Quiznetik
Computer Networks | Set 7
1. RPF stands for __________
A. reverse path forwarding
B. reverse path failure
C. reverse packet forwarding
D. reverse protocol failure
Correct : A. reverse path forwarding
2. LSP stands for __________
A. link stable packet
B. link state packet
C. link state protocol
D. link state path
Correct : B. link state packet
3. Network layer firewall works as a ________
A. frame filter
B. packet filter
C. signal filter
D. content filter
Correct : B. packet filter
4. Network layer firewall has two sub-categories called ____________
A. stateful firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network firewall and data firewall
Correct : A. stateful firewall and stateless firewall
5. WPA2 is used for security in _______
A. ethernet
B. bluetooth
C. wi-fi
D. e-mail
Correct : C. wi-fi
6. Open Shortest Path First (OSPF) is also called as _____________
A. link state protocol
B. error-correction protocol
C. routing information protocol
D. border gateway protocol
Correct : A. link state protocol
7. The computation of the shortest path in OSPF is usually done by ____________
A. bellman-ford algorithm
B. routing information protocol
C. dijkstra’s algorithm
D. distance vector routing
Correct : C. dijkstra’s algorithm
8. In OSPF, which protocol is used to discover neighbour routers automatically?
A. link state protocol
B. error-correction protocol
C. routing information protocol
D. hello protocol
Correct : D. hello protocol
9. Which of the following is not a type of OSPF packet?
A. hello
B. link-state request
C. link-state response
D. link-state ack
Correct : C. link-state response
10. In OSPF header, which field is used to detect errors in the packet?
A. type
B. area id
C. authentication type
D. checksum
Correct : D. checksum
11. The outcome of Dijkstra’s calculation is used to populate the __________
A. topology table
B. routing table
C. neighbor table
D. adjacency table
Correct : B. routing table
12. What is the IP protocol number for OSPF packets?
A. 89
B. 86
C. 20
D. 76
Correct : A. 89
13. Which packet is NOT an OSPF packet type?
A. lsu
B. lsr
C. dbd
D. query
Correct : D. query
14. Which multicast address does the OSPF Hello protocol use?
A. 224.0.0.5
B. 224.0.0.6
C. 224.0.0.7
D. 224.0.0.8
Correct : A. 224.0.0.5
15. DBD packets are involved during which two states?
A. exstart and exchange
B. loading and two-way
C. init and full
D. down and loading
Correct : A. exstart and exchange
16. At which interval does OSPF refresh LSAs?
A. 10 seconds
B. 30 seconds
C. 30 minutes
D. 1 hour
Correct : D. 1 hour
17. Which field is NOT a field within an OSPF packet header?
A. packet length
B. router id
C. authentication type
D. maxage time
Correct : D. maxage time
18. Which two commands are required for basic OSPF configuration?
A. “[network mask] area [area-id]” and “router ospf [process-id]”
B. “[wildcard-mask] area [area-id]” and “[network mask] area [area-id]”
C. only “router ospf [process-id]”
D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”
Correct : D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”
