Computer Networks MCQ pt.2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

B

In the congestion avoidance algorithm, the size of the congestion window increases ____________ until congestion is detected. a) exponentially b) additively c) multiplicatively d) suddenly

B

In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs. a) 2 b) 1 c) 4 d) 3

A

In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a threshold. a) exponentially b) additively c) multiplicatively d) suddenly

C

The conditional GET mechanism a) Imposes conditions on the objects to be requested b) Limits the number of response from a server c) Helps to keep a cache upto date d) None of the mentioned

A

The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is ________ a) Stream mode b) Block mode c) Compressed mode d) Message mode

C

Which of the following is the multiple access protocol for channel access control? a) CSMA/CD b) CSMA/CA c) Both CSMA/CD & CSMA/CA d) HDLC

C

Which of the following networks supports pipelining effect? a) Circuit-switched networks b) Message-switched networks c) Packet-switched networks d) Stream-switched networks

A

Which of the following remains same in the header of the packet in a datagram network during the entire journey of the packet? a) Destination address b) Source address c) Checksum d) Padding

D

Which of the following routing algorithms can be used for network layer design? a) shortest path algorithm b) distance vector routing c) link state routing d) all of the mentioned

C

Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a) HTTP b) FTP c) Telnet d) TCP

D

Which one of the following is an architecture paradigms? a) Peer to peer b) Client-server c) HTTP d) Both Peer-to-Peer & Client-Server

D

Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control

C

Which one of the following is not true? a) multiple hostnames may correspond to a single IP address b) a single hostname may correspond to many IP addresses c) a single hostname may correspond to a single IP address d) none of the mentioned

B

Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a) logical link control sublayer b) media access control sublayer c) network interface control sublayer d) error control sublayer

A

_____ is the multiplexing technique that shifts each signal to a different carrier frequency. a) FDM b) TDM c) Both FDM & TDM d) PDM

C

If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network. a) MAC address b) IP address c) Both MAC address and IP address d) None of the mentioned

A

A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ___________ a) Active open b) Active close c) Passive close d) Passive open

A

Application layer offers _______ service. a) End to end b) Process to process c) Both End to end and Process to process d) None of the mentioned

A

IP assigned for a client by DHCP server is a) for a limited period b) for an unlimited period c) not time dependent d) none of the mentioned

C

A 4 byte IP address consists of __________ a) only network address b) only host address c) network address & host address d) network address & MAC address

C

IPV4 Address is A. 8 bit B. 16 bit C. 32 bit D. 64 bit

B

A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched

A

A session may include ________ a) Zero or more SMTP transactions b) Exactly one SMTP transactions c) Always more than one SMTP transactions d) Number of SMTP transactions cant be determined

A

A subset of a network that includes all the routers but contains no loops is called ________ a) spanning tree b) spider structure c) spider tree d) special tree

C

After obtaining the IP address, to prevent the IP conflict the client may use _________ a) internet relay chat b) broader gateway protocol c) address resolution protocol d) none of the mentioned

D

Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________ a) Fixed number b) Random sequence of 0's and 1's c) One d) Sequence of zero's and one's

A

CRC stands for __________ a) cyclic redundancy check b) code repeat check c) code redundancy check d) cyclic repeat check

B

Choose the statement which is wrong incase of SMTP?a) It requires message to be in 7bit ASCII format b) It is a pull protocol c) It transfers files from one mail server to another mail server d) SMTP is responsible for the transmission of the mail through the internet

B

Coaxial cable consists of _______ concentric copper conductors. a) 1 b) 2 c) 3 d) 4

A

IPv6 does not use _________ type of address. a) broadcast b) multicast c) anycast d) unicast

B

Cookies were originally designed for ____________ a) Client side programming b) Server side programming c) Both Client side programming and Server side programming d) Socket programming

A

DHCP (dynamic host configuration protocol) provides __________ to the client. a) IP address b) MAC address c) Url d) None of the mentioned

A

DHCP client and servers on the same subnet communicate via _________ a) UDP broadcast b) UDP unicast c) TCP broadcast d) TCP unicast

