NETWORK 621 CA TEST 1 MCQs
NETWORK 621 CA TEST 1 MCQs
EASY QUESTIONS
TCP is a .......... protocol.
A. stream-oriented
B. message-oriented
C. block-oriented
D. packet-oriented
ANSWER:
Which of the following is not the layer of TCP/IP protocol.
A. Physical layer
B. link layer
C. network layer
D. transport layer.
ANSWER:
TCP groups a number of bytes together into a packet called a ....
A. user datagram
B. segment
C. datagram
D. packet
ANSWER:
The .......... of TCP/IP protocol is responsible for figuring out how to get data to its
destination.
A. application layer
B. link layer
C. network layer
D. transport layer.
ANSWER:
TCP is a(n) ........... transport protocol.
A. protocol delivery
B. reliable
C. best-effort delivery
D. effortless delivery
ANSWER:
......... is the protocol that hides the underlying physical network by creating a virtual
network view.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
ANSWER:
To use the services of UDP, we need ......... socket addresses.
A. four
B. two
C. three
D. four
ANSWER:
Which of the following is not the name of Regional Internet Registries(RIR) to administer the
network number portion of IP address.
A. American Registry for Internet Numbers(ARIN)
B. Reseaux IP Europeans(RIPE)
C. Europeans Registry for Internet Numbers(ERIN)
D. Asia Pacific Network Information Center(APNIC)
ANSWER:
UDP packets are called .......
A. user datagrams
B. segments
C. frames
D. packets
ANSWER:
............ addresses use 21 bits for the Network and 8 bits for the portion of the IP address for
TCP/IP network.
A. Class A
B. Class B
C. Class C
D. Class D
ANSWER:
UDP packets have fixed-size header of .......... bytes.
A. 16
B. 8
C. 32
D. 64
ANSWER:
.......... messages are never sent in response to datagrams with a broadcast or a multicast
destination address.
A. ICMP
B. ARP
C. IP
D. BOOTP
ANSWER:
TCP assigns a sequence number to each segment that is being sent. The sequence number
for each segment is number of the ....... byte carried in that segment.
A. first
B. last
C. middle
D. zero
ANSWER:
.......... is responsible for converting the higher level protocol address (IP addresses) to
physical network addresses.
A. Internet Protocol (IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
ANSWER:
UDP and TCP are both ......... layer protocols.
A. data link
B. network
C. transport
D. interface
ANSWER:
........... is a process-to-process protocol that adds only port addresses, checksum error
control, and length information to the data from upper layer.
A. TCP
B. UDP
C. IP
D. ARP
ANSWER:
Which of the following functions does UDP perform?
A. Process-to-process communication
B. Host-to-host communication
C. End-to-end reliable data delivery
D. Interface-to-interface communication.
ANSWER:
A port address in TCP/IP is .........bits long.
A. 32
B. 48
C. 16
D. 64
ANSWER:
When the IP layer of a receiving host receives a datagram, .....
A. delivery is complete
B. a transport layer protocol takes over
C. a header is added
D. a session layer protocol takes over
ANSWER:
20) TCP/IP is a .......... hierarchical protocol suite developed before the OSI model.
A. seven-layer
B. five-layer
C. six-layer
D. four-layer
Answers:
1) A. stream-oriented
2) A. Physical layer
3) B. segment
4) C. network layer
5) B. reliable
6) A. Internet Protocol(IP)
7) B. two
8) C. Europeans Registry for Internet Numbers(ERIN)
9) A. user datagrams
10) C. Class C
11) B. 8
12) A. ICMP
13) A. first
14) C. Address Resolution Protocol(ARP)
15) C. transport
16) B. UDP
17) A. Process-to-process communication
18) C. 16
19) B. a transport layer protocol takes over
20) B. five-layer
INTERMEDIATE QUESTIONS
UDP needs the ........... address to deliver the user datagram to the correct application process
A. port
B. application
C. internet
D. intranet
ANSWER:
The ........ was originally developed as a mechanism to enable disk-less hosts to be remotely booted
over a network as workstations, routers, terminal concentrators and so on.
A. ICMP
B. BOOTP
C. UDP
D. ARP
ANSWER:
Which of the following does UDP guarantee?
A. Flow control
B. Connection-oriented delivery
C. Data control
D. None of the answer
ANSWER:
.......... provides a framework for passing configuration information to hosts on a TCP/IP network.
A. Dynamic Host Configuration Protocol (DHCP)
B. Address Resolution Protocol (ARP)
C. Internet Protocol (IP)
D. Internet Control Message Protocol (ICMP)
ANSWER:
The source port address on the UDP user datagram header defines .........
A. the sending computer
B. the receiving computer
C. the process running on the sending computer
D. the process running on the receiving computer
ANSWER:
The mechanisms supported by DHCP for IP address allocation on a TCP/IP network is/are ...
A. Automatic allocation
B. Dynamic allocation
C. Manual allocation
D. All of them
ANSWER:
UDP is called a .......... transport protocol.
A. connection-oriented, unreliable
B. connectionless, reliable
C. connectionless, unreliable
D. connection, reliable
ANSWER:
DHCP in TCP/IP network assigns an IP address for a limited period of time. Such a network address is
called a ......
A. lease
B. limited network
C. timed network
D. assigned network
ANSWER:
UDP does not add anything to the services of IP except for providing .......... communication.
