VKU - Mạng Máy Tính - Bộ Câu Hỏi Trắc Nghiệm Ôn Thi Cuối Kỳ
VKU - Mạng Máy Tính - Bộ Câu Hỏi Trắc Nghiệm Ôn Thi Cuối Kỳ
MỤC LỤC
CHƯƠNG 1. TỔNG QUAN VỀ MẠNG MÁY TÍNH 2
CHƯƠNG 2. TẦNG VẬT LÝ 22
CHƯƠNG 3. TẦNG LIÊN KẾT DỮ LIỆU 44
CHƯƠNG 4. TẦNG MẠNG 63
CHƯƠNG 5. TẦNG GIAO VẬN 72
CHƯƠNG 6. TẦNG ỨNG DỤNG 75
about:blank 1/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 2/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 3/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) Physical address
b) IP address
c) Domain name
d) None of the mentioned
14)Suppose an application layer entity wants to send an L-byte message to its peer
process, using an existing TCP connection. The TCP segment consists of the
message plus 20 bytes of header. The segment is encapsulated into an IP packet
that has an additional 20 bytes of header. The IP packet in turn goes inside an
Ethernet frame that has 18 bytes of header and trailer. What is the bandwidth
utilization in terms of the percentage of the transmitted bits in the physical layer
corresponds to message information if L = 500 bytes?
a) 100%
b) 70%
c) 80%
d) 90%
15)Of the following services, which service(s) does the IP layer provides?
a) None of the mentioned
b) Error control
c) Flow control
d) Connection-based data transfer
16)Which of the following is true about the ways in which the OSI reference model
and TCP/IP reference model differ?
a) They differ in the number of layers
b) All of the mentioned
c) TCP/IP model does not have presentation layer, but OSI model has
d) TCP/IP model does not have session layer, but OSI model has
17)Which of following statements is true about how the data link layer and transport
layer differ?
a) Data link layer is concerned with framing and the transport layer is not
b) Data link layer is concerned with flow control and the transport layer is not
c) Data link layer is concerned with multiplexing and the transport layer is not
about:blank 4/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 5/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) 4x10^-19 seconds
b) 4x10^-6 seconds
c) 4x10^-7 seconds
d) None of the mentioned
24)An API allows application programs to access certain resources through a
predefined interface?
a) False
b) True
25)In transport protocol, which of the following statements is true for User Data
Protocol?
a) It enables best-effort connectionless transfer of individual block of
information.
b) It enables connection-oriented reliable transfer of individual block of
information
c) It enables best-effort connectionless reliable transfer of a stream of bytes
d) None of the mentioned
26)Which of the following sentences are true for connectionless stream mode of
service? (choose 3)
a) Multiple write/read between peer processes
b) Send/receive to/from multiple peer processes
c) No setup overhead and delay
d) Destination address with each block
27)In transmission delay, in order to reduce the number of bits in a message we use
data compression.
a) True
b) False
28)Which of the following is true of data compression algorithms? (choose 3)
a) Modify data headers
b) Recover information approximately
c) Recover original information exactly
d) Represent the information using fewer bits
about:blank 6/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 7/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
b) VPN
c) PAN
d) SAN
35)Upon receipt of a bad segment, UDP?
a) It does not do flow and error control
b) Retransmission
c) It does error control
d) It does flow control
36)Which OSI layer is responsible for providing end-to-end communication with
reliable service?
a) Session layer
b) Transport layer
c) Network layer
d) Data link layer
37)Which OSI layer is responsible for dividing the transmitted bit stream into frames?
a) Data link layer
b) Application layer
c) Network layer
d) Transport layer
38)Which OSI layer is responsible for determining which route through the network
to use?
a) Data link layer
b) Network layer
c) Transport layer
d) None of the mentioned
39)Which feature does the data link layer and transport layer have in common?
a) Flow control
b) Congestion control
c) All of the mentioned
d) Medium access control
40)Which protocol glues the network of networks together as the Internet?
about:blank 8/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) TCP
b) IP
c) UDP
d) None of the mentioned
41)Which of the following applications would you select TCP protocol for? (choose
2)
a) Web browsing
b) File transfer
c) Domain name service
d) None of the mentioned
42)In BSD socket API, which type of socket is used to create a TCP socket?
a) SOCK_RAW
b) SOCK_STREAM
c) SOCK_DGRAM
d) None of the mentioned
43)In BSD socket API, which type of socket is used to create a UDP socket?
a) SOCK_DGRAM
b) SOCK_STREAM
c) SOCK_RAW
d) None of the mentioned
44)In BSD socket API, which systems call is used to assign a network address to the
socket?
a) None of the mentioned
b) Bind()
c) Connect()
d) Listen()
45)In BSD socket API, if a client knows the server name but now server's network
address, what system call should the client use to get server's network address?
a) Gethostbyname()
b) Connect()
c) None of the mentioned
about:blank 9/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
d) Gettimeofday()
46)In a transmission system, which of the following statement is true for a receiver?
