1. HTTP client requests by establishing a __________ connection to a particular port on the server.
Correct : B. transmission control protocol
2. In HTTP pipelining
Correct : A. multiple http requests are sent on a single tcp connection without waiting for the corresponding responses
3. FTP server listens for connection on port number
Correct : B. 21
4. In FTP protocol, client contacts server using ____ as the transport protocol.
Correct : A. transmission control protocol
5. In which mode FTP, the client initiates both the control and data connections.
Correct : B. passive mode
6. The file transfer protocol is built on
Correct : C. client server architecture
7. In file transfer protocol, data transfer can be done in
Correct : D. all of the mentioned
8. Ethernet frame consists of
Correct : A. mac address
9. What is stat frame delimeter (SFD) in ethernet frame?
Correct : B. 10101011
10. What is autonegotiation?
Correct : A. a procedure by which two connected devices choose common transmission parameters
11. Ethernet in metropolitan area network (MAN) can be used as
Correct : D. all of the mentioned
12. A point-to-point protocol over ethernet is a network protocol for
Correct : A. encapsulating ppp frames inside ethernet frames
13. High speed ethernet works on
Correct : C. optical fiber
14. The maximum size of payload field in ethernet frame is
Correct : D. 1500 bytes
15. What is interframe gap?
Correct : A. idle time between frames
16. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called
Correct : B. run frame
17. Which of this is not a constituent of residential telephone line?
Correct : C. a low-speed downstream channel
18. In DSL telco provides these services
Correct : C. all of the mentioned
19. The function of DSLAM is
Correct : A. convert analog signals into digital signals
20. The following term is not associted with DSL
Correct : D. cmts
21. HFC contains
Correct : C. both of the mentioned
22. Choose the statement which is not applicable for cable internet access
Correct : D. analog signal is converted to digital signal in dslam
23. Among the optical-distribution architectures that is essentially switched ehternet is
Correct : A. aon
24. StarBand provides
Correct : D. satellite access
25. Home Access is provided by
Correct : D. all of the mentioned
26. ONT is connected to splitter using
Correct : C. optical cable
27. The sharing of a medium and its link by two or more devices is called _______
Correct : B. multiplexing
28. Multiplexing is used in _______
Correct : B. circuit switching
29. Which multiplexing technique transmits digital signals ?
Correct : B. tdm
30. If there are n signal sources of same data rate than TDM link has _______ slots
Correct : A. n
31. If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is
Correct : A. 32kbps
32. The state when dedicated signals are idle are called
Correct : C. silent period
33. Multiplexing can provide
Correct : D. both a and b
34. In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources.
Correct : A. greater than
35. In TDM, slots are further divided into
Correct : B. frames
36. Multiplexing technique that shifts each signal to a different carrier frequency
Correct : A. fdm
37. Physical or logical arrangement of network is
Correct : A. topology
38. In this topology there is a central controller or hub
Correct : A. star
39. This topology requires multipoint connection
Correct : D. bus
40. Data communication system spanning states, countries, or the whole world is
Correct : B. wan
41. Data communication system within a building or campus is
Correct : A. lan
42. Expand WAN
Correct : B. wide area network
43. A local telephone network is an example of a _______ network
Correct : B. circuit switched
44. Most packet switches use this principle
Correct : B. store and forward
45. If there are N routers from source to destination, total end to end delay in sending packet P(L->number of bits in the packet R-> transmission rate)
Correct : B. (n*l)/r
46. Method(s) to move data through a network of links and switches
Correct : D. both a and b
47. The resources needed for communication between end systems are reserved for the duration of session between end systems in ________
