0% found this document useful (0 votes)
279 views28 pages

CN 2nd Unit MCQ 200

The document contains questions about IP protocol, IPv4 datagram fields, fragmentation, ICMP, wireless LANs, Bluetooth, Ethernet, and network switching methods. It tests knowledge of key concepts such as IP addressing classes, IPv4 header fields, fragmentation issues, ICMP message types, wireless networking standards and modes, Bluetooth profiles and operation, Ethernet frame format, and differences between circuit switching and packet switching.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
279 views28 pages

CN 2nd Unit MCQ 200

The document contains questions about IP protocol, IPv4 datagram fields, fragmentation, ICMP, wireless LANs, Bluetooth, Ethernet, and network switching methods. It tests knowledge of key concepts such as IP addressing classes, IPv4 header fields, fragmentation issues, ICMP message types, wireless networking standards and modes, Bluetooth profiles and operation, Ethernet frame format, and differences between circuit switching and packet switching.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

1. Which of the following is not applicable for IP?

a) Error reporting
b) handle addressing conventions
c) Datagram format
d) Packet handling conventions

2. Which of the following field in IPv4 datagram is not related to fragmentation?


a) Flags
b) Offset
c) TOS
d) Identifier

3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1

4. If the value in protocol field is 17, the transport layer protocol used is _____________
a) TCP
b) UDP
c) ICMP
d) IGMP

5. The data field cannot carry which of the following?


a) TCP segment
b) UDP segment
c) ICMP messages
d) SMTP messages

6. What should be the flag value to indicate the last fragment?


a) 0
b) 1
c) TTl value
d) Protocol field value

7. Which of these is not applicable for IP protocol?


a) Is connectionless
b) offer reliable service
c) offer unreliable service
d) does not offer error reporting

8. Which of the following demerits does Fragmentation have?


a) complicates routers
b) open to DOS attack
c) overlapping of fragments.
d) all of the mentioned

9. Which field helps to check rearrangement of the fragments?


a) Offset
b) flag
c) ttl
d) identifier

10. Which of these is not applicable for IP protocol?


a) Connectionless
b) Offer reliable service
c) Offer unreliable service
d) Does not offer error reporting

11. Which of the following demerits does Fragmentation have?


a) Complicates routers
b) Open to DOS attack
c) Overlapping of fragments
d) All of the mentioned

12. Which field helps to check rearrangement of the fragments?


a) Offset
b) Flag
c) TTL
d) Identifier

13. In classless addressing, there are no classes but addresses are still granted in ______
a) IPs
b) Blocks
c) Codes
d) Sizes

14. In IPv4 Addresses, classful addressing is replaced with ________


a) Classless Addressing
b) Classful Addressing
c) Classful Advertising
d) Classless Advertising

15. First address in a block is used as network address that represents the ________
a) Class Network
b) Entity
c) Organization
d) Codes

16. In classful addressing, a large part of available addresses are ________


a) organized
b) Blocked
c) Wasted
d) Communicated

17. Network addresses are a very important concept of ________


a) Routing
b) Mask
c) IP Addressing
d) Classless Addressing

18. Which of this is not a class of IP address?


a) Class E
b) Class C
c) Class D
d) Class F

19. Internet Control Message Protocol (ICMP) has been designed to compensate
_________
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned

20. Header size of the ICMP message is _________


a) 8-bytes
b) 8-bits
c) 16-bytes
d) 16-bits

21. During error reporting, ICMP always reports error messages to ________
a) Destination
b) Source
c) Next router
d) previous router

22. Which of these is not a type of error-reporting message?


a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded

23. ICMP error message will not be generated for a datagram having a special address
such as _______
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127

24. When a router cannot route a datagram or host cannot deliver a datagram, the
datagram is discarded and the router or the host sends a ____________ message back to
the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded

25. The source-quench message in ICMP was designed to add a kind of ____________ to
the IP.
a) Error control
b) flow control
c) router control
d) switch control

26. In case of time exceeded error, when the datagram visits a router, the value of time
to live field is _________
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1

27. Two machines can use the timestamp request and timestamp replay messages to
determine the ___________ needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source

28. During debugging, we can use the ____________ program to find if a host is alive
and responding.
a) Trace route
b) shell
c) ping
d) java

29. In windows ____________ can be used to trace the route of the packet from the
source to the destination.
a) Trace route
b) tracert
c) ping
d) locater
30. In a simple echo-request message, the value of the sum is 01010000 01011100. Then,
value of checksum is ___________
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011