(choose 2)
a) Converts information into signal suitable for transmission
b) Receives energy from medium
c) Converts received signal into a form suitable for delivery to user
d) All of the mentioned
47)In digital transmission, long distance digital communications require the use of a
generator to recover original data sequence and re-transmits on next segment.
a) True
b) False
48)In twisted pair, a category 5 UTP cable can support a data rate of up to 16 MHz
a) True
b) False
49)Which of the following statements is true for optical fiber?
a) All of the mentioned
b) Plentiful bandwidth for new services
c) Dominates long distance transmission
d) Distance less of a cost factor in communications
50)Which of the following are advantages of optical fiber? (choose 2)
a) Extremely low bandwidth
b) No corrosion
c) Noise immunity
d) Wavelength dependency
51)Consider a network link that has distance of 100 meters, and signal traverses at the
speed of light in cable 2.5x10^18 meters per second. The link has transmission
bandwidth of 100 megabits/second (100x10^6 bits per second). The packet size is
400 bits. What is the packet transmission delay?
a) 4x10^-7 seconds
b) None of the mentioned
c) 4x10^-6 seconds
about:blank 10/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
d) 4x10^-9 seconds
52)Given a 7-bit information frame (0, 1, 0, 1, 1, 0, 1), what is the even parity bit?
a) 1
b) 0
c) None of the mentioned
d) 01
53)Which of the following statements are true for single-bit parity error detection?
(choose 2)
a) It can detect all tripe bit errors in an information frame
b) It can detect all single bit errors in an information frame
c) It can detect all double bit erros in an information frame
d) None of the mentioned
54)Which of following statements are true for two-dimensional parity error detection?
a) It can detect all single bit errors in an information frame
b) All of the mentioned
c) It can detect all double bit errors in an information frame
d) It can correct all single bit errors in an information frame
55)Assume bit errors occur at random. If each bit has 50% probability to be in error
by transmission. What is the probability of a four-bit frame to be in error by
transmission?
a) 1/4
b) 1/8
c) 1/16
d) None of the mentioned
56)What is the binary sequence that corresponds to polynomial code x^3 + x^2 + 1?
a) 111
b) 1110
c) 0111
d) 1101
57)Block codes are generated using _____.
a) Generator matrix
about:blank 11/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
b) Generator polynomial
c) Both of the mentioned
d) None of the mentioned
58)Which of the following is true for two-dimensional parity check? (choose 2)
a) Arrange information in rows
b) More parity bit to improve coverage
c) Arrange information in columns
d) Add multiple parity bits to each column
59)Polynomial codes are implemented using shift register circuits
a) True
b) False
60)What is the binary equivalent of the following polynomial arithmetic x^7 + x^6 +
x^5 + x^2 + 1?
a) 11011101
b) 11100111
c) 11101101
d) 11100101
61)Using Euclidean Division, what will be the remainder of 70 by 999 where 70 is the
divisor and 999 is the dividend?
a) 17
b) 21
c) 19
d) 14
62)Given an information polynomial code l(x) = x^7 + x^6 + x^1 + 1. Which is its
corresponding per-bit information frame?
a) 01100011
b) 10100010
c) None of the mentioned
d) 11000011
63)What is the remainder obtained by dividing x^7 + x^5 + 1 by the generator
polynomial x^3 + 1?
about:blank 12/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) x^2 + x
b) x^2 + 1
c) x^2 + x + 1
d) None of the mentioned
64)Given a generator polynomial g(x) = x^3 + x + 1, consider the information
sequence 1001. By CRC method, what is the resulting codeword for transmission?
a) 1010110
b) 1001111
c) 1001000
d) 1001110
65)Which of the following generator polynomials can detect all single bit errors in an
information frame?
a) g(2) = x + 1
b) g(x) = x
c) g(x) = x^2
d) All of the mentioned
66)Internet protocols use check bits to detect errors, instead of using CRC
polynomials. The primary rationale is _____
a) Strength of error detection capability
b) simplicity of implementation
c) CRC polynomial cannot work for internet protocols
d) None of the mentioned
67)The two basic approaches in error control are error prevention and detection, and
error correction and re-transmission.
a) False
b) True
68)Find parity bit for 1001011?
a) 1
b) 2
c) None of the mentioned
d) 0
about:blank 13/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 14/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
75) A _____ is a device that forwards packets between networks by processing the
routing information included in the packet. (G14)
a) bridge
b) firewall
c) router
d) hub
76) The number of layers in ISO OSI reference model is _________ (G14)
a) 5
b) 7
c) 6
d) 10
77) How many layers are present in the Internet protocol stack (TCP/IP model)?
