Beruflich Dokumente
Kultur Dokumente
B.6000 bps
C.1500 bps
D.None of above
Answer = B
5) If the bit string 0111101111101111110 is subjected to bit stuffing for the flag string
01111110, the output string is ?
A.011110111110011111010
B.01111011111011111100
C.01111011111011111010
D.0111101111101111110
Answer = A
6) Which of the following is not a standard RS-232C signal ?
A.RTS
B.CTS
C.DSR
D.VDR
Answer = D
7) In Ethernet CSMS/CD the special bit sequence transmitted by the media access management
for collision handling is called as ?
A.preamble
B.postamble
C.jam
D.None of above
Answer = C
8) HDLC is ?
A.bit oriented
B.Code transparent
C.Code dependent
D.None of above
Answer = D
9) Which of the following are non-polling system ?
A.TDMA
B.stop & wait
C.Xon/Xoff
D.Continuous ARQ
E.A and C
Answer = E
10) Adaptive or dynamic directory used in packet routing changes ?
A.within each user session
B.with each user session
C.at system generation times only
D.Both A and B
Answer = A
11) Which of the following is not a type of Computer Network?
A.Coaxial Cable
B.Shielded Twisted Pair (STP)
C.Unshielded Twisted Pair (UTP)
D.Only B and C
Answer = D
14) _________ Supports Data Rate Upto 1000 Mbps Gigabyte Ethernet.
A.CAT 1
B.Thinnet
C.CAT 5
D.CAT 5e
Answer = D
15) Which Color Coding of Cable is Used to Connect Similar Devices?
A.Straight Cable
B.Cross Over Cable
C.Serial Cable
D.All of Above.
Answer = B
16) HUB is a _________ Device and Switch is a ________ Device.
A.Unicast, Multicast
B.Malticast, Unicast
C.Broadcast, Unicast
D.None of Above
Answer = C
17) Switch is a Device of _________ Layer of OSI Model.
A.Network Layer
B.Data Link Layer
C.Application Layer
D.Session Layer
Answer = B
18) Star Topology is Based On a Central Device that can be __________ ?
A.HUB
B.Switch
C.Only A
D.Both A and B
Answer = D
19) TCP/IP is also well known as _______.
A.OSI Model
B.TCP Model
C.DOD Model
D.Network Model
Answer = C
UNIT-2
DATA LINK LAYER
1. In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?
A)
0 to 63
B)
0 to 64
C)
1 to 63
D)
1 to 64
2. In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an
ACK _______ to the sender.
A)
B)
C)
D)
B)
C)
D)
4.
For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are
needed.
A)
exactly 10
B)
less than 10
C)
more than 10
D)
5.
A)
B)
C)
D)
6.
Data link control deals with the design and procedures for ______ communication.
A)
node-to-node
B)
host-to-host
C)
process-to-process
D)
7.
_______ in the data link layer separates a message from one source to a destination, or
from other messages going from other sources to other destinations.
A)
Digitizing
B)
Controlling
C)
Framing
D)
8.
A)
fixed-size
B)
variable-size
C)
standard
D)
9.
In ________ framing, we need a delimiter (flag) to define the boundary of two frames.
A)
fixed-size
B)
variable-size
C)
standard
D)
10.
_________framing uses two categories of protocols: character-oriented and bitoriented.
A)
Fixed-size
B)
Variable-size
C)
Standard
D)
11.
A)
bit-oriented
B)
character-oriented
C)
D)
12.
A)
byte-oriented
B)
bit-oriented
C)
D)
13.
A)
B)
C)
D)
14.
Byte stuffing means adding a special byte to the data section of the frame when there is
a character with the same pattern as the ______.
A)
header
B)
trailer
C)
flag
D)
15.
A)
B)
C)
D)
16.
Bit stuffing means adding an extra 0 to the data section of the frame when there is a
sequence of bits with the same pattern as the ________.
A)
header
B)
trailer
C)
flag
D)
17.
_______ control refers to a set of procedures used to restrict the amount of data that the
sender can send before waiting for acknowledgment.
A)
Flow
B)
Error
C)
Transmission
D)
18.
A)
Flow
B)
Error
C)
Transmission
D)
19.
A)
The Simplest Protocol and the Stop-and-Wait Protocol are for ______ channels.
noisy
B)
noiseless
C)
D)
20.
