INF142
Which of the following public key distribution systems is most secure? a) Public-Key Certificates b) Public announcements c) Publicly available directories d) Public-Key authority
a) Public-Key Certificates
The values GET, POST, HEAD etc are specified in ____________ of HTTP message a) Request line b) Header line c) Status line d) Entity body
a) Request line
Electronic mail uses which Application layer protocol? a) SMTP b) HTTP c) FTP d) SIP
a) SMTP
In TCP, sending and receiving data is done as a) Stream of bytes b) Sequence of characters c) Lines of data d) Packets
a) Stream of bytes
In wireless ad-hoc network a) access point is not required b) access point is must c) nodes are not required d) none of the mentioned
a) access point is not required
User datagram protocol is called connectionless because a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) none of the mentioned
a) all UDP packets are treated independently by transport layer
In wireless network an extended service set is a set of a) connected basic service sets b) all stations c) all access points d) none of the mentioned
a) connected basic service sets
CRC stands for a) cyclic redundancy check b) code repeat check c) code redundancy check d) cyclic repeat check
a) cyclic redundancy check
The maximum size of payload field in ethernet frame is a) 1000 bytes b) 1200 bytes c) 1300 bytes d) 1500 bytes
d) 1500 bytes
Which of the following security protocol is transparent to end users and applications? a) IP/IPSec b) SSL c) Kerberos d) S/MIME
a) IP/IPSec
Which of the following fields are in the 802.11 frame? a) Power Management b) Sequence Control c) Type d) To/From AP
b) Sequence Control (usikker)
Open Shortest Path First (OSPF) is also called as _____________ a) Link state protocol b) Error-correction protocol c) Routing information protocol d) All of the mentioned
a) Link state protocol
Ethernet frame consists of a) MAC address b) IP address c) both MAC address and IP address d) none of the mentioned
a) MAC address
What should be the flag value to indicate the last fragment? a) 0 b) 1 c) TTl value d) None of the mentioned
a) 0
The correct format of packet in tunnel that uses IPv4 region is 1. IPv6 header 2. Payload 3. IPv4 header a) 3-1-2 b) 3-2-1 c) 1-2-3 d) 1-3-2
a) 3-1-2
What is the header size of UDP packet? a) 8 bytes b) 8 bits c) 16 bytes d) 124 bytes
a) 8 bytes
Which of the following is false with respect to UDP a) Connection-oriented b) Unreliable c) Transport layer protocol d) All of the mentioned
a) Connection-oriented
Which of the following is true with respect to TCP a) Connection-oriented b) Error-control c) Congestion Control d) All of the mentioned
a) Connection-oriented
Which of the following is not applicable for IP? a) Error reporting b) Handle addressing conventions c) Datagram format d) Packet handling conventions
a) Error reporting
The receiver of the data controls the amount of data that are to be sent by the sender is referred as ___________ a) Flow control b) Error control c) Congestion control d) Error detection
a) Flow control
The _________ field determines the lifetime of IPv6 datagram a) Hop limit b) TTL c) Next header d) None of the mentioned
a) Hop limit
The main reason for transition from IPv4 to IPv6 is a) Huge number of systems on the internet b) Very low number of system on the internet c) Providing standard address d) None of the mentioned
a) Huge number of systems on the internet
What is the access point (AP) in wireless LAN? a) device that allows wireless devices to connect to a wired network b) wireless devices itself c) both device that allows wireless devices to connect to a wired network and wireless devices itself d) none of the mentioned
a) device that allows wireless devices to connect to a wired network
The domain name system is maintained by _______ a) distributed database system b) a single server c) a single computer d) none of the mentioned
a) distributed database system
The ____________ translates Internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay chat
a) domain name system
Cryptographic hash function takes an arbitrary block of data and returns a) fixed size bit string b) variable size bit string c) both fixed size bit string and variable size bit string d) none of the mentioned
a) fixed size bit string
Automatic repeat request error management mechanism is provided by a) logical link control sublayer b) media access control sublayer c) network interface control sublayer d) none of the mentioned
a) logical link control sublayer
The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer
a) network layer
Transport layer aggregates data from different applications into a single stream before passing it to a) network layer b) data link layer c) application layer d) physical layer
a) network layer
Which field helps to check rearrangement of the fragments? a) offset b) flag c) ttl d) identifer
a) offset
If a server has no clue about where to find the address for a hostname then _______ a) server asks to the root server b) server asks to its adjacent server c) request is not processed d) none of the mentioned
a) server asks to the root server
Cryptography can be used a) to find some insecurity in a cryptographic scheme b) to authenticate communicating entities c) to encrypt the data from unauthorized reading d) none of the mentioned
a) to find some insecurity in a cryptographic scheme
In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs. a) 2 b) 1 c) 4 d) 3
b) 1
Correct order of the operations of OSPF. 1 - Hello packets 2 - Propagation of link-state information and building of routing tables 3 - Establishing adjacencies and synchronisation database a) 1-2-3 b) 1-3-2 c) 3-2-1 d) 2-1-3
b) 1-3-2
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment. a) 10000 b) 10001 c) 12001 d) 11001
b) 10001
What is stat frame delimiter (SFD) in the ethernet frame? a) 10101010 b) 10101011 c) 00000000 d) 11111111
b) 10101011
The size of IP address in IPv6 is a) 4 bytes b) 128 bits c) 8 bytes d) 100 bits
b) 128 bits