(G14)
a) 5
b) 7
c) 6
d) 10
78) Transmission data rate is decided by ________ (G14)
a) network layer
b) physical layer
c) data link layer
d) transport layer
79) In OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is _________ (G14)
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
80) In TCP/IP model, when data is sent from device A to device B, the 5th layer to
receive data at B is ________ (G14)
a) Application layer
about:blank 15/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
b) Transport layer
c) Link layer
d) Session layer
81) OSI stands for ________ (G14)
a) open system interconnection
b) operating system interface
c) optical service implementation
d) open service internet
82) Which address is used on the internet for employing the TCP/IP protocols? (G7)
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
83)TCP/IP model was developed _____ the OSI model. (G7)
a) prior to
b) after
c) simultaneous to
d) with no link to
84) Transmission data rate is decided by ____________(G7)
a) network layer
b) physical layer
c) data link layer
d) transport layer
85) TCP/IP model does not have ______ layer but OSI model have this layer.(G7)
a) session layer
b) transport layer
c) application layer
d) network layer
86) In which year was the OSI model studied?(G7)
a) 1969
b) 1970
about:blank 16/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) 1971
d) 1981
87) Which of the following is not an ISO specification for OSI model?(G7)
a) The same functions can be placed on different floors
b) Do not define too many functional layers
c) Create boundaries between functional layers so that the number of interactions
between the two layers is minimal
d) Create separate layers for functions that are completely different in terms of
technology or implementation
88) At which layer of the OSI model does packet routing occur?(G7)
a) Network
b) Data link
c) Transport
d) Presentation
89) When a packet is lost or corrupted, what does the data link layer do?(G7)
a) Self-recover or repair lost or corrupted packets or that
b) Ask the source station to resend the lost or damaged packet
c) Abort the data exchange session, giving an error message to the source station
d) All of the mentioned
90) What can cause two network layer entities of two computers in a network not to
communicate with each other?(G7)
a) The network connection is faulty
b) Data link layer protocol error
c) Data physical layer protocol error
d) All of the mentioned
91) Which of the following information do packets at the network layer contain?(G7)
a) The IP address of the sending computer and the IP address of the receiving
machine
b) IP packet size, IP packet lifetime
c) Contact serial number
d) All of the mentioned
about:blank 17/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 18/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
b. Type of computer
c. A person's name
d. Nonsense
100) Which Internet Protocol (IP) number is used by a computer to send a message
back to itself? (G15)
a. 0.0.0.0
b. 1.1.1.1
c. 127.0.0.1
d. 255.255.255.255
101) Vint Cerf and Robert E Kahn are known for their contribution for.(G15)
a. TCP
b. HTTP
c. FTP
d. ICMP
102) The function of DSLAM is to __________ (G1)
a. Convert analog signals into digital signals
b. Convert digital signals into analog signals
c. Amplify digital signals
d. De-amplify digital signals
Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s
used by Telcos to convert the analog signals to digital signals for the purpose of
providing internet. The DSLAM located in a telco’s Central Office does this function.
103) Which of the following terms is not associated with DSL? (G1)
a. DSLAM
b. CO
c. Splitter
d. CMTS
Explanation: CMTS stands for Cable modem termination system. It is used in cable
internet access. In cable internet access, internet is not provided through telephone lines
and the companies that provide such connections don’t necessarily provide telephone
access.
104) Bluetooth is an example of __________? (G1)
a. personal area network
b. local area network
c. virtual private network
about:blank 19/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 20/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
b. Session layer
c. Transport layer
d. Link layer
Explanation: The session layer provides the mechanism for opening, closing and
managing a session between end-user application processes. The session layer 5 is
responsible for establishing managing synchronizing and terminating sessions. In
TCP/IP protocol stack, the functions of the session layer are handled by the transport
layer itself and thus the session layer is missing from the TCP/IP model.
110) In OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is _________ (G1)
a. Application layer
b. Transport layer
c. Link layer
d. Session layer
Explanation: In OSI reference model, the fifth layer is Session layer. Session layer
provides the mechanism for opening, closing and managing a session between end-user
application processes. In TCP/IP protocol stack, the functions of the session layer are
handled by the transport layer itself and thus the session layer is missing from the
TCP/IP model.
111) In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________ (G1)
a. Application layer
b. Transport layer
c. Link layer
d. Session layer
Explanation: In TCP/IP model, the fifth layer is application layer. When data is sent from
device A to device B, the 5th layer to receive data at B is application layer. Application
layer provides the interface between applications and the network. The user interacts
with only this layer.
about:blank 21/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 22/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) 3
b) 2
c) 4
d) None of the mentioned
6) ARQ protocols combine error detection, retransmisison and sequence numbering
to provide reliability.
a) False
b) True
7) A service model specifies a level of performance that can be expected in the
transfer of information.
a) True
b) False
8) A service offered at a given layer can include which of the following feature(s)?
a) Sequencing
b) All of the mentioned
c) Reliability
d) Timing
9) Digital communication technologies may introduce errors in communication,
which of the following can be used to provide reliable communication. (choose 2)
a) TCP
b) HDLC
c) DNS
about:blank 23/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
d) UDP
10)Ensuring that information is not altered during transfer is associated with _____
a) Authentication
b) Integrity
c) Confidentiality
d) Availability
11) Given 3 bits for sequence numbers, what is the maximum sliding windows size at
the receiver in Go Back 3 ARQ?
a) 3
b) 8
c) 7
d) None of the mentioned
12)Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already
set the sliding window size to be 4, what is the maximum sliding window size at
the receiver?
