0% found this document useful (0 votes)
250 views

NETWORK 621 CA TEST 1 MCQs

This document provides a series of multiple choice questions (MCQs) about transport protocols at different difficulty levels - easy, intermediate, and challenging. The easy questions cover topics like TCP being a stream-oriented protocol, layers of the TCP/IP model, TCP segments, the network layer's responsibility for routing data, TCP being reliable, the role of IP, UDP socket addresses, regional internet registries, UDP datagrams, IP address classes, UDP and TCP header sizes, protocols that don't respond to broadcasts/multicasts, TCP sequence numbers, ARP's role in address resolution, UDP and TCP being transport layer protocols, UDP adding port addresses and checksums, UDP performing process-to-process communication, port address sizes,

Uploaded by

Keshia Muller
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
250 views

NETWORK 621 CA TEST 1 MCQs

This document provides a series of multiple choice questions (MCQs) about transport protocols at different difficulty levels - easy, intermediate, and challenging. The easy questions cover topics like TCP being a stream-oriented protocol, layers of the TCP/IP model, TCP segments, the network layer's responsibility for routing data, TCP being reliable, the role of IP, UDP socket addresses, regional internet registries, UDP datagrams, IP address classes, UDP and TCP header sizes, protocols that don't respond to broadcasts/multicasts, TCP sequence numbers, ARP's role in address resolution, UDP and TCP being transport layer protocols, UDP adding port addresses and checksums, UDP performing process-to-process communication, port address sizes,

Uploaded by

Keshia Muller
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 60

TOPIC 1: TRANSPORT PROTOCOLS MCQs

EASY QUESTIONS
TCP is a .......... protocol.
A. stream-oriented 
B. message-oriented
C. block-oriented
D. packet-oriented 
ANSWER:
Which of the following is not the layer of TCP/IP protocol.
A. Physical layer
B. link layer
C. network layer
D. transport layer.
ANSWER:
TCP groups a number of bytes together into a packet called a ....
A. user datagram
B. segment
C. datagram
D. packet
ANSWER:
The .......... of TCP/IP protocol is responsible for figuring out how to get data to its
destination.
A. application layer
B. link layer
C. network layer
D. transport layer.
ANSWER:
TCP is a(n) ........... transport protocol.
A. protocol delivery
B. reliable
C. best-effort delivery
D. effortless delivery
ANSWER:
......... is the protocol that hides the underlying physical network by creating a virtual
network view.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
ANSWER:
To use the services of UDP, we need ......... socket addresses. 
A. four
B. two
C. three
D. four
ANSWER:
Which of the following is not the name of Regional Internet Registries(RIR) to administer the
network number portion of IP address.
A. American Registry for Internet Numbers(ARIN)
B. Reseaux IP Europeans(RIPE)
C. Europeans Registry for Internet Numbers(ERIN)
D. Asia Pacific Network Information Center(APNIC)
ANSWER:
UDP packets are called .......
A. user datagrams
B. segments
C. frames
D. packets
ANSWER:
............ addresses use 21 bits for the Network and 8 bits for the portion of the IP address for
TCP/IP network.
A. Class A
B. Class B
C. Class C
D. Class D
ANSWER:
UDP packets have fixed-size header of .......... bytes.
A. 16
B. 8
C. 32
D. 64
ANSWER:
.......... messages are never sent in response to datagrams with a broadcast or a multicast
destination address.
A. ICMP
B. ARP
C. IP
D. BOOTP
ANSWER:
TCP assigns a sequence number to each segment that is being sent. The sequence number
for each segment is number of the ....... byte carried in that segment.
A. first
B. last
C. middle
D. zero
ANSWER:
.......... is responsible for converting the higher level protocol address (IP addresses) to
physical network addresses.
A. Internet Protocol (IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
ANSWER:
UDP and TCP are both ......... layer protocols.
A. data link
B. network
C. transport
D. interface
ANSWER:
........... is a process-to-process protocol that adds only port addresses, checksum error
control, and length information to the data from upper layer.
A. TCP
B. UDP
C. IP
D. ARP
ANSWER:
Which of the following functions does UDP perform?
A. Process-to-process communication
B. Host-to-host communication
C. End-to-end reliable data delivery
D. Interface-to-interface communication.
ANSWER:
A port address in TCP/IP is .........bits long.
A. 32
B. 48
C. 16
D. 64
ANSWER:
When the IP layer of a receiving host receives a datagram, .....
A. delivery is complete
B. a transport layer protocol takes over
C. a header is added 
D. a session layer protocol takes over
ANSWER:
20) TCP/IP is a .......... hierarchical protocol suite developed before the OSI model.
A. seven-layer
B. five-layer
C. six-layer
D. four-layer

Answers:
1) A. stream-oriented 
2) A. Physical layer
3) B. segment
4) C. network layer
5) B. reliable
6) A. Internet Protocol(IP)
7) B. two
8) C. Europeans Registry for Internet Numbers(ERIN)
9) A. user datagrams
10) C. Class C
11) B. 8
12) A. ICMP 
13) A. first
14) C. Address Resolution Protocol(ARP)
15) C. transport 
16) B. UDP
17) A. Process-to-process communication
18) C. 16
19) B. a transport layer protocol takes over
20) B. five-layer

INTERMEDIATE QUESTIONS
UDP needs the ........... address to deliver the user datagram to the correct application process
A. port
B. application
C. internet
D. intranet
ANSWER:
The ........ was originally developed as a mechanism to enable disk-less hosts to be remotely booted
over a network as workstations, routers, terminal concentrators and so on.
A. ICMP
B. BOOTP
C. UDP
D. ARP
ANSWER:
Which of the following does UDP guarantee?
A. Flow control
B. Connection-oriented delivery
C. Data control
D. None of the answer
ANSWER:
.......... provides a framework for passing configuration information to hosts on a TCP/IP network.
A. Dynamic Host Configuration Protocol (DHCP)
B. Address Resolution Protocol (ARP)
C. Internet Protocol (IP)
D. Internet Control Message Protocol (ICMP)
ANSWER:
The source port address on the UDP user datagram header defines .........
A. the sending computer
B. the receiving computer
C. the process running on the sending computer
D. the process running on the receiving computer
ANSWER:
The mechanisms supported by DHCP for IP address allocation on a TCP/IP network is/are ...
A. Automatic allocation
B. Dynamic allocation
C. Manual allocation
D. All of them
ANSWER:
UDP is called a .......... transport protocol.
A. connection-oriented, unreliable
B. connectionless, reliable
C. connectionless, unreliable
D. connection, reliable
ANSWER:
DHCP in TCP/IP network assigns an IP address for a limited period of time. Such a network address is
called a ......
A. lease
B. limited network
C. timed network
D. assigned network
ANSWER:
UDP does not add anything to the services of IP except for providing .......... communication.
A. node to node
B. process to process
C. host to host
D. interface to interface
ANSWER:
The use of ......... allows centralized configuration of multiple clients.
A. ICMP
B. BOOTP
C. UDP
D. ARP
ANSWER:
UDP is an acronym for ............
A. User Delivery Protocol
B. User Datagram Procedure
C. User Datagram Protocol
D. User Delivery Procedure
ANSWER:
............ is where users typically interact with the TCP/IP network.
A. Link layer
B. Network layer
C. Transport layer
D. Application layer
ANSWER:

The local host and the remote host are defined using IP addresses. To define the processes, we need
second identifiers called .........
A. UDP addresses
B. transport addresses
C. port addresses
D. TCP addresses
ANSWER:
The ............. is responsible for communicating with the actual network hardware.
A. Link layer
B. Network layer
C. Transport layer
D. Application layer
ANSWER:
UDP packets are encapsulated in .......
A. an Ethernet frame
B. a TCP segment
C. an IP datagram
D. an Ethernet packets
ANSWER:
............ is the protocol suite for the current Internet.
A. TCP/IP
B. NCP
C. UDP
D. ACM
ANSWER:
UDP uses ........ to handle outgoing user datagrams from multiple processes on one host.
A. flow control
B. multiplexing
C. de-multiplexing
D. data control
ANSWER:
.......... provides full transport layer services to applications.
A. TCP
B. UDP
C. IP
D. ARP
ANSWER:
UDP uses ...... to handle incoming user datagrams that go to different processes on the same host.
A. flow control
B. multiplexing
C. de-multiplexing
D. data control
ANSWER:
In the sending computer, UDP receives a data unit from the ......... layer.
A. application
B. transport
C. IP
D. interface
ANSWER:

