Sie sind auf Seite 1von 38

SUB:COMPUTER NTWORKS

FACULTY NAME:G.KOMALA(ASST.PROF IN IT DEPT)


Unit-1
INTRODUCTION TO COMPUTER NETWORKS
1) A network that requires human intervention of route signals is called a ?
A. Bus network
B. Ring network
C. Star network
D. T-switched network
E. None of above
Answer = D
2) Which layer functions as liaison between user support layers and network support layers ?
A.network layer
B. physical layer
C. transport layer
D. session layer
Answer = C
3) If digital data rate of 9600 bps is encoded using 8-level phase shift keying method, the
modulation rate is?
A.1200 bands
B.3200 bands
C.4800 bands
D.9600 bands
E.None of above
Answer = C
4) Maximum data rate of a channel for a noiseless 3-KHz binary channel is?
A.3000 bps

B.6000 bps
C.1500 bps
D.None of above
Answer = B
5) If the bit string 0111101111101111110 is subjected to bit stuffing for the flag string
01111110, the output string is ?
A.011110111110011111010
B.01111011111011111100
C.01111011111011111010
D.0111101111101111110
Answer = A
6) Which of the following is not a standard RS-232C signal ?
A.RTS
B.CTS
C.DSR
D.VDR
Answer = D
7) In Ethernet CSMS/CD the special bit sequence transmitted by the media access management
for collision handling is called as ?
A.preamble
B.postamble
C.jam
D.None of above
Answer = C
8) HDLC is ?
A.bit oriented
B.Code transparent

C.Code dependent
D.None of above
Answer = D
9) Which of the following are non-polling system ?
A.TDMA
B.stop & wait
C.Xon/Xoff
D.Continuous ARQ
E.A and C
Answer = E
10) Adaptive or dynamic directory used in packet routing changes ?
A.within each user session
B.with each user session
C.at system generation times only
D.Both A and B
Answer = A
11) Which of the following is not a type of Computer Network?

A.Local Area Network (LAN)


B.Personal Area Network (PAN)
C.Remote Area Network (RAN)
D.Metropolitan Area Network (MAN)
Answer = c
12) Full Form of NIC?

A.New Internet Connection


B.Network Interface Card

C.Network Interface Connection


D.Net Interface Card
Answer =B
13) Which of the following are type of Twisted Pair Cable?

A.Coaxial Cable
B.Shielded Twisted Pair (STP)
C.Unshielded Twisted Pair (UTP)
D.Only B and C
Answer = D
14) _________ Supports Data Rate Upto 1000 Mbps Gigabyte Ethernet.

A.CAT 1
B.Thinnet
C.CAT 5
D.CAT 5e
Answer = D
15) Which Color Coding of Cable is Used to Connect Similar Devices?

A.Straight Cable
B.Cross Over Cable
C.Serial Cable
D.All of Above.
Answer = B
16) HUB is a _________ Device and Switch is a ________ Device.

A.Unicast, Multicast

B.Malticast, Unicast
C.Broadcast, Unicast
D.None of Above
Answer = C
17) Switch is a Device of _________ Layer of OSI Model.

A.Network Layer
B.Data Link Layer
C.Application Layer
D.Session Layer
Answer = B
18) Star Topology is Based On a Central Device that can be __________ ?

A.HUB
B.Switch
C.Only A
D.Both A and B
Answer = D
19) TCP/IP is also well known as _______.

A.OSI Model
B.TCP Model
C.DOD Model
D.Network Model
Answer = C

20) IPX/SPX is used in ______________.

A.Novell's Netware Network


B.Mac - Macintosh
C.Apple
D.Microsoft
Answer = A

UNIT-2
DATA LINK LAYER
1. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?
A)

0 to 63

B)

0 to 64

C)

1 to 63

D)

1 to 64

2. In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an
ACK _______ to the sender.
A)

B)

C)

D)

any of the above

3. ARQ stands for _______.


A)

Automatic repeat quantization

B)

Automatic repeat request

C)

Automatic retransmission request

D)

Acknowledge repeat request

4.
For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are
needed.
A)

exactly 10

B)

less than 10

C)

more than 10

D)

none of the above

5.

HDLC is an acronym for _______.

