For Past Papers Just Follow The Download Buttons, We have a large data for revision of Virtual University courses. You can also join the following groupsfor study discussion . The best is We Recommend you to study your handouts and lectures, Prepare your all course then revise the past papers for your good grade.
CS610 MCQs Mega File Solved with References by vuislamabad.com
CS610 – Computer NetworkQuiz No.1 Nov 16, 2019
—— Program sends a message to a remote computer and reports whether the computer
responds.
Ping
Ping
Traceroute
ICMP
Non of the given
———- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given
The term ——– is used to denote the definition of a packet used with a specific type of
network.
Packet
Frame
Data
None of the given
Computer networks are often called ————– because they use packet technology.
Ethernet
Switch networks
Packet networks
None of the given
————– have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given
Most LANs that employ ring topology use an access mechanism known as——-
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given
IEEE LLC/SNAP header is ——–, which is used to specify the type of data.
8 octets
8 bytes
8 bits
None of the given
Formally named __________ informally known as the twisted pair Ethernet or TP
Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given
An interface for twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T
A bridges function in the _________ layers(s).
Physical (MAC)
Data link
Network
Physical (MAC) and Data link
A Bridge can ________
Filter a frame
Forward a frame
Extend a LAN
Do all the above
A Bridge forwards or filters a frame by comparing the information in its address table to
the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address
________ computes shortest paths in a graph by using weights on edges as a measure of
distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta’s algorithm
Non of the given
___________ is used for audio and video, since these have predefined maximum data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given
———- is also called self healing network ATM
FDDI
Token Ring
None of the given
Most LANs that employ ring topology use an access mechanism known as——-
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
An ————method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given
Hardware that calculates a CRC uses two simple components.
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
The Ethernet standard specifies that frames are sent using the ——–
Differential Manchester
Not Return to Zero (NRZ)
ManchesterEncoding
Return to Zero (RZ)
When an application ———— data, it makes a copy of the data available to all other computers on the network.
Select correct option:
Broadcasting
Multicasting
Unicasting
None of the given
LAN interface may use ———- to copy frame data directly from main memory. DMA
FDDI
CSMA/CD
None of the given
LAN and WAN are classified according to their………
Select correct option:
Size
Connectivity
Medium
Mobility For how much time would other computers be in wait while one computer was transferring 56MB file with transmission speed of 56Kbps
Select correct option:
10 Sec
11 Sec
12 Sec
13 Sec
A network uses _______ to arrange computers to be connected in a single closed loop.
Select correct option:
Star Topology
Dual Ring Topology
Ring Topology
Bus Topology
CBR stands for…………….Constant Byte RateConstant Bit RateConnection break RecoveryNone of the above
The routing table in interior and exterior switches has which one of the following?It should have next hop for each possible destinationThe next hop in table must be on shortest path to destinationBoth (a) and (b)None of the above
Which one of the following is a method for computing routing table information?Manual entryStatic routingBoot time routingNone of the above
Which one of the following is the responsibility of Djikstra’ algorithm?To compute the shortest path between two nodesTo extract next hop information from path informationTo insert next hop information into routing tableAll of the above
Routing table is used to keep the information about…………….DestinationMedium of transmissionRouters used in networkAll of the above
Frame relay is………………….Connection oriented serviceConnectionless serviceIt is typically ranges from 5Mbps to 1000Mbps.None of the above
Which of the following is not a guided medium?Twisted-paircable Fiber-opticcable AtmosphereCoaxial cableWhich of the following statement is wrong regarding PVC?PVC last as long as the customer pay the periodic fee for its use.Forwarding tables are automatically restored after pow er of equipment failure.Forwarding table entries for PVC’s are dynamically configured.All of the above are wrong
Which of the following statement is true regarding ATM?ATM is a single technology that is designed to meet the goals of both LANs and WANs.ATM uses the concept of connection-oriented networking.Both (a) and (b)None of the above
Djikstra’s algorithm is used to compute the……………….shortest path between two nodesnumber of nodes used in the networkdistance between different nodesnone of the above
_________ is used to attach two autonomous systems.
Select correct option:
BGP
IGP
EGP
none of the given
Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
False
TTL stands for __________
Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given
IGPs stand for _________
Select correct option:
Internal Gateway Protocols
Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given
_____________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given
__________________encapsulates IP datagram as data area in hardware frame.
Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given
Class A mask is 255.0.0.0 which is used for ________________
Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
class A mask is 255.0.0.0 which is used for subnetting.