19. Which OSPF show command describes a list of OSPF adjacencies?
A. show ip ospf interface
B. show ip ospf
C. show ip route
D. show ip ospf neighbor
Correct : D. show ip ospf neighbor
20. Datagram switching is done at which layer of OSI model?
A. network layer
B. physical layer
C. application layer
D. transport layer
Correct : A. network layer
21. Packets in datagram switching are referred to as ________
A. switches
B. segments
C. datagrams
D. data-packets
Correct : C. datagrams
22. Datagrams are routed to their destinations with the help of ________
A. switch table
B. segments table
C. datagram table
D. routing table
Correct : C. datagram table
23. The main contents of the routing table in datagram networks are ___________
A. source and destination address
B. destination address and output port
C. source address and output port
D. input port and output port
Correct : B. destination address and output port
24. Which of the following is true with respect to the delay in datagram networks?
A. delay is greater than in a virtual circuit network
B. each packet may experience a wait at a switch
C. delay is not uniform for the packets of a message
D. all of the mentioned
Correct : D. all of the mentioned
25. Which of the following is false with respect to the datagram networks?
A. number of flows of packets are not limited
B. packets may not be in order at the destination
C. path is not reserved
D. delay is the same for all packets in a flow
Correct : D. delay is the same for all packets in a flow
26. Network layer firewall works as a __________
A. frame filter
B. packet filter
C. content filter
D. virus filter
Correct : B. packet filter
27. Network layer firewall has two sub-categories as _________
A. state full firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network layer firewall and session layer firewall
Correct : A. state full firewall and stateless firewall
28. Which of the following is / are the types of firewall?
A. packet filtering firewall
B. dual homed gateway firewall
C. screen host firewall
D. dual host firewall
Correct : A. packet filtering firewall
29. A proxy firewall filters at _________
A. physical layer
B. data link layer
C. network layer
D. application layer
Correct : D. application layer
30. A packet filter firewall filters at __________
A. physical layer
B. data link layer
C. network layer or transport layer
D. application layer
Correct : C. network layer or transport layer
31. What is one advantage of setting up a DMZ with two firewalls?
A. you can control where traffic goes in three networks
B. you can do stateful packet filtering
C. you can do load balancing
D. improved network performance
Correct : C. you can do load balancing
32. A stateful firewall maintains a ___________ which is a list of active connections.
A. routing table
B. bridging table
C. state table
D. connection table
Correct : A. routing table
33. Performance management is closely related to _________
A. proactive fault management
B. fault management
C. reactive fault management
D. preventive fault management
Correct : B. fault management
34. Which of the following networks supports pipelining effect?
A. circuit-switched networks
B. message-switched networks
C. packet-switched networks
D. stream-switched networks
Correct : C. packet-switched networks
35. MIB is a collection of groups of objects that can be managed by __________
A. smtp
B. udp
C. snmp
D. tcp/ip
Correct : C. snmp
36. A network management system can be divided into ___________
A. three categories
B. five broad categories
C. seven broad categories
D. ten broad categories
Correct : B. five broad categories
37. Ping can _________
A. measure round-trip time
B. report packet loss
C. report latency
D. all of the mentioned
Correct : D. all of the mentioned
38. Ping sweep is a part of _________
A. traceroute
B. nmap
C. route
D. ipconfig
Correct : B. nmap
39. ICMP is used in _________
A. ping
B. traceroute
C. ifconfig
D. both ping & traceroute
Correct : D. both ping & traceroute
40. __________ command is used to manipulate TCP/IP routing table.
A. route
B. ipconfig
C. ifconfig
D. traceroute
Correct : A. route
41. Which of the following is not related to ipconfig in Microsoft Windows?
A. display all current tcp/ip network configuration values
B. modify dhcp settings
C. modify dns settings
D. trace the routers in the path to destination
Correct : D. trace the routers in the path to destination
42. __________ allows checking if a domain is available for registration.
A. domain check
B. domain dossier
C. domain lookup
D. domain registers
Correct : A. domain check
43. Choose the wrong statement from the following.
A. nslookup is used to query a dns server for dns data
B. ping is used to check connectivity
C. pathping combines the functionality of ping with that of route
D. ifconfig can configure tcp/ip network interface parameters
Correct : C. pathping combines the functionality of ping with that of route
44. Ethernet frame consists of ____________
A. mac address
B. ip address
C. default mask
D. network address
Correct : A. mac address
45. What is start frame delimeter (SFD) in ethernet frame?
A. 10101010
B. 10101011
C. 00000000
D. 11111111
Correct : B. 10101011
46. MAC address is of ___________
A. 24 bits
B. 36 bits
C. 42 bits
D. 48 bits
Correct : D. 48 bits
47. Ethernet in metropolitan area network (MAN) can be used as ___________
A. pure ethernet
B. ethernet over sdh
C. ethernet over mpls
D. all of the mentioned
Correct : D. all of the mentioned
48. A point-to-point protocol over ethernet is a network protocol for __________
A. encapsulating ppp frames inside ethernet frames
B. encapsulating ehternet framse inside ppp frames
C. for security of ethernet frames
D. for security of ppp frames
Correct : A. encapsulating ppp frames inside ethernet frames
49. High speed ethernet works on _________
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. unshielded twisted pair cable
