You are on page 1of 16

Seat No -

Total number of questions : 60

PWD10277_COMPUTER NETWORK TECHNOLOGY


Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. DSR algortihm is ----

A : Proactive Routing protocol

B : Hybrid Routing Protocol

C : Link state Protocol

D : Reactive Routing protocol

Q.no 2. Which of the following is present in both an HTTP request line and a
status line?

A : HTTP version number

B : URL
C : Status Code

D : Error Code

Q.no 3. To deliver a message to the correct application program running on a


host, the _______ address must be consulted.

A : IP

B : MAC

C : PORT

D : URL

Q.no 4. UDP is a ________________ protocol

A : connectionless, reliable

B : connectionless, unreliable

C : connection-oriented, reliable

D : connection-oriented, unreliable

Q.no 5. If a segment carries an acknowledgment along with data, this is called


_______________________.

A : backpacking

B : backpigging

C : piggybacking

D : piggypacking

Q.no 6. Which routing method best describes BGP?

A : Distance vector

B : Path-vector

C : Hybrid of link-state and distance vector

D : Link-state
Q.no 7. Open Shortest Path First (OSPF) is also called as __________

A : Link state protocol

B : Correction protocol

C : Routing information protocol

D : Border gateway protocol

Q.no 8. WiMAX stands for ___________

A : wireless maximum
communication

B : worldwide interoperability
for microwave access

C : worldwide international standard for microwave access

D : wireless internet maximum


communication

Q.no 9. The ____________ translates internet domain and host names to IP address.

A : domain name system

B : routing information protocol

C : network time protocol

D : internet relay chat

Q.no 10. The network layer protocol for internet is _______________

A : Ethernet

B : Internet protocol

C : Hypertext transfer protocol

D : File transfer protocol

Q.no 11. Which is not a application layer protocol?

A : HTTP
B : TCP

C : POP3

D : SMTP

Q.no 12. Which among the following wave is not employed in case of remote
sensing?

A : X-ray

B : Visible ray

C : Thermal IR

D : Radio waves

Q.no 13. The ports ranging from 1024 to 49,151 can be used as temporary port
numbers. They are known as _______________________ ports.

A : dynamic

B : registered

C : static

D : Well-known

Q.no 14. NFV stands For------------------------------------

A : Network Function Visualization

B : Network Foundation Virtualization

C : Network Function Virtualization

D : none of the above

Q.no 15. Which of the following mechanism do not impact propagation in wireless
communication system?

A : Reflection

B : Diffraction

C : Scattering
D : Refraction

Q.no 16. Here are the types of AdHoc networks except:

A : MANET

B : VANET

C : LAN

D : All of them

Q.no 17. What is the access point (AP) in a wireless LAN?

A : device that allows wireless devices to connect to a wired network

B :  wireless devices itself

C : both device that allows wireless devices to connect to a wired network and wireless
devices itself

D : all the nodes in the network

Q.no 18. The period of a satellite, the time required for a satellite to make a
complete trip around the Earth, is determined by _________ law.

A : Kepler's

B : Newton's

C : Ohm's

D : none of the above

Q.no 19. ________________________ term is used for routing inside an autonomous


system.

A : Interdomain

B : Inter System

C : Intra domain

D : Intra System

Q.no 20. Wireless Sensor Network (WSN) is an-----------------------


A : Infrastructure wireless network

B : infrastructure-less wireless network and infrastructure- wireless network

C : infrastructure-less wireless network

D : none of the above

Q.no 21. -----------is one of the most well-known and widely used protocols for
communication between Data Plane and Control Plane in an SDN

A : Open flow

B : RBAC

C : NFV

D : none of the above

Q.no 22. The combination of an IP address and a port number is called a


____________.

A : application address

B : network address

C : socket address

D : transport address

Q.no 23. What is the routing algorithm used in MANETs?

A : Shortest Path First

B : Routing Information Protocol

C : Distance Vector Protocol

D : Ad hoc On -demand Distance Vector Protocol

Q.no 24. Following are the types of routing on MANET, except:

A : Proactive Routing

B : Hybrid Routing
C : HyperActive Routing

D : Reactive Routing

Q.no 25. There is (are) _____ orbit(s) for a GEO satellite.

A : one

B : two

C : many

D : none of the above

Q.no 26. --------------------has defined the Open Flow standard, which defines direct
access to the forwarding plane of a switch or router, whether physical or virtual

A : SDN

B : Open Networking Foundation

C : RBAC

D : None of above

Q.no 27. ICMP is primarily used for _____________

A : Error and diagnostic functions

B : Addressing

C : Forwarding

D : Routing

Q.no 28. The header length of an IPv6 datagram is

A : 10 bytes

B : 40 bytes

C : 25 bytes

D : 30 bytes
Q.no 29. In SMTP header field, ............. is a summary of the message being sent
which is specified by the sender.

A : Reply-to

B : Return-path

C : Subject

D : From

Q.no 30. Which of the follwoing is hybrid routnin protocol in manet

A : AODV

B : DSR

C : DSDV

D : ZRP

Q.no 31. Which among the following are uncontrolled and un-registered form of
ephemeral ports in accordance to Internet Assigned Numbers Authority (IANA)

A : Well known Ports

B : Registered Ports

C : Dynamic Ports

D : Serial Ports

Q.no 32. A network management system can be divided into ______________

A : Three categories

B : Five broad categories

C : Seven broad categories

D : Ten broad categories

Q.no 33. In IEEE 802.16, On the downlink, data to the SS is multiplexed using _____,
and on the uplink, the medium is shared by the SSs using ____.

A : TDM, TDMA
B : TDM, CDMA

C : FDM, TDMA

D : FDM, CDMA

Q.no 34. in DSR protocol RREQ message is -----

A : Multicast

B : Single destination

C : Broadcast

D : none of the above

Q.no 35. The SNR advantage of the denser sensor network is given
by________________

A : nsnr=20logk

B : nsnr=10logk

C : nsnr=30logk

D : none of the above

Q.no 36. The processes that keep track of hosts whose home is in the area, but
who currently visiting another area is ……………..

A : Home agent

B : Mobile agent

C : Foreign agent

D : User agent

Q.no 37. In wireless ad-hoc network _________

A :  access point is not required

B :  access point is must

C : nodes are not required


D : all nodes are access points

Q.no 38. Small scale fading describes _____ fluctuations and Large scale fading
describes _____ fluctuations of the amplitude, phases or multipath delays of signal.

A : Rapid, Slow

B : Slow, Rapid

C : Instantaneous, Different

D : No, No

Q.no 39.  In a/an ............ of DNS resolver, the queried name server can return the
best answer it currently has back to the DNS resolver.

A : Reverse queries

B : Recursive queries

C : Iterative queries

D : Inverse queries

Q.no 40. What is the type of network in which the topology change from time to
time?

A : Cell Network

B : MANET

C : Wi-Fi

D : LAN

Q.no 41. Write acoustic sensing case in a two-dimensional plane, the SNR is given
by a: ------------------------------

A : SNR=10logPsource+10logPnoise+20logr

B : SNR=10logPsource-10logPnoise-20logr

C : SNR=10logPsource+10logPnoise-20logr

D : none of the above


Q.no 42. An Example of Proactive routing algorithm is -----

A : AODV

B : DSR

C : DSDV

D : ZRP

Q.no 43. In IEEE 802.16 ___ is used by subscribers that are located near the BS and
______ is used by subscribers that are located far away from the BS.

A : QAM-64, QAM-16

B : QAM-16, QPSK

C : QAM-64, QPSK

D : QAM-128, QAM-64

Q.no 44. A 4 byte IP address consists of ____________

A : Only network address

B : Only host address

C : Network address & Host address

D : Network address & MAC address

Q.no 45. in MANET ------ routing protocol use reactive routing protocols for route
discovery. It uses proactive routing protocols for table maintenance

A : Distance Vector Protocol

B : Link state Protocol

C : Hybrid Routing Protocol

D : DSR Protocol

Q.no 46. The ............ acts like a mail router, accepting messages from both MTAs
and MUAs.

A : Mail user agent(MUA)


B : Mail send agent(MSA)

C : Mail delivery agent(MDA)

D : Mail transfer agent(MTA)

Q.no 47. Low-Earth-orbit (LEO) satellites have _____ orbits.

