Sunday, February 28, 2016

CS610 COMPUTER NETWORKS Final Term Solved MCQs



CS610 COMPUTER NETWORKS Final Term Solved MCQs Mega File
(Latest All in One)
The protocol address of the next hop must be _____________ to an equivalent hardware address before a
packet can be sent.
Encrypted
Decrypted
Translated
Non of these
A _____________ address-binding table is used for each physical
network.
New
Similar
Separate
Old
UDP provides connection-oriented service.
True
False
The UDP stands for__________.
Universal Datagram Protocol
User Datagram Protocol
United Datagram Protocol
None of the given
In 3-way handshake TCP requires to generate a random ________ sequence number.
30 bit
32 bit
34 bit
none of the given
TCP stands for _______
Transport control protocol
Transmission control protocol
Terminal control protocol

File Version 2.0.1
None of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was
being exhausted because all networks had to choose one of three possible sizes.
Select correct option:
True
False
Twice NAT allows a site to run servers.
Select correct option:
True
False
Preliminary version of IP was called _________.
Select correct option:
IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
_________ uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given
The Internet service providers coordinate with the Internet assigned
number authority to obtain their network numbers.
Select correct option:
True
False
Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given
The Source can configure outgoing datagram’s to avoid _________
Select correct option:
Segmentation
Defragmentation
Fragmentation
None of the given
The time for acknowledgement to arrive depends on __________
Select correct option:
Distance to destination
Current traffic conditions
Both a and b
None of the given
Which is not the type of error messages defined by ICMP?
Select correct option:
Source quench
Time exceeded
Destination unreachable
None of the given
_________ is used to attach two autonomous systems.
Select correct option
BGP
IGP
EGP
none of the given
Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
False
TTL stands for __________
Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given
IGPs stand for _________
Select correct option:
Internal Gateway Protocols
Interior Gateway Protocols


Intermediate Gateway Protocols
None of the given
_____________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given
__________________encapsulates IP datagram as data area in hardware frame.
Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given
Class A mask is 255.0.0.0 which is used for ________________
Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
NAT is not useful at a residence with Cable Modem or DSL connectivity.
Select correct option:
True
False
Autonomous System chooses a routing protocol to exchange routing
information which is passed before being summarized to another group.
Select correct option:
True
False
______ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given

The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was
being exhausted because all networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
EGP stands for _________
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given
Hashing is the transformation of a string of characters into a usually
shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses.
ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit
Reliability is not the responsibility of the Transport layer.
Select correct option:
True
False
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False
TCP uses the term segment to refer to a ________.
Select correct option:
packet
message
both (a) and (b)
None of the given
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False
______________field tells the receiver how to order fragments within a
given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
IP datagram can contains ________ octets.
Select correct option:
0-65,535
1 -65,535
1 -65,536
none of the given
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
IPV3
IPV5


Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given
_______ protocol uses three way handshake to begin a connection.
Select correct option:
UDP
TCP
IP
none of the given
Typical internet routing uses uses a combination of two metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count
Network Address and Port Translation (NAPT) is by far the most popular
form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given
The routers within an autonomous system use a _____________ to
exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet
Routing Protocol.
Select correct option:
True
False
The Network Layer Protocol ICMP stands for____________
Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given

The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given
TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False
ATM header is about the________________of the cell.
Select correct option:
15%
10%
20%
5%
Jitter is significance for ______________
Select correct option:
Voice
Video
Data
All of above
How many methods exist for building routing table?
Select correct option
1
234
The process of forwarding the packets of information is called routing. The routing table contains
information about the _____________ immediately around it
Select correct option:
Topology of the network
Destination
Both of the above
None of the above
Which of the following statement is true regarding ATM?
Select correct option:
It is a single technology for voice, video and data
It has low jitter and high capacity
It uses fixed sized small cells. 48 octet's data
All of the above
A ____ can forward or block messages based on the information in the message itself
Select correct option

