Vous êtes sur la page 1sur 4

1.1.

In OSI model, as data packet moves from the lower to the upper layer header
are¡..
*A. Removed
1.2.There are two broad classes of packet-switched networks are:
*B. datagram network and virtual-circuit network
1.3.Which one is correct about Denial of Service (DoS) attack?
*D. Attackers make network resources unavailable by overwhelming resourc
e with bogus traffic
1.4.What is the throughput of a link in a network?
*C. Number of bits travelling through the link in a unit time
1.5.Any network that routes packets according to host destination addresses is a
________
*E. Datagram network
1.6.Which statement is correct for "layering" in OSI model
*E. Layering allows easy and maintain and updating the system; changing
the protocol of one layer does not affect the others
1.7._______ is the protocol suite for the current Internet.
* C. TCP/IP
1.8.The time required for a data bit to travel through the link from router A to
router B is
*E. Propagation delay
1.9.A set of rules or guidelines that govern interactions between two computer s
ystems in a computer network is called_____
*A. Network protocols
1.10.A packet of L bits is transmitted via the link with the transmission rate o
f R bits/sec; the transmission delay is
*C. L/R

2.1.Which one is correct about P2P network?


*C. A user computer can be both client and server
2.2.HTTP uses the services of _________ on well-known port 80.
*E. TCP
2.3._____ provides reliable, in-order transfer of bytes between client and serv
er
*E. TCP
2.4.A Web page (also called a document) consists of _______ such as a HTML file,
a JPEG image, a GIF image, a Java applet, an audio clip, etc.
*A. Objects
2.5.How long does it take to download an object from a Web Server to a client if
using non-persistent HTTP?
*A. The summation of Two Round Trip Times and the Transmission Time
2.6.Which one(s) is (are) correct about Decentralized DNS?
*E. All of the others
2.7.SMTP stands for
*A. Simple Mail Transfer Protocol
2.8.FTP uses ____ connection to the server with port numbers ____.
*E. TCP ¡. 20 and 21
2.9.IMAP and POP are_________
*A. Mail access protocols

2.10._________ is a supplementary protocol that allows non-ASCII data to be sent


through email.
*E. MIME
3.1.TCP provides __________between application processes running on different ho
sts
*A. Logical communications
3.2.What is WRONG about UDP?
*A. Use ACK to notify the sender that the packet has arrived the receive
r
3.3.In the transport layer, the job of gathering data at the source host from di
fferent application processes, enveloping the data with header information to cr
eate segments, and passing the segments to the network layer is called _______.
*C. Multiplexing
3.4.In the ________ algorithm of the TCP congestion control, the size of the con
gestion window increases exponentially until timeout
*A. Slow start
3.5.If the segment has sequence number of 128 and length of 8 bytes, the receivi
ng computer will send ACK with value of _________
*C. 136
3.6.Which one is correct about TCP and UDP?
*A. TCP is reliable transmission and it has congestion control and fl
ow control while UDP is not
3.7.What flag is used to close TCP connection?
*A. FIN
3.8.The difference between flow control and congestion control is primarily
*A. One is to avoid overflowing the receiver s buffer; one is to avoid con
gestion of the channel
3.9.TCP is a ___________ protocol.
*A. Connection-oriented
3.10.TCP assigns a sequence number to each segment that is being sent. The seque
nce number for each segment is the number of the _______ byte carried in that se
gment.
*A. First
4.1.What is the data unit used in Internet Protocol (IP)?
*A. Datagram
4.2.DHCP is used by the server to:
*A. Assign IP addresses to clients automatically
4.3.Assume that the IP address has only 8 bits; first 5 bits are used for networ
k and the remaining bits are used for host. How many subnets and hosts in each s
ubnets can be addressed?
*A. 32 subnets and 8 hosts
4.4.Why NAT (Network Address Translation) is used?
*A. All of them
4.5.In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000
-byte datagram is fragmented into _______ datagram(s)
*A. 2
4.6.Traceroute command uses
*A. ICMP
4.7.RIP (Routing Information Protocol) in the Internet uses
*A. Distance vector routing algorithm

4.8.Routers operate in the _______ layers.


*A. network
4.9.Dijkstra s algorithm is
*A. A link-state routing algorithm
4.10.Distance vector routing algorithm requires
*A. all nodes to know link costs to their neighbours
5.1.In CRC, if the generator is x^4+x+1, then which one is added in to the frame
before the dividing process to find the remainder
*D. 0000
5.2.______ is (are) (an) example(s) of random access MAC
*A. All of them
5.3.In cyclic redundancy checking, what is CRC
*B. the remainder
5.4.________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as
the MAC sub-layer protocol
*D. Wireless LAN
5.5.What is store-and-forward operation in switches?
*A. They receive the whole frame before forwarding to next station
5.6.______is used in Ethernet
*A. CSMA/CD
5.7.Which one is the flag used for framing in PPP?
*B. 01111110
5.8.Which one can be a MAC address?
*A. 00-D0-56-F2-B5-12
5.9.ARP stands for __________
*A. Address Resolution Protocol
5.10.Parity checking _____.
*A. can detect a single bit error in a transmission

Vous aimerez peut-être aussi