a) 3
b) 7
c) None of the mentioned
d) 8
13)Consider Selective Repeat ARQ flow control protocol. In the following scenario,
what should be the value of frame number x at receiver B?
a) 8
b) 7
[email protected] 24
about:blank 24/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) 3
d) None of the mentioned
14)If the probability of error is very low in a communication link, which of the
following statements is true about performance of ARQ protocol?
a) Stop-and-wait and Go-back-N ARQ protocols have similar performance
b) Go-back-N ARQ and Selective Repeat ARQ protocols have similar
performance
c) Stop-and-wait and Selective Repeat ARQ protocols have similar performance
d) None of the mentioned
15)In peer-to-peer protocol, the purpose of Automatic Repeat Request is _____
(choose 2)
a) to ensure a sequence of information packet is delivered in order
b) to ensure a sequence of information packet is delivered without errors or
duplication despite transmission errors and losses
c) to ensure a sequence of information packet is delivered out-of-order
d) to ensure a sequence of information packet is delivered with an ACK request
16)Which of the basic elements of ARQ is associated with negative
acknowledgement?
a) Error detecign code
b) NAKs
c) ACKs
d) Timeout mechanism
17)In Go-Back-N ARQ, a procedure where transmisison of a new frame is begun
before the completion of time of the previous frame transmission is called _____
a) Pipelining
b) Transitioning
c) Channeling
d) None of the mentioned
18)In Stop-and-Wait protocol, sequence number are not required.
a) True
b) False
about:blank 25/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 26/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 27/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
31)PPP is a data link protocol for point-to-point lines in Internet. Its framing is based
on which of the following?
a) Byte stuffing
b) Bit stuffing
c) Word stuffing
d) None of the mentioned
32)HDLC is another data link control protocol widely in use. Its framing is based on
which of the following?
a) Byte stuffing
b) Bit stuffing
c) Word stuffing
d) None of the mentioned
33)Which of following statements are true for HDLC?
a) All of the mentioned
b) supports various data transfer modes
c) supports multi-point links and point to point links
d) implements error control and flow control mechanisms
34)In PPP authentication, which of the following is true for Challenge-Handshake
Authentication Protocol (CHAP)? (Choose 2)
a) Initiator must send ID and password
b) Authenticator can re-issue challenge during session
c) Initiator and authenticator share a secret key
d) After several attempts, LCP closes link
35)In error detection and loss recovery, which of the following statement is correct?
a) All of the mentioned
b) Frames may undergo errors in transmission
c) CRCs detect errors and such frames treated as lost
d) Frames lost due to loss-of-synchronization or receiver buffer overflow
36)In multiplexing, Last IN First Out (LIFO) is used to determine the order of packet
transmission.
a) True
about:blank 28/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
b) False
37)Generic Framing Procedure (GFP) allows the implementation of multiple transport
modes that may coexist within the same transport channel.
a) True
b) False
38)In Generic Framing Procedure (GFP), which of the following sentences are correct
(choose 3)
a) GFP rely on byte-stuffing mechanism to delineate protocol data unit (PDUs)
b) GFP provides flexible encapsulation framework that supports either a
fixed or variable length frame structure.
c) GFP uses an explicit payload length indicator provided in its frame header
to accommodate variable length PDUs
d) GFP uses a variation of HEC-based self delineation technique
39)What is the primary function of medium access control?
a) It is to minimize or eliminate the incidence of collisions of a shared
communication link.
b) It is to deal with the flow control of a shared communication link.
c) It is to deal with the congestion control of a shared communicatioin link.
d) None of the mentioned
40)What is the primary benefit provided by the Slotted ALOHA compared to
ALOHA?
a) Lower access delay
b) Higher maximum throughput
c) Both of the mentioned
d) None of the mentioned
41)What is the vulnerable perfiod of collisions in ALOHA?
a) Two frame transmission time
b) Round-trip propagation delay
c) One frame transmission time
d) None of the mentioned
42)What is the vulnerable period of collisions in Slotted ALOHA?
about:blank 29/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 30/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
48)In Carrier Sense Multiple Access (CSMA), possibility of collision still exist
because of _____
a) Collision delay
b) Propagation delay
c) Transmit delay
d) None of the mentioned
49)Polling is a scheduling approach for dynamic medium access control. Which of
following statements are correct?
a) All of the mentioned
b) Polling performance can deteriorate with large delay-bandwidth product
c) Polling can provide bounds on access delay to the shared medium
d) Polling can provide fairness through regulated access opportunities
50)In a collision-free reservaton system that has a large number of light-traffic
stations, and the delay-bandwidth product is larger than 1. Which of following
MAC protocol is a good fit for stations to reserve mini-slots?
a) 1-persistent CSMA
b) Slotted ALOHA
c) CSMA/CD
d) None of the mentioned
51)In Carrier Sense Multiple Access with collision detection (CSMA-CD), how long
will it take a collision to be detected and resolved?
a) Round-trip propagation delay
b) One propagation delay
c) One frame transmission time
d) None of the mentioned
52)Suppose that the ALOHA protocol is used to share a 56 kbps satellite channel.