Correct : C. optical fiber
50. The maximum size of payload field in ethernet frame is __________
A. 1000 bytes
B. 1200 bytes
C. 1300 bytes
D. 1500 bytes
Correct : D. 1500 bytes
51. What is interframe gap?
A. idle time between frames
B. idle time between frame bits
C. idle time between packets
D. idle time between networks
Correct : A. idle time between frames
52. In wireless ad-hoc network _________
A. access point is not required
B. access point is must
C. nodes are not required
D. all nodes are access points
Correct : A. access point is not required
53. In wireless distribution system __________
A. multiple access point are inter-connected with each other
B. there is no access point
C. only one access point exists
D. access points are not required
Correct : A. multiple access point are inter-connected with each other
54. A wireless network interface controller can work in _______
A. infrastructure mode
B. ad-hoc mode
C. both infrastructure mode and ad-hoc mode
D. wds mode
Correct : C. both infrastructure mode and ad-hoc mode
55. In wireless network an extended service set is a set of ________
A. connected basic service sets
B. all stations
C. all access points
D. connected access points
Correct : A. connected basic service sets
56. Mostly ________ is used in wireless LAN.
A. time division multiplexing
B. orthogonal frequency division multiplexing
C. space division multiplexing
D. channel division multiplexing
Correct : B. orthogonal frequency division multiplexing
57. Which one of the following event is not possible in wireless LAN?
A. collision detection
B. acknowledgement of data frames
C. multi-mode data transmission
D. connection to wired networks
Correct : A. collision detection
58. What is Wired Equivalent Privacy (WEP)?
A. security algorithm for ethernet
B. security algorithm for wireless networks
C. security algorithm for usb communication
D. security algorithm for emails
Correct : B. security algorithm for wireless networks
59. What is WPA?
A. wi-fi protected access
B. wired protected access
C. wired process access
D. wi-fi process access
Correct : A. wi-fi protected access
60. What is internet?
A. a single network
B. a vast collection of different networks
C. interconnection of local area networks
D. interconnection of wide area networks
Correct : B. a vast collection of different networks
61. To join the internet, the computer has to be connected to a _________
A. internet architecture board
B. internet society
C. internet service provider
D. different computer
Correct : C. internet service provider
62. ISP exchanges internet traffic between their networks by __________
A. internet exchange point
B. subscriber end point
C. isp end point
D. internet end point
Correct : A. internet exchange point
63. Which of the following protocols is used in the internet?
A. http
B. dhcp
C. dns
D. dns, http and dns
Correct : D. dns, http and dns
64. The size of an IP address in IPv6 is _________
A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Correct : C. 128 bits
65. Internet works on _______
A. packet switching
B. circuit switching
C. both packet switching and circuit switching
D. data switching
Correct : A. packet switching
66. Which one of the following is not an application layer protocol used in internet?
A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. local procedure call
Correct : C. resource reservation protocol
67. Which protocol assigns IP address to the client connected in the internet?
A. dhcp
B. ip
C. rpc
D. rsvp
Correct : A. dhcp
68. Which one of the following is not used in media access control?
A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. packet switching
Correct : D. packet switching
69. An interconnected collection of piconet is called ___________
A. scatternet
B. micronet
C. mininet
D. multinet
Correct : A. scatternet
70. In a piconet, there can be up to ________ parked nodes in the network.
A. 63
B. 127
C. 255
D. 511
Correct : C. 255
71. Bluetooth is the wireless technology for __________
A. local area network
B. personal area network
C. metropolitan area network
D. wide area network
Correct : B. personal area network
72. Bluetooth uses __________
A. frequency hopping spread spectrum
B. orthogonal frequency division multiplexing
C. time division multiplexing
D. channel division multiplexing
Correct : A. frequency hopping spread spectrum
73. What is A2DP (advanced audio distribution profile)?
A. a bluetooth profile for streaming audio
B. a bluetooth profile for streaming video
C. a bluetooth profile for security
D. a bluetooth profile for file management
Correct : A. a bluetooth profile for streaming audio
74. In a piconet, one master device ________
A. can not be slave
B. can be slave in another piconet
C. can be slave in the same piconet
D. can be master in another piconet
Correct : B. can be slave in another piconet
