Quiznetik

Computer Architecture and Organization | Set 2

1. What is autonegotiation?

Correct : A. a procedure by which two connected devices choose common transmission parameters

2. Ethernet in metropolitan area network (MAN) can be used as

Correct : D. all of the mentioned

3. A point-to-point protocol over ethernet is a network protocol for

Correct : A. encapsulating ppp frames inside ethernet frames

4. High speed ethernet works on

Correct : C. optical fiber

5. The maximum size of payload field in ethernet frame is

Correct : D. 1500 bytes

6. What is interframe gap?

Correct : A. idle time between frames

7. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called

Correct : B. runt frame

8. In wireless ad-hoc network

Correct : A. access point is not required

9. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

Correct : B. csma/ca

10. A wireless network interface controller can work in

Correct : C. both infrastructure mode and ad-hoc mode

11. In wireless network an extended service set is a set of

Correct : A. connected basic service sets

12. Mostly                  is used in wireless LAN.

Correct : B. orthogonal frequency division multiplexing

13. Which one of the following event is not possible in wireless LAN?

Correct : A. collision detection

14. What is Wired Equivalent Privacy (WEP)?

Correct : B. security algorithm for wireless networks

15. What is WPA?

Correct : A. wi-fi protected access

16. The time required to transmit frame depends on

Correct : C. frame size & channel capacity

17. Window given the number of

Correct : C. bytes & frames

18. Routing is

Correct : C. static & dynamic

19. Routing is performed only centrally.

Correct : A. true

20. Which is connection oriented and which is connection-less?

Correct : B. virtual circuits, datagrams

21. Which uses UDP?

Correct : D. all of the mentioned

22. Which uses TCP?

Correct : A. simple mail transfer protocol

23. Which tells about low level transmission and framing?

Correct : C. g series

24. Which tells about signalling?

Correct : D. q series

25. An interconnected collection of piconet is called

Correct : A. scatternet

26. Bluetooth is the wireless technology for

Correct : B. personal area network

27. Bluetooth uses

Correct : A. frequency hopping spread spectrum

28. Unauthorised access of information from a wireless device through a bluetooth connection is called

Correct : B. bluesnarfing

29. What is A2DP (advanced audio distribution profile)?

Correct : A. a bluetooth profile for streaming audio

30. Bluetooth supports

Correct : C. both point-to-point connections and point- to-multipoint connection

31. A scatternet can have maximum

Correct : A. 10 piconets

32. What is the access point (AP) in a wireless LAN?

Correct : A. device that allows wireless devices to connect to a wired network

33. In wireless distribution system

Correct : A. multiple access point are inter-connected with each other

34. Which protocol is used to link all the devices in the IoT?

Correct : A. tcp/ip

35. enables seamless integration of LoWPAN devices with internet leveraging.

Correct : A. ietf 6lowpan

36. enables open application layer for constrained nodes.

Correct : B. ieft coap

37. tags, devices, smart phones useful in identification.

Correct : C. rfid/nfc

38. supports low energy radio operation.

Correct : D. bluetooth

39. specification defining the PHY and MAC layer of low power devices.

Correct : D. ieee 802.15.4.lowpan

40. is an application layer protocol for resource constrained devices.

Correct : A. coap

41. Adheres to                  approach for managing resources and support mapping to HTTP.

Correct : D. restful

42. resources are identified by Uniform Resource Identifiers.

Correct : A. coap

43. Which protocol interacts asynchronously over UDP?

Correct : B. coap

44. CoAP messages are short.

Correct : A. true

45. How many messages types are there in CoAP?

Correct : D. 4

46. Number of methods in CoAP?

Correct : C. 4

47. A 4 byte IP address consists of

Correct : B. wireless sensor network

48. In virtual circuit network each packet contains

Correct : B. a short vc number

49. A subset of a network that includes all the routers but contains no loops is called

Correct : A. spanning tree

50. ICMP is primarily used for

Correct : A. error and diagnostic functions

51. Most packet switches use this principle

Correct : B. store and forward

52. If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to

Correct : B. (n*l)/r

53. What are the Methods to move data through a network of links and switches?

Correct : D. packet switching and circuit switching

54. The required resources for communication between end systems are reserved for the duration of the session between end systems in                  method.

