0% found this document useful (0 votes)
6K views80 pages

VKU - Mạng Máy Tính - Bộ Câu Hỏi Trắc Nghiệm Ôn Thi Cuối Kỳ

This document discusses a review material for a computer network exam, including chapters on physical layer, data link layer, network layer, transport layer, and application layer. It contains 27 multiple choice questions covering topics such as network protocols, network models, network layers and their functions, communication mediums, and more. The document aims to help students prepare for their computer network exam through reviewing these concepts and practicing example questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6K views80 pages

VKU - Mạng Máy Tính - Bộ Câu Hỏi Trắc Nghiệm Ôn Thi Cuối Kỳ

This document discusses a review material for a computer network exam, including chapters on physical layer, data link layer, network layer, transport layer, and application layer. It contains 27 multiple choice questions covering topics such as network protocols, network models, network layers and their functions, communication mediums, and more. The document aims to help students prepare for their computer network exam through reviewing these concepts and practicing example questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 80

21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

MỤC LỤC
CHƯƠNG 1. TỔNG QUAN VỀ MẠNG MÁY TÍNH 2
CHƯƠNG 2. TẦNG VẬT LÝ 22
CHƯƠNG 3. TẦNG LIÊN KẾT DỮ LIỆU 44
CHƯƠNG 4. TẦNG MẠNG 63
CHƯƠNG 5. TẦNG GIAO VẬN 72
CHƯƠNG 6. TẦNG ỨNG DỤNG 75

[email protected] 1

about:blank 1/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

CHƯƠNG 1. TỔNG QUAN VỀ MẠNG MÁY TÍNH

1) Which of following protocol is HTTP built upon?


a) TCP
b) UDP
c) IP
d) ICMP
2) Which of the following requirements are necessary for packet networks to support
multiple and dTransfer arbitrary message size diverse applications?
a) Transfer arbitrary message size
b) All of the mentioned
c) Low delay for interactive applications
d)
3) What was the concern of the telephone system that motivated the ARPANET
design?
a) Vulnerability
b) Scalability
c) Efficiency
d) None of the mentioned
4) Which of the following is an application layer protocol?
a) DNS
b) HTTP
c) UDP
d) TCP
5) Gõ câu hỏi vô đây? (G1)
a) A
b) B
c) C
d) D
6)
7) Which of the following are features of ARPANET design?

[email protected] 2

about:blank 2/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) All of the mentioned


b) Connectionless packet transmission
c) Routing tables at the packet switches
d) Destinations identified by unique addresses
8) Bluetooth is an example of _____
a) Local Area Network
b) Personal Area Network
c) Wide Area Network
d) Metropolitan Area Network
9) In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are _____
a) Added
b) Rearranged
c) Removed
d) Modified
10)The _____ is the physical path over which a message travels.
a) Path
b) Medium
c) Route
d) Protocol
11) Three or more devices share a link in _____ connection.
a) Multipoint
b) Unipoint
c) Point to Point
d) None of the mentioned
12)Which of the following is true for Transport Control Protocol?
a) Process to process
b) Connection oriented
c) Transport layer protocol
d) Connectionless
13)In a LAN, which address is used to transfer frames to appropriate destination?

[email protected] 3

about:blank 3/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) Physical address
b) IP address
c) Domain name
d) None of the mentioned
14)Suppose an application layer entity wants to send an L-byte message to its peer
process, using an existing TCP connection. The TCP segment consists of the
message plus 20 bytes of header. The segment is encapsulated into an IP packet
that has an additional 20 bytes of header. The IP packet in turn goes inside an
Ethernet frame that has 18 bytes of header and trailer. What is the bandwidth
utilization in terms of the percentage of the transmitted bits in the physical layer
corresponds to message information if L = 500 bytes?
a) 100%
b) 70%
c) 80%
d) 90%
15)Of the following services, which service(s) does the IP layer provides?
a) None of the mentioned
b) Error control
c) Flow control
d) Connection-based data transfer
16)Which of the following is true about the ways in which the OSI reference model
and TCP/IP reference model differ?
a) They differ in the number of layers
b) All of the mentioned
c) TCP/IP model does not have presentation layer, but OSI model has
d) TCP/IP model does not have session layer, but OSI model has
17)Which of following statements is true about how the data link layer and transport
layer differ?
a) Data link layer is concerned with framing and the transport layer is not
b) Data link layer is concerned with flow control and the transport layer is not
c) Data link layer is concerned with multiplexing and the transport layer is not

[email protected] 4

about:blank 4/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) All of the mentioned


18)This layer is an addition to OSI model?
a) Application layer
b) Presentation layer and Session layer
c) Presentation layer
d) Session layer
19)The functionalities of presentation layer includes _____
a) All of the mentioned
b) Data compression
c) Data encryption
d) Data decryption
20)In BSD socket API, which call is usually used for transmitting data in the
connectionless mode?
a) Accept()
b) Sendto()
c) Connect()
d) None of the mentioned
21)Which of following statement about TCP/UDP sockets is wrong?
a) TCP is faster than UDP
b) TCP socket is stream oriented
c) UDP socket is block oriented
d) All of the mentioned
22)Which of following are commonly used as digital communication medium?
a) Twisted pair
b) All of the mentioned
c) Coaxial cable
d) Optical fiber
23)Consider a network link that has distance of 100 meters, and signal traverses at the
speed of light in cable 2.5 x 10^8 meters per second. The link has transmission
bandwidth of 100 megabits/second (100 x 10^6 bits per second). The packet size is
400 bits. What is the signal propagation delay?

[email protected] 5

about:blank 5/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) 4x10^-19 seconds
b) 4x10^-6 seconds
c) 4x10^-7 seconds
d) None of the mentioned
24)An API allows application programs to access certain resources through a
predefined interface?
a) False
b) True
25)In transport protocol, which of the following statements is true for User Data
Protocol?
a) It enables best-effort connectionless transfer of individual block of
information.
b) It enables connection-oriented reliable transfer of individual block of
information
c) It enables best-effort connectionless reliable transfer of a stream of bytes
d) None of the mentioned
26)Which of the following sentences are true for connectionless stream mode of
service? (choose 3)
a) Multiple write/read between peer processes
b) Send/receive to/from multiple peer processes
c) No setup overhead and delay
d) Destination address with each block
27)In transmission delay, in order to reduce the number of bits in a message we use
data compression.
a) True
b) False
28)Which of the following is true of data compression algorithms? (choose 3)
a) Modify data headers
b) Recover information approximately
c) Recover original information exactly
d) Represent the information using fewer bits

[email protected] 6

about:blank 6/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

29)Which of the following networks use store-and-forward switching operation?


(choose 2)
a) Computer networks
b) Telegraph networks
c) Telephone networks
d) Wireless networks
30)There are similarities between message switching and packet switching. Which of
following that applies to packet switching but not to message switching?
a) Variable length of information block
b) Supporting multiple applications
c) Store-and-forward
d) All of the mentioned
31)Which of the following networks can be connection-oriented? (choose 2)
a) Computer networks
b) Telephone networks
c) Telegraph networks
d) All of the mentioned
32)A protocol is a set of precise and unambiguous rules that governs.
a) How two or more communicating entities in a layer are to interact
b) All of the mentioned
c) Messages that can be sent and received
d) Actions that are to be taken when a certain event occurs
33)DNS is a domain-name-service that responds to queries of domain name to IP
address or IP address to domain name. DNS uses services provided by _____
a) UDP
b) TCP
c) HTTP
d) None of the mensocket
34)A network used to join the individual networks at different sites into one extended
network is called _____
a) LAN

[email protected] 7

about:blank 7/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) VPN
c) PAN
d) SAN
35)Upon receipt of a bad segment, UDP?
a) It does not do flow and error control
b) Retransmission
c) It does error control
d) It does flow control
36)Which OSI layer is responsible for providing end-to-end communication with
reliable service?
a) Session layer
b) Transport layer
c) Network layer
d) Data link layer
37)Which OSI layer is responsible for dividing the transmitted bit stream into frames?
a) Data link layer
b) Application layer
c) Network layer
d) Transport layer
38)Which OSI layer is responsible for determining which route through the network
to use?
a) Data link layer
b) Network layer
c) Transport layer
d) None of the mentioned
39)Which feature does the data link layer and transport layer have in common?
a) Flow control
b) Congestion control
c) All of the mentioned
d) Medium access control
40)Which protocol glues the network of networks together as the Internet?

