Quiznetik

Computer Networks | Set 4

1. Which of the following statements is not applicable for cable internet access?

Correct : D. analog signal is converted to digital signal in dslam

2. StarBand provides __________

Correct : D. satellite access

3. Home Access is provided by __________

Correct : D. all of the mentioned

4. ONT is connected to splitter using _________

Correct : C. optical cable

5. Which of the following factors affect transmission rate in DSL?

Correct : D. the gauge of the twisted-pair line and degree of electrical interference

6. The number of layers in ISO OSI reference model is __________

Correct : B. 7

7. Which of the following statements can be associated with OSI model?

Correct : C. functionality at one layer no way requires information from another layer

8. OSI stands for __________

Correct : A. open system interconnection

9. The number of layers in ISO OSI reference model is __________

Correct : D. 7

10. TCP/IP model does not have ______ layer but OSI model have this layer.

Correct : A. session layer

11. Which layer is used to link the network support layers and user support layers?

Correct : C. transport layer

12. Which address is used on the internet for employing the TCP/IP protocols?

Correct : D. all of the mentioned

13. TCP/IP model was developed _____ the OSI model.

Correct : A. prior to

14. Which address is used to identify a process on a host by the transport layer?

Correct : C. port address

15. Which layer provides the services to user?

Correct : A. application layer

16. Transmission data rate is decided by ____________

Correct : B. physical layer

17. Which transmission media provides the highest transmission speed in a network?

Correct : C. optical fiber

18. A single channel is shared by multiple signals by ____________

Correct : C. multiplexing

19. Which of the following tasks is not done by data link layer?

Correct : D. channel coding

20. Header of a frame generally contains ______________

Correct : D. all of the mentioned

21. Automatic repeat request error management mechanism is provided by ________

Correct : A. logical link control sublayer

22. CRC stands for __________

Correct : A. cyclic redundancy check

23. Which of the following is a data link protocol?

Correct : D. all of the mentioned

24. Which of the following is the multiple access protocol for channel access control?

Correct : C. both csma/cd & csma/ca

25. A 4 byte IP address consists of __________

Correct : C. network address & host address

26. User datagram protocol is called connectionless because _____________

Correct : A. all udp packets are treated independently by transport layer

27. Socket-style API for windows is called ____________

Correct : B. winsock

28. _______ topology requires a multipoint connection.

Correct : D. bus

29. WAN stands for __________

Correct : B. wide area network

30. In TDM, slots are further divided into __________

Correct : B. frames

31. The sharing of a medium and its link by two or more devices is called _________

Correct : B. multiplexing

32. Multiplexing is used in _______

Correct : B. circuit switching

33. Which multiplexing technique used to transmit digital signals?

Correct : B. tdm

34. The state when dedicated signals are idle are called __________

Correct : C. silent period

35. Multiplexing provides _________

Correct : D. both efficiency & privacy

36. In TDM, slots are further divided into _________

Correct : B. frames

37. The total nodal delay is given by ____________

Correct : C. dnodal = dproc + dqueue + dtrans + dprop

38. Transmission delay does not depend on _____________

Correct : B. distance between the routers

39. Propagation delay depends on ___________

Correct : C. distance between the routers

40. _____________ allows LAN users to share computer programs and data.

