Sie sind auf Seite 1von 50

1. _______ was the first protocol, used by ARPANET hosts in the year 1970.

Transmission Control Protocol Telnet protocol Internet Protocol Network Control Protocol

2. _______ body looks after the protocol identifiers used over Internet.
Internet Assigned Number Authority Internet Research Task Force Internet Engineering Task Force Internet Architecture Board

3. Which protocol at the application layer, transfers files that form pages on World Wide Web?
File Trans er Protocol !yperte"t Trans er Protocol Address Resolution Protocol #ser $atagram Protocol

4. Which of the following versions will replace IPv4 Internet layer?


IP%&'( IP%)'( IP%* IP%)'+

5. _________ is any device that implements IP.


Bridge !ost Router

Node

6. Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
$omain Name ,ystem FTP Telnet Control -essage Protocol

1. _______ acts as an Internet draft and is developed by a team of ________ .


File Trans er Protocol. Internet ,ociety Re/uests or Comments. Internet Engineering Task Force ,tandards. Internet Research Task Force $ARPA model. Any go%ernment agency

2. _________ is an encapsulation unit used at Inernet layer of the TCP/IP model and it has ________.
Frame. code ,egment. payload Packet. header and payload Bits. control bits

3. In ________ year, Internet Service Providers began to offer Internet access to __________.
(012. Research Institutions (010. Businesses (003. 4nly Indi%iduals (00). Businesses and indi%iduals'

4. TCP/IP protocol can be mapped to _________ layer conceptual model known as _________ model.
Three. 4,I

Four. $ARPA ,i". ARPANET None o the abo%e'

1.
1. TCP/IP is dependent on factors like network access method, frame format, and medium. 2. TCP/IP is used for communication over only similar network types and which make use of LAN technologies. 3. The layer called Network Interface layer sends TCP/IP packets through the network medium. 4. TCP/IP can easily adapt latest technologies. State true or false.

4nly statement ( is true ,tatements ( and + are alse ,tatements + and 5 are true 4nly statements & is alse

2. 1. The Internet layer of DARPA does not support sequencing.


2. Sequencing and acknowledgment services are taken care by Transport layer or the Application layer. 3. The Internet layer of DARPA does not provide acknowledgment services. 4. Sequencing and acknowledgment services are provided by Physical layer of OSI model. State true or false.

,tatement ( is alse ,tatements + and 5 are alse ,tatements 5 and & are true

4nly statement & is alse

3. 1. User Datagram Protocol is used when upper-layer protocols give reliable delivery
2. User Datagram Protocol is used when there is less data to be transferred. 3. Transmission Control Protocol does the functions like:Connection establishment and Recovering of packets. 4. TCP and UDP operate over Internet layers: IPv4 and IPv6. State true or false.

,tatements ( and + are true ,tatements ( and 5 are alse 4nly statement 5 is true 4nly statements & is alse'

1. Which of the following specifies the operations on dual MAC stations?


RFC ((22 RFC (503 RFC +&*1 RFC (5+0

2. Which of the following fields holds the packets of several protocols?


N6PI$ ield Pad ield I 73"358 ield 9'0++ ield

3. What is the capacity of Bearer channels in ISDN?


(* kbps *& kbps

5+ kbps (+2 kbps

4. In a X.25 protocol, the ________________ are sent as X.25 complete packet sequences.
Call #ser $ata 7C#$8 Network:6ayer Protocol Identi ier 7N6PI$8 $ata 6ink Connection Identi ier 7$6CI8 rotocol $ata #nits 7P$#s8

5. Which of the following is used for testing the data-link connection in a PPP network?
6ink Control Protocol 76CP8 -ethod Network Control Protocols 7NCPs8 Basic Rate Inter ace 7BRI8

6. What should be the frame size for a frame relay?


)*+ octet &*+ octet +*+ octet 5*+ octet

1. All of the following are the components of a PPP protocol, except:


-ethod to encapsulate datagrams o%er serial links' 6ink Control Protocol 76CP8 Network Control Protocols 7NCPs8 Integrated ,er%ices $igital Network 7I,$N8

2. All of the following are the features of the ISDN D-channel, except:
It is a (* kbps $:channel or control in ormation'

It is also used or sending PPP packets when suitably ramed' t is used or %oice or data or ;ust or data in a combined way' The $:channel inter ace re/uires NR< encoding'

3. Which of the following defines the transmission of IPv6 over ATM?


RFC (503 RFC ((22 RFC +++) RFC +&0+

4. Which of the following is currently a de facto standard, commonly used for point-to-point serial connections running TCP/IP?
Fiber $istributed $ata Inter ace 7F$$I8 ,erial 6ine IP 7,6IP8 Point:to:Point Protocol 7PPP8 otocol 7PPP8 IEEE 23+'5

1. Which of the following statements regarding the Frame formats for Ethernet is true?
1. The type field in Ethernet is used to distinguish between different protocols running on the coaxial cable. 2. The maximum length of an Ethernet frame is 1526 bytes. 3. The Ethernet physical layer and the IEEE 802.3/802.2 physical layers are incompatible. 4. The header field of the Ethernet Frame format contains protocol-type number.

