Quiznetik

Computer Networks | Set 2

1. HTTP client requests by establishing a __________ connection to a particular port on the server.

Correct : B. transmission control protocol

2. In HTTP pipelining

Correct : A. multiple http requests are sent on a single tcp connection without waiting for the corresponding responses

3. FTP server listens for connection on port number

Correct : B. 21

4. In FTP protocol, client contacts server using ____ as the transport protocol.

Correct : A. transmission control protocol

5. In which mode FTP, the client initiates both the control and data connections.

Correct : B. passive mode

6. The file transfer protocol is built on

Correct : C. client server architecture

7. In file transfer protocol, data transfer can be done in

Correct : D. all of the mentioned

8. Ethernet frame consists of

Correct : A. mac address

9. What is stat frame delimeter (SFD) in ethernet frame?

Correct : B. 10101011

10. What is autonegotiation?

Correct : A. a procedure by which two connected devices choose common transmission parameters

11. Ethernet in metropolitan area network (MAN) can be used as

Correct : D. all of the mentioned

12. A point-to-point protocol over ethernet is a network protocol for

Correct : A. encapsulating ppp frames inside ethernet frames

13. High speed ethernet works on

Correct : C. optical fiber

14. The maximum size of payload field in ethernet frame is

Correct : D. 1500 bytes

15. What is interframe gap?

Correct : A. idle time between frames

16. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called

Correct : B. run frame

17. Which of this is not a constituent of residential telephone line?

Correct : C. a low-speed downstream channel

18. In DSL telco provides these services

Correct : C. all of the mentioned

19. The function of DSLAM is

Correct : A. convert analog signals into digital signals

20. The following term is not associted with DSL

Correct : D. cmts

21. HFC contains

Correct : C. both of the mentioned

22. Choose the statement which is not applicable for cable internet access

Correct : D. analog signal is converted to digital signal in dslam

23. Among the optical-distribution architectures that is essentially switched ehternet is

Correct : A. aon

24. StarBand provides

Correct : D. satellite access

25. Home Access is provided by

Correct : D. all of the mentioned

26. ONT is connected to splitter using

Correct : C. optical cable

27. The sharing of a medium and its link by two or more devices is called _______

Correct : B. multiplexing

28. Multiplexing is used in _______

Correct : B. circuit switching

29. Which multiplexing technique transmits digital signals ?

Correct : B. tdm

30. If there are n signal sources of same data rate than TDM link has _______ slots

Correct : A. n

31. If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is

Correct : A. 32kbps

32. The state when dedicated signals are idle are called

Correct : C. silent period

33. Multiplexing can provide

Correct : D. both a and b

34. In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources.

Correct : A. greater than

35. In TDM, slots are further divided into

Correct : B. frames

36. Multiplexing technique that shifts each signal to a different carrier frequency

Correct : A. fdm

37. Physical or logical arrangement of network is

Correct : A. topology

38. In this topology there is a central controller or hub

Correct : A. star

39. This topology requires multipoint connection

Correct : D. bus

40. Data communication system spanning states, countries, or the whole world is

Correct : B. wan

41. Data communication system within a building or campus is

Correct : A. lan

42. Expand WAN

Correct : B. wide area network

43. A local telephone network is an example of a _______ network

Correct : B. circuit switched

44. Most packet switches use this principle

Correct : B. store and forward

45. If there are N routers from source to destination, total end to end delay in sending packet P(L->number of bits in the packet R-> transmission rate)

Correct : B. (n*l)/r

46. Method(s) to move data through a network of links and switches

Correct : D. both a and b

47. The resources needed for communication between end systems are reserved for the duration of session between end systems in ________

