Cs8591 Computer Networks Cn Multiple Choice Questions Mcq Google Docs
Cs8591 Computer Networks Cn Multiple Choice Questions Mcq Google Docs
CS8591 Computer
Networks
1. Data communication is
B. Visual Communication
Ans. A
2. Which of the following is not the criteria necessary for an effective and efficient network?
Ans. A
A. Number of users
Ans. D
4. Reliability is measured by
A. Frequency of failure
Ans. D
Ans. A
6. Fundamental characteristics that determine the effectiveness of the data communication system are
A. Delivery:
B. Accuracy
C. Timeliness
Ans. D
A. Security/encapsulation
B. Distributed databases
Ans. D
8. A protocol is
9. Standards are
C. rules
Ans. A
Ans. D
A. Simplex
B. Half-duplex
C. Full-duplex
Ans. D
A. Unidirectional
Ans. A
A. Unidirectional
A. Unidirectional
Ans. B
B. System of roads
Ans. A
B. Sharing resources
C. Sharing information
Ans. D
B. Instead of one single large machine being responsible for all aspects of process, separate computers handle a
subset
C. use of more than one processor to perform the processing for an individual task
Ans. D
18. The amount of time required for a message to travel from one device to another is
Ans. B
Ans. D
21. Physical communication pathway that transfers data from one device to another is
A. Link
B. Data communication
C. Line configuration
Ans. A
A. Link
B. Data communication
C. Line configuration
Ans. C
23. Topology is
B. Link
C. Line Configuration
Ans. A
Ans. D
Ans. A
26. In a topology) network with n nodes, there are n x (n -1) /2 direct links.
Ans. A
C. Failure of one link will not disturb other links & it helps the network manager to find the fault location and
solution
Ans. D
Ans. C
29. Assume five devices are arranged in a mesh topology. How many cables are needed?
A. 8 B. 6 C. 10 D. 4
Ans. C
30. Assume five devices are arranged in a mesh topology. How many ports are needed for each device?
A. 8 B. 6 C. 10 D. 4
Ans. D
31. Topology in which every device has a dedicated point-to-point link to a central controller (HUB) only is
Ans. B
Ans. A
33. Assume five devices are arranged in a star topology. How many cables are needed?
A. 5 B. 6 C. 10 D. 4
Ans. A
Ans. D
A. If the central hub fails, the whole network will not work.
Ans. C
36. Topology in which one long cable acts as a backbone to link all the devices in the network is
Ans. C
A. Easy Installation.
C. Less cost.
Ans. D
B. Fault isolation and reconnection is difficult & Adding new device is difficult.
Ans. D
39. Topology in which each device has a dedicated point-to-point link with only the two devices on either side
of it is
40. In a Ring topology network with n nodes, there are direct links;
Ans. A
41. In topology, the repeater is used to regenerate the signals during transmission.
Ans. C
B. Failure of one node on the ring affects the entire network & Addition of nodes or removal of nodes disrupts the
network.
Ans. D
44. A topology is a type of network topology that uses two or more other network topologies.
Ans. D
Ans. A
Ans. B
48. A Network covering a large geographical area (beyond 100 km) often a country or continent or even
whole world is
Ans. C
A. technique for organizing the protocols into an ordered series of distinct abstractions
Ans. D
B. ISO Standard
C. Layered framework
Ans. D
Ans. B
A. Physical layer
C. Network layer
Ans. D
A. Session layer
B. Presentation layer
C. Application layer
Ans. D
Ans. D
A. Physical layer B. Data Link layer C. Network layer D. Transport layer Ans.
57. Movements of individual bits from one hop (node) to the next is the responsibility of which layer
Ans. A
58. Moving frames from one hop (node) to the next is the responsibility of which layer
Ans. B
59. Delivery of individual packets from the source host to the destination host is the responsibility of which
layer
Ans. C
60. Delivery of a message from one process to another is the responsibility of which layer
Ans. D
61. Dialog control and synchronization are the responsibilities of which layer
Ans. C
62. Translation, Compression and Encryption are the responsibilities of which layer
Ans. B
64. Each layer of the OSI model receives services or data from a layer.
A. below layer
B. above layer
Ans. A
65. A layer of the OSI model on one system communicates with the layer of its peer system.
A. above
B. below
C. same
D. None
Ans. C
Ans. B
Ans. A
C. Developing hardware devices targeting certain layers is easy because the services to be offered are fixed.
Ans. D
A. Physical layer
C. Network Layer
D. Transport Layer
Ans. A
70. Which is the layer that converts Packets to Frames and Frames to Packets in the OSI model?
A. Physical Layer
C. Network Layer
D. Transport Layer
Ans.C
71. Which is the layer that converts Raw Bits to Frames and Frames to Raw Bits in the OSI model?
A) Physical Layer
C) Network Layer
D) Transport Layer
Ans. B
Ans. D
C. data rate control and detection and correction of damaged and lost frames
Ans. D
B. routing
Ans. C
75. is a unit of data that consists of a header, which is defined by the protocol in use, followed
by various application data.
Ans. A
Ans. B
Ans. C
79. The services include file transfer, remote access, shared database management, and mail
services.
A. physical layer B. data link layer C. network layer D. application layer Ans.
A. Transport layer
B. Session layer
C. Presentation layer
Ans. C
81. Which of the following layers of OSI reference model is concerned with the syntax of data exchanged
between application entities?
A. Transport layer
B. Session layer
C. Presentation layer
Ans. C
Ans. B
A. Data link layer B. Network layer C. Transport layer D. Both data link and transport layers
Ans. A
Ans. D
Ans. B
87. The Media Access Control Sublayer resides in which OSI layer?
layer Ans. D
88. Flow control is the mechanism to regulate the flow of information, so that a fast host cannot overrun a
slow one. This is the function of the following OSI layer.
Ans. A
89. In OSI model, which of the following layer provides error-free delivery of data?
Ans. B
Ans. A
Ans. D
A. 5 B. 4 C. 6 D. 7
Ans. A
Ans. A
Ans. B
Ans. A
97. SMTP, FTP, HTTP, DNS, SNMP and TELNET are related to
Ans. C
Ans. D
Ans. A
Ans. B
Ans. C
Ans. D
103. is the process of combining multiple signals into one signal, over a shared medium.
A. Multiplexing
B. Demultiplexing
C. Synchronization
Ans. A
104. a process reconverting a signal containing multiple analog or digital signal streams back
into the original separate and unrelated signals.
A. Multiplexing
B. Demultiplexing
C. Synchronization
Ans. B
A. Bandwidth
B. Latency
Ans. C
106. of a network is given by the number of bits that can be transmitted over the network in a
certain period of time.
A. Bandwidth
B. Latency
C. Data rate
Ans. A
A. Bandwidth
B. Latency
C. Data rate
Ans. B
108. is a measure of how fast we can actually send data through a network.
A. Output
B. Throughput
C. Latency
Ans. B
109. Sum of Propagation time, Transmission time, Queuing time and Processing delay is
A. Bandwidth
B. Latency
C. Data rate
Ans. B
110. defines the number of bits that can fill the link.
A. Bandwidth-delay product
B. Data rate
C. Latency
Ans. A
A. internet
C. extranet
D. internetwork
Ans. A
A. internet
B. intranet
C. extranet
D. internetwork
Ans. B
113. An is a controlled private network that allows access to partners, vendors and
suppliers or an authorized set of customers – normally to a subset of the information accessible from an
organization's intranet.
A. internet
B. intranet
C. extranet
D. internetwork
Ans. C
A. Syntax
B. Semantics
C. Timing
Ans. D
C. Protocol
Ans. D
116. Sender, Receiver, Message, Transmission Medium and Protocol are the five components of a
system.
A. Data Communication
B. visual communication
Ans. A
117. in the data link layer refers primarily to methods of error detection and retransmission
and is based on automatic repeat request, which is the retransmission of data.
A. Flow control
B. Error control
C. Access control
Ans. B
B. Cable modem
C. Dial-up modem
120. The medium provides a physical conduit from one device to another.
A. unguided
B. guided
C. (a) or (b)
Ans. B
A. twisted-pair cable
B. coaxial cable
C. fiber-optic cable
Ans. D
A. local telephone system B. Cellular telephone system C. Radio broadcasting D. Satellite Communication
Ans. A
123. A cable comprises of two separate insulated copper wires, which are twisted together and run in
parallel.
A. Fiber-optic
B. Twisted-pair
C. Coaxial
Ans. B
Ans. A
A. Fiber-optic
B. Twisted-pair
C. Coaxial
Ans. B
A. Fiber-optic
B. Twisted-pair
C. Coaxial
Ans. B
127. cable is a type of electrical cable consisting of an inner conductor surrounded by a concentric
conducting shield, with the two separated by a dielectric;
A. Fiber-optic
B. Twisted-pair
C. Coaxial
Ans. C
A. Fiber-optic
B. Twisted-pair
C. Coaxial
Ans. C
129. cable can carry signals of higher frequency ranges than twisted-pair cable.
A. Coaxial
B. Twisted-pair
C. fiber-optic
Ans. A
B. inner conductor
C. outer conductor
Ans. A
131. A cable is made of glass or plastic inner core which is surrounded by a cladding, and all are
encased in an outsider jacket.
