Quiznetik
Computer Networks | Set 6
1. Frame Relay networks offer an option called _______
A. voice over for relay
B. voice over fine relay
C. voice on frame relay
D. voice over frame relay
Correct : D. voice over frame relay
2. There are ________ total features of Frame Relay.
A. five
B. seven
C. nine
D. ten
Correct : C. nine
3. Frame Relay deploys physical layer carriers such as _______
A. adms
B. upsr
C. blsr
D. sonet
Correct : D. sonet
4. Frame relay provides error detection at the ______
A. physical layer
B. data link layer
C. network layer
D. transport layer
Correct : B. data link layer
5. Virtual circuit identifier in frame relay is called _______
A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Correct : A. data link connection identifier
6. Frame relay has only _______
A. physical layer
B. data link layer
C. physical layer and data link layer
D. network layer and data link layer
Correct : C. physical layer and data link layer
7. In frame relay networks, extended address is used ________
A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Correct : A. to increase the range of data link connection identifiers
8. Common gateway interface is used to _______
A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. download media files
Correct : A. generate executable files from web content by web server
9. URL stands for ________
A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Correct : C. uniform resource locator
10. Which one of the following is not used to generate dynamic web pages?
A. php
B. asp.net
C. jsp
D. css
Correct : D. css
11. An alternative to JavaScript on windows platform is _______
A. vbscript
B. asp.net
C. jsp
D. php
Correct : A. vbscript
12. What is document object model (DOM)?
A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in asp.net
D. scripting language
Correct : A. convention for representing and interacting with objects in html documents
13. AJAX stands for _______
A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Correct : A. asynchronous javascript and xml