4nly statements ( and + are true 4nly statement 5 is true ,tatements (. + and & are true 4nly statements ( and 5 are true

2. Given below are some statements related to IEEE 802.2 and IEEE 802.3. Identify which two statements are true.
1. 802.2 LLC layer follows the concept called Link Service Access Point (LSAP). 2. The extended form of IEEE 802.2 protocol LLC layer follows the concept called Sub network Access Protocol (SNAP). 3. 802.2 LLC layer follows the concept called Link Control Protocol (LCP). 4. 802.3 LLC layer follows the concept called Network Control Protocols (NCPs).

,tatements ( and + are true ,tatements + and 5 are true ,tatements ( and 5 are true ,tatements + and & are true

1. Which of the following methods allows host (sender) to provide explicit routing information?
,trict source routing Internet time stamp Record Route 6oose source routing

2. IP Addresses are expressed in __________ form.


$otted decimal orm $igital A,CII 4ctal decimal

3. In which type of routing, 10000011 byte specifies option type?


,trict source routing 6oose source routing

Record route Internet time stamp

4. Which of the following component in ICMP is based on the message type?


$ata Checksum Type Code

5. Which of the following protocol is described in RFC 903?


Address Resolution protocol 7ARP8 Bootstrap Protocol 7B44TP8 Internet Control -essage Protocol 7IC-P8 Re%erse Address Resolution Protocol 7RARP8

6. Which of the following mechanism in DHCP assigns a permanent IP address to the host?
-anual Allocation $ynamic Allocation Automatic Allocation #nusual Allocation

1. Which of the following type of protocol was designed to be employed for hardware broadcast networks?
$ynamic !ost Con iguration Protocol 7$!CP8 Address Resolution protocol 7ARP8 Internet Control -essage Protocol 7IC-P8 Re%erse Address Resolution Protocol 7RARP8

2. Which of the following address supports 254 hosts on each of 2 million networks?

Class $ addresses Class A addresses Class C addresses Class B addresses

3. Which of the following method is used for debugging in IP datagram routing?


,trict source routing 6oose source routing Record Route Internet time stamp

4. Which of the following help the client workstation to initialize with minimal IP stack?
$ynamic !ost Con iguration Protocol 7$!CP8 Bootstrap protocol Internet Control -essage Protocol 7IC-P8 Re%erse Address Resolution Protocol 7RARP8

1. The range of different class-based addressing are given below.

1. Class A addressing ranges from 0.0.0.0 to 127.255.255.255. 2. Class B addressing ranges from 192.0.0.0 to 191.255.255.254. 3. Class E addressing ranges from 240.0.0.0 to 255.255.255.255 4. Class C addressing ranges from 224.0.0.0 to 223.255.254.254. State true or false.

,tatement ( = & are true ,tatement ( = 5 are true ,tatements + = 5 are true

4nly statement & is true

2. Identify the true statements from the following:


1. Protocol address space is same as the EtherType field in the IEEE 802 header. 2. Hardware address length specifies the length of the protocol addresses in this packet. 3. Hardware address space specifies the length of the hardware addresses in this packet. 4. Protocol address space specifies the type of protocol. State true or false.

,tatements ( and + are alse ,tatements + and 5 are alse 4nly ,tatement 5 is true ,tatements & and ( are true

3. Which of the following statements are true with regard to protocol address?

1. Protocol address length specifies the length of the protocol addresses in this packet. 2. Protocol address length specifies the length of the acknowlegement packet. 3. The source/target protocol contains the physical network hardware addresses. 4. The source/target protocol address contains the protocol addresses. State true or false.

,tatements ( and + are alse ,tatements + and 5 are alse 4nly ,tatement 5 is true ,tatements & and ( are true

1. How many table entries are supported by global routing table in CIDR?
03.333

23.333 13.333 *3.333

2. Which of the following is a group of private IP addresses used in an organization?


Intranet Internet Ethernet E"tranet

3. What is the maximum number of hosts that can be allocated in Class B network?
*).333 *).55& *).5)3 *).+53

4. In 1996, 36.44% of _________ addresses were brought in use.


Class A Class $ Class B Class C

5. Which type of broadcast addresses use 255.255.255.255 address.


All : ,ubnets : $irected Broadcast Address ,ubnet:$irected Broadcast Address Network:$irected Broadcast Address 6imited Broadcast Address

6. Which of the following network providers cannot employ any default inter domain routing?
Type + Type & Type ( Type 5

1. Which of the following addresses has one-to-one relation between source and destination?
-ulticast #nicast Broadcast Any cast

2. What is the range of Class B networks supported by Intranets?


(0+'(*2'3'3 through (0+'(*2'+))'3 (3'3'3'3 (1+'(*'3'3 through (1+'5('3'3 (2+'(*'3'3 through (2+'5('3'3

3. ________ is extended so as to include IP address and transport identifier ?


