Friday, November 16, 2012

.::VULMSIT::.eNoxel.com CS610 Quiz No.1 Dated Nov 16


CS610 – Computer Network

Quiz No.1 Nov 16, 2012

 

------ Program sends a message to a remote computer and reports whether the computer
responds.
Ping
Ping
Traceroute
ICMP
Non of the given


---------- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given

The term -------- is used to denote the definition of a packet used with a specific type of
network.
Packet
Frame
Data
None of the given

Computer networks are often called -------------- because they use packet technology.
Ethernet
Switch networks
Packet networks
None of the given

-------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given

Most LANs that employ ring topology use an access mechanism known as-------
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given

IEEE LLC/SNAP header is --------, which is used to specify the type of data.
8 octets
8 bytes
8 bits
None of the given


Formally named __________ informally known as the twisted pair Ethernet or TP
Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given


An interface for twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T

A bridges function in the _________ layers(s).
Physical (MAC)
Data link
Network
Physical (MAC) and Data link

A Bridge can ________
Filter a frame
Forward a frame
Extend a LAN
Do all the above

A Bridge forwards or filters a frame by comparing the information in its address table to
the frame's__________
Layer 2 source address
Source node's physical address
Layer 2 destination address
Layer 3 destination address

________ computes shortest paths in a graph by using weights on edges as a measure of
distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta's algorithm
Non of the given


___________ is used for audio and video, since these have predefined maximum data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given

 

---------- is also called self healing network   ATM 
FDDI
Token Ring 
None of the given 
 
Most LANs that employ ring topology use an access mechanism known as-------  
Select correct option:  
 CSMA/CD 
 CSMA/CA 
 CSMA 
 TOKEN PASSING
 
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.  
Explicit frame type
Ideal frame type 
Implicit frame type 
None of the given 
 
Hardware that calculates a CRC uses two simple components.   
AND unit and XOR unit 
Shift register and XOR unit
Shift register & AND unit 
Shift register and shift XOR unit 
 
The Ethernet standard specifies that frames are sent using the --------  
Differential Manchester  
Not Return to Zero (NRZ) 
Manchester Encoding
Return to Zero (RZ) 
 
When an application ------------ data, it makes a copy of the data available to all other computers on the network.  
Select correct option:  
 Broadcasting
 Multicasting 
 Unicasting 
 None of the given 

LAN interface may use ---------- to copy frame data directly from main memory.    

DMA
FDDI 
CSMA/CD 
None of the given 
 

LAN and WAN are classified according to their.........  
Select correct option:  
Size
Connectivity 
Medium 
Mobility 

For how much time would other computers be in wait while one computer was transferring 56MB file with transmission speed of 56Kbps  
Select correct option:  
10 Sec
11 Sec 
12 Sec 
13 Sec 

A network uses _______ to arrange computers to be connected in a single closed loop.  
Select correct option:  
Star Topology 
Dual Ring Topology 
Ring Topology
Bus Topology

 

CBR stands for…………….

Constant Byte Rate

Constant Bit Rate

Connection break Recovery

None of the above

 

The routing table in interior and exterior switches has which one of the following?

It should have next hop for each possible destination

The next hop in table must be on shortest path to destination

Both (a) and (b)

None of the above

 

Which one of the following is a method for computing routing table information?

Manual entry

Static routing

Boot time routing

None of the above

 

Which one of the following is the responsibility of Djikstra' algorithm?

To compute the shortest path between two nodes

To extract next hop information from path information

To insert next hop information into routing table

All of the above

 

 

 

Routing table is used to keep the information about…………….

Destination

Medium of transmission

Routers used in network

All of the above

 

Frame relay is………………….

Connection oriented service

Connectionless service

It is typically ranges from 5Mbps to 1000Mbps.

None of the above

 

Which of the following is not a guided medium?

Twisted-pair

cable Fiber-optic

cable Atmosphere

Coaxial cable

Which of the following statement is wrong regarding PVC?

PVC last as long as the customer pay the periodic fee for its use.

Forwarding tables are automatically restored after pow er of equipment failure.

Forwarding table entries for PVC's are dynamically configured.

All of the above are wrong

 

Which of the following statement is true regarding ATM?

ATM is a single technology that is designed to meet the goals of both LANs and WANs.

ATM uses the concept of connection-oriented networking.

Both (a) and (b)

None of the above

 

Djikstra's algorithm is used to compute the……………….

shortest path between two nodes

number of nodes used in the network

distance between different nodes

none of the above

 

_________ is used to attach two autonomous systems.
Select correct option:

BGP
IGP
EGP

none of the given


 

 

 

 

Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps

none of the given

 

Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
False


TTL stands for __________
Select correct option:
Time to Learn
Time to Leave
Time to Live

none of the given

IGPs stand for _________
Select correct option:

Internal Gateway Protocols
Interior Gateway Protocols

Intermediate Gateway Protocols
None of the given

 

_____________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given

__________________encapsulates IP datagram as data area in hardware frame.
Select correct option:
Network Interface Layer

Datalink Layer
Network Layer
None of the given

 

 

Class A mask is 255.0.0.0 which is used for ________________
Select correct option:
Unicasting
Multicasting
Subnetting

All of the given
class A mask is 255.0.0.0 which is used for subnetting.