31. What is the access point (AP) in a wireless LAN?


a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both device that allows wireless devices to connect to a wired network and wireless
devices itself
d) all the nodes in the network

32. In wireless ad-hoc network _________


a) access point is not required
b) access point is must
c) nodes are not required
d) all nodes are access points

33. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD

34. In wireless distribution system __________


a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) access points are not required

35. A wireless network interface controller can work in _______


a) infrastructure mode
b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
d) WDS mode

36. In wireless network an extended service set is a set of ________


a) connected basic service sets
b) all stations
c) all access points
d) connected access points

37. Mostly ________ is used in wireless LAN.


a) Time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) channel division multiplexing

38. Which one of the following event is not possible in wireless LAN?
a) Collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks

39. What is Wired Equivalent Privacy (WEP)?


a) Security algorithm for Ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) security algorithm for emails

40. What is WPA?


a) Wi-Fi protected access
b) wired protected access
c) wired process access
d) Wi-Fi process access

41. An interconnected collection of piconet is called ___________


a) scatter-net
b) micro-net
c) mini-net
d) multi-net

42. In a piconet, there can be up to ________ parked nodes in the network.


a) 63
b) 127
c) 255
d) 511

43. Bluetooth is the wireless technology for __________


a) local area network
b) personal area network
c) metropolitan area network
d) wide area network

44. Bluetooth uses __________


a) frequency hopping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) channel division multiplexing
45. Unauthorised access of information from a wireless device through a bluetooth
connection is called _________
a) blue making
b) bluesnarfing
c) blue string
d) bluescoping

46. What is A2DP (advanced audio distribution profile)?


a) a Bluetooth profile for streaming audio
b) a bluetooth profile for streaming video
c) a bluetooth profile for security
d) a bluetooth profile for file management

47. In a piconet, one master device ________


a) cannot be slave
b) can be slave in another piconet
c) can be slave in the same piconet
d) can be master in another piconet

48. Bluetooth transceiver devices operate in ______ band.


a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM

49. Bluetooth supports _______


a) point-to-point connections
b) point-to-multipoint connection
c) both point-to-point connections and point-to-multipoint connection
d) multipoint to point connection

50. A scatternet can have maximum __________


a) 10 piconets
b) 20 piconets
c) 30 piconets
d) 40 piconets

51. Ethernet frame consists of ____________


a) MAC address
b) IP address
c) Default mask
d) Network address

52. What is start frame delimeter (SFD) in Ethernet frame?


a) 10101010
b) 10101011
c) 00000000
d) 11111111

53. MAC address is of ___________


a) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits

54. What is auto-negotiation?


a) a procedure by which two connected devices choose common transmissionparameters
b) a security algorithm
c) a routing algorithm
d) encryption algorithm

55. Ethernet in metropolitan area network (MAN) can be used as ___________


a) pure Ethernet
b) Ethernet over SDH
c) Ethernet over MPLS
d) all of the mentioned

56. A point-to-point protocol over ethernet is a network protocol for __________


a) encapsulating PPP frames inside ethernet frames
b) encapsulating ehternet frames inside PPP frames
c) for security of ethernet frames
d) for security of PPP frames

57. High speed ethernet works on _________


a) coaxial cable
b) twisted pair cable
c) optical fiber
d) unshielded twisted pair cable

58. The maximum size of payload field in ethernet frame is __________


a) 1000 bytes
b) 1200 bytes
c) 1300 bytes
d) 1500 bytes

59. What is interframe gap?


a) idle time between frames
b) idle time between frame bits
c) idle time between packets
d) idle time between networks
60. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called _______
a) short frame
b) runt frame
c) mini frame
d) man frame

61. A local telephone network is an example of a _______ network.


a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched

62. Most packet switches use this principle ____________


a) Stop and wait
b) Store and forward
c) Store and wait
d) Stop and forward

63. If there are N routers from source to destination, the total end to end delay in
sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to
______________
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R

64. What are the Methods to move data through a network of links and switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching

65. The required resources for communication between end systems are reserved for the
duration of the session between end systems in ________ method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching

66. As the resources are reserved between two communicating end systems in circuit
switching, ___________ is achieved.
a) Authentication
b) guaranteed constant rate
c) reliability
d) store and forward
67. In _________ systems, resources are allocated on demand.
a) Packet switching
b) circuit switching
c) line switching
d) frequency switching