Correct : B. circuit switching

48. As the resouces are reserved between two communicating end systems in circuit switching, this is achieved

Correct : B. guaranteed constant rate

49. What is internet?

Correct : B. a vast collection of different networks

50. To join the internet, the computer has to be connected to a

Correct : C. internet service provider

51. Internet access by transmitting digital data over the wires of a local telephone network is provided by

Correct : B. digital subscriber line

52. ISP exchanges internet traffic between their networks by

Correct : A. internet exchange point

53. Which one of the following protocol is not used in internet?

Correct : D. none of the mentioned

54. IPv6 addressed have a size of

Correct : C. 128 bits

55. Internet works on

Correct : A. packet switching

56. Which one of the following is not an application layer protocol used in internet?

Correct : C. resource reservation protocol

57. Which protocol assigns IP address to the client connected in the internet?

Correct : A. dhcp

58. Which one of the following is not used in media access control?

Correct : D. none of the mentioned

59. In cryptography, what is cipher?

Correct : A. algorithm for performing encryption and decryption

60. In asymmetric key cryptography, the private key is kept by

Correct : B. receiver

61. Which one of the following algorithm is not used in asymmetric key cryptography?

Correct : C. electronic code book algorithm

62. In cryptography, the order of the letters in a message is rearranged by

Correct : A. transpositional ciphers

63. What is data encryption standard (DES)?

Correct : A. block cipher

64. Cryptanalysis is used

Correct : A. to find some insecurity in a cryptographic scheme

65. Which one of the following is a cryptographic protocol used to secure HTTP connection?

Correct : B. transport layer security (tsl)

66. Voice privacy in GSM cellular telephone protocol is provided by

Correct : A. a5/2 cipher

67. ElGamal encryption system is

Correct : B. asymmetric key encryption algorithm

68. Cryptographic hash function takes an arbitrary block of data and returns

Correct : A. fixed size bit string

69. The attackers a network of compromised devices known as

Correct : B. botnet

70. Which of the following is a form of DoS attack ?

Correct : D. all of the mentioned

71. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

Correct : C. connection flooding

72. The DoS attack is which the attacker sends deluge of packets to the targeted host

Correct : B. bandwidth flooding

73. Packet sniffers involve

Correct : B. passive receiver

74. Sniffers can be deployed in

Correct : D. all of the mentioned

75. Firewalls are often configured to block

Correct : A. udp traffic

76. DHCP (dynamic host configuration protocol) provides _____ to the client.

Correct : A. ip address

77. DHCP is used for

Correct : C. both (a) and (b)

78. The DHCP server

Correct : D. all of the mentioned

79. IP assigned for a client by DHCP server is

Correct : A. for a limited period

80. DHCP uses UDP port ____ for sending data to the server.

Correct : B. 67

81. The DHCP server can provide the _______ of the IP addresses.

Correct : D. all of the mentioned

82. DHCP client and servers on the same subnet communicate via

Correct : A. udp broadcast

83. After obtaining the IP address, to prevent the IP conflict the client may use

Correct : C. address resolution protocol

84. What is DHCP snooping?

Correct : A. techniques applied to ensure the security of an existing dhcp infrastructure

85. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.

Correct : C. both (a) and (b)

86. Real-time transport protocol (RTP) is mostly used in

Correct : D. all of the mentioned

87. RTP is used to

Correct : A. carry the media stream

88. RTP provides the facility of jitter ____ .

Correct : A. compensation

89. Which protocol provides the synchronization between media streams?

Correct : B. rtcp

90. An RTP session is established for

Correct : A. each media stream

91. RTP can use

Correct : D. all of the mentioned

92. Which one of the following multimedia formats can not be supported by RTP?

Correct : D. none of the mentioned

93. An RTP header has a minimum size of

Correct : A. 12 bytes

94. Which one of the following is not correct?

Correct : D. none of the mentioned

95. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?

Correct : A. srtp

96. Ping can

Correct : D. all of the mentioned

97. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is

Correct : B. tunneling

98. Ping sweep is a part of

Correct : B. nmap

99. ICMP is used in

Correct : D. both a and b

100. _____ command is used to manipulate TCP/IP routing table.

Correct : A. route