NAT is not useful at a residence with Cable Modem or DSL connectivity.
Select correct option:
True
False
Autonomous System chooses a routing protocol to exchange routing information which is passed before being summarized to another group.
Select correct option:
True
False
______ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given
The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
EGP stands for _________
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit
Reliability is not the responsibility of the Transport layer.
Select correct option:
True
False
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the givenNAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False
TCP uses the term segment to refer to a ________.
Select correct option:
packet
message
both (a) and (b)
None of the givenboth a and b?
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
IP datagram can contains ________ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given
_______ protocol uses three way handshake to begin a connection.
Select correct option:
UDP
TCP
IP
none of the given
Typical internet routing uses uses a combination of two metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop countQuestion # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given
The routers within an autonomous system use a _____________ to exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False
The Network Layer Protocol ICMP stands for____________
Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given
The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given
TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False
In Direct point to point communication adding the Nth computerrequires___________ new connections.N2N-1N2 –N)/2None of the given
Most LANs that employ ring topology use an access mechanism knownas_______ring topology use token passing forsynchronized access to the ring
Computers attached to an ether use —— in which a computer waits for theether to be idle before transmitting a frame.CSMA/CDCSMA/CATOKEN PASSINGNone of the given
FDDI can transmits data at a rate of ___________________100 million bits per second100 million bits per second100 million bits per secondNone of the given________________ has advantages arisen from the size and ease ofcomputation.CRCParityChecksumsNone of given
AUI cable connects from NIC to—————Select correct option:BNC ConnectorRJ-45 ConnectorTransceiverNone of the above
As a result of ARPA research the first network was established which was named as Select correct option:INTERNETWORKINGARPNETARPANETPACKET NETWORK
A ———- provides mechanism that automatically assignes a physical address to a station when the station first boots. Select correct option:Static ad Configurableaddressing scheme
polygons are basically concave polygons that may have self-intersecting edges.ComplexHybridConvexConvex and HybridDynamic addressing scheme
An ___________method, the network hardware designers specify how typeinformation is included in the frame and the value use to identify various frame Local Talk is a LAN technology that employsExplicit frame type
Ideal frame type
Implicit frame type
None of the given
In Point-to-Point topology there are two topologies.Tree and RingStar and RingStar and TreeNone of the given
The topology each computer is connected to a central hub is calledSelect correct option:Ring topologyStar topologyTree topologyMesh topology
The basic responsibility of NIC is —————- Select correct option:To access mediumNetwork To resource allocationTo access memoryAll of above
Currently the original Ethernet hardware operates at a rate of ——–Select correct option:10 Mbps100 Mbps1000 Mbps3 Mbps
The Gigabit Ethernet hardware operates at a rate of_________10 Mbps100 Mbps1000 Mbps
The number of connections needed for N computer in direct point to pointcommunication is equal to:(N2-N)/2N (N-1)N2None of the given
The length of the format of hardware address isSelect correct option:One to ten bytesOne to five bytesOne to six bytesNone of the given
Star topolgy is the kind ofTree topologyPoint-to-point topolgyBroadcast topolgyRing topology
Local Talk is a LAN technology that employs________Bus topologyRing topologyStar topologyNone of the givenThe network occupies larger areas like cities & countries is calledSelect correct option:LANWANMANAll of the above
Computer networks are classified by…….factors234 5
Computers attached to an ethernet use ________in which a computer waits forthe other to be idle before transmitting a frame.CSMA/CDCSMA/CATOKEN PASSINGnone of the given
Point-to-point topology isSize BasedMobility BasedConnectivity BasedMedium Based
NIC connection in a physical network is known as——————–Select correct option:LAN wiring schemeWAN wiring schemeColor wiringNone of above
A_______ relies on the hardware manufacturer to assign a unique physicaladdress to each network interface.Static addressing schemeDynamic addressing schemeConfigurable addressing schemeNone of the given
The main functions of NIC are ———————CRC Errorcorrection AddressrecognitionAll of above
FDDI can transmits data at a rate of ___________________100 million bits per second100 million bits per second100 million bits per secondNone of the given
Wireless LAN use the ——– as a media access methodSelect correct option:CSMA/CDCSMA/CATOKEN PASSINGCSMA
