CS610 final term past papers

For Past Papers Just Follow The Download Buttons, We have a large data for revision of Virtual University courses. You can also join the following groups for study discussion . The best is We Recommend you to study your handouts and lectures, Prepare your all course then revise the past papers for your good grade.
CS610 final term past papers CS610 - Computer Network Download CS610 Final Term Papers By Waqar Siddhu 1.pdf CS610 final term past papers CS610 - Computer Network Download CS610 Final Term Papers By Waqar Siddhu 10.pdf
CS610 final term past papers CS610 - Computer Network Download CS610 Final Term Papers By Waqar Siddhu 11.pdf CS610 final term past papers CS610 - Computer Network Download CS610 Final Term Papers By Waqar Siddhu 2.pdf
CS610 final term past papers CS610 - Computer Network Download CS610 Final Term Papers By Waqar Siddhu 3.pdf CS610 final term past papers CS610 - Computer Network Download CS610 Final Term Papers By Waqar Siddhu 5.pdf
CS610 final term past papers CS610 - Computer Network Download CS610 Final Term Papers By Waqar Siddhu 6.pdf CS610 final term past papers CS610 - Computer Network Download CS610 Final Term Papers By Waqar Siddhu 7.pdf
CS610 final term past papers CS610 - Computer Network Download CS610 Final Term Papers By Waqar Siddhu 8.pdf CS610 final term past papers CS610 - Computer Network Download CS610 final term solved Mcqs with references by Moaaz1.pdf

CS610 MCQs Mega File Solved with References by vuislamabad.com

CS610 – Computer NetworkQuiz No.1 Nov 16, 2019 —— Program sends a message to a remote computer and reports whether the computer responds. Ping Ping Traceroute ICMP Non of the given ———- was especially concerned about the lack of high powered computers. ARPA IEEE EIA Non of the given The term ——– is used to denote the definition of a packet used with a specific type of network. Packet Frame Data None of the given Computer networks are often called ————– because they use packet technology. Ethernet Switch networks Packet networks None of the given ————– have advantages arisen from the size and ease of computation. CRC Parity Checksums None of given Most LANs that employ ring topology use an access mechanism known as——- CSMA/CD CSMA/CA TOKEN PASSING None of the given IEEE LLC/SNAP header is ——–, which is used to specify the type of data. 8 octets 8 bytes 8 bits None of the given Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet. 10 Base 2 10 Base 5 10 Base T None of the given An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification. RJ-45, 10 Base T RJ-45, 10 Base 5 BNC, 10 Base 2 BNC, 10 Base T A bridges function in the _________ layers(s). Physical (MAC) Data link Network Physical (MAC) and Data link A Bridge can ________ Filter a frame Forward a frame Extend a LAN Do all the above A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________ Layer 2 source address Source node’s physical address Layer 2 destination address Layer 3 destination address ________ computes shortest paths in a graph by using weights on edges as a measure of distance.[/b] Greedy algorithm Distance vector algorithm Dijksta’s algorithm Non of the given ___________ is used for audio and video, since these have predefined maximum data rates Constant Bit Rate (CBR) service Variable Bit Rate (VBR) service Available Bit Rate (ABR) service None of the given ———- is also called self healing network   ATM FDDI Token Ring None of the given Most LANs that employ ring topology use an access mechanism known as——- Select correct option: CSMA/CD CSMA/CA CSMA  TOKEN PASSING An ————method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types. Explicit frame type Ideal frame type Implicit frame type None of the given Hardware that calculates a CRC uses two simple components. AND unit and XOR unit Shift register and XOR unit Shift register & AND unit Shift register and shift XOR unit The Ethernet standard specifies that frames are sent using the ——– Differential Manchester Not Return to Zero (NRZ) ManchesterEncoding Return to Zero (RZ) When an application ———— data, it makes a copy of the data available to all other computers on the network. Select correct option: Broadcasting Multicasting Unicasting None of the given LAN interface may use ———- to copy frame data directly from main memory.    DMA FDDI CSMA/CD None of the given LAN and WAN are classified according to their……… Select correct option: Size Connectivity Medium Mobility For how much time would other computers be in wait while one computer was transferring 56MB file with transmission speed of 56Kbps Select correct option: 10 Sec 11 Sec 12 Sec 13 Sec A network uses _______ to arrange computers to be connected in a single closed loop. Select correct option: Star Topology Dual Ring Topology Ring Topology Bus Topology CBR stands for…………….Constant Byte RateConstant Bit RateConnection break RecoveryNone of the above The routing table in interior and exterior switches has which one of the following?It should have next hop for each possible destinationThe next hop in table must be on shortest path to destinationBoth (a) and (b)None of the above Which one of the following is a method for computing routing table information?Manual entryStatic routingBoot time routingNone of the above Which one of the following is the responsibility of Djikstra’ algorithm?To compute the shortest path between two nodesTo extract next hop information from path informationTo insert next hop information into routing tableAll of the above Routing table is used to keep the information about…………….DestinationMedium of transmissionRouters used in networkAll of the above Frame relay is………………….Connection oriented serviceConnectionless serviceIt is typically ranges from 5Mbps to 1000Mbps.None of the above Which of the following is not a guided medium?Twisted-paircable