CHALLENGING QUESTIONS
Which among the following are delivered by the transport layer in process-to-process delivery
mechanism? 
a. Frames
b. Datagrams
c. Packets 
d. All of the above
ANSWER: c. Packets 
Which among the following are uncontrolled and un-registered form of ephemeral ports in
accordance to IANA?
a. Well known Ports
b. Registered Ports
c. Dynamic Ports 
d. All of the above
ANSWER: c. Dynamic Ports 
What is the purpose of using source & destination port numbers respectively in the addressing
method of transport layer?
a. For Delivery & Reply operations
b. For Reply & Delivery operations 
c. Only for Delivery operations
d. Only for Reply operations
ANSWER: b. For Reply & Delivery operations 

Which among the several transport services deals with the addresses, protocol utility class in
addition to performance evaluating features of a connection? 
a. Connection Management
b. Quality of Service
c. User Interface
d. Status Reporting 
ANSWER: d. Status Reporting 
Which mechanism/s is/are extremely essential in data link and transport layers in accordance to
operational services offered by the transport protocols?
a. Buffering
b. Flow Control
c. Both a & b
d. None of the above
ANSWER: c. Both a & b 
Which among the below specified design issues should not be minimized while designing the system
of a computer network?
a. Bandwidth 
b. Content Switching
c. Software Overhead
d. All of the above
ANSWER: a. Bandwidth 

Which TCP timer signifies its contribution in measuring the time of connection maintenance in
TIME_WAIT state?
a. Keep alive Timer
b. Persist Timer
c. Retransmission Timer
d. 2 Maximum Segment lifetime Timer 
ANSWER: d. 2 Maximum Segment lifetime Timer 

Which among the following specifies the impossibility of updating RTT estimator during the arrival
acknowledgement of retransmitted data especially at the occurrence of timeout and retransmission
phases in TCP?
a. NAGLE algorithm
b. Karn's algorithm 
c. Clark's Solution
d. None of the above
ANSWER: b. Karn's algorithm 

Which mechanism in transport layer supplies multiple network connections along with the
distribution of traffic over them in a round-robin basis/ fashion? 

a. Upward Multiplexing
b. Downward Multiplexing 
c. Buffering & Flow Control
d. Crash Recovery
ANSWER: b. Downward Multiplexing 
STUB is a technique utilized in the client-server operation especially for implementation of
__________

a. RPC 
b. RTP
c. RTCP
d. All of the above
ANSWER: a. RPC
Transport layer aggregates data from different applications into a single stream before passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer:a
Which one of the following is a transport layer protocol used in internet?
a) TCP
b) UDP
c) both (a) and (b)
d) none of the mentioned
Answer: c
3. User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) both (a) and (b)
d) none of the mentioned
Answer: a
4. Transmission control protocol is
a) connection oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
Answer: d
An endpoint of an inter-process communication flow across a computer network is called
a) socket
b) pipe
c) port
d) none of the mentioned
Answer: a
Socket-style API for windows is called
a) wsock
b) winsock
c) wins
d) none of the mentioned
Answer: b
Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) none of the mentioned
Answer: a
A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) none of the mentioned
Answer: a
Transport layer protocols deals with
a) application to application communication
b) process to process communication
c) node to node communication
d) none of the mentioned
Answer: b
Which one of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbour discovery protocol
d) dynamic host configuration protocol
Answer: a
A connectionless protocol treats each segment
A. Freely
B. Independently
C. Separately
D. Closely
Answer C
In transport layer, a message is normally divided into transmittable
A. Segments
B. Signals
C. Networks
D. Paths
Answer A
Each segment as an independent packet and delivers it to transport layer at destination machine is
called
A. Connection Oriented
B. connectionless
C. Segmentation
D. Reassembly
Answer B
Transport layer may be responsible for flow and error Control, like the
A. IP Link Layer
B. Data Link Layer
C. Subnet Layer
D. Linear Layer
Answer B
Transport layer is responsible for process-to-process delivery of the
A. Message
B. Entire Message
C. Half Message
D. Partial Message
Answer B
In User Datagram Protocol (UDP), checksum calculation is different from one for IP and
A. TCP
B. TCP/IP
C. UDP
D. ICMP
Answer D
In User Datagram Protocol (UDP), queues are associated with
A. Slots
B. IP
C. Ports
D. Packets
Answer C
In User Datagram Protocol, we use term which received datagram back to sender is called
A. Protocol
B. Packet
C. Path
D. Echo
Answer D
User Datagram Protocol (UDP) is providing services of IP is
A. Host-to-Host
B. IP-to-IP
C. Process-to-Process
D. Connection-to Connection
Answer C
TFTP stands for
A. Trivial File Transfer Path
B. Trivial File Transfer Packet
C. Trivial File Transfer Protocol
D. Trivial File Transformed Protocol
Answer C
Topic 2: NAME RESOLUTION
Easy Questions
Domain Name System (DNS), can be pictured as an inverted hierarchical tree structure with one root
node at top and a maximum of
a.128 Levels
b.129 Levels
c.130 Levels
d.131 Levels
Answer A

Name of domain is domain name of node at top of the


a.Sub Tree
b.Main Tree
Last Tree
Bottom Tree
Answer A

Domain, which is used to map an address to a name is called


Generic Domains
Inverse Domain
Small Domains
Sub-Domains
Answer B

Term that define registered hosts according to their generic behaviour, is called
Generic Domains
Main Domains
Small Domains
Sub-Domains
Answer A

DNS client adds suffix atc.jhda.edu. Before passing address to the


DNS Host
DNS Server
DNS Label
DNS Recipient
Answer B

Well-known port used for encapsulation by server is


A. port 7
B. port 23
C. port 53
D. port 67
Answer C
Each node in tree has a
A. primary server
B. domain name.
C. DNS tree
D. All of them
Answer B

Two types of records are used in DNS those are


A. Question Record
B. Answers Record
C. Resource Record
D. both a and c
Answer D

In Domain Name, a full domain name always ends up at


A. Node
B. Separated Node
C. Dull Node
D. Null Node
Answer D

Domain Name System (DNS), is a protocol that can be used in different


A. Servers
B. Internet
C. Platform
D. Stages
Answer C

In Internet, domain name tree is divided into three


A. Different Stages
B. Different Junctions
C. Different Servers
D. Different Sections
Answer D

Domain Name System (DNS), can use services of UDP or TCP using the
A. well-known port 53
B. well-known port 54
C. well-known port 55
D. well-known port 56
Answer A