Correct : B. circuit switching

55. As the resources are reserved between two communicating end systems in circuit switching,                        is achieved.

Correct : B. guaranteed constant rate

56. In                    systems, resources are allocated on demand.

Correct : A. packet switching

57. Which of the following is not an application layer service?

Correct : D. error control

58. Which of the following is not applicable for IP?

Correct : A. error reporting

59. Which of the following field in IPv4 datagram is not related to fragmentation?

Correct : C. tos

60. The TTL field has value 10. How many routers (max) can process this datagram?

Correct : C. 10

61. If the value in protocol field is 17, the transport layer protocol used is

Correct : B. udp

62. The data field cannot carry which of the following?

Correct : C. icmp messages

63. What should be the flag value to indicate the last fragment?

Correct : A. 0

64. Which of these is not applicable for IP protocol?

Correct : B. offer reliable service

65. Which of the following demerits does Fragmentation have?

Correct : D. all of the mentioned

66. Which field helps to check rearrangement of the fragments?

Correct : A. offset

67. Which one of the following is not a function of network layer?

Correct : D. error control

68. A 4 byte IP address consists of

Correct : C. network address & host address

69. Which of the following routing algorithms can be used for network layer design?

Correct : D. all of the mentioned

70. Which of the following is not correct in relation to multi-destination routing?

Correct : C. data is not sent by packets

71. Which one of the following algorithm is not used for congestion control?

Correct : D. routing information protocol

72. The network layer protocol for internet is

Correct : B. internet protocol

73. Which type of Ethernet framing is used for TCP/IP and DEC net?

Correct : C. ethernet ii

74. Consider a situation in which you are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem?

Correct : A. netware 4.11 defaults to 802.2 encapsulation

75. NetWare IPX addressing uses a network number and a node number. Which statement is not true?

Correct : B. the node address is always administratively assigned

76. Which NetWare protocol works on layer 3– network layer—of the OSI model?

Correct : A. ipx

77. Which NetWare protocol provides link- state routing?

Correct : A. nlsp

78. As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?

Correct : D. debug ip igrp events

79. 0.0.0 router IGRP 109 network 172.68.7.0

Correct : A. it isolates networks 10.0.0.0 and 172.68.7.0

80. As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this?

Correct : D. interface ethernet 0.1ipx encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c

81. What does the “IPX maximum-paths 2” command accomplish?

Correct : A. it enables load sharing on 2 paths if the paths are equal metric paths

82. You want to enable both arpa and snap encapsulation on one router interface. How do you do this?

Correct : B. assign two network numbers, one for each encapsulation type

83. By default, Cisco routers forward GNS SAPs to remote networks.

Correct : A. false

84. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks?

Correct : A. each router builds its own sap table and forwards that every 60 seconds

85. Novell’s implementation of RIP updates routing tables every                    seconds.

Correct : A. 60

86. In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics.

Correct : A. ticks & hops

87. The term that is used to place packet in its route to its destination is called

Correct : C. forwarding

88. A second technique to reduce routing table and simplify searching process is called

Correct : A. network-specific method

89. Next-Hop Method is used to reduce contents of a

Correct : C. routing table

90. In Unicast routing, if instability is between three nodes, stability cannot be

Correct : C. guaranteed

91. RPF stands for

Correct : A. reverse path forwarding

92. LSP stands for

Correct : B. link state packet

93. Protocol is a set of

Correct : C. formats & procedures

94. Several techniques can make size of routing table manageable and also handle issues such as

Correct : D. security

95. Host-specific routing is used for purposes such as checking route or providing

Correct : B. security measures

96. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a

Correct : A. graph

97. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates

Correct : B. loops

98. The computation of the shortest path in OSPF is usually done by

Correct : C. dijkstra’s algorithm

99. Which of the following is false with respect to the features of OSPF?

Correct : A. support for fixed-length subnetting by including the subnet mask in the routing message

100. In OSPF, which protocol is used to discover neighbour routers automatically?

Correct : D. hello protocol