cn bits
cn bits
A.
B.
C.
D.
Answer» B. distributed system
discuss
3.
Which one of the following computer network is built on
the top of another network?
A. prior network
B. chief network
C. prime network
D. overlay network
Answer» D. overlay network
discuss
5.
Communication channel is shared by all the machines on
the network in
A. broadcast network
5.
Communication channel is shared by all the machines on
the network in
B. unicast network
C. multicast network
D. none of the mentioned
Answer» A. broadcast network
discuss
6. Bluetooth is an example of
A. personal area network
B. local area network
C. virtual private network
D. none of the mentioned
Answer» A. personal area network
discuss
8.
A list of protocols used by a system, one protocol per layer,
is called
A. protocol architecture
B. protocol stack
C. protocol suit
D. none of the mentioned
Answer» B. protocol stack
discuss
10.
Which one of the following extends a private network
across public networks?
A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
Answer» B. virtual private network
discuss
13.
TCP/IP model does not have ______ layer but OSI model
have this layer.
A. session layer
B. presentation layer
C. application layer
D. both (a) and (b)
Answer» D. both (a) and (b)
discuss
14.
Which layer links the network support layers and user
support layers
A. session layer
B. data link layer
C. transport layer
D. network layer
Answer» C. transport layer
discuss
15.
Which address is used in an internet employing the TCP/IP
protocols?
A. physical address and logical address
B. port address
C. specific address
D. all of the mentioned
Answer» D. all of the mentioned
discuss
21.
Which transmission media has the highest transmission
speed in a network?
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Answer» C. optical fiber
discuss
22.
Bits can be send over guided and unguided media as analog
signal by
A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Answer» A. digital modulation
discuss
23.
The portion of physical layer that interfaces with the media
access control sublayer is called
A. physical signalling sublayer
B. physical data sublayer
C. physical address sublayer
D. none of the mentioned
Answer» A. physical signalling sublayer
discuss
25.
In asynchronous serial communication the physical layer
provides
A. start and stop signalling
B. flow control
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss
27.
The physical layer translates logical communication
requests from the ______ into hardware specific operations.
A. data link layer
B. network layer
C. trasnport layer
27.
The physical layer translates logical communication
requests from the ______ into hardware specific operations.
D. application layer
Answer» A. data link layer
discuss
30.
The data link layer takes the packets from _____ and
encapsulates them into frames for transmission.
A. network layer
B. physical layer
C. transport layer
D. application layer
Answer» A. network layer
discuss
31.
Which one of the following task is not done by data link
layer?
A. framing
B. error control
C. flow control
D. channel coding
Answer» D. channel coding
discuss
32.
Which sublayer of the data link layer performs data link
functions that depend upon the type of medium?
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. none of the mentioned
Answer» B. media access control sublayer
discuss
34.
Automatic repeat request error management mechanism is
provided by
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. none of the mentioned
Answer» A. logical link control sublayer
discuss
35.
When 2 or more bits in a data unit has been changed
during the transmission, the error is called
A. random error
B. burst error
C. inverted error
D. none of the mentioned
Answer» B. burst error
discuss
38.
Which one of the following is the multiple access protocol
for channel access control?
A. csma/cd
B. csma/ca
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss
44.
Which one of the following routing algorithm can be used
for network layer design?
A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» D. all of the mentioned
discuss
46.
A subset of a network that includes all the routers but
contains no loops is called
A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» A. spanning tree
discuss
47.
Which one of the following algorithm is not used for
congestion control?
A. traffic aware routing
B. admission control
C. load shedding
D. none of the mentioned
Answer» D. none of the mentioned
discuss
51.
Which one of the following is a transport layer protocol
used in internet?
A. tcp
B. udp
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss
54.
An endpoint of an inter-process communication flow across
a computer network is called
A. socket
B. pipe
C. port
D. none of the mentioned
54.
An endpoint of an inter-process communication flow across
a computer network is called
Answer» A. socket
discuss
56.
Which one of the following is a version of UDP with
congestion control?
A. datagram congestion control protocol
B. stream control transmission protocol
C. structured stream transport
D. none of the mentioned
Answer» A. datagram congestion control protocol
discuss
60.
Teredo is an automatic tunneling technique. In each client
the obfuscated IPv4 address is represented by bits
A. 96 to 127
B. 0 to 63
C. 80 to 95
D. 64 to 79
Answer» A. 96 to 127
discuss
65.
Which one of the following is an internet standard protocol
for managing devices on IP network?
A. dynamic host configuration protocol
B. simple newtwork management protocol
C. internet message access protocol
D. media gateway protocol
Answer» B. simple newtwork management protocol
discuss
66.
Which one of the following is not an application layer
protocol?
A. media gateway protocol
B. dynamic host configuration protocol
C. resource reservation protocol
D. session initiation protocol
Answer» C. resource reservation protocol
discuss
67.
Which protocol is a signalling communication protocol
used for controlling multimedia communication sessions?
A. session initiation protocol
B. session modelling protocol
67.
Which protocol is a signalling communication protocol
used for controlling multimedia communication sessions?
C. session maintenance protocol
D. none of the mentioned
Answer» A. session initiation protocol
discuss
69. When displaying a web page, the application layer uses the
A. http protocol
B. ftp protocol
C. smtp protocol
D. none of the mentioned
Answer» A. http protocol
discuss
74.
If a server has no clue about where to find the address for a
hostname then
A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer» A. server asks to the root server
discuss
75.
Which one of the following allows client to update their
DNS entry as their IP address change?
A. dynamic dns
B. mail transfer agent
C. authoritative name server
D. none of the mentioned
Answer» A. dynamic dns
discuss
77.
The right to use a domain name is delegated by domain
name registers which are accredited by
A. internet architecture board
B. internet society
C. internet research task force
D. internet corporation for assigned names and numbers
Answer» D. internet corporation for assigned names and numbers
discuss
84.
The decimal code of interpret as command (IAC) character
is
A. 252
B. 253
C. 254
D. 255
Answer» D. 255
discuss
88.
If we want that a character be interpreted by the client
instead of server
A. escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. none of the mentioned
Answer» A. escape character has to be used
discuss
94.
Which one of the following is not used to generate dynamic
web pages?
A. php
B. asp.net
C. jsp
D. none of the mentioned
Answer» D. none of the mentioned
discuss
98.
Multiple object can be sent over a TCP connection between
client and server in
A. persistent http
B. nonpersistent http
C. both (a) and (b)
D. none of the mentioned
Answer» A. persistent http
discuss
104.
In FTP protocol, client contacts server using ____ as the
transport protocol.
A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» A. transmission control protocol
discuss
105.
In which mode FTP, the client initiates both the control
and data connections.
A. active mode
B. passive mode
C. both (a) and (b)
D. none of the mentioned
Answer» B. passive mode
discuss
111.
Ethernet in metropolitan area network (MAN) can be
used as
A. pure ethernet
B. ethernet over sdh
C. ethernet over mpls
D. all of the mentioned
Answer» D. all of the mentioned
discuss
112.
A point-to-point protocol over ethernet is a network
protocol for
A. encapsulating ppp frames inside ethernet frames
B. encapsulating ehternet framse inside ppp frames
C. for security of ethernet frames
D. for security of ppp frames
Answer» A. encapsulating ppp frames inside ethernet frames
discuss
116.
An ethernet frame that is less than the IEEE 802.3
minimum length of 64 octets is called
A. short frame
B. run frame
C. mini frame
D. man frame
Answer» B. run frame
discuss
117.
Which of this is not a constituent of residential telephone
line?
A. a high-speed downstream channel
B. a medium-speed downstream channel
C. a low-speed downstream channel
D. none of the mentioned
Answer» C. a low-speed downstream channel
discuss
122.
Choose the statement which is not applicable for cable
internet access
A. it is a shared broadcast medium
B. it includes hfcs
C. cable modem connects home pc to ethernet port
D. analog signal is converted to digital signal in dslam
Answer» D. analog signal is converted to digital signal in dslam
discuss
123.
Among the optical-distribution architectures that is
essentially switched ehternet is
A. aon
B. pon
C. non
D. none of the mentioned
Answer» A. aon
discuss
124. StarBand provides
A. ftth internet access
B. cable access
C. telephone access
D. satellite access
Answer» D. satellite access
discuss
127.
The sharing of a medium and its link by two or more
devices is called _______
A. fully duplexing
B. multiplexing
C. both a and b
D. none of the mentioned
Answer» B. multiplexing
discuss
130.
If there are n signal sources of same data rate than TDM
link has _______ slots
A. n
B. n/2
C. n*2
D. 2^n
Answer» A. n
discuss
131.
If link transmits 4000frames per second, and each slot has
8 bits,the transmission rate of circuit this TDM is
A. 32kbps
B. 500bps
C. 500kbps
D. none of the mentioned
Answer» A. 32kbps
discuss
132. The state when dedicated signals are idle are called
A. death period
B. poison period
C. silent period
D. none of the mentioned
Answer» C. silent period
discuss
signal sources.
A. greater than
B. lesser than
C. equal to
D. equal to or greater than
Answer» A. greater than
discuss
136.
Multiplexing technique that shifts each signal to a
different carrier frequency
A. fdm
B. tdm
C. either a or b
D. both a and b
Answer» A. fdm
discuss
140.
Data communication system spanning states, countries, or
the whole world is
A. lan
B. wan
C. man
D. none of the mentioned
Answer» B. wan
discuss
141.
Data communication system within a building or campus
is
A. lan
B. wan
C. man
D. none of the mentioned
Answer» A. lan
discuss
143.
A local telephone network is an example of a _______
network
A. packet switched
B. circuit switched
C. both of the mentioned
D. none of the mentioned
Answer» B. circuit switched
discuss (2)
146.
Method(s) to move data through a network of links and
switches
A. packet switching
B. circuit switching
C. line switching
D. both a and b
Answer» D. both a and b
discuss
The resources needed for communication between end
147. systems are reserved for the duration of session between
148.
As the resouces are reserved between two communicating
end systems in circuit switching, this is achieved
A. authentication
B. guaranteed constant rate
C. reliability
D. store and forward
Answer» B. guaranteed constant rate
discuss
151.
Internet access by transmitting digital data over the wires
of a local telephone network is provided by
A. leased line
151.
