Professional Documents
Culture Documents
Services- Performance - IPV4 addresses - Classful Addressing- Classless Addressing- DHCP- ICMP- IGMP-
IPV6- Routing algorithm - Distance-Vector Routing- Link-State Routing - Unicasting - RIP- OSPF. Multicast
routing DVMRP- PIM.
3) Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
7) The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
Explanation: TTL stands for Time to Live. This field specifies the life of the IP packet based on the number of
hops it makes (Number of routers it goes through). TTL field is decremented by one each time the datagram is
processed by a router. When the value is 0, the packet is automatically destroyed.
8)If the value in protocol field is 17, the transport layer protocol used is _____________
a) TCP
b) UDP
c) ICMP
d) IGMP
Explanation: The protocol field enables the demultiplexing feature so that the IP protocol can be used to carry
payloads of more than one protocol type. Its most used values are 17 and 6 for UDP and TCP respectively. ICMP
and IGMP are network layer protocols.
10. In classless addressing, there are no classes but addresses are still granted in ______
a) IPs
b) Blocks
c) Codes
d) Sizes
15) The computation of the shortest path in OSPF is usually done by ____________
a) Bellman-ford algorithm
b) Routing information protocol
c) Dijkstra’s algorithm
d) Distance vector routing
18)In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________
a) Graph
b) Tree
c) Network
d) Link
19)In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________
a) Gaps
b) Loops
c) Holes
d) Links
23) The main reason for transition from IPv4 to IPv6 is _________
a) Huge number of systems on the internet
b) Very low number of system on the internet
c) Providing standard address
d) To provide faster internet
25) The correct format of packet in tunnel that uses IPv4 region is ________
i. IPv6 header
ii. Payload
iii. IPv4 header
a) iii-i-ii
b) iii-ii-i
c) i-ii-iii
d) i-iii-ii
26) Header translation uses ___________ to translate an IPv6 address to an IPv4 address.
a) IP address
b) Physical address
c) Mapped address
d) MAC address
27) You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address,
subnet address, and broadcast address?
a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
Explanation: We know that the prefix 172 lies in class B (128 to 191) of IPv4 addresses. From the subnet mask,
we get that the class is divided into 2 subnets: 172.16.13.0 to 172.16.13.127 and 172.16.13.128 to 172.16.13.255.
The IP 172.16.13.5 lies in the first subnet. So the starting address 172.16.13.0 is the subnet address and last address
172.16.13.127 is the broadcast address.
28) Which of the following is the broadcast address for a Class B network ID using the default subnet mask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
Explanation: In this case, the class B network ID is 172.16.0.0. We know that the default mask of a class B
network is 255.255.0.0. If we OR any address in a network with the complement of the default mask
(0.0.255.255), we get the broadcast address of the network. In this case, the result of OR would be
172.16.255.255.
29) You type debug IP RIP on your router console and see that 172.16.10.0 is being advertised to you with a
metric of 16. What does this mean?
a) The route is 16 hops away Debug IP RIP
b) The route has a delay of 16 microseconds Debug IP route
c) The route is inaccessible
d) The route is queued at 16 messages a second
Explanation: You cannot have 16 hops on a RIP network by default, because the max default hops possible is
15. If you receive a route advertised with a metric of 16, this means it is inaccessible.
30) Which protocol gives a full route table update every 30 seconds?
a) IEGRP
b) RIP
c) ICMP
d) IP
32) DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
35) DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Uniform Resource Locator (URL)
d) None of the mentioned
a) Bellman-ford algorithm
b) Routing information protocol
c) Link State Routing
d) Distance vector routing
42) Which of the following is not a mechanism that DHCP supports for IP address allocation?
A) Automatic allocation
B) Static allocation
C) Dynamic allocation
D) Manual allocation
45) A one-to-all communication between one source and all hosts on a network is classified as a ………
A. unicast
B. multicast
C. broadcast
D. point to point
46)A ………. routing table is updated periodically using one of the dynamic routing protocols.
A. static
B. dynamic
C. hierarchical
D. non static
Services - Connectionless and Connection - Oriented Protocols - Port Numbers- UDP- TCP: Flow Control-
Error Control- TCP Congestion control- QoS -Token bucket and Leaky bucket.
Explanation: De-multiplexing is the delivering of received segments to the correct application layer processes
at the recipients end using UDP. Error checking is done through checksum in UDP.
8) The port number is “ephemeral port number”, if the source host is _______
a) NTP
b) Echo
c) Server
d) Client
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in Windows Operating System.
Ephemeral port numbers are short-lived port numbers which can be used for clients in a UDP system where there
are temporary clients all the time.
13) The sizes of source and destination port address in TCP header are ___________ respectively.
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
Explanation: All port addresses are of 16 bits and they specify the type of service being used by the network
entity. For example, port 21 is used for FTP connections and port 25 is used for ICMP connections.
15) The technique in which a congested node stops receiving data from the immediate upstream node or nodes
is called as _______
a) Admission policy
b) Backpressure
c) Forward signalling
d) Backward signalling
16) The packet sent by a node to the source to inform it of congestion is called _______
a) Explicit
b) Discard
c) Choke packet
d) Backpressure
17) In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a
threshold.
a) exponentially
b) additively
c) multiplicatively
d) suddenly
18) In the congestion avoidance algorithm, the size of the congestion window increases ____________ until
congestion is detected.
a) exponentially
b) additively
c) multiplicatively
d) suddenly
20) ………… is designed for the connection oriented protocol such as Transmission Control Protocol(TCP).
