4. Communication between a computer and a 8. Which of this is not a network edge device?
keyboard involves ______________ a) PC
transmission b) Smartphones
a) Automatic c) Servers
b) Half-duplex d) Switch
c) Full-duplex View Answer
d) Simplex
View Answer
Answer: d
Explanation: Network egde devices refer to host
1
systems, which can host applications like web 2. Two devices are in network if
browser. a) a process in one device is able to exchange
information with a process in another device
9. A set of rules that governs data b) a process is running on both devices
communication c) PIDs of the processes running of different
a) Protocols devices are same
b) Standards d) none of the mentioned
c) RFCs View Answer
d) None of the mentioned
View Answer Answer: a
Explanation: A computer network, or data
Answer: a network, is a digital telecommunications
Explanation: In communications, a protocol network which allows nodes to share resources.
refers to a set of rules and regulations that allow In computer networks, computing devices
a network of nodes to transmit and receive exchange data with each other using connections
information. between nodes.
10. Three or more devices share a link in 3. Which one of the following computer network
________ connection is built on the top of another network?
a) Unipoint a) prior network
b) Multipoint b) chief network
c) Point to point c) prime network
d) None of the mentioned d) overlay network
View Answer View Answer
Answer: b Answer: d
Explanation: A multipoint communication is Explanation: An overlay network is a computer
established when three or many network nodes network that is built on top of another network.
are connected to each other.
4. In computer network nodes are
1. When collection of various computers seems a) the computer that originates the data
a single coherent system to its client, then it is b) the computer that routes the data
called c) the computer that terminates the data
a) computer network d) all of the mentioned
b) distributed system View Answer
c) networking system
d) none of the mentioned Answer: d
View Answer Explanation: In a computer network, a node can
be anything that is capable of sending data or
Answer: b receiving data or even routing the data to the
Explanation: Computer networks is defined as a destination.
collection of interconnected computers which
uses a single technology for connection. 5. Communication channel is shared by all the
A distributed system is also the same as machines on the network in
computer network but the main difference is that a) broadcast network
the whole collection of computers appears to its b) unicast network
users as a single coherent system c) multicast network
Example :- World wide web d) none of the mentioned
View Answer
2
Answer: a 9. Network congestion occurs
Explanation: In a broadcast network, an a) in case of traffic overloading
information is sent to all station in a network b) when a system terminates
whereas in a multicast network the data or c) when connection between two nodes
information is sent to a group of stations in the terminates
network. In unicast network, information is sent d) none of the mentioned
to only one specific station. View Answer
3
Answer: c Answer: d
Explanation: The same company which provides Explanation: In cable access analog signal is
phone connection is also its ISP in DSL. converted to digital signal by CMTS.
6. Choose the statement which is not applicable 10. ONT is connected to splitter using
for cable internet access a) High speed fibre cable
a) It is a shared broadcast medium b) HFC
b) It includes HFCs c) Optical cable
c) Cable modem connects home PC to Ethernet d) None of the mentioned
port View Answer
d) Analog signal is converted to digital signal in
DSLAM Answer: c
View Answer Explanation: ONT stands for Optical Network
Terminal. The ONT connects to the Termination
Point (TP) with an optical fibre cable.
4
advertisement 4. Application layer is implemented in
a) End system
11. These factors affect transmission rate in DSL b) NIC
a) The gauge of the twisted-pair line c) Ethernet
b) Degree of electrical interfernece d) None of the mentioned
c) Shadow fading View Answer
d) Both The gauge of the twisted-pair line and
Degree of electrical interfernece Answer: a
View Answer Explanation: None.
5
Answer: d Answer: a
Explanation: None. Explanation: OSI is the abbreviation for Open
System Interconnection. OSI model provides a
9. In TCP IP Model, when data is sent from structured plan on how applications
device A to device B, the 5th layer to receive communicate over a network, which also helps
data at B is us to have a structured plan for troubleshooting.
a) Application layer
b) Transport layer 2. The OSI model has _______ layers.
c) Link layer a) 4
d) Session layer b) 5
View Answer c) 6
d) 7
Answer: a View Answer
Explanation: None.
Answer: d
10. In the OSI model, as a data packet moves Explanation: In OSI reference model, there are 7
from the lower to the upper layers, headers are layers namely Application, Presentation,
_______ Session, Transport, Network, Data Link and
a) Added Physical layer.
b) Removed
c) Rearranged 3. TCP/IP model does not have ______ layer but
d) None of the mentioned OSI model have this layer.
View Answer a) session layer
b) transport layer
Answer: b c) application layer
Explanation: None. d) None of the mentioned
advertisement View Answer
6
b) port address b) session layer
c) specific address c) presentation layer
d) all of the mentioned d) none of the mentioned
View Answer View Answer
Answer: d Answer: a
Explanation: All of the mentioned above Explanation: In networking, a user mainly
addresses are used in TCP/IP protocol. All the interacts with application layer to create and
addressing scheme, that is physical (MAC) and send information to other computer or network.
logical address, port address and specific address
are employed in both TCP/IP model and OSI 10. Transmission data rate is decided by
model. a) network layer
b) physical layer
6. TCP/IP model was developed _____ the OSI c) data link layer
model. d) transport layer
a) prior to View Answer
b) after
c) simultaneous to Answer: b
d) none of the mentioned Explanation: Physical layer is a layer 1 device
View Answer which deals with network cables or the standards
in use like connectors, pins, electric current used
Answer: a etc. Basically the transmission speed is
Explanation: Several TCP/IP prototypes were determined by the cables and connectors used.
developed at multiple research centers between Hence it is physical layer that determines the
1978 and 1983, whereas OSI reference model transmission speed in network.
was developed in the year 1984.
1. The physical layer concerns with
7. Which layer is responsible for process to a) bit-by-bit delivery
process delivery? p) process to process delivery
a) network layer c) application to application delivery
b) transport layer d) none of the mentioned
c) session layer View Answer
d) data link layer
View Answer Answer: a
Explanation: Physical layer deals with bit to bit
8. Which address identifies a process on a host? delivery in networking. The data unit in the
a) physical address physical layer is bits. Process to process delivery
b) logical address is dealy in the transport layer.
c) port address
d) specific address 2. Which transmission media has the highest
View Answer transmission speed in a network?
a) coaxial cable
Answer: c b) twisted pair cable
Explanation: A port number is a way to identify c) optical fiber
a specific process to which an Internet or other d) electrical cable
network message is to be forwarded when it View Answer
arrives at a server.
Answer: c
9. Which layer provides the services to user? Explanation: Fibre optics is considered to have
a) application layer the highest transmission speed among the all
7
mentioned above. The fibre optics transmission 6. In asynchronous serial communication the
runs at 1000Mb/s. It is called as 1000Base-Lx physical layer provides
whereas IEEE stndard for it is 802.3z. a) start and stop signalling
b) flow control
3. Bits can be send over guided and unguided c) both start & stop signalling and flow control
media as analog signal by d) none of the mentioned
a) digital modulation View Answer
b) amplitude modulation
c) frequency modulation Answer: c
d) phase modulation Explanation: In asynchronous serial
View Answer communication, the communication is not
synchronized by clock signal. Instead of a start
Answer: a and stop signaling and flow control method is
Explanation: In analog modulation, digital low followed.
frequency baseband signal (digital bitstream) are
transmitted over a higher frequency. Whereas in 7. The physical layer is responsible for
digital modulation the only difference is that the a) line coding
base band signal is of discrete amplitude level. b) channel coding
c) modulation
4. The portion of physical layer that interfaces d) all of the mentioned
with the media access control sublayer is called View Answer
a) physical signalling sublayer
b) physical data sublayer Answer: d
c) physical address sublayer Explanation: The physical layer is responsible
d) none of the mentioned for line coding, channel coding and modulation
View Answer that is needed for the transmission of the
information.
Answer: a
Explanation: The portion of physcial layer that 8. The physical layer translates logical
interfaces with the medium access control communication requests from the ______ into
sublayer is Physical Signaling Sublayer. The hardware specific operations.
main function of this layer is character encoding, a) data link layer
reception, decoding and performs optional b) network layer
isolation functions. c) trasnport layer
d) application layer
5. physical layer provides View Answer
a) mechanical specifications of electrical
connectors and cables Answer: a
b) electrical specification of transmission line Explanation: Physical layer accepts data or
signal level information from the data link layer and
c) specification for IR over optical fiber converts it into hardware specific operations so
d) all of the mentioned as to transfer the message through physical
View Answer cables.
8
d) none of the mentioned 3. Which sublayer of the data link layer
View Answer performs data link functions that depend upon
the type of medium?
Answer: c a) logical link control sublayer
Explanation: In communication and computer b) media access control sublayer
networks, the main goal is to share a scarce c) network interface control sublayer
resource. This is done by multiplexing, where d) none of the mentioned
multiple analog or digital signals are combined View Answer
into one signal over a shared medium.
Answer: b
10. Wireless transmission can be done via Explanation: None.
a) radio waves
b) microwaves 4. Header of a frame generally contains
c) infrared a) synchronization bytes
d) all of the mentioned b) addresses
View Answer c) frame identifier
d) all of the mentioned
Answer: d View Answer
Explanation: Wireless transmission is carried out
by radio waves, microwaves and IR waves. Answer: d
These waves range from 3 Khz to above 300 Explanation: None.
Ghz and are more suitable for wireless
transmission because they allow a wider band 5. Automatic repeat request error management
for modulating signals, so you can obtain higher mechanism is provided by
frequency transmission. a) logical link control sublayer
b) media access control sublayer
1. The data link layer takes the packets from c) network interface control sublayer
_________ and encapsulates them into frames d) none of the mentioned
for transmission. View Answer
a) network layer
b) physical layer Answer: a
c) transport layer Explanation: None.
d) application layer
View Answer 6. When 2 or more bits in a data unit has been
changed during the transmission, the error is
Answer: a called
Explanation: None. a) random error
b) burst error
2. Which one of the following task is not done c) inverted error
by data link layer? d) none of the mentioned
a) framing View Answer
b) error control
c) flow control Answer: b
d) channel coding Explanation: None.
View Answer
7. CRC stands for
Answer: d a) cyclic redundancy check
Explanation: None. b) code repeat check
c) code redundancy check
9
d) cyclic repeat check from the application layer is sent to the transport
View Answer layer and is converted to segments. These
segments are then transferred to the network
Answer: a layer and these are called packets. These packets
Explanation: None. are then sent to data link layer where they are
encapsulated into frames. These frames are then
8. Which one of the following is a data link transferred to physical layer where the frames
protocol? are converted to bits.
a) ethernet
b) point to point protocol 2. Which one of the following is not a function
c) hdlc of network layer?
d) all of the mentioned a) routing
View Answer b) inter-networking
c) congestion control
Answer: d d) none of the mentioned
Explanation: None. View Answer
10
5. Which one of the following routing algorithm Answer: d
can be used for network layer design? Explanation: None.
a) shortest path algorithm
b) distance vector routing 9. The network layer protocol of internet is
c) link state routing a) ethernet
d) all of the mentioned b) internet protocol
View Answer c) hypertext transfer protocol
d) none of the mentioned
Answer: d View Answer
Explanation: The routing algorithm is what
decides where a packet should go next. There Answer: b
are several routing techniques like shortest path Explanation: There are several protocols used in
algorithm, static and dynamic routing, Network layer. Some of them are IP, ICMP,
decentralized routing, distance vector routing, CLNP, ARP, IPX, HRSP etc. Hypertext transfer
link state routing, Hierarchical routing etc. protocol is for application layer and ethernet
protocol is for data link layer.
6. Multidestination routing
a) is same as broadcast routing 10. ICMP is primarily used for
b) contains the list of all destinations a) error and diagnostic functions
c) data is not sent by packets b) addressing
d) none of the mentioned c) forwarding
View Answer d) none of the mentioned
View Answer
Answer: c
Explanation: None. Answer: a
Explanation: ICMP abbreviation for Internet
7. A subset of a network that includes all the Control Message Protocol is used by networking
routers but contains no loops is called devices to send error messages and operational
a) spanning tree information indicating a host or router cannot be
b) spider structure reached.
c) spider tree
d) none of the mentioned 1. Transport layer aggregates data from different
View Answer applications into a single stream before passing
it to
Answer: a a) network layer
Explanation: Spanning tree protocol (STP) is a b) data link layer
network protocol that creates a loop free logical c) application layer
topology for ethernet networks. It is a layer 2 d) physical layer
protocol that runs on bridges and switches. The View Answer
main purpose of STP is to ensure that you do not
create loops when you have redundant paths in Answer: a
your network. Explanation: The flow of data in the OSI model
flows in following manner Application ->
8. Which one of the following algorithm is not Presentation -> Session -> Transport -> Network
used for congestion control? -> Data Link -> Physical.
a) traffic aware routing
b) admission control 2. Which one of the following is a transport
c) load shedding layer protocol used in networking?
d) none of the mentioned a) TCP
View Answer b) UDP
11
c) Both TCP and UDP d) none of the mentioned
d) None of the mentioned View Answer
View Answer
Answer: a
Answer: c Explanation: Socket is one end point in a two
Explanation: Both TCP and UDP are transport way communication link in the network. TCP
layer protocol in networking. TCP is an layer can identify the application that data is
abbreviation for Transmission Control Protocol destined to be sent by using the port number that
and UDP is an abbreviation for User Datagram is bound to socket.
Protocol. TCP is connection oriented whereas
UDP is connectionless. 6. Socket-style API for windows is called
a) wsock
3. User datagram protocol is called b) winsock
connectionless because c) wins
a) all UDP packets are treated independently by d) none of the mentioned
transport layer View Answer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order Answer: b
d) none of the mentioned Explanation: Winsock is a programming
View Answer interface which deals with input output requests
for internet applications in windows OS. It
Answer: a defines how windows network software should
Explanation: UDP is an alternative for TCP and access network services.
it is used for those purposes where speed matters
most whereas loss of data is not a problem. UDP 7. Which one of the following is a version of
is connectionless whereas TCP is connection UDP with congestion control?
oriented. a) datagram congestion control protocol
b) stream control transmission protocol
4. Transmission control protocol is c) structured stream transport
a) connection oriented protocol d) none of the mentioned
b) uses a three way handshake to establish a View Answer
connection
c) recievs data from application as a single Answer: a
stream Explanation: The datagram congestion control is
d) all of the mentioned a transport layer protocol which deals with
View Answer reliable connection setup, teardown, congestion
control, explicit congestion notification, feature
Answer: d negotiation.
Explanation: Major internet applications like
www, email, file transfer etc rely on tcp. TCP is 8. A _____ is a TCP name for a transport service
connection oriented and it is optimized for access point.
accurate delivery rather than timely delivery. a) port
It can incur long delays. b) pipe
c) node
5. An endpoint of an inter-process d) none of the mentioned
communication flow across a computer network View Answer
is called
a) socket Answer: a
b) pipe Explanation: Just as the IP address identifies the
c) port computer, the network port identifies the
12
application or service running on the computer. Answer: a
A port number is 16 bits. Explanation: None.
9. Transport layer protocols deals with 3. This topology requires multipoint connection
a) application to application communication a) Star
b) process to process communication b) Mesh
c) node to node communication c) Ring
d) none of the mentioned d) Bus
View Answer View Answer
Answer: b Answer: d
Explanation: Transport layer is 4th layer in Explanation: None.
TCP/IP model and OSI reference model. It deals
with logical communication between process. It 4. Data communication system spanning states,
is responsible for delivering a message between countries, or the whole world is
network host. a) LAN
b) WAN
10. Which one of the following is a transport c) MAN
layer protocol? d) None of the mentioned
a) stream control transmission protocol View Answer
b) internet control message protocol
c) neighbor discovery protocol Answer: b
d) dynamic host configuration protocol Explanation: Wide area network(WAN) covers
View Answer the whole of the world network.
13
d) None of the mentioned Answer: b
View Answer Explanation: FDM and WDM are used in analog
signals.
Answer: b
Explanation: None. 4. If there are n signal sources of same data rate
advertisement than TDM link has _______ slots
a) n
8. Multiplexing technique that shifts each signal b) n/2
to a different carrier frequency c) n*2
a) FDM d) 2n
b) TDM View Answer
c) Both FDM & TDM
d) None of the mentioned Answer: a
View Answer Explanation: Each slot is dedicated to one of the
source.
Answer: a
Explanation: FDM stands for Frequency 5. If link transmits 4000frames per second, and
division multiplexing. each slot has 8 bits,the transmission rate of
circuit this TDM is
1. The sharing of a medium and its link by two a) 32kbps
or more devices is called _________ b) 500bps
a) Fully duplexing c) 500kbps
b) Multiplexing d) None of the mentioned
c) Both Fully duplexing and Multiplexing View Answer
d) None of the mentioned
View Answer Answer: a
Explanation: Transmission rate= frame rate *
Answer: b number os bits in a slot.
Explanation: None.
6. The state when dedicated signals are idle are
2. Multiplexing is used in _______ called
a) Packet switching a) Death period
b) Circuit switching b) Poison period
c) Data switching c) Silent period
d) None of the mentioned d) None of the mentioned
View Answer View Answer
Answer: b Answer: c
Explanation: None. Explanation: None.