How are new domains added to DNS? This is done through a


A. Query
B. Registrar
C. Domains
D. Servers
Answer B

FQDN stands for


A. Filled Quality Domain Name
B. False Quality Domain Name
C. Fully Qualified Domain Name
D. First Qualified Domain Name
Answer C
Xxx.yyy.net is a
A. PQDN
B. FQDN
C. DDNS
D. All of them
Answer A
A supporting program that is used by other programs such as e-mail is called
A. DNS
B. SMTP
C. IP
D. Server
Answer A
In Domain Name System (DNS), solution to these problems is to distribute information among many
computers, called
A. DNS Host
B. DNS Server
C. DNS Label
D. DNS Recipient
Answer B
Country domains section uses two-character country
A. Generations
B. Abbreviations
C. Notations
D. Zones
Answer B
A registrar first verifies that requested domain name is unique and then enters it into DNS
A. Database
B. Servers
C. Domains
D. IP
Answer A
In Domain Name System (DNS), a contiguous part of entire tree is called
A. Host
B. Server
C. Domain
D. Zone
Answer D
In Domain Name System (DNS), there are many registrars; their names and addresses can be found
at
A. http://www.intenic.net.com
B. http://www.intenic.org
C. http://www.intenic.com
D. http://www.intenic.us.org
Answer A
A server whose zone consists of whole tree is called
A. Root Server
B. Sub Server
C. IP Server
D. Host Server
Answer A
A root server's zone is entire
A. STP Tree
B. DNS Tree
C. Hosted Tree
D. Small Tree
Answer B
If server has information, it satisfies the
A. Host
B. Server
C. IP
D. Resolver
Answer D
Domain Name System (DNS), allows domains to be divided further into
A. Large Domains
B. Thick Domains
C. Small Domains
D. Sub-Domains
Answer C
A Domain Name Space (DNS), client/server program can support an e-mail program to find IP
address of an
A. E-Mail Server
B. DNS Server
C. Email Recipient
D. DNS Recipient
Answer C
Mapping a name to an address or an address to a name is called name-address
A. Generations
B. Abbreviations
C. Resolutions
D. Information's
Answer C
In Domain Name System (DNS), a section consisting of one or more resource records is called
A. Question Records
B. Sheet Records
C. Paper Records
D. Answer Records
Answer D
To provide security and prevent unauthorized changes in DNS records an authentication mechanism
can use called
A. DNS
B. DDNS
C. DDN
D. SDN
Answer B
A primary server loads all information from the
A. IP File
B. Disk File
C. Host IP
D. Host Server
Answer B
In Domain Name Space (DNS), when Internet was small, mapping was done by using a
A. IP File
B. Host File
C. Host IP
D. Host Server
Answer B
In Domain Name Space, null suffix defines
A. IP
B. Server
C. Host
D. Nothing
Answer D
Information contained in domain name space must be
A. Divided
B. Shared
C. Stored
D. Noted
Answer C
In Domain Name Space, if a label is not terminated by a null string, it is called a
A. Partially Qualified Domain Name
B. Partially Qualified Domain Node
C. Partially Qualified Domain Notes
D. Partially Qualified Domain Names
Answer A
Each name is made of several parts in
A. Name Space
B. Domain Name Space
C. Hierarchical Name Space
D. Flat Name Space
Answer C
Main disadvantage of a fiat name space is that it cannot be used in a large
A. IP
B. Internet
C. Email
D. System
Answer D
A root server is a server whose zone consists of the
A. subdomains
B. Zone
C. whole tree
D. DNS servers
Answer C
In Domain Name, a full domain name is a sequence of labels separated by
A. Dots
B. Lines
C. Box
D. Circle
Answer A
Domain names are always read from the
A. node up to root
B. any node to root
C. root to bottom
D. All of them
Answer A
A root server usually does not store any information about domains but delegates its authority to
the
A. Main Server
B. Sub Server
C. Other Server
D. Host Server
Answer C
Generic domains, for specifying an organization type are
A. 6
B. 8
C. 10
D. 14
Answer D
A domain name is hello.customer.info. Is
A. City domain
B. generic domain
C. country domain
D. None
Answer B
There are two types of records in
A. SMTP
B. ICMP
C. DNS
D. Servers
Answer C
A name is assigned to an address in
A. Name Space
B. Domain Name Space
C. Flat Name Space
D. Hard Name Space
Answer C
A domain is a sub tree of the
A. domain name space
B. PQDN
C. FQDN
D. DNS
Answer A

Intermediate Questions
 In Domain Name System (DNS), server makes a database called
A. Zone IP
B. Zone File
C. Zone Domain
D. Zone Server
Answer B
If size of response message is more than 512 bytes, a Connection is used called
A. DNS
B. ICMP
C. STMP
D. TCP
Answer D
Fully Qualified Domain Name (FQDN), contains name of the
A. IP
B. Host
C. Node
D. Roots
Answer B
Domain Name System (DNS), has two types of messages
A. Small and Large
B. Hosted and Generic
C. Query and Responsive
D. Resolver and Informative
Answer C
In Domain Name System (DNS), header has
A. 08 Bytes
B. 12 Bytes
C. 14 Bytes
D. 24 Bytes
Answer B
Each node in tree has a label, which is a string with a maximum of
A. 38 characters
B. 47characters
C. 52 characters
D. 63 characters
Answer D
DDNS stands for
A. Dynamic Domain Name Solution
B. Dynamic Domain Name Server
C. Dynamic Domain Name System
D. Dynamic Domain Name Section
Answer C
System in which names are defined in an inverted-tree structure with root at top is called
A. Name Space
B. Domain Name Space
C. Hierarchical Name Space
D. Flat Name Space
Answer B
First address part can define the
A. name of an organize- tin
B. nature of organization
C. departments in organization
D. All of them
Answer B
Xxx.yyy. Is a
A. FQDN
B. PQDN
C. DDNS
D. None
Answer A
If a label is terminated by a null string, it is called a
A. PQDN
B. FQDN
C. DNS
D. None
Answer B
The entire hostname has a maximum of
a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
Answer:a
A DNS client is called
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
Answer:b
Servers handle requests for other domains
a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
Answer:b
DNS database contains
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
Answer:d
If a server has no clue about where to find the address for a hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Answer:a
Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Answer:a
Wildcard domain names start with label
a) @
b) *
c) &
d) #
Answer:b
The right to use a domain name is delegated by domain name registers which are accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Answer:d
The domain name system is maintained by
a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
Answer:a

Challenging Questions
What is the basic function of the nslookup program?
A. To probe the DNS database for various types of information
B. To look up only IP addresses in the DNS database
C. To look up only domain names in the DNS database
D. To look up only SOA records from a company’s database
Ans: A
What file does the nslookup program use to locate a name server?
A. The /etc/named.boot file
B. The /var/log/messages file
C. The /etc/hosts file
D. The /etc/resolv.conf file
Ans: D
Besides the name server process, what are the other parts of the BIND package?
A. The /etc/named.boot file
B. The /etc/hosts file
C. The name server data files
D. The /etc/resolv.conf file
Ans: A,C
What is the function of the directory directive in the name server configuration file?
A. To declare the server as an authoritative server for a zone
B. To establish the origin domain and name of the root cache file
C. To establish an initial path for later file references
D. To declare the server as a secondary server for a zone
Ans: C
For what purpose is the BIND root cache file used?
A. To serve as a zone file for the loopback address
B. To provide zone files for authoritative servers
C. To serve as a configuration file for the name server
D. To prime the name server with the root server’s addresses
Ans: D
What command would you use to direct nslookup to use a server other than the one specified in
/etc/resolv.conf?
A. ls
B. server
C. set type
D. set server
Ans: B
What command would you use to direct nslookup to extract the SOA and HINFO records?
A. ls
B. server
C. set type
D. extract
Ans: C
How can PNRP names be protected from spoofing or poisoning?
A. with digital signatures
B. in perimeter networks
C. Pointer (PTR) records
D. in a highly-secure environment
Ans: A
What is the most common record type in DNS?
A. name records
B. reverse lookup
C. Host (A) records
D. dnscmd.exe
Ans: C
In what format are IPv6 addresses usually displayed?
A. canonical name (CNAME)
B. Host (A) records
C. the Mail exchanger (MX) record
D. in hexadecimal format
Ans: D
When a DNS server resolves a host name to an IP address, what is the process called?
A. forward lookup
B. Resolution
C. Reverse lookup
d. recursive lookup
Ans: A
What DNS record type is responsible for resolving host names to IP addresses?
a. A
c. NS
b. MX
d. SOA
Ans: A
What DNS record type points to a mail server on a domain?
A. A
B. NS
C. MX
D. SOA
Ans: C
What DNS record type holds the IP address of a DNS server with information about the domain?
a. CNAME
b. NS
c. MX
d. SOA
Ans: B
What is the part of the DNS namespace for which a DNS server is responsible?
a. zone
b. SOA
c. PTR
d. DHCP
Ans: A
When monitoring a DNS server, which type of test sends a query to other name servers for
resolution?
A. Simple query
B. Recursive query
C. Forward lookup query
D. Iterative query
Ans: B
Which of the following is not a reason to use AD integrated zones rather than standard zones?
a. Fault tolerance.
b. Security.
c. Simplicity of management.
d. The database is stored in easy-to-edit text files.
Answer d
Which of the following DC resource record types would you look for if trying to troubleshoot
workstations not being able to log on to a domain? [Check all correct answers]
a. A
b. CNAME
c. SRV
d. MX
Answers a and c
Under which of the following circumstances could you use Windows 98 clients in a dynamic update
situation? [Choose the best answer]
a. When the Only Secure Updates option is enabled on the DNS server.
b. When the Allow Dynamic Updates? Option is set to Yes on the DNS server.
c. When the Enable Updates for DNS Clients That Do Not Support Dynamic Updates option is
enabled on the DHCP server.
d. Legacy clients cannot be supported by dynamic update.
Answer c
Which of the following types of name servers store copies of a zone database? [Check all correct
answers]
a. AD integrated
b. Caching
c. Primary
d. Secondary
Answers a, c, and d
Which of the following name-resolution methods use manually updated text files to record name
mappings? [Check all correct answers]
a. DNS
b. HOSTS
c. WINS
d. LMHOSTS
Answers b
In a standard primary zone, what name server(s) can an administrator update the zone database on?
[Choose the best answer]
a. Secondary
b. Active Directory integrated
c. Primary
d. Any server
Answer c 
What is used to control DNS data replication scope?
A. in a highly-secure environment
B. application directory partitions
C. in the Start of Authority (SOA) record
D. the Mail exchanger (MX) record
Ans: B
How is a loopback address specified in IPv6?
A. cache.dns
B. 128 bits
C. DHCP
D. ::1
Ans: D
How are the bits in an IPv6 address organized?
A. canonical name (CNAME)
B. name records
C. reverse lookup
D. into 8 and 16-bit groups
Ans: D
What allows PNRP to support service naming?
A. the process that DNS uses to remove records that have become stale
B. creating an alternate record or alias for an existing record
C. the fact that a PNRP name includes potential payloads such as service function
D. a referral system that performs lookups based on data known by other systems
Ans: C
What are the 3 types of IPv6 addresses?
A. link-local, site-local, and global unicast
B. in the Start of Authority (SOA) record
C. dynamic, read-write, and read-only
D. older applications that are unable to use FQDN's
Ans: A
What is an alias record used for?
A. when you have a large number of single-name clients to support
B. creating an alternate record or alias for an existing record
C. a routable internal address (similar to the 192.168 address space)
D. in an unsecured location facing the internet
Ans: B
What are the 3 strategies for updating DNS servers?
A. a unique, internet-usable IP address
B. in a highly-secure environment
C. dynamic, read-write, and read-only
D. the Mail exchanger (MX) record
Ans: C
The DNS Client service itself communicates with DNS servers, and ________ the results that it
receives.
A. CPU cache
B. Computer data Storage
C. Operating system
D. Cache
Ans: D
Microsoft's DNS server can be administered using either a graphical user interface, the "DNS
Management Console", or a ________, the dnscmd utility.
A. Unix
B. Command-line interface
C. Windows PowerShell
D. Command-line interpreter
Ans: B
________ and various versions of Unix have a generalized name resolver layer.
A. Linux distribution
B. Linux adoption
C. Desktop Linux
D. Live USB
Ans: A
Prior to ________ and Microsoft Windows 2000 Service Pack 3, the most common problem
encountered with Microsoft's DNS server was cache pollution.
A. Windows XP
B. Windows Vista
C. Windows Server 2008
D. Windows Server 2003
Ans: D
DNS data can be stored either in master files (also known as zone files) or in the ________ database
itself.
A. Microsoft Windows
B. Internet Explorer
C. DirectX
D. Active Directory
Ans: D
Microsoft DNS is the name given to the implementation of domain name system services provided in
________ operating systems.
A. Internet Information Services
B. Microsoft Windows
C. Internet Explorer
D. DirectX
Ans: B
Also the support of ________ is implemented using a different technique from that of BIND 9,
further driving even more incompatibles between the two products.
A. Open Shortest Path First
B. IPv6
C. IPsec
D. IPv4
Ans: B
The Domain Name System support in Microsoft Windows NT, and thus its derivatives ________,
Windows XP, and Windows Server 2003, comprises two clients and a server.
A. Internet Explorer
B. Windows 2000
C. Windows Server 2008
D. Windows Vista
Ans: B
As of ________, it was the fourth most popular DNS server (counting BIND version 9 separately from
versions 8 and 4) for the publication of DNS data.
A. 2006
B. 2007
C. 2004
D. 2003
Ans: C
Some machines have a Dynamic DNS client, to perform Dynamic DNS Update transactions,
registering the machines' names and ________.
A. IP address
B. IPv4
C. Classless Inter-Domain Routing
D. IPv6
Ans: A
DNS is used to resolve host names to IP addresses and find services.
A. True
B. False
Ans: A
DNS is required if you want resources such as Web servers available on the Internet.
A. True
B. False
Ans: A
The most common task a DNS server performs is resolving a host name to an IP address. This is
called a forward lookup.
A. True
B. False
Ans:A
A reverse lookup allows you to specify an IP address and the DNS server returns the host name that
is defined for it.
A. True
B. False
Ans: A
BIND is a version of DNS that runs on UNIX/Linux.
A. True
B. False
Ans: A
Which of the following elements is required to successfully install and configure DNS?
A. DHCP
B. Static IP address
C. Active Directory
D. Windows 2000 clients
Ans: B

