Blogger Text

My Aim to Provide you quality contents, Tips & Tricks, Software, Microsoft Office, Graphic Editing (Adobe PhotoShop, After Affects, Illustrator, inDesign) Corel Draw, Corel Video Studio, Cyberlink PowerDirector, Power ActionCinema, Tutorials about Blogging and VU Assignments, Quizes & GDB Solutions and Much More... at regular Basis
                                     ***    Kindly Subscribe our Official YouTube Channel "INFOPALACESS OFFICIAL-Tuts: in this channel we upload Programming (C,C++,C# JAVA, PHP), Web Development, Graphics Editing and Microsoft Office Step by Step Tutorials from bigginer to Advance Level. We also provide free online courses at our YouTube Channel. ***   Graded Assignments/Quizes and GDB will start in Next Week. Solution ideas of All assignments, Quizes and GDB will be available here. If you have any problem regarding this then you can contact us.

CS610 MCQs Mega File (1500+) MCQs Solved with References Picked from Past Papers



CS610 MCQs Mega File Solved with References by Infopalacess.com

Watch Video Below to Get Quiz 1 Spring 2019 Solution 





The demand of sharing is very high because many computers need to use the shared networks.
Select correct option:
 WAN networks
 Shared networks
 Unshared networks
 LAN networks

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:
broadcast network


Thick Ethernet is known as------------------ Select correct option:
10 base 5
10 base T
10 base 100
10 base 1



The first automated tool required to see whether the given computer is online or not was
Select correct option:
Probing program
PING program
status program
None of the above

The basic responsibility of NIC is ----------------
Select correct option:
To access medium/network
To resource allocation
To access memory
All of above


No error detection scheme is perfect because transmission errors can affect _________.
Select correct option:
Data
Additional Information
Additional information & data
Transmission medium

-------------- has advantages arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing

The third field of the header consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology

Hardware that calculates a CRC uses two simple components.
Select correct option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given

Fixed network is a type of networks which is classified with respect to the...........factor
Select correct option:
Size
Connectivity
Medium
Mobility

Network interface card acts like a (an) -----------
Select correct option:
Input/output device
Input device
Output device
All of above

IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above

Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING

The Gigabit Ethernet hardware operates at a rate of ________
10 Mbps
100 Mbps
1000 Mbps
None of the given

A network uses ------------ if all computers attach to a central point
Select correct option:
Ring Topology
Star Topology
Hub Topology
Bus Topology

---------- is also called self healing network
Select correct option:
ATM
FDDI
Token Ring
None of the given

---------- which is designed to help detect transmissions errors, send one extra bit of information with each character.
Select correct option:
Checksum
CRC
Parity
VRC

Hardware addresses must be ---------- on a LAN.
Select correct option:
Common
Unique
A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network



CS610 – Computer Network
Quiz No.1 Nov 16, 2012

------ Program sends a message to a remote computer and reports whether the computer
responds.
Ping
Ping
Traceroute
ICMP
Non of the given

---------- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given

The term -------- is used to denote the definition of a packet used with a specific type of
network.
Packet
Frame
Data
None of the given

Computer networks are often called -------------- because they use packet technology.
Ethernet
Switch networks
Packet networks
None of the given

-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given

Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given

IEEE LLC/SNAP header is --------, which is used to specify the type of data.
8 octets
8 bytes
8 bits
None of the given


Formally named __________ informally known as the twisted pair Ethernet or TP
Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given


An interface for twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T

A bridges function in the _________ layers(s).
Physical (MAC)
Data link
Network
Physical (MAC) and Data link

A Bridge can ________
Filter a frame
Forward a frame
Extend a LAN
Do all the above

A Bridge forwards or filters a frame by comparing the information in its address table to
the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address

________ computes shortest paths in a graph by using weights on edges as a measure of
distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta’s algorithm
Non of the given

___________ is used for audio and video, since these have predefined maximum data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given

---------- is also called self healing network   ATM
FDDI
Token Ring
None of the given

Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
 CSMA/CD
 CSMA/CA
 CSMA
 TOKEN PASSING