Fiber-opticcable AtmosphereCoaxial cableWhich of the following statement is wrong regarding PVC?PVC last as long as the customer pay the periodic fee for its use.Forwarding tables are automatically restored after pow er of equipment failure.Forwarding table entries for PVC’s are dynamically configured.All of the above are wrong Which of the following statement is true regarding ATM?ATM is a single technology that is designed to meet the goals of both LANs and WANs.ATM uses the concept of connection-oriented networking.Both (a) and (b)None of the above Djikstra’s algorithm is used to compute the……………….shortest path between two nodesnumber of nodes used in the networkdistance between different nodesnone of the above _________ is used to attach two autonomous systems. Select correct option: BGP IGP EGP none of the given Due to revolutionalization of IP-V6 the speed has increased from _______ Select correct option: 56kbps to 512kbps 512kbps to 1gbps 56kbps to 1gbps none of the given Whenever it handles a packet, IP software needs to separate the destination address into a prefix. Select correct option: True False TTL stands for __________ Select correct option: Time to Learn Time to Leave Time to Live none of the given IGPs stand for _________ Select correct option: Internal Gateway Protocols Interior Gateway Protocols Intermediate Gateway Protocols None of the given _____________identifies which application program on receiving computer should receive the data Select correct option: Logical address Source port Destination Port None of the given __________________encapsulates IP datagram as data area in hardware frame. Select correct option: Network Interface Layer Datalink Layer Network Layer None of the given Class A mask is 255.0.0.0 which is used for ________________ Select correct option: Unicasting Multicasting Subnetting All of the given class A mask is 255.0.0.0 which is used for subnetting. NAT is not useful at a residence with Cable Modem or DSL connectivity. Select correct option: True False Autonomous System chooses a routing protocol to exchange routing information which is passed before being summarized to another group. Select correct option: True False ______ layer Provides reliable delivery of datagram. Select correct option: Network Transport Datalink none of the given The process of using a routing table to select a next hop for a given datagram is called_________. Select correct option: Encapsulation Reassembling Routing or forwarding None of the given The process of learning the path MTU is known as path MTU discovery. Select correct option: True False As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes. Select correct option: three two four five End to End delivery Service of IP datagram is _____ Select correct option: Connection oriented Connectionless both a and b none of the given EGP stands for _________ Select correct option: Extension Gateway Protocol Exterior Gateway Protocol Explicit Gateway Protocol none of the given Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string. Select correct option: True False Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address. Select correct option: 16-bit 48-bit 64-bit 128-bit Reliability is not the responsibility of the Transport layer. Select correct option: True False IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address. Select correct option: 96 100 120 none of the givenNAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time. Select correct option: True False TCP uses the term segment to refer to a ________. Select correct option: packet message both (a) and (b) None of the givenboth a and b? The Universal Datagram Protocol is a message-oriented protocol. Select correct option: True False ______________field tells the receiver how to order fragments within a given datagram. Select correct option: FLAGS FLAGMENT OFFSET IDENTIFICATION None of the given IP datagram can contains ________ octets. Select correct option: 0-65,535 1-65,535 1-65,536 none of the given The amount of buffer space available at any time is called the window. Select correct option: True False _______ Source is responsible for fragmentation. Select correct option: IPV4 IPV6 Routers use _______ to forward datagrams along prearranged path. Select correct option: Traffic class Flow label Destination address none of the given _______ protocol uses three way handshake to begin a connection. Select correct option: UDP TCP IP none of the given Typical internet routing uses uses a combination of two metrics__________________. Select correct option: routing metrics administrative cost and routing metrics hop cost administrative cost and hop count Question # 14 of 20 Network Address and Port Translation (NAPT) is by far the most popular form of _______ Select correct option: Network Address Transmission Network Address Translation Network Address Transformation None of the given The routers within an autonomous system use a _____________ to exchange routing information. Select correct option: Interior Gateway protocols(IGPs) Exterior Gateway protocol (EGPs) Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs) None of the given Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol. Select correct option: True False The Network Layer Protocol ICMP stands for____________ Select correct option: Instant Control Message Protocol Internet Control Message Protocol Initial Control Message Protocol None of the given The Current version of IP-Version 4 is _____ old Select correct option: 18 years 20 years 22 years none of given TCP is a connectionless and reliable transport protocol. Select correct option: True False In Direct point to point communication adding the Nth computerrequires___________ new connections.N2N-1N2 –N)/2None of the given Most LANs that employ ring topology use an access mechanism