Watch Video Below to Get Quiz 1 Spring 2019 Solution
The demand of sharing is very high because many computers need to
use the shared networks.
Select correct option:
WAN networks
Shared networks
Unshared networks
LAN networks
Most NICs contain _______________ circuitry that allows the NIC to
operate independent of the CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:
broadcast network
Thick Ethernet is known as------------------ Select correct option:
10 base 5
10 base T
10 base 100
10 base 1
The first automated tool required to see whether the given
computer is online or not was
Select correct option:
Probing program
PING program
status program
None of the above
The basic responsibility of NIC is ----------------
Select correct option:
To access medium/network
To resource allocation
To access memory
All of above
No error detection scheme is perfect because transmission errors
can affect _________.
Select correct option:
Data
Additional Information
Additional information & data
Transmission medium
-------------- has advantages arisen from the size and ease of
computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing
The third field of the header consists of ------ bit Ethernet
frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the
--------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology
Hardware that calculates a CRC uses two simple components.
Select correct option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
Most NICs contain _______________ circuitry that allows the NIC to
operate independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
Fixed network is a type of networks which is classified with
respect to the...........factor
Select correct option:
Size
Connectivity
Medium
Mobility
Network interface card acts like a (an) -----------
Select correct option:
Input/output device
Input device
Output device
All of above
IEEE LLC/SNAP header is --------, which is used to specify the
type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring topology use an access mechanism known
as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
The Gigabit Ethernet hardware operates at a rate of ________
10 Mbps
100 Mbps
1000 Mbps
None of the given
A network uses ------------ if all computers attach to a central
point
Select correct option:
Ring Topology
Star Topology
Hub Topology
Bus Topology
---------- is also called self healing network
Select correct option:
ATM
FDDI
Token Ring
None of the given
---------- which is designed to help detect transmissions errors,
send one extra bit of information with each character.
Select correct option:
Checksum
CRC
Parity
VRC
Hardware addresses must be ---------- on a LAN.
Select correct option:
Common
Unique
A ---------- relies on the hardware manufacturer to assign a
unique physical address to each network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given
The satellite or radio topology in which all computers are connected
to each other via satellite or radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network
CS610 – Computer Network
Quiz No.1 Nov 16, 2012
------ Program sends a message to a remote
computer and reports whether the computer
responds.
Ping
Ping
Traceroute
ICMP
Non of the given
responds.
Ping
Ping
Traceroute
ICMP
Non of the given
---------- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given
The term -------- is used to denote the
definition of a packet used with a specific type of
network.
Packet
Frame
Data
None of the given
network.
Packet
Frame
Data
None of the given
Computer networks are often called
-------------- because they use packet technology.
Ethernet
Switch networks
Packet networks
None of the given
-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given
Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
Ethernet
Switch networks
Packet networks
None of the given
-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given
Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
IEEE LLC/SNAP header is --------, which is used
to specify the type of data.
8 octets
8 bytes
8 bits
None of the given
8 octets
8 bytes
8 bits
None of the given
Formally named __________ informally known as
the twisted pair Ethernet or TP
Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given
Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given
An interface for twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T
A bridges function in the _________ layers(s).
Physical (MAC)
Data link
Network
Physical (MAC) and Data link
A Bridge can ________
Filter a frame
Forward a frame
Extend a LAN
Do all the above
A Bridge forwards or filters a frame by
comparing the information in its address table to
the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address
the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address
________ computes shortest paths in a graph by
using weights on edges as a measure of
distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta’s algorithm
Non of the given
distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta’s algorithm
Non of the given
___________ is used for audio and video, since
these have predefined maximum data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given
----------
is also called self healing network ATM
FDDI
Token Ring
None of the given
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given
Hardware that calculates a CRC uses two simple components.
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
The Ethernet standard specifies that frames are sent using the --------
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
When an application ------------ data, it makes a copy of the data available to all other computers on the network.
Select correct option:
Broadcasting
Multicasting
Unicasting
None of the given
LAN interface may use ---------- to copy frame data directly from main memory.
FDDI
Token Ring
None of the given
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given
Hardware that calculates a CRC uses two simple components.
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
The Ethernet standard specifies that frames are sent using the --------
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
When an application ------------ data, it makes a copy of the data available to all other computers on the network.
Select correct option:
Broadcasting
Multicasting
Unicasting
None of the given
LAN interface may use ---------- to copy frame data directly from main memory.
DMA
FDDI
CSMA/CD
None of the given
FDDI
CSMA/CD
None of the given
LAN
and WAN are classified according to their.........