68. Which of the following is not an application layer service?


a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) Error control

69. The network layer is concerned with __________ of data.


a) Bits
b) frames
c) packets
d) bytes

70. Which one of the following is not a function of network layer?


a) Routing
b) inter-networking
c) congestion control
d) error control

71. A 4 byte IP address consists of __________


a) only network address
b) only host address
c) network address & host address
d) network address & MAC address

72. In virtual circuit network each packet contains ___________


a) full source and destination address
b) a short VC number
c) only source address
d) only destination address

73. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned

74. Which of the following is not correct in relation to multi-destination routing?


a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers

75. A subset of a network that includes all the routers but contains no loops is called
________
a) spanning tree
b) spider structure
c) spider tree
d) special tree

76. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol

77. The network layer protocol for internet is __________


a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol

78. ICMP is primarily used for __________


a) error and diagnostic functions
b) addressing
c) forwarding
d) routing

79. Which of this is not a constituent of residential telephone line?


a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) An ultra-high speed downstream channel

80. DSL telcos provide which of the following services?


a) Wired phone access
b) ISP
c) Wired phone access and ISP
d) Network routing and ISP

81. The function of DSLAM is to __________


a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) De-amplify digital signals
82. Which of the following terms is not associated with DSL?
a) DSLAM
b) CO
c) Splitter
d) CMTS

83. HFC contains _______


a) Fibre cable
b) Coaxial cable
c) A combination of Fibre cable and Coaxial cable
d) Twisted Pair Cable

84. Which of the following statements is not applicable for cable internet access?
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM

85. Among the optical-distribution architectures that are essentially switched ethernet is
__________
a) AON
b) PON
c) NON
d) MON

86. Star Band provides __________


a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access

87. Home Access is provided by __________


a) DSL
b) FTTP
c) Cable
d) All of the mentioned

88. ONT is connected to splitter using _________


a) High speed fibre cable
b) HFC
c) Optical cable
d) Twisted pair cable

89. Which of the following factors affect transmission rate in DSL?


a) The gauge of the twisted-pair line
b) Degree of electrical interference
c) Shadow fading
d) The gauge of the twisted-pair line and degree of electrical interference

90. IPSec is designed to provide security at the _________


a) Transport layer
b) Network layer
c) Application layer
d) Session layer

91. In tunnel mode, IPSec protects the ______


a) Entire IP packet
b) IP header
c) IP payload
d) IP trailer

92. Which component is included in IP security?


a) Authentication Header (AH)
b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
d) All of the mentioned

93. WPA2 is used for security in _______


a) Ethernet
b) Bluetooth
c) Wi-Fi
d) Email

94. An attempt to make a computer resource unavailable to its intended users is called
______
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process

95. Extensible authentication protocol is authentication framework frequently used in


______
a) Wired personal area network
b) Wireless networks
c) Wired local area network
d) Wired metropolitan area network

96. Pretty good privacy (PGP) is used in ______


a) Browser security
b) Email security
c) FTP security
d) Wi-Fi security
97. PGP encrypts data by using a block cipher called ______
a) International data encryption algorithm
b) Private data encryption algorithm
c) Internet data encryption algorithm
d) Local data encryption algorithm

98. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing

99. Complex networks today are made up of hundreds and sometimes thousands of
_________
a) Documents
b) Components
c) Servers
d) Entities

100. Performance management is closely related to _________


a) Proactive Fault Management
b) Fault management
c) Reactive Fault Management
d) Preventive Fault Management

101. Configuration management can be divided into two subsystems: reconfiguration


and __________
a) Documentation
b) Information
c) Servers
d) Entity

102. In Network Management System, the term that is responsible for controlling access
to network based on predefined policy is called ___________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management

103. Control of users’ access to network resources through charges is the main
responsibility of ______________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
104. The physical connection between an end point and a switch or between two
switches is __________
a) Transmission path
b) Virtual path
c) Virtual circuit
d) Transmission circuit

105. Which of the following networks supports pipelining effect?


a) Circuit-switched networks
b) Message-switched networks
c) Packet-switched networks
d) Stream-switched networks

106. In Network Management System, maps track each piece of hardware and its
connection to the _________
a) IP Server
b) Domain
c) Network
d) Data

107. MIB is a collection of groups of objects that can be managed by __________


a) SMTP
b) UDP
c) SNMP
d) TCP/IP

108. A network management system can be divided into ___________


a) three categories
b) five broad categories
c) seven broad categories
d) ten broad categories