What allows TCP to detect lost segments and in turn recover from that loss? a) Sequence number b) Acknowledgment number c) Checksum d) Both Sequence & Acknowledgment number
b) Acknowledgment number
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a) CDMA b) CSMA/CA c) ALOHA d) None of the mentioned
b) CSMA/CA
The field used to detect errors over the entire user datagram is a) UDP header b) Checksum c) Source port d) Destination port
b) Checksum
Packet sniffers involve a) Active receiver b) Passive receiver c) Both Active receiver and Passive receiver d) None of the mentioned
b) Passive receiver
Connection establishment in TCP is done by which mechanism? a) Flow control b) Three-Way Handshaking c) Forwarding d) Synchronisation
b) Three-Way Handshaking
The network layer protocol of internet is a) ethernet b) internet protocol c) hypertext transfer protocol d) none of the mentioned
b) internet protocol
Which of the following services that the TLS protocol offers? a) message confidentiality b) message integrity c) entity authentication d) service availability
b) message integrity
Which of these is not applicable for IP protocol? a) is connectionless b) offer reliable service c) offer unreliable service d) none of the mentioned
b) offer reliable service
In asymmetric key cryptography, the private key is kept by a) sender b) receiver c) sender and receiver d) all the connected devices to the network
b) receiver
Which one of the following is a cryptographic protocol used to secure HTTP connection? a) stream control transmission protocol (SCTP) b) transport layer security (TLS) c) explicit congestion notification (ECN) d) IPresource reservation protocol
b) transport layer security (TLS)
Which one of the following is an architecture paradigms? a) Peer to peer b) Client-server c) HTTP d) Both Peer-to-Peer & Client-Server
d) Both Peer-to-Peer & Client-Server
If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use? a) 255.255.255.252 b) 255.255.255.255 c) 255.255.255.240 d) 255.255.255.248
c) 255.255.255.240
An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL. a) 40; 80 b) 60; 620 c) 80; 443 d) 620; 80
c) 80; 443
Which one of the following is the multiple access protocol for channel access control? a) CSMA/CD b) CSMA/CA c) Both CSMA/CD & CSMA/CA d) None of the mentioned
c) Both CSMA/CD & CSMA/CA
Application developer has permission to decide the following on transport layer side a) Transport layer protocol b) Maximum buffer size c) Both Transport layer protocol and Maximum buffer size d) None of the mentioned
c) Both Transport layer protocol and Maximum buffer size
The conditional GET mechanism a) Imposes conditions on the objects to be requested b) Limits the number of response from a server c) Helps to keep a cache upto date d) None of the mentioned
c) Helps to keep a cache upto date
The value of acknowledgement field in a segment defines a) Number of previous bytes to receive b) Total number of bytes to receive c) Number of next bytes to receive d) Sequence of zero's and one's
c) Number of next bytes to receive
The combination of _________ and __________ is often termed the local address of the local portion of the IP address. a) Network number and host number b) Network number and subnet number c) Subnet number and host number d) Host number
c) Subnet number and host number
Which of the following field in IPv4 datagram is not related to fragmentation? a) Flags b) Offset c) TOS d) Identifier
c) TOS
The 4 byte IP address consists of a) network address b) host address c) both network address & host address d) none of the mentioned
c) both network address & host address
Header of a frame generally contains a) MAC addresses b) frame identifiers c) synchronization bytes d) time-to-live
c) synchronization bytes
To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data. a) Packet b) Buffer c) Segment d) Acknowledgment
d) Acknowledgment
Transport services available to applications in one or another form _________ a) Reliable data transfer b) Timing c) Security d) All of the mentioned
d) All of the mentioned
Which of the following is a form of DoS attack ? a) Vulnerability attack b) Bandwidth flooding c) Connection flooding d) All of the mentioned
d) All of the mentioned
Which of the following is an application layer service? a) Network virtual terminal b) File transfer, access, and management c) Mail service d) All of the mentioned
d) All of the mentioned
Which one of the following is not correct? a) Application layer protocols are used by both source and destination devices during a communication session b) HTTP is a session layer protocol c) TCP is an application layer protocol d) All of the mentioned
d) All of the mentioned
Beyond IP, UDP provides additional services such as a) Routing and switching b) Sending and receiving of packets c) Multiplexing and demultiplexing d) Demultiplexing and error checking
d) Demultiplexing and error checking
In OSPF, which protocol is used to discover neighbour routers automatically? a) Link state protocol b) Error-correction protocol c) Routing information protocol d) Hello protocol
d) Hello protocol
"Total length" field in UDP packet header is the length of a) Only UDP header b) Only data c) Only checksum d) UDP header plus data
d) UDP header plus data
Application layer protocol defines ____________ a) types of messages exchanged b) message format, syntax and semantics c) rules for when and how processes send and respond to messages d) all of the mentioned
d) all of the mentioned
DNS database contains _______ a) name server records b) hostname-to-address records c) hostname aliases d) all of the mentioned
d) all of the mentioned
The DHCP server _________ a) maintains a database of available IP addresses b) maintains the information about client configuration parameters c) grants a IP address when receives a request from a client d) all of the mentioned
d) all of the mentioned
Which one of the following task is not done by data link layer? a) framing b) error control c) flow control d) channel coding
d) channel coding
Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) none of the mentioned
d) none of the mentioned