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given

Hardware that calculates a CRC uses two simple components.
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

The Ethernet standard specifies that frames are sent using the --------
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)

When an application ------------ data, it makes a copy of the data available to all other computers on the network.
Select correct option:
 Broadcasting
 Multicasting
 Unicasting
 None of the given

LAN interface may use ---------- to copy frame data directly from main memory.    
DMA
FDDI
CSMA/CD
None of the given


LAN and WAN are classified according to their.........
Select correct option:
Size
Connectivity
Medium
Mobility 
For how much time would other computers be in wait while one computer was transferring 56MB file with transmission speed of 56Kbps
Select correct option:
10 Sec
11 Sec
12 Sec
13 Sec

A network uses _______ to arrange computers to be connected in a single closed loop.
Select correct option:
Star Topology
Dual Ring Topology
Ring Topology
Bus Topology

CBR stands for…………….
Constant Byte Rate
Constant Bit Rate
Connection break Recovery
None of the above

The routing table in interior and exterior switches has which one of the following?
It should have next hop for each possible destination
The next hop in table must be on shortest path to destination
Both (a) and (b)
None of the above

Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Boot time routing
None of the above

Which one of the following is the responsibility of Djikstra’ algorithm?
To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above



Routing table is used to keep the information about…………….
Destination
Medium of transmission
Routers used in network
All of the above

Frame relay is………………….
Connection oriented service
Connectionless service
It is typically ranges from 5Mbps to 1000Mbps.
None of the above

Which of the following is not a guided medium?
Twisted-pair
cable Fiber-optic
cable Atmosphere
Coaxial cable
Which of the following statement is wrong regarding PVC?
PVC last as long as the customer pay the periodic fee for its use.
Forwarding tables are automatically restored after pow er of equipment failure.
Forwarding table entries for PVC’s are dynamically configured.
All of the above are wrong

Which of the following statement is true regarding ATM?
ATM is a single technology that is designed to meet the goals of both LANs and WANs.
ATM uses the concept of connection-oriented networking.
Both (a) and (b)
None of the above

Djikstra’s algorithm is used to compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above

_________ is used to attach two autonomous systems.
Select correct option:

BGP
IGP
EGP
none of the given






Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given

Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
False

TTL stands for __________
Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given

IGPs stand for _________
Select correct option:

Internal Gateway Protocols
Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given

_____________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given

__________________encapsulates IP datagram as data area in hardware frame.
Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given



Class A mask is 255.0.0.0 which is used for ________________
Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
class A mask is 255.0.0.0 which is used for subnetting.

NAT is not useful at a residence with Cable Modem or DSL connectivity.
Select correct option:
True
False

Autonomous System chooses a routing protocol to exchange routing information which is passed before being summarized to another group.
Select correct option:
True
False

______ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given

The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given

The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five

End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given

EGP stands for _________
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit

Reliability is not the responsibility of the Transport layer.
Select correct option:
True
False

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False

TCP uses the term segment to refer to a ________.
Select correct option:

packet
message
both (a) and (b)
None of the given
both a and b?

The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False

______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given

IP datagram can contains ________ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given

The amount of buffer space available at any time is called the window.
Select correct option:
True
False 

_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6

Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given



_______ protocol uses three way handshake to begin a connection.
Select correct option:

UDP
TCP
IP
none of the given

Typical internet routing uses uses a combination of two metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count 

Question # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given 

The routers within an autonomous system use a _____________ to exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False 

The Network Layer Protocol ICMP stands for____________
Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given 

The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given

TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False



In Direct point to point communication adding the Nth computer
requires___________ new connections.
N2
N-1
N2 –N)/2
None of the given


Most LANs that employ ring topology use an access mechanism known
as_______
ring topology use token passing for
synchronized access to the ring

Computers attached to an ether use ------ in which a computer waits for the
ether to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given

FDDI can transmits data at a rate of ___________________
100 million bits per second
100 million bits per second
100 million bits per second
None of the given
________________ has advantages arisen from the size and ease of
computation.
CRC
Parity
Checksums
None of given


AUI cable connects from NIC to---------------
Select correct option:
BNC Connector
RJ-45 Connector
Transceiver
None of the above


