You are on page 1of 74

AMI (Alternate Mark Inversion) still has synchronization problems with long runs of 0-

bits. The solution used on North American T1 lines (1.544 Mbps) is known as

Select one:

a. 4B/5B 
b. B8ZS
c. NRZI
d. PAM-5
Feedback
Your answer is incorrect.
The correct answer is: B8ZS

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Bandwidth delay is more significant than propagation delay within a small LAN.

Select one:

True 
False
Feedback
The correct answer is 'True'.

Question 3
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Wi-Fi WPA2 uses the presumptively stronger encryption system called:

Select one:

a. RC4 
b. Advanced Encryption Standard (AES)
c. TKIP
d. DES-3
Feedback
Your answer is incorrect.
The correct answer is: Advanced Encryption Standard (AES)

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
All else being equal, the data rate achievable with a radio signal is proportional to:

Select one:
a. the signal power
b. the distance to the receiver

c. the width of the frequency band 


d. the number of sub-channels
Feedback
Your answer is correct.
The correct answer is: the width of the frequency band

Question 5
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
For long (multi-kilometer) electrical serial lines, in addition to the clock-related serial-
line requirements, we also want the average voltage to be zero.

Select one:
True

False 
Feedback
The correct answer is 'True'.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The network layer interacts with the Wi-Fi LAN exactly as it does with Ethernet; no
changes are required.

Select one:

True 
False
Feedback
The correct answer is 'True'.

Question 7
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Bluetooth is a low-power network; for many applications the working range is about:

Select one:

a. 10 m 
b. 50 m
c. 1 m
d. 100 m
Feedback
Your answer is correct.
The correct answer is: 10 m

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Ethernet-like collision detection is no longer feasible over radio communications:

Select one:

True 
False
Feedback
The correct answer is 'True'.

Question 9
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
The use of _________ lets the base station receive CDMA messages from
unsynchronized mobile phones.

Select one:

a. large antennas 
b. expensive digital filter components
c. sophisticated software algorithms
d. pseudorandom sequences
Feedback
Your answer is incorrect.
The correct answer is: pseudorandom sequences

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
If Wi-Fi error rates or collision rates are high, a sender can send a large packet as
multiple fragments, each receiving its own link-layer ACK.

Select one:

True 
False
Feedback
The correct answer is 'True'.
A virtual private network, or VPN, supports creation of virtual links that join far-flung
nodes via:

Select one:
a. Leased data circuits only
b. The Internet
c. Asynchronous Transfer Mode virtual circuits only

d. A Wi-Fi network 
Feedback
Your answer is incorrect.
The correct answer is: The Internet

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The Internet protocols use big-endian byte order (also referred to as network byte
order).

Select one:

True 
False
Feedback
The correct answer is 'True'.

Question 3
Correct
Mark 1.00 out of 1.00
Flag question

Question text
In the Internet, most packet losses are due to:

Select one:
a. Packet corruption
b. Software bugs
c. Protocol flaws

d. Congestion 
Feedback
Your answer is correct.
The correct answer is: Congestion

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
The terms “throughput” and “data rate” are considered to mean the same thing.

Select one:
True

False 
Feedback
The correct answer is 'False'.

Question 5
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
A store-and-forward switch or router begins forwarding a packet before it has fully
arrived.

Select one:

True 
False
Feedback
The correct answer is 'False'.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
ATM packets are often called cells which are of the following size:

Select one:

a. Fixed-size 53 bytes 
b. Variable-size up to 53 bytes
c. Variable-size up to 48 bytes
d. Fixed-size up to 48 bytes
Feedback
Your answer is correct.
The correct answer is: Fixed-size 53 bytes

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In the context of data networking, a protocol is a formal set of rules and conventions
that governs how computers exchange information over a network medium. A protocol
implements the functions of one or more of the OSI layers.

Select one:

True 
False
Feedback
The correct answer is 'True'.

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
How is an Ethernet card (or network interface) assigned a unique MAC address?

Select one:
a. By the computer vendor
b. By the network administrator

c. By the Ethernet card manufacturer 


d. By the computer Operating System
Feedback
Your answer is correct.
The correct answer is: By the Ethernet card manufacturer
Question 9
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
At the LAN layer, traffic-engineering mechanisms are historically/generally limited.

Select one:
True

False 
Feedback
The correct answer is 'True'.

Question 10
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
In datagram switching, packets are addressed by destination. In virtual-circuit
switching, packets are “addressed” by a connection ID. So, datagram switching and
virtual-circuit switching are examples of:

Select one:

a. Connection-oriented, connectionless services respectively 


b. Connectionless, connection-oriented services respectively
c. Connectionless, connectionless services respectively
d. Connection-oriented, connection-oriented services respectively

IP is a best effort system; there are no IP-layer acknowledgments or retransmissions.


Select one:

True

False

Feedback

The correct answer is 'True'.

Subnetting allows aggregation of IP address blocks in a way that is visible to the Internet backbone.

Select one:

True

False

Feedback

The correct answer is 'False'.

BGP implements policy through filtering rules which allow rejection of certain routes at three different
stages. Which of the following is NOT one of those stages?

Select one:

a. Import filtering

b. Route path optimization

c. Export filtering

d. Best path selection

Feedback

Your answer is incorrect.

