1. Layer 2 from bottom in TCP/IP is the ___________.
Correct : D. Internet layer
2. IP address___________ the physical address.
Correct : B. has no relation with
3. IP makes a __________ of datagram delivery.
Correct : C. best effort
4. The _________ for all computers on the same physical network is the same.
Correct : D. n/w-id
5. In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table.
Correct : D. default
6. In _______ forwarding, the destination address is a network address in the routing table.
Correct : B. network-specific
7. In _______ forwarding, the routing table holds the address of just the next hop instead of complete route information.
Correct : A. next-hop
8. The idea of address aggregation was designed to alleviate the increase in routing table
entries when using ________.
Correct : B. classless addressing
9. The principle of ________ states that the routing table is sorted from the longest mask to
the shortest mask.
Correct : C. longest mask matching
10. The use of hierarchy in routing tables can ________ the size of the routing tables.
Correct : A. reduce
11. An ARP reply is normally _______.
Correct : C. unicast
12. An ARP request is normally _______.
Correct : A. broadcast
13. A technique called ______ is used to create a subnetting effect.
Correct : C. proxy ARP
14. A _______ is an ARP that acts on behalf of a set of hosts.
Correct : C. proxy ARP
15. ICMP is a _________ layer protocol.
Correct : C. network
16. ICMP messages are divided into two broad categories: _____________.
Correct : A. query and error reporting messages
17. An ICMP message has _____ header and a variable-size data section.
Correct : C. an 8-byte
18. Which of the following is true about ICMP messages?
Correct : D. none is true
19. Which of the following is true about ICMP messages?
Correct : B. An ICMP error message may be generated only for the first fragment.
20. IGMP is a companion to the ______ protocol.
Correct : D. None of the above
21. IGMP is _______ protocol.
Correct : B. a group management
22. The number of addresses in a class A block is _______.
Correct : B. 16,777,216
23. The number of addresses assigned to an organization in classless addressing _______.
Correct : C. must be a power of 2
24. The first address assigned to an organization in classless addressing _______.
Correct : B. must be evenly divisible by the number of addresses
25. Which address could be the beginning address of a block of 32 classless addresses?
Correct : C. 2.4.6.64
26. A ________ is a local address. Its jurisdiction is over a local network.
Correct : A. physical
27. If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
Correct : A. the destination IP address in the datagram header
28. If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
Correct : B. the IP address of the router found in the routing table
29. The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
Correct : B. the IP address of the router found in the routing table
30. The sender is a router that has received a datagram destined for a host on the same network. The logical address that must be mapped to a physical address is ______.
Correct : A. the destination IP address in the datagram header
31. Which one of the following is not a function of network layer?
Correct : D. none of the above
32. The 4 byte IP address consists of
Correct : C. both (a) and (b)
33. In virtual circuit network each packet contains
Correct : B. a short VC number
34. Which one of the following routing algorithm can be used for network layer design?
Correct : D. all of the above
35. Multi-destination routing
Correct : C. data is not sent by packets
36. A subset of a network that includes all the routers but contains no loops is called
Correct : A. spanning tree
37. Which one of the following algorithm is not used for congestion control?
Correct : D. none
38. The network layer protocol of internet is
Correct : B. internet protocol
39. ICMP is primarily used for
Correct : A. error and diagnostic functions
40. The PDU of network layer is
Correct : C. packets
41. Which of the following is a wrong example of network layer?
Correct : D. X.25 level 2-ISO
42. For data communications to occur, the communicating devices must be part of a communication system made up of a combination of?
Correct : B. Hardware and software
43. Time required for a message to travel from one device to another is known as:
Correct : A. Transit time
44. Which network is a cross between circuits switched network and a data-gram network?
Correct : B. Virtual-circuit network
45. Switching at the network layer in the Internet uses the datagram approach to:
Correct : D. Packet switching
46. Which is also known as a connectionless protocol for a packet-switching network that
uses the Datagram approach?
Correct : B. IPV4
47. Which switch is a multistage switch with micro switches at each stage that route the packets based on the output port represented as a binary string?
Correct : A. Banyan switch
48. In Address Resolution Protocol (ARP), a packet is encapsulated directly into a
Correct : D. Data link Frame
49. Subnetting is actually
Correct : B. sub division of networks
50. Packets in IPv4 layer are called
Correct : A. datagrams
51. Transport layer protocols are useful for ensuring ______________ delivery.
Correct : A. H-2-H
52. _______________is a reliable delivery mechanism.