14
8. In TDM, the transmission rate of the a) Processing delay
multiplexed path is usually _______ the sum of b) Queuing delay
the transmission rates of the signal sources. c) Transmission delay
a) Greater than d) All of the mentioned
b) Lesser than View Answer
c) Equal to
d) Equal to or greater than Answer: a
View Answer Explanation: None.
Answer: d Answer: b
Explanation: None. Explanation: The throughput is generally the
transmission rate of bottleneck link.
2. For a 10Mbps Ethernet link, if the length of
the packet is 32bits, the transmission delay is(in 6. If end to end delay is given by dend-end =
milliseconds) N(dproc + dtrans + dprop) is a non congested
a) 3.2 network. The number of routers between source
b) 32 and destination is
c) 0.32 a) N/2
d) None of the mentioned b) N
View Answer c) N-1
d) 2N
Answer: a View Answer
Explanation: Transmission rate = length /
transmission rate = 32/10 = 3.2milli seconds. Answer: c
Explanation: None.
3. The time required to examine the packet’s
header and determine where to direct the packet 7. The total nodal delay is given by
is part of a) dnodal = dproc – dqueue + dtrans + dprop
15
b) dnodal = dproc + dtrans – dqueue d) D-net
c) dnodal = dproc + dqueue + dtrans + dprop View Answer
d) dnodal = dproc + dqueue – dtrans – dprop
View Answer Answer: b
Explanation: None.
Answer: c
Explanation: None. 2. Which of the following is a form of DoS
attack ?
8. In a network, If P is the only packet being a) Vulnerability attack
transmitted and there was no earlier b) Bandwidth flooding
transmission, which of the following delays c) Connection flooding
could be zero d) All of the mentioned
a) Propogation delay View Answer
b) Queuing delay
c) Transmission delay Answer: d
d) Processing delay Explanation: None.
View Answer
3. The DoS attack is which the attacker
Answer: b establishes a large number of half-open or fully
Explanation: None. open TCP connections at the target host
a) Vulnerability attack
9. Transmission delay does not depend on b) Bandwidth flooding
a) Packet length c) Connection flooding
b) Distance between the routers d) All of the mentioned
c) Transmission rate View Answer
d) None of the mentioned
View Answer Answer: c
Explanation: None.
Answer: b
Explanation: Transmission delay = packet length 4. The DoS attack is which the attacker sends
/ transmission rate deluge of packets to the targeted host
a) Vulnerability attack
10. Propagation delay depends on b) Bandwidth flooding
a) Packet length c) Connection flooding
b) Transmission rate d) All of the mentioned
c) Distance between the routers View Answer
d) None of the mentioned
View Answer Answer: b
Explanation: None.
Answer: c
Explanation: Propagation delay is the time it 5. Packet sniffers involve
takes a bit to propagate from one router to the a) Active receiver
next. b) Passive receiver
c) Both Active receiver and Passive receiver
1. The attackers a network of compromised d) None of the mentioned
devices known as View Answer
a) Internet
b) Botnet Answer: b
c) Telnet Explanation: They donot inject packets into the
channel.
16
6. Sniffers can be deployed in Answer: a
a) Wired environment Explanation: Unshielded twisted pair(UTP) is
b) WiFi commonly used in home access.
c) Ethernet LAN
d) All of the mentioned 3. Coaxial cable consists of _______ concentric
View Answer copper conductors.
a) 1
Answer: d b) 2
Explanation: None. c) 3
d) 4
7. Firewalls are often configured to block View Answer
a) UDP traffic
b) TCP traffic Answer: b
c) Both of the mentioned Explanation: None.
d) None of the mentioned
View Answer 4. Fiber optics posses following properties
a) Immune electromagnetic interference
Answer: a b) Very less signal attenuation
Explanation: None. c) Very hard to tap
advertisement d) All of the mentioned
View Answer
8. In a network, If P is the only packet being
transmitted and there was no earlier Answer: d
transmission, which of the following delays Explanation: None.
could be zero
a) Propogation delay 5. If an Optical Carrier is represented as OC-n,
b) Queuing delay generally the link speed equals(in Mbps),
c) Transmission delay a) n*39.8
d) Processing delay b) n*51.8
View Answer c) 2n*51.8
d) None of the mentioned
Answer: b View Answer
Explanation: None.
Answer: b
1. Which of this is not a guided media ? Explanation: None.
a) Fiber optical cable
b) Coaxial cable 6. Terrestrial radio channels are broadly
c) Wireless LAN classifed into _____ groups.
d) Copper wire a) 2
View Answer b) 3
c) 4
Answer: c d) 1
Explanation: Wireless LAN is unguided media. View Answer
17
7. Radio channels are attractive medium because b) (N*L)/R
a) Can penetrate walls c) (2N*L)/R
b) Connectivity can be given to mobile user d) L/R
c) Can carry signals for long distance View Answer
d) All of the mentioned
View Answer Answer: b
Explanation: None.
Answer: d
Explanation: None. 4. Method(s) to move data through a network of
advertisement links and switches
a) Packet switching
8. Geostationary satellites b) Circuit switching
a) Are placed at a fixed point above the earth c) Line switching
b) Rotate the earth about a fixed axis d) Both Packet switching and Circuit switching
c) Rotate the earth about a varying axis View Answer
d) All of the mentioned
View Answer Answer: d
Explanation: None.
Answer: a
Explanation: They are placed in orbit at 5. The resources needed for communication
36,000km above Earth’s surface. between end systems are reserved for the
duration of session between end systems in
1. A local telephone network is an example of a ________
_______ network a) Packet switching
a) Packet switched b) Circuit switching
b) Circuit switched c) Line switching
c) Both Packet switched and Circuit switched d) Frequency switching
d) None of the mentioned View Answer
View Answer
Answer: b
Answer: a Explanation: None.
Explanation: None.
6. As the resouces are reserved between two
2. Most packet switches use this principle communicating end systems in circuit switching,
a) Stop and wait this is achieved
b) Store and forward a) authentication
c) Both Stop and wait and Store and forward b) guaranteed constant rate
d) None of the mentioned c) reliability
View Answer d) store and forward
View Answer
Answer: b
Explanation: The packet switch will not transmit Answer: b
the first bit to outbound link until it recieves the Explanation: None.
entire packet.
7. In _________ resources are allocated on
3. If there are N routers from source to demand.
destination, total end to end delay in sending a) packet switching
packet P(L->number of bits in the packet R-> b) circuit switching
transmission rate) c) line switching
a) N
18
d) frequency switching 4. Application developer has permission to
View Answer decide the following on transport layer side
a) Transport layer protocol
Answer: a b) Maximum buffer size
Explanation: In packet switching there is no c) Both Transport layer protocol and Maximum
reservation. buffer size
advertisement d) None of the mentioned
View Answer
8. Which of the following is an application layer
service ? Answer: c
a) Network virtual terminal Explanation: None.
b) File transfer, access, and management
c) Mail service 5. Application layer offers _______ service
d) All of the mentioned a) End to end
View Answer b) Process to process
c) Both End to end and Process to process
Answer: d d) None of the mentioned
Explanation: None. View Answer
19
d) All of the mentioned Answer: c
View Answer Explanation: None.
20
b) dynamic host configuration protocol d) None of the mentioned
c) resource reservation protocol View Answer
d) session initiation protocol
View Answer Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
Answer: c
Explanation: None. 2. The default connection type used by HTTP is
_________
8. Which protocol is a signalling communication a) Persistent
protocol used for controlling multimedia b) Non-persistent
communication sessions? c) Can be either persistent or non-persistent
a) session initiation protocol depending on connection request
b) session modelling protocol d) None of the mentioned
c) session maintenance protocol View Answer
d) none of the mentioned
View Answer Answer: a
Explanation: None.
Answer: a
Explanation: None. 3. The time taken by a packet to travel from
client to server and then back to the client is
9. Which one of the following is not correct? called __________
a) application layer protocols are used by both a) STT
source and destination devices during a b) RTT
communication session c) PTT
b) HTTP is a session layer protocol d) None of the mentioned
c) TCP is an application layer protocol View Answer
d) All of the mentioned
View Answer Answer: b
Explanation: RTT stands for round-trip time.
Answer: d
Explanation: None. 4. The HTTP request message is sent in
_________ part of three-way handshake.
10. When displaying a web page, the application a) First
layer uses the b) Second
a) HTTP protocol c) Third
b) FTP protocol d) None of the mentioned
c) SMTP protocol View Answer
d) None of the mentioned
View Answer Answer: c
Explanation: None.
Answer: a
Explanation: None. 5. In the process of fetching a web page from a
server the HTTP request/response takes
1. The number of objects in a Web page which __________ RTTs.
consists of 4 jpeg images and HTML text is a) 2
________ b) 1
a) 4 c) 4
b) 1 d) 3
c) 5 View Answer
21
Answer: b 10. Find the oddly matched HTTP status codes
Explanation: None. a) 200 OK
b) 400 Bad Request
6. The first line of HTTP request message is c) 301 Moved permanently
called _____________ d) 304 Not Found
a) Request line View Answer
b) Header line
c) Status line Answer: d
d) Entity line Explanation: 404 Not Found.
View Answer
1. Multiple object can be sent over a TCP
Answer: a connection between client and server in
Explanation: The line followed by request line a) persistent HTTP
are called header lines and status line is the b) nonpersistent HTTP
initial part of response message. c) both persistent HTTP and nonpersistent
HTTP
7. The values GET, POST, HEAD etc are d) none of the mentioned
specified in ____________ of HTTP message View Answer
a) Request line
b) Header line Answer: a
c) Status line Explanation: None.
d) Entity body
View Answer 2. HTTP is ________ protocol.
a) application layer
Answer: a b) transport layer
Explanation: It is specified in the method field c) network layer
of request line in the HTTP request message. d) none of the mentioned
View Answer
8. The __________ method when used in the
method field, leaves entity body empty. Answer: a
a) POST Explanation: None.
b) SEND
c) GET 3. In the network HTTP resources are located by
d) None of the mentioned a) uniform resource identifier
View Answer b) unique resource locator
c) unique resource identifier
Answer: c d) none of the mentioned
Explanation: None. View Answer
22
Answer: b 9. The file transfer protocol is built on
Explanation: None. a) data centric architecture
b) service oriented architecture
5. In HTTP pipelining c) client server architecture
a) multiple HTTP requests are sent on a single d) none of the mentioned
TCP connection without waiting for the View Answer
corresponding responses
b) multiple HTTP requests can not be sent on a Answer: c
single TCP connection Explanation: None.
c) multiple HTTP requests are sent in a queue on
a single TCP connection 10. In file transfer protocol, data transfer can be
d) none of the mentioned done in
View Answer a) stream mode
b) block mode
Answer: a c) compressed mode
Explanation: None. d) all of the mentioned
View Answer
6. FTP server listens for connection on port
number Answer: d
a) 20 Explanation: None.
b) 21
c) 22 1. Expansion of FTP is
d) 23 a) Fine Transfer Protocol
View Answer b) File Transfer Protocol
c) First Transfer Protocol
Answer: b d) None of the mentioned
Explanation: None. View Answer
23
Answer: b Answer: b
Explanation: Control connection and data Explanation: None.
connection.
8. Find the FTP reply whose message is wrongly
4. Identify the incorrect statement matched
a) FTP stands for File Transfer Protocol a) 331 – Username OK, password required
b) FTP uses two parallel TCP connections b) 425 – Can’t open data connection
c) FTP sends its control information in-band c) 452 – Error writing file
d) FTP sends exactly one file over the data d) 452 – Can’t open data connection
connection View Answer
View Answer
Answer: d
Answer: c Explanation: None.
Explanation: FTP is out-of-band as it has
separate control connection. 9. Mode of data transfer in FTP, where all the is
left to TCP
5. If 5 files are transfered from server A to client a) Stream mode
B in the same session. The number of TCP b) Block mode
connection between A and B is c) Compressed mode
a) 5 d) None of the mentioned
b) 10 View Answer
c) 2
d) 6 Answer: a
View Answer Explanation: None.
24
b) Signal Answer: b
c) ASCII Explanation: The sending mail server pushes the
d) None of the mentioned mail to receiving mail server hence it is push
View Answer protocol.
25
a) One MTA Answer:d
b) Two UAs Explanation:None.
c) Two UAs and one pair of MTAs
d) Two UAs and two pairs of MTAs 4. Which one of the following protocol is used
View Answer to receive mail messages?
a) smtp
Answer: d b) post office protocol
Explanation: None. c) internet message access protocol
d) all of the mentioned
12. User agent does not support this View Answer
a) Composing messages
b) Reading messages Answer:d
c) Replying messages Explanation:None.
d) All of the mentioned
View Answer 5. What is on-demand mail relay (ODMR)?
a) protocol for SMTP security
Answer: d b) an SMTP extension
Explanation: None. c) protocol for web pages
d) none of the mentioned
1. Simple mail transfer protocol (SMTP) utilizes View Answer
_________ as the transport layer protocol for
electronic mail transfer. Answer:b
a) TCP Explanation:None.
b) UDP
c) DCCP 6. An email client needs to know the _________
d) SCTP of its initial SMTP server.
View Answer a) IP address
b) MAC address
Answer:a c) Url
Explanation:None. d) None of the mentioned
View Answer
2. SMTP connections secured by SSL are known
as Answer:a
a) SMTPS Explanation:None.
b) SSMTP
c) SNMP 7. A SMTP session may include
d) None of the mentioned a) zero SMTP transaction
View Answer b) one SMTP transaction
c) more than one SMTP transaction
Answer:a d) all of the mentioned
Explanation:None. View Answer
26
d) none of the mentioned b) by contacting remote DNS server
View Answer c) it is not possible
d) none of the mentioned
Answer:a View Answer
Explanation:None.
Answer:b
9. Which one of the following is an SMTP Explanation: None.
server configured in such a way that anyone on
the internet can send e-mail through it? 4. DNS database contains
a) open mail relay a) name server records
b) wide mail reception b) hostname-to-address records
c) open mail reception c) hostname aliases
d) none of the mentioned d) all of the mentioned
View Answer View Answer
Answer:a Answer:d
Explanation:None. Explanation: None.
10. SMTP is used to deliver messages to 5. If a server has no clue about where to find the
a) user’s terminal address for a hostname then
b) user’s mailbox a) server asks to the root server
c) both user’s terminal and mailbox b) server asks to its adjcent server
d) none of the mentioned c) request is not processed
View Answer d) none of the mentioned
View Answer
Answer:c
Explanation:None. Answer:a
Explanation: None.
1. The entire hostname has a maximum of
a) 255 characters 6. Which one of the following allows client to
b) 127 characters update their DNS entry as their IP address
c) 63 characters change?
d) 31 characters a) dynamic DNS
View Answer b) mail transfer agent
c) authoritative name server
Answer:a d) none of the mentioned
Explanation: None. View Answer
27
8. The right to use a domain name is delegated c) both unix-like and windows systems
by domain name registers which are accredited d) none of the mentioned
by View Answer
a) internet architecture board
b) internet society Answer:c
c) internet research task force Explanation: None.
d) internet corporation for assigned names and
numbers 3. SSH uses ___________ to authenticate the
View Answer remote computer.
a) public-key cryptography
Answer:d b) private-key cryptography
Explanation: None. c) any of public-key or private-key
d) none of the mentioned
9. The domain name system is maintained by View Answer
a) distributed database system
b) a single server Answer:a
c) a single computer Explanation: None.
d) none of the mentioned
View Answer 4. Which standard TCP port is assigned for
contacting SSH servers?
Answer:a a) port 21
Explanation: None. b) port 22
c) port 23
10. Which one of the following is not true? d) port 24
a) multiple hostnames may correspond to a View Answer
single IP address
b) a single hostname may correspond to many IP Answer:b
addresses Explanation: None.
c) a single hostname may correspond to a single
IP address 5. Which one of the following protocol can be
d) none of the mentioned used for login to a shell on a remote host except
View Answer SSH?
a) telnet
Answer:c b) rlogin
Explanation: None. c) both telnet and rlogin
d) none of the mentioned
1. Secure shell (SSH) network protocol is used View Answer
for
a) secure data communication Answer:c
b) remote command-line login Explanation: SSH is more secured then telnet
c) remote command execution and rlogin.
d) all of the mentioned
View Answer 6. Which one of the following is a file transfer
protocol using SSH?
