Quiznetik

Data Communication and Networking | Set 2

1. Layer 2 from bottom in TCP/IP is the ___________.

Correct : D. Internet layer

2. IP address___________ the physical address.

Correct : B. has no relation with

3. IP makes a __________ of datagram delivery.

Correct : C. best effort

4. The _________ for all computers on the same physical network is the same.

Correct : D. n/w-id

5. In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table.

Correct : D. default

6. In _______ forwarding, the destination address is a network address in the routing table.

Correct : B. network-specific

7. In _______ forwarding, the routing table holds the address of just the next hop instead of complete route information.

Correct : A. next-hop

8. The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________.

Correct : B. classless addressing

9. The principle of ________ states that the routing table is sorted from the longest mask to the shortest mask.

Correct : C. longest mask matching

10. The use of hierarchy in routing tables can ________ the size of the routing tables.

Correct : A. reduce

11. An ARP reply is normally _______.

Correct : C. unicast

12. An ARP request is normally _______.

Correct : A. broadcast

13. A technique called ______ is used to create a subnetting effect.

Correct : C. proxy ARP

14. A _______ is an ARP that acts on behalf of a set of hosts.

Correct : C. proxy ARP

15. ICMP is a _________ layer protocol.

Correct : C. network

16. ICMP messages are divided into two broad categories: _____________.

Correct : A. query and error reporting messages

17. An ICMP message has _____ header and a variable-size data section.

Correct : C. an 8-byte

18. Which of the following is true about ICMP messages?

Correct : D. none is true

19. Which of the following is true about ICMP messages?

Correct : B. An ICMP error message may be generated only for the first fragment.

20. IGMP is a companion to the ______ protocol.

Correct : D. None of the above

21. IGMP is _______ protocol.

Correct : B. a group management

22. The number of addresses in a class A block is _______.

Correct : B. 16,777,216

23. The number of addresses assigned to an organization in classless addressing _______.

Correct : C. must be a power of 2

24. The first address assigned to an organization in classless addressing _______.

Correct : B. must be evenly divisible by the number of addresses

25. Which address could be the beginning address of a block of 32 classless addresses?

Correct : C. 2.4.6.64

26. A ________ is a local address. Its jurisdiction is over a local network.

Correct : A. physical

27. If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.

Correct : A. the destination IP address in the datagram header

28. If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.

Correct : B. the IP address of the router found in the routing table

29. The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.

Correct : B. the IP address of the router found in the routing table

30. The sender is a router that has received a datagram destined for a host on the same network. The logical address that must be mapped to a physical address is ______.

Correct : A. the destination IP address in the datagram header

31. Which one of the following is not a function of network layer?

Correct : D. none of the above

32. The 4 byte IP address consists of

Correct : C. both (a) and (b)

33. In virtual circuit network each packet contains

Correct : B. a short VC number

34. Which one of the following routing algorithm can be used for network layer design?

Correct : D. all of the above

35. Multi-destination routing

Correct : C. data is not sent by packets

36. A subset of a network that includes all the routers but contains no loops is called

Correct : A. spanning tree

37. Which one of the following algorithm is not used for congestion control?

Correct : D. none

38. The network layer protocol of internet is

Correct : B. internet protocol

39. ICMP is primarily used for

Correct : A. error and diagnostic functions

40. The PDU of network layer is

Correct : C. packets

41. Which of the following is a wrong example of network layer?

Correct : D. X.25 level 2-ISO

42. For data communications to occur, the communicating devices must be part of a communication system made up of a combination of?

Correct : B. Hardware and software

43. Time required for a message to travel from one device to another is known as:

Correct : A. Transit time

44. Which network is a cross between circuits switched network and a data-gram network?

Correct : B. Virtual-circuit network

45. Switching at the network layer in the Internet uses the datagram approach to:

Correct : D. Packet switching

46. Which is also known as a connectionless protocol for a packet-switching network that uses the Datagram approach?

Correct : B. IPV4

47. Which switch is a multistage switch with micro switches at each stage that route the packets based on the output port represented as a binary string?