TOPIC 3: TROUBLESHOOTING
EASY QUESTIONS
Which TCP/IP utility is most often used to test whether an IP host is up and functional?

a. ftp
b. telnet
c. ping
d. netstat

Which TCP/IP utility will produce the following result? Interface: 199.102.30.152 Internet Address
Physical Address Type 199.102.30.152 A0–ee–00–5b–0e–ac dynamic

a. arp
b. netstat
c. tracert
d. nbtstat

Which Windows utility can you use to connect to a machine 50 miles away to troubleshoot?

a. Remote desktop
b. netstat
c. arp
d. Wireshark

Which TCP/IP utility might produce the following output?

Pinging 204.153.163.2 with 32 bytes of data:

Reply from 204.153.163.2: bytes=32 time=1ms TTL=128

Reply from 204.153.163.2: bytes=32 time=1ms TTL=128

Reply from 204.153.163.2: bytes=32 time=1ms TTL=128

Reply from 204.153.163.2: bytes=32 time<10ms TTL=128

a. tracert
b. ping
c. WINS
d. Ipconfig

Which utility can you use to find the MAC and TCP/IP addresses of your Windows workstation?

a. ping
b. ipconfig
c. ipconfig /all
d. tracert

Which ping commands will verify that your local TCP/IP interface is working?(Choose all that apply.)

a. ping 204.153.163.2
b. ping 127.0.0.1
c. ping localif
d. ping localhost
e. ping iphost

Which switch for the Windows nbtstat utility will display all NetBIOS name-resolution statistics?

a. –r
b. /r
c. –R
d. /R

You need to find a NIC’s specific MAC address and IP address. Which command-line tool can you use
to find this information without physically going to the computer?

a. ping
b. nbtstat
c. arp
d. netstat
e. ftp

Which nbtstat utility switch will purge and reload the remote NetBIOS name table cache?

a. –r
b. –R
c. /r
d. /R

Wireshark is an example of a ________________?

a. throughput tester
b. protocol analyzer
c. remote connection tool
d. port scanner

Which utility produces output similar to the following?

1 110 ms 96 ms 107 ms fgo1.corpcomm.net [209.74.93.10]

2 96 ms 126 ms 95 ms someone.corpcomm.net [209.74.93.1]

3 113 ms 119 ms 112 ms Serial5–1–1.GW2.MSP1.alter.net

[157.130.100.185]
4 133 ms 123 ms 126 ms 152.ATM3–0.XR2.CHI6.ALTER.NET

[146.188.209.126]

5 176 ms 133 ms 129 ms 290.ATM2–0.TR2.CHI4.ALTER.NET [146.188.209.10]

6 196 ms 184 ms 218 ms 106.ATM7–0.TR2.SCL1.ALTER.NET [146.188.136.162]

7 182 ms 187 ms 187 ms 298.ATM7–0.XR2.SJC1.ALTER.NET [146.188.146.61]

8 204 ms 176 ms 186 ms 192.ATM3–0–0.SAN–JOSE9– GW.ALTER.NET

[146.188.144.133]

9 202 ms 198 ms 212 ms atm3–0–622M.cr1.sjc.globalcenter.net [206.57.16.17]

10 209 ms 202 ms 195 ms pos3–1–155M.br4.SJC.globalcenter.net

[206.132.150.98]

11 190 ms * 191 ms pos0–0–0–155M.hr3.SNV.globalcenter.net [206.251.5.93]

12 195 ms 188 ms 188 ms pos4–1–0– 155M.hr2.SNV.globalcenter.net

[206.132.150.206]

13 198 ms 202 ms 197 ms www10.yahoo.com [204.71.200.75]

a. arp
b. tracert
c. nbtstat
d. netstat

Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
Answer: d
Ping sweep is a part of
a) Traceroute
b) Nmap
c) Route
d) Ipconfig
Answer: b
ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b
Answer: d
_____ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
Answer: a
If you want to find the number of routers between a source and destination, the utility to be used is.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
Answer: d
Which of the following is related to ipconfig in Microsoft Windows?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned
Answer: d
This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) None of the mentioned
Answer: a
Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters
Answer: c

