0% found this document useful (0 votes)
900 views29 pages

CS610 Computer Network 2010 Final Term Mcqs Solved With References by Moaaz

The document contains a set of multiple choice questions and answers related to computer networks and networking concepts. Specifically, it includes 28 multiple choice questions about topics like addressing schemes, Ethernet specifications, TCP/IP layers, routing protocols, and more. Each question is followed by 4 potential answer choices and an explanation of the correct answer is sometimes provided by clicking on a link.

Uploaded by

Shahrukh Usman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
900 views29 pages

CS610 Computer Network 2010 Final Term Mcqs Solved With References by Moaaz

The document contains a set of multiple choice questions and answers related to computer networks and networking concepts. Specifically, it includes 28 multiple choice questions about topics like addressing schemes, Ethernet specifications, TCP/IP layers, routing protocols, and more. Each question is followed by 4 potential answer choices and an explanation of the correct answer is sometimes provided by clicking on a link.

Uploaded by

Shahrukh Usman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

CS610- Computer Network

Solved MCQS June 23,2012


From Final term Papers

MC100401285 [email protected] [email protected] PSMD01

CS610- Computer Network


FINALTERM EXAMINATION - Spring 2010
Question No: 1( M a r k s: 1 )
A ---------- Relies on the hardware manufacturer to assign a unique physical address to each network interface.

► Static addressing scheme (Page 34)


► Configurable addressing scheme
► Dynamic addressing scheme
► None of the given

Question No: 2 ( M a r k s: 1 )
An interface for thin Ethernet must have an ____________ connector, and must enerate signals according to
the_____________ specification.

► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2 (CS610 Reference Book , Page 21)
► BNC, 10 Base T

Question No: 3( M a r k s: 1 )
A system with redundant bridges might have a problem with_______ in the system.

► Loop Click here for detail


► Filters
► Spanning Trees
► All given choices

Question No: 4( M a r k s: 1 )
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN
► Do all the Click here for detail
1
Question No: 5( M a r k s: 1 )
________ is used for typical data applications (where the data rate may be unknown and bursty) and allows use
of whatever bandwidth is available at a given time.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service (Page 71)
► None of the given

Question No: 6( M a r k s: 1 )
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
► 21-bit
► 22-bit
► 23-bit
► 24-bit (Page 67)

Question No: 7( M a r k s: 1 )
________ of TCP/IP layering model, corresponds to basic network hardware.

► Physical Layer (Page 84)


► Network Interface Layer
► Internet Layer
► Transport Layer

Question No: 8( M a r k s: 1 )
_________ places the boundary between the second and third octets

► Class A
► Class B (Computer Networks and Internets, page235)
► Class C
► Class D

Question No: 9( M a r k s: 1 )
UDP and TCP are both_________ layer protocols

► Physical
► Data link
► Network
► Transport (Page 101)

Question No: 10( M a r k s: 1 )


Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream
interface, Reliable connection startup and Graceful connection shutdown are the services provided
by__________

2
► IP
► None of the given
► TCP (Page 123)
► UDP

Question No: 11( M a r k s: 1 )


_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer (Page 84)

Question No: 12( M a r k s: 1 )


________identifies which application program on receiving computer should receive the data

► Logical address
► Source port
► Destination Port (Computer Networks and Internets, page313)
► None of the given

Question No: 13( M a r k s: 1 )


________ identifies the application program that sent the data.

► Destination Port
► Source port (Computer Networks and Internets, page313)
► Logical address
► None of the given

Question No: 14( M a r k s: 1 )


Which of the following are interior routing protocols?

► RIP
► OSPF
► BGP
► RIP and OSPF Click here for detail

Question No: 15( M a r k s: 1 )


The Border Gateway Protocol (BGP) uses_________ for all communication

► UDP
► TCP Click here for detail
► Both UDP and TCP
► None of the given

3
Question No: 16( M a r k s: 1 )
__________measures distance in network hops, where each network between the source and destination counts
as single hop.

► BGP
► OSPF
► RIP (Page 138)
► None of the given

Question No: 17( M a r k s: 1 )


OSPF is based on____

► Distance vector routing


► Link state routing (Page 140 )
► Path vector routing
► Distance vector routing and Link state routing

Question No: 18( M a r k s: 1 )


_________ performs local multicast and uses IP-in-IP encapsulation to send multicast datagrams from one site
on the Internet to another.