Internet access by transmitting digital data over the wires
of a local telephone network is provided by
B. digital subscriber line
C. digital signal line
D. none of the mentioned
Answer» B. digital subscriber line
discuss
153.
Which one of the following protocol is not used in
internet?
A. http
B. dhcp
C. dns
D. none of the mentioned
Answer» D. none of the mentioned
discuss
156.
Which one of the following is not an application layer
protocol used in internet?
A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. none of the mentioned
Answer» C. resource reservation protocol
discuss
157.
Which protocol assigns IP address to the client connected
in the internet?
A. dhcp
B. ip
C. rpc
D. none of the mentioned
Answer» A. dhcp
discuss
158.
Which one of the following is not used in media access
control?
A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. none of the mentioned
Answer» D. none of the mentioned
discuss
160.
In asymmetric key cryptography, the private key is kept
by
A. sender
160.
In asymmetric key cryptography, the private key is kept
by
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» B. receiver
discuss
161.
Which one of the following algorithm is not used in
asymmetric key cryptography?
A. rsa algorithm
B. diffie-hellman algorithm
C. electronic code book algorithm
D. none of the mentioned
Answer» C. electronic code book algorithm
discuss
162.
In cryptography, the order of the letters in a message is
rearranged by
A. transpositional ciphers
B. substitution ciphers
C. both (a) and (b)
D. none of the mentioned
Answer» A. transpositional ciphers
discuss
165.
Which one of the following is a cryptographic protocol
used to secure HTTP connection?
A. stream control transmission protocol (sctp)
B. transport layer security (tsl)
C. explicit congestion notification (ecn)
D. resource reservation protocol
Answer» B. transport layer security (tsl)
discuss
166.
Voice privacy in GSM cellular telephone protocol is
provided by
A. a5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Answer» A. a5/2 cipher
discuss
168.
Cryptographic hash function takes an arbitrary block of
data and returns
A. fixed size bit string
B. variable size bit string
C. both (a) and (b)
D. none of the mentioned
Answer» A. fixed size bit string
discuss
169.
The attackers a network of compromised devices known
as
A. internet
169.
The attackers a network of compromised devices known
as
B. botnet
C. telnet
D. d-net
Answer» B. botnet
discuss
target host
A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» C. connection flooding
discuss
172.
The DoS attack is which the attacker sends deluge of
packets to the targeted host
A. vulnerability attack
B. bandwidth flooding
C. connection flooding
D. all of the mentioned
Answer» B. bandwidth flooding
discuss
176.
DHCP (dynamic host configuration protocol) provides
_____ to the client.
A. ip address
B. mac address
C. url
D. none of the mentioned
Answer» A. ip address
discuss
180. DHCP uses UDP port ____ for sending data to the server.
A. 66
B. 67
C. 68
D. 69
Answer» B. 67
discuss
181.
The DHCP server can provide the _______ of the IP
addresses.
A. dynamic allocation
B. automatic allocation
C. static allocation
D. all of the mentioned
Answer» D. all of the mentioned
discuss
182.
DHCP client and servers on the same subnet communicate
via
A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
182.
DHCP client and servers on the same subnet communicate
via
Answer» A. udp broadcast
discuss
183.
After obtaining the IP address, to prevent the IP conflict
the client may use
A. internet relay chat
B. broader gateway protocol
C. address resolution protocol
D. none of the mentioned
Answer» C. address resolution protocol
discuss
185.
If DHCP snooping is configured on a LAN switch, then
clients having specific ______ can access the network.
A. mac address
B. ip address
C. both (a) and (b)
D. none of the mentioned
Answer» C. both (a) and (b)
discuss
189.
Which protocol provides the synchronization between
media streams?
A. rtp
B. rtcp
C. rpc
D. none of the mentioned
Answer» B. rtcp
discuss
195.
Which protocol defines a profile of RTP that provides
cryptographic services for the transfer of payload data?
A. srtp
B. rtcp
C. rcp
D. none of the mentioned
Answer» A. srtp
discuss
200.
_____ command is used to manipulate TCP/IP routing
table.
A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» A. route
201.
If you want to find the number of routers between a source
and destination, the utility to be used is.
A. route
B. ipconfig
C. ifconfig
D. traceroute
Answer» D. traceroute
discuss
202.
Which of the following is related to ipconfig in Microsoft
Windows ?
A. display all current tcp/ip network configuration values
B. modify dhcp settings
C. modify dns settings
D. all of the mentioned
Answer» D. all of the mentioned
discuss
203.
This allows to check if a domain is available for
registration.
A. domain check
B. domain dossier
C. domain lookup
D. none of the mentioned
Answer» A. domain check
discuss
213. Mode of data transfer in FTP, where all the is left to TCP
A. stream mode
B. block mode
C. compressed mode
D. none of the mentioned
Answer» A. stream mode
discuss
215.
The number of objects in a Web page which consists of 4
jpeg images and HTML text is ______
A. 4
B. 1
C. 5
D. none of the mentioned
Answer» C. 5
discuss
217.
The time taken by a packet to travel from client to server
and then back to the client is called ____
A. stt
B. rtt
C. ptt
D. none of the mentioned
Answer» B. rtt
discuss
218.
The HTTP request message is sent in ____ part of three-
way handshake.
A. first
B. second
C. third
D. none of the mentioned
Answer» C. third
discuss
219.
In the process of fetching a web page from a server the
HTTP request/response takes ______ RTTs.
A. 2
219.
In the process of fetching a web page from a server the
HTTP request/response takes ______ RTTs.
B. 1
C. 4
D. 3
Answer» B. 1
discuss
221.
The values GET, POST, HEAD etc are specified in ____ of
HTTP message
A. request line
B. header line
C. status line
D. entity body
Answer» A. request line
discuss
222.
The ______ method when used in the method field, leaves
entity body empty.
A. post
B. get
C. both of the mentioned
D. none of the mentioned
Answer» B. get
discuss
223.
The HTTP response message leaves out the requested
object when _____ method is used
A. get
B. post
C. head
223.
The HTTP response message leaves out the requested
object when _____ method is used
D. put
Answer» C. head
discuss
227.
Which of the following is present in both an HTTP request
line and a status line?
A. http version number
B. url
C. method
D. none of the mentioned
Answer» A. http version number
discuss
228. Which of the following is not applicable for IP?
A. error reporting
B. handle addressing conventions
C. datagram format
D. packet handling conventions
Answer» A. error reporting
discuss
229.
Which of the following field in IPv4 datagram is not
related to fragmentation?
A. flags
B. offset
C. tos
D. identifier
Answer» C. tos
discuss
230.
The TTL field has value 10. How many routers (max) can
process this datagram?
A. 11
B. 5
C. 10
D. 1
Answer» C. 10
discuss
231.
If the value in protocol field is 17, the transport layer
protocol used is ____.
A. tcp
B. udp
C. either of the mentioned
D. none of the mentioned
Answer» B. udp
discuss
233.
What should be the flag value to indicate the last
fragment?
A. 0
B. 1
C. ttl value
D. none of the mentioned
Answer» A. 0
discuss
236.
Which field helps to check rearrangement of the
fragments?
A. offset
B. flag
C. ttl
D. identifer
Answer» A. offset
discuss
237. The size of IP address in IPv6 is
A. 4bytes
B. 128bits
C. 8bytes
D. 100bits
Answer» B. 128bits
discuss
239.
In the IPv6 header,the traffic class field is similar to which
field in the IPv4 header?
A. fragmentation field
B. fast-switching
C. tos field
D. option field
Answer» C. tos field
discuss
241. These are the features present in IPv4 but not in IPv6.
A. fragmentation
B. header checksum
C. options
D. all of the mentioned
Answer» D. all of the mentioned
discuss
242. The ____ field determines the lifetime of IPv6 datagram
A. hop limit
B. ttl
C. next header
D. none of the mentioned
Answer» A. hop limit
discuss
246.
____________ media is a communication medium which
allows the data to get guided along it.
A. transparent
B. cable
C. guided
246.
____________ media is a communication medium which
allows the data to get guided along it.
D. glass
Answer» C. guided
discuss
250.
A field in header is used to specify the number of
characters in the frame.
A. start bit
B. character count
C. end bit
D. character stuffing
Answer» B. character count
251.
The data bit to be transmitted are broken into discrete
__________ at the data link layer.
A. frame
B. stuff
C. character
D. data
Answer» A. frame
discuss
253.
Which one of the below is not an component of Internet
mail system
A. user agent
B. smtp sender
C. smtp receiver
D. transfer agent
Answer» D. transfer agent
discuss
254.
How many layers are present in the Internet protocol
stack (TCP/IP model)?
A. 5
B. 7
C. 6
D. 10
Answer» A. 5
discuss
255. Application layer is implemented in ____________
A. end system
B. nic
C. ethernet
D. packet transport
Answer» A. end system
discuss
257.
The functionalities of the presentation layer include
____________
A. data compression
B. data encryption
C. data description
D. all of the mentioned
Answer» D. all of the mentioned
discuss
258.
Delimiting and synchronization of data exchange is
provided by __________
A. application layer
B. session layer
C. transport layer
D. link layer
Answer» B. session layer
discuss (1)
260.
Which network topology requires a central controller or
hub?
A. star
B. mesh
C. ring
D. bus
Answer» A. star
discuss
261.
Data communication system spanning states, countries, or
the whole world is ________
A. lan
B. wan
C. man
D. pan
Answer» B. wan
discuss
262.
Data communication system within a building or campus
is________
A. lan
B. wan
C. man
D. pan
Answer» A. lan
discuss
264.
Coaxial cable consists of _______ concentric copper
conductors.
A. 1
264.
Coaxial cable consists of _______ concentric copper
conductors.
B. 2
C. 3
D. 4
Answer» B. 2
discuss
266.
If an Optical Carrier is represented as OC-n, generally the
link speed equals(in Mbps) __________
A. n*39.8
B. n*51.8
C. 2n*51.8
D. none of the mentioned
Answer» B. n*51.8
discuss
267.
Radio channels are attractive medium because
__________
A. can penetrate walls
B. connectivity can be given to mobile user
C. can carry signals for long distance
D. all of the mentioned
Answer» D. all of the mentioned
discuss
269.
Bits can be sent over guided and unguided media as
analog signal by ___________
A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Answer» A. digital modulation
discuss
271.
