Академический Документы
Профессиональный Документы
Культура Документы
Mock Exam
2. Transmission delay
a) is a function of the packet’s length
b) is a function of the transmission rate of the link
c) is a function of the distance between routers
d) a) and b)
e) b) and c)
f) a) and b) and c)
5. A process is
a) a program written in a source language
b) a program in execution
c) an executable
d) none of the above
6. A network is required to be
a) fast
b) connection oriented
c) reliable
d) secure
e) packet based
f) all of the above
g) a) and b) and c)
h) a) and c) and d)
1
7. Distributed processes communicating via the internet are addressed using
a) the unique computer name they run on
b) address / name of the host computer and name / identifier that specifies the
receiving process
c) name /identifier of the receiving process
d) a) and b)
e) none of the above
10. An unreliable transport protocol is used for communication via an unreliable channel.
To serve an application reliably there is a need to
a) do nothing
b) replace the network
c) provide reliable data transfer at the application layer
d) a) and b)
e) b) and c)
f) none of the above
11. TCP
a) provides flow control
b) does not provide congestion control
c) provides reliable data transfer
d) a) and b)
e) b) and c)
f) a) and c)
g) all of the above
h) none of the above
2
12. Persistent HTTP connections are
a) are less efficient than nonpersistent HTTP connections
b) provide better performance than nonpersistent HTTP connections
c) provide comparable performance to that of nonpersistent HTTP connections
d) a) and b)
e) b) and c)
f) none of the above
14. DNS provides the following services: (i) translating host names to IP addresses; (ii) host
aliasing; (iii) mail server aliasing; (iv) load distribution; (v) switching.
a) true
b) false
3
18. What is the UDP checksum of the following three 16 bit words? 0110011001100000,
0101010101010101, 1000111100001100.
a. 1010111010111100
b. 1111100011101010
c. 1100101011010111
d. 1011010100111110
e. 1011010100111101
4
24. TCP takes
a) network-assisted congestion control
b) end-to-end approach Comment [PCC3]: Similar to question
31
25. Virtual circuit networks do not need routing
a) true
b) false
27. Tunneling is
a) the mechanism through which IPv6 packets can be transported through IPv4
networks
b) where the distance between the source and destination is exceedingly long
c) where a router can determine all possible paths for a packet and thus select the
shortest route
d) where one packet encapsulates another
e) (a) and (d)
5
30. The most effective flow control is based on
a) the send-and-wait protocol
b) the sliding window protocol
c) a flow control enhancement provided to an application
d) a) and b)
e) b) and c)
f) none of the above Comment [PC4]: Same as Q23
32. Is the congestion window size (illustrated in the figure below) determined by
a) additive-increase algorithm
b) additive-increase, multiplicative-decrease algorithm
c) multiplicative-decrease algorithm
d) none of the above
congestion
window
24 Kbytes
16 Kbytes
8 Kbytes
time
6
34. Virtual circuit networks do not need routing
a) true
b) false Comment [PC5]: Same as Q25
37. In a local area network a MAC address and IP address are identical
a) true
b) false
38. DES and AES are not used as often as RSA because they are computationally heavier when
providing the same communication security level
a) true
b) false
39. A security threat that renders a network, host or other piece of network infrastructure unusable
by legitimate users is classified as
a) Hijacking
b) Eavesdropping
c) Denial of Service
d) Mapping
e) IP spoofing
40. Fully secure e-mail communication system uses symmetric key cryptography, public key
encryption, a hash function, and a digital signature to provide secrecy, authentication, and
message integrity
a) true
b) false