You are on page 1of 120

21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?

testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. A _______ is a server whose zone consists of the whole tree.

A : Domain server

B : Zone server

C : Root server

D : None of the above

Q.no 2. ____________Firewall filters the packets on the basis of the application or


program related to the packets

A : packet filter

B : application gateway

C : TELNET

D : communication

Q.no 3. Class C addresses were designed for__________.

A : large organisations

B : midsize organisations

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : small organisations

D D : multicasting

Q.no 4. Flow control relates to the _________between a given sender and a given receiver.

A : point-to-point traffic

B : error control

C : slow down D : congestion

Q.no 5. DHCP is a_________protocol.

A : dynamic

B : static

C : nutral

D : static as well as dynamic

Q.no 6. A full domain name is a sequence of labels separated by ________

A : Semicolons

B : Dots

C : Colonns

D : None of the mentioned

Q.no 7. The network layer is responsible for the individual packets from the ___________.

A : source to destination

B : node to node

C : process to process

D : machine to machine

Q.no 8. E-mail is _________

A : Loss-tolerant application

B : Bandwidth-sensitive application

C : Elastic application

D : None of the mentioned

Q.no 9. IEEE 802.11 standard is known for--------- LANs.


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : wired

B : all

C : wireless

D : bluetooth

Q.no 10. Bandwidth requirements of virtual circuit is_________ than datagram subnet.

A : Less

B : more

C : equal

D : less or equal

Q.no 11. In classful addressing ,the address space is divided into_________ class.

A : five

B : four

C : two

D : three

Q.no 12. By using bridges , we can separate -------------domain.

A : collision

B : flow

C : error

D : physical

Q.no 13. _____________one of the following is not a function of network layer?

A : Routing

B : Inter- networking

C : Congestion control

D : Error control

Q.no 14. BOOTP is a_________protocol.

A : transport

B : network

C : application
D : data link
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 15. A packet filtering firewall can____

A : Deny certain users from accessing a service

B : Block worms and viruses from entering the network

C : Disallow some files from being accessed through FTP

D : Block some hosts from accessing the network

Q.no 16. Wired networks are also called as _________________network.

A : Token bus

B : star

C : ethernet

D : wireless

Q.no 17. `BOOTP is a_________protocol.

A : dynamic

B : natural

C : static

D : binding

Q.no 18. To deliver a message to the correct application program running on a host, the
_______ address must be consulted.

A : IP

B : MAC

C : Port

D : None of the mentioned

Q.no 19. BOOTP is defined in ____________ standard

A : RFC 951

B : RFC 960

C : RFC 989

D : RFC 955

Q.no 20. 10 Base T uses ________________________ -.


A : Star Topology

B : Bus Topology

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : Ring Topology

D : Mesh Topology

Q.no 21. The protocol data unit for the transport layer in the internet stack is______

A : segment

B : message

C : datagram D : frame

Q.no 22. ____________allows TCP to detect lost segments and in turn recover from that loss?

A : Sequence number

B : Acknowledgment number

C : Checksum

D : Both Sequence & Acknowledgment number

Q.no 23. In class A,_________ byte define Netid and _________bytes define the Hostid.

A : 2,4

B : 1,3

C : 1,4

D : 2,3

Q.no 24. The protocol data unit (PDU) for the application layer in the Internet stack is

A : Segment

B : Datagram

C : Message

D : Frame

Q.no 25. In a _________name , a name is assigned to address.A name in this space is sequence
of characters without strucctures.

A : Flat

B : Hierarchical
C : Organised

D : None of the mentioned

Q.no 26. The Application Layer is ______________number of layer of the Internet model

A:5
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B:4

C:3

D:2

Q.no 27. As the data packet moves from the _______ layer up to the _______ layer,
headers and a trailer are removed

A : Application; physical

B : Physical; application

C : Session; network

D : Application; data link

Q.no 28. The route that connects the the private network to their Global address uses________
private address and _________global address.

A : one,two

B : two,one

C : two,two

D : one,one

Q.no 29. _______field of cookie in WWW represents the server's directory structure by
identifying the utilization of part associated with server's file tree?

A : Domain

B : Path

C : Content

D : Secure

Q.no 30. After the message is transformed it is called as _________________

A : ciphertext

B : plain text

C : duplicate text
D : original text

Q.no 31. IPv4 is an _________&_________datagram protocol.

A : unreliable , connectionless

B : reliable , connection less

C : unreliable , connection oriented

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : reliable, connection oriented

Q.no 32. _________is autonegotiation?

A : A procedure by which two connected devices choose common

B : A security algorithm

C : A routing algorithm

D : Encryption algorithm

Q.no 33. _______ one of the following is a version of UDP with congestion control?

A : Datagram congestion control protocol

B : Stream control transmission protocol

C : Structured stream transport

D : User congestion control protocol

Q.no 34. A source address is always a-----------address.

A : broadcast

B : multicast

C : unicast

D : anycast

Q.no 35. In the DNS, the names are defined in ___________ structure

A : A linear list

B : An inverted-tree

C : A graph

D : None of the above

Q.no 36. No operation option of IPv4 is used as a _______________between options .

A : Filler
B : separator

C : booster

D : padding

Q.no 37. The receiver of the data controls the amount of data that are to be sent by the sender
is referred to as ___________

A : Flow control

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : Error control

C : Congestion control

D : Error detection

Q.no 38. _____________ mechanism helps to establish proof of identities

A : authentication

B : integrity

C : confidentiality

D : non repudiation

Q.no 39. End of the option used for_________ at the end of the option field.

A : Filler

B : seperator

C : router

D : padding

Q.no 40. Full duplex ethernet increase the capacity of domain from _____________in standard
ethernet.

A : 10mbps to 20mbps

B : 10mbps to 100mbps

C : 1mbps to 10mbps

D : 10mbbs to 1000mbps

Q.no 41. If do not fragment date value is 1 ,the machine must_________.

A : fragment the datagram

B : not fragment the datagram

C : forward the datagram


D : not forward the datagram

Q.no 42. ________one of the following is an internet standard protocol for managing devices
on IP network?

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 43. ______ is interframe gap?

A : Idle time between frames

B : Idle time between frame bits

C : Idle time between packets

D : Idle time between networks

Q.no 44. Ifs max fragment bit is set to 0, it means this is the_________ fragment.

A : first

B : middle

C : only

D : second

Q.no 45. IEEE created gigabit ethernet under the name _____________

A : 802.3a

B : 802.3b

C : 802.3d

D D : 802.3z

Q.no 46. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially
Q.no 47. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.

A : Session layer

B : The presentation layer

C : Application layer

D : None of the above

Q.no 48. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : Short frame

B : Runt frame

C : Mini frame

D : Man frame

Q.no 49. Transport layer aggregates data from different applications into a single stream
before passing it to ____________

A : network layer

B : data link layer

C : application layer

D : physical layer

Q.no 50. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________

A : Active open

B : Active close

C : Passive close

D : Passive open

Q.no 51. SYNC flooding attack belongs to a type of security attack known as ___________

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack
Q.no 52. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 53. In segment header, sequence number and acknowledgement number fields refer to
_______

A : Byte number

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : Buffer number

C : Segment number

D : Acknowledgment

Q.no 54. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________

A : Mutual open

B : Mutual Close

C : Simultaneous open

D : Simultaneous close

Q.no 55. The __________domains defines registered host according to their genneric behavior.

A : Generic

B : Country

C : Inverse

D : None of the mentioned

Q.no 56. TCP process may not write and read data at the same speed. So we need __________
for storage.

A : Packets

B : Buffers

C : Segments

D : Stacks
Q.no 57. There are _______ the number of standard content types in MIME.

A:5

B:7

C:9

D:4

Q.no 58. HLEN field defines the_________.

A : total length of header

B : total length of identification

C : total length of data

D : total length of header and data


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 59. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.

A : SMTP

B : MIME

C : POP

D : MTA

Q.no 60. A wireless network interface controller can work in

A : Infrastructure mode

B : Ad-hoc mode

C : Both infrastructure mode and ad-hoc mode

D : WDS mode

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. The value of acknowledgement field in a segment defines _______

A : sequence number of the byte received previously

B : total number of bytes to receive

C : sequence number of the next byte to be received

D : sequence of zeros and ones

Q.no 2. A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DNS
hierarchical tree. (The root is level one.)

A : third

B : fourth

C : fifth

D : None of the above

Q.no 3. _______one of the following algorithm is not used for congestion control?

A : Traffic aware routing

B : Admission control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : Load shedding

D : Routing information protocol

Q.no 4. Transport layer protocols deals with

A : Application to application communication

B : Process to process communication

C : NNode to node communication

D : Man to man communication

Q.no 5. There can be only ------------primary station in each pinconet.

A : one

B : seven

C : two

D : eight

Q.no 6. Bandwidth requirements of virtual circuit is_________ than datagram subnet.

A : Less

B : more

C : equal

D : less or equal

Q.no 7. In wireless LAN collision may not be detected because of -------.

A : mechanism not available

B : hidden station problem

C : CSMA/CD

D : DIFS

Q.no 8. _________________firewall applies the set of rules to each packet

A : application gateway

B : packet filter

C : proxy

D : secure naming
Q.no 9. A standard etherret network can transmit data at a rate upto ______________.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : 100mbps

B : 1mbps

C : 10mbps

D : none

Q.no 10. If a host moves from one physical network to other or it wants temporary IP
____________ is useful .

A : BOOTP

B : DHCP

C : ARP

D : RARP

Q.no 11. Confidential email message send by A to B which is accessed by C ,without


the permission or knowledge of A and B . This type of attack is called as________.

A : authentication

B : interception

C : interaction

D : introception

Q.no 12. _______DNS client maps an address to a name or a name to an address especially
when required by a host?

A : Resolver

B : Mapper

C : Primary Server

D : Secondary Server

Q.no 13. An endpoint of an inter-process communication flow across a computer network is


called

A : Socket

B : Pipe

C : Port

D : Machine
Q.no 14. The process of transforming cipher text message to back text is called as
______________

A : authentication

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : decryption

C : encryption

D : interception

Q.no 15. In the domain name chal.atc.fhda.edu, _______ is the least specific label.

A : chal

B : atc

C : edu

D : None of the above

Q.no 16. IN wireless LAN, CSMA/CD-----------be implemented.

A : cannot

B : can

C : will

D : forcefully

Q.no 17. _______of the following is not a field in TCP header?