Suppose that frames are 1000 bits long. What is the maximum throughput of the
system in number of frames per second.
a) 1 frame per second
b) 100 frames per second
c) None of the mentioned
about:blank 31/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 32/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 33/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 34/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) 0.122
d) None of the mentioned
70)Wireless data communication is compelling, because of _____ (choose 2)
a) Its high reliability to noise and interference
b) Its easy and low-cost deployment
c) Its support to personal and mobile devices
d) All of the mentioned
71)Why not use CSMA/CD in a wireless LAN? The primary reason is _____
a) The hidden station problem
b) The round-trip delay in a wireless LAN is too large
c) The frame is usually very small in a wireless LAN
d) All of the mentioned
72)In IEEE 802.11 MAC for wireless LANs, which of following inter-frame space
(IFS) is used to transmit high-priority frames such as ACKs?
a) DIFS
b) SIFS
c) PIFS
d) None of the mentioned
73)Which of following statements identifies the similarity between HDLC (data link
control) and Ethernet (medium access control)?
a) Both contain framing information that delineates the beginning and end of
each frame
b) Both provide connection-oriented packet transfer services to the network layer
c) All of the mentioned
d) Both implement error control and flow control functions to provide reliable
transmisison
74)Which multiple access technique is used by IEEE 802.11 standard for wireless
LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
about:blank 35/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
d) CSMA/CD
75)Which of the following are management services offered by the MAC sublayer in
wireless LAN? (choose 2)
a) Power management
b) Roaming within ESS
c) Network management
d) Storage management
76)In CSMA/CA, an amount of time divided into slots called _____
a) Contention procedure
b) Contention window
c) Contention signals
d) Contention energy
77)In medium access control sublayer, medium usage is mediated by the access
control during contention period.
a) False
b) True
78)In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), to continue
transmission process we use a _____
a) Access point
b) Loop
c) Station
d) Signal
79) The physical layer is concerned with (G2)
a) bit-by-bit delivery
b) Process to process delivery
c) Application to application delivery
d) Port to port delivery
80) Which transmission media provides the highest transmission speed in a network?
(G2)
a) Coaxial cable
b) Twisted pair cable
about:blank 36/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) Optical fiber
d) Electrical cable
81) Bits can be sent over guided and unguided media as analog signal by (G2)
a) Digital modulation
b) Amplitude modulation
c) Frequency modulation
d) Phase modulation
82)The portion of physical layer that interfaces with the media access control sublayer
is called (G2)
a) Physical signaling sublayer
b) Physical data sublayer
c) Physical address sublayer
d) Physical transport sublayer
83)The physical layer provides (G2)
a) Mechanical specifications of electrical connectors and cables
b) Electrical specification of transmission line signal level
c) Specification for IR over optical fiber
d) All of the mentioned
84) In asynchronous serial communication the physical layer provides (G2)
a) Start and stop signaling
b) Flow control
c) Both start & stop signaling and flow control
d) Only start signaling
85)The physical layer is responsible for (G2)
a) Line coding
b) Channel coding
c) Modulation
d) All of the mentioned
86) The physical layer translates logical communication requests from the ______ into
hardware specific operations
a) Data link layer
about:blank 37/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
b) Network layer
c) Transport layer
d) Application layer
87) A single channel is shared by multiple signals by (G2)
a) Analog modulation
b) Digital modulation
c) Multiplexing
d) Phase modulation
88) Wireless transmission of signals can be done via (G2)
a) Radio waves
b) Microwaves
c) Infrared
d) All of the mentioned
89)What technique is used with UTP cable to help protect against signal interference
from crosstalk?
a) terminating the cable with special grounded connectors
b) twisting the wires together into pairs
c) wrapping a foil shield around the wire pairs
d) encasing the cables within a flexible plastic sheath
90) The physical layer is concerned with the movement of _______ over the physical
medium. (g8)
a) Programs
b) Dialogs
c) Protocols
d) Bits
91) The physical layer concerns with (g8)
a) bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) None of the above
92) Before data can be transmitted, they must be transformed to ________.(g8)
about:blank 38/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) periodic signals
b) electromagnetic signals
c) aperiodic signals
d) low-frequency sine waves
93) The term ......... describes the position of the waveform relative to time 0 (g8)
a) Frequency
b) Phase
c) Phase Shift
d) Time period
94) In a frequency-domain plot, the horizontal axis measures the ________ (g8)
a) peak amplitude
b) frequency
c) phase
d) slope
95) In a time-domain plot, the horizontal axis is a measure of ________ (g8)
a) signal amplitude
b) frequency
c) phase
d) time
96) As frequency increases, the period _____ (g8)
a) Decreases
b) Increases
c) remains the same
d) doubles
97) Which standards organization oversees development of wireless LAN standards
(g8)
a) IANA
b) IEEE
c) IOS
d) TIA
about:blank 39/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 40/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) 3 MHz
d) None of the above
104) Given two sine waves A and B, if the frequency of A is twice that of B, then
the period of B is ________ that of A. (G9)
a) one-half
b) twice
c) the same as
d) indeterminate from
105) A sine wave is ________. (G9)
a) periodic and continuous
b) aperiodic and continuous
c) periodic and discrete
d) aperiodic and discrete
106) If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is
________ V. (G9)
a) 2
b) 1
c) -2
d) between -2 and 2
107) A signal is measured at two different points. The power is P1 at the first point
and P2 at the second point. The dB is 0. This means ________. (G9)
a) P2 is zero
b) P2 equals P1
c) P2 is much larger than P1
d) P2 is much smaller than P1
108) ________ is a type of transmission impairment in which the signal loses
strength due to the resistance of the transmission medium. (G9)
a) Attenuation
b) Distortion
c) Noise
d) Decibel
about:blank 41/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 42/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) Flow control
d) Connection-based data transfer
115) This layer is an addition to OSI model?
