0% found this document useful (0 votes)
77 views

Computer Networks Exam Solution

The document contains 20 multiple choice questions about networking and cybersecurity concepts. The questions cover topics such as the OSI model layers, IP addressing, routing, TCP, cryptography, and more. The correct answers are identified with a checkmark.

Uploaded by

JBBAR
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views

Computer Networks Exam Solution

The document contains 20 multiple choice questions about networking and cybersecurity concepts. The questions cover topics such as the OSI model layers, IP addressing, routing, TCP, cryptography, and more. The correct answers are identified with a checkmark.

Uploaded by

JBBAR
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

The layer has the primary responsibility for communications between one device
and the devices connected to it.

⇤ A. network
⇤ B. physical
⇤ C. transport
⌅ D. link
⇤ E. application

2. A network router joins two together?

⇤ A. computers
⌅ B. networks
⇤ C. switches
⇤ D. gateways
⇤ E. hosts
3. What is the size of an IPv4 address?

⌅ A. 32 bit
⇤ B. 48 bit
⇤ C. 64 bit
⇤ D. 80 bit
⇤ E. 128 bit
4. As a message proceeds down the protocol stack, the destination port number is added
at the:

⇤ A. Application Layer
⌅ B. Transport Layer
⇤ C. Network Layer
⇤ D. Data Link Layer
⇤ E. None of the above
5. What is the port number for SMTP?

⇤ A. 21
⌅ B. 25
⇤ C. 65
⇤ D. 70
⇤ E. 80

PAPER CODE COMP211 page 2 of 6 Continued


6. In the DNS structure, the servers responsible for the .uk domain are name
servers.

⇤ A. authoritative
⌅ B. top level domain
⇤ C. root
⇤ D. default
⇤ E. none of the above

7. Which of the following applications will effectively run on UDP?

⇤ A. Email
⇤ B. File transfer
⇤ C. Web
⌅ D. Multimedia streaming
⇤ E. All of the above

8. In a client/server connection using HTTP over TCP, if multiple objects are sent over the
same TCP connection, then the connection is classified as:

⇤ A. Stateless
⌅ B. Persistant
⇤ C. Non-persistant
⇤ D. Stable
⇤ E. Reliable

9. Consider the Go-Back-N protocol with a sender window size of N = 4 and a sequence
number range of 1024. Suppose that at time t the next in-order packet that the receiver
is expecting has sequence number 228. Assume that the medium does not reorder
messages. Which of the following is a possible pair of values for the senders send base
and nextseqnum pointers at time t?

⇤ A. send base=224; nextseqnum=226


⌅ B. send base=225; nextseqnum=228
⇤ C. send base=227; nextseqnum=232
⇤ D. send base=228; nextseqnum=233
⇤ E. send base=229; nextseqnum=233

PAPER CODE COMP211 page 3 of 6 Continued


10. Packet retransmission in TCP is coupled with:

⇤ A. Flow Control
⌅ B. Congestion Control
⇤ C. Connection Management
⇤ D. All of the above
⇤ E. None of the above

11. TCP and UDP use the 16-bit Internet Checksum for computing the value of the checksum
field in each segment. In this question you are asked to use the same method but for
simplicity we restrict to 8-bit words. Suppose you have the following three 8-bit words:
11101011
01010101
10110111
What is the value of the 8-bit Internet Checksum (i.e., the 1s complement of the 8-bit
sum) of these words?

⌅ A. 00000111
⇤ B. 00001000
⇤ C. 00001010
⇤ D. 00001001
⇤ E. None of the above

12. Consider a router that interconnects three subnets: X, Y, and Z. Suppose all of the in-
terfaces in each of these subnets are required to have the prefix 13.2.80.0/21. Suppose
subnet X is required to support 1000 interfaces, and subnets Y and Z are each required
to support 500 interfaces. Which set of network addresses for X,Y and Z satisfies these
constraints?

⇤ A. X: 13.2.80.0/22; Y: 13.2.82.0/23; Z: 13.2.84.0/23


⌅ B. X: 13.2.80.0/22; Y: 13.2.84.0/23; Z: 13.2.86.0/23
⇤ C. X: 13.2.84.0/23; Y: 13.2.80.0/23; Z: 13.2.82.0/23
⇤ D. X: 13.2.88.0/23; Y: 13.2.84.0/22; Z: 13.2.80.0/22
⇤ E. None of the above

PAPER CODE COMP211 page 4 of 6 Continued


13. Given are the following subnet addresses:
X: 192.168.128.0/22 Y: 192.168.136.0/22 Z: 192.168.142.0/22
Which of the following statements is true?

⌅ A. 192.168.132.1 and 192.168.146.1 are not in the IP range of any of the 3 subnets.
⇤ B. 192.168.132.1 is in the range of X, and
192.168.146.1 is in the range of Z.
⇤ C. 192.168.132.1 is in the range of Y, and
192.168.146.1 is in the range of Z.
⇤ D. 192.168.132.1 is is not in the IP range of any of the 3 subnets, and
192.168.146.1 is in the range of Z.
⇤ E. 192.168.132.1 is in the range of X, and
192.168.146.1 is not in the IP range of any of the 3 subnets.

14. When the speed of the incoming packets at a router exceeds the outgoing link data rate,
which of the following may occur?

⇤ A. Transmission delay
⇤ B. Queuing delay
⇤ C. Packet loss
⌅ D. All of the above
⇤ E. None of the above

15. Which of the following MAC protocols is used by Ethernet?

⇤ A. Slotted Aloha
⇤ B. CSMA/CA
⌅ C. CSMA/CD
⇤ D. TDMA
⇤ E. FDMA

16. What are the CRC bits defined by the generator 1101 and the data bit string 111011?

⇤ A. 011
⇤ B. 100
⇤ C. 101
⇤ D. 110
⌅ E. 111

PAPER CODE COMP211 page 5 of 6 Continued


17. What is the signal-to-noise ratio corresponding to 40dB?

⇤ A. 40
⇤ B. 400
⇤ C. 1000
⇤ D. 4000
⌅ E. 10000

18. What is the main advantage of first distributing a session key and then using symmetric-
key cryptography rather than using public-key cryptography techniques for the whole
communication?

⇤ A. Symmetric-key cryptography is more secure


⇤ B. Public-key cryptography is more secure
⇤ C. Public-key cryptography leads to shorter cyphertext
⌅ D. Symmetric-key cryptography is faster than public-key cryptography
⇤ E. None of the above

19. Consider RSA with p = 5 and q = 7. What are the values of n and z?

⌅ A. n = 35 and z = 24
⇤ B. n = 35 and z = 96
⇤ C. n = 119 and z = 24
⇤ D. n = 119 and z = 96
⇤ E. None of the above

20. The AES encryption standard uses the following techniques:

⌅ A. Block Cypher
⇤ B. Stream Cypher
⇤ C. Public key cryptography
⇤ D. A and B
⇤ E. All of the above

PAPER CODE COMP211 page 6 of 6 End

You might also like