A. Coaxial
B. Twisted-pair
C. fiber-optic
Ans. C
132. In fiber-optic cable, a glass or plastic core is surrounded by a cladding of glass or plastic.
A. less dense
B. more dense
C. same dense
Ans. A
A. Coaxial
B. Twisted-pair
C. fiber-optic
Ans. C
134. When the angle of incidence is the critical angle, the light beam bends along the interface.
A. less than
B. greater than
C. equal to
Ans. C
135. When the angle of incidence is the critical angle, the ray refracts and moves closer to the
surface.
A. less than
B. greater than
C. equal to
Ans. A
136. When the angle of incidence is the critical angle, the ray reflects (makes a turn) and
travels again in the denser substance.
A. less than
B. greater than
C. equal to
Ans. B
137. In a Fibre-optic cable, the signal is transmitted along the inner core by
A. reflection
B. refraction
Ans. A
138. Advantages of fiber-optic cable over twisted-pair cable and co-axial cable are:
Ans. D
B. unguided
Ans. B
A. guided
B. unguided
Ans. B
C. Radio broadcasting
D. Satellite Communication
Ans. C
A. ground
B. sky
C. line-of-sight
Ans. A
143. Signals with a frequency between 2 MHz and 30 MHz use propagation.
A. ground
B. sky
C. line-of-sight
A. ground
B. sky
C. line-of-sight
Ans. C
A. Radio wave
B. Microwave
C. Infrared wave
Ans. D
146. Electromagnetic Waves ranging in frequencies between 3 kHz and 1 GHz are called
A. Radio waves
B. Microwaves
C. Infrared waves
Ans. A
147. are used for multicast communications, such as radio and television, and paging systems.
A. Radio waves
B. Microwaves
C. Infrared waves
D. ultraviolet waves
Ans. A
A. unidirectional
B. bidirectional
Ans. C
149. Electromagnetic Waves ranging in frequencies between 1 GHz and 300 GHz are called .
A. Radio waves
B. Microwaves
C. Infrared waves
D. ultraviolet waves
Ans. B
A. unidirectional
B. bidirectional
C. omnidirectional
Ans. A
151. are used for unicast communication such as cellular telephones, satellite networks,
A. Radio waves
B. Microwaves
C. Infrared waves
D. ultraviolet waves
Ans. B
152. need unidirectional antennas that send out signals in one direction.
A. Radio waves
B. Microwaves
C. Infrared waves
D. ultraviolet waves
Ans. B
A. Radio waves
B. Microwaves
C. Infrared waves
D. ultraviolet waves
Ans. C
154. can be used for short-range communication in a closed area using line-of-sight propagation.
A. Radio waves
B. Microwaves
C. Infrared waves
Ans. C
Ans. D
Ans. B
157. is mechanism for moving information between different networks and network
segments.
A. Switching
B. Forwarding
D. Directing
Ans. A
A. Packet Switching
B. Circuit Switching
C. Message Switching
Ans. B
A. Fixed bandwidth B. Low variance end to end delay C. either (a) or (b) D. Both (a) and (b)
Ans. D
161. A circuit switched network is made of switches connected by physical links, in which each link is divided
into
Ans. C
164. Setup, data transfer and connection teardown are three phases of
Ans. B
166. A network is made of a set of switches connected by physical links, in which each link is
divided into n channels.
A. line-switched
B. frame-switched
C. circuit-switched
Ans. C
Ans. C
168. Circuit switching is most ideal for communication, while also keeping the delay uniform.
A. Voice
B. Data
Ans. A
169. Packet switching is used mainly for transmission as the delay is not uniform.
A. Voice
B. Data
Ans. B
170. The key difference between circuit switching and packet switching is that
Ans. A
171. is transmission method in which packets are transmitted over a networking medium
that maintain several paths between sender and receiver.
A. Packet Switching
B. Circuit Switching
C. Message Switching
Ans. A
Ans. B
173. Virtual circuit networks and Datagram Networks are the sub categories of
A. Message-switched networks
B. Packet-switched networks
C. Circuit-switched networks
D. None of them
Ans. B
174. Which of the following are true about Virtual Circuit Switching?
A. Connection-oriented model
C. Packet switching methodology whereby a path is established between the source and the final destination through
which all the packets will be routed.
Ans. D
175. Which of the following are true about Datagram (packet switched) network?
B. Connectionless Approach
Ans. A
A. data transfer phase B. teardown phase C. setup phase D. propagation phase Ans.
A. Packet switched network B. Datagram networks C. Virtual circuit network D. message switched network
Ans. A
179. In , the resources need to be reserved during the setup phase; the resources remain
dedicated for the entire duration of data transfer phase until the teardown phase.
A. datagram switching
B. circuit switching
C. frame switching
Ans. B
A. datagram switching
B. circuit switching
C. frame switching
Ans. A
A. datagram switching
B. circuit switching
C. frame switching
Ans. A.
A. datagram switching
B. circuit switching
C. frame switching
Ans. A
A. datagram switching
B. circuit switching
C. frame switching
Ans. A
A. Packet switching network B. Datagram networks C. Virtual circuit network D. message switched network
Ans. B
Ans. B
3. The is responsible for moving frames from one hop (node) to the next.
Ans. B
4. The Data link layer divides the stream of bits received from network layer into manageable data units
called .
Ans. C
Ans. A
6. The data link layer imposes a mechanism to avoid overwhelming the receiver.
A. Flow control
B. Error control
C. Access Control
Ans. A
7. The data link layer adds a mechanism to detect and retransmit damaged or lost frames.
A. Flow control
B. Error control
C. Access Control
Ans. B
A. Flow control
B. Error control
C. Access Control
Ans. C
A. Flow control
B. Error control
C. Access Control
Ans. D
Ans. B
A. Flow control
B. Error detection
C. Access Control
Ans. B
12. The oversees the delivery of a data unit between two systems on the same network.
Ans. B
Ans. C.
A. frame synchronization
B. flow control
C. error checking
Ans. D
15. The is responsible for moving data packets to and from one Network Interface Card (NIC)
to another across a shared channel.
Ans. B
A. physical address
B. logical address
C. port address
Ans. A
17. The is used to find the physical address of the node when its Internet address is known.
C. SNMP
Ans. A
C. SNMP
Ans. B
Ans. C
20. divides the stream of bits received from network layer into manageable data units called
frames.
Ans. A
21. In , there is no need for defining the boundaries of the frames; the size itself can be used as a
delimiter.
Ans. A
22. In , we need a way to define the end of the frame and the beginning of the next.
Ans. B
A. Frames
B. Segments
C. Datagrams
Ans. A
24. Techniques to solve the necessity of mentioning start and end of each frame are
B. Bit-oriented protocols
Ans. C
25. framing uses two categories of protocols: byte-oriented protocols and bit-oriented protocols.
A. Fixed-size
B. Variable-size
C. Standard
Ans. B
B. Bit-oriented protocols
Ans. A
Ans. D
28. In , the data portion of the frame is then contained between special sentinel
characters: STX (start of text) and ETX (end of text).
Ans. A
A. Sentinel approach
Ans.A
30. In , a special byte called the escape character (ESC) is stuffed before every byte in the
message with the same pattern as the flag byte. If the ESC sequence is found in the message byte, then
another ESC byte is stuffed before it.
B. Bit stuffing
Ans. A
31. The more recent and widely used Point-to-Point Protocol (PPP) is a
B. Bit-oriented protocols
Ans. A
32. PPP is a byte-oriented protocol using byte stuffing with the escape byte .
Ans. A
B. Bit-oriented protocols
Ans. B
Ans. A
Ans. D
B. PPP
C. BISYNC
Ans. A
Ans. A
38. HDLC denotes both the beginning and end of a frame with the distinguished bit sequence .
Ans. C
39. If the HDLC flag field pattern is found in the message data field, it needs to be altered through
.
A. synchronizaion
B. bit stuffing
C. byte stuffing
Ans. B
40. Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits with
the same pattern as the .
A. flag
B. trailer
C. header
Ans. A
Ans. D
42. are used to transport user data and control information relating to user data (piggybacking).
Ans. A
Ans. B
44. are reserved for system management. Information carried by these frames is intended for
managing the link itself.
Ans. C
A. Single-bit error
B. Burst error
Ans. C
46. In error detection, the receiver corrects errors without requesting retransmission.
A. forward
B. backward
Ans. A
47. In error detection, the receiver asks the sender to send the data again.
A. forward
B. backward
C. retransmission
Ans. C
A. Single-bit error
B. Burst error
Ans. A
49. A means that 2 or more bits in the data unit have changed.
A. Single-bit error
B. Burst error
Ans. B
50. Instead of repeating the entire data stream, a shorter group of bits may be appended to the end of each
unit. This technique is called .
A. redundancy
B. repetition
C. appending
Ans. A
C. Checksum
Ans. D
A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check
(CRC) D. Checksum
Ans. A
A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check
(CRC) D. Checksum
Ans. A
54. In , a block of bits is organized in a table (rows and columns). The parity bit for each column is
checked and a new row of eight bits which are parity bits for the whole block is created. Original data with
eight parity bits are transferred to the receiver.
A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check (CRC)
D. Checksum
Ans. B
A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check
(CRC) D. Checksum
Ans. C
Ans. D
Ans. B
A. Vertical Redundancy Check (VRC) B. Longitudinal Redundancy Check (LRC) C. Cyclic Redundancy Check
(CRC) D. Checksum
Ans. D
A. Hamming distance
B. Hamming code
C. Hamming rule
Ans. A
A. acknowledgment
B. timeout
Ans. C
61. If the sender does not receive ACK up to reasonable amount of time, the it retransmit the original frame;
waiting for reasonable amount of time is called .