Basic NAT Traditional Network Address Translation 7NAT8 Both a and b Network Address Port Translation 7NAPT8

4. What is Classless Inter-Domain Routing (CIDR)?


Error reco%ery method Ad%anced Internet addressing scheme Flow control mechanism

$ata reliability method

1. CIDR is:
1. Not designed to assign more IP addresses. 2. Based only on the higher order bits, called IP prefix. 3. Designed to assign more IP addresses in a significant manner. 4. Based mainly on the higher order bits called IP suffix. State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements & and ( are true

2. Identify the true statements from the following concepts of direct and indirect routes.
1. Direct routes describes the locally attached networks. 2. Direct route contains route, which is used when destination IP network is not found in the mappings of the previous types of type 1 and 2. 3. Default routes describes networks reachable through one or more gateways. 4. Indirect routes describes networks reachable through one or more gateways. State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements & and ( are true

3. 1. Proxy-ARP is used when one or more hosts do not support subnetting.

2. Limited Broadcast Address is used in ARP requests on un-subnetted networks. 3. Network-Directed Broadcast Address is used in ARP requests on un-subnetted networks. 4. Proxy-ARP is used when atleast one host support supernetting. State true or false.

,tatements ( and 5 are true' ,tatements 5 and & are alse' 4nly ,tatement & is true ,tatements & and + are true

1.
Which of the following synchronizes the sequence numbers in TCP segment format?

,>N FIN R,T P,!

2. UDP datagram has a header, which is of ________ .


(* bytes 2:bytes 5+ bytes *& bytes

3.
What is the format for association used in sockets ?

? local:address. local:port. oreign:address. oreign:port@ ?protocol. local:address. local:port. oreign:address@ ?protocol. local:address. oreign:address. oreign:port@

?protocol. local:address. local:port. oreign:address. oreign:port@

4. Ephemeral have port number ranging from _________ and _______.


(3+5 to *))5)' (3+& to *))))' (3+& to *))&)' (3+& to *))5)'

5. What is the address identified when socket is available at each end of TCP?
?TCP. IP address. socket number@' ?TCP. !ost address. port address@' ?TCP. IP address. port number@' ?TCP. Network address. socket address@'

6.
In TCP segment format _______indicates start of data.

R,T ACA #RB $ata 4 set

1. _________ is used for transferring smaller data units by every TCP/IP implementation.
Address Resolution Protocol 7ARP8 Internet Control -essage Protocol 7IC-P8 #ser $atagram Protocol 7#$P8 Bootstrap Protocol 7B44TP8

2. Which of the following specifies the communication path between processes?


Association

Con%ersation ,ocket Both a and c'

3. _________ is used for transferring smaller data units by every TCP/IP implementation.
Address Resolution Protocol 7ARP8 Internet Control -essage Protocol 7IC-P8 #ser $atagram Protocol 7#$P8 Bootstrap Protocol 7B44TP8

4. What is the length of datagram accepted by IP implementations in UDP datagram format?


1*) bytes )1) bytes *1) bytes )(* bytes

1. 1. UDP is basically an application interface to Internet Protocol.


2. ICMP follows window principle, which deals with data transmission. 3. TCP follows window principle, which deals with data transmission and receiving of acknowledgement. 4. ARP follows window principle, which deals with receiving of acknowledgement. State true or false.

,tatements ( and + are alse ,tatements + and ( are true 4nly ,tatement & is alse ,tatements 5 and ( are true

2. Given below are the statement related to sockets and half-association.

1. The half-association is also called a socket or a transport address. 2. Socket does not provides a communication path to the port. 3. The half-association is also called a port. 4. Socket provides a communication path to the port. State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements & and ( are true

3. Here are a few algorithms of which,


1.Fast recovery is an advanced algorithm that allows high throughput under moderate congestion. 2. Congestion avoidance and slow start are dependent algorithms with different objectives. 3.Congestion avoidance and slow start are independent algorithms with different objectives. 4. Fast recovery is the oldest algorithm that allows low throughput under moderate congestion. State true or false.

,tatements ( and 5 are true ,tatements ( and & are true 4nly ,tatement ( is alse ,tatements + and ( are alse

1. Which of the following in Open Shortest Path First (OSPF) protocol uses multiple paths and makes effective use of network resources?

Faster con%ergence time ,upport or authentication 6ogical partitioning o the network E/ual cost load balancing

2. Which of the following provides metrics for locating the network paths?
Enhanced Interior Bateway Routing Protocol 7EIBRP8 E"terior Bateway Protocol 7EBP8 Border Bateway Protocol 7BBP8 ,tatic Routing protocol

3. ____________ supports supernetting (CIDR) and variable length subnet masks (VLSM).
E"terior Bateway Protocol 7EBP8 Enhanced Interior Bateway Routing Protocol 7EIBRP8 Border Bateway Protocol 7BBP8 ,tatic Routing protocol

4. ____________ are used to monitor neighbor reachability and solicit update responses.
,tatic Routing protocol Enhanced Interior Bateway Routing Protocol 7EIBRP8 Border Bateway Protocol 7BBP8 E"terior Bateway Protocol 7EBP8

5. RFC 1322 describes about the ___________ routing.


$istance Cector 6ink ,tate !ybrid

Path Cector

6. __________ works well with small networks with limited redundancy.


