Professional Documents
Culture Documents
5.A link layer switch is involved in ………………layers of the TCP/IP protocol suite
A)two
B)Three
C)four
D)five
6.In the TCP/IP protocol suite, which of the following is an application layer
protocol?
A)The User Datagram Protocol(UDP)
B)The Internet Protocol(IP)
C) The File Transfer Protocol(FTP)
D) The Transmission Control Protocol(TCP)
7.I n the TCP/IP protocol suite, which of the following is a transport layer protocol?
A) The Internet Control Message Protocol (ICMP)
B) The Internet Protocol(IP)
C) The Transmission Control Protocol (TCP)
D) The Address Resolution Protocol (ARP)
8. In the TCP/IP protocol suite, which of the following is a network layer protocol?
A) The Stream Control Transmission Protocol (STCP)
B) The Secure Shell (SSH)
C) The Internet Protocol (IP)
D) User Datagram Protocol (UDP)
9.In the TCP/IP protocol suite, the ……….layer is responsible for moving frames
from one hop to the next
A) Physical
B) Data link
C) Transport
D) Network
10. The transport layer packet in the TCP/IP protocol suite is called
A) A message
B) A datagram
C) A segment or a user datagram
D) A frame
11. In the TCP/IP protocol suite, the physical layer is concerned with the movement
of ……….over the physical medium.
A) Programs
B) Dialogs
C) Protocols
D) Bits
12. In the TCP/IP protocol suite, a port number is the identifier at the ………….
A) Application layer
B) Transport layer
C) Network layer
D) Physical layer
13. In the TCP/IP protocol suite, a logical address is the identifier at the…………..
A) Network layer
B) Transport layer
C) Data link layer
D) Application layer
14. The ………….layer is responsible for the delivery of a message from one process
to another
A) Physical
B) Transport
C) Network
D) Application
16. The application layer in the TCP/IP protocol suite is usually considered to be the
combination of ……….layers in the OSI model
A) Application, Presentation, and Session
B) Application, Transport, and Network
C) Application, Data link, and Physical
D) Network, Data link, and Physical
17. A proposed standard is elevated to…………. standard status after at least two
successful tries
A) Informational
B) Historic
C) Draft
D) None of the above
18. An RFC is labeled ……………….if it must be implemented by all internet
systems
A) Required
B) Elective
C) Recommended
D) None of the above
21. Currently ……..is responsible for the management of internet domain names
and addresses
A) NIC
B) ICANN
C) ISOC
D) IEFE
23. In the TCP/IP, a message belonging to the transport layer is de-capsulated from
a packet at the…………layer
A) Network
B) Transport
C) Data link
D) Physical
24. In the TCP/IP, a message belonging to the network layer is de-capsulated from a
packet at the…………layer
A) Network
B) Transport
C) Data link
D) Physical
25. In the TCP/IP, a message belonging to the transport layer is de-capsulated from
a packet at the…………layer
A) Network
B) Transport
C) Data link
D) Physical
26. In TCP/IP, a logical connection between an entity at the network layer can be
made with another entity at the …………layer
A) Network
B) Transport
C) Data link
D) Physical
27. In TCP/IP, a logical connection between an entity at the network layer can be
made with another entity at the …………layer
A) Network
B) Transport
C) Data link
D) Physical
28. In TCP/IP, a packet at the third layer carries data belonging to the …………
layer and the header belonging to the ……………
A) Third; Third
B) Third: Fourth
C) Fourth;Fourth
D) Fourth; Third
51. IP is a …………protocol
A) Connection oriented unreliable
B) Connection oriented reliable
C) Connectionless unreliable
D) Connectionless reliable
54. The total length field defines the total length of the datagram………….
A) Including the header
B) Excluding the header
C) Excluding the option length
D) None of the above
55. In sub netting, the number of addresses in each subnet must……………
A) Be a power of 2
B) Be a multiple of 128
C) Be divisible by 128
D) None of the above
60. Which error detection method consists of just one redundant bit per data unit?
A) Two-dimensional parity check
B) CRC
C) Simple parity check
D) Checksum
64. The HDLC ………….field defines the beginning and end of a frame
A) Control
B) Flag
C) FCS
D) None of the above
80. A link layer switch is a connecting device that operates in the ………layers
A) Physical
B) Physical and data link
C) Data link and network
D) Physical, data link, and network
81. A router is a connecting device that operates in the………layers
A) Physical
B) Physical and data link
C) Data link and network
D) Physical, data link, and network
85. …………is a type of transmission impairment in which the signal loses due to the