[email protected] 8

about:blank 8/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) TCP
b) IP
c) UDP
d) None of the mentioned
41)Which of the following applications would you select TCP protocol for? (choose
2)
a) Web browsing
b) File transfer
c) Domain name service
d) None of the mentioned
42)In BSD socket API, which type of socket is used to create a TCP socket?
a) SOCK_RAW
b) SOCK_STREAM
c) SOCK_DGRAM
d) None of the mentioned
43)In BSD socket API, which type of socket is used to create a UDP socket?
a) SOCK_DGRAM
b) SOCK_STREAM
c) SOCK_RAW
d) None of the mentioned
44)In BSD socket API, which systems call is used to assign a network address to the
socket?
a) None of the mentioned
b) Bind()
c) Connect()
d) Listen()
45)In BSD socket API, if a client knows the server name but now server's network
address, what system call should the client use to get server's network address?
a) Gethostbyname()
b) Connect()
c) None of the mentioned

[email protected] 9

about:blank 9/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) Gettimeofday()
46)In a transmission system, which of the following statement is true for a receiver?
(choose 2)
a) Converts information into signal suitable for transmission
b) Receives energy from medium
c) Converts received signal into a form suitable for delivery to user
d) All of the mentioned
47)In digital transmission, long distance digital communications require the use of a
generator to recover original data sequence and re-transmits on next segment.
a) True
b) False
48)In twisted pair, a category 5 UTP cable can support a data rate of up to 16 MHz
a) True
b) False
49)Which of the following statements is true for optical fiber?
a) All of the mentioned
b) Plentiful bandwidth for new services
c) Dominates long distance transmission
d) Distance less of a cost factor in communications
50)Which of the following are advantages of optical fiber? (choose 2)
a) Extremely low bandwidth
b) No corrosion
c) Noise immunity
d) Wavelength dependency
51)Consider a network link that has distance of 100 meters, and signal traverses at the
speed of light in cable 2.5x10^18 meters per second. The link has transmission
bandwidth of 100 megabits/second (100x10^6 bits per second). The packet size is
400 bits. What is the packet transmission delay?
a) 4x10^-7 seconds
b) None of the mentioned
c) 4x10^-6 seconds

[email protected] 10

about:blank 10/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) 4x10^-9 seconds
52)Given a 7-bit information frame (0, 1, 0, 1, 1, 0, 1), what is the even parity bit?
a) 1
b) 0
c) None of the mentioned
d) 01
53)Which of the following statements are true for single-bit parity error detection?
(choose 2)
a) It can detect all tripe bit errors in an information frame
b) It can detect all single bit errors in an information frame
c) It can detect all double bit erros in an information frame
d) None of the mentioned
54)Which of following statements are true for two-dimensional parity error detection?
a) It can detect all single bit errors in an information frame
b) All of the mentioned
c) It can detect all double bit errors in an information frame
d) It can correct all single bit errors in an information frame
55)Assume bit errors occur at random. If each bit has 50% probability to be in error
by transmission. What is the probability of a four-bit frame to be in error by
transmission?
a) 1/4
b) 1/8
c) 1/16
d) None of the mentioned
56)What is the binary sequence that corresponds to polynomial code x^3 + x^2 + 1?
a) 111
b) 1110
c) 0111
d) 1101
57)Block codes are generated using _____.
a) Generator matrix

[email protected] 11

about:blank 11/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) Generator polynomial
c) Both of the mentioned
d) None of the mentioned
58)Which of the following is true for two-dimensional parity check? (choose 2)
a) Arrange information in rows
b) More parity bit to improve coverage
c) Arrange information in columns
d) Add multiple parity bits to each column
59)Polynomial codes are implemented using shift register circuits
a) True
b) False
60)What is the binary equivalent of the following polynomial arithmetic x^7 + x^6 +
x^5 + x^2 + 1?
a) 11011101
b) 11100111
c) 11101101
d) 11100101
61)Using Euclidean Division, what will be the remainder of 70 by 999 where 70 is the
divisor and 999 is the dividend?
a) 17
b) 21
c) 19
d) 14
62)Given an information polynomial code l(x) = x^7 + x^6 + x^1 + 1. Which is its
corresponding per-bit information frame?
a) 01100011
b) 10100010
c) None of the mentioned
d) 11000011
63)What is the remainder obtained by dividing x^7 + x^5 + 1 by the generator
polynomial x^3 + 1?

[email protected] 12

about:blank 12/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) x^2 + x
b) x^2 + 1
c) x^2 + x + 1
d) None of the mentioned
64)Given a generator polynomial g(x) = x^3 + x + 1, consider the information
sequence 1001. By CRC method, what is the resulting codeword for transmission?
a) 1010110
b) 1001111
c) 1001000
d) 1001110
65)Which of the following generator polynomials can detect all single bit errors in an
information frame?
a) g(2) = x + 1
b) g(x) = x
c) g(x) = x^2
d) All of the mentioned
66)Internet protocols use check bits to detect errors, instead of using CRC
polynomials. The primary rationale is _____
a) Strength of error detection capability
b) simplicity of implementation
c) CRC polynomial cannot work for internet protocols
d) None of the mentioned
67)The two basic approaches in error control are error prevention and detection, and
error correction and re-transmission.
a) False
b) True
68)Find parity bit for 1001011?
a) 1
b) 2
c) None of the mentioned
d) 0

[email protected] 13

about:blank 13/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

69)The divisor in a cyclic code is normally called the _____.


a) Generator
b) Degree
c) redundancy
d) None of the mentioned
70)The checksum of 0000 and 0000 is _____
a) 0101
b) 1010
c) 0000
d) 1111
71)In ASCII, a single parity bit code can detect _____ errors
a) an odd number of
b) two
c) an even number of
d) no errors
72) Which of these is not a network edge device? (G14)
a) PC
b) Smartphones
c) Servers
d) Switch
73)Two devices are in network if ________ (G14)
a) a process in one device is able to exchange information with a process
in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive
74)Which layer provides the services to user? (G14)
a) application layer
b) session layer
c) presentation layer
d) physical layer

[email protected] 14

about:blank 14/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

75) A _____ is a device that forwards packets between networks by processing the
routing information included in the packet. (G14)
a) bridge
b) firewall
c) router
d) hub
76) The number of layers in ISO OSI reference model is _________ (G14)
a) 5
b) 7
c) 6
d) 10
77) How many layers are present in the Internet protocol stack (TCP/IP model)?
(G14)
a) 5
b) 7
c) 6
d) 10
78) Transmission data rate is decided by ________ (G14)
a) network layer
b) physical layer
c) data link layer
d) transport layer
79) In OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is _________ (G14)
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
80) In TCP/IP model, when data is sent from device A to device B, the 5th layer to
receive data at B is ________ (G14)
a) Application layer

[email protected] 15

about:blank 15/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) Transport layer
c) Link layer
d) Session layer
81) OSI stands for ________ (G14)
a) open system interconnection
b) operating system interface
c) optical service implementation
d) open service internet
82) Which address is used on the internet for employing the TCP/IP protocols? (G7)
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
83)TCP/IP model was developed _____ the OSI model. (G7)
a) prior to
b) after
c) simultaneous to
d) with no link to
84) Transmission data rate is decided by ____________(G7)
a) network layer
b) physical layer
c) data link layer
d) transport layer
85) TCP/IP model does not have ______ layer but OSI model have this layer.(G7)
a) session layer
b) transport layer
c) application layer
d) network layer
86) In which year was the OSI model studied?(G7)
a) 1969
b) 1970

[email protected] 16

about:blank 16/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) 1971
d) 1981
87) Which of the following is not an ISO specification for OSI model?(G7)
a) The same functions can be placed on different floors
b) Do not define too many functional layers
c) Create boundaries between functional layers so that the number of interactions
between the two layers is minimal
d) Create separate layers for functions that are completely different in terms of
technology or implementation
88) At which layer of the OSI model does packet routing occur?(G7)
a) Network
b) Data link
c) Transport
d) Presentation
89) When a packet is lost or corrupted, what does the data link layer do?(G7)
a) Self-recover or repair lost or corrupted packets or that
b) Ask the source station to resend the lost or damaged packet
c) Abort the data exchange session, giving an error message to the source station
d) All of the mentioned
90) What can cause two network layer entities of two computers in a network not to
communicate with each other?(G7)
a) The network connection is faulty
b) Data link layer protocol error
c) Data physical layer protocol error
d) All of the mentioned
91) Which of the following information do packets at the network layer contain?(G7)
a) The IP address of the sending computer and the IP address of the receiving
machine
b) IP packet size, IP packet lifetime
c) Contact serial number
d) All of the mentioned

[email protected] 17

about:blank 17/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

92) Which type of organizations uses a Virtual private network? (G15)


a. Colleges, Large Corperations,Governmentel institutes
b. Airports, Railway Stations, churches
93) VPN ( Virtual Private Network) is a secure network that gets used by people who
are working from home or on the way home on the train. this is because (G15)
A. Its a very secure tunnel network and uses vpn because it is encrypted
B.Because vpn allowes access to their home area and you can download your work
C. because everyone can access the data in the encrypted tunnel

94) The following are browsers except one: (G15)


a. Google Chrome
b.Safari
c. Yandex
d. Hackintosh

95) A difference in DHCPv6 and DHCPv4 is? (G15)


A. A difference in DHCPv6 and DHCPv4 is?
B. There is no requirement for BOOTP compatibility.
C. Default router can be obtained by clients.
D. All the above
96) A physical interface often used for terminating telephone wires. (G15)
a. RJ 11
b.RJ 45
c. Ethernet Cable
d. RJ 14
97) A network that spans a large geographical area, the most common example being
the internet. (G15)
a. LAN
b. MAN
c. WAN
98) Who controls/configures DHCP servers? (G15)
a. Network administrators
b. Router software
c. Developer
d. Tester
99) Wi-Fi is a… (G15)
a.Popular technologies and standards for wireless computer networking

[email protected] 18

about:blank 18/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b. Type of computer
c. A person's name
d. Nonsense
100) Which Internet Protocol (IP) number is used by a computer to send a message
back to itself? (G15)
a. 0.0.0.0

b. 1.1.1.1

c. 127.0.0.1

d. 255.255.255.255

101) Vint Cerf and Robert E Kahn are known for their contribution for.(G15)
a. TCP
b. HTTP
c. FTP
d. ICMP
102) The function of DSLAM is to __________ (G1)
a. Convert analog signals into digital signals
b. Convert digital signals into analog signals
c. Amplify digital signals
d. De-amplify digital signals
Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s
used by Telcos to convert the analog signals to digital signals for the purpose of
providing internet. The DSLAM located in a telco’s Central Office does this function.
103) Which of the following terms is not associated with DSL? (G1)
a. DSLAM
b. CO
c. Splitter
d. CMTS
Explanation: CMTS stands for Cable modem termination system. It is used in cable
internet access. In cable internet access, internet is not provided through telephone lines
and the companies that provide such connections don’t necessarily provide telephone
access.
104) Bluetooth is an example of __________? (G1)
a. personal area network
b. local area network
c. virtual private network

