A group of computers and other
devices connected together is called …………….
A
|
Network
|
B
|
Networking
|
C
|
Intranet
|
D
|
both b and c
|
Question 2
|
|
|
|
Which of the following network is
used to connect a number of computers to each other by cables in a single
location?
A
|
WAN
|
B
|
LAN
|
C
|
MAN
|
D
|
both b and c
|
Transmission Lines are also called
as………………….
A
|
circuits
|
B
|
channels
|
C
|
trunks
|
D
|
circuits channels, or trunks
|
Question 4
|
|
|
|
The Switching Elements are also
called as ……….
A
|
host
|
B
|
subnet
|
C
|
Interface Message Processors
(IMPs)
|
D
|
both a and b
|
The signal which has infinitely
many levels of intensity over a period of time is called ………
A
|
digital signal
|
B
|
analog signal
|
C
|
both a and b
|
D
|
sound signal
|
Question 6
|
|
|
|
The absolute value of a signal's
highest intensity is called……….
A
|
Peak Amplitude
|
B
|
Frequency
|
C
|
Phase
|
D
|
Both a and c
|
The distance a simple signal can
travel in one period is called …………
A
|
Wavelength
|
B
|
propagation speed
|
C
|
Frequency
|
D
|
both a and b
|
Question 8
|
|
|
|
A noise where foreign signal
enters the path of the transmitted signal is called ……
A
|
Impulse
|
B
|
Inter modulation
|
C
|
cross talk
|
D
|
both b and c
|
Which type of channel it is where
the number of users are stable and the traffic is not bursts?
A
|
static channel
|
B
|
dynamic channel
|
C
|
free channel
|
D
|
both a and c
|
Question 10
|
|
|
|
With Slotted Aloha, a …………. sends
out small clock tick packets to the outlying stations.
A
|
distributed clock
|
B
|
synchronized clock
|
C
|
centralized clock
|
D
|
Digital clock
|
If there is only one station with
a packet to send, this guarantees that there will ………….. For that packet.
A
|
never be a collision
|
B
|
be a collision
|
C
|
be an improvement
|
D
|
direction
|
Question 12
|
|
|
|
The _______ layer provides a well
defined service interface to the network layer, determining how the bits of
the physical layer are grouped into frames
A
|
Data Link
|
B
|
Physical
|
C
|
Network
|
D
|
Session
|
________ is the process in which
the receiver tries to guess the message by using redundant bits
A
|
Connection-Oriented Service
|
B
|
Forward error correction
|
C
|
both a and b
|
D
|
Confirm
|
Question 14
|
|
|
|
In ______ type of service, no
connection is established before hand or afterwards.
A
|
Unacknowledged Connectionless
Service
|
B
|
acknowledged Connectionless
Service
|
C
|
point to point
|
D
|
both a and b
|
The range of sequence number which
is the concern of the receiver is called the receive sliding window.
A
|
receive sliding window.
|
B
|
sliding window
|
C
|
frame buffer
|
D
|
both a and b
|
Question 16
|
|
|
|
Data Link Control Protocol (HDLC)
is implemented at the ………
A
|
Data link layer
|
B
|
Network layer
|
C
|
transport layer
|
D
|
Physical layer
|
The maximum size of the window in
a Sliding Window Protocol is _______
A
|
2m – 1
|
B
|
2m + 1
|
C
|
2m
|
D
|
2m-1
|
Question 18
|
The _______ layer is the topmost
layer in the subnet.
A
|
Network
|
B
|
application
|
C
|
transport
|
D
|
physical
|
The subnet gets increasingly
loaded with packets causing increase in delay in the delivery of packets,
which can lead to more retransmission, and ultimately increasing more and
more traffic. This is a concept called as _________
A
|
blockage
|
B
|
Traffic jam.
|
C
|
Congestion
|
D
|
both a and b
|
Question 20
|
|
|
|
______ is a static algorithm in
which every incoming packet is sent out on every outgoing line except the one
it arrives on. This method usually generates vast number of duplicate
packets..
A
|
Flooding
|
B
|
Wait and watch
|
C
|
congestion
|
D
|
both a and c
|
The Internet addresses are ______
bits in length in IPV4 addressing scheme
A
|
16
|
B
|
64
|
C
|
32
|
D
|
48
|
Question 22
|
In addresses for _______ networks,
the first 16 bits specify a particular network, and the last 16 bits specify
a particular host.
A
|
class A
|
B
|
class C
|
C
|
class B
|
D
|
class D
|
The number of network segments on
which the datagram is allowed to travel before a router should discard it is
called _______.
A
|
Time to Live (TTL)
|
B
|
Time to Die(TTD)
|
C
|
self recognition
|
D
|
both a and b
|
Question 24
|
|
|
|
An application process is assigned
a process identifier number (process ID), which is likely to be _______ each
time that process is started.
A
|
Similar
|
B
|
smaller
|
C
|
different
|
D
|
larger
|
A ________ is a 16-bit number used
by the host-to-host protocol to identify to which higher-level protocol or
application program (process) it must deliver incoming messages
A
|
connection
|
B
|
UDP
|
C
|
port
|
D
|
TCP
|
Question 26
|
|
|
|
A UDP datagram of _____ bytes is
acceptable to all implementations
The service access points in
Session Layer are called ________________
A
|
Accessing point
|
B
|
activation point
|
C
|
Session Service Access Points
|
D
|
both a and b
|
Question 28
|
|
|
|
Sessions are ended with ________
primitive
A
|
B-RELEASE. Request
|
B
|
R-RELEASE. request
|
C
|
S-RELEASE. request
|
D
|
A-RELEASE. request
|
A procedure included in the
caller’s address space by the linker is known as ______.
A
|
local procedure
|
B
|
Universal procedure
|
C
|
addressing linker
|
D
|
both a and b
|
Question 30
|
|
|
|
The ______ protocol is based on
end-to-end delivery.
A
|
SCTP
|
B
|
TCP
|
C
|
SMTP
|
D
|
SCTP
|
The sender SMTP establishes a TCP
connection with the destination SMTP and then waits for the server to send a
____ Service ready message..
A
|
420
|
B
|
320
|
C
|
220
|
D
|
120
|
Question 32
|
There is _____ number of standard
content types in MIME
To avoid ambiguity, the names
assigned to machines must be carefully selected from a ______ with complete
control over the binding between the names and IP addresses
A
|
Table
|
B
|
look up table
|
C
|
name space
|
D
|
name table
|
Question 34
|
|
|
|
A name in the _______ name space
is a sequence of characters without structure
A
|
address
|
B
|
Doman
|
C
|
Flat
|
D
|
Both a and b
|
The ____ namespace is based on a
hierarchical and logical tree structure
A
|
DNS
|
B
|
Address
|
C
|
table
|
D
|
both a and b
|
Question 36
|
|
|
|
The ______ are programs that run
on DNS clients and DNS servers and that create queries to extract information
from name servers.
A
|
transporter
|
B
|
distributers
|
C
|
Resolvers
|
D
|
both a and b
|
The next header t is an _____
field of Authentication Header that identifies the type of what follows.
A
|
16-bit
|
B
|
64-bit
|
C
|
8-bit
|
D
|
32-bit
|
Question 38
|
The client code recognizes the SSL
request and establishes a connection through TCP port ____ to the SSL code on
the server
A
|
1023
|
B
|
402
|
C
|
443
|
D
|
8080
|
A _____ should be considered as a
means to divide the world into two or more networks: one or more secure
networks and one or more non-secure networks.
A
|
firewall
|
B
|
ESP
|
C
|
SSL
|
D
|
both a and b
|
Question 40
|
|
|
|
The _______ is used to provide
integrity check, authentication, and encryption to IP datagram’s.
A
|
UDP
|
B
|
Transport layer
|
C
|
ESP
|
D
|
SSL
|
In most Wide Area Networks, the
subnet consists of two distinct components: which are they?
A
|
Transmission Lines and Switching
Elements.
|
B
|
host and subnet
|
C
|
Transmission Lines and host
|
D
|
subnet and Switching Elements.
|
Question 42
|
|
|
|
There are two types of designs for
communication subnets: they are …………..
A
|
Point-to-Point channels and
Broadcast channels
|
B
|
packet-switched subnet and
store-and-forward
|
C
|
Multicasting and Broadcasting
|
D
|
Point-to-Point channels and
store-and-forward
|
The main hardware components of a
graphics workstation are ……………..
A
|
Thick coax, optical fiber
|
B
|
twisted pair , thin coax
|
C
|
twisted, optical fiber
|
D
|
Thick coax, Thin coax
|
Question 44
|
|
|
|
S/NET is another kind of
………….network with an ………….for switching.
