Quiznetik
Computer Networks | Set 4
1. Which of the following statements is not applicable for cable internet access?
A. it is a shared broadcast medium
B. it includes hfcs
C. cable modem connects home pc to ethernet port
D. analog signal is converted to digital signal in dslam
Correct : D. analog signal is converted to digital signal in dslam
2. StarBand provides __________
A. ftth internet access
B. cable access
C. telephone access
D. satellite access
Correct : D. satellite access
3. Home Access is provided by __________
A. dsl
B. fttp
C. cable
D. all of the mentioned
Correct : D. all of the mentioned
4. ONT is connected to splitter using _________
A. high speed fibre cable
B. hfc
C. optical cable
D. twisted pair cable
Correct : C. optical cable
5. Which of the following factors affect transmission rate in DSL?
A. the gauge of the twisted-pair line
B. degree of electrical interfernece
C. shadow fading
D. the gauge of the twisted-pair line and degree of electrical interference
Correct : D. the gauge of the twisted-pair line and degree of electrical interference
6. The number of layers in ISO OSI reference model is __________
A. 5
B. 7
C. 6
D. 10
Correct : B. 7
7. Which of the following statements can be associated with OSI model?
A. a structured way to discuss and easier update system components
B. one layer may duplicate lower layer functionality
C. functionality at one layer no way requires information from another layer
D. it is an application specific network model
Correct : C. functionality at one layer no way requires information from another layer
8. OSI stands for __________
A. open system interconnection
B. operating system interface
C. optical service implementation
D. open service internet
Correct : A. open system interconnection
9. The number of layers in ISO OSI reference model is __________
A. 4
B. 5
C. 6
D. 7
Correct : D. 7
10. TCP/IP model does not have ______ layer but OSI model have this layer.
A. session layer
B. transport layer
C. application layer
D. network layer
Correct : A. session layer
11. Which layer is used to link the network support layers and user support layers?
A. session layer
B. data link layer
C. transport layer
D. network layer
Correct : C. transport layer
12. Which address is used on the internet for employing the TCP/IP protocols?
A. physical address and logical address
B. port address
C. specific address
D. all of the mentioned
Correct : D. all of the mentioned
13. TCP/IP model was developed _____ the OSI model.
A. prior to
B. after
C. simultaneous to
D. with no link to
Correct : A. prior to
14. Which address is used to identify a process on a host by the transport layer?
A. physical address
B. logical address
C. port address
D. specific address
Correct : C. port address
15. Which layer provides the services to user?
A. application layer
B. session layer
C. presentation layer
D. physical layer
Correct : A. application layer
16. Transmission data rate is decided by ____________
A. network layer
B. physical layer
C. data link layer
D. transport layer
Correct : B. physical layer
17. Which transmission media provides the highest transmission speed in a network?
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Correct : C. optical fiber
18. A single channel is shared by multiple signals by ____________
A. analog modulation
B. digital modulation
C. multiplexing
D. phase modulation
Correct : C. multiplexing
19. Which of the following tasks is not done by data link layer?
A. framing
B. error control
C. flow control
D. channel coding
Correct : D. channel coding
20. Header of a frame generally contains ______________
A. synchronization bytes
B. addresses
C. frame identifier
D. all of the mentioned
Correct : D. all of the mentioned
21. Automatic repeat request error management mechanism is provided by ________
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. application access control sublayer
Correct : A. logical link control sublayer
22. CRC stands for __________
A. cyclic redundancy check
B. code repeat check
C. code redundancy check
D. cyclic repeat check
Correct : A. cyclic redundancy check
23. Which of the following is a data link protocol?
A. ethernet
B. point to point protocol
C. hdlc
D. all of the mentioned
Correct : D. all of the mentioned
24. Which of the following is the multiple access protocol for channel access control?
A. csma/cd
B. csma/ca
C. both csma/cd & csma/ca
D. hdlc
Correct : C. both csma/cd & csma/ca
25. A 4 byte IP address consists of __________
A. only network address
B. only host address
C. network address & host address
D. network address & mac address
Correct : C. network address & host address
26. User datagram protocol is called connectionless because _____________
A. all udp packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. it is received in the same order as sent order
D. it sends data very quickly
Correct : A. all udp packets are treated independently by transport layer
27. Socket-style API for windows is called ____________
A. wsock
B. winsock
C. wins
D. sockwi
Correct : B. winsock
28. _______ topology requires a multipoint connection.