Select correct option:
Size
Connectivity
Medium
Mobility
Select correct option:
Size
Connectivity
Medium
Mobility
For
how much time would other computers be in wait while one computer was
transferring 56MB file with transmission speed of 56Kbps
Select correct option:
10 Sec
11 Sec
12 Sec
13 Sec
Select correct option:
10 Sec
11 Sec
12 Sec
13 Sec
A
network uses _______ to arrange computers to be connected in
a single closed loop.
Select correct option:
Star Topology
Dual Ring Topology
Ring Topology
Bus Topology
Select correct option:
Star Topology
Dual Ring Topology
Ring Topology
Bus Topology
CBR stands for…………….
Constant Byte Rate
Constant Bit Rate
Connection break Recovery
None of the above
The routing table in interior and exterior
switches has which one of the following?
It should have next hop for each possible
destination
The next hop in table must be on shortest path
to destination
Both (a) and (b)
None of the above
Which one of the following is a method for
computing routing table information?
Manual entry
Static routing
Boot time routing
None of the above
Which one of the following is the
responsibility of Djikstra’ algorithm?
To compute the shortest path between two nodes
To extract next hop information from path
information
To insert next hop information into routing
table
All of the above
Routing table is used to keep the information
about…………….
Destination
Medium of transmission
Routers used in network
All of the above
Frame relay is………………….
Connection oriented service
Connectionless service
It is typically ranges from 5Mbps to 1000Mbps.
None of the above
Which of the following is not a guided medium?
Twisted-pair
cable Fiber-optic
cable Atmosphere
Coaxial cable
Which of the following statement is wrong
regarding PVC?
PVC last as long as the customer pay the
periodic fee for its use.
Forwarding tables are automatically restored
after pow er of equipment failure.
Forwarding table entries for PVC’s
are dynamically configured.
All of the above are wrong
Which of the following statement is true
regarding ATM?
ATM is a single technology that is designed to
meet the goals of both LANs and WANs.
ATM uses the concept of connection-oriented
networking.
Both (a) and (b)
None of the above
Djikstra’s algorithm is used to compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above
_________ is used to attach two autonomous
systems.
Select correct option:
BGP
IGP
EGP
none of the given
Select correct option:
BGP
IGP
EGP
none of the given
Due to revolutionalization of IP-V6 the speed has
increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Whenever
it handles a packet, IP software needs to separate the destination address into
a prefix.
Select correct option:
True
False
Select correct option:
True
False
TTL
stands for __________
Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given
Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given
IGPs
stand for _________
Select correct option:
Internal Gateway Protocols
Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given
Select correct option:
Internal Gateway Protocols
Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given
_____________identifies
which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given
Select correct option:
Logical address
Source port
Destination Port
None of the given
__________________encapsulates
IP datagram as data area in hardware frame.
Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given
Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given
Class
A mask is 255.0.0.0 which is used for ________________
Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
class A mask is 255.0.0.0 which is used for subnetting.
Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
class A mask is 255.0.0.0 which is used for subnetting.
NAT
is not useful at a residence with Cable Modem or DSL connectivity.
Select correct option:
True
False
Select correct option:
True
False
Autonomous
System chooses a routing protocol to exchange routing information which is
passed before being summarized to another group.
Select correct option:
True
False
Select correct option:
True
False
______
layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
Select correct option:
Network
Transport
Datalink
none of the given
The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given
The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False
Select correct option:
True
False
As the Internet grew, the original Classful addressing scheme
became a limitation. The IP address space was being exhausted because all
networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five
Select correct option:
three
two
four
five
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
EGP stands for _________
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
Although the ARP message format is sufficiently general to allow
arbitrary protocol and hardware addresses. ARP is almost always used to bind a
32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit
Select correct option:
16-bit
48-bit
64-bit
128-bit
Reliability is not the responsibility of the Transport layer.
Select correct option:
True
False
Select correct option:
True
False
IPV6 address with ______ leading zeros is interpreted to hold an
IPV4 address.
Select correct option:
96
100
120
none of the given
Select correct option:
96
100
120
none of the given
NAT software does not allow a PC to connect with the Internet and
act as a NAT device at the same time.
Select correct option:
True
False
Select correct option:
True
False
TCP uses the term segment to refer to a ________.
Select correct option:
packet
message
both (a) and (b)
None of the given
Select correct option:
packet
message
both (a) and (b)
None of the given
both a and b?
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False
Select correct option:
True
False
______________field tells the receiver how to order fragments
within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
IP datagram can contains ________ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
The amount of buffer space available at any time is called the
window.
Select correct option:
True
False
Select correct option:
True
False
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
Select correct option:
IPV4
IPV6
Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given
Select correct option:
Traffic class
Flow label
Destination address
none of the given
_______ protocol uses three way handshake to begin a connection.
Select correct option:
UDP
TCP
IP
none of the given
Select correct option:
UDP
TCP
IP
none of the given
Typical internet routing uses uses a combination of two
metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count
Question # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given
The routers within an
autonomous system use a _____________ to exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
Interior Gateway Protocols
(IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet
Routing Protocol.