14. The data field cannot carry which of the following?
A. tcp segment
B. udp segment
C. icmp messages
D. smtp messages
Correct : C. icmp messages
15. What should be the flag value to indicate the last fragment?
A. 0
B. 1
C. ttl value
D. protocol field value
Correct : A. 0
16. Which of these is not applicable for IP protocol?
A. is connectionless
B. offer reliable service
C. offer unreliable service
D. does not offer error reporting
Correct : B. offer reliable service
17. Which of these is not applicable for IP protocol?
A. connectionless
B. offer reliable service
C. offer unreliable service
D. does not offer error reporting
Correct : B. offer reliable service
18. Which of the following demerits does Fragmentation have?
A. complicates routers
B. open to dos attack
C. overlapping of fragments
D. all of the mentioned
Correct : D. all of the mentioned
19. Which field helps to check rearrangement of the fragments?
A. offset
B. flag
C. ttl
D. identifier
Correct : A. offset
20. In classless addressing, there are no classes but addresses are still granted in ______
A. ips
B. blocks
C. codes
D. sizes
Correct : B. blocks
21. In IPv4 Addresses, classful addressing is replaced with ________
A. classless addressing
B. classful addressing
C. classful advertising
D. classless advertising
Correct : A. classless addressing
22. First address in a block is used as network address that represents the ________
A. class network
B. entity
C. organization
D. codes
Correct : C. organization
23. In classful addressing, a large part of available addresses are ________
A. organized
B. blocked
C. wasted
D. communicated
Correct : C. wasted
24. Network addresses are a very important concept of ________
A. routing
B. mask
C. ip addressing
D. classless addressing
Correct : C. ip addressing
25. Which of this is not a class of IP address?
A. class e
B. class c
C. class d
D. class f
Correct : D. class f
26. The header length of an IPv6 datagram is ___________
A. 10bytes
B. 25bytes
C. 30bytes
D. 40bytes
Correct : D. 40bytes
27. IPv6 does not use _________ type of address.
A. broadcast
B. multicast
C. anycast
D. unicast
Correct : A. broadcast
28. Which among the following features is present in IPv6 but not in IPv4?
A. fragmentation
B. header checksum
C. options
D. anycast address
Correct : D. anycast address
29. The _________ field determines the lifetime of IPv6 datagram
A. hop limit
B. ttl
C. next header
D. type of traffic
Correct : A. hop limit
30. Dual-stack approach refers to _________
A. implementing ipv4 with 2 stacks
B. implementing ipv6 with 2 stacks
C. node has both ipv4 and ipv6 support
D. implementing a mac address with 2 stacks
Correct : C. node has both ipv4 and ipv6 support
31. A link local address of local addresses is used in an _______
A. isolated router
B. isolated mask
C. isolated subnet
D. isolated net
Correct : C. isolated subnet
32. In IPv6 addresses, addresses that start with eight 0s are called ________
A. unicast addresses
B. multicast addresses
C. any cast addresses
D. reserved addresses
Correct : D. reserved addresses
33. Which statement(s) about IPv6 addresses are true?
A. leading zeros are required
B. two colons (::) are used to represent successive hexadecimal fields of zeros
C. two colons (::) are used to separate fields
D. a single interface cannot have multiple ipv6 addresses of different types
Correct : B. two colons (::) are used to represent successive hexadecimal fields of zeros
34. When was IPv6 launched?
A. june 2, 2012
B. june 4, 2012
C. june 5, 2012
D. june 6, 2012
Correct : D. june 6, 2012
35. Which layer is responsible for process-to-process delivery?
A. physical layer
B. network layer
C. transport layer
D. application layer
Correct : C. transport layer
36. Multiple processes on destinations at transport layer are identified by __________
A. mac address
B. port number
C. host number
D. host address
Correct : B. port number
37. Range of port numbers in Internet model is __________
A. 0 and 32,765(8-bit)
B. 0 and 32,765(16-bit)
C. 0 and 65,535(32-bit)
D. 0 and 65,535(16-bit)
Correct : D. 0 and 65,535(16-bit)
38. The combination of an IP address and port number is called as ________
A. socket address
B. port address
C. mac address
D. host address
Correct : A. socket address
39. In transport layer, Multiplexing is done at _________
A. channel
B. receiver site
C. sender site
D. packet
Correct : C. sender site
40. Header size of the ICMP message is _________
A. 8-bytes
B. 8-bits
C. 16-bytes
D. 16-bits
Correct : A. 8-bytes
41. During error reporting, ICMP always reports error messages to ________
A. destination
B. source
C. next router
D. previous router
Correct : B. source
42. Which of these is not a type of error-reporting message?
A. destination unreachable
B. source quench
C. router error
D. time exceeded
Correct : C. router error
43. The main reason for transition from IPv4 to IPv6 is _________
A. huge number of systems on the internet
B. very low number of system on the internet
C. providing standard address
D. to provide faster internet
Correct : A. huge number of systems on the internet
44. Which of the following is not a transition strategy?
A. dual stack
B. tunneling
C. conversion
D. header translation
Correct : C. conversion
45. Which of the following is not applicable for IP?
A. error reporting
B. handle addressing conventions
C. datagram format
D. packet handling
Correct : A. error reporting
46. If the value in protocol field is 17, the transport layer protocol used is _________
A. tcp
B. udp
C. icmp
D. igmp
Correct : B. udp
47. In an IPv6 header, the traffic class field is similar to which field in the IPv4 header?
A. fragmentation field
B. fast switching
C. tos field
D. option field
Correct : C. tos field
48. IPv6 does not use ________ type of address.
A. broadcast
B. multicast
C. any cast
D. unicast
Correct : A. broadcast
49. Which are the features present in IPv4 but not in IPv6?
A. fragmentation
B. header checksum
C. options
D. anycast address
Correct : D. anycast address
50. _________ implies that all subnets obtained from the same subnet mask.
A. static subnetting
B. dynamic subnetting
C. variable length subnetting
D. dynamic length subnetting
Correct : A. static subnetting
51. Which of the following are Gigabit Ethernets?
A. 1000 base-sx
B. 1000 base-lx
C. 1000 base-cx
D. all of the mentioned
Correct : D. all of the mentioned
52. _________ is another kind of fiber optic network with an active star for switching.