In asynchronous serial communication the physical layer
provides ___________
A. start and stop signalling
B. flow control
C. both start & stop signalling and flow control
D. only start signalling
Answer» C. both start & stop signalling and flow control
discuss
277.
Which one of the following is not a function of network
layer?
A. routing
B. inter-networking
C. congestion control
D. error control
277.
Which one of the following is not a function of network
layer?
Answer» D. error control
discuss
278.
In virtual circuit network each packet contains
___________
A. full source and destination address
B. a short vc number
C. only source address
D. only destination address
Answer» B. a short vc number
discuss
279.
Which of the following routing algorithms can be used for
network layer design?
A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» D. all of the mentioned
discuss
280.
Which of the following is not correct in relation to multi-
destination routing?
A. is same as broadcast routing
B. contains the list of all destinations
C. data is not sent by packets
D. there are multiple receivers
Answer» C. data is not sent by packets
discuss
281.
A subset of a network that includes all the routers but
contains no loops is called ________
A. spanning tree
B. spider structure
C. spider tree
D. special tree
281.
A subset of a network that includes all the routers but
contains no loops is called ________
Answer» A. spanning tree
discuss
282.
Which one of the following algorithm is not used for
congestion control?
A. traffic aware routing
B. admission control
C. load shedding
D. routing information protocol
Answer» D. routing information protocol
discuss
285.
Which of the following are transport layer protocols used
in networking?
A. tcp and ftp
B. udp and http
C. tcp and udp
D. http and ftp
Answer» C. tcp and udp
discuss
286.
Which one of the following is a version of UDP with
congestion control?
A. datagram congestion control protocol
B. stream control transmission protocol
C. structured stream transport
D. user congestion control protocol
Answer» A. datagram congestion control protocol
discuss
287.
A _____ is a TCP name for a transport service access
point.
A. port
B. pipe
C. node
D. protocol
Answer» A. port
discuss
290.
Which of the following computer networks is built on the
top of another network?
A. prior network
B. chief network
C. prime network
290.
Which of the following computer networks is built on the
top of another network?
D. overlay network
Answer» D. overlay network
discuss
292.
Communication channel is shared by all the machines on
the network in ________
A. broadcast network
B. unicast network
C. multicast network
D. anycast network
Answer» A. broadcast network
discuss (1)
294.
A list of protocols used by a system, one protocol per layer,
is called ________
A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Answer» B. protocol stack
discuss
295. Network congestion occurs _________
A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. in case of transfer failure
Answer» A. in case of traffic overloading
discuss
296.
Which of this is not a constituent of residential telephone
line?
A. a high-speed downstream channel
B. a medium-speed downstream channel
C. a low-speed downstream channel
D. an ultra-high speed downstream channel
Answer» C. a low-speed downstream channel
discuss
301.
Which of the following statements is not applicable for
cable internet access?
A. it is a shared broadcast medium
B. it includes hfcs
C. cable modem connects home pc to ethernet port
D. analog signal is converted to digital signal in dslam
Answer» D. analog signal is converted to digital signal in dslam
discuss
306.
The number of layers in ISO OSI reference model is
__________
A. 5
B. 7
C. 6
D. 10
Answer» B. 7
discuss
307.
Which of the following statements can be associated with
OSI model?
A. a structured way to discuss and easier update system components
B. one layer may duplicate lower layer functionality
C. functionality at one layer no way requires information from another layer
D. it is an application specific network model
Answer» C. functionality at one layer no way requires information from another layer
discuss
309.
The number of layers in ISO OSI reference model is
__________
A. 4
B. 5
309.
The number of layers in ISO OSI reference model is
__________
C. 6
D. 7
Answer» D. 7
discuss
310.
TCP/IP model does not have ______ layer but OSI model
have this layer.
A. session layer
B. transport layer
C. application layer
D. network layer
Answer» A. session layer
discuss
311.
Which layer is used to link the network support layers and
user support layers?
A. session layer
B. data link layer
C. transport layer
D. network layer
Answer» C. transport layer
discuss
312.
Which address is used on the internet for employing the
TCP/IP protocols?
A. physical address and logical address
B. port address
C. specific address
D. all of the mentioned
Answer» D. all of the mentioned
discuss
314.
Which address is used to identify a process on a host by
the transport layer?
A. physical address
B. logical address
C. port address
D. specific address
Answer» C. port address
discuss
317.
Which transmission media provides the highest
transmission speed in a network?
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Answer» C. optical fiber
discuss
318.
A single channel is shared by multiple signals by
____________
A. analog modulation
B. digital modulation
C. multiplexing
D. phase modulation
Answer» C. multiplexing
discuss
319.
Which of the following tasks is not done by data link
layer?
A. framing
B. error control
C. flow control
D. channel coding
Answer» D. channel coding
discuss
321.
Automatic repeat request error management mechanism
is provided by ________
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. application access control sublayer
Answer» A. logical link control sublayer
discuss
324.
Which of the following is the multiple access protocol for
channel access control?
A. csma/cd
B. csma/ca
C. both csma/cd & csma/ca
D. hdlc
Answer» C. both csma/cd & csma/ca
discuss
326.
User datagram protocol is called connectionless because
_____________
A. all udp packets are treated independently by transport layer
B. it sends data as a stream of related packets
C. it is received in the same order as sent order
D. it sends data very quickly
Answer» A. all udp packets are treated independently by transport layer
discuss
327. Socket-style API for windows is called ____________
A. wsock
B. winsock
C. wins
D. sockwi
Answer» B. winsock
discuss
331.
The sharing of a medium and its link by two or more
devices is called _________
A. fully duplexing
B. multiplexing
C. micropleixng
D. duplexing
Answer» B. multiplexing
discuss
332. Multiplexing is used in _______
A. packet switching
B. circuit switching
C. data switching
D. packet & circuit switching
Answer» B. circuit switching
discuss
333.
Which multiplexing technique used to transmit digital
signals?
A. fdm
B. tdm
C. wdm
D. fdm & wdm
Answer» B. tdm
discuss
334.
The state when dedicated signals are idle are called
__________
A. death period
B. poison period
C. silent period
D. stop period
Answer» C. silent period
discuss
340.
_____________ allows LAN users to share computer
programs and data.
A. communication server
B. print server
C. file server
D. network
Answer» C. file server
discuss
341.
With respect to physical media, STP cables stands for
_________
A. shielded twisted pair cable
B. spanning tree protocol cable
C. static transport protocol cable
D. shielded two power cable
Answer» A. shielded twisted pair cable
discuss
342. What is the max length of the Shielded twisted pair cable?
A. 100 ft
B. 200 ft
C. 100 m
D. 200 m
Answer» C. 100 m
discuss
347.
Which of the following architecture uses the CSMA/CD
access method?
A. arc net
B. ethernet
C. router
D. stp server
Answer» B. ethernet
discuss
348.
The attacker using a network of compromised devices is
known as _____________
A. internet
B. botnet
C. telnet
D. d-net
Answer» B. botnet
discuss
354.
Terrestrial radio channels are broadly classifed into _____
groups.
A. 2
B. 3
C. 4
D. 1
354.
Terrestrial radio channels are broadly classifed into _____
groups.
Answer» B. 3
discuss
355.
A local telephone network is an example of a _______
network.
A. packet switched
B. circuit switched
C. bit switched
D. line switched
Answer» B. circuit switched
discuss
357.
What are the Methods to move data through a network of
links and switches?
A. packet switching and line switching
B. circuit switching and line switching
C. line switching and bit switching
D. packet switching and circuit switching
Answer» D. packet switching and circuit switching
discuss
361.
The packet of information at the application layer is called
__________
A. packet
B. message
C. segment
D. frame
Answer» B. message
discuss
368.
Transport services available to applications in one or
another form _________
A. reliable data transfer
B. timing
C. security
D. all of the mentioned
Answer» D. all of the mentioned
discuss
369. Electronic mail uses which Application layer protocol?
A. smtp
B. http
C. ftp
D. sip
Answer» A. smtp
discuss
370.
The ____________ translates internet domain and host
names to IP address.
A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» A. domain name system
discuss
372.
When displaying a web page, the application layer uses
the _____________
A. http protocol
B. ftp protocol
C. smtp protocol
D. tcp protocol
Answer» A. http protocol
discuss
374.
The HTTP request message is sent in _________ part of
three-way handshake.
A. first
B. second
C. third
D. fourth
Answer» C. third
discuss
375.
The first line of HTTP request message is called
_____________
A. request line
B. header line
C. status line
D. entity line
Answer» A. request line
discuss
376.
The __________ method when used in the method field,
leaves entity body empty.
A. post
B. send
C. get
D. put
Answer» C. get
discuss
380.
FTP server listens for connection on port number
____________
A. 20
B. 21
C. 22
D. 23
Answer» B. 21
discuss
382.
In File Transfer Protocol, data transfer cannot be done in
___________
A. stream mode
B. block mode
C. compressed mode
D. message mode
382.
In File Transfer Protocol, data transfer cannot be done in
___________
Answer» D. message mode
discuss
385.
FTP uses _________ parallel TCP connections to transfer
a file.
A. 1
B. 2
C. 3
D. 4
Answer» B. 2
discuss
389.
The password is sent to the server using ________
command
A. passwd
B. pass
C. password
D. pword
Answer» B. pass
discuss
390.
When the mail server sends mail to other mail servers it
becomes ____________
A. smtp server
B. smtp client
C. peer
D. master
Answer» B. smtp client
discuss
391.
If you have to send multimedia data over SMTP it has to
be encoded into _______
A. binary
B. signal
C. ascii
391.
If you have to send multimedia data over SMTP it has to
be encoded into _______
D. hash
Answer» C. ascii
discuss
392.
The underlying Transport layer protocol used by SMTP is
________
A. tcp
B. udp
C. either tcp or udp
D. imap
Answer» A. tcp
discuss
397.
Which of the following is an example of user agents for e-
mail?
A. microsoft outlook
B. facebook
C. google
D. tumblr
Answer» A. microsoft outlook
discuss
399.
SMTP connections secured by SSL are known as
_____________
A. smtps
B. ssmtp
C. snmp
D. starttls
Answer» A. smtps
discuss
401.
Which one of the following protocol is used to receive mail
messages?
A. smtp
B. post office protocol (pop)
C. internet message access protocol (imap)
D. ftp
Answer» D. ftp
discuss
403.