A : equatorial

B : polar

C : inclined

D : none of the above

Q.no 48. LEO satellites are much closer to the earth than GEO satellites, ranging
from -------------to --------km above the surface

A : 500 to 1500Km

B : 1000 to 1600Km

C : 1200 to 1600Km

D : 1100 to 1500Km

Q.no 49. Table driven routing in MANET is called as ------

A : Reactive Routing protocol

B : Proactive Routing protocol

C : Distance Vector Protocol

D : Link state Protocol

Q.no 50. EM waves varies from ______ to ________

A : Meters to nano-meters

B : Meters to micro-meters

C : Nano to micro-meters

D : Centimeters to nano-meters
Q.no 51. For BLUETOOTH Network Match the followings between column A and
column B.
Column A Column B
i) To discover services offered by other devices M) TCS
ii) Flow control and Retransmission N) LMP
iii)Establishment and release of SCO and ACL links O) RFCOMM
iv) Call Control and Group Management P) L2CAP
v) Support for Serial Interface Q) SDP

A : i,O; ii,P; iii,M; iv,N; v,Q

B : i,Q; ii,N; iii,P; iv,M; v,O

C : i,Q; ii,P; iii,N; iv,M; v,O

D : i,M; ii,Q; iii,N; iv,P; v,O

Q.no 52.  _________ allows us to control electronic components

A : MQTT

B : HTTP

C : RESTful API

D : RETful API

Q.no 53. For IEEE 802.16, Match the followings between column A and column B.
Column A Column B
i) Hide the different physical medium M) Security Sublayer
ii) Deals with Encryption N) MAC Sublayer
iii) Slot Allocation O) Service Specific Convergence sub layer
iv) Integrates the network Layer Protocols P) Transmission Convergence sub
Layer

A : i,P; ii,M; iii,N; iv,O;

B : i,P; ii,M; iii,O; iv,N;

C : i,O; ii,M; iii,P; iv,N;

D : i,M; ii,P; iii,O; iv,N;

Q.no 54. Which of the following are true about SDN Controller
A : Manages flow control to the switches/routers ‘below’ (via southbound APIs) and
Manages applications and business logic ‘above’ (via northbound APIs) to deploy
intelligent networks.

B : Manages applications and business logic ‘above’ (via northbound APIs) to deploy
intelligent networks.

C : Manages flow control to the switches/routers ‘below’ (via southbound APIs)

D : none of the above

Q.no 55. Which among the several transport services deals with the addresses,
protocol utility class in addition to performance evaluating features of a
connection?

A : Connection Management

B : Quality of Service

C : User Interface

D : Status Reporting

Q.no 56. Arrange the following IEEE 802.11 PHY Standards in the ascending order
of the maximum data rate
1. IEEE 802.11 a
2. IEEE 802.11 ac
3. IEEE 802.11 b
4. IEEE 802.11 n

A : 1. IEEE 802.11 a
2. IEEE 802.11 ac
3. IEEE 802.11 b
4. IEEE 802.11 n

B : 1. IEEE 802.11 a
2. IEEE 802.11 b
3. IEEE 802.11 ac
4. IEEE 802.11 n

C : 1. IEEE 802.11 b
2. IEEE 802.11 a
3. IEEE 802.11 n
4. IEEE 802.11 ac
D : 1. IEEE 802.11 a
2. IEEE 802.11 b
3. IEEE 802.11 n
4. IEEE 802.11 ac

Q.no 57. in MANETIn ---------- routing protocol, each network node discovers its
route to destination, on-demand.

A : Reactive Routing protocol

B : Proactive Routing protocol

C : Distance Vector Protocol

D : Link state Protocol

Q.no 58. Performance management is closely related to __

A : Proactive Fault Management

B : Fault management

C : Reactive Fault Management

D : Preventive Fault Management

Q.no 59. The administration may create a …….. link between them using a longer
path that probably goes through several routers, when the link between two
routers is broken in OSPF

A : Point-to-point

B : Transient

C : Multipoint

D : Single

Q.no 60. Military vehicles on a battlefield with no existing infrastructure will


deploy …………… network

A : Cell Network

B : LAN

C : Wi-Fi
D : MANET

You might also like