Professional Documents
Culture Documents
A) IPV4
B) IPV6
Answer:
B) IPV6
Reference:
Lecture#32, Page#113
2) In IPV6 the 128 bit addresses unwidely in dotted decimal; requires ___ numbers.
A) 12
B) 14
C) 16
D) none of the given
Answer:
C) 16
Reference:
Lecure#32, Page#114
A) Host Suffix
B) Host prefix
C) Source Prefix
D) none of the given
Answer:
A) Host Suffix
Reference:
Lecture#32, Page#114
A) Multicast
B) Broadcast
C) unicast
D) none of the given
Answer:
C) unicast
Reference:
1
Lecture#32, Page#114
5) IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
A) 96
B) 100
C) 120
D) none of the given
Answer:
A) 96
Reference:
Lecture#32, Page#114
6) ________ is a type of address used for collection of computers with same prefix.
A) Cluster
B) unicast
C) Multicast
D) none of the given
Answer:
A) Cluster
Reference:
Lecture#32, Page#114
7) The process of learning the path MTU is known as path MTU discovery.
A) True
B) False
Answer:
A) True
Reference:
Lecture#32, Page#114
A) Source quench
B) Time exceeded
C) Destination unreachable
D) none of the given
Answer:
D) none of the given
Reference:
Lecture#32, Page#115
2
9) The Network Layer Protocol ICMP stands for ___________
Answer:
B) Internet Control Message Protocol
Reference:
Lecture#32, Page#115
A) IGMP
B) SNMP
C) ICMP
D) none of the given
Answer:
C) ICMP
Reference:
Lecture#32, Page#115
A) ICMP
B) IGMP
C) TCP/IP
D) none of the given
Answer:
A) ICMP
Reference:
Lecture#33, Page#117
12) ICMP message transport is acted upon by getting ICMP ________ in IP.
A) De-encapsulated
B) Encapsulated
C) Segmented
D) none of the given
Answer:
B) Encapsulated
Reference:
Lecture#33, Page#117
3
13) ________ message is sent in response· to incoming datagrams with problems.
A) TCP/IP
B) IGMP
C) ICMP
D) none of the given
Answer:
C) ICMP
Reference:
Lecture#33, Page#117
14) There are ______ possibilities to detect the destination using Trace-route.
A) 1
B) 2
C) 3
D) None of the given
Answer:
B) 2
Reference:
Lecture#33, Page#118
15) Fragmentation when using ICMP for path MTU should be avoided.
A) True
B) False
Answer:
A) True
Reference:
Lecture#33, Page#118
A) Segmentation
B) Defragmentation
C) Fragmentation
D) None of the given
Answer:
C) Fragmentation
Reference:
Lecture#33, Page#118
4
17) The UDP stands for ________.
Answer:
B) User Datagram Protocol
Reference:
Lecture#34, Page#119
A) True
B) False
Answer:
A) True
Reference:
Lecture#34, Page#119
A) IP
B) TCP
C) ICMP
D) IGMP
Answer:
A) IP
Reference:
Lecture#34, Page#119
A) TCP
B) UDP
C) IP
D) None of the given
Answer:
B) UDP
Reference:
Lecture#34, Page#120
5
21) Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary
interaction & operating system independent are the characteristics of _______________.
A) TCP
B) UDP
C) IP
D) None of the given
Answer:
B) UDP
Reference:
Lecture#34, Page#120
A) True
B) False
Answer:
B) False
Reference:
Lecture#34, Page#120
A) True
B) False
Answer:
A) True
Reference:
Lecture#34, Page#121
A) IP
B) TCP
C) TCP/IP
D) None of the given
Answer:
A) IP
Reference:
Lecture#35, Page#122
6
25) Reliability is not the responsibility of the Transport layer.
A) True
B) False
Answer:
B) False
Reference:
Lecture#35, Page#123
Answer:
B) Transmission control protocol
Reference:
Lecture#35, Page#123
A) Point-to-Point
B) Multi-Point
C) Both (a) and (b)
D) None of the given
Answer:
A) Point-to-Point
Reference:
Lecture#35, Page#123
A) True
B) False
Answer:
B) False
Reference:
Lecture#35, Page#123
7
29) Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication,
Stream interface, Reliable connection startup and Graceful connection shutdown are the services
provided by__________
Answer:
B) TCP
Reference:
Lecture#35, Page#123
A) True
B) False
Answer:
A) True
Reference:
Lecture#35, Page#123
A) Half-duplex
B) Full-duplex
C) Both (a) and (b)
D) None of the given
Answer:
B) Full-duplex
Reference:
Lecture#35, Page#123
32) System rebooting is one of the major problems in the reliable delivery.