75. Bluetooth transceiver devices operate in ______ band.
A. 2.4 ghz ism
B. 2.5 ghz ism
C. 2.6 ghz ism
D. 2.7 ghz ism
Correct : A. 2.4 ghz ism
76. Bluetooth supports _______
A. point-to-point connections
B. point-to-multipoint connection
C. both point-to-point connections and point-to-multipoint connection
D. multipoint to point connection
Correct : C. both point-to-point connections and point-to-multipoint connection
77. A scatternet can have maximum __________
A. 10 piconets
B. 20 piconets
C. 30 piconets
D. 40 piconets
Correct : A. 10 piconets
78. WiMAX stands for ___________
A. wireless maximum communication
B. worldwide interoperability for microwave access
C. worldwide international standard for microwave access
D. wireless internet maximum communication
Correct : B. worldwide interoperability for microwave access
79. WiMAX provides ________
A. simplex communication
B. half duplex communication
C. full duplex communication
D. no communication
Correct : C. full duplex communication
80. WiMAX uses the _________
A. orthogonal frequency division multiplexing
B. time division multiplexing
C. space division multiplexing
D. channel division multiplexing
Correct : A. orthogonal frequency division multiplexing
81. Which of the following modulation schemes is supported by WiMAX?
A. binary phase shift keying modulation
B. quadrature phase shift keying modulation
C. quadrature amplitude modulation
D. all of the mentioned
Correct : D. all of the mentioned
82. WiMAX MAC layer provides an interface between ___________
A. higher transport layers and physical layer
B. application layer and network layer
C. data link layer and network layer
D. session layer and application layer
Correct : A. higher transport layers and physical layer
83. For encryption, WiMAX supports _______
A. advanced encryption standard
B. triple data encryption standard
C. advanced encryption standard and triple data encryption standard
D. double data encryption standard
Correct : C. advanced encryption standard and triple data encryption standard
84. WiMAX provides _______
A. voip services
B. iptv services
C. both voip and iptv services
D. no iptv services
Correct : C. both voip and iptv services
85. WiMAX is mostly used for __________
A. local area network
B. metropolitan area network
C. personal area network
D. wide area network
Correct : B. metropolitan area network
86. Which of the following frequencies is not used in WiMAX for communication?
A. 2.3 ghz
B. 2.4 ghz
C. 2.5 ghz
D. 3.5 ghz
Correct : B. 2.4 ghz
87. SONET stands for ___________
A. synchronous optical network
B. synchronous operational network
C. stream optical network
D. shell operational network
Correct : A. synchronous optical network
88. In SONET, STS-1 level of electrical signalling has the data rate of _________
A. 51.84 mbps
B. 155.52 mbps
C. 2488.320 mbps
D. 622.080 mbps
Correct : A. 51.84 mbps
89. The path layer of SONET is responsible for the movement of a signal _________
A. from its optical source to its optical destination
B. across a physical line
C. across a physical section
D. back to its optical source
Correct : B. across a physical line
90. The photonic layer of the SONET is similar to the __________ of OSI model.
A. network layer
B. data link layer
C. physical layer
D. transport layer
Correct : C. physical layer
91. In SONET, each synchronous transfer signal STS-n is composed of __________
A. 2000 frames
B. 4000 frames
C. 8000 frames
D. 16000 frames
Correct : C. 8000 frames
92. A linear SONET network can be ________
A. point-to-point
B. multi-point
C. both point-to-point and multi-point
D. single point
Correct : C. both point-to-point and multi-point
93. Automatic protection switching in linear network is defined at the _______
A. line layer
B. section layer
C. photonic layer
D. path layer
Correct : A. line layer
94. A unidirectional path switching ring is a network with __________
A. one ring
B. two rings
C. three rings
D. four rings
Correct : B. two rings
95. Real-time transport protocol (RTP) is mostly used in _________
A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Correct : D. all of the mentioned
96. RTP is used to ________
A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. secure the stream
Correct : A. carry the media stream
97. RTP provides the facility of jitter ____________
A. media stream
B. expansion
C. media modification
D. security
Correct : A. media stream
98. Which protocol provides the synchronization between media streams?
A. rtp
B. rtcp
C. rpc
D. rtct
Correct : B. rtcp
99. An RTP session is established for ____________
A. each media stream
B. all media streams
C. some predefined number of media streams
D. no media stream
Correct : A. each media stream
100. RTP can use __________
A. unprevileleged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Correct : D. all of the mentioned