INTERMEDIATE QUESTIONS
We can use ping program to find if a host is
A. alive
B. dead
C. responding
D. both a and c
Answer D
Ping can
a) Measure round-trip time
b) Report packet loss
c) Report latency
d) All of the mentioned
Ping sweep is a part of
a) Traceroute
b) Nmap
c) Route
d) Ipconfig
ICMP is used in
a) Ping
b) Traceroute
c) Ifconfig
d) Both a and b
_____ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
If you want to find the number of routers between a source and destination, the utility to be used is.
a) Route
b) Ipconfig
c) Ifconfig
d) Traceroute
Which of the following is related to ipconfig in Microsoft Windows?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) All of the mentioned
This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) none of the mentioned
Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters
An RPC application requires
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned
RPC is used to
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) both (a) and (b)
d) none of the mentioned
Telnet protocol is used to establish a connection to
a) TCP port number 21
b) TCP port number 22
c) TCP port number 23
d) TCP port number 24
Which one of the following is not true?
a) telnet defines a network virtual terminal (NVT) standard
b) client programs interact with NVT
c) server translates NVT operations
d) none of the mentioned
All telnet operations are sent as
a) 4 bytes
b) 8 bytes
c) 16 bytes
d) 32 bytes
Absolute Telnet is a telnet client for
a) windows
b) Linux
c) mac
d) none of the mentioned
The decimal code of interpret as command (IAC) character is
a) 252
b) 253
c) 254
d) 255
In character mode operation of telnet implementation
a) each character typed is sent by the client to the server
b) each character typed is discarded by the server
c) both (a) an (b)
d) none of the mentioned
In telnet, the client echoes the character on the screen but does not send it until a whole line is
completed in
a) default mode
c) character mode
c) server mode
d) none of the mentioned
Which one of the following is not correct?
a) telnet is a general purpose client-server program
b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
d) none of the mentioned
Which operating mode of telnet is full duplex?
a) default mode
b) server mode
c) line mode
d) none of the mentioned
If we want that a character be interpreted by the client instead of server
a) escape character has to be used
b) control functions has to be disabled
c) it is not possible
d) none of the mentioned
A local telephone network is an example of a _______ network
a) Packet switched
b) Circuit switched
c) both of the mentioned
d) none of the mentioned
Most packet switches use this principle
a) Stop and wait
b) Store and forward
c) Both of the mentioned
d) None of the mentioned
If there are N routers from source to destination, total end to end delay in sending packet P(L-
>number of bits in the packet R-> transmission rate)
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
Method(s) to move data through a network of links and switches
a) Packet switching
b) Circuit switching
c) Line switching
d) Both a and b
The resources needed for communication between end systems are reserved for the duration of
session between end systems in ________
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
As the resources are reserved between two communicating end systems in circuit switching, this is
achieved
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
In _________ resources are allocated on demand.
a) packet switching
b) circuit switching
c) line switching
d) frequency switching
RPC is a
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) none of the mentioned
The local operating system on the server machine passes the incoming packets to the
a) server stub
b) client stub
c) client operating system
d) none of the mentioned
Which one of the following event is not possible in wireless LAN.
a) Collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned

CHALLENGING QUESTIONS
How long is an IPv6 address?
A. 32 bits
B. 128 bytes
C. 64 bits
D. 128 bits
Answer: Option D
What flavor of Network Address Translation can be used to have one IP address allow many users to
connect to the global Internet?
A. NAT
B. Static
C. Dynamic
D. PAT
Answer: Option D
What are the two main types of access control lists (ACLs)?
Standard
IEEE
Extended
Specialized
A. 1 and 3
B. 2 and 4
C. 3 and 4
D. 1 and 2
Answer: Option A
What command is used to create a backup configuration?
A. copy running backup
B. copy running-config startup-config
C. config mem
D. wr mem
Answer: Option B
You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to
the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the
server?
A. 100 kbps
B. 1 Mbps
C. 2 Mbps
D. 10 Mbps
Answer: Option D

Which are reasons for using troubleshooting method? (Choose all that apply)
A. Problem isolation and resolution will occur more quickly.
B. No documentation needs to be done when following a method
C. Due to complex topologies and technologies, a systematic method is the most efficient way
to resolve network problems.
D. All the mentioned

What are the benefits of gathering additional facts for troubleshooting? (Choose all that apply)
A. Possible causes of problems may be identified
B. A specific problem definition may be created
C. Information is provided for a baseline
D. All the mentioned

Which of the following are components of creating an action plan?


A. Multiple changes as long as they are documented
B. Changes that do not compromise security
C. Changes that only brief network impact
D. Back-out plans

How many methods of problem isolation exist?


A. 2
B. 3
C. 4
D. 6
Which of the following steps are part of the Cisco troubleshooting methodology? (Choose all that
apply)
A. Observation of results
B. Observation of changes
C. Iteration
D. Problem definition

Which protocol attributes are associated with the Internet Protocol (IP) (choose all that apply)
A. Connection-oriented
B. Connectionless
C. Layer 2
D. Layer 3

Select the potential attributes of a connectionless protocol.


A. Broadcast control
B. Sequenced PDUs
C. Broadcast transmissions
D. Wireless connectivity

Choose all protocols that operates only at Layer 3 from the following list:
A. PPP (Point-to-Point Protocol)
B. IP (Internet Protocol)
C. EIGRP (Enhanced Interior Gateway Routing Protocol)
D. X.25

Choose all the layer 2 protocols from the following list:


A. TCP
B. Ethernet
C. Token Ring
D. FDDI

Choose two attributes that a connection- oriented protocol possesses.


A. Flow control
B. Error control
C. Broadcast control
D. Collision detection

Which of the following are parts of a network baseline?


A. End-system network configuration table
B. Network overview document
C. Network summary document
D. Network topology diagram
To back up an IOS, what command will you use?
A. backup IOS disk
B. copy ios tftp
C. copy tftp flash
D. copy flash tftp
Answer: Option D
What windows 2000 command shows all IP addresses and TCP port numbers of the current
connections to an end-systems?
A. netstat
B. ipconfig
C. ifconfig
D. route

What is SNMP used for?


A. Creating network maps
B. Traffic analysis
C. Statistical/environmental data collection
D. All of the mentioned

A network configuration table usually contains what kind of information? (Choose all that applies)
A. IP addresses and Interface speed
B. Show running-config
C. CRCs
D. Interface name and Interface type

You are seeing incrementing interface resets on an interface. What is the most appropriate
troubleshooting method to use for this situation?
A. Bottom-up troubleshooting
B. Top-down troubleshooting
C. Divide-and-conquer troubleshooting
D. Wait-and-see troubleshooting

What Unix command shows the IP address and subnet mask of the interface?
A. ipconfig
B. ifconfig
C. cat /etc/revolv.conf
D. netstat

Which one of the following routing protocol is a distance vector protocol and a Cisco proprietary?
A. EIGRP
B. IGRP
C. RIP
D. BG
Which commands should be used in conjunction for thorough problem isolation? (Choose two)
A. ping
B. show IP interface
C. traceroute
D. ARP

What command(s) can be issued on a Windows XP system to provide interface IP information?


A. show ip interface
B. ipconfig /all
C. winipcfg
D. ipcfg

Which protocols are used for dynamic IP address assignment? (Choose two)
A. AutoIP
B. AutoARP/IP
C. BootP
D. DHCP
Choose the troubleshooting tool that is used to test for reachability and connectivity.
A. traceroute
B. debug
C. show interface
D. ping
When is a default gateway used on the router?
A. When a packet leaves the router
B. When no route exists in the route table
C. When a static route has been set
D. Only when the router is in boot mode

Why is a default metric setting necessary for route redistribution?


A. It isn’t necessary
B. The routes being injected must be assigned metrics that the parent protocol understands.
C. A default metric setting provides better metrics when performing route redistribution
D. A default metric setting converts the parent protocol’s metric to match the protocol being
redistributed.

Which LMI (Local Management Interface) type is on by default on a router?


A. LMI
B. Cisco
C. ANSI
D. ITU-T
What are the valid LMI type? (choose all that apply)
A. LMI
B. Cisco
C. ITU-T
D. IETF
Which are the valid frame relay encapsulation type? (choose all that apply)
A. IETF
B. ITU-T
C. Cisco
D. ANSI

Which kind of encapsulation is used by default on a Cisco Serial interface?


A. SDLC
B. PPP
C. HDLC
D. X.25

What type of tests are useful in testing for end-to-end serial link integrity
A. Ping
B. Traceroute
C. Loopback
D. Loopup

Which channel is used by q.931 and q.921 for communication?


A. A channel
B. B channel
C. D channel
D. Both B and D channels

Which command should be used to display the connection setup for Layer 3?
A. Show interface bri n
B. Debug isdn q.931
C. Debug interface bri
D. Debug isdn q.92

Which ISDN protocol is used for Layer 3?


A. CHAP
B. PPP
C. Q.921
D. q.931

Which channel does PPP use when negotiating the connection?