!ybrid routing 6ink ,tate routing $istance Cector routing Path Cector routing

1. Which of the following protocol decreases the costs of link state updates and distance vector advertisements?
6ink ,tate routing !ybrid routing $istance Cector routing Path Cector routing

2. Which feature in RIP does not allow the routing table to get corrupted?
RIP:( CI$R and C6,Authentication -ulticasting

3. ____________ was developed to support aggregation and summarization of routing information.


,tatic Routing protocol Enhanced Interior Bateway Routing Protocol 7EIBRP8 Routing In ormation Protocol 7RIP8 Border Bateway Protocol 7BBP8

4. __________ maintains a table called neighbor table, which helps in keeping a track of each adjacent neighbor.
,tatic Routing protocol

Enhanced Interior Bateway Routing Protocol 7EIBRP8 E"terior Bateway Protocol 7EBP8 Border Bateway Protocol 7BBP8

1. Given below are the statements related to IP router and routing protocols:

1. The ability to form connections between different physical networks is called an IP router. 2. A robust routing protocol does not provides the ability to dynamically build and manage the information. 3. The ability to form connections between different artificial networks is called an IP router. 4. A robust routing protocol provides the ability to dynamically build and manage the information . State true or false.

,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true

2. Following are the statements based on Routing Information Protocol and its versions. Identify which of them are true.
1.RIPng uses the same algorithms, timers, and logic used in RIP-6. 2.RIP-1 was designed to be used by routers within an IPv6-based network. 3. RIPng uses the different algorithms, timers, and logic used in RIP-2. 4. RIPng was designed to be used by routers within an IPv6-based network. State true or false.

tatements ( and + are alse ,tatements + and 5 are true

4nly ,tatement 5 is true ,tatements & and ( are true

3. Which of the following statements related to Autonomous System are true?

1. Autonomous System (AS) is integral to understanding the function and scope of a routing protocol. 2.Interior Gateway Protocols allow the exchange of summary information between autonomous systems. 3.Autonomous System (AS) is integral to understanding only scope of a routing protocol. 4. Exterior Gateway Protocols allow the exchange of summary information between autonomous systems. State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements & and ( are true

1. In IGMP message format, which of the following specify an IGMPv2 membership report packet?
3"D(+D 3"D(1D 3"D((D 3"D(*D

2. Using which protocol, multiple PIM-SM domains can logically be connected?


E"terior Bateway Protocol 7EBP8 -ulticast ,ource $isco%ery Protocol 7-,$P8 Border Bateway Protocol 7BBP8

-ulticast 4,PF 7-4,PF8

3. What is the range of multicast addressing?


++5'3'3'3 through +&3'+))'+))'+)) +&&'3'3'3 through +50'+))'+))'+** ++&'('('( through +50')))'+))'+)) ++&'3'3'3 through +50'+))'+))'+))

4. BGMP builds shared domain trees and is________ routing protocol.


Any cast Broadcast #nicast -ulticast

5. Which of the following addresss is reserved for all IGMPv3-capable multicast routers?
++&'3'3'3 ++&'3'3'++ ++&'3'3'( ++&'3'3'+

6. ________is a multicast extension to OSPF Version 2.


-ulticast ,ource $isco%ery Protocol 7-,$P8 $istance Cector -ulticast Routing Protocol 7$C-RP8 -ulticast 4,PF 7-4,PF8 Internet Broup -anagement Protocol 7IB-P8

1. __________ protocol is used when multicast data has to be sent to majority of host over the network.
PI-:,- protocol PI-:$- protocol

-ulticast ,ource $isco%ery Protocol 7-,$P8 E"terior Bateway Protocol 7EBP8

2. Which of the following application of multicast, provides audio/audio-video communication facility to many-to-many connection?
$ata distribution Baming and simulation -ultimedia con erencing Real:time data multicast

3. The count of source addresses contained in an IGMPv3 message is indicated by _______ field.
Number o ,ources 7N8 , Flag uerierDs 9uery Inter%al Code uerierDs Robustness Cariable

4. Which of the following protocols has the capability to significantly reduce the congestion over the network?
PI-:,- protocol PI-:$- protocol -ulticast ,ource $isco%ery Protocol 7-,$P8 E"terior Bateway Protocol 7EBP8

1. Given below are the statements related to transient and permanent groups?

1. In Transient group, host can leave or join this group as when needed. 2. Permanent group follows a dynamic way of addressing and is not permanent. 3. Permanent group exists even with zero members. 4. Transient group does not exist, if the members in the group are zero.

State true or false.

,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is alse ,tatements + and 5 are alse

2. In membership query messages:


1.General Query is used for detemining, which groups have members of an attached network. 2. Specific Query is used for detemining, which groups have members of an attached network. 3. Group Query is used for detemining if a particular group has any members on an attached network. 4. Group-Specific Query is used for detemining if a particular group has any members on an attached network. State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true

3. Identify which of the given statements are true with regard to unicast and mulitcast algorithms.
1. Unicast algorithms must maintain loop-free routes. 2. Multicast algorithms must optimize the path from source to destinations. 3. Multicast algorithms must route data only to group members. 4. Unicast algorithms must optimize the path from source to destinations. State true or false.

