Cs-610 Important Mcq’s For Final Term:
Solve By Vu_Toper-RM
All Paid Services Is Available !! VU
LMS Handling + Notes+
Online Classes + Project
Nothing Is Impossible >> O3224021365
________ of TCP/IP layering model, corresponds to basic network
hardware.
Physical Layer
_______ protocols of TCP/IP layering model specify how to ensure
reliable transfer.
Physical Layer
Transport Layer
NAT is not useful at a residence with Cable Modem or DSL connectivity.
True
False
NAT is useful at a residence with Cable Modem or DSL connectivity
_______ includes a 32-bits address mask with each address, which allows the
address to be classful, classless, or submitted.
RIP
OSPF
OSPF includes a 32-bit address mask with each address, which allows the address
to be classful, classless, or submitted.
NAPT stands for ________________
Network address and protocol translation
Network address and port translation
But Network Address and Port Translation (NAPT) (which is another modified
form of NAT)
Which of the following are interior routing protocols?
RIP
OSPF
RIP and OSPF
The Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) are
the two most well-known interior routing protocols used in the TCP/IP suite
NAT stands for ____________
Network address translation
Network address transmission
In IP routing, forwarding refers to ______ transfer.
Packet
Datagram
FORWARDING refers to datagram transfer.
Basic NAT does not work well for communication initiated from the Internet.
True
False
Basic NAT does not work well for communication initiated from the Internet
To save traffic, an EGP does not summarize routing information from the
autonomous system before passing it to another autonomous system
True
False
OSPF has designed as an Interior Gateway Protocol used to pass routing
information among routers within an auto nomos system.
Each Autonomous System chooses a routing protocol to exchange routing
information which is summarized before being passed to another group.
OSPF is based on--------
Distance vector routing
Link state routing
LINK-STATE ALGORITHM:
OSPF uses link-state routing.
The Border Gateway Protocol (BGP) uses_________ for all communication
UDP
TCP
UDP and TCP
None of the given
"It uses reliable transport (TCP).
BGP uses the TCP/IP protocol on port 179 to establish connections
________ identifies the application program that sent the data.
Destination
Source port
Logical address
None of the given (not sure)
_______ can be used to propagate information about remote networks
Dynamic routing
Static routing
Dynamic routing can be used to propagate information about remote networks.
Which of the following protocol uses UDP for all message transmission?
OSPF
RIP
BGP AND RIP
RIP uses UDP for all message transmissions
OSPF stands for __________
Open-Source Path First Protocol
Open shortest path first
(OSPF) known as the Open Shortest Path First Protocol).
Typical internet routing uses a combination of two metrics__________________.
Mouthing metrics
Administrative cost and routing metrics
Hop cost
Administrative cost and hop count
Typical internet routing uses a combination of two metrics Administrative cost and
hop count
_________ is a current version of BGP.
2
4
None of these
The current version is four (BGP-4).
OSPF doesn’t allows a router to introduce routes learned from another means.
True
False
SPF allows a router to introduce routes learned from another means (e.g., from
BGP).
Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
IPv6 source (not intermediate routers) is responsible for fragmentation
IPV6 address consists of ________
32 Bit
128 Bits
none of the given
IPV6 addresses are 128 bits.
.......is less complex and easy to understand.
UDP
Routing inserts or changes values in _______
Routing table
.......used to attach two autonomous systems.
EGP
TCP is a ______ protocol.
POINT TO POINT
NAT software does not allow a PC to connect with the Internet and act as a NAT
device at the same time.
false
________is called an end-to-end protocol because it provides a connection directly
from an application on one computer to an application on a remote computer.
IP
UDP
____________ uses distance vector approach to define routing
RIP
None of the given
_______ is ideal in a situation where the group is small and all members are
attached to contiguous Local Area Networks.
Flood-and -Prune
Configuration-and -Tunneling
Router that decrements TTL to __ sends ICMP time exceeded message, with router
s address as source address
3
0
Protocol addresses are abstractions provided by ___________.
hardware
software
Although message exchange can be used to bind addresses, sending a request for
each binding is hopelessly inefficient.
True
False
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet
address.
