CN 2nd Unit MCQ 200
CN 2nd Unit MCQ 200
a) Error reporting
b) handle addressing conventions
c) Datagram format
d) Packet handling conventions
3. The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
4. If the value in protocol field is 17, the transport layer protocol used is _____________
a) TCP
b) UDP
c) ICMP
d) IGMP
13. In classless addressing, there are no classes but addresses are still granted in ______
a) IPs
b) Blocks
c) Codes
d) Sizes
15. First address in a block is used as network address that represents the ________
a) Class Network
b) Entity
c) Organization
d) Codes
19. Internet Control Message Protocol (ICMP) has been designed to compensate
_________
a) Error-reporting
b) Error-correction
c) Host and management queries
d) All of the mentioned
21. During error reporting, ICMP always reports error messages to ________
a) Destination
b) Source
c) Next router
d) previous router
23. ICMP error message will not be generated for a datagram having a special address
such as _______
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127
24. When a router cannot route a datagram or host cannot deliver a datagram, the
datagram is discarded and the router or the host sends a ____________ message back to
the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
25. The source-quench message in ICMP was designed to add a kind of ____________ to
the IP.
a) Error control
b) flow control
c) router control
d) switch control
26. In case of time exceeded error, when the datagram visits a router, the value of time
to live field is _________
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1
27. Two machines can use the timestamp request and timestamp replay messages to
determine the ___________ needed for an IP datagram to travel between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source
28. During debugging, we can use the ____________ program to find if a host is alive
and responding.
a) Trace route
b) shell
c) ping
d) java
29. In windows ____________ can be used to trace the route of the packet from the
source to the destination.
a) Trace route
b) tracert
c) ping
d) locater
30. In a simple echo-request message, the value of the sum is 01010000 01011100. Then,
value of checksum is ___________
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
33. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
38. Which one of the following event is not possible in wireless LAN?
a) Collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks
63. If there are N routers from source to destination, the total end to end delay in
sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to
______________
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
64. What are the Methods to move data through a network of links and switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching
65. The required resources for communication between end systems are reserved for the
duration of the session between end systems in ________ method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
66. As the resources are reserved between two communicating end systems in circuit
switching, ___________ is achieved.
a) Authentication
b) guaranteed constant rate
c) reliability
d) store and forward
67. In _________ systems, resources are allocated on demand.
a) Packet switching
b) circuit switching
c) line switching
d) frequency switching
73. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
75. A subset of a network that includes all the routers but contains no loops is called
________
a) spanning tree
b) spider structure
c) spider tree
d) special tree
76. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
84. Which of the following statements is not applicable for cable internet access?
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
85. Among the optical-distribution architectures that are essentially switched ethernet is
__________
a) AON
b) PON
c) NON
d) MON
94. An attempt to make a computer resource unavailable to its intended users is called
______
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
98. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
99. Complex networks today are made up of hundreds and sometimes thousands of
_________
a) Documents
b) Components
c) Servers
d) Entities
102. In Network Management System, the term that is responsible for controlling access
to network based on predefined policy is called ___________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
103. Control of users’ access to network resources through charges is the main
responsibility of ______________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
104. The physical connection between an end point and a switch or between two
switches is __________
a) Transmission path
b) Virtual path
c) Virtual circuit
d) Transmission circuit
106. In Network Management System, maps track each piece of hardware and its
connection to the _________
a) IP Server
b) Domain
c) Network
d) Data
113. If you want to find the number of routers between a source and destination, the
utility to be used is ___________
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
122. An attempt to make a computer resource unavailable to its intended users is called
______
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
126. When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
127. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) Both RIPv1 and RIPv2
128. How often does a RIPv1 router broadcast its routing table by default?
a) Every 30 seconds
b) Every 60 seconds
c) Every 90 seconds
d) RIPv1 does not broadcast periodically
130. Two connected routers are configured with RIP routing. What will be the result
when a router receives a routing update that contains a higher-cost path to a network
already in its routing table?
a) The updated information will be added to the existing routing table Debug IP rip
b) The update will be ignored and no further action will occur Debug IP route
c) The updated information will replace the existing routing table entry
d) The existing routing table entry will be deleted from the routing table and all routers will
exchange routing updates to reach convergence
131. You type debug IP rip on your router console and see that 172.16.10.0 is being
advertised to you with a metric of 16. What does this mean?
