Which one of the following is a method for computing routing table information? Select correct option:
Manual entry
Static routing (Correct)
Boot time routing
None of the above
Thin Ethernet is known as------------- Select correct option:
10Base2 (Correct)
10Base5
10BaseT
All of above
Which multiplexing technique shifts each signal to a different carrier frequency? Select correct option:
TDM
FDM (Correct)
Both a and b
None of the above
The basic responsibility of NIC is ---------------- Select correct option:
To access medium/network
To resource allocation
To access memory
All of above (Correct)
How many methods exist for building routing table? Select correct option:
1
2 (Correct)
3
4
CS610 Computer Networks 1. Which of the following statement is true regarding Jitter?
Jitter is used for variance in transmission delays.
Jitter can occur when a packet is delayed.
Jitter is significance for voice, video and data.
All of the above
CS610 Computer Networks 2. The maximum cable length of a LAN is _____
Fixed
Unlimited
Fixed and Unlimited in different conditions
None of these
Jitter is used for variance in transmission delays.
Jitter can occur when a packet is delayed.
Jitter is significance for voice, video and data.
All of the above
CS610 Computer Networks 2. The maximum cable length of a LAN is _____
Fixed
Unlimited
Fixed and Unlimited in different conditions
None of these
CS610 Computer Networks 3. Jitter is significance for ------------------
Voice
Video
Data
All of above
CS610 Computer Networks 4.The routing table contains information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above
The process of forwarding the packets of information is called………. Select correct option:
Routing (Correct)
Switching
Communication
None of the above
The term signaling is used to describe------------ Select correct option:
Communication about the internet (Correct)
Communication about the extranet
Communication about the network
None of above
Which of the following statement is true regarding ATM? Select correct option:
It is a single technology for voice, video and data
It has low jitter and high capacity.
It uses fixed size, small cells, 48 octet’s data
All of the above (Correct)
An interior switch is one with which …………………. Select correct option:
Computers are attached
No computer is attached (Correct)
Computers are attached internally
None of the above
Network interface card acts like a (an) ----------- Select correct option:
Input/output device
Input device
Output device
All of above (Correct)
In ---------, network occupies larger areas like cities & countries.
LAN
WAN 04 page
MAN
CAN
. When an application--------------- data, it makes a copy of the data available to all other computers on the network.
Broadcasting
Multicasting 35
Unicasting
Anycasting
NICs contain analogue circuitry and _______ that allows the NIC to operate independent of the CPU.
DMA (Direct Memory Access)
Multiplexer
Transceiver
Microprocessor 40
. In which type of topology computers are connected to a central device?
Ring
Mesh
Bus
Star 05
. IEEE LLC/SNAP header is __________which is used to specify the type of data.
8 octets
10 octets
12 bytes
16 bits
. A network which is based on packets uses a computer which may have _________, memory and__________ for switching.
Administration Rights, Algorithm
Source address, Destination address
. The next hop to which a packet is sent depends only on__________.
Packet’s destination
Packet’s original source
Path the packet has taken
Routed Protocol
. -------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
VRC
1: The topology each computer is connected to a central hub is called
Star
Ring
Mesh
Bus
A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configured addressing scheme
None of these
According to their size there are............classifications of networks.
1
2 (LAN, WAN)
3
4
LAN that use ATM technology have a ------------
Star topology
Ring topology
Mesh topology
Bus topology
A network uses _______ to arrange computers to be connected in a single closed loop.
Ring Topology
BUS topology
Mesh topology
Star topology
Hardware addresses must be ---------- on a LAN.
Unique
Common
Computer networks are classified by.......factors
2
3
4
5
Hardware that calculates a CRC uses two simple components.
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
AND unit and XOR unit
The first automated tool required to see whether the given computer is online or not was
Probing program
Ping program
Status program
None of these
In Point-to-Point topology there are two topologies.
Star and Tree
Tree and Ring
Star and Ring
Star and Tree
None of the given
------ Program sends a message to a remote computer and reports whether the computer responds.
Ping
Traceroute
ICMP
Non of the given
------ has no way to determine the cause of the problem.
ICMP
Non of the given
Ping
Trace route
In Point-to-Point topology there are two topologies.
► Tree and Ring
► Star and Ring
► Star
and Tree
and Tree
► None of the given
------ Program sends a message to a remote computer and reports whether the computer responds.
► Ping
► Traceroute
► ICMP
► Non of the given
------ has no way to determine the cause of the problem.
► ICMP
► Non of the given
► Ping
► Trace route
The term----- ------- refers to the general concept of a small block of data
► Packet
► Frame
► Data
► None of the given
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
► Parity
► Checksums
► CRC
► None of given
CS610 Computer Networks 5. Which of the following is called virtual channel?
Connection in VCI
Connection in ATM
Connection in virtual circuit
None of the above
CS610 Computer Networks 6. If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
3
2
1
0
CS610 Computer Networks 7. Frame forwarding of a bridge is based on _________.Layer 3 source address
Connection in VCI
Connection in ATM
Connection in virtual circuit
None of the above
CS610 Computer Networks 6. If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
3
2
1
0
CS610 Computer Networks 7. Frame forwarding of a bridge is based on _________.Layer 3 source address
Layer 3 destination address
Layer 2 destination address
Layer 2 Source address
CS610 Computer Networks 8. The process of forwarding the packets of information is called…………….
Routing
Switching
Communication
None of the above
Layer 2 destination address
Layer 2 Source address
CS610 Computer Networks 8. The process of forwarding the packets of information is called…………….
Routing
Switching
Communication
None of the above
Question No: 6 ( Marks: 1 ) - Please choose one
Local Talk is a LAN technology that employs -------------
► Bus topology
► Ring topology
► None of the given
► Star topology
Most LANs that employ ring topology use an access mechanism known as-------
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
► None of the given
CS610 Computer Networks 9. Which one of the following is a property of static routing?
