0% found this document useful (0 votes)
98 views3 pages

Computer Networks Test 4: Number of Questions: 25 Section Marks: 30

Computer Networks Test 4 contains 25 multiple choice questions testing knowledge of computer networking concepts like IP addressing, TCP, encryption, and network protocols. The test has a maximum score of 30 marks. Students must select the correct answer from the four choices provided for each question. An answer key is provided at the end along with some hints and explanations.

Uploaded by

AKASH PAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views3 pages

Computer Networks Test 4: Number of Questions: 25 Section Marks: 30

Computer Networks Test 4 contains 25 multiple choice questions testing knowledge of computer networking concepts like IP addressing, TCP, encryption, and network protocols. The test has a maximum score of 30 marks. Students must select the correct answer from the four choices provided for each question. An answer key is provided at the end along with some hints and explanations.

Uploaded by

AKASH PAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Computer Networks Test 4

Number of Questions: 25 Section Marks: 30

Directions for questions 1 to 25: Select the correct alterna- 10. In TCP the flags syn = 0 and ack = 1 indicates:
tive from the given choices. (A) open connection packet
1. Which of the following IP address belongs to class A (B) open connection ack
network? (C) data packet
(A) 130. 140. 180. 210 (B) 127. 190. 120. 191 (D) reply packet
(C) 125. 150. 160. 189 (D) 132. 131. 139. 134 11. A user ‘A’ got an email containing multi media (requires
2. What will be the destination address if host A with IP high band width) if the band width is limited then:
address 156.180.190.16 wants to send data to all the (A) user can open the mail using SMTP
members in network with network ID 19? (B) user can download the message using the POP3
(A) 255.255.255.255 (B) 19.255.255.255 (C) user can partially download email using IMAP4
(C) 156.19.255.255 (D) 156.180.255.255 (D) user cannot open (or) download the email
3. Which of the following work stations does not imple- 12. MIME supports
ment network layer? (A) Text in character sets other than ASCII
(A) Switch (B) Brouter (B) Non text attachments
(C) Gate way (D) Router (C) Message bodies with multiple parts
(D) All the above
4. _____ layer responds when packet gets discarded due
to its TTL (when TTL becomes 0) 13. For a link having bandwidth 10 Mbps, calculate the
(A) Application layer (B) Transport layer time to wrap the sequence numbers of TCP? (approxi-
(C) Network layer (D) Physical layer mate value)
(A) 3436 minutes (B) 100 seconds
5. Which of the following algorithm is not related to pri-
(C) 57 minutes (D) 10 minutes
vate key cryptography?
(A) DES (B) RSA 14. Sender’s window size in TCP is determined by
(C) AES (D) IDEA (i) Receiver window size
(ii) Congestion window size
6. What is the minimum positive integer ‘p’ such that
(A) Both (i) and (ii)
3p mod 17 = 1?
(B) Only (i)
(A) 5 (B) 8
(C) Only (ii)
(C) 12 (D) 16
(D) None of the above
7. X. 21 is:
15. Consider the connection establishment in TCP using
(A) a method of determining which device has access
3 way handshaking
to the transmission medium at any time
(B) a method for access control techniques for multi- Client Server
ple access transmission media
request
(C) a very common bit oriented data link protocol
Seq : 4000
(D) a network access standard for connecting stations
to a circuit switched networks
reply
8. The network topology that supports bi-directional links
between each possible node is: Seq : 16000
(A) ring (B) star ack : 4001
(C) tree (D) mesh
ack
9. Match the following:
Seq : ?
Column–I Column–II ack : ?
(a) Logical addressing system (i) 16 bit
(b) Physical addressing (ii) 32 bit What will be the values of sequence number (seq) and
system ack for the last hand shake?
(A) seq = arbitrary number ack = 16001
(c) Port addressing system (iii) 48 bit (B) seq = 4000 ack = arbitrary number
(A) a–(i) b–(ii) c–(iii) (B) a–(ii), b–(i), c–(iii) (C) seq = 4000 ack = 16001
(C) a–(ii), b–(iii), c–(i) (D) a–(iii), b–(i), c–(ii) (D) seq = 4001 ack = 16002
Computer Networks Test 4 | 3.203

16. Which of the following can be used for only source IP 22. Consider the sub net mask of IP address 255.0.0.0 to
in a packet header? which class of IP address this super net mask belongs
(A) 10.1.1.1 (B) 0.0.0.0 to?
(C) 0.1.1.1 (D) 127.1.1.1 (A) class A (B) class B
17. If WAN link is 2 Mbps and round trip time between (C) class C (D) None of these
source and destination is 300 m sec, what would be the Linked Answer Questions 23 and 24:
optional TCP window size needed to fully utilize the RSA algorithm is used by choosing two prime number
line? p = 3, q = 11.
(A) 60,000 bits (B) 75,000 bytes 23. What are the encryption and decryption keys?
(C) 75,000 bits (D) 60,000 bytes (A) 3, 7 (B) 2, 6
18. Device A IP address is 172.16.17.30/20 Device B IP (C) 5, 7 (D) 8, 12
address is 172.16.28.15/20, which one of the following 24. What will be the encrypted message for GATE (if A = 1,
statement is correct? B = 2)?
(A) Both devices are in the same subnet (A) 1311426 (B) 2416513
(B) Devices are in different subnets (C) 10134261 (D) 1421331
(C) Variable length subnet mask is used in the network 25. Which of the following is TRUE for authentication and
(D) Insufficient data key management among two parties?
19. If the IP address is 130.45.34.56 and subnet mask is (A) 3 hand shake is necessary for the authentication
255.255.240.0, then what is the subnet address? with each handshake done with private key cryp-
(A) 130.45.0.0 (B) 130.45.34.0 tography
(C) 130.45.32.0 (D) 130.45.32.56 (B) 3 handshake is necessary for the authentication
20. If the IP address is 196.196.64.170 and subset mask is and key management with each hand shake, done
255.255.255.240, what is the broadcasting address to with public key cryptography
the subnet? (C) 3 hand shake is necessary for the authentication
(A) 196.196.64.255 (B) 255.255.255.255 and key management with 2 hand shakes one with
(C) 196.196.240.170 (D) 196.196.64.175 public key cryptography and one with private key
cryptography
21. Consider the following Networks 206.82.2.0,
(D) 3 hand shake is necessary for the authentication
206.82.3.0, 206.82.4.0 and 206.82.5.0; the Super net
and key management with handshake as public
mask will be:
key cryptography and 2 handshakes as private key
(A) 255.255.252.0 (B) 255.255.244.0
cryptography
(C) 255.255.255.82 (D) 206.82.1.0/22

Answer Keys
1. C 2. B 3. A 4. C 5. B 6. D 7. D 8. D 9. C 10. C
11. C 12. D 13. C 14. A 15. C 16. B 17. B 18. A 19. C 20. D
21. B 22. B 23. A 24. A 25. C

Hints and Explanations


1. Class A IP address range is 1–126 is in the first octet. 5. RSA is public key cryptography. Choice (B)
In the given options, option (C) has the 125 in the first 6. 316 mod 17 = 1. Choice (D)
octet. So, 125.150.160, belongs to class A network.
7. X.21 is a network access standard for connecting sta-
Choice (C)
tions to a circuit switched networks. Choice (D)
2. Direct Broadcasting address for the network ID 19 will
8. In mesh topology, each node is connected to the other
be 19.255.255.255. Direct Broadcasting address in the
nodes with a link, so in Mesh topology it support
same network is 255.255.255.255. Choice (B)
bidirectional links. Mostly, Mesh topology is used in
3. Switch has only two layers, i.e. Physical layer and data Internet. Choice (D)
link layer. Choice (A)
9. Logical addressing system (IP address) takes a 32-bits.
4. When packet gets discarded with TTL = 0, then the net- Physical addressing system takes 48-bits.
work layer sends the message to source, so that it can Part addressing system takes 16-bits.
choose another route. Choice (C) Choice (C)
3.204 | Computer Networks Test 4

10. When SYN = 0 and ACK = 1, it indicates the data IP = 196.196.64.10101010


packet in TCP. Choice (C) From the above we can identify that if IP belongs to the
11. User can download partially using IMAP4 protocol, subnet whose id is 160 with host as 10
when the network bandwidth is low. Choice (C) The broadcast address will be196.196.64.175.
Choice (D)
12. MIME is used for the message having Multimedia
objects. Choice (D) 21. the IP addresses are:
206.82.00000010.0
13. TCP uses 32-bit sequence number, we have 232 distinct
206.82.0000000.11.0
numbers
206.82.00000100.0
Warp around time
206.82.00000101.0
232 × 8 The super net mask is 255.255.244.0 Choice (B)
=
10 × 106 22. 255.0.0.0 can be a subnet for class A, supernet for class B
= 57 minutes (approximately) and class C. Choice (B)
Choice (C)
23. (A) p = 3 q = 11
14. Sender’s window size is determined by using Receiver n = p × q = 33
window size and congestion window size. Choice (A) z = (p – 1) (q – 1) = 20
15. As the cluent received reply with sequence number gcd (d, z) = 1
16000, it sends the ACK with sequence number 16001 gcd (d, 20) = 1
and as it is not sending any data packet it sends with \ d=7
same sequence number. (e × 7) mod 20 = 1
i.e. sent in request i.e. 4000. Choice (C) \ e = 3. Choice (A)
16. 0.0.0.0 Address can be used as only source address in 24. GATE
DHCP. Choice (B) 7 1 20 5
6
17. In one sec we can send 2 × 10 bits Encrypted message
In 300 × 10–3 sec we can send = 73 mod 33 = 13
= 300 × 10–3 × 2 × 106 bits 13 mod 33 = 1
= 600 × 103 bits 203 mod 33 = 14
= 6,00,000 bits (or) 75000 bytes. 53 mod 33 = 26
Choice (B) Message is = 1311426. Choice (A)
18. Subnet mask for devices will be 255.255.240.0 as it has 25. EkuB ( A, RA )
borrowed 4 bits from host ID, if AND operation is per- EKU ( A,R A )
K
formed between subnet mask and IP address, then the
HOST HOST
result for both will be 172.16.16.0. Choice (A) EKU ( RA,RB,KS )
HOST A
19. If we perform AND operation between IP and mask we EKS ( RB )
will get subnetwork address
IP = 10000010.00101101.0010000.00111000
Subnet mask RA = random number generated by A
11111111.11111111.11110000.00000000 RB = random number generated by B
___________________________________.
130 . 45 . 32 .0. Choice (C) KS = session key
The first two handshakes are public key cryptography
20. Subnet mask = 255.255.255.240 and last one is private key cryptography. Choice (C)
11111111.11111111.11111111.11110000

You might also like