Вы находитесь на странице: 1из 11

1) UDP needs the ........... address to deliver the user A.

connection-oriented, unreliable
datagram to the correct application process B. connectionless, reliable
C. connectionless, unreliable
A. port D. connection, reliable
B. application
C. internet 8) DHCP in TCP/IP network assigns an IP address
D. intranet for a limited period of time. Such a network address
is called a ......
2) The ........ was originally developed as a
mechanism to enable disk-less hosts to be remotely A. lease
booted over a network as workstations, routers, B. limited network
terminal concentrators and so on. C. timed network
D. assigned network
A. ICMP
B. BOOTP 9) UDP does not add anything to the services of IP
C. UDP except for providing .......... communication.
D. ARP
A. node to node
3) Which of the following does UDP guarantee? B. process to process
C. host to host
A. Flow control D. interface to interface
B. Connection-oriented delivery
C. Data control 10) The use of ......... allows centralized configuration
D. None of the above of multiple clients.

4) .......... provides a framework for passing A. ICMP


configuration information to hosts on a TCP/IP B. BOOTP
network. C. UDP
D. ARP
A. Dynamic Host Configuration Protocol(DHCP)
B. Address Resolution Protocol(ARP) 11) UDP is an acronym for ............
C. Internet Protocol(IP)
D. Internet Control Message Protocol(ICMP) A. User Delivery Protocol
B. User Datagram Procedure
5) The source port address on the UDP user datagram C. User Datagram Protocol
header defines ......... D. User Delivery Procedure

A. the sending computer 12) ............ is where users typically interact with the
B. the receiving computer TCP/IP network.
C. the process running on the sending computer
D. the process running on the receiving computer A. Link layer
B. Network layer
6) The mechanisms supported by DHCP for IP C. Transport layer
address allocation on a TCP/IP network is/are ... D. Application layer

A. Automatic allocation 13) The local host and the remote host are defined
B. Dynamic allocation using IP addresses. To define the processes, we need
C. Manual allocation second identifiers called .........
D. All of th above
A. UDP addresses
7) UDP is called a .......... transport protocol. B. transport addresses
C. port addresses
D. TCP addresses A. application
B. transport
14) The ............. is responsible for communicating C. IP
with the actual network hardware. D. interface

A. Link layer Answers:


B. Network layer
C. Transport layer 1) A. port
D. Application layer 2) B. BOOTP
3) D. None of the above
15) UDP packets are encapsulated in ....... 4) A. Dynamic Host Configuration Protocol(DHCP)
5) C. the process running on the sending computer
A. an Ethernet frame 6) D. All of th above
B. an TCP segment 7) C. connectionless, unreliable
C. an IP datagram 8) A. lease
D. an Ethernet packets 9) B. process to process
10) B. BOOTP
16) ............ is the protocol suite for the current 11) C. User Datagram Protocol
Internet. 12) D. Application layer
13) C. port addresses
A. TCP/IP 14) A. Link layer
B. NCP 15) C. an IP datagram
C. UDP 16) A. TCP/IP
D. ACM 17) B. multiplexing
18) A. TCP
17) UDP uses ........ to handle outgoing user 19) C. demultiplexing
datagrams from multiple processes on one host. 20) A. application

