Professional Documents
Culture Documents
testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
A : Domain server
B : Zone server
C : Root server
A : packet filter
B : application gateway
C : TELNET
D : communication
A : large organisations
B : midsize organisations
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : small organisations
D D : multicasting
Q.no 4. Flow control relates to the _________between a given sender and a given receiver.
A : point-to-point traffic
B : error control
A : dynamic
B : static
C : nutral
A : Semicolons
B : Dots
C : Colonns
Q.no 7. The network layer is responsible for the individual packets from the ___________.
A : source to destination
B : node to node
C : process to process
D : machine to machine
A : Loss-tolerant application
B : Bandwidth-sensitive application
C : Elastic application
A : wired
B : all
C : wireless
D : bluetooth
Q.no 10. Bandwidth requirements of virtual circuit is_________ than datagram subnet.
A : Less
B : more
C : equal
D : less or equal
Q.no 11. In classful addressing ,the address space is divided into_________ class.
A : five
B : four
C : two
D : three
A : collision
B : flow
C : error
D : physical
A : Routing
B : Inter- networking
C : Congestion control
D : Error control
A : transport
B : network
C : application
D : data link
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : Token bus
B : star
C : ethernet
D : wireless
A : dynamic
B : natural
C : static
D : binding
Q.no 18. To deliver a message to the correct application program running on a host, the
_______ address must be consulted.
A : IP
B : MAC
C : Port
A : RFC 951
B : RFC 960
C : RFC 989
D : RFC 955
B : Bus Topology
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : Ring Topology
D : Mesh Topology
Q.no 21. The protocol data unit for the transport layer in the internet stack is______
A : segment
B : message
C : datagram D : frame
Q.no 22. ____________allows TCP to detect lost segments and in turn recover from that loss?
A : Sequence number
B : Acknowledgment number
C : Checksum
Q.no 23. In class A,_________ byte define Netid and _________bytes define the Hostid.
A : 2,4
B : 1,3
C : 1,4
D : 2,3
Q.no 24. The protocol data unit (PDU) for the application layer in the Internet stack is
A : Segment
B : Datagram
C : Message
D : Frame
Q.no 25. In a _________name , a name is assigned to address.A name in this space is sequence
of characters without strucctures.
A : Flat
B : Hierarchical
C : Organised
Q.no 26. The Application Layer is ______________number of layer of the Internet model
A:5
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B:4
C:3
D:2
Q.no 27. As the data packet moves from the _______ layer up to the _______ layer,
headers and a trailer are removed
A : Application; physical
B : Physical; application
C : Session; network
Q.no 28. The route that connects the the private network to their Global address uses________
private address and _________global address.
A : one,two
B : two,one
C : two,two
D : one,one
Q.no 29. _______field of cookie in WWW represents the server's directory structure by
identifying the utilization of part associated with server's file tree?
A : Domain
B : Path
C : Content
D : Secure
A : ciphertext
B : plain text
C : duplicate text
D : original text
A : unreliable , connectionless
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : A security algorithm
C : A routing algorithm
D : Encryption algorithm
Q.no 33. _______ one of the following is a version of UDP with congestion control?
A : broadcast
B : multicast
C : unicast
D : anycast
Q.no 35. In the DNS, the names are defined in ___________ structure
A : A linear list
B : An inverted-tree
C : A graph
A : Filler
B : separator
C : booster
D : padding
Q.no 37. The receiver of the data controls the amount of data that are to be sent by the sender
is referred to as ___________
A : Flow control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : Error control
C : Congestion control
D : Error detection
A : authentication
B : integrity
C : confidentiality
D : non repudiation
Q.no 39. End of the option used for_________ at the end of the option field.
A : Filler
B : seperator
C : router
D : padding
Q.no 40. Full duplex ethernet increase the capacity of domain from _____________in standard
ethernet.
A : 10mbps to 20mbps
B : 10mbps to 100mbps
C : 1mbps to 10mbps
D : 10mbbs to 1000mbps
Q.no 42. ________one of the following is an internet standard protocol for managing devices
on IP network?
Q.no 44. Ifs max fragment bit is set to 0, it means this is the_________ fragment.
A : first
B : middle
C : only
D : second
Q.no 45. IEEE created gigabit ethernet under the name _____________
A : 802.3a
B : 802.3b
C : 802.3d
D D : 802.3z
Q.no 46. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
Q.no 47. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.
A : Session layer
C : Application layer
Q.no 48. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : Short frame
B : Runt frame
C : Mini frame
D : Man frame
Q.no 49. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
A : network layer
C : application layer
D : physical layer
Q.no 50. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________
A : Active open
B : Active close
C : Passive close
D : Passive open
Q.no 51. SYNC flooding attack belongs to a type of security attack known as ___________
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 52. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 53. In segment header, sequence number and acknowledgement number fields refer to
_______
A : Byte number
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : Buffer number
C : Segment number
D : Acknowledgment
Q.no 54. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
Q.no 55. The __________domains defines registered host according to their genneric behavior.
A : Generic
B : Country
C : Inverse
Q.no 56. TCP process may not write and read data at the same speed. So we need __________
for storage.
A : Packets
B : Buffers
C : Segments
D : Stacks
Q.no 57. There are _______ the number of standard content types in MIME.
A:5
B:7
C:9
D:4
Q.no 59. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A : SMTP
B : MIME
C : POP
D : MTA
A : Infrastructure mode
B : Ad-hoc mode
D : WDS mode
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
Q.no 2. A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DNS
hierarchical tree. (The root is level one.)
A : third
B : fourth
C : fifth
Q.no 3. _______one of the following algorithm is not used for congestion control?
B : Admission control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : Load shedding
A : one
B : seven
C : two
D : eight
A : Less
B : more
C : equal
D : less or equal
C : CSMA/CD
D : DIFS
A : application gateway
B : packet filter
C : proxy
D : secure naming
Q.no 9. A standard etherret network can transmit data at a rate upto ______________.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : 100mbps
B : 1mbps
C : 10mbps
D : none
Q.no 10. If a host moves from one physical network to other or it wants temporary IP
____________ is useful .
A : BOOTP
B : DHCP
C : ARP
D : RARP
A : authentication
B : interception
C : interaction
D : introception
Q.no 12. _______DNS client maps an address to a name or a name to an address especially
when required by a host?
A : Resolver
B : Mapper
C : Primary Server
D : Secondary Server
A : Socket
B : Pipe
C : Port
D : Machine
Q.no 14. The process of transforming cipher text message to back text is called as
______________
A : authentication
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : decryption
C : encryption
D : interception
Q.no 15. In the domain name chal.atc.fhda.edu, _______ is the least specific label.