knownas_______ring topology use token passing forsynchronized access to the ring Computers attached to an ether use —— in which a computer waits for theether to be idle before transmitting a frame.CSMA/CDCSMA/CATOKEN PASSINGNone of the given FDDI can transmits data at a rate of ___________________100 million bits per second100 million bits per second100 million bits per secondNone of the given________________ has advantages arisen from the size and ease ofcomputation.CRCParityChecksumsNone of given AUI cable connects from NIC to—————Select correct option:BNC ConnectorRJ-45 ConnectorTransceiverNone of the above As a result of ARPA research the first network was established which was named as Select correct option:INTERNETWORKINGARPNETARPANETPACKET NETWORK A ———- provides mechanism that automatically assignes a physical address to a station when the station first boots. Select correct option:Static ad Configurableaddressing scheme polygons are basically concave polygons that may have self-intersecting edges.ComplexHybridConvexConvex and HybridDynamic addressing scheme An ___________method, the network hardware designers specify how typeinformation is included in the frame and the value use to identify various frame Local Talk is a LAN technology that employsExplicit frame type Ideal frame type Implicit frame type None of the given In Point-to-Point topology there are two topologies.Tree and RingStar and RingStar and TreeNone of the given The topology each computer is connected to a central hub is calledSelect correct option:Ring topologyStar topologyTree topologyMesh topology The basic responsibility of NIC is —————- Select correct option:To access mediumNetwork To resource allocationTo access memoryAll of above Currently the original Ethernet hardware operates at a rate of ——–Select correct option:10 Mbps100 Mbps1000 Mbps3 Mbps The Gigabit Ethernet hardware operates at a rate of_________10 Mbps100 Mbps1000 Mbps The number of connections needed for N computer in direct point to pointcommunication is equal to:(N2-N)/2N (N-1)N2None of the given The length of the format of hardware address isSelect correct option:One to ten bytesOne to five bytesOne to six bytesNone of the given Star topolgy is the kind ofTree topologyPoint-to-point topolgyBroadcast topolgyRing topology Local Talk is a LAN technology that employs________Bus topologyRing topologyStar topologyNone of the givenThe network occupies larger areas like cities & countries is calledSelect correct option:LANWANMANAll of the above Computer networks are classified by…….factors234 5 Computers attached to an ethernet use ________in which a computer waits forthe other to be idle before transmitting a frame.CSMA/CDCSMA/CATOKEN PASSINGnone of the given Point-to-point topology isSize BasedMobility BasedConnectivity BasedMedium Based NIC connection in a physical network is known as——————–Select correct option:LAN wiring schemeWAN wiring schemeColor wiringNone of above A_______ relies on the hardware manufacturer to assign a unique physicaladdress to each network interface.Static addressing schemeDynamic addressing schemeConfigurable addressing schemeNone of the given The main functions of NIC are ———————CRC Errorcorrection AddressrecognitionAll of above FDDI can transmits data at a rate of ___________________100 million bits per second100 million bits per second100 million bits per secondNone of the given Wireless LAN use the ——– as a media access methodSelect correct option:CSMA/CDCSMA/CATOKEN PASSINGCSMA A_______ relies on the hardware manufacturer to assign a unique physicaladdress to each network interface.Static addressing schemeDynamic addressing schemeConfigurable addressing schemeNone of the givenWireless LAN use the ——– as a media access methodSelect correct option:CSMA/CDCSMA/CATOKEN PASSINGCSMA According to their size there are…………classifications of networks. Select correct option:23 4 5 As a result of ARPA research the first network was established which was named as Select correct option:INTERNETWORKINGARPNETARPANETPACKET NETWOR ———- performs the matching between destination address and MAC address of machine.Select correct option:Hardware addressLAN interfaceDMANone of above An ___________method, the network hardware designers specify how typeinformation is included in the frame and the value use to identify various frametypes.Explicit frame typeIdeal frame typeImplicit frame typeNone of the given The demand of sharing is very high because many computers need to use the shared networks.Select correct option: WAN networks Shared networks Unshared networks LAN networks Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.DMA(Direct Memory Access)MultiplexerTransceiverNone of the given The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:broadcast network Thick Ethernet is known as—————— Select correct option:10 base 510 base T10 base 10010 base 1 The first automated tool required to see whether the given computer is online or not wasSelect correct option:Probing programPING programstatus programNone of the above The basic responsibility of NIC is —————-Select correct option:To access medium/networkTo resource allocationTo access memoryAll of above No error detection scheme is perfect because transmission errors can affect _________.Select correct option:DataAdditional InformationAdditional information & dataTransmission medium ————– has advantages arisen from the size and ease of computation.Select correct option:CRCParityChecksumByte Stuffing The third field of the header consists of —— bit Ethernet frame type.Select correct option:4832168The Ethernet standard specifies that frames are sent using the ——–Select correct option:Differential ManchesterNot Return to Zero (NRZ)Manchester EncodingReturn to Zero (RZ)LAN that use ATM technology have a ————Select correct option:Bus topologyStar