CHAPTER 1 Questions
CHAPTER 1 Questions
b) A group of connected computers and devices that share resources and communicate
b) Bridge
c) Hub
d) Router
b) PC
c) Smartphone
d) Server
10. Which of the following allows you to connect and login to a remote
computer?
a) SMTP
b) HTTP
c) FTP
d) Telnet
a) Circuit switching
b) Packet switching
c) Both a and b
a) Datagram subnet
c) Both a and b
a) Datagram subnet
b) Virtual circuit subnet
c) Both a and b
a) Datagram subnet
c) Both a and b
21. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is
____________ (in microseconds)
a) 3.2
b) 32
c) 0.32
d) 320
22. Transmission delay does not depend on _____________
a) Packet length
b) Distance between the routers
c) Transmission rate
d) Bandwidth of medium
23. In a network, If P is the only packet being transmitted and there was no earlier transmission, which
of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
24. How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10
25.Which of the following layers is an addition to OSI model when compared with TCP IP model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
26.The functionalities of the presentation layer include ____________
a) Data compression
b) Data encryption
c) Data description
d) All of the mentioned
28.In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______
a) Added
b) Removed
c) Rearranged
d) Randomized
29. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model
30.Which layer is responsible for process to process delivery in a general network model?
a) network layer
b) transport layer
c) session layer
d) data link layer
31.Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
32.Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
36. File, Transfer, Access and Management (FTAM) is a function of which layer?
a) Presentation Layer
b) Application Layer
c) Session Layer
d) Data Link Layer
39. The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP
connections at the target host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding
46.Given L = number of bits in the packet, a = average rate and R = transmission rate. The
Traffic intensity in the network is given by ____________
a) La/R
b) LR/a
c) R/La
d) Ra/L
47. In the transfer of file between server and client, if the transmission rates along the
path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ___________
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
48. The total nodal delay is given by ____________
a) dnodal = dproc – dqueue + dtrans + dprop
b) dnodal = dproc + dtrans – dqueue
c) dnodal = dproc + dqueue + dtrans + dprop
d) dnodal = dproc + dqueue – dtrans – dprop
49. In a network, If P is the only packet being transmitted and there was no earlier
transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay