0% found this document useful (0 votes)
7 views14 pages

Cn Objective

Uploaded by

npne000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views14 pages

Cn Objective

Uploaded by

npne000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Below are the answers to the questions in the document you uploaded:

1. SMTP operates at which layer of the OSI model?

A) Application Layer

2. The network layer is concerned with __________ of data.

C) Packets

3. Which of the following uses UDP as the transport protocol?

C) DNS

4. Which of the following is not correct in relation to multi-destination routing?

C) Data is not sent by packets

5. Transport layer protocols deal with_________.

B) Process to process communication

6. Which of the following control fields in TCP header is used to specify whether the sender
has no more data to transmit?
A) FIN

7. ICMP is primarily used for_________.

A) Error and diagnostic functions

8. Socket-style API for Windows is called____________.

B) Winsock

9. The ability of a single network to span multiple physical networks is known as_________.

A) Subnetting

10. A _________ that limits packet duplication by including a unique identifier in each
packet to avoid retransmitting the same packet.

A) Flooding

11. To deliver a message to the correct application program running on a host, the ____
address must be consulted.

C) Port

12. What is the hierarchy of DNS servers from top to bottom?

A) Root → TLD → Authoritative


13. Transport layer aggregates data from different applications into a single stream before
passing it to ___________.

A) Network layer

14. Suppose you are browsing the web using a web browser and trying to access the web
servers. What is the underlying protocol and port number being used?

B) TCP, 80

15. Which of the following uses UDP as the transport protocol?

C) DNS

16. Which protocol is typically used to retrieve emails from the server after SMTP delivers
them?

A) POP3 or IMAP

17. An ACK number of 1000 and sequence number is 0 in TCP always means that:

B) 1000 bytes have been received

18. Silly Window Syndrome is related to:

C) Degrade in TCP performance


19. Which algorithm is used to shape the bursty traffic into a fixed-rate traffic by averaging
the data rate?

D) Leaky bucket algorithm

20. Which one of the following is not a function of the network layer?

D) Error control

21. A subnet of a network that includes all the routers but contains no loops is called:

A) Spanning tree

22. Which is not an application layer protocol?

D) TCP

23. The process of combining multiple signals into one shared communication medium or
channel.

C) Multiplexing

24. Transport layer protocols deal with_________.

B) Process to process communication


25. Email is_________.

C) Elastic application

26. Which one of the following protocols delivers/stores mail to the receiver server?

A) Simple Mail Transfer Protocol

27. The ASCII encoding of binary data is called:

A) Base64 encoding

28. Which protocol is a signaling communication protocol used for controlling multimedia
communication sessions?

A) Session Initiation Protocol

29. Which of the following transmission directions listed is not a legitimate channel?

D) Double Duplex

30. A collection of hyperlinked documents on the internet forms the:

A) World Wide Web (WWW)


31. Which software prevents external access to a system?

1. Firewall

32. Software programs that allow you to legally copy files and give them away at no cost are
called which of the following?

4. Public domain

33. The maximum length (in bytes) of an IPv4 datagram is?

3. 65535

34. When the mail server sends mail to other mail servers, it becomes:

1. SMTP client

35. Which of the following is a correct IPv4 address?

5. 128.64.0.0

36. Which of the following servers allows LAN users to share data?

3. File server

37. What is the total vulnerable time value of pure Aloha?


3. 2 * Tfr

38. Which of the following layers does the HTTP protocol work on?

3. Application layer

39. What is the standard form of DHCP?

Dynamic Host Configuration Protocol

40. Which one of the following is a dynamic routing algorithm?

1. Link state routing

Let me know if you have further questions!

Here are the answers for the fill-in-the-blank questions as well:

1. ______________ is the natural mask for a class B network.

255.255.0.0
2. Maximum size of an IPv4 packet would be______________.

65,535 bytes

3. A 4-byte IP address consists of __________.

32 bits

4. In___________ routing algorithm, routers are classified into groups called regions.

Hierarchical

5. User Datagram Protocol is called connectionless because _____________.

It does not establish a connection before sending data

6. __________ address is a combination of IP address and port number.

Socket

7. Transport layer can identify the symptom of overload nodes using_________.

Congestion control
8. SMTP operates at the ____________________ layer of the OSI model.

Application

9. An endpoint of an inter-process communication flow across a computer network is


called __________.

Socket

10. The ___________ HTTP method is used to delete a resource on a server.

DELETE

11. ____________ refers to the process of transmitting audio or video content over the
internet in real-time, allowing playback without downloading the entire file.

Streaming

12. The packet of information at the application layer is called __________.

Message

13. SNMP stands for____________.

Simple Network Management Protocol

14. An example of connectionless, unreliable transport protocol is______________.


UDP (User Datagram Protocol)

15. ______________ is the natural mask for a class B network.

255.255.0.0

16. In the network layer, data is in the form of____________.

Packets

17. _____________ allows multiple applications to share a single network connection by


identifying data using port numbers.

Multiplexing

18. ____________ helps manage network traffic to prevent excessive data from causing
bottlenecks, a feature of TCP.

Flow control

19. The protocol used to access data on the WWW is________________.

HTTP

20. ______________ is the temporary storage of data before playback to ensure smooth
streaming.
Buffering

21. A _______________ protocol that establishes a connection before data transfer and
ensures reliable communication.

TCP

22. The ___________________ translates internet domain and host names to IP addresses.

DNS (Domain Name System)

23. RTTP stands for____________.

Real-Time Transport Protocol

24. The secure version of HTTP uses the protocol ______ for encryption.

HTTPS (HTTP Secure)

25. The network layer protocol for the internet is __________.

IP (Internet Protocol)

26. SONET stands for ______________.

Synchronous Optical Network


27. RAKE receiver is designed for _____ signals.

Multipath

28. A client of the DNS (Domain Name System) application is called _____.

Resolver

29. MAC address is also called ______.

Physical address

30. EDI stands for _____.

Electronic Data Interchange

31. ARPANET stands for _______.

Advanced Research Projects Agency Network

32. _______ is a 2G mobile telecommunications technology based on CDMA.

IS-95
33. _________ does not require power to forward the signals?

Passive network components

34. __________ pins does RJ-45 contain?

35. SLIP stands for ______.

Serial Line Internet Protocol

36. The second port is used to ____________ in the two-port network.

Provide feedback or isolation

37. ________ types of messages open a TCP connection to a peer and authenticate the
sender.

SYN

38. _________ standard form of ICMP.

Internet Control Message Protocol

39. The network with network layer connectionless service is called ______________
network.
Datagram network

40. In _______________ network, each packet contains a short VC number.

Virtual Circuit network

Let me know if you need further clarification!

You might also like