Correct : A. Banyan switch

48. In Address Resolution Protocol (ARP), a packet is encapsulated directly into a

Correct : D. Data link Frame

49. Subnetting is actually

Correct : B. sub division of networks

50. Packets in IPv4 layer are called

Correct : A. datagrams

51. Transport layer protocols are useful for ensuring ______________ delivery.

Correct : A. H-2-H

52. _______________is a reliable delivery mechanism.

Correct : B. TCP

53. Transport layer is _____________ the data link layer.

Correct : A. Above

54. When a packet is lost in transit, it should be handled by _____________.

Correct : A. Sequence control

55. Internet is

Correct : D. a worldwide interconnected network of computers which use a common protocol

56. World Wide Web

Correct : C. a collection of linked information residing on computers connected by the internet

57. HTML tags define

Correct : B. Presentation of specified elements of a document

58. One of the responsibilities of the transport layer protocol is to create a ______ communication.

Correct : B. process-to-process

59. UDP is called a ________________transport protocol.

Correct : C. connectionless, unreliable

60. UDP does not add anything to the services of IP except for providing _______ communication.

Correct : B. process-to-process

61. UDP is an acronym for _______.

Correct : C. User Datagram Protocol

62. Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.

Correct : A. client-server

63. The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.

Correct : C. port addresses

64. The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.

Correct : C. dynamic

65. In the sending computer, UDP receives a data unit from the _______ layer.

Correct : A. application

66. In the sending computer, UDP sends a data unit to the _______ layer.

Correct : C. IP

67. UDP and TCP are both _______ layer protocols.

Correct : C. transport

68. Which of the following functions does UDP perform?

Correct : A. process-to-process communication

69. When the IP layer of a receiving host receives a datagram, _______.

Correct : B. a transport layer protocol takes over

70. UDP needs the _______ address to deliver the user datagram to the correct application process.

Correct : A. port

71. A port address in UDP is _______bits long.

Correct : B. 16

72. Which of the following does UDP guarantee?

Correct : D. none of the above

73. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

Correct : C. authentication

74. _________ means that a sender must not be able to deny sending a message that he sent.

Correct : D. Non-repudiation

75. ________ means to prove the identity of the entity that tries to access the system's resources.

Correct : B. Entity authentication

76. A(n) _________ can be used to preserve the integrity of a document or a message.

Correct : A. message digest

77. A(n) ________function creates a message digest out of a message.

Correct : C. hash

78. A hash function must meet ________ criteria.

Correct : B. three

79. Challenge-response authentication can be done using ________.

Correct : D. all of the above

80. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.

Correct : A. KDC

81. The _____________ translates internet domain and host names to IP address.

Correct : A. domain name system

82. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?

Correct : C. telnet

83. Application layer protocol defines

Correct : D. all of the above

84. Which one of the following protocol delivers/stores mail to reciever server?

Correct : A. simple mail transfer protocol

85. Which one of the following is an internet standard protocol for managing devices on IP network?

Correct : B. simple network management protocol

86. User datagram protocol is called connectionless because

Correct : A. all UDP packets are treated independently by transport layer

87. Transmission control protocol is

Correct : D. all of the above

88. An endpoint of an inter-process communication flow across a computer network is called

Correct : A. socket

89. Transport layer aggregates data from different applications into a single stream before passing it to

Correct : A. network layer

90. The ASCII encoding of binary data is called

Correct : A. base 64 encoding

91. A high speed communication equipment typically would not be needed for

Correct : A. E-mail

92. What is Unicode?

Correct : A. Represents symbol or characters used in any langua

93. In OSI model dialogue control and token management are responsibilities of ?

Correct : A. Session Layer

94. An asymmetric-key (or public-key) cipher uses

Correct : B. 2 Key

95. A straight permutation cipher or a straight P-box has same number of inputs as

Correct : C. Outputs

96. Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not

Correct : A. Authenticated

97. We use Cryptography term to transforming messages to make them secure and immune to

Correct : C. Attacks

98. Shift cipher is sometimes referred to as the

Correct : A. Caesar cipher

99. Substitutional cipers are

Correct : D. both a and c

100. Heart of Data Encryption Standard (DES), is the

Correct : D. DES function