A_______ relies on the hardware manufacturer to assign a unique physicaladdress to each network interface.Static addressing schemeDynamic addressing schemeConfigurable addressing schemeNone of the givenWireless LAN use the ——– as a media access methodSelect correct option:CSMA/CDCSMA/CATOKEN PASSINGCSMA
According to their size there are…………classifications of networks. Select correct option:23 4 5
As a result of ARPA research the first network was established which was named as Select correct option:INTERNETWORKINGARPNETARPANETPACKET NETWOR
———- performs the matching between destination address and MAC address of machine.Select correct option:Hardware addressLAN interfaceDMANone of above
An ___________method, the network hardware designers specify how typeinformation is included in the frame and the value use to identify various frametypes.Explicit frame typeIdeal frame typeImplicit frame typeNone of the given
The demand of sharing is very high because many computers need to use the shared networks.Select correct option: WAN networks Shared networks Unshared networks LAN networks
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.DMA(Direct Memory Access)MultiplexerTransceiverNone of the given
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:broadcast network
Thick Ethernet is known as—————— Select correct option:10 base 510 base T10 base 10010 base 1
The first automated tool required to see whether the given computer is online or not wasSelect correct option:Probing programPING programstatus programNone of the above
The basic responsibility of NIC is —————-Select correct option:To access medium/networkTo resource allocationTo access memoryAll of above
No error detection scheme is perfect because transmission errors can affect _________.Select correct option:DataAdditional InformationAdditional information & dataTransmission medium
————– has advantages arisen from the size and ease of computation.Select correct option:CRCParityChecksumByte Stuffing
The third field of the header consists of —— bit Ethernet frame type.Select correct option:4832168The Ethernet standard specifies that frames are sent using the ——–Select correct option:Differential ManchesterNot Return to Zero (NRZ)Manchester EncodingReturn to Zero (RZ)LAN that use ATM technology have a ————Select correct option:Bus topologyStar topologyRing topologyMesh Topology
Hardware that calculates a CRC uses two simple components.Select correct option:AND unit and XOR unitShift register and XOR unitShift register & AND unitShift register and shift XOR unit
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.Select correct option:DMA (Direct Memory Access)MultiplexerTransceiverNone of the given
Fixed network is a type of networks which is classified with respect to the………..factorSelect correct option:SizeConnectivityMediumMobility
Network interface card acts like a (an) ———–Select correct option:Input/output deviceInput deviceOutput deviceAll of above
IEEE LLC/SNAP header is ——–, which is used to specify the type of data.Select correct option:8 octets8 bytes8 bitsNone of the above
Most LANs that employ ring topology use an access mechanism known as——-Select correct option:CSMA/CDCSMA/CACSMATOKEN PASSING
The Gigabit Ethernet hardware operates at a rate of ________10 Mbps100 Mbps1000 MbpsNone of the given
A network uses ———— if all computers attach to a central pointSelect correct option:Ring TopologyStar TopologyHub TopologyBus Topology
———- is also called self healing networkSelect correct option:ATMFDDIToken RingNone of the given
———- which is designed to help detect transmissions errors, send one extra bit of information with each character.Select correct option:ChecksumCRCParityVRC
Hardware addresses must be ———- on a LAN.Select correct option:CommonUniqueA ———- relies on the hardware manufacturer to assign a unique physical address to each network interface.Select correct option:Static addressing schemeConfigurable addressing schemeDynamic addressing schemeNone of the given
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind ofSelect correct option:Broadcast networkPoint-to-Point network
1_Which of the following statement is true regarding Link-state routing? Network topology is separated from route computation.Each switch builds its own routing tables.Link-state routing uses Djikstra’s algorithm.All of the above = Answer2_Which one of the following is a property of dynamic routing?Select correct option:It is inflexibleIt has low network overloadIt can work around network failureAll of the above3_All destinations on same switch have sameRouterInformationNext hopNone of the above4_A _____________ address-binding table is used for each physical network.Select correct option: new similar separate old5_Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets.555352516_Mapping between a protocol address and a hardware address is called Address Resolution.truefalse7_The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.Select correct option:TrueFalse8_Dotted decimal represents each octet in ________ and uses a dot to separate octets.binarydecimal lec25hexadecimalOctal · 4TH SEMEmaan..! . January 28, 2014 at 11:10amMostly Quizz were from here..Routing table is used to keep the information about…………….DestinationMedium of transmissionRouters used in networkAll of the aboveWhich of the following statement is true regarding Jitter?Jitter is used for variance in transmission delays.Jitter can occur when a packet is delayed.Jitter is significance for voice, video and data.All of