[email protected] 19

about:blank 19/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d. wide area network


Explanation: Bluetooth is a wireless technology used to create a wireless personal area
network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz
frequency band for transmission.
105) A __________ is a device that forwards packets between networks by processing
the routing information included in the packet. (G1)
a. bridge
b. firewall
c. router
d. hub
Explanation: A router is a networking device that forwards data packets between
computer networks. Routers perform the traffic directing functions on the Internet. They
make use of routing protocols like RIP to find the cheapest path to the destination.
106) Which of the following networks extends a private network across public
networks? (G1)
a. local area network
b. virtual private network
c. enterprise private network
d. storage area network
Explanation: A virtual private network extends a private network across a public network,
and enables users to send and receive data across shared or public networks as if their
computing devices were directly connected to the private network.VPN provides
enhanced security and online anonymity to users on the internet. It is also used to
unblock websites which are unavailable in certain regions.
107) Application layer is implemented in ____________ (G1)
a. End system
b. NIC
c. Ethernet
d. Packet transport
Explanation: Not only application layer, but presentation layer, session layer and
transport layer are also implemented in the end system. The layers below are
implemented outside the end system, for example, the network layer is implemented on
the routers and the physical layer is implemented for the medium.
108) Transport layer is implemented in ______________(G1)
a. End system
b. NIC
c. Ethernet
d. Signal transmission
Explanation: Application, Presentation, Session and Transport layer are implemented in
the end system. The transport layer handles the process to process delivery of the
packet through ports.
109) Delimiting and synchronization of data exchange is provided by __________ (G1)
a. Application layer

[email protected] 20

about:blank 20/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b. Session layer
c. Transport layer
d. Link layer
Explanation: The session layer provides the mechanism for opening, closing and
managing a session between end-user application processes. The session layer 5 is
responsible for establishing managing synchronizing and terminating sessions. In
TCP/IP protocol stack, the functions of the session layer are handled by the transport
layer itself and thus the session layer is missing from the TCP/IP model.
110) In OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is _________ (G1)
a. Application layer
b. Transport layer
c. Link layer
d. Session layer
Explanation: In OSI reference model, the fifth layer is Session layer. Session layer
provides the mechanism for opening, closing and managing a session between end-user
application processes. In TCP/IP protocol stack, the functions of the session layer are
handled by the transport layer itself and thus the session layer is missing from the
TCP/IP model.
111) In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________ (G1)
a. Application layer
b. Transport layer
c. Link layer
d. Session layer
Explanation: In TCP/IP model, the fifth layer is application layer. When data is sent from
device A to device B, the 5th layer to receive data at B is application layer. Application
layer provides the interface between applications and the network. The user interacts
with only this layer.

[email protected] 21

about:blank 21/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

CHƯƠNG 2. TẦNG VẬT LÝ

1) In networks where errors are infrequent, which approach is favoured for


efficiency?
a) End-to-end approach
b) Hop-by-hop approach
c) Either one of the above
d) Neither one of the above
2) Which of the following statements is true about the stop-and-wait ARQ protocol?
a) Stop-and-wait is only efficient if the link delay-bandwidth product is large
b) Stop-and-wait is only efficient if the link delay-bandwidth product is small
c) Stop-and-wait is only efficient if the link bandwidth is low
d) Stop-and-wait is only efficient if the link bandwidth is high
3) Consider a situation where an interactive application produces a packet to send
each keystroke from the client and the server echoes each keystroke that it receives
from the client. Which of the following strategies for sending ACK frames in a
Go-Back-N is appropriate for the situation?
a) send an ACK frame when the next piggyback opportunity arises
b) send an ACK frame immediately after each frame is received
c) send an ACK frame after every other frame is received
d) Any one of the mentioned
4) Consider a bulk data transfer application where a server sends a large file that is
segmented in a number of full-size packets that are to be transferred to the client.
Assume the channel has a low probability of error. Which of following strategies
for sending ACK frames in a Go-Back-N is appropriate for the situation?
a) Any one the mentioned
b) send an ACK frame after every other frame is received
c) send an ACK frame when the next piggy back opportunity arises
d) send an ACK frame immediately after each frame is received
5) Consider Selective Repeat ARQ flow control protocol. In the following scenario,
what should be the value of frame number x at receiver B?

[email protected] 22

about:blank 22/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) 3
b) 2
c) 4
d) None of the mentioned
6) ARQ protocols combine error detection, retransmisison and sequence numbering
to provide reliability.
a) False
b) True
7) A service model specifies a level of performance that can be expected in the
transfer of information.
a) True
b) False
8) A service offered at a given layer can include which of the following feature(s)?
a) Sequencing
b) All of the mentioned
c) Reliability
d) Timing
9) Digital communication technologies may introduce errors in communication,
which of the following can be used to provide reliable communication. (choose 2)
a) TCP
b) HDLC
c) DNS

[email protected] 23

about:blank 23/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) UDP
10)Ensuring that information is not altered during transfer is associated with _____
a) Authentication
b) Integrity
c) Confidentiality
d) Availability
11) Given 3 bits for sequence numbers, what is the maximum sliding windows size at
the receiver in Go Back 3 ARQ?
a) 3
b) 8
c) 7
d) None of the mentioned
12)Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already
set the sliding window size to be 4, what is the maximum sliding window size at
the receiver?
a) 3
b) 7
c) None of the mentioned
d) 8
13)Consider Selective Repeat ARQ flow control protocol. In the following scenario,
what should be the value of frame number x at receiver B?

a) 8
b) 7
[email protected] 24

about:blank 24/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) 3
d) None of the mentioned
14)If the probability of error is very low in a communication link, which of the
following statements is true about performance of ARQ protocol?
a) Stop-and-wait and Go-back-N ARQ protocols have similar performance
b) Go-back-N ARQ and Selective Repeat ARQ protocols have similar
performance
c) Stop-and-wait and Selective Repeat ARQ protocols have similar performance
d) None of the mentioned
15)In peer-to-peer protocol, the purpose of Automatic Repeat Request is _____
(choose 2)
a) to ensure a sequence of information packet is delivered in order
b) to ensure a sequence of information packet is delivered without errors or
duplication despite transmission errors and losses
c) to ensure a sequence of information packet is delivered out-of-order
d) to ensure a sequence of information packet is delivered with an ACK request
16)Which of the basic elements of ARQ is associated with negative
acknowledgement?
a) Error detecign code
b) NAKs
c) ACKs
d) Timeout mechanism
17)In Go-Back-N ARQ, a procedure where transmisison of a new frame is begun
before the completion of time of the previous frame transmission is called _____
a) Pipelining
b) Transitioning
c) Channeling
d) None of the mentioned
18)In Stop-and-Wait protocol, sequence number are not required.
a) True
b) False

[email protected] 25

about:blank 25/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

19)The disadvantage of Stop-and-Wait protocol


a) All of the above
b) Error free communication channel does not exist
c) Acknowledgement may get lost
d) Deadlock situation may occur
20)Which of the following statements are true for the best-effort service of IP?
a) Packets can arrive with errors or be lost
b) All of the mentioned
c) Packets can arrive out-of-order
d) Packets can arrive after very long delays
21)Which of following services belong to the data link layer?
a) All of the mentioned
b) Insert framing information into the transmitted stream to indicate the
boundaries that define frames.
c) Provide error control to ensure reliable transmission
d) Provide flow control to prevent the transmitter from overrunning the reciever
buffer
22)Which ARQ flow control protocol is used by TCP?
a) Stop-and-Wait
b) Selective Repeat
c) Go-back-N
d) None of the mentioned
23)By framing, frame boundaries can be determined using _____
a) All of the mentioned
b) Character Counts
c) Control Characters
d) Flags
24)Which of following statements are true about framing protocols?
a) PPP uses character-based framing which requires byte stuffing
b) All of the mentioned
c) HDLC uses Flag-based framing which required bit stuffing

[email protected] 26

about:blank 26/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) None of the mentioned


25)In IP network, which of the following statement is incorrect?
a) Packets always arrive on time
b) Packets can arrive out-of-order
c) Packets can arrive with errors or be lost
d) Packets can arrive after logn delays
26)Framing involves identifying the beginning and end of a block of information
within a digital stream.
a) False
b) True
27)Which of the following statements are true for PPP byte stuffing?
a) All of the mentioned
b) Malicious users may inflate bandwidth
c) Size of frame varies unpredictably due to byte insertion
d) None of the mentioned
28)In PPP authentication, which of the following is true for Password Authentication
Protocol (Choose 3)
a) Initiator and authenticator share a secret key
b) Transmitted unencrypted, susceptible to eavesdropping
c) After several attempts, LCP closes link
d) Initiator must send ID and password
29)In HDLC frame format, flag is used to identify secondary station (1 or more
octets)
a) True
b) False
30)Perform the bit stuffing procedure for the following binary sequence:
1101111111011111110101. What is the outcome?
a) 110111111101111111010100
b) 001000000010000000010100
c) None of the mentioned
d) 110111110110111110110101

