CS 610 SOLVED QUIZ MEGA FILE FINAL TERM

2
232

CS 610 SOLVED QUIZ MEGA FILE FINAL TERM

  On of the design goals for unicast route propagation is __________.
a. Consistency
b. inconsistency
c. stability 
d. Dynamic addressing

 

2.      Propagation multicast routing information differs dramatically from unicast route propagation?
a. True 
b. False

 

3.      In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
a. Any cast 
b. Unicast
c. Multicast
d. Non of the given
 
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
Unicast
Anycast
Multicast 
Non of the given
 
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
True 
False
 
The time for acknowledgement to arrival of packet depends on.
Distance to destination and Current traffic conditions 
Current traffic conditions
Distance to destination
non of these

Cost, effort, risks, and resources are the factors included in——–
Estimation 
Testing
Development
Maintenance
 
There are _______ possibilities to detect the destination using Trace-route
1
2 
3
None of the given
 
_______ is used for single destination computer.
Multicast
Broadcast
unicast 
none of the given
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
16-bit
48-bit 
64-bit
128-bit
 
Which is not the type of error messages defined by ICMP.
Source quench
Time exceeded
Destination unreachable
none of the given 

End to End delivery Service of IP datagram is _____
Connection oriented
Connectionless 
both a and b
none of the given
 
________ is a type of address used for collection of computers with same prefix.
Cluster 
unicast
Multicast
none of the given
IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram’s larger than network
Destination
Intermediate routers
Source 
Medium
 
_______ Source is responsible for fragmentation.
IPV4
IPV6 
 
________ message is sent in response to incoming datagrams with problems.
TCP/IP
IGMP
ICMP 
none of the given

________ field is used to identify a specific path through the network
FLOW LABEL
TRAFFIC CLASS
Both a and b 
none of the given
 
Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction & operating system independent are the characteristics of ___________________
TCP
UDP 
IP
None of the given
 
The process of using a routing table to select a next hop for a given datagram is called __________.
Encapsulation
Reassembling
Routing or forwarding 
None of the given
 
A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called __________
Distance Vector Multicast Routing Protocol (DVMRP)
Core Based Tree (CBT) 
Protocol Independent Multicast Sparse Mode (PIM-SM)
Protocol Independent Multicast Dense Mode (PIM-DM)
 
Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.
postfix, Infix
non of these
Infix, prefix
prefix, suffix 

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________
None of the given
TCP 
UDP
IP
 
_____ Protocol provides error reporting mechanism.
IGMP
SNMP
ICMP 
none of the given
 
________ encapsulates IP datagram as data area in hardware frame.
Network Interface Layer 
Datalink Layer
Network Layer
None of the given
 
TTL stands for __________
Time to Learn
Time to Leave
Time to Live 
none of the given
 
______ layer Provides reliable delivery of datagram.
Network
Transport 
Datalink
none of the given
 
Which protocol is used to test different tools.
ICMP 
IGMP
TCP/IP
none of the given
 
Routers use _______ to forward datagrams along prearranged path.
Traffic class
Flow label 
Destination address
none of the given
 
NEXT HEADER field in the base header defines type of header it appears at the end of fixed-size base header.
TRUE 
FALSE
 
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.
Least
Maximum 
Fragment
Frame
 
Postfix defines how much of address used to identify network.
TRUE
FALSE 
 
______ contains all information needed to deliver datagram to the destination.
Header

 

The Source can configure outgoing datagram’s to avoid _________
Segmentation
Defragmentation
Fragmentation 
None of the given
 
The Current version of IP-Version 4 is _____ old
18 years
20 years 
22 years
none of given
 
The Header format of IPv6 is entirely different.
TRUE 
FALSE
 
_______ shows senders preference for low latency, high Reliability.
TYPE
SERVICE TYPE 
SERVICE PRIORITY
None of the given
 
The Network Layer Protocol ICMP stands for____________
Instant Control Message Protocol
Internet Control Message Protocol 
Initial Control Message Protocol
None of the given
 