A. s/net
B. sw/net
C. net/sw
D. fs/net
Correct : A. s/net
53. What is the subnet id of a host with an IP address 172.16.66.0/21?
A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Correct : C. 172.16.64.0
54. The network address of 172.16.0.0/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each
B. 8 subnets, 8,190 hosts each
C. 8 subnets, 2,046 hosts each
D. 7 subnets, 2,046 hosts each
Correct : B. 8 subnets, 8,190 hosts each
55. Which type of Ethernet framing is used for TCP/IP and DEC net?
A. ethernet 802.3
B. ethernet 802.2
C. ethernet ii
D. ethernet snap
Correct : C. ethernet ii
56. Which NetWare protocol works on layer 3–network layer—of the OSI model?
A. ipx
B. ncp
C. spx
D. netbios
Correct : A. ipx
57. Which NetWare protocol provides link-state routing?
A. nlsp
B. rip
C. sap
D. ncp
Correct : A. nlsp
58. 0.0.0 router IGRP 109 network 172.68.7.0
A. it isolates networks 10.0.0.0 and 172.68.7.0
B. it loads igrp for networks 109 and 71
C. it disables rip
D. it disables all routing protocols
Correct : A. it isolates networks 10.0.0.0 and 172.68.7.0
59. What does the “IPX maximum-paths 2” command accomplish?
A. it enables load sharing on 2 paths if the paths are equal metric paths
B. it sets up routing to go to network 2
C. it is the default for cisco ipx load sharing
D. it enables load sharing on 2 paths if the paths are unequal metric paths
Correct : A. it enables load sharing on 2 paths if the paths are equal metric paths
60. Novell’s implementation of RIP updates routing tables every _________ seconds.
A. 60
B. 90
C. 10
D. 30
Correct : A. 60
61. Which protocol should you select if the network diameter is more than 17 hops?
A. ripv1
B. ripv2
C. eigrp
D. both ripv1 and ripv2
Correct : A. ripv1
62. How often does a RIPv1 router broadcast its routing table by default?
A. every 30 seconds
B. every 60 seconds
C. every 90 seconds
D. ripv1 does not broadcast periodically
Correct : A. every 30 seconds
63. Which command displays RIP routing updates?
A. show ip route
B. debug ip rip
C. show protocols
D. debug ip route
Correct : B. debug ip rip
64. Default administrative distance of a static route is ________
A. 0
B. 90
C. 100
D. 1
Correct : D. 1
65. Which protocol gives a full route table update every 30 seconds?
A. iegrp
B. rip
C. icmp
D. ip
Correct : B. rip
66. _________ is the default administrative distance of RIP.
