Computer Networks

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 10

ABBSOFT COMPUTERS

COMPUTER NETWORKS

1) The concept of connected computers sharing resources is called…………….


a) Internetworkin
b) Intranetworking
c)Networking
d) None of the above

2) VPN stands for


a) Virtual Private Networ
b) Visual private network
c) Virtual public network
d) Visual public network

3) IMP stands for


a) Internal message passing
b) Interface message passing
c) Internal message parsing
d) Interface message parsing

4) Process to process delivery of the entire message is done by


a) Physical layer
b) Transport layer
c) Session layer
d) Presentation layer

5) Dialog controller role is played by


a) Session layer
b) Application laye
c) Transport layer
d) Network layer

6) Syntax and semantics of the information exchanged between two systems is done by
a) Session layer
b) Application laye
c) Transport layer
d) Presentation layer

7) SDU stands for


a) Service data unit
b) Service digital unit
c) Session data unit
d) Session data unit

8) PDU stands for


a) Power data unit
b) Protocol digital unit
c) Presentation data unit
d) Protocol data unit

1
ABBSOFT COMPUTERS
9) Transmission lines suffers from major problem
a) Attenuation distortion
b) Delay distortion
c) Noise
d) All of the above

10) If the value of a signal changes over a very short span of time, its frequency is
……………..
a) Low
b) High
c) Average
d) Zero

11) The wavelength of red light whose frequency is 4*1014 m is …………….


a) 0.75m
b) 0.75mµ
c) 0.75mµ m
d) None of the above

12) The term ……….. describes the position of the waveform relative to time 0.
a) Frequency
b) Phase
c) Phase shift
d) Time period

13) Data rate depends on three factors


a) Bandwidth available
b) Level of the signals we use
c) Quality of the channel
d) All of the above

14) Which layer is not really a layer


a) Host of the network
b) Network to host
c) Application to presentation
d) None

15) The term used to describe the way in which computers are connected in network.
a) Logic
b) Technology
c) Topology
d) All of the above

16) FDM stands for


a) Fixed division multiplexing
b) First division multiplexing
c) Frequency division multiplexing
d) None
17) FDDI stands for
a) Fixed distributed data interface
b) First division data interface
c) Fiber distributed data interface
d) None

2
ABBSOFT COMPUTERS

18) The ………….. layer is responsible for resolving access to the shared media or
resources.
a) physical
b) MAC sub layer
c) Network
d) Transport

19) Coding can be divided into


a) Block coding
b) Convolution coding
c) Both of the above
d) None of the above

20) CRC stands for


a) Cyclic redundancy codes
b) Code redundancy cycle
c) Critical redundancy cycle
d) None of the above

21) DLE STX stands for data link escape, start of text
a) True
b) False

22) In ……….. type of service, no connection is established before hand or afterwards.


a) acknowledged connectionless service
b) Unacknowledged connectionless service
c) acknowledged connection oriented service
d) Unacknowledged connection oriented service

23) The …….. ………. Service primitives provide a way for the data link layer on the
requesting side to learn whether the request was successfully carried out and if not, why
a) request
b) indication
c) response
d) confirm

24) HDLC stands for high level data link connection


a) True
b) False

25) ABM stands for asynchronous balanced mode


a) True
b) False

26) CDMA stands for code division multiple authorities


a) True
b) False

27) Flooding is a dynamic algorithm


a) True
b) False

3
ABBSOFT COMPUTERS

28) Network layer is the topmost layer in the subnet


a) True
b) False

29) The static routing is also referred to as non- adaptive.


a) True
b) False

30) The congestion routing algorithms change their routing decisions to reflect changes in
topology and usually the traffic as well.
a) True
b) False

31) IPV4 stands for internet permission version 4


a) True
b) False

32) IPV4 address is of type


a) unicast
b) multicast
c) broadcase
d) all of the above

33) Internet connection message protocol for IPV6 means ICMPv6


a) True
b) False

34) MLD means multicast listener discovery


a) True
b) False

35) In multicast listener query routers use multicast listener query messages to query a
subnet for multicast listeners.
a) True
b) False

36) An analyst address identifies multiple interfaces.


a) True
b) False

37) The internet addresses are ……. Bits in length in IPV4 addressing scheme.
a) 16
b) 64
c) 32
b) 48

38) The IPV4 address is a logical address because it is assigned at the internet layer.
a) True
b) False

4
ABBSOFT COMPUTERS

39) In addresses for ……….networks, the first 16 bits specify a particular network, and
the last 16 bits specify a particular host.
a) class A
b) class B
c) class C
b) class D

40) UDP stands for user data protocol


a) True
b) False

2 MARK QUESTIONS

1)………… is a set of connecting links between LANs.


