | connected access points |
Answer» A. connected basic service sets |
656. | Mostly ________ is used in wireless LAN. |
A. | time division multiplexing |
B. | orthogonal frequency division multiplexing |
C. | space division multiplexing |
D. | channel division multiplexing |
Answer» B. orthogonal frequency division multiplexing |
657. | Which one of the following event is not possible in wireless LAN? |
A. | collision detection |
B. | acknowledgement of data frames |
C. | multi-mode data transmission |
D. | connection to wired networks |
Answer» A. collision detection |
658. | What is Wired Equivalent Privacy (WEP)? |
A. | security algorithm for ethernet |
B. | security algorithm for wireless networks |
C. | security algorithm for usb communication |
D. | security algorithm for emails |
Answer» B. security algorithm for wireless networks |
659. | What is WPA? |
A. | wi-fi protected access |
B. | wired protected access |
C. | wired process access |
D. | wi-fi process access |
Answer» A. wi-fi protected access |
660. | What is internet? |
A. | a single network |
B. | a vast collection of different networks |
C. | interconnection of local area networks |
D. | interconnection of wide area networks |
Answer» B. a vast collection of different networks |
661. | To join the internet, the computer has to be connected to a _________ |
A. | internet architecture board |
B. | internet society |
C. | internet service provider |
D. | different computer |
Answer» C. internet service provider |
662. | ISP exchanges internet traffic between their networks by __________ |
A. | internet exchange point |
B. | subscriber end point |
C. | isp end point |
D. | internet end point |
Answer» A. internet exchange point |
663. | Which of the following protocols is used in the internet? |
A. | http |
B. | dhcp |
C. | dns |
D. | dns, http and dns |
Answer» D. dns, http and dns |
664. | The size of an IP address in IPv6 is _________ |
A. | 32 bits |
B. | 64 bits |
C. | 128 bits |
D. | 265 bits |
Answer» C. 128 bits | |
Explanation: an ipv6 address is 128 bits long. therefore, 2128 i.e. 340 undecillion addresses are possible in ipv6. ipv4 has only 4 billion possible addresses and ipv6 would be a brilliant alternative in case ipv4 runs out of possible new addresses. |
665. | Internet works on _______ |
A. | packet switching |
B. | circuit switching |
C. | both packet switching and circuit switching |
D. | data switching |
Answer» A. packet switching |
666. | Which one of the following is not an application layer protocol used in internet? |
A. | remote procedure call |
B. | internet relay chat |
C. | resource reservation protocol |
D. | local procedure call |
Answer» C. resource reservation protocol |
667. | Which protocol assigns IP address to the client connected in the internet? |
A. | dhcp |
B. | ip |
C. | rpc |
D. | rsvp |
Answer» A. dhcp |
668. | Which one of the following is not used in media access control? |
A. | ethernet |
B. | digital subscriber line |
C. | fiber distributed data interface |
D. | packet switching |
Answer» D. packet switching |
669. | An interconnected collection of piconet is called ___________ |
A. | scatternet |
B. | micronet |
C. | mininet |
D. | multinet |
Answer» A. scatternet |
670. | In a piconet, there can be up to ________ parked nodes in the network. |
A. | 63 |
B. | 127 |
C. | 255 |
D. | 511 |
Answer» C. 255 |
671. | Bluetooth is the wireless technology for __________ |
A. | local area network |
B. | personal area network |
C. | metropolitan area network |
D. | wide area network |
Answer» B. personal area network |
672. | Bluetooth uses __________ |
A. | frequency hopping spread spectrum |
B. | orthogonal frequency division multiplexing |
C. | time division multiplexing |
D. | channel division multiplexing |
Answer» A. frequency hopping spread spectrum |
673. | What is A2DP (advanced audio distribution profile)? |
A. | a bluetooth profile for streaming audio |
B. | a bluetooth profile for streaming video |
C. | a bluetooth profile for security |
D. | a bluetooth profile for file management |
Answer» A. a bluetooth profile for streaming audio |
674. | In a piconet, one master device ________ |
A. | can not be slave |
B. | can be slave in another piconet |
C. | can be slave in the same piconet |
D. | can be master in another piconet |
Answer» B. can be slave in another piconet |
676. | Bluetooth supports _______ | |
A. | point-to-point connections | |
B. | point-to-multipoint connection | |
C. | both point-to-point connections and point-to-multipoint connection | |
D. | multipoint to point connection | |
Answer» C. both point-to-point connections and point-to-multipoint connection | ||
677. | A scatternet can have maximum __________ |
A. | 10 piconets |
B. | 20 piconets |
C. | 30 piconets |
D. | 40 piconets |
Answer» A. 10 piconets |
678. | WiMAX stands for ___________ |
A. | wireless maximum communication |
B. | worldwide interoperability for microwave access |
C. | worldwide international standard for microwave access |
D. | wireless internet maximum communication |
Answer» B. worldwide interoperability for microwave access view more info and meaning of WiMax |
679. | WiMAX provides ________ |
A. | simplex communication |
B. | half duplex communication |
C. | full duplex communication |
D. | no communication |
Answer» C. full duplex communication |
680. | WiMAX uses the _________ |
A. | orthogonal frequency division multiplexing |
B. | time division multiplexing |
C. | space division multiplexing |
D. | channel division multiplexing |
Answer» A. orthogonal frequency division multiplexing |
681. | Which of the following modulation schemes is supported by WiMAX? |
A. | binary phase shift keying modulation |
B. | quadrature phase shift keying modulation |
C. | quadrature amplitude modulation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
682. | WiMAX MAC layer provides an interface between ___________ |
A. | higher transport layers and physical layer |
B. | application layer and network layer |
C. | data link layer and network layer |
D. | session layer and application layer |
Answer» A. higher transport layers and physical layer |
683. | For encryption, WiMAX supports _______ |
A. | advanced encryption standard |
B. | triple data encryption standard |
C. | advanced encryption standard and triple data encryption standard |
D. | double data encryption standard |
Answer» C. advanced encryption standard and triple data encryption standard |
684. | WiMAX provides _______ |
A. | voip services |
B. | iptv services |
C. | both voip and iptv services |
D. | no iptv services |
Answer» C. both voip and iptv services |
685. | WiMAX is mostly used for __________ |
A. | local area network |
B. | metropolitan area network |
C. | personal area network |
D. | wide area network |
Answer» B. metropolitan area network |
686. | Which of the following frequencies is not used in WiMAX for communication? |
A. | 2.3 ghz |
B. | 2.4 ghz |
C. | 2.5 ghz |
D. | 3.5 ghz |
Answer» B. 2.4 ghz |
687. | SONET stands for ___________ |
A. | synchronous optical network |
B. | synchronous operational network |
C. | stream optical network |
D. | shell operational network |
Answer» A. synchronous optical network view more info and meaning of SONET |
688. | In SONET, STS-1 level of electrical signalling has the data rate of _________ |
A. | 51.84 mbps |
B. | 155.52 mbps |
C. | 2488.320 mbps |
D. | 622.080 mbps |
Answer» A. 51.84 mbps |
689. | The path layer of SONET is responsible for the movement of a signal _________ |
A. | from its optical source to its optical destination |
B. | across a physical line |
C. | across a physical section |
D. | back to its optical source |
Answer» B. across a physical line |
690. | The photonic layer of the SONET is similar to the __________ of OSI model. |
A. | network layer |
B. | data link layer |
C. | physical layer |
D. | transport layer |
Answer» C. physical layer |
691. | In SONET, each synchronous transfer signal STS-n is composed of __________ |
A. | 2000 frames |
B. | 4000 frames |
C. | 8000 frames |
D. | 16000 frames |
Answer» C. 8000 frames |
692. | A linear SONET network can be ________ |
A. | point-to-point |
B. | multi-point |
C. | both point-to-point and multi-point |
D. | single point |
Answer» C. both point-to-point and multi-point |
693. | Automatic protection switching in linear network is defined at the _______ |