The correct answer is: Route path optimization

The CIDR longest-match rule for choosing the routing table entry to be used means:
Select one:

a. using the oldest table entry

b. using the least specific matching prefix

c. using the most specific matching prefix

d. using the newest table entry

Feedback

Your answer is incorrect.

The correct answer is: using the most specific matching prefix

The Border Gateway Protocol’s primary goal is to provide support for choosing routes based on:

Select one:

a. fastest link available

b. link reliability

c. administrative input

d. lowest cost links

Feedback

Your answer is incorrect.

The correct answer is: administrative input

Internet Service Providers (ISPs) always connect to one another directly via high-speed links.

Select one:

True

False

Feedback

The correct answer is 'False'.


BGP speakers exchange with neighbors only the routes they (and thus their AS) use themselves.

Select one:

True

False

Feedback

The correct answer is 'True'.

Routers have the option of fallback-to-flooding for unknown destinations (i.e. those which are not in
their routing table).

Select one:

True

False

Feedback

The correct answer is 'False'.

In link-state routing implementations, link-state records must be periodically renewed.

Select one:

True

False

Feedback

The correct answer is 'True'.

An example of distance-vector routing-update algorithms that eliminate routing loops is:

Select one:

a. Destination-Sequenced Distance Vector


b. Enhanced Interior Gateway Routing Protocol

c. Routing Internet Protocol

d. A and B Only

Feedback

Your answer is incorrect.

The correct answer is: A and B Only

In distance-vector routing, each node has a complete view of the network topology.

Select one:

True

False

Feedback

The correct answer is 'False'.

Distance-vector is the simplest routing-update algorithm and it is used by:

Select one:

a. Border Gateway Protocol

b. Open Shortest Path First

c. Routing Information Protocol

d. Intermediate System to Intermediate System

Feedback

Your answer is correct.

The correct answer is: Routing Information Protocol

CIDR has essentially eliminated the IPv4 Class A/B/C mechanism from the:
Select one:

a. smallest ISPs

b. entire IP network

c. hosts running Windows OS

d. the Internet backbone

Feedback

Your answer is correct.

The correct answer is: the Internet backbone

A link-state routing algorithm computes routes from the network map using:

Select one:

a. the Spanning Tree algorithm

b. the Shortest Path First algorithm

c. the Routing Internet Protocol

d. Dykstra's projection algorithm

Feedback

Your answer is incorrect.

The correct answer is: the Shortest Path First algorithm

The Split Horizon fix to the slow-convergence problem prevents all linear routing loops.

Select one:

True

False

Feedback

The correct answer is 'True'.


The terms autonomous system (AS) and routing domain are used to refer to a set of routers under
common administration, using a common link-cost assignment.

Select one:

True

False

Feedback

The correct answer is 'True'.

The job of handling exterior routing (that is handling exchange of routing information between
Autonomous Systems) is done by the following protocol:

Select one:

a. Border Gateway Protocol

b. Cisco Discovery Protocol

c. Enhanced Interior Gateway Routing Protocol

d. Hot Standby Router Protocol

Feedback

Your answer is correct.

The correct answer is: Border Gateway Protocol

In link-state routing, each node keeps a maximum amount of network information about of all nodes
and all links.

Select one:

True

False

Feedback

The correct answer is 'True'.


What kind of routing-update algorithm is a preferred choice for networks such as those of ISPs?

Select one:

a. Distance Vector Routing

b. Exterior routing

c. Interior gateway routing

d. Link State Routing

Feedback

Your answer is incorrect.

The correct answer is: Link State Routing

In order to fix the slow-convergence problem, most flavors of the RIP protocol use a value of “infinity”
set to:

Select one:

a. a random value

b. 16

c. 0

d. 1000

Feedback

Your answer is incorrect.

The correct answer is: 16

The link-state flooding algorithm avoids the usual problems of broadcast in the presence of loops by:

Select one:

a. discarding old or duplicate Link State Advertisements

b. only forwarding LSAs to some neighbors


c. only forwarding an LSA a limited number of times

d. None of the above

Feedback

Your answer is incorrect.

The correct answers are: discarding old or duplicate Link State Advertisements, None of the above

In order to fix the slow-convergence problem, most flavors of the RIP protocol use a value of “infinity”
set to:

Select one:

a. a random value

b. 16

c. 0

d. 1000

Feedback

Your answer is correct.

The correct answer is: 16

CIDR has essentially eliminated the IPv4 Class A/B/C mechanism from the:

Select one:

a. smallest ISPs

b. entire IP network

c. hosts running Windows OS

d. the Internet backbone

Feedback

Your answer is correct.

The correct answer is: the Internet backbone


The Split Horizon fix to the slow-convergence problem prevents all linear routing loops.

Select one:

True

False

Feedback

The correct answer is 'True'.

An example of distance-vector routing-update algorithms that eliminate routing loops is:

Select one:

a. Destination-Sequenced Distance Vector

b. Enhanced Interior Gateway Routing Protocol

c. Routing Internet Protocol

d. A and B Only

Feedback

Your answer is correct.

The correct answer is: A and B Only

What kind of routing-update algorithm is a preferred choice for networks such as those of ISPs?

Select one:

a. Distance Vector Routing

b. Exterior routing

c. Interior gateway routing

d. Link State Routing

Feedback
Your answer is correct.

The correct answer is: Link State Routing

In link-state routing implementations, link-state records must be periodically renewed.

Select one:

True

False

Feedback

The correct answer is 'True'.

In link-state routing, each node keeps a maximum amount of network information about of all nodes
and all links.

Select one:

True

False

Feedback

The correct answer is 'True'.

The CIDR longest-match rule for choosing the routing table entry to be used means:

Select one:

a. using the oldest table entry

b. using the least specific matching prefix

c. using the most specific matching prefix

d. using the newest table entry

Feedback

Your answer is correct.


The correct answer is: using the most specific matching prefix

The link-state flooding algorithm avoids the usual problems of broadcast in the presence of loops by:

Select one:

a. discarding old or duplicate Link State Advertisements

b. only forwarding LSAs to some neighbors

c. only forwarding an LSA a limited number of times

d. None of the above

Feedback

Your answer is correct.

The correct answers are: discarding old or duplicate Link State Advertisements, None of the above

The Border Gateway Protocol’s primary goal is to provide support for choosing routes based on:

Select one:

a. fastest link available

b. link reliability

c. administrative input

d. lowest cost links

Feedback

Your answer is correct.

The correct answer is: administrative input

The Split Horizon fix to the slow-convergence problem prevents all linear routing loops.

Select one:

True
False

Feedback

The correct answer is 'True'.

A TCP connection cannot remain idle for a long period of time without getting terminated by the OS.

Select one:

True

False

Feedback

The correct answer is 'False'.

No matter the available bandwidth, every TCP connection must go through the slow-start phase.

Select one:

True

False

Feedback

The correct answer is 'True'.

Starting from the TCP ESTABLISHED state, the side that closes the connection first (active CLOSE) will end
up in the TIME WAIT state.

Select one:

True

False

Feedback

The correct answer is 'True'.


The TCP TIMEWAIT state is supposed to last for a time equal to:

Select one:

a. 10 seconds

b. 1 x MSL (maximum segment lifetime)

c. 2 x MSL (maximum segment lifetime)

d. 3 x MSL (maximum segment lifetime)

Feedback

Your answer is incorrect.

The correct answer is: 2 x MSL (maximum segment lifetime)

In most TCP implementations, data can be sent only after the 3-way handshake completes. Therefore,
the delay before any data can be sent is:

Select one:

a. 2 RTTs

b. 1 RTT

c. 1.5 RTT

d. 2.5 RTTs

Feedback

Your answer is incorrect.

The correct answer is: 1 RTT

The TCP Persist Timer is used to poll when the window size is zero. This timer is used by:

Select one:

a. the sender side

b. the receiver side

c. both the sender and the receiver sides


d. the socket owner application

Feedback

Your answer is incorrect.

The correct answer is: the sender side

The TCP the Congestion Window is just another name for the receiver’s Advertised Window.

Select one:

True

False

Feedback

The correct answer is 'False'.

A TCP socket application can use setsockopt() with the TCP_NODELAY flag to:

Select one:

a. enable the TCP Nagle algorithm for the entire system

b. disable the TCP Nagle algorithm for the connection in question

c. enable the TCP Nagle algorithm for the connection in question

d. disable the Nagle algorithm for all existing TCP connections

Feedback

Your answer is correct.

The correct answer is: disable the TCP Nagle algorithm for the connection in question

What is the functionality that TCP ports provide?

Select one:

a. Support virtual host communications


b. Provide secure communications

c. Allow communication with multiple host processes concurrently

d. Allow communication with a specific process within the host

Feedback

Your answer is incorrect.

The correct answer is: Allow communication with a specific process within the host

A TCP receiver can shrink the advertised window size to 0, so that the sender must stop sending data.

Select one:

True

False

Feedback

The correct answer is 'True'.

TCP is stream-oriented, meaning that the application can write very small or very large messages and
the TCP layer will take care of preserving message boundaries on the wire.

Select one:

True

False

Feedback

The correct answer is 'False'.

In TCP’s congestion avoidance phase, the Congestion Window adjustment rule introduced by TCP Tahoe
says that, after packet loss has been detected:

Select one:

a. the Congestion Window is decreased by 10%


b. the Congestion Window is set to the Advertised Window value

c. the Congestion Window is cut by half

d. the Congestion Window is set to 0

Feedback

Your answer is incorrect.

The correct answer is: the Congestion Window is cut by half

Path MTU is the smallest packet size which gets fragmented when sent along a path.

Select one:

True

False

Feedback

The correct answer is 'False'.

If there is no LISTENING TCP socket at the host TCP port to which a SYN request is sent, the response is
to ignore the SYN segment and send no reply.

Select one:

True

False

Feedback

The correct answer is 'False'.

The following TCP segment can be sent by either side at any time to abort the TCP connection:

Select one:

a. RST

b. SYN + ACK
c. FIN + ACK

d. FIN

Feedback

Your answer is incorrect.

The correct answer is: RST

A TCP connection is defined by the combination of the following:

Select one:

a. Local IP address and remote IP address

b. Local TCP port and remote TCP port

c. Local <IP address, port> and remote <IP address, port>

d. Local <IP address, process id> and remote <IP address, process id>

Feedback

Your answer is incorrect.