 

NAT is not useful at a residence with Cable Modem or DSL connectivity.
Select correct option:
True
False

 

Autonomous System chooses a routing protocol to exchange routing information which is passed before being summarized to another group.
Select correct option:
True
False

______ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport

Datalink
none of the given


The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given

The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five

 

End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given

EGP stands for _________
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit

 

Reliability is not the responsibility of the Transport layer.
Select correct option:
True
False

 

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given

NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False

 

TCP uses the term segment to refer to a ________.
Select correct option:

packet
message
both (a) and (b)
None of the given

both a and b?

 

The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False

 

______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given

 

IP datagram can contains ________ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given

 

The amount of buffer space available at any time is called the window.
Select correct option:
True
False 

 

_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6

 

Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given

 

 

 

_______ protocol uses three way handshake to begin a connection.
Select correct option:

UDP
TCP
IP
none of the given

 

Typical internet routing uses uses a combination of two metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count 

 

Question # 14 of 20 
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given 

 

The routers within an autonomous system use a _____________ to exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given

 

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False 

 

The Network Layer Protocol ICMP stands for____________
Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given 

 

The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given


TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False

 

 

 

In Direct point to point communication adding the Nth computer

requires___________ new connections.

N2

N-1

N2 –N)/2

None of the given

 

 

Most LANs that employ ring topology use an access mechanism known

as_______

ring topology use token passing for

synchronized access to the ring

 

Computers attached to an ether use ------ in which a computer waits for the

ether to be idle before transmitting a frame.

CSMA/CD

CSMA/CA

TOKEN PASSING

None of the given

 

FDDI can transmits data at a rate of ___________________

100 million bits per second

100 million bits per second

100 million bits per second

None of the given

________________ has advantages arisen from the size and ease of

computation.

CRC

Parity

Checksums

None of given

 

 

AUI cable connects from NIC to---------------

Select correct option:

BNC Connector

RJ-45 Connector

Transceiver

None of the above

 

As a result of ARPA research the first network was established which was named as Select correct option:

INTERNETWORKING

ARPNET

ARPANET

PACKET NETWORK

A ---------- provides mechanism that automatically assignes a physical address to a station when the station first boots. Select correct option:

Static ad Configurable

addressing scheme

 

polygons are basically concave polygons that may have self-intersecting edges.

Complex

Hybrid

Convex

Convex and Hybrid

Dynamic addressing scheme

 

An ___________method, the network hardware designers specify how type

information is included in the frame and the value use to identify various frame Local Talk is a LAN technology that employs

Explicit frame type
Ideal frame type 
Implicit frame type 
None of the given
 


In Point-to-Point topology there are two topologies.

Tree and Ring

Star and Ring

Star and Tree

None of the given

 

The topology each computer is connected to a central hub is called

Select correct option:

Ring topology

Star topology

Tree topology

Mesh topology

The basic responsibility of NIC is ---------------- Select correct option:

To access medium

Network To resource allocation

To access memory

All of above


Currently the original Ethernet hardware operates at a rate of --------

Select correct option:

10 Mbps

100 Mbps

1000 Mbps

3 Mbps

The Gigabit Ethernet hardware operates at a rate of_________

10 Mbps

100 Mbps

1000 Mbps

 

The number of connections needed for N computer in direct point to point

communication is equal to:

(N2-N)/2

N (N-1)

N2

None of the given

 

The length of the format of hardware address is

Select correct option:

One to ten bytes

One to five bytes

One to six bytes

None of the given


Star topolgy is the kind of

Tree topology

Point-to-point topolgy

Broadcast topolgy

Ring topology

Local Talk is a LAN technology that employs________

Bus topology

Ring topology

Star topology

None of the given

The network occupies larger areas like cities & countries is called

Select correct option:

LAN

WAN

MAN

All of the above

 

Computer networks are classified by.......factors

2

3

4

 5

Computers attached to an ethernet use ________in which a computer waits for

the other to be idle before transmitting a frame.

CSMA/CD

CSMA/CA

TOKEN PASSING

none of the given

 

Point-to-point topology is

Size Based

Mobility Based

Connectivity Based

Medium Based

 

NIC connection in a physical network is known as--------------------

Select correct option:

LAN wiring scheme

WAN wiring scheme

Color wiring

None of above

 

A_______ relies on the hardware manufacturer to assign a unique physical

address to each network interface.