topologyRing topologyMesh Topology Hardware that calculates a CRC uses two simple components.Select correct option:AND unit and XOR unitShift register and XOR unitShift register & AND unitShift register and shift XOR unit Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.Select correct option:DMA (Direct Memory Access)MultiplexerTransceiverNone of the given Fixed network is a type of networks which is classified with respect to the………..factorSelect correct option:SizeConnectivityMediumMobility Network interface card acts like a (an) ———–Select correct option:Input/output deviceInput deviceOutput deviceAll of above IEEE LLC/SNAP header is ——–, which is used to specify the type of data.Select correct option:8 octets8 bytes8 bitsNone of the above Most LANs that employ ring topology use an access mechanism known as——-Select correct option:CSMA/CDCSMA/CACSMATOKEN PASSING The Gigabit Ethernet hardware operates at a rate of ________10 Mbps100 Mbps1000 MbpsNone of the given A network uses ———— if all computers attach to a central pointSelect correct option:Ring TopologyStar TopologyHub TopologyBus Topology ———- is also called self healing networkSelect correct option:ATMFDDIToken RingNone of the given ———- which is designed to help detect transmissions errors, send one extra bit of information with each character.Select correct option:ChecksumCRCParityVRC Hardware addresses must be ———- on a LAN.Select correct option:CommonUniqueA ———- relies on the hardware manufacturer to assign a unique physical address to each network interface.Select correct option:Static addressing schemeConfigurable addressing schemeDynamic addressing schemeNone of the given The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind ofSelect correct option:Broadcast networkPoint-to-Point network 1_Which of the following statement is true regarding Link-state routing?  Network topology is separated from route computation. Each switch builds its own routing tables. Link-state routing uses Djikstra’s algorithm. All of the above = Answer 2_Which one of the following is a property of dynamic routing? Select correct option: It is inflexible It has low network overload It can work around network failure All of the above  3_All destinations on same switch have same Router Information Next hop None of the above 4_A _____________ address-binding table is used for each physical network. Select correct option:  new  similar  separate  old 5_Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets. 55 53 52 51 6_Mapping between a protocol address and a hardware address is called Address Resolution. true false 7_The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers. Select correct option: True False 8_Dotted decimal represents each octet in ________ and uses a dot to separate octets. binary decimal   lec25 hexadecimal Octal ·          4TH SEMEmaan..! . January 28, 2014 at 11:10amMostly Quizz were from here.. Routing table is used to keep the information about……………. Destination Medium of transmission Routers used in network All of the above Which of the following statement is true regarding Jitter? Jitter is used for variance in transmission delays. Jitter can occur when a packet is delayed. Jitter is significance for voice, video and data. All of the above The maximum cable length of a LAN is _____ Fixed Unlimited Fixed and Unlimited in different conditions None of these Jitter is significance for —————— Voice Video Data All of above The routing table contains information about the ………………immediately around it. topology of the network destination both of the above none of the above Which of the following is called virtual channel? Connection in VCI Connection in ATM Connection in virtual circuit None of the above If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment. 3 2 1 0 Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets. 55 53 52 51 Which of the following statement is true regarding ATM? ATM is a single technology that is designed to meet the goals of both LANs and WANs. ATM uses the concept of connection-oriented networking. Both (a) and (b) None of the above Frame forwarding of a bridge is based on _________. Select correct option: Layer 3 source address Layer 3 destination address Layer 2 destination address Layer 2 Source address The process of forwarding the packets of information is called……………. Routing Switching Communication None of the above Which one of the following is a property of static routing? It is inflexible It is done at boot time It has low network overload All of the above According to a bridges Performance, if both the sauces and destination are on the same segment It forward the frame to the other segment It does not forward the frame to the other segment It does not forward the frame to the same segment It forwards the frame to every other segment What will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet? 500 MHz 550 MHz 600 MHz 650 MHz Asynchronous Transfer Mode uses the concept of ………….. Connection-less network Connection-oriented network The fiber-modem converts data into _________ then transmits cover the optional fiber Pulses of light Electrons Electromagnetic signals None of these  How many methods exist for computing routing table? 