The correct answer is: Local <IP address, port> and remote <IP address, port>

To restart the flow after packet loss, TCP uses threshold slow start which transitions to congestion
avoidance.

Select one:

True

False

Feedback

The correct answer is 'True'.

Since essentially all links on the Internet have link-layer checksums to protect against data corruption,
TCP’s own checksum is strictly speaking unnecessary.
Select one:

True

False

Feedback

The correct answer is 'False'.

In terms of the TCP sequence and acknowledgment numbers, which of the following count as 1?

Select one:

a. SYN, FIN and ACK

b. SYN, but not FIN nor ACK

c. SYN and ACK but not FIN

d. SYN and FIN, but not ACK

Feedback

Your answer is incorrect.

The correct answer is: SYN and FIN, but not ACK

The TCP congestion window update strategy called “Additive Increase, Multiplicative Decrease” (AIMD)
is used during the slow-start phase of TCP connections.

Select one:

True

False

Feedback

The correct answer is 'False'.


In unswitched Ethernets, every packet is received by every host and it is up to the network card
in each host to determine if the arriving packet is addressed to that host.

Select one:

True
False

How is an Ethernet card (or network interface) assigned a unique MAC address?

Select one:
a. By the computer vendor
b. By the network administrator

c. By the Ethernet card manufacturer


d. By the computer Operating System

Which of the following is not a key element of a protocol

Select one:
a. Syntax

b. Entities
c. Semantics
d. Timing

In datagram switching, packets are addressed by destination. In virtual-circuit switching, packets


are “addressed” by a connection ID. So, datagram switching and virtual-circuit switching are
examples of:

Select one:
a. Connection-oriented, connectionless services respectively

b. Connectionless, connection-oriented services respectively


c. Connectionless, connectionless services respectively
d. Connection-oriented, connection-oriented services respectively

The term “frames” normally refers to data packets at which layer?

Select one:
a. Transport (e.g. TCP)
b. Application (e.g. WWW)

c. Data Link (e.g. Ethernet)


d. Network (e.g. IP)

The documents that contain all the formal Internet protocol standards are referred to as:

Select one:
a. IEEE 802 Standards

b. Request For Comments (RFCs)


c. OSI Specifications
d. ISO Standards

A store-and-forward switch or router begins forwarding a packet before it has fully arrived.

Select one:
True

False

In the Internet, most packet losses are due to:

Select one:
a. Packet corruption
b. Software bugs
c. Protocol flaws
d. Congestion

At the LAN layer, traffic-engineering mechanisms are historically/generally limited.

Select one:

True
False

The Wi-Fi 5 GHz band (vs. 2.4 GHz) has increased ability to penetrate walls, often resulting in a
higher effective range.

Select one:
True

False

Wi-Fi MAC (physical) addresses have the same 48-bit size as Ethernets and the same internal
structure.

Select one:
True
False

ATM Adaptation Layer AAL 5 uses a CRC-32 checksum and is able to detect lost ATM cells.

Select one:
True
False

Token Ring LAN is a simple multiple-access mechanism that is not only collision-free, but
which supports fairness in the sense that if N stations wish to send then each will receive 1/N of
the opportunities.
Select one:
True
False

Wi-Fi designers can improve throughput through a variety of techniques, including:

Select one:
a. Improved radio modulation techniques
b. Improved error-correcting codes
c. Increasing the channel width
d. Allowing multiple spatial streams via multiple antennas
e. All of the above

What is the fundamental alternative to datagram stateless forwarding?

Select one:
a. Packet switching
b. Routing
c. Flooding
d. Virtual circuits

Ethernet LAN-layer addresses are most often called MAC addresses.

Select one:

True

False

Fast (100 Mbps) Ethernet uses the following encoding:

Select one:
a. NRZI

b. Manchester

c. AMI

d. 4B/5B

Manchester encoding is principally designed to

Select one:

a. Ensure that a transition occurs in the centre of each bit period

b. Increase the bandwidth of a signal transmitted on the medium

c. Have more than one symbol per bit period

d. Ensure that the line remains balanced

The physical layer is concerned with the transmission of _______ over the physical medium.

Select one:

a. Programs

b. Protocols

c. Dialogs

d. Bits
Category 5 UTP cable is often used in which networks?

Select one:

a. Telephone

b. USB

c. 10 Mbps Ethernet

d. 100 Mbps Ethernet

Fast Ethernet introduced the concept of full-duplex Ethernet which is entirely collision-free.

Select one:

True

False

A common recommendation is to have no more than _____ hosts per LAN or VLAN

Select one:

a. 10

b. 1000

c. 100

d. 100000

A VLAN looks like a single LAN and all VLAN members will see broadcast packets sent by
other members.
Select one:

True

False

Different VLANs can usually be connected together via:

Select one:

a. An IP router

b. A straight Ethernet cable

c. A hub

d. A firewall

Ethernet switches have incorporated a switch-to-switch protocol to construct a subset of the


switch-connections graph that has no loops and yet allows reachability of every host. This
protocol is called:

Select one:

a. Ethernet Learning Algorithm

b. Multicast

c. Spanning Tree

d. VLAN protocol
Ethernet switches have an additional privacy advantage in that traffic does not flow where it does
not need to flow.

Select one:

True

False

According to Nyquist, a perfect (noiseless) channel has infinite transmission capacity.

