Quiznetik

Computer Architecture and Organization | Set 3

1. Which of the following is not a type of OSPF packet?

Correct : C. link-state response

2. In OSPF header, which field is used to detect errors in the packet?

Correct : D. checksum

3. In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to

Correct : A. 1

4. In OSPF database descriptor packet, which field is used to indicate that the router is master?

Correct : B. ms

5. In OSPF database descriptor packet, which field is used to detect a missing packet?

Correct : C. database descriptor sequence number

6. The size of an IP address in IPv6 is

Correct : B. 128 bits

7. The header length of an IPv6 datagram is

Correct : D. 40bytes

8. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?

Correct : C. tos field

9. IPv6 does not use                    type of address.

Correct : A. broadcast

10. Which among the following features is

Correct : A. hop limit

11. Dual-stack approach refers to

Correct : C. node has both ipv4 and ipv6 support

12. The                    field determines the lifetime of IPv6 datagram

Correct : B. tunneling

13. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits

Correct : A. 96 to 127

14. An endpoint of an inter-process communication flow across a computer network is called

Correct : A. socket

15. Which one of the following is a version of UDP with congestion control?

Correct : A. datagram congestion control protocol

16. Which of the following is a transport layer protocol?

Correct : A. stream control transmission protocol

17. 2 USER DATAGRAM PROTOCOLS (UDP)

Correct : A. connection-oriented

18. Return value of the UDP port “Chargen” is

Correct : A. string of characters

19. Beyond IP, UDP provides additional services such as

Correct : D. demultiplexing and error checking

20. What is the main advantage of UDP?

Correct : C. low overhead

21. What is the header size of a UDP packet?

Correct : A. 8 bytes

22. The port number is “ephemeral port number”, if the source host is

Correct : D. client

23. “Total length” field in UDP packet header is the length of

Correct : D. udp header plus data

24. Which is the correct expression for the length of UDP datagram?

Correct : A. udp length = ip length – ip header’s length

25. The              field is used to detect errors over the entire user datagram.

Correct : B. checksum

26. Which of the following is false with respect to TCP?

Correct : D. unreliable

27. In TCP, sending and receiving data is done as

Correct : A. stream of bytes

28. TCP groups a number of bytes together into a packet called

Correct : C. segment

29. Communication offered by TCP is

Correct : A. full-duplex

30. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?

Correct : B. 10001

31. Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a

Correct : D. sequence of zero’s and one’s

32. The value of acknowledgement field in a segment defines

Correct : C. sequence number of the next byte to be received

33. Two broad categories of congestion control are

Correct : A. open-loop and closed-loop

34. Retransmission of packets must not be done when

Correct : D. packet is error-free

35. In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends

Correct : B. only those packets which are lost or corrupted

36. Closed-Loop control mechanisms try to

Correct : A. remove after congestion occurs

37. The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as

Correct : B. backpressure

38. The packet sent by a node to the source to inform it of congestion is called

Correct : C. choke

39. In the slow-start algorithm, the size of the congestion window increases                       until it reaches a threshold.

Correct : A. exponentially

40. Which is not a application layer protocol?

Correct : D. tcp

41. The packet of information at the application layer is called

Correct : B. message

42. Which one of the following is an architecture paradigms?

Correct : D. both peer-to-peer & client-server

43. Application layer offers                service.

Correct : A. end to end

44. E-mail is

Correct : C. elastic application

45. Pick the odd one out.

Correct : D. interactive games

46. Which of the following is an application layer service?

Correct : D. all of the mentioned

47. Which is a time-sensitive service?

Correct : D. internet telephony

48. Transport services available to applications in one or another form

Correct : D. all of the mentioned

49. Electronic mail uses which Application layer protocol?

Correct : A. smtp

50. RMI stands for?

Correct : D. remote method invocation

51. A remote object is an object whose method can be invoked from another virtual environment.

Correct : A. true

52. A typical                    program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects.

Correct : A. server

53. A typical                      program obtains a remote reference to one or more remote objects on a server and then invokes methods on them.