A : chal
B : atc
C : edu
A : cannot
B : can
C : will
D : forcefully
A : Sequence number
B : Fragment offset
C : Checksum
D : Window size
A : Mesh Topology
B : Ring Topology
C : Bus Topology
D : Star Topology
Q.no 19. _____________is related with what uses want others to access and what they want to
keep confidential
A : security
B : speech
C : privacy
D : social issue
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : automatically
B : immediately
C : manually
D : afterwards
A : Session
B : Application
Q.no 22. In class C,_________ byte define Netid and _________bytes define the Hostid.
A : 1,3
B : 3,1
C : 2,2
D : 3,4
A : actual
B : physical
C : logical
D : no
C : Rules for when and how processes send and respond to messages
D : All of the mentioned
Q.no 25. The route that connects the the private network to their Global address uses________
private address and _________global address.
A : one,two
B : two,one
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : two,two
D : one,one
Q.no 26. Web security can be roughly divided into ____________ parts
A : four
B : five
C : six
D : three
Q.no 27. In a _________name , a name is assigned to address.A name in this space is sequence
of characters without strucctures.
A : Flat
B : Hierarchical
C : Organised
Q.no 28. With NAT , a user using large set of addresses internally and_________ set of
addresses for outside world.
A : one or small
C : three or small
D : one of large
D : occurs horizontally
Q.no 30. First field of 802.3 is used for-----------.
A : CRC
B : preamble
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : source address
D : length
Q.no 31. The ________ process ensures that the origin of an electronic message is correctly
identified.
A : authentication
B : integrity
C : non repudiation
D : interception
A : Flat
B : Hierarchical
C : Organised
Q.no 33. A client that wishes to connect to an open server tells its TCP that it needs to be
connected to that particular server. The process is called ___________
A : Active open
B : Active close
C : Passive close
D : Passive open
A : doc
B:c
C : ini
D : executable
A : 1500 btyes
B : 46 btyes
C : 1800 btyes
D : 4 bytes
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : 8 bytes
B : 8 bits
C : 16 bytes
D : 124 bytes
Q.no 37. In addition to seven active slave station ,a piconet can have upto----------parked
nodes.
A:1
B:7
C:4
D : 255
Q.no 38. In __________ resolution, the server returns the IP address of the server that it
thinks can resolve the query.
A : Iterative
B : Recursive
C : Straight
Q.no 39. Full duplex mode of ethernet has the ability to send and receive data at
____________
A : same time
B : different time
C : any time
D : none
A : broadcast
B : multicast
C : unicast
D : anycast
Q.no 41. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 42. In segment header, sequence number and acknowledgement number fields refer to
_______
A : Byte number
B : Buffer number
C : Segment number
D : Acknowledgment
Q.no 43. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----
A : Manchester scheme
B : differential manchester
C : NRZ
D : Polar
Q.no 44. TCP process may not write and read data at the same speed. So we need __________
for storage.
A : Packets
B : Buffers
C : Segments
D : Stacks
Q.no 45. The __________domains defines registered host according to their genneric behavior.
A : Generic
B : Country
C : Inverse
Q.no 46. IEEE created gigabit ethernet under the name _____________
A : 802.3a
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : 802.3b
C : 802.3d
D D : 802.3z
Q.no 47. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.
A : Session layer
C : Application layer
Q.no 49. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A : SMTP
B : MIME
C : POP
D : MTA
A : Infrastructure mode
B : Ad-hoc mode
D : WDS mode
Q.no 51. There are _______ the number of standard content types in MIME.
A:5
B:7
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C:9
D:4
Q.no 52. Ifs max fragment bit is set to 0, it means this is the_________ fragment.
A : first
B : middle
C : only
D : second
Q.no 54. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
Q.no 55. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion
A : 1100 to 1300
B : 800 to 1000
C : 1400 to 1600
D : 1500 to 1700
B : Sequence of characters
C : Lines of data
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : Packets
Q.no 57. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________
A : Active open
B : Active close
C : Passive close
D : Passive open
Q.no 58. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
A : network layer
C : application layer
D : physical layer
Q.no 59. SYNC flooding attack belongs to a type of security attack known as ___________
B : Active attack
C : Passive attack
D : Denial-of-service attack
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
Q.no 1. In the Internet, the domain name space (tree) is divided into _______ different sections
A : Three
B : Two
C : Four
A : application gateway
B : packet filter
C : proxy
D : secure naming
A : more
B : less
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : equal
D : not
Q.no 4. ________ one of the pairs of protocols given below, both the protocols can use multiple
TCP connections between the same client and the server. Which one is that?
A : HTTP, FTP
B : HTTP, TELNET
C : FTP, SMTP
D : HTTP, SMTP
A : Port
B : Pipe
C : Node
D : Protocol
A : Label
B : Name
C : Domain
Q.no 7. Censorship is about government and organisations wanting to restrict what people
can___________
A : do
B : do not
D : speak
Q.no 8. In fast ethernet implementation ---- allows 2 stations to negotiate the mode or data
rate of operation
A : negotiation
B : auto negotiation
C : does not
D : category
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : 24 bits
B : 36 bits
C : 42 bits
D : 48 bits
A : 802.3
B : 802.11
C : 802.11 µ
D : 802.15
Q.no 12. A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DNS
hierarchical tree. (The root is level one.)
A : third
B : fourth
C : fifth
Q.no 13. Network layer receive services from Data Link layer & gives services to _________.
A : application layer
B : physical layer
C : transport layer
D : session layer
Q.no 14. If a host wants to send packet to another host on another network it must first be
delivered to _____________
A : host
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : another host
D : router
A : Socket
B : Pipe
C : Port
D : Machine
A : Token bus
B : star
C : ethernet
D : wireless
Q.no 18. _______ of the following are transport layer protocols used in networking?
A : RFC 951
B : RFC 960
C : RFC 989
D : RFC 955
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : ring
B : topology
C : backbone
D : connector
Q.no 21. With NAT , a user using large set of addresses internally and_________ set of
addresses for outside world.
A : one or small
C : three or small
D : one of large
Q.no 22. Full duplex ethernet increase the capacity of domain from _____________in standard
ethernet.
