Correct : A. a procedure by which two connected devices choose common transmission parameters
2. Ethernet in metropolitan area network (MAN) can be used as
Correct : D. all of the mentioned
3. A point-to-point protocol over ethernet is a network protocol for
Correct : A. encapsulating ppp frames inside ethernet frames
4. High speed ethernet works on
Correct : C. optical fiber
5. The maximum size of payload field in ethernet frame is
Correct : D. 1500 bytes
6. What is interframe gap?
Correct : A. idle time between frames
7. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called
Correct : B. runt frame
8. In wireless ad-hoc network
Correct : A. access point is not required
9. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
Correct : B. csma/ca
10. A wireless network interface controller can work in
Correct : C. both infrastructure mode and ad-hoc mode
11. In wireless network an extended service set is a set of
Correct : A. connected basic service sets
12. Mostly is used in wireless LAN.
Correct : B. orthogonal frequency division multiplexing
13. Which one of the following event is not possible in wireless LAN?
Correct : A. collision detection
14. What is Wired Equivalent Privacy (WEP)?
Correct : B. security algorithm for wireless networks
15. What is WPA?
Correct : A. wi-fi protected access
16. The time required to transmit frame depends on
Correct : C. frame size & channel capacity
17. Window given the number of
Correct : C. bytes & frames
18. Routing is
Correct : C. static & dynamic
19. Routing is performed only centrally.
Correct : A. true
20. Which is connection oriented and which is connection-less?
Correct : B. virtual circuits, datagrams
21. Which uses UDP?
Correct : D. all of the mentioned
22. Which uses TCP?
Correct : A. simple mail transfer protocol
23. Which tells about low level transmission and framing?
Correct : C. g series
24. Which tells about signalling?
Correct : D. q series
25. An interconnected collection of piconet is called
Correct : A. scatternet
26. Bluetooth is the wireless technology for
Correct : B. personal area network
27. Bluetooth uses
Correct : A. frequency hopping spread spectrum
28. Unauthorised access of information from a wireless device through a bluetooth connection is called
Correct : B. bluesnarfing
29. What is A2DP (advanced audio distribution profile)?
Correct : A. a bluetooth profile for streaming audio
30. Bluetooth supports
Correct : C. both point-to-point connections and point- to-multipoint connection
31. A scatternet can have maximum
Correct : A. 10 piconets
32. What is the access point (AP) in a wireless LAN?
Correct : A. device that allows wireless devices to connect to a wired network
33. In wireless distribution system
Correct : A. multiple access point are inter-connected with each other
34. Which protocol is used to link all the devices in the IoT?
Correct : A. tcp/ip
35. enables seamless integration of LoWPAN devices with internet leveraging.
Correct : A. ietf 6lowpan
36. enables open application layer for constrained nodes.
Correct : B. ieft coap
37. tags, devices, smart phones useful in identification.
Correct : C. rfid/nfc
38. supports low energy radio operation.
Correct : D. bluetooth
39. specification defining the PHY and MAC layer of low power devices.
Correct : D. ieee 802.15.4.lowpan
40. is an application layer protocol for resource constrained devices.
Correct : A. coap
41. Adheres to approach for managing resources and support mapping to HTTP.
Correct : D. restful
42. resources are identified by Uniform Resource Identifiers.
Correct : A. coap
43. Which protocol interacts asynchronously over UDP?
Correct : B. coap
44. CoAP messages are short.
Correct : A. true
45. How many messages types are there in CoAP?
Correct : D. 4
46. Number of methods in CoAP?
Correct : C. 4
47. A 4 byte IP address consists of
Correct : B. wireless sensor network
48. In virtual circuit network each packet contains
Correct : B. a short vc number
49. A subset of a network that includes all the routers but contains no loops is called
Correct : A. spanning tree
50. ICMP is primarily used for
Correct : A. error and diagnostic functions
51. Most packet switches use this principle
Correct : B. store and forward
52. If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to
Correct : B. (n*l)/r
53. What are the Methods to move data through a network of links and switches?
Correct : D. packet switching and circuit switching
54. The required resources for communication between end systems are reserved for the duration of the session between end systems in method.
