0% found this document useful (0 votes)
161 views30 pages

CS610 Mcq's FinalTerm by Vu Topper RM

This document provides a list of important questions and answers related to networking concepts such as TCP/IP layers, NAT, routing protocols, and more. It also includes contact information for paid online learning services on these topics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
161 views30 pages

CS610 Mcq's FinalTerm by Vu Topper RM

This document provides a list of important questions and answers related to networking concepts such as TCP/IP layers, NAT, routing protocols, and more. It also includes contact information for paid online learning services on these topics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Cs-610 Important Mcq’s For Final Term:

Solve By Vu_Toper-RM

All Paid Services Is Available !! VU


LMS Handling + Notes+
Online Classes + Project

Nothing Is Impossible >> O3224021365

________ of TCP/IP layering model, corresponds to basic network


hardware.
Physical Layer

_______ protocols of TCP/IP layering model specify how to ensure


reliable transfer.
Physical Layer
Transport Layer
NAT is not useful at a residence with Cable Modem or DSL connectivity.
True
False
NAT is useful at a residence with Cable Modem or DSL connectivity

_______ includes a 32-bits address mask with each address, which allows the
address to be classful, classless, or submitted.
RIP
OSPF

OSPF includes a 32-bit address mask with each address, which allows the address
to be classful, classless, or submitted.

NAPT stands for ________________


Network address and protocol translation
Network address and port translation

But Network Address and Port Translation (NAPT) (which is another modified
form of NAT)

Which of the following are interior routing protocols?


RIP
OSPF
RIP and OSPF
The Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) are
the two most well-known interior routing protocols used in the TCP/IP suite

NAT stands for ____________


Network address translation
Network address transmission

In IP routing, forwarding refers to ______ transfer.


Packet
Datagram
FORWARDING refers to datagram transfer.

Basic NAT does not work well for communication initiated from the Internet.
True
False
Basic NAT does not work well for communication initiated from the Internet

To save traffic, an EGP does not summarize routing information from the
autonomous system before passing it to another autonomous system
True
False
OSPF has designed as an Interior Gateway Protocol used to pass routing
information among routers within an auto nomos system.
Each Autonomous System chooses a routing protocol to exchange routing
information which is summarized before being passed to another group.

OSPF is based on--------


Distance vector routing
Link state routing
LINK-STATE ALGORITHM:
OSPF uses link-state routing.

The Border Gateway Protocol (BGP) uses_________ for all communication


UDP
TCP
UDP and TCP
None of the given
"It uses reliable transport (TCP).
BGP uses the TCP/IP protocol on port 179 to establish connections

________ identifies the application program that sent the data.


Destination
Source port
Logical address
None of the given (not sure)

_______ can be used to propagate information about remote networks


Dynamic routing
Static routing
Dynamic routing can be used to propagate information about remote networks.

Which of the following protocol uses UDP for all message transmission?
OSPF
RIP
BGP AND RIP
RIP uses UDP for all message transmissions

OSPF stands for __________


Open-Source Path First Protocol
Open shortest path first
(OSPF) known as the Open Shortest Path First Protocol).

Typical internet routing uses a combination of two metrics__________________.


Mouthing metrics
Administrative cost and routing metrics
Hop cost
Administrative cost and hop count
Typical internet routing uses a combination of two metrics Administrative cost and
hop count

_________ is a current version of BGP.

2
4
None of these
The current version is four (BGP-4).

OSPF doesn’t allows a router to introduce routes learned from another means.
True
False

SPF allows a router to introduce routes learned from another means (e.g., from
BGP).

Source is responsible for fragmentation.


Select correct option:

IPV4
IPV6
IPv6 source (not intermediate routers) is responsible for fragmentation

IPV6 address consists of ________


32 Bit
128 Bits
none of the given
IPV6 addresses are 128 bits.

.......is less complex and easy to understand.


UDP

Routing inserts or changes values in _______


Routing table

.......used to attach two autonomous systems.


EGP

TCP is a ______ protocol.