A
|
fiber optic, active star
|
B
|
active star , fiber optic
|
C
|
twisted cable, active network
|
D
|
active network, twisted cable
|
The Aloha protocol is an OSI
_______ protocol for LAN networks with broadcast topology
A
|
layer 1
|
B
|
layer 4
|
C
|
layer 2
|
D
|
layer 3
|
Question 46
|
Thus hamming code for the ASCII
character “a” is given as ………………
A
|
10111001111
|
B
|
10111001000
|
C
|
10111001001
|
D
|
10111001
|
Coding schemes can be divided into
two broad categories…………, ……………..
A
|
character coding, integer coding
|
B
|
hamming coding and block coding
|
C
|
Hamming coding and convolution
coding
|
D
|
Block Coding and Convolution
Coding.
|
Question 48
|
|
|
|
The IP Control Protocol (IPCP) is
the NCP for IP and is responsible for ………., …………., and disabling the IP
protocol on both ends of the point-to-point link.
A
|
Reframing , enabling
|
B
|
Deleting, reframing
|
C
|
configuring, enabling,
|
D
|
configuring, reframing
|
The _______ is a unidirectional
protocol that has no flow or error control.
A
|
Simplest
|
B
|
Simplex
|
C
|
TCP/IP protocol
|
D
|
Simplest or Simplex
|
Question 50
|
|
|
|
Flooding is also a……... algorithm,
usually generates ………... of duplicate packets.
A
|
Static, vast number
|
B
|
dynamic , vast number
|
C
|
Static, less number
|
D
|
dynamic , less number
|
Distance Vector Routing is a……...
routing algorithm, it consists of a data structure called a ………
A
|
Static , routing table
|
B
|
Dynamic, look-up table
|
C
|
Dynamic, routing table
|
D
|
Static, look-up table
|
Question 52
|
|
|
|
Each IP address can identify the
………... or ………... of IP packets.
A
|
source, destination
|
B
|
length, size
|
C
|
source, length
|
D
|
Size , destination
|
In process to process delivery, an
application process is assigned a ………….., which is likely to be …………….each
time that process is started
A
|
process identifier number ,
different
|
B
|
process identifier number, same
|
C
|
source, mixed
|
D
|
Source, similar
|
Question 54
|
|
|
|
The Intel format is called ………...
and the SPARC format is called ……………..
A
|
little endian, big endian,
|
B
|
big endian, little endian
|
C
|
open source, little endian
|
D
|
Big endian, open source
|
The Post Office Protocol is an
………... protocol with both client (sender/receiver) and …………...functions
A
|
electronic mail, server
(storage)
|
B
|
three layer , server
|
C
|
UDP, transfer
|
D
|
TCP, server
|
Question 56
|
|
|
|
A zone is a contiguous portion of
a ………….. of the DNS namespace whose database records exist and are managed in
a……….. DNS database file.
A
|
domain, particular
|
B
|
Class, particular
|
C
|
tree, local
|
D
|
Domain, every
|
The DNS server that received the
initial ……... query checks it’s ………… is called…………...
A
|
Recursive, zones
|
B
|
simple, zones
|
C
|
simple, class
|
D
|
Recursive, class
|
Question 58
|
|
|
|
The purpose of a proxy server is
to control exchange of data between the two networks at …………..instead of
………..
A
|
an application level , an IP
level
|
B
|
network layer, physical layer
|
C
|
an application layer, physical layer
|
D
|
Network layer , an application
layer
|
PGP is one of the protocols used
to provide security at the ……….. It is designed to create authenticated and
confidential ……….
A
|
application layer, e-mails.
|
B
|
Network layer, packets
|
C
|
application layer, packets
|
D
|
network layer , e-mails
|
Question 60
|
|
|
|
State weather the following
statement is true or false for Internetwork layer. 1).Other
internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet
Protocol (IP) is the least important protocol in this layer 3). The
internetwork layer, also called the internet layer or the network layer,
provides the “virtual network”
A
|
1. True, 2. true, 3. true
|
B
|
1. true, 2. false, 3.true
|
C
|
1. false, 2. false, 3. false
|
D
|
1. true, 2. true, 3. false
|
State weather the following
statement is true or false for ISDN – Integrated Services Digital NetworkISDN
is an effort to standardize subscriber services, provide user/network
interfaces 2). the goal of ISDN is to form a Local area network that provides
Peer-to-Peer connectivity over digital media 3). It is a set of protocols
that combines digital telephony and data transport services
A
|
1. True, 2. false, 3. true
|
B
|
1. true, 2. false, 3. false
|
C
|
1. false, 2. false, 3. false
|
D
|
1. true, 2. true, 3. false
|
Question 62
|
|
|
|
State weather the following
statement is true or false for Token Bus 1).It is a linear or tree-shaped
cable onto which the stations are attached. 2). the token propagates around
the logical ring, with only the token holder being permitted to transmit
frames 3). In this token bus arrangement The physical order in which the
stations are connected to the cable is very important.
