1. Which of the following is not a type of OSPF packet?
Correct : C. link-state response
2. In OSPF header, which field is used to detect errors in the packet?
Correct : D. checksum
3. In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to
Correct : A. 1
4. In OSPF database descriptor packet, which field is used to indicate that the router is master?
Correct : B. ms
5. In OSPF database descriptor packet, which field is used to detect a missing packet?
Correct : C. database descriptor sequence number
6. The size of an IP address in IPv6 is
Correct : B. 128 bits
7. The header length of an IPv6 datagram is
Correct : D. 40bytes
8. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
Correct : C. tos field
9. IPv6 does not use type of address.
Correct : A. broadcast
10. Which among the following features is
Correct : A. hop limit
11. Dual-stack approach refers to
Correct : C. node has both ipv4 and ipv6 support
12. The field determines the lifetime of IPv6 datagram
Correct : B. tunneling
13. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
Correct : A. 96 to 127
14. An endpoint of an inter-process communication flow across a computer network is called
Correct : A. socket
15. Which one of the following is a version of UDP with congestion control?
Correct : A. datagram congestion control protocol
16. Which of the following is a transport layer protocol?
Correct : A. stream control transmission protocol
17. 2 USER DATAGRAM PROTOCOLS (UDP)
Correct : A. connection-oriented
18. Return value of the UDP port “Chargen” is
Correct : A. string of characters
19. Beyond IP, UDP provides additional services such as
Correct : D. demultiplexing and error checking
20. What is the main advantage of UDP?
Correct : C. low overhead
21. What is the header size of a UDP packet?
Correct : A. 8 bytes
22. The port number is “ephemeral port number”, if the source host is
Correct : D. client
23. “Total length” field in UDP packet header is the length of
Correct : D. udp header plus data
24. Which is the correct expression for the length of UDP datagram?
Correct : A. udp length = ip length – ip header’s length
25. The field is used to detect errors over the entire user datagram.
Correct : B. checksum
26. Which of the following is false with respect to TCP?
Correct : D. unreliable
27. In TCP, sending and receiving data is done as
Correct : A. stream of bytes
28. TCP groups a number of bytes together into a packet called
Correct : C. segment
29. Communication offered by TCP is
Correct : A. full-duplex
30. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?
Correct : B. 10001
31. Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a
Correct : D. sequence of zero’s and one’s
32. The value of acknowledgement field in a segment defines
Correct : C. sequence number of the next byte to be received
33. Two broad categories of congestion control are
Correct : A. open-loop and closed-loop
34. Retransmission of packets must not be done when
Correct : D. packet is error-free
35. In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends
Correct : B. only those packets which are lost or corrupted
36. Closed-Loop control mechanisms try to
Correct : A. remove after congestion occurs
37. The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as
Correct : B. backpressure
38. The packet sent by a node to the source to inform it of congestion is called
Correct : C. choke
39. In the slow-start algorithm, the size of the congestion window increases until it reaches a threshold.
Correct : A. exponentially
40. Which is not a application layer protocol?
Correct : D. tcp
41. The packet of information at the application layer is called
Correct : B. message
42. Which one of the following is an architecture paradigms?
Correct : D. both peer-to-peer & client-server
43. Application layer offers service.
Correct : A. end to end
44. E-mail is
Correct : C. elastic application
45. Pick the odd one out.
Correct : D. interactive games
46. Which of the following is an application layer service?
Correct : D. all of the mentioned
47. Which is a time-sensitive service?
Correct : D. internet telephony
48. Transport services available to applications in one or another form
Correct : D. all of the mentioned
49. Electronic mail uses which Application layer protocol?
Correct : A. smtp
50. RMI stands for?
Correct : D. remote method invocation
51. A remote object is an object whose method can be invoked from another virtual environment.
Correct : A. true
52. A typical program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects.
Correct : A. server
53. A typical program obtains a remote reference to one or more remote objects on a server and then invokes methods on them.