A. | line layer |
B. | section layer |
C. | photonic layer |
D. | path layer |
Answer» A. line layer |
694. | A unidirectional path switching ring is a network with __________ |
A. | one ring |
B. | two rings |
C. | three rings |
D. | four rings |
Answer» B. two rings |
695. | Real-time transport protocol (RTP) is mostly used in _________ |
A. | streaming media |
B. | video teleconference |
C. | television services |
D. | all of the mentioned |
Answer» D. all of the mentioned |
696. | RTP is used to ________ |
A. | carry the media stream |
B. | monitor transmission statistics of streams |
C. | monitor quality of service of streams |
D. | secure the stream |
Answer» A. carry the media stream |
697. | RTP provides the facility of jitter ____________ |
A. | media stream |
B. | expansion |
C. | media modification |
D. | security |
Answer» A. media stream |
698. | Which protocol provides the synchronization between media streams? |
A. | rtp |
B. | rtcp |
C. | rpc |
D. | rtct |
Answer» B. rtcp |
699. | An RTP session is established for ____________ |
A. | each media stream |
B. | all media streams |
C. | some predefined number of media streams |
D. | no media stream |
Answer» A. each media stream |
701. | Which one of the following multimedia formats can not be supported by RTP? |
A. | mpeg-4 |
B. | mjpeg |
C. | mpeg |
D. | txt |
Answer» D. txt |
702. | An RTP header has a minimum size of _________ |
A. | 12 bytes |
B. | 16 bytes |
C. | 24 bytes |
D. | 32 bytes |
Answer» A. 12 bytes |
703. | Which one of the following is not correct? |
A. | rtcp provides canonical end-point identifiers to all session participants |
B. | rtcp reports are expected to be sent by all participants |
C. | rtcp itself does not provide any flow encryption or authentication methods |
D. | rtcp handles the actual data delivery |
Answer» D. rtcp handles the actual data delivery |
704. | An RPC (remote procedure call) is initiated by the _________ |
A. | server |
B. | client |
C. | client after the sever |
D. | a third party |
Answer» B. client |
705. | In RPC, while a server is processing the call, the client is blocked ________ |
A. | unless the client sends an asynchronous request to the server |
B. | unless the call processing is complete |
C. | for the complete duration of the connection |
D. | unless the server is disconnected |
Answer» A. unless the client sends an asynchronous request to the server |
706. | A remote procedure call is _______ |
A. | inter-process communication |
B. | a single process |
C. | a single thread |
D. | a single stream |
Answer» A. inter-process communication |
707. | RPC allows a computer program to cause a subroutine to execute in _________ |
A. | its own address space |
B. | another address space |
C. | both its own address space and another address space |
D. | applications address space |
Answer» B. another address space |
708. | RPC works between two processes. These processes must be ____________ |
A. | on the same computer |
B. | on different computers connected with a network |
C. | on the same computer and also on different computers connected with a network |
D. | on none of the computers |
Answer» C. on the same computer and also on different computers connected with a network |
709. | A remote procedure is uniquely identified by _________ |
A. | program number |
B. | version number |
C. | procedure number |
D. | all of the mentioned |
Answer» D. all of the mentioned |
710. | An RPC application requires _________ |
A. | specific protocol for client server communication |
B. | a client program |
C. | a server program |
D. | all of the mentioned |
Answer» D. all of the mentioned |
711. | RPC is a _________ |
A. | synchronous operation |
B. | asynchronous operation |
C. | time independent operation |
D. | channel specific operation |
Answer» A. synchronous operation |
712. | Which of the following is an advantage of anomaly detection? |
A. | rules are easy to define |
B. | custom protocols can be easily analyzed |
C. | the engine can scale as the rule set grows |
D. | malicious activity that falls within normal usage patterns is detected |
Answer» C. the engine can scale as the rule set grows |
713. | What is the purpose of a shadow honeypot? |
A. | to flag attacks against known vulnerabilities |
B. | to help reduce false positives in a signature-based ids |
C. | to randomly check suspicious traffic identified by an anomaly detection system |
D. | to enhance the accuracy of a traditional honeypot |
Answer» C. to randomly check suspicious traffic identified by an anomaly detection system |
714. | At which two traffic layers do most commercial IDSes generate signatures? |
A. | application layer and network layer |
B. | network layer and session layer |
C. | transport layer and application layer |
D. | transport layer and network layer |
Answer» D. transport layer and network layer |
715. | When ing IDS/IPS, what is a signature? |
A. | an electronic signature used to authenticate the identity of a user on the network |
B. | attack-definition file |
C. | it refers to “normal,” baseline network behavior |
D. | it is used to authorize the users on a network |
Answer» B. attack-definition file |
716. | Which of the following is true of signature-based IDSes? |
A. | they alert administrators to deviations from “normal” traffic behavior |
B. | they identify previously unknown attacks |
C. | the technology is mature and reliable enough to use on production networks |
D. | they scan network traffic or packets to identify matches with attack-definition files |
Answer» D. they scan network traffic or packets to identify matches with attack-definition files |
717. | PPP provides the _______ layer in the TCP/IP suite. |
A. | link |
B. | network |
C. | transport |
D. | application |
Answer» A. link |
718. | PPP consists of ________components |
A. | three (encapsulating, the domain name system) |
B. | three (encapsulating, a link control protocol, ncp) |
C. | two (a link control protocol, simple network control protocol) |
D. | one (simple network control protocol) |
Answer» B. three (encapsulating, a link control protocol, ncp) |
719. | A Link Control Protocol (LCP) is used for ____________ |
A. | establishing, configuring and testing the data-link connection |
B. | establishing and configuring different network-layer protocols |
C. | testing the different network-layer protocols |
D. | provides for multiplexing of different network-layer protocols |
Answer» A. establishing, configuring and testing the data-link connection |
720. | A family of network control protocols (NCPs) ____________ |
A. | are a series of independently defined protocols that provide a dynamic |
B. | are a series of independently-defined protocols that encapsulate |
C. | are a series of independently defined protocols that provide transparent |
D. | the same as nfs |
Answer» B. are a series of independently-defined protocols that encapsulate |
721. | Choose the correct statement from the following. |
A. | ppp can terminate the link at any time |
B. | ppp can terminate the link only during the link establishment phase |
C. | ppp can terminate the link during the authentication phase |
D. | ppp can terminate the link during the callback control phase |
Answer» A. ppp can terminate the link at any time |
722. | EIGRP metric is ________ |
A. | k-values |
B. | bandwidth only |
C. | hop count |
D. | delay only |
Answer» A. k-values |
723. | EIGRP can support ____________ |
A. | vlsm/subnetting |
B. | auto summary |
C. | unequal cast load balancing |
D. | all of the mentioned |
Answer» D. all of the mentioned |
724. | EIGRP sends a hello message after every ___________ seconds. |
A. | 5 seconds (lan), 60 seconds (wan) |
B. | 5 seconds (lan), 5 seconds (wan) |
C. | 15s |
D. | 180s |
Answer» A. 5 seconds (lan), 60 seconds (wan) |
726. | The EIGRP metric values include: |
A. | delay |
B. | bandwidth |
C. | mtu |
D. | all of the mentioned |
Answer» D. all of the mentioned |
727. | For default gateway, which of following commands will you use on a Cisco router? |
A. | ip default network |
B. | ip default gateway |
C. | ip default route |
D. | default network |
Answer» A. ip default network |
728. | Administrative distance for external EIGRP route is _______ |
A. | 90 |
B. | 170 |
C. | 110 |
D. | 100 |
Answer» B. 170 |