The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for
______ channels.
A)
noisy
B)
noiseless
C)
D)
21.
A)
Stop-and-Wait
B)
Simplest
C)
Go-Back-N ARQ
D)
Selective-Repeat ARQ
22.
A)
Stop-and-Wait
B)
Simplest
C)
Go-Back-N ARQ
D)
Selective-Repeat ARQ
23.
A)
Stop-and-Wait
B)
Go-Back-N ARQ
C)
Selective-Repeat ARQ
D)
Answers:
1
10
11
12
13
14
15
16
17
18
19
20
21
22
23
UNIT-3
1.
a.
IEEE 802.3
b.
CSMA/CD
c.
Both a & b
d.
None of these
2.
a.
Physical layer
b.
c.
Both a & b
d.
None of these
3. Depending on the transmission media used, the Ethernet can be classified into following
categories are
a.
b.
c.
Star LAN(10baseT)
d.
e.
All of these
4.
a.
b.
c.
d.
e.
All of these
5.
a.
Blue hose
b.
Yellow hose
c.
Black hose
d.
None of these
6.
a.
b.
Coaxial cable
c.
CSMA/CD
d.
Transceiver
7.
a.
Repeater
b.
Transceiver
c.
Segments
d.
Groups
8.
Which device is used to link two network segments, which are separated by a long distance
a.
Repeater
b.
Transceiver
c.
Segments
d.
Groups
9.
a.
Repeater
b.
Transceiver
c.
Segments
d.
Groups
b.
c.
d.
b.
Medium access
c.
Data encapsulation
d.
Both a & b
Data encapsulation
b.
Link management
c.
Medium access
d.
Both a & b
13. The computer or station is connected to a Ethernet card, Ethernet card consists of
a.
Station interface
b.
c.
d.
All of these
14. The output of a Ethernet card is connected to the data encoder/decoder, which in turn is
connected to the transmission cable through a
a.
Repeater
b.
Transceiver
c.
Segments
d.
Groups
Preamble-7byte
b.
Start of frame-1byte
c.
Destination address-6byte
d.
Source address-6byte
e.
Length-2byte
f.
g.
h.
All of these
16. The local area networks that do not require the capabilities of complete Ethernet system, the
IEEE802.3 standard committee has created a new standard called
a.
Thin net
b.
Star LAN
c.
d.
None of these
17.
a.
b.
Max no of nodes is 30
c.
d.
e.
f.
g.
All of these
Thin net
b.
Star LAN
c.
d.
None of these
b.
c.
Twisted pair cable already used in telephone lines for transmission media
d.
e.
f.
All of these
20.
a.
b.
c.
High bandwidth
d.
Less weight
e.
f.
All of these
UNIT-4
THE NETWORK LAYER
1) Which protocol working at the Transport layer provides a connectionless service between
hosts?
IP
ARP
TCP
UDP
Answer = D
2) Which protocol works at the Transport layer and provides virtual circuits between hosts?
IP
ARP
TCP
UDP
Answer = C
3) Which protocol works at the Internet layer and provides a connection service between hosts?
IP
ARP
TCP
UDP
Answer = A
4) If a host broadcasts a frame that includes a source and destination hardware address, and its
purpose is to assign IP addresses to itself, which protocol at the Network layer does the host
use?
RARP
ARPA
ICMP
TCP
IPX
Answer = A
5) If a router interface is congested, which protocol in the IP suite is used to tell neighbor
routers?
RARP
ARP
ICMP
IP
TCP
Answer = C
6) What is the valid host range the IP address 172.16.10.22 255.255.255.240 is a part of?
172.16.10.20 through 172.16.10.22
172.16.10.1 through 172.16.10.255
172.16.10.16 through 172.16.10.23
172.16.10.17 through 172.16.10.31
172.16.10.17 through 172.16.10.30
Ansswer = E
7) What range of addresses can be used in the first octet of a Class B network address?
1-126
1-127
128-190
128-191
129-192
192-220
Answer = D
8) What range of addresses can be used in the first octet of a Class C address?
1-127
129-192
203-234
192-223
Answer = D
Ring network
Star network
T-switched network
None of above
Answer = D
12) Which layer functions as liaison between user support layers and network support layers ?
network layer
physical layer
transport layer
session layer
Answer = C
13) If digital data rate of 9600 bps is encoded using 8-level phase shift keying method, the
modulation rate is?