A. star
B. mesh
C. ring
D. bus
Correct : D. bus
29. WAN stands for __________
A. world area network
B. wide area network
C. web area network
D. web access network
Correct : B. wide area network
30. In TDM, slots are further divided into __________
A. seconds
B. frames
C. packets
D. bits
Correct : B. frames
31. The sharing of a medium and its link by two or more devices is called _________
A. fully duplexing
B. multiplexing
C. micropleixng
D. duplexing
Correct : B. multiplexing
32. Multiplexing is used in _______
A. packet switching
B. circuit switching
C. data switching
D. packet & circuit switching
Correct : B. circuit switching
33. Which multiplexing technique used to transmit digital signals?
A. fdm
B. tdm
C. wdm
D. fdm & wdm
Correct : B. tdm
34. The state when dedicated signals are idle are called __________
A. death period
B. poison period
C. silent period
D. stop period
Correct : C. silent period
35. Multiplexing provides _________
A. efficiency
B. privacy
C. anti jamming
D. both efficiency & privacy
Correct : D. both efficiency & privacy
36. In TDM, slots are further divided into _________
A. seconds
B. frames
C. packets
D. bits
Correct : B. frames
37. The total nodal delay is given by ____________
A. dnodal = dproc – dqueue + dtrans + dprop
B. dnodal = dproc + dtrans – dqueue
C. dnodal = dproc + dqueue + dtrans + dprop
D. dnodal = dproc + dqueue – dtrans – dprop
Correct : C. dnodal = dproc + dqueue + dtrans + dprop
38. Transmission delay does not depend on _____________
A. packet length
B. distance between the routers
C. transmission rate
D. bandwidth of medium
Correct : B. distance between the routers
39. Propagation delay depends on ___________
A. packet length
B. transmission rate
C. distance between the routers
D. speed of the cpu
Correct : C. distance between the routers
40. _____________ allows LAN users to share computer programs and data.
A. communication server
B. print server
C. file server
D. network
Correct : C. file server
41. With respect to physical media, STP cables stands for _________
A. shielded twisted pair cable
B. spanning tree protocol cable
C. static transport protocol cable
D. shielded two power cable
Correct : A. shielded twisted pair cable
42. What is the max length of the Shielded twisted pair cable?
A. 100 ft
B. 200 ft
C. 100 m
D. 200 m
Correct : C. 100 m
43. What is the max data transfer rate of STP cables?
A. 10 mbps
B. 100 mbps
C. 1000 mbps
D. 10000 mbps
Correct : B. 100 mbps
44. Which connector does the STP cable use?
A. bnc
B. rj-11
C. rj-45
D. rj-69
Correct : C. rj-45
45. What is the central device in star topology?
A. stp server
B. hub/switch
C. pdc
D. router
Correct : B. hub/switch
46. What is the max data transfer rate for optical fiber cable?
A. 10 mbps
B. 100 mbps
C. 1000 mbps
D. 10000 mbps
Correct : D. 10000 mbps
47. Which of the following architecture uses the CSMA/CD access method?
A. arc net
B. ethernet
C. router
D. stp server
Correct : B. ethernet
48. The attacker using a network of compromised devices is known as _____________
A. internet
B. botnet
C. telnet
D. d-net
Correct : B. botnet
49. Which of the following is a form of DoS attack?
A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Correct : D. all of the mentioned
50. Packet sniffers involve ____________
A. active receiver
B. passive receiver
C. legal receiver
D. partially-active receiver
Correct : B. passive receiver
51. Sniffers can be prevented by using _______________
A. wired environment
B. wifi
C. ethernet lan
D. switched network
Correct : D. switched network
52. Firewalls are often configured to block ___________
A. udp traffic
B. tcp traffic
C. sensitive traffic
D. best-effort traffic
Correct : A. udp traffic
53. UTP is commonly used in __________
A. dsl
B. fttp
C. http
D. none of the mentioned
Correct : A. dsl
54. Terrestrial radio channels are broadly classifed into _____ groups.
A. 2
B. 3
C. 4
D. 1
Correct : B. 3
55. A local telephone network is an example of a _______ network.
A. packet switched
B. circuit switched
C. bit switched
D. line switched
Correct : B. circuit switched
56. Most packet switches use this principle ____________
A. stop and wait
B. store and forward
C. store and wait
D. stop and forward
Correct : B. store and forward
57. What are the Methods to move data through a network of links and switches?
A. packet switching and line switching
B. circuit switching and line switching
C. line switching and bit switching
D. packet switching and circuit switching
Correct : D. packet switching and circuit switching
58. In _________ systems, resources are allocated on demand.
A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Correct : A. packet switching