A. A channel
B. B channel
C. D channel
D. Both B and D
Which one of the following are characteristics of the extended IP access lists? (choose all that apply)
A. Can be used to limit debug output
B. Can be used to filter Layer 2 frames
C. Can be applied to ports on a switch
D. Filter on the TCP or UDP port
What does a result of P mean in the output of a ping command?
A. Destination unreachable
B. Source quench
C. Protocol unreachable
D. Network unreachable
E. Unable to fragment
Which of the following command outputs would most likely indicate a problem at the Datalink layer?
(Select all that applies)
A. Serial 2/3 is up line protocol is down
B. Serial 2/3 is up line protocol is up
C. Serial 2/3 is down line protocol is down
D. Serial 2/3 is down line protocol is up

Which of the following are guidelines for creating network documentation (choose all that apply)
A. Determine the scope
B. Document everything
C. Put as much information as possible on network documents.
D. Keep document accessible.

Which command is used for displaying information about Cisco routers that are connected to a
switch?
A. Show connections
B. Show vtp neighbor
C. Show ip route
D. Show cdp neighbor
Which command on a Windows NT end-system is used to add routes to that end system?
A. Route add
B. Ip add route
C. Ip route add
D. Add route

What are some of the benefits of a named access list over a numbered access list? (Choose all that
apply)
A. A named access list can be applied to all interface types.
B. Individual’s lines can be removed from a named access list.
C. Named access lists are easier for a router to work with.
D. Named access lists are easier for the network administrator to work with.

TOPIC 4: SERVICES AND APPLICATIONS


EASY QUESTIONS
Which functionality of the network layer deals with the necessity of a three-way handshake usually
before the transmission of data from sender to receiver?
a. Path determination
b. Forwarding
c. Call Set-up
d. All of the above
ANSWER: c.
A packet used for the transmission purpose is basically a combination of __________

a. group of bits
b. source & destination addresses
c. both a & b
d. none of the above
ANSWER: c.
Which unit plays a crucial role in carrying out the functions of network layer, simply by the addition
of a header to it?

a. Network Service Data Unit (NSDU)


b. Medium Access Control Unit (MACU)
c. Network Address Translation Unit (NATU)
d. None of the above
ANSWER: a.
Match the classes of IP addresses with their functional applications

A. Class A -------------------- 1) Multicast services


B. Class B -------------------- 2) Reserved for future use
C. Class D -------------------- 3) Large organizations
D. Class E -------------------- 4) Midsize Organizations

a. A- 4, B- 3, C- 2, D- 1
b. A- 2, B- 4, C- 1, D- 3
c. A- 3, B- 4, C- 1, D- 2
d. A- 1, B- 2, C- 3, D- 4

ANSWER: c.
Which form of byte assigning strategy is adopted in class B type of network corresponding to IP
addresses?

a. Network.Node.Node.Node
b. Network.Network.Node.Node
c. Network.Network.Network.Node
d. Network.Node.Node.Node
ANSWER: b.
On which factors do the size of block depends in classless addressing?

a. Nature & size of an entity


b. Number of addresses
c. Availability of the address space
d. All of the above
ANSWER: a.
What are the problems involved in an IP Fragmentation Process?

A. Loss of any fragment results in rejection of all datagrams

B. Management of buffer space is essential to handle reassembly process

C. No necessity of initializing the timer after the reception of initial fragment

D. Multiple attempts can be made to recover ICMP error message due to connection-oriented IP
service

a. A & B
b. C & D
c. B& C
d. A & D
ANSWER: a. A & B
The ability of a single network to span multiple physical networks is known as ______

a. Subnetting
b. Masking
c. Fragmenting
d. Hopping
ANSWER: a.
Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to
verification for ICMP messages?

a. Type
b. Code
c. Checksum
d. All of the above
ANSWER: c.
Which among the below stated datagram discard code fields in ICMP is/are generated if a router
fails to forward a packet due to administrative filtering?

a. Source Route Failed


b. Communication Administratively Prohibited
c. Host Precedence Violation
d. Precedence Cut-off in Effect
ANSWER: b.
Each IP packet must contain
A. Only Source address
B. Only Destination address
C. Source and Destination address
D. Source or Destination address
Bridge works in which layer of the OSI model?
A. Application layer
B. Transport layer                   
C. Network layer
D. Datalink layer
_______ provides a connection-oriented reliable service for sending messages
A. TCP
B. IP
C. UDP
D. All of the above
Which layers of the OSI model are host-to-host layers?
A. Transport, Session, Presentation, Application
B. Network, Transport, Session, Presentation
C. Datalink, Network, Transport, Session
D. Physical, Datalink, Network, Transport
Which of the following IP address class is Multicast
A. Class A
B. Class B
C. Class C
D. Class D
Which of the following is correct regarding Class B Address of IP address
A. Network bit – 14, Host bit – 16
B. Network bit – 16, Host bit – 14
C. Network bit – 18, Host bit – 16
D. Network bit – 12, Host bit – 14
The last address of IP address represents
A. Unicast address
B. Network address
C. Broadcast address
D. None of above
How many bits are there in the Ethernet address?
A. 64 bits
B. 48 bits
C. 32 bits
D. 16 bits
How many layers are in the TCP/IP model?
A. 4 layers
B. 5 layers
C. 6 layers
D. 7 layers
Which of the following layer of OSI model also called end-to-end layer?
A. Presentation layer
B. Network layer
C. Session layer
D. Transport layer
 

INTERMEDIATE QUESTIONS
ICMP Stands for
A. Internet Connect Message Protocol
B. Internet Control Message Protocol
C. International Connect Message Protocol
D. International Control Message Protocol
Answer B

Transmission Control Protocol/Internet Networking Protocol have

A. Four Layers
B. Five Layers
C. Six Layers
D. Seven Layers
Answer A

Packets of data that is transported by IP is called

A. datagrams
B. Frames
C. Segments
D. Encapsulate
Answer A

Transmission Control Protocol divides a stream of data into smaller units that are called

A. Frames
B. Datagrams
C. Segments
D. Information
Answer C

Term that refers to associate a logical address with a physical address is

A. RARP
B. IGMP
C. ARP
D. ICMP
Answer C
A header in CGI script can specify
(A) format of the document.
(B) new location of the document.
(C) (A) & (B) both.
(D) start of the document.
Ans: A
All exceptions in Java are subclasses of built in class called
(A) Exception
(B) Error.
(C) Throwable.
(D) Raise.
Ans: C

In 32bit IP Addressing scheme all 1’s represent


(A) this computer.
(B) directed broadcast.
(C) limited broadcast.
(D) loop back.
Ans: C
DMSP stands for
(A) Distributed Mail System Protocol
(B) Distributed Message System Protocol
(C) Distributed Message System Pool
(D) Distributed Mail System Pool
Ans: A

Which Layer is not present in TCP/IP model?


(A) Application Layer
(B) Internet Layer
(C) Transport Layer
(D) Presentation Layer
Ans: D
Let most segment of a name inn DNS represents
(A) Individual Network.
(B) Individual computer.
(C) Domain name
(D) Network type.
Ans: B

Address 192.5.48.3 belongs to


(A) class A.
(B) class B.
(C) class C.
(D) class D.
Ans: C
Unlike Ipv4, Ipv6 does not include the following field in the base header
(A) Next Header field.
(B) Field for Fragmentation information
(B) Flow Label.
(D) Kind field.
Ans: B

The term byte stuffing refers to:


(A) data stuffing used with character oriented hardware.
(B) data stuffing used with bit oriented hardware.
(C) data stuffing used with both (A) & (B)
(D) data stuffing used with byte oriented hardware.
Ans: A

FDDI (Fiber Distributed Data Interconnect) is an example of


(A) token ring.
(B) token bus
(C) star topology
(D) multipoint network.
Ans: A
Hardware that calculates CRC(Cyclic Redundancy Check) uses:
(A) Shift register
(B) Xor unit
(C) Both (A) & (B)
(D) Instruction register
Ans: B
In TCP protocol header “checksum” is of___________
(A) 8 bits
(B) 16 bits
(C) 32 bits
(D) 64 bis
Ans: B
In IP addressing scheme, class used for multicasting is:
(A) Class A
(B) Class B
(C) Class C
(D) Class D
Ans: D
CIDR stands for
(A) Classified Internet Domain Routing
(B) Classless Inter Domain Routing
(C) Classless Internet Domain Routing
(D) Classified Inter Domain Routing
Ans: B
The total number of class of IP address are
(A) 3.
(B) 4.
(C) 5.
(D) 9.
Ans: C

Parent class of all Java classes is


(A) java.lang.system
(B) java.lang.object
(C) java.lang.class
(D) java.lang.reflect.object
Ans: B

