CS610 Mcq's FinalTerm by Vu Topper RM
CS610 Mcq's FinalTerm by Vu Topper RM
Solve By Vu_Toper-RM
_______ includes a 32-bits address mask with each address, which allows the
address to be classful, classless, or submitted.
RIP
OSPF
OSPF includes a 32-bit address mask with each address, which allows the address
to be classful, classless, or submitted.
But Network Address and Port Translation (NAPT) (which is another modified
form of NAT)
Basic NAT does not work well for communication initiated from the Internet.
True
False
Basic NAT does not work well for communication initiated from the Internet
To save traffic, an EGP does not summarize routing information from the
autonomous system before passing it to another autonomous system
True
False
OSPF has designed as an Interior Gateway Protocol used to pass routing
information among routers within an auto nomos system.
Each Autonomous System chooses a routing protocol to exchange routing
information which is summarized before being passed to another group.
Which of the following protocol uses UDP for all message transmission?
OSPF
RIP
BGP AND RIP
RIP uses UDP for all message transmissions
2
4
None of these
The current version is four (BGP-4).
OSPF doesn’t allows a router to introduce routes learned from another means.
True
False
SPF allows a router to introduce routes learned from another means (e.g., from
BGP).
IPV4
IPV6
IPv6 source (not intermediate routers) is responsible for fragmentation
NAT software does not allow a PC to connect with the Internet and act as a NAT
device at the same time.
false
_______ is ideal in a situation where the group is small and all members are
attached to contiguous Local Area Networks.
Flood-and -Prune
Configuration-and -Tunneling
Router that decrements TTL to __ sends ICMP time exceeded message, with router
s address as source address
3
0
Protocol addresses are abstractions provided by ___________.
hardware
software
Although message exchange can be used to bind addresses, sending a request for
each binding is hopelessly inefficient.
True
False
In the 1970s large organizations began to acquire multiple networks. Each network
in the organization formed island. Employees needed to choose a computer
appropriate for each task. So they needed multiple screens, keyboards and
computers.
False
True
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
C
D
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
T, D
T, C
The general form of an IP datagram is with a header followed by data. The header
contains information that controls where and how the datagram is to be sent.
True
False
To save traffic, an EGP does not summarize routing information from the
autonomous system before passing it to another autonomous system.
True
False
The network that uses a -------------, usually consist of a single long cable to which
computer attach.
Star topology
Bus topology
The network with Throughput T and Delay D has a total --------------- bits in transit
at a time.
DXT
D/T
One repeater ---------------, two repeaters --------------- the maximum cable length
limitation.
Double, triple
Double, 4 time
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
True
False
We use the term _______ to refer to a measure of the path that routing software
use when choosing a route.
routing path
routing metric
Part of the 3-way handshake used to create a connection, requires each end to
generate a random _____ sequence number.
32 bit
16 bit
_______ is ideal in a situation where the group is small and all members are
attached to contiguous Local Area Networks.
Flood-and -Prune
Configuration-and -Tunneling
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
Connectionless service paradigm
Connection-oriented service paradigm
___________ places the boundary between the first and second octets
Class A
Class B
Class C
Class D
___________ places the boundary between the second and third octets.
Class A
Class B
Class C
Class D
___________ places the boundary between the third and fourth octets.
Class A
Class B
Class C
Which of the following protocols allows the sender and receiver to enforce
polices?
RIP
OSPF
BGP
RIP and OSPF
The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address__________.
itself
prefix
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
True
Twice NAT requires the DNS to interact with the NAT device.
True
The address identifies the physical network to which the computers are
attached while the identifies an individual computer on the network
Prefix, suffix
None of these
Dotted decimal represents each octet in and uses a dot to separate octets.
Binary
Decimal
Hexadecimal
Octal
There are two standard implementations to improve computational efficiency:
True
False
The process of using a routing table to select a next hop for a given datagram is
called __________. Encapsulation
Reassembling
none of the given
_______ shows senders preference for low latency, high Reliability. TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
_______ includes a 32-bits address mask with each address, which allows the
address to be classful, classless, or submitted.
RIP
OSPF
BGP
None of the given
When one computer sends an ARP message to another the message travels
inside the hardware frame. Technically, placing a message inside a frame for
transport is not called encapsulation.
True
False
The demand of sharing is very high because many computers need to use the
shared networks.
Select correct option:
WAN networks
Shared networks
Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
broadcast network
Probing program PING program status program None of the above The basic
responsibility of NIC is ---------------- Select correct option:
To access medium/network
To resource allocation
To access memory
All of above
-------------- has advantages arisen from the size and ease of computation. Select
correct option:
CRC
Parity
Checksum
Byte Stuffing
The third field of the header consists of ------ bit Ethernet frame type. Select
correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the -------- Select correct
option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------ Select correct option: Bus
topology
Star topology
Ring topology
Mesh Topology
Hardware that calculates a CRC uses two simple components. Select correct
option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
Network interface card acts like a (an) ----------- Select correct option:
Input/output device
Input device
Output device
All of above
IEEE LLC/SNAP header is --------, which is used to specify the type of data. Select
correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
A network uses ------------ if all computers attach to a central point Select correct
option:
Ring Topology
Star Topology
Hub Topology Bus Topology
---------- which is designed to help detect transmissions errors, send one extra bit of
information with each character.
Select correct option:
Checksum
CRC
Parity
VRC
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
Broadcast network
Point-to-Point network
------ Program sends a message to a remote computer and reports whether the
computer responds.
Ping
Ping
The term -------- is used to denote the definition of a packet used with a specific
type of network.
Packet
Frame
Data
None of the given
An interface for twisted pair Ethernet must have an ____________ connector, and
must generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T
___________ is used for audio and video, since these have predefined maximum
data rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service None of the given
The Ethernet standard specifies that frames are sent using the -------- Differential
Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
The routing table in interior and exterior switches has which one of the following?
It should have next hop for each possible destination
The next hop in table must be on shortest path to destination
Both (a) and (b)
None of the above
Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Boot time routing
None of the above
Routers use _______ to forward datagrams along prearranged path. Select correct
option:
Traffic class
Flow label
The topology each computer is connected to a central hub is called Select correct
option:
Ring topology
Star topology
Tree topology
Mesh topology
Currently the original Ethernet hardware operates at a rate of -------- Select correct
option:
10 Mbps
100 Mbps
1000 Mbps
3 Mbps
The network occupies larger areas like cities & countries is called Select correct
option:
LAN
WAN
MAN
All of the above
Computers attached to an ethernet use ________in which a computer waits for the
other to be idle before transmitting a frame.
CSMA/CD
CSMA/CA TOKEN PASSING none of the given
The third field of the header consists of ------ bit Ethernet frame type. Select
correct option:
48
32
16
8
Hardware that calculates a CRC uses two simple components. Select correct
option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
Broadcast network
Point-to-Point network
IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96