C

DHCP is used for ________ a) IPv6 b) IPv4 c) Both IPv6 and IPv4 d) None of the mentioned

B

Data communication system spanning states, countries, or the whole world is ________ a) LAN b) WAN c) MAN d) PAN

A

Data communication system within a building or campus is________ a) LAN b) WAN c) MAN d) PAN

D

Datagrams are routed to their destinations with the help of ________ a) Switch table b) Segments table c) Datagram table d) Routing table

B

Distance vector protocols use the concept of split horizon, but link-state routing protocols, such as OSPF, do not. a) True b) False

B

During error reporting, ICMP always reports error messages to ________ a) Destination b) Source c) Next router d) Previous router

C

Identify the incorrect statement regarding FTP. a) FTP stands for File Transfer Protocol b) FTP uses two parallel TCP connections c) FTP sends its control information in-band d) FTP sends exactly one file over the data connection

A

Header size of the ICMP message is _________ a) 8-bytes b) 8-bits c) 16-bytes d) 16-bits

A

ICMP is primarily used for __________ a) error and diagnostic functions b) addressing c) forwarding d) routing

C

If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is? a) N/2 b) N c) N-1 d) 2N

A

If there are n signal sources of same data rate, then the TDM link has _______ slots. a) n b) n/2 c) n*2 d) 2n

B

In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ a) Packet which are not lost b) Only those packets which are lost or corrupted c) Packet from starting d) All the packets

B

In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________ a) Gaps b) Loops c) Holes d) Links

C

In Network Management System, maps track each piece of hardware and its connection to the _________ a) IP Server b) Domain c) Network d) Data

D

In OSPF header, which field is used to detect errors in the packet? a) Type b) Area ID c) Authentication type d) Checksum

A

In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________ a) Graph b) Tree c) Network d) Link

B

In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero? a) Propagation delay b) Queuing delay c) Transmission delay d) Processing delay

D

In case of time exceeded error, when the datagram visits a router, the value of time to live field is _________ a) Remains constant b) Decremented by 2 c) Incremented by 1 d) Decremented by 1

C

In the IPv6 header, the traffic class field is similar to which field in the IPv4 header? a) Fragmentation field b) Fast-switching c) ToS field d) Option field

D

Internet Control Message Protocol (ICMP) has been designed to compensate _________ a) Error-reporting b) Error-correction c) Host and management queries d) All of the mentioned

A

Multiple objects can be sent over a TCP connection between client and server in a persistent HTTP connection. a) True b) False

D

Multiplexing provides _________ a) Efficiency b) Privacy c) Anti jamming d) Both Efficiency & Privacy

A

Open Shortest Path First (OSPF) is also called as _____________ a) Link state protocol b) Error-correction protocol c) Routing information protocol d) Border gateway protocol

C

Propagation delay depends on ___________ a) Packet length b) Transmission rate c) Distance between the routers d) Speed of the CPU

D

Retransmission of packets must not be done when _______ a) Packet is lost b) Packet is corrupted c) Packet is needed d) Packet is error-free

B

Servers handle requests for other domains _______ a) directly b) by contacting remote DNS server c) it is not possible d) none of the mentioned

B

Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are connected to each other by intervening IPv4 routers. The best solution here is ________ a) Use dual-stack approach b) Tunneling c) No solution d) Replace the system

D

The DHCP server _________ a) maintains a database of available IP addresses b) maintains the information about client configuration parameters c) grants a IP address when receives a request from a client d) all of the mentioned

D

The DHCP server can provide the _______ of the IP addresses. a) dynamic allocation b) automatic allocation c) static allocation d) all of the mentioned

A

The _________ field determines the lifetime of IPv6 datagram a) Hop limit b) TTL c) Next header d) Type of traffic

A

The ____________ translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay chat

B

The attacker using a network of compromised devices is known as _____________ a) Internet b) Botnet c) Telnet d) D-net