A. acknowledgment
B. timeout
Ans. B
62. The general strategy of using acknowledgments and timeouts to implement reliable delivery is sometimes
called .
B. Delivery strategy
Ans. A
63. Stop and Wait Flow Control and Sliding Window Flow Control are the two mechanisms.
A. flow control
B. access control
C. error control
Ans. A
64. In the sliding window method of flow control, the receiver window in size when frames are received.
A. decreases
B. increases
Ans. A
65. In the sliding window method of flow control, the receiver window in size when an ACK is sent.
A. decreases
B. increases
Ans. B
68. An ideal channel in which no frames are lost, duplicated or corrupted is regarded as .
B. Noisy Channel
C. Normal Channel
Ans. A
69. The Simplest protocol and Stop and Wait protocol are for
A. Noiseless Channel
B. Noisy Channel
C. Normal Channel
Ans. A
71. In the Protocol, the sender sends its frames one after another with no regard to the receiver
72. The protocol has flow control but not error control.
73. In the Protocol, the sender sends one frame, stops until it receives confirmation from the
receiver, and then sends the next fame.
74. means that there will be lot of disturbance in the path when data is carried forward from
sender to receiver.
A. Noiseless Channel
B. Noisy Channel
C. Normal Channel
Ans. B
75. Stop-and-Wait Automatic Repeat Request, Go-Back-N Automatic Repeat Request and Selective Repeat
Automatic Repeat Request are for
A. Noiseless Channel
B. Noisy Channel
C. Normal Channel
Ans. B
76. A technique called is used to improve the efficiency of the bidirectional protocols. When
a frame is carrying data from A to B, it can also carry control information about arrived (or lost) frames
from B; when a frame is carrying data from B to A, it can also carry control information about the arrived
(or lost) frames from A.
A. piggybacking
B. synchronization
Ans. A
77. The Protocol, adds a simple error control mechanism to the Protocol.
Ans. A
78. In the Protocol, if no acknowledgment for a frame has arrived, we resend all outstanding
frames.
79. In the Protocol, we avoid unnecessary transmission by sending only frames that are
corrupted.
Ans. C
A. Sliding frame
B. Sliding window
C. Sliding packet
Ans. B
B. Controlled-access protocols
C. Channelization protocols
Ans. D
82. In method, no station is superior to another station. No station is assigned the control over
another.
A. Random access
B. Controlled-access
C. Channelization
Ans. A
83. No rules specify which station should send next. Stations compete with one another to access the medium.
That is why these methods are also called .
B. Contention methods
Ans. B
A. pure ALOHA
B. slotted ALOHA
Ans. A
85. Pure ALOHA dictates that when the time-out period passes, each station waits a random amount of time
before resending its frame. The randomness will help avoid more collisions. This time is called the .
A. Back-off time
B. time-out time
Ans. A
A. vulnerable time
B. Back-off time
C. time-out time
Ans. A
87. In pure ALOHA, the vulnerable time is the frame transmission time.
A. two times
B. three times
C. the same as
Ans. A
A. Slotted ALOHA
B. ALOHA
Ans. A
89. The is defined as average successful traffic transmitted between stations per unit time.
A. throughput
B. output
C. input
Ans. A
90. When two or more stations transmits message on channel, the signals will superimpose on each other and
is garbled beyond the decoding ability of receiving station, this is called .
A. Collisions
B. Congestions
Ans. A
91. In , the chance of collision can be reduced if a station senses the medium before
trying to use it.
Ans. B
Ans. B
Ans. C
94. In the , a station monitors the medium after it sends a frame to see if the transmission was
successful. If so, the station is finished. If, however, there is collision, the frame is sent again.
A. Multiple Access
C. CSMA/CD
Ans. C
B. CSMA/CD
Ans. C
96. In , Collisions are avoided through the use of three strategies, namely, Interframe Space
(IFS), Contention Window and Acknowledgment.
B. CSMA/CD
C. CSMA/CA
Ans. C
97. In , the stations consult one another to find which station has the right to send.
A. controlled access
B. random access
C. channelization
Ans. A
99. In the method, a station needs to make a reservation before sending data.
A. reservation
B. Polling
C. Token passing
Ans. A
100. In the method, time divided into intervals. In each interval, a reservation frame precedes the
data frames sent in that interval.
A. reservation
B. Polling
C. Token passing
Ans. A
101. In the , one device is designated as a primary station and the other devices are secondary
stations. All data exchanges must be made through the primary device.
A. reservation
B. Polling
C. Token passing
Ans. B
102. In the , the primary device controls link; the secondary devices follow its instructions.
A. reservation
B. Polling
C. Token passing
Ans. B
103. In the method, the stations in a network are organized in a logical ring.
A. reservation
B. Polling
C. Token passing
Ans. C
104. In the method, for each station, there is a predecessor and a successor.
A. reservation
B. Polling
C. Token passing
Ans. C
105. In the method, a special packet called a circulates through the ring.
Ans. C
106. is a multi-access method in which the available bandwidth of a link is shared in time,
frequency, or through code between different stations.
A. Channelization
B. Random access
C. Controlled access
Ans. A
Ans. D
Ans. A
Ans. B
Ans. C
111____________s a baseband LAN specification invented in 1970s by Xerox Corporation that operates at 10
Mbps using CSMA/CD to run over coaxial cable.
A. Ethernet
B. Internet
C. intranet
Ans. A
112. The term is now often used to refer to all CSMA/CD LANs.
A. Ethernet
B. Internet
C. intranet
Ans. A
113. In ethernet, the field is actually added at the physical layer and is not formally part of the
frame.
A. CRC
B. preamble
C. Type
Ans. B
114. In the Ethernet frame, the field contains error detection information
A. CRC
B. preamble
C. Type
Ans. A
115. Ethernet, is one of the most widely used standards for computer networking and general
data communications.
A. IEEE 802.3
B. IEEE 802.1
C. IEEE 802.5
Ans. A
116. 10Bae5, 10Base2, 10BaseT and 10Base F are Categories of Base Band in .
B. IEEE 802.1
C. IEEE 802.5
Ans. A
B. baseband
Ans. A
B. baseband
Ans. B
B. baseband
Ans. C
A. IEEE 802.11
B. IEEE 802.
C. IEEE 802.1
D. IEEE 802.5
A. IEEE 802.11
B IEEE 802.3
C. IEEE 802.1
D. IEEE 802.5
Ans. A
122. In wireless LAN, an Access Point (AP) is installed to act as Bridge between Wireless and
Wired Network
A. IEEE 802.11
B. IEEE 802.3
C. IEEE 802.1
D. IEEE 802.5
Ans. A
123. Basic Service Set (BSS) and Extended Service Set (ESS) are two kind services defined by .
A. IEEE 802.11
B. IEEE 802.3
C. IEEE 802.1
D. IEEE 802.5
Ans. A
124. In IEEE 802.11, a is made of stationary or mobile wireless stations and an optional central
base station, known as the Access Point (AP).
A. BSS
B. ESS
C. DSS
Ans. A
125. The BSS without an AP is a stand-alone network and cannot send data to other BSSs. It is called an
.
B. infrastructure network
Ans. A
A. ad hoc network
B. infrastructure network
Ans. B
127. In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two
.
A. BSSs
B. ESSs
C. APs
Ans. C
128. In IEEE 802.11, an is made up of two or more BSSs with Access Points (AP).
A. BSS
B. ESS
C. DSS
Ans. B
129. A station with mobility is either stationary (not moving) or moving only inside a BSS.
A. no-transition
B. BSS-transition
C.ESS-transition
Ans. A
130. A station with mobility can move from one BSS to another, but the movement is confined
inside one ESS.
A. no-transition
B. BSS-transition
C.ESS-transition
Ans. B
131. A station with mobility can move from one ESS to another.
A. no-transition
B. BSS-transition
C.ESS-transition
Ans. C
132. defines two types of MAC sublayers, namely, the Distributed Coordination Function (DCF)
and the Point Coordination Function (PCF)
A. IEEE 802.11
B IEEE 802.3
C. IEEE 802.1
D. IEEE 802.5
Ans. A
133. In wireless networking, the or hidden terminal problem occurs when a node is visible from a
wireless access point (AP), but not from other nodes communicating with said AP. This leads to difficulties in
media access control.
B. congestion problem
C. visibility problem
Ans. A
A. DCF
B. PCF
Ans. B
135. Which one of the following is not defined by IEEE 802.11 wireless LAN
A. Management frames
B. Control frames
C. Data frames
D. Administrative frames
Ans. D
A. Wireless LAN
B. Wired LAN
C. LAN
Ans. A
A. wireless communication
B. wired LAN
C. LAN
Ans. A
A. piconet
B. Scatternet
Ans. A
139. Piconet (bluetooth) can have up to stations, one of which is called the master (primary device);
the rest are called slaves (secondary devices).