A)

High-duplex line communication

B)

High-level data link control

C)

Half-duplex digital link combination

D)

Host double-level circuit

6.

Data link control deals with the design and procedures for ______ communication.

A)

node-to-node

B)

host-to-host

C)

process-to-process

D)

none of the above

7.
_______ in the data link layer separates a message from one source to a destination, or
from other messages going from other sources to other destinations.
A)

Digitizing

B)

Controlling

C)

Framing

D)

none of the above

8.

In _______ framing, there is no need for defining the boundaries of frames.

A)

fixed-size

B)

variable-size

C)

standard

D)

none of the above

9.

In ________ framing, we need a delimiter (flag) to define the boundary of two frames.

A)

fixed-size

B)

variable-size

C)

standard

D)

none of the above

10.
_________framing uses two categories of protocols: character-oriented and bitoriented.
A)

Fixed-size

B)

Variable-size

C)

Standard

D)

None of the above

11.

In a ________ protocol, the data section of a frame is a sequence of characters.

A)

bit-oriented

B)

character-oriented

C)

either (a) or (b)

D)

none of the above

12.

In a _________ protocol, the data section of a frame is a sequence of bits.

A)

byte-oriented

B)

bit-oriented

C)

either (a) or (b)

D)

none of the above

13.

In _________ protocols, we use ________.

A)

character-oriented; byte stuffing

B)

character-oriented; bit stuffing

C)

bit-oriented; character stuffing

D)

none of the above

14.
Byte stuffing means adding a special byte to the data section of the frame when there is
a character with the same pattern as the ______.
A)

header

B)

trailer

C)

flag

D)

none of the above

15.

In ________ protocols, we use ________.

A)

byte-oriented; bit stuffing

B)

character-oriented; bit stuffing

C)

bit-oriented; bit stuffing

D)

none of the above

16.
Bit stuffing means adding an extra 0 to the data section of the frame when there is a
sequence of bits with the same pattern as the ________.
A)

header

B)

trailer

C)

flag

D)

none of the above

17.
_______ control refers to a set of procedures used to restrict the amount of data that the
sender can send before waiting for acknowledgment.
A)

Flow

B)

Error

C)

Transmission

D)

none of the above

18.

______ control refers to methods of error detection and correction.

A)

Flow

B)

Error

C)

Transmission

D)

none of the above

19.
A)

The Simplest Protocol and the Stop-and-Wait Protocol are for ______ channels.
noisy

B)

noiseless

C)

either (a) or (b)

D)

neither (a) nor (b)

20.
The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for
______ channels.
A)

noisy

B)

noiseless

C)

either (a) or (b)

D)

neither (a) nor (b)

21.

The ____ Protocol has neither flow nor error control.

A)

Stop-and-Wait

B)

Simplest

C)

Go-Back-N ARQ

D)

Selective-Repeat ARQ

22.

The _______Protocol has flow control, but not error control.

A)

Stop-and-Wait

B)

Simplest

C)

Go-Back-N ARQ

D)

Selective-Repeat ARQ

23.

The _______Protocol has both flow control and error control.

A)

Stop-and-Wait

B)

Go-Back-N ARQ

C)

Selective-Repeat ARQ

D)

both (b) and (c)

Answers:
1

10

11

12

13

14

15

16

17

18

19

20

21

22

23

UNIT-3

1.

THE MEDIUM ACCESS SUBLAYER


Which protocol was based on the specification called the Ethernet

a.

IEEE 802.3

b.

CSMA/CD

c.

Both a & b

d.

None of these

2.

MAC(Medium Access Control)sub layer is between the

a.

Physical layer

b.

Data Link layer

c.

Both a & b

d.

None of these

3. Depending on the transmission media used, the Ethernet can be classified into following
categories are
a.

Thick Ethernet or 10base5

b.

Cheaper Net or Thin Net(10base2)

c.

Star LAN(10baseT)

d.

Optical Fibre CSMA/CD LAN (10baseF)

e.

All of these

4.

The characteristics of the Thick Ethernet cable are

a.

Provides connectivity to max of 1024 stations

b.

Cable supports a max distance of 500meters

c.

Max distance covered by a network using Thick Ethernet is 2.5Km

d.