► Distance Vector Multicast Routing Protocol (DVMRP) (Page 144)


► Core Based Trees (CBT)
► Protocol Independent Multicast_ Sparse Mode (PIM-SM)
► Protocol Independent Multicast _ Dense Mode (PIM-DM)

Question No: 19( M a r k s: 1 )


The length of time required to send a variable length packet is variable and does not require a complicated
interrupt scheme to detect completion of transmission.

► True
► False (Page 72)

Question No: 20( M a r k s: 1 )


NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base header.

► True (Page 112)


► False

Question No: 21( M a r k s: 1 )


Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly
inefficient.

► True (Page 99)


► False
4
Question No: 22( M a r k s: 1 )
Address mask defines how many bits of address are in suffix.

► True
► False (Page 103)

Question No: 23( M a r k s: 1 )


A computer attached to a given network can only communicate with other computers attached to the same
network. Is this a problem with multiple networks?
► True (Page 81)
► False

Question No: 24( M a r k s: 1 )


In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed
island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens,
keyboards and computers.

► False
► True (Page 81)

Question No: 25( M a r k s: 1 )


The term self-identifying is used for Classful IP addresses because the class of the address can be computed
from the address__________.
► itself (Page 87)
► prefix
► suffix
► mask

Question No: 26( M a r k s: 1 )


In which method of Address Resolution Protocol the protocol address independent of hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T, C
►D
►C
► T, D (Page 97)

Question No: 27( M a r k s: 1 )


In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
►T
►D
► C (Page 97)
► T, C
5
Question No: 28( M a r k s: 1 )
Reconstruction of original datagram is called reassembly.

► True (Page 28)


► False

Question No: 29( M a r k s: 1 )


A computer needs a complete stack of protocols to run either a client or a server.

► True (Computer Networks and Internets, page 344)


► False

Question No: 30( M a r k s: 1 )


TCP uses _______ mechanism to control the flow of data.

► door
► window (Page 126)
► acknowledgment
► retransmission

FINALTERM EXAMINATION
Spring 2010
CS610- Data Communication

Question No: 1 ( Marks: 1 ) - Please choose one


In Direct point to point communication adding the Nth computer requires------------ new connections.
►None of the given
2
►N
►N-1 (Page 23)
► (N2 –N)/2

Question No: 2 ( Marks: 1 ) - Please choose one


In -------------, network occupies the smaller area like a room a floor or a building

►LAN (Page 4)
►WAN
►MAN
►None of the given

6
Question No: 3 ( Marks: 1 ) - Please choose one
The third field of the header consists of ------ bit Ethernet frame type.

►48
►32
►16 Click here for detail
►8

Question No: 4 ( Marks: 1 ) - Please choose one


The maximum size of an Ethernet segment is___________

►250 meters
►500 meters Click here for detail
►700 meters
►None of the given

Question No: 5 ( Marks: 1 ) - Please choose one


The network with Throughput T and Delay D has a total --------------- bits in transit at a time.

►D + T
►D – T
►DXT (Computer Networks and Internets, page203)
►D / T

Question No: 6 ( Marks: 1 ) - Please choose one


___________ places the boundary between the first and second octets

►Class A (Computer Networks and Internets, page235)


►Class B
►Class C
►Class D

Question No: 7 ( Marks: 1 ) - Please choose one


Router detects datagram --------- than network MTU and then it splits into pieces and each piece is ----------than
outbound network MTU.

►Larger, smaller (Page 108)


►Larger, larger
►Smaller, larger
►Smaller, smaller

Question No: 9 ( Marks: 1 ) - Please choose one


Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction &
operating system independent are the characteristics of ___________________

7
►TCP
►UDP (Page 120)
►IP
►None of the given

Question No: 10 ( Marks: 1 ) - Please choose one


----------- provide Application to application communication it also called end to end communication

►IP
►TP (Page 119)
►RIP
►None of the given

Question No: 11 ( Marks: 1 ) - Please choose one


A routing table contains_______

►The destination network ID


►The hop count to reach the network
►The router ID of the next hop (Page 102)
►All of the given

Question No: 12 ( Marks: 1 ) - Please choose one


Which of the following protocols allows the sender and receiver to enforce polices.