32, 48
24, 32
In the 1970s large organizations began to acquire multiple networks. Each network
in the organization formed island. Employees needed to choose a computer
appropriate for each task. So they needed multiple screens, keyboards and
computers.
False
True
In which method of Address Resolution Protocol, the protocol address is
determined by hardware address? Were "T" stands for Table lookup, "C" for
Closed-form Computation and "D" for Data Exchange?
T
C
Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
T
C, D
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
C
D
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
T, D
T, C
The general form of an IP datagram is with a header followed by data. The header
contains information that controls where and how the datagram is to be sent.
True
False
To save traffic, an EGP does not summarize routing information from the
autonomous system before passing it to another autonomous system.
True
False
------------- was especially concerned about the lack of high-powered computers.
IEEE
None
Missing eat indicates sending computer crashed in frame format.
True
False
The -------------term refers to the general concept of a small block of data.
Packets
Data
CRC can detect more errors than a simple checksum.
True
False
The network that uses a -------------, usually consist of a single long cable to which
computer attach.
Star topology
Bus topology
LAN that use ATM technology have a -------------
Ring topology
None of the given
--------------- has a jitter zero
Virtual Private Network
Isochronous Network
Asynchronous Network
None of the given
The network with Throughput T and Delay D has a total --------------- bits in transit
at a time.
DXT
D/T
One repeater ---------------, two repeaters --------------- the maximum cable length
limitation.
Double, triple
Double, 4 time
End-to-end delivery service is connection oriented.
True
False
A single networking technology is best for all needs.
True
False
Twice NAT allows a site to run servers.
True
False
________ device is used for multicasting.
Router
none of the given
___________ does not depend on any particular unicast routing protocol.
PIM-DM
PIM-SM
PIM-AM
none of the given
A routing table contains_______
The hop count to reach the network
The router ID of the next hop
_______ can be used to propagate information about remote networks.
Dynamic routing
Static routing
________ protocol is designed to use within an organization.
MOSPF
none of the given
NAPT stands for ________________
Network Address and Protocol Translation
Network Address and Port Translation
In dynamic routing, the routing table is initialized when system boots.
True
False
OSPF includes ________ address mask with each address.
32Bit
none of the given
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
True
False
_________ uses window mechanism to control the flow of data.
TCP
none of the given
TCP uses _______ mechanism to control the flow of data.
door
window
IGPs stand for _________
Internal Gateway Protocols
Interior Gateway Protocols
________ protocol uses distance vector algorithm.
RIP
none of the given
__________measures distance in network hops, where each network between the
source and destination counts as single hop.
RIP
Non of these
Network Address Translation (NAT) requires device to perform packet translation.
True
False
We use the term _______ to refer to a measure of the path that routing software
use when choosing a route.
routing path
routing metric
Part of the 3-way handshake used to create a connection, requires each end to
generate a random _____ sequence number.
32 bit
16 bit
Reconstruction of original datagram is called reassembly.
True
False
Reliability is the responsibility of the ______ layer.
Transport
Network
_______ is ideal in a situation where the group is small and all members are
attached to contiguous Local Area Networks.
Flood-and -Prune
Configuration-and -Tunneling
In Direct point to point communication adding the Nth computer requires------------
new connections.
None of the given
N-1
The number of connections needed for N computer in direct point to point
communication is equal to:
(N2-N)/2
N(N-1)
N2
None of the given
Hardware that calculates a CRC uses two simple components.
AND unit and XOR unit
Shift register and XOR unit
The Gigabit Ethernet hardware operates at a rate of --------
10 Mbps
100 Mbps
1000 Mbps
None of the given
________ computes shortest paths in a graph by using weights on edges as a
measure of distance.
Greedy algorithm
Distance vector algorithm
Dijkstra’s algorithm
None of the given
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
Connectionless service paradigm
Connection-oriented service paradigm
Both Connectionless and Connection-oriented service paradigm
None of the given
An Internet Address (IP address) is a unique __________ binary number assigned
to a host and used for all communication with host
48-bit
32-bit
24-bit
None of the given
The address __________ identifies the physical network to which the computer is
attached, while the _______ identifies an individual computer on that network.
prefix , suffix
suffix, prefix
suffix, suffix
None of the given
___________ places the boundary between the first and second octets
Class A
Class B
Class C
Class D
___________ places the boundary between the second and third octets.
Class A
Class B
Class C
Class D
___________ places the boundary between the third and fourth octets.
Class A
Class B
Class C
________ field of header indicates whether a datagram is a fragment or a complete
datagram.