A : 10mbps to 20mbps
B : 10mbps to 100mbps
C : 1mbps to 10mbps
D : 10mbbs to 1000mbps
A : Algorithm
B : Procedure
C : Cipher
D : Module
Q.no 24. A client that wishes to connect to an open server tells its TCP that it needs to be
connected to that particular server. The process is called ___________
A : Active open
B : Active close
C : Passive close
D : Passive open
Q.no 25. A timestamp option is used to record the _________of datagram processing by a
router.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : bytes
B : time
C : hops
D : length
A : End to end
B : Process to process
A : logical
B : port
C : actual
D : physical
A : 1500 btyes
B : 46 btyes
Q.no 29. ____________allows TCP to detect lost segments and in turn recover from that loss?
A : Sequence number
B : Acknowledgment number
C : Checksum
Q.no 30. ______of the following are transport layer protocols used in networking?
A : TCP and FTP
Q.no 31. In a _________name , a name is assigned to address.A name in this space is sequence
of characters without strucctures.
A : Flat
B : Hierarchical
C : Organised
Q.no 32. In _____________each letter or group of letters are replaced by another letter or
group of letters
A : transposition cipher
B : decryption
C : substitution cipher
D : column
A : Flow control
B : Three-Way Handshaking
C : Forwarding
D : Synchronization
Q.no 35. The ________ process ensures that the origin of an electronic message is correctly
identified.
A : authentication
B : integrity
C : non repudiation
D : interception
C : Protocol error
Q.no 37. Open look congestion control policies are used to prevent the congestion__________.
A : before it happens
B : after it happens
C : when it happens
D : at the end
A : advance setup
B : no advance setup
D : message setup
Q.no 39. As the data packet moves from the _______ layer up to the _______ layer,
headers and a trailer are removed
A : Application; physical
B : Physical; application
C : Session; network
A : supernetting
B : subnetting
C : network
D : internetwork
Q.no 41. There are _______ the number of standard content types in MIME.
A:5
B:7
C:9
D:4
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 42. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.
A : Session layer
C : Application layer
Q.no 43. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A : SMTP
B : MIME
C : POP
D : MTA
Q.no 44. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
A : Short frame
B : Runt frame
C : Mini frame
D : Man frame
Q.no 45. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
Q.no 46. ________one of the following is an internet standard protocol for managing devices
on IP network?
A : Stream of bytes
B : Sequence of characters
C : Lines of data
D : Packets
Q.no 48. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
A : Infrastructure mode
B : Ad-hoc mode
D : WDS mode
Q.no 50. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
A : network layer
C : application layer
D : physical layer
Q.no 51. IEEE created gigabit ethernet under the name _____________
A : 802.3a
B : 802.3b
C : 802.3d
D D : 802.3z
Q.no 52. In segment header, sequence number and acknowledgement number fields refer to
_______
A : Byte number
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : Buffer number
C : Segment number
D : Acknowledgment
Q.no 53. Ifs max fragment bit is set to 0, it means this is the_________ fragment.
A : first
B : middle
C : only
D : second
Q.no 55. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
Q.no 56. SYNC flooding attack belongs to a type of security attack known as ___________
B : Active attack
C : Passive attack
D : Denial-of-service attack
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 59. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________
A : Active open
B : Active close
C : Passive close
D : Passive open
Q.no 60. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion
A : 1100 to 1300
B : 800 to 1000
C : 1400 to 1600
D : 1500 to 1700
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
Q.no 1. The process of transforming cipher text message to back text is called as
______________
A : authentication
B : decryption
C : encryption
D : interception
A : wired
B : all
C : wireless
D : bluetooth
A : authentication
B : interception
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : interaction
D : introception
Q.no 4. A types the URL of B , The Intruder T intercepts A's request ,T inturn fetches the
page of B , modifies the page and returns the modified page to A.This is called as
____________
A : Routing
B : Inter- networking
C : Congestion control
D : Error control
Q.no 6. When too many packets are present in a subnet , performance degrades. Packets send are
not equal to the packet received. This situation is called_________.
A : routing
B : forwarding
C : multicasting
D : congestion
Q.no 7. __________one of the following is an internet standard protocol for managing devices
on IP network?
A : inbound
B : outbound
C : inbound and outbound
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : all
Q.no 9. _________________is the technique of decoding message from non readable format
back to readable format
A : ciphertext
B : plain text
C : key
D : cryptanalysis
A : logical ,physical
B : physical , logical
C : physical , port
D : logical, special
A : transport
B : network
C : application
D : data link
Q.no 12. Network layer needs a global addressing scheme , to identify every device uniquely
on internet called as____________.
A : physical addressing
B : port addressing
C : logical addressing
D : special addressing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : Sequence number
B : Fragment offset
C : Checksum
D : Window size
Q.no 15. If the percentageof discarded packets due to lack of buffer space is more
means__________.
A : deadlock
B : congestion
C : collision D : timeout
Q.no 16. Network layer receive services from Data Link layer & gives services to _________.
A : application layer
B : physical layer
C : transport layer
D : session layer
A : socket
B : pipe
C : port
D : machine
Q.no 19. In the domain name chal.atc.fhda.edu, _______ is the least specific label.
A : chal
B : atc
C : edu
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : 20-80 bytes
B : 0-20 bytes
C : 20-60 bytes
D : 20-100 bytes
Q.no 22. The Application Layer is ______________number of layer of the Internet model
A:5
B:4
C:3
D:2
B : All stations
A : Session
B : Application
C : Presentation
D : Data link
Q.no 25. .--------- is maximum payload length of Ethernet frame.
A : 1500 btyes
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : 46 btyes
C : 1800 btyes
D : 1518 bytes
Q.no 26. _______ of the following is not correct in relation to multi-destination routing?
A : not feasible
B : feasible
C : highly impossible
D : done
A : collision
B : evolution
C : mode
D : bandwidth
A : HTTP
B : ARP
C : FTP
D : BOOTP
Q.no 30. In class C,_________ byte define Netid and _________bytes define the Hostid.
A : 1,3
B : 3,1
C : 2,2
D : 3,4
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 31. A station with BSS transition mobility can move from one BSS to another, but the
movement is in----------.
A : inside a BSS
B : outside a BSS
D : inbetween ESS
Q.no 32. _______of the following routing algorithms can be used for network layer design?
Q.no 33. DNS records are grouped into sets called as______________
A : PP sets
B : SS sets
C : RR sets
D : mm set
Q.no 34. If datagram arrives at the destination with strict source route option set, some of the
entries were not visited , it will be _________.