729. | EIGRP uses the ____________ algorithm for finding shortest path. |
A. | spf |
B. | dual |
C. | linkstat |
D. | djikstra’s |
Answer» B. dual |
730. | What are the other types of OLAP apart from ROLAP? |
A. | HOLAP |
B. | MOLAP |
C. | DOLAP |
D. | Both a and b above |
Answer» B. MOLAP |
731. | A network router joins two together? |
A. | Computers |
B. | Switches |
C. | Networks |
D. | Gateway |
Answer» C. Networks |
732. | Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues. |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» A. True |
733. | Which of the following below is a loopback IPaddress? |
A. | 127.0.0.0 |
B. | 127.0.1.1 |
C. | 127.0.1.0 |
D. | 127.0.0.1 |
Answer» D. 127.0.0.1 |
734. | Ping command works on which protocol? |
A. | ICMP |
B. | TCP |
C. | IP |
D. | UDP |
Answer» A. ICMP |
735. | Transport layer of OSI model lies between Network and layer |
A. | Application |
B. | Data link |
C. | Session |
D. | Presentation |
Answer» C. Session |
736. | Which of the following protocols below work in the application layer? |
A. | POP |
B. | PPP |
C. | FTP |
D. | Both a and d above |
Answer» D. Both a and d above |
737. | What is the port number for HTTP? |
A. | 25 |
B. | 80 |
C. | 21 |
D. | 65 |
Answer» B. 80 |
738. | IP4 is more commonly used than IPv6? |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» A. True |
739. | From the options below, which suits best for MODEM? |
A. | a device that modulates an analog carrier signal to encode digital information |
B. | a device that modulates a digital carrier signal to encode analog information |
C. | a device that modulates an analog carrier signal to decode digital information |
D. | a device that modulates a digital carrier signal to decode analoginformation |
Answer» A. a device that modulates an analog carrier signal to encode digital information |
740. | What is the size of an IP address? |
A. | 64 bit |
B. | 128 bit |
C. | 16 bit |
D. | 32 bit |
Answer» D. 32 bit |
741. | MAC addresses are also known as? |
A. | Hardware address |
B. | Physical address |
C. | both and b above |
D. | IP address |
Answer» C. both and b above |
742. | A network point that provides entrance into another network is called as |
A. | Node |
B. | Gateway |
C. | Switch |
D. | Router |
Answer» B. Gateway |
743. | UDP is an unreliable protocol. |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» A. True |
744. | A stream socket provides communications between a client and a server |
A. | One way |
B. | Two way |
C. | none |
D. | other |
Answer» B. Two way |
745. | Token Ring is a data link technology for? |
A. | WAN |
B. | MAN |
C. | LAN |
D. | both a and b above |
Answer» C. LAN |
746. | Which of the following protocol below are suited for email retrieval? |
A. | POP3 |
B. | IMAP |
C. | FTP |
D. | Both and b above |
Answer» D. Both and b above |
747. | TELNET used protocol for data connection |
A. | TCP |
B. | UDP |
C. | IP |
D. | DHCP |
Answer» A. TCP |
748. | 10Base5, 10Base2, 10BaseT are types of? |
A. | Internet |
B. | LAN |
C. | Ethernet |
D. | Cables |
Answer» C. Ethernet |
749. | The process of assigning the IP address for specific times to the various hosts by DHCP is called? |
A. | Lend |
B. | sublease |
C. | let |
D. | Lease |
Answer» D. Lease |
751. | is a standard suite of protocols used for packet switching across computer networks. |
A. | x.22 |
B. | x.23 |
C. | x.25 |
D. | x.26 |
Answer» C. x.25 |
752. | What is the full form of CAN? |
A. | Campus Area Network |
B. | Cluster Area Network |
C. | Control Area network |
D. | both A and B |
Answer» D. both A and B |
753. | Which of the following below is/are the capability of ICMP protocol? |
A. | Report package count |
B. | Report network congestion |
C. | Both band d |
D. | Report availability of remote hosts |
Answer» C. Both band d |
754. | ARP works on Ethernet networks. |
A. | False |
B. | True |
C. | none |
D. | other |
Answer» B. True |
755. | assigns a unique number to each IP network adapter called the MAC address. |
A. | Media Access Control |
B. | Metro Access Control |
C. | Metropolitan Access Control |
D. | Both B and C above |
Answer» A. Media Access Control |
756. | Piconets in the blue tooth a minimum of two and amaximum of Bluetooth peer devices. |
A. | five |
B. | eight |
C. | nine |
D. | four |
Answer» B. eight |
757. | Dynamic addressing doesn’t allow many devices To share limited address space on a network |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» B. False |
758. | NAT stands for . |
A. | network address transformer |
B. | network address translator |
C. | network address translation |
D. | Both B and C above |
Answer» C. network address translation |
759. | Which of the following is true for secure shell tunneling? |
A. | To set up an SSH tunnel, one configures an SSH client to forward a specified local port |
B. | SSH tunnels provide a means to not bypassfirewalls |
C. | All SSH clients support dynamic port forwarding |
D. | Both A and B |
Answer» A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port |
760. | Which of the following below are secure VPN protocols? |
A. | UDP |
B. | TCP |
C. | SSTP |
D. | Both B and C |
Answer» D. Both B and C |
761. | What is the difference between a switch and a hub? |
A. | Switches operate at the physical layer while hubs operate at the data link layer |
B. | Switches operate at the data link layer while hubs operate at the transport layer |
C. | Switches operate at the data link layer while hubs operate at the physical layer |
D. | Switches operate at the transport layer while hubs operate at the physical layer |
Answer» C. Switches operate at the data link layer while hubs operate at the physical layer |
762. | When computers in a network listen and receive the signal, it is termed as active toplogy |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» A. True |
763. | In 10base2, 10base5, what do 2 and 5 stand for? |
A. | Speed in Mbps |
B. | Number of segments |
C. | Length of segment |
D. | Size of segment |
Answer» B. Number of segments |
764. | is added to data packet for error detection. |
A. | checksum bit |
B. | error bit |
C. | parity bit |
D. | other |
Answer» C. parity bit |
765. | ALL IP addresses are divided into a network address and host address |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» A. True |
766. | How can we examine the current routing tables in command prompt? |
A. | using route start |
B. | using net start |
C. | using net stat |
D. | either a or b |
Answer» C. using net stat |
767. | Both ping and tracert are used to find If the computer is in the network. |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» B. False |
768. | What is the difference between ring and bustopology? |
A. | In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
B. | In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable |
C. | In the bus, all nodes are connected with another in a loop while instar they are connected to a centralbnode |
D. | In Bus all nodes are connected with another loop while instar they are connected to a central cable |
Answer» A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
769. | MAC addressing works in data link layer while IP addressing works in the network layer. |
A. | True |
B. | False |
C. | none |
D. | other |
Answer» A. True |
770. | A packet whose destination is outside the local TCP/IP network segment is sentto the _. |
A. | File server |
B. | Default gateway |
C. | DNS server |
D. | DHCP server |
Answer» B. Default gateway |
771. | Why was the OSI model developed? |
A. | manufacturers disliked the TCP/IP protocol suite |
B. | the rate of data transfer was increasing exponentially |
C. | standards were needed to allow any two systems to communicate |
D. | none of the above |
Answer» C. standards were needed to allow any two systems to communicate |
772. | Which piece of information is not vital for a computer in a TCP/IP network? |
A. | IP address |
B. | Default gateway |
C. | Subnet Mask |
D. | DNS server |
Answer» D. DNS server |
773. | The physical layer is concerned with the movement of over the physical medium. |
A. | programs |
B. | dialogs |
C. | protocols |
D. | Bits |
Answer» D. Bits |
774. | Which protocol below operates at the network layer in the OSI model? |
A. | IP |
B. | ICMP |
C. | RARP |
D. | All of the above |
Answer» D. All of the above |