the aboveThe maximum cable length of a LAN is _____FixedUnlimitedFixed and Unlimited in different conditionsNone of theseJitter is significance for ——————VoiceVideoDataAll of aboveThe routing table contains information about the ………………immediately around it.topology of the networkdestinationboth of the abovenone of the aboveWhich of the following is called virtual channel?Connection in VCIConnection in ATMConnection in virtual circuitNone of the aboveIf a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.3210Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets.55535251Which of the following statement is true regarding ATM?ATM is a single technology that is designed to meet the goals of both LANs and WANs.ATM uses the concept of connection-oriented networking.Both (a) and (b)None of the aboveFrame forwarding of a bridge is based on _________.Select correct option:Layer 3 source addressLayer 3 destination addressLayer 2 destination addressLayer 2 Source addressThe process of forwarding the packets of information is called…………….RoutingSwitchingCommunicationNone of the aboveWhich one of the following is a property of static routing?It is inflexibleIt is done at boot timeIt has low network overloadAll of the aboveAccording to a bridgesPerformance, if both the sauces and destination are on the same segmentIt forward the frame to the other segmentIt does not forward the frame to the other segmentIt does not forward the frame to the same segmentIt forwards the frame to every other segmentWhat will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet?500 MHz550 MHz600 MHz650 MHzAsynchronous Transfer Mode uses the concept of …………..Connection-less networkConnection-oriented networkThe fiber-modem converts data into _________ then transmits cover the optional fiberPulses of lightElectronsElectromagnetic signalsNone of these How many methods exist for computing routing table?5432To span long distance or many computers, networks must replace shared medium with ………..Segment transformationFiber opticsPacket switchesNone of the aboveWhich of the following statement is true regarding Distance-vector routing?It is very simple to implement.Packet switch updates own routing table firstIt is used in RIPAll of the aboveWhat will be the bandwidth rate for 1000Base-T Gigabyte or ATM?100 MHz150 MHz200 MHz250 MHzCBR stands for…………….Constant Byte RateConstant Bit RateConnection break RecoveryNone of the aboveThe routing table in interior and exterior switches has which one of the following?It should have next hop for each possible destinationThe next hop in table must be on shortest path to destinationBoth (a) and (b)None of the aboveWhich one of the following is a method for computing routing table information?Manual entryStatic routingBoot time routingNone of the aboveWhich one of the following is the responsibility of Djikstra’ algorithm?To compute the shortest path between two nodesTo extract next hop information from path informationTo insert next hop information into routing tableAll of the aboveRouting table is used to keep the information about…………….DestinationMedium of transmissionRouters used in networkAll of the aboveFrame relay is………………….Connection oriented serviceConnectionless serviceIt is typically ranges from 5Mbps to 1000Mbps.None of the aboveWhich of the following is not a guided medium?Twisted-paircable Fiber-optic cableAtmosphereCoaxial cableWhich of the following statement is wrong regarding PVC?PVC last as long as the customer pay the periodic fee for its use.Forwarding tables are automatically restored after power of equipment failure.Forwarding table entries for PVC’s are dynamically configured.All of the above are wrongWhich of the following statement is true regarding ATM?ATM is a single technology that is designed to meet the goals of both LANs and WANs.ATM uses the concept of connection-oriented networking.Both (a) and (b)None of the aboveDjikstra’s algorithm is used to compute the……………….shortest path between two nodesnumber of nodes used in the networkdistance between different nodesnone of the aboveIf a link or a packet switch fails then which one of the following would possibly be happened?Link would be reestablishedRequest to change failed hardware would appearThe packet switch will modify the tablesNone of the aboveThe routing contains information about immediately around itTopology of the networkDestinationBoth of the aboveNone of the aboveSMDS is ……………………Connectionless serviceConnection oriented serviceUsed for delivering blocks of dataNone of the aboveThe process of forwarding the packets of information is calledRoutingSwitchingCommunicationNone of the aboveThe sharing of a medium and its link by two or more devices is calledmodulationencodingline disciplinemultiplexingWhich multiplexing technique transmits analog signals?FDMTDMWDM(a) and (c)Which multiplexing technique transmits digital signals?FDMTDMWDMNone of aboveWhich multiplexing technique shifts each signal to a different carrier frequency?FDMTDMBoth (a) and (b)None of aboveIn synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots.nn+1N-1O to nWhich multiplexing technique involves signals composed of light beams?FDMTDMWDMNone of above_________ Utilization is the use of available bandwidth to achieve specific goals.FrequencyBandwidthAmplitudeNone of the above________ can be achieved by using multiplexing; ______ can be achieved by using spreading.Efficiency; privacy