Static addressing scheme

Dynamic addressing scheme

Configurable addressing scheme

None of the given



The main functions of NIC are ---------------------

CRC Error

correction Address

recognition

All of above


FDDI can transmits data at a rate of ___________________

100 million bits per second

100 million bits per second

100 million bits per second

None of the given

 

Wireless LAN use the -------- as a media access method

Select correct option:

CSMA/CD

CSMA/CA

TOKEN PASSING

CSMA

 

A_______ relies on the hardware manufacturer to assign a unique physical

address to each network interface.

Static addressing scheme

Dynamic addressing scheme

Configurable addressing scheme

None of the given

Wireless LAN use the -------- as a media access method

Select correct option:

CSMA/CD

CSMA/CA

TOKEN PASSING

CSMA

 

According to their size there are............classifications of networks.

 Select correct option:

2

3

 4

 5

As a result of ARPA research the first network was established which was named as Select correct option:

INTERNETWORKING

ARPNET

ARPANET

PACKET NETWOR

---------- performs the matching between destination address and MAC address of machine.

Select correct option:

Hardware address

LAN interface

DMA

None of above

 

An ___________method, the network hardware designers specify how type

information is included in the frame and the value use to identify various frame

types.

Explicit frame type

Ideal frame type

Implicit frame type

None of the given

 


The demand of sharing is very high because many computers need to use the shared networks.

Select correct option:

 WAN networks

 Shared networks

 Unshared networks

 LAN networks

 

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.

DMA(Direct Memory Access)

Multiplexer

Transceiver

None of the given

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:

broadcast network



Thick Ethernet is known as------------------ Select correct option:

10 base 5

10 base T

10 base 100

10 base 1

 

 

 

The first automated tool required to see whether the given computer is online or not was

Select correct option:

Probing program

PING program

status program

None of the above

 

The basic responsibility of NIC is ----------------

Select correct option:

To access medium/network

To resource allocation

To access memory

All of above

 

 

No error detection scheme is perfect because transmission errors can affect _________.

Select correct option:

Data

Additional Information

Additional information & data

Transmission medium

 

-------------- has advantages arisen from the size and ease of computation.

Select correct option:

CRC

Parity

Checksum

Byte Stuffing

 

The third field of the header consists of ------ bit Ethernet frame type.

Select correct option:

48

32

16

8

The Ethernet standard specifies that frames are sent using the --------

Select correct option:

Differential Manchester

Not Return to Zero (NRZ)

Manchester Encoding

Return to Zero (RZ)

LAN that use ATM technology have a ------------

Select correct option:

Bus topology

Star topology

Ring topology

Mesh Topology

 

Hardware that calculates a CRC uses two simple components.

Select correct option:

AND unit and XOR unit

Shift register and XOR unit

Shift register & AND unit

Shift register and shift XOR unit

 

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.

Select correct option:

DMA (Direct Memory Access)

Multiplexer

Transceiver

None of the given

 

Fixed network is a type of networks which is classified with respect to the...........factor

Select correct option:

Size

Connectivity

Medium

Mobility

 

Network interface card acts like a (an) -----------

Select correct option:

Input/output device

Input device

Output device

All of above

 

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

Select correct option:

8 octets

8 bytes

8 bits

None of the above

 

Most LANs that employ ring topology use an access mechanism known as-------

Select correct option:

CSMA/CD

CSMA/CA

CSMA

TOKEN PASSING

 

The Gigabit Ethernet hardware operates at a rate of ________

10 Mbps

100 Mbps

1000 Mbps

None of the given

 

A network uses ------------ if all computers attach to a central point

Select correct option:

Ring Topology

Star Topology

Hub Topology

Bus Topology

 

---------- is also called self healing network

Select correct option:

ATM

FDDI

Token Ring

None of the given

 

---------- which is designed to help detect transmissions errors, send one extra bit of information with each character.

Select correct option:

Checksum

CRC

Parity

VRC

 

Hardware addresses must be ---------- on a LAN.

Select correct option:

Common

Unique

A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.

Select correct option:

Static addressing scheme

Configurable addressing scheme

Dynamic addressing scheme

None of the given

 

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of

Select correct option:

Broadcast network

Point-to-Point network

--
--
Virtual University of Pakistan*** IT n CS Blog
================================
http://www.eNoxel.com
http://www.enoxelit.tk
http://www.geniusweb.tk
 
and Please do Share this group with your Friends and Class Fellows so that our Circle would expand and can be more useful for other Students.
 
Thanks, n Best of Luck......
 
 
You received this message because you are subscribed to the Google
Groups "vulms" group.
To post to this group, send email to vulmsit@googlegroups.com
To unsubscribe from this group, send email to
vulmsit+unsubscribe@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/vulmsit?hl=en?hl=en
---
You received this message because you are subscribed to the Google Groups "vulms" group.
Visit this group at http://groups.google.com/group/vulmsit?hl=en-GB.
 
 

No comments:

Post a Comment