Select one:

True

False

Baseband transmission may be defined as the transmission of a signal over a link:

Select one:

a. By means of wires

b. which is relatively short

c. Without any change in frequency

d. At a different band of frequencies

All Ethernet devices also agree on a broadcast address of all 1’s: a packet sent to the broadcast
address will be delivered to all attached hosts.

Select one:

True
False

According to Nyquist, a perfect (noiseless) channel has infinite transmission capacity.

Select one:

True

False

The popular USB (Universal Serial Bus) standard for connecting computer peripherals uses
Manchester encoding.

Select one:

True

False

The IEEE 802.1Q 32-bit VLAN tag is required to be added to frames with source and destination
ports on the same switch.

Select one:

True

False

If an Ethernet switch does not have an entry for a particular destination, it will:

Select one:

a. Drop the frame


b. Fall back to flooding

c. Keep the frame for later delivery

d. Use ARP to locate the destination

Gigabit Ethernet 1000Base-T uses the following encoding:

Select one:

a. Manchester

b. AMI

c. 4B/5B

d. PAM-5

Gigabit Ethernet slot time is largely irrelevant, as full-duplex (bidirectional) operation is almost
always supported.

Select one:

True

False

In 4B/5B encoding, some symbols are used for signaling rather than data. The following provide
an example of these:

Select one:
a. START
b. END
c. RESET
d. All of the above

What are the frequency bands used by Wi-Fi  802.11n?

Select one:
a. 5 GHz exclusively
b. 2.4 GHz exclusively
c. 2.4 GHz and 5 GHz
d. None of the above

Wi-Fi Link-Layer ACKs contain the following information:

Select one:

a. A timestamp

b. A sequence number

c. The number of bytes which are being acknowledged

d. None

Short Message Service (SMS) first became available on 3G mobile phones.

Select one:

True

False

What is the bandwidth delay to get 1500 bytes onto the wire for Gigabit Ethernet?

Select one:
a. 1 millisecond

b. 1 microsecond

c. 120 microseconds

d. 12 microseconds

AMI (Alternate Mark Inversion) still has synchronization problems with long runs of 0-bits. The
solution used on North American T1 lines (1.544 Mbps) is known as

Select one:

a. 4B/5B

b. B8ZS

c. NRZI

d. PAM-5

The telephone system is tightly intertwined with (wide area) computer networks. The limiting
factor for networking purposes turns out to be:

Select one:

a. the trunk network bandwidth

b. the government regulations

c. “the last mile” over which telephone customers connect

d. the high cost of leasing phone lines


For the Internet Checksum, the value 0000 in the checksum represents:

Select one:

a. Data corruption

b. No data in the packet

c. No checksum calculated

d. No error detected

For long (multi-kilometer) electrical serial lines, in addition to the clock-related serial-line
requirements, we also want the average voltage to be zero.

Select one:

True

False

The preferred Wi-Fi encryption standard is Wired-Equivalent Privacy, or WEP.

Select one:

True

False

The Internet Checksum is usually better than CRC at detecting transposition errors.

Select one:

True
False

HDLC (High-level Data Link Control) supports the following method(s) for frame separation:

Select one:

a. byte stuffing over asynchronous links, bit stuffing over synchronous links
b. bit stuffing over asynchronous links, byte stuffing over synchronous links
c. only byte stuffing
d. only bit stuffing

Generally speaking, IPv6 addresses consist of a 64-bit network prefix (perhaps including subnet
bits) followed by a 64-bit part called:

Select one:

a. LAN address

b. link-local address

c. interface identifier

d. h/w address

IP is a best effort system; there are no IP-layer acknowledgments or retransmissions.

Select one:

True

False

A possible Internet compatibility issue is that a packet is too large for a given network. IPv4
handles this by supporting:
Select one:

a. large packets

b. TTL (Time-to-Live) header field

c. fragmentation

d. segmentation

ARP-cache entries eventually expire and the timeout interval is on the order of:

Select one:

a. 1 day

b. 1 hour

c. a few seconds

d. from half a minute to a few minutes

An essential feature of IPv4 (and IPv6) addresses is that they can be divided into 2 parts:

Select one:

a. global part and local part

b. public part and private part

c. network part and host part

d. fixed part and variable part


 IPv6’s extension headers must be processed in order.

Select one:

True

False

If a given IPv4 destination address matches the first k bits of one of the host’s addresses
(w.x.y.z/k), the destination is on the local LAN.

Select one:

True

False

 IPv6’s link-local addresses are intended to be used only within a LAN and never routed.

Select one:

True

False

The IPv6 address ::1 (i.e. 127 0-bits followed by a 1-bit) is called the:

Select one:

a. null address

b. loopback address

c. default address
d. all-host multicast address

What enables an Internet site to appear to the outside world as a single IP network, but further
IP-layer routing to be supported inside the site?

Select one:

a. IPv6 only

b. source routing

c. subnets

d. Classless Inter-Domain Routing

IPv4 addresses are half the size of IPv6 addresses.

Select one:

True

False

 IPv6 routers periodically send Router Advertisement (RA) packets to the IPv6 broadcast
address.

Select one:

True

False

An IPv6 address has 2 times the number of bits compared to IPv4.