Answer:d a) SCP
Explanation: None. b) SFTP
c) Rsync
2. SSH can be used in only d) All of the mentioned
a) unix-like operating systems View Answer
b) windows
28
Answer:d c) Url
Explanation: None. d) None of the mentioned
View Answer
7. SSH-2 does not contain
a) transport layer Answer: a
b) user authentication layer Explanation: None.
c) physical layer
d) connection layer 2. DHCP is used for
View Answer a) IPv6
b) IPv4
Answer:c c) Both IPv6 and IPv4
Explanation: None. d) None of the mentioned
View Answer
8. Which one of the following feature was
present in SSH protocol, version 1? Answer: c
a) password changing Explanation: None.
b) periodic replacement of session keys
c) support for public-key certificates 3. The DHCP server
d) none of the mentioned a) maintains a database of available IP addresses
View Answer b) maintains the information about client
configuration parameters
Answer:d c) grants a IP address when receives a request
Explanation: None. from a client
d) all of the mentioned
9. SCP protocol is evolved from __________ View Answer
over SSH.
a) RCP protocol Answer: d
b) DHCP protocol Explanation: None.
c) MGCP protocol
d) none of the mentioned 4. IP assigned for a client by DHCP server is
View Answer a) for a limited period
b) for unlimited period
Answer:a c) not time dependent
Explanation: None. d) none of the mentioned
View Answer
10. Which one of the following authentication
method is used by SSH? Answer: a
a) public-key Explanation: None.
b) host based
c) password 5. DHCP uses UDP port _________ for sending
d) all of the mentioned data to the server.
View Answer a) 66
b) 67
Answer:d c) 68
Explanation: None. d) 69
View Answer
1. DHCP (dynamic host configuration protocol)
provides __________ to the client. Answer: b
a) IP address Explanation: None.
b) MAC address
29
6. The DHCP server can provide the _______ of d) None of the mentioned
the IP addresses. View Answer
a) dynamic allocation
b) automatic allocation Answer: c
c) static allocation Explanation: None.
d) all of the mentioned
View Answer 1. IPsec is designed to provide the security at the
a) Transport layer
Answer: d b) Network layer
Explanation: None. c) Application layer
d) Session layer
7. DHCP client and servers on the same subnet View Answer
communicate via
a) UDP broadcast Answer: b
b) UDP unicast Explanation: Network layer is used for
c) TCP broadcast transferring the data from transport layer to
d) TCP unicast another layers.
View Answer
2. In tunnel mode IPsec protects the
Answer: a a) Entire IP packet
Explanation: None. b) IP header
c) IP payload
8. After obtaining the IP address, to prevent the d) None of the mentioned
IP conflict the client may use View Answer
a) internet relay chat
b) broader gateway protocol Answer: a
c) address resolution protocol Explanation: It is nothing but adding control bits
d) none of the mentioned to the packets.
View Answer
3. Which component is included in IP security?
Answer: c a) Authentication Header (AH)
Explanation: None. b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
9. What is DHCP snooping? d) All of the mentioned
a) techniques applied to ensure the security of an View Answer
existing DHCP infrastructure
b) encryption of the DHCP server requests Answer: d
c) algorithm for DHCP Explanation: AH, ESP, IKE.
d) none of the mentioned
View Answer 4. WPA2 is used for security in
a) Ethernet
Answer: a b) Bluetooth
Explanation: None. c) Wi-Fi
d) None of the mentioned
10. If DHCP snooping is configured on a LAN View Answer
switch, then clients having specific ______ can
access the network. Answer: c
a) MAC address Explanation: WPA2 is best with Wi-Fi
b) IP address connection.
c) Both MAC address and IP address
30
5. An attempt to make a computer resource called
unavailable to its intended users is called a) DNS lookup
a) Denial-of-service attack b) DNS hijacking
b) Virus attack c) DNS spoofing
c) Worms attack d) None of the mentioned
d) Botnet process View Answer
View Answer
Answer: c
Answer: a Explanation: DNS spoofing is the phenomenon
Explanation: Denial of service attack. for the above mentioned transaction.
9. When a DNS server accepts and uses 4. Which of the following statements is NOT
incorrect information from a host that has no true concerning VPNs?
authority giving that information, then it is a) Financially rewarding compared to leased
31
lines d) L2TP
b) Allows remote workers to access corporate View Answer
data
c) Allows LAN-to-LAN connectivity over Answer: a
public networks Explanation: It is the security type of the IPsec.
d) Is the backbone of the Internet
View Answer 9. L2F was developed by which company?
a) Microsoft
Answer: d b) Cisco
Explanation: virtual packet network is not a c) Blizzard Entertainment
backbone of the internet. d) IETF
View Answer
5. Traffic in a VPN is NOT ____________
a) Invisible from public networks Answer: b
b) Logically separated from other traffic Explanation: Cisco is the second best company
c) Accessible from unauthorized public to design and make the computer networks.
networks
d) Restricted to a single protocol in IPsec 10. Which layer of the OSI reference model does
View Answer PPTP work at?
a) Layer 1
Answer: c b) Layer 2
Explanation: Because it is secured with the IP c) Layer 3
address. d) Layer 4
View Answer
6. VPNs are financially speaking __________
a) Always more expensive than leased lines Answer: b
b) Always cheaper than leased lines Explanation: Presentation layer.
c) Usually cheaper than leased lines advertisement
d) Usually more expensive than leased lines
View Answer 11. Which layer of the OSI reference model does
IPsec work at?
Answer: c a) Layer 1
Explanation: It is very cheap. b) Layer 2
c) Layer 3
7. Which layer 3 protocols can be transmitted d) Layer 4
over a L2TP VPN? View Answer
a) IP
b) IPX Answer: c
c) Neither IP or IPX Explanation: Session layer.
d) Both IP or IPX
View Answer 1. Storage management comprises of
a) SAN Management
Answer: d b) Data protection
Explanation: Data roming layer. c) Disk operation
d) All of the mentioned
8. ESP (Encapsulating Security Protocol) is View Answer
defined in which of the following standards?
a) IPsec Answer: d
b) PPTP Explanation: SAN, Data protection and Disk
c) PPP
32
operation are the main things of storage Answer: a
management. Explanation: By using Zoning, Storage
administrators ensure secure access to storage
2. Identify the storage devices devices.
a) Switch
b) RAID Arrays 6. Effective Storage management includes
c) Tape drives a) Securities
d) All of the mentioned b) Backups
View Answer c) Reporting
d) All of the mentioned
Answer: d View Answer
Explanation: switch, RAID arrays and tape
drives are main storage devices. Answer: d
Explanation: In storage management all
3. Which protocols are used for Storage necessities like security, backups and reporting
management? facilities are included.
a) SNMP
b) LDAP 7. Identify the tasks involved in Storage
c) POP3 Capacity management
d) MIB a) Identifying storage systems are approaching
View Answer full capacity
b) Monitoring trends for each resource
Answer: a c) Tracking Total capacity, total used, total
Explanation: Simple Network Management available
Protocol is for storage management. d) All of the mentioned
View Answer
4. Identify the difficulties the SAN administrator
incur while dealing with diverse vendors Answer: d
a) Proprietary management interfaces Explanation: Identifying, Monitoring and
b) Multiple applications to manage storage in the Tracking are main tasks involved in SCM.
data center
c) No single view 8. Effect of open standards like SMI(s)
d) All of the mentioned a) Standardization drives software
View Answer interoperability and interchange ability
b) Breaks the old-style dependence on
Answer: d proprietary methods, trade secrets, and single
Explanation: Proprietary management interfaces, providers
multiple applications management and no single c) Builds a strong foundation on which others
view are main difficulties. can quickly build and innovate
d) All of the mentioned
5. How do Storage administrators ensure secure View Answer
access to storage devices:
a) By using Zoning Answer: d
b) By putting a physical lock on the storage Explanation: Driver software, old style
device dependence and strong foundation.
c) By keeping devices shutdown when not in use
d) By keeping devices when used 9. Task of Distributed Management Task Force
View Answer is to
a) To promote interoperability among the
management solution providers
33
b Acts as an interface between the various Answer: a
budding technologies and provide solution to Explanation: 10 to 20 mbps capacity increased
manage various environments on each domain in full duplex mode.
c) Only To promote interoperability among the
management solution providers 3. Configuration management can be divided
d) Both To promote interoperability among the into two subsystems those are
management solution providers and Acts as an a) Reconfiguration and documentation
interface between the various budding b) Management and configuration
technologies and provide solution to manage c) Documentation and dialing up
various environments d) Both Reconfiguration and documentation and
View Answer Management and configuration
View Answer
Answer: d
Explanation: Promote interoperability and Answer: a
interface between various buildings. Explanation: Reconfiguration and
documentation are two subsystems of
10. SMI-S Standard uses configuration management.
a) Java RMI
b) CIM-XML/HTTP 4. To use Simple Network Management System
c) CORBA (SNMP), we need
d) .NET a) Servers
View Answer b) IP
c) Protocols
Answer: b d) Rules
Explanation: CIM-XML/HTTP is a SMI-S View Answer
standard.
Answer: d
1. An application-level protocol in which a few Explanation: To use Simple Network
manager stations control a set of agents is called Management System (SNMP), we need rules.
a) HTML
b) TCP 5. Main difference between SNMPv3 and
c) SNMP SNMPv2 is the
d) SNMP/IP a) Management
View Answer b) Integration
c) Classification
Answer: c d) Enhanced security
Explanation: An application-level protocol in View Answer
which a few manager stations control a set of
agents is called SNMP. Answer: d
Explanation: Enhanced security is the main
2. Full duplex mode increases capacity of each difference between SNMPv3 and SNMPv2.
domain from
a) 10 to 20 mbps 6. In Network Management System, a term that
b) 20 to 30 mbps responsible for controlling access to network
c) 30 to 40 mbps based on predefined policy is called
d) 40 to 50 mbps a) Fault Management
View Answer b) Secured Management
c) Active Management
d) Security Management
View Answer
34
Answer: d Answer: b
Explanation: A term that responsible for Explanation: SMI is guidelines of SNMP.
controlling access to network based on
predefined policy is called security management. 1. The protocol used by Telnet application is
a) Telnet
7. BER stands for b) FTP
a) Basic Encoding Rules c) HTTP
b) Basic Encoding Resolver d) None of the mentioned
c) Basic Encoding Rotator View Answer
d) Basic Encoding Router
View Answer Answer: a
Explanation: None.
Answer: a
Explanation: Basic encoding rules. 2. In “character at a time” mode
a) Character processing is done on the local
8. Control of users’ access to network resources system under the control of the remote system
through charges are main responsibilities of b) Most text typed is immediately sent to the
a) Reactive Fault Management remote host for processing
b) Reconfigured Fault Management c) All text is echoed locally, only completed
c) Accounting Management lines are sent to the remote host
d) Security Management d) None of the mentioned
View Answer View Answer
Answer: c Answer: b
Explanation: Control of users’ access to network Explanation: None.
resources through charges are main
responsibilities of accounting management. 3. _______ allows you to connect and login to a
remote computer
9. SNMP is a framework for managing devices a) Telnet
in an internet using the b) FTP
a) TCP/IP protocol c) HTTP
b) UDP d) None of the mentioned
c) SMTP View Answer
d) None
View Answer Answer: a
Explanation: None.
Answer: a
Explanation: SNMP is a framework for 4. The correct syntax to be written in the web
managing devices in an internet using the browser to Telnet to www.sanfoundry.com is
TCP/IP protocol. a) telnet//www.sanfoundry.com
b) telnet:www.sanfoundry.com
10. Structure of Management Information c) telnet://www.sanfoundry.com
(SMI), is guideline of d) telnet www.sanfoundry.com
a) HTTP View Answer
b) SNMP
c) URL Answer: c
d) MIB Explanation: None.
View Answer
5. Telnet is a
a) Television on net
35
b) Network of Telephones Answer: c
c) Remote Login Explanation: None.
d) Teleshopping site
View Answer 2. Which one of the following is not true?
a) telnet defines a network virtual terminal
Answer: c (NVT) standard
Explanation: None. b) client programs interact with NVT
c) server translates NVT operations
6. Which one of the following is not correct? d) none of the mentioned
a) telnet is a general purpose client-server View Answer
program
b) telnet lets user access an application on a Answer: d
remote computer Explanation: None.
c) telnet can also be used for file transfer
d) none of the mentioned 3. All telnet operations are sent as
View Answer a) 4 bytes
b) 8 bytes
Answer: c c) 16 bytes
Explanation: None. d) 32 bytes
View Answer
7. Which operating mode of telnet is full
duplex? Answer: b
a) default mode Explanation: None.
b) server mode
c) line mode 4. AbsoluteTelnet is a telnet client for
d) none of the mentioned a) windows
View Answer b) linux
c) mac
Answer: c d) none of the mentioned
Explanation: None. View Answer
advertisement
Answer: a
8. If we want that a character be interpreted by Explanation: None.
the client instead of server
a) escape character has to be used 5. The decimal code of interpret as command
b) control functions has to be disabled (IAC) character is
c) it is not possible a) 252
d) none of the mentioned b) 253
View Answer c) 254
d) 255
Answer: a View Answer
Explanation: None.
Answer: d
1. Telnet protocol is used to establish a Explanation: None.
connection to
a) TCP port number 21 6. In character mode operation of telnet
b) TCP port number 22 implementation
c) TCP port number 23 a) each character typed is sent by the client to
d) TCP port number 24 the server
View Answer b) each character typed is discarded by the
36
server c) Lines of data
c) each character typed is aggregated into a word d) Packets
and then send to the server View Answer
d) none of the mentioned
View Answer Answer: a
Explanation: In TCP, data is sent and received in
Answer: a terms of Stream of bytes.
Explanation: None.
3. TCP process may not write and read data at
7. In telnet, the client echoes the character on the the same speed. So we need __________ for
screen but does not send it until a whole line is storage.
completed in a) Packets
a) default mode b) Buffers
c) character mode c) Segments
c) server mode d) Stacks
d) none of the mentioned View Answer
View Answer
Answer: b
Answer: a Explanation: TCP needs buffers for storage to
Explanation: None. overcome this problem.
advertisement
4. TCP groups a number of bytes together into a
8. Which one of the following is not correct? packet called
a) telnet is a general purpose client-server a) Packet
program b) Buffer
b) telnet lets user access an application on a c) Segment
remote computer d) Stack
c) telnet can also be used for file transfer View Answer
d) none of the mentioned
View Answer Answer: c
Explanation: Segment is a grouping of number
Answer: c of bytes together into a packet.
Explanation: None.
5. Communication offered by TCP is
1. Which of the following is true with respect to a) Full-duplex
TCP b) Half-duplex
a) Connection-oriented c) Semi-duplex
b) Process-to-process d) Byte by byte
c) Transport layer protocol View Answer
d) All of the mentioned
View Answer Answer: a
Explanation: Data flow in both the directions at
Answer: d the same time during TCP communication
Explanation: TCP is a transport layer protocol, hence, Full-duplex.
process-to-process, and creates a virtual
connection between two TCP’s. 6. To achieve reliable transport in TCP,
___________ is used to check the safe and
2. In TCP, sending and receiving data is done as sound arrival of data.
a) Stream of bytes a) Packet
b) Sequence of characters b) Buffer
37
c) Segment 10. The value of acknowledgement field in a
d) Acknowledgment segment defines
View Answer a) Number of previous bytes to receive
b) Total number of bytes to receive
Answer: d c) Number of next bytes to receive
Explanation: Acknowledgment mechanism is d) Sequence of zero’s and one’s
used to check the safe and sound arrival of data. View Answer
38
4. The server program tells its TCP that it is d) Denial-of-service attack
ready to accept a connection. This process is View Answer
called
a) Active open Answer: a
b) Active close Explanation: This is the serious security problem
c) Passive close during the connection establishment.
d) Passive open
View Answer 8. SYNC flooding attack belongs to a type of
security attack known as
Answer: d a) SYNC flooding attack
Explanation: This is the first step in the Three- b) Active attack
Way Handshaking process and is started by the c) Passive attack
server. d) Denial-of-service attack
View Answer
5. The process of, A client that wishes to
connect to an open server tells its TCP that it Answer: d
needs to be connected to that particular server is Explanation: During SYNC flooding the system
a) Active open collapses and denies service to every request.
b) Active close
c) Passive close 9. Size of source and destination port address of
d) Passive open TCP header respectively are
View Answer a) 16-bits and 32-bits
b) 16-bits and 16-bits
Answer: a c) 32-bits and 16-bits
Explanation: This is the second step in the d) 32-bits and 32-bits
Three-Way Handshaking process and is done by View Answer
the client once it finds the open server.
Answer: b
6. In Three-Way Handshaking process, the Explanation: Size of source and destination ports
situation where both the TCP’s issue an active must be 32-bits.
open is
a) Mutual open 10. Connection establishment in TCP is done by
b) Mutual Close which mechanism?
c) Simultaneous open a) Flow control
d) Simultaneous close b) Three-Way Handshaking
View Answer c) Forwarding
d) Synchronisation
Answer: c View Answer
Explanation: Here, both TCP’s transmit a
SYNC+ACK segment to each other and one Answer: b
single connection is established between them. Explanation: Three-Way Handshaking is used to
terminate the connection between client and
7. The situation when a malicious attacker sends server.
a large number of SYNC segments to a server,
pretending that each of them is coming from a 1. Which of the following is false with respect to
different client by faking the source IP address UDP
in the datagrams a) Connection-oriented
a) SYNC flooding attack b) Unreliable
b) Active attack c) Transport layer protocol
c) Passive attack
39
d) All of the mentioned Answer: b
View Answer Explanation: Port number used by Network
Time Protocol with UDP is 123.
