0% found this document useful (0 votes)
27 views8 pages

CN - PUE 1 - Re

This document outlines an online examination for the Computer Networks course, detailing 50 questions with multiple-choice answers, each carrying 2 marks. The exam covers various topics within computer networking, including protocols, error control, and TCP/IP functionalities. The total duration of the exam is 90 minutes, with a maximum score of 100 marks.

Uploaded by

vibhavbhartiya13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views8 pages

CN - PUE 1 - Re

This document outlines an online examination for the Computer Networks course, detailing 50 questions with multiple-choice answers, each carrying 2 marks. The exam covers various topics within computer networking, including protocols, error control, and TCP/IP functionalities. The total duration of the exam is 90 minutes, with a maximum score of 100 marks.

Uploaded by

vibhavbhartiya13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Univ.

Roll No:

KIET Group of Institutions

Department Of Computer Science & Engineering


B. Tech 6th Semester
Online Pre University Examination1 – Re - Test, (2019-20) Even Semester
(Computer Networks) (RCS - 601)
Duration: 90 Minutes Max. Marks: 100
Note: - Attempt All Questions, each question carries 2 marks.
Q. No. Question Marks CO BL
1 What does protocol defines? 2 1 1
A. Protocol defines what data is communicated.
B. Protocol defines how data is communicated.
C. Protocol defines when data is communicated.
D. All of above

2 Which of the following system calls results in the sending of SYN packets? 2 1 2
A. Socket
B. Bind
C. Listen
D. Connect

3 How many bits are there in the ETHERNET address? 2 1 2


A. 64 bits
B. 48 bits
C. 32 bits
D. 16 bits

4 Determine the correct option for the given assertion and reason: - 2 1 3
Assertion: in IEEE802.3 is not suitable for client server application
Reason: in ETHERNET there is a restriction on minimum size.
A. Assertion and Reason are true but this is not correct reason for
the given assertion.
B. Assertion and Reason are false
C. Assertion and Reason both are true.
D. Assertion is true and Reason is false.

5 In which of the following protocol(s) it is possible for sender to 2 2 3


receive acknowledgement for a packet that falls outside its current
window?
A. Selective Repeat Protocol
B. Stop And Wait Protocol
C. Go Back N Protocol
D. All Of The Above

6 The technique of temporarily delaying outgoing acknowledgements 2 2 3


so that they can be hooked onto the next outgoing data frame is called
____________.
A. Piggybacking
B. Cyclic Redundancy Check
C. Fletcher’s Checksum
D. Parity Check

7 When two or more bits in a data unit has been changed during the 2 2 2
transmission, the error is called ____________.
A. Random Error
B. Burst Error
C. Inverted Error
D. Double Error
8 Which of the following tasks is not done by data link layer? 2 2 1
A. Framing
B. Error Control
C. Flow Control
D. Channel Coding
9 Which device uses logical addressing system? 2 3 1
A. Hub
B. Switch
C. Bridge
D. Router

10 Which of the following is not true about subnetting? 2 3 2


A. It can be applied only for single network.
B. It is used to improve security.
C. Here, bits are borrowed from network id portion.
D. Here, bits are borrowed from host id portion.

11 In the slow start phase of the TCP Congestion Control Algorithm, the 2 3 3
size of the congestion window: -
A. Does not increase
B. Increases Linearly
C. Increases Quadratic ally
D. Increases Exponentially

12 One of the header fields in an IP datagram is the time to live (TTL) 2 3 3


field. Which of the following statements best explains the need for
this field?
A. It can be used to prioritize packets
B. it can be used to reduce delays
C. it can be used to optimize throughput
D. it can be used to prevent packet looping

13 TCP groups a number of bytes together into a packet called _______ 2 4 2

A. Packet
B. Buffer
C. Segment
D. Stack
14 What is the header size of a UDP packet? 2 4 3
A. 8 Bytes
B. 8 Bits
C. 16 Bytes
D. 124 Bytes
15 The receiver of the data controls the amount of data that are to be sent 2 4 2
by the sender is referred to as ___________.
A. Flow Control
B. Error Control
C. Congestion Control
D. Error Detection
16 Connection establishment in TCP is done by which mechanism? 2 4 3
A. Flow Control
B. Three-Way Handshaking
C. Forwarding
D. Synchronization
17 Which one of the following use the UDP as transport layer protocol? 2 5 2
A. HTTP
B. TELNET
C. SMTP
D. DNS