A : Sequence number

B : Fragment offset

C : Checksum

D : Window size

Q.no 18. 10 Base F uses ________________________ -.

A : Mesh Topology

B : Ring Topology

C : Bus Topology

D : Star Topology

Q.no 19. _____________is related with what uses want others to access and what they want to
keep confidential

A : security
B : speech

C : privacy

D : social issue

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 20. In BOOTP mapping of IP addresses to physical addresses needs to be done


______________

A : automatically

B : immediately

C : manually

D : afterwards

Q.no 21. Directory services are handled by the _______ layer.

A : Session

B : Application

C : Presentation D : Data link

Q.no 22. In class C,_________ byte define Netid and _________bytes define the Hostid.

A : 1,3

B : 3,1

C : 2,2

D : 3,4

Q.no 23. Network layer provides____________ connection between different networks.

A : actual

B : physical

C : logical

D : no

Q.no 24. Application layer protocol defines ____________

A : Types of messages exchanged

B : Message format, syntax and semantics

C : Rules for when and how processes send and respond to messages
D : All of the mentioned

Q.no 25. The route that connects the the private network to their Global address uses________
private address and _________global address.

A : one,two

B : two,one

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : two,two

D : one,one

Q.no 26. Web security can be roughly divided into ____________ parts

A : four

B : five

C : six

D : three

Q.no 27. In a _________name , a name is assigned to address.A name in this space is sequence
of characters without strucctures.

A : Flat

B : Hierarchical

C : Organised

D : None of the mentioned

Q.no 28. With NAT , a user using large set of addresses internally and_________ set of
addresses for outside world.

A : one or small

B : two are small

C : three or small

D : one of large

Q.no 29. The TCP sliding window

A : can be used to control the flow of


information

B : always occurs when the field value is 0

C : always occurs when the field value is

D : occurs horizontally
Q.no 30. First field of 802.3 is used for-----------.

A : CRC

B : preamble

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : source address

D : length

Q.no 31. The ________ process ensures that the origin of an electronic message is correctly
identified.

A : authentication

B : integrity

C : non repudiation

D : interception

Q.no 32. In a _________name , each name is made of several

A : Flat

B : Hierarchical

C : Organised

D : None of the mentioned

Q.no 33. A client that wishes to connect to an open server tells its TCP that it needs to be
connected to that particular server. The process is called ___________

A : Active open

B : Active close

C : Passive close

D : Passive open

Q.no 34. Viruses infect __________programs on the disk

A : doc

B:c

C : ini

D : executable

Q.no 35. .--------- is minimum payload length of Ethernet frame.

A : 1500 btyes
B : 46 btyes

C : 1800 btyes

D : 4 bytes

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 36. ________ is the header size of a UDP packet?

A : 8 bytes

B : 8 bits

C : 16 bytes

D : 124 bytes

Q.no 37. In addition to seven active slave station ,a piconet can have upto----------parked
nodes.

A:1

B:7

C:4

D : 255

Q.no 38. In __________ resolution, the server returns the IP address of the server that it
thinks can resolve the query.

A : Iterative

B : Recursive

C : Straight

D : None of the above

Q.no 39. Full duplex mode of ethernet has the ability to send and receive data at
____________

A : same time

B : different time

C : any time

D : none

Q.no 40. A source address is always a-----------address.

A : broadcast

B : multicast
C : unicast

D : anycast

Q.no 41. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 42. In segment header, sequence number and acknowledgement number fields refer to
_______

A : Byte number

B : Buffer number

C : Segment number

D : Acknowledgment

Q.no 43. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----

A : Manchester scheme

B : differential manchester

C : NRZ

D : Polar

Q.no 44. TCP process may not write and read data at the same speed. So we need __________
for storage.

A : Packets

B : Buffers

C : Segments

D : Stacks

Q.no 45. The __________domains defines registered host according to their genneric behavior.

A : Generic

B : Country
C : Inverse

D : None of the mentioned

Q.no 46. IEEE created gigabit ethernet under the name _____________

A : 802.3a

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : 802.3b

C : 802.3d

D D : 802.3z

Q.no 47. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.

A : Session layer

B : The presentation layer

C : Application layer

D : None of the above

Q.no 48. ______ is interframe gap?

A : Idle time between frames

B : Idle time between frame bits

C : Idle time between packets

D : Idle time between networks

Q.no 49. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.

A : SMTP

B : MIME

C : POP

D : MTA

Q.no 50. A wireless network interface controller can work in

A : Infrastructure mode

B : Ad-hoc mode

C : Both infrastructure mode and ad-hoc mode

D : WDS mode
Q.no 51. There are _______ the number of standard content types in MIME.

A:5

B:7

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C:9

D:4

Q.no 52. Ifs max fragment bit is set to 0, it means this is the_________ fragment.

A : first

B : middle

C : only

D : second

Q.no 53. HLEN field defines the_________.

A : total length of header

B : total length of identification

C : total length of data

D : total length of header and data

Q.no 54. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially

Q.no 55. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion

A : 1100 to 1300

B : 800 to 1000

C : 1400 to 1600

D : 1500 to 1700

Q.no 56. In TCP, sending and receiving data is done as _______


A : Stream of bytes

B : Sequence of characters

C : Lines of data

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : Packets

Q.no 57. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________

A : Active open

B : Active close

C : Passive close

D : Passive open

Q.no 58. Transport layer aggregates data from different applications into a single stream
before passing it to ____________

A : network layer

B : data link layer

C : application layer

D : physical layer

Q.no 59. SYNC flooding attack belongs to a type of security attack known as ___________

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 60. If do not fragment date value is 1 ,the machine must_________.

A : fragment the datagram

B : not fragment the datagram

C : forward the datagram

D : not forward the datagram

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. In the Internet, the domain name space (tree) is divided into _______ different sections

A : Three

B : Two

C : Four

D : None of the above

Q.no 2. _________________firewall applies the set of rules to each packet

A : application gateway

B : packet filter

C : proxy

D : secure naming

Q.no 3. Application Gateway Firewalls are ___________secure than packet filters .

A : more

B : less

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : equal

D : not

Q.no 4. ________ one of the pairs of protocols given below, both the protocols can use multiple
TCP connections between the same client and the server. Which one is that?

A : HTTP, FTP

B : HTTP, TELNET

C : FTP, SMTP

D : HTTP, SMTP

Q.no 5. A is a TCP name for a transport service access point.

A : Port

B : Pipe

C : Node

D : Protocol

Q.no 6. A _________ is a subtree of the domain name space.

A : Label

B : Name

C : Domain

D : None of the mentioned

Q.no 7. Censorship is about government and organisations wanting to restrict what people
can___________

A : do

B : do not

C : publish and read

D : speak

Q.no 8. In fast ethernet implementation ---- allows 2 stations to negotiate the mode or data
rate of operation

A : negotiation

B : auto negotiation

C : does not
D : category
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 9. MAC address is of

A : 24 bits

B : 36 bits

C : 42 bits

D : 48 bits

Q.no 10. User datagram protocol is called connectionless because

A : All UDP packets are treated independently by transport layer

B : It sends data as a stream of related packets

C : It is received in the same order as sent order

D : It sends data very quickly

Q.no 11. Bluetooth technology is defined by IEEE ______________

A : 802.3

B : 802.11

C : 802.11 µ

D : 802.15

Q.no 12. A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DNS
hierarchical tree. (The root is level one.)

A : third

B : fourth

C : fifth

D : None of the above

Q.no 13. Network layer receive services from Data Link layer & gives services to _________.

A : application layer

B : physical layer

C : transport layer

D : session layer

Q.no 14. If a host wants to send packet to another host on another network it must first be
delivered to _____________
A : host

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : host on same network

C : another host

D : router

Q.no 15. DNSsec introduces three new record types_____________

A : KEY record , SIG record , CERT record

B : KEY record , MIP record , CERT record

C : CERT ecord , WMP record , PIM record

D : CERT ecord , MIP record , PIM record

Q.no 16. An endpoint of an inter-process communication flow across a computer network is


called

A : Socket

B : Pipe

C : Port

D : Machine

Q.no 17. Wired networks are also called as _________________network.

A : Token bus

B : star

C : ethernet

D : wireless

Q.no 18. _______ of the following are transport layer protocols used in networking?

A : TCP and FTP

B : UDP and HTTP

C : TCP and UDP

D : HTTP and FTP

Q.no 19. BOOTP is defined in ____________ standard

A : RFC 951

B : RFC 960
C : RFC 989

D : RFC 955
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 20. Network that allows several LANs to be connected is ---------------.

A : ring

B : topology

C : backbone

D : connector

Q.no 21. With NAT , a user using large set of addresses internally and_________ set of
addresses for outside world.

A : one or small

B : two are small

C : three or small

D : one of large

Q.no 22. Full duplex ethernet increase the capacity of domain from _____________in standard
ethernet.

A : 10mbps to 20mbps

B : 10mbps to 100mbps

C : 1mbps to 10mbps

D : 10mbbs to 1000mbps

Q.no 23. An algorithm in encryption is called

A : Algorithm

B : Procedure

C : Cipher

D : Module

Q.no 24. A client that wishes to connect to an open server tells its TCP that it needs to be
connected to that particular server. The process is called ___________

A : Active open

B : Active close

C : Passive close
D : Passive open

Q.no 25. A timestamp option is used to record the _________of datagram processing by a
router.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : bytes

B : time

C : hops

D : length

Q.no 26. Application layer offers _______ service.

A : End to end

B : Process to process

C : Both End to end and Process to process

D : None of the mentioned

Q.no 27. If NIC of a machine is changed , its __________ address changes .

A : logical

B : port

C : actual

D : physical

Q.no 28. .--------- is minimum payload length of Ethernet frame.

A : 1500 btyes

B : 46 btyes

C : 1800 btyes D : 4 bytes

Q.no 29. ____________allows TCP to detect lost segments and in turn recover from that loss?

A : Sequence number

B : Acknowledgment number

C : Checksum

D : Both Sequence & Acknowledgment number

Q.no 30. ______of the following are transport layer protocols used in networking?
A : TCP and FTP

B : UDP and HTTP

C : TCP and UDP

D : HTTP and FTP


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 31. In a _________name , a name is assigned to address.A name in this space is sequence
of characters without strucctures.