IPV6 address consists of ________
32 Bits
64 Bits
128 Bits 
none of the given
 
_______ is a technique used to Limit datagram size to small MTU of any network
Segmentation
Fragmentation 
Encapsulation
none of the given
 
ICMP message transport is acted upon by getting ICMP _________ in IP.
De-encapsulated
Encapsulated 
Segmented
none of the given
 
IETF stands for _____________
Internet Engineering Task Force 
Internal Efficient Task Force
Internet Engineering Technical Force
none of the given
 
Which of the following protocols provide the routing information at the autonomous system level?
BGP 
OSPF
RIP
OSPF and RIP
 
A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication.
Unicast
Multicast 
Broadcast
Unicast & Multicast
 
_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted.
RIP
OSPF 
BGP
None of the given
 
In TCP when a computer sends a segment, the__________ and _______ fields refer to incoming data.
ACKNOWLEGE NUMBER, WINDOW 
SEQUENCE NUMBER, WINDOW
ACKNOWLGEGE NUMBER, SEQUENCE NUMBER
None of the given
 
_________ is used to attach two autonomous systems.
BGP
IGP
EGP 
none of the given
 
Routing inserts or changes values in _______
MAC address
routing table 
both (a) and (b)
None of the given
 
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
True
False 
 
Each autonomous system used to communicate among autonomous systems by chooses an IGP.
True
False 
 
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
True 
False
 
The computer uses _________ to inform Local router about the last application when it leaves.
ICMP
IGMP 
SNMP
None of the given
 
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
96 
100
120
none of the given
 
For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
Efficiency 
Security
Accuracy
Anomalies
 
Class A mask is 255.0.0.0 which is used for ______
Unicasting
Multicasting
Subnetting 
All of the given
 
When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.
True
False 

Which one of these is not a main feature of connectionless service:

It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.

Mapping between a protocol address and a hardware address is called Address Resolution.

 

True

 

To reduce network traffic, ARP software extracts and saves the information from a response so that it can be used for subsequent packets.ARP manages the Table as a cache short-term storage.

 

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
  

  32, 48

 

Address mask defines how many bits of address are in

 

 prefix.

 

A datagram cannot be larger than ______ of a
network over which it is sent. 

 

IP header

 

________ field of header indicates whether a datagram is a fragment or a complete datagram.
    

   FLAGS 

 Base header is fixed size i.e. 

 

40 octets

 

 In IPv6 the type of address used for collection of computers with same prefix. Are known as 

 

 Non of the given

 

Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary interaction and operating system independent are the characteristics of _____________

 UDP


application-to-application communication and end-to-end communication.
is

 

 TRANSPORT PROTOCOLS

 

IPV6 addresses are

 

128 bits.

 

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
     

Transport Layer

 

the 3-way handshake used to create a connection, requires each end to
generate a random 

 

32-bit sequence number.

 

________identifies which application program on receiving computer should receive the data

Destination Port

 

In TCP when a computer sends a segment, the__________ and _______ fields refer to incoming data.

ACKNOWLEGE NUMBER, WINDOW

 

 A popular use of _____ is TCP Splicing. It interconnects two independent TCP
connections and performs segment rewriting.

 

 NAPT

 

_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

 Flood-and –Prune

 

_________ performs local multicast and uses IP-in-IP encapsulation to send
multicast datagrams from one site on the Internet to another.

 

Distance Vector Multicast Routing Protocol

 

We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

routing

 

We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

 

routing (Computer Networks and Internets,

 

NAT is not useful at a residence with Cable Modem or DSL connectivity.

True

False

 

 

_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted.

 

RIP

OSPF

BGP

None of the given

 

NAPT stands for ________________

 

Network address and protocol translation

Network address and port translation

Network address and packet translation

None of the given

 

Which of the following are interior routing protocols?

 

RIP

OSPF

BGP

RIP and OSPF

 

NAT stands for ____________

 

Network address translation

Network address transmission

Network address test

None of the given

 

In IP routing, forwarding refers to ______ transfer.