Answer: a
Explanation: UDP is an unreliable, 6. what is the header size of UDP packet?
connectionless transport layer protocol. a) 8 bytes
b) 8 bits
2. Return value of the UDP port “Chargen” is c) 16 bytes
a) String of characters d) 124 bytes
b) String of integers View Answer
c) Array of characters with integers
d) Array of zero’s and one’s Answer: a
View Answer Explanation: The fixed size of the UDP packet
header is 8 bytes.
Answer: a
Explanation: Chargen with port number 19 7. The port number is “ephemeral port number”,
returns string of characters. if the source host is ……
a) NTP
3. Beyond IP, TCP provides additional services b) Echo
such as c) Server
a) Routing and switching d) Client
b) Sending and receiving of packets View Answer
c) Multiplexing and demultiplexing
d) Demultiplexing and error checking Answer: d
View Answer Explanation: If the source host is the client, the
port number in most cases will be ephemeral
Answer: d port number.
Explanation: UDP is a simple protocol which
provides demultiplexing and error checking. 8. “Total length” field in UDP packet header is
the length of
4. The main advantage of UDP is a) Only UDP header
a) More overload b) Only data
b) Reliable c) Only checksum
c) Less overload d) UDP header plus data
d) Fast View Answer
View Answer
Answer: d
Answer: c Explanation: Total length is the 16 bit field
Explanation: UDP is an unreliable, which contains the length of UDP header and
connectionless transport layer protocol and uses the data.
minimum overload.
9. Correct expression for UDP user datagram
5. Port number used by Network Time length is
Protocol(NTP) with UDP is a) UDP length = IP length – IP header’s length
a) 161 b) UDP length = UDP length – UDP header’s
b) 123 length
c) 162 c) UDP length = IP length + IP header’s length
d) 124 d) UDP length = UDP length + UDP header’s
View Answer length
View Answer
40
Answer: a authentication that can be used with IPsec, not
Explanation: A user datagram is encapsulated in an encryption protocol; therefore, answer B is
an IP datagram. There is a field in the IP incorrect.
datagram the defines the total length. There is
another field in the IP datagram that defines the 3. Which two types of IPsec can be used to
length of the header. So if we subtract the length secure communications between two LANs?
of a UDP datagram that is encapsulated in an IP a) AH tunnel mode
datagram, we get the length of UDP user b) ESP tunnel mode
datagram. c) Both AH tunnel mode and ESP tunnel mode
d) ESP transport mode
10. The field used to detect errors over the entire View Answer
user datagram is
a) UDP header Answer: c
b) Checksum Explanation: A tunnel mode IPsec should be
c) Source port used. Option c is for data transfer purpose,
d) Destination port option d is for integrity & confidentiality
View Answer purpose.
41
Answer: a d) ITU
Explanation: Network layer is mainly used for View Answer
security purpose, so IPsec in mainly operates in
network layer. Answer: a
Explanation: The NSA is primarily responsible
7. ESP provides for military encryption systems. The NSA
a) source authentication designs, evaluates, and implements encryption
b) data integrity systems for the military and government
c) privacy agencies with high security needs.
d) all of the mentioned
View Answer 1. Two broad categories of congestion control
are
Answer: d a) Open-loop and Closed-loop
Explanation: Encrypted security payload b) Open-control and Closed-control
provides source, data integrity and privacy. c) Active control and Passive control
d) None of the mentioned
8. In computer security… means that computer View Answer
system assets can be modified only by
authorized parities. Answer: a
a) Confidentiality Explanation: These are two types of congestion
b) Integrity control.
c) Availability
d) Authenticity 2. In open-loop control, policies are applied to
View Answer __________
a) Remove after congestion occurs
Answer: b b) Remove after sometime
Explanation: Integrity means that computer c) Prevent before congestion occurs
system assets can be modified only by d) Prevent before sending packets
authorized parities. View Answer
42
a) Packet that have not lost d) Virtual circuit networks
b) Packet that have lost or corrupted View Answer
c) Packet from starting
d) All the packets Answer: d
View Answer Explanation: In Virtual circuit networks, each
node knows the upstream node from which a
Answer: b flow data is coming.
Explanation: In selective repeat window, packet
that have lost or corrupted must be sent. 9. The packet sent by a node to the source to
inform it of congestion is called
5. Discarding policy is mainly done by a) Explicit
a) Sender b) Discard
b) Receiver c) Choke
c) Router d) Backpressure
d) Switch View Answer
View Answer
Answer: c
Answer: c Explanation: Choke packet is sent by a node to
Explanation: This is done by the routers to the source to inform it of congestion.
prevent congestion.
10. In the slow-start algorithm, the size of the
6. Closed-Loop control mechanism try to congestion window increases __________ until
a) Remove after congestion occurs it reaches a threshold.
b) Remove after sometime a) Exponentially
c) Prevent before congestion occurs b) Additively
d) Prevent before sending packets c) Multiplicatively
View Answer d) None of the mentioned
View Answer
Answer: a
Explanation: Policies are applied to remove Answer: a
congestion after it occurs. Explanation: In the slow-start algorithm, the size
of the congestion window increases
7. The technique in which a congested node exponentially until it reaches a threshold.
stops receiving data from the immediate advertisement
upstream node or nodes is called as
a) Admission policy 11. In the congestion avoidance algorithm, the
b) Backpressure size of the congestion window increases
c) Forward signalling ____________ until congestion is detected.
d) Backward signalling a) Exponentially
View Answer b) Additively
c) Multiplicatively
Answer: b d) None of the mentioned
Explanation: This is a node-to-node congestion View Answer
control that starts with a node and propagates in
opposite direction of data flow to the source. Answer: b
Explanation: In the congestion avoidance
8. Backpressure technique can be applied only to algorithm, the size of the congestion window
a) Congestion networks increases additively until congestion is detected.
b) Closed circuit networks
c) Open circuit networks
43
1. Which of the following is not a characteristic Answer: c
of Virtual Circuit Network? Explanation: Virtual circuit network does not
a) There are setup and teardown phases in contain termination phase.
addition to the data transfer phase
b) Resources can be allocated during setup phase 5. Steps required in setup process are
or on demand a) Setup request and acknowledgement
c) All packets follow the same path established b) Setup request and setup response
during the connection c) Setup request and setup termination
d) Virtual circuit network is implemented in d) Setup and termination steps
application layer View Answer
View Answer
Answer: a
Answer: d Explanation: Steps required in setup process are
Explanation: Virtual circuit network is normally Setup request and acknowledgement.
implemented in datalink layer.
6. During teardown phase, source after sending
2. The address that is unique in the scope of the all the frames to destination sends……..to notify
network or internationally if the network is part termination
of an international network is called as a) Teardown response
a) Global address b) Teardown request
b) Network address c) Termination request
c) Physical address d) Termination response
d) IP address View Answer
View Answer
Answer: b
Answer: a Explanation: Source after sending all the frames
Explanation: This address is used to create a to destination sends teardown request to which,
virtual circuit identifier. destination sends teardown response.
3. The Identifier that is used for data transfer in 7. Delay if, resource allocated during setup
virtual circuit network is phase during data transfer is
a) Global address a) Constant
b) Virtual circuit identifier b) Increases for each packet
c) Network identifier c) Same for each packet
d) IP identifier d) Different for each packet
View Answer View Answer
Answer: b Answer: c
Explanation: Virtual circuit identifier is used for Explanation: If resource allocated during setup
data transfer and has switch scope. phase, delay is same for each packet.
4. Which of the following is not a phase of 8. Delay if, resource allocated on demand during
virtual circuit network? data transfer is
a) Setup phase a) Constant
b) Datatransfer phase b) Increases for each packet
c) Termination phase c) Same for each packet
d) Teardown phase d) Different for each packet
View Answer View Answer
44
Answer: d 3. ATM standard defines _______ layers.
Explanation: If resource allocated on demand, a) 2
delay is different for each packet. b) 3
c) 4
9. In virtual circuit network, delay times for d) 5
setup and teardown respectively are View Answer
a) 1 and 1
b) 1 and 2 Answer: b
c) 2 and 1 Explanation: Three layers are physical layer,
d) 2 and 2 ATM layer and application adoption layer.
View Answer
4. ATM can be used for
Answer: a a) local area network
Explanation: Delay time for setup and teardown b) wide area network
is one each. c) any of local or wide area network
d) none of the mentioned
10. In data transfer phase, the table contains how View Answer
many columns?
a) 1 Answer: c
b) 2 Explanation: None.
c) 3
d) 4 5. An ATM cell has the payload field of
View Answer a) 32 bytes
b) 48 bytes
Answer: d c) 64 bytes
Explanation: Table has 4 columns. Port and VCI d) 128 bytes
for both incoming and outgoing data. View Answer
Answer: b
1. ATM and frame relay are Explanation: None.
a) virtual circuit networks
b) datagram networks 6. Frame relay has error detection at the
c) virtual private networks a) physical layer
d) none of the mentioned b) data link layer
View Answer c) network layer
d) transport layer
Answer: a View Answer
Explanation: ATM stands for asynchronous
transfer mode. Answer: b
Explanation: None.
2. ATM uses the
a) asynchronous frequency division multiplexing 7. Virtual circuit identifier in frame relay is
b) asynchronous time division multiplexing called
c) asynchronous space division multiplexing a) data link connection identifier
d) none of the mentioned b) frame relay identifier
View Answer c) cell relay identifier
d) none of the mentioned
Answer: b View Answer
Explanation: None.
45
Answer: a 2. Frame Relay networks offer an option called
Explanation: None. a) Voice Over For Relay
b) Voice Over Fine Relay
8. Frame relay has c) Voice On Frame Relay
a) only physical layer d) Voice Over Frame Relay
b) only data link layer View Answer
c) only network layer
d) both physical and data link layer Answer: d
View Answer Explanation: Frame Relay networks offer an
option calledVoice Over Frame Relay
Answer: d
Explanation: None. 3. There are ________ total features of Frame
Relay.
9. In frame relay networks, extended address is a) Five
used b) Seven
a) to increase the range of data link connection c) Nine
identifiers d) Ten
b) for error detection View Answer
c) for encryption
d) for error recovery Answer: c
View Answer Explanation: There are total features of Frame
Relay are Nine.
Answer: a
Explanation: None. 4. Frame Relay does not provide flow or error
control, they must be provided by the
10. What is FRAD in frame relay network? a) Lower Level Protocol
a) FRAD assembles and disassembles the frames b) High Level Protocol
coming from other protocols c) Upper Level Protocol
b) FRAD is used for modulation and d) Downward Level Protocol
demodulation View Answer
c) FRAD is used for error detection
d) None of the mentioned Answer: c
View Answer Explanation: Frame Relay does not provide flow
or error control, they must be provided by
Answer: a theUpper Level Protocol.
Explanation: FRAD stands for frame relay
assembler/disassembler. 5. Frame Relay deploys physical layer carriers
such as
1. Frame Relay is very cheap than other a) ADMs
a) LANs b) UPSR
b) WANs c) BLSR
c) MANs d) SONET
d) Multipoint Networks View Answer
View Answer
Answer: d
Answer: b Explanation: Frame Relay deploys physical
Explanation: Frame Relay is very cheap than layer carriers such asSONET.
other WANs.
6. Frame relay has error detection at the
a) physical layer
46
b) data link layer 10. What is FRAD in frame relay network?
c) network layer a) FRAD assembles and disassembles the frames
d) transport layer coming from other protocols
View Answer b) FRAD is used for modulation and
demodulation
Answer: b c) FRAD is used for error detection
Explanation: In data link layer error control d) None of the mentioned
header is the main thing for any packet transfer, View Answer
so we use this layer frame relay has error
detection. Answer: a
Explanation: FRAD stands for frame relay
7. Virtual circuit identifier in frame relay is assembler/disassembler.
called
a) data link connection identifier 1. A piece of icon or image on a web page
b) frame relay identifier associated with another webpage is called
c) cell relay identifier a) url
d) none of the mentioned b) hyperlink
View Answer c) plugin
d) none of the mentioned
Answer: a View Answer
Explanation: Virtual circuit identifier in frame
relay is calleddata link connection identifier. Answer: b
Explanation: None.
8. Frame relay has only
a) physical layer 2. Dynamic web page
b) data link layer a) is same every time whenever it displays
c) both physical layer and data link layer b) generates on demand by a program or a
d) none of the mentioned request from browser
View Answer c) both is same every time whenever it displays
and generates on demand by a program or a
Answer: c request from browser
Explanation: Frame relay has only physical and d) none of the mentioned
data link layer for error detection in data link View Answer
layer and for conversion in physical layer.
Answer: b
9. In frame relay networks, extended address is Explanation: None.
used
a) to increase the range of data link connection 3. What is a web browser?
identifiers a) a program that can display a web page
b) for error detection b) a program used to view html documents
c) both to increase the range of data link c) it enables user to access the resources of
connection identifiers and for error detection internet
d) none of the mentioned d) all of the mentioned
View Answer View Answer
Answer: a Answer: d
Explanation: In frame relay networks, extended Explanation: None.
address is usedto increase the range of data link
connection identifiers. 4. Common gateway interface is used to
a) generate executable files from web content by
47
web server Answer: a
b) generate web pages Explanation: None.
c) stream videos
d) none of the mentioned 9. What is document object model (DOM)?
View Answer a) convention for representing and interacting
with objects in html documents
Answer: a b) application programming interface
Explanation: None. c) hierarchy of objects in ASP.NET
d) none of the mentioned
5. URL stands for View Answer
a) unique reference label
b) uniform reference label Answer: a
c) uniform resource locator Explanation: None.
d) unique resource locator
View Answer 10. AJAX stands for
a) asynchronous javascript and xml
Answer: c b) advanced JSP and xml
Explanation: None. c) asynchronous JSP and xml
d) advanced javascript and xml
6. A web cookie is a small piece of data View Answer
a) sent from a website and stored in user’s web
browser while a user is browsing a website Answer: a
b) sent from user and stored in the server while a Explanation: None.
user is browsing a website
c) sent from root server to all servers 1. Which of the following is not applicable for
d) none of the mentioned IP?
View Answer a) Error reporting
b) Handle addressing conventions
Answer: a c) Datagram format
Explanation: None. d) Packet handling conventions
View Answer
7. Which one of the following is not used to
generate dynamic web pages? Answer: a
a) PHP Explanation: Error reporting is handled by
b) ASP.NET ICMP.
c) JSP
d) None of the mentioned 2. Which of the following field in IPv4 datagram
View Answer is not related to fragmentation?
a) Flags
Answer: d b) Offset
Explanation: None. c) TOS
d) Identifier
8. An alternative of javascript on windows View Answer
platform is
a) VBScript Answer: c
b) ASP.NET Explanation: TOS-type of service identifies the
c) JSP type of packets.
d) None of the mentioned
View Answer 3. The TTL field has value 10. How many
routers (max) can process this datagram?
48
a) 11 c) offer unreliable service
b) 5 d) none of the mentioned
c) 10 View Answer
d) 1
View Answer Answer: b
Explanation: Ip offers unreliable service.
Answer: c advertisement
Explanation: TTL field is decremented by one
each time the datagram is processed by a router. 8. Fragmentation has following demerits
a) complicates routers
4. If the value in protocol field is 17, the b) open to DOS attack
transport layer protocol used is _____________ c) overlapping of fragments.
a) TCP d) all of the mentioned
b) UDP View Answer
c) Either of the mentioned
d) None of the mentioned Answer: d
View Answer Explanation: Fragmentation makes the
implementation complex and also can create
Answer: b DOS attack.
Explanation: For TCP it is 6.
9. Which field helps to check rearrangement of
5. The data field can carry which of the the fragments?
following? a) offset
a) TCP segemnt b) flag
b) UDP segment c) ttl
c) ICMP messages d) identifer
d) None of the mentioned View Answer
View Answer
Answer: a
Answer: c Explanation: Offset field specifies where the
Explanation: Data field usually has tranaport fragment fits in the original datagram.
layer segment, but it can also carry ICMP
messages. 1. Which of these is not applicable for IP
protocol?
6. What should be the flag value to indicate the a) Connectionless
last fragment? b) Offer reliable service
a) 0 c) Offer unreliable service
b) 1 d) None of the mentioned
c) TTl value View Answer
d) None of the mentioned
View Answer Answer: b
Explanation: IP offers unreliable service.
Answer: a
Explanation: flag=0 indicates that it is the last 2. Fragmentation has following demerits
fragment. a) Complicates routers
b) Open to DOS attack
7. Which of these is not applicable for IP c) Overlapping of fragments
protocol? d) All of the mentioned
a) is connectionless View Answer
b) offer reliable service
49
Answer: d Answer: c
Explanation: Fragmentation makes the Explanation: First address in a block is used as
implementation complex and also can create network address that represents the organization.
DOS attack.
7. In classful addressing, a large part of available
3. Which field helps to check rearrangement of addresses are
the fragments? a) Organized
a) Offset b) Blocked
b) Flag c) Wasted
c) TTL d) Communicated
d) Identifier View Answer
View Answer
Answer: c
Answer: a Explanation: In classful addressing, a large part
Explanation: offset field specifies where the of available addresses are wasted.
fragment fits in the original datagram. advertisement
4. In classless addressing, there are no classes 8. Network addresses are very important
but addresses are still granted in concepts of
a) IPs a) Routing
b) Blocks b) Mask
c) Codes c) IP Addressing
d) Sizes d) Classless Addressing
View Answer View Answer
Answer: b Answer: c
Explanation: In classless addressing, there are no Explanation: Network addresses are very
classes but addresses are still granted in blocks. important concepts of IP addressing.