A : Flat

B : Hierarchical

C : Organised

D : None of the mentioned

Q.no 32. In _____________each letter or group of letters are replaced by another letter or
group of letters

A : transposition cipher

B : decryption

C : substitution cipher

D : column

Q.no 33. Connection establishment in TCP is done by which mechanism?

A : Flow control

B : Three-Way Handshaking

C : Forwarding

D : Synchronization

Q.no 34. In wireless ad-hoc network

A : Access point is not required

B : Access point is must

C : Nodes are not required

D : All nodes are access points

Q.no 35. The ________ process ensures that the origin of an electronic message is correctly
identified.

A : authentication
B : integrity

C : non repudiation

D : interception

Q.no 36. _____________ does an HTTP status code of "404" mean?

A : Document has moved


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : Successful document retrieval

C : Protocol error

D : Document not found

Q.no 37. Open look congestion control policies are used to prevent the congestion__________.

A : before it happens

B : after it happens

C : when it happens

D : at the end

Q.no 38. in Datagram subnet_________ is needed.

A : advance setup

B : no advance setup

C : virtual circuit setup

D : message setup

Q.no 39. As the data packet moves from the _______ layer up to the _______ layer,
headers and a trailer are removed

A : Application; physical

B : Physical; application

C : Session; network

D : Application; data link

Q.no 40. Proxy ARP is used to create ___________ effect .

A : supernetting

B : subnetting

C : network
D : internetwork

Q.no 41. There are _______ the number of standard content types in MIME.

A:5

B:7

C:9

D:4
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 42. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.

A : Session layer

B : The presentation layer

C : Application layer

D : None of the above

Q.no 43. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.

A : SMTP

B : MIME

C : POP

D : MTA

Q.no 44. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called

A : Short frame

B : Runt frame

C : Mini frame

D : Man frame

Q.no 45. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially
Q.no 46. ________one of the following is an internet standard protocol for managing devices
on IP network?

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

Q.no 47. In TCP, sending and receiving data is done as _______


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : Stream of bytes

B : Sequence of characters

C : Lines of data

D : Packets

Q.no 48. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially

Q.no 49. A wireless network interface controller can work in

A : Infrastructure mode

B : Ad-hoc mode

C : Both infrastructure mode and ad-hoc mode

D : WDS mode

Q.no 50. Transport layer aggregates data from different applications into a single stream
before passing it to ____________

A : network layer

B : data link layer

C : application layer

D : physical layer

Q.no 51. IEEE created gigabit ethernet under the name _____________
A : 802.3a

B : 802.3b

C : 802.3d

D D : 802.3z

Q.no 52. In segment header, sequence number and acknowledgement number fields refer to
_______

A : Byte number
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : Buffer number

C : Segment number

D : Acknowledgment

Q.no 53. Ifs max fragment bit is set to 0, it means this is the_________ fragment.

A : first

B : middle

C : only

D : second

Q.no 54. ______ is interframe gap?

A : Idle time between frames

B : Idle time between frame bits

C : Idle time between packets

D : Idle time between networks

Q.no 55. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________

A : Mutual open

B : Mutual Close

C : Simultaneous open

D : Simultaneous close

Q.no 56. SYNC flooding attack belongs to a type of security attack known as ___________

A : SYNC flooding attack

B : Active attack
C : Passive attack

D : Denial-of-service attack

Q.no 57. If do not fragment date value is 1 ,the machine must_________.

A : fragment the datagram

B : not fragment the datagram

C : forward the datagram

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : not forward the datagram

Q.no 58. HLEN field defines the_________.

A : total length of header

B : total length of identification

C : total length of data

D : total length of header and data

Q.no 59. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________

A : Active open

B : Active close

C : Passive close

D : Passive open

Q.no 60. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion

A : 1100 to 1300

B : 800 to 1000

C : 1400 to 1600

D : 1500 to 1700

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. The process of transforming cipher text message to back text is called as
______________

A : authentication

B : decryption

C : encryption

D : interception

Q.no 2. IEEE 802.11 standard is known for--------- LANs.

A : wired

B : all

C : wireless

D : bluetooth

Q.no 3. Confidential email message send by A to B which is accessed by C ,without the


permission or knowledge of A and B . This type of attack is called as________.

A : authentication
B : interception
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : interaction

D : introception

Q.no 4. A types the URL of B , The Intruder T intercepts A's request ,T inturn fetches the
page of B , modifies the page and returns the modified page to A.This is called as
____________

A : women in the middle attack

B : women in front attack

C : man in the middle attack

D : bucket Bridge attack

Q.no 5. _____________one of the following is not a function of network layer?

A : Routing

B : Inter- networking

C : Congestion control

D : Error control

Q.no 6. When too many packets are present in a subnet , performance degrades. Packets send are
not equal to the packet received. This situation is called_________.

A : routing

B : forwarding

C : multicasting

D : congestion

Q.no 7. __________one of the following is an internet standard protocol for managing devices
on IP network?

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

Q.no 8. Firewalls are controlling _______________Communications

A : inbound

B : outbound
C : inbound and outbound

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : all

Q.no 9. _________________is the technique of decoding message from non readable format
back to readable format

A : ciphertext

B : plain text

C : key

D : cryptanalysis

Q.no 10. ARP protocol is used for mapping_________address to_________address.

A : logical ,physical

B : physical , logical

C : physical , port

D : logical, special

Q.no 11. BOOTP is a_________protocol.

A : transport

B : network

C : application

D : data link

Q.no 12. Network layer needs a global addressing scheme , to identify every device uniquely
on internet called as____________.

A : physical addressing

B : port addressing

C : logical addressing

D : special addressing

Q.no 13. A BSS without AP type of networks-------------.

A : can send data to other BSS

B : cannot send data to other BSS

C : can send data to ESS

D : cannot send data to ESS


Q.no 14. _______of the following is not a field in TCP header?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : Sequence number

B : Fragment offset

C : Checksum

D : Window size

Q.no 15. If the percentageof discarded packets due to lack of buffer space is more
means__________.

A : deadlock

B : congestion

C : collision D : timeout

Q.no 16. Network layer receive services from Data Link layer & gives services to _________.

A : application layer

B : physical layer

C : transport layer

D : session layer

Q.no 17. An endpoint of an inter-process communication flow across a computer network is


called __________

A : socket

B : pipe

C : port

D : machine

Q.no 18. User datagram protocol is called connectionless because _____________

A : all UDP packets are treated independently by transport layer

B : it sends data as a stream of related packets

C : it is received in the same order as sent order

D : it sends data very quickly

Q.no 19. In the domain name chal.atc.fhda.edu, _______ is the least specific label.

A : chal
B : atc

C : edu
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : None of the above

Q.no 20. _______of the following is a transport layer protocol?

A : stream control transmission protocol

B : internet control message protocol

C : neighbor discovery protocol

D : dynamic host configuration protocol

Q.no 21. Header size of Ipv4 is_________.

A : 20-80 bytes

B : 0-20 bytes

C : 20-60 bytes

D : 20-100 bytes

Q.no 22. The Application Layer is ______________number of layer of the Internet model

A:5

B:4

C:3

D:2

Q.no 23. In wireless network an extended service set is a set of

A : Connected basic service sets

B : All stations

C : All access points

D : Connected access points

Q.no 24. Directory services are handled by the _______ layer.

A : Session

B : Application

C : Presentation

D : Data link
Q.no 25. .--------- is maximum payload length of Ethernet frame.

A : 1500 btyes

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : 46 btyes

C : 1800 btyes

D : 1518 bytes

Q.no 26. _______ of the following is not correct in relation to multi-destination routing?

A : Is same as broadcast routing

B : Contains the list of all destinations

C : Data is not sent by packets

D : There are multiple receivers

Q.no 27. Periodic updates o adrresses in static table is _______________ .

A : not feasible

B : feasible

C : highly impossible

D : done

Q.no 28. Bridges can raise the __________________

A : collision

B : evolution

C : mode

D : bandwidth

Q.no 29. In static allocation , DHCP works same as _____________ .

A : HTTP

B : ARP

C : FTP

D : BOOTP

Q.no 30. In class C,_________ byte define Netid and _________bytes define the Hostid.

A : 1,3

B : 3,1
C : 2,2

D : 3,4

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 31. A station with BSS transition mobility can move from one BSS to another, but the
movement is in----------.

A : inside a BSS

B : outside a BSS

C : one ESS Only

D : inbetween ESS

Q.no 32. _______of the following routing algorithms can be used for network layer design?

A : Shortest path algorithm

B : Distance vector routing

C : Link state routing

D : All of the mentioned

Q.no 33. DNS records are grouped into sets called as______________

A : PP sets

B : SS sets

C : RR sets

D : mm set

Q.no 34. If datagram arrives at the destination with strict source route option set, some of the
entries were not visited , it will be _________.

A : discarded

B : forwarded

C : accepted

D : routed

Q.no 35. The receiver of the data controls the amount of data that are to be sent by the sender
is referred to as ___________

A : Flow control

B : Error control

C : Congestion control
D : Error detection

Q.no 36. IPv4 has_________addressses.

A : more than 4 billion


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : more than 1 billion

C : more than 2 billion

D : more than 5 billion

Q.no 37. The ________ process ensures that the origin of an electronic message is correctly
identified.

A : authentication

B : integrity

C : non repudiation

D : interception

Q.no 38. _____________ mechanism helps to establish proof of identities

A : authentication

B : integrity

C : confidentiality

D : non repudiation

Q.no 39. network layer receives data from the upper layers and creates its own packet by
encapsulating these packets , is known as__________.

A : fragmentation

B : logical addressing

C : intrenetworking

D : packetizing

Q.no 40. A station with no transition mobility is either stationary or moving only ________

A : inside a BSS

B : outside a BSS

C : inside ESS

D : outside ESS

Q.no 41. There are _______ the number of standard content types in MIME.
A:5

B:7

C:9

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D:4

Q.no 42. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________

A : Active open

B : Active close

C : Passive close

D : Passive open

Q.no 43. If do not fragment date value is 1 ,the machine must_________.

A : fragment the datagram

B : not fragment the datagram

C : forward the datagram

D : not forward the datagram

Q.no 44. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----

A : Manchester scheme

B : differential manchester

C : NRZ

D : Polar

Q.no 45. In segment header, sequence number and acknowledgement number fields refer to
_______

A : Byte number

B : Buffer number

C : Segment number

D : Acknowledgment

Q.no 46. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called

A : Short frame
B : Runt frame

C : Mini frame

D : Man frame

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 47. SYNC flooding attack belongs to a type of security attack known as ___________

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 48. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.

