0% found this document useful (0 votes)
20 views

cn bits

The document contains a series of questions and answers related to computer networks, covering topics such as network types, protocols, layers, and transmission methods. Key concepts include the OSI model, TCP/IP model, data link protocols, and various network functionalities. Each question is followed by the correct answer, providing a comprehensive overview of networking fundamentals.

Uploaded by

cse4671
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

cn bits

The document contains a series of questions and answers related to computer networks, covering topics such as network types, protocols, layers, and transmission methods. Key concepts include the OSI model, TCP/IP model, data link protocols, and various network functionalities. Each question is followed by the correct answer, providing a comprehensive overview of networking fundamentals.

Uploaded by

cse4671
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 220

1.

A.
B.
C.
D.
Answer» B. distributed system
discuss

2. Two devices are in network if


A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. pids of the processes running of different devices are same
D. none of the mentioned
Answer» A. a process in one device is able to exchange information with a process in another
device
discuss

3.
Which one of the following computer network is built on
the top of another network?
A. prior network
B. chief network
C. prime network
D. overlay network
Answer» D. overlay network
discuss

4. In computer network nodes are


A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
Answer» D. all of the mentioned
discuss

5.
Communication channel is shared by all the machines on
the network in
A. broadcast network
5.
Communication channel is shared by all the machines on
the network in
B. unicast network
C. multicast network
D. none of the mentioned
Answer» A. broadcast network
discuss

6. Bluetooth is an example of
A. personal area network
B. local area network
C. virtual private network
D. none of the mentioned
Answer» A. personal area network
discuss

A _____ is a device that forwards packets between networks


7. by processing the routing information included in the
packet.
A. bridge
B. firewall
C. router
D. all of the mentioned
Answer» C. router
discuss

8.
A list of protocols used by a system, one protocol per layer,
is called
A. protocol architecture
B. protocol stack
C. protocol suit
D. none of the mentioned
Answer» B. protocol stack
discuss

9. Network congestion occurs


A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. none of the mentioned
9. Network congestion occurs
Answer» A. in case of traffic overloading
discuss

10.
Which one of the following extends a private network
across public networks?
A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
Answer» B. virtual private network
discuss

11. OSI stands for


A. open system interconnection
B. operating system interface
C. optical service implementation
D. none of the mentioned
Answer» A. open system interconnection
discuss

12. The OSI model has ___ layers.


A. 4
B. 5
C. 6
D. 7
Answer» D. 7
discuss

13.
TCP/IP model does not have ______ layer but OSI model
have this layer.
A. session layer
B. presentation layer
C. application layer
D. both (a) and (b)
Answer» D. both (a) and (b)
discuss
14.
Which layer links the network support layers and user
support layers
A. session layer
B. data link layer
C. transport layer
D. network layer
Answer» C. transport layer
discuss

15.
Which address is used in an internet employing the TCP/IP
protocols?
A. physical address and logical address
B. port address
C. specific address
D. all of the mentioned
Answer» D. all of the mentioned
discuss

16. TCP/IP model was developed _____ the OSI model.


A. prior to
B. after
C. simultaneous to
D. none of the mentioned
Answer» A. prior to
discuss (1)

17. Which layer is responsible for process to process delivery?


A. network layer
B. transport layer
C. session layer
D. data link layer
Answer» B. transport layer
discuss

18. Which address identifies a process on a host?


A. physical address
B. logical address
C. port address
D. specific address
18. Which address identifies a process on a host?
Answer» C. port address
discuss

19. Which layer provides the services to user?


A. application layer
B. session layer
C. presentation layer
D. none of the mentioned
Answer» A. application layer
discuss

20. Transmission data rate is decided by


A. network layer
B. physical layer
C. data link layer
D. transport layer
Answer» B. physical layer
discuss

21.
Which transmission media has the highest transmission
speed in a network?
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Answer» C. optical fiber
discuss

22.
Bits can be send over guided and unguided media as analog
signal by
A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Answer» A. digital modulation
discuss
23.
The portion of physical layer that interfaces with the media
access control sublayer is called
A. physical signalling sublayer
B. physical data sublayer
C. physical address sublayer
D. none of the mentioned
Answer» A. physical signalling sublayer
discuss

24. physical layer provides


A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for ir over optical fiber
D. all of the mentioned
Answer» D. all of the mentioned
discuss

25.
In asynchronous serial communication the physical layer
provides
A. start and stop signalling
B. flow control
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss

26. The physical layer is responsible for


A. line coding
B. channel coding
C. modulation
D. all of the mentioned
Answer» D. all of the mentioned
discuss

27.
The physical layer translates logical communication
requests from the ______ into hardware specific operations.
A. data link layer
B. network layer
C. trasnport layer
27.
The physical layer translates logical communication
requests from the ______ into hardware specific operations.
D. application layer
Answer» A. data link layer
discuss

28. A single channel is shared by multiple signals by


A. analog modulation
B. digital modulation
C. multiplexing
D. none of the mentioned
Answer» C. multiplexing
discuss

29. Wireless transmission can be done via


A. radio waves
B. microwaves
C. infrared
D. all of the mentioned
Answer» D. all of the mentioned
discuss

30.
The data link layer takes the packets from _____ and
encapsulates them into frames for transmission.
A. network layer
B. physical layer
C. transport layer
D. application layer
Answer» A. network layer
discuss

31.
Which one of the following task is not done by data link
layer?
A. framing
B. error control
C. flow control
D. channel coding
Answer» D. channel coding
discuss
32.
Which sublayer of the data link layer performs data link
functions that depend upon the type of medium?
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. none of the mentioned
Answer» B. media access control sublayer
discuss

33. Header of a frame generally contains


A. synchronization bytes
B. addresses
C. frame identifier
D. all of the mentioned
Answer» D. all of the mentioned
discuss

34.
Automatic repeat request error management mechanism is
provided by
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. none of the mentioned
Answer» A. logical link control sublayer
discuss

35.
When 2 or more bits in a data unit has been changed
during the transmission, the error is called
A. random error
B. burst error
C. inverted error
D. none of the mentioned
Answer» B. burst error
discuss

36. CRC stands for


A. cyclic redundancy check
B. code repeat check
C. code redundancy check
36. CRC stands for
D. cyclic repeat check
Answer» A. cyclic redundancy check
discuss

37. Which one of the following is a data link protocol?


A. ethernet
B. point to point protocol
C. hdlc
D. all of the mentioned
Answer» D. all of the mentioned
discuss

38.
Which one of the following is the multiple access protocol
for channel access control?
A. csma/cd
B. csma/ca
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss

The technique of temporarily delaying outgoing outgoing


39. acknowledgements so that they can be hooked onto the next

outgoing data frame is called


A. piggybacking
B. cyclic redundancy check
C. fletcher’s checksum
D. none of the mentioned
Answer» A. piggybacking
discuss

40. The network layer concerns with


A. bits
B. frames
C. packets
D. none of the mentioned
Answer» C. packets
discuss
41.
Which one of the following is not a function of network
layer?
A. routing
B. inter-networking
C. congestion control
D. none of the mentioned
Answer» D. none of the mentioned
discuss

42. The 4 byte IP address consists of


A. network address
B. host address
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss

43. In virtual circuit network each packet contains


A. full source and destination address
B. a short vc number
C. both (a) and (b)
D. none of the mentioned
Answer» B. a short vc number
discuss

44.
Which one of the following routing algorithm can be used
for network layer design?
A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» D. all of the mentioned
discuss

45. Multidestination routing


A. is same as broadcast routing
B. contains the list of all destinations
C. data is not sent by packets
D. none of the mentioned
45. Multidestination routing
Answer» C. data is not sent by packets
discuss

46.
A subset of a network that includes all the routers but
contains no loops is called
A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» A. spanning tree
discuss

47.
Which one of the following algorithm is not used for
congestion control?
A. traffic aware routing
B. admission control
C. load shedding
D. none of the mentioned
Answer» D. none of the mentioned
discuss

48. The network layer protocol of internet is


A. ethernet
B. internet protocol
C. hypertext transfer protocol
D. none of the mentioned
Answer» B. internet protocol
discuss (1)

49. ICMP is primarily used for


A. error and diagnostic functions
B. addressing
C. forwarding
D. none of the mentioned
Answer» A. error and diagnostic functions
discuss
50.
Transport layer aggregates data from different applications
into a single stream before passing it to
A. network layer
B. data link layer
C. application layer
D. physical layer
Answer» A. network layer

51.
Which one of the following is a transport layer protocol
used in internet?
A. tcp
B. udp
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss

52. User datagram protocol is called connectionless because


A. all udp packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. both (a) and (b)
D. none of the mentioned
Answer» A. all udp packets are treated independently by transport layer
discuss

53. Transmission control protocol is


A. connection oriented protocol
B. uses a three way handshake to establish a connection
C. recievs data from application as a single stream
D. all of the mentioned
Answer» D. all of the mentioned
discuss

54.
An endpoint of an inter-process communication flow across
a computer network is called
A. socket
B. pipe
C. port
D. none of the mentioned
54.
An endpoint of an inter-process communication flow across
a computer network is called
Answer» A. socket
discuss

55. Socket-style API for windows is called


A. wsock
B. winsock
C. wins
D. none of the mentioned
Answer» B. winsock
discuss

56.
Which one of the following is a version of UDP with
congestion control?
A. datagram congestion control protocol
B. stream control transmission protocol
C. structured stream transport
D. none of the mentioned
Answer» A. datagram congestion control protocol
discuss

57. A _____ is a TCP name for a transport service access point.


A. port
B. pipe
C. node
D. none of the mentioned
Answer» A. port
discuss

58. Transport layer protocols deals with


A. application to application communication
B. process to process communication
C. node to node communication
D. none of the mentioned
Answer» B. process to process communication
discuss
59.
The ____ translates internet domain and host names to IP
address.
A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» A. domain name system
discuss

60.
Teredo is an automatic tunneling technique. In each client
the obfuscated IPv4 address is represented by bits
A. 96 to 127
B. 0 to 63
C. 80 to 95
D. 64 to 79
Answer» A. 96 to 127
discuss

Which one of the following allows a user at one site to


61. establish a connection to another site and then pass

keystrokes from local host to remote host?


A. http
B. ftp
C. telnet
D. none of the mentioned
Answer» C. telnet
discuss

62. Application layer protocol defines


A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of the mentioned
Answer» D. all of the mentioned
discuss
63.
Which one of the following protocol delivers/stores mail to
reciever server?
A. simple mail transfer protocol
B. post office protocol
C. internet mail access protocol
D. hypertext transfer protocol
Answer» A. simple mail transfer protocol
discuss

64. The ASCII encoding of binary data is called


A. base 64 encoding
B. base 32 encoding
C. base 16 encoding
D. base 8 encoding
Answer» A. base 64 encoding
discuss

65.
Which one of the following is an internet standard protocol
for managing devices on IP network?
A. dynamic host configuration protocol
B. simple newtwork management protocol
C. internet message access protocol
D. media gateway protocol
Answer» B. simple newtwork management protocol
discuss

66.
Which one of the following is not an application layer
protocol?
A. media gateway protocol
B. dynamic host configuration protocol
C. resource reservation protocol
D. session initiation protocol
Answer» C. resource reservation protocol
discuss

67.
Which protocol is a signalling communication protocol
used for controlling multimedia communication sessions?
A. session initiation protocol
B. session modelling protocol
67.
Which protocol is a signalling communication protocol
used for controlling multimedia communication sessions?
C. session maintenance protocol
D. none of the mentioned
Answer» A. session initiation protocol
discuss

68. Which one of the following is not correct?


application layer protocols are used by both source and destination devices during a
A.
communication session
B. application layer protocols implemented on the source and destination host must match
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss

69. When displaying a web page, the application layer uses the
A. http protocol
B. ftp protocol
C. smtp protocol
D. none of the mentioned
Answer» A. http protocol
discuss

70. The entire hostname has a maximum of


A. 255 characters
B. 127 characters
C. 63 characters
D. 31 characters
Answer» A. 255 characters
discuss

71. A DNS client is called


A. dns updater
B. dns resolver
C. dns handler
D. none of the mentioned
Answer» B. dns resolver
discuss
72. Servers handle requests for other domains
A. directly
B. by contacting remote dns server
C. it is not possible
D. none of the mentioned
Answer» B. by contacting remote dns server
discuss

73. DNS database contains


A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer» D. all of the mentioned
discuss

74.
If a server has no clue about where to find the address for a
hostname then
A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer» A. server asks to the root server
discuss

75.
Which one of the following allows client to update their
DNS entry as their IP address change?
A. dynamic dns
B. mail transfer agent
C. authoritative name server
D. none of the mentioned
Answer» A. dynamic dns
discuss

76. Wildcard domain names start with label


A. @
B. *
C. &
D. #
76. Wildcard domain names start with label
Answer» B. *
discuss

77.
The right to use a domain name is delegated by domain
name registers which are accredited by
A. internet architecture board
B. internet society
C. internet research task force
D. internet corporation for assigned names and numbers
Answer» D. internet corporation for assigned names and numbers
discuss

78. The domain name system is maintained by


A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer» A. distributed database system
discuss

79. Which one of the following is not true?


A. multiple hostnames may correspond to a single ip address
B. a single hostname may correspond to many ip addresses
C. a single hostname may correspond to a single ip address
D. none of the mentioned
Answer» C. a single hostname may correspond to a single ip address
discuss

80. Telnet protocol is used to establish a connection to


A. tcp port number 21
B. tcp port number 22
C. tcp port number 23
D. tcp port number 24
Answer» C. tcp port number 23
discuss

81. Which one of the following is not true?


A. telnet defines a network virtual terminal (nvt) standard
81. Which one of the following is not true?
B. client programs interact with nvt
C. server translates nvt operations
D. none of the mentioned
Answer» D. none of the mentioned
discuss

82. All telnet operations are sent as


A. 4 bytes
B. 8 bytes
C. 16 bytes
D. 32 bytes
Answer» B. 8 bytes
discuss

83. AbsoluteTelnet is a telnet client for


A. windows
B. linux
C. mac
D. none of the mentioned
Answer» A. windows
discuss

84.
The decimal code of interpret as command (IAC) character
is
A. 252
B. 253
C. 254
D. 255
Answer» D. 255
discuss

85. In character mode operation of telnet implementation


A. each character typed is sent by the client to the server
B. each character typed is discarded by the server
C. both (a) an (b)
D. none of the mentioned
Answer» A. each character typed is sent by the client to the server
discuss
86. Which one of the following is not correct?
A. telnet is a general purpose client-server program
B. telnet lets user access an application on a remote computer
C. telnet can also be used for file transfer
D. none of the mentioned
Answer» C. telnet can also be used for file transfer
discuss

87. Which operating mode of telnet is full duplex?


A. default mode
B. server mode
C. line mode
D. none of the mentioned
Answer» C. line mode
discuss

88.
If we want that a character be interpreted by the client
instead of server
A. escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. none of the mentioned
Answer» A. escape character has to be used
discuss

89. Dynamic web page


A. is same every time whenever it displays
B. generates on demand by a program or a request from browser
C. both (a) and (b)
D. none of the mentioned
Answer» B. generates on demand by a program or a request from browser
discuss

90. What is a web browser?


A. a program that can display a web page
B. a program used to view html documents
C. it enables user to access the resources of internet
D. all of the mentioned
Answer» D. all of the mentioned
discuss
91. Common gateway interface is used to
A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. none of the mentioned
Answer» A. generate executable files from web content by web server
discuss

92. URL stands for


A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» C. uniform resource locator
discuss

93. A web cookie is a small piece of data


A. sent from a website and stored in user’s web browser while a user is browsing a website
B. sent from user and stored in the server while a user is browsing a website
C. sent from root server to all servers
D. none of the mentioned
Answer» A. sent from a website and stored in user’s web browser while a user is browsing a
website
discuss

94.
Which one of the following is not used to generate dynamic
web pages?
A. php
B. asp.net
C. jsp
D. none of the mentioned
Answer» D. none of the mentioned
discuss

95. An alternative of javascript on windows platform is


A. vbscript
B. asp.net
C. jsp
D. none of the mentioned
Answer» A. vbscript
discuss

96. What is document object model (DOM)?


A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in asp.net
D. none of the mentioned
Answer» A. convention for representing and interacting with objects in html documents
discuss

97. AJAX stands for


A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Answer» A. asynchronous javascript and xml
discuss

98.
Multiple object can be sent over a TCP connection between
client and server in
A. persistent http
B. nonpersistent http
C. both (a) and (b)
D. none of the mentioned
Answer» A. persistent http
discuss

99. HTTP is ________ protocol.


A. application layer
B. transport layer
C. network layer
D. none of the mentioned
Answer» A. application layer
discuss

100. In the network HTTP resources are located by


A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. none of the mentioned
Answer» A. uniform resource identifier
101.
HTTP client requests by establishing a __________
connection to a particular port on the server.
A. user datagram protocol
B. transmission control protocol
C. broader gateway protocol
D. none of the mentioned
Answer» B. transmission control protocol
discuss

102. In HTTP pipelining


multiple http requests are sent on a single tcp connection without waiting for the
A.
corresponding responses
B. multiple http requests can not be sent on a single tcp connection
C. multiple http requests are sent in a queue on a single tcp connection
D. none of the mentioned
Answer» A. multiple http requests are sent on a single tcp connection without waiting for the
corresponding responses
discuss

103. FTP server listens for connection on port number


A. 20
B. 21
C. 22
D. 23
Answer» B. 21
discuss

104.
In FTP protocol, client contacts server using ____ as the
transport protocol.
A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» A. transmission control protocol
discuss
105.
In which mode FTP, the client initiates both the control
and data connections.
A. active mode
B. passive mode
C. both (a) and (b)
D. none of the mentioned
Answer» B. passive mode
discuss

106. The file transfer protocol is built on


A. data centric architecture
B. service oriented architecture
C. client server architecture
D. none of the mentioned
Answer» C. client server architecture
discuss

107. In file transfer protocol, data transfer can be done in


A. stream mode
B. block mode
C. compressed mode
D. all of the mentioned
Answer» D. all of the mentioned
discuss

108. Ethernet frame consists of


A. mac address
B. ip address
C. both (a) and (b)
D. none of the mentioned
Answer» A. mac address
discuss

109. What is stat frame delimeter (SFD) in ethernet frame?


A. 10101010
B. 10101011
C. 00000000
D. 11111111
Answer» B. 10101011
discuss
110. What is autonegotiation?
A. a procedure by which two connected devices choose common transmission parameters
B. a security algorithm
C. a routing algorithm
D. none of the mentioned
Answer» A. a procedure by which two connected devices choose common transmission parameters
discuss

111.
Ethernet in metropolitan area network (MAN) can be
used as
A. pure ethernet
B. ethernet over sdh
C. ethernet over mpls
D. all of the mentioned
Answer» D. all of the mentioned
discuss

112.
A point-to-point protocol over ethernet is a network
protocol for
A. encapsulating ppp frames inside ethernet frames
B. encapsulating ehternet framse inside ppp frames
C. for security of ethernet frames
D. for security of ppp frames
Answer» A. encapsulating ppp frames inside ethernet frames
discuss

113. High speed ethernet works on


A. coaxial cable
B. twisted pair cable
C. optical fiber
D. none of the mentioned
Answer» C. optical fiber
discuss

114. The maximum size of payload field in ethernet frame is


A. 1000 bytes
B. 1200 bytes
C. 1300 bytes
D. 1500 bytes
Answer» D. 1500 bytes
discuss

115. What is interframe gap?


A. idle time between frames
B. idle time between frame bits
C. idle time between packets
D. none of the mentioned
Answer» A. idle time between frames
discuss

116.
An ethernet frame that is less than the IEEE 802.3
minimum length of 64 octets is called
A. short frame
B. run frame
C. mini frame
D. man frame
Answer» B. run frame
discuss

117.
Which of this is not a constituent of residential telephone
line?
A. a high-speed downstream channel
B. a medium-speed downstream channel
C. a low-speed downstream channel
D. none of the mentioned
Answer» C. a low-speed downstream channel
discuss

118. In DSL telco provides these services


A. wired phone access
B. isp
C. all of the mentioned
D. none of the mentioned
Answer» C. all of the mentioned
discuss

119. The function of DSLAM is


A. convert analog signals into digital signals
B. convert digital signals into analog signals
C. amplify digital signals
119. The function of DSLAM is
D. none of the mentioned
Answer» A. convert analog signals into digital signals
discuss

120. The following term is not associted with DSL


A. dslam
B. co
C. splitter
D. cmts
Answer» D. cmts
discuss

121. HFC contains


A. fibre cable
B. coaxial cable
C. both of the mentioned
D. none of the mentioned
Answer» C. both of the mentioned
discuss

122.
Choose the statement which is not applicable for cable
internet access
A. it is a shared broadcast medium
B. it includes hfcs
C. cable modem connects home pc to ethernet port
D. analog signal is converted to digital signal in dslam
Answer» D. analog signal is converted to digital signal in dslam
discuss

123.
Among the optical-distribution architectures that is
essentially switched ehternet is
A. aon
B. pon
C. non
D. none of the mentioned
Answer» A. aon
discuss
124. StarBand provides
A. ftth internet access
B. cable access
C. telephone access
D. satellite access
Answer» D. satellite access
discuss

125. Home Access is provided by


A. dsl
B. fttp
C. cable
D. all of the mentioned
Answer» D. all of the mentioned
discuss

126. ONT is connected to splitter using


A. high speed fibre cable
B. hfc
C. optical cable
D. none of the mentioned
Answer» C. optical cable
discuss

127.
The sharing of a medium and its link by two or more
devices is called _______
A. fully duplexing
B. multiplexing
C. both a and b
D. none of the mentioned
Answer» B. multiplexing
discuss

128. Multiplexing is used in _______


A. packet switching
B. circuit switching
C. data switching
D. none of the mentioned
Answer» B. circuit switching
discuss
129. Which multiplexing technique transmits digital signals ?
A. fdm
B. tdm
C. wdm
D. none of the mentioned
Answer» B. tdm
discuss