As a result of ARPA research the first network was established which was named as Select correct option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWORK

A ---------- provides mechanism that automatically assignes a physical address to a station when the station first boots. Select correct option:
Static ad Configurable
addressing scheme

polygons are basically concave polygons that may have self-intersecting edges.
Complex
Hybrid
Convex
Convex and Hybrid
Dynamic addressing scheme

An ___________method, the network hardware designers specify how type
information is included in the frame and the value use to identify various frame Local Talk is a LAN technology that employs
Explicit frame type
Ideal frame type
Implicit frame type
None of the given



In Point-to-Point topology there are two topologies.
Tree and Ring
Star and Ring
Star and Tree
None of the given

The topology each computer is connected to a central hub is called
Select correct option:
Ring topology
Star topology
Tree topology
Mesh topology

The basic responsibility of NIC is ---------------- Select correct option:
To access medium
Network To resource allocation
To access memory
All of above


Currently the original Ethernet hardware operates at a rate of --------
Select correct option:
10 Mbps
100 Mbps
1000 Mbps
3 Mbps

The Gigabit Ethernet hardware operates at a rate of_________
10 Mbps
100 Mbps
1000 Mbps

The number of connections needed for N computer in direct point to point
communication is equal to:
(N2-N)/2
N (N-1)
N2
None of the given

The length of the format of hardware address is
Select correct option:
One to ten bytes
One to five bytes
One to six bytes
None of the given

Star topolgy is the kind of
Tree topology
Point-to-point topolgy
Broadcast topolgy
Ring topology

Local Talk is a LAN technology that employs________
Bus topology
Ring topology
Star topology
None of the given
The network occupies larger areas like cities & countries is called
Select correct option:
LAN
WAN
MAN
All of the above

Computer networks are classified by.......factors
2
3
4
 5

Computers attached to an ethernet use ________in which a computer waits for
the other to be idle before transmitting a frame.
CSMA/CD
CSMA/CA
TOKEN PASSING
none of the given

Point-to-point topology is
Size Based
Mobility Based
Connectivity Based
Medium Based

NIC connection in a physical network is known as--------------------
Select correct option:
LAN wiring scheme
WAN wiring scheme
Color wiring
None of above

A_______ relies on the hardware manufacturer to assign a unique physical
address to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given


The main functions of NIC are ---------------------
CRC Error
correction Address
recognition
All of above

FDDI can transmits data at a rate of ___________________
100 million bits per second
100 million bits per second
100 million bits per second
None of the given

Wireless LAN use the -------- as a media access method
Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA

A_______ relies on the hardware manufacturer to assign a unique physical
address to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given
Wireless LAN use the -------- as a media access method
Select correct option:
CSMA/CD
CSMA/CA
TOKEN PASSING
CSMA

According to their size there are............classifications of networks.
 Select correct option:
2
3
 4
 5

As a result of ARPA research the first network was established which was named as Select correct option:
INTERNETWORKING
ARPNET
ARPANET
PACKET NETWOR

---------- performs the matching between destination address and MAC address of machine.
Select correct option:
Hardware address
LAN interface
DMA
None of above

An ___________method, the network hardware designers specify how type
information is included in the frame and the value use to identify various frame
types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given


The demand of sharing is very high because many computers need to use the shared networks.
Select correct option:
 WAN networks
 Shared networks
 Unshared networks
 LAN networks

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:
broadcast network


Thick Ethernet is known as------------------ Select correct option:
10 base 5
10 base T
10 base 100
10 base 1



The first automated tool required to see whether the given computer is online or not was
Select correct option:
Probing program
PING program
status program
None of the above

The basic responsibility of NIC is ----------------
Select correct option:
To access medium/network
To resource allocation
To access memory
All of above


No error detection scheme is perfect because transmission errors can affect _________.
Select correct option:
Data
Additional Information
Additional information & data
Transmission medium

-------------- has advantages arisen from the size and ease of computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing

The third field of the header consists of ------ bit Ethernet frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the --------
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology

Hardware that calculates a CRC uses two simple components.
Select correct option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given