5 4 3 2 To span long distance or many computers, networks must replace shared medium with ……….. Segment transformation Fiber optics Packet switches None of the above Which of the following statement is true regarding Distance-vector routing? It is very simple to implement. Packet switch updates own routing table first It is used in RIP All of the above What will be the bandwidth rate for 1000Base-T Gigabyte or ATM? 100 MHz 150 MHz 200 MHz 250 MHz CBR stands for……………. Constant Byte Rate Constant Bit Rate Connection break Recovery None of the above The routing table in interior and exterior switches has which one of the following? It should have next hop for each possible destination The next hop in table must be on shortest path to destination Both (a) and (b) None of the above Which one of the following is a method for computing routing table information? Manual entry Static routing Boot time routing None of the above Which one of the following is the responsibility of Djikstra’ algorithm? To compute the shortest path between two nodes To extract next hop information from path information To insert next hop information into routing table All of the above Routing table is used to keep the information about……………. Destination Medium of transmission Routers used in network All of the above Frame relay is…………………. Connection oriented service Connectionless service It is typically ranges from 5Mbps to 1000Mbps. None of the above Which of the following is not a guided medium? Twisted-pair cable Fiber-optic cable Atmosphere Coaxial cable Which of the following statement is wrong regarding PVC? PVC last as long as the customer pay the periodic fee for its use. Forwarding tables are automatically restored after power of equipment failure. Forwarding table entries for PVC’s are dynamically configured. All of the above are wrong Which of the following statement is true regarding ATM? ATM is a single technology that is designed to meet the goals of both LANs and WANs. ATM uses the concept of connection-oriented networking. Both (a) and (b) None of the above Djikstra’s algorithm is used to compute the………………. shortest path between two nodes number of nodes used in the network distance between different nodes none of the above If a link or a packet switch fails then which one of the following would possibly be happened? Link would be reestablished Request to change failed hardware would appear The packet switch will modify the tables None of the above The routing contains information about immediately around it Topology of the network Destination Both of the above None of the above SMDS is …………………… Connectionless service Connection oriented service Used for delivering blocks of data None of the above The process of forwarding the packets of information is called Routing Switching Communication None of the above The sharing of a medium and its link by two or more devices is called modulation encoding line discipline multiplexing Which multiplexing technique transmits analog signals? FDM TDM WDM (a) and (c) Which multiplexing technique transmits digital signals? FDM TDM WDM None of above Which multiplexing technique shifts each signal to a different carrier frequency? FDM TDM Both (a) and (b) None of above In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots. n n+1 N-1 O to n Which multiplexing technique involves signals composed of light beams? FDM TDM WDM None of above _________ Utilization is the use of available bandwidth to achieve specific goals. Frequency Bandwidth Amplitude None of the above ________ can be achieved by using multiplexing; ______ can be achieved by using spreading. Efficiency; privacy and antijamming Privacy and antijamming; efficiency Privacy and efficiency; antijamming Efficiency and antijamming; privacy ________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. 1; n 1:1 n;1 n;n The word ______ refers to the portion of a _______ that carries a transmission. channel; link link; channel line; channel line; link  ______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted. TDM FDM Both (a) or (b) Neither (a) or (b) FSM is an _________technique. Analog Digital Either (a) or b) None of the above ____ is designed to use the high bandwidth capability of fiber-optic cable. FDM TDM WDM None of the above _____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one. FDM TDM WDM None of the above ____ is designed to use the high bandwidth capability of fiber-optic cable. FDM TDM WDM None of the above ______ is an analog multiplexing technique to combine optical signals. FDM TDM WDM None of the above _____ is a digital process that allows several connections to share the high bandwidth of a link. FDM TDM WDM None of the above _____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one. FDM TDM WDM None of the above Djikstra’s algorithm is used to compute the………………. shortest path between two nodes number of nodes used in the network distance between different nodes none of the above The routing table in interior and exterior switches has which one of the following? None of the above Which one of the following is the responsibility of Djikstra’ algorithm To compute the shortest path between two nodes To extract next hop information from path information To extract next hop information from path information None of above What will be the bandwidth rate for short distance 10Base-T 16mhz 20mhz 100mhz 150mhz What will be the bandwidth rate for older, low-speed network, and analog telephones 16 20 24 30 How many methods exist for building routing table? 1 2 3 4 Which of the following statement is wrong regarding ATM? It is a single technology for voice, video and data it has low jitter and high capacity. it uses fixed size, small cells, 48 octet’s data None of the above In Asynchronous Transfer Mode VPI/VCI fields indentify the cells Source Destination [email protected] none The physical addressing in a WAN is similar as in LAN in the way……………. The data is transmitted in packets equivalent to frames. Each packet has a format with header. The packet header includes destination and source addresses. All of the above In Asynchronous Transfer Mode VPI/VCI fields indentify the cells————– Which one of the following is a method for computing routing table information? Manual entry Boot time routing  Static routing None of the above All destinations on same switch have same Router Information Next hop None of the above Which of the following