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
______ provides connectionless service.
TCP
UDP
IP
None of the given
UDP and TCP are both_________ layer protocols
Physical
Data link
Network
Transport
________identifies which application program on receiving computer should
receive the data
Logical address
Source port
Source port
The Border Gateway Protocol (BGP) uses_________ for all communication
UDP
TCP
Both UDP and TCP
None of the given
Which of the following protocols allows the sender and receiver to enforce
polices?
RIP
OSPF
BGP
RIP and OSPF
ICMP message transport is acted upon by getting ICMP encrypted in IP.
True
False
These ICMP message transport is acted upon ________ as frames on ______
Intranet, LAN
Internet, WAN
Intranet, WAN
Internet, LAN
Address mask defines how many bits of address are in suffix?
True
False
A computer attached to a given network can only communicate with other
computers attached to the same network. Is this a problem with multiple networks?
True
False
The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address__________.
itself
prefix
Find the class of the address:
11110011 10011011 11111011 00001111
E
B
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
True
EGP stands for _________
Exterior Gateway Protocol
Twice NAT requires the DNS to interact with the NAT device.
True
A is a special purpose system dedicated to the task of interconnecting networks.
Router
Bridge
Switch
None of these
The address identifies the physical network to which the computers are
attached while the identifies an individual computer on the network
Prefix, suffix
None of these
Dotted decimal represents each octet in and uses a dot to separate octets.
Binary
Decimal
Hexadecimal
Octal
There are two standard implementations to improve computational efficiency:
True
False
MTU stands for:
Minimum transmission unit
Maximum transmission unit
Multicast transmission unit
None of these
Whenever it handles a packet, IP software needs to separate the destination
Address into a prefix and suffix
True
False
technique is to limit datagram size to smallest MTU of any network
Segmentation
Fragmentation
Encapsulation
None of these
In the protocol address assigned to a computer is chosen
carefully so that computer’s hardware address can be computed from the protocol
address
basic Boolean and arithmetic operations
Closed-form computation
The header format of IPV6 is entirely different.
True
False
A is a special purpose system dedicated to the task of interconnecting
networks.
Router (Page 82)
Bridge
In Closed-form computation, the protocol address assigned to a computer is chosen
carefully so that computer’s hardware address can be computed from the protocol
address using basic Boolean and _________ operations.
Arithmetic (Page 94)
Shift
For _____________, information about forwarding is stored in a routing table,
which is initialized at system initialization and must be updated as network
topology changes.
security
efficiency
______ layer Provides reliable delivery of datagram.
Select correct option: Network
Transport
Datalink
none of the given
Header contains all information needed to deliver datagram to the destination
computer. But which one of the following is not included:
Destination address
Source address
Rectifier
______ field is used to identify a specific path through the network
Flow label
Traffic class
None of the given
Serve Same purpose in Internet as frames on LAN
Packets
Virtual Packets
Virtual Frames
Header contains all information needed to deliver datagram to the destination
computer. But which one of the following is not included
Destination address
Source address
Rectifier
Although the ARP message format is sufficiently general to allow arbitrary
protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP
address to a ____ Ethernet address.
48bit
Other options are missing
For _____________, information about forwarding is stored in a routing table,
which is initialized at system initialization and must be updated as network
topology changes.
Select correct option:
Efficiency
Security
Anomalies
IPv6 ______________ is responsible for fragmentation. Routers simply drop
datagram’s larger than network Destination
Intermediate routers
Source
Medium
The process of using a routing table to select a next hop for a given datagram is
called __________. Encapsulation
Reassembling
none of the given
Every hardware technology specification includes the definition of the maximum
size of the frame data area, which is called the ____________ Transmission Unit.
Least
Maximum
Fragment
Frame
______ contains all information needed to deliver datagram to the destination.
Header
The Header format of IPv6 is entirely different.