776. | Session layer of the OSI model provides |
A. | Data representation |
B. | Dialog control |
C. | Remote job execution |
D. | Creating logical connections |
Answer» B. Dialog control |
777. | IPv6 has -bit addresses. |
A. | 32 |
B. | 64 |
C. | 128 |
D. | Variable |
Answer» C. 128 |
778. | Which one of the following functionalities aren’t provided by TCP? |
A. | Flow control |
B. | Addressing |
C. | Retransmission of packets as required |
D. | Proper sequencing of the packets |
Answer» B. Addressing |
779. | Which of the following can be an Ethernet physical address? |
A. | 01:02:01:2C:4B |
B. | 07:01:02:01:2C:4B:2C |
C. | 07:01:02:01:2C:4B |
D. | none of the above |
Answer» C. 07:01:02:01:2C:4B |
780. | An IP address contains bits ? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» C. 32 |
781. | Which routing protocol below is used by exterior routers between the autonomoussystems? |
A. | RIP |
B. | IGRP |
C. | OSPF |
D. | BGP |
Answer» D. BGP |
782. | Which of the IP headers decides when the packet should be discarded? |
A. | Fragment control |
B. | TTL |
C. | Checksum |
D. | Header length |
Answer» B. TTL |
783. | Which IP address is reserved for software loop-back? |
A. | 224.x.x.x |
B. | 127.x.x.x |
C. | 0.0.0.0 |
D. | 255.255.255.255 |
Answer» B. 127.x.x.x |
784. | What is the network ID for a computer whose IP address is190.148.64.23? |
A. | 190 |
B. | 190.148 |
C. | 190.148.64 |
D. | None of the above |
Answer» B. 190.148 |
785. | Which port is reserved for use of the SMTP protocol? |
A. | 21 |
B. | 23 |
C. | 25 |
D. | 53 |
Answer» C. 25 |
786. | Which one of the followings is a connectionless protocol? |
A. | UDP |
B. | Ethernet |
C. | IPX |
D. | All of the above |
Answer» D. All of the above |
787. | Which application below uses the UDP protocol? |
A. | DNS |
B. | TFTP |
C. | RIP |
D. | All of the above |
Answer» C. RIP |
788. | How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192? |
A. | 62 |
B. | 126 |
C. | 192 |
D. | 254 |
Answer» A. 62 |
789. | Which of the followings is not a direct implication of subnet masks in TCP/IP networks? |
A. | Reduce network traffic |
B. | Increase network security |
C. | Assignment of more IP addresses |
D. | Better network management |
Answer» C. Assignment of more IP addresses |
790. | In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are |
A. | Added |
B. | Removed |
C. | Rearranged |
D. | Modified |
Answer» A. Added |
791. | The structure or format of data is called |
A. | Syntax |
B. | Semantics |
C. | Struct |
D. | Formatting |
Answer» A. Syntax |
792. | Communication between a computer and a keyboard involves transmission. |
A. | Automatic |
B. | Half-duplex |
C. | Full-duplex |
D. | Simplex |
Answer» D. Simplex |
793. | The first Network was called |
A. | CNNET |
B. | NSFNET |
C. | ASAPNET |
D. | ARPANET |
Answer» D. ARPANET |
794. | A set of rules that governs data communication. |
A. | Protocols |
B. | Standards |
C. | RFCs |
D. | Servers |
Answer» A. Protocols |
795. | Communication channel is shared by all the machines on the networkin |
A. | Broadcast network |
B. | Unicast network |
C. | Multicast network |
D. | Anycast network |
Answer» A. Broadcast network |
796. | A is a device that forwards packets between networks by processing the routing information included in the packet. |
A. | Bridge |
B. | Firewall |
C. | Router |
D. | Hub |
Answer» C. Router |
797. | Network congestion occurs |
A. | In case of traffic overloading |
B. | When a system terminates |
C. | When connection between two nodes terminates |
D. | In case of transfer failure |
Answer» A. In case of traffic overloading |
798. | Which of the following networks extends a private network across public networks? |
A. | Local area network |
B. | Virtual private network |
C. | Enterprise private network |
D. | Storage area network |
Answer» B. Virtual private network |
799. | The number of layers in ISO OSI reference model is |
A. | 5 |
B. | 7 |
C. | 6 |
D. | 10 |
Answer» B. 7 |
801. | The functionalities of the presentation layerinclude |
A. | Data compression |
B. | Data encryption |
C. | Data description |
D. | All of the mentioned |
Answer» D. All of the mentioned |
802. | Delimiting and synchronization of data exchange is providedby |
A. | Application layer |
B. | Session layer |
C. | Transport layer |
D. | Link layer |
Answer» B. Session layer |
803. | In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is |
A. | Application layer |
B. | Transport layer |
C. | Link layer |
D. | Session layer |
Answer» D. Session layer |
804. | In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is |
A. | Application layer |
B. | Transport layer |
C. | Link layer |
D. | Session layer |
Answer» A. Application layer |
805. | Which layer is used to link the network support layers and user supportlayers? |
A. | Session layer |
B. | Data link layer |
C. | Transport layer |
D. | Network layer |
Answer» C. Transport layer |
806. | OSI standsfor |
A. | Open system interconnection |
B. | Operating system interface |
C. | Optical service implementation |
D. | Open service Internet |
Answer» A. Open system interconnection |
807. | Which Project 802 standard provides for a collision-free protocol? |
A. | 802.2 |
B. | 802.3 |
C. | 802.5 |
D. | 802.6 |
Answer» C. 802.5 |
808. | The protocol data unit (PDU) for the application layer in the Internet stack is |
A. | Segment |
B. | Datagram |
C. | Message |
D. | Frame |
Answer» C. Message |
809. | What is a Firewall in Computer Network? |
A. | The physical boundary of Network |
B. | An operating System of Computer Network |
C. | A system designed to prevent unauthorized access |
D. | A web browsing Software |
Answer» C. A system designed to prevent unauthorized access |
810. | Which of the following services is not provided by wireless access point in 802.11 WLAN? |
A. | Association |
B. | Disassociation |
C. | Error correction |
D. | Integration |
Answer» C. Error correction |
811. | Bridge works in which layer of the OSI model? |
A. | Application layer |
B. | Transport layer |
C. | Network layer |
D. | Data link layer |
Answer» D. Data link layer |
812. | Why IP Protocol is considered as unreliable? |
A. | A packet may be lost |
B. | Packets may arrive out of order |
C. | Duplicate packets may be generated |
D. | All of the above |
Answer» D. All of the above |
813. | What are the uses of subnetting ? |
A. | It divides one large network into several smaller ones |
B. | It divides network into network classes |
C. | It speeds up the speed of network |
D. | None of above |
Answer» A. It divides one large network into several smaller ones |
814. | The Internet is an example of |
A. | Cell switched network |
B. | circuit switched network |
C. | Packet switched network |
D. | All of above |
Answer» C. Packet switched network |
815. | What does protocol defines? |
A. | Protocol defines what data is communicated. |
B. | Protocol defines how data is communicated. |
C. | Protocol defines when data is communicated. |
D. | All of above |
Answer» D. All of above |
816. | What is the use of Ping command? |
A. | To test a device on the network is reachable |
B. | To test a hard disk fault |
C. | To test a bug in an Application |
D. | To test a Pinter Quality |
Answer» A. To test a device on the network is reachable |
817. | What is the Demilitarized Zone? |
A. | The area between firewall & connection to an external network |
B. | The area between ISP to Military area |
C. | The area surrounded by secured servers |
D. | The area surrounded by the Military |
Answer» A. The area between firewall & connection to an external network |
818. | The combination of an IP address and a port number is known as. |
A. | network number |
B. | socket address |
C. | subnet mask number |
D. | MAC address |
Answer» B. socket address |
819. | Which of the following is reliable communication? |
A. | TCP |
B. | IP |
C. | UPD |
D. | All of them |
Answer» A. TCP |
820. | What is the size of Host bits in Class B of IP address? |
A. | 04 |
B. | 08 |
C. | 16 |
D. | 32 |
Answer» C. 16 |
821. | Which of the following is not associated with the session layer? |
A. | Dialog control |
B. | Token management |
C. | Semantics of the information transmitted |
D. | Synchronization |
Answer» C. Semantics of the information transmitted |
822. | The Internet Control Message Protocol (ICMP) |