A : SMTP

B : MIME

C : POP

D : MTA

Q.no 49. IEEE created gigabit ethernet under the name _____________

A : 802.3a

B : 802.3b

C : 802.3d \

D D : 802.3z

Q.no 50. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.

A : Session layer

B : The presentation layer

C : Application layer

D : None of the above

Q.no 51. A wireless network interface controller can work in

A : Infrastructure mode

B : Ad-hoc mode

C : Both infrastructure mode and ad-hoc mode


D : WDS mode

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 52. Ifs max fragment bit is set to 0, it means this is the_________ fragment.

A : first

B : middle

C : only

D : second

Q.no 53. Transport layer aggregates data from different applications into a single stream
before passing it to ____________

A : network layer

B : data link layer

C : application layer D : physical layer

Q.no 54. The __________domains defines registered host according to their genneric behavior.

A : Generic

B : Country

C : Inverse

D : None of the mentioned

Q.no 55. HLEN field defines the_________.

A : total length of header

B : total length of identification

C : total length of data

D : total length of header and data

Q.no 56. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack
Q.no 57. ______ is interframe gap?

A : Idle time between frames


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : Idle time between frame bits

C : Idle time between packets

D : Idle time between networks

Q.no 58. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________

A : Mutual open

B : Mutual Close

C : Simultaneous open

D : Simultaneous close

Q.no 59. In TCP, sending and receiving data is done as _______

A : Stream of bytes

B : Sequence of characters

C : Lines of data

D : Packets

Q.no 60. TCP process may not write and read data at the same speed. So we need __________
for storage. A : Packets

B : Buffers

C : Segments

D : Stacks

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. There can be only ------------primary station in each pinconet.

A : one

B : seven

C : two

D : eight

Q.no 2. Record route option of IPv4 is used to record the_________.

A : external routers

B : internal routers

C : internet routers

D : internal machines

Q.no 3. Mobile codes are small ______________program

A : hidden

B : simple
C : executable

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : non executable

Q.no 4. Symmetric key cryptography is ____________ & ____________

A : cheap , secure

B : fast , efficient

C : slow , efficient

D : fast , costly

Q.no 5. In asymmetric key cryptography __________ key is known to all.

A : private

B : session

C : symmetric

D : public

Q.no 6. A BSS without AP type of networks-------------.

A : can send data to other BSS

B : cannot send data to other BSS

C : can send data to ESS

D : cannot send data to ESS

Q.no 7. The network layer protocol for internet is

A : Ethernet

B : Internet protocol

C : Hypertext transfer protocol

D : File transfer protocol

Q.no 8. DHCP is a_________protocol.

A : dynamic

B : static

C : nutral

D : static as well as dynamic

Q.no 9. Class B addresses were designed for__________.


A : large organisations

B : midsize organisations
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : small organisations

D : multicasting

Q.no 10. An endpoint of an inter-process communication flow across a computer network is


called

A : Socket

B : Pipe

C : Port

D : Machine

Q.no 11. Copyright is a form of ____________protection

A : intellectual property

B : private property

C : public property

D : own property

Q.no 12. Symmetric key cryptography having a disadvatage of a pkey exchangeroblem of


________________

A : key exchange

B : session key

C : private key

D : public key

Q.no 13. ARP reply is_________.

A : multicast

B : unicast

C : broadcast

D : nocast

Q.no 14. ______ is the main advantage of UDP?

A : More overload

B : Reliable
C : Low overhead

D : Fast

Q.no 15. The value of acknowledgement field in a segment defines _______


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : sequence number of the byte received previously

B : total number of bytes to receive

C : sequence number of the next byte to be received

D : sequence of zeros and ones

Q.no 16. _________________is the technique of decoding message from non readable format back
to readable format

A : ciphertext

B : plain text

C : key

D : cryptanalysis

Q.no 17. To deliver a message to the correct application program running on a host, the
_______ address must be consulted.

A : IP

B : MAC

C : Port

D : None of the mentioned

Q.no 18. _____ one of the following protocol delivers/stores mail to reciever server?

A : Simple mail transfer protocol

B : Post office protocol

C : Internet mail access protocol

D : Hypertext transfer protocol

Q.no 19. ______ one of the following statements is FALSE?

A : TCP guarantees a minimum communication rate

B : TCP ensures in-order delivery

C : TCP reacts to congestion by reducing sender window size

D : TCP employs retransmission to compensate for packet loss


Q.no 20. DNSsec introduces three new record types_____________

A : KEY record , SIG record , CERT record

B : KEY record , MIP record , CERT record

C : CERT ecord , WMP record , PIM record


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : CERT ecord , MIP record , PIM record

Q.no 21. IPv4 has_________addressses.

A : more than 4 billion

B : more than 1 billion

C : more than 2 billion

D : more than 5 billion

Q.no 22. In a _________name , each name is made of several

A : Flat

B : Hierarchical

C : Organised

D : None of the mentioned

Q.no 23. A timestamp option is used to record the _________of datagram processing by a
router.

A : bytes

B : time

C : hops

D : length

Q.no 24. _______ is start frame delimeter (SFD) in ethernet frame?

A : 110101E7

B : 1101011 E 7

C:0

D : 1.1111111 E 7

Q.no 25. in Datagram subnet_________ is needed.

A : advance setup
B : no advance setup

C : virtual circuit setup

D : message setup

Q.no 26. IEEE created fast ethernet standard under the name ________________________----
-.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : 802.3

B : 802.3 F

C : 802.3 µ

D : 802.3 m

Q.no 27. ___________is a device usually a computer or router sits between the internal
network of organisation and rest of the internet

A : Bridge

B : repeater

C : gateway

D : firewall

Q.no 28. Application layer protocol defines ____________

A : Types of messages exchanged

B : Message format, syntax and semantics

C : Rules for when and how processes send and respond to messages

D : All of the mentioned

Q.no 29. A station with BSS transition mobility can move from one BSS to another, but the
movement is in----------.

A : inside a BSS

B : outside a BSS

C : one ESS Only

D : inbetween ESS

Q.no 30. _______field of cookie in WWW represents the server's directory structure by
identifying the utilization of part associated with server's file tree?

A : Domain

B : Path
C : Content

D : Secure

Q.no 31. Fast ethernet is -------------- compatible to standard ethernet.

A : backward

B : forward

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : not

D : also

Q.no 32. The ________ process ensures that the origin of an electronic message is correctly
identified.

A : authentication

B : integrity

C : non repudiation

D : interception

Q.no 33. In implicit feedback congestion control algorithm, the source makes a conclusion of
congestion by_________.

A : making local observation

B : traffic

C : feedback

D : good design

Q.no 34. The protocol data unit for the transport layer in the internet stack is______

A : segment

B : message

C : datagram

D : frame

Q.no 35. Packets of the same session may be routed through different paths in

A : TCP, but not UDP

B : TCP and UDP

C : UDP, but not TCP

D : Neither TCP, nor UDP


Q.no 36. Network layer________frames among networks.

A : flows

B : forwards

C : routes

D : pushes

Q.no 37. A _____ is a TCP name for a transport service access point.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : port

B : pipe

C : node

D : protocol

Q.no 38. Bridges can raise the __________________

A : collision

B : evolution

C : mode

D : bandwidth

Q.no 39. _________is autonegotiation?

A : A procedure by which two connected devices choose common

B : A security algorithm

C : A routing algorithm

D : Encryption algorithm

Q.no 40. As the data packet moves from the _______ layer up to the _______ layer,
headers and a trailer are removed

A : Application; physical

B : Physical; application

C : Session; network

D : Application; data link

Q.no 41. TCP process may not write and read data at the same speed. So we need __________
for storage.
A : Packets
B : Buffers

C : Segments

D : Stacks

Q.no 42. HLEN field defines the_________.

A : total length of header

B : total length of identification

C : total length of data

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : total length of header and data

Q.no 43. IEEE created gigabit ethernet under the name _____________

A : 802.3a

B : 802.3b

C : 802.3d

D D : 802.3z

Q.no 44. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.

A : Session layer

B : The presentation layer

C : Application layer

D : None of the above

Q.no 45. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.

A : SMTP

B : MIME

C : POP

D : MTA

Q.no 46. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________

A : Mutual open

B : Mutual Close
C : Simultaneous open

D : Simultaneous close

Q.no 47. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion

A : 1100 to 1300

B : 800 to 1000

C : 1400 to 1600

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : 1500 to 1700

Q.no 48. In segment header, sequence number and acknowledgement number fields refer to
_______

A : Byte number

B : Buffer number

C : Segment number

D : Acknowledgment

Q.no 49. Ifs max fragment bit is set to 0, it means this is the_________ fragment.

A : first

B : middle

C : only

D : second

Q.no 50. In TCP, sending and receiving data is done as _______

A : Stream of bytes

B : Sequence of characters

C : Lines of data

D : Packets

Q.no 51. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called

A : Short frame

B : Runt frame

C : Mini frame
D : Man frame

Q.no 52. There are _______ the number of standard content types in MIME.

A:5

B:7

C:9

D:4

Q.no 53. If do not fragment date value is 1 ,the machine must_________.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : fragment the datagram

B : not fragment the datagram

C : forward the datagram

D : not forward the datagram

Q.no 54. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________

A : Active open

B : Active close

C : Passive close

D : Passive open

Q.no 55. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----

A : Manchester scheme

B : differential manchester

C : NRZ

D : Polar

Q.no 56. A wireless network interface controller can work in

A : Infrastructure mode

B : Ad-hoc mode

C : Both infrastructure mode and ad-hoc mode

D : WDS mode
Q.no 57. ________one of the following is an internet standard protocol for managing devices
on IP network?

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

Q.no 58. ______ is interframe gap?

A : Idle time between frames

B : Idle time between frame bits

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : Idle time between packets

D : Idle time between networks

Q.no 59. The __________domains defines registered host according to their genneric behavior.

A : Generic

B : Country

C : Inverse

D : None of the mentioned

Q.no 60. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. security of networking is based on ____________.

A : planning

B : fundamentals

C : cryptography

D : plain text

Q.no 2. ____________is not an objective of network security?

A : Identification

B : Authentication

C : Access control

D : Lock

Q.no 3. A _____________is a number or a set of number that the algorithm uses to perform
encryption and decryption

A : ciphertext

B : plain text
C : sender
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : key

Q.no 4. ______ one of the following is not correct?