A. node to node
B. process to process
C. host to host
D. interface to interface
ANSWER:
The use of ......... allows centralized configuration of multiple clients.
A. ICMP
B. BOOTP
C. UDP
D. ARP
ANSWER:
UDP is an acronym for ............
A. User Delivery Protocol
B. User Datagram Procedure
C. User Datagram Protocol
D. User Delivery Procedure
ANSWER:
............ is where users typically interact with the TCP/IP network.
A. Link layer
B. Network layer
C. Transport layer
D. Application layer
ANSWER:
The local host and the remote host are defined using IP addresses. To define the processes, we need
second identifiers called .........
A. UDP addresses
B. transport addresses
C. port addresses
D. TCP addresses
ANSWER:
The ............. is responsible for communicating with the actual network hardware.
A. Link layer
B. Network layer
C. Transport layer
D. Application layer
ANSWER:
UDP packets are encapsulated in .......
A. an Ethernet frame
B. a TCP segment
C. an IP datagram
D. an Ethernet packets
ANSWER:
............ is the protocol suite for the current Internet.
A. TCP/IP
B. NCP
C. UDP
D. ACM
ANSWER:
UDP uses ........ to handle outgoing user datagrams from multiple processes on one host.
A. flow control
B. multiplexing
C. de-multiplexing
D. data control
ANSWER:
.......... provides full transport layer services to applications.
A. TCP
B. UDP
C. IP
D. ARP
ANSWER:
UDP uses ...... to handle incoming user datagrams that go to different processes on the same host.
A. flow control
B. multiplexing
C. de-multiplexing
D. data control
ANSWER:
In the sending computer, UDP receives a data unit from the ......... layer.
A. application
B. transport
C. IP
D. interface
ANSWER:
CHALLENGING QUESTIONS
Which among the following are delivered by the transport layer in process-to-process delivery
mechanism?
a. Frames
b. Datagrams
c. Packets
d. All of the above
ANSWER: c. Packets
Which among the following are uncontrolled and un-registered form of ephemeral ports in
accordance to IANA?
a. Well known Ports
b. Registered Ports
c. Dynamic Ports
d. All of the above
ANSWER: c. Dynamic Ports
What is the purpose of using source & destination port numbers respectively in the addressing
method of transport layer?
a. For Delivery & Reply operations
b. For Reply & Delivery operations
c. Only for Delivery operations
d. Only for Reply operations
ANSWER: b. For Reply & Delivery operations
Which among the several transport services deals with the addresses, protocol utility class in
addition to performance evaluating features of a connection?
a. Connection Management
b. Quality of Service
c. User Interface
d. Status Reporting
ANSWER: d. Status Reporting
Which mechanism/s is/are extremely essential in data link and transport layers in accordance to
operational services offered by the transport protocols?
a. Buffering
b. Flow Control
c. Both a & b
d. None of the above
ANSWER: c. Both a & b
Which among the below specified design issues should not be minimized while designing the system
of a computer network?
a. Bandwidth
b. Content Switching
c. Software Overhead
d. All of the above
ANSWER: a. Bandwidth
Which TCP timer signifies its contribution in measuring the time of connection maintenance in
TIME_WAIT state?
a. Keep alive Timer
b. Persist Timer
c. Retransmission Timer
d. 2 Maximum Segment lifetime Timer
ANSWER: d. 2 Maximum Segment lifetime Timer
Which among the following specifies the impossibility of updating RTT estimator during the arrival
acknowledgement of retransmitted data especially at the occurrence of timeout and retransmission
phases in TCP?
a. NAGLE algorithm
b. Karn's algorithm
c. Clark's Solution
d. None of the above
ANSWER: b. Karn's algorithm
Which mechanism in transport layer supplies multiple network connections along with the
distribution of traffic over them in a round-robin basis/ fashion?
a. Upward Multiplexing
b. Downward Multiplexing
c. Buffering & Flow Control
d. Crash Recovery
ANSWER: b. Downward Multiplexing
STUB is a technique utilized in the client-server operation especially for implementation of
__________
a. RPC
b. RTP
c. RTCP
d. All of the above
ANSWER: a. RPC
Transport layer aggregates data from different applications into a single stream before passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer:a
Which one of the following is a transport layer protocol used in internet?