A : discarded
B : forwarded
C : accepted
D : routed
Q.no 35. The receiver of the data controls the amount of data that are to be sent by the sender
is referred to as ___________
A : Flow control
B : Error control
C : Congestion control
D : Error detection
Q.no 37. The ________ process ensures that the origin of an electronic message is correctly
identified.
A : authentication
B : integrity
C : non repudiation
D : interception
A : authentication
B : integrity
C : confidentiality
D : non repudiation
Q.no 39. network layer receives data from the upper layers and creates its own packet by
encapsulating these packets , is known as__________.
A : fragmentation
B : logical addressing
C : intrenetworking
D : packetizing
Q.no 40. A station with no transition mobility is either stationary or moving only ________
A : inside a BSS
B : outside a BSS
C : inside ESS
D : outside ESS
Q.no 41. There are _______ the number of standard content types in MIME.
A:5
B:7
C:9
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D:4
Q.no 42. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________
A : Active open
B : Active close
C : Passive close
D : Passive open
Q.no 44. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----
A : Manchester scheme
B : differential manchester
C : NRZ
D : Polar
Q.no 45. In segment header, sequence number and acknowledgement number fields refer to
_______
A : Byte number
B : Buffer number
C : Segment number
D : Acknowledgment
Q.no 46. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
A : Short frame
B : Runt frame
C : Mini frame
D : Man frame
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 47. SYNC flooding attack belongs to a type of security attack known as ___________
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 48. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A : SMTP
B : MIME
C : POP
D : MTA
Q.no 49. IEEE created gigabit ethernet under the name _____________
A : 802.3a
B : 802.3b
C : 802.3d \
D D : 802.3z
Q.no 50. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.
A : Session layer
C : Application layer
A : Infrastructure mode
B : Ad-hoc mode
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 52. Ifs max fragment bit is set to 0, it means this is the_________ fragment.
A : first
B : middle
C : only
D : second
Q.no 53. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
A : network layer
Q.no 54. The __________domains defines registered host according to their genneric behavior.
A : Generic
B : Country
C : Inverse
Q.no 56. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 57. ______ is interframe gap?
Q.no 58. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
A : Stream of bytes
B : Sequence of characters
C : Lines of data
D : Packets
Q.no 60. TCP process may not write and read data at the same speed. So we need __________
for storage. A : Packets
B : Buffers
C : Segments
D : Stacks
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
A : one
B : seven
C : two
D : eight
A : external routers
B : internal routers
C : internet routers
D : internal machines
A : hidden
B : simple
C : executable
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : non executable
A : cheap , secure
B : fast , efficient
C : slow , efficient
D : fast , costly
A : private
B : session
C : symmetric
D : public
A : Ethernet
B : Internet protocol
A : dynamic
B : static
C : nutral
B : midsize organisations
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : small organisations
D : multicasting
A : Socket
B : Pipe
C : Port
D : Machine
A : intellectual property
B : private property
C : public property
D : own property
A : key exchange
B : session key
C : private key
D : public key
A : multicast
B : unicast
C : broadcast
D : nocast
A : More overload
B : Reliable
C : Low overhead
D : Fast
Q.no 16. _________________is the technique of decoding message from non readable format back
to readable format
A : ciphertext
B : plain text
C : key
D : cryptanalysis
Q.no 17. To deliver a message to the correct application program running on a host, the
_______ address must be consulted.
A : IP
B : MAC
C : Port
Q.no 18. _____ one of the following protocol delivers/stores mail to reciever server?
A : Flat
B : Hierarchical
C : Organised
Q.no 23. A timestamp option is used to record the _________of datagram processing by a
router.
A : bytes
B : time
C : hops
D : length
A : 110101E7
B : 1101011 E 7
C:0
D : 1.1111111 E 7
A : advance setup
B : no advance setup
D : message setup
Q.no 26. IEEE created fast ethernet standard under the name ________________________----
-.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : 802.3
B : 802.3 F
C : 802.3 µ
D : 802.3 m
Q.no 27. ___________is a device usually a computer or router sits between the internal
network of organisation and rest of the internet
A : Bridge
B : repeater
C : gateway
D : firewall
C : Rules for when and how processes send and respond to messages
Q.no 29. A station with BSS transition mobility can move from one BSS to another, but the
movement is in----------.
A : inside a BSS
B : outside a BSS
D : inbetween ESS
Q.no 30. _______field of cookie in WWW represents the server's directory structure by
identifying the utilization of part associated with server's file tree?
A : Domain
B : Path
C : Content
D : Secure
A : backward
B : forward
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : not
D : also
Q.no 32. The ________ process ensures that the origin of an electronic message is correctly
identified.
A : authentication
B : integrity
C : non repudiation
D : interception
Q.no 33. In implicit feedback congestion control algorithm, the source makes a conclusion of
congestion by_________.
B : traffic
C : feedback
D : good design
Q.no 34. The protocol data unit for the transport layer in the internet stack is______
A : segment
B : message
C : datagram
D : frame
Q.no 35. Packets of the same session may be routed through different paths in
A : flows
B : forwards
C : routes
D : pushes
Q.no 37. A _____ is a TCP name for a transport service access point.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : port
B : pipe
C : node
D : protocol
A : collision
B : evolution
C : mode
D : bandwidth
B : A security algorithm
C : A routing algorithm
D : Encryption algorithm
Q.no 40. As the data packet moves from the _______ layer up to the _______ layer,
headers and a trailer are removed
A : Application; physical
B : Physical; application
C : Session; network
Q.no 41. TCP process may not write and read data at the same speed. So we need __________
for storage.
A : Packets
B : Buffers
C : Segments
D : Stacks
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 43. IEEE created gigabit ethernet under the name _____________
A : 802.3a
B : 802.3b
C : 802.3d
D D : 802.3z
Q.no 44. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.
A : Session layer
C : Application layer
Q.no 45. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A : SMTP
B : MIME
C : POP
D : MTA
Q.no 46. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
Q.no 47. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion
A : 1100 to 1300
B : 800 to 1000
C : 1400 to 1600
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : 1500 to 1700
Q.no 48. In segment header, sequence number and acknowledgement number fields refer to
_______
A : Byte number
B : Buffer number
C : Segment number
D : Acknowledgment
Q.no 49. Ifs max fragment bit is set to 0, it means this is the_________ fragment.
A : first
B : middle
C : only
D : second
A : Stream of bytes
B : Sequence of characters
C : Lines of data
D : Packets
Q.no 51. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
A : Short frame
B : Runt frame
C : Mini frame
D : Man frame
Q.no 52. There are _______ the number of standard content types in MIME.
