Quiznetik
Computer Networks | Set 5
1. Which one of the following protocol is used to receive mail messages?
A. smtp
B. post office protocol (pop)
C. internet message access protocol (imap)
D. ftp
Correct : D. ftp
2. What is on-demand mail relay (ODMR)?
A. protocol for smtp security
B. an smtp extension
C. protocol for web pages
D. protocol for faster mail transfer
Correct : B. an smtp extension
3. An email client needs to know the _________ of its initial SMTP server.
A. ip address
B. mac address
C. url
D. name
Correct : A. ip address
4. An SMTP session may not include _______
A. zero smtp transaction
B. one smtp transaction
C. more than one smtp transaction
D. one http transaction
Correct : D. one http transaction
5. SMTP defines _______
A. message transport
B. message encryption
C. message content
D. message password
Correct : A. message transport
6. SMTP is not used to deliver messages to ______
A. user’s terminal
B. user’s mailbox
C. user’s word processor
D. user’s email client
Correct : C. user’s word processor
7. The entire hostname has a maximum of ___________
A. 255 characters
B. 127 characters
C. 63 characters
D. 31 characters
Correct : A. 255 characters
8. A DNS client is called _________
A. dns updater
B. dns resolver
C. dns handler
D. none of the mentioned
Correct : B. dns resolver
9. Servers handle requests for other domains _______
A. directly
B. by contacting remote dns server
C. it is not possible
D. none of the mentioned
Correct : B. by contacting remote dns server
10. DNS database contains _______
A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Correct : D. all of the mentioned
11. If a server has no clue about where to find the address for a hostname then _______
A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Correct : A. server asks to the root server
12. Wildcard domain names start with label _______
A. @
B. *
C. &
D. #
Correct : B. *
13. The domain name system is maintained by _______
A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Correct : A. distributed database system