A. flow control
B. multiplexing 1. The computer network is
C. demultiplexing A) Network computer with cable
D. data control B) Network computer without cable
C) Both of the above
18) .......... provides full transport layer services to D) None of the above
applications.
2. FDDI used which type of physical topology?
A. TCP A) Bus
B. UDP B) Ring
C. IP C) Star
D. ARP
3. FTP stands for
19) UDP uses ...... to handle incoming user datagrams A) File transfer protocol
that go to different processes on the same host. B) File transmission protocol
C) Form transfer protocol
A. flow control D) Form transmission protocol
B. multiplexing
C. demultiplexing 4. Ethernet system uses which of the following
D. data control technology.
A) Bus
20) In the sending computer, UDP receives a data B) Ring
unit from the ......... layer. C) Star
D) Tree
5. Which of the following are the network a maximum cable length of about 600 feet.
services? A) Star
A) File service B) Ring
B) Print service C) Bus
C) Database service D) Tree
D) All of the above
13) …………… is a set of connecting links
6. If all devices are connected to a central hub, between LANs.
then topology is called A) CAN
A) Bus Topology B) WAN
B) Ring Topology C) CLAN
C) Star Topology D) IAN
D) Tree Topology
14) A ………. line considered as a fast WAN link,
7. FDDI stands for transmits at 1.5 Mbps, or 1 million bits per
A) Fiber Distributed Data Interface second.
B) Fiber Data Distributed Interface A) L1
C) Fiber Dual Distributed Interface B) F1
D) Fiber Distributed Data Interface C) W1
D) T1
8. Which of the following is an application layer
service? 15) The …………….. elements are specialized
A) Network virtual terminal computers to connect two or more transmission
B) File transfer, access and management lines.
C) Mail service A) Networking
D) All of the above B) Broadcasting
C) Switching
9. Which is the main function of transport layer? D) Transfering
A) Node to node delivery
B) End to end delivery 16) In …………… the network contains
C) Synchronization numerous cables or leased telephone line, each
D) Updating and maintaining routing tables one connecting a pair or IMPs.
A) Point-to-Point channels
10. The ………… layer change bits onto B) Pair-to-Pair channels
electromagnetic signals. C) Broadcast channels
A) Physical D) Interface channels
B) Transport
C) Data Link 17) The entities comprising the corresponding
D) Presentation layers on different layers on different machines
are called …………. processes.
A) entity
11. A group of computers and other devices B) peer
connected together is called a network, and the C) peer-to-peer
concept of connected computers sharing resources D) layred
is called ………
A) Networking 18) …………….. entities are entities in the same
B) Inter-Network layer on different machines.
C) Inter-Connection A) Software
D) Computer Group B) Service
C) Peer
12. A simple cabling method, known as the D) Interface
………… topology, allows about 30 computers on
19) To use a …………………. network service, the C) Session D) Transport
service user first establishes a connection, uses the
connection, and terminates the connection. 3. Which of the transport layer protocols is
A) connection-oriented connection-less?
B) connection-less
C) service-oriented A) UDP B) TCP
D) service-less
C) FTP D) Nvt
20) In ……………………… service, each message
carries the full destination address, and each one 4. Which of the following applications allows a
is routed through the system independent of all user to access and change remote files without
others. actual transfer?
A) connection-oriented
B) connection-less A) DNS B) FTP
C) service-oriented
D) service-less C) NFS D) Telnet

Answers: 5. The data unit in the TCP/IP data link layer


called a …..
1. C) Both of the above
2. B) Ring A) Message B) Segment
3. A) File transfer protocol
4. A) Bus C) Datagram D) Frame
5. D) All of the above
6. C) Star Topology 6. DNS can obtain the …………….. of host if its
7. A) Fiber Distributed… Interface domain name is known and vice versa.
8. C) Mail service
9. B) End to end delivery A) Station address B) IP address
10. A) Physical
C) Port address D) Checksum
11. A) Networking
12. C) Bus 7. Which of the following OSI layers correspond
13. B) WAN to TCP/IP’s application layer?
14. D) T1
15. C) Switching A) Application B) Presentation
16. A) Point-to-Point channels
17. B) peer C) Session D) All of the above
18) C) Peer
19) A) connection-oriented 8. Devices on one network can communicate with
20) B) connection-less devices on another network via a …….

1. A network that needs human beings to A) File Server B) Utility Server


manually route signals is called….
C) Printer Server D) Gateway
A) Fiber Optic Network B) Bus Network
9. A communication device that combines
C) T-switched network D) Ring network transmissions from several I/O devices into one
line is a
2. TCP/IP …………….. layer corresponds to the
OSI models to three layers. A) Concentration B) Modifier

A) Application B) Presentation
C) Multiplexer D) Full duplex file 17. The standard suit of protocols used by the
Internet, Intranets, extra-nets and some other
10. Which layers of the OSI determines the networks.
interface often system with the user?
A) TCP/IP B) Protocol
A) Network B) Application
C) Open system D) Internet work processor
C) Data link D) Session
18. State whether the following is True or False.
11. Which of the following of the TCP/IP
protocols is the used for transferring files from i) In bus topology, heavy Network traffic slows down
one machine to another? the bus speed.

A) FTP C) SNMP ii) It is multi-point configuration.

B) SMTP D) Rpe A) True, True B) True, False

12. In which OSI layers does the FDDI protocol C) False, True D) False, False
operate?
19. Which of the following is the logical topology?
A) Physical B) Data link
A) Bus B) Tree
C) Network D) A and B
C) Star D) Both A and B
13. In FDDI, data normally travel on
……………… 20. Which of the following is/ are the drawbacks
of Ring Topology?
A) The primary ring B) The Secondary ring
A) Failure of one computer, can affect the whole
C) Both rings D) Neither ring network

14. The …………layer of OSI model can use the B) Adding or removing the computers disturbs the
trailer of the frame for error detection. network activity.