109. Ping can _________


a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned

110. Ping sweep is a part of _________


a) Traceroute
b) Nmap
c) Route
d) Ipconfig

111. ICMP is used in _________


a) Ping
b) Traceroute
c) Ipconfig
d) Both Ping & Traceroute

112. __________ command is used to manipulate TCP/IP routing table.


a) route
b) Ipconfig
c) Ifconfig
d) Traceroute

113. If you want to find the number of routers between a source and destination, the
utility to be used is ___________
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute

114. Which of the following is not related to ipconfig in Microsoft Windows?


a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) Trace the routers in the path to destination

115. __________ allows checking if a domain is available for registration.


a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) Domain registers

116. Choose the wrong statement from the following.


a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters

117. IPSec is designed to provide security at the _________


a) transport layer
b) network layer
c) application layer
d) session layer

118. In tunnel mode, IPSec protects the ______


a) Entire IP packet
b) IP header
c) IP payload
d) IP trailer
119. Network layer firewall works as a ________
a) frame filter
b) packet filter
c) signal filter
d) content filter

120. Network layer firewall has two sub-categories called ____________


a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) network firewall and data firewall

121. WPA2 is used for security in _______


a) ethernet
b) bluetooth
c) Wi-Fi
d) e-mail

122. An attempt to make a computer resource unavailable to its intended users is called
______
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process

123. Extensible authentication protocol is authentication framework frequently used in


______
a) wired personal area network
b) wireless networks
c) wired local area network
d) wired metropolitan area network

124. Pretty good privacy (PGP) is used in ______


a) browser security
b) email security
c) FTP security
d) Wi-Fi security

125. PGP encrypts data by using a block cipher called ______


a) international data encryption algorithm
b) private data encryption algorithm
c) internet data encryption algorithm
d) local data encryption algorithm

126. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing

127. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) Both RIPv1 and RIPv2

128. How often does a RIPv1 router broadcast its routing table by default?
a) Every 30 seconds
b) Every 60 seconds
c) Every 90 seconds
d) RIPv1 does not broadcast periodically

129. Which command displays RIP routing updates?


a) Show IP route
b) Debug IP rip
c) Show protocols
d) Debug IP route

130. Two connected routers are configured with RIP routing. What will be the result
when a router receives a routing update that contains a higher-cost path to a network
already in its routing table?
a) The updated information will be added to the existing routing table Debug IP rip
b) The update will be ignored and no further action will occur Debug IP route
c) The updated information will replace the existing routing table entry
d) The existing routing table entry will be deleted from the routing table and all routers will
exchange routing updates to reach convergence

131. You type debug IP rip on your router console and see that 172.16.10.0 is being
advertised to you with a metric of 16. What does this mean?
a) The route is 16 hops away Debug IP rip
b) The route has a delay of 16 microseconds Debug IP route
c) The route is inaccessible
d) The route is queued at 16 messages a second

132. Default administrative distance of a static route is ________


a) 0
b) 90
c) 100
d) 1
133. Which protocol gives a full route table update every 30 seconds?
a) IEGRP
b) RIP
c) ICMP
d) IP

134. _________ is the default administrative distance of RIP.


a) 0
b) 90
c) 120
d) 130

135. Which statement is true regarding classless routing protocol?


a) The use of discontinuous networks is not allowed
b) Use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) IGRP supports classes routing within the same autonomous system

136. Where should we use default routing?


a) On stub networks- which have only one exit path out of the network
b) Which have more than one exit path out of the network
c) Minimum five exit paths out of the network
d) Maximum five exit paths out of the network

137. Which statement is true regarding classless routing protocols?


a) The use of discontinuous networks is not allowed
b) The use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) RIPv2 supports classless routing

138. What is route poisoning?


a) It sends back the protocol received from a router as a poison pill, which stops the regular
updates. The use of variable length subnet masks are permitted
b) It is information received from a router that can’t be sent back to the originating
router.RIPv2 supports classless routing
c) It prevents regular update messages from reinstating a route that has just come up
d) It describes when a router sets the metric for a downed link to infinity

139. Which of the following is true regarding RIPv2?


a) It has a lower administrative distance than RIPv1
b) It converges faster than RIPv1
c) It has the same timers as RIPv1
d) It is harder to configure than RIPv1

140. Which of the situations might not require multiple routing protocols in a network?
a) When a new Layer 2-only switch is added to the network
b) when you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) when there are host-based routers from multiple vendors