Fixed network is a type of networks which is classified with respect to the...........factor
Select correct option:
Size
Connectivity
Medium
Mobility

Network interface card acts like a (an) -----------
Select correct option:
Input/output device
Input device
Output device
All of above

IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above

Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING

The Gigabit Ethernet hardware operates at a rate of ________
10 Mbps
100 Mbps
1000 Mbps
None of the given

A network uses ------------ if all computers attach to a central point
Select correct option:
Ring Topology
Star Topology
Hub Topology
Bus Topology

---------- is also called self healing network
Select correct option:
ATM
FDDI
Token Ring
None of the given

---------- which is designed to help detect transmissions errors, send one extra bit of information with each character.
Select correct option:
Checksum
CRC
Parity
VRC

Hardware addresses must be ---------- on a LAN.
Select correct option:
Common
Unique
A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network

1_Which of the following statement is true regarding Link-state routing? 

Network topology is separated from route computation.

Each switch builds its own routing tables.

Link-state routing uses Djikstra’s algorithm.

All of the above = Answer


  
2_Which one of the following is a property of dynamic routing?

Select correct option:

It is inflexible

It has low network overload

It can work around network failure

All of the above

  
3_All destinations on same switch have same

Router

Information

Next hop


None of the above



4_A _____________ address-binding table is used for each physical network.

Select correct option:

 new

 similar

 separate


 old



5_Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ----------- octets.

55

53

52


51



6_Mapping between a protocol address and a hardware address is called Address Resolution.



true

false



7_The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.

Select correct option:

True


False



8_Dotted decimal represents each octet in ________ and uses a dot to separate octets.







binary

decimal   lec25

hexadecimal

Octal 

4TH SEM
Emaan..! . January 28, 2014 at 11:10am
Mostly Quizz were from here..



Routing table is used to keep the information about…………….

Destination

Medium of transmission

Routers used in network

All of the above





Which of the following statement is true regarding Jitter?

Jitter is used for variance in transmission delays.

Jitter can occur when a packet is delayed.

Jitter is significance for voice, video and data.

All of the above



The maximum cable length of a LAN is _____

Fixed

Unlimited

Fixed and Unlimited in different conditions

None of these



Jitter is significance for ------------------

Voice

Video

Data

All of above



The routing table contains information about the ………………immediately around it.

topology of the network

destination

both of the above

none of the above



Which of the following is called virtual channel?

Connection in VCI

Connection in ATM

Connection in virtual circuit

None of the above



If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.

3

2

1

0



Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ----------- octets.

55

53

52

51



Which of the following statement is true regarding ATM?

ATM is a single technology that is designed to meet the goals of both LANs and WANs.

ATM uses the concept of connection-oriented networking.

Both (a) and (b)

None of the above





Frame forwarding of a bridge is based on _________.

Select correct option:

Layer 3 source address

Layer 3 destination address

Layer 2 destination address

Layer 2 Source address



The process of forwarding the packets of information is called…………….

Routing

Switching

Communication

None of the above



Which one of the following is a property of static routing?

It is inflexible

It is done at boot time

It has low network overload

All of the above



According to a bridges

Performance, if both the sauces and destination are on the same segment

It forward the frame to the other segment

It does not forward the frame to the other segment

It does not forward the frame to the same segment

It forwards the frame to every other segment



What will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet?

500 MHz

550 MHz

600 MHz

650 MHz



Asynchronous Transfer Mode uses the concept of …………..

Connection-less network

Connection-oriented network

The fiber-modem converts data into _________ then transmits cover the optional fiber

Pulses of light

Electrons

Electromagnetic signals

None of these



 How many methods exist for computing routing table?

5

4

3

2



To span long distance or many computers, networks must replace shared medium with ………..

Segment transformation

Fiber optics

Packet switches

None of the above



Which of the following statement is true regarding Distance-vector routing?

It is very simple to implement.

Packet switch updates own routing table first

It is used in RIP

All of the above



What will be the bandwidth rate for 1000Base-T Gigabyte or ATM?

100 MHz

150 MHz

200 MHz

250 MHz





CBR stands for…………….

Constant Byte Rate

Constant Bit Rate

Connection break Recovery

None of the above



The routing table in interior and exterior switches has which one of the following?

It should have next hop for each possible destination

The next hop in table must be on shortest path to destination

Both (a) and (b)

None of the above



Which one of the following is a method for computing routing table information?

Manual entry

Static routing

Boot time routing

None of the above

Which one of the following is the responsibility of Djikstra’ algorithm?

To compute the shortest path between two nodes

To extract next hop information from path information

To insert next hop information into routing table

All of the above



Routing table is used to keep the information about…………….

Destination


Medium of transmission

Routers used in network

All of the above



Frame relay is………………….

Connection oriented service

Connectionless service

It is typically ranges from 5Mbps to 1000Mbps.

None of the above



Which of the following is not a guided medium?

Twisted-pair

cable Fiber-optic cable

Atmosphere

Coaxial cable



Which of the following statement is wrong regarding PVC?

PVC last as long as the customer pay the periodic fee for its use.

Forwarding tables are automatically restored after power of equipment failure.

Forwarding table entries for PVC’s are dynamically configured.

All of the above are wrong



Which of the following statement is true regarding ATM?

ATM is a single technology that is designed to meet the goals of both LANs and WANs.

ATM uses the concept of connection-oriented networking.

Both (a) and (b)

None of the above



Djikstra’s algorithm is used to compute the……………….

shortest path between two nodes

number of nodes used in the network

distance between different nodes

none of the above



If a link or a packet switch fails then which one of the following would possibly be happened?

Link would be reestablished

Request to change failed hardware would appear

The packet switch will modify the tables

None of the above





The routing contains information about immediately around it

Topology of the network

Destination

Both of the above

None of the above



SMDS is ……………………

Connectionless service

Connection oriented service

Used for delivering blocks of data

None of the above



The process of forwarding the packets of information is called

Routing

Switching

Communication

None of the above



The sharing of a medium and its link by two or more devices is called

modulation

encoding

line discipline

multiplexing







Which multiplexing technique transmits analog signals?

FDM

TDM

WDM

(a) and (c)



Which multiplexing technique transmits digital signals?

FDM

TDM

WDM

None of above

Which multiplexing technique shifts each signal to a different carrier frequency?

FDM

TDM

Both (a) and (b)

None of above



In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots.

n

n+1

N-1

O to n



Which multiplexing technique involves signals composed of light beams?

FDM

TDM

WDM

None of above



_________ Utilization is the use of available bandwidth to achieve specific goals.

Frequency

Bandwidth

Amplitude

None of the above



________ can be achieved by using multiplexing; ______ can be achieved by using spreading.

Efficiency; privacy and antijamming

Privacy and antijamming; efficiency

Privacy and efficiency; antijamming

Efficiency and antijamming; privacy



________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.

1; n

1:1

n;1

n;n





The word ______ refers to the portion of a _______ that carries a transmission.

channel; link

link; channel

line; channel

line; link



 ______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted.

TDM

FDM

Both (a) or (b)

Neither (a) or (b)



FSM is an _________technique.

Analog

Digital

Either (a) or b)

None of the above



____ is designed to use the high bandwidth capability of fiber-optic cable.

FDM

TDM

WDM

None of the above





_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.

FDM

TDM

WDM

None of the above



____ is designed to use the high bandwidth capability of fiber-optic cable.

FDM

TDM

WDM

None of the above



______ is an analog multiplexing technique to combine optical signals.

FDM

TDM

WDM

None of the above



_____ is a digital process that allows several connections to share the high bandwidth of a link.

FDM

TDM

WDM

None of the above



_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.

FDM

TDM

WDM

None of the above



Djikstra’s algorithm is used to compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above







The routing table in interior and exterior switches has which one of the following?
None of the above



Which one of the following is the responsibility of Djikstra’ algorithm

To compute the shortest path between two nodes

To extract next hop information from path information

To extract next hop information from path information

None of above

What will be the bandwidth rate for short distance 10Base-T

16mhz

20mhz

100mhz

150mhz



What will be the bandwidth rate for older, low-speed network, and analog telephones

16

20

24

30



How many methods exist for building routing table?