A : Application layer protocols are used by both source and destination devices during a
communication session

B : HTTP is a session layer protocol

C : TCP is an application layer protocol

D : All of the mentioned

Q.no 5. __________one of the following is an internet standard protocol for managing devices
on IP network?

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

Q.no 6. ______ of the following protocol is used for transferring electronic mail messages from
one machine to another?

A : TELNET

B : FTP

C : SNMP

D : SMTP

Q.no 7. A BSS without AP is also called as-----------architecture.

A : ad hoc

B : infrastructure

C : home

D : business

Q.no 8. The well-known port of the SMTP server is________

A : 110

B : 25

C : 50
D : 20

Q.no 9. _______one of the following algorithm is not used for congestion control?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : Traffic aware routing

B : Admission control

C : Load shedding

D : Routing information protocol

Q.no 10. Encryption Algorithm performs ________________on plain text

A : substitutions

B : transformation

C : substitutions and transformations

D : addition

Q.no 11. _______of the following is a transport layer protocol?

A : stream control transmission protocol

B : internet control message protocol

C : neighbor discovery protocol

D : dynamic host configuration protocol

Q.no 12. Mobile codes are small ______________program

A : hidden

B : simple

C : executable

D : non executable

Q.no 13. In fast ethernet implementation ---- allows 2 stations to negotiate the mode or data
rate of operation

A : negotiation

B : auto negotiation

C : does not

D : category

Q.no 14. E-mail is _________


A : Loss-tolerant application

B : Bandwidth-sensitive application

C : Elastic application

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : None of the mentioned

Q.no 15. Application layer protocol defines

A : Types of messages exchanged

B : Message format, syntax and semantics

C : Rules for when and how processes send and respond to messages

D : All of the mentioned

Q.no 16. Non adaptive routing algorithms do not based on their routing decisions on
measurements or estimates of the current_________.

A : network

B : speed

C : capacity

D : traffic and topology

Q.no 17. The first address in the block can be found by setting the_________ most 32-n bits on
Os.

A : middle

B : left

C : right

D : left corner

Q.no 18. _________is used to find logical address of a computer which knows only its
physical address.

A : ARP

B : RARP

C : IP

D : TCP

Q.no 19. IPv4 addresses are _________bits in length.

A : 28
B : 56

C : 64

D : 32

Q.no 20. Class D addresses were designed for________.


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : large organisations

B : midsize organisations

C : unicasting

D : multicasting

Q.no 21. After the message is transformed it is called as _________________

A : ciphertext

B : plain text

C : duplicate text D : original text

Q.no 22. _______one of the following event is not possible in wireless LAN?

A : Collision detection

B : Acknowledgement of data frames

C : Multi-mode data transmission

D : Connection to wired networks

Q.no 23. ____________is a technique that facilitates hiding of message that is to be kept secret
inside other messages .

A : public key cryptography

B : private key cryptography

C : steganography

D : decryption

Q.no 24. ______ language in WWW specifies a web's way by describing three-dimensional
objects?

A : HTML

B : VRML

C : XML
D : UML

Q.no 25. ____________of these is a part of network identification?

A : UserID

B : Password

C : OTP

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : Fingerprint

Q.no 26. A station with ESS transition mobility can move from---------.

A : inside a BSS

B : outside a BSS

C : one ESS Only

D : one ESS to another

Q.no 27. _________is autonegotiation?

A : A procedure by which two connected devices choose common

B : A security algorithm

C : A routing algorithm

D : Encryption algorithm

Q.no 28. Open look congestion control policies are used to prevent the congestion__________.

A : before it happens

B : after it happens

C : when it happens

D D : at the end

Q.no 29. The _______ is the interface through which a user can read and send mail.

A : Mail user agent(MUA)

B : Mail transfer agent(MTA)

C : Mail delivery agent(MDA)

D : Mail send agent(MSA)

Q.no 30. IPv4 is an _________&_________datagram protocol.

A : unreliable , connectionless
B : reliable , connection less

C : unreliable , connection oriented

D : reliable, connection oriented

Q.no 31. In virtual circuit network each packet contains

A : Full source and destination address


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : A short VC number

C : Only source address

D : Only destination address

Q.no 32. IEEE created fast ethernet standard under the name ________________________----
-.

A : 802.3

B : 802.3 F

C : 802.3 µ

D : 802.3 m

Q.no 33. The sizes of source and destination port address in TCP header are ___________
respectively.

A : 16-bits and 32-bits

B : 16-bits and 16-bits

C : 32-bits and 16-bits

D : 32-bits and 32-bits

Q.no 34. Header size of Ipv4 is_________.

A : 20-80 bytes

B : 0-20 bytes

C : 20-60 bytes

D : 20-100 bytes

Q.no 35. _______of the following routing algorithms can be used for network layer design?

A : Shortest path algorithm

B : Distance vector routing

C : Link state routing


D : All of the mentioned

Q.no 36. In wireless ad-hoc network

A : Access point is not required

B : Access point is must

C : Nodes are not required

D : All nodes are access points


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 37. Closed loop congestion control algorithm are based on_________.

A : good design

B : mid course

C : feedback loop

D : conclusion

Q.no 38. ______ is the maximum size of data that the application layer can pass on to the TCP
layer below?

A : Any size

B : 216 bytes – size of TCP header

C : 216 bytes

D : 1500

Q.no 39. A timestamp option is used to record the _________of datagram processing by a
router.

A : bytes

B : time

C : hops

D : length

Q.no 40. ___________principle states that there has to be some way of ensuring that the
received message is fresh and not duplicate

A : freshness

B : firewall

C : DNS sec D : spoofing

Q.no 41. IEEE created gigabit ethernet under the name _____________

A : 802.3a

B : 802.3b

C : 802.3d

D D : 802.3z

Q.no 42. HLEN field defines the_________.

A : total length of header


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : total length of identification

C : total length of data

D : total length of header and data

Q.no 43. Ifs max fragment bit is set to 0, it means this is the_________ fragment.

A : first

B : middle

C : only

D : second

Q.no 44. A wireless network interface controller can work in

A : Infrastructure mode

B : Ad-hoc mode

C : Both infrastructure mode and ad-hoc mode

D : WDS mode

Q.no 45. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________

A : Mutual open

B : Mutual Close

C : Simultaneous open

D : Simultaneous close

Q.no 46. In TCP, sending and receiving data is done as _______

A : Stream of bytes
B : Sequence of characters

C : Lines of data D : Packets

Q.no 47. The __________domains defines registered host according to their genneric behavior.

A : Generic

B : Country

C : Inverse

D : None of the mentioned

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 48. ______ is interframe gap?

A : Idle time between frames

B : Idle time between frame bits

C : Idle time between packets

D : Idle time between networks

Q.no 49. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion

A : 1100 to 1300

B : 800 to 1000

C : 1400 to 1600

D : 1500 to 1700

Q.no 50. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially

Q.no 51. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called

A : Short frame

B : Runt frame
C : Mini frame

D : Man frame

Q.no 52. Transport layer aggregates data from different applications into a single stream
before passing it to ____________

A : network layer

B : data link layer

C : application layer

D : physical layer

Q.no 53. ________one of the following is an internet standard protocol for managing devices
on IP network?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

Q.no 54. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________

A : Active open

B : Active close

C : Passive close

D : Passive open

Q.no 55. There are _______ the number of standard content types in MIME.

A:5

B:7

C:9

D:4

Q.no 56. In segment header, sequence number and acknowledgement number fields refer to
_______

A : Byte number

B : Buffer number

C : Segment number
D : Acknowledgment

Q.no 57. SYNC flooding attack belongs to a type of security attack known as ___________

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 58. TCP process may not write and read data at the same speed. So we need __________
for storage.

A : Packets

B : Buffers

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : Segments

D : Stacks

Q.no 59. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.

A : Session layer

B : The presentation layer

C : Application layer

D : None of the above

Q.no 60. If do not fragment date value is 1 ,the machine must_________.

A : fragment the datagram

B : not fragment the datagram

C : forward the datagram

D : not forward the datagram

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. A router is a_________ layer device.

A : two

B : one

C : three

D D : five

Q.no 2. A _______ is a server whose zone consists of the whole tree.

A : Domain server

B : Zone server

C : Root server

D : None of the above

Q.no 3. A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DNS
hierarchical tree. (The root is level one.)

A : third
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : fourth
C : fifth

D : None of the above

Q.no 4. BOOTP is defined in ____________ standard

A : RFC 951

B : RFC 960

C : RFC 989

D : RFC 955

Q.no 5. Scaternet is formed by combining various ______________

A : piconet

B : BSS

C : ESS

D : master

Q.no 6. To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.

A : Packet

B : Buffer

C : Segment

D : Acknowledgment

Q.no 7. The IEEE has subdivided tha data link layer into _____________sub layers.

A : two

B : one

C : three

D : five

Q.no 8. Network layer provides _______ addressing.

A : logical

B : physical

C : port

D : virtual

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 9. DHCP is a_________protocol.

A : dynamic

B : static

C : nutral

D : static as well as dynamic

Q.no 10. Flow control relates to the _________between a given sender and a given receiver.

A : point-to-point traffic

B : error control

C : slow down D : congestion

Q.no 11. security of networking is based on ____________.

A : planning

B : fundamentals

C : cryptography

D : plain text

Q.no 12. DNSsec introduces three new record types_____________

A : KEY record , SIG record , CERT record

B : KEY record , MIP record , CERT record

C : CERT ecord , WMP record , PIM record

D : CERT ecord , MIP record , PIM record

Q.no 13. For long message , symmetric key cryptography is _________ than asymmetric key
cryptography .

A : slow and not efficient

B : very fast and more efficient

C : unreliable

D : very reliable

Q.no 14. Confidential email message send by A to B which is accessed by C ,without the
permission or knowledge of A and B . This type of attack is called as________.

A : authentication
B : interception

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : interaction

D : introception

Q.no 15. If a host moves from one physical network to other or it wants temporary IP
____________ is useful .

A : BOOTP

B : DHCP

C : ARP

D : RARP

Q.no 16. Ten-gigabit ethernet operates only in ________________________-mode .

A : Full duplex

B : half duplex

C : mini duplex

D : auto

Q.no 17. `BOOTP is a_________protocol.

