0% found this document useful (0 votes)
28 views10 pages

نتورك

Uploaded by

Mirna Attallah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views10 pages

نتورك

Uploaded by

Mirna Attallah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

8. Which of this is not a network edge device?

a) PC
b) Smartphones
c) Servers
d) Switch
10. Three or more devices share a link in ________ connection.
a) Uni-point
b) Multipoint
c) Point to point
d) Simplex
5. Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
6. Bluetooth is an example of __________

a) personal area network

b) local area network

c) virtual private network

d) wide area network

9. Network congestion occurs _________

a) in case of traffic overloading

b) when a system terminates

c) when connection between two nodes terminates

d) in case of transfer failure

4. Application layer is implemented in ____________


a) End system
b) NIC
c) Ethernet
d) Packet transport
7. Delimiting and synchronization of data exchange is provided by __________
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
8. In OSI model, when data is sent from device A to device B, the 2nd layer to receive data at B is
_________

a) Application layer

b) Transport layer

c) Link layer

d) Session layer

9. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is
____________

a) Application layer

b) Transport layer

c) Link layer

d) Session layer

1. How many layers are present in the Internet protocol stack (TCP/IP model)?

a) 5

b) 7

c) 6

d) 10

11. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model
3. TCP/IP model does not have ______ layer but OSI model have this layer.

a) session layer

b) transport layer

c) application layer

d) network layer
6. TCP/IP model was developed _____ the OSI model.

a) prior to

b) after

c) simultaneous to

d) with no link to

7. Which layer is responsible for process to process delivery in a general network model?

a) network layer

b) transport layer

c) session layer

d) data link layer

8. Which address is used to identify a process on a host by the transport layer?


a) physical address
b) logical address
c) port address
d) specific address
9. Which layer provides the services to user?

a) application layer

b) session layer

c) presentation layer

d) physical layer

10. Transmission data rate is decided by ____________

a) network layer

b) physical layer

c) data link layer

d) transport layer

1. The physical layer is concerned with ___________

a) bit-by-bit delivery

b) process to process delivery

c) application to application delivery

d) port to port delivery


5. The physical layer provides __________
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
7. The physical layer is responsible for __________
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
1. The data link layer takes the packets from _________ and encapsulates them into
frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
2. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
3. Which sublayer of the data link layer performs data link functions that depend upon the
type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
5. Automatic repeat request error management mechanism is provided by ________
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
7. CRC stands for __________
a) cyclic redundancy check: (is a code that is added to a data which helps us to identify
any error that occurred during the transmission of the data. CRC is only able to detect
errors, not correct them. CRC is inserted in the frame trailer).
b) code repeat check
c) code redundancy check
d) cyclic repeat check
1. The network layer is concerned with __________ of data.
a) bits
b) frames
c) packets
d) bytes
2. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) error control
3. A 4 byte IP address consists of __________
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
10. ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing

2. Which of the following are transport layer protocols used in networking?


a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
3. User datagram protocol is called connectionless because _____________
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly

4. Transmission control protocol ___________


a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
5. An endpoint of an inter-process communication flow across a computer network is
called __________
a) socket
b) pipe
c) port
d) machine
1. Physical or logical arrangement of network is __________
a) Topology
b) Routing
c) Networking
d) Control
2. Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus
3. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
8. Which of the following is an application layer service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
12. Electronic mail uses which Application layer protocol?
a) SMTP
b) HTTP
c) FTP
d) SIP
1. The ____________ translates internet domain and host names to IP address.
a) domain name system
b) routing information protocol
c) network time protocol
d) internet relay chat
2. Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) Telnet
d) TCP
3. Application layer protocol defines ____________
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned
6. Which one of the following is an internet standard protocol for managing devices on
IP network?
a) dynamic host configuration protocol
b) simple network management protocol
c) internet message access protocol
d) media gateway protocol
10. When displaying a web page, the application layer uses the _____________
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) data link layer
4. HTTP client requests by establishing a __________ connection to a particular port on
the server.
a) user datagram protocol
b) transmission control protocol
c) border gateway protocol
d) domain host control protocol

3. FTP uses _________ parallel TCP connections to transfer a file.


a) 1
b) 2
c) 3
d) 4
2. FTP is built on _____ architecture.
a) Client-server
b) P2P
c) Data centric
d) Service oriented
5. If 5 files are transferred from server A to client B in the same session. The
number of TCP connections between A and B is _______
a) 5
b) 10
c) 2
d) 6
1. When the mail server sends mail to other mail servers it becomes ____________
a) SMTP server
b) SMTP client
c) Peer
d) Master
5. The underlying Transport layer protocol used by SMTP is ________
a) TCP
b) UDP
8. Typically the TCP port used by SMTP is _________
a) 25
b) 35
c) 50
d) 15
1. When the sender and the receiver of an email are on different systems, we need only
_________
a) One MTA
b) Two UAs
c) Two UAs and one MTA
d) Two UAs and two MTAs
2. A DNS client is called _________
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
1. The application-level protocol in which a few manager stations control a set of
agents is called ______
a) HTML
b) TCP
c) SNMP
d) SNMP/IP
10. Structure of Management Information (SMI), is the guideline of ________
a) HTTP
b) SNMP
c) URL
d) MIB
3. _______ allows you to connect and login to a remote computer
a) Telnet
b) FTP
c) HTTP
d) SMTP
2. Which one of the following is not true?
a) telnet defines a network virtual terminal (NVT) standard
b) client programs interact with NVT
c) server translates NVT operations
d) client can transfer files using to remote server using NVT
1. Which of the following is false with respect to TCP?
a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) Unreliable
5. Communication offered by TCP is ________
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
1. The receiver of the data controls the amount of data that are to be sent by the sender
is referred to as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
1. Which of the following is false with respect to UDP?
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
2. During error reporting, ICMP always reports error messages to ________
a) Destination
b) Source
c) Next router
d) Previous router
5. In IPv4 Addresses, classfull addressing is replaced with ________
a) Classless Addressing
b) Classfull Addressing
c) Classfull Advertising
d) Classless Advertising
6. In classful addressing, a large part of available addresses are ________
a) Organized
b) Blocked
c) Wasted
d) Communicated
9. Which of this is not a class of IP address?
a) Class E
b) Class C
c) Class D
d) Class F
2. To join the internet, the computer has to be connected to a _________
a) internet architecture board
b) internet society
c) internet service provider
d) different computer
3. Internet access by transmitting digital data over the wires of a local telephone network
is provided by _______
a) leased line
b) digital subscriber line
c) digital signal line
d) digital leased line
6. The size of an IP address in IPv6 is _________
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits

You might also like