1

2

3

4



Which of the following statement is wrong regarding ATM?

It is a single technology for voice, video and data

it has low jitter and high capacity.

it uses fixed size, small cells, 48 octet’s data

None of the above



In Asynchronous Transfer Mode VPI/VCI fields indentify the cells

Source

Destination

port@

none



The physical addressing in a WAN is similar as in LAN in the way................

The data is transmitted in packets equivalent to frames.

Each packet has a format with header.

The packet header includes destination and source addresses.

All of the above







In Asynchronous Transfer Mode VPI/VCI fields indentify the cells--------------

Which one of the following is a method for computing routing table information?

Manual entry

Boot time routing

 Static routing

None of the above



All destinations on same switch have same

Router

Information

Next hop

None of the above



Which of the following statement is wrong regarding ATM?

It is a single technology for voice, video and data

It has low jitter and high capacity.

It uses fixed size, small cells, 48 octet’s data

None of the above



Which one of the following is the responsibility of Djikstra’ algorithm?

To compute the shortest path between two nodes

To extract next hop information from path information

To insert next hop information into routing table

All of the above



Which of the following statement is true regarding Link-state routing?

Network topology is separated from route computation.

Each switch builds its own routing tables.

Link-state routing uses Djikstra’s algorithm.

All of the above



Jitter is significance for ------------------

Voice

Video

Data

All of above



The routing table contains information about the ………………immediately around it.

topology of the network

destination

both of the above

none of the above









Which one of the following is a property of dynamic routing?

Select correct option:

It is inflexible

It has low network overload

It can work around network failure

All of the above



An exterior switch is one with which ………………….

Select correct option:

Computers are attached

No computer is attached

hubs are attached externally

None of the above
some ware from here..

CS610 - Computer Network
Quiz #3 JAN 14, 2013


NAT device stores state information in translation table.

Select correct option:

True

 False



A _____________ address-binding table is used for each physical network.

Select correct option:

 new

 similar

 separate

 old

Fragmentation when using ICMP for path MTU should be avoided.

Select correct option:

 True

 False

Static routing

_______ can be used to propagate information about remote networks.

Select correct option:

 Dynamic routing

 Static routing

 Address resolution

 None of the given



TCP stands for _______

Select correct option:

Transport control protocol

Transmission control protocol



The Universal Datagram Protocol is not an end-to-end protocol.

Select correct option:

True

False



For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.

Select correct option:

Efficiency

Security

Accuracy

Anomalies



IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.

Select correct option:

 96

 100

 120

 none of the given



_____ Protocol provides error reporting mechanism.

Select correct option:

IGMP

SNMP

ICMP

none of the given



The Universal Datagram Protocol is a message-oriented protocol.  
Select correct option:  

True 
False

destination address into a prefix and suffix  
Select correct option:  
True 
False



which is not the type of error messages defined by ICMP.  
Select correct option:  
Source quench 
Time exceeded 
Destination unreachable 
none of the given



Which protocol is used to test different tools.  
Select correct option:  
ICMP 
IGMP 
TCP/IP 
none of the given



HEADER LEN field gives size of extention header.  
Select correct option:  
False 
True



is a ____ protocol.  
Select correct option:  
Point-to-Point 
Multi-Point 
Both (a) and (b) 
None of the given

CP



NAT device stores state information in translation table.  
Select correct option:  
True 
False



Postfix defines how much of address used to identify network.  
Select correct option:  
True 
False



As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of______ possible sizes.  