50
2. The header length of an IPv6 datagram is a) Hop limit
___________ b) TTL
a) 10bytes c) Next header
b) 25bytes d) None of the mentioned
c) 30bytes View Answer
d) 40bytes
View Answer Answer: a
Explanation: The Hop limit value is
Answer: d decremented by one by a router when the
Explanation: IPv6 datagram has fixed header datagram is forwaded by the router. When the
length of 40bytes, which results is faster value becomes zero the datagram is discarded.
processing of the datagram.
7. Dual-stack approach refers to
3. In the IPv6 header,the traffic class field is a) Implementing Ipv4 with 2 stacks
similar to which field in the IPv4 header? b) Implementing Ipv6 with 2 stacks
a) Fragmentation field c) Node has both IPv4 and IPv6 support
b) Fast-switching d) None of the mentioned
c) ToS field View Answer
d) Option field
View Answer Answer: c
Explanation: Dual-stack is one of the approach
Answer: c used to support IPv6 in already existing systems.
Explanation: This field enables to have different advertisement
types of IP datagram.
8. Suppose two IPv6 nodes want to interoperate
4. IPv6 doesnot use _________ type of address using IPv6 datagrams but are connected to each
a) Broadcast other by intervening IPv4 routers. The best
b) Multicast solution here is
c) Anycast a) Use dual-stack approach
d) None of the mentioned b) Tunneling
View Answer c) No solution
d) Replace the system
Answer: a View Answer
Explanation: Broadcast has been eliminated in
IPv6. Answer: b
Explanation: The IPv4 routers can form a tuunel.
5. These are the features present in IPv4 but not
in IPv6. 9. Teredo is an automatic tunneling technique. In
a) Fragmentation each client the obfuscated IPv4 address is
b) Header checksum represented by bits
c) Options a) 96 to 127
d) All of the mentioned b) 0 to 63
View Answer c) 80 to 95
d) 64 to 79
Answer: d View Answer
Explanation: All the features are only present in
IPv4 and not IPv6. Answer: a
Explanation: Bits 96 to 127 in the datagram
6. The _________ field determines the lifetime represents obfuscated 1Pv4 address.
of IPv6 datagram
51
1. Dual-stack approach refers to 5. In subcategories of reserved address in IPv6,
a) Implementing Ipv4 with 2 stacks address that is used by a host to test itself
b) Implementing Ipv6 with 2 stacks without going into network is called
c) Node has both IPv4 and IPv6 support a) Unspecified address
d) None of the mentioned b) Loopback address
View Answer c) Compatible address
d) Mapped address
Answer: c View Answer
Explanation: Dual-stack is one of the approach
used to support IPv6 in already existing systems. Answer: b
Explanation: In subcategories of reserved
2. Suppose two IPv6 nodes want to interoperate address in IPv6, address that is used by a host to
using IPv6 datagrams but are connected to each test itself without going into network is called
other by intervening IPv4 routers. The best loop back address.
solution here is
a) Use dual-stack approach 6. A few leftmost bits in each address of IPv6
b) Tunneling address define its category is called
c) No solution a) Prefix type
d) Replace the system b) Postfix type
View Answer c) Reserved type
d) Local type
Answer: b View Answer
Explanation: The IPv4 routers can form a tunnel.
Answer: a
3. Teredo is an automatic tunneling technique. In Explanation: Prefix means bits in the IP address
each client the obfuscated IPv4 address is are placed in leftmost position.
represented by bits
a) 96 to 127 7. In IPv6 addresses, addresses start with eight
b) 0 to 63 0s are called
c) 80 to 95 a) Unicast addresses
d) 64 to 79 b) Multicast addresses
View Answer c) Any cast addresses
d) Reserved addresses
Answer: a View Answer
Explanation: Bits 96 to 127 in the datagram
represents obfuscated 1Pv4 address. Answer: d
Explanation: In IPv6 address format the starting
4. A link local address of local addresses is used bits are specified with eight 0s called reserved
in an address.
a) Isolated router advertisement
b) Isolated mask
c) Isolated subnet 8. Which statement(s) about IPv6 addresses are
d) Isolated net true?
View Answer a) Leading zeros are required
b) Two colons (::) are used to represent
Answer: c successive hexadecimal fields of zeros
Explanation: Isolated subnet is very huge c) Two colons (::) are used to separate fields
sharing network area in this link local address of d) A single interface cannot have multiple IPv6
local addresses is used. addresses of different types
View Answer
52
Answer: b b) Port number
Explanation: In order to shorten the written c) Host number
length of an IPv6 address, successive fields of d) Host address
zeros may be replaced by double colons. In View Answer
trying to shorten the address further, leading
zeros may also be removed. Just as with IPv4, a Answer: b
single device’s interface can have more than one Explanation: Multiple processes on destinations
address; with IPv6 there are more types of are identified by transport layer address also
addresses and the same rule applies. There can called as port number.
be link-local, global unicast, and multicast
addresses all assigned to the same interface. 4. Range of port numbers in Internet model is
a) 0 and 32,765(8-bit)
9. When IPV6 launched b) 0 and 32,765(16-bit)
a) June 2, 2012 c) 0 and 65,535(32-bit)
b) June 4, 2012 d) 0 and 65,535(16-bit)
c) June 5, 2012 View Answer
d) June 6, 2012
View Answer Answer: d
Explanation: Port numbers are 16-bit integers
Answer: d between 0 and 65,535.
Explanation: None
5. According to Internet Assigned Numbers
1. Which layer is responsible for process-to- Authority(IANA), which of the following range
process delivery? is not a part of port number?
a) Physical layer a) Well-known ports
b) Network layer b) Registered ports
c) Transport layer c) Dynamic ports
d) Application layer d) Static ports
View Answer View Answer
Answer: c Answer: d
Explanation: Transport layer is responsible for Explanation: IANA divided port number range
process-to-process delivery. in to three i.e., Well-known, Registered and
Dynamic ports.
2. In process-to-process delivery, two processes
communicate in which of the following 6. The combination of an IP address and port
methods? number is called as?
a) Client/Server a) Socket address
b) Source/Destination b) Port address
c) Message Transfer c) MAC address
d) None of the mentioned d) Host address
View Answer View Answer
Answer: a Answer: a
Explanation: The most common method used for Explanation: Socket address is the combination
this communication is Client/Server. of an IP address and port number.
3. Multiple processes on destinations at transport 7. Which of the following is false with respect to
layer are identified by: Connectionless service of transport layer
a) Mac address protocol?
53
a) Packets are not numbered delivering messages to appropriate process
b) Packets are not delayed based on port number.
c) No acknowledgement
d) Packet may arrive out of sequence 1. Internet Control Message Protocol(ICMP) has
View Answer designed to compensate
a) Error-reporting
Answer: b b) Error-correction
Explanation: Packets in this method may be c) Host and management queries
delayed or lost. d) All of the mentioned
View Answer
8. Correct order in the process of Connection-
Oriented services is Answer: d
1. Data transfer Explanation: ICMP has been designed to address
2. Connection release these issues.
3. Connection establishment
a) 1-2-3 2. Header size of the ICMP message is
b) 3-2-1 a) 8-bytes
c) 2-1-3 b) 8-bits
d) 3-1-2 c) 16-bytes
View Answer d) 16-bits
View Answer
Answer: d
Explanation: First connection should be Answer: a
established followed by data transfer and Explanation: ICMP message has 8-bytes header
connection release. and variable size data section.
9. In transport layer, Multiplexing is done at 3. During error reporting, ICMP always reports
a) Channel error messages to
b) Receiver site a) Destination
c) Sender site b) Source
d) Packet c) Next router
View Answer d) Previous router
View Answer
Answer: c
Explanation: Multiplexing is done before Answer: b
sending packets at sender site. Explanation: ICMP sends error message to the
source because the datagram knows information
10. The process of error checking and dropping about source and destination IP address.
of the header, delivering messages to appropriate
process based on port number is called as 4. Which of these is not a type of error-reporting
a) Delivery of packets messages
b) Error correction a) Destination unreachable
c) Multiplexing b) Source quench
d) Demultiplexing c) Router error
View Answer d) Time exceeded
View Answer
Answer: d
Explanation: Demultiplexing is the process of Answer: c
error checking and dropping of the header, Explanation: Router error is not a type of error-
reporting messages in ICMP.
54
5. ICMP error message will not be generated for d) Decremented by 1
a datagram having a special address such as View Answer
a) 127.0.0.0
b) 12.1.2 Answer: d
c) 11.1 Explanation: This field will be decremented by 1
d) 127 at every router, and will be zero by the time it
View Answer reaches source.
55
12. In a simple echo-request message, the value determine which version to use when sending a
of the sum is 01010000 01011100. Then, value packet to a destination.
of checksum is
a) 10101111 10100011 4. The strategy used when two computers using
b) 01010000 01011100 IPv6 want to communicate with each other and
c) 10101111 01011100 the packet must pass through a region that uses
d) 01010000 10100011 IPv4 is
View Answer a) Dual stack
b) Header translation
Answer: a c) Conversion
Explanation: Checksum is the compliment of the d) Tunnelling
sum(exchange 0’s and 1’s). View Answer
56
a) IP address 3. The TTL field has value 10. How many
b) Physical address routers (max) can process this datagram?
c) Mapped address a) 11
d) Any of the mentioned b) 5
View Answer c) 10
d) 1
Answer: c View Answer
Explanation: Mapped address is used to translate
an IPv6 address to an IPv4 address. Answer: c
advertisement Explanation: TTL field is decremented by one
each time the datagram is processed by a router.
8. Which of the following is not the step in
Header translation procedure? 4. If the value in protocol field is 17, the
a) The IPv6 mapped address is changed to an transport layer protocol used is _________
IPv4 address by extracting the rightmost 32bits a) TCP
b) The value of the IPv6 priority field is b) UDP
discarded c) Either TCP and UDP
c) The type of service field in IPv4 is set to zero d) None of the mentioned
d) The IPv6 flow label is considered View Answer
View Answer
Answer: b
Answer: d Explanation: For TCP it is 6.
Explanation: In header translation procedure,
IPv6 flow label is ignored. 5. Which field helps to check rearrangement of
the fragments?
1. Which of the following is not applicable for a) offset
IP? b) flag
a) Error reporting c) ttl
b) Handle addressing conventions d) identifier
c) Datagram format View Answer
d) Packet handling
View Answer Answer: a
Explanation: Offset field specifies where the
Answer: a fragment fits in the original datagram.
Explanation: Error reporting is handled by
ICMP. 6. The size of IP address in IPv6 is
a) 4bytes
2. Which of the following field in IPv4 datagram b) 128bits
is not related to fragmentation? c) 8bytes
a) Flags d) 100bits
b) Offset View Answer
c) TOS
d) Identifier Answer: b
View Answer Explanation: An IPv6 address is 128 bits long.
57
d) 40bytes d) 172.255.255.255
View Answer View Answer
Answer: d Answer: c
Explanation: IPv6 datagram has fixed header Explanation: This address is used for broadcast
length of 40bytes, which results is faster the class B network purpose
processing of the datagram.
2. You have an IP address of 172.16.13.5 with a
8. In the IPv6 header, the traffic class field is 255.255.255.128 subnet mask. What is your
similar to which field in the IPv4 header? class of address, subnet address, and broadcast
a) Fragmentation field address?
b) Fast switching a) Class A, Subnet 172.16.13.0, Broadcast
c) TOS field address 172.16.13.127
d) Option field b) Class B, Subnet 172.16.13.0, Broadcast
View Answer address 172.16.13.127
c) Class B, Subnet 172.16.13.0, Broadcast
Answer: c address 172.16.13.255
Explanation: This field enables to have different d) Class B, Subnet 172.16.0.0, Broadcast
types of IP datagram. address 172.16.255.255
View Answer
9. IPv6 does not use ________ type of address
a) Broadcast Answer: b
b) Multicast Explanation: Class B is the address of IP code
c) Any cast 172.16.13.5
d) None of the mentioned
View Answer 3. If you wanted to have 12 subnets with a Class
C network ID, which subnet mask would you
Answer: a use?
Explanation: Broadcast has been eliminated in a) 255.255.255.252
IPv6. b) 255.255.255.255
c) 255.255.255.240
10. Which are the features present in IPv4 but d) 255.255.255.248
not in IPv6? View Answer
a) Fragmentation
b) Header checksum Answer: c
c) Options Explanation: If you have eight networks and
d) All of the mentioned each requires 10 hosts, you would use the Class
View Answer C mask of 255.255.255.240. Why? Because 240
in binary is 11110000, which means you have
Answer: d four subnet bits and four host bits. Using our
Explanation: All the features are only present in math, we’d get the following:
IPv4 and not IPv6. 24-2=14 subnets
24-2=14 hosts.
1. Which of the following is the broadcast
address for a Class B network ID using the 4. The combination of _________ and
default subnetmask? __________ is often termed the local address of
a) 172.16.10.255 the local portion of the IP address.
b) 255.255.255.255 a) Network number and host number
c) 172.16.255.255 b) Network number and subnet number
c) Subnet number and host number
58
d) Host number 8. Which of the following are Gigabit Ethernets?
View Answer a) 1000 BASE-SX
b) 1000 BASE-LX
Answer: c c) 1000 BASE-CX
Explanation: Sub networking is implemented for d) all of the above
remote sensing in transparent way from that a View Answer
host contains the sub network which called local
operation. Answer: d
Explanation: In computer networking, Gigabit
5. _________ implies that all subnets obtained Ethernet (GbE or 1 GigE) is a term describing
from the same subnet mask. various technologies for transmitting Ethernet
a) Static subnetting frames at a rate of a gigabit per second
b) Dynamic subnetting (1,000,000,000 bits per second), as defined by
c) Variable length subnetting the IEEE 802.3-2008 standard. It came into use
d) Both Dynamic subnetting and Variable length beginning in 1999, gradually supplanting Fast
subnetting Ethernet in wired local networks, as a result of
View Answer being considerably faster.
59
1.A network administrator is connecting hosts A Answer: c
and B directly through their Ethernet interfaces, Explanation: The router’s IP address on the E0
as shown in the illustration. Ping attempts interface is 172.16.2.1/23, which is
between the hosts are unsuccessful. What can be 255.255.254.0. This makes the third octet a
done to provide connectivity between the hosts? block size of 2. The router’s interface is in the
2.0 subnet, and the broadcast address is 3.255
because the next subnet is 4.0. The valid host
range is 2.1 through 3.254. The router is using
the first valid host address in the range.
2. Your router has the following IP address on 4. What is the maximum number of IP addresses
Ethernet0: 172.16.2.1/23. Which of the that can be assigned to hosts on a local subnet
following can be valid host IDs on the LAN that uses the 255.255.255.224 subnet mask?
interface attached to the router? a) 14
1. 172.16.1.100 b) 15
2. 172.16.1.198 c) 16
3. 172.16.2.255 d) 30
4. 172.16.3.0 View Answer
a) 1 only
b) 2 and 3 only Answer: d
c) 3 and 4 only Explanation: A /27 (255.255.255.224) is 3 bits
d) None of the mentioned on and 5 bits off. This provides 8 subnets, each
View Answer with 30 hosts. Does it matter if this mask is used
60
with a Class A, B, or C network address? Not at Used with a Class B network, the third and
all. The number of host bits would never change. fourth octets are used for subnetting with a total
of 9 subnet bits, 8 bits in the third octet and 1 bit
5. You need to subnet a network that has 5 in the fourth octet. Since there is only 1 bit in the
subnets, each with at least 16 hosts. Wohich fourth octet, the bit is either off or on-which is a
classful subnet mask would you use value of 0 or 128. The host in the question is in
a) 255.255.255.192 the 0 subnet, which has a broadcast address of
b) 255.255.255.224 127 since 128 is the next subnet
c) 255.255.255.240
d) 255.255.255.248 8. You have an interface on a router with the IP
View Answer address of 192.168.192.10/29. Including the
router interface, how many hosts can have IP
Answer: b addresses on the LAN attached to the router
Explanation: You need 5 subnets, each with at interface?
least 16 hosts. The mask 255.255.255.240 a) 6
provides 16 subnets with 14 hosts-this will not b) 8
work. The mask 255.255.255.224 provides 8 c) 30
subnets, each with 30 hosts. This is the best d) 32
answer. View Answer
61
Answer: b Answer: b
Explanation: A CIDR address of /19 is Explanation: The network address can be up to
255.255.224.0. This is a Class B address, so that 16 hexadecimal digits in length. The node
is only 3 subnet bits, but it provides 13 host bits, number is 12hexadecimal digits. The node
or 8 subnets, each with 8,190 hosts. address is usually the MAC address. An
example IPXaddress is 4a1d.0000.0c56.de33.
1. Which type of Ethernet framing is used for The network part is 4a1d. The node part
TCP/IP and DEC net? is0000.0c56.de33. The network number is
a) Ethernet 802.3 assigned by the system administrator of
b) Ethernet 802.2 theNovell network.
c) Ethernet II
d) Ethernet SNAP 4. Which NetWare protocol works on layer 3–
View Answer network layer—of the OSI model?
a) IPX
Answer: c b) NCP
Explanation: Ethernet 802.3 is used with c) SPX
NetWare versions 2 through 3.11, Ethernet d) NetBIOS
802.2 is used withNetWare 3.12 and later plus View Answer
OSI routing, Ethernet II is used with TCP/IP and
DEC net,and Ethernet SNAP is used with Answer: a
TCP/IP and AppleTalk. Explanation: IPX (Internetwork Packet
Exchange) is a NetWare network layer 3
2. You are a system administrator on a NetWare protocol used fortransferring information on
network, you are runningNetWare 4.11 and you LANs.
cannot communicate with your router. What is
the likelyproblem? 5. Which NetWare protocol provides link-state
a) NetWare 4.11 defaults to 802.2 encapsulation routing?
b) NetWare 4.11 defaults to 802.3 encapsulation a) NLSP
c) Cisco routers only work with NetWare 3.11 b) RIP
d) NetWare 3.11 defaults to 802.2 encapsulation c) SAP
View Answer d) NCP
View Answer
Answer: a
Explanation: The default encapsulation on Cisco Answer: a
routers is Novell Ethernet_802.3 and NetWare Explanation: NetWare Link Services Protocol
3.12and later defaults to 802.2 encapsulation, (NLSP) provides link-state routing. SAP
3.11 and earlier defaults to 802.3. (Service Advertisement Protocol) advertises
network services. NCP (NetWare Core
3. NetWare IPX addressing uses a network Protocol)provides client-to-server connections
number and a node number. Which statement is and applications. RIP is a distance vector
not true? routingprotocol.
a) The network address is administratively
assigned and can be up to 16 hexadecimal digits 6. As a system administrator, you want to debug
long IGRP but are worried that the
b) The node address is always administratively “debug IP IGRP transaction” command will
assigned flood the console. What is the command
c) The node address is usually the MAC address that you should use?
d) If the MAC address is used as the node a) Debug IP IGRP event
address, then IPX eliminates the use of ARP b) Debug IP IGRP-events
View Answer c) Debug IP IGRP summary
62
d) Debug IP IGRP events b) Interface Ethernet 0 IPX encapsulation
View Answer Novell-ether IPX network 9e interface
Ethernet 0 IPX encapsulation sap IPX network
Answer: d 6c
Explanation: The “debug IP IGRP events” is c) Interface Ethernet 0.1 IPX encapsulation
used to only display a summary of IGRP routing Novell-ether interface Ethernet 0.2 IPX
information. You can append an IP address onto encapsulation sap
either command to see only the IGRP d) Interface Ethernet 0.1ipx encapsulation
updates from a neighbor. Novell-ether IPX network 9e interface
Ethernet 0.2 IPX encapsulation sap IPX network
7. What does the following series of commands 6c
accomplish? RouterIGRP 71 network View Answer
10.0.0.0 router IGRP 109 network 172.68.7.0
a) It isolates networks 10.0.0.0 and 172.68.7.0 Answer: d
b) It loads IGRP for networks 109 and 71 Explanation: The following commands setup the
c) It disables RIP sub interfaces to allow for two types of
d) It disables all routing protocols encapsulation:interface Ethernet 0.1 IPX
View Answer encapsulation Novell-ether IPX network 9e
interface Ethernet0.2 IPX encapsulation sap IPX
Answer: a network 6c.
Explanation: It isolates network 10.0.0.0 and
172.68.7.0 and associates autonomous systems 10. What does the “IPX maximum-paths 2”
109 and71 with IGRP. IGRP does not disable command accomplish?
RIP, both can be used at the same time. a) It enables load sharing on 2 paths if the paths
are equal metric paths
8. The “IPX delay number” command will allow b) It sets up routing to go to network 2
an administrator to change the c) It is the default for Cisco IPX load sharing
default settings. What are the default settings? d) It enables load sharing on 2 paths if the paths
a) For LAN interfaces, one tick; for WAN are unequal metric paths
interfaces, six ticks View Answer
b) For LAN interfaces, six ticks; for WAN
interfaces, one tick Answer: a
c) For LAN interfaces, zero ticks; for WAN Explanation: It enables load sharing on 2 paths if
interfaces, five ticks the paths are equal metric paths. The default is 1
d) For LAN interfaces, five ticks; for WAN pathand the maximum is 512 paths.
interfaces, zero Ticks
View Answer 11. You want to enable both arpa and snap
encapsulation on one router interface.
Answer: a How do you do this?
Explanation: The default is–for LAN interfaces, a) The interface can handle multiple
one tick; for WAN interfaces, six ticks encapsulation types with no extra configuration
b) Assign two network numbers, one for each
9. As a system administrator, you need to set up encapsulation type
one Ethernet interface on the Cisco c) Enable Novell-ether to run multiple
router to allow for both sap and Novell-ether encapsulation types
encapsulations. Which set of d) Both arpa and snap are enabled by default so
commands will accomplish this? you don’t have to configure anything
a) Interface Ethernet 0.1 IPX encapsulation View Answer
Novell-ether IPX network 9e interface
Ethernet 0.2 IPX network 6c
63
Answer: b d) Debug IP route
Explanation: To assign multiple network View Answer
numbers, you usually use sub interfaces. A
sample configuration follows: IPXEthernet 0.1 Answer: b
IPX encapsulation novell-ether ipx network 9e Explanation: The debug IP rip command is used
interface ethernet 0.2 ipx encapsulation sap ipx to show the Internet Protocol (IP) Routing
network 6c Information Protocol (RIP) updates being sent
and received on the router.
12. By default, Cisco routers forward GNS
SAPs to remote networks. 4. Two connected routers are configured with
a) False RIP routing. What will be the result when a
b) True router receives a routing update that contains a
View Answer higher-cost path to a network already in its
routing table?
Answer: a a) The updated information will be added to the
Explanation: GNS is Novell’s protocol to Get existing routing table Debug IP rip
Nearest Server. If there is a server on the local b) The update will be ignored and no further
network,that server will respond. If there isn’t, action will occur Debug IP route
the Cisco router has to be configured to forward c) The updated information will replace the
theGNS SAP. existing routing table entry
d) The existing routing table entry will be
1. Which protocol should you select if the deleted from the routing table and all routers
network diameter is more than 17 hops? will exchange routing updates to reach
a) RIPv1 convergence
b) RIPv2 View Answer
c) EIGRP
d) Both RIPv1 and RIPv2 Answer: b
View Answer Explanation: When a routing update is received
by a router, the router first checks the
Answer: a administrative distance (AD) and always
Explanation: RIP v1 has network diameter is chooses the route with the lowest AD. However,
more than 17 hopes. if two routes are received and they both have the
same AD, then the router will choose the one
2. How often does a RIPv1 router broadcast its route with the lowest metrics, or in RIP’s case,
routing table by default? hop count.
a) Every 30 seconds
b) Every 60 seconds 5. You type debug IP rip on your router console
c) Every 90 seconds and see that 172.16.10.0 is being advertised to
d) RIPv1 does not broadcast periodically you with a metric of 16. What does this mean?
View Answer a) The route is 16 hops away Debug IP rip
b) The route has a delay of 16 microseconds
Answer: a Debug IP route
Explanation: Every 30 seconds RIPv1 router c) The route is inaccessible
broadcast its routing table by default. d) The route is queued at 16 messages a second
View Answer
3. Which command displays RIP routing
updates? Answer: c
a) Show IP route Explanation: You cannot have 16 hops on a RIP
b) Debug IP rip network by default. If you receive a route
c) Show protocols
64
advertised with a metric of 16, this means it is Answer: b
inaccessible. Explanation: Use of variable length subnet
masks is permittedis true regarding classless
6. Default administrative distance of Static routing protocol.
Route
a) 0 10. Where we should use default routing
b) 90 a) On stub networks- which have only one exit
c) 100 path out of the network
d) 1 b) Which have more than one exit path out of
View Answer the network
c) Minimum five exit paths out of the network
Answer: d d) None of the mentioned
Explanation: 1 is the default administrative View Answer
distance of Static Route.
Answer: a
7. Which protocol gives a full route table update Explanation: On stub networks- which have only
every 30 seconds? one exit path out of the networkuse default
a) IEGRP routing.
b) RIP
c) both IEGRP and RIP 1. Which statement is true regarding classless
d) none of the mentioned routing protocols?
View Answer a) The use of discontinuous networks is not
allowed
Answer: b b) The use of variable length subnet masks is
Explanation: RIP gives a full route table update permitted
every 30 seconds. c) RIPv1 is a classless routing protocol
d) RIPv2 supports classless routing
8. Default administrative distance of RIP View Answer
a) 0
b) 90 Answer: b
c) 120 Explanation: Classful routing means that all
d) 130 hosts in the internetwork use the same mask.
View Answer Classless routing means that you can use
Variable Length Subnet Masks (VLSMs) and
Answer: c can also support discontinuous networking.
Explanation: Default administrative distance of
RIP is 120. 2. What is route poisoning?
a) It sends back the protocol received from a
9. Which statement is true regarding classless router as a poison pill, which stops the regular
routing protocol? updates. The use of variable length subnet masks
a) The use of discontinuous networks is not is permitted
allowed b) It is information received from a router that
b) Use of variable length subnet masks is can’t be sent back to the originating
permitted router.RIPv2 supports classless routing
c) RIPv1 is a classless routing protocol c) It prevents regular update messages from
d) IGRP supports classes routing within the reinstating a route that has just come up
same autonomous system d) It describes when a router sets the metric for a
View Answer downed link to infinity
View Answer
65
Answer: d 6. Which is a reason for avoiding doing route
Explanation: When a network goes down, the redistribution on two routers between the same
distance-vector routing protocol initiates route two routing domains?
poisoning by advertising the network with a a) Higher cost of two routers
metric of 16, or unreachable. b) Routing feedback
c) Cisco IOS incompatibility
3. Which of the following is true regarding d) Not possible to use two routers
RIPv2? View Answer
a) It has a lower administrative distance than
RIPv1 Answer: b
b) It converges faster than RIPv1 Explanation: Routing feedback is a reason for
c) It has the same timers as RIPv1 avoiding doing route redistribution on two
d) It is harder to configure than RIPv1 routers between the same two routing domains.
View Answer
7. What does administrative distance rank?
Answer: c a) Metrics
Explanation: RIPv2 is pretty much just like b) Sources of routing information
RIPv1. It has the same administrative distance c) Router reliability
and timers and is configured just like RIPv1. d) Best paths
View Answer
4. Which of the situations might not require
require multiple routing protocols in a network? Answer: b
a) When a new Layer 2-only switch is added to Explanation: Sources of routing information is
the network the administrative distance rank.
b) When you are migrating from one routing
protocol to another 8. Which protocol maintains neighbor
c) When you are using routers from multiple adjacencies?
vendors a) RIPv2 and EIGRP
d) When there are host-based routers from b) IGRP and EIGRP
multiple vendors c) RIPv2
View Answer d) EIGRP
View Answer
Answer: a
Explanation: One routing protocol to another, Answer: c
routers from multiple vendors,host-based routers Explanation: RIP V2 maintains neighbor
from multiple vendors. adjacencies.
5. Which two routing protocols can be 9. Which routing protocol implements the
redistributed into OSPF by a Cisco router? diffusing update algorithm?
a) IP EIGRP and AppleTalk EIGRP a) IS-IS
b) AppleTalk EIGRP and RIPv2 b) IGRP
c) RIPv2 and IP EIGRP c) EIGRP
d) IPX RIP & AppleTalk EIGRP d) OSPF
View Answer View Answer
Answer: c Answer: c
Explanation: IP EIGRP, RIPv2. These can be Explanation: EIGRProuting protocol implements
redistributed into OSPF by a Cisco router. the diffusing update algorithm.
66
10. Which protocol should you select if the c) both transpositional ciphers and substitution
network diameter is more than 17 hops? ciphers
a) RIPv1 d) none of the mentioned
b) RIPv2 View Answer
c) EIGRP
d) All of the above Answer: a
View Answer Explanation: None.
67
9. ElGamal encryption system is d) None of the mentioned
a) symmetric key encryption algorithm View Answer
b) asymmetric key encryption algorithm
c) not an encryption algorithm Answer: a
d) none of the mentioned Explanation: HTTP resources are located by
View Answer uniform resource identifier.
68
7. In FTP protocol, client contacts server using b) Public Socket accept ()
_________ as the transport protocol. c) Public synchronized void close ()
a) Transmission control protocol d) None of the mentioned
b) User datagram protocol View Answer
c) Datagram congestion control protocol
d) Stream control transmission protocol Answer: b
View Answer Explanation: Public Socket accept () used in
Server Socket class.
Answer: a
Explanation: Client contacts server using TCP as 2. Which constructor of Datagram Socket class
the transport protocol. is used to create a datagram socket and binds it
with the given Port Number?
8. In which mode FTP, the client initiates both a) Datagram Socket(int port)
the control and data connections. b) Datagram Socket(int port, Int Address
a) Active mode address)
b) Passive mode c) Datagram Socket()
c) Both Active mode and Passive mode d) None of the mentioned
d) None of the mentioned View Answer
View Answer
Answer: b
Answer: b Explanation: Datagram Socket (int port, Int
Explanation: In passive mode the client initiates Address address) is use data create a datagram
both the control and data connections. socket.
9. The file transfer protocol is built on 3. The client in socket programming must know
a) Data centric architecture which information?
b) Service oriented architecture a) IP address of Server
c) Client server architecture b) Port number
d) None of the mentioned c) Both IP address of Server & Port number
View Answer d) None of the mentioned
View Answer
Answer: c
Explanation: FTP is built on client server Answer: c
architecture. Explanation: The client in socket programming
must know IP address of Server.
10. In file transfer protocol, data transfer can be
done in 4. The URL Connection class can be used to
a) Stream mode read and write data to the specified resource
b) Block mode referred by the URL
c) Compressed mode a) True
d) All of the mentioned b) False
View Answer View Answer
Answer: d Answer: a
Explanation: Data transfer can be done in Explanation: The URL Connection class can be
stream, block and compressed modes. used to read and write data to the specified
resource referred by the URL.
1. Which methods are commonly used in Server
Socket class? 5. Datagram is basically an information but there
a) Public Output Stream get Output Stream () is no guarantee of its content, arrival or arrival
69
time. d) None of the mentioned
a) True View Answer
b) False
View Answer Answer: c
Explanation: Datagram Socket, Datagram Packet
Answer: a are used for connection-less socket
Explanation: Datagram is basically an programming.
information but there is no guarantee of its
content, arrival or arrival time. 10. In Int Address class which method returns
the host name of the IP Address?
6. TCP, FTP, Telnet, SMTP, POP etc. are a) Public String get Hostname()
examples of? b) Public String getHostAddress()
a) Socket c) Public static IntAddress get Localhost()
b) IP Address d) None of the mentioned
c) Protocol View Answer
d) MAC Address
View Answer Answer: a
Explanation: In Int Address class public String
Answer: c get Hostname() method returns the host name of
Explanation: TCP, FTP, Telnet, SMTP, POP etc. the IP Address.
are examples of Protocol.
1. Cookies were originally designed for
7. What does the java.net.InetAddress class a) Client side programming
represent? b) Server side programming
a) Socket c) Both Client side programming and Server side
b) IP Address programming
c) Protocol d) None of the mentioned
d) MAC Address View Answer
View Answer
Answer: b
Answer: b Explanation: Cookies were originally designed
Explanation: The java.net.InetAddress class for server side programming, and at the lowest
represent IP Address. level, they are implemented as an extension to
the HTTP protocol.
8. The flush () method of Print Stream class
flushes any un cleared buffers in memory 2. The Cookie manipulation is done using which
a) True property?
b) False a) cookie
View Answer b) cookies
c) manipulate
Answer: a d) none of the mentioned
Explanation: The flush () method of Print View Answer
Stream class flushes any un cleared buffers in
memory. Answer: a
Explanation: There are no methods involved:
9. Which classes are used for connection-less cookies are queried, set, and deleted by reading
socket programming? and Writing the cookie property of the
a) Datagram Socket Document object using specially formatted
b) Datagram Packet strings.
c) Both Datagram Socket & Datagram Packet
70
3. Which of the following explains Cookies d) None of the mentioned
nature? View Answer
a) Non Volatile
b) Volatile Answer: d
c) Intransient Explanation: The Cookie visibility scope is
d) Transient configurable through cookie attributes path and
View Answer domain.
71
Answer: a c) Both of the mentioned
Explanation: Cookie values cannot include d) None of the mentioned
semicolons, commas, or whitespace. For this View Answer
reason, you may want to use the core JavaScript
global function encodeURIComponent() to Answer: C
encode the value before storing it in the cookie. Explanation: Both of the above options are
correct.
10. What is the constraint on the data per
cookie? 4. Which of the following HTTP method should
a) 2 KB be idempotent in nature?
b) 1 KB a) OPTIONS
c) 4 KB b) DELETE
d) 3 KB c) POST
View Answer d) HEAD
View Answer
Answer: c
Explanation: Each cookie can hold upto only 4 Answer: b
KB. In practice, browsers allow many more than Explanation: DELETE operations should be
300 cookies total, but the 4 KB size limit may idempotent, means their result will always same
still be enforced by some. no matter how many times these operations are
invoked.
1. What REST stands for?
a) Represent State Transfer 5. Which of the following directive of Cache
b) Representational State Transfer Control Header of HTTP response indicates that
c) Represent State Transfer resource is cachable by only client and server?
d) None of the mentioned a) Public
View Answer b) Private
c) Nocache/nostore
Answer: b d) Maxage
Explanation: REST stands for Representational View Answer
State Transfer.
Answer: b
2. Which of the following protocol is used by Explanation: Private directive indicates that
Restful web services as a medium of resource is cachable by only client and server,
communication between client and server? no intermediary can cache the resource.
a) HTTP
b) FTP 6. Which of the following HTTP Status code
c) Gopher means CREATED, when a resource is
d) None of the mentioned successful created using POST or PUT request?
View Answer a) 200
b) 201
Answer: a c) 204
Explanation: Restful web services make use of d) 304
HTTP protocol as a medium of communication View Answer
between client and server.
Answer: b
3. Which of the following is a best practice to Explanation: HTTP Status Code 201 means
create a standard URI for a web service? CREATED, when a resource is successful
a) Maintain Backward Compatibility created using POST or PUT request.
b) Use HTTP Verb
72
7. Which of the following annotation of JAX RS a) Delayed
API is used to annotate a method used to create b) Urgent
resource? c) Forwarding
a) @Path d) Delivering
b) @GET View Answer
c) @PUT
d) @POST Answer: c
View Answer Explanation: It is for transforming the message
from source to destination with forward
Answer: C technique.
Explanation: @PUT – HTTP Get request, used
to create resource. 2. A second technique to reduce routing table
and simplify searching process is called
8. Which of the following annotation of JAX RS a) Network-Specific Method
API binds the parameter passed to method to a b) Network-Specific Motion
HTTP matrix parameter in path? c) Network-Specific Maintaining
a) @PathParam d) Network-Specific Membership
b) @QueryParam View Answer
c) @MatrixParam
d) @HeaderParam Answer: a
View Answer Explanation: It is the before method of the
packet switching.
Answer: c
Explanation: @MatrixParam – Binds the 3. Next-Hop Method is used to reduce contents
parameter passed to method to a HTTP matrix of a
parameter in path. a) Revolving table
b) Rotating Table
9. In REST architecture, a REST Server simply c) Routing Table
provides access to resources and REST client d) Re-allocate table
accesses and presents the resources. View Answer
a) False
b) True Answer: c
View Answer Explanation: This method is for creating the
shortest distances.
Answer: b
Explanation: In REST architecture, a REST 4. Several techniques can make size of routing
Server simply provides access to resources and table manageable and also handle issues such as
REST client accesses and presents the resources. a) Maturity
b) Error reporting
10. POST operations should be idempotent. c) Tunneling
a) True d) Security
b) False View Answer
View Answer
Answer: d
Answer: b Explanation: To visible only accessing sub
Explanation: POST operation can cause different networks.
result.
5. Host-specific routing is used for purposes
1. Term is used to place packet in its route to its such as checking route or providing
destination is called a) Network Measures
73
b) Security Measures Answer: a
c) Routing Measures Explanation: Reverse Path Forwarding.
d) Delivery Measures
View Answer 10. LSP stands for
a) Link Stable Packet
Answer: b b) Link State Packet
Explanation: Security measures. c) Link State Protocol
d) Link State Path
6. In Unicast routing, if instability is between View Answer
three nodes, stability cannot be
a) Stable Answer: b
b) Reversed Explanation: Link State Packet
c) Guaranteed
d) Forward 1. IPSec is designed to provide the security at
View Answer the
a) transport layer
Answer: c b) network layer
Explanation: It is only for unidirectional. c) application layer
d) session layer
7. In Unicast Routing, Dijkstra algorithm creates View Answer
a shortest path tree from a
a) Graph Answer: b
b) Tree Explanation: None.
c) Network
d) Link 2. In tunnel mode IPsec protects the
View Answer a) Entire IP packet
b) IP header
Answer: a c) IP payload
Explanation: Graph technique is used for best d) None of the mentioned
node finding technic with shortest path View Answer
algorithms.
Answer: a
8. In Multicast Routing Protocol, flooding is Explanation: None.
used to broadcast packets but it creates
a) Gaps 3. Network layer firewall works as a
b) Loops a) frame filter
c) Holes b) packet filter
d) Links c) both frame filter and packet filter
View Answer d) none of the mentioned
View Answer
Answer: b
Explanation: Loops is for multicast routing. Answer: b
Explanation: None.
9. RPF stands for
a) Reverse Path Forwarding 4. Network layer firewall has two sub-categories
b) Reverse Path Failure as
c) Reverse Packet Forwarding a) stateful firewall and stateless firewall
d) Reverse Protocol Failure b) bit oriented firewall and byte oriented firewall
View Answer c) frame firewall and packet firewall
74
d) none of the mentioned a) international data encryption algorithm
View Answer b) private data encryption algorithm
c) intrenet data encryption algorithm
Answer: a d) none of the mentioned
Explanation: None. View Answer
9. PGP encrypts data by using a block cipher 3. Which of the following is false with respect to
called the features of OSPF
75
a) Support for fixed-length sunbathing by d) 2-1-3
including the subnet mask in the routing View Answer
message
b) More flexible link cost than can range from 1 Answer: b
to 65535 Explanation: None.
c) Use of designated router
d) Distribution of traffic over multiple paths that 7. In OSPF header, which field is used to detect
have equal cost to the destination errors in the packet?
View Answer a) Type
b) Area ID
Answer: a c) Authentication type
Explanation: Support for variable-length d) Checksum
sunbathing by including the subnet mask in the View Answer
routing message.
Answer: c
4. In OSPF, which protocol is used to discover Explanation: Checksum field is used to detect
neighbour routers automatically? errors.
a) Link state protocol
b) Error-correction protocol 8. In OSPF database descriptor packet, if more
c) Routing information protocol database descriptor packet flows, ‘M’ field is set
d) Hello protocol to
View Answer a) 1
b) 0
Answer: d c) more
Explanation: Hello protocol is used to discover d) none
neighbour routers automatically. View Answer
76
Answer: c d) floods the LSA to the other routers
Explanation: Sequence number field is used to View Answer
detect a missing packet.
Answer: c
1. An OSPF router receives an LSA, the router Explanation: An OSPF router receives an LSA.
checks its sequence number, and this The router checks its sequence number and finds
number matches the sequence number of the that this number is lower than the sequence
LSA that the receiving router already has. number sends newer LSU update to source
What does the receiving router do with the router.
LSA?
a) Ignores the LSA 4. Each LSA has its own age timer. By default,
b) Adds it to the database how long does an LSA wait before requiring an
c) Sends newer LSU update to source router update?
d) Floods the LSA to the other routers a) 30 seconds
View Answer b) 1 minute
c) 30 minutes
Answer: a d) 1 hour
Explanation: An OSPF router receives an LSA, View Answer
the router checks its sequence number, and this
number matches the sequence number of the Answer: c
LSA that the receiving router already has Explanation: Each LSA has its own age timer.
Ignores the LSA. By default, 30 minutes does an LSA wait before
requiring an update.
2. An OSPF router receives an LSA. The router
checks its sequence number and finds that 5. Distance vector protocols use the concept of
this number is higher than the sequence number split horizon, but link-state routing protocols,
it already has. Which two tasks does such as OSPF, do not.
the router perform with the LSA? a) True
a) Ignores the LSA b) False
b) Adds it to the database View Answer
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers Answer: b
View Answer Explanation: Distance vector protocols use the
concept of split horizon, but link-state routing
Answer: b protocols, such as OSPF, do not use this.
Explanation: An OSPF router receives an LSA.
The router checks its sequence number and finds 6. The outcome of Dijkstra’s calculation is used
that this number is higher than the sequence to populate the __________
number Adds it to the database, Floods the LSA a) Topology table
to the other routers. b) Routing table
c) Neighbor table
3. An OSPF router receives an LSA. The router d) Adjacency table
checks its sequence number and finds that View Answer
this number is lower than the sequence number
it already has. What does the router do Answer: b
with the LSA? Explanation: The outcome of Dijkstra’s
a) ignores the LSA calculation is used to populate the Routing table.
b) adds it to the database
c) sends newer LSU update to source router 7. What is the IP protocol number for OSPF
packets?
77
a) 89 d) Two-way
b) 86 View Answer
c) 20
d) 76 Answer: a
View Answer Explanation: DBD packets are involved during
which two states Exstart, Exchange.
Answer: a
Explanation: 89 is the IP protocol number for 12. At which interval does OSPF refresh LSAs?
OSPF packets. a) 10 seconds
b) 30 seconds
8. Which packet is NOT an OSPF packet type? c) 30 minutes
a) LSU d) 1 hour
b) LSR View Answer
c) DBD
d) Query Answer: d
View Answer Explanation: None.
advertisement
Answer: d
Explanation: Query packet is NOT an OSPF 13. Which field is NOT a field within an OSPF
packet type. packet header?
a) Packet length
9. Which multicast address does the OSPF Hello b) Router ID
protocol use? c) Authentication type
a) 224.0.0.5 d) Maxage time
b) 224.0.0.6 View Answer
c) 224.0.0.7
d) 224.0.0.8 Answer: d
View Answer Explanation: Maxage timeis NOT a field within
an OSPF packet header.
Answer: a
Explanation: 224.0.0.5 is the multicast address 14. Which two commands are required for basic
does the OSPF Hello protocol use. OSPF configuration?
a) Network ip-address mask area area-id
10. The Hello protocol sends periodic updates to b) Network ip-address wildcard-mask area area-
ensure that a neighbor relationship is maintained id
between adjacent routers. c) Router ospf process-id
a) True d) both Network ip-address wildcard-mask area
b) False area-id and Router ospf process-id
View Answer View Answer
Answer: a Answer: d
Explanation: The Hello protocol sends periodic Explanation: Network ip-address wildcard-mask
updates to ensure that a neighbor relationship is area area-id, Router ospf process-id are required
maintained between adjacent routers. for basic OSPF configuration.
11. DBD packets are involved during which two 15. Which OSPF show command describes a list
states? of OSPF adjacencies?
a) Exstart a) Show ipospf interface
b) Loading b) Show ipospf
c) Exchange c) Show ip route
78
d) Show ipospf neighbor Answer: c
View Answer Explanation: Routing table is used to route the
packets to their destinations.
Answer: d
Explanation: Show ipospf neighborOSPF show 5. The main contents of the routing table in
command describes a list of OSPF adjacencies. datagram networks are
a) Source and Destination address
1. Datagram switching is done at which layer of b) Destination address and Output port
OSI model? c) Source address and Output port
a) Network layer d) Input port and Output port
b) Physical layer View Answer
c) Application layer
d) Transport layer Answer: b
View Answer Explanation: Routing table contains destination
address and output port to route the packets to
Answer: a their destinations.
Explanation: Datagram switching is normally
done at network layer. 6. Which of the following remains same in the
header of the packet in a datagram network
2. Packets in datagram switching are referred to during the entire journey of the packet?
as a) Destination address
a) Switches b) Source address
b) Segments c) Checksum
c) Datagrams d) Padding
d) Data-packets View Answer
View Answer
Answer: a
Answer: c Explanation: Destination address remains same
Explanation: As the name suggests, in datagram in the header during the entire journey of the
switching packets are called as datagrams. packet.
3. Datagram networks mainly refers to 7. Which of the following is true with respect to
a) Connection oriented networks the delay in datagram networks?
b) Connection less networks a) Delay is greater than in a virtual circuit
c) Telephone networks network
d) Internetwork b) Each packet may experience a wait at a
View Answer switch
c) Delay is not uniform for the packets of a
Answer: b message
Explanation: The switch does not keep the d) All of the mentioned
information about the connection state, hence it View Answer
is connection less.
Answer: d
4. Datagrams are routed to their destinations Explanation: All the options are true with
with the help of respect to the delay in datagram networks.
a) Switch table
b) Segments table 8. During datagram switching, the packets are
c) Datagram table placed in __________ to wait until the given
d) Routing table transmission line becomes available.
View Answer a) Stack
79
b) Queue access to your internal, trusted network from
c) Hash outside threats.
d) Routing table
View Answer 2. Network layer firewall has two sub-categories
as
Answer: b a) State full firewall and stateless firewall
Explanation: Packets are stored in queue during b) Bit oriented firewall and byte oriented
delay and are served as first in first out. firewall
c) Frame firewall and packet firewall
9. The probability of the error in a transmitted d) None of the mentioned
block _________ with the length of the block View Answer
a) Remains same
b) Decreases Answer: a
c) Increases Explanation: Most network layer firewalls can
d) None of the mentioned operate as stateful or stateless firewalls, creating
View Answer two subcategories of the standard network layer
firewall. Stateful firewalls have the advantage of
Answer: c being able to track packets over a period of time
Explanation: Probability of the error in a for greater analysis and accuracy — but they
transmitted block increases with the length of require more memory and operate more slowly.
the block. Stateless firewalls do not analyze past traffic and
can be useful for systems where speed is more
10. Which of the following is true with respect important than security, or for systems that have
to the datagram networks? very specific and limited needs. For example, a
a) Number of flows of packets are not limited computer that only needs to connect to a
b) Packets may not be in order at the destination particular backup server does not need the extra
c) Path is not reserved security of a stateful firewall.
d) All of the mentioned
View Answer 3. A firewall is installed at the point where the
secure internal network and untrusted external
Answer: d network meet which is also known as
Explanation: All are the facts with respect to the __________
datagram networks. a) Chock point
b) Meeting point
1. Network layer firewall works as a c) Firewall point
a) Frame filter d) Secure point
b) Packet filter View Answer
c) Both Frame as well as Packet filter
d) None of the mentioned Answer: a
View Answer Explanation: A firewall can be a PC, a router, a
midrange, a mainframe, a UNIX workstation, or
Answer: b a combination of these that determines which
Explanation: As you know, firewalls are information or services can be accessed from the
available as hardware appliances, as software- outside and who is permitted to use the
only, or a combination of the two. In every case, information and services from outside.
the purpose of a firewall is to isolate your trusted Generally, a firewall is installed at the point
internal network (or your personal PC) from the where the secure internal network and untrusted
dangers of unknown resources on the Internet external network meet, which is also known as a
and other network connections that may be chokepoint.
harmful. The firewall prevents unauthorized
80
4. Which of the following is / are the types of assumed not to be secure or trusted.[2] Firewalls
firewall? are often categorized as either network firewalls
a) Packet Filtering Firewall or host-based firewalls.
b) Dual Homed Gateway Firewall
c) Screen Host Firewall 7. What is one advantage of setting up a DMZ
d) All of the mentioned with two firewalls?
View Answer a) You can control where traffic goes in three
networks
Answer: a b) You can do stateful packet filtering
Explanation: A firewall can be a PC, a c) You can do load balancing
midrange, a mainframe, a UNIX workstation, a d) Improved network performance
router, or combination of these. Depending on View Answer
the requirements, a firewall can consist of one or
more of the following functional components: Answer: c
Packet-filtering router Explanation: In a topology with a single firewall
serving both internal and external users (LAN
5. A proxy firewall filters at? and WAN), it acts as a shared resource for these
a) Physical layer two zones.
b) Data link layer
c) Network layer 8. What tells a firewall how to reassemble a data
d) Application layer stream that has been divided into packets?
View Answer a) The source routing future
b) The number in the header’s identification
Answer: d field
Explanation: The application firewall is typically c) The destination IP address
built to control all network traffic on any layer d) The header checksum field in the packet
up to the application layer. It is able to control header
applications or services specifically, unlike a View Answer
stateful network firewall, which is – without
additional software – unable to control network Answer: a
traffic regarding a specific application. There are Explanation: source routing future.
two primary categories of application firewalls,
network-based application firewalls and host- 9. A stateful firewall maintains a ___________
based application firewalls. which is a list of active connections?
a) Routing table
6. A packet filter firewall filters at? b) Bridging table
a) Physical layer c) State table
b) Data link layer d) Connection table
c) Network layer or Transport layer View Answer
d) Application layer
View Answer Answer: a
Explanation: Routing table with best
Answer: c performance
Explanation: In computing, a firewall is a
network security system that monitors and 10. A firewall needs to be __________ so that it
controls the incoming and outgoing network can grow with the network it protects
traffic based on predetermined security rules.[1] a) Robust
A firewall typically establishes a barrier between b) Expansive
a trusted, secure internal network and another c) Fast
outside network, such as the Internet, that is
81
d) Scalable d) Security Management
View Answer View Answer
Answer: b Answer: d
Explanation: Expansive to block the fake Explanation: In Network Management System, a
subscribers. term that responsible for controlling access to
network based on predefined policy is called
1. Complex networks today are made up of security management.
hundreds and sometimes thousands of
a) Documents 5. Control of users’ access to network resources
b) Components through charges are main responsibilities of
c) Servers a) Reactive Fault Management
d) Entities b) Reconfigured Fault Management
View Answer c) Accounting Management
d) Security Management
Answer: b View Answer
Explanation: Complex networks today are made
up of hundreds and sometimes thousands of Answer: c
components. Explanation: Control of users’ access to network
resources through charges are main
2. Performance management, is closely related responsibilities of accounting management.
to
a) Proactive Fault Management 6. The physical connection between an end point
b) Fault management and a switch or between two switches is
c) Reactive Fault Management a) Transmission path
d) None of the mentioned b) Virtual path
View Answer c) Virtual circuit
d) None of the mentioned
Answer: b View Answer
Explanation: Fault management is called the
performance management. Answer: a
Explanation:bThe physical connection between
3. Configuration management can be divided an end point and a switch or between two
into two subsystems: reconfiguration and switches is transmission path.
a) Documentation
b) Information 7. Which of the following networks supports
c) Servers pipelining effect?
d) Entity a) Circuit-switched networks
View Answer b) Message-switched networks
c) Packet-switched networks
Answer: a d) None of the mentioned
Explanation: Documentation is the other type of View Answer
configuration management.