Select one:

True

False

If the IPv4 “Don’t Fragment” (DF header flag) is set to 1 by the sender, then a router must not
fragment the packet and must _____ instead.

Select one:

a. forward it unchanged

b. return it to sender

c. truncate it

d. drop it

The checksum field in the IPv4 packet header is the “Internet checksum” applied to:

Select one:

a. the header and the payload

b. the header only

c. the packet payload

d. the header with the TTL excluded

The subnet mask for an IPv4 147.126.16.0/20 subnet would be 255.255.224.0.

Select one:
True

False

Which of the following is not supported by IPv6?

Select one:

a. LAN multicast

b. IP multicast

c. IP unicast

d. LAN broadcast

Which one of the following IPv4 addresses can be used as a valid host IP address?

Select one:

a. 10.0.0.0/24

b. 224.0.0.80

c. 10.0.0.80/24

d. 10.0.0.255/24

Two things are gained from station “A “ doing gratuitous ARP on starting up: first, all stations
that had A in their cache are now updated with A’s most current LAN address, and second:

Select one:

a. duplicate IP address may be detected


b. no further ARP requests for station A’s LAN address will be needed

c. A learns the LAN address of the other stations

d. no other gain

In the IPv6 fixed header, the IPv4 header Time To Live (TTL) field has become the:

Select one:

a. Hop Limit
b. Flow Label
c. Traffic Class
d. None of the above

The number of bits in the network part of IPv4 class A, B, C addresses are:

Select one:
a. 8, 24, 16 respectively
b. 16, 24, 32 respectively
c. 24, 16, 8 respectively

d. 8, 16, 24 respectively

One thing DNS makes possible is changing a website’s IP address while leaving the fully
qualified domain name (FQDN) alone.

Select one:

True
False

Which of the following IPv4 addresses is NOT a private address?


Select one:
a. 10.0.0.1

b. 24.4.202.93
c. 172.16.1.1
d. 192.168.11.12

If an IPv4 address has all 1-bits for the host bits, it is of type:

Select one:

a. broadcast
b. invalid
c. unallocated
d. multicast

With IPv6, routers can use CIDR (Classless Internet Domain Routing) but must base forwarding
decisions on prefixes longer than /64.

Select one:
True

False

IPv4 class D addresses are used for:

Select one:
a. broadcast traffic

b. multicast traffic
c. unicast traffic
d. anycast traffic
ARP (Address Resolution Protocol) takes advantage of the existence of LAN-level multicast
frames.

Select one:
True

False

The IPv6 fixed header is twice the size of the IPv4 header, so it amounts to:

Select one:
a. 32 bytes
b. 60 bytes
c. 50 bytes

d. 40 bytes

The IPv4 Time-to-Live (TTL) header field is incremented by 1 at each router; if it reaches 10,
the packet is discarded.

Select one:
True
False

Subnetting allows aggregation of IP address blocks in a way that is visible to the Internet
backbone.

Select one:
True
False

To avoid stop-and-wait becoming a performance bottleneck, TFTP has an option to allow small
window size sliding windows operation.

Select one:
True

False

TFTP prevents internal old duplicates simply by not allowing its 16-bit block numbers to wrap
around; this is effective, but limits the maximum file size to:

Select one:

a. about 64 MB

b. about 32 MB

c. about 20 MB

d. about 16 MB

In Stop-and-Wait, deadlock can be avoided by the sender side doing retransmit-on-timeout while
the receiver does not do retransmissions.

Select one:

True

False

If an 8 KB block of data is sent as a single UDP send operation over Ethernet (without jumbo
frames), IP fragmentation is just avoided.

Select one:

True

False
The most common binary data encoding on the Internet – at least below the application layer – is
big-endian encoding.

Select one:

True

False

UDP ports are considered a shared namespace with TCP ports. Therefore, 2 processes cannot
share the same port number even if one process is using UDP and the other is using TCP.

Select one:

True

False

Which application made the greatest use of early Remote Procedure Call?

Select one:

a. Network File System

b. Windows Internet Explorer

c. File Transfer Protocol

d. Email

Which of the following message types is NOT a valid TFTP message type?

Select one:
a. Read request

b. Write request

c. Connection request

d. Error

In the context of Sun RPC’s at-least-once semantics, duplicate request execution is a possibility.

Select one:

True

False

In Sliding Windows, once a full timeout has occurred, there are usually no packets remaining in
flight and this is referred to as:

Select one:

a. deadlock

b. packet starvation

c. congestion

d. pipeline drain

The UDP 16-bit Internet checksum on the data can be disabled by setting the checksum field to:

Select one:

a. all 0 bits
b. -1

c. 0xffff

d. 65535

If the TFTP client changes its port number on a subsequent connection, but the server does not,
what prevents an old duplicate data packet sent by the server from being accepted by the new
client?

Select one:

a. the size of the old dup data is wrong

b. both client and server UDP are wrong in the old dup packet

c. the old dup packet has the wrong client UDP port number

d. the old dup packet has the wrong server UDP port number

The Real-time Transport Protocol (RTP) is built on top of UDP because of its packet loss
intolerance.

Select one:

True

False

UDP packets with spoofed source address are difficult to deliver to the application.

Select one:

True
False

UDP (like TCP) avoids IP fragmentation by relying on the Path MTU Discovery mechanism.

