(CS 610 – Computer Network) Solved Quiz No 2

4
184

 

_____ of TCP/IP layering model, corresponds to basic network hardware.

· Physical Layer 

· Network Interface Layer

· Internet Layer

· Transport Layer

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

· Physical Layer

· Network Interface Layer

· Internet Layer

· Transport Layer 

 

________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.

· IP

· UDP 

· TCP

· None of the given

____________ uses distance vector approach to define routing

· BGP

· OSPF

· RIP 

· None of the given

_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

· Flood-and -Prune 

· Configuration-and -Tunneling

· Core-Based Discovery

· None of the given

Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source address

· 3

· 2

· 1

· 0 

 

Protocol addresses are abstractions provided by ___________.

· hardware

· software 

· internet

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

· True 

· False

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

· 32, 48 

· 24, 32

· 32, 64

· 32, 128

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.

· False

· True 

In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were “T” stands for Table lookup, “C” for Closed-form Computation and “D” for Data Exchange?

· T

· D

· C 

· T, C

Which method of Address Resolution Protocol is useful with any hardware?

Were “T” stands for Table lookup, “C” for Closed-form Computation and “D” for Data Exchange?

· T 

· C

· D

· C, D

In which method of Address Resolution Protocol the implementation is more difficult?

Were “T” stands for Table lookup, “C” for Closed-form Computation and “D” for Data Exchange?

· T, C

      · T

· C

· D 

Which method of Address Resolution Protocol resolution with minimum delay?

Were “T” stands for Table lookup, “C” for Closed-form Computation and “D” for Data Exchange?

· T, D

· c

· T

· T, C 

The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.

· True 

· False

To save traffic, an EGP does not summarize routing information from the autonomous system before passing it to another autonomous system.

· True

· False 

————- was especially concerned about the lack of high powered computers.

· IEEE

· APRA (wrong spelling)

· EIA

· None 

Missing eot indicates sending computer crashed in frame format.

· True 

· False

The ————-term refers to the general concept of a small block of data.

· Packets 

· Data

· Frame

· None of given

CRC can detect more errors than a simple checksum.

· True 

· False

The network that uses a ————-, usually consist of a single long cable to which computer attach.

· Star topology

· Bus topology 

· Ring topology

· None of the given

LAN that use ATM technology have a ————-

· Star topology

· Bus topology

· Ring topology

· None of the given 

————— has a jitter zero

· Virtual Private Network

· Isochronous Network 

· Asynchronous Network

· None of the given

The network with Throughput T and Delay D has a total ————— bits in transit at a time.

· D + T

· D – T

· D X T 

· D / T

One repeater —————, two repeaters ————— the maximum cable length limitation.

· Double, triple 

· Double, 4 time

· half, triple

· Double, half

End-to-end delivery service is connection oriented.

· True

· False 

A single networking technology is best for all needs.

· True

· False 

Twice NAT allows a site to run servers.

· True 

· False

________ device is used for multicasting.

· Hub

· Switch

· Router 

· none of the given

___________ does not depend on any particular unicast routing protocol.

· PIM-DM

· PIM-SM 

· PIM-AM

· none of the given

A routing table contains_______

· The destination network ID

· The hop count to reach the network

· The router ID of the next hop 

· All of the given

_______ can be used to propagate information about remote networks.

· Dynamic routing 

· Static routing

· Address resolution

· None of the given

________ protocol is designed to use within an organization.

· OSPF

· MEOSPF

· MOSPF 

· none of the given

NAPT stands for ________________

· Network Address and Protocol Translation

· Network Address and Port Translation 

· Network Address and Packet Translation

· None of the given

In dynamic routing, the routing table is initialized when system boots.

· True 

· False

OPPF includes ________ address mask with each address.

· 30Bit

· 32Bit 

· 34Bit

· none of the given

Twice NAT fails if an application uses the IP addresses instead of Domain Name.

· True 

· False

_________ uses window mechanism to control the flow of data.

· IP

· UDP

· TCP 

· none of the given

TCP uses _______ mechanism to control the flow of data.

· door

· window 

· acknowledgment

· retransmission

IGPs stand for _________

· Internal Gateway Protocols

· Interior Gateway Protocols 

· Intermediate Gateway Protocols

· None of the given

________ protocol uses distance vector algorithm.

· IGP

· BGP

· RIP 

· none of the given

__________measures distance in network hops, where each network between the source and destination counts as single hop.

· BGP

· OSPF

· RIP 

· Non of these

Network Address Translation (NAT) requires device to perform packet translation.