and antijammingPrivacy and antijamming; efficiencyPrivacy and efficiency; antijammingEfficiency and antijamming; privacy________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.1; n1:1n;1n;nThe word ______ refers to the portion of a _______ that carries a transmission.channel; linklink; channelline; channelline; link ______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted.TDMFDMBoth (a) or (b)Neither (a) or (b)FSM is an _________technique.AnalogDigitalEither (a) or b)None of the above____ is designed to use the high bandwidth capability of fiber-optic cable.FDMTDMWDMNone of the above_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.FDMTDMWDMNone of the above____ is designed to use the high bandwidth capability of fiber-optic cable.FDMTDMWDMNone of the above______ is an analog multiplexing technique to combine optical signals.FDMTDMWDMNone of the above_____ is a digital process that allows several connections to share the high bandwidth of a link.FDMTDMWDMNone of the above_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.FDMTDMWDMNone of the aboveDjikstra’s algorithm is used to compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the aboveThe routing table in interior and exterior switches has which one of the following?None of the aboveWhich one of the following is the responsibility of Djikstra’ algorithmTo compute the shortest path between two nodesTo extract next hop information from path informationTo extract next hop information from path informationNone of aboveWhat will be the bandwidth rate for short distance 10Base-T16mhz20mhz100mhz150mhzWhat will be the bandwidth rate for older, low-speed network, and analog telephones16202430How many methods exist for building routing table?1234Which of the following statement is wrong regarding ATM?It is a single technology for voice, video and datait has low jitter and high capacity.it uses fixed size, small cells, 48 octet’s dataNone of the aboveIn Asynchronous Transfer Mode VPI/VCI fields indentify the cellsSourceDestination[email protected]noneThe physical addressing in a WAN is similar as in LAN in the way…………….The data is transmitted in packets equivalent to frames.Each packet has a format with header.The packet header includes destination and source addresses.All of the aboveIn Asynchronous Transfer Mode VPI/VCI fields indentify the cells————–Which one of the following is a method for computing routing table information?Manual entryBoot time routingStatic routingNone of the aboveAll destinations on same switch have sameRouterInformationNext hopNone of the aboveWhich of the following statement is wrong regarding ATM?It is a single technology for voice, video and dataIt has low jitter and high capacity.It uses fixed size, small cells, 48 octet’s dataNone of the aboveWhich one of the following is the responsibility of Djikstra’ algorithm?To compute the shortest path between two nodesTo extract next hop information from path informationTo insert next hop information into routing tableAll of the aboveWhich of the following statement is true regarding Link-state routing?Network topology is separated from route computation.Each switch builds its own routing tables.Link-state routing uses Djikstra’s algorithm.All of the aboveJitter is significance for ——————VoiceVideoDataAll of aboveThe routing table contains information about the ………………immediately around it.topology of the networkdestinationboth of the abovenone of the aboveWhich one of the following is a property of dynamic routing?Select correct option:It is inflexibleIt has low network overloadIt can work around network failureAll of the aboveAn exterior switch is one with which ………………….Select correct option:Computers are attachedNo computer is attachedhubs are attached externallyNone of the above· some ware from here..CS610 – Computer NetworkQuiz #3 JAN 14, 2013NAT device stores state information in translation table.Select correct option:True FalseA _____________ address-binding table is used for each physical network.Select correct option: new similar separate oldFragmentation when using ICMP for path MTU should be avoided.Select correct option: True FalseStatic routing_______ can be used to propagate information about remote networks.Select correct option:Dynamic routing Static routing Address resolution None of the givenTCP stands for _______Select correct option:Transport control protocolTransmission control protocolThe Universal Datagram Protocol is not an end-to-end protocol.Select correct option:TrueFalseFor _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.Select correct option:EfficiencySecurityAccuracyAnomaliesIPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.Select correct option:96 100 120 none of the given_____ Protocol provides error reporting mechanism.Select correct option:IGMPSNMPICMPnone of the givenThe Universal Datagram Protocol is a message-oriented protocol. Select correct option: True Falsedestination address into a prefix and suffix Select correct option: True Falsewhich is not the type of error messages defined by ICMP. Select correct option: Source quench Time exceeded Destination unreachable none of the givenWhich protocol is used to test different tools. Select correct option: ICMP IGMP TCP/IP none of the givenHEADER LEN field gives size of extention header. Select correct option: False Trueis a ____ protocol. Select correct option: Point-to-Point Multi-Point Both (a) and (b) None