a) Application layer
b) Presentation layer and Session layer
c) Presentation layer
d) Session layer
116) The functionalities of presentation layer includes _____
a) All of the mentioned
b) Data compression
c) Data encryption
d) Data decryption
117)
about:blank 43/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 44/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 45/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
store-and-forward, what is the total time for the packet to be transmitted to the
destination?
a) m+n
b) 3m+n
c) None of the mentioned
d) 3m+3n
12)Consider a three hop network from the source to the destination. Let me be the
message transmission time at each hop. Let n be the propagation delay of each
hop. Assume there is no queueing delay and processing time at each hop. Based on
store-and-forward, what is the total time for three packets to be transmitted to the
destination by packet pipelining?
a) 9m+9n
b) 3m+3n
c) 5m+3n
d) None of the mentioned
13)Six stations (S1-S6) are connected to an extended LAN through transparent
bridges (B1 and B2), as shown in the following figure. Initially, the forwarding
tables are empty. Both bridges use backward learning to build their tables. Suppose
station S2 transmits a frame to S1. Which of following statements is correct?
about:blank 46/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 47/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 48/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 49/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 50/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) 3
b) 4
c) 6
d) All of the mentioned
32)Consider the network as shown in the figure. We use the Bellman-Ford algorithm
to find the set of shortest paths from all nodes to the destination node 2. Each node
maintains an entry (n, cost) about the next node along the current shortest path and
the current minimum cost from the node to the destination. In the third algorithm
iteration, which nodes will update their entries and inform their neighbors?
a) 4
b) 6
c) 3
d) All of the mentioned
33)In link state routing after the construction of link state packets new routes are
computed using _____
a) Bellman Ford algorithm
about:blank 51/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
b) Dijkstra's algorithm
c) Leaky buckete algorithm
d) None of the mentioned
34)A subset of a network that includes all the routers but contains no loops is called
_____
a) spanning tree
b) Broadcast structure
c) Multi-destination routing structure
d) None of the mentioned
35)In a router, which of the following statement is true for creating routing tables?
a) Need information on state of links
b) All of the mentioned
c) Need to distribute link state information using a routing protocol
d) Need to compute routes based on information
36)In a virtual-circuit packet network, routing is determined during connection set-up
a) True
b) False
37)In deflection routing, bufferless operation is considered a disadvantage due to
packet loss
a) True
b) False
38)What is the root problem of Bellman-Ford algorithm for distance vector
approach?
a) All of the mentioned
b) Counting to infinity
c) Flooding overhead
d) Cannot work in IP
39)What is the root problem of link state routing?
a) Counting to infinity
b) Flooding overhead
c) Slow reaction to link failures
about:blank 52/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 53/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) 5
b) 1
c) 3
d) 2
about:blank 54/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
50)Consider the network as shown in the figure. We use the Dijkstra's algorithm to
find the set of shortest paths from all nodes to the destination node 4. In Dijkstra's
algorithm, each iteration the next closet node is added to the set with the root node.
At the second iteration, which node will be added to the set N?
a) 6
b) 1
c) 3
d) 5
51)Consider the network as shown in the figure. We use the Dijkstra's algorithm to
find the set of shortest paths from all nodes to the destination node 4. In Dijkstra's
algorithm, each iteration the next closet node is added to the set with the root node.
At the third iteration, which node will be added to the set N?
a) 1
b) 6
c) 3
d) 5
52)Consider the network as shown in the figure. We use the Dijkstra's algorithm to
find the set of shortest paths from all nodes to the destination node 4. In Dijkstra's
about:blank 55/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
algorithm, each iteration the next closet node is added to the set with the root node.