A …………. Line considered as a fast WAN link, transmits at 1.5 Mbps, or 1 million bits
per second.
a) MAN, S1
b) WAN, T1
c) LAN, P1
d) none of the above

2) Information that is continuous is ………………..


Information that has discrete states is ………………
a) Analog data, Digital data
b) Digital data, Analog data
c) Both are Analog
d) Both are Digital

3) The data link layer of the ISO OSI model is divided into ……… sub layers.
A WAN typically spans a set of countries that have data rates less than …….Mbps.
a) 2,2
b) 1,2
c) 2,1
d) 1,1

4) TDMA stands for Time division multiple access


FDMA stands for frequency division multiple access
a) True
b) False

5) Session routing algorithm takes place when subnet uses virtual circuits
Forwarding is used if subnet uses datagram.
a) True
b) False

6) TFTP stands for trivial format transfer protocol


SNMP stands for simple network management protocol
a) TT
b) FF
c) FT
d) TF

5
ABBSOFT COMPUTERS

7) When the load is much less than the capacity of the network, the delay is at a
minimum.
Throughput is the number of bits passing through a point in a second.
a) TT
b) FF
c) FT
d) TF

8) A UDP datagram of 516 bytes is acceptable to all implementations.


The UDP is basically an application interface to IP.
a) TT
b) FF
c) FT
d) TF

9) The layers which are not present in TCP / IP reference model are ------&-------
(Session and presentation)

10)The different types of intruders are


a) Active
b) Passive

11) How many addresses are in between 194.24.0.0 to 194.24.31.255


a) 1024 address
b) 1026 address
c) 1022 address
d) None

8) A UDP datagram of 516 bytes is acceptable to all implementations.


The UDP is basically an application interface to IP.
a) TT
b) FF
c) FT
d) TF
8) A UDP datagram of 516 bytes is acceptable to all implementations.
The UDP is basically an application interface to IP.
a) TT
b) FF
c) FT
d) TF

9) The service access points in session layer are called SSAPs.


Sessions are ended with S-RELEASE.request primitive.
a) TT
b) FF
c) FT
d) TF

6
ABBSOFT COMPUTERS
10) In principle, all OSI connections are half duplex.
A procedure included in the caller’s address space by the linker is known as local
procedure.
a) TT
b) FF
c) FT
d) TF

11) IEEE stands for –


a) Institute of Electrical and Electronics Engineering
b) Institute of Electronics and Electricity Engineering
c) Institute of Electrical and Electronics Engineering
d) None

12) The no. of bits to identify the network in class A is –


a) 8
b) 16
c) 32
d) 24

13) Inter NIC is known as –


a) International Net Information Communication
b)Inter Network Information Command
c) International Network Institute Cente
d) International Network Information Cente

14) Repeaters are


a) Analog
b) Analog and digital
c) digital
d) None of the above

15) The different types of intruders are


a) Active
b) Active and passive
c) passive
d) none of the above

16) TPDU is an acronym of ------- (Transport Protocol Data Unit)

17) Ethernet incorporates both ________ & ________ layer


(a) Physical , DLL
(b) Session , Transport
(c) Presentation , Application
(d) none of these

18) Broadcast networks have


a) single communication channel
b) multiple communication channel
c) can be anyone
d) can be both.

