INF142

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which one of the following is an architecture paradigms? a) Peer to peer b) Client-server c) HTTP d) Both Peer-to-Peer & Client-Server

d) Both Peer-to-Peer & Client-Server

Beyond IP, UDP provides additional services such as a) Routing and switching b) Sending and receiving of packets c) Multiplexing and demultiplexing d) Demultiplexing and error checking

d) Demultiplexing and error checking

In TCP, sending and receiving data is done as a) Stream of bytes b) Sequence of characters c) Lines of data d) Packets

a) Stream of bytes

In wireless ad-hoc network a) access point is not required b) access point is must c) nodes are not required d) none of the mentioned

a) access point is not required

The 4 byte IP address consists of a) network address b) host address c) both network address & host address d) none of the mentioned

c) both network address & host address

The maximum size of payload field in ethernet frame is a) 1000 bytes b) 1200 bytes c) 1300 bytes d) 1500 bytes

d) 1500 bytes

To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data. a) Packet b) Buffer c) Segment d) Acknowledgment

d) Acknowledgment

Transport services available to applications in one or another form _________ a) Reliable data transfer b) Timing c) Security d) All of the mentioned

d) All of the mentioned

Which of the following is a form of DoS attack ? a) Vulnerability attack b) Bandwidth flooding c) Connection flooding d) All of the mentioned

d) All of the mentioned

Which of the following is an application layer service? a) Network virtual terminal b) File transfer, access, and management c) Mail service d) All of the mentioned

d) All of the mentioned

Which of the following is true with respect to TCP a) Connection-oriented b) Error-control c) Congestion Control d) All of the mentioned

d) All of the mentioned

Which one of the following is not correct? a) Application layer protocols are used by both source and destination devices during a communication session b) HTTP is a session layer protocol c) TCP is an application layer protocol d) All of the mentioned

d) All of the mentioned

What should be the flag value to indicate the last fragment? a) 0 b) 1 c) TTl value d) None of the mentioned

a) 0

The correct format of packet in tunnel that uses IPv4 region is 1. IPv6 header 2. Payload 3. IPv4 header a) 3-1-2 b) 3-2-1 c) 1-2-3 d) 1-3-2

a) 3-1-2

What is the header size of UDP packet? a) 8 bytes b) 8 bits c) 16 bytes d) 124 bytes

a) 8 bytes

Some of well known BGP metric's attributes are ______ a) AS-path b) next hop-address c) load preference d) origin

a) AS-path b) next hop-address d) origin

Which of the following is false with respect to UDP a) Connection-oriented b) Unreliable c) Transport layer protocol d) All of the mentioned

a) Connection-oriented

Which of the following is not applicable for IP? a) Error reporting b) Handle addressing conventions c) Datagram format d) Packet handling conventions

a) Error reporting

The receiver of the data controls the amount of data that are to be sent by the sender is referred as ___________ a) Flow control b) Error control c) Congestion control d) Error detection

a) Flow control

The _________ field determines the lifetime of IPv6 datagram a) Hop limit b) TTL c) Next header d) None of the mentioned

a) Hop limit

The main reason for transition from IPv4 to IPv6 is a) Huge number of systems on the internet b) Very low number of system on the internet c) Providing standard address d) None of the mentioned

a) Huge number of systems on the internet

Which of the following security protocol is transparent to end users and applications? a) IP/IPSec b) SSL c) Kerberos d) S/MIME

a) IP/IPSec

Open Shortest Path First (OSPF) is also called as _____________ a) Link state protocol b) Error-correction protocol c) Routing information protocol d) All of the mentioned

a) Link state protocol

Ethernet frame consists of a) MAC address b) IP address c) both MAC address and IP address d) none of the mentioned

a) MAC address

Header of a frame generally contains a) MAC addresses b) frame identifiers c) synchronization bytes d) time-to-live

a) MAC addresses b) frame identifiers c) synchronization bytes

Which of the following fields are in the 802.11 frame? a) Power Management b) Sequence Control c) Type d) To/From AP

a) Power Management b) Sequence Control c) Type d) To/From AP

Which of the following public key distribution systems is most secure? a) Public-Key Certificates b) Public announcements c) Publicly available directories d) Public-Key authority