Answer: c
4. In Network Management System, a term that Explanation: Packet switched network is most
responsible for controlling access to network preferred for pipelining process.
based on predefined policy is called
a) Fault Management 8. In Network Management System, maps track
b) Secured Management each piece of hardware and its connection to the
c) Active Management a) IP Server
82
b) Domain b) Nmap
c) Network c) Route
d) Data d) Ipconfig
View Answer View Answer
Answer: c Answer: b
Explanation: Network is main thing in Explanation: A ping sweep is a method that can
connecting different entities in a place. establish a range of IP addresses which map to
live hosts and are mostly used by network
9. MIB is a collection of groups of objects that scanning tools like nmap.
can be managed by
a) SMTP 3. ICMP is used in
b) UDP a) Ping
c) SNMP b) Traceroute
d) TCP/IP c) Ifconfig
View Answer d) Both Ping & Traceroute
View Answer
Answer: c
Explanation: Simple network management Answer: d
controls the group of objects in management Explanation: None.
interface base.
4. __________ command is used to manipulate
10. A network management system can be TCP/IP routing table.
divided into a) route
a) three categories b) Ipconfig
b) five broad categories c) Ifconfig
c) seven broad categories d) Traceroute
d) ten broad categories View Answer
View Answer
Answer: a
Answer: b Explanation: None.
Explanation: Five broad categories are
• Fault Management 5. If you want to find the number of routers
• Configuration Management between a source and destination, the utility to
• Accounting (Administration) be used is.
• Performance Management a) route
• Security Management. b) Ipconfig
c) Ifconfig
1. Ping can d) Traceroute
a) Measure round-trip time View Answer
b) Report packet loss
c) Report latency Answer: d
d) All of the mentioned Explanation: None.
View Answer
6. Which of the following is related to ipconfig
Answer: d in Microsoft Windows ?
Explanation: None. a) Display all current TCP/IP network
configuration values
2. Ping sweep is a part of b) Modify DHCP settings
a) Traceroute c) Modify DNS settings
83
d) All of the mentioned Answer: b
View Answer Explanation: None.
84
b) twisted pair cable Answer: a
c) optical fiber Explanation: None.
d) none of the mentioned
View Answer 2. In wireless ad-hoc network
a) access point is not required
Answer: c b) access point is must
Explanation: None. c) nodes are not required
d) none of the mentioned
8. The maximum size of payload field in View Answer
ethernet frame is
a) 1000 bytes Answer: a
b) 1200 bytes Explanation: None.
c) 1300 bytes
d) 1500 bytes 3. Which multiple access technique is used by
View Answer IEEE 802.11 standard for wireless LAN?
a) CDMA
Answer: d b) CSMA/CA
Explanation: None. c) ALOHA
d) None of the mentioned
9. What is interframe gap? View Answer
a) idle time between frames
b) idle time between frame bits Answer: b
c) idle time between packets Explanation: None.
d) none of the mentioned
View Answer 4. In wireless distribution system
a) multiple access point are inter-connected with
Answer: a each other
Explanation: None. b) there is no access point
c) only one access point exists
10. An ethernet frame that is less than the IEEE d) none of the mentioned
802.3 minimum length of 64 octets is called View Answer
a) short frame
b) run frame Answer: a
c) mini frame Explanation: None.
d) man frame
View Answer 5. A wireless network interface controller can
work in
Answer: b a) infrastructure mode
Explanation: None. b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
1. What is the access point (AP) in wireless d) none of the mentioned
LAN? View Answer
a) device that allows wireless devices to connect
to a wired network Answer: c
b) wireless devices itself Explanation: In infrastructure mode WNIC
c) both device that allows wireless devices to needs access point but in ad-hoc mode access
connect to a wired network and wireless devices point is not required.
itself
d) none of the mentioned 6. In wireless network an extended service set is
View Answer a set of
85
a) connected basic service sets 1. What is internet?
b) all stations a) a single network
c) all access points b) a vast collection of different networks
d) none of the mentioned c) interconnection of local area networks
View Answer d) none of the mentioned
View Answer
Answer: a
Explanation: None. Answer: b
Explanation: None.
7. Mostly ________ is used in wireless LAN.
a) time division multiplexing 2. To join the internet, the computer has to be
b) orthogonal frequency division multiplexing connected to a
c) space division multiplexing a) internet architecture board
d) none of the mentioned b) internet society
View Answer c) internet service provider
d) none of the mentioned
Answer: b View Answer
Explanation: None.
Answer: c
8. Which one of the following event is not Explanation: None.
possible in wireless LAN.
a) collision detection 3. Internet access by transmitting digital data
b) acknowledgement of data frames over the wires of a local telephone network is
c) multi-mode data transmission provided by
d) none of the mentioned a) leased line
View Answer b) digital subscriber line
c) digital signal line
Answer: a d) none of the mentioned
Explanation: None. View Answer
86
d) None of the mentioned a) ethernet
View Answer b) digital subscriber line
c) fiber distributed data interface
Answer: d d) none of the mentioned
Explanation: None. View Answer
87
Answer: a c) both point-to-point connections and point-to-
Explanation: None. multipoint connection
d) none of the mentioned
5. Unauthorised access of information from a View Answer
wireless device through a bluetooth connection
is called Answer: c
a) bluemaking Explanation: None.
b) bluesnarfing
c) bluestring 10. A scatternet can have maximum
d) none of the mentioned a) 10 piconets
View Answer b) 20 piconets
c) 30 piconets
Answer: b d) 40 piconets
Explanation: None. View Answer
88
4. Which one of the following modulation Answer: a
scheme is supported by WiMAX? Explanation: None.
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation 9. WiMAX is mostly used for
c) quadrature amplitude modulation a) local area network
d) all of the mentioned b) metropolitan area network
View Answer c) personal area network
d) none of the mentioned
Answer: d View Answer
Explanation: None.
Answer: b
5. WiMAX MAC layer provides an interface Explanation: None.
between
a) higher transport layers and physical layer 10. Which one of the following frequency is not
b) application layer and network layer used in WiMAX for communication?
c) data link layer and network layer a) 2.3 GHz
d) none of the mentioned b) 2.4 GHz
View Answer c) 2.5 GHz
d) 3.5 GHz
Answer: a View Answer
Explanation: None.
Answer: b
6. For encryption, WiMAX supports Explanation: None.
a) advanced encryption standard
b) triple data encryption standard 1. SONET stands for
c) both advanced encryption standard and triple a) synchronous optical network
data encryption standard b) synchronous operational network
d) none of the mentioned c) stream optical network
View Answer d) shell operational network
View Answer
Answer: c
Explanation: None. Answer: a
Explanation: None.
7. WiMAX provides
a) VoIP services 2. In SONET, STS-1 level of electrical
b) IPTV services signalling has the data rate of
c) Both VoIP services and IPTV services a) 51.84 Mbps
d) None of the mentioned b) 155.52 Mbps
View Answer c) 466.56 Mbps
d) none of the mentioned
Answer: c View Answer
Explanation: None.
Answer: a
8. Devices that provide the connectivity to a Explanation: None.
WiMAX network are known as
a) subscriber stations 3. The path layer of SONET is responsible for
b) base stations the movement of a signal
c) gateway a) from its optical source to its optical
d) none of the mentioned destination
View Answer b) across a physical line
89
c) across a physical section Answer: c
d) none of the mentioned Explanation: None.
View Answer
8. Automatic protection switching in linear
Answer: b network is defined at the
Explanation: None. a) line layer
b) section layer
4. The photonic layer of the SONET is similar to c) photonic layer
the __________ of OSI model. d) path layer
a) network layer View Answer
b) data link layer
c) physical layer Answer: a
d) none of the mentioned Explanation: None.
View Answer
9. A unidirectional path switching ring is a
Answer: c network with
Explanation: None. a) one ring
b) two rings
5. In SONET, each synchronous transfer signal c) three rings
STS-n is composed of d) four rings
a) 2000 frames View Answer
b) 4000 frames
c) 8000 frames Answer: b
d) 16000 frames Explanation: One ring is used as the working
View Answer ring and other as the protection ring.
90
2. RTP is used to Answer: d
a) carry the media stream Explanation: None.
b) monitor transmission statistics of streams
c) monitor quality of service of streams 7. Which one of the following multimedia
d) none of the mentioned formats can not be supported by RTP?
View Answer a) MPEG-4
b) MJPEG
Answer: a c) MPEG
Explanation: None. d) None of the mentioned
View Answer
3. RTP provides the facility of jitter
____________ Answer: d
a) media stream Explanation: None.
b) expansion
c) both media stream and expansion 8. An RTP header has a minimum size of
d) none of the mentioned a) 12 bytes
View Answer b) 16 bytes
c) 24 bytes
Answer: a d) 32 bytes
Explanation: None. View Answer
91
1. An RPC (remote procedure call) is initiated c) both on the same computer and on different
by the computers connected with a network
a) server d) none of the mentioned
b) client View Answer
c) both server and client
d) none of the mentioned Answer: c
View Answer Explanation: None.
Answer: b 9. RPC is a
Explanation: None. a) synchronous operation
b) asynchronous operation
5. RPC works between two processes. These c) time independent operation
processes must be d) none of the mentioned
a) on the same computer View Answer
b) on different computers connected with a
network
92
Answer: a 3. One of the most obvious places to put an IDS
Explanation: None. sensor is near the firewall. Where exactly in
relation to the firewall is the most productive
10. The local operating system on the server placement?
machine passes the incoming packets to the a) Inside the firewall
a) server stub b) Outside the firewall
b) client stub c) Both inside and outside the firewall
c) client operating system d) Neither inside the firewall nor outside the
d) none of the mentioned firewall.
View Answer View Answer
Answer: a Answer: a
Explanation: None. Explanation: There are legitimate political,
budgetary and research reasons to want to see all
1. Which of the following is an advantage of the “attacks” against your connection, but given
anomaly detection? the care and feeding any IDS requires, do
a) Rules are easy to define yourself a favor and keep your NIDS sensors on
b) Custom protocols can be easily analyzed the inside of the firewall.
c) The engine can scale as the rule set grows
d) Malicious activity that falls within normal 4. What is the purpose of a shadow honeypot?
usage patterns is detected a) To flag attacks against known vulnerabilities
View Answer b) To help reduce false positives in a signature-
based IDS
Answer: c c) To randomly check suspicious traffic
Explanation: Once a protocol has been built and identified by an anomaly detection system
a behavior defined, the engine can scale more d) To enhance the accuracy of a traditional
quickly and easily than the signature-based honeypot
model because a new signature does not have to View Answer
be created for every attack and potential variant.
Answer: c
2. A false positive can be defined as… Explanation: “Shadow honeypots,” as
a) An alert that indicates nefarious activity on a researchers call them, share all the same
system that, upon further inspection, turns out to characteristics of protected applications running
represent legitimate network traffic or behavior on both the server and client side of a network
b) An alert that indicates nefarious activity on a and operate in conjunction with an ADS.
system that is not running on the network
c) The lack of an alert for nefarious activity 5. At which two traffic layers do most
d) Both An alert that indicates nefarious activity commercial IDSes generate signatures?
on a system that, upon further inspection, turns a) Application layer
out to represent legitimate network traffic or b) Network layer
behavior and An alert that indicates nefarious c) Transport layer
activity on a system that is not running on the d) both Transport layer and Network layer
network View Answer
View Answer
Answer: d
Answer: d Explanation: Most commercial IDSes generate
Explanation: A false positive is any alert that signatures at the network and transport layers.
indicates nefarious activity on a system that,
upon further inspection, turns out to represent 6. An IDS follows a two-step process consisting
legitimate network traffic or behavior. of a passive component and an active
93
component. Which of the following is part of the a) Crossover error rate
active component? b) False negative rate
a) Inspection of password files to detect c) False positive rate
inadvisable passwords d) Bit error rate
b) Mechanisms put in place to reenact known View Answer
methods of attack and record system responses
c) Inspection of system to detect policy Answer: a
violations Explanation: As the sensitivity of systems may
d) Inspection of configuration files to detect cause the false positive/negative rates to vary,
inadvisable settings it’s critical to have some common measure that
View Answer may be applied across the board.
94
Answer: c 6. The PPP encapsulation
Explanation: LCP and NCP are the PPP protocol a) Provides for multiplexing of different
provide for handling the capabilities of the network-layer protocols
connection/link on the network. b) Requires framing to indicate the beginning
and end of the encapsulation
3. The PPP protocol c) Establishing, configuring and testing the data-
a) Is designed for simple links which transport link connection
packets between two peers d) None of the mentioned
b) Is one of the protocols for making an Internet View Answer
connection over a phone line
c) Both Is designed for simple links which Answer: a
transport packets between two peers & Is one of Explanation: The PPP encapsulationprovides for
the protocols for making an Internet connection multiplexing of different network-layer
over a phone line protocols.
d) None of the mentioned
View Answer 7. A Link Control Protocol (LCP) is used for
a) Establishing, configuring and testing the data-
Answer: c link connection
Explanation: The PPP protocolis designed for b) Establishing and configuring different
simple links which transport packets between network-layer protocols
two peers and one of the protocols for making an c) Testing the different network-layer protocols
Internet connection over a phone line. d) None of the mentioned
View Answer
4. PPP provides the _______ layer in the TCP/IP
suite. Answer: a
a) Link Explanation: A Link Control Protocol (LCP) is
b) Network used for establishing, configuring and testing the
c) Transport data-link connection.
d) Application
View Answer 8. A family of network control protocols (NCPs)
a) Are a series of independently defined
Answer: a protocols that provide a dynamic
Explanation: PPP provides thelinklayer in the b) Are a series of independently-defined
TCP/IP suite. protocols that encapsulate
c) Are a series of independently defined
5. PPP consists of ________components protocols that provide transparent
a) Three (encapsulating, the Domain Name d) The same as NFS
system) View Answer
b) Three ( encapsulating, a link control protocol,
NCP ) Answer: b
c) Two ( a link control protocol, Simple Explanation: A family of network control
Network Control protocol) protocols (NCPs)are a series of independently-
d) None of the mentioned defined protocols that encapsulate.
View Answer
9. Choose one from the following
Answer: b a) PPP can terminate the link at any time
Explanation: PPP consists of three b) PPP can terminate the link only during the
(encapsulating, a link control protocol, NCP) link establishment phase
Components. c) PPP can terminate the link during the
authentication phase
95
d) None of the mentioned Answer: d
View Answer Explanation: VLSM/subnetting, Auto summary,
Unequal cast load balancing.
Answer: a
Explanation: PPP can terminate the link at any 4. EIGRP send the hello message after every
time because it works on the data link layer ___________ seconds
protocol. a) 5 seconds (LAN), 60 seconds (WAN)
b) 5 seconds (LAN), 5 seconds (WAN)
10. The link necessarily begins and ends with c) 15s
this phase. During this phase, the LCP automata d) 180s
will be in INITIAL or STARTING states View Answer
a) Link-termination phase
b) Link establishment phase Answer: a
c) Authentication phase Explanation: EIGRP send the hello message
d) Link dead phase after every5 seconds (LAN), 60 seconds
View Answer (WAN).
96
Answer: a Answer: c
Explanation: IP default network command used Explanation: File server allows LAN users to
in default gateway in Cisco router. share computer programs and data.
97
d) 200 m 10. Which of the following architecture uses
View Answer CSMA/CD access method?
a) ARC net
Answer: d b) Ethernet
Explanation: 200m is the max cable length of c) Router
STP. d) STP server
View Answer
6. What is the max data capacity of STP?
a) 10 mbps Answer: b
b) 100 mbps Explanation: Ethernet uses CSMA/CD access
c) 1000 mbps method.
d) 10000 mbps
View Answer
Answer: b
Explanation: 100 mbps is the max data capacity
of STP.
Answer: c
Explanation: RJ-45 is used for STP cable.
Answer: b
Explanation: Hub/switch is the central device in
star topology.
Answer: c
Explanation: 1000 mbps is max data capacity for
optical fiber cable.
98