[email protected] 27

about:blank 27/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

31)PPP is a data link protocol for point-to-point lines in Internet. Its framing is based
on which of the following?
a) Byte stuffing
b) Bit stuffing
c) Word stuffing
d) None of the mentioned
32)HDLC is another data link control protocol widely in use. Its framing is based on
which of the following?
a) Byte stuffing
b) Bit stuffing
c) Word stuffing
d) None of the mentioned
33)Which of following statements are true for HDLC?
a) All of the mentioned
b) supports various data transfer modes
c) supports multi-point links and point to point links
d) implements error control and flow control mechanisms
34)In PPP authentication, which of the following is true for Challenge-Handshake
Authentication Protocol (CHAP)? (Choose 2)
a) Initiator must send ID and password
b) Authenticator can re-issue challenge during session
c) Initiator and authenticator share a secret key
d) After several attempts, LCP closes link
35)In error detection and loss recovery, which of the following statement is correct?
a) All of the mentioned
b) Frames may undergo errors in transmission
c) CRCs detect errors and such frames treated as lost
d) Frames lost due to loss-of-synchronization or receiver buffer overflow
36)In multiplexing, Last IN First Out (LIFO) is used to determine the order of packet
transmission.
a) True

[email protected] 28

about:blank 28/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) False
37)Generic Framing Procedure (GFP) allows the implementation of multiple transport
modes that may coexist within the same transport channel.
a) True
b) False
38)In Generic Framing Procedure (GFP), which of the following sentences are correct
(choose 3)
a) GFP rely on byte-stuffing mechanism to delineate protocol data unit (PDUs)
b) GFP provides flexible encapsulation framework that supports either a
fixed or variable length frame structure.
c) GFP uses an explicit payload length indicator provided in its frame header
to accommodate variable length PDUs
d) GFP uses a variation of HEC-based self delineation technique
39)What is the primary function of medium access control?
a) It is to minimize or eliminate the incidence of collisions of a shared
communication link.
b) It is to deal with the flow control of a shared communication link.
c) It is to deal with the congestion control of a shared communicatioin link.
d) None of the mentioned
40)What is the primary benefit provided by the Slotted ALOHA compared to
ALOHA?
a) Lower access delay
b) Higher maximum throughput
c) Both of the mentioned
d) None of the mentioned
41)What is the vulnerable perfiod of collisions in ALOHA?
a) Two frame transmission time
b) Round-trip propagation delay
c) One frame transmission time
d) None of the mentioned
42)What is the vulnerable period of collisions in Slotted ALOHA?

[email protected] 29

about:blank 29/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) Round-trip propagation delay


b) One frame transmission time
c) Two frame transmission time
d) None of the mentioned
43)What is the vulnerable period of collsions in Carrier Sense Multiple Access
(CSMA)?
a) One propagation delay
b) One frame transmission time
c) Round-trip propagation delay
d) None of the mentioned
44)The primary function of Media Access Control is to minimize or eliminate the
instance of the collisions to achieve a reasonable utilization of the medium
a) False
b) True
45)In media sharing techniques, which of the following are channelization
approaches? (Choose 3)
a) Time Division Multiple Access
b) Frequency Division Multiple Access
c) Code Division Multiple Access
d) Data Division Multiple Access
46)Corresponding box of Carrier Sense Multiple Access/Collision Detection can be
replaced by one of the _____
a) Non-persistent process
b) Persistent process
c) i-persistent process
d) p-persistent process
47)Random access is also called the _____
a) Contention methods
b) Controlled access
c) Channelization
d) Authentication

[email protected] 30

about:blank 30/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

48)In Carrier Sense Multiple Access (CSMA), possibility of collision still exist
because of _____
a) Collision delay
b) Propagation delay
c) Transmit delay
d) None of the mentioned
49)Polling is a scheduling approach for dynamic medium access control. Which of
following statements are correct?
a) All of the mentioned
b) Polling performance can deteriorate with large delay-bandwidth product
c) Polling can provide bounds on access delay to the shared medium
d) Polling can provide fairness through regulated access opportunities
50)In a collision-free reservaton system that has a large number of light-traffic
stations, and the delay-bandwidth product is larger than 1. Which of following
MAC protocol is a good fit for stations to reserve mini-slots?
a) 1-persistent CSMA
b) Slotted ALOHA
c) CSMA/CD
d) None of the mentioned
51)In Carrier Sense Multiple Access with collision detection (CSMA-CD), how long
will it take a collision to be detected and resolved?
a) Round-trip propagation delay
b) One propagation delay
c) One frame transmission time
d) None of the mentioned
52)Suppose that the ALOHA protocol is used to share a 56 kbps satellite channel.
Suppose that frames are 1000 bits long. What is the maximum throughput of the
system in number of frames per second.
a) 1 frame per second
b) 100 frames per second
c) None of the mentioned

[email protected] 31

about:blank 31/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) 10 frames per second


53)Consider building a CSMA/CD network running at 1 Gbps over a 1-km cable. The
signal speed in the cable is 200,000 km/sec. What is the minimum frame size?
a) 64 Bytes
b) 640 Bytes
c) 1250 Bytes
d) None of the mentioned
54)In media access control, which of the following statements are true for
Channelization? (Choose 3)
a) Widely used in internet traffic
b) Does not scale well to large numbers of users
c) Inefficient for bursty traffic
d) Inflexible in allocating bandwidth to users with different requirements
55)Time-out period is equal to maximum possible propagation delay of _____
a) round-trip
b) Square-trip
c) Triangle-trip
d) Rectangle-trip
56)In Carrier Sense Multiple Access (CSMA), if station senses medium before trying
to use it then chance of collision can be _____
a) Increased
b) Reduced
c) Doubled
d) Highlighted
57)Carrier Sense Multiple Access (CSMA) is based on medium called _____
a) Sense before transmit
b) Sense before Collision
c) Listen before sending
d) Listen before talk
58)Which of the following is not true for MAC scheduling?
a) Can provide fairness to stations

[email protected] 32

about:blank 32/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) Reduced computational or procedural complexity


c) Less variability in delays
d) More efficient channel utilization
59)Which of following features are typically true for local area networks?
a) All of the mentioned
b) Low error rate
c) High speed
d) Low round-trip delay
60)Use HDLC and Ethernet to identify similarities between medium access control
and data link control protocols. Which of following statements are true? (Choose
2)
a) Both implement error control and flow control for reliable transmission.
b) Both contains framing information that delineates the beginning and end
of each frame.
c) Both check the CRC in the received frames for errors
d) None of the mentioned
61)Use IEEE 802.3 and IEEE 802.11 to discuss differences between wired and
wireless LANs. Which of following statements are true about the differences?
a) All of the mentioned
b) Collision detection
c) Error rate
d) Station mobility
62)Which of following is not a primary responsibility of the MAC sublayer in LANs?
a) Channel access
b) reliable connection-oriented service
c) Protocol data unit addressing
d) Fragmentation and reassembly of MAC service data unit.
63)In Ethernet, slot time that is at least the round-trip propagation delay, is the critical
system parameter for _____
a) All of the mentioned
b) Upper bound on time to acquire channel

[email protected] 33

about:blank 33/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) upper bound on time to detect collision


d) quantum for re-transmission scheduling
64)Which one of the following event is not possible in wireless LAN?
a) Acknowledgement of data frames
b) Collision detection
c) Multi-mode data transfer
d) Collision avoidance
65)In 802.11 protocol, MAC can alternate between Contention Periods (CPs) and
Contention-Free Periods (CFPs)
a) True
b) False
66)CSMA/CD is not used in DCF because _____
a) physical carrier sense detects the presence of other WLAN users
b) a station is unable to listen to the channel for collisions while transmitting
c) in idle state, a station is unable to listen to the cahnnel for collisions
d) None of the mentioned
67)In infrastructure network supporting voice and data traffic, data traffic is
transported through the CP and voice traffic through the CFP.
a) False
b) True
68)In 802.11 protocol, which of the following statements are true for Basic Service
Set (BSS)? (Choose 2)
a) Multiple BSSs interconnected by Central System (CS)
b) Stations in BSS can communicate with each other
c) Location in a Basic Service Area (BSA)
d) Distinct collocated BSS's cannot coexist
69)Consider a Gigabit Ethernet hub with stations at a 100-meter distance and average
frame size of 512 bytes. Assume the propagation speed is at 2/3 of light speed.
What is the value of normalized delay-bandwidth product?
a) 0.0122
b) 1.22

[email protected] 34

about:blank 34/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) 0.122
d) None of the mentioned
70)Wireless data communication is compelling, because of _____ (choose 2)
a) Its high reliability to noise and interference
b) Its easy and low-cost deployment
c) Its support to personal and mobile devices
d) All of the mentioned
71)Why not use CSMA/CD in a wireless LAN? The primary reason is _____
a) The hidden station problem
b) The round-trip delay in a wireless LAN is too large
c) The frame is usually very small in a wireless LAN
d) All of the mentioned
72)In IEEE 802.11 MAC for wireless LANs, which of following inter-frame space
(IFS) is used to transmit high-priority frames such as ACKs?
a) DIFS
b) SIFS
c) PIFS
d) None of the mentioned
73)Which of following statements identifies the similarity between HDLC (data link
control) and Ethernet (medium access control)?
a) Both contain framing information that delineates the beginning and end of
each frame
b) Both provide connection-oriented packet transfer services to the network layer
c) All of the mentioned
d) Both implement error control and flow control functions to provide reliable
transmisison
74)Which multiple access technique is used by IEEE 802.11 standard for wireless
LAN?
a) CDMA
b) CSMA/CA
c) ALOHA

[email protected] 35

about:blank 35/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) CSMA/CD
75)Which of the following are management services offered by the MAC sublayer in
wireless LAN? (choose 2)
a) Power management
b) Roaming within ESS
c) Network management
d) Storage management
76)In CSMA/CA, an amount of time divided into slots called _____
a) Contention procedure
b) Contention window
c) Contention signals
d) Contention energy
77)In medium access control sublayer, medium usage is mediated by the access
control during contention period.
a) False
b) True
78)In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), to continue
transmission process we use a _____
a) Access point
b) Loop
c) Station
d) Signal
79) The physical layer is concerned with (G2)
a) bit-by-bit delivery
b) Process to process delivery
c) Application to application delivery
d) Port to port delivery
80) Which transmission media provides the highest transmission speed in a network?
(G2)
a) Coaxial cable
b) Twisted pair cable