►RIP
►OSPF
►BGP (Reference Book 347)
►RIP and OSPF

Question No: 13 ( Marks: 1 ) - Please choose one


__________measures distance in network hops, where each network between the source and destination counts
as single hop.

►BGP
►OSPF
►RIP (Page 138)
►Non of these

Question No: 14 ( Marks: 1 ) - Please choose one


_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless,
or subnetted.
►RIP
►OSPF (Page 140)
►BGP
►None of the given
8
Question No: 15 ( Marks: 1 ) - Please choose one
One repeater ---------------, two repeaters --------------- the maximum cable length limitation.

►Double, triple (Page 49)


►Double, 4 time
►half, triple
►Double, half

Question No: 16 ( Marks: 1 ) - Please choose one


ICMP message transport is acted upon by getting ICMP encrypted in IP.

►True (Page 117)


►False

Question No: 17 ( Marks: 1 ) - Please choose one


Like most application programs, a client and server use a transport protocol to communicate.
►True (Page 146)
►False

Question No: 18 ( Marks: 1 ) - Please choose one


Mapping between a protocol address and a hardware address is called Address Resolution.

►True (Page 93)


►False

Question No: 19 ( Marks: 1 ) - Please choose one


Address mask defines how many bits of address are in suffix?

►True
►False (Page 103)

Question No: 20 ( Marks: 1 ) - Please choose one


A single networking technology is best for all needs.
►True
►False (Page 81)

Question No: 21 ( Marks: 1 ) - Please choose one


In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed
island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens,
keyboards and computers.

►False
►True (Page 81) rep

9
Question No: 22 ( Marks: 1 ) - Please choose one
Router detects datagram---------than network MTU

►Larger (Page 108) rep


►Smaller
►None of given
►Equal

Question No: 23 ( Marks: 1 ) - Please choose one


Information can flow in either or both direction between
►Clients
►Clients and servers (Computer Networks and Internets, page 344)
►Servers
►None of given

Question No: 24 ( Marks: 1 ) - Please choose one


On of the design goals for unicast route propagation is __________.

►consistency
►inconsistency
►stability (Computer Networks and Internets, page 344)
►dynamic addressing

Question No: 25 ( Marks: 1 ) - Please choose one


IPV6 address consists of ________

►32 Bits
►64 Bits
►128 Bits (Page 128)
►none of the given

Question No: 26 ( Marks: 1 ) - Please choose one


UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to
preserve data boundaries.

►True (Page 120)


►False

Question No: 27 ( Marks: 1 ) - Please choose one


In case TCP, retransmission, acknowledgment from a computer on LAN are expected to arrive within

►Seconds
►Micro seconds
►Milliseconds Click here for detail
►Nanoseconds
10
Question No: 28 ( Marks: 1 ) - Please choose one
Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is
connected to Domain Name.

►True (Page 131)


►False

Question No: 29 ( Marks: 1 ) - Please choose one


A network uses a ------arranges for computers to be connected in a closed loop.

►Star Topology
►Ring Topology (Page 25)
►Bus Topology
►None of the given

Question No: 30 ( Marks: 1 ) - Please choose one


Protocol addresses are abstractions provided by ___________.

►hardware
►software (Page 93)
►operating system
►internet

FINALTERM EXAMINATION
Fall 2008
CS610- Computer Network
Question No: 1 ( Marks: 1 ) - Please choose one
In Direct point to point communication adding the Nth computer requires------------ new connections.