Select correct option:
True
False
Select correct option:
True
False
The Network Layer Protocol ICMP
stands for____________
Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given
Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given
The Current version of
IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given
Select correct option:
18 years
20 years
22 years
none of given
TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False
In Direct point to point
communication adding the Nth computer
requires___________ new
connections.
N2
N-1
N2 –N)/2
None of the given
Most LANs that employ ring
topology use an access mechanism known
as_______
ring topology use token passing
for
synchronized access to the ring
Computers attached to an ether
use ------ in which a computer waits for the
ether to be idle before
transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
FDDI can transmits data at a
rate of ___________________
100 million bits per second
100 million bits per second
100 million bits per second
None of the given
________________ has advantages
arisen from the size and ease of
computation.
CRC
Parity
Checksums
None of given
AUI cable connects from NIC
to---------------
Select correct option:
BNC Connector
RJ-45 Connector
Transceiver
None of the above
As a result of ARPA research
the first network was established which was named as Select correct option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWORK
A ---------- provides mechanism
that automatically assignes a physical address to a station when the station
first boots. Select correct option:
Static ad Configurable
addressing scheme
polygons are basically concave
polygons that may have self-intersecting edges.
Complex
Hybrid
Convex
Convex and Hybrid
Dynamic addressing scheme
An ___________method, the
network hardware designers specify how type
information is included in the
frame and the value use to identify various frame Local Talk is a LAN
technology that employs
Explicit frame type
Ideal frame type
Implicit frame type
None of the given
In Point-to-Point topology there are two topologies.
Ideal frame type
Implicit frame type
None of the given
In Point-to-Point topology there are two topologies.
Tree and Ring
Star and Ring
Star and Tree
None of the given
The topology each computer is
connected to a central hub is called
Select correct option:
Ring topology
Star topology
Tree topology
Mesh topology
The basic responsibility of NIC
is ---------------- Select correct option:
To access medium
Network To resource allocation
To access memory
All of above
Currently the original Ethernet
hardware operates at a rate of --------
Select correct option:
10 Mbps
100 Mbps
1000 Mbps
3 Mbps
The Gigabit Ethernet hardware
operates at a rate of_________
10 Mbps
100 Mbps
1000 Mbps
The number of connections
needed for N computer in direct point to point
communication is equal to:
(N2-N)/2
N (N-1)
N2
None of the given
The length of the format of
hardware address is
Select correct option:
One to ten bytes
One to five bytes
One to six bytes
None of the given
Star topolgy is the kind of
Tree topology
Point-to-point topolgy
Broadcast topolgy
Ring topology
Local Talk is a LAN technology that employs________
Local Talk is a LAN technology that employs________
Bus topology
Ring topology
Star topology
None of the given
The network occupies larger
areas like cities & countries is called
Select correct option:
LAN
WAN
MAN
All of the above
Computer networks are
classified by.......factors
2
3
4
5
Computers attached to an
ethernet use ________in which a computer waits for
the other to be idle before
transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
none of the given
Point-to-point topology is
Size Based
Mobility Based
Connectivity Based
Medium Based
NIC connection in a physical
network is known as--------------------
Select correct option:
LAN wiring scheme
WAN wiring scheme
Color wiring
None of above
A_______ relies on the hardware
manufacturer to assign a unique physical
address to each network
interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given
The main functions of NIC are ---------------------
CRC Error
correction Address
recognition
All of above
FDDI can transmits data at a rate of ___________________
100 million bits per second
100 million bits per second
100 million bits per second
None of the given
Wireless LAN use the --------
as a media access method
Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA
A_______ relies on the hardware
manufacturer to assign a unique physical
address to each network
interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given
Wireless LAN use the --------
as a media access method
Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA
According to their size there
are............classifications of networks.
Select correct option:
2
3
4
5
As a result of ARPA research the first network was established which was named as Select correct option:
As a result of ARPA research the first network was established which was named as Select correct option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWOR
---------- performs the matching between destination address and MAC address of machine.
---------- performs the matching between destination address and MAC address of machine.
Select correct option:
Hardware address
LAN interface
DMA
None of above
An ___________method, the
network hardware designers specify how type
information is included in the
frame and the value use to identify various frame
types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given
The demand of sharing is very high because many computers need to use the shared networks.
Select correct option:
WAN networks
Shared networks
Unshared networks
LAN networks
Most NICs contain
_______________ circuitry that allows the NIC to operate independent of the
CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:
broadcast network
Thick Ethernet is known as------------------ Select correct option:
10 base 5
10 base T
10 base 100
10 base 1
The first automated tool
required to see whether the given computer is online or not was
Select correct option:
Probing program
PING program
status program
None of the above
The basic responsibility of NIC
is ----------------
Select correct option:
To access medium/network
To resource allocation
To access memory
All of above
No error detection scheme is
perfect because transmission errors can affect _________.