statement is wrong regarding ATM? It is a single technology for voice, video and data It has low jitter and high capacity. It uses fixed size, small cells, 48 octet’s data None of the above Which one of the following is the responsibility of Djikstra’ algorithm? To compute the shortest path between two nodes To extract next hop information from path information To insert next hop information into routing table All of the above Which of the following statement is true regarding Link-state routing? Network topology is separated from route computation. Each switch builds its own routing tables. Link-state routing uses Djikstra’s algorithm. All of the above Jitter is significance for —————— Voice Video Data All of above The routing table contains information about the ………………immediately around it. topology of the network destination both of the above none of the above Which one of the following is a property of dynamic routing? Select correct option: It is inflexible It has low network overload It can work around network failure All of the above An exterior switch is one with which …………………. Select correct option: Computers are attached No computer is attached hubs are attached externally None of the above·         some ware from here.. CS610 – Computer NetworkQuiz #3 JAN 14, 2013 NAT device stores state information in translation table. Select correct option: True  False A _____________ address-binding table is used for each physical network. Select correct option:  new  similar  separate  old Fragmentation when using ICMP for path MTU should be avoided. Select correct option:  True  False Static routing _______ can be used to propagate information about remote networks. Select correct option:  Dynamic routing  Static routing  Address resolution  None of the given TCP stands for _______ Select correct option: Transport control protocol Transmission control protocol The Universal Datagram Protocol is not an end-to-end protocol. Select correct option: True False For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes. Select correct option: Efficiency Security Accuracy Anomalies IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address. Select correct option:  96  100  120  none of the given _____ Protocol provides error reporting mechanism. Select correct option: IGMP SNMP ICMP none of the given The Universal Datagram Protocol is a message-oriented protocol.   Select correct option:   True  False destination address into a prefix and suffix   Select correct option:   True  False which is not the type of error messages defined by ICMP.   Select correct option:   Source quench  Time exceeded  Destination unreachable  none of the given Which protocol is used to test different tools.   Select correct option:   ICMP  IGMP  TCP/IP  none of the given HEADER LEN field gives size of extention header.   Select correct option:   False  True is a ____ protocol.   Select correct option:   Point-to-Point  Multi-Point  Both (a) and (b)  None of the given CP NAT device stores state information in translation table.   Select correct option:   True  False Postfix defines how much of address used to identify network.   Select correct option:   True  False As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of______ possible sizes.   Select correct option:   three  two  four  five Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________Transmission Unit.   Select correct option:  Least  Maximum  Fragment  Frame Twice NAT allows a site to run servers.   Select correct option:   True  False The maximum segment size of TCP flow control is_________   Select correct option:   3000 octets  2000 octets  1000 octets  none of the given In IP routing, forwarding refers to ____ transfer.   Select correct option:   packet  datagram  message  None of the given There are _____ possibilities to detect the destination using Trace-route   Select correct option:   1   3   None of the given dynamic routing, the routing table is initialized when system boots.   Select correct option:   True  False Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.   Select correct option:   True  False Dotted decimal represents each octet in ______ and uses a dot to separate octets.   Select correct option:   binary  decimal  hexadecimal  Octal The amount of buffer space available at any time is called the window.   Select correct option:   True  False In IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers.   Select correct option:   12  14  16  none of the given ______ field is used to identify a specific path through the network   Select correct option:   FLOW LABEL  TRAFFIC CLASS  Both a and b  none of the given IPV6 address consists of ______   Select correct option:   32 Bits  64 Bits  128 Bits  none of the given The IP class scheme does not divide the______ address space into equal size class and the classes do not contain the same number of networks.   Select correct option:   16-bit   32-bit   48-bit   64-bit A datagram cannot be larger than ______ of a network over which it is sent.   Select correct option:   MTU  Size  IP header None of the given An Internet Address (IP address) is a unique ________ binary number assigned to a host and used for all communication with host   Select correct option:   48-bit  32-bit  24-bit  None of the given IP datagram can contains ______ octets.   Select correct option:   0-65,535  1-65,535  1-65,536  none of the given Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.   Select correct option:   True  False Due to revolutionalization of IP-V6 the speed has increased from_____   Select correct option:   56kbps to 512kbps  512kbps to 1gbps  56kbps to 1gbps  none of the given  _______uses window mechanism to control the flow of data.   Select correct option:   IP  UDP  TCP  none of the given window mechanism Mapping between a protocol address and a hardware address is called Address Resolution.   