► None of the given


► N2
► N-1 (Page 23)
► (N2 –N)/2

11
Question No: 2 ( Marks: 1 ) - Please choose one
In Point-to-Point topology there are two topologies.
► Tree and Ring
► Star and Ring
► Star and Tree (Page 5)
► None of the given

Question No: 3 ( Marks: 1 ) - Please choose one


In -------------, network occupies the smaller area like a room a floor or a building

► LAN (Page 4)
► WAN
► MAN
► None of the given

Question No: 4 (Marks: 1) - Please choose one


Hardware that calculates a CRC uses two simple components.
► AND unit and XOR unit
► Shift register and XOR unit (Page 20)
► Shift register and AND unit
► None of the given

Question No: 5 ( Marks: 1 ) - Please choose one


CRC can detect more errors than a simple checksum.
► true (Computer Networks and Internets, page 80)
► false

Question No: 6 ( Marks: 1 ) - Please choose one


The Gigabit Ethernet hardware operates at a rate of --------

► 10 Mbps
► 100 Mbps
► 1000 Mbps Click here for detail
► None of the given

Question No: 7 ( Marks: 1 ) - Please choose one


Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

► 10 Base 2
► 10 Base 5
► 10 Base T (Page 43)
► None of the given
12
Question No: 8 ( Marks: 1 ) - Please choose one
An interface for thin Ethernet must have an ____________ connector , and must generate signals according to
the_____________ specification.

► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2 ( cs610 reference book Page 201)
► BNC, 10 Base T

Question No: 9 ( Marks: 1 ) - Please choose one


A system with redundant bridges might have a problem with_______ in the system.

► Loop Click here for detail rep


► Filters
► Spanning Trees
► All given choices

Question No: 10 ( Marks: 1 ) - Please choose one


________ computes shortest paths in a graph by using weights on edges as a measure of distance.

► Greedy algorithm
► Distance vector algorithm
► Dijksta’s algorithm (Computer Networks and Internets, page 112)
► Non of the given

Question No: 11 ( Marks: 1 ) - Please choose one


Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

► Connectionless service paradigm (Computer Networks and Internets, page 112)


► Connection-oriented service paradigm
► Both Connectionless and Connection-oriented service paradigm
► None of the given

Question No: 12 ( Marks: 1 ) - Please choose one


_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer (Page 84) rep
13
Question No: 13 ( Marks: 1 ) - Please choose one
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all
communication with host
► 48-bit
► 32-bit (Page 85)
► 24-bit
► None of the given

Question No: 14 ( Marks: 1 ) - Please choose one


The address __________ identifies the physical network to which the computer is attached, while the _______
identifies an individual computer on that network.

► prefix , suffix (Page 85)


► suffix , prefix
► suffix , suffix
► None of the given

Question No: 15 ( Marks: 1 ) - Please choose one


___________ places the boundary between the first and second octets

► Class A (Computer Networks and Internets, page 235)


► Class B
► Class C
► Class D

Question No: 16 ( Marks: 1 ) - Please choose one


___________ places the boundary between the third and fourth octets.
► Class A
► Class B
► Class C (Computer Networks and Internets, page 235)
► Class D

Question No: 17 ( Marks: 1 ) - Please choose one


________ field of header indicates whether a datagram is a fragment or a complete datagram.

► FLAGS Click here for detail


► FLAGMENT OFFSET
► IDENTIFICATION
► None of the given

14
Question No: 18 ( Marks: 1 ) - Please choose one
______ provides connectionless service.

► TCP
► UDP (Page 120)
► IP
► None of the given

Question No: 19 ( Marks: 1 ) - Please choose one


UDP and TCP are both_________ layer protocols

► Physical
► Data link
► Network
► Transport (Page 101) rep

Question No: 20 ( Marks: 1 ) - Please choose one


Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream
interface, Reliable connection startup and Graceful connection shutdown are the services provided
by__________

► IP
► None of the given
► TCP (Page 123) rep
► UDP

Question No: 21 ( Marks: 1 ) - Please choose one


_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer
►Network Interface Layer
► Internet Layer
► Transport Layer (Page 84) rep

Question No: 22 ( Marks: 1 ) - Please choose one


________identifies which application program on receiving computer should receive the data

► Logical address
► Source port
► Destination Port (Computer Networks and Internets, page313) rep
► None of the given

15
Question No: 23 ( Marks: 1 ) - Please choose one
________ identifies the application program that sent the data.
► DestinationPort
► Source port (Computer Networks and Internets, page313) rep
► Logical address
► None of the given

Question No: 24 ( Marks: 1 ) - Please choose one


The Border Gateway Protocol (BGP) uses_________ for all communication

► UDP
► TCP Click here for detail rep
► Both UDP and TCP
► None of the given

Question No: 25 ( Marks: 1 ) - Please choose one


Which of the following protocols allows the sender and receiver to enforce polices.