A:5
B:7
C:9
D:4
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 54. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________
A : Active open
B : Active close
C : Passive close
D : Passive open
Q.no 55. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----
A : Manchester scheme
B : differential manchester
C : NRZ
D : Polar
A : Infrastructure mode
B : Ad-hoc mode
D : WDS mode
Q.no 57. ________one of the following is an internet standard protocol for managing devices
on IP network?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 59. The __________domains defines registered host according to their genneric behavior.
A : Generic
B : Country
C : Inverse
Q.no 60. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
A : planning
B : fundamentals
C : cryptography
D : plain text
A : Identification
B : Authentication
C : Access control
D : Lock
Q.no 3. A _____________is a number or a set of number that the algorithm uses to perform
encryption and decryption
A : ciphertext
B : plain text
C : sender
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : key
A : Application layer protocols are used by both source and destination devices during a
communication session
Q.no 5. __________one of the following is an internet standard protocol for managing devices
on IP network?
Q.no 6. ______ of the following protocol is used for transferring electronic mail messages from
one machine to another?
A : TELNET
B : FTP
C : SNMP
D : SMTP
A : ad hoc
B : infrastructure
C : home
D : business
A : 110
B : 25
C : 50
D : 20
Q.no 9. _______one of the following algorithm is not used for congestion control?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : Admission control
C : Load shedding
A : substitutions
B : transformation
D : addition
A : hidden
B : simple
C : executable
D : non executable
Q.no 13. In fast ethernet implementation ---- allows 2 stations to negotiate the mode or data
rate of operation
A : negotiation
B : auto negotiation
C : does not
D : category
B : Bandwidth-sensitive application
C : Elastic application
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : Rules for when and how processes send and respond to messages
Q.no 16. Non adaptive routing algorithms do not based on their routing decisions on
measurements or estimates of the current_________.
A : network
B : speed
C : capacity
Q.no 17. The first address in the block can be found by setting the_________ most 32-n bits on
Os.
A : middle
B : left
C : right
D : left corner
Q.no 18. _________is used to find logical address of a computer which knows only its
physical address.
A : ARP
B : RARP
C : IP
D : TCP
A : 28
B : 56
C : 64
D : 32
A : large organisations
B : midsize organisations
C : unicasting
D : multicasting
A : ciphertext
B : plain text
Q.no 22. _______one of the following event is not possible in wireless LAN?
A : Collision detection
Q.no 23. ____________is a technique that facilitates hiding of message that is to be kept secret
inside other messages .
C : steganography
D : decryption
Q.no 24. ______ language in WWW specifies a web's way by describing three-dimensional
objects?
A : HTML
B : VRML
C : XML
D : UML
A : UserID
B : Password
C : OTP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : Fingerprint
Q.no 26. A station with ESS transition mobility can move from---------.
A : inside a BSS
B : outside a BSS
B : A security algorithm
C : A routing algorithm
D : Encryption algorithm
Q.no 28. Open look congestion control policies are used to prevent the congestion__________.
A : before it happens
B : after it happens
C : when it happens
D D : at the end
Q.no 29. The _______ is the interface through which a user can read and send mail.
A : unreliable , connectionless
B : reliable , connection less
B : A short VC number
Q.no 32. IEEE created fast ethernet standard under the name ________________________----
-.
A : 802.3
B : 802.3 F
C : 802.3 µ
D : 802.3 m
Q.no 33. The sizes of source and destination port address in TCP header are ___________
respectively.
A : 20-80 bytes
B : 0-20 bytes
C : 20-60 bytes
D : 20-100 bytes
Q.no 35. _______of the following routing algorithms can be used for network layer design?
Q.no 37. Closed loop congestion control algorithm are based on_________.
A : good design
B : mid course
C : feedback loop
D : conclusion
Q.no 38. ______ is the maximum size of data that the application layer can pass on to the TCP
layer below?
A : Any size
C : 216 bytes
D : 1500
Q.no 39. A timestamp option is used to record the _________of datagram processing by a
router.
A : bytes
B : time
C : hops
D : length
Q.no 40. ___________principle states that there has to be some way of ensuring that the
received message is fresh and not duplicate
A : freshness
B : firewall
Q.no 41. IEEE created gigabit ethernet under the name _____________
A : 802.3a
B : 802.3b
C : 802.3d
D D : 802.3z
Q.no 43. Ifs max fragment bit is set to 0, it means this is the_________ fragment.
A : first
B : middle
C : only
D : second
A : Infrastructure mode
B : Ad-hoc mode
D : WDS mode
Q.no 45. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
A : Stream of bytes
B : Sequence of characters
Q.no 47. The __________domains defines registered host according to their genneric behavior.
A : Generic
B : Country
C : Inverse
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 49. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion
A : 1100 to 1300
B : 800 to 1000
C : 1400 to 1600
D : 1500 to 1700
Q.no 50. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
Q.no 51. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
A : Short frame
B : Runt frame
C : Mini frame
D : Man frame
Q.no 52. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
A : network layer
C : application layer
D : physical layer
Q.no 53. ________one of the following is an internet standard protocol for managing devices
on IP network?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 54. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________
A : Active open
B : Active close
C : Passive close
D : Passive open
Q.no 55. There are _______ the number of standard content types in MIME.
A:5
B:7
C:9
D:4
Q.no 56. In segment header, sequence number and acknowledgement number fields refer to
_______
A : Byte number
B : Buffer number
C : Segment number
D : Acknowledgment
Q.no 57. SYNC flooding attack belongs to a type of security attack known as ___________
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 58. TCP process may not write and read data at the same speed. So we need __________
for storage.
A : Packets
B : Buffers
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : Segments
D : Stacks
Q.no 59. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.
A : Session layer
C : Application layer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
A : two
B : one
C : three
D D : five
A : Domain server
B : Zone server
C : Root server
Q.no 3. A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DNS
hierarchical tree. (The root is level one.)
A : third
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : fourth
C : fifth
A : RFC 951
B : RFC 960
C : RFC 989
D : RFC 955
A : piconet
B : BSS
C : ESS
D : master
Q.no 6. To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.
A : Packet
B : Buffer
C : Segment
D : Acknowledgment
Q.no 7. The IEEE has subdivided tha data link layer into _____________sub layers.
A : two
B : one
C : three
D : five
A : logical
B : physical
C : port
D : virtual
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : dynamic
B : static
C : nutral
Q.no 10. Flow control relates to the _________between a given sender and a given receiver.
