MCQs
MCQs
3. Consider an HTTP client that wants to retrieve a Web document at a given URL. The
IP address of the HTTP server is initially unknown. What application layer protocols
are needed in this scenario?
A) DNS and HTTP
B) TCP for DNS; TCP for HTTP
C) UDP for DNS; TCP for HTTP
D) None of the responses above is correct.
6. ______________ delay is the result when packets wait to be transmitted onto the next
link.
A) Queuing
B) Transmission
C) Propagation
D) Nodal processing
8. Which of the following options show the correct name for a packet of information in
each layer?
A) application layer: frame, Transport layer: segment, Network layer: datagram, Link
layer: message
B) application layer: message, Transport layer: frame, Network layer: datagram, Link
layer: segment
C) application layer: message, Transport layer: segment, Network layer: datagram,
Link layer: frame
D) None of the responses above is correct.
10. The type of domain that deals with edu, com, net, org, and other similar extensions, is
called a ____________ .
A) Root DNS servers
B) Top-level DNS servers
C) Authoritative DNS servers
D) Local DNS servers
18. Transport services and protocols provide logical communication between hosts.
A) True
B) False
21. Consider an HTTP client that wants to retrieve a Web document at a given URL. The
IP address of the HTTP server is initially unknown. What transport layer protocols are
needed in this scenario?
A) DNS and HTTP
B) TCP for DNS; TCP for HTTP
C) UDP for DNS; TCP for HTTP
D) All of the above are correct responses.
23. Suppose Client A initiates a Telnet session with Server S. At about the same time,
Client B also initiates a Telnet session with Server S. If A and B are different hosts, is it
permissible that the source port number in the segments from A to S is the same as that
from B to S.
A) Yes
B) No
26. With download and delete, after a user retrieves its messages from a POP server
_______________ .
A) The user may retrieve all their messages later on any machine
B) The user may retrieve only some of their messages later on any machine
C) The messages are deleted immediately after reading them
D) The messages are saved for only a limited period of time, then deleted
E) None of the responses above are correct.
Page 6 of 11
28. The time it takes for a small packet to travel from client to server and then back to the
client is called _______________ .
A) Round-trip time
B) Propagation time
C) Transmission time
D) Delay time
29. Both UDP and TCP require that the applications recognize their own data formats.
A) True
B) False
33. Delivery and storage of email messages to a server is achieved using ___________ .
A) Post Office Protocol (POP)
B) Internet Mail Access Protocol (IMAP)
C) Simple Mail Transfer Protocol (SMTP)
D) Hypertext Transfer Protocol (HTTP)
E) All of these responses are correct.
Page 7 of 11
37. Which of the following options control the sending and receiving of information within
the Internet?
A) protocols
B) packets
C) ISP
D) RFC
39. Circuit switching is used to establish dedicated network paths that may be shared by
other end systems.
A) True
B) False
40. Time and frequency division multiplexing schemes are used to divide link bandwidth
into separately allocatable pieces.
A) True
B) False
44. Modern networks support networking sharing using techniques such as ___________ .
A) Time division multiplexing
B) Frequency division multiplexing
C) Packet switching
D) All of the above responses are correct
48. TCP abstracts data communication to appear as an apparent stream of flowing data.
A) True
B) False
Page 9 of 11
49. Which option describes the server program in a connection-oriented transport service?
A) Create socket and then, in a loop, wait for incoming connection request, read
request, write reply, then close
B) Create socket, send request, read reply, close
C) Create socket, read request, write reply
D) Create socket, send request, read reply, close
51. The socket that represents a ‘passive open’ is a(n) ________ socket.
A) Server
B) Client
C) TCP
D) Application
53. End systems must be connected to a(n) __________ in order to connect to an edge
router.
A) residential access network
B) mobile access network
C) institutional access network
D) All of the responses above are correct
56. Suppose a Client is downloading a 5MB file from a Server, through a single
communication link, with bandwidth capacity of 100Mbps, as in the diagram below.
If the distance between the Client and the Server is 4000 Km and the propagation speed
through the medium is 2 x 108 m/s, then the propagation delay is ____________ .
A) 0.4 seconds
B) 0.04 seconds
C) 0.02 seconds
D) 0.2 micro-seconds
57. Suppose a Client is downloading a 5MB file from a Server, through a single
communication link, with bandwidth capacity of 100Mbps, as in the diagram below.
If the distance between the Client and the Server is 4000 Km and the propagation speed
through the medium is 2 x 108 m/s, then the transmission delay is _________________ .
A) 0.4 seconds
B) 0.04 seconds
C) 0.02 seconds
D) 0.2 micro-seconds
58. A process sends messages into, and receives messages from, the network through a
software interface called a ___________________ .
A) CODEC
B) multiplexer
C) socket
D) cookie
60. The ability to inject packets into the Internet with a false source address is known as
__________________ .
A) IP spoofing
B) IP sniffing
C) IP phishing
D) Man-in-the-middle attack
62. Multiple TCP streams can distinguished on a given machine using __________ .
A) Ports
B) DNS addresses
C) network interface cards
D) All of the above responses are correct.
End of Examination.