Select correct option:
Data
Additional Information
Additional information &
data
Transmission medium
-------------- has advantages
arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing
The third field of the header
consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies
that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology
have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology
Hardware that calculates a CRC
uses two simple components.
Select correct option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR
unit
Most NICs contain _______________
circuitry that allows the NIC to operate independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
Fixed network is a type of
networks which is classified with respect to the...........factor
Select correct option:
Size
Connectivity
Medium
Mobility
Network interface card acts
like a (an) -----------
Select correct option:
Input/output device
Input device
Output device
All of above
IEEE LLC/SNAP header is
--------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring
topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
The Gigabit Ethernet hardware
operates at a rate of ________
10 Mbps
100 Mbps
1000 Mbps
None of the given
A network uses ------------ if
all computers attach to a central point
Select correct option:
Ring Topology
Star Topology
Hub Topology
Bus Topology
---------- is also called self
healing network
Select correct option:
ATM
FDDI
Token Ring
None of the given
---------- which is designed to
help detect transmissions errors, send one extra bit of information with each
character.
Select correct option:
Checksum
CRC
Parity
VRC
Hardware addresses must be
---------- on a LAN.
Select correct option:
Common
Unique
A ---------- relies on the
hardware manufacturer to assign a unique physical address to each network
interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given
The satellite or radio topology
in which all computers are connected to each other via satellite or radio wave
is a kind of
Select correct option:
Broadcast network
Point-to-Point network
1_Which of the following
statement is true regarding Link-state routing?
Network topology is separated
from route computation.
Each switch builds its own
routing tables.
Link-state routing uses
Djikstra’s algorithm.
All
of the above = Answer
2_Which one of the following is
a property of dynamic routing?
Select correct option:
It is inflexible
It has low network overload
It can work around network
failure
All
of the above
3_All destinations on same
switch have same
Router
Information
Next
hop
None of the above
4_A _____________
address-binding table is used for each physical network.
Select correct option:
new
similar
separate
old
5_Asynchronous Transfer Mode
uses small fixed size cell. Each cell consist of ----------- octets.
55
53
52
51
6_Mapping between a protocol
address and a hardware address is called Address Resolution.
true
false
7_The Internet service
providers coordinate with the Internet assigned number authority to obtain
their network numbers.
Select correct option:
True
False
8_Dotted decimal represents
each octet in ________ and uses a dot to separate octets.
binary
decimal
lec25
hexadecimal
Octal
·
Mostly Quizz were from here..
Routing table is used to keep
the information about…………….
Destination
Medium of transmission
Routers used in network
All of the above
Which of the following
statement is true regarding Jitter?
Jitter is used for variance in
transmission delays.
Jitter can occur when a packet
is delayed.
Jitter is significance for
voice, video and data.
All
of the above
The maximum cable length of a
LAN is _____
Fixed
Unlimited
Fixed and Unlimited in
different conditions
None of these
Jitter is significance for
------------------
Voice
Video
Data
All
of above
The routing table contains
information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above
Which of the following is
called virtual channel?
Connection in VCI
Connection
in ATM
Connection in virtual circuit
None of the above
If a bridge builds up address
list for each segment that consists of physical addresses of the computer attached
to that segment. So, when the bridge boots, the size of list will be__ for each
segment.
3
2
1
0
Asynchronous Transfer Mode uses
small fixed size cell. Each cell consist of ----------- octets.
55
53
52
51
Which of the following
statement is true regarding ATM?
ATM is a single technology that
is designed to meet the goals of both LANs and WANs.
ATM uses the concept of
connection-oriented networking.
Both
(a) and (b)
None of the above
Frame forwarding of a bridge is
based on _________.
Select correct option:
Layer 3 source address
Layer 3 destination address
Layer
2 destination address
Layer 2 Source address
The process of forwarding the
packets of information is called…………….
Routing
Switching
Communication
None of the above
Which one of the following is a
property of static routing?
It is inflexible
It is done at boot time
It has low network overload
All
of the above
According to a bridges
Performance, if both the sauces
and destination are on the same segment
It forward the frame to the
other segment
It
does not forward the frame to the other segment
It does not forward the frame
to the same segment
It forwards the frame to every
other segment
What will be the bandwidth rate
for future (possibly 10 Gigabyte) Ethernet?
500 MHz
550 MHz
600
MHz
650 MHz
Asynchronous Transfer Mode uses
the concept of …………..