Max no of stations supported by the Ethernet is 1024

e.

All of these

5.

A 10 Mbps cable is like a

a.

Blue hose

b.

Yellow hose

c.

Black hose

d.

None of these

6.

All stations in a Thick Ethernet is connected to a

a.

Twisted pair cable

b.

Coaxial cable

c.

CSMA/CD

d.

Transceiver

7.

A group of stations connected to a cable forms a

a.

Repeater

b.

Transceiver

c.

Segments

d.

Groups

8.

Which device is used to link two network segments, which are separated by a long distance

a.

Repeater

b.

Transceiver

c.

Segments

d.

Groups

9.

Each cable is connected to a Ethernet cable through a

a.

Repeater

b.

Transceiver

c.

Segments

d.

Groups

10. A repeater consists of _______ transceiver


a.

b.

c.

d.

11. The functions performed by physical layer are


a.

Encoding the data

b.

Medium access

c.

Data encapsulation

d.

Both a & b

12. The functions performed by logical layer are


a.

Data encapsulation

b.

Link management

c.

Medium access

d.

Both a & b

13. The computer or station is connected to a Ethernet card, Ethernet card consists of
a.

Station interface

b.

Data packet generator

c.

A link management unit

d.

All of these

14. The output of a Ethernet card is connected to the data encoder/decoder, which in turn is
connected to the transmission cable through a
a.

Repeater

b.

Transceiver

c.

Segments

d.

Groups

15. The IEEE802.3 Ethernet frame format are


a.

Preamble-7byte

b.

Start of frame-1byte

c.

Destination address-6byte

d.

Source address-6byte

e.

Length-2byte

f.

Information field-46to 1500bytes

g.

Frame check sequencer-4byte

h.

All of these

16. The local area networks that do not require the capabilities of complete Ethernet system, the
IEEE802.3 standard committee has created a new standard called
a.

Thin net

b.

Star LAN

c.

Optical fibre CSMA/CD

d.

None of these

17.

The characteristics of thin net or cheaper net is

a.

Max distance is up to 200meters

b.

Max no of nodes is 30

c.

Max stations per network is 1024

d.

Node spacing is 0.5meters

e.

Cable diameter is 0.25inches

f.

BNC-T-connector is used to connect cables and N-series connector

g.

All of these

18. The third variation of IEEE802.3 standard was a


a.

Thin net

b.

Star LAN

c.

Optical fibre CSMA/CD

d.

None of these

19. The characteristics of Star LAN are


a.

It operates data rate up to 1Mbps

b.

The configuration contains up to 5 upward levels of hubs

c.

Twisted pair cable already used in telephone lines for transmission media

d.

Each group of stations is connected to a local hub

e.

The hubs are connected in the form of tree

f.

All of these

20.

The characteristics of optical fibre CSMA/CD LAN are

a.

Good immunity to the electromagnetic interference

b.

Low loss of power

c.

High bandwidth

d.

Less weight

e.

High transmission security

f.

All of these

UNIT-4
THE NETWORK LAYER
1) Which protocol working at the Transport layer provides a connectionless service between
hosts?
IP
ARP
TCP
UDP
Answer = D
2) Which protocol works at the Transport layer and provides virtual circuits between hosts?
IP
ARP
TCP
UDP
Answer = C
3) Which protocol works at the Internet layer and provides a connection service between hosts?
IP
ARP
TCP
UDP
Answer = A
4) If a host broadcasts a frame that includes a source and destination hardware address, and its
purpose is to assign IP addresses to itself, which protocol at the Network layer does the host
use?
RARP

ARPA
ICMP
TCP
IPX
Answer = A
5) If a router interface is congested, which protocol in the IP suite is used to tell neighbor
routers?
RARP
ARP
ICMP
IP
TCP
Answer = C
6) What is the valid host range the IP address 172.16.10.22 255.255.255.240 is a part of?
172.16.10.20 through 172.16.10.22
172.16.10.1 through 172.16.10.255
172.16.10.16 through 172.16.10.23
172.16.10.17 through 172.16.10.31
172.16.10.17 through 172.16.10.30
Ansswer = E
7) What range of addresses can be used in the first octet of a Class B network address?
1-126
1-127
128-190
128-191
129-192
192-220

Answer = D
8) What range of addresses can be used in the first octet of a Class C address?
1-127
129-192
203-234
192-223
Answer = D

9) How many bytes is an Ethernet address?