Packet

Datagram

Message

None of the given

 

Basic NAT does not work well for communication initiated from the Internet.

 

True

False

 

To save traffic, an EGP does not summarize routing information from the autonomous system before passing it to another autonomous system

 

True

False

 

OSPF is based on——–

 

Distance vector routing

Link state routing

Path vector routing

Distance vector and link state routing

 

The Border Gateway Protocol (BGP) uses_________ for all communication

UDP

TCP

UDP and TCP

None of the given

 

________ identifies the application program that sent the data.

 

Destination

Source port

 Logical address

None of the given

 

_______ can be used to propagate information about remote networks

 

Dynamic routing

Static routing

Address resolution

None of the given

 

Which of the following protocol uses UDP for all message transmission?

 

OSPF

BGP

RIP

BGP AND RIP

 

OSPF stands for __________

Open Source Path First Protocol

Open shortest path first

Open Secure Path First Protocol

open shortest path first

 

 

_________ is a current version of BGP.

2

3

4

None of these

 

OSPF does’nt allows a router to introduce routes learned from another means.

 

True

False

 

Source is responsible for fragmentation.

IPV4
IPV6

IPV6 address consists of ________

32 Bits
64 Bits
128 Bits
none of the given

EGPs stand for ________.

Exterior Gateway Protocols

External Gateway Protocols

Extra Gateway Protocols

None of the given

Twice NAT fails if an application uses the IP addresses instead of Domain Name.

true

false

NAT device stores state information in translation table.

true

false

________ protocol uses three way handshake to begin a connection.

UDP

TCP

IP

none of the given

In 3-way handshake TCP requires to generate a random ________ sequence number.

30 bit

32 bit

34 bit

none of the given

________ is less complex and easy to understand.

TCP

UDP

IP

None of the given

Fragmentation when using ICMP for path MTU should be avoided.

true

false

________ sends ICMP echo messages with increasing TTL.

Ping

Trace route

Tracert

none of the given

________ Source is responsible for fragmentation.

IPV4

IPV6

IPV6 128 bits address includes network prefix and ________

Host Suffix

Host prefix

Source Prefix

none of the given

Due to revolutionalization of IP-V6 the speed has increased from ________.

56kbps to 512kbps

512kbps to 1gbps

56kbps to 1gbps

none of the given

________ encapsulates IP datagram as data area in hardware frame.

Network Interface Layer

Datalink Layer

Network Layer

None of the given

Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included:

Destination address

Source address

Rectifier

Other delivery information

The protocol address of the next hop must be _____________ to an equivalent hardware address before a packet can be sent.

Encrypted

Decrypted

Translated

Non of these

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.

true

false

Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.

8-bit

16-bit

32-bit

64-bit

________ places the boundary between the second and third octets

Class A

Class B

Class C

Class D

A ________ is a special-purpose computer dedicated to the task of interconnecting networks.

Router

Bridge

Switch

None of the given

VBR stands for __________.

Virtual Bit Rate

Virtual Byte Rate

Variable Byte Redundancy

Variable Bit Rate

Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.

true

false

Which of the following is called virtual channel?

Connection in VCI

Connection in ATM

Connection in virtual circuit

None of the above

How many methods exist for computing routing table?

5

4

3

2

Which of the following statement is true regarding ATM?

It is a single technology for voice, video and data.

It has low jitter and high capacity.

It uses fixed size, small cells, 48 octet’s data.

All of the above

An interior switch is one with wich ________.

Computers are attached.

No computer is attached.

Computers are attached internally.

None of the above.

Which of the following is not a benefit of Source Independence?

It allows fast and efficient routing.

Packet switch need not hove complete information about all destinations.

network functions even if topology changes.

None of the given

Which of the following is a benefit of source independence?

It allows fast and efficient routing.

Packet switch do not need to have complete information about all destinations

Network functions even if topology changes

All of the above

To span long distances or many computers, networks must replace shared medium with _________.

segment transformation

fiber optices

packet switches

None of the above

The physical addressing in a WAN is similar as in LAN in the way __________.