different propagation speeds of each frequency that makes up the signal
A) Attenuation
B) Distortion
C) Noise
D) Decibel
89. …………conversion involves three techniques: line coding, block coding, and
scrambling
A) Analog-to-digital
B) Digital-analog
C) Analog-to-analog
D) Digital-to-digital
93. In……………….resolution, the resolver expects the server to supply the final
answer
A) Iterative
B) Recursive
C) Straight
D) None of the above
94. A route of DNS tree is …………..
A) A string of 127 characters
B) A string of 63 characters
C) A string of 15 characters
D) An empty string
98. When a user logs into a local time-sharing system it is called ……….login
A) Local
B) Remote
C) Local or remote
D) None of the above
104. In kademlia each node in the network divides the binary tree into m sub-trees
that
A) Include the node itself
B) Do not include the node itself
C) Include the node itself and the successor node
D) None of the above
105. I n …………nodes and data items are m-bit identifiers that create an identifier
space of 2m points distributed at the leaves of a binary tree
A) Chord
B) Pastry
C) Kademlia
D) None of the above
106. In kademlia the distance between the two identifiers are measured as the bit-
wise…………..between them
A) AND
B) OR
C) NOR
D) None of the above
107. To solve a query………….uses two entities a routing table and a leaf set
A) Chord
B) Pastry
C) Kademlia
D) None of the above
111. In a centralized P2P network the directory system uses the …………paradigm;
the storing and downloading of the files are done using ………………paradigm
A) Client-Server; Client-Server
B) Peer- to-Peer; Client-Server
C) Client-Server; Peer-to-Peer
D) Peer-to-Peer; Peer-to-Peer
115. A……………..server is a computer that stores a file about the zone for which it
has an authority
A) Primary
B) Secondary
C) Zone
D) Root
116. A ………….server is a computer whose zone system consists of the whole tree
A) Domain
B) Zone
C) Root
D) Primary
117. In the domain name space what a server is responsible for or has authority over
is called a………….
A) Domain
B) Label
C) Zone
D) None of the above
118. In the domain name space a …………….is a sub-tree of the domain name space
A) Domain
B) Label
C) Zone
D) None of the above
119. In the domain name space if a label is not terminated by a null, it is called a
……………
A) FQDN
B) PQDN
C) SQDN
D) None of the above
126.In…………….,each packet of a message need not follow the same path from
sender to receiver
(A)Circuit switching
(B)Message switching
(C) Virtual approach to packet switching
(D) Datagram approach to packet switching
129.Computer Network is
A)Collection of hardware components and computers
B) Interconnected by communication channels
C) Sharing of resources and information
D)Allofthe Above
130. What is a Firewall in Computer Network?
A)The physical boundary of Network
B)An operating System of Computer Network
C)A system designed to prevent unauthorized access
D)A web browsing Software
132.IPV4 Address is
A) 8 bit
B) 16 bit
C) 32 bit
D) 64 bit
147. Which of the following layer of OSI model also called end-to-end
layer?
A) Presentation layer
B) Network layer
C) Session layer
D) Transport layer
152. What is the size of Network bits & Host bits of Class A of IP
address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits24
C. Network bits 7, Host bits23
D. Network bits 8, Host bits 23
161. In mesh topology, relationship between one device and another is..............
A) Primary to peer
B) Peer to primary
C) Primary to secondary
D) Peer to Peer
163. Find out the OSI layer, which performs token management.
A) Network Layer
B) Transport Layer
C) Session Layer
D) Presentation Layer
164. The name of the protocol which provides virtual terminal in TCP/IP model is.
A) Telnet
B) SMTP
C) HTTP
166. What is the name of the network topology in which there are bi-directional
links between each possible node?
A) Ring
B) Star
C) Tree
D) Mesh
167. What is the commonly used unit for measuring the speed of data
transmission?
A)Bytes per second
B)Baud
C) Bit per second
D) Both B & C
168. A network that needs human beings to manually route signals is called....
A) Fiber Optic Network
B) Bus Network
C) T-switched network
D) Ring network
170.Whichofthetransportlayerprotocolsis connectionless?
A) UDP
B) TCP
C) FTP
D) Nvt
171. Which of the following applications allows a user to access and change
remote files without actual Transfer?
A) DNS
B) FTP
C) NFS
D) Telnet
173. DNS can obtain the................. Of host if its domain name is known and vice
versa.
A) Station address
B) IP address
C) Port address
D) Checksum
174. Which of the following OSI layers correspond to TCP/IP's application layer?
A) Application
B) IP Address
C) Session
D) All of the above
175. Devices on one network can communicate with devices on another network via
a.......
A) File Server
B) Utility Server
C) Printer Server
D) Gateway
176. A communication device that combines transmissions from several I/O devices
into one line is a
A) Concentrator
B) Modifier
C) Multiplexer
D) Full duplex file
177. Which layers of the OSI determines the interface often system with the user?
A) Network
B) Application
C) Data link
D) Session
178. Which of the following of the TCP/IP protocols is used for transferring files
from one machine to another?
A) FTP
B) SMTP
C) SNMP
D) Rpe
181. The............layer of OSI model can use the trailer of the frame for error
detection.
A) Physical
B) Datalink
C) Transport
D) Presentation
182. In a................topology, if there are n devices in a network, each device has n-1
ports for cables.
A) Mesh
B) Star
C) Bus
D) Ring
195. To deliver a message to the correct application program running on a host, the
_______ address must be consulted.
a) IP
b) MAC
c) Port
d) none of the mentioned