130.
If there are n signal sources of same data rate than TDM
link has _______ slots
A. n
B. n/2
C. n*2
D. 2^n
Answer» A. n
discuss

131.
If link transmits 4000frames per second, and each slot has
8 bits,the transmission rate of circuit this TDM is
A. 32kbps
B. 500bps
C. 500kbps
D. none of the mentioned
Answer» A. 32kbps
discuss

132. The state when dedicated signals are idle are called
A. death period
B. poison period
C. silent period
D. none of the mentioned
Answer» C. silent period
discuss

133. Multiplexing can provide


A. efficiency
B. privacy
C. anti jamming
D. both a and b
133. Multiplexing can provide
Answer» D. both a and b
discuss

In TDM, the transmission rate of the multiplexed path is


134. usually _______ the sum of the transmission rates of the

signal sources.
A. greater than
B. lesser than
C. equal to
D. equal to or greater than
Answer» A. greater than
discuss

135. In TDM, slots are further divided into


A. seconds
B. frames
C. packets
D. none of the mentioned
Answer» B. frames
discuss

136.
Multiplexing technique that shifts each signal to a
different carrier frequency
A. fdm
B. tdm
C. either a or b
D. both a and b
Answer» A. fdm
discuss

137. Physical or logical arrangement of network is


A. topology
B. routing
C. networking
D. none of the mentioned
Answer» A. topology
discuss
138. In this topology there is a central controller or hub
A. star
B. mesh
C. ring
D. bus
Answer» A. star
discuss

139. This topology requires multipoint connection


A. star
B. mesh
C. ring
D. bus
Answer» D. bus
discuss

140.
Data communication system spanning states, countries, or
the whole world is
A. lan
B. wan
C. man
D. none of the mentioned
Answer» B. wan
discuss

141.
Data communication system within a building or campus
is
A. lan
B. wan
C. man
D. none of the mentioned
Answer» A. lan
discuss

142. Expand WAN


A. world area network
B. wide area network
C. web area network
D. none of the mentioned
142. Expand WAN
Answer» B. wide area network
discuss

143.
A local telephone network is an example of a _______
network
A. packet switched
B. circuit switched
C. both of the mentioned
D. none of the mentioned
Answer» B. circuit switched
discuss (2)

144. Most packet switches use this principle


A. stop and wait
B. store and forward
C. both of the mentioned
D. none of the mentioned
Answer» B. store and forward
discuss

If there are N routers from source to destination, total end


145. to end delay in sending packet P(L->number of bits in the

packet R-> transmission rate)


A. n
B. (n*l)/r
C. (2n*l)/r
D. l/r
Answer» B. (n*l)/r
discuss

146.
Method(s) to move data through a network of links and
switches
A. packet switching
B. circuit switching
C. line switching
D. both a and b
Answer» D. both a and b
discuss
The resources needed for communication between end
147. systems are reserved for the duration of session between

end systems in ________


A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» B. circuit switching
discuss

148.
As the resouces are reserved between two communicating
end systems in circuit switching, this is achieved
A. authentication
B. guaranteed constant rate
C. reliability
D. store and forward
Answer» B. guaranteed constant rate
discuss

149. What is internet?


A. a single network
B. a vast collection of different networks
C. interconnection of local area networks
D. none of the mentioned
Answer» B. a vast collection of different networks
discuss

150. To join the internet, the computer has to be connected to a


A. internet architecture board
B. internet society
C. internet service provider
D. none of the mentioned
Answer» C. internet service provider

151.
Internet access by transmitting digital data over the wires
of a local telephone network is provided by
A. leased line
151.
Internet access by transmitting digital data over the wires
of a local telephone network is provided by
B. digital subscriber line
C. digital signal line
D. none of the mentioned
Answer» B. digital subscriber line
discuss

152. ISP exchanges internet traffic between their networks by


A. internet exchange point
B. subscriber end point
C. isp end point
D. none of the mentioned
Answer» A. internet exchange point
discuss

153.
Which one of the following protocol is not used in
internet?
A. http
B. dhcp
C. dns
D. none of the mentioned
Answer» D. none of the mentioned
discuss

154. IPv6 addressed have a size of


A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Answer» C. 128 bits
discuss

155. Internet works on


A. packet switching
B. circuit switching
C. both (a) and (b)
D. none of the mentioned
Answer» A. packet switching
discuss

156.
Which one of the following is not an application layer
protocol used in internet?
A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. none of the mentioned
Answer» C. resource reservation protocol
discuss

157.
Which protocol assigns IP address to the client connected
in the internet?
A. dhcp
B. ip
C. rpc
D. none of the mentioned
Answer» A. dhcp
discuss

158.
Which one of the following is not used in media access
control?
A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. none of the mentioned
Answer» D. none of the mentioned
discuss

159. In cryptography, what is cipher?


A. algorithm for performing encryption and decryption
B. encrypted message
C. both (a) and (b)
D. none of the mentioned
Answer» A. algorithm for performing encryption and decryption
discuss

160.
In asymmetric key cryptography, the private key is kept
by
A. sender
160.
In asymmetric key cryptography, the private key is kept
by
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» B. receiver
discuss

161.
Which one of the following algorithm is not used in
asymmetric key cryptography?
A. rsa algorithm
B. diffie-hellman algorithm
C. electronic code book algorithm
D. none of the mentioned
Answer» C. electronic code book algorithm
discuss

162.
In cryptography, the order of the letters in a message is
rearranged by
A. transpositional ciphers
B. substitution ciphers
C. both (a) and (b)
D. none of the mentioned
Answer» A. transpositional ciphers
discuss

163. What is data encryption standard (DES)?


A. block cipher
B. stream cipher
C. bit cipher
D. none of the mentioned
Answer» A. block cipher
discuss

164. Cryptanalysis is used


A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. none of the mentioned
Answer» A. to find some insecurity in a cryptographic scheme
discuss

165.
Which one of the following is a cryptographic protocol
used to secure HTTP connection?
A. stream control transmission protocol (sctp)
B. transport layer security (tsl)
C. explicit congestion notification (ecn)
D. resource reservation protocol
Answer» B. transport layer security (tsl)
discuss

166.
Voice privacy in GSM cellular telephone protocol is
provided by
A. a5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Answer» A. a5/2 cipher
discuss

167. ElGamal encryption system is


A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. none of the mentioned
Answer» B. asymmetric key encryption algorithm
discuss

168.
Cryptographic hash function takes an arbitrary block of
data and returns
A. fixed size bit string
B. variable size bit string
C. both (a) and (b)
D. none of the mentioned
Answer» A. fixed size bit string
discuss

169.
The attackers a network of compromised devices known
as
A. internet
169.
The attackers a network of compromised devices known
as
B. botnet
C. telnet
D. d-net
Answer» B. botnet
discuss

170. Which of the following is a form of DoS attack ?


A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» D. all of the mentioned
discuss

The DoS attack is which the attacker establishes a large


171. number of half-open or fully open TCP connections at the

target host
A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» C. connection flooding
discuss

172.
The DoS attack is which the attacker sends deluge of
packets to the targeted host
A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» B. bandwidth flooding
discuss

173. Packet sniffers involve


A. active receiver
B. passive receiver
C. both of the mentioned
173. Packet sniffers involve
D. none of the mentioned
Answer» B. passive receiver
discuss

174. Sniffers can be deployed in


A. wired environment
B. wifi
C. ethernet lan
D. all of the mentioned
Answer» D. all of the mentioned
discuss

175. Firewalls are often configured to block


A. udp traffic
B. tcp traffic
C. both of the mentioned
D. none of the mentioned
Answer» A. udp traffic
discuss

176.
DHCP (dynamic host configuration protocol) provides
_____ to the client.
A. ip address
B. mac address
C. url
D. none of the mentioned
Answer» A. ip address
discuss

177. DHCP is used for


A. ipv6
B. ipv4
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss
178. The DHCP server
A. maintains a database of available ip addresses
B. maintains the information about client configuration parameters
C. grants a ip address when receives a request from a client
D. all of the mentioned
Answer» D. all of the mentioned
discuss

179. IP assigned for a client by DHCP server is


A. for a limited period
B. for unlimited period
C. not time dependent
D. none of the mentioned
Answer» A. for a limited period
discuss

180. DHCP uses UDP port ____ for sending data to the server.
A. 66
B. 67
C. 68
D. 69
Answer» B. 67
discuss

181.
The DHCP server can provide the _______ of the IP
addresses.
A. dynamic allocation
B. automatic allocation
C. static allocation
D. all of the mentioned
Answer» D. all of the mentioned
discuss

182.
DHCP client and servers on the same subnet communicate
via
A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
182.
DHCP client and servers on the same subnet communicate
via
Answer» A. udp broadcast
discuss

183.
After obtaining the IP address, to prevent the IP conflict
the client may use
A. internet relay chat
B. broader gateway protocol
C. address resolution protocol
D. none of the mentioned
Answer» C. address resolution protocol
discuss

184. What is DHCP snooping?


A. techniques applied to ensure the security of an existing dhcp infrastructure
B. encryption of the dhcp server requests
C. algorithm for dhcp
D. none of the mentioned
Answer» A. techniques applied to ensure the security of an existing dhcp infrastructure
discuss

185.
If DHCP snooping is configured on a LAN switch, then
clients having specific ______ can access the network.
A. mac address
B. ip address
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss

186. Real-time transport protocol (RTP) is mostly used in


A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer» D. all of the mentioned
discuss
187. RTP is used to
A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. none of the mentioned
Answer» A. carry the media stream
discuss

188. RTP provides the facility of jitter ____ .


A. compensation
B. expansion
C. both (a) and (b)
D. none of the mentioned
Answer» A. compensation
discuss

189.
Which protocol provides the synchronization between
media streams?
A. rtp
B. rtcp
C. rpc
D. none of the mentioned
Answer» B. rtcp
discuss

190. An RTP session is established for


A. each media stream
B. all media streams
C. some predefined number of media streams
D. none of the mentioned
Answer» A. each media stream
discuss

191. RTP can use


A. unprevileleged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer» D. all of the mentioned
discuss
192.
Which one of the following multimedia formats can not be
supported by RTP?
A. mpeg-4
B. mjpeg
C. mpeg
D. none of the mentioned
Answer» D. none of the mentioned
discuss

193. An RTP header has a minimum size of


A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer» A. 12 bytes
discuss

194. Which one of the following is not correct?


A. rtcp provides canonical end-point identifiers to all session participants
B. rtcp reports are expected to be sent by all participants
C. both (a) and (b)
D. none of the mentioned
Answer» D. none of the mentioned
discuss

195.
Which protocol defines a profile of RTP that provides
cryptographic services for the transfer of payload data?
A. srtp
B. rtcp
C. rcp
D. none of the mentioned
Answer» A. srtp
discuss

196. Ping can


A. measure round-trip time
B. report packet loss
C. report latency
D. all of the mentioned
196. Ping can
Answer» D. all of the mentioned
discuss

Suppose two IPv6 nodes want to interoperate using IPv6


197. datagrams but are connected to each other by intervening

IPv4 routers. The best solution here is


A. use dual-stack approach
B. tunneling
C. no solution
D. replace the system
Answer» B. tunneling
discuss

198. Ping sweep is a part of


A. traceroute
B. nmap
C. route
D. ipconfig
Answer» B. nmap
discuss

199. ICMP is used in


A. ping
B. traceroute
C. ifconfig
D. both a and b
Answer» D. both a and b
discuss

200.
_____ command is used to manipulate TCP/IP routing
table.
A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» A. route
201.
If you want to find the number of routers between a source
and destination, the utility to be used is.
A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» D. traceroute
discuss

202.
Which of the following is related to ipconfig in Microsoft
Windows ?
A. display all current tcp/ip network configuration values
B. modify dhcp settings
C. modify dns settings
D. all of the mentioned
Answer» D. all of the mentioned
discuss

203.
This allows to check if a domain is available for
registration.
A. domain check
B. domain dossier
C. domain lookup
D. none of the mentioned
Answer» A. domain check
discuss

204. Choose the wrong statement


A. nslookup is used to query a dns server for dns data
B. ping is used to check connectivity
C. pathping combines the functionality of ping with that of route
D. ifconfig can configure tcp/ip network interface parameters
Answer» C. pathping combines the functionality of ping with that of route
discuss

205. Expansion of FTP is


A. fine transfer protocol
B. file transfer protocol
C. first transfer protocol
205. Expansion of FTP is
D. none of the mentioned
Answer» B. file transfer protocol
discuss

206. FTP is built on _____ architecture


A. client-server
B. p2p
C. both of the mentioned
D. none of the mentioned
Answer» A. client-server
discuss

207. FTP uses _____ parallel TCP connections to transfer a file


A. 1
B. 2
C. 3
D. 4
Answer» B. 2
discuss

208. Identify the incorrect statement


A. ftp stands for file transfer protocol
B. ftp uses two parallel tcp connections
C. ftp sends its control information in-band
D. ftp sends exactly one file over the data connection
Answer» C. ftp sends its control information in-band
discuss

If 5 files are transfered from server A to client B in the


209. same session. The number of TCP connection between A
and B is
A. 5
B. 10
C. 2
D. 6
Answer» D. 6
discuss
210. FTP server
A. mantains state
B. is stateless
C. has single tcp connection for a file transfer
D. none of the mentioned
Answer» A. mantains state
discuss

The commands, from client to server, and replies, from


211. server to client, are sent across the control connection in

____ bit ASCII format


A. 8
B. 7
C. 3
D. 5
Answer» B. 7
discuss

212. Find the FTP reply whose message is wrongly matched


A. 331 – username ok, password required
B. 425 – can’t open data connection
C. 452 – error writing file
D. 452 – can’t open data connection
Answer» D. 452 – can’t open data connection
discuss

213. Mode of data transfer in FTP, where all the is left to TCP
A. stream mode
B. block mode
C. compressed mode
D. none of the mentioned
Answer» A. stream mode
discuss

214. The password is sent to the server using _____ command


A. passwd
B. pass
C. password
D. none of the mentioned
Answer» B. pass
discuss

215.
The number of objects in a Web page which consists of 4
jpeg images and HTML text is ______
A. 4
B. 1
C. 5
D. none of the mentioned
Answer» C. 5
discuss

216. The default connection type used by HTTP is _____


A. persistent
B. non-persistent
C. either of the mentioned
D. none of the mentioned
Answer» A. persistent
discuss

217.
The time taken by a packet to travel from client to server
and then back to the client is called ____
A. stt
B. rtt
C. ptt
D. none of the mentioned
Answer» B. rtt
discuss

218.
The HTTP request message is sent in ____ part of three-
way handshake.
A. first
B. second
C. third
D. none of the mentioned
Answer» C. third
discuss

219.
In the process of fetching a web page from a server the
HTTP request/response takes ______ RTTs.
A. 2
219.
In the process of fetching a web page from a server the
HTTP request/response takes ______ RTTs.
B. 1
C. 4
D. 3
Answer» B. 1
discuss

220. The first line of HTTP request message is called ____


A. request line
B. header line
C. status line
D. entity line
Answer» A. request line
discuss

221.
The values GET, POST, HEAD etc are specified in ____ of
HTTP message
A. request line
B. header line
C. status line
D. entity body
Answer» A. request line
discuss

222.
The ______ method when used in the method field, leaves
entity body empty.
A. post
B. get
C. both of the mentioned
D. none of the mentioned
Answer» B. get
discuss

223.
The HTTP response message leaves out the requested
object when _____ method is used
A. get
B. post
C. head
223.
The HTTP response message leaves out the requested
object when _____ method is used
D. put
Answer» C. head
discuss

224. Find the oddly matched HTTP status codes


A. 200 ok
B. 400 bad request
C. 301 moved permanently
D. 304 not found
Answer» D. 304 not found
discuss

225. Which of the following is not correct ?


A. web cache doesnt has its own disk space
B. web cache can act both like server and client
C. web cache might reduce the response time
D. web cache contains copies of recently requested objects
Answer» A. web cache doesnt has its own disk space
discuss

226. The conditional GET mechanism


A. imposes conditions on the objects to be requested
B. limits the number of response from a server
C. helps to keep a cache upto date
D. none of the mentioned
Answer» C. helps to keep a cache upto date
discuss

227.
Which of the following is present in both an HTTP request
line and a status line?
A. http version number
B. url
C. method
D. none of the mentioned
Answer» A. http version number
discuss
228. Which of the following is not applicable for IP?
A. error reporting
B. handle addressing conventions
C. datagram format
D. packet handling conventions
Answer» A. error reporting
discuss

229.
Which of the following field in IPv4 datagram is not
related to fragmentation?
A. flags
B. offset
C. tos
D. identifier
Answer» C. tos
discuss

230.
The TTL field has value 10. How many routers (max) can
process this datagram?
A. 11
B. 5
C. 10
D. 1
Answer» C. 10
discuss

231.
If the value in protocol field is 17, the transport layer
protocol used is ____.
A. tcp
B. udp
C. either of the mentioned
D. none of the mentioned
Answer» B. udp
discuss

232. The data field can carry which of the following?


A. tcp segemnt
B. udp segment
C. icmp messages
232. The data field can carry which of the following?
D. none of the mentioned
Answer» C. icmp messages
discuss

233.
What should be the flag value to indicate the last
fragment?
A. 0
B. 1
C. ttl value
D. none of the mentioned
Answer» A. 0
discuss

234. Which of these is not applicable for IP protocol?


A. is connectionless
B. offer reliable service
C. offer unreliable service
D. none of the mentioned
Answer» B. offer reliable service
discuss

235. Fragmentation has following demerits


A. complicates routers
B. open to dos attack
C. overlapping of fragments.
D. all of the mentioned
Answer» D. all of the mentioned
discuss

236.
Which field helps to check rearrangement of the
fragments?
A. offset
B. flag
C. ttl
D. identifer
Answer» A. offset
discuss
237. The size of IP address in IPv6 is
A. 4bytes
B. 128bits
C. 8bytes
D. 100bits
Answer» B. 128bits
discuss

238. The header length of an IPv6 datagram is _____.


A. 10bytes
B. 25bytes
C. 30bytes
D. 40bytes
Answer» D. 40bytes
discuss

239.
In the IPv6 header,the traffic class field is similar to which
field in the IPv4 header?
A. fragmentation field
B. fast-switching
C. tos field
D. option field
Answer» C. tos field
discuss

240. IPv6 doesnot use ______ type of address


A. broadcast
B. multicast
C. anycast
D. none of the mentioned
Answer» A. broadcast
discuss

241. These are the features present in IPv4 but not in IPv6.
A. fragmentation
B. header checksum
C. options
D. all of the mentioned
Answer» D. all of the mentioned
discuss
242. The ____ field determines the lifetime of IPv6 datagram
A. hop limit
B. ttl
C. next header
D. none of the mentioned
Answer» A. hop limit
discuss

243. Dual-stack approach refers to


A. implementing ipv4 with 2 stacks
B. implementing ipv6 with 2 stacks
C. node has both ipv4 and ipv6 support
D. none of the mentioned
Answer» C. node has both ipv4 and ipv6 support
discuss

The operation of ____________ is based on signals which


244. are multiplexed and added in time domain but they occupy

different slots in frequency domain


A. fdm
B. tdm
C. wdm
D. mdm
Answer» A. fdm
discuss

245. which of the following is not Guided transmission media


A. twisted pair cables
B. co-axial cables
C. infrared
D. fibre optics
Answer» C. infrared
discuss

246.
____________ media is a communication medium which
allows the data to get guided along it.
A. transparent
B. cable
C. guided
246.
____________ media is a communication medium which
allows the data to get guided along it.
D. glass
Answer» C. guided
discuss

247. Presentation doesn’t perform ________ function


A. translation
B. transmission
C. encryption
D. compression
Answer» B. transmission
discuss

248. Below layers are not present in TCP/IP layer.


A. application
B. presentation
C. transport
D. network
Answer» B. presentation
discuss

249. Which of the following are not duties of Physical layer


A. bit rate control
B. multiplexing
C. error detection
D. circuit switching
Answer» C. error detection
discuss

250.
A field in header is used to specify the number of
characters in the frame.
A. start bit
B. character count
C. end bit
D. character stuffing
Answer» B. character count
251.
The data bit to be transmitted are broken into discrete
__________ at the data link layer.
A. frame
B. stuff
C. character
D. data
Answer» A. frame
discuss

A standard mechanism provided by internet which helps


252. in copying a file from one host to another is known as
________.
A. smtp
B. dns server
C. telnet
D. ftp
Answer» D. ftp
discuss

253.
Which one of the below is not an component of Internet
mail system
A. user agent
B. smtp sender
C. smtp receiver
D. transfer agent
Answer» D. transfer agent
discuss

254.
How many layers are present in the Internet protocol
stack (TCP/IP model)?
A. 5
B. 7
C. 6
D. 10
Answer» A. 5
discuss
255. Application layer is implemented in ____________
A. end system
B. nic
C. ethernet
D. packet transport
Answer» A. end system
discuss

256. Transport layer is implemented in ______________


A. end system
B. nic
C. ethernet
D. signal transmission
Answer» A. end system
discuss

257.
The functionalities of the presentation layer include
____________
A. data compression
B. data encryption
C. data description
D. all of the mentioned
Answer» D. all of the mentioned
discuss

258.
Delimiting and synchronization of data exchange is
provided by __________
A. application layer
B. session layer
C. transport layer
D. link layer
Answer» B. session layer
discuss (1)

259. Physical or logical arrangement of network is __________


A. topology
B. routing
C. networking
D. control
Answer» A. topology
discuss

260.
Which network topology requires a central controller or
hub?
A. star
B. mesh
C. ring
D. bus
Answer» A. star
discuss

261.
Data communication system spanning states, countries, or
the whole world is ________
A. lan
B. wan
C. man
D. pan
Answer» B. wan
discuss

262.
Data communication system within a building or campus
is________
A. lan
B. wan
C. man
D. pan
Answer» A. lan
discuss

263. Which of this is not a guided media?


A. fiber optical cable
B. coaxial cable
C. wireless lan
D. copper wire
Answer» C. wireless lan
discuss

264.
Coaxial cable consists of _______ concentric copper
conductors.
A. 1
264.
Coaxial cable consists of _______ concentric copper
conductors.
B. 2
C. 3
D. 4
Answer» B. 2
discuss