The data is transmitted in packets equivalent to frames.

Each packet has a format with header.

The packet header includes destination and source addresses.

All of the above

The maximum cable length of a LAN is ________.

Fixed

Unlimited

Fixed and Unlimited in different conditions

None of these

The mechanism extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _______ and bandwidth is very _______.

Low, High

High, Low

High, High

Low, Low

The third field of the header consists of ___________ bit Ethernet frame type.

48

32

16

8

LAN interface may use ________ to copy frame data directly from main memory.

DMA

FDDI

CSMA/CD

None of the given

When an application _________ data, it makes a copy of the data available to all other computers on the network.

Broadcasting

Multicasting

Unicasting

None of the given

The first automated tool required to see whether the given computer is online or not was

Probing program

PING program

status program

None of the above

The network occupies larger areas like cities & countries is called

LAN

WAN

MAN

All of the above

Frames include additional information to detect/correct errors are insert by ________.

Sender

Receiver

Network Devices

Sender and Receiver

SMDS is ________.

Connectionless service

Connection oriented service

Used for delivering blocks of data

None of the given

The topology each computer is connected to a central hub is called

Ring topology

Star topology

Tree topology

Mesh topology

If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each other at which speed they can communicate?

11 Megabit

100 Megabit

1 Gigabit

1.1 Gigabit

According to size, there are ________ classifications of networks.

2

3

4

5

We need packets rather than bits because ________.

To compress the data

Packets move faster

Sender and receiver need to coordinate to detect transmission errors.

Packets can only move between two terminals

According to a bridge performance, if both the source and destination are on the same segment.

It forwards the frame to the other segment

It does not forward the frame to the other segment

It does not forward the frame to the same segment

It forwards the frame to every other segment

CS 610 SOLVED QUIZ MEGA FILE FINAL TERM

________ is the most popular wiring scheme because of lowest cost.

5 Base T

10 Base T

100 Base T

1000 Base T

Point-to-point topology is

Size Based

Mobility Based

Connectivity Based

Medium Based

The recent executed instruction ________ in temporal aspect of the locality of reference.

won’t be executed soon

is temporarily not referenced

will be wxwcuted soon again

will be showing the final results

Even parity can be used to check for ________ bit/bits of errors.

1

2

3

0

________ is inflexible.

Routing

Searching

Processing

Static routing

The switch that has computers attached with it is called ________ switch.

Exterior

Interior

Packet

Front

________ cannot be extended arbitrarily far or to handle arbitrarily many computers.

WAN

LAN

MAN

LED

The length of time required to send a variable length packet is ________.

5 seconds

Variable

Constant

Fix

If a small set of bits changes near a specific location due to lighting or electric motor starting nearby, this type of errors are called ________.

Burst error

Vertical error

Parity Error

Single bit error

ATM header is about ________ of the cell.

100 %

10 %

20 %

50 %

In CSMA, if simultaneous transmission occurs, the ________ interfere with each other and this phenomenon is called collision.

Computers

Network

Frames

Cable wires

The ________ of errors is easier than the ________ of errors.

correction, detection

detection, correction

correction, creation

detection, manipulation

The sharing of a ________ among the workers in an office is a goal of resource sharing.

Mouse

Printer

Keyboard

Motherboard

       Frame relay is ________.

Connection oriented service

Connectionless service

It is typically ranges from 5Mbps to 1000Mbps

None of the given

________ is a measure of the rate at which data can be sent through the network.

Throughput

Propagation delay

Access delay

Switching delay

Which of the following remains same in the header of the packet in a datagram during the entire journey of the packet?

Source Address

Destination Address

Next Node Address

Checksum

Which of the following technologies can extend the diameter of LAN medium?

Fiber optic

Repeaters

Diameter of LAN medium is not extendable

Both Fiber Optic and Repeaters

SMDS is ________.

Connectionless service

Connection oriented service

Used for delivering blocks of data

None of the given

The information about ________ is kept in routing tables.

Entries

Destinations

Source

Packets

Physical Addressing is a WAN is similar to LAN as each packet has format with ________.