[email protected] 36

about:blank 36/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) Optical fiber
d) Electrical cable
81) Bits can be sent over guided and unguided media as analog signal by (G2)
a) Digital modulation
b) Amplitude modulation
c) Frequency modulation
d) Phase modulation
82)The portion of physical layer that interfaces with the media access control sublayer
is called (G2)
a) Physical signaling sublayer
b) Physical data sublayer
c) Physical address sublayer
d) Physical transport sublayer
83)The physical layer provides (G2)
a) Mechanical specifications of electrical connectors and cables
b) Electrical specification of transmission line signal level
c) Specification for IR over optical fiber
d) All of the mentioned
84) In asynchronous serial communication the physical layer provides (G2)
a) Start and stop signaling
b) Flow control
c) Both start & stop signaling and flow control
d) Only start signaling
85)The physical layer is responsible for (G2)
a) Line coding
b) Channel coding
c) Modulation
d) All of the mentioned
86) The physical layer translates logical communication requests from the ______ into
hardware specific operations
a) Data link layer

[email protected] 37

about:blank 37/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) Network layer
c) Transport layer
d) Application layer
87) A single channel is shared by multiple signals by (G2)
a) Analog modulation
b) Digital modulation
c) Multiplexing
d) Phase modulation
88) Wireless transmission of signals can be done via (G2)
a) Radio waves
b) Microwaves
c) Infrared
d) All of the mentioned
89)What technique is used with UTP cable to help protect against signal interference
from crosstalk?
a) terminating the cable with special grounded connectors
b) twisting the wires together into pairs
c) wrapping a foil shield around the wire pairs
d) encasing the cables within a flexible plastic sheath
90) The physical layer is concerned with the movement of _______ over the physical
medium. (g8)
a) Programs
b) Dialogs
c) Protocols
d) Bits
91) The physical layer concerns with (g8)
a) bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) None of the above
92) Before data can be transmitted, they must be transformed to ________.(g8)

[email protected] 38

about:blank 38/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) periodic signals
b) electromagnetic signals
c) aperiodic signals
d) low-frequency sine waves

93) The term ......... describes the position of the waveform relative to time 0 (g8)
a) Frequency
b) Phase
c) Phase Shift
d) Time period
94) In a frequency-domain plot, the horizontal axis measures the ________ (g8)
a) peak amplitude
b) frequency
c) phase
d) slope
95) In a time-domain plot, the horizontal axis is a measure of ________ (g8)
a) signal amplitude
b) frequency
c) phase
d) time
96) As frequency increases, the period _____ (g8)
a) Decreases
b) Increases
c) remains the same
d) doubles
97) Which standards organization oversees development of wireless LAN standards
(g8)
a) IANA
b) IEEE
c) IOS
d) TIA

[email protected] 39

about:blank 39/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

98) The physical layer of a network _______ (g8)


a) Defines the electrical characteristics of signals passed between the
computer and communication devices
b) Controls error detection and correction
c) Constructs packets of data and send them across the network
d) All of the above
99) Bits can be send over guided and unguided media as analog signal by (g8)
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
100) Which transmission media has the highest transmission speed in a network?
(g8)
a) twisted pair cable
b) coaxial cable
c) optical fiber
d) electrical cable
101) A periodic signal completes one cycle in 0.001 s. What is the frequency? (G9)
a) 1 Hz
b) 100 Hz
c) 1 KHz
d) 1 MHz
102) If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, what
is the highest frequency? (G9)
a) 5 KHz
b) 10 KHz
c) 47 KHz
d) 57 KHz
103) What is the bandwidth of a signal that ranges from 1 MHz to 4 MHz? (G9)
a) 4 MHz
b) 1 KHz

[email protected] 40

about:blank 40/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) 3 MHz
d) None of the above
104) Given two sine waves A and B, if the frequency of A is twice that of B, then
the period of B is ________ that of A. (G9)
a) one-half
b) twice
c) the same as
d) indeterminate from
105) A sine wave is ________. (G9)
a) periodic and continuous
b) aperiodic and continuous
c) periodic and discrete
d) aperiodic and discrete
106) If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is
________ V. (G9)
a) 2
b) 1
c) -2
d) between -2 and 2
107) A signal is measured at two different points. The power is P1 at the first point
and P2 at the second point. The dB is 0. This means ________. (G9)
a) P2 is zero
b) P2 equals P1
c) P2 is much larger than P1
d) P2 is much smaller than P1
108) ________ is a type of transmission impairment in which the signal loses
strength due to the resistance of the transmission medium. (G9)
a) Attenuation
b) Distortion
c) Noise
d) Decibel

[email protected] 41

about:blank 41/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

109) ________ is a type of transmission impairment in which the signal loses


strength due to the different propagation speeds of each frequency that makes up
the signal. (G9)
a) Attenuation
b) Distortion
c) Noise
d) Decibel
110) ________ is a type of transmission impairment in which an outside source such
as crosstalk corrupts a signal. (G9)
a) Attenuation
b) Distortion
c) Noise
d) Decibel
111) The _____ is the physical path over which a message travels.
a) Path
b) Medium
c) Route
d) Protocol
112) Three or more devices share a link in _____ connection.
a) Multipoint
b) Unipoint
c) Point to Point
d) None of the mentioned
113) In a LAN, which address is used to transfer frames to appropriate destination?
a) Physical address
b) IP address
c) Domain name
d) None of the mentioned
114) Of the following services, which service(s) does the IP layer provides?
a) None of the mentioned
b) Error control

[email protected] 42

about:blank 42/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) Flow control
d) Connection-based data transfer
115) This layer is an addition to OSI model?
a) Application layer
b) Presentation layer and Session layer
c) Presentation layer
d) Session layer
116) The functionalities of presentation layer includes _____
a) All of the mentioned
b) Data compression
c) Data encryption
d) Data decryption
117)

[email protected] 43

about:blank 43/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

CHƯƠNG 3. TẦNG LIÊN KẾT DỮ LIỆU

1) Which layer LAN bridges work on?


a) Medium access control
b) Transport layer
c) Network layer
d) None of the mentioned
1) One can use repeaters, bridges and routers to interconect two LANs. Which of the
following approaches will make local traffic stay in its own LAN? (Choose 2)
a) repeaters
b) bridges
c) routers
d) All of the mentioned
2) Of the following network layer functions, which one is optional?
a) congestion control
b) Routing
c) Forwarding
d) None of the mentioned
3) Of the following, which is a basic function of transparent bridge?
a) Prevents loops in the topology
b) All of the mentioned
c) Learns where stations are attached to the LAN
d) Forwards frames from one LAN to another
4) It is possible for a network layer to provide a choice of services to the user of the
network. Which of following the IP network layer offers?
a) Best-effort connectionless service
b) connection-oriented reliable stream service
c) All of the mentioned
d) connection-oriented transfer of packets with delay guarantee
5) The network layer is considered the most complex layer because of the following
reasons (choose 2)

[email protected] 44

about:blank 44/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) Responsible for displaying received information to users


b) Challengers such as addressing and routing
c) User scalability
d) Requires coordinated actions of multiple, geographically distributed network
elements
6) An end-to-end function is best implemented at a lower level than at a higher level
a) False
b) True
7) Which of the following is an essential network function?
a) Forwarding
b) All of the mentioned
c) Routing
d) Priority and scheduling
8) In network layer, which of the following statement is true for packet networks?
a) All of the mentioned
b) Individual packet streams are highly bursty.
c) User demand can undergo dramatic change
d) Internet structure is highly decentralized
9) The main purpose of access multiplexer is to combine the typically bursty traffic
flows from the individual computers into aggregate flows?
a) False
b) True
10)Which of the following functions can a home router perform?
a) All of the mentioned
b) Local area network access using WiFi
c) Private IP addresses in home by network address translation
d) Single global IP address using HCP
11) Consider a three hop network from the source to the destination. Let m be the
packet transmission time at each hop. Let n be the propagation delay at each hop.
Assume there is no queuing delay and processing time at each hop. Based on

[email protected] 45

about:blank 45/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

store-and-forward, what is the total time for the packet to be transmitted to the
destination?
a) m+n
b) 3m+n
c) None of the mentioned
d) 3m+3n
12)Consider a three hop network from the source to the destination. Let me be the
message transmission time at each hop. Let n be the propagation delay of each
hop. Assume there is no queueing delay and processing time at each hop. Based on
store-and-forward, what is the total time for three packets to be transmitted to the
destination by packet pipelining?
a) 9m+9n
b) 3m+3n
c) 5m+3n
d) None of the mentioned
13)Six stations (S1-S6) are connected to an extended LAN through transparent
bridges (B1 and B2), as shown in the following figure. Initially, the forwarding
tables are empty. Both bridges use backward learning to build their tables. Suppose
station S2 transmits a frame to S1. Which of following statements is correct?

a) The frame will reach bridge B1 only


b) None of the mentioned
c) The frame will reach bridge B2 only
d) The frame will reach both bridges B1 and B2

[email protected] 46

about:blank 46/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

14)Six stations (S1-S6) are connected to an extended LAN through transparent


bridges (B1 and B2), as shown in the following figure. Initially, the forwarding
tables are empty. Both bridges use backward learning to build their tables. Station
S2 already transmitted a frame to S1 successfully. Suppose stations S3 transmits a
frame to S5. Which of following statements is correct?