Exceptions of type error inn JAVA are handled by


(A) User program
(B) Java run time environment
(C) Operating system kernel
(D) Interrupt
Ans: B
Error detecting method that can detect more errors without increasing
additional information in each packet is
(A) checksum
(B) even parity mechanism
(C) CRC
(D) odd parity mechanism.
Ans: C
A Network uses a star topology if
(A) Computers are arranged in a closed loop.
(B) All computers attach to a central point.
(C) All computers attach to a single long cable.
(D) Computers attach to multiple hierarchical cables.
Ans: B

MTU is specified by
(A) IP Datagram size
(B) Hardware technology
(C) TCP Segment size
(D) None of the above.
Ans: B

Network address prefixed by 1110 is a


(A) Class A address
(B) Multicast address
(C) Class B address
(D) Reserve address.
Ans: B

FTP does not use


(A) Two transfer mode.
(B) Control connection to remote computer before file can be transferred.
(C) User Datagram Protocol.
(D) Authorization of a user through login and password verification.
Ans: C

A Header in CGI document can represent


(A) format of the document
(B) location if document used to different URL
(C) both (A) & (B)
(D) None of the above.
Ans: B

127.0.0.1 is a
(A) limited broadcast address
(B) direct broadcast address
(C) multicast address
(D) loop-back address
Ans: D

In cyclic redundancy checking CRC is the


(A) divisor
(B) quotient.
(C) dividend
(D) remainder.
Ans: D
Which one of the following uses the greatest number of layers in the OSI model?
(A) Bridge
(B) Repeater.
(C) Router.
(D) Gateway.
Ans: D

Which of the following 802 standard provides for a collision free protocol?
(A) 802.2
(B) 802.3
(C) 802.5
(D) 802.6
Ans: C

The addressing especially used by Transport Layer is


(A) Station address
(B) Network address
(B) Application port address
(D) Dialog address
Ans: B

Which one of thee following is an error reporting protocol?


(A) ARP
(B) ICMP
(C) TCP
(D) UDP
Ans: B
Which type of web document is run at the client site?
(A) Static
(B) Dynamic
(C) Active
(D) All of the above
Ans: C

The main function of a browser is to


(A) compile HTML
(B) interpret HTML
(C) de-compile HTML
(D) interpret CGI programs
Ans: B

Which of the following is associated with SNMP


(A) SMI
(B) BER
(C) DNS
(D) MIB
Ans: D

ATM is an example of
(A) Ring topology
(B) Star topology
(C) Bus topology
(D) None of the above.
Ans: B
The first part of the address in electronic mailbox identifies:
(A) User’s mailbox
(B) Computer on which mail box resides
(C) Both (A) & (B)
(D) None of the above
Ans:
Protocol used to monitor and control network devices operates at:
(A) Application layer
(B) Transport layer
(C) Network layer
(D) Data Link layer
Ans: A
DHCP stands for
(A) Dynamic Host Control Protocol
(B) Dynamic Host Configuration Protocol.
(C) Dynamic Host Connection Protocol.
(D) None of the above.
Ans: B
The transport protocol used by TFTP (Trivial File Transfer Protocol) is:
(A) FTP
(B) UDP
(C) TCP
(D) IP
Ans: B
The Environment variable SCRIPT_NAME in CGI script specifies:
(A) Domain name of the computer running o server
(B) The path of URL after server name.
(C) Name of the server
(D) None of the above.
Ans: B
Application layer (layer 4) in TCP/IP model corresponds to:
(A) Layer 4 and 5 in OSI model
(B) Layer 5 and 6 in OSI model
(C) Layer 6 and 7 in OSI model
(D) Layer 1 and 2 in OSI model
Ans: C
UDP (User Diagram Protocol) is
(A) Connectionless
(B) Message Oriented
(C) Connection oriented
(D) Both (A) and (B)
Ans: D
A network address prefixed by 1000 is:
(A) Class A address
(B) Class B address
(C) Class C address
(D) Class D address
Ans: B Class B address.

CHALLENGING QUESTIONS
Multiple object can be sent over a TCP connection between client and server in
a) persistent HTTP
b) non persistent HTTP
c) both (a) and (b)
d) none of the mentioned

Answer:a

HTTP is ________ protocol.


a) application layer
b) transport layer
c) network layer
d) none of the mentioned

Answer:a

In the network HTTP resources are located by


a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) none of the mentioned

Answer:a

HTTP client requests by establishing a __________ connection to a particular port on the server.
a) user datagram protocol
b) transmission control protocol
c) broader gateway protocol
d) none of the mentioned

Answer:b

In HTTP pipelining
a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding
responses
b) multiple HTTP requests cannot be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) none of the mentioned

Answer:a
FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23

Answer:b

In FTP protocol, client contacts server using ____ as the transport protocol.
a) Transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol

Answer:a

In which mode FTP, the client initiates both the control and data connections.
a) active mode
b) passive mode
c) both (a) and (b)
d) none of the mentioned

Answer:b

The file transfer protocol is built on


a) data centric architecture
b) service oriented architecture
c) client server architecture
d) none of the mentioned

Answer:c

In file transfer protocol, data transfer can be done in


a) stream mode
b) block mode
c) compressed mode
d) all of the mentioned

Answer:d

A piece of icon or image on a web page associated with another webpage is called
a) url
b) hyperlink
c) plugin
d) none of the mentioned
View Answer

Answer:b
Dynamic web page
a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
c) both (a) and (b)
d) none of the mentioned

Answer:b
What is a web browser?
a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned

Answer:d

Common gateway interface is used to


a) generate executable files from web content by web server
b) generate web pages
c) stream videos
d) none of the mentioned
View Answer

Answer:a

URL stands for


a) unique reference label
b) uniform reference label
c) uniform resource locator
d) unique resource locator

Answer:c

A web cookie is a small piece of data


a) sent from a website and stored in user’s web browser while a user is browsing a website
b) sent from user and stored in the server while a user is browsing a website
c) sent from root server to all servers
d) none of the mentioned

Answer:a
Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) none of the mentioned

Answer:d
An alternative of JavaScript on windows platform is
a) VBScript
b) ASP.NET
c) JSP
d) none of the mentioned

Answer:a
What is document object model (DOM)?
a) convention for representing and interacting with objects in html documents
b) application programming interface
c) hierarchy of objects in ASP.NET
d) none of the mentioned

Answer:a
AJAX stands for
a) Asynchronous JavaScript and xml
b) advanced JSP and xml
c) Asynchronous JSP and xml
d) advanced JavaScript and xml
Answer:a

What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
Answer:b

To join the internet, the computer has to be connected to a


a) internet architecture board
b) internet society
c) internet service provider
d) none of the mentioned
Answer:c

Internet access by transmitting digital data over the wires of a local telephone network is provided
by
a) leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
Answer:b

4. ISP exchanges internet traffic between their networks by


a) internet exchange point
b) subscriber end point
c) ISP end point
d) none of the mentioned
Answer:a

Which one of the following protocol is not used in internet?


a) HTTP
b) DHCP
c) DNS
d) none of the mentioned
Answer:d

IPv6 addressed have a size of


a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
Answer:c

Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)
d) none of the mentioned
View Answer
Answer:a

Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
Answer:c

Which protocol assigns IP address to the client connected in the internet?


a) DHCP
b) IP
c) RPC
d) none of the mentioned
Answer:a

Which one of the following is not used in media access control?


a) Ethernet
b) digital subscriber line
c) fiber distributed data interface
d) none of the mentioned
Answer:d

In Hyper Text Transfer Protocol (HTTP), support

A. Proxy Domain
B. Proxy Documents
C. Proxy Server
D. Proxy IP
Answer C

To use proxy server, client must be configured to access proxy instead of the

A. Proxy Server
B. Target Server
C. Post Server
D. Original Server
Answer B

In Hypertext Transaction, formats of request and response messages are


A. Same
B. Similar
C. Changed
D. Active
Answer B

In Hypertext Transaction, term CONNECT is used for

A. Connection
B. Reserved Connection
C. Post Connection
D. Active Connection
Answer B

In Hyper Text Transfer Protocol (HTTP), a client can directly connect to a server using