3
4
5
6
7
8
16
Answer = D
10) What protocol is used to find the hardware address of a local device?
RARP
ARP
IP
ICMP
BootP
Answer = B
11) A network that requires human intervention of route signals is called a ?
Bus network

Ring network
Star network
T-switched network
None of above
Answer = D
12) Which layer functions as liaison between user support layers and network support layers ?
network layer
physical layer
transport layer
session layer
Answer = C
13) If digital data rate of 9600 bps is encoded using 8-level phase shift keying method, the
modulation rate is?
1200 bands
3200 bands
4800 bands
9600 bands
None of above
Answer = C
14) Maximum data rate of a channel for a noiseless 3-KHz binary channel is?
3000 bps
6000 bps
1500 bps
None of above
Answer = B
15) If the bit string 0111101111101111110 is subjected to bit stuffing for the flag string
01111110, the output string is ?

011110111110011111010
01111011111011111100
01111011111011111010
0111101111101111110
Answer = A
16) Which of the following is not a standard RS-232C signal ?
RTS
CTS
DSR
VDR
Answer = D
17) In Ethernet CSMS/CD the special bit sequence transmitted by the media access management
for collision handling is called as ?
preamble
postamble
jam
None of above
Answer = C
18) HDLC is ?
bit oriented
Code transparent
Code dependent
None of above
A and B
Answer = D
19) Which of the following are non-polling system ?
TDMA

stop & wait


Xon/Xoff
Continuous ARQ
A and C
Answer = E
20) Adaptive or dynamic directory used in packet routing changes ?
within each user session
with each user session
at system generation times only
Both A and B

Unit5
5.INTERNETWORKING

1. How does a host on an Ethernet LAN know when to transmit after a collision has occurred?
1. In a CSMA/CD collision domain, multiple stations can successfully transmit data
simultaneously.
2. In a CSMA/CD collision domain, stations must wait until the media is not in use
before transmitting.
3. You can improve the CSMA/CD network by adding more hubs.
4. After a collision, the station that detected the collision has first priority to resend the
lost data.
5. After a collision, all stations run a random backoff algorithm. When the backoff delay
period has expired, all stations have equal priority to transmit data.
A.

1 and 3

B.

2 and 4

C.

1,3 and 4

D.

2 and 5

Answer D
2. Which of the following types of connections can use full duplex?
1.
2.
3.
4.
5.

Hub to hub
Switch to switch
Host to host
Switch to hub
Switch to host

A.

1, 2 and 4

B.

3 and 4

C.

3 and 5

D.

2, 3 and 5

Answer D
3. Acknowledgments, sequencing, and flow control are characteristics of which OSI layer?
A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 7

Answer C
4. Which fields are contained within an IEEE Ethernet frame header?
1.
2.
3.
4.

Source and destination MAC address


Source and destination network address
Source and destination MAC address and source and destination network address
FCS field

A.

1 and 4

B.

2 only

C.

2 and 3 only

D.

3 only

Answer: Option A

5. What type of RJ45 UTP cable do you use to connect a PC's COM port to a router or switch
console port?
A.

Straight-through

B.

Crossover cable

C.

Crossover with a CSU/DSU

D.

Rolled

Answer: D

6. What are the two types of transmission technology available?


(i) Broadcast and (ii) point-to-point
7. What is subnet?
A generic term for section of a large networks usually separated by a bridge or router.
8. Difference between the communication and transmission.
Transmission is a physical movement of information and concern issues like bit polarity,
synchronisation, clock etc.
Communication means the meaning full exchange of information between two
communication media.
9. What are the possible ways of data exchange?
(i) Simplex (ii) Half-duplex (iii) Full-duplex.
10. What is SAP?
Series of interface points that allow other computers to communicate with the other layers of
network protocol stack.
11. What do you meant by "triple X" in Networks?
The function of PAD (Packet Assembler Disassembler) is described in a document known as
X.3. The standard protocol has been defined between the terminal and the PAD, called X.28;
another standard protocol exists between hte PAD and the network, called X.29. Together,
these three recommendations are often called "triple X".