A. | allows gateways to send error a control messages to other gateways or hosts |
B. | provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another |
C. | reports error conditions to the original source, the source must relate errorsto individual application programs and take action to correct the problem |
D. | All of the above |
Answer» A. allows gateways to send error a control messages to other gateways or hosts |
823. | Your company has a LAN in its downtown office and has now set up aLAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer. |
A. | Modem |
B. | Cable |
C. | Hub |
D. | Router |
Answer» D. Router |
824. | Which of the following TCP/IP protocol is used for transferringelectronic mail messages from one machine to another? |
A. | FTP |
B. | SNMP |
C. | SMTP |
D. | RPC |
Answer» C. SMTP |
826. | can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. | |
A. | Hamming Code | |
B. | CRC | |
C. | VRC | |
D. | None of the above | |
Answer» B. CRC | ||
827. | The PSTN is an example of a……………………….. network. |
A. | packet switched |
B. | circuit switched |
C. | message switched |
D. | None of these |
Answer» B. circuit switched |
828. | When and where RARP is used intentionally or effectively? |
A. | At the time of network booting where no space to store IP address (or diskless network) for address resolution. |
B. | In broadcasting to get IP address of Network. |
C. | To get the access in private network whenever it is required. |
D. | None of the above. |
Answer» A. At the time of network booting where no space to store IP address (or diskless network) for address resolution. |
829. | Which one of the following routing algorithm can be used for network layer design? |
A. | shortest path algorithm |
B. | distance vector routing |
C. | link state routing |
D. | all of the mentioned |
Answer» D. all of the mentioned |
830. | A subset of a network that includes all the routers but contains no loopsis called: |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | none of the mentioned |
Answer» A. spanning tree |
831. | ICMP is primarily used for: |
A. | error and diagnostic functions |
B. | addressing |
C. | forwarding |
D. | none of the mentioned |
Answer» A. error and diagnostic functions |
832. | User datagram protocol is called connectionless because: |
A. | all UDP packets are treated independently by transport layer |
B. | it sends data as a stream of related packets |
C. | both (a) and (b) |
D. | none of the mentioned |
Answer» A. all UDP packets are treated independently by transport layer |
833. | An endpoint of an inter-process communication flow across a computer network is called: |
A. | socket |
B. | pipe |
C. | port |
D. | none of the mentioned |
Answer» A. socket |
834. | A is a TCP name for a transport service access point. |
A. | port |
B. | pipe |
C. | node |
D. | none of the mentioned |
Answer» A. port |
835. | Which one of the following is a transport layer protocol? |
A. | stream control transmission protocol |
B. | internet control message protocol |
C. | neighbour discovery protocol |
D. | dynamic host configuration protocol |
Answer» A. stream control transmission protocol |
836. | Physical layer provides: |
A. | mechanical specifications of electrical connectors and cables |
B. | electrical specification of transmission line signal level |
C. | specification for IR over optical fiber |
D. | all of the mentioned |
Answer» D. all of the mentioned |
837. | The translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» A. domain name system |
838. | When displaying a web page, the application layer uses the: |
A. | HTTP protocol |
B. | FTP protocol |
C. | SMTP protocol |
D. | none of the mentioned |
Answer» A. HTTP protocol |
839. | This is a time-sensitive service: |
A. | File transfer |
B. | File download |
C. | |
D. | Internet telephony |
Answer» D. Internet telephony |
840. | Packet sniffers involve: |
A. | Active receiver |
B. | Passive receiver |
C. | Both of the mentioned |
D. | None of the mentioned |
Answer» B. Passive receiver |
841. | Identify the incorrect statement: |
A. | FTP stands for File Transfer Protocol |
B. | FTP uses two parallel TCP connections |
C. | FTP sends its control information in-band |
D. | FTP sends exactly one file over the data connection |
Answer» C. FTP sends its control information in-band |
842. | If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is: |
A. | 5 |
B. | 10 |
C. | 2 |
D. | 6 |
Answer» D. 6 |
843. | Find the FTP reply whose message is wrongly matched: |
A. | 331 – Username OK, password required |
B. | 425 – Can’t open data connection |
C. | 452 – Error writing file |
D. | 452 – Can’t open data connection |
Answer» D. 452 – Can’t open data connection |
844. | In an Ethernet local area network, which one of the following statementsis TRUE? |
A. | A station stops to sense the channel once it starts transmitting a frame. |
B. | The purpose of the jamming signal is to pad the frames that are smallerthan the minimum frame size. |
C. | A station continues to transmit the packet even after the collision is detected. |
D. | The exponential back off mechanism reduces the probability of collision on retransmissions |
Answer» D. The exponential back off mechanism reduces the probability of collision on retransmissions |
845. | The first Network: |
A. | CNNET |
B. | NSFNET |
C. | ASAPNET |
D. | ARPANET |
Answer» D. ARPANET |
846. | Which organization has authority over interstate and international commerce in the communications field? |
A. | ITU-T |
B. | IEEE |
C. | FCC |
D. | ISOC |
Answer» C. FCC |
847. | Baud rate is: |
A. | number of signal changes per second |
B. | number of bits per second |
C. | number of bytes per second |
D. | number of ASCII characters per second |
Answer» A. number of signal changes per second |
848. | The slowest transmission speeds are those of |
A. | Coaxial cable |
B. | Twisted pair wire |
C. | Fiber-optic cable |
D. | Microwave |
Answer» B. Twisted pair wire |
849. | The performance of a data communication network depends on |
A. | The number of users |
B. | The transmission media |
C. | The hardware and software |
D. | All of the above |
Answer» D. All of the above |
851. | The process of keeping addresses in memory for future use is called | |
A. | Routing | |
B. | Resolving | |
C. | Caching | |
D. | None of the above | |
Answer» C. Caching | ||
852. | A small network making up the Internet and also having a small numbers of computers within it is called |
A. | Host |
B. | Address |
C. | Subdomain |
D. | None of the above |
Answer» C. Subdomain |
853. | If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is . |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» D. 10 kbps |
854. | In CRC there is no error if the remainder at the receiver is . |
A. | equal to the remainder at the sender |
B. | zero |
C. | nonzero |
D. | the quotient at the sender |
Answer» B. zero |
855. | Internet-like networks within an enterprise. |
A. | Intranets |
B. | Switching alternating |
C. | Inter organizational networks |
D. | Extranets |
Answer» A. Intranets |
856. | Sending a file from your personal computer’s primary memory or disk to another computer is called |
A. | uploading |
B. | downloading |
C. | logging on |
D. | hangs on |
Answer» A. uploading |
857. | FDDI is a |
A. | ring network |
B. | star network |
C. | mesh network |
D. | bus based network |
Answer» A. ring network |
858. | Which address is the loopback address? |
A. | 0.0.0.1 |
B. | 127.0.0.0 |
C. | 127.0.0.1 |
D. | 255.255.255.255 |
Answer» C. 127.0.0.1 |
859. | A modulator converts a signal to a(n) signal. |
A. | FSK; PSK |
B. | PSK; FSK |
C. | analog; digital |
D. | digital; analog |
Answer» C. analog; digital |
860. | The birthplace of the World Wide Web is considered to be |
A. | the Department of Defence |
B. | CERN |
C. | ARPA |
D. | Netscape |
Answer» B. CERN |
861. | What is the port number for HTTP? |
A. | 99 |
B. | 86 |
C. | 80 |
D. | 23 |
Answer» C. 80 |
862. | The communication mode that supports data in both directions at the same time is |
A. | simplex |
B. | half-duplex |
C. | full-duplex |
D. | multiplex |
Answer» C. full-duplex |
863. | The basic Ethernet design does not provide |
A. | access control |
B. | addressing |
C. | automatic retransmission of a message |
D. | multiple virtual networks |