Correct : C. file server

41. With respect to physical media, STP cables stands for _________

Correct : A. shielded twisted pair cable

42. What is the max length of the Shielded twisted pair cable?

Correct : C. 100 m

43. What is the max data transfer rate of STP cables?

Correct : B. 100 mbps

44. Which connector does the STP cable use?

Correct : C. rj-45

45. What is the central device in star topology?

Correct : B. hub/switch

46. What is the max data transfer rate for optical fiber cable?

Correct : D. 10000 mbps

47. Which of the following architecture uses the CSMA/CD access method?

Correct : B. ethernet

48. The attacker using a network of compromised devices is known as _____________

Correct : B. botnet

49. Which of the following is a form of DoS attack?

Correct : D. all of the mentioned

50. Packet sniffers involve ____________

Correct : B. passive receiver

51. Sniffers can be prevented by using _______________

Correct : D. switched network

52. Firewalls are often configured to block ___________

Correct : A. udp traffic

53. UTP is commonly used in __________

Correct : A. dsl

54. Terrestrial radio channels are broadly classifed into _____ groups.

Correct : B. 3

55. A local telephone network is an example of a _______ network.

Correct : B. circuit switched

56. Most packet switches use this principle ____________

Correct : B. store and forward

57. What are the Methods to move data through a network of links and switches?

Correct : D. packet switching and circuit switching

58. In _________ systems, resources are allocated on demand.

Correct : A. packet switching

59. Which of the following is not an application layer service?

Correct : D. error control

60. Which is not a application layer protocol?

Correct : D. tcp

61. The packet of information at the application layer is called __________

Correct : B. message

62. Which one of the following is an architecture paradigms?

Correct : D. both peer-to-peer & client-server

63. Application layer offers _______ service.

Correct : A. end to end

64. E-mail is _________

Correct : C. elastic application

65. Pick the odd one out.

Correct : D. interactive games

66. Which of the following is an application layer service?

Correct : D. all of the mentioned

67. Which is a time-sensitive service?

Correct : D. internet telephony

68. Transport services available to applications in one or another form _________

Correct : D. all of the mentioned

69. Electronic mail uses which Application layer protocol?

Correct : A. smtp

70. The ____________ translates internet domain and host names to IP address.

Correct : A. domain name system

71. Application layer protocol defines ____________

Correct : D. all of the mentioned

72. When displaying a web page, the application layer uses the _____________

Correct : A. http protocol

73. The default connection type used by HTTP is _________

Correct : A. persistent

74. The HTTP request message is sent in _________ part of three-way handshake.

Correct : C. third

75. The first line of HTTP request message is called _____________

Correct : A. request line

76. The __________ method when used in the method field, leaves entity body empty.

Correct : C. get

77. Which of the following is not correct?

Correct : A. web cache doesnt has its own disk space

78. HTTP is ________ protocol.

Correct : A. application layer

79. In the network HTTP resources are located by

Correct : A. uniform resource identifier

80. FTP server listens for connection on port number ____________

Correct : B. 21

81. The File Transfer Protocol is built on ______________

Correct : C. client server architecture

82. In File Transfer Protocol, data transfer cannot be done in ___________

Correct : D. message mode

83. Expansion of FTP is __________

Correct : B. file transfer protocol

84. FTP is built on _____ architecture.

Correct : A. client-server

85. FTP uses _________ parallel TCP connections to transfer a file.

Correct : B. 2

86. Identify the incorrect statement regarding FTP.

Correct : C. ftp sends its control information in-band

87. FTP server _____________

Correct : A. maintains state information

88. Find the FTP reply whose message is wrongly matched.

Correct : D. 452 – can’t open data connection

89. The password is sent to the server using ________ command

Correct : B. pass

90. When the mail server sends mail to other mail servers it becomes ____________

Correct : B. smtp client

91. If you have to send multimedia data over SMTP it has to be encoded into _______

Correct : C. ascii

92. The underlying Transport layer protocol used by SMTP is ________

Correct : A. tcp

93. Choose the statement which is wrong incase of SMTP?

Correct : B. it is a pull protocol

94. Internet mail places each object in _________

Correct : B. one message

95. Typically the TCP port used by SMTP is _________

Correct : A. 25

96. A session may include ________

Correct : A. zero or more smtp transactions

97. Which of the following is an example of user agents for e-mail?

Correct : A. microsoft outlook

98. User agent does not support this ___________

Correct : D. routing messages

99. SMTP connections secured by SSL are known as _____________

Correct : A. smtps

100. SMTP uses which of the following TCP port?

Correct : D. 25