TRUE
FALSE
_______ shows senders preference for low latency, high Reliability. TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
The Network Layer Protocol ICMP stands for____________
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given
Which of the following protocols provide the routing information at the
autonomous system level?
BGP
OSPF
RIP
OSPF and RIP
A one-to-many communication between a source and a specific group of hosts
is classified as a_______ communication.
Unicast
Multicast
Broadcast
Unicast & Multicast
_______ includes a 32-bits address mask with each address, which allows the
address to be classful, classless, or submitted.
RIP
OSPF
BGP
None of the given
In TCP when a computer sends a segment, the__________ and _______ fields
refer to incoming data.
ACKNOWLEGE NUMBER, WINDOW
SEQUENCE NUMBER, WINDOW
ACKNOWLGEGE NUMBER, SEQUENCE NUMBER
None of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs)
two broad classes of Internet Routing Protocol.
True
False
Class A mask is 255.0.0.0 which is used for ______
Unicasting
Multicasting
Subnetting
When one computer sends an ARP message to another the message travels
inside the hardware frame. Technically, placing a message inside a frame for
transport is not called encapsulation.
True
False
The demand of sharing is very high because many computers need to use the
shared networks.
Select correct option:
WAN networks
Shared networks
Most NICs contain _______________ circuitry that allows the NIC to operate
independent of the CPU.
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
broadcast network
Thick Ethernet is known as------------------ Select correct option:
10 base 5
10 base T
10 base 100 10 base 1
Probing program PING program status program None of the above The basic
responsibility of NIC is ---------------- Select correct option:
To access medium/network
To resource allocation
To access memory
All of above
No error detection scheme is perfect because transmission errors can affect
_________. Select correct option:
Data
Additional Information
Additional information & data
Transmission medium
-------------- has advantages arisen from the size and ease of computation. Select
correct option:
CRC
Parity
Checksum
Byte Stuffing
The third field of the header consists of ------ bit Ethernet frame type. Select
correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the -------- Select correct
option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ------------ Select correct option: Bus
topology
Star topology
Ring topology
Mesh Topology
Hardware that calculates a CRC uses two simple components. Select correct
option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
Fixed network is a type of networks which is classified with respect to
the...........factor Select correct option:
Size
Connectivity
Medium
Mobility
Network interface card acts like a (an) ----------- Select correct option:
Input/output device
Input device
Output device
All of above
IEEE LLC/SNAP header is --------, which is used to specify the type of data. Select
correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring topology use an access mechanism known as-------
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
The Gigabit Ethernet hardware operates at a rate of ________
10 Mbps
100 Mbps
1000 Mbps
None of the given
A network uses ------------ if all computers attach to a central point Select correct
option:
Ring Topology
Star Topology
Hub Topology Bus Topology
---------- is also called self-healing network Select correct option:
ATM
FDDI
Token Ring
None of the given
---------- which is designed to help detect transmissions errors, send one extra bit of
information with each character.
Select correct option:
Checksum
CRC
Parity
VRC
Hardware addresses must be ---------- on a LAN.
Select correct option:
Common
Unique
A ---------- relies on the hardware manufacturer to assign a unique physical address
to each network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme None of the given
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
Broadcast network
Point-to-Point network
------ Program sends a message to a remote computer and reports whether the
computer responds.
Ping
Ping
---------- was especially concerned about the lack of high-powered computers.
ARPA
IEEE
EIA
None of the given
The term -------- is used to denote the definition of a packet used with a specific
type of network.
Packet
Frame
Data
None of the given
An interface for twisted pair Ethernet must have an ____________ connector, and
must generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T
A bridges function in the _________ layers(s).
Physical (MAC)
Data link
Network
Physical (MAC) and Data link
A Bridge can ________
Filter a frame
Forward a frame
Extend a LAN
Do all the above
A Bridge forwards or filters a frame by comparing the information in its address
table to the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address
___________ is used for audio and video, since these have predefined maximum
data rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service None of the given
---------- is also called self-healing network ATM
FDDI
Token Ring
None of the given
Hardware that calculates a CRC uses two simple components.
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
The Ethernet standard specifies that frames are sent using the -------- Differential
Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN and WAN are classified according to their.........