POINT TO POINT

NAT software does not allow a PC to connect with the Internet and act as a NAT
device at the same time.
false

________is called an end-to-end protocol because it provides a connection directly


from an application on one computer to an application on a remote computer.
IP
UDP

____________ uses distance vector approach to define routing


RIP
None of the given

_______ is ideal in a situation where the group is small and all members are
attached to contiguous Local Area Networks.
Flood-and -Prune
Configuration-and -Tunneling

Router that decrements TTL to __ sends ICMP time exceeded message, with router
s address as source address
3
0
Protocol addresses are abstractions provided by ___________.
hardware
software

Although message exchange can be used to bind addresses, sending a request for
each binding is hopelessly inefficient.
True
False

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet


address.
32, 48
24, 32

In the 1970s large organizations began to acquire multiple networks. Each network
in the organization formed island. Employees needed to choose a computer
appropriate for each task. So they needed multiple screens, keyboards and
computers.
False
True

In which method of Address Resolution Protocol, the protocol address is


determined by hardware address? Were "T" stands for Table lookup, "C" for
Closed-form Computation and "D" for Data Exchange?
T
C

Which method of Address Resolution Protocol is useful with any hardware?


Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
T
C, D

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
C
D
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
T, D
T, C

The general form of an IP datagram is with a header followed by data. The header
contains information that controls where and how the datagram is to be sent.
True
False

To save traffic, an EGP does not summarize routing information from the
autonomous system before passing it to another autonomous system.
True
False

------------- was especially concerned about the lack of high-powered computers.


IEEE
None

Missing eat indicates sending computer crashed in frame format.


True
False

The -------------term refers to the general concept of a small block of data.


Packets
Data

CRC can detect more errors than a simple checksum.


True
False

The network that uses a -------------, usually consist of a single long cable to which
computer attach.
Star topology
Bus topology

LAN that use ATM technology have a -------------


Ring topology
None of the given
--------------- has a jitter zero
Virtual Private Network
Isochronous Network
Asynchronous Network
None of the given

The network with Throughput T and Delay D has a total --------------- bits in transit
at a time.
DXT
D/T

One repeater ---------------, two repeaters --------------- the maximum cable length
limitation.
Double, triple
Double, 4 time

End-to-end delivery service is connection oriented.


True
False

A single networking technology is best for all needs.


True
False

Twice NAT allows a site to run servers.


True
False

________ device is used for multicasting.


Router
none of the given

___________ does not depend on any particular unicast routing protocol.


PIM-DM
PIM-SM
PIM-AM
none of the given

A routing table contains_______


The hop count to reach the network
The router ID of the next hop

_______ can be used to propagate information about remote networks.


Dynamic routing
Static routing

________ protocol is designed to use within an organization.


MOSPF
none of the given

NAPT stands for ________________


Network Address and Protocol Translation
Network Address and Port Translation

In dynamic routing, the routing table is initialized when system boots.


True
False

OSPF includes ________ address mask with each address.


32Bit
none of the given

Twice NAT fails if an application uses the IP addresses instead of Domain Name.
True
False

_________ uses window mechanism to control the flow of data.


TCP
none of the given

TCP uses _______ mechanism to control the flow of data.


door
window

IGPs stand for _________


Internal Gateway Protocols
Interior Gateway Protocols
________ protocol uses distance vector algorithm.
RIP
none of the given

__________measures distance in network hops, where each network between the


source and destination counts as single hop.
RIP
Non of these

Network Address Translation (NAT) requires device to perform packet translation.


True
False

We use the term _______ to refer to a measure of the path that routing software
use when choosing a route.
routing path
routing metric

Part of the 3-way handshake used to create a connection, requires each end to
generate a random _____ sequence number.
32 bit
16 bit

Reconstruction of original datagram is called reassembly.


True
False

Reliability is the responsibility of the ______ layer.


Transport
Network

_______ is ideal in a situation where the group is small and all members are
attached to contiguous Local Area Networks.
Flood-and -Prune
Configuration-and -Tunneling

In Direct point to point communication adding the Nth computer requires------------


new connections.
None of the given
N-1

The number of connections needed for N computer in direct point to point


communication is equal to:
(N2-N)/2
N(N-1)
N2
None of the given

Hardware that calculates a CRC uses two simple components.