A : dynamic

B : natural

C : static

D : binding

Q.no 18. _______of the following is a transport layer protocol?

A : stream control transmission protocol

B : internet control message protocol

C : neighbor discovery protocol

D : dynamic host configuration protocol

Q.no 19. ______ one of the following is not correct?

A : Application layer protocols are used by both source and destination devices during a
communication session

B : HTTP is a session layer protocol

C : TCP is an application layer protocol


D : All of the mentioned

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 20. CRC field of 802.3 is used for-----------.

A : error correction

B : error detection

C : retransmission

D : framing

Q.no 21. Bytes of data being transferred in each connection are numbered by TCP. These
numbers start with a _________

A : Fixed number

B : Random sequence of 0’s and 1’s

C : One

D : Sequence of zero’s and one’s

Q.no 22. Fast ethernet is -------------- compatible to standard ethernet.

A : backward

B : forward

C : not

D : also

Q.no 23. Closed loop congestion control algorithm are based on_________.

A : good design

B : mid course

C : feedback loop

D : conclusion

Q.no 24. DNS records are grouped into sets called as______________

A : PP sets

B : SS sets

C : RR sets

D : mm set

Q.no 25. Network layer________frames among networks.


A : flows

B : forwards

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : routes

D : pushes

Q.no 26. IPv4 is an _________&_________datagram protocol.

A : unreliable , connectionless

B : reliable , connection less

C : unreliable , connection oriented

D : reliable, connection oriented

Q.no 27. Application layer offers _______ service.

A : End to end

B : Process to process

C : Both End to end and Process to process

D : None of the mentioned

Q.no 28. The ________ process ensures that the origin of an electronic message is correctly
identified.

A : authentication

B : integrity

C : non repudiation

D : interception

Q.no 29. E-mail is a service handled by the _______ layer.

A : Data link

B : Presentation

C : Application

D D : Session

Q.no 30. The ____________ translates internet domain and host names to IP address.

A : Domain name system

B : Routing information protocol


C : Network time protocol

D : Internet relay chat

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 31. Bridges can raise the __________________

A : collision

B : evolution

C : mode

D : bandwidth

Q.no 32. First field of 802.3 is used for-----------.

A : CRC

B : preamble

C : source address

D : length

Q.no 33. With NAT , a user using large set of addresses internally and_________ set of
addresses for outside world.

A : one or small

B : two are small

C : three or small

D : one of large

Q.no 34. In static allocation , DHCP works same as _____________ .

A : HTTP

B : ARP

C : FTP

D : BOOTP

Q.no 35. Two fundamental principles are underlying to all cryptographic systems they are
_____________________

A : redundancy and freshness

B : redundancy and firewall

C : redundancy and DNS

D : firewalls and freshness


Q.no 36. ____________is a technique that facilitates hiding of message that is to be kept secret
inside other messages .

A : public key cryptography

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : private key cryptography

C : steganography

D : decryption

Q.no 37. The protocol data unit for the transport layer in the internet stack is______

A : segment

B : message

C : datagram

D : frame

Q.no 38. _____ is a time-sensitive service?

A : File transfer

B : File download

C : E-mail

D : Internet telephony

Q.no 39. Computer security means to protect information . It deals with ___________of
unauthorized actions by users of a computer .

A : prevention & detection

B : only prevention

C : only detection

D : neither prevention nor detection

Q.no 40. A station with BSS transition mobility can move from one BSS to another, but the
movement is in----------.

A : inside a BSS

B : outside a BSS

C : one ESS Only

D : inbetween ESS

Q.no 41. A wireless network interface controller can work in


A : Infrastructure mode

B : Ad-hoc mode

C : Both infrastructure mode and ad-hoc mode

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : WDS mode

Q.no 42. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called

A : Short frame

B : Runt frame

C : Mini frame

D : Man frame

Q.no 43. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially

Q.no 44. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.

A : Session layer

B : The presentation layer

C : Application layer

D : None of the above

Q.no 45. HLEN field defines the_________.

A : total length of header

B : total length of identification

C : total length of data

D : total length of header and data

Q.no 46. In TCP, sending and receiving data is done as _______

A : Stream of bytes
B : Sequence of characters

C : Lines of data

D : Packets

Q.no 47. In segment header, sequence number and acknowledgement number fields refer to

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

_______

A : Byte number

B : Buffer number

C : Segment number

D : Acknowledgment

Q.no 48. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----

A : Manchester scheme

B : differential manchester

C : NRZ

D : Polar

Q.no 49. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion

A : 1100 to 1300

B : 800 to 1000

C : 1400 to 1600

D : 1500 to 1700

Q.no 50. Transport layer aggregates data from different applications into a single stream
before passing it to ____________

A : network layer

B : data link layer

C : application layer

D : physical layer

Q.no 51. There are _______ the number of standard content types in MIME.

A:5
B:7

C:9

D:4

Q.no 52. ________one of the following is an internet standard protocol for managing devices
on IP network?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

Q.no 53. The __________domains defines registered host according to their genneric behavior.

A : Generic

B : Country

C : Inverse

D : None of the mentioned

Q.no 54. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.

A : SMTP

B : MIME

C : POP

D : MTA

Q.no 55. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________

A : Mutual open

B : Mutual Close

C : Simultaneous open

D : Simultaneous close

Q.no 56. SYNC flooding attack belongs to a type of security attack known as ___________

A : SYNC flooding attack

B : Active attack
C : Passive attack

D : Denial-of-service attack

Q.no 57. TCP process may not write and read data at the same speed. So we need __________
for storage.

A : Packets

B : Buffers

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : Segments

D : Stacks

Q.no 58. IEEE created gigabit ethernet under the name _____________

A : 802.3a

B : 802.3b

C : 802.3d

D D : 802.3z

Q.no 59. Ifs max fragment bit is set to 0, it means this is the_________ fragment.

A : first

B : middle

C : only

D : second

Q.no 60. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. _________________firewall applies the set of rules to each packet

A : application gateway

B : packet filter

C : proxy

D : secure naming

Q.no 2. _____________one of the following is not a function of network layer?

A : Routing

B : Inter- networking

C : Congestion control

D : Error control

Q.no 3. ______ is the main advantage of UDP?

A : More overload

B : Reliable
C : Low overhead

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D D : Fast

Q.no 4. ARP protocol is used for mapping_________address to_________address.

A : logical ,physical

B : physical , logical

C : physical , port

D : logical, special

Q.no 5. Transmission control protocol ___________

A : is a connection-oriented protocol

B : uses a three way handshake to establish a connection

C : receives data from application as a single stream

D : all of the mentioned

Q.no 6. The principle of _________defeats of denying something having done it .

A : authentication

B : integrity

C : non repudiation

D : interception

Q.no 7. To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.

A : Packet

B : Buffer

C : Segment

D : Acknowledgment

Q.no 8. Class C addresses were designed for__________.

A : large organisations

B : midsize organisations

C : small organisations

D : multicasting
Q.no 9. Network layer provides _______ addressing.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : logical

B : physical

C : port

D : virtual

Q.no 10. The process of encoding plain text into cipher text message is known as
_____________

A : authentication

B : decryption

C : encryption

D : interception

Q.no 11. Network layer receive services from Data Link layer & gives services to _________.

A : application layer

B : physical layer

C : transport layer

D D : session layer

Q.no 12. In the domain name chal.atc.fhda.edu, _______ is the least specific label.

A : chal

B : atc

C : edu

D : None of the above

Q.no 13. The ______ field is used to detect errors over the entire user datagram.

A : udp header

B : checksum

C : source port

D : destination port

Q.no 14. The propose of LLC is to promote----------to upper layer protocols.

A : physical addressing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : logical addressing

C : flow and error control

D : full duplex

Q.no 15. Mobile codes are small ______________program

A : hidden

B : simple

C : executable

D : non executable

Q.no 16. ________ one of the pairs of protocols given below, both the protocols can use
multiple TCP connections between the same client and the server. Which one is that?

A : HTTP, FTP

B : HTTP, TELNET

C : FTP, SMTP

D : HTTP, SMTP

Q.no 17. Bluetooth architecture defines two types of networks________________________-.

A : BSS & ESS

B : mobile & stationary

C : piconet & scatternet

D D : master & slave

Q.no 18. ______________one of the following protocol delivers/stores mail to reciever server?

A : Simple mail transfer protocol

B : Post office protocol

C : Internet mail access protocol

D : Hypertext transfer protocol

Q.no 19. MAC address is of

A : 24 bits

B : 36 bits

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : 42 bits
D : 48 bits

Q.no 20. Bluetooth technology is defined by IEEE ______________

A : 802.3

B : 802.11

C : 802.11 µ

D : 802.15

Q.no 21. ______ is the maximum size of data that the application layer can pass on to the TCP
layer below?

A : Any size

B : 216 bytes – size of TCP header

C : 216 bytes

D : 1500

Q.no 22. If NIC of a machine is changed , its __________ address changes .

A : logical

B : port

C : actual

D : physical

Q.no 23. .--------- is minimum payload length of Ethernet frame.

A : 1500 btyes

B : 46 btyes

C : 1800 btyes

D : 4 bytes

Q.no 24. network layer receives data from the upper layers and creates its own packet by
encapsulating these packets , is known as__________.

A : fragmentation

B : logical addressing

C : intrenetworking

D D : packetizing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 25. ______of the following are transport layer protocols used in networking?
A : TCP and FTP

B : UDP and HTTP

C : TCP and UDP

D : HTTP and FTP

Q.no 26. The route that connects the the private network to their Global address uses________
private address and _________global address.

A : one,two

B : two,one

C : two,two

D : one,one

Q.no 27. Application layer offers _______ service.

A : End to end

B : Process to process

C : Both End to end and Process to process

D : None of the mentioned

Q.no 28. In wireless ad-hoc network

A : Access point is not required

B : Access point is must

C : Nodes are not required

D : All nodes are access points

Q.no 29. _______ is start frame delimeter (SFD) in ethernet frame?

A : 110101E7

B : 1101011 E 7

C:0

D : 1.1111111 E 7

Q.no 30. _____________ is Wired Equivalent Privacy (WEP)?

A : Security algorithm for ethernet

B : Security algorithm for wireless networks

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : Security algorithm usb communication

D : Security algorithm for emails

Q.no 31. Transport layer protocols deals with ____________

A : application to application communication

B : process to process communication

C : node to node communication

D : man to man communication

Q.no 32. The application, presentation, and session layers in the OSI model correspond to the
_______ layer in the TCP/IP protocol suite.