Select correct option:
Size
Connectivity
Medium
Mobility
For how much time would other computers be in wait while one computer was
transferring 56MB file with transmission speed of 56Kbps Select correct option:
Sec
Sec
Sec
Sec
CBR stands for…………….
Constant Byte Rate
Constant Bit Rate
Connection break Recovery None of the above
The routing table in interior and exterior switches has which one of the following?
It should have next hop for each possible destination
The next hop in table must be on shortest path to destination
Both (a) and (b)
None of the above
Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Boot time routing
None of the above
Which one of the following is the responsibility of Dijkstra’ algorithm?
To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above
Routing table is used to keep the information about…………….
Destination
Medium of transmission
Routers used in network
All of the above
Frame relay is………………….
Connection oriented service
Connectionless service
It is typically ranges from 5Mbps to 1000Mbps. None of the above
Which of the following statement is wrong regarding PVC?
PVC last as long as the customer pay the periodic fee for its use.
Forwarding tables are automatically restored after pow er of equipment failure.
Forwarding table entries for PVC’s are dynamically configured. All of the
above are wrong
Whenever it handles a packet, IP software needs to separate the destination address
into a prefix.
Select correct option:
True
False
TTL stands for __________ Select correct option:
Time to Live
none of the given
Routers use _______ to forward datagrams along prearranged path. Select correct
option:
Traffic class
Flow label
_______ protocol uses three-way handshake to begin a connection.
UDP
TCP
IP
none of the given
Typical internet routing uses uses a combination of two
metrics__________________. Select correct option:
routing metrics
administrative cost and routing metrics hop cost
administrative cost and hop count
AUI cable connects from NIC to--------------- Select correct option:
BNC Connector
RJ-45 Connector
Transceiver
None of the above
An ___________method, the network hardware designers specify how type
information is included in the frame and the value use to identify various frame
Local Talk is a LAN technology that employs
Explicit frame type
Ideal frame type
Implicit frame type
None of the given
In Point-to-Point topology there are two topologies.
Tree and Ring
Star and Ring
Star and Tree
None of the given
The topology each computer is connected to a central hub is called Select correct
option:
Ring topology
Star topology
Tree topology
Mesh topology
The basic responsibility of NIC is ---------------- Select correct option:
To access medium
Network To resource allocation
To access memory
All of above
Currently the original Ethernet hardware operates at a rate of -------- Select correct
option:
10 Mbps
100 Mbps
1000 Mbps
3 Mbps
The Gigabit Ethernet hardware operates at a rate of_________
10 Mbps
100 Mbps
1000 Mbps
The number of connections needed for N computer in direct point to point
communication is equal to:
(N2-N)/2
N (N-1)
N2
None of the given
The length of the format of hardware address is Select correct option:
One to ten bytes
One to five bytes
One to six bytes
None of the given
Local Talk is a LAN technology that employs________
Bus topology
Ring topology
Star topology
None of the given
The network occupies larger areas like cities & countries is called Select correct
option:
LAN
WAN
MAN
All of the above
Computer networks are classified by.......factors
2
3
4
5
Computers attached to an ethernet use ________in which a computer waits for the
other to be idle before transmitting a frame.
CSMA/CD
CSMA/CA TOKEN PASSING none of the given
A_______ relies on the hardware manufacturer to assign a unique physical address
to each network interface.
Static addressing scheme
Dynamic addressing scheme
Configurable addressing scheme
None of the given
FDDI can transmits data at a rate of ___________________
100 million bits per second
100 million bits per second
100 million bits per second None of the given
The basic responsibility of NIC is ---------------- Select correct option:
To access medium/network
To resource allocation
To access memory
All of above
No error detection scheme is perfect because transmission errors can affect
_________. Select correct option: Data
Additional Information
Additional information & data
Transmission medium
The third field of the header consists of ------ bit Ethernet frame type. Select
correct option:
48
32
16
8
Hardware that calculates a CRC uses two simple components. Select correct
option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
The satellite or radio topology in which all computers are connected to each other
via satellite or radio wave is a kind of Select correct option:
Broadcast network
Point-to-Point network
IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
Which protocol is used to test different tools. Select correct option:
ICMP
IGMP
Postfix defines how much of address used to identify network.
Select correct option:
True
False