,tatements ( and + are alse

,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements ( and & are true

1. Which of the following specification information is used in packet classifier?


,er%ice speci ication ,er%ice Re/uest ,peci ication 7Rspec8 Tra ic ,peci ication 7Tspec8 Filter speci ication

2. ___________ defines traffic and QoS characteristics for a particular flow of data packets.
Flow descriptor Flow control Tra ic control Policy control

3. What is the range of the parameter b in token bucket system?


( byte to +&3 gigabytes ( byte to +)3 gigabytes ( byte to +*3 gigabytes ( byte to +13 gigabytes

4. Which parameter specifies maximum packet size in bytes that conforms to the Tspec?
Parameter r Parameter b Parameter m Parameter -

5. When traffic is passed through token bucket filter, the overall time period, T should not exceed ________.
rT:b +rTE)b rTEb rT:+b

6. Which of the following is a simplex protocol?


-ulticast ,ource $isco%ery Protocol 7-,$P8 #ser datagram protocol7#$P8 Resource Reser%ation Protocol 7R,CP8 Internet Broup -anagement Protocol 7IB-P8

1. _________ recommends that an RSVP implementation should use the object order defined in RFC.
RFC ++33 RFC ++3) RFC ++3& RFC ++35

2. Which of the following field contains IP address of the node in RSVP object header?
,tyle N#66 R,CPF!4P ,ession

3. Which of the following has maximum length of 65528 bytes in Resource Reservation Protocol (RSVP)?
4b;ect contents C:Type

Class:Number Integrity

4. Which of the following is based on flow-state and flow-processing?


Integrated ser%ices 7I,8 $i erentiated ser%ices 7$,8 6inear Non linear

1. Which of the following statements based on Differentiated Service field are true?
1. The DS field uses the space of the former TOS octet in the IPv4 IP header. 2. DS field is not used to mark the packets that receive a particular forwarding treatment at each network node. 3. The DS field uses the space of the former TOS octet in the IPv5 IP header. 4. DS field is used to mark the packets that receive a particular forwarding treatment at each network node. State true or false.

,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true

2. Identify the true statement from the following:


1. Resources within the Diffserv network or region include RSVP-aware devices that participate in RSVP signaling. 2. Resources within the Intserv region include no RSVP signaling. 3. Resources within the Intserv network or region include RSVP-aware devices that participate in RSVP signaling. 4. Resources within the Diffserv region include no RSVP signaling.

State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true

3. Given below are a few services. Identify which statements are true.
1. Integrated Service offers predictable performance for a given load at a given time. 2. Controlled Load Service is intended to support the class of applications that are highly sensitive to overloaded conditions in the Internet. 3. The Guaranteed Service model provides functions that assure that datagram will arrive within a guaranteed delivery time. 4. Guaranteed Service is intended to support the class of applications that are highly sensitive to overloaded conditions in the Internet. State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements ( and & are true

1. Which of the following do not provide an absolute protection for a network?


,ource le%el gateway Circuit:le%el gateway Application:le%el gateway Packet: iltering

2. Which of the following firewall consists of a packet-filtering router and an application-level gateway?
,creened host irewall $ual:homed gateway irewall

Packet: iltering irewall ,creened subnet irewall

3. Currently security association management mechanisms are defined only for ________ addresses.
Any cast Broadcast -ulticast #nicast

4. ________ provides a private channel between communicating applications.


,4CA, ser%er ,ecure ,ockets 6ayer ,ecure ,hell Firewalls

5. _________ is an extension of an enterprise's private intranet.


6ocal area network Cirtual path network Cirtual pri%ate network 7CPN8 Public network

6. Which of the following, was earlier referred to as ISAKMP/Oakley?


ncapsulating ,ecurity Payload 7E,P8 Internet Aey E"change 7IAE8 protocol ,creened subnet irewall ,ecurity Parameter Inde"

1. A financial institution that issues the card to the purchaser is ________.


-erchant Issuer

Ac/uirer payment gateway Cardholder

2. In case of Secure Electronic Transaction, ______request from merchant asks acquirer to transfer previously authorized amount into its account.
Purchase order AuthoriGation Capture In/uiry

3. Which of the following common attacks render network resources nonfunctional?


$enial:o :ser%ice Replay o messages Password cracking Buessing o keys

4. Which of the following solutions protect against improper alteration of messages?


Authentication by digital signatures and certi icates Integrity checking and message authentication codes Non:repudiation Encryption

1. Which of the following statements related to database is true?

1. The Security Policy Database specifies what security services are to be offered to the IP traffic. 2. The Security Policy Database contains parameter information. 3. The Security Association Database specifies what security services are to be offered to the IP traffic.