A
|
1. False, 2. true, 3. true
|
B
|
1. true, 2. false, 3. false
|
C
|
1. false, 2. false, 3. false
|
D
|
1. true, 2. true, 3. false
|
Find the transmitted code if the
frame is (MSB) 1101011011 (LSB) and generator polynomial is x4 + x + 1.
A
|
1101011011 1110
|
B
|
1101011111 1110
|
C
|
1101011011 1111
|
D
|
1101011011
|
Question 64
|
|
|
|
State weather the following statement
is true or false for Point-to-Point Protocol 1). It is still in widespread
use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of
asynchronous lines have long been the mainstay for data communications. 3).
Point-to-Point Protocol (PPP) is a network-specific standard protocol with
STD number 51.
A
|
1. True, 2. true, 3. true
|
B
|
1. true, 2. false, 3. false
|
C
|
1. false, 2. false, 3. false
|
D
|
1. true, 2. false, 3. true
|
State weather the following
statement is true or false for Hierarchical Routing 1). In hierarchical
routing, the routers are divided into regions. 2) Each router is having the
idea about internal structure of other regions 3). Two level hierarchies may
be insufficient hence it may be necessary to group the regions into clusters.
A
|
1. True, 2. true, 3. true
|
B
|
1. true, 2. false, 3. false
|
C
|
1. false, 2. false, 3. false
|
D
|
1. true, 2. false, 3. true
|
Question 66
|
|
|
|
State weather the following
statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol
that addresses, routes, fragments, and reassembles packets 2).IPV6 is a
connectionless, unreliable datagram protocol. 3). An IPV6 packet consists of
an IPV6 header and an IPV6 payload.
A
|
1. True, 2. true, 3. true
|
B
|
1. true, 2. false, 3. false
|
C
|
1. false, 2. false, 3. false
|
D
|
1.false, 2. true, 3. true
|
State weather the following
statement is true or false for Stream Control Transmission Protocol (SCTP).
1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new
transport protocol at the same layer as TCP and UDP. 3). SCTP is a new
reliable, message oriented transport layer protocol.
A
|
1. True, 2. true, 3. true
|
B
|
1. true, 2. false, 3. false
|
C
|
1. false, 2. false, 3. false
|
D
|
1.false, 2. true, 3. true
|
Question 68
|
|
|
|
State weather the following
statement is true or false for Exception Reporting 1). If the user runs into
trouble, this trouble can be reported to the peer using a
S-U-EXCEPTION-REPORT. request primitive. 2). Exception reporting does not
only apply to user-detected errors 3). The service provider can generate an
S-P-EXCEPTION-REPORT.indication to notify the user about internal problems
within the session layer.
A
|
1. True, 2. true, 3. true
|
B
|
1. true, 2. false, 3. false
|
C
|
1. false, 2. false, 3. false
|
D
|
1.false, 2. true, 3. true
|
State weather the following
statement is true or false for Multipurpose Internet Mail Extensions 1).The
general syntax for MIME header fields is not the same as that for RFC 2822.
2).MIME header field names are never significant, but the cases of field
values can b. 3). A MIME-compliant message must contain a header field with
the following verbatim text: MIME-Version: 1.0
A
|
1. True, 2. true, 3. true
|
B
|
1. true, 2. false, 3. false
|
C
|
1. false, 2. false, 3. false
|
D
|
1.false, 2. true, 3. true
|
Question 70
|
|
|
|
State weather the following
statement is true or false for Sendmail. 1).Sendmail is a command-line tool
designed for most UNIX-like operating systems. 2).It define a method of
transferring mail, and acts as a client/server that supports multiple mail
protocols 3). Sendmail exists in both open source and proprietary software
packages.
A
|
1. True, 2. False, 3. true
|
B
|
1. true, 2. false, 3. false
|
C
|
1. false, 2. false, 3. false
|
D
|
|
|
No comments:
Post a Comment