A : point-to-point traffic
B : error control
A : planning
B : fundamentals
C : cryptography
D : plain text
Q.no 13. For long message , symmetric key cryptography is _________ than asymmetric key
cryptography .
C : unreliable
D : very reliable
Q.no 14. Confidential email message send by A to B which is accessed by C ,without the
permission or knowledge of A and B . This type of attack is called as________.
A : authentication
B : interception
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : interaction
D : introception
Q.no 15. If a host moves from one physical network to other or it wants temporary IP
____________ is useful .
A : BOOTP
B : DHCP
C : ARP
D : RARP
A : Full duplex
B : half duplex
C : mini duplex
D : auto
A : dynamic
B : natural
C : static
D : binding
A : Application layer protocols are used by both source and destination devices during a
communication session
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : error correction
B : error detection
C : retransmission
D : framing
Q.no 21. Bytes of data being transferred in each connection are numbered by TCP. These
numbers start with a _________
A : Fixed number
C : One
A : backward
B : forward
C : not
D : also
Q.no 23. Closed loop congestion control algorithm are based on_________.
A : good design
B : mid course
C : feedback loop
D : conclusion
Q.no 24. DNS records are grouped into sets called as______________
A : PP sets
B : SS sets
C : RR sets
D : mm set
B : forwards
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : routes
D : pushes
A : unreliable , connectionless
A : End to end
B : Process to process
Q.no 28. The ________ process ensures that the origin of an electronic message is correctly
identified.
A : authentication
B : integrity
C : non repudiation
D : interception
A : Data link
B : Presentation
C : Application
D D : Session
Q.no 30. The ____________ translates internet domain and host names to IP address.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : collision
B : evolution
C : mode
D : bandwidth
A : CRC
B : preamble
C : source address
D : length
Q.no 33. With NAT , a user using large set of addresses internally and_________ set of
addresses for outside world.
A : one or small
C : three or small
D : one of large
A : HTTP
B : ARP
C : FTP
D : BOOTP
Q.no 35. Two fundamental principles are underlying to all cryptographic systems they are
_____________________
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : steganography
D : decryption
Q.no 37. The protocol data unit for the transport layer in the internet stack is______
A : segment
B : message
C : datagram
D : frame
A : File transfer
B : File download
C : E-mail
D : Internet telephony
Q.no 39. Computer security means to protect information . It deals with ___________of
unauthorized actions by users of a computer .
B : only prevention
C : only detection
Q.no 40. A station with BSS transition mobility can move from one BSS to another, but the
movement is in----------.
A : inside a BSS
B : outside a BSS
D : inbetween ESS
B : Ad-hoc mode
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : WDS mode
Q.no 42. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
A : Short frame
B : Runt frame
C : Mini frame
D : Man frame
Q.no 43. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
Q.no 44. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.
A : Session layer
C : Application layer
A : Stream of bytes
B : Sequence of characters
C : Lines of data
D : Packets
Q.no 47. In segment header, sequence number and acknowledgement number fields refer to
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
_______
A : Byte number
B : Buffer number
C : Segment number
D : Acknowledgment
Q.no 48. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----
A : Manchester scheme
B : differential manchester
C : NRZ
D : Polar
Q.no 49. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion
A : 1100 to 1300
B : 800 to 1000
C : 1400 to 1600
D : 1500 to 1700
Q.no 50. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
A : network layer
C : application layer
D : physical layer
Q.no 51. There are _______ the number of standard content types in MIME.
A:5
B:7
C:9
D:4
Q.no 52. ________one of the following is an internet standard protocol for managing devices
on IP network?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 53. The __________domains defines registered host according to their genneric behavior.
A : Generic
B : Country
C : Inverse
Q.no 54. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A : SMTP
B : MIME
C : POP
D : MTA
Q.no 55. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
Q.no 56. SYNC flooding attack belongs to a type of security attack known as ___________
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 57. TCP process may not write and read data at the same speed. So we need __________
for storage.
A : Packets
B : Buffers
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : Segments
D : Stacks
Q.no 58. IEEE created gigabit ethernet under the name _____________
A : 802.3a
B : 802.3b
C : 802.3d
D D : 802.3z
Q.no 59. Ifs max fragment bit is set to 0, it means this is the_________ fragment.
A : first
B : middle
C : only
D : second
Q.no 60. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
A : application gateway
B : packet filter
C : proxy
D : secure naming
A : Routing
B : Inter- networking
C : Congestion control
D : Error control
A : More overload
B : Reliable
C : Low overhead
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D D : Fast
A : logical ,physical
B : physical , logical
C : physical , port
D : logical, special
A : is a connection-oriented protocol
A : authentication
B : integrity
C : non repudiation
D : interception
Q.no 7. To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.
A : Packet
B : Buffer
C : Segment
D : Acknowledgment
A : large organisations
B : midsize organisations
C : small organisations
D : multicasting
Q.no 9. Network layer provides _______ addressing.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : logical
B : physical
C : port
D : virtual
Q.no 10. The process of encoding plain text into cipher text message is known as
_____________
A : authentication
B : decryption
C : encryption
D : interception
Q.no 11. Network layer receive services from Data Link layer & gives services to _________.
A : application layer
B : physical layer
C : transport layer
D D : session layer
Q.no 12. In the domain name chal.atc.fhda.edu, _______ is the least specific label.
A : chal
B : atc
C : edu
Q.no 13. The ______ field is used to detect errors over the entire user datagram.
A : udp header
B : checksum
C : source port
D : destination port
A : physical addressing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : logical addressing
D : full duplex
A : hidden
B : simple
C : executable
D : non executable
Q.no 16. ________ one of the pairs of protocols given below, both the protocols can use
multiple TCP connections between the same client and the server. Which one is that?
A : HTTP, FTP
B : HTTP, TELNET
C : FTP, SMTP
D : HTTP, SMTP
Q.no 18. ______________one of the following protocol delivers/stores mail to reciever server?
A : 24 bits
B : 36 bits
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : 42 bits
D : 48 bits
A : 802.3
B : 802.11
C : 802.11 µ
D : 802.15
Q.no 21. ______ is the maximum size of data that the application layer can pass on to the TCP
layer below?
A : Any size
C : 216 bytes
D : 1500
A : logical
B : port
C : actual
D : physical
A : 1500 btyes
B : 46 btyes
C : 1800 btyes
D : 4 bytes
Q.no 24. network layer receives data from the upper layers and creates its own packet by
encapsulating these packets , is known as__________.
A : fragmentation
B : logical addressing
C : intrenetworking
D D : packetizing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 25. ______of the following are transport layer protocols used in networking?