a) TCP
b) UDP
c) both (a) and (b)
d) none of the mentioned
Answer: c
3. User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) both (a) and (b)
d) none of the mentioned
Answer: a
4. Transmission control protocol is
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
Answer: d
An endpoint of an inter-process communication flow across a computer network is called
a) socket
b) pipe
c) port
d) none of the mentioned
Answer: a
Socket-style API for windows is called
a) wsock
b) winsock
c) wins
d) none of the mentioned
Answer: b
Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) none of the mentioned
Answer: a
A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) none of the mentioned
Answer: a
Transport layer protocols deals with
a) application to application communication
b) process to process communication
c) node to node communication
d) none of the mentioned
Answer: b
Which one of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbour discovery protocol
d) dynamic host configuration protocol
Answer: a
A connectionless protocol treats each segment
A. Freely
B. Independently
C. Separately
D. Closely
Answer C
In transport layer, a message is normally divided into transmittable
A. Segments
B. Signals
C. Networks
D. Paths
Answer A
Each segment as an independent packet and delivers it to transport layer at destination machine is
called
A. Connection Oriented
B. connectionless
C. Segmentation
D. Reassembly
Answer B
Transport layer may be responsible for flow and error Control, like the
A. IP Link Layer
B. Data Link Layer
C. Subnet Layer
D. Linear Layer
Answer B
Transport layer is responsible for process-to-process delivery of the
A. Message
B. Entire Message
C. Half Message
D. Partial Message
Answer B
In User Datagram Protocol (UDP), checksum calculation is different from one for IP and
A. TCP
B. TCP/IP
C. UDP
D. ICMP
Answer D
In User Datagram Protocol (UDP), queues are associated with
A. Slots
B. IP
C. Ports
D. Packets
Answer C
In User Datagram Protocol, we use term which received datagram back to sender is called
A. Protocol
B. Packet
C. Path
D. Echo
Answer D
User Datagram Protocol (UDP) is providing services of IP is
A. Host-to-Host
B. IP-to-IP
C. Process-to-Process
D. Connection-to Connection
Answer C
TFTP stands for
A. Trivial File Transfer Path
B. Trivial File Transfer Packet
C. Trivial File Transfer Protocol
D. Trivial File Transformed Protocol
Answer C
Topic 2: NAME RESOLUTION
Easy Questions
Domain Name System (DNS), can be pictured as an inverted hierarchical tree structure with one root
node at top and a maximum of
a.128 Levels
b.129 Levels
c.130 Levels
d.131 Levels
Answer A
Term that define registered hosts according to their generic behaviour, is called
Generic Domains
Main Domains
Small Domains
Sub-Domains
Answer A
Domain Name System (DNS), can use services of UDP or TCP using the
A. well-known port 53
B. well-known port 54
C. well-known port 55
D. well-known port 56
Answer A
Intermediate Questions
In Domain Name System (DNS), server makes a database called
A. Zone IP
B. Zone File
C. Zone Domain
D. Zone Server
Answer B
If size of response message is more than 512 bytes, a Connection is used called
A. DNS
B. ICMP
C. STMP
D. TCP
Answer D
Fully Qualified Domain Name (FQDN), contains name of the
A. IP
B. Host
C. Node
D. Roots
Answer B
Domain Name System (DNS), has two types of messages
A. Small and Large
B. Hosted and Generic
C. Query and Responsive
D. Resolver and Informative
Answer C
In Domain Name System (DNS), header has
A. 08 Bytes
B. 12 Bytes
C. 14 Bytes
D. 24 Bytes
Answer B
Each node in tree has a label, which is a string with a maximum of
A. 38 characters
B. 47characters
C. 52 characters
D. 63 characters
Answer D
DDNS stands for
A. Dynamic Domain Name Solution
B. Dynamic Domain Name Server
C. Dynamic Domain Name System
D. Dynamic Domain Name Section
Answer C
System in which names are defined in an inverted-tree structure with root at top is called
A. Name Space
B. Domain Name Space
C. Hierarchical Name Space
D. Flat Name Space
Answer B
First address part can define the
A. name of an organize- tin
B. nature of organization
C. departments in organization
D. All of them
Answer B
Xxx.yyy. Is a
A. FQDN
B. PQDN
C. DDNS
D. None
Answer A
If a label is terminated by a null string, it is called a
A. PQDN
B. FQDN
C. DNS
D. None
Answer B
The entire hostname has a maximum of
a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
Answer:a
A DNS client is called
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
Answer:b
Servers handle requests for other domains
a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
Answer:b
DNS database contains
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
Answer:d
If a server has no clue about where to find the address for a hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Answer:a
Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Answer:a
Wildcard domain names start with label
a) @
b) *
c) &
d) #
Answer:b
The right to use a domain name is delegated by domain name registers which are accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Answer:d
The domain name system is maintained by
a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
Answer:a
Challenging Questions
What is the basic function of the nslookup program?
A. To probe the DNS database for various types of information
B. To look up only IP addresses in the DNS database
C. To look up only domain names in the DNS database
D. To look up only SOA records from a company’s database
Ans: A
What file does the nslookup program use to locate a name server?
A. The /etc/named.boot file
B. The /var/log/messages file
C. The /etc/hosts file
D. The /etc/resolv.conf file
Ans: D
Besides the name server process, what are the other parts of the BIND package?
A. The /etc/named.boot file
B. The /etc/hosts file
C. The name server data files
D. The /etc/resolv.conf file
Ans: A,C
What is the function of the directory directive in the name server configuration file?
A. To declare the server as an authoritative server for a zone
B. To establish the origin domain and name of the root cache file
C. To establish an initial path for later file references
D. To declare the server as a secondary server for a zone
Ans: C
For what purpose is the BIND root cache file used?
A. To serve as a zone file for the loopback address
B. To provide zone files for authoritative servers
C. To serve as a configuration file for the name server
D. To prime the name server with the root server’s addresses
Ans: D
What command would you use to direct nslookup to use a server other than the one specified in
/etc/resolv.conf?
A. ls
B. server
C. set type
D. set server
Ans: B
What command would you use to direct nslookup to extract the SOA and HINFO records?
A. ls
B. server
C. set type
D. extract
Ans: C
How can PNRP names be protected from spoofing or poisoning?