► RIP
► OSPF
► BGP (Reference Book 347) rep
► RIP and OSPF

Question No: 26 ( Marks: 1 ) - Please choose one


____________ uses distance vector approach to define routing

► BGP
► OSPF
► RIP (Computer Networks and Internets, page332)
► None of the given

Question No: 27 (Marks: 1) - Please choose one


ICMP message transport is acted upon by getting ICMP encrypted in IP.

► True (Page 117)


► False

16
Question No: 28 ( Marks: 1 ) - Please choose one
Protocol addresses are abstractions provided by ___________.
► hardware
► software (Page 93) rep
► operating system
► internet

Question No: 29 ( Marks: 1 ) - Please choose one


These packets serve same purpose on ________ as frames on ______

► Intranet, LAN
► Internet, WAN
► Intranet, WAN
► Internet, LAN (Page 101)

Question No: 30 ( Marks: 1 ) - Please choose one


Address mask defines how many bits of address are in suffix?
► True
► False (Page 103) rep

Question No: 31 ( Marks: 1 ) - Please choose one


A single networking technology is best for all needs.
► True
► False (Page 81) rep

Question No: 32 ( Marks: 1 ) - Please choose one


A computer attached to a given network can only communicate with other computers attached to the same
network. Is this a problem with multiple networks?

► True (Page 81) rep


► False

Question No: 33 ( Marks: 1 ) - Please choose one


The term self-identifying is used for Classful IP addresses because the class of the address can be computed
from the address__________.

► itself (Page 87)


► prefix
► suffix
► mask

17
Question No: 34 ( Marks: 1 ) - Please choose one
Find the class of the address.
10100111 11011011 10001011 01101111

►A
►B (Computer Networks and Internets, page 122)
►E
►C

Question No: 35 ( Marks: 1 ) - Please choose one


Find the class of the address:
11110011 10011011 11111011 00001111

►A
►C
►E (Computer Networks and Internets, page 122)
►B

Question No: 36 ( Marks: 1 ) - Please choose one


In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

►T
►D
►C (Page 97) rep
► T, C

Question No: 37 ( Marks: 1 ) - Please choose one


Which method of Address Resolution Protocol requires hardware broadcast?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► D (Page 97)
►T
►C
► T, D

18
Question No: 38 ( Marks: 1 ) - Please choose one
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T, D
►c
►T
► T, C (Page 97)

Question No: 39 ( Marks: 1 ) - Please choose one


In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

► T, C
►T
►C
► D (Page 97)

Question No: 40 ( Marks: 1 ) - Please choose one


On of the design goals for unicast route propagation is __________.

► Consistency
► inconsistency
► stability (Computer Networks and Internets, page 344) rep
► dynamic addressing

Question No: 41 ( Marks: 1 ) - Please choose one


Propagation multicast routing information differs dramatically from unicast route propagation?

► True (Computer Networks and Internets, page 335)


► False

Question No: 42 ( Marks: 1 ) - Please choose one


The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group
at any time. While _____________ application on a computer remain a member of a group.
► One or more
► only one
► no
► many

19
Question No: 43 ( Marks: 1 ) - Please choose one
To save traffic, an EGP does not summerize routing information from the autonomous system before passing it
to another autonomous system.

► True
► False (Computer Networks and Internets, page 329)

Question No: 44 (Marks: 1) - Please choose one


In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.

► Anycast
► Unicast
► Multicast
► Non of the given (Page 114)

Question No: 45 ( Marks: 1 ) - Please choose one


Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known
as_________.

► Unicast
► Anycast
► Multicast (Page 114)
► Non of the given

Question No: 46 ( Marks: 1 ) - Please choose one


UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to
preserve data boundaries.

► True (Page 120) rep


► False

Question No: 47 ( Marks: 1 ) - Please choose one


Reliability is the responsibility of the _________ layer

► Network
► Datalink
► Transport (Page 123)
► Application

20
Question No: 48 ( Marks: 1 ) - Please choose one
TCP uses _______ mechanism to control the flow of data.

► door
► window (Page 126) rep
► acknowledgment
► retransmission
TCP uses window mechanism to control the flow of data.