A : TCP and FTP
Q.no 26. The route that connects the the private network to their Global address uses________
private address and _________global address.
A : one,two
B : two,one
C : two,two
D : one,one
A : End to end
B : Process to process
A : 110101E7
B : 1101011 E 7
C:0
D : 1.1111111 E 7
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 32. The application, presentation, and session layers in the OSI model correspond to the
_______ layer in the TCP/IP protocol suite.
A : Application
B : Session
C : Data link
D : Transport
A : backward
B : forward
C : not
D : also
A : collision
B : evolution
C : mode
D : bandwidth
Q.no 35. End of the option used for_________ at the end of the option field.
A : Filler
B : seperator
C : router
D : padding
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 36. Two fundamental principles are underlying to all cryptographic systems they are
_____________________
A : sender
B : receiver
C : intermediate
D : anywhere
B : A security algorithm
C : A routing algorithm
D : Encryption algorithm
Q.no 39. DNS server maintenance the mapping the mapping between domain names and
corresponding ___________
A : physical addresses
B : IP addresses
C : passive networks
D : website
Q.no 40. _______ of the following is not correct in relation to multi-destination routing?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 42. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.
A : Session layer
C : Application layer
Q.no 44. SYNC flooding attack belongs to a type of security attack known as ___________
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 45. Ifs max fragment bit is set to 0, it means this is the_________ fragment.
A : first
B : middle
C : only
D : second
Q.no 46. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : increases quadratically
D : increases exponentially
Q.no 47. ________one of the following is an internet standard protocol for managing devices
on IP network?
Q.no 48. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion
A : 1100 to 1300
B : 800 to 1000
C : 1400 to 1600
D : 1500 to 1700
Q.no 49. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----
A : Manchester scheme
B : differential manchester
C : NRZ
D : Polar
A : Stream of bytes
B : Sequence of characters
C : Lines of data
D : Packets
A : Infrastructure mode
B : Ad-hoc mode
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : WDS mode
Q.no 52. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 53. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A : SMTP
B : MIME
C : POP
D : MTA
Q.no 54. The __________domains defines registered host according to their genneric behavior.
A : Generic
B : Country
C : Inverse
Q.no 55. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
Q.no 56. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
A : Short frame
B : Runt frame
C : Mini frame
D : Man frame
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 57. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
A : network layer
C : application layer
D : physical layer
Q.no 58. There are _______ the number of standard content types in MIME.
A:5
B:7
C:9
D:4
Q.no 59. IEEE created gigabit ethernet under the name _____________
A : 802.3a
B : 802.3b
C : 802.3d
D D : 802.3z
Q.no 60. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
A : More overload
B : Reliable
C : Low overhead
D : Fast
A : setup time
B : no setup time
C : virtual time
D : future time
A : intellectual property
B : private property
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : public property
D : own property
Q.no 5. Censorship is about government and organisations wanting to restrict what people
can___________
A : do
B : do not
D : speak
A : thick ethernet
B : twist ethernet
C : thin ethernet
D : shield ethernet
A : Star Topology
B : Bus Topology
C : Ring Topology
D : Mesh Topology
Q.no 8. ______ of the following protocol is used for transferring electronic mail messages from
one machine to another?
A : TELNET
B : FTP
C : SNMP
D : SMTP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : Mesh Topology
B : Ring Topology
C : Bus Topology
D : Star Topology
Q.no 10. In ____________ same key is used by sender for encryption & by receiver for decryption
.
C : manual key
D : session
Q.no 12. The process of encoding plain text into cipher text message is known as
_____________
A : authentication
B : decryption
C : encryption
D : interception
A : large organisations
B : midsize organisations
C : small organisations
D : multicasting
Q.no 14. To solve the address depletion problem and give more organisation access to
internet,_________ addressing was designed and implemented.
A : classful
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : classless
C : subnetting
D : supernetting
A : dynamic
B : natural
C : static
D : binding
Q.no 16. In the domain name chal.atc.fhda.edu, _______ is the most specific label
A : chal
B : atc
C : fhda
A : less
B : appropriate
C : more
A : physical
B : actual
C : virtual
D : logical
Q.no 19. A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DNS
hierarchical tree. (The root is level one.)
A : third
B : fourth
C : fifth
A : Loss-tolerant application
B : Bandwidth-sensitive application
C : Elastic application
Q.no 21. ___________is a device usually a computer or router sits between the internal
network of organisation and rest of the internet
A : Bridge
B : repeater
C : gateway
D : firewall
A : broadcast
B : multicast
C : unicast
D : anycast
Q.no 23. Full duplex mode of ethernet has the ability to send and receive data at
____________
A : same time
B : different time
C : any time
D : none
Q.no 24. In _________ resolution, the resolver expects the server to supply the final answer
A : Iterative
B : Recursive
C : Straight
A : File transfer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : File download
C : E-mail
D : Internet telephony
Q.no 26. A station with BSS transition mobility can move from one BSS to another, but the
movement is in----------.
A : inside a BSS
B : outside a BSS
D : in between ESS
Q.no 27. Proxy ARP increases the amount of ARP traffic .State True or false
A : TRUE
B : FALSE
C : not known
D : may be
A : 1500 btyes
B : 46 btyes
C : 1800 btyes
D : 4 bytes
Q.no 29. The Application Layer is ______________number of layer of the Internet model
A:5
B:4
C:3
D:2
Q.no 30. IEEE created fast ethernet standard under the name ________________________----
-.
A : 802.3
B : 802.3 F
C : 802.3 µ
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : 802.3 m
A : actual
B : physical
C : logical
D : no
Q.no 32. The transport layer protocols used for real time multimedia, file transfer, DNS and
email, respectively are:
Q.no 33. Transposition ciphers also perform some ______________ over to the plaintext
alphabet
A : transformation
B : permutation
C : addition
D : subtraction
A : unreliable , connectionless
Q.no 35. ____________is a technique that facilitates hiding of message that is to be kept secret
inside other messages .
C : steganography
D : decryption
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 36. The ________ process ensures that the origin of an electronic message is correctly
identified.