A) True
B) False
Answer:
A) True
Reference:
Lecture#35, Page#124
A) Efficiency
B) Accuracy
8
C) Reliability
D) none of the given
Answer:
C) Reliability
Reference:
Lecture#36, Page#125
A) Distance to destination
B) Current traffic conditions
C) Both a and b
D) none of the given
Answer:
C) Both a and b
Reference:
Lecture#36, Page#125
A) IP
B) UDP
C) TCP
D) none of the given
Answer:
C) TCP
Reference:
Lecture#36, Page#126
A) 3000 octets
B) 2000 octets
C) 1000 octets
D) none of the given
Answer:
C) 1000 octets
Reference:
Lecture#36, Page#126
37) The amount of buffer space available at any time is called the window.
A) True
B) False
Answer:
A) True
Reference:
9
Lecture#36, Page#126
38) Network having short intervals has a large timeout and the network having large interval has
short timeout.
A) True
B) False
Answer:
B) False
Reference:
The network having short intervals has a short timeout and the network having large interval has
large timeout.
Lecture#36, Page#126
39) In 3-way handshake TCP requires to generate a random _______ sequence number.
A) 30 bit
B) 32 bit
C) 34 bit
D) none of the given
Answer:
B) 32 bit
Reference:
Lecture#36, Page#127
40) The goal of ________ is to avoid adding retransmissions to an already congested network.
A) packet control
B) congestion control
C) transmission control
D) None of the given
Answer:
B) congestion control
Reference:
Lecture#37, Page#128
A) packet
B) message
C) both (a) and (b)
D) None of the given
Answer:
B) message
Reference:
Lecture#37, Page#128
10
42) TCP uses ______ format for all messages.
A) single
B) double
C) multiple
D) None of the given
Answer:
A) single
Reference:
Lecture#37, Page#128
Answer:
A) Network Address Translation
Reference:
Lecture#37, Page#128
A) multiple, multiple
B) multiple, single
C) single, single
D) None of the given
Answer:
B) multiple, single
Reference:
NETWORK ADDRESS TRANSLATION:
Lecture#37, Page#128
A) Packet control
B) congestion control
C) transmission control
D) None of the given
Answer:
B) congestion control
Reference:
Lecture#37, Page#128
11
46) Network Address Translation (NAT) requires device to perform packet translation.
A) True
B) False
Answer:
A) True
Reference:
Lecture#37, Page#128
47) A popular use of _______ is TCP Splicing. It interconnects two independent TCP connections
and performs segment rewriting.
A) NAT
B) NAPT
C) Twice NAT
D) All of these
Answer:
B) NAPT
Reference:
Lecture#38, Page#131
48) Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT
box is connected to Domain Name.
A) False
B) True
Answer:
B) True
Reference:
Lecture#38, Page#131
49) Network Address and Port Translation (NAPT) is by far the most popular form of ________.
Answer:
B) Network Address Translation
Reference:
Lecture#38, Page#131
51) Basic NAT does not work well for communication initiated from the internet.
A) True
B) False
Answer:
A) True
Reference:
Lecture#38, Page#132
52) NAT software does not allow a PC to connect with the internet and act as a NAT device at the
same time.
A) True
B) False
Answer:
B) False
Reference:
NAT software allows a PC to connect with the Internet and act as a NAT device at the same time.
Lecture#38, Page#132
53) Twice NAT requires the DNS interact with the NAT device.
A) True
B) False
Answer:
A) True
Reference:
Lecture#38, Page#132
54) Twice NAT fails if an application uses the IP addresses instead of Domain Name.
A) True
B) False
Answer:
A) True
Reference:
Lecture#38, Page#132
13
55) Routing inserts or changes values in _______
A) MAC address
B) routing table
C) both (a) and (b)
D) None of the given
Answer:
B) routing table
Reference:
Lecture#39, Page#133
56) In dynamic routing, the routing table is initialized when system boots.
A) True
B) False
Answer:
A) True
Reference:
Lecture#39, Page#133
A) packet
B) datagram
C) message
D) None of the given
Answer:
B) datagram
Reference:
Lecture#39, Page#133
58) In __________ routing, the table is initialized when system boots and there is no further
changes.
A) Dynamic
B) Static
C) Both (a) and (b)
D) None of the given
Answer:
B) Static
Reference:
Lecture#39, Page#133
14
59) Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes
of Internet Routing Protocol.
A) True
B) False
Answer:
A) True
Reference:
Lecture#40, Page#135
60) Autonomous System chooses a routing protocol to exchange routing information which is
passed before being summarized to another group.
A) True
B) False
Answer:
B) False
Reference:
Lecture#40, Page#135
Each Autonomous System chooses a routing protocol to exchange routing information which is
summarized before being passed to another group.
Answer:
B) Exterior Gateway Protocol
Reference:
Lecture#40, Page#135
62) Each autonomous system used to communicate among autonomous systems by chooses an
IGP.
A) True
B) False
Answer:
A) True
Reference:
Lecture#40, Page#136
15
63) ________ protocol uses distance vector algorithm.