Correct : B. TCP
53. Transport layer is _____________ the data link layer.
Correct : A. Above
54. When a packet is lost in transit, it should be handled by _____________.
Correct : A. Sequence control
55. Internet is
Correct : D. a worldwide interconnected network of computers which use a common protocol
56. World Wide Web
Correct : C. a collection of linked information residing on computers connected by the internet
57. HTML tags define
Correct : B. Presentation of specified elements of a document
58. One of the responsibilities of the transport layer protocol is to create a ______ communication.
Correct : B. process-to-process
59. UDP is called a ________________transport protocol.
Correct : C. connectionless, unreliable
60. UDP does not add anything to the services of IP except for providing _______
communication.
Correct : B. process-to-process
61. UDP is an acronym for _______.
Correct : C. User Datagram Protocol
62. Although there are several ways to achieve process-to-process communication, the most
common is through the __________ paradigm.
Correct : A. client-server
63. The local host and the remote host are defined using IP addresses. To define the
processes, we need second identifiers called ____________.
Correct : C. port addresses
64. The ports ranging from 49,152 to 65,535 can be used as temporary or private port
numbers. They are called the ________ ports.
Correct : C. dynamic
65. In the sending computer, UDP receives a data unit from the _______ layer.
Correct : A. application
66. In the sending computer, UDP sends a data unit to the _______ layer.
Correct : C. IP
67. UDP and TCP are both _______ layer protocols.
Correct : C. transport
68. Which of the following functions does UDP perform?
Correct : A. process-to-process communication
69. When the IP layer of a receiving host receives a datagram, _______.
Correct : B. a transport layer protocol takes over
70. UDP needs the _______ address to deliver the user datagram to the correct application
process.
Correct : A. port
71. A port address in UDP is _______bits long.
Correct : B. 16
72. Which of the following does UDP guarantee?
Correct : D. none of the above
73. Message _______ means that the receiver is ensured that the message is coming from the
intended sender, not an imposter.
Correct : C. authentication
74. _________ means that a sender must not be able to deny sending a message that he sent.
Correct : D. Non-repudiation
75. ________ means to prove the identity of the entity that tries to access the system's
resources.
Correct : B. Entity authentication
76. A(n) _________ can be used to preserve the integrity of a document or a message.
Correct : A. message digest
77. A(n) ________function creates a message digest out of a message.
Correct : C. hash
78. A hash function must meet ________ criteria.
Correct : B. three
79. Challenge-response authentication can be done using ________.
Correct : D. all of the above
80. A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
Correct : A. KDC
81. The _____________ translates internet domain and host names to IP address.
Correct : A. domain name system
82. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
Correct : C. telnet
83. Application layer protocol defines
Correct : D. all of the above
84. Which one of the following protocol delivers/stores mail to reciever server?
Correct : A. simple mail transfer protocol
85. Which one of the following is an internet standard protocol for managing devices on IP
network?
Correct : B. simple network management protocol
86. User datagram protocol is called connectionless because
Correct : A. all UDP packets are treated independently by transport layer
87. Transmission control protocol is
Correct : D. all of the above
88. An endpoint of an inter-process communication flow across a computer network is called
Correct : A. socket
89. Transport layer aggregates data from different applications into a single stream before
passing it to
Correct : A. network layer
90. The ASCII encoding of binary data is called
Correct : A. base 64 encoding
91. A high speed communication equipment typically would not be needed for
Correct : A. E-mail
92. What is Unicode?
Correct : A. Represents symbol or characters used in any langua
93. In OSI model dialogue control and token management are responsibilities of ?
Correct : A. Session Layer
94. An asymmetric-key (or public-key) cipher uses
Correct : B. 2 Key
95. A straight permutation cipher or a straight P-box has same number of inputs as
Correct : C. Outputs
96. Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
Correct : A. Authenticated
97. We use Cryptography term to transforming messages to make them secure and immune to
Correct : C. Attacks
98. Shift cipher is sometimes referred to as the
Correct : A. Caesar cipher
99. Substitutional cipers are
Correct : D. both a and c
100. Heart of Data Encryption Standard (DES), is the