12. What is packet filter?


Packet filter is a standard router equipped with some extra functionality. The extra
functionality allows every incoming or outgoing packet to be inspected. Packets meeting
some criterion are forwarded normally. Those that fail the test are dropped.

13. What is traffic shaping?


One of the main causes of congestion is that traffic is often busy. If hosts could be made to
transmit at a uniform rate, congestion would be less common. Another open loop method to
help manage congestion is forcing the packet to be transmitted at a more predictable rate.
This is called traffic shaping.
14. What is multicast routing?
Sending a message to a group is called multicasting, and its routing algorithm is called
multicast routing.
15. What is region?
When hierarchical routing is used, the routers are divided into what we will call regions, with
each router knowing all the details about how to route packets to destinations within its own
region, but knowing nothing about the internal structure of other regions.
16. What is silly window syndrome?
It is a problem that can ruin TCP performance. This problem occurs when data are passed to
the sending TCP entity in large blocks, but an interactive application on the receiving side
reads 1 byte at a time.
17. What are Digrams and Trigrams?
The most common two letter combinations are called as digrams. e.g. th, in, er, re and an.
The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion.
18. What is Proxy ARP?
It is using a router to answer ARP requests. This will be done when the originating host
believes that a destination is local, when in fact is lies beyond router.
19. What is SLIP (Serial Line Interface Protocol)?
It is a very simple protocol used for transmission of IP datagrams across a serial line.
20. What is RIP (Routing Information Protocol)?
It is a simple protocol used to exchange information between the routers.
21. What is source route?
It is a sequence of IP addresses identifying the route a datagram must follow. A source route
may optionally be included in an IP datagram header.

Unit-6
TRANSPORT LAYER
1.Whichtransportlayerprotocolprovidesconnectionoriented,reliabletransport?

A.TFTP
B.UDP
C.Ethernet
D.TCP
E.SecureShell
2.Which protocol working at the Transport layer provides a connectionless service between
hosts?
A.IP
B.ARP
C. TCP
D. UDP
Answer = D

3) Which protocol works at the Transport layer and provides virtual circuits between hosts?

A. IP
B. ARP
C. TCP
D. UDP

Answer = C

4) Which protocol works at the Internet layer and provides a connection service between hosts?

A. IP
B. ARP
C. TCP
D. UDP
Answer = A
5 .What is classless addressing?
In classless addressing, there are variable-length blocks that belong to no class. The entire
address space is divided into blocks based on organization needs.
6. What is Encapsulation and De-capsulation ?
To send a message from one application program to another, the TCP/UDP protocol
encapsulates and de-capsulate messages.
7. What is Multiplexing and De-multiplexing?
In the TCP/IP protocol suite, there is one TCP but there are several application programs that
may want to use its services. To handle this situation TCP does multiplexing and demultiplexing.
8. Explain buffering?
TCP creates sending and receiving buffers for each connection. TCP uses a buffer to store the
stream of data coming from the sending application program. The receiving TCP also buffer data
when
they arrive and deliver them to the application program.
9. What is connection establishment?
TCP transmit data in full-duplex mode, when two TCPs in two machines are connected they

are able to send segments to each other simultaneously. This implies that each party must
initialize
communication and get approval from the other party before any data transfer is called
connection
establishment.
10. What is connection termination?
Any of the two parties involved in exchanging data can close the connection. When connection
in one direction is terminated, the other party can continue sending data in the other direction.
Therefore both machines are needed to close the connection in both direction.
11.What is classless addressing?
In classless addressing, there are variable-length blocks that belong to no class. The entire
address space is divided into blocks based on organization needs.
12. What is root server?
A root server is a server whose zone consists of the whole tree. A root server usually does not
store any information about domains but delegates its authority to other servers, keeping
references to
those servers.
13. What is simple mail transfer protocol?
The TCP/IP protocol that supports electronic mail on the internet is called Simple Mail
Transfer Protocol (SMTP). It is a system for sending messages to other computer users based on
email
addresses.
14. What is User Agent?
A user Agent is defined in SMTP, but the implementation details are not. The UA is normally a
program used to send and receive mail. Popular user agent programs are MH, Berkeley Mail,
Elm,
Zmail, and Mush.