A. 0
B. 90
C. 120
D. 130
Correct : C. 120
67. Which statement is true regarding classless routing protocol?
A. the use of discontinuous networks is not allowed
B. use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
D. igrp supports classes routing within the same autonomous system
Correct : B. use of variable length subnet masks is permitted
68. Where should we use default routing?
A. on stub networks- which have only one exit path out of the network
B. which have more than one exit path out of the network
C. minimum five exit paths out of the network
D. maximum five exit paths out of the network
Correct : A. on stub networks- which have only one exit path out of the network
69. Which statement is true regarding classless routing protocols?
A. the use of discontinuous networks is not allowed
B. the use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
D. ripv2 supports classless routing
Correct : B. the use of variable length subnet masks is permitted
70. Which of the following is true regarding RIPv2?
A. it has a lower administrative distance than ripv1
B. it converges faster than ripv1
C. it has the same timers as ripv1
D. it is harder to configure than ripv1
Correct : C. it has the same timers as ripv1
71. Which of the situations might not require multiple routing protocols in a network?
A. when a new layer 2-only switch is added to the network
B. when you are migrating from one routing protocol to another
C. when you are using routers from multiple vendors
D. when there are host-based routers from multiple vendors
Correct : A. when a new layer 2-only switch is added to the network
72. Which two routing protocols can be redistributed into OSPF by a Cisco router?
A. ip eigrp and appletalk eigrp
B. appletalk eigrp and ripv2
C. ripv2 and ip eigrp
D. ipx rip & appletalk eigrp
Correct : C. ripv2 and ip eigrp
73. What does administrative distance rank?
A. metrics
B. sources of routing information
C. router reliability
D. best paths
Correct : B. sources of routing information
74. Which protocol maintains neighbor adjacencies?
A. ripv2 and eigrp
B. igrp and eigrp
C. ripv2
D. eigrp
Correct : C. ripv2
75. Which routing protocol implements the diffusing update algorithm?
A. is-is
B. igrp
C. eigrp
D. ospf
Correct : C. eigrp
76. Which protocol should you select if the network diameter is more than 17 hops?
A. ripv1
B. ripv2
C. eigrp
D. ospf
Correct : B. ripv2
77. In the network HTTP resources are located by __________
A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Correct : A. uniform resource identifier
78. FTP server listens for connection on which port number?
A. 20
B. 21
C. 22
D. 23
Correct : B. 21
79. In FTP protocol, a client contacts a server using ______ as the transport protocol.
A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Correct : A. transmission control protocol
80. The File Transfer Protocol is built on __________
A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Correct : C. client server architecture
81. In File Transfer Protocol, data transfer cannot be done in __________
A. stream mode
B. block mode
C. compressed mode
D. message mode
Correct : D. message mode
82. Which methods are commonly used in Server Socket class?
A. public output stream get output stream ()
B. public socket accept ()
C. public synchronized void close ()
D. public void connect ()
Correct : B. public socket accept ()
83. The client in socket programming must know which information?
A. ip address of server
B. port number
C. both ip address of server & port number
D. only its own ip address
Correct : C. both ip address of server & port number
84. TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________
A. socket
B. ip address
C. protocol
D. mac address
Correct : C. protocol
85. What does the java.net.InetAddress class represent?
A. socket
B. ip address
C. protocol
D. mac address
Correct : B. ip address
86. Which classes are used for connection-less socket programming?
A. datagram socket
B. datagram packet
C. both datagram socket & datagram packet
D. server socket
Correct : C. both datagram socket & datagram packet
87. In Inet Address class, which method returns the host name of the IP Address?
A. public string get hostname()
B. public string gethostaddress()
C. public static inetaddress get localhost()
D. public getbyname()
Correct : A. public string get hostname()
88. Cookies were originally designed for ____________
A. client side programming
B. server side programming
C. both client side programming and server side programming
D. socket programming
Correct : B. server side programming
89. The Cookie manipulation is done using which property?
A. cookie
B. cookies
C. manipulate
D. manipulate cookie
Correct : A. cookie
90. Which of the following explains Cookies nature?
A. non volatile
B. volatile
C. intransient
D. transient
Correct : D. transient
91. Which attribute is used to extend the lifetime of a cookie?
A. higher-age
B. increase-age
C. max-age
D. lifetime
Correct : C. max-age
92. Which of the following defines the Cookie visibility?
A. document path
B. localstorage
C. sessionstorage
D. all of the mentioned
Correct : D. all of the mentioned
93. Which of the following can be used to configure the scope of the Cookie visibility?
A. path
B. domain
C. both path and domain
D. server
Correct : D. server
94. How can you set a Cookie visibility scope to local Storage?
A. /
B. %
C. *
D. #
Correct : A. /
95. Which of the following is a Boolean cookie attribute?
A. bool
B. secure
C. lookup
D. domain
Correct : B. secure
96. What is the constraint on the data per cookie?
A. 2 kb
B. 1 kb
C. 4 kb
D. 3 kb
Correct : C. 4 kb
97. What does REST stand for?
A. represent state transfer
B. representational state transfer
C. representing state transfer
D. representation state transfer
Correct : B. representational state transfer
98. Which of the following HTTP methods should be idempotent in nature?
A. options
B. delete
C. post
D. head
Correct : B. delete
99. Next-Hop Method is used to reduce contents of a _________
A. revolving table
B. rotating table
C. routing table
D. re-allocate table
Correct : C. routing table
100. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________
A. graph
B. tree
C. network
D. link
Correct : A. graph