A : Application

B : Session

C : Data link

D : Transport

Q.no 33. Fast ethernet is -------------- compatible to standard ethernet.

A : backward

B : forward

C : not

D : also

Q.no 34. Bridges can raise the __________________

A : collision

B : evolution

C : mode

D : bandwidth

Q.no 35. End of the option used for_________ at the end of the option field.

A : Filler

B : seperator

C : router

D : padding

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 36. Two fundamental principles are underlying to all cryptographic systems they are
_____________________

A : redundancy and freshness

B : redundancy and firewall

C : redundancy and DNS

D : firewalls and freshness

Q.no 37. The message must be encrypted at the _________ site .

A : sender

B : receiver

C : intermediate

D : anywhere

Q.no 38. _________is autonegotiation?

A : A procedure by which two connected devices choose common

B : A security algorithm

C : A routing algorithm

D : Encryption algorithm

Q.no 39. DNS server maintenance the mapping the mapping between domain names and
corresponding ___________

A : physical addresses

B : IP addresses

C : passive networks

D : website

Q.no 40. _______ of the following is not correct in relation to multi-destination routing?

A : Is same as broadcast routing

B : Contains the list of all destinations

C : Data is not sent by packets

D : There are multiple receivers

Q.no 41. HLEN field defines the_________.

A : total length of header

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : total length of identification

C : total length of data

D : total length of header and data

Q.no 42. The TCP/IP__________ corresponds to the combined session, presentation, and
application layers of the OSI model.

A : Session layer

B : The presentation layer

C : Application layer

D : None of the above

Q.no 43. If do not fragment date value is 1 ,the machine must_________.

A : fragment the datagram

B : not fragment the datagram

C : forward the datagram

D : not forward the datagram

Q.no 44. SYNC flooding attack belongs to a type of security attack known as ___________

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 45. Ifs max fragment bit is set to 0, it means this is the_________ fragment.

A : first

B : middle

C : only

D : second

Q.no 46. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : increases quadratically
D : increases exponentially

Q.no 47. ________one of the following is an internet standard protocol for managing devices
on IP network?

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

Q.no 48. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion

A : 1100 to 1300

B : 800 to 1000

C : 1400 to 1600

D : 1500 to 1700

Q.no 49. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----

A : Manchester scheme

B : differential manchester

C : NRZ

D : Polar

Q.no 50. In TCP, sending and receiving data is done as _______

A : Stream of bytes

B : Sequence of characters

C : Lines of data

D : Packets

Q.no 51. A wireless network interface controller can work in

A : Infrastructure mode

B : Ad-hoc mode

C : Both infrastructure mode and ad-hoc mode

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : WDS mode
Q.no 52. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 53. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.

A : SMTP

B : MIME

C : POP

D : MTA

Q.no 54. The __________domains defines registered host according to their genneric behavior.

A : Generic

B : Country

C : Inverse

D : None of the mentioned

Q.no 55. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________

A : Mutual open

B : Mutual Close

C : Simultaneous open

D : Simultaneous close

Q.no 56. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called

A : Short frame

B : Runt frame

C : Mini frame

D : Man frame

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 57. Transport layer aggregates data from different applications into a single stream
before passing it to ____________

A : network layer

B : data link layer

C : application layer

D : physical layer

Q.no 58. There are _______ the number of standard content types in MIME.

A:5

B:7

C:9

D:4

Q.no 59. IEEE created gigabit ethernet under the name _____________

A : 802.3a

B : 802.3b

C : 802.3d

D D : 802.3z

Q.no 60. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. ______ is the main advantage of UDP?

A : More overload

B : Reliable

C : Low overhead

D : Fast

Q.no 2. Virtual circuit requires_________.

A : setup time

B : no setup time

C : virtual time

D : future time

Q.no 3. Copyright is a form of ____________protection

A : intellectual property

B : private property

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : public property

D : own property

Q.no 4. _______of the following is a transport layer protocol?

A : stream control transmission protocol

B : internet control message protocol

C : neighbor discovery protocol

D : dynamic host configuration protocol

Q.no 5. Censorship is about government and organisations wanting to restrict what people
can___________

A : do

B : do not

C : publish and read

D : speak

Q.no 6. 10 Base2 also known as _____________

A : thick ethernet

B : twist ethernet

C : thin ethernet

D : shield ethernet

Q.no 7. 10 Base T uses ________________________ -.

A : Star Topology

B : Bus Topology

C : Ring Topology

D : Mesh Topology

Q.no 8. ______ of the following protocol is used for transferring electronic mail messages from
one machine to another?

A : TELNET

B : FTP

C : SNMP

D : SMTP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 9. 10 Base F uses ________________________ -.

A : Mesh Topology

B : Ring Topology

C : Bus Topology

D : Star Topology

Q.no 10. In ____________ same key is used by sender for encryption & by receiver for decryption
.

A : asymmetric key cryptography

B : symmetric key cryptography

C : manual key

D : session

Q.no 11. Sender hardware address field in ARP defines_________.

A : physical address of sender

B : physical address in receiver

C : logical address of sender

D : logical address of receiver

Q.no 12. The process of encoding plain text into cipher text message is known as
_____________

A : authentication

B : decryption

C : encryption

D : interception

Q.no 13. Class A addresses were designed for__________.

A : large organisations

B : midsize organisations

C : small organisations

D : multicasting

Q.no 14. To solve the address depletion problem and give more organisation access to
internet,_________ addressing was designed and implemented.
A : classful
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : classless

C : subnetting

D : supernetting

Q.no 15. `BOOTP is a_________protocol.

A : dynamic

B : natural

C : static

D : binding

Q.no 16. In the domain name chal.atc.fhda.edu, _______ is the most specific label

A : chal

B : atc

C : fhda

D : None of the above

Q.no 17. Router's memory requirements are____________ in datagram subnet.

A : less

B : appropriate

C : more

D : very very less

Q.no 18. A VLAN is a -------------- group of workstations,serversand network devices

A : physical

B : actual

C : virtual

D : logical

Q.no 19. A host with the domain name pit.arc.nasa.gov. is on the _______ level of the DNS
hierarchical tree. (The root is level one.)

A : third

B : fourth
C : fifth

D : None of the above


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 20. E-mail is _________

A : Loss-tolerant application

B : Bandwidth-sensitive application

C : Elastic application

D : None of the mentioned

Q.no 21. ___________is a device usually a computer or router sits between the internal
network of organisation and rest of the internet

A : Bridge

B : repeater

C : gateway

D : firewall

Q.no 22. A source address is always a-----------address.

A : broadcast

B : multicast

C : unicast

D : anycast

Q.no 23. Full duplex mode of ethernet has the ability to send and receive data at
____________

A : same time

B : different time

C : any time

D : none

Q.no 24. In _________ resolution, the resolver expects the server to supply the final answer

A : Iterative

B : Recursive

C : Straight

D : None of the above

Q.no 25. _____ is a time-sensitive service?

A : File transfer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : File download

C : E-mail

D : Internet telephony

Q.no 26. A station with BSS transition mobility can move from one BSS to another, but the
movement is in----------.

A : inside a BSS

B : outside a BSS

C : one ESS Only

D : in between ESS

Q.no 27. Proxy ARP increases the amount of ARP traffic .State True or false

A : TRUE

B : FALSE

C : not known

D : may be

Q.no 28. .--------- is minimum payload length of Ethernet frame.

A : 1500 btyes

B : 46 btyes

C : 1800 btyes

D : 4 bytes

Q.no 29. The Application Layer is ______________number of layer of the Internet model

A:5

B:4

C:3

D:2

Q.no 30. IEEE created fast ethernet standard under the name ________________________----
-.

A : 802.3

B : 802.3 F

C : 802.3 µ
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : 802.3 m

Q.no 31. Network layer provides____________ connection between different networks.

A : actual

B : physical

C : logical

D : no

Q.no 32. The transport layer protocols used for real time multimedia, file transfer, DNS and
email, respectively are:

A : TCP, UDP, UDP and TCP

B : UDP, TCP, TCP and UDP

C : UDP, TCP, UDP and TCP

D : TCP, UDP, TCP and UDP

Q.no 33. Transposition ciphers also perform some ______________ over to the plaintext
alphabet

A : transformation

B : permutation

C : addition

D : subtraction

Q.no 34. IPv4 is an _________&_________datagram protocol.

A : unreliable , connectionless

B : reliable , connection less

C : unreliable , connection oriented

D : reliable, connection oriented

Q.no 35. ____________is a technique that facilitates hiding of message that is to be kept secret
inside other messages .

A : public key cryptography

B : private key cryptography

C : steganography

D : decryption

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 36. The ________ process ensures that the origin of an electronic message is correctly
identified.

A : authentication

B : integrity

C : non repudiation

D : interception

Q.no 37. Header size of Ipv4 is_________.

A : 20-80 bytes

B : 0-20 bytes

C : 20-60 bytes

D : 20-100 bytes

Q.no 38. _____________ mechanism helps to establish proof of identities

A : authentication

B : integrity

C : confidentiality

D : non repudiation

Q.no 39. In asymmetric key cryptography we need __________ key.

A : single

B : pair

C : three

D : no

Q.no 40. Periodic updates o adrresses in static table is _______________ .

A : not feasible

B : feasible

C : highly impossible

D : done
Q.no 41. The server program tells its TCP that it is ready to accept a connection. This process
is called ___________

A : Active open

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : Active close

C : Passive close

D : Passive open

Q.no 42. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.

A : SMTP

B : MIME

C : POP

D : MTA

Q.no 43. TCP process may not write and read data at the same speed. So we need __________
for storage. A : Packets

B : Buffers

C : Segments

D : Stacks

Q.no 44. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----

A : Manchester scheme

B : differential manchester

C : NRZ

D : Polar

Q.no 45. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially
Q.no 46. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called

A : Short frame

B : Runt frame

C : Mini frame
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : Man frame

Q.no 47. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially

Q.no 48. A wireless network interface controller can work in

A : Infrastructure mode

B : Ad-hoc mode

C : Both infrastructure mode and ad-hoc mode

D : WDS mode

Q.no 49. SYNC flooding attack belongs to a type of security attack known as ___________

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 50. If do not fragment date value is 1 ,the machine must_________.