18 Which one of the following protocols is not used to resolve one form 2 5 3
of address to another one?
A. RARP
B. DHCP
C. ARP
D. DNS

19 In one of the pairs of protocols given below, both the protocols can 2 5 3
use multiple TCP connections between the same client and the server.
Which one is that?
A. HTTP, TELNET
B. HTTP, FTP.
C. FTP, SMTP
D. HTTP, SMTP

20 Which of the following transport layer protocols is used to support 2 5 2


electronic mail?
A. SMTP
B. IP
C. TCP
D. UDP

21 Match the following: - 2 1 3


P. SMTP 1. Application Layer
Q. BGP 2. Transport Layer
R. TCP 3. Data Link Layer
S. PPP 4. Network Layer
5. Physical Layer

A. P–2Q–1R–3S–5
B. P–1Q–4R–2S–3
C. P–1Q–4R–2S–5
D. P–2Q–4R–1S–3
22 Match the following: - 2 1 3
1. Application Layer P. L2TP
2. Session Layer Q. DHCP
3. Physical Layer R. PPP
4. Data Link Layer S. IEEE 802.3
A. 1-Q,2-P,3-S,4-R
B. 1-Q,2-R,3-S,4-P
C. 1-R,2-P,3-Q,4-S
D. 1-S,2-R, 3-Q,4-P

23 The maximum window size for data transmission using the selective 2 2 2
reject protocol with n-bit frame sequence numbers is:
A. 2n
B. 2n - 1
C. 2n - 1
D. 2n - 2

24 Which of the following IEEE protocols is used for Wireless 2 2 2


Communication: -
A. IEEE 802.3
B. IEEE 802.4
C. IEEE 802.5
D. IEEE 802.11
25 Which one of the following is not a mandatory path attribute for BGP 2 3 3
protocol: -
A. ORIGIN
B. AS_PATH
C. NEXT_HOP
D. ES_PATH
26 What is the size of network bits & host bits of class a of IP address? 2 3 3
A. Network Bits 7, Host Bits 24
B. Network Bits 8, Host Bits 24
C. Network Bits 7, Host Bits 23
D. Network Bits 8, Host Bits 23

27 A layer-4 firewall ( a device that can look at all protocol headers up 2 4 3


to the transport layer) cannot; -

A. Block HTTP traffic during 9:00PM and 5:00AM


B. Block all ICMP traffic
C. Stop incoming traffic from a specific IP address but allow
outgoing traffic to same IP
D. Block TCP traffic from a specific user on a specific IP address
on multi-user system during 9:00PM and 5:00AM

28 Which of the transport layer protocol can be used for Internet 2 4 2


Applications: -
A. SMTP
B. SCTP
C. TCP
D. UDP
29 Which one of the following is a file transfer protocol; - 2 5 3
A. TELNET
B. SMTP
C. POP
D. FTP
30 Consider different activities related to email: - 2 5 3
M1:Send An Email From A Mail Client To Mail Server
M2:Download An Email From Mailbox Server To A Mail Client
M3:Checking Email In A Web Browser
Which Is The Applicable Level Protocol User In Each Activity?
A. M1:HTTP, M2:SMTP, M3:POP
B. M1:SMTP, M2:FTP, M3:HTTP
C. M1:SMTP, M2:POP, M3:HTTP
D. M1:POP, M2:SMTP, M3:IMAP

31 Period of a signal is 100ms. The frequency of the signal is _____Hz. 2 1 3


.01
32 The power of a signal is 10 milli Watt and the power of the noise is 1 2 1 3
microWatt; The values of SNR is __________and SNRdB is _____.
10,2
33 Station A uses 32 byte packets to transmit messages to station B 2 2 3
using a sliding window protocol. The round trip delay between A and
B is 80 milliseconds and the bottleneck bandwidth on the path
between A and B is 128 kbps. What is the optimal window size that
A should use?
A. 20
B. 40
C. 160
D. 320

34 The message 11001001 is to be transmitted using the CRC 2 2 3


polynomial x^3 + 1 to protect it from errors. The message that should
be transmitted is: -
A. 11001001000
B. 11001001011
C. 11001010
D. 110010010011