Select correct option:   True  False UPD is operating system independent.   Select correct option:   True  False A________ is a special-purpose computer dedicated to the task of interconnecting networks.   Select correct option:   Router  Bridge  Switch  None of the given Network having short intervals has a large timeout and the network having large interval has short timeout.   Select correct option:   True  False _________ places the boundary between the first and second octets   Select correct option:   Class A  Class B  Class C  Class D Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix   Select correct option:   True  False There are three standard implementations to improve computational efficiency: Hashing, Direct Indexing and InDirect Indexing   True  False IPV6 128 bits address includes network prefix and ______   Select correct option:   Host Suffix  Host prefix  Source Prefix  none of the given ICMP message transport is acted upon by getting ICMP_______ in IP.   Select correct option:   De-encapsulated  Encapsulated  Segmented  none of the given As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes. Select correct option: True False  Twice NAT allows a site to run servers. Select correct option: True False·         Preliminary version of IP was called _________. Select correct option: IP – New Generation (IPng) IP – Next Generation (IPng) IP – Net Generation (IPng) None of the given  As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes. Select correct option: True False  _________ uses window mechanism to control the flow of data. Select correct option: IP UDP TCP none of the given  The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers. Select correct option: True False Which protocol is used to test different tools. Select correct option: ICMP IGMP TCP/IP none of the given ________ identifies the application program that sent the data. Select correct option: Destination Port Source port Logical address None of the given The Source can configure outgoing datagram’s to avoid _________ Select correct option: Segmentation Defragmentation Fragmentation None of the given The time for acknowledgement to arrive depends on __________ Select correct option: Distance to destination Current traffic conditions Both a and b none of the given which is not the type of error messages defined by ICMP. Select correct option: Source quench Time exceeded Destination unreachable none of the given  Preliminary version of IP was called _________. Select correct option: IP – New Generation (IPng) IP – Next Generation (IPng) IP – Net Generation (IPng) None of the given HEADER LEN field gives size of extention header. Select correct option: False True _______ shows senders preference for low latency, high Reliability. Select correct option: TYPE SERVICE TYPE SERVICE PRIORITY None of the given As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes. Select correct option: True False ________ field of header indicates whether a datagram is a fragment or a complete datagram. Select correct option: FLAGS FRAGMENT OFFSET IDENTIFICATIONNo.3 None of the given (not sure) Page 105 In ______________, the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and arithmetic operations. Select correct option: Address Resolution Table Lookup Message Exchange Closed-form Computation Page 94 Postfix defines how much of address used to identify network. Select correct option: True False ______________field tells the receiver how to order fragments within a given datagram. Select correct option: FLAGSNo.4 FRAGMENT OFFSET IDENTIFICATION None of the given (not sure) Page 105 H.LEN shows the header length in units of ____ Bits Select correct option: 34 32 Page 105 30 None of the given In Closed-form computation, the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations. Select correct option: arithmetic XOR Shift XNORNo.5 For _____________, information about forwarding is stored in a routing table, which is initialized atsystem initialization and must be updated as network topology changes. Select correct option: Efficiency Security Accuracy Anomalies End to End delivery Service of IP datagram is _____ Select correct option: Connection oriented Connectionless Page 120 both a and b none of the given ______ contains all information needed to deliver datagram to the destination. Select correct option: Header Data AreaPage No.6 Identifier none of the given IPV6 addresses are _____ bits. Select correct option: 32 64 128 256 The Header format of IPv6 is entirely different. Select correct option: True False ____ contains all information needed to deliver datagram to the destination. Select correct option: Header Data Area Identifier none of the given Which one of these is not a main feature of connectionless service: Select correct option: It includes extension of LAN abstraction. It has universal addressing and the data is delivered in packets frames), each with a header. It combines collection of physical networks into a single virtual network. It has universal addressing and the data is delivered in packets frames), without a header. H.LEN shows the header length in units of __ Bits Select correct option: 34 32 30 None of the given ____ layer Provides reliable delivery of datagram. Select correct option: Network Transport Datalink none of the given Routers use _______ to forward datagrams along prearranged path. Select correct option: Traffic class Flow label Destination address none of the given ______ field is used to identify a specific path through the network Select correct option: FLOW LABEL TRAFFIC CLASS Both a and b none of the given _____ is a technique used to Limit datagram size to small MTU of any network Select correct option: Segmentation Fragmentation Encapsulation none of the given The