A : fragment the datagram

B : not fragment the datagram

C : forward the datagram

D : not forward the datagram

Q.no 51. ________one of the following is an internet standard protocol for managing devices
on IP network?

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 52. Ifs max fragment bit is set to 0, it means this is the_________ fragment.

A : first

B : middle

C : only

D : second

Q.no 53. HLEN field defines the_________.

A : total length of header

B : total length of identification

C : total length of data

D : total length of header and data

Q.no 54. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________

A : Mutual open

B : Mutual Close

C : Simultaneous open

D : Simultaneous close

Q.no 55. The __________domains defines registered host according to their genneric behavior.

A : Generic

B : Country

C : Inverse

D : None of the mentioned

Q.no 56. Transport layer aggregates data from different applications into a single stream
before passing it to ____________

A : network layer

B : data link layer


C : application layer

D : physical layer

Q.no 57. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 58. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion A :
1100 to 1300

B : 800 to 1000

C : 1400 to 1600

D : 1500 to 1700

Q.no 59. IEEE created gigabit ethernet under the name _____________

A : 802.3a

B : 802.3b

C : 802.3d

D : 802.3z

Q.no 60. In TCP, sending and receiving data is done as _______

A : Stream of bytes

B : Sequence of characters

C : Lines of data

D : Packets
E

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Seat No Total number of questions : 60


12737 _CS 343 COMPUTER NETWORKS II
Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. IEEE 802.11 standard is known for--------- LANs.

A : wired

B : all

C : wireless

D : bluetooth

Q.no 2. Firewalls are controlling _______________Communications

A : inbound

B : outbound

C : inbound and outbound

D : all

Q.no 3. In wireless LAN collision may not be detected because of -------.

A : mechanism not available

B : hidden station problem


C : CSMA/CD

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 1/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : DIFS

Q.no 4. E-mail is _________

A : Loss-tolerant application

B : Bandwidth-sensitive application

C : Elastic application

D : None of the mentioned

Q.no 5. The first address in the block can be found by setting the_________ most 32-n bits on
Os.

A : middle

B : left

C : right

D : left corner

Q.no 6. __________one of the following is an internet standard protocol for managing devices
on IP network?

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

Q.no 7. Ethernet frame consists of

A : MAC address

B : IP address

C : Default mask

D : Network address

Q.no 8. A is a TCP name for a transport service access point.

A : Port

B : Pipe

C : Node

D : Protocol
Q.no 9. ______ one of the following is not correct?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 2/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : Application layer protocols are used by both source and destination devices during a
communication session

B : HTTP is a session layer protocol

C : TCP is an application layer protocol

D : All of the mentioned

Q.no 10. When the contents of a message are changed after the sender sends it but before it
reaches the intended recipient the __________ of a message is lost.

A : authentication

B : non repudiation

C : integrity

D : meaning

Q.no 11. _________________firewall applies the set of rules to each packet

A : application gateway

B : packet filter

C : proxy

D : secure naming

Q.no 12. If A is replaced by D , B by E , C by F and so on then NASHIk becomes _______

A : QDVKLN

B : ABZYM

C : QANMP

D : MEGAB

Q.no 13. Bluetooth technology is defined by IEEE ______________

A : 802.3

B : 802.11

C : 802.11 µ

D : 802.15

Q.no 14. Flow control relates to the _________between a given sender and a given receiver.

A : point-to-point traffic
B : error control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 3/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : slow down D : congestion

Q.no 15. Gigabit ethernet operates at________________________.

A : 10 mbps

B : 100 mbps

C : 50 mbps

D : 1000 mbps

Q.no 16. In classful addressing ,the address space is divided into_________ class.

A : five

B : four

C : two

D : three

Q.no 17. Ten-gigabit ethernet operates only in ________________________-mode .

A : Full duplex

B : half duplex

C : mini duplex

D : auto

Q.no 18. IPv4 addresses are _________bits in length.

A : 28

B : 56

C : 64

D : 32

Q.no 19. When a plain text message is codified using suitable scheme , the resulting message is
known as __________.

A : plain text

B : clear text

C : cipher text
D : normal text

Q.no 20. In asymmetric key cryptography __________ key is known to all.

A : private
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 4/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : session

C : symmetric

D : public

Q.no 21. _____ is a time-sensitive service?

A : File transfer

B : File download

C : E-mail

D : Internet telephony

Q.no 22. In wireless ad-hoc network

A : Access point is not required

B : Access point is must

C : Nodes are not required

D : All nodes are access points

Q.no 23. Application layer offers _______ service.

A : End to end

B : Process to process

C : Both End to end and Process to process

D : None of the mentioned

Q.no 24. If NIC of a machine is changed , its __________ address changes .

A : logical

B : port

C : actual

D : physical

Q.no 25. Application layer protocol defines ____________

A : Types of messages exchanged


B : Message format, syntax and semantics

C : Rules for when and how processes send and respond to messages

D : All of the mentioned

Q.no 26. Packets of the same session may be routed through different paths in
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 5/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : TCP, but not UDP

B : TCP and UDP

C : UDP, but not TCP

D : Neither TCP, nor UDP

Q.no 27. The sizes of source and destination port address in TCP header are ___________
respectively.

A : 16-bits and 32-bits

B : 16-bits and 16-bits

C : 32-bits and 16-bits

D : 32-bits and 32-bits

Q.no 28. Full duplex mode of ethernet has the ability to send and receive data at
____________

A : same time

B : different time

C : any time

D : none

Q.no 29. Bridges can raise the __________________

A : collision

B : evolution

C : mode

D : bandwidth

Q.no 30. In static allocation , DHCP works same as _____________ .

A : HTTP

B : ARP

C : FTP
D : BOOTP

Q.no 31. IP is also called as_________.

A : effortless delivery

B : worst effort delivery

C : best effort delivery


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 6/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : no delivery

Q.no 32. _______one of the following event is not possible in wireless LAN?

A : Collision detection

B : Acknowledgement of data frames

C : Multi-mode data transmission

D : Connection to wired networks

Q.no 33. Full duplex ethernet increase the capacity of domain from _____________in standard
ethernet.

A : 10mbps to 20mbps

B : 10mbps to 100mbps

C : 1mbps to 10mbps

D : 10mbbs to 1000mbps

Q.no 34. _____________ mechanism helps to establish proof of identities

A : authentication

B : integrity

C : confidentiality

D : non repudiation

Q.no 35. A station with no transition mobility is either stationary or moving only ________

A : inside a BSS

B : outside a BSS

C : inside ESS

D : outside ESS

Q.no 36. .--------- is maximum payload length of Ethernet frame.


A : 1500 btyes

B : 46 btyes

C : 1800 btyes

D : 1518 bytes

Q.no 37. A client that wishes to connect to an open server tells its TCP that it needs to be
connected to that particular server. The process is called ___________

A : Active open
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 7/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

B : Active close

C : Passive close

D : Passive open

Q.no 38. _______is the access point (AP) in a wireless LAN?

A : Device that allows wireless devices to connect to a wired network

B : ireless devices itself

C : Both device that allows wireless devices to connect to a wired network and wireless devices itself

D : All the nodes in the network

Q.no 39. Open look congestion control policies are used to prevent the congestion__________.

A : before it happens

B : after it happens

C : when it happens

D : at the end

Q.no 40. _____________ does an HTTP status code of "404" mean?

A : Document has moved

B : Successful document retrieval

C : Protocol error

D : Document not found

Q.no 41. SYNC flooding attack belongs to a type of security attack known as ___________

A : SYNC flooding attack

B : Active attack
C : Passive attack

D : Denial-of-service attack

Q.no 42. ______ is interframe gap?

A : Idle time between frames

B : Idle time between frame bits

C : Idle time between packets

D : Idle time between networks

Q.no 43. HLEN field defines the_________.


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 8/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

A : total length of header

B : total length of identification

C : total length of data

D : total length of header and data

Q.no 44. If do not fragment date value is 1 ,the machine must_________.

A : fragment the datagram

B : not fragment the datagram

C : forward the datagram

D : not forward the datagram

Q.no 45. The __________domains defines registered host according to their genneric behavior.

A : Generic

B : Country

C : Inverse

D : None of the mentioned

Q.no 46. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window

A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially

Q.no 47. Transport layer aggregates data from different applications into a single stream
before passing it to ____________

A : network layer

B : data link layer

C : application layer

D : physical layer

Q.no 48. In TCP, sending and receiving data is done as _______

A : Stream of bytes

B : Sequence of characters

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 9/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

C : Lines of data

D : Packets

Q.no 49. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is
called

A : Short frame

B : Runt frame

C : Mini frame

D : Man frame

Q.no 50. IEEE created gigabit ethernet under the name _____________

A : 802.3a

B : 802.3b

C : 802.3d

D D : 802.3z

Q.no 51. ________one of the following is an internet standard protocol for managing devices
on IP network?

A : Dynamic host configuration protocol

B : Simple network management protocol

C : Internet message access protocol

D : Media gateway protocol

Q.no 52. There are _______ the number of standard content types in MIME.
A:5

B:7

C:9

D:4

Q.no 53. In segment header, sequence number and acknowledgement number fields refer to
_______

A : Byte number

B : Buffer number

C : Segment number

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 10/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

D : Acknowledgment

Q.no 54. ________ is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.

A : SMTP

B : MIME

C : POP

D : MTA

Q.no 55. TCP process may not write and read data at the same speed. So we need __________
for storage. A : Packets

B : Buffers

C : Segments

D : Stacks

Q.no 56. Let the size of congestion window of a TCP connection be 32 KB when a timeout
occurs. The round trip time of the connection is 100 msec and the maximum segment size used
is 2 KB. The time taken (in mse by the TCP connection to get back to 32 KB congestion

A : 1100 to 1300

B : 800 to 1000

C : 1400 to 1600

D : 1500 to 1700

Q.no 57. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
A : does not increase

B : increases linearly

C : increases quadratically

D : increases exponentially

Q.no 58. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________

A : Mutual open

B : Mutual Close

C : Simultaneous open

D : Simultaneous close

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 11/12
21/10/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1

Q.no 59. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?

A : SYNC flooding attack

B : Active attack

C : Passive attack

D : Denial-of-service attack

Q.no 60. In standard ethernet implementation sender converts data into a digital signal by
using the________________________-----

A : Manchester scheme

B : differential manchester

C : NRZ

D : Polar

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=2771&code=1052000&showTest=2371&actForm=edit&set=1 12/12

You might also like