CS610 Solved MCQS 100% Correct (Visit Vurank For More)
CS610 Solved MCQS 100% Correct (Visit Vurank For More)
---------------------------------------------------------------
-------------
· Physical Layer
· Internet Layer
· Transport Layer
· Physical Layer
· Internet Layer
· Transport Layer
· IP
· UDP
· TCP
· None of the given
· BGP
· OSPF
· RIP
_______ is ideal in a situation where the group is small and all members are
attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
Router that decrements TTL to __ sends ICMP time exceeded message, with
router s address as source address
·3
·2
·1
·0
· hardware
· software
·
· internet
Although message exchange can be used to bind addresses, sending a request for
each binding is hopelessly inefficient.
· True
· False
· 32, 48
· 24, 32
· 32, 64
· 32, 128
· False
· True
·T
·D
·C
· T, C
Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for
Data Exchange?
·T
·C
·D
· C, D
· T, C
·T
·C
·D
· T, D
·c
·T
· T, C
The general form of an IP datagram is with a header followed by data. The header
contains information that controls where and how the datagram is to be sent.
· True
· False
To save traffic, an EGP does not summerize routing information from the
autonomous system before passing it to another autonomous system.
· True
· False
------------- was especially concerned about the lack of high powered computers.
· IEEE
· EIA
· None
· True
· False
· Packets
· Data
· Frame
· None of given
· True
· False
The network that uses a -------------, usually consist of a single long cable to which
computer attach.
· Star topology
· Bus topology
· Ring topology
· Star topology
· Bus topology
· Ring topology
·
·
·
·
· Isochronous Network
· Asynchronous Network
· None of the given
The network with Throughput T and Delay D has a total --------------- bits in
transit at a time.
·D+T
·D–T
·DXT
·D/T
One repeater ---------------, two repeaters --------------- the maximum cable length
limitation.
· Double, triple
· Double, 4 time
· half, triple
· Double, half
· True
· False
· True
· False
· True
· False
________ device is used for multicasting.
· Hub
· Switch
· Router
· PIM-DM
· PIM-SM
· PIM-AM
· Dynamic routing
· Static routing
· Address resolution
· OSPF
· MEOSPF
· MOSPF
· True
· False
· 30Bit
· 32Bit
· 34Bit
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
· True
· False
_________ uses window mechanism to control the flow of data.
· IP
· UDP
· TCP
· door
· window
· acknowledgment
· retransmission
· IGP
· BGP
· RIP
· BGP
· OSPF
· RIP
· Non of these
· False
We use the term _______ to refer to a measure of the path that routing software
use when choosing a route.
· routing path
· routing metric
· routing
· switching
Part of the 3-way handshake used to create a connection, requires each end to
generate a random _____ sequence number.
· 32 bit
· 16 bit
· 8 bit
· 64 bit
· False
· Transport
· Network
· Physical
· Internet
_______ is ideal in a situation where the group is small and all members are
attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
· N2
· N-1
· (N2 –N)/2
· (N2-N)/2
· N(N-1)
· N2
· 10 Mbps
· 100 Mbps
· 1000 Mbps
· Greedy algorithm
· Dijksta’s algorithm
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
· 48-bit
· 32-bit
· 24-bit
The address __________ identifies the physical network to which the computer
is attached, while the _______ identifies an individual computer on that
network.
· prefix , suffix
· suffix , prefix
· suffix , suffix
___________ places the boundary between the first and second octets
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the second and third octets.
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the third and fourth octets.
· Class A
· Class B
· Class C
· Class D
· FLAGS
· FLAGMENT OFFSET
· IDENTIFICATION
· TCP
· UDP
· IP
· Data link
· Network
· Transport
· Source port
· Source port
· Destination Port
· Destination Port
· Source port
· Logical address
· UDP
· TCP
· RIP
· OSPF
· BGP
· True
· False
· Intranet, LAN
· Internet, WAN
· Intranet, WAN
· Internet, LAN
· True
· False
· True
· False
The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address__________.
· itself
· prefix
· suffix
· mask
·A
·C
·E
·B
Network
Transport
Datalink
none of the given
Due to revolutionalization of IP-V6 the speed has increased from _______
512 to 1 GB
as the Internet grew, the original Classful addressing scheme became a limitation. The IP
address space was being exhausted because all networks had to choose one of four
possible sizes. www.vustudents.ning.com
False
As the Internet grew, the original Classful addressing scheme became a limitation. The IP
address space was being exhausted because all networks had to choose one of ________
possible sizes.
Three
Header contains all information needed to deliver datagram to the destination computer.
But which one of the following is not included:
Rectifier
______ contains all information needed to deliver datagram to the destination.
Header
one of the parameters, which motivated IP for change is address space. The
_____________ address space allows for over a million networks. But most networks are
class C and too small for many organizations.
32-bit
Sub netting
False
________ field is used to identify a specific path through the network
FLOW LABEL
_______ is a technique used to Limit datagram size to small MTU of any network
Fragmentation
Hashing is the transformation of a string of characters into a usually shorter fixed-length
value or a key that represents the original string.
True
Closed-form Computation
Flow label
True
Preliminary version of IP was called _________.
IPV6
End to End delivery Service of IP datagram is _____
Connectionless
Every hardware technology specification includes the definition of the maximum size of
the frame data area, which is called the ____________ Transmission Unit.
Maximum
IPV6 addresses are _____ bits.
128
MTU Stands for _______
Maximum transmission unit
_______ shows senders preference for low latency, high Reliability.
SERVICE TYPE
NEXT HEADER field in the base header defines type of header it appears at the end of
fixed-size base header.
True
IP header
The protocol address of the next hop must be _____________ to an equivalent hardware
address before a packet can be sent.
Translated www.vustudents.ning.com
Manual entry
Boot time routing
Static routing
None of the above
Router
Information
Next hop
None of the above
Voice
Video
Data
All of above
(1) There are three types of Hubs that exist. Which of the following options
correctly describes these three?
a. Speed rating
b. Durability
c. Brand
d. Class
Which of the following network topologies among the list below is incorrect?
a. Star
b. Internet
c. Ring
d. Bus
a. Bi-directional
b. Few Kilometer range
c. Proton based
d. Ethernet(basis for 802.3) at 10 Mbps
Client-server
Client
Computer network
Hub
In which of the following networks does the client submit a task to the server,
then the server executes and returns the result for the requesting client station?
(a) Peer-to-Peer
(b) Client-Server
Server-Based
All of the above
Star
Bus
Mesh
Ring
Which of the following topologies is used for Ethernet?
Star
Bus
Ring
All of the above
Error detection
Set up a session
Routing
Encryption
IEEE 802.3
IEEE 802.2
IEEE 802.5
IEEE 802.4
ITU
IEEE
EIA
ISO
Packet Switching
Link Switching
Packets are switched in the form of datagram
Circuit switching techniques
Identify any of the following statements which truly describe a virtual circuit.
(a) Packets are forwarded more quickly and no routing decisions
(b) More reliable in functionality
(c) Call set up phases are present
Packets are centralized at random and more routing decisions are made
Which of the following operating systems software is most suitable for wide area
network?
DOS
OS/2
WINDOWS NT
NOVELL NETWARE
3 com LP III