Select correct option:  
three 
two 
four 
five



Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________Transmission Unit.  
Select correct option: 

Least 
Maximum 
Fragment 
Frame



Twice NAT allows a site to run servers.  
Select correct option:  
True 
False









The maximum segment size of TCP flow control is_________  
Select correct option:  

3000 octets 
2000 octets 
1000 octets 
none of the given



In IP routing, forwarding refers to ____ transfer.  
Select correct option:  
packet 
datagram 
message 
None of the given



There are _____ possibilities to detect the destination using Trace-route  
Select correct option:  
1  

3  
None of the given



dynamic routing, the routing table is initialized when system boots.  
Select correct option:  
True 
False



Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.  
Select correct option:  
True 
False



Dotted decimal represents each octet in ______ and uses a dot to separate octets.  
Select correct option:  

binary 
decimal 
hexadecimal 
Octal







The amount of buffer space available at any time is called the window.  
Select correct option:  
True 
False



In IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers.  
Select correct option:  
12 
14 
16 
none of the given



______ field is used to identify a specific path through the network  
Select correct option:  
FLOW LABEL 
TRAFFIC CLASS 
Both a and b 
none of the given



IPV6 address consists of ______  
Select correct option:  
32 Bits 
64 Bits 
128 Bits 
none of the given



The IP class scheme does not divide the______ address space into equal size class and the classes do not contain the same number of networks.  
Select correct option:  
16-bit  
32-bit  
48-bit  
64-bit



A datagram cannot be larger than ______ of a network over which it is sent.  
Select correct option:  
MTU 
Size 
IP header
None of the given



An Internet Address (IP address) is a unique ________ binary number assigned to a host and used for all communication with host  
Select correct option:  
48-bit 
32-bit 
24-bit 
None of the given



IP datagram can contains ______ octets.  
Select correct option:  
0-65,535 
1-65,535 
1-65,536 
none of the given



Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.  
Select correct option:  
True 
False



Due to revolutionalization of IP-V6 the speed has increased from_____  
Select correct option:  
56kbps to 512kbps 
512kbps to 1gbps 
56kbps to 1gbps 
none of the given



 _______uses window mechanism to control the flow of data.  
Select correct option:  
IP 
UDP 
TCP 
none of the given

window mechanism



Mapping between a protocol address and a hardware address is called Address Resolution.  
Select correct option:  
True 
False



UPD is operating system independent.  
Select correct option:  
True 
False



A________ is a special-purpose computer dedicated to the task of interconnecting networks.  
Select correct option:  
Router 
Bridge 
Switch 
None of the given



Network having short intervals has a large timeout and the network having large interval has short timeout.  
Select correct option:  
True 
False

_________ places the boundary between the first and second octets  
Select correct option:  
Class A 
Class B 
Class C 
Class D

Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix  
Select correct option:  

True 
False



There are three standard implementations to improve computational efficiency: Hashing, Direct Indexing and InDirect Indexing  
True 
False



IPV6 128 bits address includes network prefix and ______  
Select correct option:  
Host Suffix 
Host prefix 
Source Prefix 
none of the given



ICMP message transport is acted upon by getting ICMP_______ in IP.  
Select correct option:  
De-encapsulated 
Encapsulated 
Segmented 
none of the given



As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.

Select correct option:

True

False 



Twice NAT allows a site to run servers.

Select correct option:

True

False
Preliminary version of IP was called _________.

Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given 



As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.

Select correct option:

True

False 



_________ uses window mechanism to control the flow of data.

Select correct option:

IP

UDP

TCP

none of the given 









The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.

Select correct option:

True

False



Which protocol is used to test different tools.

Select correct option:

ICMP

IGMP

TCP/IP

none of the given



________ identifies the application program that sent the data.

Select correct option:

Destination Port

Source port

Logical address

None of the given



The Source can configure outgoing datagram's to avoid _________

Select correct option:

Segmentation

Defragmentation

Fragmentation

None of the given



The time for acknowledgement to arrive depends on __________

Select correct option:

Distance to destination

Current traffic conditions

Both a and b

none of the given



which is not the type of error messages defined by ICMP.

Select correct option:

Source quench

Time exceeded

Destination unreachable

none of the given 

Preliminary version of IP was called _________.

Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given



HEADER LEN field gives size of extention header.

Select correct option:

False

True



_______ shows senders preference for low latency, high Reliability.

Select correct option:

TYPE

SERVICE TYPE

SERVICE PRIORITY

None of the given



As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.