Connection-less network
Connection-oriented
network
The fiber-modem converts data
into _________ then transmits cover the optional fiber
Pulses
of light
Electrons
Electromagnetic signals
None of these
How many methods exist
for computing routing table?
5
4
3
2
To span long distance or many
computers, networks must replace shared medium with ………..
Segment transformation
Fiber optics
Packet
switches
None of the above
Which of the following
statement is true regarding Distance-vector routing?
It is very simple to implement.
Packet switch updates own
routing table first
It is used in RIP
All
of the above
What will be the bandwidth rate
for 1000Base-T Gigabyte or ATM?
100 MHz
150 MHz
200 MHz
250 MHz
CBR stands for…………….
Constant Byte Rate
Constant
Bit Rate
Connection break Recovery
None of the above
The routing table in interior
and exterior switches has which one of the following?
It should have next hop for
each possible destination
The next hop in table must be
on shortest path to destination
Both
(a) and (b)
None of the above
Which one of the following is a
method for computing routing table information?
Manual entry
Static
routing
Boot time routing
None of the above
Which one of the following is
the responsibility of Djikstra’ algorithm?
To compute the shortest path
between two nodes
To extract next hop information
from path information
To insert next hop information
into routing table
All
of the above
Routing table is used to keep
the information about…………….
Destination
Medium of transmission
Routers used in network
All of the above
Frame relay is………………….
Connection
oriented service
Connectionless service
It is typically ranges from
5Mbps to 1000Mbps.
None of the above
Which of the following is not a
guided medium?
Twisted-pair
cable Fiber-optic cable
Atmosphere
Coaxial cable
Which of the following
statement is wrong regarding PVC?
PVC last as long as the
customer pay the periodic fee for its use.
Forwarding tables are
automatically restored after power of equipment failure.
Forwarding
table entries for PVC’s are dynamically configured.
All of the above are wrong
Which of the following
statement is true regarding ATM?
ATM is a single technology that
is designed to meet the goals of both LANs and WANs.
ATM uses the concept of
connection-oriented networking.
Both
(a) and (b)
None of the above
Djikstra’s algorithm is used to
compute the……………….
shortest
path between two nodes
number of nodes used in the
network
distance between different
nodes
none of the above
If a link or a packet switch
fails then which one of the following would possibly be happened?
Link would be reestablished
Request to change failed
hardware would appear
The
packet switch will modify the tables
None of the above
The routing contains information
about immediately around it
Topology of the network
Destination
Both of the above
None of the above
SMDS is ……………………
Connectionless
service
Connection oriented service
Used for delivering blocks of
data
None of the above
The process of forwarding the
packets of information is called
Routing
Switching
Communication
None of the above
The sharing of a medium and its
link by two or more devices is called
modulation
encoding
line discipline
multiplexing
Which multiplexing technique
transmits analog signals?
FDM
TDM
WDM
(a)
and (c)
Which multiplexing technique
transmits digital signals?
FDM
TDM
WDM
None of above
Which multiplexing technique
shifts each signal to a different carrier frequency?
FDM
TDM
Both (a) and (b)
None of above
In synchronous TDM, for n
signal sources of the same data rate, each frame contains _______ slots.
n
n+1
N-1
O to n
Which multiplexing technique
involves signals composed of light beams?
FDM
TDM
WDM
None of above
_________ Utilization is the
use of available bandwidth to achieve specific goals.
Frequency
Bandwidth
Amplitude
None of the above
________ can be achieved by
using multiplexing; ______ can be achieved by using spreading.
Efficiency;
privacy and antijamming
Privacy and antijamming;
efficiency
Privacy and efficiency;
antijamming
Efficiency and antijamming;
privacy
________ is the set of
techniques that allows the simultaneous transmission of multiple signals across
a single data link.
1;
n
1:1
n;1
n;n
The word ______ refers to the
portion of a _______ that carries a transmission.
channel;
link
link; channel
line; channel
line; link
______ can be applied
when the bandwidth of a link (in hertz) is greater than the combined bandwidths
of the signals to be transmitted.
TDM
FDM
Both (a) or (b)
Neither (a) or (b)
FSM is an _________technique.
Analog
Digital
Either (a) or b)
None of the above
____ is designed to use the
high bandwidth capability of fiber-optic cable.
FDM
TDM
WDM
None of the above
_____ is a digital multiplexing
technique for combining several low-rate channels into one high-rate one.
FDM
TDM
WDM
None of the above
____ is designed to use the
high bandwidth capability of fiber-optic cable.
FDM
TDM
WDM
None of the above
______ is an analog
multiplexing technique to combine optical signals.
FDM
TDM
WDM
None of the above
_____ is a digital process that
allows several connections to share the high bandwidth of a link.
FDM
TDM
WDM
None of the above
_____ is a digital multiplexing
technique for combining several low-rate channels into one high-rate one.