4. The Security Association Database contains parameter information. State true or false.

,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true

2. Identify the true statement related to Tunneling technique.

1. Tunneling or encapsulation is a common technique in packet-switched networks. 2. Tunneling is used to carry traffic of one protocol over a network that supports that protocol directly. 3. Tunneling or encapsulation is a rare technique used in packet-switched networks. 4. Tunneling is used to carry traffic of one protocol over a network that does not support that protocol directly. State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true

3. Encapsulating Security Payload (ESP):


1. Offers connectionless services like Integrity check, authentication, and encryption 2. Advantage is that authentication and integrity check are used together. 3. Provides optional replay protection. 4. Services are selected at the time of termination of Security Association. State true or false.

,tatements ( and 5 are true

,tatements + and 5 are true 4nly ,tatement & is true ,tatements & and 5 are alse

1. The early Internet configurations required the use of only ______________.


Numbers Names !e"a decimal numbers Numeric IP addresses

2. Which of the following center maintained the host names to address mappings?
Network In ormation Center 7NIC8 Network center IP address center !ost in ormation center

3. _________ is a type of domain name queries.


6inear Iterati%e Brouped Parallel

4. The top-level domain names are called as __________.


,tatic Top:6e%el $omains ,tate Top:6e%el $omains Country Top:6e%el $omains Beneric Top:6e%el $omains'

5. Which of the following domain name corresponds to employment related sites?

biG ;obs in o mobi

6. Which among the following domains are maintained by Internet Corporation for Assigned Names and Numbers (ICANN)?
,peci ic domains ,tate domains Beneric domains Country domains

1. Which of the following server, loads zone's information from disk and has authority over the zone?
,econdary Primary Caching:4nly Caching

2. _________ field in the DNS General Resource Record identifies the protocol family.
Name Type Class TT6

3. _________ of the zone, is identified by Start of Authority (SOA) record.


$omain name !ost name IP address

,er%er name

4. Which response is displayed when message is not processed because of the server?
Name error er%er ailure Not implemented Format error

1. Which of the following statements based on Domain Name System are true?

1. The Domain Name System distributed database is composed of Resource Records (RRs). 2. All messages in the Domain Name System protocol use a different format. 3. The Domain Name System distributed database is composed of Start of Authority (SOA) records. 4. All messages in the Domain Name System protocol use a single format. State true or false.

,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true

2. Identify the true statement among the following:


1. Domain Name System (DNS) is a way to resolve meaningful and easy-to-remember names to IP addresses. 2. Maintaining one central list of the name to- IP-address relationships across the Internet is unrealistic. 3. Domain Name System (DNS) is a linear naming system for services, resources, etc., linked to the Internet.

4. Maintaining one central list of the name to- IP-address relationships across the Internet is realistic. State true or false.

,tatements ( and + are true ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true

3. Identify the true statement with regard to domain name. 1. A domain name that ends with a comma is called a fully qualified domain name.
2. If a domain name ends with a dot, it is said to be complete. 3. A domain name that ends with a dot is called a semi- qualified domain name. 4. If a domain name ends with a comma it is said to be complete. State true or false.

4nly statement ( is true 4nly statement + is true ,tatements + and 5 are true ,tatements ( and & are true

1. Most Telnet operations do not provide ________ capabilities.


-obile communication Audios Cideos Braphics

2. Which of the following principle is used by Telnet protocol?


Negotiation o terminal options ,ymmetric %iew H Network Cirtual Terminal 7NCT8

Cirtual Terminal

3. Both the host and client can propose additional options, as Telnet uses the________ model.
Asymmetric ,ymmetric ,tatic Iater all

4. The Network Virtual Terminal has printer and __________.


Central processing unit -onitor -ouse Aeyboard

5. In Network Virtual Terminal, the data is represented by _________.


2:bit A,CII 1:bit A,CII 0:bit A,CII (3:bit A,CII

6. In Network Virtual Terminal, the data is transmitted in ___________.


*:bit bytes 1:bit bytes 2:bit bytes 0:bit bytes

1. What is the code used for Interpret As Command (IAC)?


+)5 +))

+&3 ' +&(

2. The command NOP refers to _________.


NCT character BRA End o sub negotiation parameters No operation BA signal

3. What is the code used for "End of sub negotiation parameters"?


+&3 +)) +)5 +&(

4. Telnet protocol uses ___________ representation for the function Synchronize.


,>C ,>NC! ,N< ,>

1. "Identify the true statements with regard to RSH and REXEC.


1. Remote Execution Command Protocol (REXEC) handles commands issued by foreign hosts. 2. Remote Shell Protocol (RSH) transfers orders to subordinate virtual machines for job execution. 3. Remote Shell Protocol (RSH) handles commands issued by foreign hosts. 4. Remote Execution Command Protocol (REXEC) transfers orders to subordinate virtual machines for job execution." State true or false.