a) The frame will reach bridge B1 only


b) The frame will reach bridge B2 only
c) The frame will reach both bridges B1 and B2
d) None of the mentioned
15)One can use repeaters bridges and routers to interconnect two LANs. Which of the
following approaches will make local traffic appear in both LANs?
a) Routers
b) Repeater
c) Bridges
d) All of the mentioned
16)Packet pipelining can lead to latency in message delivery
a) False
b) True
17)In internet, switching is done by using datagram approach to packet switching at
the _____
a) Application layer
b) Network layer
c) Data link layer
d) Physical layer

[email protected] 47

about:blank 47/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

18)A transparent bridge's duties include _____


a) All of the mentioned
b) Forwarding
c) Blocking
d) Filtering frame
19)For a 10Mbps Ethernet link, if the length of the packet is 32 bits, the transmission
delay is _____ µs (microseconds)
a) 320
b) 0.32
c) 32
d) 3.2
20)Which of following networks represents an example of virtual circuit switching at
the network layer?
a) ATM
b) IP
c) IP and ATM
d) All of the mentioned
21)Consider a three hop network from the source to the destination. Let m be the
message transmission time at each hop. Let n be the propagation delay of each
hop. Assume there is no queueing delay and processing time at each hop. Based on
cut-through switching, what is the total time for three packets to be transmitted to
the destination?
a) 5m + 3n
b) 9m + 9n
c) None of the mentioned
d) 3m + 3n
22)Which of following issue exists in virtual-circuit subnet but not in datagram
subnet?
a) State information
b) Addressing
c) Routing

[email protected] 48

about:blank 48/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) None of the mentioned


23)Which of following describe general goals in a routing algorithm?
a) Rapid responsiveness to network changes
b) All of the mentioned
c) Robustness under high load and link failure
d) Low overhead for implementation
24)Which of following describe benefits of flooding, a specialized routing approach?
a) All of the mentioned
b) Always reach the destination by the fastest path
c) No routing table needed for routers
d) Useful in propagating information to all nodes
25)A Virtual-Circuit Network (VCN) is normally implemented in the _____
a) session layer
b) data link layer
c) network layer
d) physical layer
26)In routing approaches, which of the following statement is true for deflection
routing? (choose 2)
a) Fixed, preset routing procedures
b) No route synthesis
c) Useful in starting up network
d) Predefined source to destination route
27)To reduce size of routing table, routers do lookup table on MAC address
a) True
b) False
28)Flooding may easily swamp the network as one packet creates multiple packets,
possibly in exponential growth rate. What are possible means to reduce resource
consumption in the network?
a) All of the mentioned
b) Use a time-to-live field in each packet to limit its lifetime
c) Ad a unique identifier to a packet for removing its duplicate

[email protected] 49

about:blank 49/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) Use address and sequence number to discard duplicates


29)What are possible metrics for routing?
a) Hop count
b) All of the mentioned
c) Delay
d) Bandwidth
30)Consider the network as shown in the figure. We use the Bellman-Ford algorithm
to find the set of shortest paths from all nodes to the destination node 2. Each node
maintains an entry (n, cost) about the next node along the current shortest path and
the current minimum cost from the node to the destination. Initially, each node has
entry (-1, infinity).

a) All of the mentioned


b) 1
c) 4
d) 5
31)Consider the network as shown in the figure. We use the Bellman-Ford algorithm
to find the set of shortest paths from all nodes to the destination node 2. Each node
maintains an entry (n, cost) about the next node along the current shortest path and
the current minimum cost from the node to the destination. In the second
algorithm iteration, which nodes will update their entries and inform their
neighbors?

[email protected] 50

about:blank 50/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) 3
b) 4
c) 6
d) All of the mentioned
32)Consider the network as shown in the figure. We use the Bellman-Ford algorithm
to find the set of shortest paths from all nodes to the destination node 2. Each node
maintains an entry (n, cost) about the next node along the current shortest path and
the current minimum cost from the node to the destination. In the third algorithm
iteration, which nodes will update their entries and inform their neighbors?

a) 4
b) 6
c) 3
d) All of the mentioned
33)In link state routing after the construction of link state packets new routes are
computed using _____
a) Bellman Ford algorithm

[email protected] 51

about:blank 51/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) Dijkstra's algorithm
c) Leaky buckete algorithm
d) None of the mentioned
34)A subset of a network that includes all the routers but contains no loops is called
_____
a) spanning tree
b) Broadcast structure
c) Multi-destination routing structure
d) None of the mentioned
35)In a router, which of the following statement is true for creating routing tables?
a) Need information on state of links
b) All of the mentioned
c) Need to distribute link state information using a routing protocol
d) Need to compute routes based on information
36)In a virtual-circuit packet network, routing is determined during connection set-up
a) True
b) False
37)In deflection routing, bufferless operation is considered a disadvantage due to
packet loss
a) True
b) False
38)What is the root problem of Bellman-Ford algorithm for distance vector
approach?
a) All of the mentioned
b) Counting to infinity
c) Flooding overhead
d) Cannot work in IP
39)What is the root problem of link state routing?
a) Counting to infinity
b) Flooding overhead
c) Slow reaction to link failures

[email protected] 52

about:blank 52/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) All of the mentioned


40)Which of following describe the benefits of link state routing compared to distance
vector routing?
a) All of the mentioned
b) Fast convergence
c) Support for multiple metrics
d) Support for multiple paths to a destination
41)Which of following is the implementation of distance vector approach in the IP
routing protocol?
a) OSPF
b) RIP
c) BGP
d) None of the mentioned
42)Which of following is the implementation of link state approach in the IP routing
protocol?
a) OSPF
b) RIP
c) BGP
d) None of the mentioned
43)In Routing Information Protocol (RIP), the use of max number limited to 15 limits
the count-to-infinity problem
a) False
b) True
44)In an OSPF network, routers in area only knows complete topology inside area and
limits the flooding of link-state information to area
a) True
b) False
45)In link state routing, which of the following are possible steps taken to resolve the
problem of old update messages (choose 2)
a) Add a null number to each update message
b) Add time stamp to reach update message

[email protected] 53

about:blank 53/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) Add sequence number to each update message


d) None of the mentioned
46)In Asynchronous Transfer Mode (ATM), which of the following is an examples of
supported services?
a) All of the mentioned
b) Real time voice and video
c) Circuit emulation for digital transport
d) Data traffic with bandwidth guarantees
47)In Asynchronous Transfer Mode (ATM), the packet structure attribute simplifies
implementation and ensuses high speed transfer
a) True
b) False
48)Which of the following features are true for asynchronous transfer mode (ATM)?
a) All of the mentioned
b) It supports quality of service
c) It only supports fixed-length packets
d) It is connection-oriented
49)Consider the network as shown in the figure. We use the Dijkstra's algorithm to
find the set of shortest paths from all nodes to the destination node 4. In Dijkstra's
algorithm, each iteration the next closet node is added to the set with the root node.

a) 5
b) 1
c) 3
d) 2

[email protected] 54

about:blank 54/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

50)Consider the network as shown in the figure. We use the Dijkstra's algorithm to
find the set of shortest paths from all nodes to the destination node 4. In Dijkstra's
algorithm, each iteration the next closet node is added to the set with the root node.
At the second iteration, which node will be added to the set N?

a) 6
b) 1
c) 3
d) 5
51)Consider the network as shown in the figure. We use the Dijkstra's algorithm to
find the set of shortest paths from all nodes to the destination node 4. In Dijkstra's
algorithm, each iteration the next closet node is added to the set with the root node.
At the third iteration, which node will be added to the set N?

a) 1
b) 6
c) 3
d) 5
52)Consider the network as shown in the figure. We use the Dijkstra's algorithm to
find the set of shortest paths from all nodes to the destination node 4. In Dijkstra's

[email protected] 55

about:blank 55/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

algorithm, each iteration the next closet node is added to the set with the root node.
At the fourth iteration, which node will be added to the set N?

a) 5
b) 3
c) 6
d) 1
53)In RIP operation, which of the following statement is correct?
a) Router sends update message to neighbors every 30 sec
b) All of the mentioned
c) To deal with changes in topology such as a link failure, a router expects an
update from each of its neighbors within 180 sec.
d) Convergence speed up by triggered updates
54)What are the limitations of RIP protocol? (choose 2)
a) Limited metric use
b) Slow convergence
c) Fixed number of hops
d) Update message overhead
55) In Open Shortest Path First (OSPF), which of the following statements are
correct? (choose 3)
a) OSPF typically converges slower than RIP when there is a failure in the
network
b) Allows routers to build shortest path tree with router as root
c) Enables each router to learn complete network topology
d) Each router builds an identical link-state database
56)Which of the following is a type of router defined in OSPF?