A. with digital signatures
B. in perimeter networks
C. Pointer (PTR) records
D. in a highly-secure environment
Ans: A
What is the most common record type in DNS?
A. name records
B. reverse lookup
C. Host (A) records
D. dnscmd.exe
Ans: C
In what format are IPv6 addresses usually displayed?
A. canonical name (CNAME)
B. Host (A) records
C. the Mail exchanger (MX) record
D. in hexadecimal format
Ans: D
When a DNS server resolves a host name to an IP address, what is the process called?
A. forward lookup
B. Resolution
C. Reverse lookup
d. recursive lookup
Ans: A
What DNS record type is responsible for resolving host names to IP addresses?
a. A
c. NS
b. MX
d. SOA
Ans: A
What DNS record type points to a mail server on a domain?
A. A
B. NS
C. MX
D. SOA
Ans: C
What DNS record type holds the IP address of a DNS server with information about the domain?
a. CNAME
b. NS
c. MX
d. SOA
Ans: B
What is the part of the DNS namespace for which a DNS server is responsible?
a. zone
b. SOA
c. PTR
d. DHCP
Ans: A
When monitoring a DNS server, which type of test sends a query to other name servers for
resolution?
A. Simple query
B. Recursive query
C. Forward lookup query
D. Iterative query
Ans: B
Which of the following is not a reason to use AD integrated zones rather than standard zones?
a. Fault tolerance.
b. Security.
c. Simplicity of management.
d. The database is stored in easy-to-edit text files.
Answer d
Which of the following DC resource record types would you look for if trying to troubleshoot
workstations not being able to log on to a domain? [Check all correct answers]
a. A
b. CNAME
c. SRV
d. MX
Answers a and c
Under which of the following circumstances could you use Windows 98 clients in a dynamic update
situation? [Choose the best answer]
a. When the Only Secure Updates option is enabled on the DNS server.
b. When the Allow Dynamic Updates? Option is set to Yes on the DNS server.
c. When the Enable Updates for DNS Clients That Do Not Support Dynamic Updates option is
enabled on the DHCP server.
d. Legacy clients cannot be supported by dynamic update.
Answer c
Which of the following types of name servers store copies of a zone database? [Check all correct
answers]
a. AD integrated
b. Caching
c. Primary
d. Secondary
Answers a, c, and d
Which of the following name-resolution methods use manually updated text files to record name
mappings? [Check all correct answers]
a. DNS
b. HOSTS
c. WINS
d. LMHOSTS
Answers b
In a standard primary zone, what name server(s) can an administrator update the zone database on?
[Choose the best answer]
a. Secondary
b. Active Directory integrated
c. Primary
d. Any server
Answer c
What is used to control DNS data replication scope?
A. in a highly-secure environment
B. application directory partitions
C. in the Start of Authority (SOA) record
D. the Mail exchanger (MX) record
Ans: B
How is a loopback address specified in IPv6?
A. cache.dns
B. 128 bits
C. DHCP
D. ::1
Ans: D
How are the bits in an IPv6 address organized?
A. canonical name (CNAME)
B. name records
C. reverse lookup
D. into 8 and 16-bit groups
Ans: D
What allows PNRP to support service naming?
A. the process that DNS uses to remove records that have become stale
B. creating an alternate record or alias for an existing record
C. the fact that a PNRP name includes potential payloads such as service function
D. a referral system that performs lookups based on data known by other systems
Ans: C
What are the 3 types of IPv6 addresses?
A. link-local, site-local, and global unicast
B. in the Start of Authority (SOA) record
C. dynamic, read-write, and read-only
D. older applications that are unable to use FQDN's
Ans: A
What is an alias record used for?
A. when you have a large number of single-name clients to support
B. creating an alternate record or alias for an existing record
C. a routable internal address (similar to the 192.168 address space)
D. in an unsecured location facing the internet
Ans: B
What are the 3 strategies for updating DNS servers?
A. a unique, internet-usable IP address
B. in a highly-secure environment
C. dynamic, read-write, and read-only
D. the Mail exchanger (MX) record
Ans: C
The DNS Client service itself communicates with DNS servers, and ________ the results that it
receives.
A. CPU cache
B. Computer data Storage
C. Operating system
D. Cache
Ans: D
Microsoft's DNS server can be administered using either a graphical user interface, the "DNS
Management Console", or a ________, the dnscmd utility.
A. Unix
B. Command-line interface
C. Windows PowerShell
D. Command-line interpreter
Ans: B
________ and various versions of Unix have a generalized name resolver layer.
A. Linux distribution
B. Linux adoption
C. Desktop Linux
D. Live USB
Ans: A
Prior to ________ and Microsoft Windows 2000 Service Pack 3, the most common problem
encountered with Microsoft's DNS server was cache pollution.
A. Windows XP
B. Windows Vista
C. Windows Server 2008
D. Windows Server 2003
Ans: D
DNS data can be stored either in master files (also known as zone files) or in the ________ database
itself.
A. Microsoft Windows
B. Internet Explorer
C. DirectX
D. Active Directory
Ans: D
Microsoft DNS is the name given to the implementation of domain name system services provided in
________ operating systems.
A. Internet Information Services
B. Microsoft Windows
C. Internet Explorer
D. DirectX
Ans: B
Also the support of ________ is implemented using a different technique from that of BIND 9,
further driving even more incompatibles between the two products.