Correct : B. client

54. The                        layer, which provides the interface that client and server application objects use to interact with each other.

Correct : D. stub/skeleton

55. A layer which is the binary data protocol layer.

Correct : D. transport protocol

56. A middleware layer between the stub skeleton and transport.

Correct : D. remote reference layer

57. An object acting as a gateway for the client side.

Correct : B. stub

58. A gateway for the server side object.

Correct : A. skeleton

59. RMI uses stub and skeleton for communication with the                  object.

Correct : B. remote

60. A piece of icon or image on a web page associated with another webpage is called

Correct : B. hyperlink

61. Dynamic web page

Correct : B. generates on demand by a program or a request from browser

62. What is a web browser?

Correct : D. all of the mentioned

63. Common gateway interface is used to

Correct : A. generate executable files from web content by web server

64. URL stands for

Correct : C. uniform resource locator

65. A web cookie is a small piece of data that is

Correct : A. sent from a website and stored in user’s web browser while a user is browsing a website

66. Which one of the following is not used to generate dynamic web pages?

Correct : D. css

67. What is document object model (DOM)?

Correct : A. convention for representing and interacting with objects in html documents

68. AJAX stands for

Correct : A. asynchronous javascript and xml

69. An alternative to JavaScript on windows platform is

Correct : A. vbscript

70. A DNS client is called

Correct : B. dns resolver

71. Servers handle requests for other domains

Correct : B. by contacting remote dns server

72. DNS database contains

Correct : D. all of the mentioned

73. If a server has no clue about where to find the address for a hostname then

Correct : A. server asks to the root server

74. Which one of the following allows client to update their DNS entry as their IP address change?

Correct : A. dynamic dns

75. Wildcard domain names start with label

Correct : B. *

76. The right to use a domain name is delegated by domain name registers which are accredited by

Correct : D. internet corporation for assigned names and numbers

77. The domain name system is maintained by

Correct : A. distributed database system

78. Which one of the following is not true?

Correct : C. a single hostname may correspond to a single ip address

79. Simple mail transfer protocol (SMTP) utilizes                    as the transport layer protocol for electronic mail transfer.

Correct : A. tcp

80. SMTP connections secured by SSL are known as

Correct : A. smtps

81. SMTP uses which of the following TCP port?

Correct : D. 25

82. Which one of the following protocol is used to receive mail messages?

Correct : D. ftp

83. What is on-demand mail relay (ODMR)?

Correct : B. an smtp extension

84. An SMTP session may not include

Correct : D. one http transaction

85. SMTP defines

Correct : A. message transport

86. Which layer is responsible for process-to- process delivery?

Correct : C. transport layer

87. 6 INTRODUCTION TO PEER TO PEER NETWORKS

Correct : A. client/server

88. Multiple processes on destinations at transport layer are identified by

Correct : B. port number

89. According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?

Correct : D. static ports

90. The combination of an IP address and port number is called as

Correct : A. socket address

91. Which of the following is false with respect to Connectionless service of transport layer protocol?

Correct : B. packets are not delayed

92. In transport layer, Multiplexing is done at

Correct : C. sender site

93. The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as

Correct : D. demultiplexing

94. Number of phases in the handshaking protocol?

Correct : C. 4

95. In the SSL record protocol operation pad_2 is –

Correct : B. is the byte 0x5c repeated 48 times for md5

96. In the SSL record protocol operation pad_1 is –

Correct : D. is the byte 0x36 repeated 48 times for md5

97. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?

Correct : A. server_done

98. Which is the key exchange algorithm used in CipherSuite parameter?

Correct : D. any of the mentioned

99. The certificate message is required for any agreed-on key exchange method except

Correct : B. anonymous diffie-hellman

100. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?

Correct : C. fixed diffie-hellman