15. What is Mail Transfer Agent?


The actual mail transfer is done through mail transfer agents (MTAs). To send mail, a system
must have the client MTA, and to receive mail, a system must have a server MTA.
16. Describe mail address.
The mail address consists of two parts: a local address (user mailbox) and a domain name. The
form is localname@domainname
17. What are steps to transfer a mail message?
The steps in transferring a mail message are
a) Connection establishment
b) Mail transfer
c) Connection termination
18. What is MIME?
Multipurpose Internet Mail Extension (MIME) is an extension of SMTP that allows the transfer.
19. What is ISOC?
The Internet Society (ISOC) promotes research and other scholarly activities relating
to the Internet.
20. Who is IAB?
The Internet Architecture Board (lAB) is the technical advisor to the ISOC.

Unit-7
APPLICATION LAYER

1. What is the purpose of client-server model?


The purpose of a network, or an internetwork is to provide services to end users. A user at a local
site wants to receive a service from a computer at a remote site. To achieve this a computer runs
aprogram to request a service from another program and also provide service to another
computer. Thismeans that two computer connected by an internet, must each run a program, one
to provide a serviceand one to request a service.
2. What is concurrency in server?
A concurrent server can process many request at the same time and can share its time between
many request.
3. What is BOOTP?
BOOTSTRAP Protocol is a client/server protocol designed to provide the following four
information for a diskless computer or a computer that is booted for the first time.
IP address, Subnet mask, IP address of a router, IP address of a name server.
4. What is DHCP?
The Dynamic Host Configuration Protocol has been derived to provide dynamic configuration.
DHCP is also needed when a host moves from network to network or is connected and
disconnected
from a network.
5. What is DNS?
Domain name service is the method by which Internet address in mnemonic form such as
sun.it.ac.in are converted into the equivalent numeric IP address such as 134.220.4.1. To the user
andapplication process this translation is a service provided either by the local host or from the
remote host via the Internet. The DNS server may communicate with other internet DNS server
if it cannot translate the address itself.
6. What is Fully Qualified Domain Name?
If a label is terminated by a null string is called a Fully Qualified Domain Name.

Eg. Excellect.oprt.nit.com.
7. What is Partially Qualified Domain Name?
If a label is not terminated by a null string is called Partially Qualified Domain Name.
8. What is DNS?
Domain name service is the method by which Internet address in mnemonic form such as
sun.it.ac.in are converted into the equivalent numeric IP address such as 134.220.4.1. To the user
and application process this translation is a service provided either by the local host or from the
remote host via the Internet. The DNS server may communicate with other internet DNS server
if it cannot translate the address itself.
9. What is Fully Qualified Domain Name?
If a label is terminated by a null string is called a Fully Qualified Domain Name.
Eg. Excellect.oprt.nit.com.
10. What is Partially Qualified Domain Name?
If a label is not terminated by a null string is called Partially Qualified Domain Name.
Eg. Excellent
11. What is Generic Domains?
Generic domain define registered hosts according to their generic behaviour. Each node in the
tree defines a domain, which is an index to the domain name space database.
Eg. com Commercial organizations
edu - Educational institutions
gov - Government institutions
12. What is Country Domain?
The country domain section follows the same format as the generic domains but uses two
characters country abbreviations.
Eg. in - India
us - United States
uk - United Kingdom

13. What are the modules and tables are in IP package?


An IP package can consist of the following: a header-adding module, a processing module, a
routing module, a fragmentation module, a reassembly module, a routing table, an MTU table,
and a
reassembly table.
14. Why do we need subnetting of a network?
Subnetting divides one large network into several smaller ones
15. What is the format of UDP packet?Explain.
Header and data. Header contains: Source port number, Destination port number, Total length,
Checksum.
16. Describe the various fields in IP Header format.
The fields in the IP header that relate to fragmentation are the identification number, the
fragmentation flags, and the fragmentation offset.
17. Give the importance and working of DHCP.
The DHCP has been devised to provide dynamic configuration. DHCP is an extension to
BOOTP.
18. List the various timers used in TCP.
Retransmission, Persistence, Keep alive and Time-waited.
19. How is a connection established and terminated in TCP?
Three way handshaking and four way handshaking.
20. What is Zone?
What a server is responsible for or has authority over is called a zone. If a server accepts
responsibility for a domain and does not divide the domain into smaller domains, the domain
and thezone refer to the same thing multimedia messages.