,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true

2. "1. Remote Execution Command Protocol (REXEC) performs automatic login and user authentication when a user ID and password are entered.
2. Remote Shell Protocol (RSH) command is used to define the user ID, password, host address and the process to be started on the remote host. 3. Remote Shell Protocol (RSH) performs automatic login and user authentication when a user ID and password are entered. 4. Remote Execution Command Protocol(REXEC) command is used to define the user ID, password, host address, and the process to be started on the remote host." State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true

3. "1.Remote Shell Protocol (RSH) is a server that allows the execution of jobs submitted from a remote host over the TCP/IP network.
2. The primary goal of the Telnet protocol is the provision of a standard interface for hosts over a network. 3. Remote Execution Command Daemon (REXECD) is a server that allows the execution of jobs submitted from a remote host over the TCP/IP network. 4. The primary goal of the File transfer protocol(FTP) is the provision of a standard interface for hosts over a network." State true or false.

,tatements ( and + are alse ,tatements + and 5 are true

4nly ,tatement 5 is alse ,tatements ( and & are true

1. Which of the following is defined in RFC 4366?


,ecure File Tras er Protocol 7,FTP8 Tri%ial File Trans er Protocol 7TFTP8 File Trans er Protocol 7FTP8 Transport 6ayer ,ecurity 7T6,8

2. Which protocol supports disk-to-disk data transfer?


Tri%ial File Trans er Protocol 7TFTP8 ,ecure File Tras er Protocol 7,FTP8 File Trans er Protocol 7FTP8 ,ecure Copy 7,CP8

3. Which protocol is used by FTP to provide reliable end-to-end connections?


#ser $atagram Protocol Transmission Control Protocol Internet Protocol None o the abo%e'

4. Which of the following command of Trivial File Transfer Protocol specifies destination host ID?
Put ?remote ilename@ J?local ilename@K Bet ?remote ilename@ J?local ilename@K -ode ?asciiLbinary@ Connect ?host@

5. ________ packet of TFTP has the opcode 2.


Read re/uest

Irite re/uest $ata Error

6. TFTP servers do not allow, which of the following access to public directories?
Read Access Tras er Access Irite Access Control Access

1. While navigating the directory structure, the subcommand that changes the directory on remote host is ___________.
6cd cd 6s $ir

2. ________ and __________ type of packets are supported by TFTP.


Read Re/uest. 4ption Acknowledgement Irite 4ption. ,a%e 6oad. Acknowledgement ,ecure Copy. Error

3. Which command copies a file from the remote host to the local host?
Bet -get Put -Put

4. Which of the following Transport Layer Security (TLS) command specifies the data channel protection level?
A$AT PR4T PB,< A#T!

1. "Which of the following statements based on Trivial File Transfer Protocol (TFTP) and File Transfer Protocol (FTP) are true.
1. TFTP use diskless devices to download firmware at boot time. 2. FTP uses any automated process for which the assignment of a user ID or password is not feasible. 3. FTP use diskless devices to download firmware at boot time. 4. TFTP uses any automated process for which the assignment of a user ID or password is not feasible." State true or false.

,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true

2. "Identify the true statements among the following.


1. The commands used by Trivial File Transfer Protocol (TFTP) implementations are not architected by an RFC. 2. File Transfer Protocol (FTP) is limited to only reading a file from a server or writing a file to a server. 3. The commands used by File Transfer Protocol (FTP) implementations are not architected by an RFC.

4. Trivial File Transfer Protocol (TFTP) is limited to only reading a file from a server or writing a file to a server." State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is true ,tatements ( and & are true

3. "Which of the following statements related to data transfer modes in TFTP are true?
1. The hexa mode, octet mode and NetASCII are the data trasfer modes in TFTP. 2. Octet mode is of 8-bit bytes and is also known as decimal. 3. NetASCII mode is a modified form of ASCII and is of 8-bits. 4. The use of octet mode is specified in the TFTP header for the Request for Read/Write packets." State true or false.

4nly statemtent ( is true ,tatements ( and + are true ,tatements 5 and & are true 4nly statement & is alse

4. "Which of the following statements related to data transfer modes in TFTP are true?
1. The hexa mode, octet mode and NetASCII are the data trasfer modes in TFTP. 2. Octet mode is of 8-bit bytes and is also known as decimal. 3. NetASCII mode is a modified form of ASCII and is of 8-bits. 4. The use of octet mode is specified in the TFTP header for the Request for Read/Write packets."

State true or false.

4nly statemtent ( is true ,tatements ( and + are true ,tatements 5 and & are true 4nly statement & is alse

1. Which of the following always keeps messages on the server and replicates copies to the clients?
Post 4 ice Protocol 7P4P8 ,imple -ail Trans er Protocol File Trans er Protocol 7FTP8 Internet -essage Access Protocol 7I-AP&8

2. While using which of these should a client be always connected to the server for the changes to be made?
Internet -essage Access Protocol 7I-AP&8 ,imple -ail Trans er Protocol 7,-TP8 File Trans er Protocol 7FTP8 Post 4 ice Protocol 7P4P8

3. Which of the following tells about primary recipients of the message?


cc To From Reply:to

4. Which of the following flags denotes that the message has been marked for special attention?
M$ra t MAnswered

M$eleted MFlagged

5. Which of the following desination address contains explicit routing information in SMTP Destination Address?
userNhost Nhost:a. host:bOuserNhost:c userP remote:hostNgateway:host user remote:hostNgateway:host

6. If a receiver-SMTP supports service extensions, it responds with a __________________?


!E64 command )33 ,ynta" Error message +)3 4A message 9#IT message

1. Which of the following command contains the reverse-path that can be used to report errors?
!E64 command -AI6 command RCPT command $ATA command

2. Which of the following states suggests that the connection has been ended either at the request of the client or for any other reason?
,elected state Authenticated state 6ogout state Non:authenticated state

3. _________ shows the current status of a message in IMAP4 Messages.