Current version of IP-Version 4 is _____ old Select correct option: 18 years 20 years 22 years none of given The protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent. Select correct option: Encrypted Decrypted Translated Non of these Inside a computer, each address mask is stored as a __-bit value. Select correct option: 48 64 16 32 _____ Source is responsible for fragmentation. Select correct option: IPV4 IPV6 Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit. Select correct option: Least Maximum Fragment Frame IP datagram can contains ______ octets. Select correct option: 0-65,535 1-65,535 1-65,536 none of the given MTU Stands for _______ Select correct option: Mininum transmission unit Maximun transmission unit Multicast transmission unit None of the given As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ______ possible sizes. Select correct option: three two four five End to End delivery Service of IP datagram is ___ Select correct option: Connection oriented Connectionless Both a and b None of the given ______________field tells the receiver how to order fragments within a given datagram. Select correct option: FLAGS FRAGMENT OFFSET IDENTIFICATION None of the given Postfix defines how much of address used to identify network. Select correct option: True False Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit. Select correct option: Least Maximum Fragment Frame·         A routing table contains_______ Select correct option: The destination network ID The hop count to reach the network The router ID of the next hop All of the given NAT device stores state information in translation table. Select correct option: True False TCP achieves _________ by retransmission. Select correct option: Efficiency Accuracy Reliability none of the given ________ identifies the application program that sent the data. Select correct option: Destination Port Source port Logical address None of the given _____ Protocol provides error reporting mechanism. Select correct option: IGMP SNMP ICMP none of the given Routing refers to the _________ of routing information. Select correct option: transmission propagation communication None of the given ______ layer Provides reliable delivery of datagram. Select correct option: Network Transport Datalink none of the given End to End delivery Service of IP datagram is _____ Select correct option: Connection oriented Connectionless both a and b none of the given TCP is a connectionless and reliable transport protocol. Select correct option: True False The demand of sharing is very high because many computers need to use the shared networks. Select correct option: WAN networks  Shared networks Unshared networks LAN networks Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU. DMA(Direct Memory Access) Multiplexer Transceiver None of the given The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option: broadcast network Thick Ethernet is known as—————— Select correct option: 10 base 5 10 base T 10 base 100 10 base 1 The first automated tool required to see whether the given computer is online or not was Select correct option: Probing program PING program status program None of the above The basic responsibility of NIC is —————- Select correct option: To access medium/network To resource allocation To access memory All of above No error detection scheme is perfect because transmission errors can affect _________. Select correct option: Data Additional Information Additional information & data Transmission medium ————– has advantages arisen from the size and ease of computation. Select correct option: CRC Parity Checksum Byte Stuffing The third field of the header consists of —— bit Ethernet frame type. Select correct option: 48 32 16 8 The Ethernet standard specifies that frames are sent using the ——– Select correct option: Differential Manchester Not Return to Zero (NRZ) Manchester Encoding Return to Zero (RZ) LAN that use ATM technology have a ———— Select correct option: Bus topology Star topology Ring topology Mesh Topology Hardware that calculates a CRC uses two simple components. Select correct option: AND unit and XOR unit Shift register and XOR unit Shift register & AND unit Shift register and shift XOR unit Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU. Select correct option: DMA (Direct Memory Access) Multiplexer Transceiver None of the given Fixed network is a type of networks which is classified with respect to the………..factor Select correct option: Size Connectivity Medium Mobility Network interface card acts like a (an) ———– Select correct option: Input/output device Input device Output device All of above IEEE LLC/SNAP header is ——–, which is used to specify the type of data. Select correct option: 8 octets 8 bytes 8 bits None of the above Most LANs that employ ring topology use an access mechanism known as——- Select correct option: CSMA/CD CSMA/CA CSMA TOKEN PASSING The Gigabit Ethernet hardware operates at a rate of ________ 10 Mbps 100 Mbps 1000 Mbps None of the given A network uses ———— if all computers attach to a central point Select correct option: Ring Topology Star Topology Hub Topology Bus Topology ———- is also called self healing network Select correct option: ATM FDDI Token Ring None of the given ———- which is designed to help detect transmissions errors, send one extra bit of information with each character. Select correct option: Checksum CRC Parity VRC Hardware addresses must be ———- on a LAN. Select correct option: Common Unique A ———- relies on the hardware manufacturer to assign a unique physical address to each network interface. Select correct option: Static addressing scheme Configurable addressing scheme Dynamic addressing scheme None of the given The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option: Broadcast network Point-to-Point network

Responses