[email protected] 56

about:blank 56/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) All of the mentioned


b) Internal router
c) Area border router
d) Backbone router
57)In a distance vector routing, if a link fails
a) All routers immediately update their link database and recalculate their shortest
path
b) Neighboring routers exchange routing tables that may use failed links
c) Routers set link distance to infinity and floods the network with an update
packet
d) All of the mentioned
58)Based on traffic granularity, which of the following levels is traffic management
not usually classified into?
a) Byte level
b) Flow level
c) Packet level
d) Flow-aggregated level
59)Which of following statements is true for FIFO queueing?
a) In FIFO queueing, arriving packets will be discarded if the buffer is full
b) All of the mentioned
c) In FIFO queueing, all packet flows share the same buffer
d) FIFO queueing cannot provide differentiated QoS to packet flows
60)Which of following is not a packet-level mechanism?
a) Token bucket shaping
b) Random early detection
c) Fair queueing
d) Head-of-line priority queueing
61)What are typical end-to-end Quality-of-Service factors?
a) Packet loss rate
b) All of the mentioned
c) Jitter

[email protected] 57

about:blank 57/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) Packet delay
62)By Random Early Detection (RED), when a given source transmits at a higher rate
than others, the source will _____
a) Suffers a higher packet-dropping rate
b) Achieves a higher bandwidth
c) Suffer a lower packet-dropping rate
d) Achieves a lower waiting delay
63)The simplest approach to queue scheduling in First-In, First-out queueing, where
all packet flow make use of different buffer.
a) True
b) False
64)In FIFO queueing, delay and loss of packets depends on _____ and _____
a) Inter-arrival, packet lengths
b) Packet size, sequence number
c) routing path, sequence number
d) RTT value, packet lengths
65)Which of the following is a feature of fair queueing?
a) Every user flows share the same logical buffer
b) Idealized system assumes fluid flow from queues
c) Addresses different users by order or request
d) None of the mentioned
66)In buffer management, drop priorities requires packet to drop when buffer is full
a) False
b) True
67)What are the key mechanisms in Open-Loop Control? (Choose 3)
a) Re-routing
b) Traffic shaping
c) Admission control
d) Policing
68)The data link layer takes the packets from _____ and encapsulates them into
frames for transmission (G3).

[email protected] 58

about:blank 58/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) A. network layer
b) B. physical layer
c) C. transport layer
d) D. application layer
69) Consider the situation in which the disk read/write head is currently located at
track 45 (of tracks 0-255) and moving in the positive direction. Assume that the
following track requests have been made in this order: 40, 67, 11, 240, 87. What is
the order in which optimised C-SCAN would service these requests and what is
the total seek distance? (G3)

a) 600
b) 810
c) 505
d) 550
70) Token ring station operates in which of the following modes? (G3)
a) Transit mode
b) Listen mode
c) Bypass mode and receive mode
d) All of them above
71) The sending station in IEEE 802.5 sets the address recognized (A) bit and frame
copied (C) bit in MAC header as ? (G3)
a) 1,0
b) 0,0
c) 0,1
d) 1,1
72) What type of acknowledgement system is used in 802.5? (G3)

a) Cumulative ACK
b) Independent ACK
c) Piggybacking ACK
d) None
73) Consider a token ring with latency 500 μsec and packet size of 1500 bytes. What
is the effective throughput rate for both single active host and for many active
hosts that can be achieved if the ring has 3 Mbps bandwidth? Assume the strategy
used is delayed token reinsertion. (G3)
a) 2.4 Mbps and 3 Mbps

[email protected] 59

about:blank 59/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) 2.4 Mbps and 2 Mbps


c) 2.3 Mbps and 3 Mbps
d) 2.4 Mbps and 2.67 Mbps
74) Automatic repeat request error management mechanism is provided by: (G3)
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
75) When 2 or more bits in a data unit has been changed during the transmission, the
error is called: (G3)
a) random error
b) burst error
c) inverted error
d) none of the mentioned
76) CRC stands for: (G3)
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
77) Which one of the following is a data link protocol? (G3)
a) ethernet
b) point to point protocol
c) HDLC
d) all of the mentioned
78) Which frame field is created by a source node and used by a destination node to
ensure that a transmitted data signal has not been altered by interference,
distortion, or signal loss?
a) transport layer error check field
b) error correction process field
c) flow control field
d) frame check sequence field
79)What is a function of the data link layer?
a) provides delivery of data between two applications
b) provides for the exchange of frames over a common local media
c) provides end-to-end delivery of data between hosts
d) provides the formatting of data

[email protected] 60

about:blank 60/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

80)What will happen if the default gateway address is incorrectly configured on a


host?
a) The host cannot communicate with hosts in other networks.
b) The host cannot communicate with other hosts in the local network.
c) A ping from the host to 127.0.0.1 would not be successful.
d) The switch will not forward packets initiated by the host.
81)Which two protocols operate at the top layer of the TCP/IP protocol suite?
a) POP and DNS
b) DNS and IP
c) IP and TCP
d) TCP and Ethernet
82)What does the term “attenuation” mean in data communication?
a) strengthening of a signal by a networking device
b) leakage of signals from one cable pair to another
c) loss of signal strength as distance increases
d) time for a signal to reach its destination
83)Consider a network link that has distance of 100 meters, and signal traverses at the
speed of light in cable 2.5 x 10^8 meters per second. The link has transmission
bandwidth of 100 megabits/second (100 x 10^6 bits per second). The packet size is
400 bits. What is the signal propagation delay?
a) 4x10^-19 seconds
b) 4x10^-6 seconds
c) 4x10^-7 seconds
d) None of the mentioned
84)DNS is a domain-name-service that responds to queries of domain name to IP
address or IP address to domain name. DNS uses services provided by _____
a) UDP
b) TCP
c) HTTP
d) None of the mentioned
85)

[email protected] 61

about:blank 61/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

[email protected] 62

about:blank 62/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

CHƯƠNG 4. TẦNG MẠNG

1) Which of the following storages /may have an associative access method?


a) Main memory
b) Cache
c) Disks
d) Virtual memory
2) The network layer concerns with ? (G11)
a) frames
b) bits

c) packets
d) none of these

3) The 4 byte IP address consists of (G11)


a) network address

b) host address
c) both (a) and (b)
d) none of the mentioned

4) A subset of a network that includes all the routers but contains no loops is called
(G11)

a) spider structure
b) spider tree
c) spanning tree

d) none of these
5) ICMP is primarily used for _____ (G11)

a) error and diagnostic functions


b) addressing

c) forwarding
d) none of these

[email protected] 63

about:blank 63/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

6) Assume that source S and destination D are connected through two intermediate
routers labeled R. Determine how many times each packet has to visit the network
layer and the data link layer during a transmission from S to D (G11)

a) Network layer – 4 times and Data link layer – 4 times

b) Network layer – 4 times and Data link layer – 3 times


c) Network layer – 4 times and Data link layer – 6 times
d) Network layer – 2 times and Data link layer – 6 times

7) Consider a network with 6 routers R1 to R6 connected with links having weights


as shown in the following diagram: (G11)

All the routers use the distance vector based routing algorithm to update their
routing tables. Each router starts with its routing table initialized to contain an
entry for each neighbor with the weight of the respective connecting link. After all
the routing tables stabilize, how many links in the network will never be used for
carrying any data?

a) 4
b) 3

c) 2
d) 1

8) Which one of the following is not a function of network layer? (G11)

[email protected] 64

about:blank 64/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) routing
b) inter-networking

c) congestion control
d) none of these
9) Which one of the following routing algorithm can be used for network layer
design? (G11)
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of these
10) The network layer protocol of internet is (G11)
a) internet protocol

b) ethernet
c) hypertext transfer protocol

d) none of these
11) Classless Inter-domain Routing (CIDR) receives a packet with address
131.23.151.76. The router’s routing table has the following entries: (G11)

a) 1
b) 2
c) 3
d) 5

12)Which subnet would include the address 192.168.1.96 as a usable host address?
a) 192.168.1.32/27
b) 192.168.1.32/28
[email protected] 65

about:blank 65/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) 192.168.1.64/29
d) 192.168.1.64/26

13)A network administrator is adding a new LAN to a branch office. The new LAN
must support 200 connected devices. What is the smallest network mask that the
network administrator can use for the new network?
a) 255.255.255.224
b) 255.255.255.240
c) 255.255.255.192
d) 255.255.255.0

14)Refer to the exhibit. Which protocol was responsible for building the table that is
shown?

a) ARP
b) DNS

c) DHCP
d) ICMP

15)Which value, that is contained in an IPv4 header field, is decremented by each


router that receives a packet?
a) Differentiated Services

[email protected] 66

about:blank 66/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) Fragment Offset
c) Header Length

d) Time-to-Live
16)Refer to the exhibit. The IP address of which device interface should be used as the
default gateway setting of host H1?

a) R2: S0/0/1

b) R1: G0/0
c) R2: S0/0/0
d) R1: S0/0/0

17)Refer to the exhibit. If host A sends an IP packet to host B, what will the
destination address be in the frame when it leaves host A?

[email protected] 67

about:blank 67/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) AA:AA:AA:AA:AA:AA
b) CC:CC:CC:CC:CC:CC
c) BB:BB:BB:BB:BB:BB
d) DD:DD:DD:DD:DD:DD
18) Select the incorrect statement about the error control problem (G4)
a) All errors are detected by error control methods
b) The general principle is to add some check bit set so that it can be controlled by
the receiver
c) With the error correction code, it is possible to locate the error so there is no
need to retransmit
d) With a debug code, only an error is detected, so it has to be retransmitted
19) Choose the incorrect statement about local area network (G4)

a) Fully centralized, unified network mining management


b) Currently, the local area network only uses the star configuration
c) Local area network with high speed and low error
d) No need for navigation devices with complicated relationships
20) Which LAN technology uses the CSMA/CD . method? (G4)

a) FDDI
b) Ethernet
[email protected] 68

about:blank 68/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) Token Ring
d) ArcNet

21) Currently, bus-type networks are not favored by network designers, the reason is
that (g4)
a) Data sent from one machine will travel in both directions, affecting the speed
of information exchange in the network
b) When there is a problem on the cable, it is very difficult to fix or need to
expand, the network must stop working
c) Large investment costs
d) Connection is very complicated
22) Find the incorrect statement in the following statements (g4)
a) Wired networks connect to each other by twisted pair cable, coaxial cable,
optical cable, etc. It can connect computers, televisions to form a network.
b) Wired networks are not capable of making connections all the time and
everywhere
c) Wireless networks connect to each other by radio, infrared or satellite
transmissions through WAP wireless access points. It can connect computers,
mobile phones to form a network
d) The coverage of the wireless network is not limited
23) The architecture of the TCP/IP model consists of layers ? (G4)
a) Application, Transport, Internet, Network interface

b) Application, Transport, Network, Physical


c) Application, Transport, Datalink, Network interface

d) Application, Transport, Internet, Physical


24) In the OSI model, the ARP protocol belongs to the ?
a) Application layer

b) Transport layer
c) Network layer

[email protected] 69

about:blank 69/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) Data link layer