141. Which two routing protocols can be redistributed into OSPF by a Cisco router?
a) IP EIGRP and AppleTalk EIGRP
b) AppleTalk EIGRP and RIPv2
c) RIPv2 and IP EIGRP
d) IPX RIP & AppleTalk EIGRP

142. Which is a reason for avoiding doing route redistribution on two routers between
the same two routing domains?
a) Higher cost of two routers
b) Routing feedback
c) Cisco IOS incompatibility
d) Not possible to use two routers

143. What does administrative distance rank?


a) Metrics
b) Sources of routing information
c) Router reliability
d) Best paths

144. Which protocol maintains neighbour adjacencies?


a) RIPv2 and EIGRP
b) IGRP and EIGRP
c) RIPv2
d) EIGRP

145. Which routing protocol implements the diffusing update algorithm?


a) IS-IS
b) IGRP
c) EIGRP
d) OSPF

146. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) OSPF

147. WiMAX stands for ___________


a) wireless maximum communication
b) worldwide interoperability for microwave access
c) worldwide international standard for microwave access
d) wireless internet maximum communication
148. WiMAX provides ________
a) simplex communication
b) half duplex communication
c) full duplex communication
d) no communication

149. WiMAX uses the _________


a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) channel division multiplexing

150. Which of the following modulation schemes is supported by WiMAX?


a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned

151. WiMAX MAC layer provides an interface between ___________


a) higher transport layers and physical layer
b) application layer and network layer
c) data link layer and network layer
d) session layer and application layer

152. For encryption, WiMAX supports _______


a) advanced encryption standard
b) triple data encryption standard
c) advanced encryption standard and triple data encryption standard
d) double data encryption standard

153. WiMAX provides _______


a) VoIP services
b) IPTV services
c) Both VoIP and IPTV services
d) no IPTV services

154. Devices that provide the connectivity to a WiMAX network are known as
_________
a) subscriber stations
b) base stations
c) gateway
d) switch stations

155. WiMAX is mostly used for __________


a) local area network
b) metropolitan area network
c) personal area network
d) wide area network

156. Which of the following frequencies is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz

157. Open Shortest Path First (OSPF) is also called as _____________


a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) Border gateway protocol

158. The computation of the shortest path in OSPF is usually done by ____________
a) Bellman-ford algorithm
b) Routing information protocol
c) Dijkstra’s algorithm
d) Distance vector routing

159. Which of the following is false with respect to the features of OSPF?
a) Support for fixed-length sub-netting by including the subnet mask in the routing message
b) More flexible link cost than can range from 1 to 65535
c) Use of designated router
d) Distribution of traffic over multiple paths that have equal cost to the destination

160. In OSPF, which protocol is used to discover neighbour routers automatically?


a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) Hello protocol

161. Which of the following is not a type of OSPF packet?


a) Hello
b) Link-state request
c) Link-state response
d) Link-state ACK

162. What is the correct order of the operations of OSPF?


i – Hello packets
ii – Propagation of link-state information and building of routing tables
iii – Establishing adjacencies and synchronization of database
a) i-ii-iii
b) i-iii-ii
c) iii-ii-i
d) ii-i-iii

163. In OSPF header, which field is used to detect errors in the packet?
a) Type
b) Area ID
c) Authentication type
d) Checksum

164. In OSPF database descriptor packet, if there are more database descriptor packets
in the flow, ‘M’ field is set to ____________
a) 1
b) 0
c) more
d) -1

165. In OSPF database descriptor packet, which field is used to indicate that the router
is master?
a) M
b) MS
c) I
d) Options

166. In OSPF database descriptor packet, which field is used to detect a missing packet?
a) LSA header
b) MS
c) Database descriptor sequence number
d) Options

167. An OSPF router receives an LSA, the router checks its sequence number, and this
number matches the sequence number of the LSA that the receiving router already has.
What does the receiving router do with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers

168. An OSPF router receives an LSA. The router checks its sequence number and
finds that this number is higher than the sequence number it already has. Which two
tasks does the router perform with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
169. An OSPF router receives an LSA. The router checks its sequence number and
finds that this number is lower than the sequence number it already has. What does the
router do with the LSA?
a) ignores the LSA
b) adds it to the database
c) sends newer LSU update to source router
d) floods the LSA to the other routers