A) Physical B) Data link C) If the central hub fails, the whole network fails to
operate.
C) Transport D) Presentation
D) Both of A and B
15. In a …………….topology, if there are n
devices in a network, each device has n-1 ports for Answers:
cables.

A) Mesh B) Star 1. C) T-switched network


2. A) Application
C) Bus D) Ring 3. A) UDP
4. C) NFS
16. Another name for Usenet is 5. D) Frame
6. B) IP address
A) Gopher B) Newsgroups 7. D) All of the above
8. D) Gateway
C) Browser D) CERN 9. C) Multiplexer
10. B) Application
11. A) FTP 7. What is the commonly used unit for measuring the
12. D) A and B speed of data transmission?
13. A) The primary ring A) Bytes per second
14. B) Data link B) Baud
15. A) Mesh C) Bits per second
16. B) Newsgroups D) Both B and C
17. A) TCP/IP
18. A) True, True 8. Which of the communication modes support two
19. C) Bus way traffic but in only once direction of a time?
20. D) Both of A and B A) Simplex
B) Half-duplex
1. In mesh topology, relationship between one device C) Three – quarter’s duplex
and another is ………….. D) Full duplex
A) Primary to peer
B) Peer to primary 9. The loss in signal power as light travels down the
C) Primary to secondary fiber is called ………….
D) Peer to Peer A) Attenuation
B) Propagation
2. The performance of data communications network C) Scattering
depends on ………….. D) Interruption
A) Number of users 10. ……………………. is an interconnection of
B) The hardware and software networks that provide universal communication
C) The transmission services over heterogeneous physical networks.
D) All of the above A) Internet
B) Intranet
3. Find out the OSI layer, which performs token C) Network
management. D) LAN
A) Network Layer
B) Transport Layer 11. Commercial networks providing access to the
C) Session Layer ………………. to subscribers, and networks owned
D) Presentation Layer by commercial organizations for internal use that also
have connections to the internet.
4. The name of the protocol which provides virtual A) backbones
terminal in TCP/IP model is. B) Network access points(NAPs)
A) Telnet C) Internet Exchange Points(IXPs)
B) SMTP D) All of the above
C) HTTP
12. The …………………… layer is provided by the
5. The layer one of the OSI model is program that uses TCP/IP for communication.
A) Physical layer A) Transport
B) Link layer B) Application
C) Router layer C) Internetwork
D) Broadcast layer D) Network interface

6. What is the name of the network topology in 13) The ………………….. layer Provides the end-to-
which there are bi-directional links between each end data transfer by delivering data from an
possible node? application to its remote peer.
A) Ring A) Transport
B) Star B) Application
C) Tree C) Internetwork
D) Mesh D) Network interface
14) …………….. provides connection-oriented 2. ………………. address use 7 bits for the
reliable data delivery, duplicate data suppression, <network> and 24 bits for the <host> portion of the
congestion control, and flow control. IP address.
A) TCP A) Class A
B) IP B) Class B
C) UDP C) Class C
D) ICMP D) Class D

15) ………………. is used by applications that need 3. …………. addresses are reserved for multi-
a fast transport mechanism and can tolerate the loss casting.
of some data. A) Class B
A) TCP B) Class C
B) IP C) Class D
C) UDP D) Class E
D) ICMP
4. State the following statement is true or false.
16) ……………… is a connection-less protocol that i) In class B addresses a total of more than 1 billion
does not assume reliability from lower layers, which addresses can be formed.
does not provide reliability, flow control, or error ii) Class E addresses are reserved for future or
recovery. experimental use.
A) Transmission control protocol A) True, False
B) Internet protocol B) True, True
C) User Datagram Protocol C) False, True
D) Simple Mail Transfer Protocol D) False, False

Answers: 5. Which of the following statement is true?


i) An address with all bits 1 is interpreted as all
1. D) Peer to Peer networks or all hosts.
2. D) All of the above ii) The class A network 128.0.0.0 is defined as the
3. C) Session Layer loopback network.
4. A) Telnet A) i only
5. A) Physical layer B) ii only
6. D) Mesh C) Both A and B
7. B) Baud D) None of the above
8. B) Half-duplex
9. A) Attenuation 6. Which is not the Regional Internet Registers (RIR)
10. A) Internet of the following?
11. D) All of the above A) American Registry for Internet Numbers (ARIN)
12. B) Application B) Europeans Registry for Internet Numbers (ERIN)
13. A) Transport C) Reseaux IP Europeans (RIPE)
14. A) TCP D) Asia Pacific Network Information Centre
15. C) UDP (APNIC)
16. B) Internet protocol
7. Match the following IEEE No to their
1. Which of the following is not the layer of TCP/IP corresponding Name for IEEE 802 standards for
protocol? LANs.
A) Application Layer i) 802.3 a) WiFi
B) Session Layer ii) 802.11 b) WiMa
C) Transport Layer iii) 802.15.1 c) Ethernet
D) Internetwork layer iv) 802.16 d) Bluetooth
A) i-b, ii-c, iii-d, iv-a
B) i-c, ii-d, iii-a, iv-b
C) i-c, ii-a, iii-d, iv-b 3. ………………….. is a collective term for a
D) i-b, ii-d, iii-c, iv-a number of Ethernet Standards that carry traffic at the
8. ……….. was the first step in the evolution of nominal rate of 1000 Mbit/s against the original
Ethernet from a coaxial cable bus to hub managed, Ethernet speed of 10 Mbit/s.
twisted pair network. A) Ethernet
A) Star LAN B) Fast Ethernet
B) Ring LAN C) Gigabit Ethernet
C) Mesh LAN D) All of the above
D) All of the above
4. …………… is another kind of fiber optic network
9. …………… is the predominant form of Fast with an active star for switching.
Ethernet, and runs over two pairs of category 5 or A) S/NET
above cable. B) SW/NET
A) 100 BASE-T C) NET/SW
B) 100 BASE-TX D) FS/NET
C) 100 BASE-T4
D) 100 BASE-T2 5. The combination of ……………. And …………..
is often termed the local address of the local portion
10. IEEE 802.3ab defines Gigabit Ethernet of the IP address.
transmission over unshielded twisted pair (UTP) A) Network number and host number
category 5, 5e or 6 cabling known as ……………….. B) Network number and subnet number
A) 1000 BASE-T C) Subnet number and host number
B) 1000 BASE-SX D) All of the above
C) 1000 BASE-LX
D) 1000 BASE-CX 6. ………………….. implies that all subnets
obtained from the same subnet mask.
Answers: A) Static subnetting
B) Dynamic subnetting
1. B) Session Layer C) Variable length subnetting
2. A) Class A D) Both B and C
3. C) Class D
4. B) True, True 7. State whether true or false.
5. A) i only i) A connection oriented protocol can only use
6. B) Europeans ….. (ERIN) unicast addresses.
7. C) i-c, ii-a, iii-d, iv-b ii) The anycast service is included in IPV6.
8. A) Star LAN A) True, True
9. B) 100 BASE-TX B) True, False
10. A) 1000 BASE-T C) False, True
D) False, False
1. ………………….. is a high performance fiber
optic token ring LAN running at 100 Mbps over
distances upto 1000 stations connected. 8. The most important and common protocols
A) FDDI associated TCP/IP internetwork layer are.
B) FDDT i) Internet protocol(IP) ii) Internet control Message
C) FDDR Protocol(ICMP)
D) FOTR iii) Bootstrap Protocol (BooTP) iv) Dynamic Host
Configuration Protocol (DHCP)
2. Which of the following are Gigabit Ethernet’s? v) Address Resolution Protocol (ARP)
A) 1000 BASE-SX A) i, ii, iii and iv only
B) 1000 BASE-LX B) i, iii, iv and v only
C) 1000 BASE-CX C) ii, iii, iv and v only
D) All of above D) All i, ii, iii, iv and v
9. …………………….. is responsible for converting B) i, ii and iii only
the higher level protocol addresses (IP addresses) to C) ii, iii and iv only
physical network addresses. D) All i, ii, iii and iv
A) Address Resolution Protocol (ARP)
B) Reverse Address Resolution Protocol (RARP) 4. A ………….. is a set of information that is
C) Bootstrap Protocol (BOOTP) exchanged between a client and web browser and a
D) Internet Control Message Protocol (ICMP) web server during an HTTP transaction.
A) infoset
10. Which of the following is not a mechanism that B) clientinfo
DHCP supports for IP address allocation? C) cookie
A) Automatic allocation D) transkie
B) Static allocation
C) Dynamic allocation 5. Match the following HTTP status code to their
D) Manual allocation respective definitions.
i) 400 a) OK
Answers: ii) 500 b) Not found
iii) 200 c) Continue
1. A) FDDI iv) 100 d) Internal server error
2. D) All of above A) i-b, ii-d, iii-a, iv-c
3. B) Fast Ethernet B) i-a, ii-b, iii-c, iv-d
4. A) S/NET C) i-b, ii-c, iii-a, iv-d
5. C) Subnet . host number D) i-b, ii-a, iii-c, iv-d
6. A) Static subnetting
7. A) True, True 6. Loopback address ……………………. of IPv6
8. D) All i, ii, iii, iv and v address is equivalent to the IPV4 loopback address
9. A) Address …..(ARP) 127.0.0.1.
10. B) Static allocation A) (: : 1)
B) (: : )
1. The examples of Interior Gateway Protocols (IGP) C) (: : 0)
are. D) (1 : : )
i) Open Short Path First (OSPF)
ii) Routing Information Protocol (RIP) 7. Unspecified address ………………….. of IPV6
iii) Border Gateway Protocol (BGP) address is equivalent to the IPV4 unspecified address
A) i only 0.0.0.0.
B) i, and ii only A) (: : 1)
C) i and iii only B) (: : )
D) All i, ii and iii C) (: : 0)
D) (1 : : )
2. FTP server listens to connections on port 8. A simple cabling method, known as the
……………………. ……………… topology allows about 30 computers
A) 19 and 20 on a maximum cable length of about 600 feet.
B) 20 and 21 A) Ring
C) 21 and 22 B) Bus
D) 20 and 22 C) Star
D) Mesh
3. Which of the following operations can be
performed by using FTP. 9. The ……………… layer is responsible for
i) Connect to a remote host resolving access to the shared media or resources.
ii) Select directory A) Physical
iii) Define the transfer mode B) Mac sub layer
iv) List file available C) Network
A) i, and ii only D) Transport
10. A WAN typically spans a set of countries that 5. The ………………. layer provides a well defined
have data rates less than ……………. Mbps. service interface to the network layer, determining
A) 2 how the bits of the physical layer are grouped into
B) 1 frames.
C) 4 A) Data Link
D) 100 B) Physical
C) Network
Answers: D) Session