A. 8 B. 7 C. 6 D. 5
Ans.8
A. piconet
B. Scatternet
C. extranet
Ans. B
141. In Bluetooth, the layer is roughly equivalent to the physical layer of the Internet model.
A. radio
B. baseband
C. L2CAP
Ans. A
142. In Bluetooth, the layer is roughly equivalent to the MAC sublayer in LANs.
A. radio
B. baseband
C. L2CAP
Ans. B
143. In Bluetooth, the layer is roughly equivalent to the LLC sublayer in LANs.
A. radio
B. baseband
Ans. C
A. FDMA
B. CDMA
C. TDD-TDMA
Ans. C
145. In Bluetooth, the link is used when avoiding latency is more important than integrity.
Ans. A
146. In Bluetooth, is used when data integrity is more important than avoiding latency.
Ans.B
A. Adhoc networking
B. Cable replacement
Ans. D
148. Both Bluetooth and Wi-Fi are used for providing wireless communication through radio signals. The
most distinction between Bluetooth and Wifi is that,
A. Bluetooth is actually accustomed connect short-range devices for sharing information whereas Wifi is used for
providing high-speed web access or internet.
Ans. A
Ans. D
150. All networks except those using co-axial cable require a central location to bring media segment
together. These central locations are called .
151. A simply combines the signals of network segments. There is no signal regeneration.
A. Passive hubs
B. Active hubs
C. Intelligent hub
Ans. A
A. Passive hubs
B. Active hubs
C. Intelligent hub
Ans. B
153. regenerates the signal and performs some network management and intelligent path
selection.
A. Passive hubs
B. Active hubs
C. Intelligent hub
Ans. C
A. Physical layer
Ans. A
B. Network layer
C. Transport layer
D. Application layer
Ans. A
156. A receives a signal and before it becomes too weak or corrupted, regenerates the original
bit pattern. The repeater then sends the refreshed signal.
Ans. B
Ans. A
Ans. D
A. Single port repeater & Multiport repeater B. Smart repeater C. Optical repeater D. Audio repeater Ans.
layer Ans. A
162. A extends the maximum distance of network by connecting separate network segment, and
simply passes on all the signals it receives. It reads the address of all the signal it receives.
Ans. C
B. Network layer
C. Transport layer
Ans. A
C. Routing
Ans. D
165. Which of the following functions that a bridge cannot perform are
Ans. C
Ans. D
B. Network layer
Ans. C
169. A is a three layer device that routes packets based on their logical addresses. It connects
two or more networks.
Ans. D
Ans. D
Ans. D
B. Network layer
C. Transport layer
D. Application layer
Ans. C
A. physical layer B. data link layer C. network layer D. all seven layers
Ans. D
A. Network adapter
B. Memory Cards
C. Expansion cards
Ans. A
B. Memory Cards
C. Expansion cards
Ans. A
176. is a circuit board installed in a computer that provides a dedicated network connection to the
computer. It is also called network interface controller, network adapter or LAN adapter.
A. NIC
B. Memory Cards
C. Expansion cards
Ans. A
B. NIC allows communications between computers connected via local area network (LAN) as
well as communications over large-scale network through Internet Protocol (IP).
C. NIC is both a physical layer and a data link layer device, i.e. it provides the necessary hardware circuitry so that
the physical layer processes and some data link layer processes can run on it.
Ans. D
178. is a device which has a block of memory, reserved for storing incoming data until they are
processed.
B. Chip
C. Buffer
Ans. C
179. In selective reject ARQ only, specific damaged or lost frame is transmitted.
B. ARQ
C. go-back N ARQ
D. Selective-Repeat ARQ
Ans. A
Ans. B
A. Ethernet
C. FDDI
A. Switched Ethernet
B. Fast Ethernet
C. Gigabit Ethernet
Ans. D
A. Receive Ready (RR), Receive Not Ready (RNR), Reject (REJ), Selective Reject (SREJ)
Ans. A
Ans. A
1. The layer is responsible for the delivery of individual packets from source host to the
destination host.
A. packetizing
B. routing
C. forwarding
Ans. D
3. The process of encapsulating the data received from upper layers of the network (also called as payload) in
a network layer packet at the source and decapsulating the payload from the network layer packet at the
destination is known as .
A. packetizing
B. routing
C. forwarding
Ans. A
A. logical addressing
B. routing
Ans. C
5. Network layer functions are logical addressing and routing. In addition, other functions are
A. Datagram encapsulation
Ans. D
6. When a packet passes the network boundary, the network layer adds the addresses of the sender
and receiver.
A. logical
C. port
Ans. A
A. 2 B. 3 C. 4 D. 5
Ans. D
9. Each Internet address consists of four bytes (32 bits), defining three fields:
A. class type
B. netid
C. hostid
Ans. D
10. An is made of four bytes (32 bits) that define a host's connection to a network.
B. physical address
C. port address
Ans. A
A. 2 B. 3 C. 4 D. 5
Ans. C
12. IPv4 uses 32-bit addresses, which means that the address space is
A. 2
B. 2
Ans. A
A. Consumed
B. Reserved
C. Wasted
Ans. C
14. In classful addressing, the whole address is divided into two parts that are
Ans. A
15. addresses were designed for large organizations with a large number of attached hosts or
routers.
A. Class A
B. Class B
C. Class C
Ans. A
16. addresses were designed for midsize organizations with tens of thousands of attached hosts
or routers.
A. Class A
B. Class B
C. Class C
Ans. B
A. Class A
B. Class B
C. Class C
Ans. C
18. addresses are used for multicast services that allow a host to send information to a group of
hosts simultaneously.
A. Class A
B. Class B
C. Class C
D. Class D
Ans. D
A. Class A
B. Class B
C. Class D
D. class E
Ans. D
20. In network, the first byte is assigned to the network address and the remaining three bytes
used for the node address.
A. Class A
B. Class B
C. Class C
D. Class D
Ans. A
21. In network, the first two bytes are assigned to the network address and the remaining two
bytes used for the node address.
A. Class A
C. Class C
D. Class D
Ans. B
22. In network, the first three bytes are assigned to the network address and the remaining one
byte used for the node address.
A. Class A
B. Class B
C. Class C
D. Class D
Ans. C
A. 0.0.0.0 to 127.255.255.255
B. 128.0.0.0 to 191.255.255.255
C. 192.0.0.0 to 223.255.255.255
D. 224.0.0.0 to 239.255.255.255
Ans. A
A. 0.0.0.0 to 127.255.255.255
B. 128.0.0.0 to 191.255.255.255
C. 192.0.0.0 to 223.255.255.255
D. 224.0.0.0 to 239.255.255.255
Ans. B
A. 0.0.0.0 to 127.255.255.255
B. 128.0.0.0 to 191.255.255.255
C. 192.0.0.0 to 223.255.255.255
D. 224.0.0.0 to 239.255.255.255
A. 0.0.0.0 to 127.255.255.255
B. 128.0.0.0 to 191.255.255.255
C. 192.0.0.0 to 223.255.255.255
D. 224.0.0.0 to 239.255.255.255
Ans. D
A. 128.0.0.0 to 191.255.255.255
B. 192.0.0.0 to 223.255.255.255
C. 224.0.0.0 to 239.255.255.255
D. 240.0.0.0 to 255.255.255.255
Ans. D
for loopback and diagnostic functions. These addresses are called addresses.
A. loopback
B. link-local
Ans. A
Ans. C
A. Class A
C. Class B
D. Class E
Ans. A
A. Class A
B. Class C
C. Class B
D. Class E
Ans. B
A. Class A
B. Class C
C. Class B
D. Class E
Ans. C
A. Class A
B. Class C
C. Class B
D. Class E
Ans. D
A. Class A
B. Class B
C. Class C
D. Class D
Ans. D
A. Class A
B. Class B
C. Class C
D. Class D
Ans. C
A. Class A
B. Class B
C. Class C
D. Class D
Ans. A
A. Class A
B. Class B
C. Class C
D. Class E
Ans. D
A. Class A
B. Class B
C. Class C
D. Class E
Ans. A
A. Class A
B. Class B
C. Class C
Ans. D
A. Class A
B. Class B
C. Class C
D. Class E
Ans. C
A. Class A
B. Class B
C. Class C
D. Broadcast address
Ans. D
42. In addressing, variable length blocks are assigned that belong to no class. The entire
address space is divided into blocks of different sizes. An organization is granted a block suitable for its
purposes.
A. Classful
B. Classless
Ans. B
C. Memory is allocated in terms of bits and bytes rather than huge chunks of contiguous memory.
Ans. D
B. segments
Ans. A
45. is a networking term that defines the largest packet size that can be sent over a network
connection.
B. Segment
C. Packet
D. Frame.
Ans. A
46. identifies a network with a range of Internet Protocol addresses in the Internet. It also allows
large networks to be divided into smaller networks, each with its own set of IP addresses.
A. subnetting a network
B. intranet
C. extranet
Ans. A
Ans. D
48. Classless Inter Domain Routing (CIDR) is needed to resolve the following problems the Internet faced
Ans. C
49. CIDR provides the following solutions developed and adopted by the global Internet community
Ans. C
50. is a new addressing scheme for the Internet which allows for more efficient allocation of IP
addresses than the old Class A, B, and C address scheme.
A. CIDR
B. IPv6
Ans. A
51. For IPv4, is an alternative to the older system of representing networks by their
starting address and the subnet mask, both written in dot-decimal notation. 192.168.100.0/24 is equivalent to
192.168.100.0/255.255.255.0.
A. CIDR notation
B. IPv6
Ans. A
52. refers to the way a packet is delivered to the next node and it requires a host or router to have a
routing table.
A. Forwarding
B. routing
C. transferring
Ans. A
C. Default method
Ans. D
54. In the , routing table stores only the address of the next hop and this method
reduces the content of routing table.