of the givenCPNAT device stores state information in translation table. Select correct option: True FalsePostfix defines how much of address used to identify network. Select correct option: True FalseAs the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of______ possible sizes. Select correct option: three two four fiveEvery hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________Transmission Unit. Select correct option: Least Maximum Fragment FrameTwice NAT allows a site to run servers. Select correct option: True FalseThe maximum segment size of TCP flow control is_________ Select correct option: 3000 octets 2000 octets 1000 octetsnone of the givenIn IP routing, forwarding refers to ____ transfer. Select correct option: packet datagram message None of the givenThere are _____ possibilities to detect the destination using Trace-route Select correct option: 1 2 3 None of the givendynamic routing, the routing table is initialized when system boots. Select correct option: True FalseHashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string. Select correct option: True FalseDotted decimal represents each octet in ______ and uses a dot to separate octets. Select correct option: binarydecimal hexadecimal OctalThe amount of buffer space available at any time is called the window. Select correct option: True FalseIn IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers. Select correct option: 12 14 16 none of the given______ field is used to identify a specific path through the network Select correct option: FLOW LABEL TRAFFIC CLASS Both a and bnone of the givenIPV6 address consists of ______ Select correct option: 32 Bits 64 Bits 128 Bitsnone of the givenThe IP class scheme does not divide the______ address space into equal size class and the classes do not contain the same number of networks. Select correct option: 16-bit 32-bit48-bit 64-bitA datagram cannot be larger than ______ of a network over which it is sent. Select correct option: MTU Size IP headerNone of the givenAn Internet Address (IP address) is a unique ________ binary number assigned to a host and used for all communication with host Select correct option: 48-bit 32-bit24-bit None of the givenIP datagram can contains ______ octets. Select correct option: 0-65,535 1-65,5351-65,536 none of the givenInterior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol. Select correct option: True FalseDue to revolutionalization of IP-V6 the speed has increased from_____ Select correct option: 56kbps to 512kbps 512kbps to 1gbps 56kbps to 1gbpsnone of the given _______uses window mechanism to control the flow of data. Select correct option: IP UDP TCPnone of the givenwindow mechanismMapping between a protocol address and a hardware address is called Address Resolution. Select correct option: True FalseUPD is operating system independent. Select correct option: True FalseA________ is a special-purpose computer dedicated to the task of interconnecting networks. Select correct option: Router Bridge Switch None of the givenNetwork having short intervals has a large timeout and the network having large interval has short timeout. Select correct option: True False_________ places the boundary between the first and second octets Select correct option: Class AClass B Class C Class DWhenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix Select correct option: TrueFalseThere are three standard implementations to improve computational efficiency: Hashing, Direct Indexing and InDirect Indexing True FalseIPV6 128 bits address includes network prefix and ______ Select correct option: Host SuffixHost prefix Source Prefix none of the givenICMP message transport is acted upon by getting ICMP_______ in IP. Select correct option: De-encapsulated EncapsulatedSegmented none of the givenAs the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.Select correct option:TrueFalse Twice NAT allows a site to run servers.Select correct option:TrueFalse· Preliminary version of IP was called _________.Select correct option:IP – New Generation (IPng)IP – Next Generation (IPng)IP – Net Generation (IPng)None of the given As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.Select correct option:TrueFalse_________ uses window mechanism to control the flow of data.Select correct option:IPUDPTCPnone of the given The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.Select correct option:TrueFalseWhich protocol is used to test different tools.Select correct option:ICMPIGMPTCP/IPnone of the given________ identifies the application program that sent the data.Select correct option:Destination PortSource portLogical addressNone of the givenThe Source can configure outgoing datagram’s to avoid _________Select correct option:SegmentationDefragmentationFragmentationNone of the givenThe time for acknowledgement to arrive depends on __________Select correct option:Distance to destinationCurrent traffic conditionsBoth a and bnone of the givenwhich is not the type of error messages defined by ICMP.Select correct option:Source quenchTime exceededDestination unreachablenone of the givenPreliminary version of IP was called _________.Select correct option:IP – New Generation (IPng)IP – Next Generation (IPng)IP – Net Generation (IPng)None of the givenHEADER LEN field gives size of extention header.Select correct option:FalseTrue_______ shows senders preference for low latency, high Reliability.Select correct