At the fourth iteration, which node will be added to the set N?
a) 5
b) 3
c) 6
d) 1
53)In RIP operation, which of the following statement is correct?
a) Router sends update message to neighbors every 30 sec
b) All of the mentioned
c) To deal with changes in topology such as a link failure, a router expects an
update from each of its neighbors within 180 sec.
d) Convergence speed up by triggered updates
54)What are the limitations of RIP protocol? (choose 2)
a) Limited metric use
b) Slow convergence
c) Fixed number of hops
d) Update message overhead
55) In Open Shortest Path First (OSPF), which of the following statements are
correct? (choose 3)
a) OSPF typically converges slower than RIP when there is a failure in the
network
b) Allows routers to build shortest path tree with router as root
c) Enables each router to learn complete network topology
d) Each router builds an identical link-state database
56)Which of the following is a type of router defined in OSPF?
about:blank 56/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 57/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
d) Packet delay
62)By Random Early Detection (RED), when a given source transmits at a higher rate
than others, the source will _____
a) Suffers a higher packet-dropping rate
b) Achieves a higher bandwidth
c) Suffer a lower packet-dropping rate
d) Achieves a lower waiting delay
63)The simplest approach to queue scheduling in First-In, First-out queueing, where
all packet flow make use of different buffer.
a) True
b) False
64)In FIFO queueing, delay and loss of packets depends on _____ and _____
a) Inter-arrival, packet lengths
b) Packet size, sequence number
c) routing path, sequence number
d) RTT value, packet lengths
65)Which of the following is a feature of fair queueing?
a) Every user flows share the same logical buffer
b) Idealized system assumes fluid flow from queues
c) Addresses different users by order or request
d) None of the mentioned
66)In buffer management, drop priorities requires packet to drop when buffer is full
a) False
b) True
67)What are the key mechanisms in Open-Loop Control? (Choose 3)
a) Re-routing
b) Traffic shaping
c) Admission control
d) Policing
68)The data link layer takes the packets from _____ and encapsulates them into
frames for transmission (G3).
about:blank 58/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) A. network layer
b) B. physical layer
c) C. transport layer
d) D. application layer
69) Consider the situation in which the disk read/write head is currently located at
track 45 (of tracks 0-255) and moving in the positive direction. Assume that the
following track requests have been made in this order: 40, 67, 11, 240, 87. What is
the order in which optimised C-SCAN would service these requests and what is
the total seek distance? (G3)
a) 600
b) 810
c) 505
d) 550
70) Token ring station operates in which of the following modes? (G3)
a) Transit mode
b) Listen mode
c) Bypass mode and receive mode
d) All of them above
71) The sending station in IEEE 802.5 sets the address recognized (A) bit and frame
copied (C) bit in MAC header as ? (G3)
a) 1,0
b) 0,0
c) 0,1
d) 1,1
72) What type of acknowledgement system is used in 802.5? (G3)
a) Cumulative ACK
b) Independent ACK
c) Piggybacking ACK
d) None
73) Consider a token ring with latency 500 μsec and packet size of 1500 bytes. What
is the effective throughput rate for both single active host and for many active
hosts that can be achieved if the ring has 3 Mbps bandwidth? Assume the strategy
used is delayed token reinsertion. (G3)
a) 2.4 Mbps and 3 Mbps
about:blank 59/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 60/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 61/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 62/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) packets
d) none of these
b) host address
c) both (a) and (b)
d) none of the mentioned
4) A subset of a network that includes all the routers but contains no loops is called
(G11)
a) spider structure
b) spider tree
c) spanning tree
d) none of these
5) ICMP is primarily used for _____ (G11)
c) forwarding
d) none of these
about:blank 63/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
6) Assume that source S and destination D are connected through two intermediate
routers labeled R. Determine how many times each packet has to visit the network
layer and the data link layer during a transmission from S to D (G11)
All the routers use the distance vector based routing algorithm to update their
routing tables. Each router starts with its routing table initialized to contain an
entry for each neighbor with the weight of the respective connecting link. After all
the routing tables stabilize, how many links in the network will never be used for
carrying any data?
a) 4
b) 3
c) 2
d) 1
about:blank 64/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) routing
b) inter-networking
c) congestion control
d) none of these
9) Which one of the following routing algorithm can be used for network layer
design? (G11)
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of these
10) The network layer protocol of internet is (G11)
a) internet protocol
b) ethernet
c) hypertext transfer protocol
d) none of these
11) Classless Inter-domain Routing (CIDR) receives a packet with address
131.23.151.76. The router’s routing table has the following entries: (G11)
a) 1
b) 2
c) 3
d) 5
12)Which subnet would include the address 192.168.1.96 as a usable host address?
a) 192.168.1.32/27
b) 192.168.1.32/28
[email protected] 65
about:blank 65/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) 192.168.1.64/29
d) 192.168.1.64/26
13)A network administrator is adding a new LAN to a branch office. The new LAN
must support 200 connected devices. What is the smallest network mask that the
network administrator can use for the new network?
a) 255.255.255.224
b) 255.255.255.240
c) 255.255.255.192
d) 255.255.255.0
14)Refer to the exhibit. Which protocol was responsible for building the table that is
shown?
a) ARP
b) DNS
c) DHCP
d) ICMP
about:blank 66/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
b) Fragment Offset
c) Header Length
d) Time-to-Live
16)Refer to the exhibit. The IP address of which device interface should be used as the
default gateway setting of host H1?
a) R2: S0/0/1
b) R1: G0/0
c) R2: S0/0/0
d) R1: S0/0/0
17)Refer to the exhibit. If host A sends an IP packet to host B, what will the
destination address be in the frame when it leaves host A?