A. Web
B. Domain
C. TELNET
D. HTTP
Answer C

In World Wide Web (WWW), an electronic store (e-commerce) can use a cookie for its
A. Client Shopper
B. Client Details
C. Client Usage
D. Client Data
Answer A
HTTP uses a TCP connection to
A. establish link between servers
B. transfer whole database
C. client server connections
D. transfer files
Answer D
In Hyper Text Transfer Protocol (HTTP), a client can directly connect to a server using
A. Web
B. Domain
C. TELNET
D. HTTP
Answer C
HTML stands for
A. Hypertext Mark-up Locator
B. Hypertext Mark-up Language
C. Hypertext Mixed Language
D. Hypertext Mark-up Lines
A Web page is made up of two parts
A. Header and Footer
B. Text and Number
C. Document and File
D. Head and Body
Answer D

Protocol is client/server program used to retrieve the


A. Information
B. Location
C. Document
D. Files
Answer C
In World Wide Web (WWW), an electronic store (e-commerce) can use a cookie for its
A. Client Shopper
B. Client Details
C. Client Usage
D. Client Data
Answer A
Uniform Resource Locator (URL), is a standard for specifying any kind of information on the
A. Server
B. IP
C. Web Page
D. Internet
Answer D
World Wide Web (WWW), was originally designed as a
A. Stateless Document
B. Stateless Program
C. Stateless Entity
D. Stateless IP
Answer C
Web page is stored at the
A. Server
B. IP
C. Domain
D. Mail Server
Answer A
Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned
Answer: b

FTP is built on _____ architecture


a) Client-server
b) P2P
c) Both of the mentioned
d) None of the mentioned
Answer: a

FTP uses _____ parallel TCP connections to transfer a file


a) 1
b) 2
c) 3
d) 4
Answer: b

Identify the incorrect statement


a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection
Answer: c

If 5 files are transferred from server A to client B in the same session. The number of TCP connection
between A and B is
a) 5
b) 10
c) 2
d) 6
Answer: d

FTP server
a) Maintains state
b) Is stateless
c) Has single TCP connection for a file transfer
d) None of the mentioned
Answer: a

The commands, from client to server, and replies, from server to client, are sent across the control
connection in ____ bit ASCII format
a) 8
b) 7
c) 3
d) 5
Answer: b

Find the FTP reply whose message is wrongly matched


a) 331 – Username OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection
Answer: d

Mode of data transfer in FTP, where all the is left to TCP


a) Stream mode
b) Block mode
c) Compressed mode
d) None of the mentioned
Answer: a

The password is sent to the server using _____ command


a) PASSWD
b) PASS
c) PASSWORD
d) None of the mentioned

Answer: b
In File Transfer Protocol (FTP), while control connection is open, data connection can be opened and
closed
A. One time
B. Several Times
C. Multiple Times
D. None of given
Answer C
File Transfer Protocol (FTP), uses he same operation as uses by
A. ICMP
B. STMP
C. TCP
D. FSK
Answer C
File Transfer Protocol (FTP), uses well-known port 21 is used for control connection and well-known
port 20 for the
A. Data Rate
B. Data Connection
C. Data Protocol
D. Data Congestion
Answer B
In File Transfer Protocol (FTP), a user needs an account (user name) and a password on the
A. IP Server
B. Remote Server
C. Domain Server
D. Data Server
Answer B
Well-known port for FTP is used for control connection is
A. 6
B. 8
C. 19
D. 21
Answer D
Which of the following services use TCP?
DHCP
SMTP
HTTP
TFTP
FTP
A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4
Answer: Option B

What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
Answer: Option B
Which of the following describe the DHCP Discover message?
It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
It uses UDP as the Transport layer protocol.
It uses TCP as the Transport layer protocol.
It does not use a layer 2 destination address.
A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only
Answer: Option B
You want to implement a mechanism that automates the IP configuration, including IP address,
subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
Answer: Option C

Which of the following is private IP address?


A. 12.0.0.1
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43
Answer: Option D

Which of the following is true?


A) Telnet uses the telnet protocol.
B) Telnet uses the rlogin protocol.
C) Telnet and rlogin are identical.
D) Telnet and FTP have the same functionality.
Which of the following choices best describes the utility of Telnet?
A) Telnet allows you to transfer files between two computers.
B) Telnet allows you to connect and login to a remote computer.
C) Telnet allows you to network to the Internet.
D) Telnet can be used to retrieve images on the Web.
To Telnet to the machine hopper.unh.edu through a Web browser you should type which of the
following in the location area?
A) telnet:hopper.unh.edu
B) Telnet:hopper.unh.edu
C) telnet:$\backslash$$\backslash$hopper.unh.edu
D) telnet://hopper.unh.edu

Choose the answer containing the most types of operating systems that have Telnet clients available
to them.
A) Windows95 and Unix
B) MacOS and Windows98
C) WindowsNT, Unix, and MacOS
D) Windows95, Windows98, Unix, and MacOS
To display help about the rlogin command from a Unix system, you would enter which of the
following?
A) help rlogin
B) man rlogin
C) manual rlogin
D)? rlogin
What is the correct syntax for user mary to rlogin to host bert?
A) rlogin -l bert mary
B) rlogin -1 bert mary
C) rlogin -1 mary bert
D) rlogin -l mary bert

Which of the following statements is true?


A) Telnet does not prompt you for a password most of the time.
B) Rlogin is quicker and more secure than Telnet.
C) Rlogin will echo your password on the screen
D) Rlogin will prompt you for a password.
FTP stands for
A) Find Transfer Protocol
B) Finder Transfer Protocol
C) File Transfer Protocol
D) File Transferring Protocol

Which of the following is not a mode of a standard graphical FTP client?


A) Auto
B) Binary
C) GIF
D) ASCII

Which mode should compressed files be transferred in?

A) Binary
B) ASCII
C) GIF
D) Plaintext

Which of the following is not a valid command to type in to the Unix ftp prompt?
A)?
B) get
C) put
D) pwt

Which Unix ftp command is used to list the directory contents of the remote machine?

A) lcd
B) cd
C) ls
D) dir

Which answer best describes the purpose of file compression?


A) Encrypt information.
B) Reduce storage space required for a file.
C) Hide information.
D) Recode the file into binary.

Which of the following is not a commonly used file compression utility?

A) PKZIP
B) gzip
C) Compress
D) shrinker

Which of the following statements is false?


A) Any compressed file can be decompressed with any compression program.
B) There are files whose space cannot be compressed.
C) Most compressed files are larger than the original.
D) Gzip works well with gunzip.
Anonymous file transfer is best used for which of the following?

A) Distributing freeware.
B) Distributing email.
C) File compression.
D) Letting people get secretive documents without revealing their identities.
Which of the following statements is false?

A) There are text-based FTP clients.


B) There are graphical-based FTP clients.
C) FTP can be launched through the location area of a browser.
D) By typing FTP to the UNIX prompt, you can start the UNIX file transfer protocol.

Which of the following is not a name for an item that could be a security threat to your compute
A) Trojan horse
B) meta-crawler
C) worm
D) virus

Which of the following is the best definition for virus?


A) A program that when run is able to replicate itself and then embed itself within another program.
B) A series of bits that are spread via phone lines.
C) A file that contains binary data.
D) A computer hacker who spams other users in an annoying fashion.

Which of the following is not something you would do to protect yourself from viruses?
A) Run antivirus software.
B) Download software from unknown sources.
C) Avoid pirated copies of software.
D) Backup your files regularly.

Anonymous FTP usually uses which of the following?


A) The user's e-mail address as the account name and the word guest as the password.
B) The user's e-mail address as the account name and the word anonymous as the password.
C) The word anonymous as the account name and the user's e-mail address as the password.
D) The word anonymous as the account name and the user's system password as the password.

Ways to copy a file from one computer to another include all but which of the following?
A) Archie.
B) E-mail the file as an attachment.
C) FTP.
D) Copy the file onto a diskette and then "walk" the diskette over to the other computer.

Which of the following statements is false?


A) Archie is a service that maintains databases containing listings of files from various file transfer
sites.
B) One way to find a specific file involves sending e-mail to an Archie site.
C) Another way to find a specific file involves connecting to an Archie server via Telnet.
D) The name Archie is derived from "file architecture."
Which of the following statements is true?
A) UNIX viruses are rare because hackers are more interested in PCs and Macs.
B) Backing up your files regularly will not help in the event of a virus since the backed-up version will
probably be infected as well.
C) Nearly all viruses are operating-system specific.
D) If infected by a virus, damage will occur immediately as it fills all available space on your hard
drive.

Which of the following best describes a Trojan horse virus?


A) A stand-alone program that tries to gain access to computer systems via networks.
B) A virus that is transmitted via e-mail and is usually called "Good Times."
C) The Internet Worm which was created by Robert Morris.
D) A legitimate program for carrying out some useful function that has hidden code.

You might also like