An email client needs to know the _________ of its initial
SMTP server.
A. ip address
B. mac address
C. url
D. name
Answer» A. ip address
discuss
411.
If a server has no clue about where to find the address for
a hostname then _______
A. server asks to the root server
B. server asks to its adjcent server
C. request is not processed
D. none of the mentioned
Answer» A. server asks to the root server
discuss
416.
SSH uses ___________ to authenticate the remote
computer.
A. public-key cryptography
B. private-key cryptography
C. any of public-key or private-key
D. both public-key & private-key
Answer» A. public-key cryptography
discuss
417.
Which standard TCP port is assigned for contacting SSH
servers?
A. port 21
B. port 22
C. port 23
D. port 24
Answer» B. port 22
discuss
418.
Which one of the following is a file transfer protocol using
SSH?
A. scp
B. sftp
418.
Which one of the following is a file transfer protocol using
SSH?
C. rsync
D. all of the mentioned
Answer» D. all of the mentioned
discuss
420.
Which one of the following feature was present in SSH
protocol, version 1?
A. password changing
B. periodic replacement of session keys
C. support for public-key certificates
D. none of the mentioned
Answer» D. none of the mentioned
discuss
422.
Which one of the following authentication method is used
by SSH?
A. public-key
B. host based
C. password
D. all of the mentioned
Answer» D. all of the mentioned
discuss
423.
DHCP (dynamic host configuration protocol) provides
__________ to the client.
A. ip address
B. mac address
C. url
D. none of the mentioned
Answer» A. ip address
discuss
427.
DHCP uses UDP port _________ for sending data to the
server.
A. 66
B. 67
C. 68
427.
DHCP uses UDP port _________ for sending data to the
server.
D. 69
Answer» B. 67
discuss
428.
DHCP client and servers on the same subnet communicate
via _________
A. udp broadcast
B. udp unicast
C. tcp broadcast
D. tcp unicast
Answer» A. udp broadcast
discuss
434.
How do Storage administrators ensure secure access to
storage devices?
A. by using zoning
B. by putting a physical lock on the storage device
C. by keeping devices shutdown when not in use
D. by keeping devices when used
Answer» A. by using zoning
discuss
435.
Effective Storage management does not include
__________
A. security
B. backups
C. reporting
D. connection
Answer» D. connection
discuss
437.
Full duplex mode increases the capacity of each domain by
________
A. 10 to 20 mbps
B. 20 to 30 mbps
C. 30 to 40 mbps
D. 40 to 50 mbps
Answer» A. 10 to 20 mbps
discuss
438.
Configuration management can be divided into which two
subsystems?
A. reconfiguration and documentation
B. management and configuration
C. documentation and dialing up
D. configuration and dialing up
Answer» A. reconfiguration and documentation
discuss
439.
To use a Simple Network Management System, we need
_______
A. servers
B. ip
C. protocols
D. rules
Answer» D. rules
discuss
440.
The main difference between SNMPv3 and SNMPv2 is
_______
A. management
B. integration
C. classification
D. enhanced security
Answer» D. enhanced security
discuss
441. BER stands for ________
A. basic encoding rules
B. basic encoding resolver
C. basic encoding rotator
D. basic encoding router
Answer» A. basic encoding rules
discuss
442.
SNMP is the framework for managing devices in an
internet using the ______
A. tcp/ip protocol
B. udp
C. smtp
D. none
Answer» A. tcp/ip protocol
discuss
443.
Structure of Management Information (SMI), is the
guideline of ________
A. http
B. snmp
C. url
D. mib
Answer» B. snmp
discuss
444.
The application layer protocol used by a Telnet application
is ________
A. telnet
B. ftp
C. http
D. smtp
Answer» A. telnet
discuss
445.
_______ allows you to connect and login to a remote
computer
A. telnet
B. ftp
445.
_______ allows you to connect and login to a remote
computer
C. http
D. smtp
Answer» A. telnet
discuss
449.
If we want that a character be interpreted by the client
instead of server _________
A. interpret as command (iac) escape character has to be used
B. control functions has to be disabled
C. it is not possible
D. cli character has to be used
Answer» A. interpret as command (iac) escape character has to be used
discuss
450.
Telnet protocol is used to establish a connection to
__________
A. tcp port number 21
B. tcp port number 22
C. tcp port number 23
D. tcp port number 25
Answer» C. tcp port number 23
453.
AbsoluteTelnet is a telnet client for _______ Operating
system.
A. windows
B. linux
C. mac
D. ubuntu
Answer» A. windows
discuss
454.
The decimal code of Interpret as Command (IAC)
character is _______
A. 252
B. 253
454.
The decimal code of Interpret as Command (IAC)
character is _______
C. 254
D. 255
Answer» D. 255
discuss
457.
TCP groups a number of bytes together into a packet
called _______
A. packet
B. buffer
C. segment
D. stack
Answer» C. segment
discuss
461.
Connection establishment in TCP is done by which
mechanism?
A. flow control
B. three-way handshaking
C. forwarding
D. synchronization
Answer» B. three-way handshaking
discuss
462.
SYNC flooding attack belongs to a type of security attack
known as ___________
A. sync flooding attack
B. active attack
C. passive attack
D. denial-of-service attack
Answer» D. denial-of-service attack
discuss
463.
What allows TCP to detect lost segments and in turn
recover from that loss?
A. sequence number
B. acknowledgment number
463.
What allows TCP to detect lost segments and in turn
recover from that loss?
C. checksum
D. both sequence & acknowledgment number
Answer» B. acknowledgment number
discuss
466.
Beyond IP, UDP provides additional services such as
_______
A. routing and switching
B. sending and receiving of packets
C. multiplexing and demultiplexing
D. demultiplexing and error checking
Answer» D. demultiplexing and error checking
discuss
470.
The port number is “ephemeral port number”, if the
source host is _______
A. ntp
B. echo
C. server
D. client
Answer» D. client
discuss
471.
“Total length” field in UDP packet header is the length of
_________
A. only udp header
B. only data
C. only checksum
D. udp header plus data
Answer» D. udp header plus data
discuss
472.
Which is the correct expression for the length of UDP
datagram?
A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
472.
Which is the correct expression for the length of UDP
datagram?
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Answer» A. udp length = ip length – ip header’s length
discuss
473.
The ______ field is used to detect errors over the entire
user datagram.
A. udp header
B. checksum
C. source port
D. destination port
Answer» B. checksum
discuss
479.
Retransmission of packets must not be done when
_______
A. packet is lost
B. packet is corrupted
C. packet is needed
D. packet is error-free
Answer» D. packet is error-free
discuss
483.
The packet sent by a node to the source to inform it of
congestion is called _______
A. explicit
B. discard
C. choke
D. backpressure
Answer» C. choke
discuss
484.
Which of the following is not a characteristic of Virtual
Circuit Network?
A. there are setup and teardown phases in addition to the data transfer phase
B. resources can be allocated during setup phase or on demand
C. all packets follow the same path established during the connection
D. virtual circuit network is implemented in application layer
Answer» D. virtual circuit network is implemented in application layer
discuss
485.
Which of the following is not a phase of virtual circuit
network?
A. setup phase
B. data transfer phase
C. termination phase
D. teardown phase
Answer» C. termination phase
discuss
487.
Delay of the resource allocated during setup phase during
data transfer is ________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» C. same for each packet
discuss
488.
Delay of the resource allocated on demand during data
transfer is ________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer» D. different for each packet
discuss
489.
In data transfer phase, how many columns does the table
contain?
A. 1
B. 2
C. 3
D. 4
Answer» D. 4
discuss
498.
In frame relay networks, extended address is used
_______
A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» A. to increase the range of data link connection identifiers
discuss
503.
Frame Relay deploys physical layer carriers such as
_______
A. adms
B. upsr
C. blsr
D. sonet
Answer» D. sonet
discuss
507.
In frame relay networks, extended address is used
________
A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer» A. to increase the range of data link connection identifiers
discuss
510.
Which one of the following is not used to generate
dynamic web pages?
A. php
B. asp.net
C. jsp
510.
Which one of the following is not used to generate
dynamic web pages?
D. css
Answer» D. css
discuss
511.
An alternative to JavaScript on windows platform is
_______
A. vbscript
B. asp.net
C. jsp
D. php
Answer» A. vbscript
discuss
518.
Which of the following demerits does Fragmentation
have?
A. complicates routers
B. open to dos attack
C. overlapping of fragments
D. all of the mentioned
Answer» D. all of the mentioned
discuss
519.
Which field helps to check rearrangement of the
fragments?
A. offset
B. flag
C. ttl
D. identifier
519.
Which field helps to check rearrangement of the
fragments?
Answer» A. offset
discuss
520.
In classless addressing, there are no classes but addresses
are still granted in ______
A. ips
B. blocks
C. codes
D. sizes
Answer» B. blocks
discuss
521.
In IPv4 Addresses, classful addressing is replaced with
________
A. classless addressing
B. classful addressing
C. classful advertising
D. classless advertising
Answer» A. classless addressing
discuss
522.
First address in a block is used as network address that
represents the ________
A. class network
B. entity
C. organization
D. codes
Answer» C. organization
discuss
523.
In classful addressing, a large part of available addresses
are ________
A. organized
B. blocked
C. wasted
D. communicated
523.
In classful addressing, a large part of available addresses
are ________
Answer» C. wasted
discuss
524.
Network addresses are a very important concept of
________
A. routing
B. mask
C. ip addressing
D. classless addressing
Answer» C. ip addressing
discuss
529.
The _________ field determines the lifetime of IPv6
datagram
A. hop limit
B. ttl
C. next header
D. type of traffic
Answer» A. hop limit
discuss
531.
A link local address of local addresses is used in an
_______
A. isolated router
B. isolated mask
C. isolated subnet
D. isolated net
Answer» C. isolated subnet
discuss
532.
In IPv6 addresses, addresses that start with eight 0s are
called ________
A. unicast addresses
B. multicast addresses
532.
In IPv6 addresses, addresses that start with eight 0s are
called ________
C. any cast addresses
D. reserved addresses
Answer» D. reserved addresses
discuss
535.
Which layer is responsible for process-to-process
delivery?
A. physical layer
B. network layer
C. transport layer
D. application layer
Answer» C. transport layer
discuss
536.
