Computer_NS
Computer_NS
1) What is the protocol data unit (PDU) for the application layer in the
Internet stack?
a. Frame
b. Datagram
c. Segment
d. Message
a. Ping
b. Web-browsing
c. Internet Chat
d. Email
4) The pairs of OSI protocol layer/sub-layer and its functionality are given
5) A firewall is installed at the point where the secure internal network and
e. Secure point
f. Meeting point
g. Chock point
h. Firewall point
q. In 1990
r. In 1980
s. In 1970
t. In 1960
u. fibre optics
v. coaxial cable
w. microwave
x. satellite
10) Which of these protocols given below uses UDP as transport protocol?
y. DNS
z. Telnet
aa. HTTP
bb. SMTP
kk. 0.612
ll. 0.512
mm. 0.412
nn.0.312
oo.directional
pp. bidirectional
qq. omnidirectional
rr. unidirectional
15) The term that refers to the shortest unit and carries data elements
is______
ww. P2P
xx. Client-server
yy. Both the above
zz. None of these
19) Identify the correct option for the given assertion and reason
d. Assertion and reason are true, but this is not the correct reason for the
given assertion
iii. 8 seconds
jjj. 5 seconds
kkk. 2 seconds
lll. 1.6 seconds
21) In Unicast Routing, we use shortest path tree method for finding shortest
path of the______
mmm. Nodes
nnn. Networks
ooo. Packets
ppp. Frames
qqq. Internetwork
rrr. WAN
sss. LAN
ttt. MAN
23) What is the maximum number of subnets and the maximum number of
26) What is the Network, in which every computer is capable of playing the
(a) P – 2 Q – 1 R – 3 S – 5
(b) P – 1 Q – 4 R – 2 S – 5
(c) P – 1 Q – 4 R – 2 S – 3
(d) P – 2 Q – 4 R – 1 S – 3
28) If a CSMA/CD network that transmits data at a rate of 100 Mbps (10 8 bits
frame size required for this network is 1250 bytes, what is the signal speed
gggg. 16000
hhhh. 20000
iiii. 10000
jjjj. 8000
29) One of the header fields in an IP datagram is the Time to Live (TTL) field.
Which of these below given statements best explains the need for this field?
and A wins the first back off race. At the end of this successful transmission
kkkk. 0.625
llll. 0.75
mmmm. 0.5
nnnn. 1.0
message size is 24 bytes and each packet contains a header of 3 bytes, then
oooo. 4
pppp. 6
qqqq. 7
rrrr. 9
strategy. All packets are ready and immediately available for transmission.
If every 5th packet that B transmits gets lost (but no acks from C ever get
lost), then what is the number of packets that B will transmit for sending the
message to C?
ssss. 14
tttt. 16
uuuu. 12
vvvv. 18
33) Which of the following assertions about the Internet Protocol (IP) is
False?
wwww. IP Packets from the same source to the same destination can
take different routes in the network
xxxx. The packet source cannot set the route of an ongoing packets;
the route is only determined by the routing tables in the routers on the
way
yyyy. IP ensures that a packet is discarded if it is unable to reach its
destination within a given number of hops
zzzz. It is possible for a computer to have multiple IP addresses
34) For an organization that has a class B network and wishes to form
aaaaa. 255.255.64.0
bbbbb. 255.255.64.0
ccccc. 255.255.128.0
ddddd. 255.255.252.0
35) The message 11001001 is to be transmitted using the CRC polynomial x^3
is______
a. 11001001011
b. 11001001000
c. 110010010011
d. 11001010
statements is true?
37) Look at these three statements about link state and distance vector
routing protocols, for a large network with 500 network nodes and 4000
links
39) If the length of a Broadcast LAN is 2 Km and it has 107 bps bandwidth and
uses CSMA/CD and the signal travels along the wire at 2108m/s, then what
40) Which is one of the pairs of protocols given below from both the
protocols that can use multiple TCP connections between the same client
41) What is the number of 8-bit characters that can be transmitted per
second over a 9600 baud serial communication link that use asynchronous
mode of transmission with 8 data bits, one start bit and one parity bit?
yyyyy. 800
zzzzz. 600
aaaaaa. 876
bbbbbb. 1200
others in the group, then what is the number of keys required in the system
kkkkkk. N(N-1)
llllll. N(N-1) / 2
mmmmmm. 2N
nnnnnn.
(N-1)2
46) This is one of two protocols that let a network administrator supervise
network.
ssssss. UDP
tttttt. TCP
uuuuuu. TCPMAN
vvvvvv. DHCP
B with its private key. In this scenario, one or more of the following security
II. A third party attacker can launch a birthday attack to replace m with a
fraudulent message
wwwwww. I only
xxxxxx. II only
yyyyyy. II and III only
zzzzzz. I and II only
48) Take the example of 1 Mbps error-free line, with the maximum frame
size of 1000 bits and new packets generated about 1 second apart . Timeout
unnecessary timeout would occur . In the scenario, how any times average
aaaaaaa. Twice
bbbbbbb. Only once
ccccccc. Thrice
ddddddd. None of the above
50) In a class C address, if 3 bits are borrowed for subnetting of host ID part,