14. Secure shell (SSH) network protocol is used for __________
A. secure data communication
B. remote command-line login
C. remote command execution
D. all of the mentioned
Correct : D. all of the mentioned
15. SSH can be used in only _____________
A. unix-like operating systems
B. windows
C. both unix-like and windows systems
D. none of the mentioned
Correct : C. both unix-like and windows systems
16. SSH uses ___________ to authenticate the remote computer.
A. public-key cryptography
B. private-key cryptography
C. any of public-key or private-key
D. both public-key & private-key
Correct : A. public-key cryptography
17. Which standard TCP port is assigned for contacting SSH servers?
A. port 21
B. port 22
C. port 23
D. port 24
Correct : B. port 22
18. Which one of the following is a file transfer protocol using SSH?
A. scp
B. sftp
C. rsync
D. all of the mentioned
Correct : D. all of the mentioned
19. SSH-2 does not contain ______________
A. transport layer
B. user authentication layer
C. physical layer
D. connection layer
Correct : C. physical layer
20. Which one of the following feature was present in SSH protocol, version 1?
A. password changing
B. periodic replacement of session keys
C. support for public-key certificates
D. none of the mentioned
Correct : D. none of the mentioned
21. SCP protocol is evolved from __________ over SSH.
A. rcp protocol
B. dhcp protocol
C. mgcp protocol
D. gcp protocol
Correct : A. rcp protocol
22. Which one of the following authentication method is used by SSH?
A. public-key
B. host based
C. password
D. all of the mentioned
Correct : D. all of the mentioned
23. DHCP (dynamic host configuration protocol) provides __________ to the client.
A. ip address
B. mac address
C. url
D. none of the mentioned
Correct : A. ip address
24. DHCP is used for ________
A. ipv6
B. ipv4
C. both ipv6 and ipv4
D. none of the mentioned
Correct : C. both ipv6 and ipv4
25. The DHCP server _________
A. maintains a database of available ip addresses
B. maintains the information about client configuration parameters
C. grants a ip address when receives a request from a client
D. all of the mentioned
Correct : D. all of the mentioned
26. IP assigned for a client by DHCP server is
A. for a limited period
B. for an unlimited period
C. not time dependent
D. none of the mentioned
Correct : A. for a limited period
27. DHCP uses UDP port _________ for sending data to the server.
A. 66
B. 67
C. 68
D. 69
Correct : B. 67
28. DHCP client and servers on the same subnet communicate via _________
A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
Correct : A. udp broadcast
29. WPA2 is used for security in _______
A. ethernet
B. bluetooth
C. wi-fi
D. email
Correct : C. wi-fi
30. VPNs are financially speaking __________
A. always more expensive than leased lines
B. always cheaper than leased lines
C. usually cheaper than leased lines
D. usually more expensive than leased lines
Correct : C. usually cheaper than leased lines
31. Storage management comprises of _______________
A. san management
B. data protection
C. disk operation
D. all of the mentioned
Correct : D. all of the mentioned
32. Which of the following is not a storage device?
A. switch
B. raid arrays
C. tape drives
D. hub
Correct : D. hub
33. Which protocols are used for Storage management?
A. snmp
B. ldap
C. pop3
D. mib
Correct : A. snmp
34. How do Storage administrators ensure secure access to storage devices?
A. by using zoning
B. by putting a physical lock on the storage device
C. by keeping devices shutdown when not in use
D. by keeping devices when used
Correct : A. by using zoning
35. Effective Storage management does not include __________
A. security
B. backups
C. reporting
D. connection
Correct : D. connection
36. SMI-S Standard uses which of the following?
A. java rmi
B. cim-xml/http
C. corba
D. .net
Correct : B. cim-xml/http
37. Full duplex mode increases the capacity of each domain by ________
A. 10 to 20 mbps
B. 20 to 30 mbps
C. 30 to 40 mbps
D. 40 to 50 mbps
Correct : A. 10 to 20 mbps
38. Configuration management can be divided into which two subsystems?
A. reconfiguration and documentation
B. management and configuration
C. documentation and dialing up
D. configuration and dialing up
Correct : A. reconfiguration and documentation
39. To use a Simple Network Management System, we need _______
A. servers
B. ip
C. protocols
D. rules
Correct : D. rules
40. The main difference between SNMPv3 and SNMPv2 is _______
A. management
B. integration
C. classification
D. enhanced security
Correct : D. enhanced security
41. BER stands for ________
A. basic encoding rules
B. basic encoding resolver
C. basic encoding rotator
D. basic encoding router
Correct : A. basic encoding rules
42. SNMP is the framework for managing devices in an internet using the ______
A. tcp/ip protocol
B. udp
C. smtp
D. none
Correct : A. tcp/ip protocol
43. Structure of Management Information (SMI), is the guideline of ________
A. http
B. snmp
C. url
D. mib
Correct : B. snmp
44. The application layer protocol used by a Telnet application is ________
A. telnet
B. ftp
C. http
D. smtp
Correct : A. telnet
45. _______ allows you to connect and login to a remote computer
A. telnet
B. ftp
C. http
D. smtp
Correct : A. telnet
46. Telnet is used for _______
A. television on net
B. network of telephones
C. remote login
D. teleshopping site
Correct : C. remote login
47. Which one of the following is not correct?
A. telnet is a general purpose client-server program
B. telnet lets user access an application on a remote computer
C. telnet can also be used for file transfer
D. telnet can be used for remote login
Correct : C. telnet can also be used for file transfer
48. Which operating mode of telnet is full duplex?
A. default mode
B. server mode
C. line mode
D. character mode
Correct : C. line mode
49. If we want that a character be interpreted by the client instead of server _________
A. interpret as command (iac) escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. cli character has to be used
Correct : A. interpret as command (iac) escape character has to be used
50. Telnet protocol is used to establish a connection to __________
A. tcp port number 21
B. tcp port number 22
C. tcp port number 23
D. tcp port number 25
Correct : C. tcp port number 23
51. Which one of the following is not true?
A. telnet defines a network virtual terminal (nvt) standard
B. client programs interact with nvt
C. server translates nvt operations
D. client can transfer files using to remote server using nvt
Correct : D. client can transfer files using to remote server using nvt
52. All telnet operations are sent as ________
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
Correct : B. 8 bits
53. AbsoluteTelnet is a telnet client for _______ Operating system.
A. windows
B. linux
C. mac
D. ubuntu
Correct : A. windows
54. The decimal code of Interpret as Command (IAC) character is _______
A. 252
B. 253
C. 254
D. 255
Correct : D. 255
55. Which of the following is false with respect to TCP?
A. connection-oriented
B. process-to-process
C. transport layer protocol
D. unreliable
Correct : D. unreliable
56. In TCP, sending and receiving data is done as _______
A. stream of bytes
B. sequence of characters
C. lines of data
D. packets
Correct : A. stream of bytes
57. TCP groups a number of bytes together into a packet called _______
A. packet
B. buffer
C. segment
D. stack
Correct : C. segment
58. Communication offered by TCP is ________