Multiple processes on destinations at transport layer are
identified by __________
A. mac address
B. port number
C. host number
D. host address
Answer» B. port number
discuss
538.
The combination of an IP address and port number is
called as ________
A. socket address
B. port address
C. mac address
D. host address
Answer» A. socket address
discuss
541.
During error reporting, ICMP always reports error
messages to ________
A. destination
B. source
C. next router
541.
During error reporting, ICMP always reports error
messages to ________
D. previous router
Answer» B. source
discuss
543.
The main reason for transition from IPv4 to IPv6 is
_________
A. huge number of systems on the internet
B. very low number of system on the internet
C. providing standard address
D. to provide faster internet
Answer» A. huge number of systems on the internet
discuss
547.
In an IPv6 header, the traffic class field is similar to which
field in the IPv4 header?
A. fragmentation field
B. fast switching
C. tos field
D. option field
Answer» C. tos field
discuss
549. Which are the features present in IPv4 but not in IPv6?
A. fragmentation
B. header checksum
C. options
D. anycast address
Answer» D. anycast address
discuss
550.
_________ implies that all subnets obtained from the same
subnet mask.
A. static subnetting
B. dynamic subnetting
C. variable length subnetting
550.
_________ implies that all subnets obtained from the same
subnet mask.
A. static subnetting
B. dynamic subnetting
C. variable length subnetting
D. dynamic length subnetting
Answer» A. static subnetting
552.
_________ is another kind of fiber optic network with an
active star for switching.
A. s/net
B. sw/net
C. net/sw
D. fs/net
Answer» A. s/net
discuss
553.
What is the subnet id of a host with an IP address
172.16.66.0/21?
A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
Answer» C. 172.16.64.0
discuss
554.
The network address of 172.16.0.0/19 provides how many
subnets and hosts?
A. 7 subnets, 30 hosts each
554.
The network address of 172.16.0.0/19 provides how many
subnets and hosts?
B. 8 subnets, 8,190 hosts each
C. 8 subnets, 2,046 hosts each
D. 7 subnets, 2,046 hosts each
Answer» B. 8 subnets, 8,190 hosts each
discuss
555.
Which type of Ethernet framing is used for TCP/IP and
DEC net?
A. ethernet 802.3
B. ethernet 802.2
C. ethernet ii
D. ethernet snap
Answer» C. ethernet ii
discuss
556.
Which NetWare protocol works on layer 3–network layer
—of the OSI model?
A. ipx
B. ncp
C. spx
D. netbios
Answer» A. ipx
discuss
559.
What does the “IPX maximum-paths 2” command
accomplish?
A. it enables load sharing on 2 paths if the paths are equal metric paths
B. it sets up routing to go to network 2
C. it is the default for cisco ipx load sharing
D. it enables load sharing on 2 paths if the paths are unequal metric paths
Answer» A. it enables load sharing on 2 paths if the paths are equal metric paths
discuss
560.
Novell’s implementation of RIP updates routing tables
every _________ seconds.
A. 60
B. 90
C. 10
D. 30
Answer» A. 60
discuss
561.
Which protocol should you select if the network diameter
is more than 17 hops?
A. ripv1
B. ripv2
C. eigrp
D. both ripv1 and ripv2
Answer» A. ripv1
discuss
562.
How often does a RIPv1 router broadcast its routing table
by default?
A. every 30 seconds
B. every 60 seconds
C. every 90 seconds
D. ripv1 does not broadcast periodically
Answer» A. every 30 seconds
discuss
563. Which command displays RIP routing updates?
A. show ip route
B. debug ip rip
C. show protocols
D. debug ip route
Answer» B. debug ip rip
discuss
564.
Default administrative distance of a static route is
________
A. 0
B. 90
C. 100
D. 1
Answer» D. 1
discuss
565.
Which protocol gives a full route table update every 30
seconds?
A. iegrp
B. rip
C. icmp
D. ip
Answer» B. rip
discuss
567.
Which statement is true regarding classless routing
protocol?
A. the use of discontinuous networks is not allowed
B. use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
567.
Which statement is true regarding classless routing
protocol?
D. igrp supports classes routing within the same autonomous system
Answer» B. use of variable length subnet masks is permitted
discuss
569.
Which statement is true regarding classless routing
protocols?
A. the use of discontinuous networks is not allowed
B. the use of variable length subnet masks is permitted
C. ripv1 is a classless routing protocol
D. ripv2 supports classless routing
Answer» B. the use of variable length subnet masks is permitted
discuss
571.
Which of the situations might not require multiple routing
protocols in a network?
A. when a new layer 2-only switch is added to the network
B. when you are migrating from one routing protocol to another
C. when you are using routers from multiple vendors
D. when there are host-based routers from multiple vendors
Answer» A. when a new layer 2-only switch is added to the network
discuss
572.
Which two routing protocols can be redistributed into
OSPF by a Cisco router?
A. ip eigrp and appletalk eigrp
B. appletalk eigrp and ripv2
C. ripv2 and ip eigrp
D. ipx rip & appletalk eigrp
Answer» C. ripv2 and ip eigrp
discuss
575.
Which routing protocol implements the diffusing update
algorithm?
A. is-is
B. igrp
C. eigrp
D. ospf
Answer» C. eigrp
discuss
576.
Which protocol should you select if the network diameter
is more than 17 hops?
A. ripv1
B. ripv2
C. eigrp
576.
Which protocol should you select if the network diameter
is more than 17 hops?
D. ospf
Answer» B. ripv2
discuss (1)
577.
In the network HTTP resources are located by
__________
A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. union resource locator
Answer» A. uniform resource identifier
discuss
579.
In FTP protocol, a client contacts a server using ______ as
the transport protocol.
A. transmission control protocol
B. user datagram protocol
C. datagram congestion control protocol
D. stream control transmission protocol
Answer» A. transmission control protocol
discuss
582.
Which methods are commonly used in Server Socket
class?
A. public output stream get output stream ()
B. public socket accept ()
C. public synchronized void close ()
D. public void connect ()
Answer» B. public socket accept ()
discuss
583.
The client in socket programming must know which
information?
A. ip address of server
B. port number
C. both ip address of server & port number
D. only its own ip address
Answer» C. both ip address of server & port number
discuss
584.
TCP, FTP, Telnet, SMTP, POP etc. are examples of
___________
A. socket
B. ip address
C. protocol
D. mac address
Answer» C. protocol
discuss
586.
Which classes are used for connection-less socket
programming?
A. datagram socket
B. datagram packet
C. both datagram socket & datagram packet
D. server socket
Answer» C. both datagram socket & datagram packet
discuss
587.
In Inet Address class, which method returns the host name
of the IP Address?
A. public string get hostname()
B. public string gethostaddress()
C. public static inetaddress get localhost()
D. public getbyname()
Answer» A. public string get hostname()
discuss
593.
Which of the following can be used to configure the scope
of the Cookie visibility?
A. path
B. domain
C. both path and domain
D. server
Answer» D. server
discuss
594. How can you set a Cookie visibility scope to local Storage?
A. /
B. %
C. *
D. #
Answer» A. /
discuss
595. Which of the following is a Boolean cookie attribute?
A. bool
B. secure
C. lookup
D. domain
Answer» B. secure
discuss
598.
Which of the following HTTP methods should be
idempotent in nature?
A. options
B. delete
C. post
D. head
Answer» B. delete
discuss
599.
Next-Hop Method is used to reduce contents of a
_________
A. revolving table
B. rotating table
C. routing table
D. re-allocate table
Answer» C. routing table
discuss
600.
In Unicast Routing, Dijkstra algorithm creates a shortest
path tree from a ________
A. graph
B. tree
C. network
D. link
Answer» A. graph
604.
Network layer firewall has two sub-categories called
____________
A. stateful firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
604.
Network layer firewall has two sub-categories called
____________
C. frame firewall and packet firewall
D. network firewall and data firewall
Answer» A. stateful firewall and stateless firewall
discuss
606.
Open Shortest Path First (OSPF) is also called as
_____________
A. link state protocol
B. error-correction protocol
C. routing information protocol
D. border gateway protocol
Answer» A. link state protocol
discuss
607.
The computation of the shortest path in OSPF is usually
done by ____________
A. bellman-ford algorithm
B. routing information protocol
C. dijkstra’s algorithm
D. distance vector routing
Answer» C. dijkstra’s algorithm
discuss
608.
In OSPF, which protocol is used to discover neighbour
routers automatically?
A. link state protocol
B. error-correction protocol
C. routing information protocol
D. hello protocol
608.
In OSPF, which protocol is used to discover neighbour
routers automatically?
Answer» D. hello protocol
discuss
610.
In OSPF header, which field is used to detect errors in the
packet?
A. type
B. area id
C. authentication type
D. checksum
Answer» D. checksum
Explanation: The checksum field is used to detect errors. It makes sure that the data
portions that are being sent are all in integrity. It can detect duplicated bits. Once an
error is detected, the sender has to re-transmit the data as it won’t receive an
acknowledgment.
discuss
611.
The outcome of Dijkstra’s calculation is used to populate
the __________
A. topology table
B. routing table
C. neighbor table
D. adjacency table
Answer» B. routing table
discuss
612. What is the IP protocol number for OSPF packets?
A. 89
B. 86
C. 20
D. 76
Answer» A. 89
discuss
614.
Which multicast address does the OSPF Hello protocol
use?
A. 224.0.0.5
B. 224.0.0.6
C. 224.0.0.7
D. 224.0.0.8
Answer» A. 224.0.0.5
discuss
618.
Which two commands are required for basic OSPF
configuration?
A. “[network mask] area [area-id]” and “router ospf [process-id]”
B. “[wildcard-mask] area [area-id]” and “[network mask] area [area-id]”
C. only “router ospf [process-id]”
D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”
Answer» D. “[wildcard-mask] area [area-id]” and “router ospf [process-id]”
discuss
619.
Which OSPF show command describes a list of OSPF
adjacencies?
A. show ip ospf interface
B. show ip ospf
C. show ip route
D. show ip ospf neighbor
Answer» D. show ip ospf neighbor
discuss
622.
Datagrams are routed to their destinations with the help
of ________
A. switch table
B. segments table
C. datagram table
D. routing table
Answer» C. datagram table
discuss
623.
The main contents of the routing table in datagram
networks are ___________
A. source and destination address
B. destination address and output port
C. source address and output port
D. input port and output port
Answer» B. destination address and output port
discuss
624.