A. Berkeley socket
B. Stream socket
C. Datagram socket
D. Raw socket
21) A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the
A. Data Rate
B. Average Rate
C. Traffic Rate
D. Traffic Shaping
A. 1
B. 0
C.-1
D. 2
23) In QoS techniques, packets wait in a buffer (queue) until the node is ready to process them in
A. Out-of-Order Ones
B. Last in First Out
C. First-in First out
D. First in Last out
24) A mechanism to control the amount and the rate of the traffic sent to the network is called
A. Traffic Shaping
B. Traffic Flow
C. Traffic Control
D. Traffic Congestion
25) In Quality Service, Jitter is the variation in delay for packets belonging to the
A. Protocol Flow
B. Same flow
C. Parallel flow
D. Both A and C
26) The _______ bucket algorithm allows idle hosts to accumulate credit for the future in the form of tokens.
A. Token
B. Leaky
C. Both A and B
D. Either A or B
27) In the ___________ algorithm of TCP, the size of the threshold is dropped to one-half, a multiplicative
decrease.
A. slow-start
B. congestion avoidance
C. congestion detection
D. none of the above
28) _________ is a characteristic that a flow needs. Lack of it means losing a packet or acknowledgment, which
entails retransmission.
A. Reliability
B. Delay
C. Jitter
D. Bandwidth
29) The ________ is a function of three values: average data rate, peak data rate, and maximum burst size.
32)TCP is a……………protocol
A. stream oriented
B. message oriented
C. block oriented
D. none of the above
33)Communication in TCP is
A. half duplex
B. full duplex
C. simplex
D. none of the above
36)The connection establishment procedure in TCP is susceptible to a security problem called the -------- attack.
A. ACK flooding
B. SYN flooding
C. FIN flooding
D. none of the above
37)If a segment carries data along with the acknowledgement then it is known as
A. piggybacking
B. piggy packing
C. forward packing
D. both A and B
38)TCP uses ----------------- mechanism to check the safe and sound arrival of data
A. acknowledgement mechanism
B. out of band signalling
C. services of another protocol
D. none of the above
40)In a network, when the load is much less than the capacity of the network, the delay is
A. at maximum
B. at constant
C. at minimum
D. none of the above
42)The ports ranging from 49,152 to 65,535 can be used as private port numbers. These are called as
A. well known
B. registered
C. dynamic
D. none of the above
43)The local host and remote host are identified using IP address. To define processes, we need second set of
identifiers called
A. UDP address
B. transport address
C. both A and B
D. port address
45)In ------------Congestion Control, the mechanisms are used to alleviate the congestion after it happens
A. Open Loop
B. Closed Loop
C. either A or B
D. none of the above
46) An endpoint of an inter-process communication flow across a computer network is called __________
a) socket
b) pipe
c) port
d) machine
47)Which of the following is a transport layer protocol? (Apart from TCP and UDP)
a) stream control transmission protocol
b) internet control message protocol
c) neighbour discovery protocol
d) dynamic host configuration protocol
48) TCP process may not write and read data at the same speed. So we need __________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
49) Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a
_________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
Explanation: One might expect the sequence number of the first byte in the stream to be 0, or 1. But that does
not happen in TCP, Instead, the sender has to choose an Initial Sequence Number (ISN), which is basically a
random 32 bit sequence of 0’s and 1’s, during the connection handshake.
50) In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is
___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
Explanation: In simultaneous open situation, two nodes send an SYN signal to each other and start a TCP
connection. Here, both TCP nodes transmit a SYNC+ACK segment to each other and a connection is established
between them. This doesn’t happen usually, because both sides have to know which port on the other side to send
to.
UNIT V
4.E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
7.To deliver a message to the correct application program running on a host, the _______ address must be
consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
Explanation: IP address lets you know where the network is located. Whereas MAC address is a unique
address for every device. Port address identifies a process or service you want to carry on.
12.Which protocol is a signaling communication protocol used for controlling multimedia communication
sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) resource reservation protocol
14.When displaying a web page, the application layer uses the _____________
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
16.The time taken by a packet to travel from client to server and then back to the client is called __________
a) STT
b) RTT
c) PTT
d) JTT
26.When the sender and the receiver of an email are on different systems, we need only _________
a) One MTA
b) Two UAs
c) Two UAs and one MTA
d) Two UAs and two MTAs
33. If a server has no clue about where to find the address for a hostname then _______
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
34.Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
40.Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TLS)
c) explicit congestion notification (ECN)
d) resource reservation protocol
41.If end to end connection is done at a network or IP level, and if there are N hosts, then what is the number of
keys required?
a) N(N-1)/2
b) N
c) N(N+1)/2
d) N/2
Explanation: The number of keys required would be N(N-1)/2, similar to that of a mesh topology network
connection (each node is connection line requires a key).
43.“Meet in the middle attack” and “man in the middle attack” are the same.
a) True
b) False