Correct : B. client
54. The layer, which provides the interface that client and server application objects use to interact with each other.
Correct : D. stub/skeleton
55. A layer which is the binary data protocol layer.
Correct : D. transport protocol
56. A middleware layer between the stub skeleton and transport.
Correct : D. remote reference layer
57. An object acting as a gateway for the client side.
Correct : B. stub
58. A gateway for the server side object.
Correct : A. skeleton
59. RMI uses stub and skeleton for communication with the object.
Correct : B. remote
60. A piece of icon or image on a web page associated with another webpage is called
Correct : B. hyperlink
61. Dynamic web page
Correct : B. generates on demand by a program or a request from browser
62. What is a web browser?
Correct : D. all of the mentioned
63. Common gateway interface is used to
Correct : A. generate executable files from web content by web server
64. URL stands for
Correct : C. uniform resource locator
65. A web cookie is a small piece of data that is
Correct : A. sent from a website and stored in user’s web browser while a user is browsing a website
66. Which one of the following is not used to generate dynamic web pages?
Correct : D. css
67. What is document object model (DOM)?
Correct : A. convention for representing and interacting with objects in html documents
68. AJAX stands for
Correct : A. asynchronous javascript and xml
69. An alternative to JavaScript on windows platform is
Correct : A. vbscript
70. A DNS client is called
Correct : B. dns resolver
71. Servers handle requests for other domains
Correct : B. by contacting remote dns server
72. DNS database contains
Correct : D. all of the mentioned
73. If a server has no clue about where to find the address for a hostname then
Correct : A. server asks to the root server
74. Which one of the following allows client to update their DNS entry as their IP address change?
Correct : A. dynamic dns
75. Wildcard domain names start with label
Correct : B. *
76. The right to use a domain name is delegated by domain name registers which are accredited by
Correct : D. internet corporation for assigned names and numbers
77. The domain name system is maintained by
Correct : A. distributed database system
78. Which one of the following is not true?
Correct : C. a single hostname may correspond to a single ip address
79. Simple mail transfer protocol (SMTP) utilizes as the transport layer protocol for electronic mail transfer.
Correct : A. tcp
80. SMTP connections secured by SSL are known as
Correct : A. smtps
81. SMTP uses which of the following TCP port?
Correct : D. 25
82. Which one of the following protocol is used to receive mail messages?
Correct : D. ftp
83. What is on-demand mail relay (ODMR)?
Correct : B. an smtp extension
84. An SMTP session may not include
Correct : D. one http transaction
85. SMTP defines
Correct : A. message transport
86. Which layer is responsible for process-to- process delivery?
Correct : C. transport layer
87. 6 INTRODUCTION TO PEER TO PEER NETWORKS
Correct : A. client/server
88. Multiple processes on destinations at transport layer are identified by
Correct : B. port number
89. According to Internet Assigned Numbers Authority (IANA), which of the following ranges is not a part of port number ranges?
Correct : D. static ports
90. The combination of an IP address and port number is called as
Correct : A. socket address
91. Which of the following is false with respect to Connectionless service of transport layer protocol?
Correct : B. packets are not delayed
92. In transport layer, Multiplexing is done at
Correct : C. sender site
93. The process of error checking and dropping of the header, delivering messages to appropriate process based on port number is called as
Correct : D. demultiplexing
94. Number of phases in the handshaking protocol?
Correct : C. 4
95. In the SSL record protocol operation pad_2 is –
Correct : B. is the byte 0x5c repeated 48 times for md5
96. In the SSL record protocol operation pad_1 is –
Correct : D. is the byte 0x36 repeated 48 times for md5
97. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
Correct : A. server_done
98. Which is the key exchange algorithm used in CipherSuite parameter?
Correct : D. any of the mentioned
99. The certificate message is required for any agreed-on key exchange method except
Correct : B. anonymous diffie-hellman
100. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?