Quiznetik

Computer Networks | Set 8

1. Which one of the following multimedia formats can not be supported by RTP?

Correct : D. txt

2. An RTP header has a minimum size of _________

Correct : A. 12 bytes

3. Which one of the following is not correct?

Correct : D. rtcp handles the actual data delivery

4. An RPC (remote procedure call) is initiated by the _________

Correct : B. client

5. In RPC, while a server is processing the call, the client is blocked ________

Correct : A. unless the client sends an asynchronous request to the server

6. A remote procedure call is _______

Correct : A. inter-process communication

7. RPC allows a computer program to cause a subroutine to execute in _________

Correct : B. another address space

8. RPC works between two processes. These processes must be ____________

Correct : C. on the same computer and also on different computers connected with a network

9. A remote procedure is uniquely identified by _________

Correct : D. all of the mentioned

10. An RPC application requires _________

Correct : D. all of the mentioned

11. RPC is a _________

Correct : A. synchronous operation

12. Which of the following is an advantage of anomaly detection?

Correct : C. the engine can scale as the rule set grows

13. What is the purpose of a shadow honeypot?

Correct : C. to randomly check suspicious traffic identified by an anomaly detection system

14. At which two traffic layers do most commercial IDSes generate signatures?

Correct : D. transport layer and network layer

15. When discussing IDS/IPS, what is a signature?

Correct : B. attack-definition file

16. Which of the following is true of signature-based IDSes?

Correct : D. they scan network traffic or packets to identify matches with attack-definition files

17. PPP provides the _______ layer in the TCP/IP suite.

Correct : A. link

18. PPP consists of ________components

Correct : B. three (encapsulating, a link control protocol, ncp)

19. A Link Control Protocol (LCP) is used for ____________

Correct : A. establishing, configuring and testing the data-link connection

20. A family of network control protocols (NCPs) ____________

Correct : B. are a series of independently-defined protocols that encapsulate

21. Choose the correct statement from the following.

Correct : A. ppp can terminate the link at any time

22. EIGRP metric is ________

Correct : A. k-values

23. EIGRP can support ____________

Correct : D. all of the mentioned

24. EIGRP sends a hello message after every ___________ seconds.

Correct : A. 5 seconds (lan), 60 seconds (wan)

25. Administrative distance for internal EIGRP is ______

Correct : A. 90

26. The EIGRP metric values include:

Correct : D. all of the mentioned

27. For default gateway, which of following commands will you use on a Cisco router?

Correct : A. ip default network

28. Administrative distance for external EIGRP route is _______

Correct : B. 170

29. EIGRP uses the ____________ algorithm for finding shortest path.

Correct : B. dual

30. What are the other types of OLAP apart from ROLAP?

Correct : B. MOLAP

31. A network router joins two together?

Correct : C. Networks

32. Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues.

Correct : A. True

33. Which of the following below is a loopback IPaddress?

Correct : D. 127.0.0.1

34. Ping command works on which protocol?

Correct : A. ICMP

35. Transport layer of OSI model lies between Network and layer

Correct : C. Session

36. Which of the following protocols below work in the application layer?

Correct : D. Both a and d above

37. What is the port number for HTTP?

Correct : B. 80

38. IP4 is more commonly used than IPv6?

Correct : A. True

39. From the options below, which suits best for MODEM?

Correct : A. a device that modulates an analog carrier signal to encode digital information

40. What is the size of an IP address?

Correct : D. 32 bit

41. MAC addresses are also known as?

Correct : C. both and b above

42. A network point that provides entrance into another network is called as

Correct : B. Gateway

43. UDP is an unreliable protocol.

Correct : A. True

44. A stream socket provides communications between a client and a server

Correct : B. Two way

45. Token Ring is a data link technology for?

Correct : C. LAN

46. Which of the following protocol below are suited for email retrieval?

Correct : D. Both and b above

47. TELNET used protocol for data connection

Correct : A. TCP

48. 10Base5, 10Base2, 10BaseT are types of?

Correct : C. Ethernet

49. The process of assigning the IP address for specific times to the various hosts by DHCP is called?

Correct : D. Lease

50. What is the full form of URL?

Correct : B. Uniform Resource Locator

51. is a standard suite of protocols used for packet switching across computer networks.