265. Fiber optics posses following properties __________


A. immune electromagnetic interference
B. very less signal attenuation
C. very hard to tap
D. all of the mentioned
Answer» D. all of the mentioned
discuss

266.
If an Optical Carrier is represented as OC-n, generally the
link speed equals(in Mbps) __________
A. n*39.8
B. n*51.8
C. 2n*51.8
D. none of the mentioned
Answer» B. n*51.8
discuss

267.
Radio channels are attractive medium because
__________
A. can penetrate walls
B. connectivity can be given to mobile user
C. can carry signals for long distance
D. all of the mentioned
Answer» D. all of the mentioned
discuss

268. Geostationary satellites ___________


A. are placed at a fixed point above the earth
B. rotate the earth about a fixed axis
C. rotate the earth about a varying axis
D. all of the mentioned
268. Geostationary satellites ___________
Answer» A. are placed at a fixed point above the earth
discuss

269.
Bits can be sent over guided and unguided media as
analog signal by ___________
A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Answer» A. digital modulation
discuss

270. The physical layer provides __________


A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for ir over optical fiber
D. all of the mentioned
Answer» D. all of the mentioned
discuss

271.
In asynchronous serial communication the physical layer
provides ___________
A. start and stop signalling
B. flow control
C. both start & stop signalling and flow control
D. only start signalling
Answer» C. both start & stop signalling and flow control
discuss

272. The physical layer is responsible for __________


A. line coding
B. channel coding
C. modulation
D. all of the mentioned
Answer» D. all of the mentioned
discuss
273.
Wireless transmission of signals can be done via
___________
A. radio waves
B. microwaves
C. infrared
D. all of the mentioned
Answer» D. all of the mentioned
discuss

274. Transmission control protocol ___________


A. is a connection-oriented protocol
B. uses a three way handshake to establish a connection
C. receives data from application as a single stream
D. all of the mentioned
Answer» D. all of the mentioned
discuss

275. Datagram networks mainly refers to _________


A. connection oriented networks
B. connection less networks
C. telephone networks
D. internetwork
Answer» B. connection less networks
discuss

276. The network layer is concerned with __________ of data.


A. bits
B. frames
C. packets
D. bytes
Answer» C. packets
discuss

277.
Which one of the following is not a function of network
layer?
A. routing
B. inter-networking
C. congestion control
D. error control
277.
Which one of the following is not a function of network
layer?
Answer» D. error control
discuss

278.
In virtual circuit network each packet contains
___________
A. full source and destination address
B. a short vc number
C. only source address
D. only destination address
Answer» B. a short vc number
discuss

279.
Which of the following routing algorithms can be used for
network layer design?
A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» D. all of the mentioned
discuss

280.
Which of the following is not correct in relation to multi-
destination routing?
A. is same as broadcast routing
B. contains the list of all destinations
C. data is not sent by packets
D. there are multiple receivers
Answer» C. data is not sent by packets
discuss

281.
A subset of a network that includes all the routers but
contains no loops is called ________
A. spanning tree
B. spider structure
C. spider tree
D. special tree
281.
A subset of a network that includes all the routers but
contains no loops is called ________
Answer» A. spanning tree
discuss

282.
Which one of the following algorithm is not used for
congestion control?
A. traffic aware routing
B. admission control
C. load shedding
D. routing information protocol
Answer» D. routing information protocol
discuss

283. The network layer protocol for internet is __________


A. ethernet
B. internet protocol
C. hypertext transfer protocol
D. file transfer protocol
Answer» B. internet protocol
discuss

284. ICMP is primarily used for __________


A. error and diagnostic functions
B. addressing
C. forwarding
D. routing
Answer» A. error and diagnostic functions
discuss

285.
Which of the following are transport layer protocols used
in networking?
A. tcp and ftp
B. udp and http
C. tcp and udp
D. http and ftp
Answer» C. tcp and udp
discuss
286.
Which one of the following is a version of UDP with
congestion control?
A. datagram congestion control protocol
B. stream control transmission protocol
C. structured stream transport
D. user congestion control protocol
Answer» A. datagram congestion control protocol
discuss

287.
A _____ is a TCP name for a transport service access
point.
A. port
B. pipe
C. node
D. protocol
Answer» A. port
discuss

288. Transport layer protocols deals with ____________


A. application to application communication
B. process to process communication
C. node to node communication
D. man to man communication
Answer» B. process to process communication
discuss

289. Which of the following is a transport layer protocol?


A. stream control transmission protocol
B. internet control message protocol
C. neighbor discovery protocol
D. dynamic host configuration protocol
Answer» A. stream control transmission protocol
discuss

290.
Which of the following computer networks is built on the
top of another network?
A. prior network
B. chief network
C. prime network
290.
Which of the following computer networks is built on the
top of another network?
D. overlay network
Answer» D. overlay network
discuss

291. In computer network nodes are _________


A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
Answer» D. all of the mentioned
discuss

292.
Communication channel is shared by all the machines on
the network in ________
A. broadcast network
B. unicast network
C. multicast network
D. anycast network
Answer» A. broadcast network
discuss (1)

293. Bluetooth is an example of __________


A. personal area network
B. local area network
C. virtual private network
D. wide area network
Answer» A. personal area network
discuss

294.
A list of protocols used by a system, one protocol per layer,
is called ________
A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Answer» B. protocol stack
discuss
295. Network congestion occurs _________
A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. in case of transfer failure
Answer» A. in case of traffic overloading
discuss

296.
Which of this is not a constituent of residential telephone
line?
A. a high-speed downstream channel
B. a medium-speed downstream channel
C. a low-speed downstream channel
D. an ultra-high speed downstream channel
Answer» C. a low-speed downstream channel
discuss

297. DSL telcos provide which of the following services?


A. wired phone access
B. isp
C. wired phone access and isp
D. network routing and isp
Answer» C. wired phone access and isp
discuss

298. The function of DSLAM is to __________


A. convert analog signals into digital signals
B. convert digital signals into analog signals
C. amplify digital signals
D. de-amplify digital signals
Answer» A. convert analog signals into digital signals
discuss

299. Which of the following terms is not associated with DSL?


A. dslam
B. co
C. splitter
D. cmts
Answer» D. cmts
discuss
300. HFC contains _______
A. fibre cable
B. coaxial cable
C. a combination of fibre cable and coaxial cable
D. twisted pair cable
Answer» C. a combination of fibre cable and coaxial cable

301.
Which of the following statements is not applicable for
cable internet access?
A. it is a shared broadcast medium
B. it includes hfcs
C. cable modem connects home pc to ethernet port
D. analog signal is converted to digital signal in dslam
Answer» D. analog signal is converted to digital signal in dslam
discuss

302. StarBand provides __________


A. ftth internet access
B. cable access
C. telephone access
D. satellite access
Answer» D. satellite access
discuss

303. Home Access is provided by __________


A. dsl
B. fttp
C. cable
D. all of the mentioned
Answer» D. all of the mentioned
discuss

304. ONT is connected to splitter using _________


A. high speed fibre cable
B. hfc
C. optical cable
D. twisted pair cable
Answer» C. optical cable
discuss
305.
Which of the following factors affect transmission rate in
DSL?
A. the gauge of the twisted-pair line
B. degree of electrical interfernece
C. shadow fading
D. the gauge of the twisted-pair line and degree of electrical interference
Answer» D. the gauge of the twisted-pair line and degree of electrical interference
discuss

306.
The number of layers in ISO OSI reference model is
__________
A. 5
B. 7
C. 6
D. 10
Answer» B. 7
discuss

307.
Which of the following statements can be associated with
OSI model?
A. a structured way to discuss and easier update system components
B. one layer may duplicate lower layer functionality
C. functionality at one layer no way requires information from another layer
D. it is an application specific network model
Answer» C. functionality at one layer no way requires information from another layer
discuss

308. OSI stands for __________


A. open system interconnection
B. operating system interface
C. optical service implementation
D. open service internet
Answer» A. open system interconnection
discuss

309.
The number of layers in ISO OSI reference model is
__________
A. 4
B. 5
309.
The number of layers in ISO OSI reference model is
__________
C. 6
D. 7
Answer» D. 7
discuss

310.
TCP/IP model does not have ______ layer but OSI model
have this layer.
A. session layer
B. transport layer
C. application layer
D. network layer
Answer» A. session layer
discuss

311.
Which layer is used to link the network support layers and
user support layers?
A. session layer
B. data link layer
C. transport layer
D. network layer
Answer» C. transport layer
discuss

312.
Which address is used on the internet for employing the
TCP/IP protocols?
A. physical address and logical address
B. port address
C. specific address
D. all of the mentioned
Answer» D. all of the mentioned
discuss

313. TCP/IP model was developed _____ the OSI model.


A. prior to
B. after
C. simultaneous to
D. with no link to
313. TCP/IP model was developed _____ the OSI model.
Answer» A. prior to
discuss

314.
Which address is used to identify a process on a host by
the transport layer?
A. physical address
B. logical address
C. port address
D. specific address
Answer» C. port address
discuss

315. Which layer provides the services to user?


A. application layer
B. session layer
C. presentation layer
D. physical layer
Answer» A. application layer
discuss

316. Transmission data rate is decided by ____________


A. network layer
B. physical layer
C. data link layer
D. transport layer
Answer» B. physical layer
discuss

317.
Which transmission media provides the highest
transmission speed in a network?
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Answer» C. optical fiber
discuss
318.
A single channel is shared by multiple signals by
____________
A. analog modulation
B. digital modulation
C. multiplexing
D. phase modulation
Answer» C. multiplexing
discuss

319.
Which of the following tasks is not done by data link
layer?
A. framing
B. error control
C. flow control
D. channel coding
Answer» D. channel coding
discuss

320. Header of a frame generally contains ______________


A. synchronization bytes
B. addresses
C. frame identifier
D. all of the mentioned
Answer» D. all of the mentioned
discuss

321.
Automatic repeat request error management mechanism
is provided by ________
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. application access control sublayer
Answer» A. logical link control sublayer
discuss

322. CRC stands for __________


A. cyclic redundancy check
B. code repeat check
C. code redundancy check
322. CRC stands for __________
D. cyclic repeat check
Answer» A. cyclic redundancy check
discuss

323. Which of the following is a data link protocol?


A. ethernet
B. point to point protocol
C. hdlc
D. all of the mentioned
Answer» D. all of the mentioned
discuss

324.
Which of the following is the multiple access protocol for
channel access control?
A. csma/cd
B. csma/ca
C. both csma/cd & csma/ca
D. hdlc
Answer» C. both csma/cd & csma/ca
discuss

325. A 4 byte IP address consists of __________


A. only network address
B. only host address
C. network address & host address
D. network address & mac address
Answer» C. network address & host address
discuss

326.
User datagram protocol is called connectionless because
_____________
A. all udp packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. it is received in the same order as sent order
D. it sends data very quickly
Answer» A. all udp packets are treated independently by transport layer
discuss
327. Socket-style API for windows is called ____________
A. wsock
B. winsock
C. wins
D. sockwi
Answer» B. winsock
discuss

328. _______ topology requires a multipoint connection.


A. star
B. mesh
C. ring
D. bus
Answer» D. bus
discuss

329. WAN stands for __________


A. world area network
B. wide area network
C. web area network
D. web access network
Answer» B. wide area network
discuss

330. In TDM, slots are further divided into __________


A. seconds
B. frames
C. packets
D. bits
Answer» B. frames
discuss

331.
The sharing of a medium and its link by two or more
devices is called _________
A. fully duplexing
B. multiplexing
C. micropleixng
D. duplexing
Answer» B. multiplexing
discuss
332. Multiplexing is used in _______
A. packet switching
B. circuit switching
C. data switching
D. packet & circuit switching
Answer» B. circuit switching
discuss

333.
Which multiplexing technique used to transmit digital
signals?
A. fdm
B. tdm
C. wdm
D. fdm & wdm
Answer» B. tdm
discuss

334.
The state when dedicated signals are idle are called
__________
A. death period
B. poison period
C. silent period
D. stop period
Answer» C. silent period
discuss

335. Multiplexing provides _________


A. efficiency
B. privacy
C. anti jamming
D. both efficiency & privacy
Answer» D. both efficiency & privacy
discuss

336. In TDM, slots are further divided into _________


A. seconds
B. frames
C. packets
D. bits
336. In TDM, slots are further divided into _________
Answer» B. frames
discuss

337. The total nodal delay is given by ____________


A. dnodal = dproc – dqueue + dtrans + dprop
B. dnodal = dproc + dtrans – dqueue
C. dnodal = dproc + dqueue + dtrans + dprop
D. dnodal = dproc + dqueue – dtrans – dprop
Answer» C. dnodal = dproc + dqueue + dtrans + dprop
discuss

338. Transmission delay does not depend on _____________


A. packet length
B. distance between the routers
C. transmission rate
D. bandwidth of medium
Answer» B. distance between the routers
discuss

339. Propagation delay depends on ___________


A. packet length
B. transmission rate
C. distance between the routers
D. speed of the cpu
Answer» C. distance between the routers
discuss

340.
_____________ allows LAN users to share computer
programs and data.
A. communication server
B. print server
C. file server
D. network
Answer» C. file server
discuss
341.
With respect to physical media, STP cables stands for
_________
A. shielded twisted pair cable
B. spanning tree protocol cable
C. static transport protocol cable
D. shielded two power cable
Answer» A. shielded twisted pair cable
discuss

342. What is the max length of the Shielded twisted pair cable?
A. 100 ft
B. 200 ft
C. 100 m
D. 200 m
Answer» C. 100 m
discuss

343. What is the max data transfer rate of STP cables?


A. 10 mbps
B. 100 mbps
C. 1000 mbps
D. 10000 mbps
Answer» B. 100 mbps
discuss

344. Which connector does the STP cable use?


A. bnc
B. rj-11
C. rj-45
D. rj-69
Answer» C. rj-45
discuss

345. What is the central device in star topology?


A. stp server
B. hub/switch
C. pdc
D. router
Answer» B. hub/switch
discuss
346. What is the max data transfer rate for optical fiber cable?
A. 10 mbps
B. 100 mbps
C. 1000 mbps
D. 10000 mbps
Answer» D. 10000 mbps
discuss

347.
Which of the following architecture uses the CSMA/CD
access method?
A. arc net
B. ethernet
C. router
D. stp server
Answer» B. ethernet
discuss

348.
The attacker using a network of compromised devices is
known as _____________
A. internet
B. botnet
C. telnet
D. d-net
Answer» B. botnet
discuss

349. Which of the following is a form of DoS attack?


A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» D. all of the mentioned
discuss

350. Packet sniffers involve ____________


A. active receiver
B. passive receiver
C. legal receiver
D. partially-active receiver
350. Packet sniffers involve ____________
A. active receiver
B. passive receiver
C. legal receiver
D. partially-active receiver
Answer» B. passive receiver

351. Sniffers can be prevented by using _______________


A. wired environment
B. wifi
C. ethernet lan
D. switched network
Answer» D. switched network
discuss

352. Firewalls are often configured to block ___________


A. udp traffic
B. tcp traffic
C. sensitive traffic
D. best-effort traffic
Answer» A. udp traffic
discuss

353. UTP is commonly used in __________


A. dsl
B. fttp
C. http
D. none of the mentioned
Answer» A. dsl
discuss

354.
Terrestrial radio channels are broadly classifed into _____
groups.
A. 2
B. 3
C. 4
D. 1
354.
Terrestrial radio channels are broadly classifed into _____
groups.
Answer» B. 3
discuss

355.
A local telephone network is an example of a _______
network.
A. packet switched
B. circuit switched
C. bit switched
D. line switched
Answer» B. circuit switched
discuss

356. Most packet switches use this principle ____________


A. stop and wait
B. store and forward
C. store and wait
D. stop and forward
Answer» B. store and forward
discuss

357.
What are the Methods to move data through a network of
links and switches?
A. packet switching and line switching
B. circuit switching and line switching
C. line switching and bit switching
D. packet switching and circuit switching
Answer» D. packet switching and circuit switching
discuss

358. In _________ systems, resources are allocated on demand.


A. packet switching
B. circuit switching
C. line switching
D. frequency switching
Answer» A. packet switching
discuss
359. Which of the following is not an application layer service?
A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. error control
Answer» D. error control
discuss

360. Which is not a application layer protocol?


A. http
B. smtp
C. ftp
D. tcp
Answer» D. tcp
discuss

361.
The packet of information at the application layer is called
__________
A. packet
B. message
C. segment
D. frame
Answer» B. message
discuss

362. Which one of the following is an architecture paradigms?


A. peer to peer
B. client-server
C. http
D. both peer-to-peer & client-server
Answer» D. both peer-to-peer & client-server
discuss

363. Application layer offers _______ service.


A. end to end
B. process to process
C. both end to end and process to process
D. none of the mentioned
Answer» A. end to end
discuss
364. E-mail is _________
A. loss-tolerant application
B. bandwidth-sensitive application
C. elastic application
D. none of the mentioned
Answer» C. elastic application
discuss

365. Pick the odd one out.


A. file transfer
B. file download
C. e-mail
D. interactive games
Answer» D. interactive games
discuss

366. Which of the following is an application layer service?


A. network virtual terminal
B. file transfer, access, and management
C. mail service
D. all of the mentioned
Answer» D. all of the mentioned
discuss

367. Which is a time-sensitive service?


A. file transfer
B. file download
C. e-mail
D. internet telephony
Answer» D. internet telephony
discuss

368.
Transport services available to applications in one or
another form _________
A. reliable data transfer
B. timing
C. security
D. all of the mentioned
Answer» D. all of the mentioned
discuss
369. Electronic mail uses which Application layer protocol?
A. smtp
B. http
C. ftp
D. sip
Answer» A. smtp
discuss

370.
The ____________ translates internet domain and host
names to IP address.
A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» A. domain name system
discuss

371. Application layer protocol defines ____________


A. types of messages exchanged
B. message format, syntax and semantics
C. rules for when and how processes send and respond to messages
D. all of the mentioned
Answer» D. all of the mentioned
discuss

372.
When displaying a web page, the application layer uses
the _____________
A. http protocol
B. ftp protocol
C. smtp protocol
D. tcp protocol
Answer» A. http protocol
discuss

373. The default connection type used by HTTP is _________


A. persistent
B. non-persistent
C. can be either persistent or non-persistent depending on connection request
D. none of the mentioned
373. The default connection type used by HTTP is _________
Answer» A. persistent
discuss

374.
The HTTP request message is sent in _________ part of
three-way handshake.
A. first
B. second
C. third
D. fourth
Answer» C. third
discuss

375.
The first line of HTTP request message is called
_____________
A. request line
B. header line
C. status line
D. entity line
Answer» A. request line
discuss

376.
The __________ method when used in the method field,
leaves entity body empty.
A. post
B. send
C. get
D. put
Answer» C. get
discuss

377. Which of the following is not correct?


A. web cache doesnt has its own disk space
B. web cache can act both like server and client
C. web cache might reduce the response time
D. web cache contains copies of recently requested objects
Answer» A. web cache doesnt has its own disk space
discuss
378. HTTP is ________ protocol.
A. application layer
B. transport layer
C. network layer
D. data link layer
Answer» A. application layer
discuss

379. In the network HTTP resources are located by


A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Answer» A. uniform resource identifier
discuss

380.
FTP server listens for connection on port number
____________
A. 20
B. 21
C. 22
D. 23
Answer» B. 21
discuss

381. The File Transfer Protocol is built on ______________


A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Answer» C. client server architecture
discuss

382.
In File Transfer Protocol, data transfer cannot be done in
___________
A. stream mode
B. block mode
C. compressed mode
D. message mode
382.
In File Transfer Protocol, data transfer cannot be done in
___________
Answer» D. message mode
discuss

383. Expansion of FTP is __________


A. fine transfer protocol
B. file transfer protocol
C. first transfer protocol
D. fast transfer protocol
Answer» B. file transfer protocol
discuss

384. FTP is built on _____ architecture.


A. client-server
B. p2p
C. data centric
D. service oriented
Answer» A. client-server
discuss (1)

385.
FTP uses _________ parallel TCP connections to transfer
a file.
A. 1
B. 2
C. 3
D. 4
Answer» B. 2
discuss

386. Identify the incorrect statement regarding FTP.


A. ftp stands for file transfer protocol
B. ftp uses two parallel tcp connections
C. ftp sends its control information in-band
D. ftp sends exactly one file over the data connection
Answer» C. ftp sends its control information in-band
discuss
387. FTP server _____________
A. maintains state information
B. is stateless
C. has single tcp connection for a file transfer
D. has udp connection for file transfer
Answer» A. maintains state information
discuss

388. Find the FTP reply whose message is wrongly matched.


A. 331 – username ok, password required
B. 425 – can’t open data connection
C. 452 – error writing file
D. 452 – can’t open data connection
Answer» D. 452 – can’t open data connection
discuss

389.
The password is sent to the server using ________
command
A. passwd
B. pass
C. password
D. pword
Answer» B. pass
discuss

390.
When the mail server sends mail to other mail servers it
becomes ____________
A. smtp server
B. smtp client
C. peer
D. master
Answer» B. smtp client
discuss

391.
If you have to send multimedia data over SMTP it has to
be encoded into _______
A. binary
B. signal
C. ascii
391.
If you have to send multimedia data over SMTP it has to
be encoded into _______
D. hash
Answer» C. ascii
discuss

392.
The underlying Transport layer protocol used by SMTP is
________
A. tcp
B. udp
C. either tcp or udp
D. imap
Answer» A. tcp
discuss

393. Choose the statement which is wrong incase of SMTP?


A. it requires message to be in 7bit ascii format
B. it is a pull protocol
C. it transfers files from one mail server to another mail server
D. smtp is responsible for the transmission of the mail through the internet
Answer» B. it is a pull protocol
discuss

394. Internet mail places each object in _________


A. separate messages for each object
B. one message
C. varies with number of objects
D. multiple messages for each object
Answer» B. one message
discuss