AND unit and XOR unit
Shift register and XOR unit

The Gigabit Ethernet hardware operates at a rate of --------


10 Mbps
100 Mbps
1000 Mbps
None of the given

________ computes shortest paths in a graph by using weights on edges as a


measure of distance.
Greedy algorithm
Distance vector algorithm
Dijkstra’s algorithm
None of the given

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
Connectionless service paradigm
Connection-oriented service paradigm

Both Connectionless and Connection-oriented service paradigm


None of the given
An Internet Address (IP address) is a unique __________ binary number assigned
to a host and used for all communication with host
48-bit
32-bit
24-bit
None of the given
The address __________ identifies the physical network to which the computer is
attached, while the _______ identifies an individual computer on that network.
prefix , suffix
suffix, prefix
suffix, suffix
None of the given

___________ places the boundary between the first and second octets
Class A
Class B
Class C
Class D

___________ places the boundary between the second and third octets.
Class A
Class B
Class C
Class D

___________ places the boundary between the third and fourth octets.
Class A
Class B
Class C

________ field of header indicates whether a datagram is a fragment or a complete


datagram.
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given

______ provides connectionless service.


TCP
UDP
IP
None of the given

UDP and TCP are both_________ layer protocols


Physical
Data link
Network
Transport

________identifies which application program on receiving computer should


receive the data
Logical address
Source port
Source port

The Border Gateway Protocol (BGP) uses_________ for all communication


UDP
TCP
Both UDP and TCP
None of the given

Which of the following protocols allows the sender and receiver to enforce
polices?
RIP
OSPF
BGP
RIP and OSPF

ICMP message transport is acted upon by getting ICMP encrypted in IP.


True
False

These ICMP message transport is acted upon ________ as frames on ______


Intranet, LAN
Internet, WAN
Intranet, WAN
Internet, LAN

Address mask defines how many bits of address are in suffix?


True
False

A computer attached to a given network can only communicate with other


computers attached to the same network. Is this a problem with multiple networks?
True
False

The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address__________.
itself
prefix

Find the class of the address:


11110011 10011011 11111011 00001111
E
B

Twice NAT fails if an application uses the IP addresses instead of Domain Name.
True

EGP stands for _________


Exterior Gateway Protocol

Twice NAT requires the DNS to interact with the NAT device.
True

A is a special purpose system dedicated to the task of interconnecting networks.


Router
Bridge
Switch
None of these

The address identifies the physical network to which the computers are
attached while the identifies an individual computer on the network
Prefix, suffix
None of these

Dotted decimal represents each octet in and uses a dot to separate octets.
Binary
Decimal
Hexadecimal
Octal
There are two standard implementations to improve computational efficiency:
True
False

MTU stands for:


Minimum transmission unit
Maximum transmission unit
Multicast transmission unit
None of these

Whenever it handles a packet, IP software needs to separate the destination


Address into a prefix and suffix
True
False

technique is to limit datagram size to smallest MTU of any network


Segmentation
Fragmentation
Encapsulation
None of these

In the protocol address assigned to a computer is chosen


carefully so that computer’s hardware address can be computed from the protocol
address
basic Boolean and arithmetic operations
Closed-form computation

The header format of IPV6 is entirely different.


True
False

A is a special purpose system dedicated to the task of interconnecting


networks.
Router (Page 82)
Bridge

In Closed-form computation, the protocol address assigned to a computer is chosen


carefully so that computer’s hardware address can be computed from the protocol
address using basic Boolean and _________ operations.
Arithmetic (Page 94)
Shift

For _____________, information about forwarding is stored in a routing table,


which is initialized at system initialization and must be updated as network
topology changes.
security
efficiency

______ layer Provides reliable delivery of datagram.


Select correct option: Network
Transport
Datalink
none of the given

Header contains all information needed to deliver datagram to the destination


computer. But which one of the following is not included:
Destination address
Source address
Rectifier

______ field is used to identify a specific path through the network


Flow label
Traffic class
None of the given

Serve Same purpose in Internet as frames on LAN


Packets
Virtual Packets
Virtual Frames

Header contains all information needed to deliver datagram to the destination


computer. But which one of the following is not included
Destination address
Source address
Rectifier
Although the ARP message format is sufficiently general to allow arbitrary
protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP
address to a ____ Ethernet address.
48bit
Other options are missing

For _____________, information about forwarding is stored in a routing table,


which is initialized at system initialization and must be updated as network
topology changes.
Select correct option:
Efficiency
Security
Anomalies

IPv6 ______________ is responsible for fragmentation. Routers simply drop


datagram’s larger than network Destination
Intermediate routers
Source
Medium

The process of using a routing table to select a next hop for a given datagram is
called __________. Encapsulation
Reassembling
none of the given

Every hardware technology specification includes the definition of the maximum


size of the frame data area, which is called the ____________ Transmission Unit.
Least
Maximum
Fragment
Frame

______ contains all information needed to deliver datagram to the destination.


Header

The Header format of IPv6 is entirely different.