C. Default method
Ans. A
55. In the , routing table contains only the address of the destination network and
this method reduces the routing table size.
C. Default method
Ans. B
56. In the , host is connected with more than one routers and a router is assigned to receive
all packets with no match in the routing table. Default router is used for communication with outside world.
C. Default method
Ans. C
57. The protocol is the transmission mechanism used by the TCP/IP suite.
58. is an Internet Protocol (IP) process that breaks packets into smaller pieces (fragments), so
that the resulting pieces can pass through a link with a smaller maximum transmission unit (MTU) than the
original packet size. The fragments are reassembled by the receiving host.
A. IP fragmentation
B. segmentation
C. framing
Ans. A
A. unreliable
B. connectionless
Ans. C
Ans. A
B. Fragment the data into smaller units if it is greater than a given amount (64 Kb)
C. Report errors
Ans. D
62. At the network layer (the internetwork layer), TCP/IP supports the Internetworking Protocol (IP) which,
in turn, uses the following Supporting protocols
B.ICMP
C. IGMP
Ans. D
63. A protocol in the TCP/IP protocol suite that handles error and control messages is
Ans. D
A. Error reporting
B. Query
Ans. C
Ans. A
A. IP packet
B. IP protocol
C. IP frame
Ans. B
67. A host may know its IP address, but it may not know the
A. Corresponding Mask
B. Corresponding Clock
C. Corresponding Data
D. Corresponding Protocol
68 is used to find the physical address of the node when its Internet address is known.
Ans. B
69. allows a host to discover its Internet address when it knows only its physical
address.
A. IP B. Address Resolution Protocol (ARP) C. Reverse Address Resolution Protocol (RARP) D. ICMP Ans.
71. is a client/server protocol that configures a diskless computer or a computer that is booted
for the first time.
A. IP address
B. net mask
Ans. D
74. is a network management protocol used on Internet Protocol (IP) networks, whereby a
DHCP server dynamically assigns an IP address and other network configuration parameters to each device
on the network, so they can communicate with other IP networks.
B. BOOTP
D. IGMP
Ans. A
Ans. A
A. static, dynamic
B. dynamic, static
C. dynamic, dynamic
Ans. A
A. Routing
B. transferring
C. delivering
Ans. A
78. Router maintains table which contains address of each destination where packets are to be sent.
A. routing
B. forwarding
C. transferring
Ans. A
79. routing manually sets up the optimal paths between the source and the destination computers.
A. Static
B. Dynamic
Ans. A
80. routing uses dynamic protocols to update the routing table and to find the optimal path
between the source and the destination computers.
A. Static
B. Dynamic
Ans. B
81. means finding a suitable path for a packet from sender to destination and is the process
of sending the packet toward the destination based on routing information.
A. Routing, Forwarding
B. Routing, Transferring
C. Delivering, Transferring
Ans. A
82. is group of networks and routers under the authority of a single administration.
B. Individual system
Ans. A
C. AS
Ans. A
C. AS
Ans. B
Ans. C
Ans. D
Ans. A
Ans. B
Ans. C
Ans. A
91. protocols rely on two mechanisms: reliable dissemination of link-state information, and
the calculation of routes from the sum of all the accumulated link-state knowledge.
Ans. A
92. is the process of making sure that all the nodes participating in the routing protocol get a
copy of the link-state information from all the other nodes.
A. Reliable flooding
B. OSPF
C. BGP
Ans. A
Ans. B
Ans. D
95. Both provider networks and end user sites are administratively
B. intradomains
C. interdomains
Ans. A
96. An is a set of routers that are administratively configured to exchange link-state information with
each other.
A6s. A
A. area 0
B. area 1
C. area 2
Ans. A
A. router
B. switch
C. bridge
Ans. A
99. When dividing a domain into areas, the network administrator makes a tradeoff between scalability and
optimality of routing.
A. scalability, optimality
B. scalability, inefficiency
C. unscalability
Ans. A
100. are used to exchange routing information between ISPs, or in some cases between a customer's
AS and the provider's network.
B. BGP
Ans. A
101. , version 4 is the most common EPG and is considered the Internet standard.
B. AS
C. ABR
Ans. A
A. Stub AS
C. Transit AS
Ans. D
Ans. A
Ans. D
C. Nowadays IP addresses are assigned not just to full blown computers but also mobile phones, televisions and
other household appliances.
Ans. D
A. IPv4
B. IPv6
C. physical address
A. Classful
B. Classless
Ans. B
Ans. A
Ans. D
Ans. D
Ans. D
Ans. D
B. Videoconferencing
C. Shared applications
Ans. D
114. A node may be assigned an IPv4-compatible IPv6 address by zero-extending a 32-bit IPv4 address to 128
bits.
A. zero
B. one
Ans. A
A. 47CD::A456:0124
B. 47CD:A456:0124
Ans. A
116. When continuous 0s (zeros) are available in IPv6 address notaion then all zeros are replaced by .
A. ::
C. ;
Ans. A
117. When in hexadecimal notation of IPv6 all fields are 0, It is denoted by ::. (:: = 0:0:0:0:0:0:0:0). This
address is called
A. Unspecified address
B. Loopback address
Ans. A
118. When in hexadecimal notation of IPv6 all fields are 0 except the last field and last field value is 1, it is
denoted by ::1. (::1 = 0:0:0:0:0:0:0:1). This address is called
A. Unspecified address
B. Loopback address
Ans. B
A. IPv6
B. IPv4
Ans. A
120. The longer address format in IPv6 helps to provide a useful, new form of autoconfiguration called
, which does not require a server.
A. stateless autoconfiguration
B. stateful autoconfiguration
Ans. A
Ans. D
B. Single sender, multiple receivers; a receiver host specify multicast group and a sender.
Ans. D
Ans. D
C. ICMP
Ans. A
125. is used by IPv6 routers for discovering multicast listeners on a directly attached link,
much like Internet Group Management Protocol (IGMP) is used in IPv4. The protocol is embedded in
ICMPv6 instead of using a separate protocol.
C. ICMP
Ans. A
126. Distance vector algorithm for unicast can be extended to support multicast. This protocol is called
which is a flood-and-prune protocol.
B. RIP
C. BGP
Ans. A
Ans. A
128. is a group-based tree routing protocol that has a rendezvous point (RP) as the source of tree.
Ans. A
Ans. B
C. Link failure would not have any serious effect on communication if it is possible to find an alternate route around
the failure and update the forwarding table accordingly.
Ans. D
131. enables a user to have a large set of addresses internally and one
address, or a small set of addresses, externally (public network). The traffic inside can use the larget set, the
traffic outside can use the small set.
B. ARP
C. RARP
Ans. A
A. Adaptive Routing
Ans. C
Ans. B
A. Masking
C. Routing
Ans. A
is a small packet containing routing information sent by a router to all other router in a link
state routing.
B. Segment
C. Datagram
Ans. A
Ans. D
Ans. C
3. The layer is lying between the network layer and session layer
Ans. C
4. The layer gets the entire message to the correct process on the destination systems by adding a
type of address called a service-point address (or port address).
Ans. C
Ans. C
C. Multiplexing
Ans. D
A. Connection services
B. Connectionless services
Ans. C
Ans. A
Ans. C
Ans. C
11. layer performs error control if the lower layers are not adequately error free.
Ans. C
12. layer performs flow control if flow control is not done adequately at the network layer.
Ans. C
13. Transport layer requires transport layer address called a for selecting multiple processes
running on the destination host.
A. physical address
B. logical address
Ans. C
14. In the Internet model, the port numbers are bits integers between 0 and 65,535.
A. 16 B. 32 C. 64 D. 128
Ans. A
15. The client program defines itself with a port number, chosen randomly by the transport layer software
running on the client host. This is the port number.
A. ephemeral
B. well-known
Ans. A
16. Server define a port number but not randomly. Internet has decided to use universal port numbers for
servers, these are called port numbers.
A. ephemeral
B. well-known
Ans. B
17. Well-known port numbers ranging from are assigned and controlled by Internet Assigned
Number Authority (IANA).
A. 0 to 1023
B. 1024 to 49151
C. 49152 to 65535
Ans. A
18. Registered port numbers ranging from are not assigned and controlled by IANA.(only
registered to prevent duplication)
A. 0 to 1023
B. 1024 to 49151
C. 49152 to 65535
Ans. B
19. Ephemeral port numbers (Dynamic port numbers) ranging from are neither controlled nor
registered. (used by any process)
A. 0 to 1023
B. 1024 to 49151
C. 49152 to 65535
20. has Error Control, Sequence Control, Loss Control and Duplication Control.
A. Reliable delivery
B. unreliable delivery
Ans. A
21. In the transport layer, when transferring data, the primary goal of reliability is . Data must be
delivered to their destination exactly as they originated from the source.
A. Error Control
B. Sequence Control
Ans. A
22. When the size of the data unit received from the upper layer is too long for the network layer datagram
or data link frame to handle, the transport protocol divides it into smaller usable blocks called segments. This
process is called .
A. Segmentation
B. Concatenation
Ans. A
23. When the size of the data units belonging to a single session are so small, the transport protocol can fit
several data units together into a single datagram or frame. The combining process is called .
A. Segmentation
B. Concatenation
Ans. B
A. Error Control
B. Sequence Control
C. Loss Control
D. Duplication Control
Ans. C
25. The transport layer functions must guarantee that no piece of data arrive at the receiving system
duplicated. This is called .