395. Typically the TCP port used by SMTP is _________


A. 25
B. 35
C. 50
D. 15
Answer» A. 25
discuss
396. A session may include ________
A. zero or more smtp transactions
B. exactly one smtp transactions
C. always more than one smtp transactions
D. number of smtp transactions cant be determined
Answer» A. zero or more smtp transactions
discuss

397.
Which of the following is an example of user agents for e-
mail?
A. microsoft outlook
B. facebook
C. google
D. tumblr
Answer» A. microsoft outlook
discuss

398. User agent does not support this ___________


A. composing messages
B. reading messages
C. replying messages
D. routing messages
Answer» D. routing messages
discuss

399.
SMTP connections secured by SSL are known as
_____________
A. smtps
B. ssmtp
C. snmp
D. starttls
Answer» A. smtps
discuss

400. SMTP uses which of the following TCP port?


A. 22
B. 23
C. 21
D. 25
400. SMTP uses which of the following TCP port?
A. 22
B. 23
C. 21
D. 25
Answer» D. 25

401.
Which one of the following protocol is used to receive mail
messages?
A. smtp
B. post office protocol (pop)
C. internet message access protocol (imap)
D. ftp
Answer» D. ftp
discuss

402. What is on-demand mail relay (ODMR)?


A. protocol for smtp security
B. an smtp extension
C. protocol for web pages
D. protocol for faster mail transfer
Answer» B. an smtp extension
discuss

403.
An email client needs to know the _________ of its initial
SMTP server.
A. ip address
B. mac address
C. url
D. name
Answer» A. ip address
discuss

404. An SMTP session may not include _______


A. zero smtp transaction
B. one smtp transaction
C. more than one smtp transaction
D. one http transaction
404. An SMTP session may not include _______
Answer» D. one http transaction
discuss

405. SMTP defines _______


A. message transport
B. message encryption
C. message content
D. message password
Answer» A. message transport
discuss

406. SMTP is not used to deliver messages to ______


A. user’s terminal
B. user’s mailbox
C. user’s word processor
D. user’s email client
Answer» C. user’s word processor
discuss

407. The entire hostname has a maximum of ___________


A. 255 characters
B. 127 characters
C. 63 characters
D. 31 characters
Answer» A. 255 characters
discuss

408. A DNS client is called _________


A. dns updater
B. dns resolver
C. dns handler
D. none of the mentioned
Answer» B. dns resolver
discuss

409. Servers handle requests for other domains _______


A. directly
B. by contacting remote dns server
409. Servers handle requests for other domains _______
C. it is not possible
D. none of the mentioned
Answer» B. by contacting remote dns server
discuss

410. DNS database contains _______


A. name server records
B. hostname-to-address records
C. hostname aliases
D. all of the mentioned
Answer» D. all of the mentioned
discuss (1)

411.
If a server has no clue about where to find the address for
a hostname then _______
A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer» A. server asks to the root server
discuss

412. Wildcard domain names start with label _______


A. @
B. *
C. &
D. #
Answer» B. *
discuss

413. The domain name system is maintained by _______


A. distributed database system
B. a single server
C. a single computer
D. none of the mentioned
Answer» A. distributed database system
discuss
414.
Secure shell (SSH) network protocol is used for
__________
A. secure data communication
B. remote command-line login
C. remote command execution
D. all of the mentioned
Answer» D. all of the mentioned
discuss

415. SSH can be used in only _____________


A. unix-like operating systems
B. windows
C. both unix-like and windows systems
D. none of the mentioned
Answer» C. both unix-like and windows systems
discuss

416.
SSH uses ___________ to authenticate the remote
computer.
A. public-key cryptography
B. private-key cryptography
C. any of public-key or private-key
D. both public-key & private-key
Answer» A. public-key cryptography
discuss

417.
Which standard TCP port is assigned for contacting SSH
servers?
A. port 21
B. port 22
C. port 23
D. port 24
Answer» B. port 22
discuss

418.
Which one of the following is a file transfer protocol using
SSH?
A. scp
B. sftp
418.
Which one of the following is a file transfer protocol using
SSH?
C. rsync
D. all of the mentioned
Answer» D. all of the mentioned
discuss

419. SSH-2 does not contain ______________


A. transport layer
B. user authentication layer
C. physical layer
D. connection layer
Answer» C. physical layer
discuss

420.
Which one of the following feature was present in SSH
protocol, version 1?
A. password changing
B. periodic replacement of session keys
C. support for public-key certificates
D. none of the mentioned
Answer» D. none of the mentioned
discuss

421. SCP protocol is evolved from __________ over SSH.


A. rcp protocol
B. dhcp protocol
C. mgcp protocol
D. gcp protocol
Answer» A. rcp protocol
discuss

422.
Which one of the following authentication method is used
by SSH?
A. public-key
B. host based
C. password
D. all of the mentioned
Answer» D. all of the mentioned
discuss

423.
DHCP (dynamic host configuration protocol) provides
__________ to the client.
A. ip address
B. mac address
C. url
D. none of the mentioned
Answer» A. ip address
discuss

424. DHCP is used for ________


A. ipv6
B. ipv4
C. both ipv6 and ipv4
D. none of the mentioned
Answer» C. both ipv6 and ipv4
discuss

425. The DHCP server _________


A. maintains a database of available ip addresses
B. maintains the information about client configuration parameters
C. grants a ip address when receives a request from a client
D. all of the mentioned
Answer» D. all of the mentioned
discuss

426. IP assigned for a client by DHCP server is


A. for a limited period
B. for an unlimited period
C. not time dependent
D. none of the mentioned
Answer» A. for a limited period
discuss

427.
DHCP uses UDP port _________ for sending data to the
server.
A. 66
B. 67
C. 68
427.
DHCP uses UDP port _________ for sending data to the
server.
D. 69
Answer» B. 67
discuss

428.
DHCP client and servers on the same subnet communicate
via _________
A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
Answer» A. udp broadcast
discuss

429. WPA2 is used for security in _______


A. ethernet
B. bluetooth
C. wi-fi
D. email
Answer» C. wi-fi
discuss

430. VPNs are financially speaking __________


A. always more expensive than leased lines
B. always cheaper than leased lines
C. usually cheaper than leased lines
D. usually more expensive than leased lines
Answer» C. usually cheaper than leased lines
discuss

431. Storage management comprises of _______________


A. san management
B. data protection
C. disk operation
D. all of the mentioned
Answer» D. all of the mentioned
discuss
432. Which of the following is not a storage device?
A. switch
B. raid arrays
C. tape drives
D. hub
Answer» D. hub
discuss

433. Which protocols are used for Storage management?


A. snmp
B. ldap
C. pop3
D. mib
Answer» A. snmp
discuss

434.
How do Storage administrators ensure secure access to
storage devices?
A. by using zoning
B. by putting a physical lock on the storage device
C. by keeping devices shutdown when not in use
D. by keeping devices when used
Answer» A. by using zoning
discuss

435.
Effective Storage management does not include
__________
A. security
B. backups
C. reporting
D. connection
Answer» D. connection
discuss

436. SMI-S Standard uses which of the following?


A. java rmi
B. cim-xml/http
C. corba
D. .net
436. SMI-S Standard uses which of the following?
Answer» B. cim-xml/http
discuss

437.
Full duplex mode increases the capacity of each domain by
________
A. 10 to 20 mbps
B. 20 to 30 mbps
C. 30 to 40 mbps
D. 40 to 50 mbps
Answer» A. 10 to 20 mbps
discuss

438.
Configuration management can be divided into which two
subsystems?
A. reconfiguration and documentation
B. management and configuration
C. documentation and dialing up
D. configuration and dialing up
Answer» A. reconfiguration and documentation
discuss

439.
To use a Simple Network Management System, we need
_______
A. servers
B. ip
C. protocols
D. rules
Answer» D. rules
discuss

440.
The main difference between SNMPv3 and SNMPv2 is
_______
A. management
B. integration
C. classification
D. enhanced security
Answer» D. enhanced security
discuss
441. BER stands for ________
A. basic encoding rules
B. basic encoding resolver
C. basic encoding rotator
D. basic encoding router
Answer» A. basic encoding rules
discuss

442.
SNMP is the framework for managing devices in an
internet using the ______
A. tcp/ip protocol
B. udp
C. smtp
D. none
Answer» A. tcp/ip protocol
discuss

443.
Structure of Management Information (SMI), is the
guideline of ________
A. http
B. snmp
C. url
D. mib
Answer» B. snmp
discuss

444.
The application layer protocol used by a Telnet application
is ________
A. telnet
B. ftp
C. http
D. smtp
Answer» A. telnet
discuss

445.
_______ allows you to connect and login to a remote
computer
A. telnet
B. ftp
445.
_______ allows you to connect and login to a remote
computer
C. http
D. smtp
Answer» A. telnet
discuss

446. Telnet is used for _______


A. television on net
B. network of telephones
C. remote login
D. teleshopping site
Answer» C. remote login
discuss

447. Which one of the following is not correct?


A. telnet is a general purpose client-server program
B. telnet lets user access an application on a remote computer
C. telnet can also be used for file transfer
D. telnet can be used for remote login
Answer» C. telnet can also be used for file transfer
discuss

448. Which operating mode of telnet is full duplex?


A. default mode
B. server mode
C. line mode
D. character mode
Answer» C. line mode
discuss

449.
If we want that a character be interpreted by the client
instead of server _________
A. interpret as command (iac) escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. cli character has to be used
Answer» A. interpret as command (iac) escape character has to be used
discuss
450.
Telnet protocol is used to establish a connection to
__________
A. tcp port number 21
B. tcp port number 22
C. tcp port number 23
D. tcp port number 25
Answer» C. tcp port number 23

451. Which one of the following is not true?


A. telnet defines a network virtual terminal (nvt) standard
B. client programs interact with nvt
C. server translates nvt operations
D. client can transfer files using to remote server using nvt
Answer» D. client can transfer files using to remote server using nvt
discuss

452. All telnet operations are sent as ________


A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
Answer» B. 8 bits
discuss

453.
AbsoluteTelnet is a telnet client for _______ Operating
system.
A. windows
B. linux
C. mac
D. ubuntu
Answer» A. windows
discuss

454.
The decimal code of Interpret as Command (IAC)
character is _______
A. 252
B. 253
454.
The decimal code of Interpret as Command (IAC)
character is _______
C. 254
D. 255
Answer» D. 255
discuss

455. Which of the following is false with respect to TCP?


A. connection-oriented
B. process-to-process
C. transport layer protocol
D. unreliable
Answer» D. unreliable
discuss

456. In TCP, sending and receiving data is done as _______


A. stream of bytes
B. sequence of characters
C. lines of data
D. packets
Answer» A. stream of bytes
discuss

457.
TCP groups a number of bytes together into a packet
called _______
A. packet
B. buffer
C. segment
D. stack
Answer» C. segment
discuss

458. Communication offered by TCP is ________


A. full-duplex
B. half-duplex
C. semi-duplex
D. byte by byte
Answer» A. full-duplex
discuss
459.
The value of acknowledgement field in a segment defines
_______
A. sequence number of the byte received previously
B. total number of bytes to receive
C. sequence number of the next byte to be received
D. sequence of zeros and ones
Answer» C. sequence number of the next byte to be received
discuss

460. Size of TCP segment header ranges between ___________


A. 16 and 32 bytes
B. 16 and 32 bits
C. 20 and 60 bytes
D. 20 and 60 bits
Answer» C. 20 and 60 bytes
discuss

461.
Connection establishment in TCP is done by which
mechanism?
A. flow control
B. three-way handshaking
C. forwarding
D. synchronization
Answer» B. three-way handshaking
discuss

462.
SYNC flooding attack belongs to a type of security attack
known as ___________
A. sync flooding attack
B. active attack
C. passive attack
D. denial-of-service attack
Answer» D. denial-of-service attack
discuss

463.
What allows TCP to detect lost segments and in turn
recover from that loss?
A. sequence number
B. acknowledgment number
463.
What allows TCP to detect lost segments and in turn
recover from that loss?
C. checksum
D. both sequence & acknowledgment number
Answer» B. acknowledgment number
discuss

464. Which of the following is false with respect to UDP?


A. connection-oriented
B. unreliable
C. transport layer protocol
D. low overhead
Answer» A. connection-oriented
discuss

465. Return value of the UDP port “Chargen” is _______


A. string of characters
B. string of integers
C. array of characters with integers
D. array of zero’s and one’s
Answer» A. string of characters
discuss

466.
Beyond IP, UDP provides additional services such as
_______
A. routing and switching
B. sending and receiving of packets
C. multiplexing and demultiplexing
D. demultiplexing and error checking
Answer» D. demultiplexing and error checking
discuss

467. What is the main advantage of UDP?


A. more overload
B. reliable
C. low overhead
D. fast
Answer» C. low overhead
discuss
468.
Port number used by Network Time Protocol (NTP) with
UDP is ________
A. 161
B. 123
C. 162
D. 124
Answer» B. 123
discuss

469. What is the header size of a UDP packet?


A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Answer» A. 8 bytes
discuss

470.
The port number is “ephemeral port number”, if the
source host is _______
A. ntp
B. echo
C. server
D. client
Answer» D. client
discuss

471.
“Total length” field in UDP packet header is the length of
_________
A. only udp header
B. only data
C. only checksum
D. udp header plus data
Answer» D. udp header plus data
discuss

472.
Which is the correct expression for the length of UDP
datagram?
A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
472.
Which is the correct expression for the length of UDP
datagram?
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Answer» A. udp length = ip length – ip header’s length
discuss

473.
The ______ field is used to detect errors over the entire
user datagram.
A. udp header
B. checksum
C. source port
D. destination port
Answer» B. checksum
discuss

474. IPsec defines two protocols: _______ and ________


A. ah; ssl
B. pgp; esp
C. ah; esp
D. pgp; ssl
Answer» C. ah; esp
discuss

475. IP Security operates in which layer of the OSI model?


A. network
B. transport
C. application
D. physical
Answer» A. network
discuss

476. ESP does not provide ________


A. source authentication
B. data integrity
C. privacy
D. error control
Answer» D. error control
discuss
477. Two broad categories of congestion control are
A. open-loop and closed-loop
B. open-control and closed-control
C. active control and passive control
D. active loop and passive loop
Answer» A. open-loop and closed-loop
discuss

478. In open-loop control, policies are applied to __________


A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer» C. prevent before congestion occurs
discuss

479.
Retransmission of packets must not be done when
_______
A. packet is lost
B. packet is corrupted
C. packet is needed
D. packet is error-free
Answer» D. packet is error-free
discuss

480. Discarding policy is mainly done by _______


A. sender
B. receiver
C. router
D. switch
Answer» C. router
discuss

481. Closed-Loop control mechanisms try to _________


A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer» A. remove after congestion occurs
discuss
482. Backpressure technique can be applied only to _______
A. congestion networks
B. closed circuit networks
C. open circuit networks
D. virtual circuit networks
Answer» D. virtual circuit networks
discuss

483.
The packet sent by a node to the source to inform it of
congestion is called _______
A. explicit
B. discard
C. choke
D. backpressure
Answer» C. choke
discuss

484.
Which of the following is not a characteristic of Virtual
Circuit Network?
A. there are setup and teardown phases in addition to the data transfer phase
B. resources can be allocated during setup phase or on demand
C. all packets follow the same path established during the connection
D. virtual circuit network is implemented in application layer
Answer» D. virtual circuit network is implemented in application layer
discuss

485.
Which of the following is not a phase of virtual circuit
network?
A. setup phase
B. data transfer phase
C. termination phase
D. teardown phase
Answer» C. termination phase
discuss

486. Steps required in setup process are ___________


A. setup request and acknowledgement
B. setup request and setup response
C. setup request and setup termination
486. Steps required in setup process are ___________
D. setup and termination steps
Answer» A. setup request and acknowledgement
discuss

487.
Delay of the resource allocated during setup phase during
data transfer is ________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» C. same for each packet
discuss

488.
Delay of the resource allocated on demand during data
transfer is ________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» D. different for each packet
discuss

489.
In data transfer phase, how many columns does the table
contain?
A. 1
B. 2
C. 3
D. 4
Answer» D. 4
discuss

490. ATM and frame relay are ________


A. virtual circuit networks
B. datagram networks
C. virtual private networks
D. virtual public networks
Answer» A. virtual circuit networks
discuss
491. ATM uses _______________
A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. asynchronous amplitude division multiplexing
Answer» B. asynchronous time division multiplexing
discuss

492. ATM standard defines _______ layers.


A. 2
B. 3
C. 4
D. 5
Answer» B. 3
discuss

493. ATM can be used for ________


A. local area network
B. wide area network
C. campus area network
D. networks covering any range
Answer» D. networks covering any range
discuss

494. An ATM cell has the payload field of __________


A. 32 bytes
B. 48 bytes
C. 64 bytes
D. 128 bytes
Answer» B. 48 bytes
discuss

495. Frame relay has error detection at the ______


A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» B. data link layer
discuss
496. Virtual circuit identifier in frame relay is called ______
A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» A. data link connection identifier
discuss

497. Frame relay has _______


A. only physical layer
B. only data link layer
C. only network layer
D. both physical and data link layer
Answer» D. both physical and data link layer
discuss

498.
In frame relay networks, extended address is used
_______
A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» A. to increase the range of data link connection identifiers
discuss

499. What is FRAD in frame relay network?


A. frad assembles and disassembles the frames coming from other protocols
B. frad is used for modulation and demodulation
C. frad is used for error detection
D. frad is used for error recovery
Answer» A. frad assembles and disassembles the frames coming from other protocols
discuss

500. Frame Relay is cheaper than other _____


A. lans
B. wans
C. mans
D. multipoint networks
Answer» B. wans
501. Frame Relay networks offer an option called _______
A. voice over for relay
B. voice over fine relay
C. voice on frame relay
D. voice over frame relay
Answer» D. voice over frame relay
discuss

502. There are ________ total features of Frame Relay.


A. five
B. seven
C. nine
D. ten
Answer» C. nine
discuss

503.
Frame Relay deploys physical layer carriers such as
_______
A. adms
B. upsr
C. blsr
D. sonet
Answer» D. sonet
discuss

504. Frame relay provides error detection at the ______


A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer» B. data link layer
discuss

505. Virtual circuit identifier in frame relay is called _______


A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer» A. data link connection identifier
discuss

506. Frame relay has only _______


A. physical layer
B. data link layer
C. physical layer and data link layer
D. network layer and data link layer
Answer» C. physical layer and data link layer
discuss

507.
In frame relay networks, extended address is used
________
A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» A. to increase the range of data link connection identifiers
discuss

508. Common gateway interface is used to _______


A. generate executable files from web content by web server
B. generate web pages
C. stream videos
D. download media files
Answer» A. generate executable files from web content by web server
discuss

509. URL stands for ________


A. unique reference label
B. uniform reference label
C. uniform resource locator
D. unique resource locator
Answer» C. uniform resource locator
discuss

510.
Which one of the following is not used to generate
dynamic web pages?
A. php
B. asp.net
C. jsp
510.
Which one of the following is not used to generate
dynamic web pages?
D. css
Answer» D. css
discuss

511.
An alternative to JavaScript on windows platform is
_______
A. vbscript
B. asp.net
C. jsp
D. php
Answer» A. vbscript
discuss

512. What is document object model (DOM)?


A. convention for representing and interacting with objects in html documents
B. application programming interface
C. hierarchy of objects in asp.net
D. scripting language
Answer» A. convention for representing and interacting with objects in html documents
discuss

513. AJAX stands for _______


A. asynchronous javascript and xml
B. advanced jsp and xml
C. asynchronous jsp and xml
D. advanced javascript and xml
Answer» A. asynchronous javascript and xml
discuss

514. The data field cannot carry which of the following?


A. tcp segment
B. udp segment
C. icmp messages
D. smtp messages
Answer» C. icmp messages
discuss
515.
What should be the flag value to indicate the last
fragment?
A. 0
B. 1
C. ttl value
D. protocol field value
Answer» A. 0
discuss

516. Which of these is not applicable for IP protocol?


A. is connectionless
B. offer reliable service
C. offer unreliable service
D. does not offer error reporting
Answer» B. offer reliable service
discuss

517. Which of these is not applicable for IP protocol?


A. connectionless
B. offer reliable service
C. offer unreliable service
D. does not offer error reporting
Answer» B. offer reliable service
discuss

518.
Which of the following demerits does Fragmentation
have?
A. complicates routers
B. open to dos attack
C. overlapping of fragments
D. all of the mentioned
Answer» D. all of the mentioned
discuss

519.
Which field helps to check rearrangement of the
fragments?
A. offset
B. flag
C. ttl
D. identifier
519.
Which field helps to check rearrangement of the
fragments?
Answer» A. offset
discuss

520.
In classless addressing, there are no classes but addresses
are still granted in ______
A. ips
B. blocks
C. codes
D. sizes
Answer» B. blocks
discuss

521.
In IPv4 Addresses, classful addressing is replaced with
________
A. classless addressing
B. classful addressing
C. classful advertising
D. classless advertising
Answer» A. classless addressing
discuss

522.
First address in a block is used as network address that
represents the ________
A. class network
B. entity
C. organization
D. codes
Answer» C. organization
discuss

523.
In classful addressing, a large part of available addresses
are ________
A. organized
B. blocked
C. wasted
D. communicated
523.
In classful addressing, a large part of available addresses
are ________
Answer» C. wasted
discuss

524.
Network addresses are a very important concept of
________
A. routing
B. mask
C. ip addressing
D. classless addressing
Answer» C. ip addressing
discuss

525. Which of this is not a class of IP address?


A. class e
B. class c
C. class d
D. class f
Answer» D. class f
discuss

526. The header length of an IPv6 datagram is ___________


A. 10bytes
B. 25bytes
C. 30bytes
D. 40bytes
Answer» D. 40bytes
discuss

527. IPv6 does not use _________ type of address.


A. broadcast
B. multicast
C. anycast
D. unicast
Answer» A. broadcast
discuss
528.
Which among the following features is present in IPv6 but
not in IPv4?
A. fragmentation
B. header checksum
C. options
D. anycast address
Answer» D. anycast address
discuss