FDM
TDM
WDM
None of the above
Djikstra’s algorithm is used to
compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above
The routing table in interior and exterior
switches has which one of the following?
None of the above
None of the above
Which one of the following is
the responsibility of Djikstra’ algorithm
To
compute the shortest path between two nodes
To extract next hop information
from path information
To extract next hop information
from path information
None of above
What will be the bandwidth rate
for short distance 10Base-T
16mhz
20mhz
100mhz
150mhz
What will be the bandwidth rate
for older, low-speed network, and analog telephones
16
20
24
30
How many methods exist for
building routing table?
1
2
3
4
Which of the following
statement is wrong regarding ATM?
It is a single technology for
voice, video and data
it has low jitter and high
capacity.
it uses fixed size, small
cells, 48 octet’s data
None
of the above
In Asynchronous Transfer Mode
VPI/VCI fields indentify the cells
Source
Destination
port@
none
The physical addressing in a
WAN is similar as in LAN in the way................
The data is transmitted in
packets equivalent to frames.
Each packet has a format with
header.
The packet header includes
destination and source addresses.
All
of the above
In Asynchronous Transfer Mode
VPI/VCI fields indentify the cells--------------
Which one of the following is a
method for computing routing table information?
Manual entry
Boot time routing
Static routing
None of the above
All destinations on same switch
have same
Router
Information
Next
hop
None of the above
Which of the following
statement is wrong regarding ATM?
It is a single technology for
voice, video and data
It has low jitter and high
capacity.
It uses fixed size, small
cells, 48 octet’s data
None
of the above
Which one of the following is
the responsibility of Djikstra’ algorithm?
To
compute the shortest path between two nodes
To extract next hop information
from path information
To insert next hop information
into routing table
All of the above
Which of the following
statement is true regarding Link-state routing?
Network topology is separated
from route computation.
Each switch builds its own
routing tables.
Link-state routing uses
Djikstra’s algorithm.
All
of the above
Jitter is significance for
------------------
Voice
Video
Data
All
of above
The routing table contains
information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above
Which one of the following is a
property of dynamic routing?
Select correct option:
It is inflexible
It has low network overload
It can work around network
failure
All
of the above
An exterior switch is one with
which ………………….
Select correct option:
Computers
are attached
No computer is attached
hubs are attached externally
None of the above
·
CS610 - Computer Network
Quiz #3 JAN 14, 2013
NAT device stores state
information in translation table.
Select correct option:
True
False
A _____________ address-binding
table is used for each physical network.
Select correct option:
new
similar
separate
old
Fragmentation when using ICMP
for path MTU should be avoided.
Select correct option:
True
False
Static routing
_______ can be used to
propagate information about remote networks.
Select correct option:
Dynamic routing
Static routing
Address resolution
None of the given
TCP stands for _______
Select correct option:
Transport control protocol
Transmission
control protocol
The Universal Datagram Protocol
is not an end-to-end protocol.
Select correct option:
True
False
For _____________, information
about forwarding is stored in a routing table, which is initialized at system
initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
IPV6 address with ____ leading
zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
_____ Protocol provides error
reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given
The Universal Datagram Protocol
is a message-oriented protocol.
Select correct option:
True
False
Select correct option:
True
False
destination address into a
prefix and suffix
Select correct option:
True
False
Select correct option:
True
False
which is not the type of error
messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given
Which protocol is used to test
different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
HEADER LEN field gives size of
extention header.
Select correct option:
False
True
Select correct option:
False
True
is a ____ protocol.
Select correct option:
Point-to-Point
Multi-Point
Both (a) and (b)
None of the given
Select correct option:
Point-to-Point
Multi-Point
Both (a) and (b)
None of the given
CP
NAT device stores state
information in translation table.
Select correct option:
True
False
Select correct option:
True
False
Postfix defines how much of
address used to identify network.
Select correct option:
True
False
Select correct option:
True
False
As the Internet grew, the
original Classful addressing scheme became a limitation. The IP address space
was being exhausted because all networks had to choose one
of______ possible sizes.
Select correct option:
three
two
four
five
three
two
four
five
Every hardware technology
specification includes the definition of the maximum size of the frame data area,
which is called the __________Transmission Unit.
Select correct option:
Select correct option:
Least
Maximum
Fragment
Frame
Maximum
Fragment
Frame
Twice NAT allows a site to run
servers.
Select correct option:
True
False
Select correct option:
True
False
The maximum segment size of TCP
flow control is_________
Select correct option:
3000 octets
2000 octets
1000 octets
none of the given
Select correct option:
3000 octets
2000 octets
1000 octets
none of the given
In IP routing, forwarding
refers to ____ transfer.