Correct : B. circuit switching
48. As the resouces are reserved between two communicating end systems in circuit switching, this is achieved
Correct : B. guaranteed constant rate
49. What is internet?
Correct : B. a vast collection of different networks
50. To join the internet, the computer has to be connected to a
Correct : C. internet service provider
51. Internet access by transmitting digital data over the wires of a local telephone network is provided by
Correct : B. digital subscriber line
52. ISP exchanges internet traffic between their networks by
Correct : A. internet exchange point
53. Which one of the following protocol is not used in internet?
Correct : D. none of the mentioned
54. IPv6 addressed have a size of
Correct : C. 128 bits
55. Internet works on
Correct : A. packet switching
56. Which one of the following is not an application layer protocol used in internet?
Correct : C. resource reservation protocol
57. Which protocol assigns IP address to the client connected in the internet?
Correct : A. dhcp
58. Which one of the following is not used in media access control?
Correct : D. none of the mentioned
59. In cryptography, what is cipher?
Correct : A. algorithm for performing encryption and decryption
60. In asymmetric key cryptography, the private key is kept by
Correct : B. receiver
61. Which one of the following algorithm is not used in asymmetric key cryptography?
Correct : C. electronic code book algorithm
62. In cryptography, the order of the letters in a message is rearranged by
Correct : A. transpositional ciphers
63. What is data encryption standard (DES)?
Correct : A. block cipher
64. Cryptanalysis is used
Correct : A. to find some insecurity in a cryptographic scheme
65. Which one of the following is a cryptographic protocol used to secure HTTP connection?
Correct : B. transport layer security (tsl)
66. Voice privacy in GSM cellular telephone protocol is provided by
Correct : A. a5/2 cipher
67. ElGamal encryption system is
Correct : B. asymmetric key encryption algorithm
68. Cryptographic hash function takes an arbitrary block of data and returns
Correct : A. fixed size bit string
69. The attackers a network of compromised devices known as
Correct : B. botnet
70. Which of the following is a form of DoS attack ?
Correct : D. all of the mentioned
71. The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host
Correct : C. connection flooding
72. The DoS attack is which the attacker sends deluge of packets to the targeted host
Correct : B. bandwidth flooding
73. Packet sniffers involve
Correct : B. passive receiver
74. Sniffers can be deployed in
Correct : D. all of the mentioned
75. Firewalls are often configured to block
Correct : A. udp traffic
76. DHCP (dynamic host configuration protocol) provides _____ to the client.
Correct : A. ip address
77. DHCP is used for
Correct : C. both (a) and (b)
78. The DHCP server
Correct : D. all of the mentioned
79. IP assigned for a client by DHCP server is
Correct : A. for a limited period
80. DHCP uses UDP port ____ for sending data to the server.
Correct : B. 67
81. The DHCP server can provide the _______ of the IP addresses.
Correct : D. all of the mentioned
82. DHCP client and servers on the same subnet communicate via
Correct : A. udp broadcast
83. After obtaining the IP address, to prevent the IP conflict the client may use
Correct : C. address resolution protocol
84. What is DHCP snooping?
Correct : A. techniques applied to ensure the security of an existing dhcp infrastructure
85. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.
Correct : C. both (a) and (b)
86. Real-time transport protocol (RTP) is mostly used in
Correct : D. all of the mentioned
87. RTP is used to
Correct : A. carry the media stream
88. RTP provides the facility of jitter ____ .
Correct : A. compensation
89. Which protocol provides the synchronization between media streams?
Correct : B. rtcp
90. An RTP session is established for
Correct : A. each media stream
91. RTP can use
Correct : D. all of the mentioned
92. Which one of the following multimedia formats can not be supported by RTP?
Correct : D. none of the mentioned
93. An RTP header has a minimum size of
Correct : A. 12 bytes
94. Which one of the following is not correct?
Correct : D. none of the mentioned
95. Which protocol defines a profile of RTP that provides cryptographic services for the transfer of payload data?
Correct : A. srtp
96. Ping can
Correct : D. all of the mentioned
97. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is
Correct : B. tunneling
98. Ping sweep is a part of
Correct : B. nmap
99. ICMP is used in
Correct : D. both a and b
100. _____ command is used to manipulate TCP/IP routing table.