7
ABBSOFT COMPUTERS
19) TCP / IP model contains :
a) 4 layers
b) 5 layers
c) 4-5 layers
d) none of these

20) Frame reader is subdivided into __________and _______________. (Physical, IP)

4 MARK QUESTIONS
1) Match the following
a) simplex communication 1)data transfers occurs in one direction only
b) half duplex communication 2) data transfers occurs in either direction,
but not simultaneously
c) full duplex communication 3) data transfers occurs in either direction
simultaneously

a) a-1,b-2,c-3
b) a-2,b-1,c-3
c) a-1, b-3,c-2
d) a-3,b-2,c-1

2) Match the following


a) Entity 1)Entities in same layers on different machines
b) Peer entity 2) Active elements of each layer
c) Service provider 3) Entities in layer n implement a service used by
layer n+1
d) Service user 4) ) Entities in layer n+1 use a service provide a
service layer n

a) a-1,b-2,c-3,d-4
b) a-2,b-1,c-3,d-4
c) a-1, b-3,c-4,d-2
d) a-3,b-4,c-1,d-2

3) Match the following for IP addresses


a) class a 1)7 bits for network and 24 bits for host portion
b) class c 2) 14 bits for network and 16 bits for host portion
c) class b 3) 21 bits for network and 8 bits for host portion

a) a-1,b-2,c-3
b) a-2,b-1,c-3
c) a-1, b-3,c-2
d) a-3,b-2,c-1

4) Match the following field names in TCP segment format to their description
a) source port 1)The 16 bit source port number, used by the receiver to reply.
b) destinatation port 2) The 16 bit destination port number.
c) reserved 3) six bits reserved for future use; must be zero

a) a-1,b-2,c-3
b) a-2,b-1,c-3
c) a-1,b-3,c-2
d) a-3,b-2,c-1

8
ABBSOFT COMPUTERS

5) Match the following


a) Back pressure 1) no comm. b/w congested nodes & source/destination
b) Choke packets 2) node explicitly sends a signal to source/destination
c) implicit signaling 3) congestion control mechanism
d) explicit signaling 4) is a packet

a) a-1,b-2,c-3,d-4
b) a-2,b-1,c-3,d-4
c) a-1, b-3,c-4,d-2
d) a-3,b-4,c-1,d-2

6) Main components of computer networks are


a) Servers & Workstatio
b) Nodes
c) Network operating system
d) All of the above

7) First four different layers of OSI model are ----,-----,------&-------.


a) Physical, Data link , Network , Transport
b) Physical, Session, Network , Transport
c) Application , Session , Network , Transport
d) Network, Physical Transport, Session

8) Which is the data link layer protocol :


1) ADLC
2) BSC
3) SDLC
4) HDLC

a) only 1,2
b) only 1,3,4
c) only 4
d) all of the above

9) The address reserved for private networks is


a) 172.16.255.0
b) 173.15.256.1
c) 173.15.258.2
d) None

10) The IPsec is a collection of protocols designed by internet engineering task force to
provide security for a packet at the n/w level.
In encapsulation mode, a common technique is packet switched networks consists of
wrapping a packet in a new one.
The Authentication header is used to provide integrity and authentication to IP
datagrams.
The ESP is used to provide integrity check, authentication, and encryption to IP address.
a) TTTT
b) FFTT
c) FTTT
d) TFFT

9
ABBSOFT COMPUTERS
11) The TCP protocol is based on end to end delivery.
The client SMTP uses the DNS to determine the IP address of the destination mailbox.

a) TT
b) FF
c) FT
d) TF

12) A procedure included in the caller’s address address space by the linker is known as
local procedure.
Packing parameters into a message is called parameter marshaling

a) TT
b) FF
c) FT
d) TF

13) Match the following


Physical address IP address
1.02-60-8A-01-02-04 a) 192.168.0.1
2.08-03-8A-01-02-04 b) 192.168.0.2
3.08-03-8A-01-02-04 c) 192.168.0.3
a) 1-a, 2-b, 3-c
b)1-b, 3-c, 2-a
c)1-b, 3-a, 2-c
d) 1-c, 2-b, 3-

14) Which classes can not accommodate more than 254 hosts.
1) class B, class C
2) class D, class C
3) class B, class D
4) class B, class A

15) For UDP datagram match the following


a) Source port 1) specifies port of destination process on destination host.
b) Destination port 2) 16 bit 1’s complement of one’s complement sum of a
pseudo-IP header, and the UDP data.
c) Length 3) congestion control mechanism
d) Checksum 4) length of this user datagram, including the header

a) a-1,b-2,c-3,d-4
b) a-2,b-1,c-3,d-4
c) a-1, b-3,c-4,d-2
d) None of the above

10

You might also like