Select correct option:
packet
datagram
message
None of the given
Select correct option:
packet
datagram
message
None of the given
There are _____ possibilities
to detect the destination using Trace-route
Select correct option:
1
2
3
None of the given
Select correct option:
1
2
3
None of the given
dynamic routing, the routing
table is initialized when system boots.
Select correct option:
True
False
Select correct option:
True
False
Hashing is the transformation
of a string of characters into a usually shorter fixed-length value or a key
that represents the original string.
Select correct option:
True
False
Select correct option:
True
False
Dotted decimal represents each
octet in ______ and uses a dot to separate octets.
Select correct option:
binary
decimal
hexadecimal
Octal
Select correct option:
binary
decimal
hexadecimal
Octal
The amount of buffer space
available at any time is called the window.
Select correct option:
True
False
Select correct option:
True
False
In IPV6 the 128 bit addresses
unwidely in dotted decimal;requires ___numbers.
Select correct option:
12
14
16
none of the given
Select correct option:
12
14
16
none of the given
______ field is used to
identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
IPV6 address consists of ______
Select correct option:
32 Bits
64 Bits
128 Bits
none of the given
Select correct option:
32 Bits
64 Bits
128 Bits
none of the given
The IP class scheme does not
divide the______ address space into equal size class and the classes do
not contain the same number of networks.
Select correct option:
16-bit
32-bit
48-bit
64-bit
Select correct option:
16-bit
32-bit
48-bit
64-bit
A datagram cannot be larger
than ______ of a network over which it is sent.
Select correct option:
MTU
Size
IP header
None of the given
Select correct option:
MTU
Size
IP header
None of the given
An Internet Address (IP
address) is a unique ________ binary number assigned to a host and
used for all communication with host
Select correct option:
48-bit
32-bit
24-bit
None of the given
Select correct option:
48-bit
32-bit
24-bit
None of the given
IP datagram can
contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Interior Gateway Protocols
(IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet
Routing Protocol.
Select correct option:
True
False
Select correct option:
True
False
Due to revolutionalization of
IP-V6 the speed has increased from_____
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
_______uses window
mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given
Select correct option:
IP
UDP
TCP
none of the given
window mechanism
Mapping between a protocol address
and a hardware address is called Address Resolution.
Select correct option:
True
False
Select correct option:
True
False
UPD is operating system
independent.
Select correct option:
True
False
Select correct option:
True
False
A________ is a
special-purpose computer dedicated to the task of interconnecting networks.
Select correct option:
Router
Bridge
Switch
None of the given
Select correct option:
Router
Bridge
Switch
None of the given
Network having short intervals
has a large timeout and the network having large interval has short timeout.
Select correct option:
True
False
Select correct option:
True
False
_________ places the
boundary between the first and second octets
Select correct option:
Class A
Class B
Class C
Class D
Select correct option:
Class A
Class B
Class C
Class D
Whenever it handles a packet,
IP software needs to separate the destination address into a prefix and suffix
Select correct option:
True
False
Select correct option:
True
False
There are three standard
implementations to improve computational efficiency: Hashing, Direct Indexing
and InDirect Indexing
True
False
True
False
IPV6 128 bits address includes
network prefix and ______
Select correct option:
Host Suffix
Host prefix
Source Prefix
none of the given
Select correct option:
Host Suffix
Host prefix
Source Prefix
none of the given
ICMP message transport is acted
upon by getting ICMP_______ in IP.
Select correct option:
De-encapsulated
Encapsulated
Segmented
none of the given
Select correct option:
De-encapsulated
Encapsulated
Segmented
none of the given
As the Internet grew, the
original Classful addressing scheme became a limitation. The IP address space
was being exhausted because all networks had to choose one of three possible
sizes.
Select correct option:
True
False
Twice NAT allows a site to run
servers.
Select correct option:
True
False
·
Select correct option:
IP - New Generation (IPng)
IP
- Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
As the Internet grew, the
original Classful addressing scheme became a limitation. The IP address space
was being exhausted because all networks had to choose one of two possible
sizes.
Select correct option:
True
False
_________ uses window mechanism
to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given
The Internet service providers
coordinate with the Internet assigned number authority to obtain their network
numbers.
Select correct option:
True
False
Which protocol is used to test
different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
________ identifies the
application program that sent the data.
Select correct option:
Destination Port
Source
port
Logical address
None of the given
The Source can configure
outgoing datagram's to avoid _________
Select correct option:
Segmentation
Defragmentation
Fragmentation
None of the given
The time for acknowledgement to
arrive depends on __________
Select correct option:
Distance to destination
Current traffic conditions
Both
a and b
none of the given
which is not the type of error
messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none
of the given
Preliminary version of IP was
called _________.