A. Error Control
B. Sequence Control
C. Loss Control
D. Duplication Control
Ans. D
A. Error Control
B. Flow Control
C. Loss Control
D. Duplication Control
Ans. B
27. is the process of combining multiple signals into one signal, over a shared medium.
A. Multiplexing
B. Demultiplexing
C. Synchronization
Ans. A
28. a process reconverting a signal containing multiple analog or digital signal streams back
into the original separate and unrelated signals.
A. Multiplexing
C. Synchronization
Ans. B
Ans. D
30. Which of the following is true about User Datagram Protocol (UDP)?
Ans. D
A. pseudoheader
B. UDP header
C. It is suitable for a process with internal flow and error control mechanisms.
A. In multicasting
Ans. C
A. UDP
B. TCP
C. IP
Ans.A
Ans. B
37. runs over UDP and it is a network protocol for delivering audio and video
over IP networks.
B. TCP
C. IP
Ans. A
Ans. B
Ans. C
40. The Internet’s is probably the most widely used protocol of this type.
Ans. A
41. provides a reliable end-to-end byte stream delivery over an unreliable internetwork.
Ans. A
Ans. A
B. physical addresses
C. port numbers
Ans. C
Ans. B
A. Segment
B. data unit
Ans. A
A. Segment
B. data unit
Ans. A
B. Full-Duplex Communication
48. TCP allows the sending process to deliver data as a stream of bytes and the receiving process to receive
data as a stream of bytes. This is .
B. Full-Duplex Communication
Ans. A
49. TCP offers , in which data can flow in both directions at the same time.
B. Full-Duplex Communication
Ans. B
50. TCP offers a , in which the two TCPs establish a connection between them,
data are exchange in both directions, and the connection is terminated.
B. Full-Duplex Communication
C. Connection-oriented Service
D. Reliable Service
Ans. C
51. Transport layer creates the connection between source and destination. Events involved in the connection
are:
A. Connection establishment
B. Data transfer
C. Connection release
Ans. D
52. TCP provides a in which it uses an acknowledgment mechanism to check the safe and
sound arrival of data.
B. Full-Duplex Communication
C. Connection-oriented Service
D. Reliable Service
Ans. D
53. The bytes of data being transferred in each connection are numbered by . The numbering
starts with a randomly generated number.
Ans. B
A. Sequence Number
B. Acknowledgment Number
Ans. C
55. After the bytes have been numbered, TCP assigns a sequence number to each segment that is being sent.
The for each segment is the number of the first byte carried in that segment.
A. Sequence Number
B. Acknowledgment Number
Ans. A
56. TCP packets can contain an which is the sequence number of the next byte the
sender expects to receive. The acknowledgement number is cumulative.
A. Sequence Number
B. Acknowledgment Number
Ans. B
57. Suppose a TCP connection is transferring a file of 5000 bytes. The first byte is numbered 10001. What is
the sequence number for Segment 1 if data is sent in five segments, each carrying 1000 bytes?
A. 10,001
B. 11,001
C. 12,001
A. Connection establishment
B. Connection termination
Ans. C
59. The algorithm used by TCP to establish and terminate a connection is called a .
A. three-way handshake
B. two-way handshake
C. four-way handshake
Ans. A
60. To keep track of all the different events happening during connection establishment, connection
termination, and data transfer, TCP is specified as a .
Ans. A
Ans. A
62. URG, ACK, PSH, RST, SYN and FIN are six flags in header
A. TCP
B. UDP
C. SCTP
Ans. A
63. balances the rate a producer creates data with the rate a consumer can use the data.
A. flow control
B. error control
C. access control
Ans. A
A. sliding window
B. silly window
65. A is used to make transmission more efficient as well as to control the flow of data so
that the destination does not become overwhelmed with data.
A. silly window
B. sliding window
Ans. B
66. TCP’s variant of the sliding window algorithm serves the following.
Ans. D
67. A serious problem can arise in the sliding window operation when the receiver is only able to accept a few
bytes at a time or when the sender transmits data in small segments repeatedly. This is called
syndrome.
A. sliding window
B. silly window
D. B
Ans. B
68. TCP guarantees the delivery of data. So, it retransmits each segment if an ACK is not received
in a certain period of time.
A. reliable
B. prompt
C. unreliable
Ans. A
69. In retransmission, TCP sets the timeout as a function of the , it expects between the two
ends of the connection.
Ans. A
Ans. A
71. To overcome the problem in calculating the RTT in today's world, TCP uses an
retransmission mechanism.
A. adaptive
B. incremental
C. additive
D. multiplicative
Ans. A
72. Whenever TCP retransmits a segment, it stops taking sample of the RTT it only measures sample RTT for
segments that have been sent only once. This solution is called .
Ans. A
73. In algorithm, the sender measures a new sample RTT as before. It then folds
this new sample into the timeout calculation. This algorithm is used by any end-to-end protocol.
A. Karn / Partridge
B. Jacobson / Karels
Ans. B
74. refers to techniques and mechanisms that can either prevent congestion, before it happens,
or remove congestion, after it has happened.
B. Congestion Control
C. Flow Control
D. Error control
Ans. B
Ans. C
76. In congestion control, policies are applied to prevent congestion before it happens.
A. open-loop
B. closed-loop
Ans. A
A. open-loop
B. closed-loop
Ans. B
78. algorithm is a feedback control algorithm best known for its use in TCP
congestion control.
A. Additive-Increase/Multiplicative-Decrease (AIMD)
B. Slow Start
Ans. A
79. In , TCP maintains a new state variable for each connection, called
Congestion Window, which is used by the source to limit how much data it is allowed to have in transit at a given
time.
A. Additive-Increase/Multiplicative-Decrease
B. Slow Start
Ans. A
80. TCP provides a mechanism, called , which is used to increase the congestion window rapidly
from a cold start. Slow start effectively increases the congestion window exponentially, rather than linearly.
A. Additive-Increase/Multiplicative-Decrease (AIMD)
B. Slow Start
Ans. B
81. When too many packets are rushing to a node or part of network, the network performance degrades,
and this situation is called as .
A. Collision
B. Congestion
C. trap
D. error
Ans. B
82. occurs because the switches in a network have a limited buffer size to store arrived packets
before and after processing.
A. Congestion
B. Collision
C. Jamming
A. Packet elimination
B. Flow control
Ans. D
84. A scheme allows a network to operate in the region of low delay and high
throughput. It is a prevention mechanism.
A. Congestion control
B. Congestion avoidance
Ans. B
Ans. A
86. The first mechanism was developed for use on the Digital Network Architecture (DNA), a
connectionless network with a connection-oriented transport protocol. This technique is implemented in
routers to avoid congestion.
A. DECBit
C. TCP Vegas
Ans. A
87. When too many packets are rushing to a node or part of network, the network performance degrades,
and this situation is called as .
B. Congestion
C. trap
D. error
Ans. B
88. A scheme allows a network to operate in the region of low delay and high
throughput. It is a prevention mechanism.
A. Congestion control
B. Congestion avoidance
Ans. B
Ans. A
90. The first mechanism was developed for use on the Digital Network Architecture (DNA), a
connectionless network with a connection-oriented transport protocol. This technique is implemented in
routers to avoid congestion.
A. DECBit
C. TCP Vegas
Ans. A
91. is a traffic shaping mechanism. In it, the input rate can vary but the output rate remains
constant. A technique called leaky bucket can smooth out bursty traffic.
A. Leaky bucket
B. DECBit
Ans. A
92. The technique of back pressure refers to a congestion control mechanism in which a congested node stops
receiving data from the immediate upstream node or nodes.
A. backpressure
B. choke packet
C. implicit signaling
D. explicit signaling
Ans. A
A. backpressure
B. choke packet
C. implicit signaling
D. explicit signaling
Ans. B
94. In , there is no communication between the congested node or nodes and the source. The
source guesses that there is a congestion somewhere in the network from other symptoms.
A. backpressure
B. choke packet
C. implicit signaling
D. explicit signaling
Ans. C
95. In the method, the signal is included in the packets that carry data.
A. backpressure
B. choke packet
C. implicit signaling
D. explicit signaling
Ans. D
A. SCTP is a message-oriented,
B. reliable protocol that combines the best features of UDP and TCP
Ans. D
A. single stream
B. multistream
C. double stream
Ans. B
B. multiple IP address
Ans. B
B. an SI
C. an SSN
Ans. A
100. To distinguish between different data chunks belonging to the same stream, SCTP uses
.
A. TSNs
B. SIs
Ans. C
A. segment; packets
B. packets; segments
C. frames; segments
Ans. A
B. data chunks
C. control chunks
Ans. C
A. no data chunks
Ans. C
104. In SCTP, the acknowledgment number and window size are part of each .
A. Control chunk
B. data chunk
C. (a) or (b)
Ans. A
Ans. C
A. 8
B. 16
C. 32
D. 64
Ans. C
Ans. B
108. In STP, control information and data information are carried in chunks.
B. different chunks
Ans. B
A. before
B. after
Ans. A
A. no other chunk
Ans. A
A. transmission
B. negotiation
C. association
Ans. C
113. Which of the following is/are true about Quality of Service (QoS)?
A. Quality of Service (QoS) is a set of technologies that work on a network to guarantee its ability to dependably
run high-.priority applications and traffic under limited network capacity.
B Measurements of concern to QoS are bandwidth (throughput), latency (delay), jitter (variance in latency), and error
rate.
