Quiznetik

Computer Networks | Set 10

1. In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called

Correct : C. Jam

2. What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?

Correct : B. 25%

3. The physical layer translates logical communication requestsfrom the into hardware specific operations.

Correct : A. Data link layer

4. A single channel is shared by multiple signals by

Correct : C. Multiplexing

5. Wireless transmission of signals can be done via

Correct : D. All of the mentioned

6. ICMP is primarily used for

Correct : A. Error and diagnostic functions

7. Which of the following is a transport layer protocol?

Correct : A. Stream control transmission protocol

8. is the multiplexing technique that shifts each signal to a different carrierfrequency.

Correct : A. FDM

9. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is

Correct : A. 32kbps

10. If there are n signal sources of same data rate, then the TDMlink has slots.

Correct : A. N

11. The state when dedicated signals are idle are called

Correct : C. Silent period

12. In TDM, slots are further divided into

Correct : B. Frames

13. In TDM, the transmission rate of a multiplexed path is always the sum of the transmission rates of the signal sources.

Correct : A. Greater than

14. The time required to examine the packet’s header and determine where to direct the packetis part of

Correct : A. Processing delay

15. Transmission delay does not depend on

Correct : B. Distance between the routers

16. Propagation delay depends on

Correct : C. Distance between the routers

17. Which of the following delay is faced by the packet in travelling from one end system toanother?

Correct : D. All of the mentioned

18. A network router joins two _________ together?

Correct : C. Networks

19. Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server system using message queues.

Correct : A. True

20. Which of the following below is a loopback IP address?

Correct : D. 127.0.0.1

21. Transport layer of OSI model lies between Network and ___________ layer

Correct : C. Session

22. IP4 is more commonly used than IPv6?

Correct : A. True

23. From the options below, which suits best for MODEM?

Correct : A. a device that modulates an analog carrier signal to encode digital information

24. A network point that provides entrance into another network is called as ___________

Correct : B. Gateway

25. UDP is an unreliable protocol.

Correct : A. True

26. A stream socket provides _________ communications between a client and a server

Correct : B. Two way

27. TELNET used _________ protocol for data connection

Correct : A. TCP

28. __________ is a standard suite of protocols used for packet switching across computer networks.

Correct : C. x.25

29. ARP works on Ethernet networks.

Correct : B. True

30. _______ assigns a unique number to each IP network adapter called the MAC address.

Correct : A. Media Access Control

31. Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peer devices.

Correct : B. eight

32. Dynamic addressing doesn’t allow many devices To share limited address space on a network

Correct : B. False

33. NAT stands for _____ .

Correct : C. network address translation

34. Which of the following is true for secure shell tunneling?

Correct : A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port

35. When computers in a network listen and receive the signal, it is termed as active toplogy

Correct : A. True

36. ______is added to data packet for error detection.

Correct : C. parity bit

37. ALL IP addresses are divided into a network address and host address

Correct : A. True

38. Both ping and tracert are used to find If the computer is in the network.

Correct : B. False

39. What is the difference between ring and bus topology?

Correct : A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable

40. MAC addressing works in data link layer while IP addressing works in the network layer.

Correct : A. True

41. A packet whose destination is outside the local TCP/IP network segment is sent to the ___ _.

Correct : B. Default gateway

42. The physical layer is concerned with the movement of _______ over the physical medium.

Correct : D. Bits

43. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.

Correct : B. removed

44. IPv6 has _______ -bit addresses.

Correct : C. 128

45. An IP address contains________ bits ?

Correct : C. 32

46. Which routing protocol below is used by exterior routers between the autonomous systems?

Correct : D. BGP

47. What is the network ID for a computer whose IP address is 190.148.64.23?

Correct : B. 190.148

48. 9 93. Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s.

Correct : B. 2

49. The combination of an IP address and a port number is known as ___________.

Correct : B. socket address

50. The Internet Control Message Protocol (ICMP)

Correct : D. All of the above

51. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.

Correct : D. Router

52. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

Correct : C. SMTP

53. Which of the following device is used to connect two systems, especially if the systems use different protocols?

Correct : C. gateway

54. _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

Correct : B. CRC

55. The PSTN is an example of a ………………… network.

Correct : B. circuit switched

56. A subset of a network that includes all the routers but contains no loops is called:

Correct : A. spanning tree

57. An endpoint of an inter-process communication flow across a computer network is called:

Correct : A. socket

58. In an Ethernet local area network, which one of the following statements is TRUE?

Correct : D. The exponential back off mechanism reduces the probability of collision on retransmissions

59. A small network making up the Internet and also having a small numbers of computers within it is called

Correct : C. Subdomain

60. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________.

Correct : D. 10 kbps

61. In CRC there is no error if the remainder at the receiver is _____.

Correct : B. zero

62. A modulator converts a _____ signal to a(n) _____ signal.

Correct : C. analog; digital

63. ASK, PSK, FSK, and QAM are examples of _____ encoding.

Correct : B. digital-to-analog

64. With an IP address of 201.142.23.12, what is your default subnet mask?

Correct : D. 255.255.255.0

65. DSL stands for ------------------------

Correct : D. digital subscriber lines

66. The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?

Correct : B. Token passing

67. One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field?

Correct : D. It can be used to prevent packet looping

68. Which of the following system calls results in the sending of SYN packets?

Correct : D. connect

69. What is the maximum size of data that the application layer can pass on to the TCP layer below?

Correct : A. Any size

70. Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what is the number of packets that A will transmit for sending the message to B?

Correct : C. 16

71. Which one of the following statements is FALSE?

Correct : B. Packet switching results in less variation in delay than circuit switching.

72. In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ________.

Correct : D. 5 bytes

73. In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called

Correct : C. Jam

74. How many digits of the DNIC (Data Network Identification Code) identify the country?

Correct : A. First three

75. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

Correct : C. SMTP

76. Which of the following device is used to connect two systems, especially if the systems use different protocols?

Correct : C. gateway

77. _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

Correct : B. CRC

78. If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is:

Correct : D. 6

79. In an Ethernet local area network, which one of the following statements is TRUE?

Correct : A. A station stops to sense the channel once it starts transmitting a frame.

80. Which of the following to keep track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet.

Correct : C. Hypertext transfer Protocol (HTTP)

81. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________.

Correct : D. 10 kbps

82. Sending a file from your personal computer's primary memory or disk to another computer is called

Correct : A. uploading

83. Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity?

Correct : C. m1:SMTP, m2:POP, m3:HTTP

84. In the slow start phase of the TCP congestion control algorithm, the size of the congestion window

Correct : D. increases exponentially

85. Match the following: (P) SMTP (1) Application layer (Q) BGP (2) Transport layer (R) TCP (3) Data link layer (S) PPP (4) Network layer (5) Physical layer

Correct : B. P – 1 Q – 4 R – 2 S – 3

86. In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because

Correct : A. Receiver is to be synchronized for byte reception

87. What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?

Correct : B. 25%