TRUE
FALSE

_______ shows senders preference for low latency, high Reliability. TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given

The Network Layer Protocol ICMP stands for____________


Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given

Which of the following protocols provide the routing information at the


autonomous system level?
BGP
OSPF
RIP
OSPF and RIP

A one-to-many communication between a source and a specific group of hosts


is classified as a_______ communication.
Unicast
Multicast
Broadcast
Unicast & Multicast

_______ includes a 32-bits address mask with each address, which allows the
address to be classful, classless, or submitted.
RIP
OSPF
BGP
None of the given

In TCP when a computer sends a segment, the__________ and _______ fields


refer to incoming data.
ACKNOWLEGE NUMBER, WINDOW
SEQUENCE NUMBER, WINDOW
ACKNOWLGEGE NUMBER, SEQUENCE NUMBER
None of the given

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs)


two broad classes of Internet Routing Protocol.
True
False

Class A mask is 255.0.0.0 which is used for ______


Unicasting
Multicasting
Subnetting

When one computer sends an ARP message to another the message travels
inside the hardware frame. Technically, placing a message inside a frame for
transport is not called encapsulation.
True
False

The demand of sharing is very high because many computers need to use the
shared networks.
Select correct option:
WAN networks
Shared networks

Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given

The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
broadcast network

Thick Ethernet is known as------------------ Select correct option:


10 base 5
10 base T
10 base 100 10 base 1

Probing program PING program status program None of the above The basic
responsibility of NIC is ---------------- Select correct option:
To access medium/network
To resource allocation
To access memory
All of above

No error detection scheme is perfect because transmission errors can affect


_________. Select correct option:
Data
Additional Information
Additional information & data
Transmission medium

-------------- has advantages arisen from the size and ease of computation. Select
correct option:
CRC
Parity
Checksum
Byte Stuffing

The third field of the header consists of ------ bit Ethernet frame type. Select
correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the -------- Select correct
option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------ Select correct option: Bus
topology
Star topology
Ring topology
Mesh Topology

Hardware that calculates a CRC uses two simple components. Select correct
option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

Fixed network is a type of networks which is classified with respect to


the...........factor Select correct option:
Size
Connectivity
Medium
Mobility

Network interface card acts like a (an) ----------- Select correct option:
Input/output device
Input device
Output device
All of above

IEEE LLC/SNAP header is --------, which is used to specify the type of data. Select
correct option:
8 octets
8 bytes
8 bits
None of the above

Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING

The Gigabit Ethernet hardware operates at a rate of ________


10 Mbps
100 Mbps
1000 Mbps
None of the given

A network uses ------------ if all computers attach to a central point Select correct
option:
Ring Topology
Star Topology
Hub Topology Bus Topology

---------- is also called self-healing network Select correct option:


ATM
FDDI
Token Ring
None of the given

---------- which is designed to help detect transmissions errors, send one extra bit of
information with each character.
Select correct option:
Checksum
CRC
Parity
VRC

Hardware addresses must be ---------- on a LAN.


Select correct option:
Common
Unique

A ---------- relies on the hardware manufacturer to assign a unique physical address


to each network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme None of the given

The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
Broadcast network
Point-to-Point network

------ Program sends a message to a remote computer and reports whether the
computer responds.
Ping
Ping

---------- was especially concerned about the lack of high-powered computers.


ARPA
IEEE
EIA
None of the given

The term -------- is used to denote the definition of a packet used with a specific
type of network.
Packet
Frame
Data
None of the given

An interface for twisted pair Ethernet must have an ____________ connector, and
must generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T

A bridges function in the _________ layers(s).


Physical (MAC)
Data link
Network
Physical (MAC) and Data link

A Bridge can ________


Filter a frame
Forward a frame
Extend a LAN
Do all the above

A Bridge forwards or filters a frame by comparing the information in its address


table to the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address

___________ is used for audio and video, since these have predefined maximum
data rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service None of the given

---------- is also called self-healing network ATM


FDDI
Token Ring
None of the given

Hardware that calculates a CRC uses two simple components.


AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

The Ethernet standard specifies that frames are sent using the -------- Differential
Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)

LAN and WAN are classified according to their.........


Select correct option:
Size
Connectivity
Medium
Mobility
For how much time would other computers be in wait while one computer was
transferring 56MB file with transmission speed of 56Kbps Select correct option:
Sec
Sec
Sec
Sec
CBR stands for…………….
Constant Byte Rate
Constant Bit Rate
Connection break Recovery None of the above

The routing table in interior and exterior switches has which one of the following?
It should have next hop for each possible destination
The next hop in table must be on shortest path to destination
Both (a) and (b)
None of the above

Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Boot time routing
None of the above

Which one of the following is the responsibility of Dijkstra’ algorithm?


To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above

Routing table is used to keep the information about…………….


Destination
Medium of transmission
Routers used in network
All of the above

Frame relay is………………….


Connection oriented service
Connectionless service
It is typically ranges from 5Mbps to 1000Mbps. None of the above

Which of the following statement is wrong regarding PVC?


PVC last as long as the customer pay the periodic fee for its use.
Forwarding tables are automatically restored after pow er of equipment failure.
Forwarding table entries for PVC’s are dynamically configured. All of the
above are wrong
Whenever it handles a packet, IP software needs to separate the destination address
into a prefix.
Select correct option:
True
False

TTL stands for __________ Select correct option:


Time to Live
none of the given

Routers use _______ to forward datagrams along prearranged path. Select correct
option:
Traffic class
Flow label

_______ protocol uses three-way handshake to begin a connection.


UDP
TCP
IP
none of the given

Typical internet routing uses uses a combination of two


metrics__________________. Select correct option:
routing metrics
administrative cost and routing metrics hop cost
administrative cost and hop count

AUI cable connects from NIC to--------------- Select correct option:


BNC Connector
RJ-45 Connector
Transceiver
None of the above

An ___________method, the network hardware designers specify how type


information is included in the frame and the value use to identify various frame
Local Talk is a LAN technology that employs
Explicit frame type
Ideal frame type
Implicit frame type
None of the given

In Point-to-Point topology there are two topologies.


Tree and Ring
Star and Ring
Star and Tree
None of the given

The topology each computer is connected to a central hub is called Select correct
option:
Ring topology
Star topology
Tree topology
Mesh topology

The basic responsibility of NIC is ---------------- Select correct option:


To access medium
Network To resource allocation
To access memory
All of above

Currently the original Ethernet hardware operates at a rate of -------- Select correct
option:
10 Mbps
100 Mbps
1000 Mbps
3 Mbps

The Gigabit Ethernet hardware operates at a rate of_________


10 Mbps
100 Mbps
1000 Mbps

The number of connections needed for N computer in direct point to point


communication is equal to:
(N2-N)/2
N (N-1)
N2
None of the given

The length of the format of hardware address is Select correct option:


One to ten bytes
One to five bytes
One to six bytes
None of the given

Local Talk is a LAN technology that employs________


Bus topology
Ring topology
Star topology
None of the given

The network occupies larger areas like cities & countries is called Select correct
option:
LAN
WAN
MAN
All of the above

Computer networks are classified by.......factors


2
3
4
5

Computers attached to an ethernet use ________in which a computer waits for the
other to be idle before transmitting a frame.
CSMA/CD
CSMA/CA TOKEN PASSING none of the given

A_______ relies on the hardware manufacturer to assign a unique physical address


to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given
FDDI can transmits data at a rate of ___________________
100 million bits per second
100 million bits per second
100 million bits per second None of the given

The basic responsibility of NIC is ---------------- Select correct option:


To access medium/network
To resource allocation
To access memory
All of above

No error detection scheme is perfect because transmission errors can affect


_________. Select correct option: Data
Additional Information
Additional information & data
Transmission medium

The third field of the header consists of ------ bit Ethernet frame type. Select
correct option:
48
32
16
8

Hardware that calculates a CRC uses two simple components. Select correct
option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
Broadcast network
Point-to-Point network

IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96

Which protocol is used to test different tools. Select correct option:


ICMP
IGMP

Postfix defines how much of address used to identify network.


Select correct option:
True
False

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy