Вы находитесь на странице: 1из 5

Computer Networking II

MKSSS's Shri Siddhivinayak Mahila Mahavidyalaya , Karve Nagar, Pune-52


Department of Computer Science TYBSc(CS) SEM II CS-343 Computer Networking II Question Bank
Sr. Question Option 1 Option 2 Option 3 Option 4
No.
1 Physical or logical arrangement of network is ______ Topology Routing Networking Control
2 Which network topology requires a central controller or hub Star Mesh Ring Bus
3 _______ topology requires a multipoint connection. Star Mesh Ring Bus
4 Data communication system spanning states, countries, or the whole world is LAN WAN MAN PAN
________
5 Data communication system within a building or campus is________ LAN WAN MAN PAN
6 WAN stands for __________ World area network Wide area network Web area network Web access network
7 In TDM, slots are further divided into __________ Seconds Frames Packets Bits
8 WLANs use high power levels and generally require a license for spectrum true FALSE
use.
9 Which of the following specifies a set of media access control (MAC) and IEEE 802.16 IEEE 802.3 IEEE 802.11 IEEE 802.15
physical layer specifications for implementing WLANs?
10 The network layer is concerned with __________ of data. bits frames packets bytes
11 Which one of the following is not a function of network layer? routing inter-networking congestion control error control
12 A 4 byte IP address consists of __________ only network address only host address network address & host network address & MAC
address address
13 In virtual circuit network each packet contains ___________ full source and destination a short VC number only source address only destination address
address
14 Which of the following is not correct in relation to multi-destination routing? is same as broadcast contains the list of all data is not sent by packets there are multiple receivers
routing destinations
15 A subset of a network that includes all the routers but contains no loops is spanning tree spider structure spider tree special tree
called ________
16 Which one of the following algorithm is not used for congestion control? traffic aware routing admission control load shedding routing information protoco
17 The network layer protocol for internet is ________ ethernet internet protocol hypertext transfer protocol file transfer protocol
18 Which is a reason for avoiding doing route redistribution on two routers Higher cost of two routers Routing feedback Cisco IOS incompatibility Not possible to use two
between the same two routing domains? routers
19 Which of the following is false with respect to TCP? Connection-oriented Process-to-process Transport layer protocol Unreliable
20 In TCP, sending and receiving data is done as ______ Stream of bytes Sequence of characters Lines of data Packets
21 TCP process may not write and read data at the same speed. So we need Packets Buffers Segments Stack
__________ for storage.
22 TCP groups a number of bytes together into a packet called _______ Packets Buffers Segments Stack
23 Communication offered by TCP is ________ Full-duplex Half-duplex Semi-duplex Byte by byte

1
Computer Networking II

24 To achieve reliable transport in TCP, ___________ is used to check the safe Packet Buffer Segments Acknowledgment
and sound arrival of data.
25 In segment header, sequence number and acknowledgement number fields Byte number Buffer number Segment number Acknowledgment
refer to _______
26 Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is 10000 10001 12001 11001
numbered 10001. What is the sequence number of the segment if all data is
sent in only one segment?
27 Bytes of data being transferred in each connection are numbered by TCP. Fixed number Random sequence of 0’s One Sequence of zero’s and
These numbers start with a ________ and 1’s one’s
28 The value of acknowledgement field in a segment defines _______ sequence number of the total number of bytes to sequence number of the sequence of zeros and ones
byte received previously receive next byte to be received
29 In the layer hierarchy as the data packet moves from the upper to the lower Added Removed Rearranged Modified
layers, headers are ___________
30 Communication between a computer and a keyboard involves Automatic Half-duplex Full-duplex Simplex
______________ transmission
31 Which of this is not a network edge device? PC Smartphones Servers Switch
32 Protocols are set of rules to govern _________ Communication Standard Metropolitan Bandwidth
communication
33 An internet is a __________ Collection of WANS Network of networks Collection of LANS Collection of identical
LANS and WANS
34 Checksum is used in Internet by several protocols although not at the Session layer Transport layer Network layer Data link layer
_________
35 In version field of IPv4 header, when machine is using some other version of Discarded Accepted Interpreted Interpreted incorrectly
IPv4 then datagram is ______
36 Network layer at source is responsible for creating a packet from data coming Station Link Node Protocol
from another ______
37 Header of datagram in IPv4 has _________ 0 to 20 bytes 20 to 40 bytes 20 to 60 bytes 20 to 80 bytes
38 In IPv4 layer, datagram is of ________ Fixed length Variable length Global length Zero length
39 In IPv4, service type of service in header field, first 3 bits are called ______ Type of service Code bits Sync bits Precedence bits
40 Which is a link layer protocol? ARP TCP UDP HTTP
41 Which of the following is false with respect to UDP? Connection-oriented Unreliable ransport layer protocol Low overhead
42 Beyond IP, UDP provides additional services such as _______ Routing and switching Sending and receiving of Multiplexing and Demultiplexing and error
packets demultiplexing checking
43 What is the main advantage of UDP? More overload Reliable Low overhead Fast
44 The ______ field is used to detect errors over the entire user datagram. udp header checksum source port destination port
45 Which of the following is not applicable for IP? Error reporting Handle addressing Datagram format Packet handling
conventions conventions

2
Computer Networking II

46 Which of the following field in IPv4 datagram is not related to fragmentation Flags Offset TOS Identifier
47 Which of these is not applicable for IP protocol? is connectionless offer reliable service offer unreliable service does not offer error
reporting
48 Which field helps to check rearrangement of the fragments? offset flag ttl identifer
49 IP Security operates in which layer of the OSI model? Network Transport Application Physical
50 Two broad categories of congestion control are Open-loop and Closed-loop Open-control and Closed- Active control and Passive Active loop and Passive
control control loop
51 In open-loop control, policies are applied to _________ Remove after congestion Remove after sometime Prevent before congestion Prevent before sending
occurs occurs packets
52 . Retransmission of packets must not be done when ____ Packet is lost Packet is corrupted Packet is needed Packet is error-free
53 Closed-Loop control mechanisms try to _____ Remove after congestion Remove after sometime Prevent before congestion Prevent before sending
occurs occurs packets
54 The technique in which a congested node stops receiving data from the Admission policy Backpressure Forward signaling Backward signaling
immediate upstream node or nodes is called as _______
55 Backpressure technique can be applied only to __ Congestion networks Closed circuit networks Open circuit networks Virtual circuit networks
56 The packet sent by a node to the source to inform it of congestion is called Explicit Discard Choke Backpressure
_______
57 In the slow-start algorithm, the size of the congestion window increases exponentially additively multiplicatively suddenly
__________ until it reaches a threshold
58 The address that is unique in the scope of the network or internationally if the Global address Network address Physical address IP address
network is part of an international network is called as ______
59 The Identifier that is used for data transfer in virtual circuit network is called Global address Virtual circuit identifier Network identifier IP identifier
_____
60 During teardown phase, the source, after sending all the frames to destination, teardown response teardown request termination request termination response
sends a _____ to notify termination.
61 The data link layer takes the packets from _________ and encapsulates them network layer physical layer transport layer application layer
into frames for transmission.
62 Which of the following tasks is not done by data link layer? framing error control flow control channel coding
63 CRC stands for __________ cyclic redundancy check code repeat check code redundancy check cyclic repeat check
64 Which of the following is a data link protocol? ethernet point to point protocol hdlc all of the mentioned
65 The technique of temporarily delaying outgoing acknowledgements so that piggybacking cyclic redundancy check fletcher’s checksum parity check
they can be hooked onto the next outgoing data frame is called ___
66 . Expansion of FTP is __________ Fine Transfer Protocol File Transfer Protocol First Transfer Protocol Fast Transfer Protocol
67 FTP is built on _____ architecture. Client-server P2P Data centric Service oriented
68 FTP uses _________ parallel TCP connections to transfer a file. 1 2 3 5
69 Identify the incorrect statement regarding FTP. FTP stands for File FTP uses two parallel TCP FTP sends its control FTP sends exactly one file
Transfer Protocol connections information in-band over the data connection

3
Computer Networking II

70 FTP server _____________ Maintains state information Is stateless Has single TCP connection Has UDP connection for
for a file transfer file transfer
71 The password is sent to the server using ________ command PASSWD PASS PASSWORD PWORD
72 Simple mail transfer protocol (SMTP) utilizes _________ as the transport TCP UDP DCCP SCTP
layer protocol for electronic mail transfer.
73 SMTP connections secured by SSL are known as __________ SMTPS SSMTP SNMP STARTTLS
74 SMTP uses which of the following TCP port? 22 23 74 25
75 Which one of the following protocol is used to receive mail messages? SMTP POP IMAP FTP
76 What is on-demand mail relay (ODMR)? protocol for SMTP security an SMTP extension protocol for web pages protocol for faster mail
transfer
78 An email client needs to know the _________ of its initial SMTP server. IP address MAC address URL Name
79 An SMTP session may not include _______ zero SMTP transaction one SMTP transaction more than one SMTP one HTTP transaction
transaction
80 SMTP defines _______ message transport message encryption message content message password
81 Which one of the following is an SMTP server configured in such a way that open mail relay wide mail reception open mail reception short mail reception
anyone on the internet can send e-mail through it?
82 SMTP is not used to deliver messages to ______ user’s terminal user’s mailbox user’s word processor user’s email client
83 An asymmetric-key cipher uses 1 Key 2 Key 3 key 4 key
84 .Which one of the following protocol is used to secure HTTP connection? Resource reservation Transport layer security Xplicit congestion Stream control transmission
protocol (TSL) notification (ECN) protocol (SCTP)
85 Cryptography term is used to transforming messages to make them secure and Change Defend Idle Attacks
to prevent from
86 Shift cipher is also referred to as the Caesar cipher cipher text Shift cipher None of the above
87 Which one is the Heart of Data Encryption Standard (DES)? DES function Encryption Rounds Cipher
88 DES stands for………………… Data Encryption Slots Data Encryption Data Encryption Standard Data Encryption Solutions
Subscription
89 Encryption algorithm is used to transforms plaintext into…………… Simple Text Cipher Text Empty Text None of the above
90 What is cipher in Cryptography ? Algorithm for performing Algorithm for performing Encrpted Messages Both algorithm for
encryption decryption performing encryption and
Decryption and encrypted
message
91 The message before being transformed, is Simple Text Cipher Text Empty Text plain text
92 Which technique is used for data protection ?. Data piracy Authentication Encryption None of these
93 ________are the types of firewalls. Packet Filtering Dual Homed Gateway Both A and B None of these
94 In networks protocol TCP/ IP stands for. Transaction control Transmission control Transmission contribution None of these
protocol protocol protocol
95 Which of the following services use TCP? DHCP SMTP HTTP TFTP

4
Computer Networking II

96 What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI Application Host-to-Host Internet Network Access
model?
97 You want to implement a mechanism that automates the IP configuration, SMTP SNMP DHCP ARP
including IP address, subnet mask, default gateway, and DNS information.
Which protocol will you use to accomplish this?
98 The DoD model (also called the TCP/IP stack) has four layers. Which layer of Application Host-to-Host Internet Network Access
the DoD model is equivalent to the Network layer of the OSI model?
99 Which of the following services use UDP? DHCP SMTP SNMP TFTP
100 Which statements are true regarding ICMP packets? ICMP guarantees datagram ICMP can provide hosts ICMP is encapsulated ICMP is encapsulated
delivery. with information about within IP datagrams. within UDP datagrams.
network problems.
101 Which layer 4 protocol is used for a Telnet connection? IP TCP TCP/IP UDP

Вам также может понравиться