529.
The _________ field determines the lifetime of IPv6
datagram
A. hop limit
B. ttl
C. next header
D. type of traffic
Answer» A. hop limit
discuss

530. Dual-stack approach refers to _________


A. implementing ipv4 with 2 stacks
B. implementing ipv6 with 2 stacks
C. node has both ipv4 and ipv6 support
D. implementing a mac address with 2 stacks
Answer» C. node has both ipv4 and ipv6 support
discuss

531.
A link local address of local addresses is used in an
_______
A. isolated router
B. isolated mask
C. isolated subnet
D. isolated net
Answer» C. isolated subnet
discuss

532.
In IPv6 addresses, addresses that start with eight 0s are
called ________
A. unicast addresses
B. multicast addresses
532.
In IPv6 addresses, addresses that start with eight 0s are
called ________
C. any cast addresses
D. reserved addresses
Answer» D. reserved addresses
discuss

533. Which statement(s) about IPv6 addresses are true?


A. leading zeros are required
B. two colons (::) are used to represent successive hexadecimal fields of zeros
C. two colons (::) are used to separate fields
D. a single interface cannot have multiple ipv6 addresses of different types
Answer» B. two colons (::) are used to represent successive hexadecimal fields of zeros
discuss

534. When was IPv6 launched?


A. june 2, 2012
B. june 4, 2012
C. june 5, 2012
D. june 6, 2012
Answer» D. june 6, 2012
discuss

535.
Which layer is responsible for process-to-process
delivery?
A. physical layer
B. network layer
C. transport layer
D. application layer
Answer» C. transport layer
discuss

536.
Multiple processes on destinations at transport layer are
identified by __________
A. mac address
B. port number
C. host number
D. host address
Answer» B. port number
discuss

537. Range of port numbers in Internet model is __________


A. 0 and 32,765(8-bit)
B. 0 and 32,765(16-bit)
C. 0 and 65,535(32-bit)
D. 0 and 65,535(16-bit)
Answer» D. 0 and 65,535(16-bit)
discuss

538.
The combination of an IP address and port number is
called as ________
A. socket address
B. port address
C. mac address
D. host address
Answer» A. socket address
discuss

539. In transport layer, Multiplexing is done at _________


A. channel
B. receiver site
C. sender site
D. packet
Answer» C. sender site
discuss

540. Header size of the ICMP message is _________


A. 8-bytes
B. 8-bits
C. 16-bytes
D. 16-bits
Answer» A. 8-bytes
discuss

541.
During error reporting, ICMP always reports error
messages to ________
A. destination
B. source
C. next router
541.
During error reporting, ICMP always reports error
messages to ________
D. previous router
Answer» B. source
discuss

542. Which of these is not a type of error-reporting message?


A. destination unreachable
B. source quench
C. router error
D. time exceeded
Answer» C. router error
discuss

543.
The main reason for transition from IPv4 to IPv6 is
_________
A. huge number of systems on the internet
B. very low number of system on the internet
C. providing standard address
D. to provide faster internet
Answer» A. huge number of systems on the internet
discuss

544. Which of the following is not a transition strategy?


A. dual stack
B. tunneling
C. conversion
D. header translation
Answer» C. conversion
discuss (1)

545. Which of the following is not applicable for IP?


A. error reporting
B. handle addressing conventions
C. datagram format
D. packet handling
Answer» A. error reporting
discuss
546.
If the value in protocol field is 17, the transport layer
protocol used is _________
A. tcp
B. udp
C. icmp
D. igmp
Answer» B. udp
discuss

547.
In an IPv6 header, the traffic class field is similar to which
field in the IPv4 header?
A. fragmentation field
B. fast switching
C. tos field
D. option field
Answer» C. tos field
discuss

548. IPv6 does not use ________ type of address.


A. broadcast
B. multicast
C. any cast
D. unicast
Answer» A. broadcast
discuss

549. Which are the features present in IPv4 but not in IPv6?
A. fragmentation
B. header checksum
C. options
D. anycast address
Answer» D. anycast address
discuss

550.
_________ implies that all subnets obtained from the same
subnet mask.
A. static subnetting
B. dynamic subnetting
C. variable length subnetting
550.
_________ implies that all subnets obtained from the same
subnet mask.
A. static subnetting
B. dynamic subnetting
C. variable length subnetting
D. dynamic length subnetting
Answer» A. static subnetting

551. Which of the following are Gigabit Ethernets?


A. 1000 base-sx
B. 1000 base-lx
C. 1000 base-cx
D. all of the mentioned
Answer» D. all of the mentioned
discuss

552.
_________ is another kind of fiber optic network with an
active star for switching.
A. s/net
B. sw/net
C. net/sw
D. fs/net
Answer» A. s/net
discuss

553.
What is the subnet id of a host with an IP address
172.16.66.0/21?
A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer» C. 172.16.64.0
discuss

554.
The network address of 172.16.0.0/19 provides how many
subnets and hosts?
A. 7 subnets, 30 hosts each
554.
The network address of 172.16.0.0/19 provides how many
subnets and hosts?
B. 8 subnets, 8,190 hosts each
C. 8 subnets, 2,046 hosts each
D. 7 subnets, 2,046 hosts each
Answer» B. 8 subnets, 8,190 hosts each
discuss

555.
Which type of Ethernet framing is used for TCP/IP and
DEC net?
A. ethernet 802.3
B. ethernet 802.2
C. ethernet ii
D. ethernet snap
Answer» C. ethernet ii
discuss

556.
Which NetWare protocol works on layer 3–network layer
—of the OSI model?
A. ipx
B. ncp
C. spx
D. netbios
Answer» A. ipx
discuss

557. Which NetWare protocol provides link-state routing?


A. nlsp
B. rip
C. sap
D. ncp
Answer» A. nlsp
discuss

558. 0.0.0 router IGRP 109 network 172.68.7.0


A. it isolates networks 10.0.0.0 and 172.68.7.0
B. it loads igrp for networks 109 and 71
C. it disables rip
D. it disables all routing protocols
558. 0.0.0 router IGRP 109 network 172.68.7.0
Answer» A. it isolates networks 10.0.0.0 and 172.68.7.0
discuss

559.
What does the “IPX maximum-paths 2” command
accomplish?
A. it enables load sharing on 2 paths if the paths are equal metric paths
B. it sets up routing to go to network 2
C. it is the default for cisco ipx load sharing
D. it enables load sharing on 2 paths if the paths are unequal metric paths
Answer» A. it enables load sharing on 2 paths if the paths are equal metric paths
discuss

560.
Novell’s implementation of RIP updates routing tables
every _________ seconds.
A. 60
B. 90
C. 10
D. 30
Answer» A. 60
discuss

561.
Which protocol should you select if the network diameter
is more than 17 hops?
A. ripv1
B. ripv2
C. eigrp
D. both ripv1 and ripv2
Answer» A. ripv1
discuss

562.
How often does a RIPv1 router broadcast its routing table
by default?
A. every 30 seconds
B. every 60 seconds
C. every 90 seconds
D. ripv1 does not broadcast periodically
Answer» A. every 30 seconds
discuss
563. Which command displays RIP routing updates?
A. show ip route
B. debug ip rip
C. show protocols
D. debug ip route
Answer» B. debug ip rip
discuss

564.
Default administrative distance of a static route is
________
A. 0
B. 90
C. 100
D. 1
Answer» D. 1
discuss

565.
Which protocol gives a full route table update every 30
seconds?
A. iegrp
B. rip
C. icmp
D. ip
Answer» B. rip
discuss

566. _________ is the default administrative distance of RIP.


A. 0
B. 90
C. 120
D. 130
Answer» C. 120
discuss

567.
Which statement is true regarding classless routing
protocol?
A. the use of discontinuous networks is not allowed
B. use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
567.
Which statement is true regarding classless routing
protocol?
D. igrp supports classes routing within the same autonomous system
Answer» B. use of variable length subnet masks is permitted
discuss

568. Where should we use default routing?


A. on stub networks- which have only one exit path out of the network
B. which have more than one exit path out of the network
C. minimum five exit paths out of the network
D. maximum five exit paths out of the network
Answer» A. on stub networks- which have only one exit path out of the network
discuss

569.
Which statement is true regarding classless routing
protocols?
A. the use of discontinuous networks is not allowed
B. the use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
D. ripv2 supports classless routing
Answer» B. the use of variable length subnet masks is permitted
discuss

570. Which of the following is true regarding RIPv2?


A. it has a lower administrative distance than ripv1
B. it converges faster than ripv1
C. it has the same timers as ripv1
D. it is harder to configure than ripv1
Answer» C. it has the same timers as ripv1
discuss

571.
Which of the situations might not require multiple routing
protocols in a network?
A. when a new layer 2-only switch is added to the network
B. when you are migrating from one routing protocol to another
C. when you are using routers from multiple vendors
D. when there are host-based routers from multiple vendors
Answer» A. when a new layer 2-only switch is added to the network
discuss
572.
Which two routing protocols can be redistributed into
OSPF by a Cisco router?
A. ip eigrp and appletalk eigrp
B. appletalk eigrp and ripv2
C. ripv2 and ip eigrp
D. ipx rip & appletalk eigrp
Answer» C. ripv2 and ip eigrp
discuss

573. What does administrative distance rank?


A. metrics
B. sources of routing information
C. router reliability
D. best paths
Answer» B. sources of routing information
discuss

574. Which protocol maintains neighbor adjacencies?


A. ripv2 and eigrp
B. igrp and eigrp
C. ripv2
D. eigrp
Answer» C. ripv2
discuss

575.
Which routing protocol implements the diffusing update
algorithm?
A. is-is
B. igrp
C. eigrp
D. ospf
Answer» C. eigrp
discuss

576.
Which protocol should you select if the network diameter
is more than 17 hops?
A. ripv1
B. ripv2
C. eigrp
576.
Which protocol should you select if the network diameter
is more than 17 hops?
D. ospf
Answer» B. ripv2
discuss (1)

577.
In the network HTTP resources are located by
__________
A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Answer» A. uniform resource identifier
discuss

578. FTP server listens for connection on which port number?


A. 20
B. 21
C. 22
D. 23
Answer» B. 21
discuss

579.
In FTP protocol, a client contacts a server using ______ as
the transport protocol.
A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» A. transmission control protocol
discuss

580. The File Transfer Protocol is built on __________


A. data centric architecture
B. service oriented architecture
C. client server architecture
D. connection oriented architecture
Answer» C. client server architecture
discuss
581.
In File Transfer Protocol, data transfer cannot be done in
__________
A. stream mode
B. block mode
C. compressed mode
D. message mode
Answer» D. message mode
discuss

582.
Which methods are commonly used in Server Socket
class?
A. public output stream get output stream ()
B. public socket accept ()
C. public synchronized void close ()
D. public void connect ()
Answer» B. public socket accept ()
discuss

583.
The client in socket programming must know which
information?
A. ip address of server
B. port number
C. both ip address of server & port number
D. only its own ip address
Answer» C. both ip address of server & port number
discuss

584.
TCP, FTP, Telnet, SMTP, POP etc. are examples of
___________
A. socket
B. ip address
C. protocol
D. mac address
Answer» C. protocol
discuss

585. What does the java.net.InetAddress class represent?


A. socket
B. ip address
585. What does the java.net.InetAddress class represent?
C. protocol
D. mac address
Answer» B. ip address
discuss

586.
Which classes are used for connection-less socket
programming?
A. datagram socket
B. datagram packet
C. both datagram socket & datagram packet
D. server socket
Answer» C. both datagram socket & datagram packet
discuss

587.
In Inet Address class, which method returns the host name
of the IP Address?
A. public string get hostname()
B. public string gethostaddress()
C. public static inetaddress get localhost()
D. public getbyname()
Answer» A. public string get hostname()
discuss

588. Cookies were originally designed for ____________


A. client side programming
B. server side programming
C. both client side programming and server side programming
D. socket programming
Answer» B. server side programming
discuss

589. The Cookie manipulation is done using which property?


A. cookie
B. cookies
C. manipulate
D. manipulate cookie
Answer» A. cookie
discuss
590. Which of the following explains Cookies nature?
A. non volatile
B. volatile
C. intransient
D. transient
Answer» D. transient
discuss

591. Which attribute is used to extend the lifetime of a cookie?


A. higher-age
B. increase-age
C. max-age
D. lifetime
Answer» C. max-age
discuss

592. Which of the following defines the Cookie visibility?


A. document path
B. localstorage
C. sessionstorage
D. all of the mentioned
Answer» D. all of the mentioned
discuss

593.
Which of the following can be used to configure the scope
of the Cookie visibility?
A. path
B. domain
C. both path and domain
D. server
Answer» D. server
discuss

594. How can you set a Cookie visibility scope to local Storage?
A. /
B. %
C. *
D. #
Answer» A. /
discuss
595. Which of the following is a Boolean cookie attribute?
A. bool
B. secure
C. lookup
D. domain
Answer» B. secure
discuss

596. What is the constraint on the data per cookie?


A. 2 kb
B. 1 kb
C. 4 kb
D. 3 kb
Answer» C. 4 kb
discuss

597. What does REST stand for?


A. represent state transfer
B. representational state transfer
C. representing state transfer
D. representation state transfer
Answer» B. representational state transfer
discuss

598.
Which of the following HTTP methods should be
idempotent in nature?
A. options
B. delete
C. post
D. head
Answer» B. delete
discuss

599.
Next-Hop Method is used to reduce contents of a
_________
A. revolving table
B. rotating table
C. routing table
D. re-allocate table
Answer» C. routing table
discuss

600.
In Unicast Routing, Dijkstra algorithm creates a shortest
path tree from a ________
A. graph
B. tree
C. network
D. link
Answer» A. graph

01. RPF stands for __________


A. reverse path forwarding
B. reverse path failure
C. reverse packet forwarding
D. reverse protocol failure
Answer» A. reverse path forwarding
discuss

602. LSP stands for __________


A. link stable packet
B. link state packet
C. link state protocol
D. link state path
Answer» B. link state packet
discuss

603. Network layer firewall works as a ________


A. frame filter
B. packet filter
C. signal filter
D. content filter
Answer» B. packet filter
discuss

604.
Network layer firewall has two sub-categories called
____________
A. stateful firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
604.
Network layer firewall has two sub-categories called
____________
C. frame firewall and packet firewall
D. network firewall and data firewall
Answer» A. stateful firewall and stateless firewall
discuss

605. WPA2 is used for security in _______


A. ethernet
B. bluetooth
C. wi-fi
D. e-mail
Answer» C. wi-fi
discuss

606.
Open Shortest Path First (OSPF) is also called as
_____________
A. link state protocol
B. error-correction protocol
C. routing information protocol
D. border gateway protocol
Answer» A. link state protocol
discuss

607.
The computation of the shortest path in OSPF is usually
done by ____________
A. bellman-ford algorithm
B. routing information protocol
C. dijkstra’s algorithm
D. distance vector routing
Answer» C. dijkstra’s algorithm
discuss

608.
In OSPF, which protocol is used to discover neighbour
routers automatically?
A. link state protocol
B. error-correction protocol
C. routing information protocol
D. hello protocol
608.
In OSPF, which protocol is used to discover neighbour
routers automatically?
Answer» D. hello protocol
discuss

609. Which of the following is not a type of OSPF packet?


A. hello
B. link-state request
C. link-state response
D. link-state ack
Answer» C. link-state response
Explanation: The five types of OSPF packets are: Hello, Database description, Linkstate
request, Link-state update, and Link-state ACK. There is no Link-state response
packet; the neighbor router sends a Link-state update packet as a response to the
Linkstate request packet if there is an update in the routing table.
discuss

610.
In OSPF header, which field is used to detect errors in the
packet?
A. type
B. area id
C. authentication type
D. checksum
Answer» D. checksum
Explanation: The checksum field is used to detect errors. It makes sure that the data
portions that are being sent are all in integrity. It can detect duplicated bits. Once an
error is detected, the sender has to re-transmit the data as it won’t receive an
acknowledgment.
discuss

611.
The outcome of Dijkstra’s calculation is used to populate
the __________
A. topology table
B. routing table
C. neighbor table
D. adjacency table
Answer» B. routing table
discuss
612. What is the IP protocol number for OSPF packets?
A. 89
B. 86
C. 20
D. 76
Answer» A. 89
discuss

613. Which packet is NOT an OSPF packet type?


A. lsu
B. lsr
C. dbd
D. query
Answer» D. query
discuss

614.
Which multicast address does the OSPF Hello protocol
use?
A. 224.0.0.5
B. 224.0.0.6
C. 224.0.0.7
D. 224.0.0.8
Answer» A. 224.0.0.5
discuss

615. DBD packets are involved during which two states?


A. exstart and exchange
B. loading and two-way
C. init and full
D. down and loading
Answer» A. exstart and exchange
discuss

616. At which interval does OSPF refresh LSAs?


A. 10 seconds
B. 30 seconds
C. 30 minutes
D. 1 hour
Answer» D. 1 hour
discuss
617.
Which field is NOT a field within an OSPF packet
header?
A. packet length
B. router id
C. authentication type
D. maxage time
Answer» D. maxage time
discuss

618.
Which two commands are required for basic OSPF
configuration?
A. “[network mask] area [area-id]” and “router ospf [process-id]”
B. “[wildcard-mask] area [area-id]” and “[network mask] area [area-id]”
C. only “router ospf [process-id]”
D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”
Answer» D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”
discuss

619.
Which OSPF show command describes a list of OSPF
adjacencies?
A. show ip ospf interface
B. show ip ospf
C. show ip route
D. show ip ospf neighbor
Answer» D. show ip ospf neighbor
discuss

620. Datagram switching is done at which layer of OSI model?


A. network layer
B. physical layer
C. application layer
D. transport layer
Answer» A. network layer
discuss

621. Packets in datagram switching are referred to as ________


A. switches
B. segments
C. datagrams
621. Packets in datagram switching are referred to as ________
D. data-packets
Answer» C. datagrams
discuss

622.
Datagrams are routed to their destinations with the help
of ________
A. switch table
B. segments table
C. datagram table
D. routing table
Answer» C. datagram table
discuss

623.
The main contents of the routing table in datagram
networks are ___________
A. source and destination address
B. destination address and output port
C. source address and output port
D. input port and output port
Answer» B. destination address and output port
discuss

624.
Which of the following is true with respect to the delay in
datagram networks?
A. delay is greater than in a virtual circuit network
B. each packet may experience a wait at a switch
C. delay is not uniform for the packets of a message
D. all of the mentioned
Answer» D. all of the mentioned
discuss

625.
Which of the following is false with respect to the
datagram networks?
A. number of flows of packets are not limited
B. packets may not be in order at the destination
C. path is not reserved
D. delay is the same for all packets in a flow
Answer» D. delay is the same for all packets in a flow
discuss

626. Network layer firewall works as a __________


A. frame filter
B. packet filter
C. content filter
D. virus filter
Answer» B. packet filter
discuss

627.
Network layer firewall has two sub-categories as
_________
A. state full firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network layer firewall and session layer firewall
Answer» A. state full firewall and stateless firewall
discuss

628. Which of the following is / are the types of firewall?


A. packet filtering firewall
B. dual homed gateway firewall
C. screen host firewall
D. dual host firewall
Answer» A. packet filtering firewall
discuss

629. A proxy firewall filters at _________


A. physical layer
B. data link layer
C. network layer
D. application layer
Answer» D. application layer
discuss

630. A packet filter firewall filters at __________


A. physical layer
B. data link layer
C. network layer or transport layer
D. application layer
Answer» C. network layer or transport layer
discuss

631.
What is one advantage of setting up a DMZ with two
firewalls?
A. you can control where traffic goes in three networks
B. you can do stateful packet filtering
C. you can do load balancing
D. improved network performance
Answer» C. you can do load balancing
discuss

632.
A stateful firewall maintains a ___________ which is a list
of active connections.
A. routing table
B. bridging table
C. state table
D. connection table
Answer» A. routing table
discuss

633. Performance management is closely related to _________


A. proactive fault management
B. fault management
C. reactive fault management
D. preventive fault management
Answer» B. fault management
discuss

634.
Which of the following networks supports pipelining
effect?
A. circuit-switched networks
B. message-switched networks
C. packet-switched networks
D. stream-switched networks
Answer» C. packet-switched networks
discuss

635.
MIB is a collection of groups of objects that can be
managed by __________
A. smtp
635.
MIB is a collection of groups of objects that can be
managed by __________
B. udp
C. snmp
D. tcp/ip
Answer» C. snmp
discuss

636.
A network management system can be divided into
___________
A. three categories
B. five broad categories
C. seven broad categories
D. ten broad categories
Answer» B. five broad categories
discuss

637. Ping can _________


A. measure round-trip time
B. report packet loss
C. report latency
D. all of the mentioned
Answer» D. all of the mentioned
discuss

638. Ping sweep is a part of _________


A. traceroute
B. nmap
C. route
D. ipconfig
Answer» B. nmap
discuss

639. ICMP is used in _________


A. ping
B. traceroute
C. ifconfig
D. both ping & traceroute
Answer» D. both ping & traceroute
discuss
640.
__________ command is used to manipulate TCP/IP
routing table.
A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» A. route
discuss

641.
Which of the following is not related to ipconfig in
Microsoft Windows?
A. display all current tcp/ip network configuration values
B. modify dhcp settings
C. modify dns settings
D. trace the routers in the path to destination
Answer» D. trace the routers in the path to destination
discuss

642.
__________ allows checking if a domain is available for
registration.
A. domain check
B. domain dossier
C. domain lookup
D. domain registers
Answer» A. domain check
discuss

643. Choose the wrong statement from the following.


A. nslookup is used to query a dns server for dns data
B. ping is used to check connectivity
C. pathping combines the functionality of ping with that of route
D. ifconfig can configure tcp/ip network interface parameters
Answer» C. pathping combines the functionality of ping with that of route
discuss

644. Ethernet frame consists of ____________


A. mac address
B. ip address
C. default mask
644. Ethernet frame consists of ____________
D. network address
Answer» A. mac address
discuss