Question No: 49 ( Marks: 1 ) - Please choose one


The time for acknowledgement to arrival of packet depends on.

► Distance to destination and Current traffic conditions (Page 125)


► Current traffic conditions
► Distance to destination
► non of these

Question No: 50 ( Marks: 1 ) - Please choose one


FDDI can transmits data at a rate of ----------
► 100 million bits per second (Page 31)
► 10 million bits per second
► 1000 million bits per second
► None of the given

FINALTERM EXAMINATION Fall 2008


CS610- Computer Network
Question No: 1 ( M a r k s: 1 )
Computer networks are often called -------------- because they use packet technology.

► Ethernet
► Switch networks
► Packet networks (Computer Networks and Internets, page 73)
► None of the given

Question No: 2 ( M a r k s: 1 )
A network uses a ------arranges for computers to be connected in a closed loop.

► Star Topology
► Ring Topology (Page 25) rep
► Bus Topology

21
► None of the given

Question No: 3 ( M a r k s: 1 )
An ------------method, the network hardware designers specify how type information is included in the frame
and the value use to identify various frame types.

► Explicit frame type (Computer Networks and Internets, page 108)


► Ideal frame type
► Implicit frame type
► None of the given

Question No: 4 ( M a r k s: 1 )
An interface for thin Ethernet must have an ____________ connector , and must generate signals according to
the_____________ specification.

► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2 (cs610 reference book Page 201) rep
► BNC, 10 Base T

Question No: 5 ( M a r k s: 1 )
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_________

► Layer 2 source address


► Source node’s physical address
► Layer 2 destination address Click here for detail
► Layer 3 destination address

Question No: 6 ( M a r k s: 1 )
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing
is called___________

► Hierarchal address
► Default route (Computer Networks and Internets, page 172)
► Shortest path
► None of the given

Question No: 7 ( M a r k s: 1 )
________ of TCP/IP layering model, corresponds to basic network hardware.

► Physical Layer (Page 84) rep


► Network Interface Layer
► Internet Layer
► Transport Layer

22
Question No: 8 ( M a r k s: 1 )
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer (Page 84) rep

Question No: 9 ( M a r k s: 1 )
________is called an end-to-end protocol because it provide a connection directly from an application on one
computer to an application on a remote computer.

► IP
► UDP
► TCP (Computer Networks and Internets, page 306)
► None of the given

Question No: 10 ( M a r k s: 1 )
____________ uses distance vector approach to define routing

► BGP
► OSPF
► RIP (Computer Networks and Internets, page332) rep
► None of the given

Question No: 11 ( M a r k s: 1 )
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local
Area Networks.

► Flood-and –Prune (Page 143)


► Configuration-and -Tunneling
► Core-Based Discovery
► None of the given

Question No: 12 ( M a r k s: 1 )
Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source address

►3
►2
►1
► 0 (Page 118)

23
Question No: 13 ( M a r k s: 1 )
Protocol addresses are abstractions provided by ___________.

► hardware
► software (Page 93) rep
► operating system
► internet

Question No: 14 ( M a r k s: 1 )
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly
inefficient.
► True (Page 99) rep
► False

Question No: 15 ( M a r k s: 1 )
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
► 32, 48 (Page 98)
► 24, 32
► 32, 64
► 32, 128

Question No: 16 ( M a r k s: 1 )
In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed
island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens,
keyboards and computers.

► False
► True (Page 81) rep

Question No: 17 ( M a r k s: 1 )
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

Types of
Features Resolution

Use full with any hardware T


Address change affects all hosts T
Protocol address is determined C
by hardware address
►T
►D
► C (Page 97) rep
► T, C
24
Question No: 18 ( M a r k s: 1 )
The general form of an IP datagram is with a header followed by data. The header contains information that
controls where and how the datagram is to be sent.
► True (Computer Networks and Internets, page 332)
► False

Question No: 19 ( M a r k s: 1 )
To save traffic, an EGP does not summarize routing information from the autonomous system before passing it
to another autonomous system.
► True
► False (Computer Networks and Internets, page 329)

Question No: 20 ( M a r k s: 1 )
Which of the following is a correct representation of the IPv6?
► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255 (Page 114)
► 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255
► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

FINALTERM EXAMINATION
Fall 2008
CS610- Computer Network

Question No: 1 ( Marks: 1 ) - Please choose one


The number of connections needed for N computer in direct point to point communication is equal to:

► (N2 –N)/2 (Page 23)


► N(N- 1)
► N2
► None of the given

Question No: 2 ( Marks: 1 ) - Please choose one


When an application--------------- data, it makes a copy of the data available to all other computers on the
network.

► Broadcasting Click here for detail


► Multicasting
► Unicasting
► None of the given
25
Question No: 3 ( Marks: 1 ) - Please choose one
Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the
manufacturer.

► 64
► 48 (Computer Networks and Internets, page 109)
► 32
►8

Question No: 4 ( Marks: 1 ) - Please choose one


A system with redundant bridges might have a problem with_______ in the system.

► Loop Click here for detail rep


► Filters
► Spanning Trees
► All given choices

Question No: 5 ( Marks: 1 ) - Please choose one


The product of delay and throughput measures the _____ of data that can be present on the network.

► Area
► Volume (Page 80) rep
► Length
► None of the given

Question No: 6 ( Marks: 1 ) - Please choose one


Connectionless service, Message-Oriented protocol, best effort delivery service, arbitrary interaction and
operating system independent are the characteristics of _____________

► TCP
► UDP (Page 110)
► IP
► None of the given

Question No: 7 ( Marks: 1 ) - Please choose one


Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream
interface, Reliable connection startup and Graceful connection shutdown are the services provided
by__________

► None of the given


► TCP ( Page 123) rep
► UDP
► IP
26
Question No: 8 ( Marks: 1 ) - Please choose one
The process of using a routing table to select a next hop for a given datagram is called_________

► Encapsulation
► Reassembling
► Routing or forwarding (Computer Networks and Internets, page 265)
► None of the given

Question No: 9 ( Marks: 1 ) - Please choose one


____________ uses distance vector approach to define routing

► BGP
► OSPF
► RIP (Computer Networks and Internets, page332) rep
► None of the given

Question No: 10 ( Marks: 1 ) - Please choose one


A multicast routing scheme in which the protocol software builds a delivery tree from a central point is
called__________

► Distance Vector Multicast Routing Protocol (DVMRP)


► Core Based Trees (CBT) (Page 114)
► Protocol Independent Multicast_ Sparse Mode (PIM-SM)
► Protocol Independent Multicast _ Dense Mode (PIM-DM)

Question No: 11 ( Marks: 1 ) - Please choose one


One repeater _______, two repeaters ________ the maximum cable length limitation.

► doubles, cancel
► doubles, triple (Page 49) rep
► square roots, cude roots
► and, triple

Question No: 12 ( Marks: 1 ) - Please choose one


Whenever it handles a packet, IP software needs to separate the destination address into a _________ and
___________.

► postfix, Infix
► non of these
► Infix, prefix
► prefix, suffix (Page 87)

27
Question No: 13 ( Marks: 1 ) - Please choose one
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly
inefficient.

► True (Page 99) rep


► False

Question No: 14 ( Marks: 1 ) - Please choose one


ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

► 32, 48 (Page 98)


► 24, 32
► 32, 64
► 32, 128

Question No: 15 ( Marks: 1 ) - Please choose one


End-to-end delivery service is connection oriented.

► True
► False (Page 101)

Question No: 16 ( Marks: 1 ) - Please choose one


A single networking technology is best for all needs.

► True
► False (Page 81) rep

Question No: 17 ( Marks: 1 ) - Please choose one


In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed
island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens,
keyboards and computers.

► False
► True (Page 81)

Question No: 18 ( Marks: 1 ) - Please choose one


Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

►T (Page 97)
►C
►D
► C, D
28
Question No: 19 ( Marks: 1 ) - Please choose one
In which method of Address Resolution Protocol the protocol address is determined by hardware address?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

►T
►D
►C (Page 97) rep
► T, C

Question No: 20 ( Marks: 1 ) - Please choose one


We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

► routing path
► routing metric
► routing (Computer Networks and Internets, page330)
► switching

29

You might also like