170. Each LSA has its own age timer. By default, how long does an LSA wait before
requiring an update?
a) 30 seconds
b) 1 minute
c) 30 minutes
d) 1 hour

171. Distance vector protocols use the concept of split horizon, but link-state routing
protocols, such as OSPF, do not.
a) True
b) False

172. The outcome of Dijkstra’s calculation is used to populate the __________


a) Topology table
b) Routing table
c) Neighbour table
d) Adjacency table

173. What is the IP protocol number for OSPF packets?


a) 89
b) 86
c) 20
d) 76

174. Which packet is NOT an OSPF packet type?


a) LSU
b) LSR
c) DBD
d) Query

175. Which multicast address does the OSPF Hello protocol use?
a) 224.0.0.5
b) 224.0.0.6
c) 224.0.0.7
d) 224.0.0.8
176. The Hello protocol sends periodic updates to ensure that a neighbour relationship
is maintained between adjacent routers.
a) True
b) False

177. Datagram switching is done at which layer of OSI model?


a) Network layer
b) Physical layer
c) Application layer
d) Transport layer

178. Packets in datagram switching are referred to as ________


a) Switches
b) Segments
c) Datagrams
d) Data-packets

179. Datagram networks mainly refers to _________


a) Connection oriented networks
b) Connection less networks
c) Telephone networks
d) Internetwork

180. Datagrams are routed to their destinations with the help of ________
a) Switch table
b) Segments table
c) Datagram table
d) Routing table

181. The main contents of the routing table in datagram networks are ___________
a) Source and Destination address
b) Destination address and Output port
c) Source address and Output port
d) Input port and Output port

182. Which of the following remains same in the header of the packet in a datagram
network during the entire journey of the packet?
a) Destination address
b) Source address
c) Checksum
d) Padding

183. Which of the following is true with respect to the delay in datagram networks?
a) Delay is greater than in a virtual circuit network
b) Each packet may experience a wait at a switch
c) Delay is not uniform for the packets of a message
d) All of the mentioned

184. During datagram switching, the packets are placed in __________ to wait until the
given transmission line becomes available.
a) Stack
b) Queue
c) Hash
d) Routing table

185. The probability of the error in a transmitted block _________ with the length of
the block
a) Remains same
b) Decreases
c) Increases
d) Is not proportional

186. Which of the following is false with respect to the datagram networks?
a) Number of flows of packets are not limited
b) Packets may not be in order at the destination
c) Path is not reserved
d) Delay is the same for all packets in a flow

187. Network layer firewall works as a __________


a) Frame filter
b) Packet filter
c) Content filter
d) Virus filter

188. Network layer firewall has two sub-categories as _________


a) State full firewall and stateless firewall
b) Bit oriented firewall and byte oriented firewall
c) Frame firewall and packet firewall
d) Network layer firewall and session layer firewall

189. A firewall is installed at the point where the secure internal network and untrusted
external network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point

190. Which of the following is / are the types of firewall?


a) Packet Filtering Firewall
b) Dual Homed Gateway Firewall
c) Screen Host Firewall
d) Dual Host Firewall

191. A proxy firewall filters at _________


a) Physical layer
b) Data link layer
c) Network layer
d) Application layer

192. A packet filter firewall filters at __________


a) Physical layer
b) Data link layer
c) Network layer or Transport layer
d) Application layer

193. What is one advantage of setting up a DMZ with two firewalls?


a) You can control where traffic goes in three networks
b) You can do stateful packet filtering
c) You can do load balancing
d) Improved network performance

194. What tells a firewall how to reassemble a data stream that has been divided into
packets?
a) The source routing feature
b) The number in the header’s identification field
c) The destination IP address
d) The header checksum field in the packet header

195. A stateful firewall maintains a ___________ which is a list of active connections.


a) Routing table
b) Bridging table
c) State table
d) Connection table

196. A firewall needs to be __________ so that it can grow proportionally with the
network that it protects.
a) Robust
b) Expansive
c) Fast
d) Scalable

197. Complex networks today are made up of hundreds and sometimes thousands of
_________
a) Documents
b) Components
c) Servers
d) Entities

198. Performance management is closely related to _________


a) Proactive Fault Management
b) Fault management
c) Reactive Fault Management
d) Preventive Fault Management

199. Configuration management can be divided into two subsystems: reconfiguration


and __________
a) Documentation
b) Information
c) Servers
d) Entity

200. In Network Management System, the term that is responsible for controlling access
to network based on predefined policy is called ___________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management

You might also like