A. Open Shortest Path First
B. IPv6
C. IPsec
D. IPv4
Ans: B
The Domain Name System support in Microsoft Windows NT, and thus its derivatives ________,
Windows XP, and Windows Server 2003, comprises two clients and a server.
A. Internet Explorer
B. Windows 2000
C. Windows Server 2008
D. Windows Vista
Ans: B
As of ________, it was the fourth most popular DNS server (counting BIND version 9 separately from
versions 8 and 4) for the publication of DNS data.
A. 2006
B. 2007
C. 2004
D. 2003
Ans: C
Some machines have a Dynamic DNS client, to perform Dynamic DNS Update transactions,
registering the machines' names and ________.
A. IP address
B. IPv4
C. Classless Inter-Domain Routing
D. IPv6
Ans: A
DNS is used to resolve host names to IP addresses and find services.
A. True
B. False
Ans: A
DNS is required if you want resources such as Web servers available on the Internet.
A. True
B. False
Ans: A
The most common task a DNS server performs is resolving a host name to an IP address. This is
called a forward lookup.
A. True
B. False
Ans:A
A reverse lookup allows you to specify an IP address and the DNS server returns the host name that
is defined for it.
A. True
B. False
Ans: A
BIND is a version of DNS that runs on UNIX/Linux.
A. True
B. False
Ans: A
Which of the following elements is required to successfully install and configure DNS?
A. DHCP
B. Static IP address
C. Active Directory
D. Windows 2000 clients
Ans: B
TOPIC 3: TROUBLESHOOTING
EASY QUESTIONS
Which TCP/IP utility is most often used to test whether an IP host is up and functional?
a. ftp
b. telnet
c. ping
d. netstat
Which TCP/IP utility will produce the following result? Interface: 199.102.30.152 Internet Address
Physical Address Type 199.102.30.152 A0–ee–00–5b–0e–ac dynamic
a. arp
b. netstat
c. tracert
d. nbtstat
Which Windows utility can you use to connect to a machine 50 miles away to troubleshoot?
a. Remote desktop
b. netstat
c. arp
d. Wireshark
a. tracert
b. ping
c. WINS
d. Ipconfig
Which utility can you use to find the MAC and TCP/IP addresses of your Windows workstation?
a. ping
b. ipconfig
c. ipconfig /all
d. tracert
Which ping commands will verify that your local TCP/IP interface is working?(Choose all that apply.)
a. ping 204.153.163.2
b. ping 127.0.0.1
c. ping localif
d. ping localhost
e. ping iphost
Which switch for the Windows nbtstat utility will display all NetBIOS name-resolution statistics?
a. –r
b. /r
c. –R
d. /R
You need to find a NIC’s specific MAC address and IP address. Which command-line tool can you use
to find this information without physically going to the computer?
a. ping
b. nbtstat
c. arp
d. netstat
e. ftp
Which nbtstat utility switch will purge and reload the remote NetBIOS name table cache?
a. –r
b. –R
c. /r
d. /R
a. throughput tester
b. protocol analyzer
c. remote connection tool
d. port scanner
[157.130.100.185]
4 133 ms 123 ms 126 ms 152.ATM3–0.XR2.CHI6.ALTER.NET
[146.188.209.126]
[146.188.144.133]
[206.132.150.98]
[206.132.150.206]
a. arp
b. tracert
c. nbtstat
d. netstat
Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
Answer: d
Ping sweep is a part of
a) Traceroute
b) Nmap
c) Route
d) Ipconfig
Answer: b
ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b
Answer: d
_____ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
Answer: a
If you want to find the number of routers between a source and destination, the utility to be used is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
Answer: d
Which of the following is related to ipconfig in Microsoft Windows?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned
Answer: d
This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) None of the mentioned
Answer: a
Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters
Answer: c
INTERMEDIATE QUESTIONS
We can use ping program to find if a host is
A. alive
B. dead
C. responding
D. both a and c
Answer D
Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
Ping sweep is a part of
a) Traceroute
b) Nmap
c) Route
d) Ipconfig
ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b
_____ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
If you want to find the number of routers between a source and destination, the utility to be used is.
a) Route
b) Ipconfig
c) Ifconfig
d) Traceroute
Which of the following is related to ipconfig in Microsoft Windows?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned
This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) none of the mentioned
Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters
An RPC application requires
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned
RPC is used to
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) both (a) and (b)
d) none of the mentioned
Telnet protocol is used to establish a connection to
a) TCP port number 21
b) TCP port number 22
c) TCP port number 23
d) TCP port number 24
Which one of the following is not true?
a) telnet defines a network virtual terminal (NVT) standard
b) client programs interact with NVT
c) server translates NVT operations
d) none of the mentioned
All telnet operations are sent as
a) 4 bytes
b) 8 bytes
c) 16 bytes
d) 32 bytes
Absolute Telnet is a telnet client for
a) windows
b) Linux
c) mac
d) none of the mentioned
The decimal code of interpret as command (IAC) character is
a) 252
b) 253
c) 254
d) 255
In character mode operation of telnet implementation
a) each character typed is sent by the client to the server
b) each character typed is discarded by the server
c) both (a) an (b)
d) none of the mentioned
In telnet, the client echoes the character on the screen but does not send it until a whole line is
completed in
a) default mode
c) character mode
c) server mode
d) none of the mentioned
Which one of the following is not correct?