Which of the following is true with respect to the delay in
datagram networks?
A. delay is greater than in a virtual circuit network
B. each packet may experience a wait at a switch
C. delay is not uniform for the packets of a message
D. all of the mentioned
Answer» D. all of the mentioned
discuss
625.
Which of the following is false with respect to the
datagram networks?
A. number of flows of packets are not limited
B. packets may not be in order at the destination
C. path is not reserved
D. delay is the same for all packets in a flow
Answer» D. delay is the same for all packets in a flow
discuss
627.
Network layer firewall has two sub-categories as
_________
A. state full firewall and stateless firewall
B. bit oriented firewall and byte oriented firewall
C. frame firewall and packet firewall
D. network layer firewall and session layer firewall
Answer» A. state full firewall and stateless firewall
discuss
631.
What is one advantage of setting up a DMZ with two
firewalls?
A. you can control where traffic goes in three networks
B. you can do stateful packet filtering
C. you can do load balancing
D. improved network performance
Answer» C. you can do load balancing
discuss
632.
A stateful firewall maintains a ___________ which is a list
of active connections.
A. routing table
B. bridging table
C. state table
D. connection table
Answer» A. routing table
discuss
634.
Which of the following networks supports pipelining
effect?
A. circuit-switched networks
B. message-switched networks
C. packet-switched networks
D. stream-switched networks
Answer» C. packet-switched networks
discuss
635.
MIB is a collection of groups of objects that can be
managed by __________
A. smtp
635.
MIB is a collection of groups of objects that can be
managed by __________
B. udp
C. snmp
D. tcp/ip
Answer» C. snmp
discuss
636.
A network management system can be divided into
___________
A. three categories
B. five broad categories
C. seven broad categories
D. ten broad categories
Answer» B. five broad categories
discuss
641.
Which of the following is not related to ipconfig in
Microsoft Windows?
A. display all current tcp/ip network configuration values
B. modify dhcp settings
C. modify dns settings
D. trace the routers in the path to destination
Answer» D. trace the routers in the path to destination
discuss
642.
__________ allows checking if a domain is available for
registration.
A. domain check
B. domain dossier
C. domain lookup
D. domain registers
Answer» A. domain check
discuss
647.
Ethernet in metropolitan area network (MAN) can be
used as ___________
A. pure ethernet
B. ethernet over sdh
C. ethernet over mpls
D. all of the mentioned
Answer» D. all of the mentioned
discuss
648.
A point-to-point protocol over ethernet is a network
protocol for __________
A. encapsulating ppp frames inside ethernet frames
B. encapsulating ehternet framse inside ppp frames
C. for security of ethernet frames
D. for security of ppp frames
Answer» A. encapsulating ppp frames inside ethernet frames
discuss
649. High speed ethernet works on _________
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. unshielded twisted pair cable
Answer» C. optical fiber
discuss
650.
The maximum size of payload field in ethernet frame is
__________
A. 1000 bytes
B. 1200 bytes
C. 1300 bytes
D. 1500 bytes
Answer» D. 1500 bytes
654.
A wireless network interface controller can work in
_______
A. infrastructure mode
B. ad-hoc mode
C. both infrastructure mode and ad-hoc mode
D. wds mode
Answer» C. both infrastructure mode and ad-hoc mode
discuss
655.
In wireless network an extended service set is a set of
________
A. connected basic service sets
B. all stations
C. all access points
D. connected access points
Answer» A. connected basic service sets
discuss
657.
Which one of the following event is not possible in wireless
LAN?
A. collision detection
B. acknowledgement of data frames
C. multi-mode data transmission
D. connection to wired networks
Answer» A. collision detection
discuss
661.
To join the internet, the computer has to be connected to a
_________
A. internet architecture board
B. internet society
C. internet service provider
D. different computer
Answer» C. internet service provider
discuss
662.
ISP exchanges internet traffic between their networks by
__________
A. internet exchange point
B. subscriber end point
C. isp end point
D. internet end point
Answer» A. internet exchange point
discuss
663. Which of the following protocols is used in the internet?
A. http
B. dhcp
C. dns
D. dns, http and dns
Answer» D. dns, http and dns
discuss
666.
Which one of the following is not an application layer
protocol used in internet?
A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. local procedure call
Answer» C. resource reservation protocol
discuss
667.
Which protocol assigns IP address to the client connected
in the internet?
A. dhcp
B. ip
667.
Which protocol assigns IP address to the client connected
in the internet?
C. rpc
D. rsvp
Answer» A. dhcp
discuss
668.
Which one of the following is not used in media access
control?
A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. packet switching
Answer» D. packet switching
discuss
669.
An interconnected collection of piconet is called
___________
A. scatternet
B. micronet
C. mininet
D. multinet
Answer» A. scatternet
discuss
670.
In a piconet, there can be up to ________ parked nodes in
the network.
A. 63
B. 127
C. 255
D. 511
Answer» C. 255
discuss
682.
WiMAX MAC layer provides an interface between
___________
A. higher transport layers and physical layer
B. application layer and network layer
C. data link layer and network layer
D. session layer and application layer
Answer» A. higher transport layers and physical layer
discuss
686.
Which of the following frequencies is not used in WiMAX
for communication?
A. 2.3 ghz
B. 2.4 ghz
C. 2.5 ghz
D. 3.5 ghz
Answer» B. 2.4 ghz
discuss
688.
In SONET, STS-1 level of electrical signalling has the data
rate of _________
A. 51.84 mbps
B. 155.52 mbps
C. 2488.320 mbps
D. 622.080 mbps
Answer» A. 51.84 mbps
discuss
689.
The path layer of SONET is responsible for the movement
of a signal _________
A. from its optical source to its optical destination
B. across a physical line
C. across a physical section
D. back to its optical source
Answer» B. across a physical line
discuss
690.
The photonic layer of the SONET is similar to the
__________ of OSI model.
A. network layer
B. data link layer
C. physical layer
D. transport layer
Answer» C. physical layer
discuss
691.
In SONET, each synchronous transfer signal STS-n is
composed of __________
A. 2000 frames
B. 4000 frames
C. 8000 frames
D. 16000 frames
Answer» C. 8000 frames
discuss
693.
Automatic protection switching in linear network is
defined at the _______
A. line layer
B. section layer
C. photonic layer
D. path layer
Answer» A. line layer
discuss
694.
A unidirectional path switching ring is a network with
__________
A. one ring
B. two rings
C. three rings
694.
A unidirectional path switching ring is a network with
__________
D. four rings
Answer» B. two rings
discuss
695.
Real-time transport protocol (RTP) is mostly used in
_________
A. streaming media
B. video teleconference
C. television services
D. all of the mentioned
Answer» D. all of the mentioned
discuss
698.
Which protocol provides the synchronization between
media streams?
A. rtp
B. rtcp
C. rpc
D. rtct
Answer» B. rtcp
discuss
701.
Which one of the following multimedia formats can not be
supported by RTP?
A. mpeg-4
B. mjpeg
C. mpeg
D. txt
Answer» D. txt
discuss
704.
An RPC (remote procedure call) is initiated by the
_________
A. server
B. client
C. client after the sever
D. a third party
Answer» B. client
discuss
705.
In RPC, while a server is processing the call, the client is
blocked ________
A. unless the client sends an asynchronous request to the server
B. unless the call processing is complete
C. for the complete duration of the connection
D. unless the server is disconnected
Answer» A. unless the client sends an asynchronous request to the server
discuss
707.
RPC allows a computer program to cause a subroutine to
execute in _________
A. its own address space
B. another address space
C. both its own address space and another address space
D. applications address space
Answer» B. another address space
discuss
708.
RPC works between two processes. These processes must
be ____________
A. on the same computer
B. on different computers connected with a network
C. on the same computer and also on different computers connected with a network
D. on none of the computers
Answer» C. on the same computer and also on different computers connected with a network
discuss
712.
Which of the following is an advantage of anomaly
detection?
A. rules are easy to define
B. custom protocols can be easily analyzed
C. the engine can scale as the rule set grows
D. malicious activity that falls within normal usage patterns is detected
712.
Which of the following is an advantage of anomaly
detection?
Answer» C. the engine can scale as the rule set grows
discuss
714.
At which two traffic layers do most commercial IDSes
generate signatures?
A. application layer and network layer
B. network layer and session layer
C. transport layer and application layer
D. transport layer and network layer
Answer» D. transport layer and network layer
discuss
720.
A family of network control protocols (NCPs)
____________
A. are a series of independently defined protocols that provide a dynamic
B. are a series of independently-defined protocols that encapsulate
C. are a series of independently defined protocols that provide transparent
D. the same as nfs
Answer» B. are a series of independently-defined protocols that encapsulate
discuss
724.
EIGRP sends a hello message after every ___________
seconds.
A. 5 seconds (lan), 60 seconds (wan)
B. 5 seconds (lan), 5 seconds (wan)
C. 15s
D. 180s
Answer» A. 5 seconds (lan), 60 seconds (wan)
discuss
728.
Administrative distance for external EIGRP route is
_______
A. 90
B. 170
C. 110
D. 100
Answer» B. 170
discuss
729.
EIGRP uses the ____________ algorithm for finding
shortest path.
A. spf
B. dual
C. linkstat
D. djikstra’s
Answer» B. dual
discuss
730. What are the other types of OLAP apart from ROLAP?
A. HOLAP
B. MOLAP
C. DOLAP
D. Both a and b above
Answer» B. MOLAP
discuss
message queues.
A. True
B. False
C. none
D. other
Answer» A. True
discuss
735.
Transport layer of OSI model lies between Network and
layer
A. Application
B. Data link
C. Session
D. Presentation
Answer» C. Session
discuss
736.
Which of the following protocols below work in the
application layer?
A. POP
B. PPP
C. FTP
D. Both a and d above
Answer» D. Both a and d above
discuss
739. From the options below, which suits best for MODEM?
A. a device that modulates an analog carrier signal to encode digital information
B. a device that modulates a digital carrier signal to encode analog information
C. a device that modulates an analog carrier signal to decode digital information
D. a device that modulates a digital carrier signal to decode analoginformation
Answer» A. a device that modulates an analog carrier signal to encode digital information
discuss
742.
A network point that provides entrance into another
network is called as
A. Node
B. Gateway
C. Switch
D. Router
Answer» B. Gateway
discuss
744.