Header

Title

Frame

Address

Which of the following cannot be used to extend a LAN?

              Repeaters

              Switches

              Routers

     Fiber Modems

The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.

Djikstra

            Shortest path first

              Vector distance

             Distributed Spanning Tree

   Which of the following is not a guided medium?

           Twisted-pair cable                      

          Fiber-optic cable

           Atmosphere

           Coaxial cable

    Which multiplexing technique shifts each signal to a different carrier frequency?

          TDM                 

           FDM

           Both a and b

           None of the above

CS 610 SOLVED QUIZ MEGA FILE FINAL TERM

   

  ATM offers high speed and ________ delay.

            High                

             Low

             Moderate               

            All of the above

      NIC connection in a physical network is known as __________.

             LAN wiring scheme      

            WAN wiring scheme

           Color wiring scheme               

           None of above

_________ is used to attach two autonomous systems.

BGP
IGP
EGP

none of the given

Due to revolutionization of IP-V6 the speed has increased from _______

56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps

none of the given

 

Whenever it handles a packet, IP software needs to separate the destination address into a prefix.


True
False



TTL stands for __________

Time to Learn
Time to Leave
Time to Live
none of the given

IGPs stand for _________

Internal Gateway Protocols
Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given

_____________identifies which application program on receiving computer should receive the data

Logical address
Source port
Destination Port
None of the given

__________________encapsulates IP datagram as data area in hardware frame.

Network Interface Layer
Datalink Layer
Network Layer
None of the given

Class A mask is 255.0.0.0 which is used for ________________

Unicasting
Multicasting
Subnetting
All of the given

NAT is not useful at a residence with Cable Modem or DSL connectivity.

True
False

 

Autonomous System chooses a routing protocol to exchange routing information which is passed before being summarized to another group.


True
False

______ layer Provides reliable delivery of datagram.


Network
Transport
Datalink
none of the given

The process of using a routing table to select a next hop for a given datagram is called_________.

Encapsulation
Reassembling
Routing or forwarding
The process of learning the path MTU is known as path MTU discovery.

True
False

CS 610 SOLVED QUIZ MEGA FILE FINAL TERM

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes.

three
two
four
five

 

End to End delivery Service of IP datagram is _____:

Connection oriented
Connectionless
both a and b
none of the given

EGP stands for _________

Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.

True
False

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.

16-bit
48-bit
64-bit
128-bit


Reliability is not the responsibility of the Transport layer.

True
False 

 

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

96
100
120
none of the given

 NAT software does not allow a PC to connect with the Internet & act as a NAT device at the same time.

True
False


TCP uses the term segment to refer to a ________.

packet
message
both (a) or (b)
None of the given

 
          The Universal Datagram Protocol is a message-oriented protocol.

           True
           False


______________field tells the receiver how to order fragments within a given datagram.

FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given


IP datagram can contains ________ octets.

0-65,535
1-65,535
1-65,536
none of the given


      The amount of buffer space available at any time is called the window.


True
False
 


_______ Source is responsible for fragmentation.

IPV4
IPV6

CS 610 SOLVED QUIZ MEGA FILE FINAL TERM


Routers use _______ to forward datagrams along prearranged path.

Traffic class
Flow label
Destination address
none of the given


_______ protocol uses three way handshake to begin a connection.

UDP
TCP
IP
none of the given


Typical internet routing uses uses a combination of two metrics__________________.

routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count

 

Network Address and Port Translation (NAPT) is by far the most popular form of _______

Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given
 


The routers within an autonomous system use a _____________ to exchange routing information.
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) & Exterior Gateway protocol (EGPs)
None of the given


Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.

True
False 

 

The Network Layer Protocol ICMP stands for____________

Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given 

 

      The Current version of IP-Version 4 is _____ old
      a.18 years
      b.20 years
      c.22 years
      d. None of given


TCP is a connectionless and reliable transport protocol.

a. True
b. False

CS 610 SOLVED QUIZ MEGA FILE FINAL TERM

 Next Quiz

 

2 COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here