option:TYPESERVICE TYPESERVICE PRIORITYNone of the givenAs the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.Select correct option:TrueFalse________ field of header indicates whether a datagram is a fragment or a complete datagram.Select correct option:FLAGSFRAGMENT OFFSETIDENTIFICATIONNo.3None of the given (not sure) Page 105In ______________, the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.Select correct option:Address ResolutionTable LookupMessage ExchangeClosed-form Computation Page 94Postfix defines how much of address used to identify network.Select correct option:TrueFalse______________field tells the receiver how to order fragments within a given datagram.Select correct option:FLAGSNo.4FRAGMENT OFFSETIDENTIFICATIONNone of the given (not sure) Page 105H.LEN shows the header length in units of ____ BitsSelect correct option:3432 Page 10530None of the givenIn Closed-form computation, the protocol address assigned to a computer is chosen carefully sothat computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.Select correct option:arithmeticXORShiftXNORNo.5For _____________, information about forwarding is stored in a routing table, which is initialized atsystem initialization and must be updated as network topology changes.Select correct option:EfficiencySecurityAccuracyAnomaliesEnd to End delivery Service of IP datagram is _____Select correct option:Connection orientedConnectionless Page 120both a and bnone of the given______ contains all information needed to deliver datagram to the destination.Select correct option:HeaderData AreaPage No.6Identifiernone of the givenIPV6 addresses are _____ bits.Select correct option:3264128256The Header format of IPv6 is entirely different.Select correct option:TrueFalse____ contains all information needed to deliver datagram to the destination.Select correct option:HeaderData AreaIdentifiernone of the givenWhich one of these is not a main feature of connectionless service:Select correct option:It includes extension of LAN abstraction.It has universal addressing and the data is delivered in packets frames), each with a header.It combines collection of physical networks into a single virtual network.It has universal addressing and the data is delivered in packets frames), without a header.H.LEN shows the header length in units of __ BitsSelect correct option:343230None of the given____ layer Provides reliable delivery of datagram.Select correct option:NetworkTransportDatalinknone of the givenRouters use _______ to forward datagrams along prearranged path.Select correct option:Traffic classFlow labelDestination addressnone of the given______ field is used to identify a specific path through the networkSelect correct option:FLOW LABELTRAFFIC CLASSBoth a and bnone of the given_____ is a technique used to Limit datagram size to small MTU of any networkSelect correct option:SegmentationFragmentationEncapsulationnone of the givenThe Current version of IP-Version 4 is _____ oldSelect correct option:18 years20 years22 yearsnone of givenThe protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent.Select correct option:EncryptedDecryptedTranslatedNon of theseInside a computer, each address mask is stored as a __-bit value.Select correct option:48641632_____ Source is responsible for fragmentation.Select correct option:IPV4IPV6Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.Select correct option:LeastMaximumFragmentFrameIP datagram can contains ______ octets.Select correct option:0-65,5351-65,5351-65,536none of the givenMTU Stands for _______Select correct option:Mininum transmission unitMaximun transmission unitMulticast transmission unitNone of the givenAs the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ______ possible sizes.Select correct option:threetwofourfiveEnd to End delivery Service of IP datagram is ___Select correct option:Connection orientedConnectionlessBoth a and bNone of the given______________field tells the receiver how to order fragments within a given datagram.Select correct option:FLAGSFRAGMENT OFFSETIDENTIFICATIONNone of the givenPostfix defines how much of address used to identify network.Select correct option:TrueFalseEvery hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.Select correct option:LeastMaximumFragmentFrame· A routing table contains_______Select correct option:The destination network IDThe hop count to reach the networkThe router ID of the next hopAll of the givenNAT device stores state information in translation table.Select correct option:TrueFalseTCP achieves _________ by retransmission.Select correct option:EfficiencyAccuracyReliabilitynone of the given________ identifies the application program that sent the data.Select correct option:Destination PortSource portLogical addressNone of the given_____ Protocol provides error reporting mechanism.Select correct option:IGMPSNMPICMPnone of the givenRouting refers to the _________ of routing information.Select correct option:transmissionpropagationcommunicationNone of the given______ layer Provides reliable delivery of datagram.Select correct option:NetworkTransportDatalinknone of the givenEnd to End delivery Service of IP datagram is _____Select correct option:Connection orientedConnectionlessboth a and bnone of the givenTCP is a connectionless and reliable transport protocol.Select correct option:TrueFalse
The demand of sharing is very high because many computers need to
use the shared networks.