· True 

· False

We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

· routing path

· routing metric 

· routing

· switching

Part of the 3-way handshake used to create a connection, requires each end to generate a random _____ sequence number.

· 32 bit 

· 16 bit

· 8 bit

· 64 bit

Reconstruction of original datagram is called reassembly.

· True 

· False

Reliability is the responsibility of the ______ layer.

· Transport 

· Network

· Physical

· Internet

_______    is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

· Flood-and -Prune 

· Configuration-and -Tunneling

· Core-Based Discovery

· None of the given

In Direct point to point communication adding the Nth computer requires———— new connections.

· None of the given

· N2

· N-1 

· (N2 –N)/2

The number of connections needed for N computer in direct point to point communication is equal to:

· (N2-N)/2 

· N(N-1)

· N2

· None of the given

Hardware that calculates a CRC uses two simple components.

· AND unit and XOR unit

· Shift register and XOR unit 

· Shift register and AND unit

· None of the given

The Gigabit Ethernet hardware operates at a rate of ——–

· 10 Mbps

· 100 Mbps

· 1000 Mbps 

· None of the given

________ computes shortest paths in a graph by using weights on edges as a measure of distance.

· Greedy algorithm

· Distance vector algorithm

· Dijksta’s algorithm 

· Non of the given

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

· Connectionless service paradigm 

· Connection-oriented service paradigm

· Both Connectionless and Connection-oriented service paradigm

· None of the given

An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host

· 48-bit

· 32-bit 

· 24-bit

· None of the given

The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.

· prefix , suffix 

· suffix , prefix

· suffix , suffix

· None of the given

___________ places the boundary between the first and second octets

· Class A 

· Class B

· Class C

· Class D

___________ places the boundary between the second and third octets.

· Class A

· Class B 

· Class C

· Class D

___________ places the boundary between the third and fourth octets.

· Class A

· Class B

· Class C 

· Class D

________ field of header indicates whether a datagram is a fragment or a complete datagram.

· FLAGS 

· FLAGMENT OFFSET

· IDENTIFICATION

· None of the given

______ provides connectionless service.

· TCP

· UDP 

· IP

· None of the given

UDP and TCP are both_________ layer protocols

· Physical

· Data link

· Network

· Transport 

________identifies which application program on receiving computer should receive the data

Logical address

· Source port

· Source port 

· Destination Port 

· None of the given

________ identifies the application program that sent the data.

· Destination Port 

· Source port 

· Logical address

· None of the given

The Border Gateway Protocol (BGP) uses_________ for all communication

· UDP

· TCP 

· Both UDP and TCP

· None of the given

Which of the following protocols allows the sender and receiver to enforce polices.

· RIP

· OSPF

· BGP 

· RIP and OSPF

ICMP message transport is acted upon by getting ICMP encrypted in IP.

· True

· False 

These ICMP message transport is acted upon ________ as frames on ______

· Intranet, LAN

· Internet, WAN

· Intranet, WAN

· Internet, LAN 

Address mask defines how many bits of address are in suffix?

· True

· False 

A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?

· True 

· False

The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.

· itself 

· prefix

· suffix

· mask

Find the class of the address:

11110011 10011011 11111011 00001111

· A

· C

· E 

· B

 

 

4 COMMENTS

  1. It is appropriate time to make some plans for the future and it’s time to be happy.

    I’ve read this post and if I could I desire to
    suggest you few interesting things or suggestions. Perhaps you
    could write next articles referring to this article.
    I want to read more things about it!

  2. Good day! I know this is kinda off topic but I was wondering if you knew where I could locate a captcha plugin for my comment form?
    I’m using the same blog platform as yours and I’m having difficulty finding
    one? Thanks a lot!

  3. Hey I know this is off topic but I was wondering if you knew of any widgets I could add to my blog that automatically tweet my newest twitter updates.
    I’ve been looking for a plug-in like this for quite some time and was hoping maybe you
    would have some experience with something like this.
    Please let me know if you run into anything. I truly enjoy reading your
    blog and I look forward to your new updates.

LEAVE A REPLY

Please enter your comment!
Please enter your name here