Correct : C. x.25

52. What is the full form of CAN?

Correct : D. both A and B

53. Which of the following below is/are the capability of ICMP protocol?

Correct : C. Both band d

54. ARP works on Ethernet networks.

Correct : B. True

55. assigns a unique number to each IP network adapter called the MAC address.

Correct : A. Media Access Control

56. Piconets in the blue tooth a minimum of two and amaximum of Bluetooth peer devices.

Correct : B. eight

57. Dynamic addressing doesn’t allow many devices To share limited address space on a network

Correct : B. False

58. NAT stands for .

Correct : C. network address translation

59. Which of the following is true for secure shell tunneling?

Correct : A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port

60. Which of the following below are secure VPN protocols?

Correct : D. Both B and C

61. What is the difference between a switch and a hub?

Correct : C. Switches operate at the data link layer while hubs operate at the physical layer

62. When computers in a network listen and receive the signal, it is termed as active toplogy

Correct : A. True

63. In 10base2, 10base5, what do 2 and 5 stand for?

Correct : B. Number of segments

64. is added to data packet for error detection.

Correct : C. parity bit

65. ALL IP addresses are divided into a network address and host address

Correct : A. True

66. How can we examine the current routing tables in command prompt?

Correct : C. using net stat

67. Both ping and tracert are used to find If the computer is in the network.

Correct : B. False

68. What is the difference between ring and bustopology?

Correct : A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable

69. MAC addressing works in data link layer while IP addressing works in the network layer.

Correct : A. True

70. A packet whose destination is outside the local TCP/IP network segment is sentto the _.

Correct : B. Default gateway

71. Why was the OSI model developed?

Correct : C. standards were needed to allow any two systems to communicate

72. Which piece of information is not vital for a computer in a TCP/IP network?

Correct : D. DNS server

73. The physical layer is concerned with the movement of over the physical medium.

Correct : D. Bits

74. Which protocol below operates at the network layer in the OSI model?

Correct : D. All of the above

75. In the OSI model, as a data packet moves from the lower to the upper layers, headers are .

Correct : B. removed

76. Session layer of the OSI model provides

Correct : B. Dialog control

77. IPv6 has -bit addresses.

Correct : C. 128

78. Which one of the following functionalities aren’t provided by TCP?

Correct : B. Addressing

79. Which of the following can be an Ethernet physical address?

Correct : C. 07:01:02:01:2C:4B

80. An IP address contains bits ?

Correct : C. 32

81. Which routing protocol below is used by exterior routers between the autonomoussystems?

Correct : D. BGP

82. Which of the IP headers decides when the packet should be discarded?

Correct : B. TTL

83. Which IP address is reserved for software loop-back?

Correct : B. 127.x.x.x

84. What is the network ID for a computer whose IP address is190.148.64.23?

Correct : B. 190.148

85. Which port is reserved for use of the SMTP protocol?

Correct : C. 25

86. Which one of the followings is a connectionless protocol?

Correct : D. All of the above

87. Which application below uses the UDP protocol?

Correct : C. RIP

88. How many IP addresses can be assigned to hosts in a C-class network segment with a subnet mask of 255.255.255.192?

Correct : A. 62

89. Which of the followings is not a direct implication of subnet masks in TCP/IP networks?

Correct : C. Assignment of more IP addresses

90. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are

Correct : A. Added

91. The structure or format of data is called

Correct : A. Syntax

92. Communication between a computer and a keyboard involves transmission.

Correct : D. Simplex

93. The first Network was called

Correct : D. ARPANET

94. A set of rules that governs data communication.

Correct : A. Protocols

95. Communication channel is shared by all the machines on the networkin

Correct : A. Broadcast network

96. A is a device that forwards packets between networks by processing the routing information included in the packet.

Correct : C. Router

97. Network congestion occurs

Correct : A. In case of traffic overloading

98. Which of the following networks extends a private network across public networks?

Correct : B. Virtual private network

99. The number of layers in ISO OSI reference model is

Correct : B. 7

100. Which of the following layers is an addition to OSI model when compared with TCP IPmodel?

Correct : D. Session and Presentation layer