Ans. C
114. The defines a set of attributes related to the performance of the connection.
For each connection, the user can request a particular attribute; each service class is associated with a set of
attributes.
B. Stream service
Ans. A
A. Reliability
B. Bandwidth
Ans. D
B. to increase delay
Ans. A
A. User-oriented
B. Network-oriented
Ans. C
119. Which of the following are true about delay and jitter?
A. Delay is the time it takes a packet to travel across the network from source to destination.
B. Jitter is the fluctuation of end-to-end delay from packet to the next packet.
Ans. C
120. Packets from different flows arrive at a switch or router for processing. The routers and switches have
queues (buffers) that hold the packets before and after processing. The scheduling method of processing the
packets waiting in a queue is called .
A. Waiting
B. Queuing
C. Flowing
Ans. B
B. Priority queuing
Ans. D
122. on networks is an error-correction technique which can be used to correct data loss in
packets sent over networks. The way in which interleaving works can create latency issues (the time delay
between data being sent and data being received).
A. intruding
B. interleaving
C. mixing
Ans. B
A. framing bits
B. DECbit
Ans. A
A. bottom
B. top
C. middle
Ans. B
2. The TCP/IP corresponds to the Session, Presentation, and Application layers of the OSI
model.
A. application layer
B. presentation layer
C. session layer
Ans. A
B. Message
C. Segment
D. Frame
Ans. B
4. Which of the following is/are the important applications of the application layer?
A. Electronic mail
C. USENET
Ans. D
C. Mail service
Ans. D
A. End to end
B. Process to process
Ans. A
A. HTTP
B. SMTP
C. FTP
D. TCP
BA. physical
B. logical
C. port
D. specific
Ans. D
A. E-mail address
Ans. C
Ans. A
11. SMTP and HTTP are ; Internet Explorer and Chrome are .
Ans. A
Ans. D
A. The companion protocol specifies the format of data that can be exchanged.
Ans. D
14. The is the network of pages of images, texts and sounds on the Internet which can
be viewed using browser software .
B. HTTP
C. FTP
Ans. A
15. The is a repository of information linked together from point all over the world.
Ans. C
A. flexibility
B. portability
C. user-friendly features
Ans. D
B. IETF
C. IANA
Ans. A
18. The today is a distributed client/server service, in which a client using a browser can
access a service using a server. However, the service provided is distributed over many locations called sites.
B. HTTP
C. FTP
Ans. A
19. is a program, which is used to communicate with web server on the Internet.
A. HTTP
B. FTP
C. Web browser
Ans. C
A. two
B. three
C. four
Ans. B
A. controller
B. client protocol
Column X Column Y
III. Interpreter 3. Receives input from input device and use the programs to access
the documents.
Ans. A
23. The is a standard for specifying any kind of information on the Internet.
(HTML) Ans. C
A. two
B. three
C. four
D. five
Ans. C
26. In the URL, the is the client-server program which is used to retrieve the
document or file.
A. protocol
B. host
C. port
D. path
Ans. A
27. In the URL, the is the name of computer on which the information is located.
A. protocol
B. host
C. port
D. path
Ans. B
28. The URL can optionally contain the and it is separated from the host name by a colon.
A. protocol
B. host
C. port number
D. path
Ans. C
29. The documents in the WWW can be grouped into broad categories.
A. two
C. four
D. five
Ans. B
30. The documents in the WWW can be grouped into the following categories
Ans. C
31. documents are fixed-content documents that are created and stored in a server. The
client can get only a copy of the document.
A. Static
B. Dynamic
C. Active
Ans. A
Ans. A
33. A document is created by a Web server whenever a browser requests the document.
A. Static
B. Dynamic
C. Active
Ans. B
A. Server-site dynamic
B. Client-site dynamic
Ans. A
36. For many applications, we need a program or a script to be run at the client site. These are called
documents.
A. Static
B. Dynamic
C. Active
Ans. C
A. Java applet
B. CGI
C. GUI
Ans. A
A. Server-site dynamic
Ans. B
39. The is a protocol used mainly to access data on the World Wide Web. It functions as a
combination of FTP and SMTP.
Ans. C
A. 70
B. 80
C. 60
D. 90
Ans. B
A. FTP; SMTP
B. FTP; SNMP
C. DNS; TFTP
Ans. A
A. TCP
B. UDP
C. SCTP
43. A protocol does not require the server to retain session information or status about each
communicating partner for the duration of multiple requests.
A. stateful
B. stateless
Ans. B
A. stateful
B. stateless
Ans. B
45. A protocol that requires keeping of the internal state on the server is known as a protocol.
A. stateful
B. stateless
Ans. A
A. stateful
B. stateless
Ans. A
Ans. A
Ans. A
Ans. B
Ans. B
51. The first line in the request message is ; the first line in the response message is
.
A. 0.9
B. 1.0
C. 1.1
Ans. C
53. Match the following between the column ‘Method’ and the column ‘Action’.
Method Action
III. PUT 3. Sends some information from the client to the server
Ans. B
54. In HTTP, the exchanges additional information between the client and the server.
A. Header
B. Request line
C. Status line
Ans. A
B. status code
C. URL
Ans. A
Ans. B
Ans. A
A. persistent
B. nonpersistent
Ans. B
59. In a connection, the server leaves the connection open for more requests after
sending a response.
A. persistent
B. nonpersistent
Ans. A
A. persistent
B. nonpersistent
Ans. A
61. HTTP supports servers which are computers that keep copies of responses to recent requests.
A. parallel
B. Proxy
C. additional
Ans. B
Ans. B
A. UDP
B. TCP
C. SCTP
Ans. B
Ans. B
65. FTP establishes two connections between the hosts. One connection is used for , the other for
.
Ans. A
A. four
B. three
C. two
Ans. C
67. The well-known port is used for the control connection and the well-known port for the data
connection.
A. 18; 17
B. 19; 18
C. 21; 20
D. 20; 19
Ans. C
A. Client-server
B. P2P
C. Data centric
Ans. A
69. In FTP, is the service type used by the IP protocol because this is an interactive connection
between a user (human) and a server.
A. minimize delay
B. Maximize throughput
C. minimize error
Ans. A
70. For the control connection, FTP uses the character set.
A. EBCDIC
B. regular ASCII
C. NVT ASCII
Ans. C
A. exactly twice
B. exactly once
Ans. B
A. exactly twice
B. exactly once
Ans. C
73. In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute
called .
B. file types
C. transmission modes
Ans. A
74. In FTP, there are three types of : stream, block, and compressed
A. data structures
B. file types
C. transmission modes
Ans. C
A. data structures
B. file type
C. transmission modes
Ans. B
A. retrieve a file
B. retrieve a list
Ans. C
A. retrieve a list
B. retrieve a file
C. Store a file
Ans. D
79. If 5 files are transferred from server A to client B in the same session. The number of TCP connections
between A and B is
A. 5
B. 6
C. 2
D. 10
Ans. B
B. is stateless
Ans. A
81. The commands, from client to server, and replies, from server to client, are sent across the control
connection in bit ASCII format.
a) 3
b) 5
c) 7
d) 8
Ans. C
Ans. D
83. The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is
A. Stream mode
B. Block mode
C. Compressed mode
D. Message mode
Ans. A
A. PASSWD
B. PASS
C. PASSWORD
D. PWORD
Ans. B
85. The major difference between FTP and HTTP is that FTP is a system (FTP can be used to
copy/move files from a server to a client as well as upload/transfer files from a client to a server). HTTP, on
the other hand, is strictly : "transferring files from the server to a client".
A. three-way; two-way
B. two-way; one-way
Ans. B
86. Which of the following is/are true about Trivial File Transfer Protocol (TFTP)?
A. TFTP is frequently used to allow diskless hosts to boot over the network.
B. TFTP is implemented by the TFTP client program and by the TFTP server program.
87. is a complete, session-oriented, general purpose file transfer protocol, and it can be used
interactively. is used as a bare-bones special purpose file transfer protocol, and it allows only
unidirectional transfer of files.
A. FTP; SCTP
B. FTP; TFTP
C. SNMP; TFTP
Ans. B
88. are self-contained, modular, distributed, dynamic applications that can be described,
published, located or invoked over the network to create products, processes, and supply chains.
A. Web services
B. internet services
Ans. A
C. Web services are built on top of open standards such as TCP/IP, HTTP, Java, HTML, and XML.
Ans. A
91. Web services make full use of the following open standards
Ans. D
B. Manager
Ans. A
94. provides service to the user to make the process of sending and receiving a message
easier.
A. An MTA
B. An MAA
C. A UA
Ans. C
95. A is a software package (program) that composes, reads, replies to and forward messages. It
also handle mailboxes.
B. Manager
Ans. A
A. Composing messages
Ans. D
Ans. A
98. A user agent accepts a one-character command from the keyboard to perform its task.
A. Command-driven
B. GUI-based
Ans. A
A. mail
B. pine
C. elm
Ans. D
100. contain Graphical User Interface (GUI) components to interact with the software by using
the keyboard and the mouse. They have graphical components such as icons, menu bars, and windows that
make the services easy to access.
A. Command-driven
B. GUI-based
Ans. B
A. Eudora
B. Microsoft Outlook
C. Netscape.
Ans. D
Ans. A
103. is an Internet protocol used to send audio, video, programs, graphics and other
binary files.
A. RFC 822
Ans. B
104. specifies how to convert the non-ASCII data into ASCII allowing it to remain compatible
with existing email protocols.