A : authentication
B : integrity
C : non repudiation
D : interception
A : 20-80 bytes
B : 0-20 bytes
C : 20-60 bytes
D : 20-100 bytes
A : authentication
B : integrity
C : confidentiality
D : non repudiation
A : single
B : pair
C : three
D : no
A : not feasible
B : feasible
C : highly impossible
D : done
Q.no 41. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________
A : Active open
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : Active close
C : Passive close
D : Passive open
Q.no 42. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A : SMTP
B : MIME
C : POP
D : MTA
Q.no 43. TCP process may not write and read data at the same speed. So we need __________
for storage. A : Packets
B : Buffers
C : Segments
D : Stacks
Q.no 44. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----
A : Manchester scheme
B : differential manchester
C : NRZ
D : Polar
Q.no 45. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
Q.no 46. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
A : Short frame
B : Runt frame
C : Mini frame
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : Man frame
Q.no 47. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
A : Infrastructure mode
B : Ad-hoc mode
D : WDS mode
Q.no 49. SYNC flooding attack belongs to a type of security attack known as ___________
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 51. ________one of the following is an internet standard protocol for managing devices
on IP network?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 52. Ifs max fragment bit is set to 0, it means this is the_________ fragment.
A : first
B : middle
C : only
D : second
Q.no 54. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
Q.no 55. The __________domains defines registered host according to their genneric behavior.
A : Generic
B : Country
C : Inverse
Q.no 56. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
A : network layer
D : physical layer
Q.no 57. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 58. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion A :
1100 to 1300
B : 800 to 1000
C : 1400 to 1600
D : 1500 to 1700
Q.no 59. IEEE created gigabit ethernet under the name _____________
A : 802.3a
B : 802.3b
C : 802.3d
D : 802.3z
A : Stream of bytes
B : Sequence of characters
C : Lines of data
D : Packets
E
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
A : wired
B : all
C : wireless
D : bluetooth
A : inbound
B : outbound
D : all
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : DIFS
A : Loss-tolerant application
B : Bandwidth-sensitive application
C : Elastic application
Q.no 5. The first address in the block can be found by setting the_________ most 32-n bits on
Os.
A : middle
B : left
C : right
D : left corner
Q.no 6. __________one of the following is an internet standard protocol for managing devices
on IP network?
A : MAC address
B : IP address
C : Default mask
D : Network address
A : Port
B : Pipe
C : Node
D : Protocol
Q.no 9. ______ one of the following is not correct?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : Application layer protocols are used by both source and destination devices during a
communication session
Q.no 10. When the contents of a message are changed after the sender sends it but before it
reaches the intended recipient the __________ of a message is lost.
A : authentication
B : non repudiation
C : integrity
D : meaning
A : application gateway
B : packet filter
C : proxy
D : secure naming
A : QDVKLN
B : ABZYM
C : QANMP
D : MEGAB
A : 802.3
B : 802.11
C : 802.11 µ
D : 802.15
Q.no 14. Flow control relates to the _________between a given sender and a given receiver.
A : point-to-point traffic
B : error control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
A : 10 mbps
B : 100 mbps
C : 50 mbps
D : 1000 mbps
Q.no 16. In classful addressing ,the address space is divided into_________ class.
A : five
B : four
C : two
D : three
A : Full duplex
B : half duplex
C : mini duplex
D : auto
A : 28
B : 56
C : 64
D : 32
Q.no 19. When a plain text message is codified using suitable scheme , the resulting message is
known as __________.
A : plain text
B : clear text
C : cipher text
D : normal text
A : private
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : session
C : symmetric
D : public
A : File transfer
B : File download
C : E-mail
D : Internet telephony
A : End to end
B : Process to process
A : logical
B : port
C : actual
D : physical
C : Rules for when and how processes send and respond to messages
Q.no 26. Packets of the same session may be routed through different paths in
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 27. The sizes of source and destination port address in TCP header are ___________
respectively.
Q.no 28. Full duplex mode of ethernet has the ability to send and receive data at
____________
A : same time
B : different time
C : any time
D : none
A : collision
B : evolution
C : mode
D : bandwidth
A : HTTP
B : ARP
C : FTP
D : BOOTP
A : effortless delivery
D : no delivery
Q.no 32. _______one of the following event is not possible in wireless LAN?
A : Collision detection
Q.no 33. Full duplex ethernet increase the capacity of domain from _____________in standard
ethernet.
A : 10mbps to 20mbps
B : 10mbps to 100mbps
C : 1mbps to 10mbps
D : 10mbbs to 1000mbps
A : authentication
B : integrity
C : confidentiality
D : non repudiation
Q.no 35. A station with no transition mobility is either stationary or moving only ________
A : inside a BSS
B : outside a BSS
C : inside ESS
D : outside ESS
B : 46 btyes
C : 1800 btyes
D : 1518 bytes
Q.no 37. A client that wishes to connect to an open server tells its TCP that it needs to be
connected to that particular server. The process is called ___________
A : Active open
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
B : Active close
C : Passive close
D : Passive open
C : Both device that allows wireless devices to connect to a wired network and wireless devices itself
Q.no 39. Open look congestion control policies are used to prevent the congestion__________.
A : before it happens
B : after it happens
C : when it happens
D : at the end
C : Protocol error
Q.no 41. SYNC flooding attack belongs to a type of security attack known as ___________
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 45. The __________domains defines registered host according to their genneric behavior.
A : Generic
B : Country
C : Inverse
Q.no 46. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
B : increases linearly
C : increases quadratically
D : increases exponentially
Q.no 47. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
A : network layer
C : application layer
D : physical layer
A : Stream of bytes
B : Sequence of characters
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
C : Lines of data
D : Packets
Q.no 49. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
A : Short frame
B : Runt frame
C : Mini frame
D : Man frame
Q.no 50. IEEE created gigabit ethernet under the name _____________
A : 802.3a
B : 802.3b
C : 802.3d
D D : 802.3z
Q.no 51. ________one of the following is an internet standard protocol for managing devices
on IP network?
Q.no 52. There are _______ the number of standard content types in MIME.
A:5
B:7
C:9
D:4
Q.no 53. In segment header, sequence number and acknowledgement number fields refer to
_______
A : Byte number
B : Buffer number
C : Segment number
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
D : Acknowledgment
Q.no 54. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A : SMTP
B : MIME
C : POP
D : MTA
Q.no 55. TCP process may not write and read data at the same speed. So we need __________
for storage. A : Packets
B : Buffers
C : Segments
D : Stacks
Q.no 56. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion
A : 1100 to 1300
B : 800 to 1000
C : 1400 to 1600
D : 1500 to 1700
Q.no 57. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
A : does not increase
B : increases linearly
C : increases quadratically
D : increases exponentially
Q.no 58. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1
Q.no 59. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 60. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----
A : Manchester scheme
B : differential manchester
C : NRZ
D : Polar
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12