59. Which of the following is not an application layer service?
A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. error control
Correct : D. error control
60. Which is not a application layer protocol?
A. http
B. smtp
C. ftp
D. tcp
Correct : D. tcp
61. The packet of information at the application layer is called __________
A. packet
B. message
C. segment
D. frame
Correct : B. message
62. Which one of the following is an architecture paradigms?
A. peer to peer
B. client-server
C. http
D. both peer-to-peer & client-server
Correct : D. both peer-to-peer & client-server
63. Application layer offers _______ service.
A. end to end
B. process to process
C. both end to end and process to process
D. none of the mentioned
Correct : A. end to end
64. E-mail is _________
A. loss-tolerant application
B. bandwidth-sensitive application
C. elastic application
D. none of the mentioned
Correct : C. elastic application
65. Pick the odd one out.
A. file transfer
B. file download
C. e-mail
D. interactive games
Correct : D. interactive games
66. Which of the following is an application layer service?
A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. all of the mentioned
Correct : D. all of the mentioned
67. Which is a time-sensitive service?
A. file transfer
B. file download
C. e-mail
D. internet telephony
Correct : D. internet telephony
68. Transport services available to applications in one or another form _________
A. reliable data transfer
B. timing
C. security
D. all of the mentioned
Correct : D. all of the mentioned
69. Electronic mail uses which Application layer protocol?
A. smtp
B. http
C. ftp
D. sip
Correct : A. smtp
70. The ____________ translates internet domain and host names to IP address.
A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Correct : A. domain name system
71. Application layer protocol defines ____________
A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of the mentioned
Correct : D. all of the mentioned
72. When displaying a web page, the application layer uses the _____________
A. http protocol
B. ftp protocol
C. smtp protocol
D. tcp protocol
Correct : A. http protocol
73. The default connection type used by HTTP is _________
A. persistent
B. non-persistent
C. can be either persistent or non-persistent depending on connection request
D. none of the mentioned
Correct : A. persistent
74. The HTTP request message is sent in _________ part of three-way handshake.
A. first
B. second
C. third
D. fourth
Correct : C. third
75. The first line of HTTP request message is called _____________
A. request line
B. header line
C. status line
D. entity line
Correct : A. request line
76. The __________ method when used in the method field, leaves entity body empty.
A. post
B. send
C. get
D. put
Correct : C. get
77. Which of the following is not correct?
A. web cache doesnt has its own disk space
B. web cache can act both like server and client
C. web cache might reduce the response time
D. web cache contains copies of recently requested objects
Correct : A. web cache doesnt has its own disk space
78. HTTP is ________ protocol.
A. application layer
B. transport layer
C. network layer
D. data link layer
Correct : A. application layer
79. In the network HTTP resources are located by
A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Correct : A. uniform resource identifier
80. FTP server listens for connection on port number ____________
A. 20
B. 21
C. 22
D. 23
Correct : B. 21
81. The File Transfer Protocol is built on ______________
A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Correct : C. client server architecture
82. In File Transfer Protocol, data transfer cannot be done in ___________
A. stream mode
B. block mode
C. compressed mode
D. message mode
Correct : D. message mode
83. Expansion of FTP is __________
A. fine transfer protocol
B. file transfer protocol
C. first transfer protocol
D. fast transfer protocol
Correct : B. file transfer protocol
84. FTP is built on _____ architecture.
A. client-server
B. p2p
C. data centric
D. service oriented
Correct : A. client-server
85. FTP uses _________ parallel TCP connections to transfer a file.
A. 1
B. 2
C. 3
D. 4
Correct : B. 2
86. Identify the incorrect statement regarding FTP.
A. ftp stands for file transfer protocol
B. ftp uses two parallel tcp connections
C. ftp sends its control information in-band
D. ftp sends exactly one file over the data connection
Correct : C. ftp sends its control information in-band
87. FTP server _____________
A. maintains state information
B. is stateless
C. has single tcp connection for a file transfer
D. has udp connection for file transfer
Correct : A. maintains state information
88. Find the FTP reply whose message is wrongly matched.
A. 331 – username ok, password required
B. 425 – can’t open data connection
C. 452 – error writing file
D. 452 – can’t open data connection
Correct : D. 452 – can’t open data connection
89. The password is sent to the server using ________ command
A. passwd
B. pass
C. password
D. pword
Correct : B. pass
90. When the mail server sends mail to other mail servers it becomes ____________
A. smtp server
B. smtp client
C. peer
D. master
Correct : B. smtp client
91. If you have to send multimedia data over SMTP it has to be encoded into _______
A. binary
B. signal
C. ascii
D. hash
Correct : C. ascii
92. The underlying Transport layer protocol used by SMTP is ________
A. tcp
B. udp
C. either tcp or udp
D. imap
Correct : A. tcp
93. Choose the statement which is wrong incase of SMTP?
A. it requires message to be in 7bit ascii format
B. it is a pull protocol
C. it transfers files from one mail server to another mail server
D. smtp is responsible for the transmission of the mail through the internet
Correct : B. it is a pull protocol
94. Internet mail places each object in _________
A. separate messages for each object
B. one message
C. varies with number of objects
D. multiple messages for each object
Correct : B. one message
95. Typically the TCP port used by SMTP is _________
A. 25
B. 35
C. 50
D. 15
Correct : A. 25
96. A session may include ________
A. zero or more smtp transactions
B. exactly one smtp transactions
C. always more than one smtp transactions
D. number of smtp transactions cant be determined
Correct : A. zero or more smtp transactions
97. Which of the following is an example of user agents for e-mail?
A. microsoft outlook
B. facebook
C. google
D. tumblr
Correct : A. microsoft outlook
98. User agent does not support this ___________
A. composing messages
B. reading messages
C. replying messages
D. routing messages
Correct : D. routing messages
99. SMTP connections secured by SSL are known as _____________
A. smtps
B. ssmtp
C. snmp
D. starttls
Correct : A. smtps
100. SMTP uses which of the following TCP port?
A. 22
B. 23
C. 21
D. 25
Correct : D. 25