a) The route is 16 hops away Debug IP rip
b) The route has a delay of 16 microseconds Debug IP route
c) The route is inaccessible
d) The route is queued at 16 messages a second
140. Which of the situations might not require multiple routing protocols in a network?
a) When a new Layer 2-only switch is added to the network
b) when you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) when there are host-based routers from multiple vendors
141. Which two routing protocols can be redistributed into OSPF by a Cisco router?
a) IP EIGRP and AppleTalk EIGRP
b) AppleTalk EIGRP and RIPv2
c) RIPv2 and IP EIGRP
d) IPX RIP & AppleTalk EIGRP
142. Which is a reason for avoiding doing route redistribution on two routers between
the same two routing domains?
a) Higher cost of two routers
b) Routing feedback
c) Cisco IOS incompatibility
d) Not possible to use two routers
146. Which protocol should you select if the network diameter is more than 17 hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) OSPF
154. Devices that provide the connectivity to a WiMAX network are known as
_________
a) subscriber stations
b) base stations
c) gateway
d) switch stations
156. Which of the following frequencies is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
158. The computation of the shortest path in OSPF is usually done by ____________
a) Bellman-ford algorithm
b) Routing information protocol
c) Dijkstra’s algorithm
d) Distance vector routing
159. Which of the following is false with respect to the features of OSPF?
a) Support for fixed-length sub-netting by including the subnet mask in the routing message
b) More flexible link cost than can range from 1 to 65535
c) Use of designated router
d) Distribution of traffic over multiple paths that have equal cost to the destination
163. In OSPF header, which field is used to detect errors in the packet?
a) Type
b) Area ID
c) Authentication type
d) Checksum
164. In OSPF database descriptor packet, if there are more database descriptor packets
in the flow, ‘M’ field is set to ____________
a) 1
b) 0
c) more
d) -1
165. In OSPF database descriptor packet, which field is used to indicate that the router
is master?
a) M
b) MS
c) I
d) Options
166. In OSPF database descriptor packet, which field is used to detect a missing packet?
a) LSA header
b) MS
c) Database descriptor sequence number
d) Options
167. An OSPF router receives an LSA, the router checks its sequence number, and this
number matches the sequence number of the LSA that the receiving router already has.
What does the receiving router do with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
168. An OSPF router receives an LSA. The router checks its sequence number and
finds that this number is higher than the sequence number it already has. Which two
tasks does the router perform with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
169. An OSPF router receives an LSA. The router checks its sequence number and
finds that this number is lower than the sequence number it already has. What does the
router do with the LSA?
a) ignores the LSA
b) adds it to the database
c) sends newer LSU update to source router
d) floods the LSA to the other routers
170. Each LSA has its own age timer. By default, how long does an LSA wait before
requiring an update?
a) 30 seconds
b) 1 minute
c) 30 minutes
d) 1 hour
171. Distance vector protocols use the concept of split horizon, but link-state routing
protocols, such as OSPF, do not.
a) True
b) False
175. Which multicast address does the OSPF Hello protocol use?
a) 224.0.0.5
b) 224.0.0.6
c) 224.0.0.7
d) 224.0.0.8
176. The Hello protocol sends periodic updates to ensure that a neighbour relationship
is maintained between adjacent routers.
a) True
b) False
180. Datagrams are routed to their destinations with the help of ________
a) Switch table
b) Segments table
c) Datagram table
d) Routing table
181. The main contents of the routing table in datagram networks are ___________
a) Source and Destination address
b) Destination address and Output port
c) Source address and Output port
d) Input port and Output port
182. Which of the following remains same in the header of the packet in a datagram
network during the entire journey of the packet?
a) Destination address
b) Source address
c) Checksum
d) Padding
183. Which of the following is true with respect to the delay in datagram networks?
a) Delay is greater than in a virtual circuit network
b) Each packet may experience a wait at a switch
c) Delay is not uniform for the packets of a message
d) All of the mentioned
184. During datagram switching, the packets are placed in __________ to wait until the
given transmission line becomes available.
a) Stack
b) Queue
c) Hash
d) Routing table
185. The probability of the error in a transmitted block _________ with the length of
the block
a) Remains same
b) Decreases
c) Increases
d) Is not proportional
186. Which of the following is false with respect to the datagram networks?
a) Number of flows of packets are not limited
b) Packets may not be in order at the destination
c) Path is not reserved
d) Delay is the same for all packets in a flow
189. A firewall is installed at the point where the secure internal network and untrusted
external network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
194. What tells a firewall how to reassemble a data stream that has been divided into
packets?
a) The source routing feature
b) The number in the header’s identification field
c) The destination IP address
d) The header checksum field in the packet header
196. A firewall needs to be __________ so that it can grow proportionally with the
network that it protects.
a) Robust
b) Expansive
c) Fast
d) Scalable
197. Complex networks today are made up of hundreds and sometimes thousands of
_________
a) Documents
b) Components
c) Servers
d) Entities
200. In Network Management System, the term that is responsible for controlling access
to network based on predefined policy is called ___________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management