645. What is start frame delimeter (SFD) in ethernet frame?


A. 10101010
B. 10101011
C. 00000000
D. 11111111
Answer» B. 10101011
discuss

646. MAC address is of ___________


A. 24 bits
B. 36 bits
C. 42 bits
D. 48 bits
Answer» D. 48 bits
discuss

647.
Ethernet in metropolitan area network (MAN) can be
used as ___________
A. pure ethernet
B. ethernet over sdh
C. ethernet over mpls
D. all of the mentioned
Answer» D. all of the mentioned
discuss

648.
A point-to-point protocol over ethernet is a network
protocol for __________
A. encapsulating ppp frames inside ethernet frames
B. encapsulating ehternet framse inside ppp frames
C. for security of ethernet frames
D. for security of ppp frames
Answer» A. encapsulating ppp frames inside ethernet frames
discuss
649. High speed ethernet works on _________
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. unshielded twisted pair cable
Answer» C. optical fiber
discuss

650.
The maximum size of payload field in ethernet frame is
__________
A. 1000 bytes
B. 1200 bytes
C. 1300 bytes
D. 1500 bytes
Answer» D. 1500 bytes

651. What is interframe gap?


A. idle time between frames
B. idle time between frame bits
C. idle time between packets
D. idle time between networks
Answer» A. idle time between frames
discuss

652. In wireless ad-hoc network _________


A. access point is not required
B. access point is must
C. nodes are not required
D. all nodes are access points
Answer» A. access point is not required
discuss

653. In wireless distribution system __________


A. multiple access point are inter-connected with each other
B. there is no access point
C. only one access point exists
D. access points are not required
Answer» A. multiple access point are inter-connected with each other
discuss

654.
A wireless network interface controller can work in
_______
A. infrastructure mode
B. ad-hoc mode
C. both infrastructure mode and ad-hoc mode
D. wds mode
Answer» C. both infrastructure mode and ad-hoc mode
discuss

655.
In wireless network an extended service set is a set of
________
A. connected basic service sets
B. all stations
C. all access points
D. connected access points
Answer» A. connected basic service sets
discuss

656. Mostly ________ is used in wireless LAN.


A. time division multiplexing
B. orthogonal frequency division multiplexing
C. space division multiplexing
D. channel division multiplexing
Answer» B. orthogonal frequency division multiplexing
discuss

657.
Which one of the following event is not possible in wireless
LAN?
A. collision detection
B. acknowledgement of data frames
C. multi-mode data transmission
D. connection to wired networks
Answer» A. collision detection
discuss

658. What is Wired Equivalent Privacy (WEP)?


A. security algorithm for ethernet
B. security algorithm for wireless networks
658. What is Wired Equivalent Privacy (WEP)?
C. security algorithm for usb communication
D. security algorithm for emails
Answer» B. security algorithm for wireless networks
discuss

659. What is WPA?


A. wi-fi protected access
B. wired protected access
C. wired process access
D. wi-fi process access
Answer» A. wi-fi protected access
discuss

660. What is internet?


A. a single network
B. a vast collection of different networks
C. interconnection of local area networks
D. interconnection of wide area networks
Answer» B. a vast collection of different networks
discuss

661.
To join the internet, the computer has to be connected to a
_________
A. internet architecture board
B. internet society
C. internet service provider
D. different computer
Answer» C. internet service provider
discuss

662.
ISP exchanges internet traffic between their networks by
__________
A. internet exchange point
B. subscriber end point
C. isp end point
D. internet end point
Answer» A. internet exchange point
discuss
663. Which of the following protocols is used in the internet?
A. http
B. dhcp
C. dns
D. dns, http and dns
Answer» D. dns, http and dns
discuss

664. The size of an IP address in IPv6 is _________


A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Answer» C. 128 bits
Explanation: an ipv6 address is 128 bits long. therefore, 2128 i.e. 340 undecillion addresses are
possible in ipv6. ipv4 has only 4 billion possible addresses and ipv6 would be a brilliant alternative
in case ipv4 runs out of possible new addresses.
discuss

665. Internet works on _______


A. packet switching
B. circuit switching
C. both packet switching and circuit switching
D. data switching
Answer» A. packet switching
discuss

666.
Which one of the following is not an application layer
protocol used in internet?
A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. local procedure call
Answer» C. resource reservation protocol
discuss

667.
Which protocol assigns IP address to the client connected
in the internet?
A. dhcp
B. ip
667.
Which protocol assigns IP address to the client connected
in the internet?
C. rpc
D. rsvp
Answer» A. dhcp
discuss

668.
Which one of the following is not used in media access
control?
A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. packet switching
Answer» D. packet switching
discuss

669.
An interconnected collection of piconet is called
___________
A. scatternet
B. micronet
C. mininet
D. multinet
Answer» A. scatternet
discuss

670.
In a piconet, there can be up to ________ parked nodes in
the network.
A. 63
B. 127
C. 255
D. 511
Answer» C. 255
discuss

671. Bluetooth is the wireless technology for __________


A. local area network
B. personal area network
C. metropolitan area network
D. wide area network
671. Bluetooth is the wireless technology for __________
Answer» B. personal area network
discuss

672. Bluetooth uses __________


A. frequency hopping spread spectrum
B. orthogonal frequency division multiplexing
C. time division multiplexing
D. channel division multiplexing
Answer» A. frequency hopping spread spectrum
discuss

673. What is A2DP (advanced audio distribution profile)?


A. a bluetooth profile for streaming audio
B. a bluetooth profile for streaming video
C. a bluetooth profile for security
D. a bluetooth profile for file management
Answer» A. a bluetooth profile for streaming audio
discuss

674. In a piconet, one master device ________


A. can not be slave
B. can be slave in another piconet
C. can be slave in the same piconet
D. can be master in another piconet
Answer» B. can be slave in another piconet
discuss

675. Bluetooth transceiver devices operate in ______ band.


A. 2.4 ghz ism
B. 2.5 ghz ism
C. 2.6 ghz ism
D. 2.7 ghz ism
Answer» A. 2.4 ghz ism
discuss

676. Bluetooth supports _______


A. point-to-point connections
B. point-to-multipoint connection
676. Bluetooth supports _______
C. both point-to-point connections and point-to-multipoint connection
D. multipoint to point connection
Answer» C. both point-to-point connections and point-to-multipoint connection
discuss

677. A scatternet can have maximum __________


A. 10 piconets
B. 20 piconets
C. 30 piconets
D. 40 piconets
Answer» A. 10 piconets
discuss

678. WiMAX stands for ___________


A. wireless maximum communication
B. worldwide interoperability for microwave access
C. worldwide international standard for microwave access
D. wireless internet maximum communication
Answer» B. worldwide interoperability for microwave access
discuss

679. WiMAX provides ________


A. simplex communication
B. half duplex communication
C. full duplex communication
D. no communication
Answer» C. full duplex communication
discuss

680. WiMAX uses the _________


A. orthogonal frequency division multiplexing
B. time division multiplexing
C. space division multiplexing
D. channel division multiplexing
Answer» A. orthogonal frequency division multiplexing
discuss
681.
Which of the following modulation schemes is supported
by WiMAX?
A. binary phase shift keying modulation
B. quadrature phase shift keying modulation
C. quadrature amplitude modulation
D. all of the mentioned
Answer» D. all of the mentioned
discuss

682.
WiMAX MAC layer provides an interface between
___________
A. higher transport layers and physical layer
B. application layer and network layer
C. data link layer and network layer
D. session layer and application layer
Answer» A. higher transport layers and physical layer
discuss

683. For encryption, WiMAX supports _______


A. advanced encryption standard
B. triple data encryption standard
C. advanced encryption standard and triple data encryption standard
D. double data encryption standard
Answer» C. advanced encryption standard and triple data encryption standard
discuss

684. WiMAX provides _______


A. voip services
B. iptv services
C. both voip and iptv services
D. no iptv services
Answer» C. both voip and iptv services
discuss

685. WiMAX is mostly used for __________


A. local area network
B. metropolitan area network
C. personal area network
D. wide area network
685. WiMAX is mostly used for __________
Answer» B. metropolitan area network
discuss

686.
Which of the following frequencies is not used in WiMAX
for communication?
A. 2.3 ghz
B. 2.4 ghz
C. 2.5 ghz
D. 3.5 ghz
Answer» B. 2.4 ghz
discuss

687. SONET stands for ___________


A. synchronous optical network
B. synchronous operational network
C. stream optical network
D. shell operational network
Answer» A. synchronous optical network
discuss

688.
In SONET, STS-1 level of electrical signalling has the data
rate of _________
A. 51.84 mbps
B. 155.52 mbps
C. 2488.320 mbps
D. 622.080 mbps
Answer» A. 51.84 mbps
discuss

689.
The path layer of SONET is responsible for the movement
of a signal _________
A. from its optical source to its optical destination
B. across a physical line
C. across a physical section
D. back to its optical source
Answer» B. across a physical line
discuss
690.
The photonic layer of the SONET is similar to the
__________ of OSI model.
A. network layer
B. data link layer
C. physical layer
D. transport layer
Answer» C. physical layer
discuss

691.
In SONET, each synchronous transfer signal STS-n is
composed of __________
A. 2000 frames
B. 4000 frames
C. 8000 frames
D. 16000 frames
Answer» C. 8000 frames
discuss

692. A linear SONET network can be ________


A. point-to-point
B. multi-point
C. both point-to-point and multi-point
D. single point
Answer» C. both point-to-point and multi-point
discuss

693.
Automatic protection switching in linear network is
defined at the _______
A. line layer
B. section layer
C. photonic layer
D. path layer
Answer» A. line layer
discuss

694.
A unidirectional path switching ring is a network with
__________
A. one ring
B. two rings
C. three rings
694.
A unidirectional path switching ring is a network with
__________
D. four rings
Answer» B. two rings
discuss

695.
Real-time transport protocol (RTP) is mostly used in
_________
A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer» D. all of the mentioned
discuss

696. RTP is used to ________


A. carry the media stream
B. monitor transmission statistics of streams
C. monitor quality of service of streams
D. secure the stream
Answer» A. carry the media stream
discuss

697. RTP provides the facility of jitter ____________


A. media stream
B. expansion
C. media modification
D. security
Answer» A. media stream
discuss

698.
Which protocol provides the synchronization between
media streams?
A. rtp
B. rtcp
C. rpc
D. rtct
Answer» B. rtcp
discuss

699. An RTP session is established for ____________


A. each media stream
B. all media streams
C. some predefined number of media streams
D. no media stream
Answer» A. each media stream
discuss

700. RTP can use __________


A. unprevileleged udp ports
B. stream control transmission protocol
C. datagram congestion control protocol
D. all of the mentioned
Answer» D. all of the mentioned

701.
Which one of the following multimedia formats can not be
supported by RTP?
A. mpeg-4
B. mjpeg
C. mpeg
D. txt
Answer» D. txt
discuss

702. An RTP header has a minimum size of _________


A. 12 bytes
B. 16 bytes
C. 24 bytes
D. 32 bytes
Answer» A. 12 bytes
discuss

703. Which one of the following is not correct?


A. rtcp provides canonical end-point identifiers to all session participants
B. rtcp reports are expected to be sent by all participants
C. rtcp itself does not provide any flow encryption or authentication methods
D. rtcp handles the actual data delivery
703. Which one of the following is not correct?
Answer» D. rtcp handles the actual data delivery
discuss

704.
An RPC (remote procedure call) is initiated by the
_________
A. server
B. client
C. client after the sever
D. a third party
Answer» B. client
discuss

705.
In RPC, while a server is processing the call, the client is
blocked ________
A. unless the client sends an asynchronous request to the server
B. unless the call processing is complete
C. for the complete duration of the connection
D. unless the server is disconnected
Answer» A. unless the client sends an asynchronous request to the server
discuss

706. A remote procedure call is _______


A. inter-process communication
B. a single process
C. a single thread
D. a single stream
Answer» A. inter-process communication
discuss

707.
RPC allows a computer program to cause a subroutine to
execute in _________
A. its own address space
B. another address space
C. both its own address space and another address space
D. applications address space
Answer» B. another address space
discuss
708.
RPC works between two processes. These processes must
be ____________
A. on the same computer
B. on different computers connected with a network
C. on the same computer and also on different computers connected with a network
D. on none of the computers
Answer» C. on the same computer and also on different computers connected with a network
discuss

709. A remote procedure is uniquely identified by _________


A. program number
B. version number
C. procedure number
D. all of the mentioned
Answer» D. all of the mentioned
discuss

710. An RPC application requires _________


A. specific protocol for client server communication
B. a client program
C. a server program
D. all of the mentioned
Answer» D. all of the mentioned
discuss

711. RPC is a _________


A. synchronous operation
B. asynchronous operation
C. time independent operation
D. channel specific operation
Answer» A. synchronous operation
discuss

712.
Which of the following is an advantage of anomaly
detection?
A. rules are easy to define
B. custom protocols can be easily analyzed
C. the engine can scale as the rule set grows
D. malicious activity that falls within normal usage patterns is detected
712.
Which of the following is an advantage of anomaly
detection?
Answer» C. the engine can scale as the rule set grows
discuss

713. What is the purpose of a shadow honeypot?


A. to flag attacks against known vulnerabilities
B. to help reduce false positives in a signature-based ids
C. to randomly check suspicious traffic identified by an anomaly detection system
D. to enhance the accuracy of a traditional honeypot
Answer» C. to randomly check suspicious traffic identified by an anomaly detection system
discuss

714.
At which two traffic layers do most commercial IDSes
generate signatures?
A. application layer and network layer
B. network layer and session layer
C. transport layer and application layer
D. transport layer and network layer
Answer» D. transport layer and network layer
discuss

715. When discussing IDS/IPS, what is a signature?


A. an electronic signature used to authenticate the identity of a user on the network
B. attack-definition file
C. it refers to “normal,” baseline network behavior
D. it is used to authorize the users on a network
Answer» B. attack-definition file
discuss

716. Which of the following is true of signature-based IDSes?


A. they alert administrators to deviations from “normal” traffic behavior
B. they identify previously unknown attacks
C. the technology is mature and reliable enough to use on production networks
D. they scan network traffic or packets to identify matches with attack-definition files
Answer» D. they scan network traffic or packets to identify matches with attack-definition files
discuss
717. PPP provides the _______ layer in the TCP/IP suite.
A. link
B. network
C. transport
D. application
Answer» A. link
discuss

718. PPP consists of ________components


A. three (encapsulating, the domain name system)
B. three (encapsulating, a link control protocol, ncp)
C. two (a link control protocol, simple network control protocol)
D. one (simple network control protocol)
Answer» B. three (encapsulating, a link control protocol, ncp)
discuss

719. A Link Control Protocol (LCP) is used for ____________


A. establishing, configuring and testing the data-link connection
B. establishing and configuring different network-layer protocols
C. testing the different network-layer protocols
D. provides for multiplexing of different network-layer protocols
Answer» A. establishing, configuring and testing the data-link connection
discuss

720.
A family of network control protocols (NCPs)
____________
A. are a series of independently defined protocols that provide a dynamic
B. are a series of independently-defined protocols that encapsulate
C. are a series of independently defined protocols that provide transparent
D. the same as nfs
Answer» B. are a series of independently-defined protocols that encapsulate
discuss

721. Choose the correct statement from the following.


A. ppp can terminate the link at any time
B. ppp can terminate the link only during the link establishment phase
C. ppp can terminate the link during the authentication phase
D. ppp can terminate the link during the callback control phase
Answer» A. ppp can terminate the link at any time
discuss
722. EIGRP metric is ________
A. k-values
B. bandwidth only
C. hop count
D. delay only
Answer» A. k-values
discuss

723. EIGRP can support ____________


A. vlsm/subnetting
B. auto summary
C. unequal cast load balancing
D. all of the mentioned
Answer» D. all of the mentioned
discuss

724.
EIGRP sends a hello message after every ___________
seconds.
A. 5 seconds (lan), 60 seconds (wan)
B. 5 seconds (lan), 5 seconds (wan)
C. 15s
D. 180s
Answer» A. 5 seconds (lan), 60 seconds (wan)
discuss

725. Administrative distance for internal EIGRP is ______


A. 90
B. 170
C. 110
D. 91
Answer» A. 90
discuss

726. The EIGRP metric values include:


A. delay
B. bandwidth
C. mtu
D. all of the mentioned
Answer» D. all of the mentioned
discuss
727.
For default gateway, which of following commands will
you use on a Cisco router?
A. ip default network
B. ip default gateway
C. ip default route
D. default network
Answer» A. ip default network
discuss

728.
Administrative distance for external EIGRP route is
_______
A. 90
B. 170
C. 110
D. 100
Answer» B. 170
discuss

729.
EIGRP uses the ____________ algorithm for finding
shortest path.
A. spf
B. dual
C. linkstat
D. djikstra’s
Answer» B. dual
discuss

730. What are the other types of OLAP apart from ROLAP?
A. HOLAP
B. MOLAP
C. DOLAP
D. Both a and b above
Answer» B. MOLAP
discuss

731. A network router joins two together?


A. Computers
B. Switches
C. Networks
731. A network router joins two together?
D. Gateway
Answer» C. Networks
discuss

Message Oriented Middleware allows general purpose


732. messages to be exchanged in a Client/Server system using

message queues.
A. True
B. False
C. none
D. other
Answer» A. True
discuss

733. Which of the following below is a loopback IPaddress?


A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
Answer» D. 127.0.0.1
discuss

734. Ping command works on which protocol?


A. ICMP
B. TCP
C. IP
D. UDP
Answer» A. ICMP
discuss

735.
Transport layer of OSI model lies between Network and
layer
A. Application
B. Data link
C. Session
D. Presentation
Answer» C. Session
discuss
736.
Which of the following protocols below work in the
application layer?
A. POP
B. PPP
C. FTP
D. Both a and d above
Answer» D. Both a and d above
discuss

737. What is the port number for HTTP?


A. 25
B. 80
C. 21
D. 65
Answer» B. 80
discuss

738. IP4 is more commonly used than IPv6?


A. True
B. False
C. none
D. other
Answer» A. True
discuss

739. From the options below, which suits best for MODEM?
A. a device that modulates an analog carrier signal to encode digital information
B. a device that modulates a digital carrier signal to encode analog information
C. a device that modulates an analog carrier signal to decode digital information
D. a device that modulates a digital carrier signal to decode analoginformation
Answer» A. a device that modulates an analog carrier signal to encode digital information
discuss

740. What is the size of an IP address?


A. 64 bit
B. 128 bit
C. 16 bit
D. 32 bit
Answer» D. 32 bit
discuss
741. MAC addresses are also known as?
A. Hardware address
B. Physical address
C. both and b above
D. IP address
Answer» C. both and b above
discuss

742.
A network point that provides entrance into another
network is called as
A. Node
B. Gateway
C. Switch
D. Router
Answer» B. Gateway
discuss

743. UDP is an unreliable protocol.


A. True
B. False
C. none
D. other
Answer» A. True
discuss

744.
A stream socket provides communications between a client
and a server
A. One way
B. Two way
C. none
D. other
Answer» B. Two way
discuss

745. Token Ring is a data link technology for?


A. WAN
B. MAN
C. LAN
D. both a and b above
745. Token Ring is a data link technology for?
Answer» C. LAN
discuss

746.
Which of the following protocol below are suited for email
retrieval?
A. POP3
B. IMAP
C. FTP
D. Both and b above
Answer» D. Both and b above
discuss

747. TELNET used protocol for data connection


A. TCP
B. UDP
C. IP
D. DHCP
Answer» A. TCP
discuss

748. 10Base5, 10Base2, 10BaseT are types of?