Select one:

True

False

Suppose a Sun RPC read() request ends up executing twice. In between successive read()
operations, the block of data is updated by another process. So different data is returned. This is
failure of idempotence.

Select one:

True

False

What is the functionality that UDP ports provide?

Select one:

a. Support virtual host communications

b. Provide secure communications

c. Allow communication with multiple host processes concurrently

d. Allow communication with a specific process within the host


In Sliding Windows, if a sender chooses window size larger than the bandwidth x RTT product,
then the RTT simply grows until the bandwidth x RTT matches the chosen window size. RTT
increase is due to:

Select one:

a. packet loss

b. queueing delays

c. data corruption

d. all of the above

In Sliding Windows, the sender is allowed to send up to this many packets (starting with the next
packet after the last acknowledged packet):

Select one:

a. half of the window size

b. window size minus 1

c. window size

d. window size plus 1

Sliding Windows can work even if the receiver assumes that the window size is much less than
the sender’s window size value.

Select one:

True

False
TCP is stream-oriented, meaning that the application can write very small or very large messages and
the TCP layer will take care of preserving message boundaries on the wire.

Select one:

True

False

Feedback

The correct answer is 'False'.

Question 2

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

In TCP’s congestion avoidance phase, the Congestion Window adjustment rule introduced by TCP Tahoe
says that, after packet loss has been detected:

Select one:

a. the Congestion Window is decreased by 10%

b. the Congestion Window is set to the Advertised Window value

c. the Congestion Window is cut by half

d. the Congestion Window is set to 0

Feedback

Your answer is incorrect.

The correct answer is: the Congestion Window is cut by half

Question 3

Correct

Mark 1.00 out of 1.00


Flag question

Question text

Path MTU is the smallest packet size which gets fragmented when sent along a path.

Select one:

True

False

Feedback

The correct answer is 'False'.

Question 4

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

If there is no LISTENING TCP socket at the host TCP port to which a SYN request is sent, the response is
to ignore the SYN segment and send no reply.

Select one:

True

False

Feedback

The correct answer is 'False'.

Question 5

Incorrect

Mark 0.00 out of 1.00

Flag question
Question text

The following TCP segment can be sent by either side at any time to abort the TCP connection:

Select one:

a. RST

b. SYN + ACK

c. FIN + ACK

d. FIN

Feedback

Your answer is incorrect.

The correct answer is: RST

Question 6

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

A TCP connection is defined by the combination of the following:

Select one:

a. Local IP address and remote IP address

b. Local TCP port and remote TCP port

c. Local <IP address, port> and remote <IP address, port>

d. Local <IP address, process id> and remote <IP address, process id>

Feedback

Your answer is incorrect.


The correct answer is: Local <IP address, port> and remote <IP address, port>

Question 7

Correct

Mark 1.00 out of 1.00

Flag question

Question text

To restart the flow after packet loss, TCP uses threshold slow start which transitions to congestion
avoidance.

Select one:

True

False

Feedback

The correct answer is 'True'.

Question 8

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Since essentially all links on the Internet have link-layer checksums to protect against data corruption,
TCP’s own checksum is strictly speaking unnecessary.

Select one:

True

False

Feedback
The correct answer is 'False'.

Question 9

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

In terms of the TCP sequence and acknowledgment numbers, which of the following count as 1?

Select one:

a. SYN, FIN and ACK

b. SYN, but not FIN nor ACK

c. SYN and ACK but not FIN

d. SYN and FIN, but not ACK

Feedback

Your answer is incorrect.

The correct answer is: SYN and FIN, but not ACK

Question 10

Correct

Mark 1.00 out of 1.00

Flag question

Question text

The TCP congestion window update strategy called “Additive Increase, Multiplicative Decrease” (AIMD)
is used during the slow-start phase of TCP connections.

Select one:

True
False

Feedback

The correct answer is 'False'.

Making the stack non-executable prevents stack buffer overflow attacks that place a shellcode on
the stack and also prevents return-to-libc attacks.

Select one:

True

False

A protocol that allows mail users agents to copy email from the email server to the user is:

Select one:

a. POP3

b. SMTP

c. IMAP

d. MIME

Fully qualified domain names (FQDN) are case-sensitive.

Select one:

True

False
A DNS record which comes from a name resolver that manages the record and is thus always
correct is called:

Select one:

a. Administrative Record

b. Authoritative Record

c. Server Record

d. None of the above

HTTP 1.1 supports persistent TCP connections. A persistent connection is a TCP connection
over which a client may send several HTTP requests.

Select one:

True

False

An attack that keeps changing in relatively trivial ways to avoid signature-based detection is
sometimes said to be:

Select one:

a. dynamic

b. unsophisticated

c. polymorphic

d. trivial
The following protocol assumes that all the e-mail will remain on the server indefinitely in
multiple mailboxes:

Select one:

a. POP3

b. SMTP

c. IMAP

d. MIME

The HTTP Content-Type header value used for HTML pages is text/html.

Select one:

True

False

In the C language, a stack buffer overflow is not detected at the time it occurs because:

Select one:

a. buffer memory is limited

b. C is not an object-oriented language

c. the compiler generates optimized code

d. there is no array bounds checking at run-time


If a web server receives the line below in an HTTP request, it is missing the desired web page
and should send an error back.

GET / HTTP/1.1

Select one:

True

False

Overlapping TCP segments raises the possibility of signature-based detection evasion (the
attacker might arrange the packets so that the detection reassembles them one way and the target
another way).

Select one:

True

False

The usual approach to prevent eavesdropping on a communication channel is the use of:

Select one:

a. secure authentication

b. encryption

c. checksums

d. random TCP or UDP ports

The HTTP Set-Cookie header is used by:

Select one:
a. the web browser

b. the web server

c. both the web  browser and the web server

d. the proxy web server

Most network intrusion-detection systems (NIDS) detect intrusions based either on traffic
anomalies or on pattern-based signatures. Which of the following would fall under “traffic
anomalies”?

Select one:

a. pings directed to non-existent hosts

b. TCP connection attempts targeting many different ports

c. a large number of ping requests

d. all of the above

The Simple Mail Transfer Protocol (SMTP) is used to retrieve email messages from older email
servers.

Select one:

True

False

Which HTTP header is used by the server to inform the client about how it agrees to use the
persistent connection?

Select one:
a. Cache-Control

b. Connection

c. Keep-Alive

d. Content-Length

WEP Wi-Fi encryption is still considered very strong nowadays.

Select one:

True

False

The 2 types of DNS Resource Records used to encode the IPv4 and IPv6 addresses that
correspond to the specified domain name are respectively:

Select one:

a. PTR and A

b. A and AAAA

c. A and PTR

d. AAAA and A

The essence of DNS is a hierarchical domain-based naming scheme and a distributed database
system for implementing this naming scheme.

Select one:

True
False

Linux systems support assigning to an unprivileged process any of several “capabilities”. One of
these is CAP_NET_BIND_SERVICE which allows the following:

Select one:

a. opening (“binding” to) a privileged port

b. opening (“binding” to) a port above 1024

c. opening (“binding” to) port 1024

d. opening (“binding” to) port 0

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In
broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be
sent simultaneously.

Select one:
True
False

Which information is found in the UDP header?

Select one:
a. Sequencing
b. Flow Control
c. Acknowledgement
d. Urgent data flag
e. Source and Destination Port
Switches are used to connect distant LANs whereas a Router is most often used to connect
individual computers.

Select one:
True
False

What is the primary reason for the development of IPv6?

Select one:
a. security
b. header format specification
c. expanded addressing capabilities
d. addressing simplifications

Which statement describes the purpose of a default route?

Select one:
a. to identify the Layer 2 address of an end device on the local network.
b. to forward data to the local switch as the next hop to all destinations.
c. to transfer data to another host on the same network segment.
d. to transfer data to a host outside the local network when no other route to the destination
exists.
e. to send packets whose destination address is unknown

The Routing Information Protocol (RIP) is an intra-domain routing protocol based on _________
routing

Select one:
a. distance vector
b. link state
c. path vector
d. OSPF
e. path state
What OSI layer identifies the communicating applications?

Select one:
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5

What is a possible effect of improperly applying a connector to a network cable?

Select one:

a. Data will be forwarded to the wrong node.

b. An improper signaling method will be implemented for data transmitted on that cable.

c. Data transmitted through that cable may experience signal loss.

d. Data bits will get inverted.

In bridged LANs, the _______ algorithm creates a topology in which each LAN can be reached
from any other LAN through one path only.

Select one:

a. binary tree

b. unary tree

c. routing

d. shortest path

e. spanning tree
What characteristic of UTP cable helps reduce the effects of interference?

Select one:
a. the metal braiding in the shielding
b. the reflective cladding around core
c. the twisting of the wires in the cable
d. the insulating material in the outer jacket
e. the type of metal used for the wires

What is the size of IPv6 addresses?

Select one:
a. 256 bits
b. 96 bits
c. 32 bits
d. 128 bits
e. 64 bits

What is the primary reason for the eventual retirement of IPv4?

Select one:
a. security
b. header format specification
c. limited addressing capabilities
d. addressing simplifications
e. performance issues

Which is an important characteristic of UDP?

Select one:
a. acknowledgement of data delivery
b. minimal delays in data delivery
c. high reliability of data delivery
d. same order data delivery
e. flow control

The degeneration of a signal over distance on a network cable is called attenuation.

Select one:

True

False

A network cable lies in the ____________ layer.

Select one:

a. Network

b. Transport

c. Data Link

d. MAC

e. Physical

What is the purpose of the preamble in an Ethernet frame?

Select one:
a. It is used as a pad for data
b. It identifies the source address
c. It marks the end of timing information
d. It is used for timing synchronization with alternating patterns of ones and zeros
e. It identifies the destination address
The size of the UDP port field is:

Select one:

a. 8 bits

b. 16 bits

c. 32 bits

d. 48 bits

e. 64 bits

The reverse address resolution protocol (RARP) allows a host to discover its Internet address
when it knows only its physical address.

Select one:

True

False

What version of IP is the most common in the world?

Select one:
a. IPv3
b. IPng
c. IPv5
d. IPv6
e. IPv4
Which of the following is a characteristic of single-mode fiber-optic cable?

Select one:
a. generally uses LEDs as the light source
b. no longer in use
c. uses relatively larger core with multiple light paths
d. is cheaper than multi-mode fiber
e. generally uses semiconductor lasers as the light source

You might also like