Correct : B. circuit switching
55. As the resources are reserved between two communicating end systems in circuit switching, is achieved.
Correct : B. guaranteed constant rate
56. In systems, resources are allocated on demand.
Correct : A. packet switching
57. Which of the following is not an application layer service?
Correct : D. error control
58. Which of the following is not applicable for IP?
Correct : A. error reporting
59. Which of the following field in IPv4 datagram is not related to fragmentation?
Correct : C. tos
60. The TTL field has value 10. How many routers (max) can process this datagram?
Correct : C. 10
61. If the value in protocol field is 17, the transport layer protocol used is
Correct : B. udp
62. The data field cannot carry which of the following?
Correct : C. icmp messages
63. What should be the flag value to indicate the last fragment?
Correct : A. 0
64. Which of these is not applicable for IP protocol?
Correct : B. offer reliable service
65. Which of the following demerits does Fragmentation have?
Correct : D. all of the mentioned
66. Which field helps to check rearrangement of the fragments?
Correct : A. offset
67. Which one of the following is not a function of network layer?
Correct : D. error control
68. A 4 byte IP address consists of
Correct : C. network address & host address
69. Which of the following routing algorithms can be used for network layer design?
Correct : D. all of the mentioned
70. Which of the following is not correct in relation to multi-destination routing?
Correct : C. data is not sent by packets
71. Which one of the following algorithm is not used for congestion control?
Correct : D. routing information protocol
72. The network layer protocol for internet is
Correct : B. internet protocol
73. Which type of Ethernet framing is used for TCP/IP and DEC net?
Correct : C. ethernet ii
74. Consider a situation in which you are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem?
Correct : A. netware 4.11 defaults to 802.2 encapsulation
75. NetWare IPX addressing uses a network number and a node number. Which statement is not true?
Correct : B. the node address is always administratively assigned
76. Which NetWare protocol works on layer 3– network layer—of the OSI model?
Correct : A. ipx
77. Which NetWare protocol provides link- state routing?
Correct : A. nlsp
78. As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?
Correct : D. debug ip igrp events
79. 0.0.0 router IGRP 109 network 172.68.7.0
Correct : A. it isolates networks 10.0.0.0 and 172.68.7.0
80. As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this?
Correct : D. interface ethernet 0.1ipx encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
81. What does the “IPX maximum-paths 2” command accomplish?
Correct : A. it enables load sharing on 2 paths if the paths are equal metric paths
82. You want to enable both arpa and snap encapsulation on one router interface. How do you do this?
Correct : B. assign two network numbers, one for each encapsulation type
83. By default, Cisco routers forward GNS SAPs to remote networks.
Correct : A. false
84. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks?
Correct : A. each router builds its own sap table and forwards that every 60 seconds
85. Novell’s implementation of RIP updates routing tables every seconds.
Correct : A. 60
86. In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics.
Correct : A. ticks & hops
87. The term that is used to place packet in its route to its destination is called
Correct : C. forwarding
88. A second technique to reduce routing table and simplify searching process is called
Correct : A. network-specific method
89. Next-Hop Method is used to reduce contents of a
Correct : C. routing table
90. In Unicast routing, if instability is between three nodes, stability cannot be
Correct : C. guaranteed
91. RPF stands for
Correct : A. reverse path forwarding
92. LSP stands for
Correct : B. link state packet
93. Protocol is a set of
Correct : C. formats & procedures
94. Several techniques can make size of routing table manageable and also handle issues such as
Correct : D. security
95. Host-specific routing is used for purposes such as checking route or providing
Correct : B. security measures
96. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a
Correct : A. graph
97. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates
Correct : B. loops
98. The computation of the shortest path in OSPF is usually done by
Correct : C. dijkstra’s algorithm
99. Which of the following is false with respect to the features of OSPF?
Correct : A. support for fixed-length subnetting by including the subnet mask in the routing message
100. In OSPF, which protocol is used to discover neighbour routers automatically?