Message digest
Proxy firewall
Packet filter firewall
Private Key
Transmission media are usually categorized as
Select correct option:
Guided or unguided
Fixed or unfixed
Determinate or indeterminate
Metallic or nonmetallic
Which of the following is not a guided medium?
Select correct option:
Twisted-pair cable
Fiber-optic cable
Atmosphere
Coaxial Cable
Which multiplexing technique transmits digital signals?
Select correct option:
WDM
FDM
TDM
None of the above
All destinations on same switch have same _________
Select correct option:
Router
Information
Next Hop
None of the above
Which of the following statement is true regarding Distance-Vector Routing?
Select correct option:
It is very simple to implement.
Packet switch updates its own routing table first
It is used in RIP.
All of the above
An exterior switch is one with which _______________
Select correct option:
Computers are attached
No computer is attached
Hubs are attached externally
None of the above
Frame relay is _______________________
Select correct option:
Connection oriented service
Connectionless service

It is typically ranges from 5Mbps to 1000Mbps.
None of the above
An interior switch is one with which ___________
Select correct option:
Computers are attached
No computer is attached
Computers are attached internally
None of the above
Which of the following is not a benefit of source independence?
Select correct option:
It allows fast and efficient routing.
Packet switch do not need to have complete information about all destinations
Network functions even if topology changes
None of the above
Which of the following statement regarding ATM is true?
Select correct option:
Connections in ATM are called virtual channels
The VC is identified by a 24-bit value formed from the VPI
Both (a) and (b)
None of the above
How many methods exist for computing routing table?
Select correct option:
5
4
3
2
Which of the following statement is true regarding Distance-vector routing?
Select correct option:
It is very simple to implement.
Packet switch updates its own routing table first.
It is used in RIP.
All of the above
Which one of the following is a property of static routing?
Select correct option:
It is inflexible
It is done at boot time
It has low network overload
All of the above
Asynchronous Transfer Mode uses the concept of --------------------.
Select correct option:
Connection-less networking
Connection-oriented networking

Which multiplexing technique shifts each signal to a different carrier frequency?
Select correct option:
TDM
FDM
Both a and b
None of the above
LAN networks can not be extended to very large networks because of the limitations of...........
Select correct option:
Area
Distance
Routers
Technology
Which of the following statement is wrong regarding ATM?
Select correct option:
It is a single technology for voice, video and data
It has low jitter and high capacity.
It uses fixed size, small cells, and 48 octet’s data
None of the above
Which one of the following is the responsibility of Djikstra’ algorithm?
Select correct option:
To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above
Which one of the following is a property of dynamic routing?
Select correct option:
It is inflexible
It has low network overload
It can work around network failure
All of the above
Which of the following statement is true regarding ATM?
Select correct option:
ATM is a single technology that is designed to meet the goals of both LANs and WANs.
ATM uses the concept of connection-oriented networking.
Both (a) and (b)
None of the above
Source independence is a phenomena in which next hop to destination does not depend on the
…………………
Select correct option:
Source of packet
Destination of packet
No of hops
Source of protocol

If a computer on the network shares resources for others to use, it is called ____
a. Server
b. Client
c. Mainframe
Answer: a
2. Terminators are used in ______ topology.
a. Bus
b. Star
Answer: a
3. In _____ topology, if a computer’s network cable is broken, whole network goes down.
a. Bus
b. Star
Answer: a
4. For large networks, _______ topology is used.
a. Bus
b. Star
c. Ring
Answer: b
5. ISO stands for
a. International Standard Organization
b. International Student Organization
c. Integrated Services Organization
Answer: a
6. ISO OSI model is used in
a. Stand alone PC
b. Network environment
Answer: b
7. Network cable lies on _____ layer
a. Application
b. Network
c. Physical
Answer: c
8. ____ Layer decides which physical pathway the data should take.
a. Application
b. Network
c. Physical
Answer: c
9. ISDN is an example of ______ network

a. Circuit switched
b. Packet switched
Answer: a
10. X.25 is an example of ______ network
a. Circuit switched
b. Packet switched
Answer: b
11. _____________ allows LAN users to share computer programs and data.
a. Communication server
b. Print server
c. File server
Answer: c
12. Print server uses ________ which is a buffer that holds data before it is send to the printer.
a. Queue
b. Spool
c. Node
Answer: b
13. A standalone program that has been modified to work on a LAN by
including concurrency controls such as file and record locking is an
example of____
a LAN intrinsic software
b. LAN aware software
c. Groupware
d. LAN ignorant software
Answer: a
14. The ______ portion of LAN management software restricts access, records user activities and audit data
etc.
a. Configuration management
b. Security management
c. Performance management
Answer : b
15. What is the max cable length of STP?
a. 100 ft
b. 200 ft
c. 100 m
d. 200 m
Answer : d
16. What is the max data capacity of STP?
a. 10 mbps
b. 100 mbps
c. 1000 mbps
d. 10000 mbps
Answer: b



17. Which connector STP uses?
a. BNC
b. RJ-11
c. RJ-45
d. RJ-69
Answer : c
18. What is the central device in star topology?
a. STP server
b. Hub/switch
c. PDC
d. Router
Answer : b
19. What is max data capacity for optical fiber cable?
a. 10 mbps
b. 100 mbps
c. 1000 mbps
d. 10000 mbps
Answer : c
In Direct point to point communication adding the Nth computer
requires----------- new connections.
► None of the given
► N2
► N-1
► (N2 –N)/2
In Point-to-Point topology there are two topologies.
► Tree and Ring
► Star and Ring
► Star and Tree
► None of the given
In -------------, network occupies the smaller area like a room a floor or a building
► LAN
► WAN
► MAN
► None of the given
Hardware that calculates a CRC uses two simple components .
► AND unit and XOR unit
► Shift register and XOR unit
► Shift register and AND unit
► none of the given
The Gigabit Ethernet hardware operates at a rate of --------
► 10 Mbps


► 100 Mbps
► 1000 Mbps
► None of the given
formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
► 10 Base T
► none of the given
An interface for thin Ethernet must have an ____________ connector , and must generate signals according
to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
A system with redundant bridges might have a problem with_______ in the system .
► Loop
► Filters
► Spanning Trees
► All given choices
________ computes shortest paths in a graph by using weights on edges
as a measure of distance.
► Greedy algorithm
► Distance vector algorithm
► Dijksta’s algorithm
► none of the given
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
► Connectionless service paradigm
► Connection-oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all
communication with host
► 48-bit
► 32-bit
► 24-bit
► None of the given
the address __________ identifies the physical network to which the computer is attached, while the _______


identifies an individual computer on that network.
► Prefix, suffix
► suffix, prefix
► suffix, suffix
► none of the given
___________ places the boundary between the first and second octets
► Class A
► Class B
► Class C
► Class D
___________ places the boundary between the third and fourth octets.
► Class A
► Class B
► Class C
► Class D
________ field of header indicates whether a datagram is a fragment or a complete datagram .
► FLAGS
► FLAGMENT OFFSET
► IDENTIFICATION
► None of the given
______ provides connectionless service.
► TCP
► UDP
► IP
► none of the given
UDP and TCP are both_________ layer protocols
► Physical
► Data link
► Network
► Transport
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream
interface, Reliable connection start-up and Graceful connection shutdown are the services provided
by__________
► IP
► None of the given
► TCP
► UDP
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer


► Transport Layer
________identifies which application program on receiving computer should receive the data
► Logical address
► Source port
► Destination Port
► None of the given
________ identifies the application program that sent the data.
► Destination Port
► Source port
► Logical address
► None of the given
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP
► Both UDP and TCP
► none of the given
____________ uses distance vector approach to define routing
► BGP
► OSPF
► RIP
► None of the given
ICMP message transport is acted upon by getting ICMP encrypted in IP.
► True
► False
Protocol addresses are abstractions provided by ___________.
► hardware
► software
► operating system
► internet
These packets serve same purpose on ________ as frames on ______
► Intranet, LAN
► Internet, WAN
► Intranet, WAN
► Internet, LAN
Address mask defines how many bits of address are in suffix?
► True
► False
a single networking technology is best for all needs.
► True

► False
A computer attached to a given network can only communicate with other computers attached to the same
network. Is this a problem with multiple networks?
► True
► False
The term self-identifying is used for Classful IP addresses because the class of the address can be
computed from the address__________.
► Itself
► prefix
► suffix
► mask
Find the class of the address.
10100111 11011011 10001011 01101111
► A
► B
► E
► C
Find the class of the address:
11110011 10011011 11111011 00001111
► A
► C
► E
► B
In which method of Address Resolution Protocol the protocol address is
determined by hardware address? Were "T" stands for Table lookup, "C"
for Closed-form Computation and "D" for Data Exchange?
► T
► D
► C
► T, C
Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► D
► T
► C
► T, D
://vuzs.net
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, D
► c
► T
► T, C