Answer» C. automatic retransmission of a message |
864. | What does the acronym ISDN stand for? |
A. | Indian Standard Digital Network |
B. | Integrated Services Digital Network |
C. | Intelligent Services Digital Network |
D. | Integrated Services Data Network |
Answer» B. Integrated Services Digital Network |
865. | ASK, PSK, FSK, and QAM are examples of encoding. |
A. | digital-to-digital |
B. | digital-to-analog |
C. | analog-to-analog |
D. | analog-to-digital |
Answer» B. digital-to-analog |
866. | Who invented the modem? |
A. | Wang Laboratories Ltd. |
B. | AT & T Information Systems, USA |
C. | Apple Computers Inc. |
D. | Digital Equipment Corpn |
Answer» B. AT & T Information Systems, USA |
867. | With an IP address of 201.142.23.12, what is your default subnetmask? |
A. | 0.0.0.0 |
B. | 255.0.0.0 |
C. | 255.255.0.0 |
D. | 255.255.255.0 |
Answer» D. 255.255.255.0 |
868. | Which utility is an all-purpose tool for troubleshooting TCP/IP problems? |
A. | NBTSTAT |
B. | Netstat |
C. | PING |
D. | Hostname |
Answer» C. PING |
869. | Which Layer is Responsible for Congestion Control? |
A. | Network Layer |
B. | Data link Layer |
C. | Transport Layer |
D. | Application layer |
Answer» C. Transport Layer |
870. | Pure ALOHA has a maximum throughput of ———– |
A. | 16.4 % |
B. | 18.4 % |
C. | 7.4 % |
D. | 1 % |
Answer» B. 18.4 % |
871. | Which of these is a feature of hubs? |
A. | Hubs amplifies the incoming signal. |
B. | Hubs understand frames, packets or headers |
C. | All lines coming into a Hub must operate at a same speed. |
D. | all of these |
Answer» C. All lines coming into a Hub must operate at a same speed. |
872. | DSL stands for |
A. | data subscriber lines |
B. | dual subscriber lines |
C. | delay subscriber lines |
D. | digital subscriber lines |
Answer» D. digital subscriber lines |
873. | Which of the following is a MAC address? |
A. | 192.166.200.50 |
B. | 00056A:01A01A5CCA7FF60 |
C. | 568, Airport Road |
D. | 01:A5: BB: A7: FF: 60 |
Answer» D. 01:A5: BB: A7: FF: 60 |
874. | The main difference between TCP and UDP is |
A. | UDP is connection oriented whereas TCP is datagram service |
B. | TCP is an Internet protocol whereas UDP is an ATM protocol |
C. | UDP is a datagram whereas TCP is a connection oriented service |
D. | All of the above |
Answer» C. UDP is a datagram whereas TCP is a connection oriented service |
876. | Which file transfer protocol uses UDP? |
A. | NFS |
B. | TELNET |
C. | TFTP |
D. | FTP |
Answer» C. TFTP |
877. | Which of the following network access standard is used for connecting stations to a circuit-switched network? |
A. | X.3 |
B. | X.21 |
C. | X.25 |
D. | X.75 |
Answer» B. X.21 |
878. | In OSI model, which of the following layer provides error-free delivery of data? |
A. | Data link |
B. | Network |
C. | transport |
D. | Session |
Answer» C. transport |
879. | To avoid transmission errors, a check figure is calculated by the |
A. | transmitting computer |
B. | receiving computer |
C. | both (a) and (b) |
D. | Start and stop bit |
Answer» C. both (a) and (b) |
880. | What is the first octet range for a class A IP address? |
A. | 1 – 126 |
B. | 192 – 255 |
C. | 192 – 223 |
D. | 1 – 127 |
Answer» A. 1 – 126 |
881. | CSMA (Carrier Sense Multiple Access) is |
A. | a method of determining which device has access to the transmission medium at any time |
B. | a method access control technique for multiple-access transmission media. |
C. | a very common bit-oriented data link protocol issued by ISO. |
D. | network access standard for connecting stations to a circuit-switched network |
Answer» B. a method access control technique for multiple-access transmission media. |
882. | What is the first octet range for a class B IP address? |
A. | 128 – 255 |
B. | 1 – 127 |
C. | 192 – 223 |
D. | 128 – 191 |
Answer» D. 128 – 191 |
883. | ARP (Address Resolution Protocol) is |
A. | a TCP/IP protocol used to dynamically bind a high level IP Address to a lowlevel physical hardware address |
B. | a TCP/IP high level protocol for transferring files from one machine to another |
C. | a protocol used to monitor computers |
D. | a protocol that handles error and control messages |
Answer» A. a TCP/IP protocol used to dynamically bind a high level IP Address to a lowlevel physical hardware address |
884. | The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? |
A. | CSMA/CD |
B. | Token passing |
C. | Collision detection |
D. | Time sharing |
Answer» B. Token passing |
885. | Terminals are required for |
A. | real time, batch processing, and timesharing |
B. | real time, timesharing, and distributed processing |
C. | real time, distributed processing, and manager inquiry |
D. | real time, timesharing, and message switching |
Answer» D. real time, timesharing, and message switching |
886. | What OSI layer handles logical address to logical name resolution? |
A. | Transport |
B. | Physical |
C. | Presentation |
D. | Data Link |
Answer» A. Transport |
887. | Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity? |
A. | m1:HTTP, m2:SMTP, m3:POP |
B. | m1:SMTP, m2:FTP, m3:HTTP |
C. | m1:SMTP, m2:POP, m3:HTTP |
D. | m1:POP, m2:SMTP, m3:IMAP |
Answer» C. m1:SMTP, m2:POP, m3:HTTP |
888. | One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field? |
A. | It can be used to prioritize packets |
B. | It can be used to reduce delays |
C. | It can be used to optimize throughput |
D. | It can be used to prevent packet looping |
Answer» D. It can be used to prevent packet looping |
889. | Which of the following system calls results in the sending of SYNpackets? |
A. | socket |
B. | bind |
C. | listen |
D. | connect |
Answer» D. connect |
890. | In the slow start phase of the TCP congestion control algorithm, the size of the congestion window |
A. | does not increase |
B. | increases linearly |
C. | increases quadratically |
D. | increases exponentially |
Answer» D. increases exponentially |
891. | What is the maximum size of data that the application layer can pass on to the TCP layer below? |
A. | Any size |
B. | 2^16 bytes-size of TCP header |
C. | 2^16 bytes |
D. | 1500 bytes |
Answer» A. Any size |
892. | A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for which the computer can transmit at the full 10Mbps? |
A. | 1.6 seconds |
B. | 2 seconds |
C. | 5 seconds |
D. | 8 seconds |
Answer» B. 2 seconds |
893. | In Ethernet when Manchester encoding is used, the bit rate is: |
A. | Half the baud rate. |
B. | Twice the baud rate. |
C. | Same as the baud rate. |
D. | none of the above |
Answer» A. Half the baud rate. |
894. | Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what isthe number of packets that A will transmit for sending the message to B? |
A. | 12 |
B. | 14 |
C. | 16 |
D. | 18 |
Answer» C. 16 |
895. | Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s. |
A. | 1 |
B. | 2 |
C. | 2.5 |
D. | 5 |
Answer» B. 2 |
896. | Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error? |
A. | G(x) contains more than two terms |
B. | G(x) does not divide 1+x^k, for any k not exceeding the frame length |
C. | 1+x is a factor of G(x) |
D. | G(x) has an odd number of terms. |
Answer» C. 1+x is a factor of G(x) |
897. | In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because |
A. | Receiver is to be synchronized for byte reception |
B. | Receiver recovers lost ‘0’ and ‘1’s from these padded bits |
C. | Padded bits are useful in parity computation |
D. | None of these |
Answer» A. Receiver is to be synchronized for byte reception |
898. | Which one of the following statements is FALSE? |
A. | Packet switching leads to better utilization of bandwidth resources than circuit switching. |
B. | Packet switching results in less variation in delay than circuitswitching. |
C. | Packet switching requires more per packet processing than circuitswitching |
D. | Packet switching can lead to reordering unlike in circuitswitching |
Answer» B. Packet switching results in less variation in delay than circuitswitching. |
899. | Which of the following statements is FALSE regarding a bridge? |
A. | Bridge is a layer 2 device |
B. | Bridge reduces collision domain |
C. | Bridge is used to connect two or more LAN segments |
D. | Bridge reduces broadcast domain |
Answer» D. Bridge reduces broadcast domain |
901. | In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called |
A. | Preamble |
B. | Post amble |
C. | Jam |