25) What is the data at the network layer in the TCP/IP model called?

a) Data
b) Data snippet
c) Data frame
d) Data Packs
26) What are the similarities between OSI and TCP/IP models?
a) Have the same number of floors
b) Provides packet-switched communication methods

c) Both have a transport layer and a data link layer


d) The actual application is the same
27) What is the protocol used at the network layer in the TCP/IP model?
a) IP, ARP
b) TCP, IP

c) TCP, ARP
d) ARP, UDP

28)A network used to join the individual networks at different sites into one extended
network is called _____
a) LAN
b) VPN
c) PAN
d) SAN
29)Which OSI layer is responsible for providing end-to-end communication with
reliable service?
a) Session layer
b) Transport layer
c) Network layer
d) Data link layer
30)Which OSI layer is responsible for dividing the transmitted bit stream into frames?
a) Data link layer
b) Application layer
c) Network layer
d) Transport layer
31)Which OSI layer is responsible for determining which route through the network
to use?
[email protected] 70

about:blank 70/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) Data link layer


b) Network layer
c) Transport layer
d) None of the mentioned
32)Which feature does the data link layer and transport layer have in common?
a) Flow control
b) Congestion control
c) All of the mentioned
d) Medium access control
33)Which of the following statement is true for optical fiber?
a) All of the mentioned
b) Plentiful bandwidth for new services
c) Dominates long distance transmisison
d) Distance less of a cost factor in communications
34)Consider a network link that has distance of 100 meters, and signal traverses at the
speed of light in cable 2.5x10^18 meters per second. The link has transmission
bandwidth of 100 megabits/second (100x10^6 bits per second). The packet size is
400 bits. What is the packet transmission delay?
a) 4x10^-7 seconds
b) None of the mentioned
c) 4x10^-6 seconds
d) 4x10^-9 seconds
35)

[email protected] 71

about:blank 71/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

CHƯƠNG 5. TẦNG GIAO VẬN

1) Which of the following storages may have an associative access method?


a) Main memory
b) Cache
c) Disks
d) Virtual memory
2) What is the purpose of the TCP sliding window?
a) to ensure that segments arrive in order at the destination
b) to request that a source decrease the rate at which it transmits data
c) to inform a source to retransmit data from a specific point forward
d) to end communication when data transmission is complete
3) A client packet is received by a server. The packet has a destination port number of
53. What service is the client requesting?
a) SSH
b) FTP
c) Telnet
d) DNS
4) Transport layer aggregates data from different applications into a single stream
before passing it to ________ :
a) Network layer
b) Data link layer
c) Application layer
d) Physical layer
5) Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
6) Which of the following is a transport layer protocol?
a) Stream control transmission protocol

[email protected] 72

about:blank 72/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) Internet control message protocol


c) Neighbor discovery protocol
d) Dynamic host configuration protocol
7) Transport layer protocols deals with _________:
a) Application to application communication
b) Process to process communication
c) Node to node communication
d) Man to man communication
8) A _____ is a TCP name for a transport service access point.
a) Port
b) Pipe
c) Node
d) Protocol
9) An endpoint of an inter-process communication flow across a computer network
is called __________
a) Socket
b) Pipe
c) Port
d) Machine
10) At the transport layer, TCP/IP defines:
a) Transmission Control Protocol
b) User Datagram Protocol
c) Stream Control Transmission Protocol
d) All of above
11) In the transport layer, a message is normally divided into transmittable
a) Segments
b) Signals
c) Networks
d) Frames
12) User datagram protocol is called connectionless because __________ :
a) All UDP packets are treated independently by transport layer

[email protected] 73

about:blank 73/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

b) It sends data as a stream of related packets


c) It is received in the same order as the sent order
d) It sends data very quickly
13) In the OSI model, what layer is the transport layer:
a) Layer 7
b) Layer 1
c) Layer 3
d) Layer 4
14) What is the main function of the Transport layer?
a) Provide encryption
b) Provide end to end delivery
c) Send data physically
d) Data formatting
15) Which protocol is used the most in the transport layer?
a) UDP
b) TCP
c) FTP
d) PPP

[email protected] 74

about:blank 74/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

CHƯƠNG 6. TẦNG ỨNG DỤNG

1) Which of the following storages may have an associative access method?


a) Main memory
b) Cache
c) Disks
d) Virtual memory
5) Which two are protocols that belong in the OSI application layer? (G13)
a) PNG
b) DNS
c) SMTP
d) QuickTime
6) Which peer-to-peer application allows users to share pieces of many files with
each other at the same time? (G13)
a) Hybrid
b) Gnutella
c) BitTorrent
7) DHCP clients send a DHCP request message to available DHCP servers. (G13)
a) True
b) False
8) What does FTP stand for? (G13)
a) File Transfer Protocol
b) Folder Transfer Protocol
c) Protocol Transfer Program
d) Protocol Transfer Folder
9) Which application belongs to the Client/Server type ? (G13)
a) WinWord
b) WWW (World Wide Web)
c) Excel
d) Photoshop
10)Which is not an application layer protocol? (G13)

[email protected] 75

about:blank 75/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) HTTP
b) SMTP
c) FTP
d) TCP
11) The packet of information at the application layer is called __________ (G13)
a) Packet
b) Message
c) Segment
d) Frame
12)Which one of the following is an architecture paradigms? (G13)
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
13) Application developer has permission to decide the following on transport layer
side (G13)
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
14) Application layer offers _______ service. (G13)
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
15) E-mail is a(an) _________ (G13)
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
16) Pick the odd one out. (G13)
a) File transfer
b) File download
[email protected] 76

about:blank 76/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) E-mail
d) Interactive games
17) Which of the following is an application layer service? (G13)
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
18) To deliver a message to the correct application program running on a host, the
_______ address must be consulted. (G13)
a) IP
b) MAC
c) Port
d) None of the mentioned
19) Which is a time-sensitive service? (G13)
a) File transfer
b) File download
c) E-mail
d) Internet telephony
20) Transport services available to applications in one or another form _________
(G13)
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
21) Electronic mail uses which Application layer protocol? (G13)
a) SMTP
b) HTTP
c) FTP
d) SIP
22) Application layer protocol defines ____________ (G6)
a) Types of messages exchanged
b) Message format, syntax and semantics
c) Rules for when and how processes send and respond to messages
d) All of the mentioned
23) When displaying a web page, the application layer uses the _____________ (G6)
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
24) Which protocol is a signaling communication protocol used for controlling
multimedia communication sessions? (G6)
a) session initiation protocol
b) session modelling protocol

[email protected] 77

about:blank 77/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

c) session maintenance protocol


d) resource reservation protocol

25) Which one of the following is an internet standard protocol for managing devices
on IP network? (G6)
a) dynamic host configuration protocol
b) simple network management protocol
c) internet message access protocol
d) media gateway protocol
26) The ____ translates internet domain and host names to IP address. (G6)
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
27) Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host? (G6)
a) HTTP
b) FTP
c) Telnet
d) None of the mentioned
28) The ASCII encoding of binary data is called: (G6)
a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
29) Which one of the following protocol delivers/stores mail to reciever server? (G6)
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
30) Which one of the following is not correct? (G6)
a) Application layer protocols are used by both source and destination devices
during a communication session
b) HTTP is a session layer protocol
c) TCP is an application layer protocol
d) All of the mentioned
31)What is the aim of an IP address? (G6)
a) To uniquely identify a point on a network to allow packets to be sent to the
correct destination
b) To uniquely identify every device, so that communication between devices can
be achieved
c) To generally identify an end-point in a network to support communication and
packet routing

[email protected] 78

about:blank 78/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

d) To identify a sub-set of end points, devices or network components during any


given communication
32)What service is provided by HTTP?
a) An application that allows real-time chatting among remote users.
b) Uses encryption to secure the exchange of text, graphic images, sound, and
video on the web.
c) Allows for data transfers between a client and a file server.
d) A basic set of rules for exchanging text, graphic images, sound, video, and
other multimedia files on the web.
33)A client packet is received by a server. The packet has a destination port number of
67. What service is the client requesting?
a) Telnet
b) FTP
c) SSH
d) DHCP
34)Which type of server relies on record types such as A, NS, AAAA, and MX in
order to provide services?
a) email
b) file
c) web
d) DNS
35)What service is provided by HTTPS?
a) Allows remote access to network devices and servers.
b) Resolves domain names, such as cisco.com, into IP addresses.
c) Uses encryption to provide secure remote access to network devices and
servers.
d) Uses encryption to secure the exchange of text, graphic images, sound, and
video on the web.
36) Which of following protocol is HTTP built upon?
a) TCP
b) UDP
c) IP
d) ICMP
37) What was the concern of the telephone system that motivated the ARPANET design?
a) Vulnerability
b) Scalability
c) Efficiency
d) None of the mentioned
38) Which of the following is an application layer protocol?
a) DNS
b) HTTP
c) UDP
d) TCP
39) Bluetooth is an example of _____

[email protected] 79

about:blank 79/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ

a) Local Area Network


b) Personal Area Network
c) Wide Area Network
d) Metropolitan Area Network
40) In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are _____
a) Added
b) Rearranged
c) Removed
d) Modified
41)

[email protected] 80

about:blank 80/80

You might also like