1200 bands
3200 bands
4800 bands
9600 bands
None of above
Answer = C
14) Maximum data rate of a channel for a noiseless 3-KHz binary channel is?
3000 bps
6000 bps
1500 bps
None of above
Answer = B
15) If the bit string 0111101111101111110 is subjected to bit stuffing for the flag string
01111110, the output string is ?
011110111110011111010
01111011111011111100
01111011111011111010
0111101111101111110
Answer = A
16) Which of the following is not a standard RS-232C signal ?
RTS
CTS
DSR
VDR
Answer = D
17) In Ethernet CSMS/CD the special bit sequence transmitted by the media access management
for collision handling is called as ?
preamble
postamble
jam
None of above
Answer = C
18) HDLC is ?
bit oriented
Code transparent
Code dependent
None of above
A and B
Answer = D
19) Which of the following are non-polling system ?
TDMA
Unit5
5.INTERNETWORKING
1. How does a host on an Ethernet LAN know when to transmit after a collision has occurred?
1. In a CSMA/CD collision domain, multiple stations can successfully transmit data
simultaneously.
2. In a CSMA/CD collision domain, stations must wait until the media is not in use
before transmitting.
3. You can improve the CSMA/CD network by adding more hubs.
4. After a collision, the station that detected the collision has first priority to resend the
lost data.
5. After a collision, all stations run a random backoff algorithm. When the backoff delay
period has expired, all stations have equal priority to transmit data.
A.
1 and 3
B.
2 and 4
C.
1,3 and 4
D.
2 and 5
Answer D
2. Which of the following types of connections can use full duplex?
1.
2.
3.
4.
5.
Hub to hub
Switch to switch
Host to host
Switch to hub
Switch to host
A.
1, 2 and 4
B.
3 and 4
C.
3 and 5
D.
2, 3 and 5
Answer D
3. Acknowledgments, sequencing, and flow control are characteristics of which OSI layer?
A.
Layer 2
B.
Layer 3
C.
Layer 4
D.
Layer 7
Answer C
4. Which fields are contained within an IEEE Ethernet frame header?
1.
2.
3.
4.
A.
1 and 4
B.
2 only
C.
2 and 3 only
D.
3 only
Answer: Option A
5. What type of RJ45 UTP cable do you use to connect a PC's COM port to a router or switch
console port?
A.
Straight-through
B.
Crossover cable
C.
D.
Rolled
Answer: D
Unit-6
TRANSPORT LAYER
1.Whichtransportlayerprotocolprovidesconnectionoriented,reliabletransport?
A.TFTP
B.UDP
C.Ethernet
D.TCP
E.SecureShell
2.Which protocol working at the Transport layer provides a connectionless service between
hosts?
A.IP
B.ARP
C. TCP
D. UDP
Answer = D
3) Which protocol works at the Transport layer and provides virtual circuits between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer = C
4) Which protocol works at the Internet layer and provides a connection service between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer = A
5 .What is classless addressing?
In classless addressing, there are variable-length blocks that belong to no class. The entire
address space is divided into blocks based on organization needs.
6. What is Encapsulation and De-capsulation ?
To send a message from one application program to another, the TCP/UDP protocol
encapsulates and de-capsulate messages.
7. What is Multiplexing and De-multiplexing?
In the TCP/IP protocol suite, there is one TCP but there are several application programs that
may want to use its services. To handle this situation TCP does multiplexing and demultiplexing.
8. Explain buffering?
TCP creates sending and receiving buffers for each connection. TCP uses a buffer to store the
stream of data coming from the sending application program. The receiving TCP also buffer data
when
they arrive and deliver them to the application program.
9. What is connection establishment?
TCP transmit data in full-duplex mode, when two TCPs in two machines are connected they
are able to send segments to each other simultaneously. This implies that each party must
initialize
communication and get approval from the other party before any data transfer is called
connection
establishment.
10. What is connection termination?
Any of the two parties involved in exchanging data can close the connection. When connection
in one direction is terminated, the other party can continue sending data in the other direction.
Therefore both machines are needed to close the connection in both direction.
11.What is classless addressing?
In classless addressing, there are variable-length blocks that belong to no class. The entire
address space is divided into blocks based on organization needs.