D. | None of the above |
Answer» C. Jam |
902. | What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns? |
A. | 20% |
B. | 25% |
C. | 40% |
D. | 66% |
Answer» B. 25% |
903. | The physical layer translates logical communication requestsfrom the into hardware specific operations. |
A. | Data link layer |
B. | Network layer |
C. | Transport layer |
D. | Application layer |
Answer» A. Data link layer |
904. | A single channel is shared by multiple signals by |
A. | Analog modulation |
B. | Digital modulation |
C. | Multiplexing |
D. | Phase modulation |
Answer» C. Multiplexing |
905. | Wireless transmission of signals can be done via |
A. | Radio waves |
B. | Microwaves |
C. | Infrared |
D. | All of the mentioned |
Answer» D. All of the mentioned |
906. | ICMP is primarily used for |
A. | Error and diagnostic functions |
B. | Addressing |
C. | Forwarding |
D. | Routing |
Answer» A. Error and diagnostic functions |
907. | Which of the following is a transport layer protocol? |
A. | Stream control transmission protocol |
B. | Internet control message protocol |
C. | Neighbour discovery protocol |
D. | Dynamic host configuration protocol |
Answer» A. Stream control transmission protocol |
908. | is the multiplexing technique that shifts each signal to a different carrierfrequency. |
A. | FDM |
B. | TDM |
C. | Both FDM & TDM |
D. | PDM |
Answer» A. FDM |
909. | If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is |
A. | 32kbps |
B. | 500bps |
C. | 500kbps |
D. | 32bps |
Answer» A. 32kbps |
910. | If there are n signal sources of same data rate, then the TDMlink has slots. |
A. | N |
B. | n/2 |
C. | n*2 |
D. | 2n |
Answer» A. N |
911. | The state when dedicated signals are idle are called |
A. | Death period |
B. | Poison period |
C. | Silent period |
D. | Stop period |
Answer» C. Silent period |
912. | In TDM, slots are further divided into |
A. | Seconds |
B. | Frames |
C. | Packets |
D. | Bits |
Answer» B. Frames |
913. | In TDM, the transmission rate of a multiplexed path is always the sum of the transmission rates of the signal sources. |
A. | Greater than |
B. | Lesser than |
C. | Equal to |
D. | Equal to or greater than |
Answer» A. Greater than |
914. | The time required to examine the packet’s header and determine where to direct the packetis part of |
A. | Processing delay |
B. | Queuing delay |
C. | Transmission delay |
D. | Propagation delay |
Answer» A. Processing delay |
915. | Transmission delay does not depend on |
A. | Packet length |
B. | Distance between the routers |
C. | Transmission rate |
D. | Bandwidth of medium |
Answer» B. Distance between the routers |
916. | Propagation delay depends on |
A. | Packet length |
B. | Transmission rate |
C. | Distance between the routers |
D. | Speed of the CPU |
Answer» C. Distance between the routers |
917. | Which of the following delay is faced by the packet in travelling from one end system toanother? |
A. | Propagation delay |
B. | Queuing delay |
C. | Transmission delay |
D. | All of the mentioned |
Answer» D. All of the mentioned |
918. | A network router joins two _________ together? |
A. | Computers |
B. | Switches |
C. | Networks |
D. | Gateway |
Answer» C. Networks |
919. | Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues. |
A. | True |
B. | False |
Answer» A. True |
920. | Which of the following below is a loopback IP address? |
A. | 127.0.0.0 |
B. | 127.0.1.1 |
C. | 127.0.1.0 |
D. | 127.0.0.1 |
Answer» D. 127.0.0.1 |
921. | Transport layer of OSI model lies between Network and ___________ layer |
A. | Application |
B. | Data link |
C. | Session |
D. | Presentation |
Answer» C. Session |
922. | IP4 is more commonly used than IPv6? |
A. | True |
B. | False |
Answer» A. True |
923. | From the options below, which suits best for MODEM? |
A. | a device that modulates an analog carrier signal to encode digital information |
B. | a device that modulates a digital carrier signal to encode analog information |
C. | a device that modulates an analog carrier signal to decode digital information |
D. | a device that modulates a digital carrier signal to decode analog information |
Answer» A. a device that modulates an analog carrier signal to encode digital information |
924. | A network point that provides entrance into another network is called as ___________ |
A. | Node |
B. | Gateway |
C. | Switch |
D. | Router |
Answer» B. Gateway |
926. | A stream socket provides _________ communications between a client and a server |
A. | One way |
B. | Two way |
Answer» B. Two way |
927. | TELNET used _________ protocol for data connection |
A. | TCP |
B. | UDP |
C. | IP |
D. | DHCP |
Answer» A. TCP |
928. | __________ is a standard suite of protocols used for packet switching across computer networks. |
A. | x.22 |
B. | x.23 |
C. | x.25 |
D. | x.26 |
Answer» C. x.25 |
929. | ARP works on Ethernet networks. |
A. | False |
B. | True |
Answer» B. True |
930. | _______ assigns a unique number to each IP network adapter called the MAC address. |
A. | Media Access Control |
B. | Metro Access Control |
C. | Metropolitan Access Control |
D. | Both B and C above |
Answer» A. Media Access Control |
931. | Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peer devices. |
A. | five |
B. | eight |
C. | nine |
D. | four |
Answer» B. eight |
932. | Dynamic addressing doesn’t allow many devices To share limited address space on a network |
A. | True |
B. | False |
Answer» B. False |
933. | NAT stands for _____ . |
A. | network address transformer |
B. | network address translator |
C. | network address translation |
D. | Both B and C above |
Answer» C. network address translation |
934. | Which of the following is true for secure shell tunneling? |
A. | To set up an SSH tunnel, one configures an SSH client to forward a specified local port |
B. | SSH tunnels provide a means to not bypass firewalls |
C. | All SSH clients support dynamic port forwarding |
D. | Both A and B |
Answer» A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port |
935. | When computers in a network listen and receive the signal, it is termed as active toplogy |
A. | True |
B. | False |
Answer» A. True |
936. | ______is added to data packet for error detection. |
A. | checksum bit |
B. | error bit |
C. | parity bit |
Answer» C. parity bit |
937. | ALL IP addresses are divided into a network address and host address |
A. | True |
B. | False |
Answer» A. True |
938. | Both ping and tracert are used to find If the computer is in the network. |
A. | True |
B. | False |
Answer» B. False |
939. | What is the difference between ring and bus topology? |
A. | In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
B. | In Ring, all nodes are connected with another loop while on a bus they are connected to a central cable |
C. | In the bus, all nodes are connected with another in a loop while instar they are connected to a central node |
D. | In Bus all nodes are connected with another loop while instar they are connected to a central cable |
Answer» A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable |
940. | MAC addressing works in data link layer while IP addressing works in the network layer. |
A. | True |
B. | False |
Answer» A. True |
941. | A packet whose destination is outside the local TCP/IP network segment is sent to the ___ _. |
A. | File server |
B. | Default gateway |
C. | DNS server |
D. | DHCP server |
Answer» B. Default gateway |
942. | The physical layer is concerned with the movement of _______ over the physical medium. |
A. | programs |
B. | dialogs |
C. | protocols |
D. | Bits |
Answer» D. Bits |
943. | In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______. |
A. | added |
B. | removed |
C. | rearranged |
D. | Modified |
Answer» B. removed |
944. | IPv6 has _______ -bit addresses. |
A. | 32 |
B. | 64 |
C. | 128 |
D. | Variable |
Answer» C. 128 |
945. | An IP address contains________ bits ? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» C. 32 |
946. | Which routing protocol below is used by exterior routers between the autonomous systems? |
A. | RIP |
B. | IGRP |
C. | OSPF |
D. | BGP |
Answer» D. BGP |
947. | What is the network ID for a computer whose IP address is 190.148.64.23? |
A. | 190 |
B. | 190.148 |
C. | 190.148.64 |
D. | None of the above |
Answer» B. 190.148 |
948. | 9 93. Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s. |
A. | 1 |
B. | 2 |
