Computer Networks Test 4: Number of Questions: 25 Section Marks: 30
Computer Networks Test 4: Number of Questions: 25 Section Marks: 30
Directions for questions 1 to 25: Select the correct alterna- 10. In TCP the flags syn = 0 and ack = 1 indicates:
tive from the given choices. (A) open connection packet
1. Which of the following IP address belongs to class A (B) open connection ack
network? (C) data packet
(A) 130. 140. 180. 210 (B) 127. 190. 120. 191 (D) reply packet
(C) 125. 150. 160. 189 (D) 132. 131. 139. 134 11. A user ‘A’ got an email containing multi media (requires
2. What will be the destination address if host A with IP high band width) if the band width is limited then:
address 156.180.190.16 wants to send data to all the (A) user can open the mail using SMTP
members in network with network ID 19? (B) user can download the message using the POP3
(A) 255.255.255.255 (B) 19.255.255.255 (C) user can partially download email using IMAP4
(C) 156.19.255.255 (D) 156.180.255.255 (D) user cannot open (or) download the email
3. Which of the following work stations does not imple- 12. MIME supports
ment network layer? (A) Text in character sets other than ASCII
(A) Switch (B) Brouter (B) Non text attachments
(C) Gate way (D) Router (C) Message bodies with multiple parts
(D) All the above
4. _____ layer responds when packet gets discarded due
to its TTL (when TTL becomes 0) 13. For a link having bandwidth 10 Mbps, calculate the
(A) Application layer (B) Transport layer time to wrap the sequence numbers of TCP? (approxi-
(C) Network layer (D) Physical layer mate value)
(A) 3436 minutes (B) 100 seconds
5. Which of the following algorithm is not related to pri-
(C) 57 minutes (D) 10 minutes
vate key cryptography?
(A) DES (B) RSA 14. Sender’s window size in TCP is determined by
(C) AES (D) IDEA (i) Receiver window size
(ii) Congestion window size
6. What is the minimum positive integer ‘p’ such that
(A) Both (i) and (ii)
3p mod 17 = 1?
(B) Only (i)
(A) 5 (B) 8
(C) Only (ii)
(C) 12 (D) 16
(D) None of the above
7. X. 21 is:
15. Consider the connection establishment in TCP using
(A) a method of determining which device has access
3 way handshaking
to the transmission medium at any time
(B) a method for access control techniques for multi- Client Server
ple access transmission media
request
(C) a very common bit oriented data link protocol
Seq : 4000
(D) a network access standard for connecting stations
to a circuit switched networks
reply
8. The network topology that supports bi-directional links
between each possible node is: Seq : 16000
(A) ring (B) star ack : 4001
(C) tree (D) mesh
ack
9. Match the following:
Seq : ?
Column–I Column–II ack : ?
(a) Logical addressing system (i) 16 bit
(b) Physical addressing (ii) 32 bit What will be the values of sequence number (seq) and
system ack for the last hand shake?
(A) seq = arbitrary number ack = 16001
(c) Port addressing system (iii) 48 bit (B) seq = 4000 ack = arbitrary number
(A) a–(i) b–(ii) c–(iii) (B) a–(ii), b–(i), c–(iii) (C) seq = 4000 ack = 16001
(C) a–(ii), b–(iii), c–(i) (D) a–(iii), b–(i), c–(ii) (D) seq = 4001 ack = 16002
Computer Networks Test 4 | 3.203
16. Which of the following can be used for only source IP 22. Consider the sub net mask of IP address 255.0.0.0 to
in a packet header? which class of IP address this super net mask belongs
(A) 10.1.1.1 (B) 0.0.0.0 to?
(C) 0.1.1.1 (D) 127.1.1.1 (A) class A (B) class B
17. If WAN link is 2 Mbps and round trip time between (C) class C (D) None of these
source and destination is 300 m sec, what would be the Linked Answer Questions 23 and 24:
optional TCP window size needed to fully utilize the RSA algorithm is used by choosing two prime number
line? p = 3, q = 11.
(A) 60,000 bits (B) 75,000 bytes 23. What are the encryption and decryption keys?
(C) 75,000 bits (D) 60,000 bytes (A) 3, 7 (B) 2, 6
18. Device A IP address is 172.16.17.30/20 Device B IP (C) 5, 7 (D) 8, 12
address is 172.16.28.15/20, which one of the following 24. What will be the encrypted message for GATE (if A = 1,
statement is correct? B = 2)?
(A) Both devices are in the same subnet (A) 1311426 (B) 2416513
(B) Devices are in different subnets (C) 10134261 (D) 1421331
(C) Variable length subnet mask is used in the network 25. Which of the following is TRUE for authentication and
(D) Insufficient data key management among two parties?
19. If the IP address is 130.45.34.56 and subnet mask is (A) 3 hand shake is necessary for the authentication
255.255.240.0, then what is the subnet address? with each handshake done with private key cryp-
(A) 130.45.0.0 (B) 130.45.34.0 tography
(C) 130.45.32.0 (D) 130.45.32.56 (B) 3 handshake is necessary for the authentication
20. If the IP address is 196.196.64.170 and subset mask is and key management with each hand shake, done
255.255.255.240, what is the broadcasting address to with public key cryptography
the subnet? (C) 3 hand shake is necessary for the authentication
(A) 196.196.64.255 (B) 255.255.255.255 and key management with 2 hand shakes one with
(C) 196.196.240.170 (D) 196.196.64.175 public key cryptography and one with private key
cryptography
21. Consider the following Networks 206.82.2.0,
(D) 3 hand shake is necessary for the authentication
206.82.3.0, 206.82.4.0 and 206.82.5.0; the Super net
and key management with handshake as public
mask will be:
key cryptography and 2 handshakes as private key
(A) 255.255.252.0 (B) 255.255.244.0
cryptography
(C) 255.255.255.82 (D) 206.82.1.0/22
Answer Keys
1. C 2. B 3. A 4. C 5. B 6. D 7. D 8. D 9. C 10. C
11. C 12. D 13. C 14. A 15. C 16. B 17. B 18. A 19. C 20. D
21. B 22. B 23. A 24. A 25. C