A. RFC 822
Ans. B
A. 3 B. 4 C. 5 D. 6
Ans. C
A. MIME-Version
Ans. D
107. When the sender and the receiver of an email are on the same system, we need only .
A. one UA
B. two UAs
C. 3 UAs
Ans. B
108. When the sender and the receiver of an email are on different systems, we need only .
A. one UA
B. two UAs
Ans. C
109. When the sender is connected to the mail server via a LAN or a WAN, we need .
A. two MTA
Ans. B
Ans. A
A. UAs
Ans. B
112. The protocol that defines the MTA client and server in the Internet is called .
Ans. B
A. push
B. pull
Ans. A
A. 11
B. 12
D. 14
Ans. D
A. two
B. three
C. four
D. five
Ans. B
116. The process of transferring a mail message occurs in the following phases.
C. Mail transfer
Ans. A
A. Post Office Protocol (POP) version 3; Internet Message Access Protocol (IMAP4).
B. Post Office Protocol (POP) version 3; Internet Group Management Protocol (IGMP)
Ans. A
A. POP3 is simple and limited functionality & POP3 client is needed on user machine and POP3 server on the mail
server machine.
C. It then sends its user name and password to access the mailbox. User can then access the email.
Ans. D
C. SMTP
Ans. A
120. Which of the following can be doing by a user with use of IMAP?
B. A user can search the contents of the email for a specific string of characters prior to downloading & a user can
partially download email
C. A user can create, delete, or rename mailboxes on the mail server; a user can create a hierarchy of mailboxes in a
folder for email storage.
Ans. D
A. MTA
B. MAA
Ans. C
A. telecommunication network
B. telephone network
C. terminal network
Ans. C
A. FTP
B. TELNET
D. SMTP
Ans. B
A. remote login
B. television on net
Ans. A
A. general-purpose
B. specific-purpose
Ans. A
126. TELNET uses only one TCP connection. The server uses port and the client uses
port.
A. a well-known; a registered
B. a well-known; an ephemeral
C. an ephemeral; a well-known
D. a registered; an ephemeral
Ans. B
127. The is software residing on the remote system that allows the remote system to
receive characters from a TELNET server.
A. pseudoterminal driver
B. terminal driver
Ans. A
A. TELNET server
B. TELNET client
C. terminal driver
Ans. B
129. The translates NVT characters into a form acceptable by the remote operating system.
A. TELNET server
B. TELNET client
C. terminal driver
Ans. A
130. Which of the following statements is correct for “character at a time” mode?
A. Most text typed is immediately sent to the remote host for processing
B. Character processing is done on the local system under the control of the remote system
C. All text is echoed locally, only completed lines are sent to the remote host
D. All text is processed locally, and only confirmed lines are sent to the remote
host Ans. A
131. What is the correct syntax to be written in the web browser to initiate a TELNET connection to
www.xyz.com?
A. TELNET//www.xyz.com
B. TELNET:www.xyz.com
C. TELNET www.xyz.com
D. TELNET://www.xyz.com
Ans. D
Ans. D
Ans. A
A. default mode
B. server mode
C. character mode
D. line mode
Ans. D
B. it is not possible
used Ans. D
A. WILL
B. WONT
C. DO
D. DONT
Ans. B
B. WONT
C. DO
D. DONT
Ans. A
138. If the sender wants an option disabled by the receiver, it sends a command.
A. WILL
B. WONT
C. DO
D. DONT
Ans. D
Ans. D
B. Windows
Ans. C
A. private-key cryptography
B. public-key cryptography
142. Which standard TCP port is assigned for contacting SSH servers?
A. port 20
B. port 21
C. port 22
D. port 23
Ans. C
143. Which one of the following protocol can be used for login to a shell on a remote host except SSH?
A. TELNET
B. rlogin
Answer: C
144. Which one of the following is a file transfer protocol using SSH?
A. SFTP
B. SCP
C. Rsync
A. transport layer
C. connection layer
D. physical layer
Answer: D
146. Which one of the following feature was present in SSH protocol, version 1?
A. password changing
Ans: D
147. Which one of the following feature was present in SSH-2 protocol, version 2?
A. password changing
Ans: D
A. DHCP protocol
B. MGCP protocol
C. GCP protocol
Answer: D
A. host-based
B. public-key
C. password
Ans. D
Ans. D
Ans. A
Ans. A
A. Host aliasing
C. Load distribution
Ans. D
Ans. B
A. zone
B. label
C. domain
Ans. C
B. Domain and zone refers to the same thing, if a server accepts responsibility for a domain and does not divide the
domain into smaller domains.
C. If a server divides its domain into subdomains and delegates part of its authority to other servers, domain and
zone refer to different things.
Ans. D
157. In the Internet, the DNS (tree) is divided into different sections.
A. two
B. three
C. four
D. five
Ans. B
Ans. A
159. The define registered hosts according to their generic behavior. Each node in the tree
defines a domain, which is an index to the domain name space database.
A. Generic domains
B. country domains
C. inverse domains
Ans. A
A. Generic domains
B. country domains
C. inverse domains
Ans. B
A. Generic domains
B. country domains
C. inverse domains
Ans. C
162. A name space that maps each address to a unique name can be organized in the following ways:
Ans. C
163. Which of the following is/are true about Flat name space?
C. The main disadvantage of a flat name space is that it cannot be used in a large system such as the Internet
because it must be centrally controlled to avoid ambiguity and duplication.
164. Which of the following is/are true about Hierarchical name space?
B. The first part can define the nature of the organization, the second part can define the name of an organization,
and the third part can define departments in the organization, and so on.
Ans. D
165. In DNS, the names are defined in an inverted-tree structure with the root at the top.
A. 128, 127
B. 127, 126
C. 126, 125
D. 125, 124
Ans. A
166. Each node in the tree has a label, which is a string with a maximum of characters.
A. 62, null
B. 63, null
C. 62, null
D. 64, null
Ans. B
167. If a zone consists of the full tree, then that zone server is called which do not maintain any
information about domains.
A. root server
B. primary server
C. secondary server
Ans. A
168. A is a server that stores a file about the zone for which it is an authority. It is
responsible for creating, maintaining, and updating the zone file. It stores the zone file on a local disk.
A. root server
B. primary server
C. secondary server
Ans. B
169. A is a server that transfers the complete information about a zone from another server
(primary or secondary) and stores the file on its local disk.It neither creates nor updates the zone files. If
updating is required, it must be done by the primary server, which sends the updated version to the
secondary.
A. root server
B. primary server
C. secondary server
Ans. C
Ans. B
C. SNMP is an application-level protocol in which a few manager stations control a set of agents.
Ans. D
172. SNMP defines the to be sent from a manager to an agent and vice versa.
173. A management station, called a manager, is a host that runs the SNMP program.
A. server
B. client
Ans. B
174. A managed station, called an agent, is a router (or a host) that runs the SNMP program.
A. server
B. client
Ans. A
175. Which of the following is/are basis for Management with SNMP?
A. A manager checks an agent by requesting information that reflect the behavior of the agent.
B. A manager forces an agent to perform a task by resetting values in the agent database.
C. An agent contributes to the management process by warning the manager of an unusual situation.
Ans. D
Ans. A
177. defines the general rules for naming objects, defining object types (including range and
length), and showing how to encode objects and values.
A. SMI
Ans. A
178. creates a collection of named objects, their types, and their relationships to each other in an
entity to be managed.
A. SMI
B. MIB
Ans. B
A. To name objects
Ans. D
Ans. A
A. Simple; complex
B. Simple; Structured
A. structure
B. simple
Ans. B
A. sequence; order
C. complex; sequence
Ans. B
B. MIB
Ans. A
A. 9
B. 10
C. 11
D. 12
Ans. B
Ans. D
A. 7
B. 8
C. 9
D. 10
Ans. B
188. SNMP PDU has fields: PDU type, Request ID, , and .
A. Error status
B. Error index
C. VarBind list
Ans. D
189. SNMP does not send only a PDU; it embeds the PDU in a .
A. packet
B. message
C. segment
Ans. B
190. A message in is made of four elements: Version, Header, Security parameters and Data.
A. SNMPv3
B. SMTP
C. TFTP
Ans. A
B. UDP
Ans. B
192. The well-known port is used by the server (agent) whereas the well-known port is used by
the client (manager).
A. 162;163
B. 161;162
C. 163;164
D. 160;161
Ans. B
193. The GetRequest PDU is sent from the to the retrieve the value of a variable or a
set of variables.
A. client; server
B. server; client
C. client; network
Ans. A
194. The response PDU is sent from the to the to report an event.
A. client; server
B. server; client
C. client; network
Ans. B
195. INTEGER, OCTET STRING, and ObjectIdentifier are definitions used by SMI.
A. ASN.1
B. MIB
C. SNMP
Ans. A
A. 1.3.6.1.2.1.1
B. 1.3.6.1.2.2.1
C. 2.3.6.1.2.1.2
D. 3.3.6.1.2.1.2
Ans. A
Ans.D
198. For a 1-byte length field, what is the maximum value for the data length?
A. 127
B. 128
C. 255
Ans.127
A. variable; table
B. table; variable
Ans. C
A. GetRequest
C. Trap
Ans. C
A. Response
B. GetRequest
C. SetRequest
Ans. A
202. The field in the SNMP PDU is an offset that points to the variable in error.
A. community
B. enterprise
C. error index
Ans. C