about:blank 67/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) AA:AA:AA:AA:AA:AA
b) CC:CC:CC:CC:CC:CC
c) BB:BB:BB:BB:BB:BB
d) DD:DD:DD:DD:DD:DD
18) Select the incorrect statement about the error control problem (G4)
a) All errors are detected by error control methods
b) The general principle is to add some check bit set so that it can be controlled by
the receiver
c) With the error correction code, it is possible to locate the error so there is no
need to retransmit
d) With a debug code, only an error is detected, so it has to be retransmitted
19) Choose the incorrect statement about local area network (G4)
a) FDDI
b) Ethernet
[email protected] 68
about:blank 68/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) Token Ring
d) ArcNet
21) Currently, bus-type networks are not favored by network designers, the reason is
that (g4)
a) Data sent from one machine will travel in both directions, affecting the speed
of information exchange in the network
b) When there is a problem on the cable, it is very difficult to fix or need to
expand, the network must stop working
c) Large investment costs
d) Connection is very complicated
22) Find the incorrect statement in the following statements (g4)
a) Wired networks connect to each other by twisted pair cable, coaxial cable,
optical cable, etc. It can connect computers, televisions to form a network.
b) Wired networks are not capable of making connections all the time and
everywhere
c) Wireless networks connect to each other by radio, infrared or satellite
transmissions through WAP wireless access points. It can connect computers,
mobile phones to form a network
d) The coverage of the wireless network is not limited
23) The architecture of the TCP/IP model consists of layers ? (G4)
a) Application, Transport, Internet, Network interface
b) Transport layer
c) Network layer
about:blank 69/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) Data
b) Data snippet
c) Data frame
d) Data Packs
26) What are the similarities between OSI and TCP/IP models?
a) Have the same number of floors
b) Provides packet-switched communication methods
c) TCP, ARP
d) ARP, UDP
28)A network used to join the individual networks at different sites into one extended
network is called _____
a) LAN
b) VPN
c) PAN
d) SAN
29)Which OSI layer is responsible for providing end-to-end communication with
reliable service?
a) Session layer
b) Transport layer
c) Network layer
d) Data link layer
30)Which OSI layer is responsible for dividing the transmitted bit stream into frames?
a) Data link layer
b) Application layer
c) Network layer
d) Transport layer
31)Which OSI layer is responsible for determining which route through the network
to use?
[email protected] 70
about:blank 70/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 71/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 72/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 73/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 74/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 75/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
a) HTTP
b) SMTP
c) FTP
d) TCP
11) The packet of information at the application layer is called __________ (G13)
a) Packet
b) Message
c) Segment
d) Frame
12)Which one of the following is an architecture paradigms? (G13)
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
13) Application developer has permission to decide the following on transport layer
side (G13)
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
14) Application layer offers _______ service. (G13)
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
15) E-mail is a(an) _________ (G13)
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
16) Pick the odd one out. (G13)
a) File transfer
b) File download
[email protected] 76
about:blank 76/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
c) E-mail
d) Interactive games
17) Which of the following is an application layer service? (G13)
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
18) To deliver a message to the correct application program running on a host, the
_______ address must be consulted. (G13)
a) IP
b) MAC
c) Port
d) None of the mentioned
19) Which is a time-sensitive service? (G13)
a) File transfer
b) File download
c) E-mail
d) Internet telephony
20) Transport services available to applications in one or another form _________
(G13)
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
21) Electronic mail uses which Application layer protocol? (G13)
a) SMTP
b) HTTP
c) FTP
d) SIP
22) Application layer protocol defines ____________ (G6)
a) Types of messages exchanged
b) Message format, syntax and semantics
c) Rules for when and how processes send and respond to messages
d) All of the mentioned
23) When displaying a web page, the application layer uses the _____________ (G6)
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
24) Which protocol is a signaling communication protocol used for controlling
multimedia communication sessions? (G6)
a) session initiation protocol
b) session modelling protocol
about:blank 77/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
25) Which one of the following is an internet standard protocol for managing devices
on IP network? (G6)
a) dynamic host configuration protocol
b) simple network management protocol
c) internet message access protocol
d) media gateway protocol
26) The ____ translates internet domain and host names to IP address. (G6)
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
27) Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host? (G6)
a) HTTP
b) FTP
c) Telnet
d) None of the mentioned
28) The ASCII encoding of binary data is called: (G6)
a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
29) Which one of the following protocol delivers/stores mail to reciever server? (G6)
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
30) Which one of the following is not correct? (G6)
a) Application layer protocols are used by both source and destination devices
during a communication session
b) HTTP is a session layer protocol
c) TCP is an application layer protocol
d) All of the mentioned
31)What is the aim of an IP address? (G6)
a) To uniquely identify a point on a network to allow packets to be sent to the
correct destination
b) To uniquely identify every device, so that communication between devices can
be achieved
c) To generally identify an end-point in a network to support communication and
packet routing
about:blank 78/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 79/80
21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ
about:blank 80/80