C. | 2.5 |
D. | 5 |
Answer» B. 2 |
949. | The combination of an IP address and a port number is known as ___________. |
A. | network number |
B. | socket address |
C. | subnet mask number |
D. | MAC address |
Answer» B. socket address |
951. | Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer. |
A. | Modem |
B. | Cable |
C. | Hub |
D. | Router |
Answer» D. Router |
952. | Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? |
A. | FTP |
B. | SNMP |
C. | SMTP |
D. | RPC |
Answer» C. SMTP |
953. | Which of the following device is used to connect two systems, especially if the systems use different protocols? |
A. | hub |
B. | bridge |
C. | gateway |
D. | repeater |
Answer» C. gateway |
954. | _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
A. | Hamming Code |
B. | CRC |
C. | VRC |
D. | None of the above |
Answer» B. CRC |
955. | The PSTN is an example of a ………………… network. |
A. | packet switched |
B. | circuit switched |
C. | message switched |
D. | None of these |
Answer» B. circuit switched |
956. | A subset of a network that includes all the routers but contains no loops is called: |
A. | spanning tree |
B. | spider structure |
C. | spider tree |
D. | none of the mentioned |
Answer» A. spanning tree |
957. | An endpoint of an inter-process communication flow across a computer network is called: |
A. | socket |
B. | pipe |
C. | port |
D. | none of the mentioned |
Answer» A. socket |
958. | In an Ethernet local area network, which one of the following statements is TRUE? |
A. | A station stops to sense the channel once it starts transmitting a frame. |
B. | The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size. |
C. | A station continues to transmit the packet even after the collision is detected. |
D. | The exponential back off mechanism reduces the probability of collision on retransmissions |
Answer» D. The exponential back off mechanism reduces the probability of collision on retransmissions |
959. | A small network making up the Internet and also having a small numbers of computers within it is called |
A. | Host |
B. | Address |
C. | Subdomain |
D. | None of the above |
Answer» C. Subdomain |
960. | If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________. |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» D. 10 kbps |
961. | In CRC there is no error if the remainder at the receiver is _____. |
A. | equal to the remainder at the sender |
B. | zero |
C. | nonzero |
D. | the quotient at the sender |
Answer» B. zero |
962. | A modulator converts a _____ signal to a(n) _____ signal. |
A. | FSK; PSK |
B. | PSK; FSK |
C. | analog; digital |
D. | digital; analog |
Answer» C. analog; digital |
963. | ASK, PSK, FSK, and QAM are examples of _____ encoding. |
A. | digital-to-digital |
B. | digital-to-analog |
C. | analog-to-analog |
D. | analog-to-digital |
Answer» B. digital-to-analog |
964. | With an IP address of 201.142.23.12, what is your default subnet mask? |
A. | 0.0.0.0 |
B. | 255.0.0.0 |
C. | 255.255.0.0 |
D. | 255.255.255.0 |
Answer» D. 255.255.255.0 |
965. | DSL stands for ———————— |
A. | data subscriber lines |
B. | dual subscriber lines |
C. | delay subscriber lines |
D. | digital subscriber lines |
Answer» D. digital subscriber lines |
966. | The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? |
A. | CSMA/CD |
B. | Token passing |
C. | Collision detection |
D. | Time sharing |
Answer» B. Token passing |
967. | One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field? |
A. | It can be used to prioritize packets |
B. | It can be used to reduce delays |
C. | It can be used to optimize throughput |
D. | It can be used to prevent packet looping |
Answer» D. It can be used to prevent packet looping |
968. | Which of the following system calls results in the sending of SYN packets? |
A. | socket |
B. | bind |
C. | listen |
D. | connect |
Answer» D. connect |
969. | What is the maximum size of data that the application layer can pass on to the TCP layer below? |
A. | Any size |
B. | 2^16 bytes-size of TCP header |
C. | 2^16 bytes |
D. | 1500 bytes |
Answer» A. Any size |
970. | Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what is the number of packets that A will transmit for sending the message to B? |
A. | 12 |
B. | 14 |
C. | 16 |
D. | 18 |
Answer» C. 16 |
971. | Which one of the following statements is FALSE? |
A. | Packet switching leads to better utilization of bandwidth resources than circuit switching. |
B. | Packet switching results in less variation in delay than circuit switching. |
C. | Packet switching requires more per packet processing than circuit switching |
D. | Packet switching can lead to reordering unlike in circuit switching |
Answer» B. Packet switching results in less variation in delay than circuit switching. |
972. | In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ________. |
A. | 2 bytes |
B. | 1 bytes |
C. | 4 bytes |
D. | 5 bytes |
Answer» D. 5 bytes |
973. | In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called |
A. | Preamble |
B. | Post amble |
C. | Jam |
D. | None of the above |
Answer» C. Jam |
974. | How many digits of the DNIC (Data Network Identification Code) identify the country? |
A. | First three |
B. | First four |
C. | First five |
D. | First six |
Answer» A. First three |
976. | Which of the following device is used to connect two systems, especially if the systems use different protocols? |
A. | hub |
B. | bridge |
C. | gateway |
D. | repeater |
Answer» C. gateway |
977. | _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. |
A. | Hamming Code |
B. | CRC |
C. | VRC |
D. | None of the above |
Answer» B. CRC |
978. | If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is: |
A. | 5 |
B. | 10 |
C. | 2 |
D. | 6 |
Answer» D. 6 |
979. | In an Ethernet local area network, which one of the following statements is TRUE? |
A. | A station stops to sense the channel once it starts transmitting a frame. |
B. | The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size. |
C. | A station continues to transmit the packet even after the collision is detected. |
D. | The exponential back off mechanism reduces the probability of collision on retr |
Answer» A. A station stops to sense the channel once it starts transmitting a frame. |
980. | Which of the following to keep track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. |
A. | Address Resolution Protocol (ARP) |
B. | Internet Protocol (IP) |
C. | Hypertext transfer Protocol (HTTP) |
D. | Tr |
Answer» C. Hypertext transfer Protocol (HTTP) |
981. | If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________. |
A. | 1 kbps |
B. | 1.25 kbps |
C. | 2 kbps |
D. | 10 kbps |
Answer» D. 10 kbps |
982. | Sending a file from your personal computer’s primary memory or disk to another computer is called |
A. | uploading |
B. | downloading |
C. | logging on |
D. | hangs on |
Answer» A. uploading |
983. | Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity? |
A. | m1:HTTP, m2:SMTP, m3:POP |
B. | m1:SMTP, m2:FTP, m3:HTTP |
C. | m1:SMTP, m2:POP, m3:HTTP |
D. | m1:POP, m2:SMTP, m3:IMAP |
Answer» C. m1:SMTP, m2:POP, m3:HTTP |
984. | In the slow start phase of the TCP congestion control algorithm, the size of the congestion window |
A. | does not increase |
B. | increases linearly |
C. | increases quadratically |
D. | increases exponentially |
Answer» D. increases exponentially |
985. | Match the following: (P) SMTP (1) Application layer (Q) BGP (2) Transport layer (R) TCP (3) Data link layer (S) PPP (4) Network layer (5) Physical layer |
A. | P – 2 Q – 1 R – 3 S – 5 |
B. | P – 1 Q – 4 R – 2 S – 3 |
C. | P – 1 Q – 4 R – 2 S – 5 |
D. | P – 2 Q – 4 R – 1 S – 3 |
Answer» B. P – 1 Q – 4 R – 2 S – 3 |
986. | In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because |
A. | Receiver is to be synchronized for byte reception |
B. | Receiver recovers lost ‘0’ and ‘1’s from these padded bits |
C. | Padded bits are useful in parity computation |
D. | None of these |
Answer» A. Receiver is to be synchronized for byte reception |
987. | What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns? |
A. | 20% |
B. | 25% |
C. | 40% |
D. | 66% |
Answer» B. 25% |
Tags
Question and answers in Computer Networks,Computer Networks multiple choice questions and answers,Computer Networks Important MCQs,Solved MCQs for Computer Networks,Computer Networks MCQs with answers PDF download