UNIT-8
NETWORK SECURITY
1. Which of the following are primary categories of remote attacks against information
systems?
A. Pilfer
B. Sabotage
C. Modification
D. Social engineering
2. ________ is where the attacker exploits the good nature of an employee to get the employee
to reveal sensitive information.
A. Masquerading
B. Social engineering
C. Impersonation
D. Good Samaritan
3. You return to your office to pick up you forgot take with you for an early morning meeting
the next day. As you enter your office , you find the janitor sitting at your desk going through
a sensitive project you have been working on for the last several months. This is an example
of ________
A. Social engineering
B. Snooping
C. Denial of service
D. Repudiation
4. Which of the following is an example of how electronic information can be taken without the
owner being aware of it?A.
A. The information can be deleted
B. The information can be moved
C. The information can be copied
D. The information can be locked
5. The introduction of wireless has increased the opportunity for attcks to _______
A. Socially engineer
B. Evesdrop
C. Repudiate
D. Change transmitted information
6. Information produced on paper is most likely to be found in whichof the following
locations?
A. Hard drives
B. Filling cabinets
C. PC desktops
D. Zip drives

7. In order for an attacker to be able to snoop, they must have _______


A. Physical access
B. Special access
C. Cleared access
D. Privileged access
8. If access controls have been properly set, an un authorized individual would be ____
A. Granted access
B. Denied access
C. Immediately detected
D. undetected
9. Which of the following is a location where you could possibly access a wireless network
using typical antenna?
A. The floors immediately above and below the access point.
B. In a facility that been shielded.
C. Three blocks away.
D. Across the city.
10. Which of the following is true concerning modification attacks?
A. Modifying paper information is easier than electronic information.
B. Modifying paper information is more difficult to detect.
C. A modification attack on transmitted information is more difficult.
D. A modification attack on electronic data is equally difficult as paper information.
11. You are attempting to work on a document and the word processor used to access the
information will not launch. Further investigation shows the software configuration has been
altered. What type of attack is this?
A. Social engineering
B. Change attack
C. Denial of application
D. Denial of systems
12. You are trying to open data that you previously used. When you try to open the floder that
contains the data , you receive an error that the data cannot at that location. This is
characteristic of a ________
A. Denial of access to information
B. Denial of access applications
C. Denial of access systems
D. Denial of access flodres
13. Dos attacks are primarily directed toward _______
A. Paper- based systems
B. Computer systems
C. Government systems

D. Voice communications
14. An attacker calls the help desk, posing as the new vice president of the department, and asks
for access to a floder that contains sensitive company information information. The help desk
technician initially challenges the caller, but the caller tells the help desk technician that if he
has questions he should contact the human resources director, providing the directors name.
The technician decides that if the person knows the director of human resources, he must be
legitimate , so the technician grants the caller access to the floder. What techniques is the
caller using?
A. Denial of service
B. Modification attack
C. Social engineering
D. Brute force attack
15. Which of the following is an example of asuitation where repudiation attack is more likely to
occur?
A. Making your DMA look like that of another system.
B. Sending a digitally signed email using a smart card and password
C. Making a financial transaction on the internet
D. Making a financial transaction in a store where ID is clicked.
16. Which of the following is the term most commonly associated with person who breaks into
computer or networked systems?
A. Cracker
B. Cyberpunk
C. Hacker
D. User
17. Which is the most common motivation for hackers to break into computers?
A. The challenge
B. Greed
C. Malicious intent
D. Being dared
18. What causes buffer overflows?
A. A programming flaw
B. A shell program
C. A SYN flood
D. A stack
19. Most denial of service attacks originate from __________.
A. Trojan horse programs
B. Reconnaissance
C. Legitimate systems
D. Spoofed system

20. Short passwords will allow an attackler to use ______ to break in.
A. Brute force
B. Social engineering
C. Viruses
D. spoofing

Das könnte Ihnen auch gefallen