A) IGP
B) BGP
C) RIP
D) none of the given
Answer:
C) RIP
Reference:
Lecture#40, Page#138
Answer:
A) Open Shortest Path First Protocol
Reference:
Lecture#41, Page#137
A) 2
B) 3
C) 4
D) none of the given
Answer:
C) 4
Reference:
Lecture#41, Page#138
66) ____________ measures distance in network hops, where each network between the source
and destination counts as a single hop.
A) BGP
B) OSPF
C) RIP
D) None of these
Answer:
C) RIP
Reference:
Lecture#41, Page#138
16
67) Which of the following is an exterior routing protocol?
A) OSPF
B) RIP
C) BGP
D) RIP and OSPF
Answer:
C) BGP
Reference:
Lecture#41, Page#138
68) _______ includes a 32 -bits address mask with each address, which allows the
address to be classful, classless, or subnetted.
A) RIP
B) OSPF
C) BGP
D) None of the given
Answer:
B) OSPF
Reference:
Lecture#42, Page#140
A) RIP
B) OSPF
C) BGP
D) RIP and OSPF
Answer:
D) RIP and OSPF
Reference:
https://www.metaswitch.com/knowledge-center/reference/what-is-routing-information-protocol-
rip#:~:text=The%20Routing%20Information%20Protocol%20(RIP,existing%20implementations%2
0in%20the%20field.
Lecture#42, Page#140
A) 30Bit
B) 32Bit
C) 34Bit
D) none of the given
Answer:
B) 32Bit
Reference:
Lecture#42, Page#140
17
71) OSPF has designed as an Exterior Gateway Protocol used to pass routing information among
routers within an autonomous system.
A) True
B) False
Answer:
B) False
Reference:
OSPF has designed as an Interior Gateway Protocol used to pass routing information among
routers within an autonomous system.
Lecture#42, Page#140
Answer:
B) Link state routing
Reference:
Lecture#42, Page#140
73) The computer uses _________ to inform Local router about the last application when it
leaves.
A) ICMP
B) IGMP
C) SNMP
D) None of the given
Answer:
B) IGMP
Reference:
Lecture#43, Page#142
74) A standard protocol exists that allows a host to inform a nearby router whenever the host
needs to join or leave a particular multicast group known as ______________.
A) IGMP
B) OSPF
C) BGP
D) None of the given
Answer:
A) IGMP
Reference:
Lecture#43, Page#142
18
75) A multicast routing scheme in which the protocol software builds a delivery tree from a
central point is called __________
Answer:
B) Core Based Tree (CBT)
Reference:
Lecture#44, Page#144
A) True
B) False
Answer:
A) False
Reference:
Lecture#45, Page#154
77) In TCP when a computer sends a segment, the _______ and ______ fields refer to incoming
data.
Answer:
A) ACKNOWLEGE NUMBER, WINDOW
78) ______ identifies the application program that sent the data.
A) Destination Port
B) Source port
C) Logical address
D) None of the given
Answer:
B) Source port
79) A datagram cannot be larger than _________ of a network over which it is sent.
A) MTU
B) Size
C) IP header
D) None of the given
19
Answer:
A) MTU
A) True
B) False
Answer:
A) True
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#363
81) To save traffic, an EGP does not summarize routing information from an autonomous system
before passing it to another autonomous system.
A) True
B) False
Answer:
B) False
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#454
Answer:
A) Part of an Autonomous System
83) We use the term ___________ to refer to a measure of the path that routing software uses
when choosing a route.
A) routing path
B) routing metric
C) routing
D) switching
Answer:
B) routing metric
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#455
20
84) ____________ uses distance vector approach to define routing.
A) BDP
B) OSPF
C) None of these
D) RIP
Answer:
D) RIP
Reference:
Google
85) A one-to-many communication between a source and a specific group of hosts is classified as
a ____ communication.
A) Unicast
B) Multicast
C) Broadcast
D) Unicast & Multicast
Answer:
B) Multicast
Reference:
Google
86) Which of the following protocols allows the sender and receiver to enforce polices.
A) RIP
B) OSPF
C) BGP
D) BGP and RIP
Answer:
C) BGP
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#457
87) The Border Gateway Protocol (BGP) uses __________ for all communication
A) UDP
B) TCP
C) UDP and TCP
D) None of the given
Answer:
B) TCP
Reference:
CS610-Computer-Networks-and-Internets-with-Internet-Applications-by-Douglas-E-Comer
Page#457
21
88) _________ is used to attach two autonomous systems.
A) BGP
B) IGP
C) EGP
D) none of the given
Answer:
C) EGP
Reference:
https://www.ibm.com/docs/en/aix/7.2?topic=gateways-interior-exterior-routing
These MCQs are taken from Quiz No. 01 and Quiz No. 02 from Semester Fall 2020.
All MCQs are 100% correct with reference.
22