35 If a class b network on the internet has a subnet mask of 2 3 3


255.255.248.0, what is the maximum number of hosts per subnet?
A. 1022
B. 1023
C. 2046
D. 2047

36 A sender uses the stop-and-wait ARQ protocol for reliable 2 3 3


transmission of frames. Frames are of size 1000 bytes and the
transmission rate at the sender is 80 kbps (1kbps = 1000 bits/second).
Size of an acknowledgment is 100 bytes and the transmission rate at
the receiver is 8 kbps. The one-way propagation delay is 100
milliseconds. Assuming no frame is lost, the sender throughput is
__________ bytes/second.
2500
37 The value of the receiver window (rwnd) for host A is ___________ 2 4 3
if the receiver, host B, has a buffer size of 5000 bytes and 1000 bytes
of received and unprocessed data?
4000
38 The size of the window for host A is __________ if the value of rwnd 2 4 3
is 3000 bytes and the value of cwnd is 3500 bytes?
3000

39 A graphical HTML browser resident at a network client 2 5 3


machine Q accesses a static HTML webpage from a HTTP server S.
The static HTML page has exactly one static embedded image which
is also at S. Assuming no caching, which one of the following is
correct about the HTML webpage loading (including the embedded
image)?
A. Q needs to send at least 2 HTTP requests to S, each
necessarily in a separate TCP connection to server S.
B. Q needs to send at least 2 HTTP requests to S, but a single
TCP connection to server S is sufficient.
C. A single HTTP request from Q to S is sufficient, and a single
TCP connection between Q and S is necessary for this.
D. A single HTTP request from Q to S is sufficient, and this is
possible without any TCP connection between Q and S.

40 Which of the following protocol pairs can be used to send and 2 5 3


retrieve e-mails (in that order)?
A. IMAP, POP3
B. SMTP, POP3
C. SMTP, MIME
D. IMAP, SMTP
41 Which of the following is not the External Security Threats? 2 2 2
A. Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)
42 A station in a network forwards incoming packets by placing them on 2 2 3
its shortest output queue. What routing algorithm is being used?
A. Hot Potato Routing
B. Flooding
C. Static Routing
D. Delta Routing
43 Frames from one LAN can be transmitted to another LAN via the 2 2 2
device.
A. Router
B. Bridge
C. Repeater
D. Modem
44 Which of the following condition is used to transmit two packets over 2 3 3
a medium at the same time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
45 The Internet Control Message Protocol (ICMP) – 2 3 2
A. Allows gateways to send error a control messages to other
gateways or hosts
B. Provides communication between the internet protocol software on
one machine and the internet protocol software on another
C. Reports error conditions to the original source, the source must
relate errors to individual application programs and take action to
correct the problem
D. All of the above
46 Which of the following TCP/IP protocol is used for transferring 2 2 2
electronic mail messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
47 Which of the following TCP/IP protocol allows an application 2 2 3
program on one machine to send a datagram to an application
program on another machine?
A. UDP
B. X.25
C. SMTP
D. VMTP
48 Which of the following tasks is not done by Network layer? 2 2 2
A. Routing
B. Forwarding
C. Delivery
D. Channel Coding
49 Match the following: - 2 3 3
1. Application Layer P. L2TP
2. Network Layer Q. BGP
3. Physical Layer R. PPP
4. Data Link Layer S. IEEE 802.11
A. 1-Q,2-P,3-S,4-R
B. 1-Q,2-R,3-S,4-P
C. 1-R,2-P,3-Q,4-S
D. 1-S,2-R, 3-Q,4-P

50 Match the following: - 2 2 2


1. Application Layer P. L2TP
2. Transport Layer Q. TCP
3. Physical Layer R. PPP
4. Data Link Layer S. IEEE 802.4
A. 1-Q,2-P,3-S,4-R
B. 1-Q,2-R,3-S,4-P
C. 1-R,2-P,3-Q,4-S
D. 1-S,2-R, 3-Q,4-P

 Co -Course Outcome Generally Refer To Traits, Knowledge, Skill Set That A Student Attains After Completing The Course
Successfully.
 Bloom’s Level (Bl) - Bloom’s Taxonomy Framework Is Planning And Designing Of Assessment Of Student Learning

You might also like