A stream socket provides communications between a client
and a server
A. One way
B. Two way
C. none
D. other
Answer» B. Two way
discuss
746.
Which of the following protocol below are suited for email
retrieval?
A. POP3
B. IMAP
C. FTP
D. Both and b above
Answer» D. Both and b above
discuss
749.
The process of assigning the IP address for specific times
to the various hosts by DHCP is called?
A. Lend
B. sublease
C. let
D. Lease
Answer» D. Lease
discuss
750. What is the full form of URL?
A. Uniform routing locator
B. Uniform Resource Locator
C. Universal Resource Locator
D. Uniform router locator
Answer» B. Uniform Resource Locator
751.
is a standard suite of protocols used for packet switching
across computer networks.
A. x.22
B. x.23
C. x.25
D. x.26
Answer» C. x.25
discuss
753.
Which of the following below is/are the capability of ICMP
protocol?
A. Report package count
B. Report network congestion
C. Both band d
D. Report availability of remote hosts
Answer» C. Both band d
discuss
755.
assigns a unique number to each IP network adapter
called the MAC address.
A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Both B and C above
Answer» A. Media Access Control
discuss
756.
Piconets in the blue tooth a minimum of two and
amaximum of Bluetooth peer devices.
A. five
B. eight
C. nine
D. four
Answer» B. eight
discuss
757.
Dynamic addressing doesn’t allow many devices To share
limited address space on a network
A. True
B. False
C. none
D. other
Answer» B. False
discuss
762.
When computers in a network listen and receive the
signal, it is termed as active toplogy
A. True
B. False
C. none
D. other
Answer» A. True
discuss
765.
ALL IP addresses are divided into a network address and
host address
A. True
B. False
C. none
D. other
Answer» A. True
discuss
766.
How can we examine the current routing tables in
command prompt?
A. using route start
B. using net start
C. using net stat
D. either a or b
Answer» C. using net stat
discuss
767.
Both ping and tracert are used to find If the computer is in
the network.
A. True
B. False
C. none
D. other
Answer» B. False
discuss
769.
MAC addressing works in data link layer while IP
addressing works in the network layer.
A. True
B. False
C. none
D. other
Answer» A. True
discuss
770.
A packet whose destination is outside the local TCP/IP
network segment is sentto the _.
A. File server
B. Default gateway
C. DNS server
D. DHCP server
Answer» B. Default gateway
discuss
772.
Which piece of information is not vital for a computer in a
TCP/IP network?
A. IP address
772.
Which piece of information is not vital for a computer in a
TCP/IP network?
B. Default gateway
C. Subnet Mask
D. DNS server
Answer» D. DNS server
discuss
773.
The physical layer is concerned with the movement of over
the physical medium.
A. programs
B. dialogs
C. protocols
D. Bits
Answer» D. Bits
discuss
774.
Which protocol below operates at the network layer in the
OSI model?
A. IP
B. ICMP
C. RARP
D. All of the above
Answer» D. All of the above
discuss
775.
In the OSI model, as a data packet moves from the lower
to the upper layers, headers are .
A. added
B. removed
C. rearranged
D. Modified
Answer» B. removed
discuss
778.
Which one of the following functionalities aren’t provided
by TCP?
A. Flow control
B. Addressing
C. Retransmission of packets as required
D. Proper sequencing of the packets
Answer» B. Addressing
discuss
779.
Which of the following can be an Ethernet physical
address?
A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. none of the above
Answer» C. 07:01:02:01:2C:4B
discuss
782.
Which of the IP headers decides when the packet should
be discarded?
A. Fragment control
B. TTL
C. Checksum
D. Header length
Answer» B. TTL
discuss
784.
What is the network ID for a computer whose IP address
is190.148.64.23?
A. 190
B. 190.148
C. 190.148.64
D. None of the above
Answer» B. 190.148
discuss
255.255.255.192?
A. 62
B. 126
C. 192
D. 254
Answer» A. 62
discuss
789.
Which of the followings is not a direct implication of
subnet masks in TCP/IP networks?
A. Reduce network traffic
B. Increase network security
C. Assignment of more IP addresses
D. Better network management
Answer» C. Assignment of more IP addresses
discuss
790.
In the layer hierarchy as the data packet moves from the
upper to the lower layers, headers are
A. Added
B. Removed
C. Rearranged
D. Modified
Answer» A. Added
discuss
792.
Communication between a computer and a keyboard
involves transmission.
A. Automatic
B. Half-duplex
C. Full-duplex
D. Simplex
Answer» D. Simplex
discuss
795.
Communication channel is shared by all the machines on
the networkin
A. Broadcast network
B. Unicast network
C. Multicast network
D. Anycast network
Answer» A. Broadcast network
discuss
796.
A is a device that forwards packets between networks by
processing the routing information included in the packet.
A. Bridge
B. Firewall
C. Router
D. Hub
Answer» C. Router
discuss
798.
Which of the following networks extends a private
network across public networks?
A. Local area network
B. Virtual private network
C. Enterprise private network
D. Storage area network
Answer» B. Virtual private network
discuss
800.
Which of the following layers is an addition to OSI model
when compared with TCP IPmodel?
A. Application layer
B. Presentation layer
C. Session layer
D. Session and Presentation layer
Answer» D. Session and Presentation layer
802.
Delimiting and synchronization of data exchange is
providedby
A. Application layer
B. Session layer
C. Transport layer
D. Link layer
Answer» B. Session layer
discuss
803.
In OSI model, when data is sent from device A to device B,
the 5th layer to receive data at B is
A. Application layer
B. Transport layer
C. Link layer
D. Session layer
803.
In OSI model, when data is sent from device A to device B,
the 5th layer to receive data at B is
Answer» D. Session layer
discuss
804.
In TCP IP Model, when data is sent from device A to
device B, the 5th layer to receive data at B is
A. Application layer
B. Transport layer
C. Link layer
D. Session layer
Answer» A. Application layer
discuss
805.
Which layer is used to link the network support layers and
user supportlayers?
A. Session layer
B. Data link layer
C. Transport layer
D. Network layer
Answer» C. Transport layer
discuss
807.
Which Project 802 standard provides for a collision-free
protocol?
A. 802.2
B. 802.3
C. 802.5
D. 802.6
Answer» C. 802.5
discuss
808.
The protocol data unit (PDU) for the application layer in
the Internet stack is
A. Segment
B. Datagram
C. Message
D. Frame
Answer» C. Message
discuss
810.
Which of the following services is not provided by wireless
access point in 802.11 WLAN?
A. Association
B. Disassociation
C. Error correction
D. Integration
Answer» C. Error correction
discuss
818.
The combination of an IP address and a port number is
known as.
A. network number
B. socket address
C. subnet mask number
D. MAC address
Answer» B. socket address
discuss
821.
Which of the following is not associated with the session
layer?
A. Dialog control
B. Token management
C. Semantics of the information transmitted
D. Synchronization
Answer» C. Semantics of the information transmitted
discuss
822. The Internet Control Message Protocol (ICMP)
A. allows gateways to send error a control messages to other gateways or hosts
provides communication between the Internet Protocol Software on one machine and the
B.
Internet Protocol Software on another
reports error conditions to the original source, the source must relate errorsto individual
C.
application programs and take action to correct the problem
D. All of the above
Answer» A. allows gateways to send error a control messages to other gateways or hosts
discuss
another?
A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» C. SMTP
discuss
825.
Which of the following device is used to connect two
systems, especiallyif the systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
Answer» C. gateway
discuss
828.
When and where RARP is used intentionally or
effectively?
At the time of network booting where no space to store IP address (or diskless network) for
A.
address resolution.
B. In broadcasting to get IP address of Network.
C. To get the access in private network whenever it is required.
D. None of the above.
Answer» A. At the time of network booting where no space to store IP address (or diskless
network) for address resolution.
discuss
829.
Which one of the following routing algorithm can be used
for network layer design?
A. shortest path algorithm
B. distance vector routing
C. link state routing
D. all of the mentioned
Answer» D. all of the mentioned
discuss
830.
A subset of a network that includes all the routers but
contains no loopsis called:
A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» A. spanning tree
discuss
833.
An endpoint of an inter-process communication flow
across a computer network is called:
A. socket
B. pipe
C. port
D. none of the mentioned
Answer» A. socket
discuss
837.
The translates internet domain and host names to IP
address.
A. domain name system
B. routing information protocol
C. network time protocol
D. internet relay chat
Answer» A. domain name system
discuss
838.
When displaying a web page, the application layer uses
the:
A. HTTP protocol
B. FTP protocol
C. SMTP protocol
D. none of the mentioned
Answer» A. HTTP protocol
discuss
846.
Which organization has authority over interstate and
international commerce in the communications field?
A. ITU-T
B. IEEE
C. FCC
D. ISOC
Answer» C. FCC
discuss
849.
The performance of a data communication network
depends on
A. The number of users
B. The transmission media
C. The hardware and software
D. All of the above
Answer» D. All of the above
discuss
851.
The process of keeping addresses in memory for future
use is called
A. Routing
B. Resolving
C. Caching
D. None of the above
Answer» C. Caching
discuss
852.
A small network making up the Internet and also having a
small numbers of computers within it is called
A. Host
B. Address
C. Subdomain
852.
A small network making up the Internet and also having a
small numbers of computers within it is called
D. None of the above
Answer» C. Subdomain
discuss
853.
If a file consisting of 50,000 characters takes 40 seconds to
send, then the data rate is .
A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» D. 10 kbps
discuss
854.
In CRC there is no error if the remainder at the receiver is
.
A. equal to the remainder at the sender
B. zero
C. nonzero
D. the quotient at the sender
Answer» B. zero
discuss
856.
Sending a file from your personal computer's primary
memory or disk to another computer is called
A. uploading
B. downloading
C. logging on
D. hangs on
Answer» A. uploading
discuss
857. FDDI is a
A. ring network
B. star network
C. mesh network
D. bus based network
Answer» A. ring network
discuss
868.
Which utility is an all-purpose tool for troubleshooting
TCP/IP problems?
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
Answer» C. PING
discuss
875. What operates in the Data Link and the Network layer?
A. NIC
B. Bridge
C. Brouter
D. Router
Answer» C. Brouter
discuss
877.
Which of the following network access standard is used for
connecting stations to a circuit-switched network?