Select correct option:
IP - New Generation (IPng)
IP
- Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
HEADER LEN field gives size of
extention header.
Select correct option:
False
True
_______ shows senders
preference for low latency, high Reliability.
Select correct option:
TYPE
SERVICE
TYPE
SERVICE PRIORITY
None of the given
As the Internet grew, the
original Classful addressing scheme became a limitation. The IP address space
was being exhausted because all networks had to choose one of two possible
sizes.
Select correct option:
True
False
________ field of header
indicates whether a datagram is a fragment or a complete datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATIONNo.3
None
of the given (not sure) Page 105
In ______________, the protocol
address assigned to a computer is chosen carefully so that computer's hardware
address can be computed from the protocol address using basic Boolean and
arithmetic operations.
Select correct option:
Address Resolution
Table Lookup
Message Exchange
Closed-form
Computation Page 94
Postfix defines how much of
address used to identify network.
Select correct option:
True
False
______________field tells the
receiver how to order fragments within a given datagram.
Select correct option:
FLAGSNo.4
FRAGMENT OFFSET
IDENTIFICATION
None
of the given (not sure) Page 105
H.LEN shows the header length
in units of ____ Bits
Select correct option:
34
32
Page 105
30
None of the given
In Closed-form computation, the
protocol address assigned to a computer is chosen carefully so
that computer's hardware
address can be computed from the protocol address using basic Boolean and
_________ operations.
Select correct option:
arithmetic
XOR
Shift
XNORNo.5
For _____________, information
about forwarding is stored in a routing table, which is initialized atsystem
initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
End to End delivery Service of
IP datagram is _____
Select correct option:
Connection oriented
Connectionless
Page 120
both a and b
none of the given
______ contains all information
needed to deliver datagram to the destination.
Select correct option:
Header
Data AreaPage No.6
Identifier
none of the given
IPV6 addresses are _____ bits.
Select correct option:
32
64
128
256
The Header format of IPv6 is entirely different.
Select correct option:
True
False
____ contains all information needed to deliver datagram to the destination.
Select correct option:
Header
Data Area
Identifier
none of the given
Which one of these is not a
main feature of connectionless service:
Select correct option:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.
Select correct option:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.
H.LEN shows the header length in units of __ Bits
Select correct option:
34
32
30
None of the given
____ layer Provides
reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Network
Transport
Datalink
none of the given
Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given
Traffic class
Flow label
Destination address
none of the given
______ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
_____ is a technique used to Limit datagram size to small MTU of any network
Select correct option:
Segmentation
Fragmentation
Encapsulation
none of the given
The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given
The protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent.
Select correct option:
Encrypted
Decrypted
Translated
Non of these
Inside a computer, each address mask is stored as a __-bit value.
Select correct option:
48
64
16
32
_____ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
18 years
20 years
22 years
none of given
The protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent.
Select correct option:
Encrypted
Decrypted
Translated
Non of these
Inside a computer, each address mask is stored as a __-bit value.
Select correct option:
48
64
16
32
_____ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
Every hardware technology
specification includes the definition of the maximum size of the frame data
area, which is called the __________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame
IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Select correct option:
Least
Maximum
Fragment
Frame
IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
MTU Stands for _______
Select correct option:
Mininum transmission unit
Maximun transmission unit
Multicast transmission unit
None of the given
Select correct option:
Mininum transmission unit
Maximun transmission unit
Multicast transmission unit
None of the given
As the Internet grew, the
original Classful addressing scheme became a limitation. The IP address space
was being exhausted because all networks had to choose one of ______ possible
sizes.
Select correct option:
three
two
four
five
End to End delivery Service of
IP datagram is ___
Select correct option:
Connection oriented
Connectionless
Both a and b
None of the given
______________field tells the
receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATION
None of the given
Postfix defines how much of
address used to identify network.
Select correct option:
True
False
Every hardware technology
specification includes the definition of the maximum size of the frame data
area, which is called the __________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame
·
Select correct option:
The destination network ID
The hop count to reach the
network
The
router ID of the next hop
All of the given
NAT device stores state
information in translation table.
Select correct option:
True
False
TCP achieves _________ by retransmission.
Select correct option:
Efficiency
Accuracy
Reliability
none of the given
________ identifies the
application program that sent the data.
Select correct option:
Destination Port
Source
port
Logical address
None of the given
_____ Protocol provides error
reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given
Routing refers to the _________
of routing information.
Select correct option:
transmission
propagation
communication
None of the given
______ layer Provides reliable
delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
End to End delivery Service of
IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
TCP is a connectionless and
reliable transport protocol.
Select correct option:
True
False
If you need any help regarding Any Subject of VU or Need Solution of Assignments, Quizes, GDBs or Past Peper then Contact Us or Join Our WhatsApp Group:
0 Comments