A. full-duplex
B. half-duplex
C. semi-duplex
D. byte by byte
Correct : A. full-duplex
59. The value of acknowledgement field in a segment defines _______
A. sequence number of the byte received previously
B. total number of bytes to receive
C. sequence number of the next byte to be received
D. sequence of zeros and ones
Correct : C. sequence number of the next byte to be received
60. Size of TCP segment header ranges between ___________
A. 16 and 32 bytes
B. 16 and 32 bits
C. 20 and 60 bytes
D. 20 and 60 bits
Correct : C. 20 and 60 bytes
61. Connection establishment in TCP is done by which mechanism?
A. flow control
B. three-way handshaking
C. forwarding
D. synchronization
Correct : B. three-way handshaking
62. SYNC flooding attack belongs to a type of security attack known as ___________
A. sync flooding attack
B. active attack
C. passive attack
D. denial-of-service attack
Correct : D. denial-of-service attack
63. What allows TCP to detect lost segments and in turn recover from that loss?
A. sequence number
B. acknowledgment number
C. checksum
D. both sequence & acknowledgment number
Correct : B. acknowledgment number
64. Which of the following is false with respect to UDP?
A. connection-oriented
B. unreliable
C. transport layer protocol
D. low overhead
Correct : A. connection-oriented
65. Return value of the UDP port “Chargen” is _______
A. string of characters
B. string of integers
C. array of characters with integers
D. array of zero’s and one’s
Correct : A. string of characters
66. Beyond IP, UDP provides additional services such as _______
A. routing and switching
B. sending and receiving of packets
C. multiplexing and demultiplexing
D. demultiplexing and error checking
Correct : D. demultiplexing and error checking
67. What is the main advantage of UDP?
A. more overload
B. reliable
C. low overhead
D. fast
Correct : C. low overhead
68. Port number used by Network Time Protocol (NTP) with UDP is ________
A. 161
B. 123
C. 162
D. 124
Correct : B. 123
69. What is the header size of a UDP packet?
A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Correct : A. 8 bytes
70. The port number is “ephemeral port number”, if the source host is _______
A. ntp
B. echo
C. server
D. client
Correct : D. client
71. “Total length” field in UDP packet header is the length of _________
A. only udp header
B. only data
C. only checksum
D. udp header plus data
Correct : D. udp header plus data
72. Which is the correct expression for the length of UDP datagram?
A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Correct : A. udp length = ip length – ip header’s length
73. The ______ field is used to detect errors over the entire user datagram.
A. udp header
B. checksum
C. source port
D. destination port
Correct : B. checksum
74. IPsec defines two protocols: _______ and ________
A. ah; ssl
B. pgp; esp
C. ah; esp
D. pgp; ssl
Correct : C. ah; esp
75. IP Security operates in which layer of the OSI model?
A. network
B. transport
C. application
D. physical
Correct : A. network
76. ESP does not provide ________
A. source authentication
B. data integrity
C. privacy
D. error control
Correct : D. error control
77. Two broad categories of congestion control are
A. open-loop and closed-loop
B. open-control and closed-control
C. active control and passive control
D. active loop and passive loop
Correct : A. open-loop and closed-loop
78. In open-loop control, policies are applied to __________
A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Correct : C. prevent before congestion occurs
79. Retransmission of packets must not be done when _______
A. packet is lost
B. packet is corrupted
C. packet is needed
D. packet is error-free
Correct : D. packet is error-free
80. Discarding policy is mainly done by _______
A. sender
B. receiver
C. router
D. switch
Correct : C. router
81. Closed-Loop control mechanisms try to _________
A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Correct : A. remove after congestion occurs
82. Backpressure technique can be applied only to _______
A. congestion networks
B. closed circuit networks
C. open circuit networks
D. virtual circuit networks
Correct : D. virtual circuit networks
83. The packet sent by a node to the source to inform it of congestion is called _______
A. explicit
B. discard
C. choke
D. backpressure
Correct : C. choke
84. Which of the following is not a characteristic of Virtual Circuit Network?
A. there are setup and teardown phases in addition to the data transfer phase
B. resources can be allocated during setup phase or on demand
C. all packets follow the same path established during the connection
D. virtual circuit network is implemented in application layer
Correct : D. virtual circuit network is implemented in application layer
85. Which of the following is not a phase of virtual circuit network?
A. setup phase
B. data transfer phase
C. termination phase
D. teardown phase
Correct : C. termination phase
86. Steps required in setup process are ___________
A. setup request and acknowledgement
B. setup request and setup response
C. setup request and setup termination
D. setup and termination steps
Correct : A. setup request and acknowledgement
87. Delay of the resource allocated during setup phase during data transfer is ________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Correct : C. same for each packet
88. Delay of the resource allocated on demand during data transfer is ________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Correct : D. different for each packet
89. In data transfer phase, how many columns does the table contain?
A. 1
B. 2
C. 3
D. 4
Correct : D. 4
90. ATM and frame relay are ________
A. virtual circuit networks
B. datagram networks
C. virtual private networks
D. virtual public networks
Correct : A. virtual circuit networks
91. ATM uses _______________
A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. asynchronous amplitude division multiplexing
Correct : B. asynchronous time division multiplexing
92. ATM standard defines _______ layers.
A. 2
B. 3
C. 4
D. 5
Correct : B. 3
93. ATM can be used for ________
A. local area network
B. wide area network
C. campus area network
D. networks covering any range
Correct : D. networks covering any range
94. An ATM cell has the payload field of __________
A. 32 bytes
B. 48 bytes
C. 64 bytes
D. 128 bytes
Correct : B. 48 bytes
95. Frame relay has error detection at the ______
A. physical layer
B. data link layer
C. network layer
D. transport layer
Correct : B. data link layer
96. Virtual circuit identifier in frame relay is called ______
A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Correct : A. data link connection identifier
97. Frame relay has _______
A. only physical layer
B. only data link layer
C. only network layer
D. both physical and data link layer
Correct : D. both physical and data link layer
98. In frame relay networks, extended address is used _______
A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Correct : A. to increase the range of data link connection identifiers
99. What is FRAD in frame relay network?
A. frad assembles and disassembles the frames coming from other protocols
B. frad is used for modulation and demodulation
C. frad is used for error detection
D. frad is used for error recovery
Correct : A. frad assembles and disassembles the frames coming from other protocols
100. Frame Relay is cheaper than other _____
A. lans
B. wans
C. mans
D. multipoint networks
Correct : B. wans