a) telnet is a general purpose client-server program
b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
d) none of the mentioned
Which operating mode of telnet is full duplex?
a) default mode
b) server mode
c) line mode
d) none of the mentioned
If we want that a character be interpreted by the client instead of server
a) escape character has to be used
b) control functions has to be disabled
c) it is not possible
d) none of the mentioned
A local telephone network is an example of a _______ network
a) Packet switched
b) Circuit switched
c) both of the mentioned
d) none of the mentioned
Most packet switches use this principle
a) Stop and wait
b) Store and forward
c) Both of the mentioned
d) None of the mentioned
If there are N routers from source to destination, total end to end delay in sending packet P(L-
>number of bits in the packet R-> transmission rate)
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
Method(s) to move data through a network of links and switches
a) Packet switching
b) Circuit switching
c) Line switching
d) Both a and b
The resources needed for communication between end systems are reserved for the duration of
session between end systems in ________
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
As the resources are reserved between two communicating end systems in circuit switching, this is
achieved
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
In _________ resources are allocated on demand.
a) packet switching
b) circuit switching
c) line switching
d) frequency switching
RPC is a
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) none of the mentioned
The local operating system on the server machine passes the incoming packets to the
a) server stub
b) client stub
c) client operating system
d) none of the mentioned
Which one of the following event is not possible in wireless LAN.
a) Collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned
CHALLENGING QUESTIONS
How long is an IPv6 address?
A. 32 bits
B. 128 bytes
C. 64 bits
D. 128 bits
Answer: Option D
What flavor of Network Address Translation can be used to have one IP address allow many users to
connect to the global Internet?
A. NAT
B. Static
C. Dynamic
D. PAT
Answer: Option D
What are the two main types of access control lists (ACLs)?
Standard
IEEE
Extended
Specialized
A. 1 and 3
B. 2 and 4
C. 3 and 4
D. 1 and 2
Answer: Option A
What command is used to create a backup configuration?
A. copy running backup
B. copy running-config startup-config
C. config mem
D. wr mem
Answer: Option B
You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to
the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the
server?
A. 100 kbps
B. 1 Mbps
C. 2 Mbps
D. 10 Mbps
Answer: Option D
Which are reasons for using troubleshooting method? (Choose all that apply)
A. Problem isolation and resolution will occur more quickly.
B. No documentation needs to be done when following a method
C. Due to complex topologies and technologies, a systematic method is the most efficient way
to resolve network problems.
D. All the mentioned
What are the benefits of gathering additional facts for troubleshooting? (Choose all that apply)
A. Possible causes of problems may be identified
B. A specific problem definition may be created
C. Information is provided for a baseline
D. All the mentioned
Which protocol attributes are associated with the Internet Protocol (IP) (choose all that apply)
A. Connection-oriented
B. Connectionless
C. Layer 2
D. Layer 3
Choose all protocols that operates only at Layer 3 from the following list:
A. PPP (Point-to-Point Protocol)
B. IP (Internet Protocol)
C. EIGRP (Enhanced Interior Gateway Routing Protocol)
D. X.25
A network configuration table usually contains what kind of information? (Choose all that applies)
A. IP addresses and Interface speed
B. Show running-config
C. CRCs
D. Interface name and Interface type
You are seeing incrementing interface resets on an interface. What is the most appropriate
troubleshooting method to use for this situation?
A. Bottom-up troubleshooting
B. Top-down troubleshooting
C. Divide-and-conquer troubleshooting
D. Wait-and-see troubleshooting
What Unix command shows the IP address and subnet mask of the interface?
A. ipconfig
B. ifconfig
C. cat /etc/revolv.conf
D. netstat
Which one of the following routing protocol is a distance vector protocol and a Cisco proprietary?
A. EIGRP
B. IGRP
C. RIP
D. BG
Which commands should be used in conjunction for thorough problem isolation? (Choose two)
A. ping
B. show IP interface
C. traceroute
D. ARP
Which protocols are used for dynamic IP address assignment? (Choose two)
A. AutoIP
B. AutoARP/IP
C. BootP
D. DHCP
Choose the troubleshooting tool that is used to test for reachability and connectivity.
A. traceroute
B. debug
C. show interface
D. ping
When is a default gateway used on the router?
A. When a packet leaves the router
B. When no route exists in the route table
C. When a static route has been set
D. Only when the router is in boot mode
What type of tests are useful in testing for end-to-end serial link integrity
A. Ping
B. Traceroute
C. Loopback
D. Loopup
Which command should be used to display the connection setup for Layer 3?
A. Show interface bri n
B. Debug isdn q.931
C. Debug interface bri
D. Debug isdn q.92
Which of the following are guidelines for creating network documentation (choose all that apply)
A. Determine the scope
B. Document everything
C. Put as much information as possible on network documents.
D. Keep document accessible.
Which command is used for displaying information about Cisco routers that are connected to a
switch?
A. Show connections
B. Show vtp neighbor
C. Show ip route
D. Show cdp neighbor
Which command on a Windows NT end-system is used to add routes to that end system?