C

The computation of the shortest path in OSPF is usually done by ____________ a) Bellman-ford algorithm b) Routing information protocol c) Dijkstra's algorithm d) Distance vector routing

D

The header length of an IPv6 datagram is ___________ a) 10bytes b) 25bytes c) 30bytes d) 40bytes

B

The main contents of the routing table in datagram networks are ___________ a) Source and Destination address b) Destination address and Output port c) Source address and Output port d) Input port and Output port

D

The right to use a domain name is delegated by domain name registers which are accredited by _______ a) internet architecture board b) internet society c) internet research task force d) internet corporation for assigned names and numbers

C

The server program tells its TCP that it is ready to accept a connection. This process is called ___________ a) Active open b) Active close c) Passive close d) Passive open

B

The size of an IP address in IPv6 is _________ a) 4 bytes b) 128 bits c) 8 bytes d) 100 bits

B

The source-quench message in ICMP was designed to add a kind of ____________ to the IP. a) error control b) flow control c) router control d) switch control

D

Which of the following is a data link protocol? a) ethernet b) point to point protocol c) hdlc d) all of the mentioned

A

Which of the following is a transport layer protocol? a) stream control transmission protocol b) internet control message protocol c) neighbor discovery protocol d) dynamic host configuration protocol

C

The term that is used to place packet in its route to its destination is called __________ a) Delayed b) Urgent c) Forwarding d) Delivering

C

The total nodal delay is given by ____________ a) dnodal = dproc - dqueue + dtrans + dprop b) dnodal = dproc + dtrans - dqueue c) dnodal = dproc + dqueue + dtrans + dprop d) dnodal = dproc + dqueue - dtrans - dprop

B

Transmission delay does not depend on _____________ a) Packet length b) Distance between the routers c) Transmission rate d) Bandwidth of medium

B

Two machines can use the timestamp request and timestamp replay messages to determine the ___________ needed for an IP datagram to travel between them. a) Half-trip time b) Round-trip time c) Travel time for the next router d) Time to reach the destination/source

D

User agent does not support this ___________ a) Composing messages b) Reading messages c) Replying messages d) Routing messages

B

WAN stands for __________ a) World area network b) Wide area network c) Web area network d) Web access network

A

Which of the following is not applicable for IP? a) Error reporting b) Handle addressing conventions c) Datagram format d) Packet handling conventions

C

Which of the following is not correct in relation to multi-destination routing? a) is same as broadcast routing b) contains the list of all destinations c) data is not sent by packets d) there are multiple receivers

A

What is DHCP snooping? a) techniques applied to ensure the security of an existing DHCP infrastructure b) encryption of the DHCP server requests c) algorithm for DHCP d) none of the mentioned

C

What is the size of MAC Address? A. 16-bits B. 32-bits C. 48-bits D. 64-bits

A

What should be the flag value to indicate the last fragment? a) 0 b) 1 c) TTl value d) Protocol field value

B

When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ a) random error b) burst error c) inverted error d) double error

A

When a router cannot route a datagram or host cannot deliver a datagram, the datagram is discarded and the router or the host sends a ____________ message back to the source host that initiated the datagram. a) Destination unreachable b) Source quench c) Router error d) Time exceeded

D

Which among the following features is present in IPv6 but not in IPv4? a) Fragmentation b) Header checksum c) Options d) Anycast address

A

Which field helps to check rearrangement of the fragments? a) offset b) flag c) ttl d) identifer

C

Which of the following field in IPv4 datagram is not related to fragmentation? a) Flags b) Offset c) TOS d) Identifier


संबंधित स्टडी सेट्स

Ch 9 Business Cycles, Unemployment, & Inflation

View Set

Physio 1/ ESP: Resistance Exercise 1

View Set

Everything you need to know to be a Directioner

View Set

HOSPITALITY AND TOURISM EXAM FINAL

View Set

3. Recombinant DNA Technology and Genomics

View Set

Biological rhythms, Sleep & Consciousness

View Set

Chapter 27: Nursing Management: Upper Respiratory Problems

View Set