0% found this document useful (0 votes)
24 views7 pages

M NG Máy Tính

Uploaded by

vuirum84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views7 pages

M NG Máy Tính

Uploaded by

vuirum84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Câu 1. Windowing is provided at what layer of the OSI reference model?

A. Network layer
B. Transport layer
C. Physical layer
D. Data link layer
ANSWER:B
Câu 2. IP address reside at which layer of the OSI reference model?
A. Network layer
B. Transport layer
C. Physical layer
D. Data link layer
ANSWER:A
Câu 3. Which of the following is a connectionless transport layer protocol?
A. IP
B. TCP
C. UDP
D. H.323
ANSWER:C
Câu 4. Which of the following is a valid MAC address?
A. AA-65-EC-6F-C4-YZ
B. 44-FF-AB
C. 30-65-EC-6F-C4-58
D. A9-B6-4D-3B
ANSWER:C
Câu 5. A packet whose destination is outside the local TCP/IP network segment is sent to
..............
A. TCP
B. DHCP server
C. File server
D. Default gateway
ANSWER:D
Câu 6. Distance vector routing algorithm is a dynamic routing algorithm. The routing
tables in distance vector routing algorithm are updated ...........
A. by exchanging information with neighbor nodes
B. with back up database
C. by server
D. automatically
ANSWER:A
Câu 7. In link state routing algorithm after the construction of link state packets, new
routes are computed using:
A. Dijkstra's algorithm
B. RSA algorithm
C. DES algorithm
D. Packets
ANSWER:A
Câu 8. In a fast Ethernet cabling, 100 Base-TX uses............cable and maximum segment
size is ............
A. fibre optics, 2000 metres
B. fibre optics, 500 metres
C. twisted pair, 200 metres
D. twisted pair, 100 metres
ANSWER:D
Câu 9. Which of the following protocols is used by email server to maintain a
central repository that can be accessed from any machine?
A. SMTP
B. POP3
C. DMSP
D. IMAP
ANSWER:D
Câu 10. An attacker sits between the sender and receiver and captures the information
and retransmits to the receiver after some time without altering the information. This
attack is called as ..............
A. Complex attack
B. Simple attack
C. Masquarade attack
D. Denial of service attack
ANSWER:D
Câu 11. In CRC checksum method, assume that given frame for transmission
is 1101011011 and the generator polynomial is G(x) = x^4 + x + 1.
A. 110101111001111
B. 110101111100111
C. 11101101011011
D. 11010110111110
ANSWER:D
Câu 12. Which layer of OSI reference model is responsible for decomposition of messages
and generation of sequence numbers to 'ensure correct re-composition from end to end of
the network?
A. Application layer
B. Network layer
C. Transport layer
D. Data link layer
ANSWER:C
Câu 13. The start and stop bits are used in serial communication for
A. error detection
B. error correction
C. slowing down the communication
D. synchronization
ANSWER:D
Câu 14. Which of the following is not a field in TCP header ?
A. Sequence number
B. Checksum
C. Window size
D. Fragment offSet
ANSWER:D
Câu 15. Which of the following is not associated with the session layer ?
A. Semantics of the information transmitted
B. Synchronization
C. Dialog control
D. Token management
ANSWER:A
Câu 16. What is the size of the 'total length' field in IPv4 datagram ?
A. 32 bits
B. 16 bits
C. 8 bits
D. 4 bits
ANSWER:B
Câu 17. Which transmission technique guarantees that data packets will be received by
the receiver in the same order in which they were sent by the sender?
A. Circuit switching
B. Packet switching
C. Unicasting
D. Broadcasting
ANSWER:A
Câu 18. The maximum payload of a TCP segment is :
A. 65,535
B. 65,495
C. 65,799
D. 65,536
ANSWER:B
Câu 19. In a binary Hamming Code the number of check digits is r then number
of message digits is equal to :
A. 2^r – 1
B. 2^r + r – 1
C. 2^r – r + 1
D. 2^r – r – 1
ANSWER:D