A. Route add
B. Ip add route
C. Ip route add
D. Add route
What are some of the benefits of a named access list over a numbered access list? (Choose all that
apply)
A. A named access list can be applied to all interface types.
B. Individual’s lines can be removed from a named access list.
C. Named access lists are easier for a router to work with.
D. Named access lists are easier for the network administrator to work with.
a. group of bits
b. source & destination addresses
c. both a & b
d. none of the above
ANSWER: c.
Which unit plays a crucial role in carrying out the functions of network layer, simply by the addition
of a header to it?
a. A- 4, B- 3, C- 2, D- 1
b. A- 2, B- 4, C- 1, D- 3
c. A- 3, B- 4, C- 1, D- 2
d. A- 1, B- 2, C- 3, D- 4
ANSWER: c.
Which form of byte assigning strategy is adopted in class B type of network corresponding to IP
addresses?
a. Network.Node.Node.Node
b. Network.Network.Node.Node
c. Network.Network.Network.Node
d. Network.Node.Node.Node
ANSWER: b.
On which factors do the size of block depends in classless addressing?
D. Multiple attempts can be made to recover ICMP error message due to connection-oriented IP
service
a. A & B
b. C & D
c. B& C
d. A & D
ANSWER: a. A & B
The ability of a single network to span multiple physical networks is known as ______
a. Subnetting
b. Masking
c. Fragmenting
d. Hopping
ANSWER: a.
Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to
verification for ICMP messages?
a. Type
b. Code
c. Checksum
d. All of the above
ANSWER: c.
Which among the below stated datagram discard code fields in ICMP is/are generated if a router
fails to forward a packet due to administrative filtering?
INTERMEDIATE QUESTIONS
ICMP Stands for
A. Internet Connect Message Protocol
B. Internet Control Message Protocol
C. International Connect Message Protocol
D. International Control Message Protocol
Answer B
A. Four Layers
B. Five Layers
C. Six Layers
D. Seven Layers
Answer A
A. datagrams
B. Frames
C. Segments
D. Encapsulate
Answer A
Transmission Control Protocol divides a stream of data into smaller units that are called
A. Frames
B. Datagrams
C. Segments
D. Information
Answer C
A. RARP
B. IGMP
C. ARP
D. ICMP
Answer C
A header in CGI script can specify
(A) format of the document.
(B) new location of the document.
(C) (A) & (B) both.
(D) start of the document.
Ans: A
All exceptions in Java are subclasses of built in class called
(A) Exception
(B) Error.
(C) Throwable.
(D) Raise.
Ans: C
MTU is specified by
(A) IP Datagram size
(B) Hardware technology
(C) TCP Segment size
(D) None of the above.
Ans: B
127.0.0.1 is a
(A) limited broadcast address
(B) direct broadcast address
(C) multicast address
(D) loop-back address
Ans: D
Which of the following 802 standard provides for a collision free protocol?
(A) 802.2
(B) 802.3
(C) 802.5
(D) 802.6
Ans: C
ATM is an example of
(A) Ring topology
(B) Star topology
(C) Bus topology
(D) None of the above.
Ans: B
The first part of the address in electronic mailbox identifies:
(A) User’s mailbox
(B) Computer on which mail box resides
(C) Both (A) & (B)
(D) None of the above
Ans:
Protocol used to monitor and control network devices operates at:
(A) Application layer
(B) Transport layer
(C) Network layer
(D) Data Link layer
Ans: A
DHCP stands for
(A) Dynamic Host Control Protocol
(B) Dynamic Host Configuration Protocol.
(C) Dynamic Host Connection Protocol.
(D) None of the above.
Ans: B
The transport protocol used by TFTP (Trivial File Transfer Protocol) is:
(A) FTP
(B) UDP
(C) TCP
(D) IP
Ans: B
The Environment variable SCRIPT_NAME in CGI script specifies:
(A) Domain name of the computer running o server
(B) The path of URL after server name.
(C) Name of the server
(D) None of the above.
Ans: B
Application layer (layer 4) in TCP/IP model corresponds to:
(A) Layer 4 and 5 in OSI model
(B) Layer 5 and 6 in OSI model
(C) Layer 6 and 7 in OSI model
(D) Layer 1 and 2 in OSI model
Ans: C
UDP (User Diagram Protocol) is
(A) Connectionless
(B) Message Oriented
(C) Connection oriented
(D) Both (A) and (B)
Ans: D
A network address prefixed by 1000 is:
(A) Class A address
(B) Class B address
(C) Class C address
(D) Class D address
Ans: B Class B address.
CHALLENGING QUESTIONS
Multiple object can be sent over a TCP connection between client and server in
a) persistent HTTP
b) non persistent HTTP
c) both (a) and (b)
d) none of the mentioned
Answer:a
Answer:a
Answer:a
HTTP client requests by establishing a __________ connection to a particular port on the server.
a) user datagram protocol
b) transmission control protocol
c) broader gateway protocol
d) none of the mentioned
Answer:b
In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding
responses
b) multiple HTTP requests cannot be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) none of the mentioned
Answer:a
FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23
Answer:b
In FTP protocol, client contacts server using ____ as the transport protocol.
a) Transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
Answer:a
In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
c) both (a) and (b)
d) none of the mentioned
Answer:b
Answer:c
Answer:d
A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
d) none of the mentioned
View Answer
Answer:b
Dynamic web page
a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
c) both (a) and (b)
d) none of the mentioned
Answer:b
What is a web browser?
