0% found this document useful (0 votes)
11 views

Important Objective Questions

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Important Objective Questions

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Important Objective Questions

Multiple choice questions:


1. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
2. Which of the following is not correct in relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers
3. ICMP is primarily used for
a) error & diagnostic functions
b) addressing
c) forwarding
d) none of the mentioned
4.ISP exchanges internet traffic between their networks by
a) internet exchange point
b) subscriber end point
c) ISP end point
d) none of the mentioned
5. The network layer protocol of internet is
a)Ethernet
b) Internet Protocol
c) HTTP
d) none of the mentioned
6.An endpoint of an inter-process communication flow across a computer network is
called __________
a) socket
b) pipe
c) port
d) machine
7. Socket-style API for windows is called ____________
a) wsock
b) winsock
c) wins
d) sockwi
8..Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
9.Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
10.An endpoint of an inter-process communication flow across a computer network is
called
a)socket
b)pipe
c)port
d)machine Mega computer
11. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol
12. Which one of the following algorithms is not used for congestion control?
a)traffic aware routing
b)admission control
c)load shedding
d)none of the mentioned
13.TCP is a(n) ........... transport protocol.
A. protocol delivery
B. reliable
C. best-effort delivery
D. effortless delivery
14.Transport layer protocols deals with ____________
a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication
15.Which is not a application layer protocol?
a)HTTP
b)SMTP
c)FTP
d) TCP
16.A DNS client is called
a) DNS updater
b) DNS resolver
c) DNS handle
d)none of the mentioned

17. The entire hostname has a maximum of


a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
18.E-mail is ____________.

a)Loss-tolerant application

b)Bandwidth-sensitive application

c)Elastic application

d)None of the mentioned


19.To deliver a message to the correct application program running on a host, the
_______address must be consulted

a) IP

b) MAC

c) Port

d) None of the mentioned

20. Which one of the following allows client to update their DNS entry as their IP
address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned

Fill In The Blanks:


1. In the ipv4, the data gram is of________.
2.Data in network layer is transferred in the form of ____________.
3. The network layer is considered as the _______ of the network layer.
4. RIP stands for ________.
5. The network layer contains which hardware device ______,___________and
_______.
6. Security based connection is provided by which layer__________.
7. A modem is a _____________ de vice.
8. Security based connection is provided by which layer__________.
9.Using which method in transport layer data integrity can be ensured ______.
10. Transport layer can identify the symptoms of overload nodes using _________.
11.Congestion control can control traffic entry into a telecommunications network, so
to avoid _________.
12. The ASCII encoding of binary data is __________.
13._____________ is the following is not an application layer protocol.
14.When displaying a web page, the application layer uses the _____________
15. Transport layer can identify the symptoms of overload nodes using _________.
16.Using which method in transport layer data integrity can be ensured _______
17. The ____________ translates internet domain and host names to IP address.
18. When displaying a web page, the application layer uses the _____________
19. ___________ is an internet standard protocol for managing devices on IP network
20 DNS stands for _______________.

You might also like