Câu 20. In a digital transmission, the receiver clock is 0.1 percent faster than the sender
clock. How many extra bits per second does the receiver receive if the data rate is 1
Mbps?
A. 1000 bps
B. 10000 bps
C. 100000 bps
D. 1000000 bps
ANSWER:A
Câu 21. Which of the following is used in the options field of IPv4 ?
A. Strict source routing
B. time stamp
C. Loose source routing
D. All of the above
ANSWER:D
Câu 22. Which layers of the OSI reference model are host-to-host layers ?
A. Transport, Session, Presentation, Application
B. Data-link, Network, Transport, Session
C. Physical, Data-link, Network, Transport
D. Network, Transport, Session, Presentation
ANSWER:A
Câu 23. A network on the Internet has a subnet mask of 255.255.240.0. What is the
maximum number of hosts it can handle ?
A. 8192
B. 4096
C. 2048
D. 1024
ANSWER:B
Câu 24. In TCP/IP reference model, the job of layer is to permit hosts to inject
packets into any network and travel them independently to the destination.
A. Physical
B. Host to network
C. Application
D. None of the above
ANSWER:D
Câu 25. Protocols are
A. Sets of computers
B. Sets of rules
C. Sets of product
D. Sets of rules
ANSWER:B
Câu 26. The design issue of Datalink Layer in OSI Reference Model is
A. Representation of bits
B. Synchronization of bits
C. Connection control
D. Framing
ANSWER:D
Câu 27. Coaxial cables are categorized by Radio Government rating are adapted for specialized
functions. Category RG-59 with impedance 75Ω used for
A. Ethernet
B. Thin Ethernet
C. Thick Ethernet
D. Cable TV
ANSWER:D
Câu 28. An example of a layer that is absent in broadcast networks is:
A. Physical layer
B. Presentation layer
C. Network layer
D. Application layer
ANSWER:C
Câu 29. In classful addressing, an IP address 123.23.156.4 belongs to class format.
A. A
B. B
C. C
D. D
ANSWER:A
Câu 30. The message 11001001 is to be transmitted using the CRC polynomial x3 +1 to protect it
from errors. The message that should be transmitted is :
A. 110010011001
B. 11001001
C. 11001001011
D. 110010011001001
ANSWER:C

Câu 1. Cho địa chỉ IP: 172.32.0.2, subnet mask 255.255.240.0


Hãy xác định:
a. Địa chỉ đường mạng.
b. Địa chỉ broadcast.
c. Dãy địa chỉ IP hợp lệ trong đường mạng ...
Đáp án:
a. Địa chỉ IP nhị phân: 10101100.00100000.00000000.00000010
AND
Subnet mask: 11111111.11111111.11110000.00000000
---------------------------------------------------------------------------
10101100.00100000.00000000.00000000
-Địa chỉ đường mạng 172.32.0.0
b.Địa chỉ IP nhị phân: 10101100.00100000.00000000.00000010
OR
Subnet mask đảo: 00000000.00000000.00001111.11111111
-------------------------------------------------------------------------------
10101100.00100000.00001111.11111111
Địa chỉ broadcast: 172.32.15.255

c.Dãy địa chỉ IP hợp lệ: 172.32.0.1-172.32.15.254


Câu 2. Cho địa chỉ IP: 10.12.10.1, subnet mask 255.224.0.0
Hãy xác định:
a. Địa chỉ đường mạng.
b. Địa chỉ broadcast.
c. Dãy địa chỉ IP hợp lệ trong đường mạng ...
Đáp án:
a.Địa chỉ IP nhị phân 00001010.00001100.00001010.00000001
AND
Subnet mask: 11111111.11110000.00000000.00000000
-------------------------------------------------------------------------------
00001010.00000000.00000000.000000000
-Địa chỉ đường mạng: 10.0.0.0
b.Địa chỉ IP nhị phân: 00001010.00001100.00001010.00000001
OR
Subnet mask đảo: 00000000.00001111.11111111.11111111
-------------------------------------------------------------------------------
00001010.00001111.11111111.11111111
Địa chỉ broadcast: 10.15.255.255
c.Địa chỉ mạng hợp lệ: 10.0.0.1-10.15.255.254

You might also like