A. Internet
B. LAN
C. Ethernet
D. Cables
Answer» C. Ethernet
discuss

749.
The process of assigning the IP address for specific times
to the various hosts by DHCP is called?
A. Lend
B. sublease
C. let
D. Lease
Answer» D. Lease
discuss
750. What is the full form of URL?
A. Uniform routing locator
B. Uniform Resource Locator
C. Universal Resource Locator
D. Uniform router locator
Answer» B. Uniform Resource Locator

751.
is a standard suite of protocols used for packet switching
across computer networks.
A. x.22
B. x.23
C. x.25
D. x.26
Answer» C. x.25
discuss

752. What is the full form of CAN?


A. Campus Area Network
B. Cluster Area Network
C. Control Area network
D. both A and B
Answer» D. both A and B
discuss

753.
Which of the following below is/are the capability of ICMP
protocol?
A. Report package count
B. Report network congestion
C. Both band d
D. Report availability of remote hosts
Answer» C. Both band d
discuss

754. ARP works on Ethernet networks.


A. False
B. True
C. none
D. other
754. ARP works on Ethernet networks.
Answer» B. True
discuss

755.
assigns a unique number to each IP network adapter
called the MAC address.
A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Both B and C above
Answer» A. Media Access Control
discuss

756.
Piconets in the blue tooth a minimum of two and
amaximum of Bluetooth peer devices.
A. five
B. eight
C. nine
D. four
Answer» B. eight
discuss

757.
Dynamic addressing doesn’t allow many devices To share
limited address space on a network
A. True
B. False
C. none
D. other
Answer» B. False
discuss

758. NAT stands for .


A. network address transformer
B. network address translator
C. network address translation
D. Both B and C above
Answer» C. network address translation
discuss
759. Which of the following is true for secure shell tunneling?
A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port
B. SSH tunnels provide a means to not bypassfirewalls
C. All SSH clients support dynamic port forwarding
D. Both A and B
Answer» A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port
discuss

760. Which of the following below are secure VPN protocols?


A. UDP
B. TCP
C. SSTP
D. Both B and C
Answer» D. Both B and C
discuss

761. What is the difference between a switch and a hub?


A. Switches operate at the physical layer while hubs operate at the data link layer
B. Switches operate at the data link layer while hubs operate at the transport layer
C. Switches operate at the data link layer while hubs operate at the physical layer
D. Switches operate at the transport layer while hubs operate at the physical layer
Answer» C. Switches operate at the data link layer while hubs operate at the physical layer
discuss

762.
When computers in a network listen and receive the
signal, it is termed as active toplogy
A. True
B. False
C. none
D. other
Answer» A. True
discuss

763. In 10base2, 10base5, what do 2 and 5 stand for?


A. Speed in Mbps
B. Number of segments
C. Length of segment
D. Size of segment
Answer» B. Number of segments
discuss
764. is added to data packet for error detection.
A. checksum bit
B. error bit
C. parity bit
D. other
Answer» C. parity bit
discuss

765.
ALL IP addresses are divided into a network address and
host address
A. True
B. False
C. none
D. other
Answer» A. True
discuss

766.
How can we examine the current routing tables in
command prompt?
A. using route start
B. using net start
C. using net stat
D. either a or b
Answer» C. using net stat
discuss

767.
Both ping and tracert are used to find If the computer is in
the network.
A. True
B. False
C. none
D. other
Answer» B. False
discuss

768. What is the difference between ring and bustopology?


In Ring, all nodes are connected with another in a loop while in the bus they are connected to
A.
a central cable
B. In Ring, all nodes are connected with another loop while on a bus they are connected to a
768. What is the difference between ring and bustopology?
central cable
In the bus, all nodes are connected with another in a loop while instar they are connected to a
C.
centralbnode
In Bus all nodes are connected with another loop while instar they are connected to a central
D.
cable
Answer» A. In Ring, all nodes are connected with another in a loop while in the bus they are
connected to a central cable
discuss

769.
MAC addressing works in data link layer while IP
addressing works in the network layer.
A. True
B. False
C. none
D. other
Answer» A. True
discuss

770.
A packet whose destination is outside the local TCP/IP
network segment is sentto the _.
A. File server
B. Default gateway
C. DNS server
D. DHCP server
Answer» B. Default gateway
discuss

771. Why was the OSI model developed?


A. manufacturers disliked the TCP/IP protocol suite
B. the rate of data transfer was increasing exponentially
C. standards were needed to allow any two systems to communicate
D. none of the above
Answer» C. standards were needed to allow any two systems to communicate
discuss

772.
Which piece of information is not vital for a computer in a
TCP/IP network?
A. IP address
772.
Which piece of information is not vital for a computer in a
TCP/IP network?
B. Default gateway
C. Subnet Mask
D. DNS server
Answer» D. DNS server
discuss

773.
The physical layer is concerned with the movement of over
the physical medium.
A. programs
B. dialogs
C. protocols
D. Bits
Answer» D. Bits
discuss

774.
Which protocol below operates at the network layer in the
OSI model?
A. IP
B. ICMP
C. RARP
D. All of the above
Answer» D. All of the above
discuss

775.
In the OSI model, as a data packet moves from the lower
to the upper layers, headers are .
A. added
B. removed
C. rearranged
D. Modified
Answer» B. removed
discuss

776. Session layer of the OSI model provides


A. Data representation
B. Dialog control
C. Remote job execution
776. Session layer of the OSI model provides
D. Creating logical connections
Answer» B. Dialog control
discuss

777. IPv6 has -bit addresses.


A. 32
B. 64
C. 128
D. Variable
Answer» C. 128
discuss

778.
Which one of the following functionalities aren’t provided
by TCP?
A. Flow control
B. Addressing
C. Retransmission of packets as required
D. Proper sequencing of the packets
Answer» B. Addressing
discuss

779.
Which of the following can be an Ethernet physical
address?
A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. none of the above
Answer» C. 07:01:02:01:2C:4B
discuss

780. An IP address contains bits ?


A. 8
B. 16
C. 32
D. 64
Answer» C. 32
discuss
781.
Which routing protocol below is used by exterior routers
between the autonomoussystems?
A. RIP
B. IGRP
C. OSPF
D. BGP
Answer» D. BGP
discuss

782.
Which of the IP headers decides when the packet should
be discarded?
A. Fragment control
B. TTL
C. Checksum
D. Header length
Answer» B. TTL
discuss

783. Which IP address is reserved for software loop-back?


A. 224.x.x.x
B. 127.x.x.x
C. 0.0.0.0
D. 255.255.255.255
Answer» B. 127.x.x.x
discuss

784.
What is the network ID for a computer whose IP address
is190.148.64.23?
A. 190
B. 190.148
C. 190.148.64
D. None of the above
Answer» B. 190.148
discuss

785. Which port is reserved for use of the SMTP protocol?


A. 21
B. 23
C. 25
785. Which port is reserved for use of the SMTP protocol?
D. 53
Answer» C. 25
discuss

786. Which one of the followings is a connectionless protocol?


A. UDP
B. Ethernet
C. IPX
D. All of the above
Answer» D. All of the above
discuss

787. Which application below uses the UDP protocol?


A. DNS
B. TFTP
C. RIP
D. All of the above
Answer» C. RIP
discuss

How many IP addresses can be assigned to hosts in a C-


788. class network segment with a subnet mask of

255.255.255.192?
A. 62
B. 126
C. 192
D. 254
Answer» A. 62
discuss

789.
Which of the followings is not a direct implication of
subnet masks in TCP/IP networks?
A. Reduce network traffic
B. Increase network security
C. Assignment of more IP addresses
D. Better network management
Answer» C. Assignment of more IP addresses
discuss
790.
In the layer hierarchy as the data packet moves from the
upper to the lower layers, headers are
A. Added
B. Removed
C. Rearranged
D. Modified
Answer» A. Added
discuss

791. The structure or format of data is called


A. Syntax
B. Semantics
C. Struct
D. Formatting
Answer» A. Syntax
discuss

792.
Communication between a computer and a keyboard
involves transmission.
A. Automatic
B. Half-duplex
C. Full-duplex
D. Simplex
Answer» D. Simplex
discuss

793. The first Network was called


A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Answer» D. ARPANET
discuss

794. A set of rules that governs data communication.


A. Protocols
B. Standards
C. RFCs
D. Servers
Answer» A. Protocols
discuss

795.
Communication channel is shared by all the machines on
the networkin
A. Broadcast network
B. Unicast network
C. Multicast network
D. Anycast network
Answer» A. Broadcast network
discuss

796.
A is a device that forwards packets between networks by
processing the routing information included in the packet.
A. Bridge
B. Firewall
C. Router
D. Hub
Answer» C. Router
discuss

797. Network congestion occurs


A. In case of traffic overloading
B. When a system terminates
C. When connection between two nodes terminates
D. In case of transfer failure
Answer» A. In case of traffic overloading
discuss

798.
Which of the following networks extends a private
network across public networks?
A. Local area network
B. Virtual private network
C. Enterprise private network
D. Storage area network
Answer» B. Virtual private network
discuss

799. The number of layers in ISO OSI reference model is


A. 5
B. 7
799. The number of layers in ISO OSI reference model is
C. 6
D. 10
Answer» B. 7
discuss

800.
Which of the following layers is an addition to OSI model
when compared with TCP IPmodel?
A. Application layer
B. Presentation layer
C. Session layer
D. Session and Presentation layer
Answer» D. Session and Presentation layer

801. The functionalities of the presentation layerinclude


A. Data compression
B. Data encryption
C. Data description
D. All of the mentioned
Answer» D. All of the mentioned
discuss

802.
Delimiting and synchronization of data exchange is
providedby
A. Application layer
B. Session layer
C. Transport layer
D. Link layer
Answer» B. Session layer
discuss

803.
In OSI model, when data is sent from device A to device B,
the 5th layer to receive data at B is
A. Application layer
B. Transport layer
C. Link layer
D. Session layer
803.
In OSI model, when data is sent from device A to device B,
the 5th layer to receive data at B is
Answer» D. Session layer
discuss

804.
In TCP IP Model, when data is sent from device A to
device B, the 5th layer to receive data at B is
A. Application layer
B. Transport layer
C. Link layer
D. Session layer
Answer» A. Application layer
discuss

805.
Which layer is used to link the network support layers and
user supportlayers?
A. Session layer
B. Data link layer
C. Transport layer
D. Network layer
Answer» C. Transport layer
discuss

806. OSI standsfor


A. Open system interconnection
B. Operating system interface
C. Optical service implementation
D. Open service Internet
Answer» A. Open system interconnection
discuss

807.
Which Project 802 standard provides for a collision-free
protocol?
A. 802.2
B. 802.3
C. 802.5
D. 802.6
Answer» C. 802.5
discuss
808.
The protocol data unit (PDU) for the application layer in
the Internet stack is
A. Segment
B. Datagram
C. Message
D. Frame
Answer» C. Message
discuss

809. What is a Firewall in Computer Network?


A. The physical boundary of Network
B. An operating System of Computer Network
C. A system designed to prevent unauthorized access
D. A web browsing Software
Answer» C. A system designed to prevent unauthorized access
discuss

810.
Which of the following services is not provided by wireless
access point in 802.11 WLAN?
A. Association
B. Disassociation
C. Error correction
D. Integration
Answer» C. Error correction
discuss

811. Bridge works in which layer of the OSI model?


A. Application layer
B. Transport layer
C. Network layer
D. Data link layer
Answer» D. Data link layer
discuss

812. Why IP Protocol is considered as unreliable?


A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above
812. Why IP Protocol is considered as unreliable?
Answer» D. All of the above
discuss

813. What are the uses of subnetting ?


A. It divides one large network into several smaller ones
B. It divides network into network classes
C. It speeds up the speed of network
D. None of above
Answer» A. It divides one large network into several smaller ones
discuss

814. The Internet is an example of


A. Cell switched network
B. circuit switched network
C. Packet switched network
D. All of above
Answer» C. Packet switched network
discuss

815. What does protocol defines?


A. Protocol defines what data is communicated.
B. Protocol defines how data is communicated.
C. Protocol defines when data is communicated.
D. All of above
Answer» D. All of above
discuss

816. What is the use of Ping command?


A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in an Application
D. To test a Pinter Quality
Answer» A. To test a device on the network is reachable
discuss

817. What is the Demilitarized Zone?


A. The area between firewall & connection to an external network
B. The area between ISP to Military area
817. What is the Demilitarized Zone?
C. The area surrounded by secured servers
D. The area surrounded by the Military
Answer» A. The area between firewall & connection to an external network
discuss

818.
The combination of an IP address and a port number is
known as.
A. network number
B. socket address
C. subnet mask number
D. MAC address
Answer» B. socket address
discuss

819. Which of the following is reliable communication?


A. TCP
B. IP
C. UPD
D. All of them
Answer» A. TCP
discuss

820. What is the size of Host bits in Class B of IP address?


A. 04
B. 08
C. 16
D. 32
Answer» C. 16
discuss

821.
Which of the following is not associated with the session
layer?
A. Dialog control
B. Token management
C. Semantics of the information transmitted
D. Synchronization
Answer» C. Semantics of the information transmitted
discuss
822. The Internet Control Message Protocol (ICMP)
A. allows gateways to send error a control messages to other gateways or hosts
provides communication between the Internet Protocol Software on one machine and the
B.
Internet Protocol Software on another
reports error conditions to the original source, the source must relate errorsto individual
C.
application programs and take action to correct the problem
D. All of the above
Answer» A. allows gateways to send error a control messages to other gateways or hosts
discuss

Your company has a LAN in its downtown office and has


now set up aLAN in the manufacturing plant in the
823. suburbs. To enable everyone to share data and resources

between the two LANs, what type of device(s) are needed


to connect them? Choose the most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
Answer» D. Router
discuss

Which of the following TCP/IP protocol is used for


824. transferringelectronic mail messages from one machine to

another?
A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» C. SMTP
discuss

825.
Which of the following device is used to connect two
systems, especiallyif the systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
Answer» C. gateway
discuss

can detect burst error of length less than or equal to


826. degree of the polynomial and detects burst errors that

affect odd number of bits.


A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» B. CRC
discuss

827. The PSTN is an example of a............................. network.


A. packet switched
B. circuit switched
C. message switched
D. None of these
Answer» B. circuit switched
discuss

828.
When and where RARP is used intentionally or
effectively?
At the time of network booting where no space to store IP address (or diskless network) for
A.
address resolution.
B. In broadcasting to get IP address of Network.
C. To get the access in private network whenever it is required.
D. None of the above.
Answer» A. At the time of network booting where no space to store IP address (or diskless
network) for address resolution.
discuss

829.
Which one of the following routing algorithm can be used
for network layer design?
A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» D. all of the mentioned
discuss
830.
A subset of a network that includes all the routers but
contains no loopsis called:
A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» A. spanning tree
discuss

831. ICMP is primarily used for:


A. error and diagnostic functions
B. addressing
C. forwarding
D. none of the mentioned
Answer» A. error and diagnostic functions
discuss

832. User datagram protocol is called connectionless because:


A. all UDP packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. both (a) and (b)
D. none of the mentioned
Answer» A. all UDP packets are treated independently by transport layer
discuss

833.
An endpoint of an inter-process communication flow
across a computer network is called:
A. socket
B. pipe
C. port
D. none of the mentioned
Answer» A. socket
discuss

834. A is a TCP name for a transport service access point.


A. port
B. pipe
C. node
D. none of the mentioned
Answer» A. port
discuss

835. Which one of the following is a transport layer protocol?


A. stream control transmission protocol
B. internet control message protocol
C. neighbour discovery protocol
D. dynamic host configuration protocol
Answer» A. stream control transmission protocol
discuss

836. Physical layer provides:


A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for IR over optical fiber
D. all of the mentioned
Answer» D. all of the mentioned
discuss

837.
The translates internet domain and host names to IP
address.
A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» A. domain name system
discuss

838.
When displaying a web page, the application layer uses
the:
A. HTTP protocol
B. FTP protocol
C. SMTP protocol
D. none of the mentioned
Answer» A. HTTP protocol
discuss

839. This is a time-sensitive service:


A. File transfer
B. File download
C. E-mail
839. This is a time-sensitive service:
D. Internet telephony
Answer» D. Internet telephony
discuss

840. Packet sniffers involve:


A. Active receiver
B. Passive receiver
C. Both of the mentioned
D. None of the mentioned
Answer» B. Passive receiver
discuss

841. Identify the incorrect statement:


A. FTP stands for File Transfer Protocol
B. FTP uses two parallel TCP connections
C. FTP sends its control information in-band
D. FTP sends exactly one file over the data connection
Answer» C. FTP sends its control information in-band
discuss

If 5 files are transferred from server A to client B in the


842. same session. The number of TCP connection between A
and B is:
A. 5
B. 10
C. 2
D. 6
Answer» D. 6
discuss

843. Find the FTP reply whose message is wrongly matched:


A. 331 – Username OK, password required
B. 425 – Can’t open data connection
C. 452 – Error writing file
D. 452 – Can’t open data connection
Answer» D. 452 – Can’t open data connection
discuss
844.
In an Ethernet local area network, which one of the
following statementsis TRUE?
A. A station stops to sense the channel once it starts transmitting a frame.
The purpose of the jamming signal is to pad the frames that are smallerthan the minimum
B.
frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retransmissions
Answer» D. The exponential back off mechanism reduces the probability of collision on
retransmissions
discuss

845. The first Network:


A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Answer» D. ARPANET
discuss

846.
Which organization has authority over interstate and
international commerce in the communications field?
A. ITU-T
B. IEEE
C. FCC
D. ISOC
Answer» C. FCC
discuss

847. Baud rate is:


A. number of signal changes per second
B. number of bits per second
C. number of bytes per second
D. number of ASCII characters per second
Answer» A. number of signal changes per second
discuss

848. The slowest transmission speeds are those of


A. Coaxial cable
B. Twisted pair wire
C. Fiber-optic cable
848. The slowest transmission speeds are those of
D. Microwave
Answer» B. Twisted pair wire
discuss

849.
The performance of a data communication network
depends on
A. The number of users
B. The transmission media
C. The hardware and software
D. All of the above
Answer» D. All of the above
discuss

Which of the following to keep track of the individual units


850. of data (called packets) that a message is divided into for

efficient routing through the Internet.


A. Address Resolution Protocol (ARP)
B. Internet Protocol (IP)
C. Hypertext transfer Protocol (HTTP)
D. Transmission Control Protocol/Internet Protocol (TCP/IP)
Answer» D. Transmission Control Protocol/Internet Protocol (TCP/IP)

851.
The process of keeping addresses in memory for future
use is called
A. Routing
B. Resolving
C. Caching
D. None of the above
Answer» C. Caching
discuss

852.
A small network making up the Internet and also having a
small numbers of computers within it is called
A. Host
B. Address
C. Subdomain
852.
A small network making up the Internet and also having a
small numbers of computers within it is called
D. None of the above
Answer» C. Subdomain
discuss

853.
If a file consisting of 50,000 characters takes 40 seconds to
send, then the data rate is .
A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» D. 10 kbps
discuss

854.
In CRC there is no error if the remainder at the receiver is
.
A. equal to the remainder at the sender
B. zero
C. nonzero
D. the quotient at the sender
Answer» B. zero
discuss

855. Internet-like networks within an enterprise.


A. Intranets
B. Switching alternating
C. Inter organizational networks
D. Extranets
Answer» A. Intranets
discuss

856.
Sending a file from your personal computer's primary
memory or disk to another computer is called
A. uploading
B. downloading
C. logging on
D. hangs on
Answer» A. uploading
discuss

857. FDDI is a
A. ring network
B. star network
C. mesh network
D. bus based network
Answer» A. ring network
discuss

858. Which address is the loopback address?


A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
Answer» C. 127.0.0.1
discuss

859. A modulator converts a signal to a(n) signal.


A. FSK; PSK
B. PSK; FSK
C. analog; digital
D. digital; analog
Answer» C. analog; digital
discuss

860. The birthplace of the World Wide Web is considered to be


A. the Department of Defence
B. CERN
C. ARPA
D. Netscape
Answer» B. CERN
discuss

861. What is the port number for HTTP?


A. 99
B. 86
C. 80
D. 23
Answer» C. 80
discuss
862.
The communication mode that supports data in both
directions at the same time is
A. simplex
B. half-duplex
C. full-duplex
D. multiplex
Answer» C. full-duplex
discuss

863. The basic Ethernet design does not provide


A. access control
B. addressing
C. automatic retransmission of a message
D. multiple virtual networks
Answer» C. automatic retransmission of a message
discuss

864. What does the acronym ISDN stand for?


A. Indian Standard Digital Network
B. Integrated Services Digital Network
C. Intelligent Services Digital Network
D. Integrated Services Data Network
Answer» B. Integrated Services Digital Network
discuss

865. ASK, PSK, FSK, and QAM are examples of encoding.


A. digital-to-digital
B. digital-to-analog
C. analog-to-analog
D. analog-to-digital
Answer» B. digital-to-analog
discuss

866. Who invented the modem?


A. Wang Laboratories Ltd.
B. AT & T Information Systems, USA
C. Apple Computers Inc.
D. Digital Equipment Corpn
Answer» B. AT & T Information Systems, USA
discuss
867.
With an IP address of 201.142.23.12, what is your default
subnetmask?
A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer» D. 255.255.255.0
discuss

868.
Which utility is an all-purpose tool for troubleshooting
TCP/IP problems?
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
Answer» C. PING
discuss

869. Which Layer is Responsible for Congestion Control?


A. Network Layer
B. Data link Layer
C. Transport Layer
D. Application layer
Answer» C. Transport Layer
discuss

870. Pure ALOHA has a maximum throughput of -----------


A. 16.4 %
B. 18.4 %
C. 7.4 %
D. 1%
Answer» B. 18.4 %
discuss

871. Which of these is a feature of hubs?


A. Hubs amplifies the incoming signal.
B. Hubs understand frames, packets or headers
C. All lines coming into a Hub must operate at a same speed.
D. all of these
871. Which of these is a feature of hubs?
Answer» C. All lines coming into a Hub must operate at a same speed.
discuss

872. DSL stands for


A. data subscriber lines
B. dual subscriber lines
C. delay subscriber lines
D. digital subscriber lines
Answer» D. digital subscriber lines
discuss

873. Which of the following is a MAC address?


A. 192.166.200.50
B. 00056A:01A01A5CCA7FF60
C. 568, Airport Road
D. 01:A5: BB: A7: FF: 60
Answer» D. 01:A5: BB: A7: FF: 60
discuss

874. The main difference between TCP and UDP is


A. UDP is connection oriented whereas TCP is datagram service
B. TCP is an Internet protocol whereas UDP is an ATM protocol
C. UDP is a datagram whereas TCP is a connection oriented service
D. All of the above
Answer» C. UDP is a datagram whereas TCP is a connection oriented service
discuss

875. What operates in the Data Link and the Network layer?
A. NIC
B. Bridge
C. Brouter
D. Router
Answer» C. Brouter
discuss

876. Which file transfer protocol uses UDP?


A. NFS
B. TELNET
876. Which file transfer protocol uses UDP?
C. TFTP
D. FTP
Answer» C. TFTP
discuss

877.
Which of the following network access standard is used for
connecting stations to a circuit-switched network?
A. X.3
B. X.21
C. X.25
D. X.75
Answer» B. X.21
discuss

878.
In OSI model, which of the following layer provides error-
free delivery of data?
A. Data link
B. Network
C. transport
D. Session
Answer» C. transport
discuss

879.
To avoid transmission errors, a check figure is calculated
by the
A. transmitting computer
B. receiving computer
C. both (a) and (b)
D. Start and stop bit
Answer» C. both (a) and (b)
discuss

880. What is the first octet range for a class A IP address?


A. 1 - 126
B. 192 - 255
C. 192 - 223
D. 1 - 127
Answer» A. 1 - 126
discuss

881. CSMA (Carrier Sense Multiple Access) is


A. a method of determining which device has access to the transmission medium at any time
B. a method access control technique for multiple-access transmission media.
C. a very common bit-oriented data link protocol issued by ISO.
D. network access standard for connecting stations to a circuit-switched network
Answer» B. a method access control technique for multiple-access transmission media.
discuss

882. What is the first octet range for a class B IP address?


A. 128 - 255
B. 1 - 127
C. 192 - 223
D. 128 - 191
Answer» D. 128 - 191
discuss

883. ARP (Address Resolution Protocol) is


a TCP/IP protocol used to dynamically bind a high level IP Address to a lowlevel physical
A.
hardware address
B. a TCP/IP high level protocol for transferring files from one machine to another
C. a protocol used to monitor computers
D. a protocol that handles error and control messages
Answer» A. a TCP/IP protocol used to dynamically bind a high level IP Address to a lowlevel
physical hardware address
discuss

The 802.5 standard implements a way for preventing


884. collisions on the network. How are collisions prevented

when using this standard?