1. B) i, and ii only 6. A distributed data processing configuration in


2. B) 20 and 21 which all activities must pass through a centrally
3. D) All i, ii, iii and iv located computer is called as …………
4. C) cookie A) ring network
5. A) i-b, ii-d, iii-a, iv-c B) spider network
6. A) (: : 1) C) hierarchical network
7. B) (: : ) D) data control network
8. B) Bus
9. B) Mac sub layer 7. The …………… signals are used for the
10. B) 1 maintenance, troubleshooting and overall operation
of the network.
1. In addresses for ………………. networks, the first A) address
16 bits specify a particular network, and the last 16 B) network management
bits specify a particular host. C) call Information
D) supervisory
A) class A 8. In …………………… a route is selected for each
B) class B source-destination pair of in the network.
C) class C A) flooding
D) class D B) variable routing
C) fixed routing
2. The ………….. protocol is based on end to end D) random routing
delivery.
A) SMTP 9. In …………….. type of service, each frame sent
B) TCP over the connection is numbered and the data link
C) IP layer guarantees that each frame sent is indeed
D) SCTP received.
A) connection less service
3. A/An ……………….. routing scheme is designed B) indirect link service
to enable switches to react to changing traffic C) direct link service
patterns on the network. D) connection oriented service
A) static routing
B) fixed alternate routing 10. In ……………….. deliver, packets of a message
C) adaptive routing are logically connected to one another.
D) dynamic routing A) connection less
B) indirect link
4. The IPV4 address is a ……………… address C) direct link
because it is assigned at the internet layer. D) connection oriented
A) logical
B) physical Answers:
C) common
D) shared 1. In addresses for ………………. networks, the first
16 bits specify a particular network, and the last 16
bits specify a particular host.
B) class B

2. The ………….. protocol is based on end to end


delivery.
A) SMTP

3. A/An ……………….. routing scheme is designed


to enable switches to react to changing traffic
patterns on the network.
C) adaptive routing

4. The IPV4 address is a ……………… address


because it is assigned at the internet layer.
A) logical

5. The ………………. layer provides a well defined


service interface to the network layer, determining
how the bits of the physical layer are grouped into
frames.
A) Data Link

6. A distributed data processing configuration in


which all activities must pass through a centrally
located computer is called as …………
B) spider network

7. The …………… signals are used for the


maintenance, troubleshooting and overall operation
of the network.
B) network management

8. In …………………… a route is selected for each


source-destination pair of in the network.
C) fixed routing

9. In …………….. type of service, each frame sent


over the connection is numbered and the data link
layer guarantees that each frame sent is indeed
received.
D) connection oriented service

10. In ……………….. deliver, packets of a message


are logically connected to one another.
D) connection oriented

Вам также может понравиться