It is inflexible
It is done at boot time
It has low network overload
All of the above
CS610 Computer Networks 10. According to a bridges Performance, if both the sauces and destination are on the same segment
It forward the frame to the other segment
It does not forward the frame to the other segment
It does not forward the frame to the same segment
It forwards the frame to every other segment
It is inflexible
It is done at boot time
It has low network overload
All of the above
CS610 Computer Networks 10. According to a bridges Performance, if both the sauces and destination are on the same segment
It forward the frame to the other segment
It does not forward the frame to the other segment
It does not forward the frame to the same segment
It forwards the frame to every other segment
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
► 64
► 48
► 32
► 8
The UDP stands for__________.
Universal Datagram Protocol
User Datagram Protocol
United Datagram Protocol
None of the given
In 3-way handshake TCP requires to generate a random ________ sequence number.
30 bit
32 bit
34 bit
none of the given
TCP stands for _______
Transport control protocol
Transmission control protocol
Terminal control protocol
None of the given
Formally named __________ informally known as the thick wire Ethernet or Thick net.
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
NAT device stores state information in translation table.
Select correct option:
True
False
A _____________ address-binding table is used for each physical network.
Select correct option:
new
similar
separate
old
Fragmentation when using ICMP for path MTU should be avoided.
Select correct option:
True
False
Static routing
_______ can be used to propagate information about remote networks.
Select correct option:
Dynamic routing
Static routing
Address resolution
None of the given
TCP stands for _______
Select correct option:
Transport control protocol
Transmission control protocol
The Universal Datagram Protocol is not an end-to-end protocol.
Select correct option:
True
False
For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False
Select correct option:
True
False
Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix
Select correct option:
True
False
Select correct option:
True
False
which is not the type of error messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given
Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
HEADER LEN field gives size of extention header.
Select correct option:
False
True
Select correct option:
False
True
is a ____ protocol.
Select correct option:
Point-to-Point
Multi-Point
Both (a) and (b)
None of the given
Select correct option:
Point-to-Point
Multi-Point
Both (a) and (b)
None of the given
CP
NAT device stores state information in translation table.
Select correct option:
True
False
Select correct option:
True
False
Postfix defines how much of address used to identify network.
Select correct option:
True
False
6. CRC can detect more errors than a simple shecksum. 1
True
False
7. The network that uses a ------------- , usually consist of a single long cable to which computer attach. 1
Star topology
Bus topology
Ring topology
None of the given
8. Local Talk is a LAN technology that employs ------------- 1
Star topology
Bus topology
Ring topology
None of the given
9. LAN that use ATM tecnology have a ------------- 1
Star topology
Bus topology
Ring topology
None of the given
10. When an application--------------- data, it makes a copy of the data available to all other computers on the network. 1
Broadcasting
Multicasting
Unicasting
None of the given
11. Formally named --------------- informally known as thin wire ethernet or thin net. 1
10 Base 2
10 Base 5
10 Base T
None of the given
Select correct option:
True
False
6. CRC can detect more errors than a simple shecksum. 1
True
False
7. The network that uses a ------------- , usually consist of a single long cable to which computer attach. 1
Star topology
Bus topology
Ring topology
None of the given
8. Local Talk is a LAN technology that employs ------------- 1
Star topology
Bus topology
Ring topology
None of the given
9. LAN that use ATM tecnology have a ------------- 1
Star topology
Bus topology
Ring topology
None of the given
10. When an application--------------- data, it makes a copy of the data available to all other computers on the network. 1
Broadcasting
Multicasting
Unicasting
None of the given
11. Formally named --------------- informally known as thin wire ethernet or thin net. 1
10 Base 2
10 Base 5
10 Base T
None of the given
1. Which protocol working at the Transport layer provides a connectionless service between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer: D
User Datagram Protocol is used at the Transport layer to provide a connectionless service.
Chapter: 3
2. Which protocol works at the Transport layer and provides virtual circuits between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer: C
Transmission Control Protocol sets up a virtual circuit before transmitting any data. This creates a reliable session and is known as a connection-oriented session.
Chapter: 3
3. Which protocol works at the Internet layer and provides a connection service between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer: A
Internet Protocol is used to address hosts and route packets through the internetwork. The question does not refer to a connection-oriented service, which is different from a plain connection service.
Chapter: 3
4. If a host broadcasts a frame that includes a source and destination hardware address, and its purpose is to assign IP addresses to itself, which protocol at the Network layer does the host use?
A. RARP
B. ARPA
C. ICMP
D. TCP
E. IPX
Answer: A
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of______ possible sizes.
Select correct option:
three
two
four
five
three
two
four
five
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________Transmission Unit.
Select correct option:
Select correct option:
Least
Maximum
Fragment
Frame
Maximum
Fragment
Frame
Twice NAT allows a site to run servers.
Select correct option:
True
False
Select correct option:
True
False
6. What is the valid host range the IP address 172.16.10.22 255.255.255.240 is a part of?
A. 172.16.10.20 through 172.16.10.22
B. 172.16.10.1 through 172.16.10.255
C. 172.16.10.16 through 172.16.10.23
D. 172.16.10.17 through 172.16.10.31
E. 172.16.10.17 through 172.16.10.30
Answer: E
First start by using the 256 mask, which in this case is 256–240=16. The first subnet is 16; the second subnet is 32. This host must be in the 16 subnet; the broadcast address is 31 and the valid host range is 17–30.
Chapter: 3
7. What range of addresses can be used in the first octet of a Class B network address?
A. 1–126
B. 1–127
C. 128–190
D. 128–191
E. 129–192
F. 192–220
Answer: D
A Class B network is defined in the first octet with the numbers 128–191.
Chapter: 3
8. What range of addresses can be used in the first octet of a Class C address?
A. 1-127
B. 129-192
C. 203-234
D. 192-223
Answer: D
A. 172.16.10.20 through 172.16.10.22
B. 172.16.10.1 through 172.16.10.255
C. 172.16.10.16 through 172.16.10.23
D. 172.16.10.17 through 172.16.10.31
E. 172.16.10.17 through 172.16.10.30
Answer: E
First start by using the 256 mask, which in this case is 256–240=16. The first subnet is 16; the second subnet is 32. This host must be in the 16 subnet; the broadcast address is 31 and the valid host range is 17–30.
Chapter: 3
7. What range of addresses can be used in the first octet of a Class B network address?
A. 1–126
B. 1–127
C. 128–190
D. 128–191
E. 129–192
F. 192–220
Answer: D
A Class B network is defined in the first octet with the numbers 128–191.
Chapter: 3
8. What range of addresses can be used in the first octet of a Class C address?
A. 1-127
B. 129-192
C. 203-234
D. 192-223
Answer: D
The maximum segment size of TCP flow control is_________
Select correct option:
3000 octets
2000 octets
1000 octets
none of the given
Select correct option:
3000 octets
2000 octets
1000 octets
none of the given
In IP routing, forwarding refers to ____ transfer.
Select correct option:
packet
datagram message
None of the given
Select correct option:
packet
datagram message
None of the given
There are _____ possibilities to detect the destination using Trace-route
Select correct option:
1
2
3
None of the given
Select correct option:
1
2
3
None of the given
A Class C network is defined in the first octet with the numbers 192-223.
Chapter: 3
9. How many bytes is an Ethernet address?
A. 3
B. 4
C. 5
D. 6
E. 7
F. 8
G. 16
Answer: D
An Ethernet (MAC) address is 6 bytes long (48 bits).
Chapter: 3
10. What protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
E. BootP
Answer: B
Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.
Chapter: 3
11. Which of the following is the broadcast address for a Class B network ID using the default subnet mask?
A. 172.16.10.255
B. 172.16.255.255
C. 172.255.255.255
D. 255.255.255.255
Answer: B
dynamic routing, the routing table is initialized when system boots.
Select correct option:
True
False
Select correct option:
True
False
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
Select correct option:
True
False
Dotted decimal represents each octet in ______ and uses a dot to separate octets.
Select correct option:
binary
decimal
hexadecimal
Octal
Select correct option:
binary
decimal
hexadecimal
Octal
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
Select correct option:
True
False
In IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers.
Select correct option:
12
14
16
none of the given
Select correct option:
12
14
16
none of the given
______ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
IPV6 address consists of ______
Select correct option:
32 Bits
64 Bits
128 Bits
none of the given
Select correct option:
32 Bits
64 Bits
128 Bits
none of the given
The IP class scheme does not divide the______ address space into equal size class and the classes do not contain the same number of networks.
Select correct option:
16-bit
32-bit
48-bit
64-bit
Select correct option:
16-bit
32-bit
48-bit
64-bit
A datagram cannot be larger than ______ of a network over which it is sent.
Select correct option:
MTU
Size
IP header
None of the given
Select correct option:
MTU
Size
IP header
None of the given
__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
Question No: 15 ( M - 1 ) .
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
Question No: 15 ( M - 1 ) .
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
► 21-bit
► 22-bit
► 23-bit
► 24 bit
Question No: 16 ( M - 1 ) .
ATM was designed for ________ and use a_________
Question No: 17 ( M - 1 ) .
The product of delay and throughput measures the _____ of data that can be present on the network.
► Area
► Volume
► Length
► None of the given
► Area
► Volume
► Length
► None of the given
Question No: 18 ( M - 1 ) .
A typical port on an ATM switch operates at __________ or higher.
► OC-2 speed (155Mbps)
► OC-3 speed (100Mbps)
► OC-3 speed (155Mbps)
► OC-3 speed (155Gbps)
An Internet Address (IP address) is a unique ________ binary number assigned to a host and used for all communication with host
Select correct option:
48-bit
32-bit
24-bit
None of the given
Select correct option:
48-bit
32-bit
24-bit
None of the given
IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False
Select correct option:
True
False
Due to revolutionalization of IP-V6 the speed has increased from_____
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
_______uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given
Select correct option:
IP
UDP
TCP
none of the given
window mechanism
Question No: 10 ( Marks: 1 ) - Please choose one
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
UPD is operating system independent.
Select correct option:
True
False
Select correct option:
True
False
A________ is a special-purpose computer dedicated to the task of interconnecting networks.
Select correct option:
Router
Bridge
Switch
None of the given
Select correct option:
Router
Bridge
Switch
None of the given
Network having short intervals has a large timeout and the network having large interval has short timeout.
Select correct option:
True
False
Select correct option:
True
False
_________ places the boundary between the first and second octets
Select correct option:
Class A
Class B
Class C
Class D
Select correct option:
Class A
Class B
Class C
Class D
Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix
Select correct option:
True
False
Select correct option:
True
False
There are three standard implementations to improve computational efficiency: Hashing, Direct Indexing and InDirect Indexing
True
False
True
False
IPV6 128 bits address includes network prefix and ______
Select correct option:
Host Suffix
Host prefix
Source Prefix
none of the given
Select correct option:
Host Suffix
Host prefix
Source Prefix
none of the given
ICMP message transport is acted upon by getting ICMP_______ in IP.
Select correct option:
De-encapsulated
Encapsulated
Segmented
none of the given
Select correct option:
De-encapsulated
Encapsulated
Segmented
none of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.
Select correct option:
True
False
Twice NAT allows a site to run servers.
Select correct option:
True
False
Preliminary version of IP was called _________.
Select correct option:
IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False
_________ uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given
The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.
Select correct option:
True
False
Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given
The Source can configure outgoing datagram’s to avoid _________
Select correct option:
Segmentation
Defragmentation
Fragmentation
None of the given
The time for acknowledgement to arrive depends on __________
Select correct option:
Distance to destination
Current traffic conditions
Both a and b
none of the given
which is not the type of error messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given
Preliminary version of IP was called _________.
Select correct option:
IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
HEADER LEN field gives size of extention header.
Select correct option:
False
True
A Class B network address is two bytes long, which means the host bits are two bytes long. The network address must be 172.16.0.0, which is all host bits off. The broadcast address is all bits on, or 172.16.255.255.
Chapter: 3
12. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. A
B. B
C. C
D. D
E. E
Answer: C
A Class C network address only has 8 bits for defining hosts. 2^8–2=254.
Chapter: 3
13. What is the broadcast address of the subnet address 10.254.255.19 255.255.255.248?
A. 10.254.255.23
B. 10.254.255.24
C. 10.254.255.255
D. 10.255.255.255
Answer: A
First start with 256 mask or in this case, 256–248=8. The first subnet is 8. The second subnet is 16, then 24. This host is in the 16 subnet, the broadcast address is 23, and the valid host range is 17–22.
Chapter: 3
14. What is the broadcast address of the subnet address 172.16.99.99 255.255.192.0?
A. 172.16.99.255
B. 172.16.127.255
C. 172.16.255.255
D. 172.16.64.127
Answer: B
First start with 256 mask or in this case, 256-192=64. 64 is the first subnet; 128 is the second subnet. This host is in the 64-subnet range, the broadcast address is 127, and the valid host range is 65-126.
Chapter: 3
15. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
A. 255.255.255.252
B. 255.255.255.248
C. 255.255.255.240
D. 255.255.255.255
Answer: C
A Class B network address is two bytes long, which means the host bits are two bytes long. The network address must be 172.16.0.0, which is all host bits off. The broadcast address is all bits on, or 172.16.255.255.
Chapter: 3
12. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. A
B. B
C. C
D. D
E. E
Answer: C
A Class C network address only has 8 bits for defining hosts. 2^8–2=254.
Chapter: 3
13. What is the broadcast address of the subnet address 10.254.255.19 255.255.255.248?
A. 10.254.255.23
B. 10.254.255.24
C. 10.254.255.255
D. 10.255.255.255
Answer: A
First start with 256 mask or in this case, 256–248=8. The first subnet is 8. The second subnet is 16, then 24. This host is in the 16 subnet, the broadcast address is 23, and the valid host range is 17–22.
Chapter: 3
14. What is the broadcast address of the subnet address 172.16.99.99 255.255.192.0?
A. 172.16.99.255
B. 172.16.127.255
C. 172.16.255.255
D. 172.16.64.127
Answer: B
First start with 256 mask or in this case, 256-192=64. 64 is the first subnet; 128 is the second subnet. This host is in the 64-subnet range, the broadcast address is 127, and the valid host range is 65-126.
Chapter: 3
15. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
A. 255.255.255.252
B. 255.255.255.248
C. 255.255.255.240
D. 255.255.255.255
Answer: C
_______ shows senders preference for low latency, high Reliability.
Select correct option:
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False
________ field of header indicates whether a datagram is a fragment or a complete datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATIONNo.3
None of the given (not sure) Page 105
In ______________, the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.
Select correct option:
Address Resolution
Table Lookup
Message Exchange
Closed-form Computation Page 94
Postfix defines how much of address used to identify network.
Select correct option:
True
False
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGSNo.4
FRAGMENT OFFSET
IDENTIFICATION
None of the given (not sure) Page 105
H.LEN shows the header length in units of ____ Bits
Select correct option:
34
32 Page 105
30
None of the given
In Closed-form computation, the protocol address assigned to a computer is chosen carefully so
that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.
Select correct option:
arithmetic
XOR
Shift
XNORNo.5
For _____________, information about forwarding is stored in a routing table, which is initialized atsystem initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless Page 120
both a and b
none of the given
CS610 Computer Networks 1. Which of the following statement is true regarding Jitter?
Jitter is used for variance in transmission delays.
Jitter can occur when a packet is delayed.
Jitter is significance for voice, video and data.
All of the above
CS610 Computer Networks 2. The maximum cable length of a LAN is _____
Fixed
Unlimited
Fixed and Unlimited in different conditions
None of these
Jitter is used for variance in transmission delays.
Jitter can occur when a packet is delayed.
Jitter is significance for voice, video and data.
All of the above
CS610 Computer Networks 2. The maximum cable length of a LAN is _____
Fixed
Unlimited
Fixed and Unlimited in different conditions
None of these
CS610 Computer Networks 3. Jitter is significance for ------------------
Voice
Video
Data
All of above
CS610 Computer Networks 4.The routing table contains information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above
CS610 Computer Networks 5. Which of the following is called virtual channel?
Connection in VCI
Connection in ATM
Connection in virtual circuit
None of the above
CS610 Computer Networks 6. If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
3
2
1
0
CS610 Computer Networks 7. Frame forwarding of a bridge is based on _________.Layer 3 source address
Layer 3 destination address
Layer 2 destination address
Layer 2 Source address
CS610 Computer Networks 8. The process of forwarding the packets of information is called…………….
Routing
Switching
Communication
None of the above
CS610 Computer Networks 9. Which one of the following is a property of static routing?
It is inflexible
It is done at boot time
It has low network overload
All of the above
CS610 Computer Networks 10. According to a bridges Performance, if both the sauces and destination are on the same segment
It forward the frame to the other segment
It does not forward the frame to the other segment
It does not forward the frame to the same segment
It forwards the frame to every other segment
Layer 2 destination address
Layer 2 Source address
CS610 Computer Networks 8. The process of forwarding the packets of information is called…………….
Routing
Switching
Communication
None of the above
CS610 Computer Networks 9. Which one of the following is a property of static routing?
It is inflexible
It is done at boot time
It has low network overload
All of the above
CS610 Computer Networks 10. According to a bridges Performance, if both the sauces and destination are on the same segment
It forward the frame to the other segment
It does not forward the frame to the other segment
It does not forward the frame to the same segment
It forwards the frame to every other segment
The term----- ------- refers to the general concept of a small block of data
Packet
Frame
Data
None of the given
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
Parity
Checksums
CRC
None of given
Local Talk is a LAN technology that employs -------------
Bus topology
Ring topology
None of the given
Star topology
Most LANs that employ ring topology use an access mechanism known as-------
TOKEN PASSING
CSMA/CA
TOKEN PASSING
None of the given
To span long distance or many computers, networks must replace shared medium with ………..
- Segment transformation
- Fiber optics
- Packet switches
- None of the above
Which of the following statement is true regarding Distance-vector routing?
- It is very simple to implement.
- Packet switch updates own routing table first
- It is used in RIP
- All of the above
What will be the bandwidth rate for 1000Base-T Gigabyte or ATM?
- 100 MHz
- 150 MHz
- 200 MHz
- 250 MHz
CBR stands for…………….
- Constant Byte Rate
- Constant Bit Rate
- Connection break Recovery
- None of the above
The routing table in interior and exterior switches has which one of the following?
- It should have next hop for each possible destination
- The next hop in table must be on shortest path to destination
- Both (a) and (b)
- None of the above
Which one of the following is a method for computing routing table information?
- Manual entry
- Static routing
- Boot time routing
- None of the above
Which one of the following is the responsibility of Djikstra’ algorithm?
- To compute the shortest path between two nodes
- To extract next hop information from path information
- To insert next hop information into routing table
- All of the above
Routing table is used to keep the information about…………….
- Destination
- Medium of transmission
- Routers used in network
- All of the above
Frame relay is………………….
- Connection oriented service
- Connectionless service
- It is typically ranges from 5Mbps to 1000Mbps.
- None of the above
Which of the following is not a guided medium?
- Twisted-pair
- cable Fiber-optic cable
- Atmosphere
- Coaxial cable
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.
► True
► False
------ Program sends a message to a remote computer and reports whether the computer responds.
► Ping
Ping
► Traceroute
► ICMP
► Non of the given
---------- was especially concerned about the lack of high powered computers.
► ARPA
► IEEE
► EIA
► Non of the given
The term -------- is used to denote the definition of a packet used with a specific type of network.
► Packet
► Frame
► Data
► None of the given
Computer networks are often called -------------- because they use packet technology.
► Ethernet
► Switch networks
► Packet networks
► None of the given
-------------- have advantages arisen from the size and ease of computation.
► CRC
► Parity
► Checksums
► None of given
Most LANs that employ ring topology use an access mechanism known as-------
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
► None of the given
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
► 8 octets
► 8 bytes
► 8 bits
► None of the given
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
A bridges function in the _________ layers(s).
► Physical (MAC)
► Data link
► Network
► Physical (MAC) and Data link
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN
► Do all the above
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________
► Layer 2 source address
► Source node’s physical address
► Layer 2 destination address
► Layer 3 destination address
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Greedy algorithm
► Distance vector algorithm
► Dijksta’s algorithm
► Non of the given
___________ is used for audio and video, since these have predefined maximum data rates
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .
► Connectionless service paradigm
► Connection oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given
A network with throughput T and delay D has a total of ________ bit in transit at any time.
► T / D
► T x D
► T + D
► None of the given
16. What is the port number range that a transmitting host can use to set up a session with another host?
A. 1–1023
B. 1024 and above
C. 1–256
D. 1–65534
Answer: B
Source hosts can use any port number starting at 1024.
Chapter: 3
17. Which of the following ranges are considered well-known port numbers?
A. 1–1023
B. 1024 and above
C. 1–256
D. 1–65534
Answer: A
The port numbers 1–1023 are defined as and considered well-known port numbers.
Chapter: 3
18. What is the broadcast address of the host subnet address 10.10.10.10 255.255.254.0?
A. 10.10.10.255
B. 10.10.11.255
C. 10.10.255.255
D. 10.255.255.255
Answer: B
First start with 256-254=2. The first subnet is 2, the second subnet is 4, then 6, 8, 10, and 12. Remember that the fourth octet is host addresses. This host is a part of the subnet 10.0, the broadcast address is 11.255, and the valid host range is 10.1 through 11.254.
Chapter: 3
19. What broadcast address will the host 192.168.210.5 255.255.255.252 use?
A. 192.168.210.255
B. 192.168.210.254
C. 192.168.210.7
D. 192.168.210.15
Answer: C
Question No: 2 ( M - 1 ) .
Start with the 256 mask or in this case, 256-252=4. This first subnet is 4. The second subnet is 8. This falls in the 4-subnet range. The broadcast address is 7, and the valid hosts are 5 and 6.
Chapter: 3
20. If you need to have a Class B network address subnetted into exactly 510 subnets, what subnet mask would you assign?
A. 255.255.255.252
B. 255.255.255.128
C. 255.255.0.0
D. 255.255.255.192
Answer: B
A. 1–1023
B. 1024 and above
C. 1–256
D. 1–65534
Answer: B
Source hosts can use any port number starting at 1024.
Chapter: 3
17. Which of the following ranges are considered well-known port numbers?
A. 1–1023
B. 1024 and above
C. 1–256
D. 1–65534
Answer: A
The port numbers 1–1023 are defined as and considered well-known port numbers.
Chapter: 3
18. What is the broadcast address of the host subnet address 10.10.10.10 255.255.254.0?
A. 10.10.10.255
B. 10.10.11.255
C. 10.10.255.255
D. 10.255.255.255
Answer: B
First start with 256-254=2. The first subnet is 2, the second subnet is 4, then 6, 8, 10, and 12. Remember that the fourth octet is host addresses. This host is a part of the subnet 10.0, the broadcast address is 11.255, and the valid host range is 10.1 through 11.254.
Chapter: 3
19. What broadcast address will the host 192.168.210.5 255.255.255.252 use?
A. 192.168.210.255
B. 192.168.210.254
C. 192.168.210.7
D. 192.168.210.15
Answer: C
A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.
► Static addressing scheme
► Configurable addressing scheme
► Dynamic addressing scheme
► None of the given
Question No: 2 ( M - 1 ) .
An interface for thin Ethernet must have an ____________ connector , and must enerate signals according to the_____________ specification.
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T
12. A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame. 1
Source address, destination adress.
Destination adress, destination address.
Destination adress, source address.
source adress, source address.
13. A Bridge can ---------------. 1
Filter a frame.
Forward a frame.
Extend LAN.
All of the given.
14. Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________ 1
Hierarchal address
Default route
Shortest route
None of the given
15. __________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved. 1
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given www.vuzs.info
16. ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy. 1
21-bit
22-bit
23-bit
24-bit
17. --------------- has a jitter zero 1
Virtual Private Network
Isochronous Network
Asynchronous Network
None of the given
Source address, destination adress.
Destination adress, destination address.
Destination adress, source address.
source adress, source address.
13. A Bridge can ---------------. 1
Filter a frame.
Forward a frame.
Extend LAN.
All of the given.
14. Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________ 1
Hierarchal address
Default route
Shortest route
None of the given
15. __________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved. 1
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given www.vuzs.info
16. ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy. 1
21-bit
22-bit
23-bit
24-bit
17. --------------- has a jitter zero 1
Virtual Private Network
Isochronous Network
Asynchronous Network
None of the given
Question No: 3( M - 1 ) .
A system with redundant bridges might have a problem with_______ in the system.
► Loop
► Filters
► Spanning Trees
► All given choices
Question No: 4( M - 1 ) .
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN
► Do all the above
Start with the 256 mask or in this case, 256-252=4. This first subnet is 4. The second subnet is 8. This falls in the 4-subnet range. The broadcast address is 7, and the valid hosts are 5 and 6.
Chapter: 3
20. If you need to have a Class B network address subnetted into exactly 510 subnets, what subnet mask would you assign?
A. 255.255.255.252
B. 255.255.255.128
C. 255.255.0.0
D. 255.255.255.192
Answer: B
ATM is designed to work on___________.
► Twisted Pair
► Coaxial
► Radio Frequency
► Fiber
Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
► None of the given
________ is used for typical data applications (where the data rate may be unknown and bursty) and allows use of whatever bandwidth is available at a given time.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
Question No: 6( M - 1 ) .
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
► 21-bit
► 22-bit
► 23-bit
► 24-bit
The VC is identified by a 24-bit value formed from the VPI or Virtual Path Indicator (8-
bit),
Question No: 7( M - 1 ) .
________ of TCP/IP layering model, corresponds to basic network hardware.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
FDDI can transmits data at a rate of ----------
► 100 million bits per second
► 10 million bits per second
► 1000 million bits per second
► None of the given
Which of the following statement is wrong regarding PVC?
- PVC last as long as the customer pay the periodic fee for its use.
- Forwarding tables are automatically restored after power of equipment failure.
- Forwarding table entries for PVC’s are dynamically configured.
- All of the above are wrong
Which of the following statement is true regarding ATM?
- ATM is a single technology that is designed to meet the goals of both LANs and WANs.
- ATM uses the concept of connection-oriented networking.
- Both (a) and (b)
- None of the above
UDP and TCP are both_________ layer protocols
► Physical
► Data link
► Network
Question No: 10( M - 1 ) .
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________
► IP
► None of the given
► TCP
► UDP
A bridges function in the _________ layers(s).
► Physical(MAC)
► Data Link
► Network
► Physical (MAC) and Datalink
Question No: 12 ( M - 1 ) .
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________
► Layer 2 source address
► Source node’s physical address
► Layer 3 destination address
Question No: 13 ( M - 1 ) .
The next hop to which a packet is sent depends only on
► Packet’s destination
► Packet’s original source
► Path the packet has taken
► Non of the given
Question No: 11( M - 1 ) .
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer
1. No error detection scheme is perfect because transmission errors can affect the additional information as well as the data. 1
True
False
2. In -------------, network occupies the smaller area like a room a floor or a building 1
LAN
WAN
MAN
None of the given
3. ------------- was especially concerned about the lack of high powered computers. 1
IEEE
APRA
EIA
None
4. Missing eot indicates sending computer crashed in frame format. 1
5. The -------------term refers to the general concept of a small block of data. 1
Packets
Data
Fram
None of given
True
False
2. In -------------, network occupies the smaller area like a room a floor or a building 1
LAN
WAN
MAN
None of the given
3. ------------- was especially concerned about the lack of high powered computers. 1
IEEE
APRA
EIA
None
4. Missing eot indicates sending computer crashed in frame format. 1
5. The -------------term refers to the general concept of a small block of data. 1
Packets
Data
Fram
None of given
Question No: 12( M - 1 ) .
________identifies which application program on receiving computer should receive the data
► Logical address
► Source port
► None of the given
► CRC can detect more errors than a simple checksum……
► True
► False
Question No: 5 ( M - 1 ) .
The Ethernet standard specifies that frames are sent using the --------Manchestor
Question No: 6 ( M - 1 ) .
Most LANs that employ ring topology use an access mechanism known as-------
► CSMA/CD
► CSMA/CA
► None of the given
Question No: 7 ( M - 1 ) .
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
► Explicit frame type
► Ideal frame type
► Implicit frame type
► None of the given
Question No: 13( M - 1 ) .
________ identifies the application program that sent the data.
► DestinationPort
► Logical address
► None of the given
Djikstra’s algorithm is used to compute the……………….
- shortest path between two nodes
- number of nodes used in the network
- distance between different nodes
- none of the above
Routing table is used to keep the information about…………….
- Destination
- Medium of transmission
- Routers used in network
- All of the above
Which of the following statement is true regarding Jitter?
- Jitter is used for variance in transmission delays.
- Jitter can occur when a packet is delayed.
- Jitter is significance for voice, video and data.
- All of the above
The maximum cable length of a LAN is _____
- Fixed
- Unlimited
- Fixed and Unlimited in different conditions
- None of these
Jitter is significance for ——————
- Voice
- Video
- Data
- All of above
The routing table contains information about the ………………immediately around it.
- topology of the network
- destination
- both of the above
- none of the above
Which of the following is called virtual channel?
- Connection in VCI
- Connection in ATM
- Connection in virtual circuit
- None of the above
If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
- 3
- 2
- 1
- 0
Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets.
- 55
- 53
- 52
- 51
Which of the following statement is true regarding ATM?
- ATM is a single technology that is designed to meet the goals of both LANs and WANs.
- ATM uses the concept of connection-oriented networking.
- Both (a) and (b)
- None of the above
Frame forwarding of a bridge is based on _________.
- Layer 3 source address
- Layer 3 destination address
- Layer 2 destination address
- Layer 2 Source address
The process of forwarding the packets of information is called…………….
- Routing
- Switching
- Communication
- None of the above
Which one of the following is a property of static routing?
- It is inflexible
- It is done at boot time
- It has low network overload
- All of the above
According to a bridges Performance, if both the sauces and destination are on the same segment
- It forward the frame to the other segment
- It does not forward the frame to the other segment
- It does not forward the frame to the same segment
- It forwards the frame to every other segment
What will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet?
- 500 MHz
- 550 MHz
- 600 MHz
- 650 MHz
18. The network with Throughput T and Delay D has a total --------------- bits in transit at a time. 1
D + T
D – T
D X T
D / T
19. One repeater ---------------, two repeaters --------------- the maximum cable length limitation. 1
Double, triple
Double, 4 time
half, triple
Double, half
D + T
D – T
D X T
D / T
19. One repeater ---------------, two repeaters --------------- the maximum cable length limitation. 1
Double, triple
Double, 4 time
half, triple
Double, half
In broadcast topology there are two categories____.
► SATELLITE\RADIO
► RING TOPOLOGY
► Both a & b
► None of the above
Question No: 2 ( M - 1 ) .
The term ……..refers to the general concept of a small block of data
► Packet
► Frame
► Data
► None of the given
Question No: 3 ( M - 1 ) .
The term -------- is used to denote the definition of a packet used with a specific type of network.
► Packet
► Frame
► Data
► None of the given
20. The length of time required to send a veriable length packet a veriable and does not require a complicated interrupt scheme to detect complication transmission. 1
True
False
Asynchronous Transfer Mode uses the concept of …………..
- Connection-less network
- Connection-oriented network
The fiber-modem converts data into _________ then transmits cover the optional fiber
- Pulses of light
- Electrons
- Electromagnetic signals
- None of these
How many methods exist for computing routing table?
- 5
- 4
- 3
- 2
If a link or a packet switch fails then which one of the following would possibly be happened?
- Link would be reestablished
- Request to change failed hardware would appear
- The packet switch will modify the tables
- None of the above
The routing contains information about immediately around it
- Topology of the network
- Destination
- Both of the above
- None of the above
SMDS is ……………………
- Connectionless service
- Connection oriented service
- Used for delivering blocks of data
- None of the above
The process of forwarding the packets of information is called
- Routing
- Switching
- Communication
- None of the above
The sharing of a medium and its link by two or more devices is called
- modulation
- encoding
- line discipline
- multiplexing
Which multiple
xing technique transmits analog signals?
xing technique transmits analog signals?
- FDM
- TDM
- WDM
- (a) and (c)
Which multiplexing technique transmits digital signals?
- FDM
- TDM
- WDM
- None of above
Which multiplexing technique shifts each signal to a different carrier frequency?
- FDM
- TDM
- Both (a) and (b)
- None of above
In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots.
- n
- n+1
- N-1
- O to n
Which multiplexing technique involves signals composed of light beams?
- FDM
- TDM
- WDM
- None of above
_________ Utilization is the use of available bandwidth to achieve specific goals.
- Frequency
- Bandwidth
- Amplitude
- None of the above
________ can be achieved by using multiplexing; ______ can be achieved by using spreading.
- Efficiency; privacy and antijamming
- Privacy and antijamming; efficiency
- Privacy and efficiency; antijamming
- Efficiency and antijamming; privacy
________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.
- 1; n
- 1:1
- n;1
- n;n
The word __
____ refers to the portion of a _______ that carries a transmission.
____ refers to the portion of a _______ that carries a transmission.
- channel; link
- link; channel
- line; channel
- line; link
______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted.
- TDM
- FDM
- Both (a) or (b)
- Neither (a) or (b)
FSM is an _________technique.
- Analog
- Digital
- Either (a) or b)
- None of the above
____ is designed to use the high bandwidth capability of fiber-optic cable.
- FDM
- TDM
- WDM
- None of the above
____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
- FDM
- TDM
- WDM
- None of the above
____ is designed to use the high bandwidth capability of fiber-optic cable.
- FDM
- TDM
- WDM
- None of the above
______ is an analog multiplexing technique to combine optical signals.
- FDM
- TDM
- WDM
- None of the above
_____ is a digital process that allows several connections to share the high bandwidth of a link.
- FDM
- TDM
- WDM
- None of the above
_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
- FDM
- TDM
- WDM
- None of the above
Djikstra’s algorithm is used to compute the……………….
- shortest path between two nodes
- number of nodes used in the network
- distance between different nodes
- none of the above
Which one of the following is the responsibility of Djikstra’ algorithm
- To compute the shortest path between two nodes
- To extract next hop information from path information
- To extract next hop information from path information
- None of above
What will be the bandwidth rate for short distance 10Base-T
- 16mhz
- 20mhz
- 100mhz
- 150mhz
What will be the bandwidth rate for older, low-speed network, and analog telephones
- 16
- 20
- 24
- 30
How many methods exist for building routing table?
- 1
- 2
- 3
- 4
Which of the following statement is wrong regarding ATM?
- It is a single technology for voice, video and data
- it has low jitter and high capacity.
- it uses fixed size, small cells, 48 octet’s data
- None of the above
In Asynchronous Transfer Mode VPI/VCI fields indentify the cells
- Source
- Destination
- port@
- none
The physical addressing in a WAN is similar as in LAN in the way…………….
- The data is transmitted in packets equivalent to frames.
- Each packet has a format with header.
- The packet header includes destination and source addresses.
- All of the above
Which one of the following is a method for computing routing table information?
- Manual entry
- Boot time routing
- Static routing
- None of the above
All destinations on same switch have same
- Router
- Information
- Next hop
- None of the above
Which of the following statement is wrong regarding ATM?