A. X.3
B. X.21
C. X.25
D. X.75
Answer» B. X.21
discuss
878.
In OSI model, which of the following layer provides error-
free delivery of data?
A. Data link
B. Network
C. transport
D. Session
Answer» C. transport
discuss
879.
To avoid transmission errors, a check figure is calculated
by the
A. transmitting computer
B. receiving computer
C. both (a) and (b)
D. Start and stop bit
Answer» C. both (a) and (b)
discuss
886.
What OSI layer handles logical address to logical name
resolution?
A. Transport
B. Physical
C. Presentation
D. Data Link
Answer» A. Transport
discuss
890.
In the slow start phase of the TCP congestion control
algorithm, the size of the congestion window
A. does not increase
B. increases linearly
C. increases quadratically
D. increases exponentially
Answer» D. increases exponentially
discuss
891.
What is the maximum size of data that the application
layer can pass on to the TCP layer below?
A. Any size
B. 2^16 bytes-size of TCP header
C. 2^16 bytes
D. 1500 bytes
Answer» A. Any size
discuss
that A transmits gets lost (but no acks from B ever get lost),
then what isthe number of packets that A will transmit for
sending the message to B?
A. 12
B. 14
C. 16
D. 18
Answer» C. 16
discuss
of byte because
A. Receiver is to be synchronized for byte reception
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
C. Padded bits are useful in parity computation
D. None of these
Answer» A. Receiver is to be synchronized for byte reception
discuss
899.
Which of the following statements is FALSE regarding a
bridge?
A. Bridge is a layer 2 device
B. Bridge reduces collision domain
C. Bridge is used to connect two or more LAN segments
D. Bridge reduces broadcast domain
Answer» D. Bridge reduces broadcast domain
discuss
In a packet switching network, if the message size is 48
900.
bytes and each packet contains a header of 3 bytes. If 24
packets are required to transmit the message, the packet
size is .
A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Answer» D. 5 bytes
903.
The physical layer translates logical communication
requestsfrom the into hardware specific operations.
A. Data link layer
B. Network layer
C. Transport layer
D. Application layer
Answer» A. Data link layer
discuss
908.
is the multiplexing technique that shifts each signal to a
different carrierfrequency.
A. FDM
B. TDM
C. Both FDM & TDM
D. PDM
Answer» A. FDM
discuss
909.
If link transmits 4000frames per second, and each slot has
8 bits, the transmission rate of circuit this TDM is
A. 32kbps
B. 500bps
C. 500kbps
D. 32bps
Answer» A. 32kbps
discuss
910.
If there are n signal sources of same data rate, then the
TDMlink has slots.
A. N
B. n/2
C. n*2
D. 2n
Answer» A. N
discuss
911. The state when dedicated signals are idle are called
A. Death period
B. Poison period
C. Silent period
D. Stop period
Answer» C. Silent period
discuss
914.
The time required to examine the packet’s header and
determine where to direct the packetis part of
A. Processing delay
B. Queuing delay
C. Transmission delay
D. Propagation delay
Answer» A. Processing delay
discuss
917.
Which of the following delay is faced by the packet in
travelling from one end system toanother?
A. Propagation delay
B. Queuing delay
C. Transmission delay
917.
Which of the following delay is faced by the packet in
travelling from one end system toanother?
D. All of the mentioned
Answer» D. All of the mentioned
discuss
message queues.
A. True
B. False
Answer» A. True
discuss
921.
Transport layer of OSI model lies between Network and
___________ layer
A. Application
B. Data link
C. Session
D. Presentation
Answer» C. Session
discuss
922. IP4 is more commonly used than IPv6?
A. True
B. False
Answer» A. True
discuss
923. From the options below, which suits best for MODEM?
A. a device that modulates an analog carrier signal to encode digital information
B. a device that modulates a digital carrier signal to encode analog information
C. a device that modulates an analog carrier signal to decode digital information
D. a device that modulates a digital carrier signal to decode analog information
Answer» A. a device that modulates an analog carrier signal to encode digital information
discuss
924.
A network point that provides entrance into another
network is called as ___________
A. Node
B. Gateway
C. Switch
D. Router
Answer» B. Gateway
discuss
926.
A stream socket provides _________ communications
between a client and a server
A. One way
B. Two way
Answer» B. Two way
discuss
928.
__________ is a standard suite of protocols used for packet
switching across computer networks.
A. x.22
B. x.23
C. x.25
D. x.26
Answer» C. x.25
discuss
930.
_______ assigns a unique number to each IP network
adapter called the MAC address.
A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Both B and C above
Answer» A. Media Access Control
discuss
931.
Piconets in the blue tooth a minimum of two and a
maximum of ____________ Bluetooth peer devices.
A. five
B. eight
C. nine
D. four
Answer» B. eight
discuss
932.
Dynamic addressing doesn’t allow many devices To share
limited address space on a network
A. True
B. False
Answer» B. False
discuss
935.
When computers in a network listen and receive the
signal, it is termed as active toplogy
A. True
B. False
Answer» A. True
discuss
938.
Both ping and tracert are used to find If the computer is in
the network.
A. True
B. False
Answer» B. False
discuss
940.
MAC addressing works in data link layer while IP
addressing works in the network layer.
A. True
B. False
Answer» A. True
discuss
941.
A packet whose destination is outside the local TCP/IP
network segment is sent to the ___ _.
A. File server
B. Default gateway
C. DNS server
D. DHCP server
941.
A packet whose destination is outside the local TCP/IP
network segment is sent to the ___ _.
Answer» B. Default gateway
discuss
942.
The physical layer is concerned with the movement of
_______ over the physical medium.
A. programs
B. dialogs
C. protocols
D. Bits
Answer» D. Bits
discuss
943.
In the OSI model, as a data packet moves from the lower
to the upper layers, headers are _______.
A. added
B. removed
C. rearranged
D. Modified
Answer» B. removed
discuss
947.
What is the network ID for a computer whose IP address
is 190.148.64.23?
A. 190
B. 190.148
C. 190.148.64
D. None of the above
Answer» B. 190.148
discuss
949.
The combination of an IP address and a port number is
known as ___________.
A. network number
B. socket address
C. subnet mask number
D. MAC address
Answer» B. socket address
discuss
950. The Internet Control Message Protocol (ICMP)
A. allows gateways to send error a control messages to other gateways or hosts
provides communication between the Internet Protocol Software on one machine and the
B.
Internet Protocol Software on another
reports error conditions to the original source, the source must relate errors to individual
C.
application programs and take action to correct the problem
D. All of the above
Answer» D. All of the above
953.
Which of the following device is used to connect two
systems, especially if the systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
Answer» C. gateway
discuss
_______ can detect burst error of length less than or equal
954. to degree of the polynomial and detects burst errors that
956.
A subset of a network that includes all the routers but
contains no loops is called:
A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» A. spanning tree
discuss
957.
An endpoint of an inter-process communication flow
across a computer network is called:
A. socket
B. pipe
C. port
D. none of the mentioned
Answer» A. socket
discuss
958.
In an Ethernet local area network, which one of the
following statements is TRUE?
A. A station stops to sense the channel once it starts transmitting a frame.
The purpose of the jamming signal is to pad the frames that are smaller than the minimum
B.
frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retransmissions
Answer» D. The exponential back off mechanism reduces the probability of collision on
retransmissions
discuss
959.
A small network making up the Internet and also having a
small numbers of computers within it is called
A. Host
B. Address
C. Subdomain
D. None of the above
Answer» C. Subdomain
discuss
960.
If a file consisting of 50,000 characters takes 40 seconds to
send, then the data rate is __________.
A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» D. 10 kbps
discuss
961.
In CRC there is no error if the remainder at the receiver is
_____.
A. equal to the remainder at the sender
B. zero
C. nonzero
D. the quotient at the sender
Answer» B. zero
discuss
962. A modulator converts a _____ signal to a(n) _____ signal.
A. FSK; PSK
B. PSK; FSK
C. analog; digital
D. digital; analog
Answer» C. analog; digital
discuss
963.
ASK, PSK, FSK, and QAM are examples of _____
encoding.
A. digital-to-digital
B. digital-to-analog
C. analog-to-analog
D. analog-to-digital
Answer» B. digital-to-analog
discuss
964.
With an IP address of 201.142.23.12, what is your default
subnet mask?
A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer» D. 255.255.255.0
discuss
968.
Which of the following system calls results in the sending
of SYN packets?
A. socket
B. bind
C. listen
D. connect
Answer» D. connect
discuss
969.
What is the maximum size of data that the application
layer can pass on to the TCP layer below?
A. Any size
B. 2^16 bytes-size of TCP header
C. 2^16 bytes
D. 1500 bytes
Answer» A. Any size
discuss
Station A needs to send a message consisting of 9 packets to
Station B using a sliding window (window size 3) and go-
back-n error control strategy. All packets are ready and
970. immediately available for transmission. If every 5th packet
that A transmits gets lost (but no acks from B ever get lost),
then what is the number of packets that A will transmit for
sending the message to B?
A. 12
B. 14
C. 16
D. 18
Answer» C. 16
discuss
974.
How many digits of the DNIC (Data Network
Identification Code) identify the country?
A. First three
B. First four
C. First five
D. First six
Answer» A. First three
discuss
976.
Which of the following device is used to connect two
systems, especially if the systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
Answer» C. gateway
discuss
_______ can detect burst error of length less than or equal
977. to degree of the polynomial and detects burst errors that
979.
In an Ethernet local area network, which one of the
following statements is TRUE?
A. A station stops to sense the channel once it starts transmitting a frame.
The purpose of the jamming signal is to pad the frames that are smaller than the minimum
B.
frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retr
Answer» A. A station stops to sense the channel once it starts transmitting a frame.
discuss
982.
Sending a file from your personal computer's primary
memory or disk to another computer is called
A. uploading
B. downloading
C. logging on
D. hangs on
Answer» A. uploading
discuss
984.
In the slow start phase of the TCP congestion control
algorithm, the size of the congestion window
A. does not increase
B. increases linearly
C. increases quadratically
D. increases exponentially
Answer» D. increases exponentially
discuss
of byte because
A. Receiver is to be synchronized for byte reception
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
C. Padded bits are useful in parity computation
D. None of these
Answer» A. Receiver is to be synchronized for byte reception
discuss