Flags message attribute #ni/ue identi ier 7#I$8 message attribute -essage se/uence number message attribute ,e/uence number message attribute

4. Which of the following flags cannot be changed by the client in IMAP4 Messages?
M$ra t MRecent M$eleted MFlagged

1. "Which of the following statements are true?


1. Simple Mail Transfer Protocol (SMTP) is used to refer to the combined set of protocols. 2. TFTP only guarantees delivery to the mail-gateway host, not to the real destination host. 3. File Transfer Protocol (FTP) is used to refer to the combined set of protocols. 4. SMTP only guarantees delivery to the mail-gateway host, not to the real destination host." State true or false.

,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true

2. "Which of the following statements are true?


1. The sender SMTP will generate commands that are replied to by the receiver SMTP in mail exchange. 2. File Transfer Protocol (FTP) design is based on the model of communication.

3. The SMTP design is based on the model of communication. 4. The sender FTP will generate commands that are replied to by the receiver SMTP in mail exchange." State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement & is true ,tatements ( and 5 are true

3. "1. Simple Mail Transfer Protocol (SMTP) allows clients to make changes both when connected and when disconnected models.
2. IMAP4 model provides more functionality to users than the POP model. 3. IMAP4 allows clients to make changes both when connected and when disconnected models. 4. Simple Mail Transfer Protocol (SMTP) model provides more functionality to users than the POP model." State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements ( and & are true

1. Which of the following function in SIP technologies is used for feature negotiation?
,ession setup #ser location and name translation #ser a%ailability #sers capabilities

2. Which of the following network server provides application layer routing of SIP requests and responses?
Pro"y ser%er Registrar ser%er Application ser%er -edia ser%er

3. Which of the following SIP request terminates a call?


ACA B>E INCITE CANCE6

4. Which of the following SIP responses denotes global failure response?


,IP ("" ,IP +"" ,IP )"" ,IP *""

5. __________________ is a protocol that is defined in RFC 2327.


,tream Control Transmission Protocol 7,CTP8 ,ession $escription Protocol 7,$P8 ,ession Announcement Protocol 7,AP8 Real:time Control Protocol 7RTCP8

6. Which of the following was designed for bit rates up to 1.5 Mbps in Moving Pictures Expert Group (MPEG) standards?
-PEB:+ -PEB:5

-PEB:( -PEB:&

1. Which of the following source description provides the geographic location of the application user?
E-AI6 T446 64C N4TE

2. Which of the following application uses 1.5 Mbps bandwidth?


!igh speed internet browsing Recording or later %iewing Two7+8other TCQ, 4ne7(8high de inition TC7!$TC8

3. ________________ packet is used by an RTP sender to provide local capability information in control information.
,ource description ,ender report Recei%er report APP

4. ___________ is the primary profile for broadcast and disc storage applications.
E"tended Pro ile 7RP8 Intended !igh Pro ile 7!iP8 !igh (3 Pro ile 7!i(3P8 !igh &O+O+ Pro ile 7!i&++P8

1. "1. User availability determines whether the called party is willing to engage in communication.

2. Session management is used for establishing the communication session parameters at both ends. 3. Users capabilities determines whether the called party is willing to engage in communication. 4. Session setup is used for establishing the communication session parameters at both ends." State true or false.

,tatements ( and + are alse ,tatements & and ( are true 4nly ,tatement 5 is true ,tatements + and 5 are true

2. "1. Analog Terminal Adapters (ATA) controls connections between the circuit and packet networks in segments.
2. Call Agent can use a TCP/IP link to manage multiple Media Gateways. 3. Coder-decoder (CODEC) can use a TCP/IP link to manage multiple Media Gateways. 4. Soft switch controls connections between the circuit and packet networks in segments." State true or false.

,tatements ( and + are alse ,tatements ( and 5 are true 4nly ,tatement 5 is true ,tatements + and & are true

3. "1. G.728 is a speech CODEC standard covering the transmission of voice at rates of 16, 24, 32, and 40 kbps.
2. G.711 (64 kbps) standard encodes non-compressed speech streams running at 64 Kbps. 3. G.726 is a speech CODEC standard covering the transmission of voice at rates of 16, 24, 32, and 40 kbps.

4. G.723.1, encodes non-compressed speech streams running at 64 Kbps." State true or false.

,tatements ( and + are alse ,tatements + and 5 are true 4nly ,tatement 5 is alse ,tatements ( and & are true