Select correct option:

True

False



________ field of header indicates whether a datagram is a fragment or a complete datagram.

Select correct option:

FLAGS

FRAGMENT OFFSET

IDENTIFICATIONNo.3

None of the given (not sure) Page 105



In ______________, the protocol address assigned to a computer is chosen carefully so that computer's hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.

Select correct option:

Address Resolution

Table Lookup

Message Exchange

Closed-form Computation Page 94







Postfix defines how much of address used to identify network.

Select correct option:

True

False



______________field tells the receiver how to order fragments within a given datagram.

Select correct option:

FLAGSNo.4

FRAGMENT OFFSET

IDENTIFICATION

None of the given (not sure) Page 105





H.LEN shows the header length in units of ____ Bits

Select correct option:

34

32 Page 105

30

None of the given



In Closed-form computation, the protocol address assigned to a computer is chosen carefully so

that computer's hardware address can be computed from the protocol address using basic Boolean and _________ operations.

Select correct option:

arithmetic

XOR

Shift

XNORNo.5



For _____________, information about forwarding is stored in a routing table, which is initialized atsystem initialization and must be updated as network topology changes.

Select correct option:

Efficiency

Security

Accuracy

Anomalies



End to End delivery Service of IP datagram is _____

Select correct option:

Connection oriented

Connectionless Page 120

both a and b

none of the given



______ contains all information needed to deliver datagram to the destination.

Select correct option:

Header

Data AreaPage No.6

Identifier

none of the given



IPV6 addresses are _____ bits.

Select correct option:

32

64

128

256


The Header format of IPv6 is entirely different.
Select correct option:
True
False

____ contains all information needed to deliver datagram to the destination.
Select correct option:
Header
Data Area
Identifier
none of the given

Which one of these is not a main feature of connectionless service:
Select correct option:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.


H.LEN shows the header length in units of __ Bits
Select correct option:
34
32
30
None of the given

____ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given

Routers use _______ to forward datagrams along prearranged path.

Select correct option:
Traffic class
Flow label
Destination address
none of the given


______ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given


_____ is a technique used to Limit datagram size to small MTU of any network
Select correct option:
Segmentation
Fragmentation
Encapsulation
none of the given

The Current version of IP-Version 4 is _____ old

Select correct option:
18 years
20 years
22 years
none of given

The protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent.
Select correct option:
Encrypted
Decrypted
Translated
Non of these

Inside a computer, each address mask is stored as a __-bit value.
Select correct option:
48
64
16
32

_____ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame

IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given


MTU Stands for _______
Select correct option:
Mininum transmission unit
Maximun transmission unit
Multicast transmission unit
None of the given

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ______ possible sizes.

Select correct option:

three

two

four

five



End to End delivery Service of IP datagram is ___

Select correct option:

Connection oriented

Connectionless

Both a and b

None of the given



______________field tells the receiver how to order fragments within a given datagram.

Select correct option:

FLAGS

FRAGMENT OFFSET

IDENTIFICATION

None of the given



Postfix defines how much of address used to identify network.

Select correct option:

True

False



Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.

Select correct option:

Least

Maximum

Fragment

Frame
A routing table contains_______

Select correct option:

The destination network ID

The hop count to reach the network

The router ID of the next hop

All of the given



NAT device stores state information in translation table.

Select correct option:

True

False



TCP achieves _________ by retransmission.

Select correct option:

Efficiency

Accuracy

Reliability

none of the given



________ identifies the application program that sent the data.

Select correct option:

Destination Port

Source port

Logical address

None of the given



_____ Protocol provides error reporting mechanism.

Select correct option:

IGMP

SNMP

ICMP

none of the given



Routing refers to the _________ of routing information.

Select correct option:

transmission

propagation

communication

None of the given

______ layer Provides reliable delivery of datagram.

Select correct option:



Network

Transport

Datalink

none of the given



End to End delivery Service of IP datagram is _____

Select correct option:

Connection oriented

Connectionless

both a and b

none of the given



TCP is a connectionless and reliable transport protocol.

Select correct option:

True

False




If you need any help regarding Any Subject of VU or Need Solution of Assignments, Quizes, GDBs or Past Peper then Contact Us or Join Our WhatsApp Group: 

Post a Comment

0 Comments