A. CSMA/CD
B. Token passing
C. Collision detection
D. Time sharing
Answer» B. Token passing
discuss

885. Terminals are required for


A. real time, batch processing, and timesharing
B. real time, timesharing, and distributed processing
885. Terminals are required for
C. real time, distributed processing, and manager inquiry
D. real time, timesharing, and message switching
Answer» D. real time, timesharing, and message switching
discuss

886.
What OSI layer handles logical address to logical name
resolution?
A. Transport
B. Physical
C. Presentation
D. Data Link
Answer» A. Transport
discuss

Consider different activities related to email. m1:Send an


email from a mail client to mail server m2:Download an
887. email from mailbox server to a mail client m3:Checking

email in a web browser Which is the applicable level


protocol user in each activity?
A. m1:HTTP, m2:SMTP, m3:POP
B. m1:SMTP, m2:FTP, m3:HTTP
C. m1:SMTP, m2:POP, m3:HTTP
D. m1:POP, m2:SMTP, m3:IMAP
Answer» C. m1:SMTP, m2:POP, m3:HTTP
discuss

One of the header fields in an IP datagram is the Time to


888. Live (TTL) field. Which of the following statements best

explains the need for this field?


A. It can be used to prioritize packets
B. It can be used to reduce delays
C. It can be used to optimize throughput
D. It can be used to prevent packet looping
Answer» D. It can be used to prevent packet looping
discuss
889.
Which of the following system calls results in the sending
of SYNpackets?
A. socket
B. bind
C. listen
D. connect
Answer» D. connect
discuss

890.
In the slow start phase of the TCP congestion control
algorithm, the size of the congestion window
A. does not increase
B. increases linearly
C. increases quadratically
D. increases exponentially
Answer» D. increases exponentially
discuss

891.
What is the maximum size of data that the application
layer can pass on to the TCP layer below?
A. Any size
B. 2^16 bytes-size of TCP header
C. 2^16 bytes
D. 1500 bytes
Answer» A. Any size
discuss

A computer on a 10Mbps network is regulated by a token


bucket. The token bucket is filled at a rate of 2Mbps. It is
892. initially filled to capacity with 16Megabits. What is the

maximum duration for which the computer can transmit


at the full 10Mbps?
A. 1.6 seconds
B. 2 seconds
C. 5 seconds
D. 8 seconds
Answer» B. 2 seconds
discuss
893.
In Ethernet when Manchester encoding is used, the bit
rate is:
A. Half the baud rate.
B. Twice the baud rate.
C. Same as the baud rate.
D. none of the above
Answer» A. Half the baud rate.
discuss

Station A needs to send a message consisting of 9 packets to


Station B using a sliding window (window size 3) and go-
back-n error control strategy. All packets are ready and
894. immediately available for transmission. If every 5th packet

that A transmits gets lost (but no acks from B ever get lost),
then what isthe number of packets that A will transmit for
sending the message to B?
A. 12
B. 14
C. 16
D. 18
Answer» C. 16
discuss

Determine the maximum length of the cable (in km) for


895.
transmitting data at a rate of 500 Mbps in an Ethernet
LAN with frames of size 10,000 bits. Assume the signal
speed in the cable to be 2,00,000 km/s.
A. 1
B. 2
C. 2.5
D. 5
Answer» B. 2
discuss
Let G(x) be the generator polynomial used for CRC
896. checking. What is the condition that should be satisfied by

G(x) to detect odd number of bits in error?


A. G(x) contains more than two terms
B. G(x) does not divide 1+x^k, for any k not exceeding the frame length
C. 1+x is a factor of G(x)
D. G(x) has an odd number of terms.
Answer» C. 1+x is a factor of G(x)
discuss

In serial data transmission, every byte of data is padded


897. with a ‘0’ in the beginning and one or two ‘1’ s at the end

of byte because
A. Receiver is to be synchronized for byte reception
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
C. Padded bits are useful in parity computation
D. None of these
Answer» A. Receiver is to be synchronized for byte reception
discuss

898. Which one of the following statements is FALSE?


A. Packet switching leads to better utilization of bandwidth resources than circuit switching.
B. Packet switching results in less variation in delay than circuitswitching.
C. Packet switching requires more per packet processing than circuitswitching
D. Packet switching can lead to reordering unlike in circuitswitching
Answer» B. Packet switching results in less variation in delay than circuitswitching.
discuss

899.
Which of the following statements is FALSE regarding a
bridge?
A. Bridge is a layer 2 device
B. Bridge reduces collision domain
C. Bridge is used to connect two or more LAN segments
D. Bridge reduces broadcast domain
Answer» D. Bridge reduces broadcast domain
discuss
In a packet switching network, if the message size is 48
900.
bytes and each packet contains a header of 3 bytes. If 24
packets are required to transmit the message, the packet
size is .
A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Answer» D. 5 bytes

In Ethernet CSMA/CD, the special bit sequence


901. transmitted by media access management to handle
collision is called
A. Preamble
B. Post amble
C. Jam
D. None of the above
Answer» C. Jam
discuss

What will be the efficiency of a Stop and Wait protocol, if


902. the transmission time for a frame is 20ns and the

propagation time is 30ns?


A. 20%
B. 25%
C. 40%
D. 66%
Answer» B. 25%
discuss

903.
The physical layer translates logical communication
requestsfrom the into hardware specific operations.
A. Data link layer
B. Network layer
C. Transport layer
D. Application layer
Answer» A. Data link layer
discuss

904. A single channel is shared by multiple signals by


A. Analog modulation
B. Digital modulation
C. Multiplexing
D. Phase modulation
Answer» C. Multiplexing
discuss

905. Wireless transmission of signals can be done via


A. Radio waves
B. Microwaves
C. Infrared
D. All of the mentioned
Answer» D. All of the mentioned
discuss

906. ICMP is primarily used for


A. Error and diagnostic functions
B. Addressing
C. Forwarding
D. Routing
Answer» A. Error and diagnostic functions
discuss

907. Which of the following is a transport layer protocol?


A. Stream control transmission protocol
B. Internet control message protocol
C. Neighbour discovery protocol
D. Dynamic host configuration protocol
Answer» A. Stream control transmission protocol
discuss

908.
is the multiplexing technique that shifts each signal to a
different carrierfrequency.
A. FDM
B. TDM
C. Both FDM & TDM
D. PDM
Answer» A. FDM
discuss

909.
If link transmits 4000frames per second, and each slot has
8 bits, the transmission rate of circuit this TDM is
A. 32kbps
B. 500bps
C. 500kbps
D. 32bps
Answer» A. 32kbps
discuss

910.
If there are n signal sources of same data rate, then the
TDMlink has slots.
A. N
B. n/2
C. n*2
D. 2n
Answer» A. N
discuss

911. The state when dedicated signals are idle are called
A. Death period
B. Poison period
C. Silent period
D. Stop period
Answer» C. Silent period
discuss

912. In TDM, slots are further divided into


A. Seconds
B. Frames
C. Packets
D. Bits
Answer» B. Frames
discuss

In TDM, the transmission rate of a multiplexed path is


913. always the sum of the transmission rates of the signal
sources.
A. Greater than
In TDM, the transmission rate of a multiplexed path is
913. always the sum of the transmission rates of the signal
sources.
B. Lesser than
C. Equal to
D. Equal to or greater than
Answer» A. Greater than
discuss

914.
The time required to examine the packet’s header and
determine where to direct the packetis part of
A. Processing delay
B. Queuing delay
C. Transmission delay
D. Propagation delay
Answer» A. Processing delay
discuss

915. Transmission delay does not depend on


A. Packet length
B. Distance between the routers
C. Transmission rate
D. Bandwidth of medium
Answer» B. Distance between the routers
discuss

916. Propagation delay depends on


A. Packet length
B. Transmission rate
C. Distance between the routers
D. Speed of the CPU
Answer» C. Distance between the routers
discuss

917.
Which of the following delay is faced by the packet in
travelling from one end system toanother?
A. Propagation delay
B. Queuing delay
C. Transmission delay
917.
Which of the following delay is faced by the packet in
travelling from one end system toanother?
D. All of the mentioned
Answer» D. All of the mentioned
discuss

918. A network router joins two _________ together?


A. Computers
B. Switches
C. Networks
D. Gateway
Answer» C. Networks
discuss

Message Oriented Middleware allows general purpose


919. messages to be exchanged in a Client/Server system using

message queues.
A. True
B. False
Answer» A. True
discuss

920. Which of the following below is a loopback IP address?


A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
Answer» D. 127.0.0.1
discuss

921.
Transport layer of OSI model lies between Network and
___________ layer
A. Application
B. Data link
C. Session
D. Presentation
Answer» C. Session
discuss
922. IP4 is more commonly used than IPv6?
A. True
B. False
Answer» A. True
discuss

923. From the options below, which suits best for MODEM?
A. a device that modulates an analog carrier signal to encode digital information
B. a device that modulates a digital carrier signal to encode analog information
C. a device that modulates an analog carrier signal to decode digital information
D. a device that modulates a digital carrier signal to decode analog information
Answer» A. a device that modulates an analog carrier signal to encode digital information
discuss

924.
A network point that provides entrance into another
network is called as ___________
A. Node
B. Gateway
C. Switch
D. Router
Answer» B. Gateway
discuss

925. UDP is an unreliable protocol.


A. True
B. False
Answer» A. True
discuss

926.
A stream socket provides _________ communications
between a client and a server
A. One way
B. Two way
Answer» B. Two way
discuss

927. TELNET used _________ protocol for data connection


A. TCP
B. UDP
927. TELNET used _________ protocol for data connection
C. IP
D. DHCP
Answer» A. TCP
discuss

928.
__________ is a standard suite of protocols used for packet
switching across computer networks.
A. x.22
B. x.23
C. x.25
D. x.26
Answer» C. x.25
discuss

929. ARP works on Ethernet networks.


A. False
B. True
Answer» B. True
discuss

930.
_______ assigns a unique number to each IP network
adapter called the MAC address.
A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Both B and C above
Answer» A. Media Access Control
discuss

931.
Piconets in the blue tooth a minimum of two and a
maximum of ____________ Bluetooth peer devices.
A. five
B. eight
C. nine
D. four
Answer» B. eight
discuss
932.
Dynamic addressing doesn’t allow many devices To share
limited address space on a network
A. True
B. False
Answer» B. False
discuss

933. NAT stands for _____ .


A. network address transformer
B. network address translator
C. network address translation
D. Both B and C above
Answer» C. network address translation
discuss

934. Which of the following is true for secure shell tunneling?


A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port
B. SSH tunnels provide a means to not bypass firewalls
C. All SSH clients support dynamic port forwarding
D. Both A and B
Answer» A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port
discuss

935.
When computers in a network listen and receive the
signal, it is termed as active toplogy
A. True
B. False
Answer» A. True
discuss

936. ______is added to data packet for error detection.


A. checksum bit
B. error bit
C. parity bit
Answer» C. parity bit
discuss
937.
ALL IP addresses are divided into a network address and
host address
A. True
B. False
Answer» A. True
discuss

938.
Both ping and tracert are used to find If the computer is in
the network.
A. True
B. False
Answer» B. False
discuss

939. What is the difference between ring and bus topology?


In Ring, all nodes are connected with another in a loop while in the bus they are connected to
A.
a central cable
In Ring, all nodes are connected with another loop while on a bus they are connected to a
B.
central cable
In the bus, all nodes are connected with another in a loop while instar they are connected to a
C.
central node
In Bus all nodes are connected with another loop while instar they are connected to a central
D.
cable
Answer» A. In Ring, all nodes are connected with another in a loop while in the bus they are
connected to a central cable
discuss

940.
MAC addressing works in data link layer while IP
addressing works in the network layer.
A. True
B. False
Answer» A. True
discuss

941.
A packet whose destination is outside the local TCP/IP
network segment is sent to the ___ _.
A. File server
B. Default gateway
C. DNS server
D. DHCP server
941.
A packet whose destination is outside the local TCP/IP
network segment is sent to the ___ _.
Answer» B. Default gateway
discuss

942.
The physical layer is concerned with the movement of
_______ over the physical medium.
A. programs
B. dialogs
C. protocols
D. Bits
Answer» D. Bits
discuss

943.
In the OSI model, as a data packet moves from the lower
to the upper layers, headers are _______.
A. added
B. removed
C. rearranged
D. Modified
Answer» B. removed
discuss

944. IPv6 has _______ -bit addresses.


A. 32
B. 64
C. 128
D. Variable
Answer» C. 128
discuss

945. An IP address contains________ bits ?


A. 8
B. 16
C. 32
D. 64
Answer» C. 32
discuss
946.
Which routing protocol below is used by exterior routers
between the autonomous systems?
A. RIP
B. IGRP
C. OSPF
D. BGP
Answer» D. BGP
discuss

947.
What is the network ID for a computer whose IP address
is 190.148.64.23?
A. 190
B. 190.148
C. 190.148.64
D. None of the above
Answer» B. 190.148
discuss

9 93. Determine the maximum length of the cable (in km)


948.
for transmitting data at a rate of 500 Mbps in an Ethernet
LAN with frames of size 10,000 bits. Assume the signal
speed in the cable to be 2,00,000 km/s.
A. 1
B. 2
C. 2.5
D. 5
Answer» B. 2
discuss

949.
The combination of an IP address and a port number is
known as ___________.
A. network number
B. socket address
C. subnet mask number
D. MAC address
Answer» B. socket address
discuss
950. The Internet Control Message Protocol (ICMP)
A. allows gateways to send error a control messages to other gateways or hosts
provides communication between the Internet Protocol Software on one machine and the
B.
Internet Protocol Software on another
reports error conditions to the original source, the source must relate errors to individual
C.
application programs and take action to correct the problem
D. All of the above
Answer» D. All of the above

Your company has a LAN in its downtown office and has


now set up a LAN in the manufacturing plant in the
951. suburbs. To enable everyone to share data and resources

between the two LANs, what type of device(s) are needed


to connect them? Choose the most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
Answer» D. Router
discuss

Which of the following TCP/IP protocol is used for


952. transferring electronic mail messages from one machine to
another?
A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» C. SMTP
discuss

953.
Which of the following device is used to connect two
systems, especially if the systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
Answer» C. gateway
discuss
_______ can detect burst error of length less than or equal
954. to degree of the polynomial and detects burst errors that

affect odd number of bits.


A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» B. CRC
discuss

955. The PSTN is an example of a ………………… network.


A. packet switched
B. circuit switched
C. message switched
D. None of these
Answer» B. circuit switched
discuss

956.
A subset of a network that includes all the routers but
contains no loops is called:
A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» A. spanning tree
discuss

957.
An endpoint of an inter-process communication flow
across a computer network is called:
A. socket
B. pipe
C. port
D. none of the mentioned
Answer» A. socket
discuss
958.
In an Ethernet local area network, which one of the
following statements is TRUE?
A. A station stops to sense the channel once it starts transmitting a frame.
The purpose of the jamming signal is to pad the frames that are smaller than the minimum
B.
frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retransmissions
Answer» D. The exponential back off mechanism reduces the probability of collision on
retransmissions
discuss

959.
A small network making up the Internet and also having a
small numbers of computers within it is called
A. Host
B. Address
C. Subdomain
D. None of the above
Answer» C. Subdomain
discuss

960.
If a file consisting of 50,000 characters takes 40 seconds to
send, then the data rate is __________.
A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» D. 10 kbps
discuss

961.
In CRC there is no error if the remainder at the receiver is
_____.
A. equal to the remainder at the sender
B. zero
C. nonzero
D. the quotient at the sender
Answer» B. zero
discuss
962. A modulator converts a _____ signal to a(n) _____ signal.
A. FSK; PSK
B. PSK; FSK
C. analog; digital
D. digital; analog
Answer» C. analog; digital
discuss

963.
ASK, PSK, FSK, and QAM are examples of _____
encoding.
A. digital-to-digital
B. digital-to-analog
C. analog-to-analog
D. analog-to-digital
Answer» B. digital-to-analog
discuss

964.
With an IP address of 201.142.23.12, what is your default
subnet mask?
A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer» D. 255.255.255.0
discuss

965. DSL stands for ------------------------


A. data subscriber lines
B. dual subscriber lines
C. delay subscriber lines
D. digital subscriber lines
Answer» D. digital subscriber lines
discuss

The 802.5 standard implements a way for preventing


966. collisions on the network. How are collisions prevented

when using this standard?


A. CSMA/CD
B. Token passing
The 802.5 standard implements a way for preventing
966. collisions on the network. How are collisions prevented

when using this standard?


C. Collision detection
D. Time sharing
Answer» B. Token passing
discuss

One of the header fields in an IP datagram is the Time to


967. Live (TTL) field. Which of the following statements best

explains the need for this field?


A. It can be used to prioritize packets
B. It can be used to reduce delays
C. It can be used to optimize throughput
D. It can be used to prevent packet looping
Answer» D. It can be used to prevent packet looping
discuss

968.
Which of the following system calls results in the sending
of SYN packets?
A. socket
B. bind
C. listen
D. connect
Answer» D. connect
discuss

969.
What is the maximum size of data that the application
layer can pass on to the TCP layer below?
A. Any size
B. 2^16 bytes-size of TCP header
C. 2^16 bytes
D. 1500 bytes
Answer» A. Any size
discuss
Station A needs to send a message consisting of 9 packets to
Station B using a sliding window (window size 3) and go-
back-n error control strategy. All packets are ready and
970. immediately available for transmission. If every 5th packet

that A transmits gets lost (but no acks from B ever get lost),
then what is the number of packets that A will transmit for
sending the message to B?
A. 12
B. 14
C. 16
D. 18
Answer» C. 16
discuss

971. Which one of the following statements is FALSE?


A. Packet switching leads to better utilization of bandwidth resources than circuit switching.
B. Packet switching results in less variation in delay than circuit switching.
C. Packet switching requires more per packet processing than circuit switching
D. Packet switching can lead to reordering unlike in circuit switching
Answer» B. Packet switching results in less variation in delay than circuit switching.
discuss

In a packet switching network, if the message size is 48


972.
bytes and each packet contains a header of 3 bytes. If 24
packets are required to transmit the message, the packet
size is ________.
A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Answer» D. 5 bytes
discuss

In Ethernet CSMA/CD, the special bit sequence


973. transmitted by media access management to handle
collision is called
A. Preamble
B. Post amble
In Ethernet CSMA/CD, the special bit sequence
973. transmitted by media access management to handle
collision is called
C. Jam
D. None of the above
Answer» C. Jam
discuss

974.
How many digits of the DNIC (Data Network
Identification Code) identify the country?
A. First three
B. First four
C. First five
D. First six
Answer» A. First three
discuss

Which of the following TCP/IP protocol is used for


975. transferring electronic mail messages from one machine to
another?
A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» C. SMTP
discuss

976.
Which of the following device is used to connect two
systems, especially if the systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
Answer» C. gateway
discuss
_______ can detect burst error of length less than or equal
977. to degree of the polynomial and detects burst errors that

affect odd number of bits.


A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» B. CRC
discuss

If 5 files are transferred from server A to client B in the


978. same session. The number of TCP connection between A
and B is:
A. 5
B. 10
C. 2
D. 6
Answer» D. 6
discuss

979.
In an Ethernet local area network, which one of the
following statements is TRUE?
A. A station stops to sense the channel once it starts transmitting a frame.
The purpose of the jamming signal is to pad the frames that are smaller than the minimum
B.
frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retr
Answer» A. A station stops to sense the channel once it starts transmitting a frame.
discuss

Which of the following to keep track of the individual units


980. of data (called packets) that a message is divided into for

efficient routing through the Internet.


A. Address Resolution Protocol (ARP)
B. Internet Protocol (IP)
C. Hypertext transfer Protocol (HTTP)
D. Tr
Answer» C. Hypertext transfer Protocol (HTTP)
discuss
981.
If a file consisting of 50,000 characters takes 40 seconds to
send, then the data rate is __________.
A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» D. 10 kbps
discuss

982.
Sending a file from your personal computer's primary
memory or disk to another computer is called
A. uploading
B. downloading
C. logging on
D. hangs on
Answer» A. uploading
discuss

Consider different activities related to email.


m1:Send an email from a mail client to mail server
m2:Download an email from mailbox server to a mail
983. client
m3:Checking email in a web browser
Which is the applicable level protocol user in each
activity?
A. m1:HTTP, m2:SMTP, m3:POP
B. m1:SMTP, m2:FTP, m3:HTTP
C. m1:SMTP, m2:POP, m3:HTTP
D. m1:POP, m2:SMTP, m3:IMAP
Answer» C. m1:SMTP, m2:POP, m3:HTTP
discuss

984.
In the slow start phase of the TCP congestion control
algorithm, the size of the congestion window
A. does not increase
B. increases linearly
C. increases quadratically
D. increases exponentially
Answer» D. increases exponentially
discuss

Match the following:


(P) SMTP (1) Application layer
985.
(Q) BGP (2) Transport layer
(R) TCP (3) Data link layer
(S) PPP (4) Network layer
(5) Physical layer
A. P–2Q–1R–3S–5
B. P–1Q–4R–2S–3
C. P–1Q–4R–2S–5
D. P–2Q–4R–1S–3
Answer» B. P – 1 Q – 4 R – 2 S – 3
discuss

In serial data transmission, every byte of data is padded


986. with a ‘0’ in the beginning and one or two ‘1’ s at the end

of byte because
A. Receiver is to be synchronized for byte reception
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
C. Padded bits are useful in parity computation
D. None of these
Answer» A. Receiver is to be synchronized for byte reception
discuss

What will be the efficiency of a Stop and Wait protocol, if


987. the transmission time for a frame is 20ns and the

propagation time is 30ns?


A. 20%
B. 25%
C. 40%
D. 66%
Answer» B. 25%

You might also like