a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned
Answer:d
Answer:a
Answer:c
Answer:a
Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) none of the mentioned
Answer:d
An alternative of JavaScript on windows platform is
a) VBScript
b) ASP.NET
c) JSP
d) none of the mentioned
Answer:a
What is document object model (DOM)?
a) convention for representing and interacting with objects in html documents
b) application programming interface
c) hierarchy of objects in ASP.NET
d) none of the mentioned
Answer:a
AJAX stands for
a) Asynchronous JavaScript and xml
b) advanced JSP and xml
c) Asynchronous JSP and xml
d) advanced JavaScript and xml
Answer:a
What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
Answer:b
Internet access by transmitting digital data over the wires of a local telephone network is provided
by
a) leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
Answer:b
Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a
Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
Answer:c
A. Proxy Domain
B. Proxy Documents
C. Proxy Server
D. Proxy IP
Answer C
To use proxy server, client must be configured to access proxy instead of the
A. Proxy Server
B. Target Server
C. Post Server
D. Original Server
Answer B
A. Connection
B. Reserved Connection
C. Post Connection
D. Active Connection
Answer B
In Hyper Text Transfer Protocol (HTTP), a client can directly connect to a server using
A. Web
B. Domain
C. TELNET
D. HTTP
Answer C
In World Wide Web (WWW), an electronic store (e-commerce) can use a cookie for its
A. Client Shopper
B. Client Details
C. Client Usage
D. Client Data
Answer A
HTTP uses a TCP connection to
A. establish link between servers
B. transfer whole database
C. client server connections
D. transfer files
Answer D
In Hyper Text Transfer Protocol (HTTP), a client can directly connect to a server using
A. Web
B. Domain
C. TELNET
D. HTTP
Answer C
HTML stands for
A. Hypertext Mark-up Locator
B. Hypertext Mark-up Language
C. Hypertext Mixed Language
D. Hypertext Mark-up Lines
A Web page is made up of two parts
A. Header and Footer
B. Text and Number
C. Document and File
D. Head and Body
Answer D
If 5 files are transferred from server A to client B in the same session. The number of TCP connection
between A and B is
a) 5
b) 10
c) 2
d) 6
Answer: d
FTP server
a) Maintains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned
Answer: a
The commands, from client to server, and replies, from server to client, are sent across the control
connection in ____ bit ASCII format
a) 8
b) 7
c) 3
d) 5
Answer: b
Answer: b
In File Transfer Protocol (FTP), while control connection is open, data connection can be opened and
closed
A. One time
B. Several Times
C. Multiple Times
D. None of given
Answer C
File Transfer Protocol (FTP), uses he same operation as uses by
A. ICMP
B. STMP
C. TCP
D. FSK
Answer C
File Transfer Protocol (FTP), uses well-known port 21 is used for control connection and well-known
port 20 for the
A. Data Rate
B. Data Connection
C. Data Protocol
D. Data Congestion
Answer B
In File Transfer Protocol (FTP), a user needs an account (user name) and a password on the
A. IP Server
B. Remote Server
C. Domain Server
D. Data Server
Answer B
Well-known port for FTP is used for control connection is
A. 6
B. 8
C. 19
D. 21
Answer D
Which of the following services use TCP?
DHCP
SMTP
HTTP
TFTP
FTP
A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4
Answer: Option B
What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
Answer: Option B
Which of the following describe the DHCP Discover message?
It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
It uses UDP as the Transport layer protocol.
It uses TCP as the Transport layer protocol.
It does not use a layer 2 destination address.
A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only
Answer: Option B
You want to implement a mechanism that automates the IP configuration, including IP address,
subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
Answer: Option C
Choose the answer containing the most types of operating systems that have Telnet clients available
to them.
A) Windows95 and Unix
B) MacOS and Windows98
C) WindowsNT, Unix, and MacOS
D) Windows95, Windows98, Unix, and MacOS
To display help about the rlogin command from a Unix system, you would enter which of the
following?
A) help rlogin
B) man rlogin
C) manual rlogin
D)? rlogin
What is the correct syntax for user mary to rlogin to host bert?
A) rlogin -l bert mary
B) rlogin -1 bert mary
C) rlogin -1 mary bert
D) rlogin -l mary bert
A) Binary
B) ASCII
C) GIF
D) Plaintext
Which of the following is not a valid command to type in to the Unix ftp prompt?
A)?
B) get
C) put
D) pwt
Which Unix ftp command is used to list the directory contents of the remote machine?
A) lcd
B) cd
C) ls
D) dir
A) PKZIP
B) gzip
C) Compress
D) shrinker
A) Distributing freeware.
B) Distributing email.
C) File compression.
D) Letting people get secretive documents without revealing their identities.
Which of the following statements is false?
Which of the following is not a name for an item that could be a security threat to your compute
A) Trojan horse
B) meta-crawler
C) worm
D) virus
Which of the following is not something you would do to protect yourself from viruses?
A) Run antivirus software.
B) Download software from unknown sources.
C) Avoid pirated copies of software.
D) Backup your files regularly.
Ways to copy a file from one computer to another include all but which of the following?
A) Archie.
B) E-mail the file as an attachment.
C) FTP.
D) Copy the file onto a diskette and then "walk" the diskette over to the other computer.