Select correct option:
WAN networks
Shared networks
Unshared networks
LAN networks
Most NICs contain _______________ circuitry that allows the NIC to
operate independent of the CPU.
DMA(Direct Memory Access)
Multiplexer
Transceiver
None of the given
The satellite or radio topology in which all
computers are connected to each other via satellite or radio wave is a kind of
Select correct option:
broadcast network
Thick Ethernet is known as——————
Select correct option:
10 base 5
10 base T
10 base 100
10 base 1
The first automated tool required to see whether the given computer
is online or not was
Select correct option:
Probing program
PING program
status program
None of the above
The basic responsibility of NIC is —————-
Select correct option:
To access medium/network
To resource allocation
To access memory
All of above
No error detection scheme is perfect because transmission errors
can affect _________.
Select correct option:
Data
Additional Information
Additional information & data
Transmission medium
————– has advantages arisen from the size and ease of
computation.
Select correct option:
CRC
Parity
Checksum
Byte Stuffing
The third field of the header consists of —— bit Ethernet
frame type.
Select correct option:
48
32
16
8
The Ethernet standard specifies that frames are sent using the
——–
Select correct option:
Differential Manchester
Not Return to Zero (NRZ)
Manchester Encoding
Return to Zero (RZ)
LAN that use ATM technology have a ————
Select correct option:
Bus topology
Star topology
Ring topology
Mesh Topology
Hardware that calculates a CRC uses two simple components.
Select correct option:
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit
Most NICs contain _______________ circuitry that allows the NIC to
operate independent of the CPU.
Select correct option:
DMA (Direct Memory Access)
Multiplexer
Transceiver
None of the given
Fixed network is a type of networks which is classified with
respect to the………..factor
Select correct option:
Size
Connectivity
Medium
Mobility
Network interface card acts like a (an) ———–
Select correct option:
Input/output device
Input device
Output device
All of above
IEEE LLC/SNAP header is ——–, which is used to specify the
type of data.
Select correct option:
8 octets
8 bytes
8 bits
None of the above
Most LANs that employ ring topology use an access mechanism known
as——-
Select correct option:
CSMA/CD
CSMA/CA
CSMA
TOKEN PASSING
The Gigabit Ethernet hardware operates at a rate of ________
10 Mbps
100 Mbps
1000 Mbps
None of the given
A network uses ———— if all computers attach to a central
point
Select correct option:
Ring Topology
Star Topology
Hub Topology
Bus Topology
———- is also called self healing network
Select correct option:
ATM
FDDI
Token Ring
None of the given
———- which is designed to help detect transmissions errors,
send one extra bit of information with each character.
Select correct option:
Checksum
CRC
Parity
VRC
Hardware addresses must be ———- on a LAN.
Select correct option:
Common
Unique
A ———- relies on the hardware manufacturer to assign a
unique physical address to each network interface.
Select correct option:
Static addressing scheme
Configurable addressing scheme
Dynamic addressing scheme
None of the given
The satellite or radio topology in which all computers are
connected to each other via satellite or radio wave is a kind of
Select correct option:
Broadcast network
Point-to-Point network
Responses