- It is a single technology for voice, video and data
- It has low jitter and high capacity.
- It uses fixed size, small cells, 48 octet’s data
- None of the above
Which one of the following is the responsibility of Djikstra’ algorithm?
- To compute the shortest path between two nodes
- To extract next hop information from path information
- To insert next hop information into routing table
- All of the above
Which of the following statement is true regarding Link-state routing?
- Network topology is separated from route computation.
- Each switch builds its own routing tables.
- Link-state routing uses Djikstra’s algorithm.
- All of the above
Jitter is significance for ——————
- Voice
- Video
- Data
- All of above
The routing table contains information about the ………………immediately around it.
- topology of the network
- destination
- both of the above
- none of the above
Which one of the following is a property of dynamic routing?
- It is inflexible
- It has low network overload
- It can work around network failure
- All of the above
An exterior switch is one with which ………………….
- Computers are attached
- No computer is attached
- hubs are attached externally
- None of the above
Which of the following statement regarding ATM is true?
- Connections in ATM are called virtual channels
- The VC is identified by a 24-bit value formed from the VPI
- Both (a) and (b)
- None of the above
The fiber-modem coverts digital data into _______ then transmits over the optical fiber
- Pulses of light
- Electrons
- Electromagnetic signals
- None of these
_______network topology is a bus but wiring topology is a star
- 10Base-T
- Ring
- 10Base-W
- Star
Which of the following is not a guided medium?
- Twisted-pair cable
- Fiber-optic cable
- Atmosphere
- Coaxial cable
A system with redundant bridges might have a problem with_______ in the system.
- Select correct option:
- Filters
- Spanning Trees
- Addressing
- Loop
Repeaters are used when ______ communication is carries out
- Optical fiber
- Twisted Pair
- Copper wire
- All type of
The mechanism of extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _____ and bandwidth is very _____
- Low, High
- High, Low
- High, High
- Low, Low
To span long distances or many computers, networks must replace shared medium with…………
- segment transformation
- fiber optices
- packet switches
- None of the above
Which one is incorrect statement?
- Hub wiring centralizes electronics and connections. It makes management easier
- No Transceiver allows computers to be powered off or disconnected from network without distracting other communication
- Transceiver may be located in an inconvenient place in any situation
- None of these
An interior switch is one with which ………………….
- Computers are attached
- No computer is attached
- Computers are attached internally
- None of the above
The routers within an autonomous system use a _____________ to exchange routing information.
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
UDP datagram format is _____ bits.
Select correct option:
8
16
32
64
A routing table contains_______
Select correct option:
The destination network ID
The hop count to reach the network
The router ID of the next hop
All of the given
NAT device stores state information in translation table.
Select correct option:
True
False
TCP achieves _________ by retransmission.
Select correct option:
Efficiency
Accuracy
Reliability
none of the given
________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given
_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given
Routing refers to the _________ of routing information.
Select correct option:
transmission
propagation
communication
None of the given
______ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
In Point-to-Point topology there are two topologies.
► Star and Tree
► Tree and Ring
► Star and Ring
► Star and Tree
► None of the given
------ Program sends a message to a remote computer and reports whether the computer responds.
► Ping
► Ping
Ping
► Traceroute
► ICMP
► Non of the given
------ has no way to determine the cause of the problem.
► ICMP
► ICMP
► Non of the given
► Ping
► Trace route
The term----- ------- refers to the general concept of a small block of data
► Packet
► Packet
► Frame
► Data
► None of the given
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
► Parity
► Parity
► Checksums
► CRC
► None of given
Local Talk is a LAN technology that employs -------------
► Bus topology
► Bus topology
► Ring topology
► None of the given
► Star topology
Most LANs that employ ring topology use an access mechanism known as-------
► TOKEN PASSING
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
► None of the given
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.
► 64
► 64
► 48
► 32
► 8
Formally named __________ informally known as the thick wire Ethernet or Thick net.
► 10 Base T
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
► 10 Base 2
► 10 Base 2
► 10 Base 5
► 10 Base T
► None of the given
The maximum size of an Ethernet segment is___________
► 500 meters
► 250 meters
► 500 meters
► 700 meters
► None of the given
A Bridge can ________
► Do all the above
► Filter a frame
► Forward a frame
► Extend a LAN
► Do all the above
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
► Dijksta’s algorithm
► Greedy algorithm
► Distance vector algorithm
► Dijksta’s algorithm
► Non of the given
__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
► Constant Bit Rate (CBR) service
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
► Connection-oriented service paradigm
► Connectionless service paradigm
► Connection-oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given
The product of delay and throughput measures the _____ of data that can be present on the network.
► None of the given
► Area
► Volume
► Length
► None of the given
A network with throughput T and delay D has a total of ________ bit in transit at any time.
► T x D
► T / D
► T x D
► T + D
► None of the given
One repeater _______, two repeaters ________ the maximum cable length limitation.
► doubles, triple
► doubles, triple
► square roots, cude roots
► and, triple
► doubles, cancel
A network uses a ------ if all computers attach to a central point
► Star Topology
► Star Topology
► Ring Topology
► Bus Topology
► None of the given
Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.
► TOKEN PASSING
► CSMA/CD
► CSMA/CA
► TOKEN PASSING
► None of the given
CS610 Computer Networkmcqs solved CS610 Computer Networkquiz mega file CS610 Computer Networkmidterm solved papers 2017 CS610 Computer Networksolved mcqs mega file CS610 Computer Networkmidterm solved papers 2016 CS610 Computer Network midterm papers CS610 Computer Networkfinal term solved mcqs mega file CS610 Computer Network handouts CS610 Computer Networklectures CS610 Computer Network assignment CS610 Computer Networkhandouts CS610 Computer Network assignment solution 2018 CS610 Computer Networkppt slides CS610 Computer Networkassignment no 2 solution 2018 CS610 Computer Networkmidterm solved papers by moaaz CS610 Computer Networkfinal term solved mcqs by moaaz