In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, C
► T
► C
► D
On of the design goals for unicast route propagation is __________.
► Consistency
► inconsistency
► stability
► dynamic addressing
Propagation multicast routing information differs dramatically from unicast route propagation?
► True
► False
To save traffic, an EGP does not summarize routing information from the autonomous system before
passing it to another autonomous system.
► True
► False
In IPv6 the type of address used for collection of computers with same
prefix. Are known as_________.
► Anycast
► Unicast
► Multicast
► Non of the given
Special types of addresses in IPv6 used for multiple destinations; possibly not same site. Are known
as________
► Unicast
► Anycast
► Multicast
► none of the given
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to
preserve data boundaries.
► True
► False
Reliability is the responsibility of the _________ layer
► Network
► Data link
► Transport
► Application
TCP uses _______ mechanism to control the flow of data.

► door
► window
► acknowledgment
► retransmission
In Direct point to point communication adding the Nth computer requires------------ new connections.
► None of the given
► N2
► N-1
► (N2 –N)/2
In Point-to-Point topology there are two topologies.
► Tree and Ring
► Star and Ring
► Star and Tree
► None of the given
In -------------, network occupies the smaller area like a room a floor or a building
► LAN
► WAN
► MAN
► None of the given
Hardware that calculates a CRC uses two simple components.
► AND unit and XOR unit
► Shift register and XOR unit
► Shift register and ANDunit
► none of the given
The Gigabit Ethernet hardware operates at a rate of --------
► 10 Mbps
► 100 Mbps
► 1000 Mbps
► None of the given
formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
► 10 Base T
► none of the given
An interface for thin Ethernet must have an ____________ connector , and must generate signals according
to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
A system with redundant bridges might have a problem with_______ in the system.


► Loop
► Filters
► Spanning Trees
► All given choices
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Greedy algorithm
► Distance vector algorithm
► Dijksta’s algorithm
► none of the given
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
► Connectionless service paradigm
► Connection-oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► none of the given
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
An Internet Address (IP address) is a unique __________ binary number
assigned to a host and used for all communication with host
► 48-bit
► 32-bit
► 24-bit
► None of the given
The address __________ identifies the physical network to which the computer is attached, while the
_______ identifies an individual computer on that network.
► prefix , suffix
► suffix , prefix
► suffix , suffix
► None of the given
___________ places the boundary between the first and second octets
► Class A
► Class B
► Class C
► Class D
___________ places the boundary between the third and fourth octets.
► Class A
► Class B
► Class C
► Class D


________ field of header indicates whether a datagram is a fragment or a complete datagram.
► FLAGS
► FLAGMENT OFFSET
► IDENTIFICATION
► None of the given
______ provides connectionless service.
► TCP
► UDP
► IP
► none of the given
UDP and TCP are both_________ layer protocols
► Physical
► Data link
► Network
► Transport
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream
interface, Reliable connection startup and Graceful connection shutdown are the services provided
by__________
► IP
► None of the given
► TCP
► UDP
_______ protocols of TCP/IP layering model specify how to ensure
reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
________identifies which application program on receiving computer should receive the data
► Logical address
► Source port
► Destination Port
► None of the given
________ identifies the application program that sent the data.
► Destination Port
► Source port
► Logical address
► None of the given
The Border Gateway Protocol (BGP) uses_________ for all communication
► UDP
► TCP

► Both UDP and TCP
► None of the given
____________ uses distance vector approach to define routing
► BGP
► OSPF
► RIP
► None of the given
ICMP message transport is acted upon by getting ICMP encrypted in IP.
► True
► False
Protocol addresses are abstractions provided by ___________.
► hardware
► software
► operating system
► internet
These packets serve same purpose on ________ as frames on ______
► Intranet, LAN
► Internet, WAN
► Intranet, WAN
► Internet, LAN
Address mask defines how many bits of address are in suffix?
► True
► False
A single networking technology is best for all needs.
► True
► False
A computer attached to a given network can only communicate with other computers attached to the same
network. Is this a problem with multiple networks?
► True
► False
The term self-identifying is used for Classful IP addresses because the class of the address can be
computed from the address__________.
► Itself
► prefix
► suffix
► mask
Find the class of the address.
10100111 11011011 10001011 01101111
► A
► B

► E
► C
Find the class of the address:
11110011 10011011 11111011 00001111
► A
► C
► E
► B
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T
► D
► C
► T, C
Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► D
► T
► C
► T, D
Which method of Address Resolution Protocol resolution with minimum
delay? Were "T" stands for Table lookup, "C" for Closed-form
Computation and "D" for Data Exchange?
► T, D
► c
► T
► T, C
In which method of Address Resolution Protocol the implementation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
► T, C
► T
► C
► D
On of the design goals for unicast route propagation is __________.
► Consistency
► inconsistency
► stability
► dynamic addressing
Propagation multicast routing information differs dramatically from unicast route propagation?
► True
► False

to save traffic an EGP does not summarize routing information from the autonomous system before passing
it to another autonomous system.
► True
► False
In IPv6 the type of address used for collection of computers with same prefix. Are known as_____
► Anycast
► Unicast
► Multicast
► none of the given
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. _________.
► Unicast
► Anycast
► Multicast
► none of the given
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to
preserve data boundaries.
► True
► False
Reliability is the responsibility of the _________ layer
► Network
► Data link
► Transport
► Application
TCP uses _______ mechanism to control the flow of data.
► Door
► window
► acknowledgment
► retransmission
the time for acknowledgement to arrival of packet depends on.
► Distance to destination and Current traffic conditions
► Current traffic conditions
► Distance to destination
► non of these
FDDI can transmits data at a rate of ----------
► 100 million bits per second
► 10 million bits per second
► 1000 million bits per second
► None of the given
the time for acknowledgement to arrival of packet depends on.
► Distance to destination and Current traffic conditions

► Current traffic conditions
► Distance to destination
► non of these
Question # 1 of 10 ( Start time: 11:14:05 PM ) Total Marks: 1
---------- is also called self healing network
www.vukamoke.blogspot.com
Select correct option:
ATM
FDDI (Correct)
Token Ring
None of the given
Question # 2 of 10 ( Start time: 11:15:34 PM ) Total Marks: 1
Most LANs that employ ring topology use an access mechanism known as -------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING (Correct)
Question # 3 of 10 ( Start time: 11:16:55 PM ) Total Marks: 1
An ------------method, the network hardware designers specify how type
information is included in the frame and the value use to identify various
frame types. www.vumobile.blogspot.com
Select correct option:
Explicit frame type (Correct)
Ideal frame type
Implicit frame type
None of the given
Question # 4 of 10 ( Start time: 11:17:47 PM ) Total Marks: 1
Hardware that calculates a CRC uses two simple components.
Select correct option:
AND unit and XOR unit
Shift register and XOR unit (Correct)
Shift register & AND unit
Shift register and shift XOR unit
Question # 5 of 10 ( Start time: 11:18:59 PM ) Total Marks: 1
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding (Correct)
Return to Zero (RZ)
Question # 6 of 10 ( Start time: 11:20:08 PM ) Total Marks: 1
When an application ------------ data, it makes a copy of the data available to all other computers on the
network.
Select correct option:

Broadcasting (Correct)
Multicasting
Unicasting
None of the given
Question # 7 of 10 ( Start time: 11:21:26 PM ) Total Marks: 1
LAN interface may use ---------- to copy frame data directly from main memory.
Select correct option:
DMA (Correct)
FDDI
CSMA/CD
None of the given
Question # 8 of 10 ( Start time: 11:22:19 PM ) Total Marks: 1
LAN and WAN are classified according to their.........
Select correct option:
Size (Correct)
Connectivity
Medium
Mobility
Question # 9 of 10 ( Start time: 11:23:43 PM ) Total Marks: 1
For how much time would other computers be in wait while one
computer was transferring 56MB file with transmission speed of 56Kbps
Select correct option:
10 Sec
11 Sec
12 Sec
13 Sec
Question # 10 of 10 ( Start time: 11:25:05 PM ) Total Marks: 1
A network uses _______ to arrange computers to be connected in a single closed loop.
Select correct option:
Star Topology
Dual Ring Topology
Ring Topology (Correct)
Bus Topology
Question # 1 of 10 ( Start time: 05:19:30 PM ) Total Marks: 1
Which one of the following is a method for computing routing table information?
Select correct option:
Manual entry
Static routing (Correct)
Boot time routing
None of the above
Question # 2 of 10 ( Start time: 05:20:20 PM ) Total Marks: 1
Thin Ethernet is known as-------------
Select correct option:
10Base2 (Correct)
10Base5
10BaseT
All of above

Question # 3 of 10 ( Start time: 05:21:03 PM ) Total Marks: 1
Which multiplexing technique shifts each signal to a different carrier frequency?
Select correct option:
TDM
FDM (Correct)
Both a and b
None of the above
Question # 4 of 10 ( Start time: 05:22:03 PM ) Total Marks: 1
The basic responsibility of NIC is ----------------
Select correct option:
To access medium/network
To resource allocation
To access memory
All of above (Correct)
Question # 5 of 10 ( Start time: 05:23:23 PM ) Total Marks: 1
How many methods exist for building routing table?
Select correct option:
1
2 (Correct)
3
4
Question # 6 of 10 ( Start time: 05:24:07 PM ) Total Marks: 1
The process of forwarding the packets of information is called……….
Select correct option:
Routing (Correct)
Switching
Communication
None of the above
Question # 7 of 10 ( Start time: 05:24:48 PM ) Total Marks: 1
The term signaling is used to describe------------ Select correct option:
Communication about the internet (Correct)
Communication about the extranet
Communication about the network
None of above
Question # 8 of 10 ( Start time: 05:26:17 PM ) Total Marks: 1
Which of the following statement is true regarding ATM?
Select correct option:
It is a single technology for voice, video and data
It has low jitter and high capacity.
It uses fixed size, small cells, 48 octet’s data
All of the above (Correct)
Question # 9 of 10 ( Start time: 05:27:02 PM ) Total Marks: 1
An interior switch is one with which ………………….
Select correct option:
Computers are attached
No computer is attached (Correct)
Computers are attached internally
None of the above
Question # 10 of 10 ( Start time: 05:28:12 PM ) Total Marks: 1
Network interface card acts like a (an) -----------

Select correct option:
Input/output device
Input device
Output device
All of above (Correct)
Question # 1 of 10 ( Start time: 03:47:55 PM ) Total Marks: 1
The Network Layer Protocol ICMP stands for____________
Select correct option:
Instant Control Message Protocol (Correct)
Internet Control Message Protocol
Initial Control Message Protocol
None of the given
Question # 2 of 10 ( Start time: 03:48:51 PM ) Total Marks: 1
Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps (Correct)
none of the given
Question # 3 of 10 ( Start time: 03:50:18 PM ) Total Marks: 1
An Internet Address (IP address) is a unique __________ binary number
assigned to a host and used for all communication with host
Select correct option:
48-bit
32-bit (Correct)
24-bit
None of the given
Question # 4 of 10 ( Start time: 03:51:50 PM ) Total Marks: 1
_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP (Correct)
none of the given
IPV6 addresses are _____ bits.
Select correct option:
32
64
128 (Correct)
256
Question # 6 of 10 ( Start time: 03:53:54 PM ) Total Marks: 1
A _____________ address-binding table is used for each physical network.
Select correct option:
new
similar
separate (Correct)
old
Question # 7 of 10 ( Start time: 03:54:21 PM ) Total Marks: 1
________ identifies the application program that sent the data.
Select correct option:

Destination Port
Source port (Correct)
Logical address
None of the given
Question # 8 of 10 ( Start time: 03:55:00 PM ) Total Marks: 1
TCP/IP defines the term__________ to refer any computer system that connects to an internet and runs
applications Select correct option:
Router
Host computer (Correct)
Bridge
None of the given
Question # 9 of 10 ( Start time: 03:56:31 PM ) Total Marks: 1
The Universal Datagram Protocol is not an end-to-end protocol.
Select correct option:
True (Correct)
False
Question # 10 of 10 ( Start time: 03:57:48 PM ) Total Marks: 1
In _______ routing, the table is initialized when system boots and there is no further changes.
Select correct option:
Dynamic
Static
Both (a) and (b) (Correct)
None of the given


No comments:

Post a Comment