a) Public-Key Certificates

The values GET, POST, HEAD etc are specified in ____________ of HTTP message a) Request line b) Header line c) Status line d) Entity body

a) Request line

Electronic mail uses which Application layer protocol? a) SMTP b) HTTP c) FTP d) SIP

a) SMTP

User datagram protocol is called connectionless because a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) none of the mentioned

a) all UDP packets are treated independently by transport layer

In wireless network an extended service set is a set of a) connected basic service sets b) all stations c) all access points d) none of the mentioned

a) connected basic service sets

CRC stands for a) cyclic redundancy check b) code repeat check c) code redundancy check d) cyclic repeat check

a) cyclic redundancy check

The services of OSPF include______ a) derivation of the shortest path b) multiple same-cost paths c) security d) unicast and multicast routing

a) derivation of the shortest path b) multiple same-cost paths c) security d) unicast and multicast routing

What is the access point (AP) in wireless LAN? a) device that allows wireless devices to connect to a wired network b) wireless devices itself c) both device that allows wireless devices to connect to a wired network and wireless devices itself d) none of the mentioned

a) device that allows wireless devices to connect to a wired network

The domain name system is maintained by _______ a) distributed database system b) a single server c) a single computer d) none of the mentioned

a) distributed database system

The ____________ translates Internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay chat

a) domain name system

Cryptographic hash function takes an arbitrary block of data and returns a) fixed size bit string b) variable size bit string c) both fixed size bit string and variable size bit string d) none of the mentioned

a) fixed size bit string

Automatic repeat request error management mechanism is provided by a) logical link control sublayer b) media access control sublayer c) network interface control sublayer d) none of the mentioned

a) logical link control sublayer

Which of the following services that the TLS protocol offers? a) message confidentiality b) message integrity c) entity authentication d) service availability

a) message confidentiality b) message integrity c) entity authentication

The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

a) network layer

Transport layer aggregates data from different applications into a single stream before passing it to a) network layer b) data link layer c) application layer d) physical layer

a) network layer

Which field helps to check rearrangement of the fragments? a) offset b) flag c) ttl d) identifer

a) offset

If a server has no clue about where to find the address for a hostname then _______ a) server asks to the root server b) server asks to its adjacent server c) request is not processed d) none of the mentioned

a) server asks to the root server

Which of the following field in IPv4 datagram is not related to fragmentation? a) Flags b) Offset c) TOS d) Identifier

c) TOS

Which of the following fields in IPv4 header are reserved in the IPv6 header? a) source and destination address b) the upper-layer protocol c) the life time of a datagram d) Option field

a) source and destination address b) the upper-layer protocol c) the life time of a datagram

Cryptography can be used a) to find some insecurity in a cryptographic scheme b) to authenticate communicating entities c) to encrypt the data from unauthorized reading d) none of the mentioned

a) to find some insecurity in a cryptographic scheme b) to authenticate communicating entities c) to encrypt the data from unauthorized reading

In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs. a) 2 b) 1 c) 4 d) 3

b) 1

Correct order of the operations of OSPF. 1 - Hello packets 2 - Propagation of link-state information and building of routing tables 3 - Establishing adjacencies and synchronisation database a) 1-2-3 b) 1-3-2 c) 3-2-1 d) 2-1-3

b) 1-3-2

Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment. a) 10000 b) 10001 c) 12001 d) 11001

b) 10001

What is stat frame delimiter (SFD) in the ethernet frame? a) 10101010 b) 10101011 c) 00000000 d) 11111111

b) 10101011

The size of IP address in IPv6 is a) 4 bytes b) 128 bits c) 8 bytes d) 100 bits

b) 128 bits

Border Gateway Protocol (BGP) use the hop-count for shortest path, but hop-count in BGP's case is a ________ a) router b) AS (Autonomous System) c) BGP doesn't use Hop-count d) switch

b) AS (Autonomous System)

What allows TCP to detect lost segments and in turn recover from that loss? a) Sequence number b) Acknowledgment number c) Checksum d) Both Sequence & Acknowledgment number

b) Acknowledgment number

Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a) CDMA b) CSMA/CA c) ALOHA d) None of the mentioned

b) CSMA/CA

The field used to detect errors over the entire user datagram is a) UDP header b) Checksum c) Source port d) Destination port

b) Checksum

Packet sniffers involve a) Active receiver b) Passive receiver c) Both Active receiver and Passive receiver d) None of the mentioned

b) Passive receiver

Connection establishment in TCP is done by which mechanism? a) Flow control b) Three-Way Handshaking c) Forwarding d) Synchronisation

b) Three-Way Handshaking

The network layer protocol of internet is a) ethernet b) internet protocol c) hypertext transfer protocol d) none of the mentioned

b) internet protocol

Which of these is not applicable for IP protocol? a) is connectionless b) offer reliable service c) offer unreliable service d) none of the mentioned

b) offer reliable service

In asymmetric key cryptography, the private key is kept by a) sender b) receiver c) sender and receiver d) all the connected devices to the network

b) receiver

Which one of the following is a cryptographic protocol used to secure HTTP connection? a) stream control transmission protocol (SCTP) b) transport layer security (TLS) c) explicit congestion notification (ECN) d) IPresource reservation protocol

b) transport layer security (TLS)

If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use? a) 255.255.255.252 b) 255.255.255.255 c) 255.255.255.240 d) 255.255.255.248

c) 255.255.255.240

An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL. a) 40; 80 b) 60; 620 c) 80; 443 d) 620; 80

c) 80; 443

Which one of the following is the multiple access protocol for channel access control? a) CSMA/CD b) CSMA/CA c) Both CSMA/CD & CSMA/CA d) None of the mentioned

c) Both CSMA/CD & CSMA/CA

Application developer has permission to decide the following on transport layer side a) Transport layer protocol b) Maximum buffer size c) Both Transport layer protocol and Maximum buffer size d) None of the mentioned

c) Both Transport layer protocol and Maximum buffer size

The conditional GET mechanism a) Imposes conditions on the objects to be requested b) Limits the number of response from a server c) Helps to keep a cache upto date d) None of the mentionedterm-1

c) Helps to keep a cache upto date

The value of acknowledgement field in a segment defines a) Number of previous bytes to receive b) Total number of bytes to receive c) Number of next bytes to receive d) Sequence of zero's and one's

c) Number of next bytes to receive

The combination of _________ and __________ is often termed the local address of the local portion of the IP address. a) Network number and host number b) Network number and subnet number c) Subnet number and host number d) Host number

c) Subnet number and host number

In OSPF, which protocol is used to discover neighbour routers automatically? a) Link state protocol b) Error-correction protocol c) Routing information protocol d) Hello protocol

d) Hello protocol

"Total length" field in UDP packet header is the length of a) Only UDP header b) Only data c) Only checksum d) UDP header plus data

d) UDP header plus data

Application layer protocol defines ____________ a) types of messages exchanged b) message format, syntax and semantics c) rules for when and how processes send and respond to messages d) all of the mentioned

d) all of the mentioned

DNS database contains _______ a) name server records b) hostname-to-address records c) hostname aliases d) all of the mentioned

d) all of the mentioned

The DHCP server _________ a) maintains a database of available IP addresses b) maintains the information about client configuration parameters c) grants a IP address when receives a request from a client d) all of the mentioned

d) all of the mentioned

Which one of the following task is not done by data link layer? a) framing b) error control c) flow control d) channel coding

d) channel coding

Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) none of the mentioned

d) none of the mentioned


Kaugnay na mga set ng pag-aaral

Iggy Ch 27-MC- Assessment of the Respiratory System

View Set

Chapter 26: Growth and Development of the School-Aged Child: 6 to 10 Years - ML4

View Set

>>pre-calc: unit circle memorization<<

View Set

Vocabulary Used in Resistance Training

View Set

Motion Calculation Reference Guide

View Set

Electrical Motor Control Midterm Review

View Set

Ch 9 Microbiology The Human Experience

View Set

Ultimate Marvel Cinematic Universe Trivia

View Set

BandTec E4 - Career - collocations (sentences)

View Set

Chapter 40: Ronald Reagan's 80s-Kerris Lassley

View Set