12. What is root server?
A root server is a server whose zone consists of the whole tree. A root server usually does not
store any information about domains but delegates its authority to other servers, keeping
references to
those servers.
13. What is simple mail transfer protocol?
The TCP/IP protocol that supports electronic mail on the internet is called Simple Mail
Transfer Protocol (SMTP). It is a system for sending messages to other computer users based on
email
addresses.
14. What is User Agent?
A user Agent is defined in SMTP, but the implementation details are not. The UA is normally a
program used to send and receive mail. Popular user agent programs are MH, Berkeley Mail,
Elm,
Zmail, and Mush.
Unit-7
APPLICATION LAYER
Eg. Excellect.oprt.nit.com.
7. What is Partially Qualified Domain Name?
If a label is not terminated by a null string is called Partially Qualified Domain Name.
8. What is DNS?
Domain name service is the method by which Internet address in mnemonic form such as
sun.it.ac.in are converted into the equivalent numeric IP address such as 134.220.4.1. To the user
and application process this translation is a service provided either by the local host or from the
remote host via the Internet. The DNS server may communicate with other internet DNS server
if it cannot translate the address itself.
9. What is Fully Qualified Domain Name?
If a label is terminated by a null string is called a Fully Qualified Domain Name.
Eg. Excellect.oprt.nit.com.
10. What is Partially Qualified Domain Name?
If a label is not terminated by a null string is called Partially Qualified Domain Name.
Eg. Excellent
11. What is Generic Domains?
Generic domain define registered hosts according to their generic behaviour. Each node in the
tree defines a domain, which is an index to the domain name space database.
Eg. com Commercial organizations
edu - Educational institutions
gov - Government institutions
12. What is Country Domain?
The country domain section follows the same format as the generic domains but uses two
characters country abbreviations.
Eg. in - India
us - United States
uk - United Kingdom
UNIT-8
NETWORK SECURITY
1. Which of the following are primary categories of remote attacks against information
systems?
A. Pilfer
B. Sabotage
C. Modification
D. Social engineering
2. ________ is where the attacker exploits the good nature of an employee to get the employee
to reveal sensitive information.
A. Masquerading
B. Social engineering
C. Impersonation
D. Good Samaritan
3. You return to your office to pick up you forgot take with you for an early morning meeting
the next day. As you enter your office , you find the janitor sitting at your desk going through
a sensitive project you have been working on for the last several months. This is an example
of ________
A. Social engineering
B. Snooping
C. Denial of service
D. Repudiation
4. Which of the following is an example of how electronic information can be taken without the
owner being aware of it?A.
A. The information can be deleted
B. The information can be moved
C. The information can be copied
D. The information can be locked
5. The introduction of wireless has increased the opportunity for attcks to _______
A. Socially engineer
B. Evesdrop
C. Repudiate
D. Change transmitted information
6. Information produced on paper is most likely to be found in whichof the following
locations?
A. Hard drives
B. Filling cabinets
C. PC desktops
D. Zip drives
D. Voice communications
14. An attacker calls the help desk, posing as the new vice president of the department, and asks
for access to a floder that contains sensitive company information information. The help desk
technician initially challenges the caller, but the caller tells the help desk technician that if he
has questions he should contact the human resources director, providing the directors name.
The technician decides that if the person knows the director of human resources, he must be
legitimate , so the technician grants the caller access to the floder. What techniques is the
caller using?
A. Denial of service
B. Modification attack
C. Social engineering
D. Brute force attack
15. Which of the following is an example of asuitation where repudiation attack is more likely to
occur?
A. Making your DMA look like that of another system.
B. Sending a digitally signed email using a smart card and password
C. Making a financial transaction on the internet
D. Making a financial transaction in a store where ID is clicked.
16. Which of the following is the term most commonly associated with person who breaks into
computer or networked systems?
A. Cracker
B. Cyberpunk
C. Hacker
D. User
17. Which is the most common motivation for hackers to break into computers?
A. The challenge
B. Greed
C. Malicious intent
D. Being dared
18. What causes buffer overflows?
A. A programming flaw
B. A shell program
C. A SYN flood
D. A stack
19. Most denial of service attacks originate from __________.
A. Trojan horse programs
B. Reconnaissance
C. Legitimate systems
D. Spoofed system
20. Short passwords will allow an attackler to use ______ to break in.
A. Brute force
B. Social engineering
C. Viruses
D. spoofing