Beruflich Dokumente
Kultur Dokumente
1. The __________ is the physical path over 8. In a network with 25 computers, which
which a message travels topology would require the most extensive
a. Protocol cabling?
b. Medium a. Mesh
c. Signal b. Star
d. All of the above c. Bus
d. Ring
2. The information to be communicated in a
data system is the ___________. 9. A television broadcast is an example of
a. Medium ______________ transmission.
b. Protocol a. Simplex
c. Message b. Half-duplex
d. Transmission c. Full-duplex
d. Automatic
3. Frequency of failure and network recovery
time after a failure are measures of the 10. A ______________ connection provides a
__________ of a network. dedicated link between two devices.
a. Performance a. Point-to-point
b. Reliability b. Multipoint
c. Security c. Primary
d. Feasibility d. Secondary
1. The Internet model consists of _________ 8. Layer 2 lies between the physical layer and
layers. the _____________ layer.
a. Three a. Network
b. Five b. Data link
c. Seven c. Transport
d. Eight d. None of the above
2. The process-to-process delivery of the entire 9. When data are transmitted from device A to
message is the responsibility of the ___________ device B, the header from A’s layer 4 is read by
layer. B’s ___________ layer.
a. Network a. Physical
b. Transport b. Transport
c. Application c. Application
d. Physical d. None of the above
3. The __________ layer is the layer closest to 10. The ____________ layer changes bits into
the transmission medium. electromagnetic signals.
a. Physical a. Physical
b. Data link b. Data link
c. Network c. Transport
d. Transport d. None of the above
4. Mail services are available to network users 11. The physical layer is concerned with the
through the __________ layer. transmission of _____________ over the physical
a. Data link medium.
b. Physical a. Programs
c. Transport b. Dialogs
d. Application c. Protocols
d. Bits
5. As the data packet moves from the lower to
the upper layers, headers are ________. 12. Which layer functions as a liaison between
a. Added user support layers and network support
b. Subtracted layers?
c. Rearranged a. Network layer
d. Modified b. Physical layer
c. Transport layer
6. As the data packet moves from the upper to d. Application layer
the lower layers, headers are __________.
a. Added 13. What is the main function of the transport
b. Removed layer?
c. Rearranged a. Node-to-node delivery
d. Modified b. Process-to-process delivery
c. Synchronization
7. The __________ layer lies between the network d. Updating and maintenance of routing
layer and the application layer. tables
a. Physical
b. Data link 14. Which of the following is an application
c. Transport layer service?
d. None of the above a. Remote log-in
b. File transfer and access
c. Mail service
d. All of the above
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 3: Signals
1. Before data can be transmitted, they must be 8. In a time-domain plot, the horizontal axis is
transformed to _____________. a measure of _______________.
a. Periodic signals a. Signal amplitude
b. Electromagnetic signals b. Frequency
c. Aperiodic signals c. Phase
d. Low-frequency sine waves d. Time
2. A periodic signal completes one cycle in 9. If the bandwidth of a signal is 5 kHz and the
0.001 seconds. What is the frequency? lowest frequency is 52 kHz, what is the highest
a. 1 Hz frequency?
b. 100 Hz a. 5 kHz
c. 1 kHz b. 10 kHz
d. 1 MHz c. 47 kHz
d. 57 kHz
3. Which of the following can be determined
from a frequency-domain graph of a signal? 10. What is the bandwidth of a signal that
a. Frequency ranges from 40 kHz to 4 MHz?
b. Phase a. 36 MHz
c. Power b. 360 kHz
d. All of the above c. 3.96 MHz
d. 396 kHz
4. Which of the following can be determined
from a frequency-domain graph of a signal? 11. When one of the components of a signal has
a. Bandwidth a frequency of zero, the average amplitude of
b. Phase the signal ____________.
c. Power a. Is greater than zero
d. All of the above b. Is less than zero
c. Is zero
5. In a frequency-domain plot, the vertical axis d. A or B
measures the _____________.
a. Peak amplitude 12. A periodic signal can always be decomposed
b. Frequency into ______________.
c. Phase a. Exactly an odd number of sine waves
d. Slope b. A set of sine waves
c. A set of sine waves, one of which must
6. In a frequency-domain plot, the horizontal have a phase of 0o
axis measures the _____________. d. None of the above
a. Peak amplitude
b. Frequency 13. As frequency increase, the period
c. Phase ____________.
d. Slope a. Decreases
b. Increases
7. In a time-domain plot, the vertical axis is a c. Remains the same
measure of _______________. d. Doubles
a. Amplitude
b. Frequency 14. Given two sine waves A and B, if the
c. Phase frequency of A is twice that of B, then the
d. Time period of B is ______________ that of A.
a. One-half
b. Twice
c. The same as
d. Indeterminate from
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 3: Signals
17. A signal is measured at two different points. 23. The ___________ has units of second.
The power is P1 at the first point and P2 at the a. Throughput
second point. The dB is 0. This means b. Propagation speed
_______________. c. Propagation time
a. P2 is zero d. B or C
b. P2 equals P1
c. P2 is much larger than P1 24. When propagation speed is multiplied by
d. P2 is much smaller than P1 propagation time, we get the _____________.
a. Throughput
18. _______________ is a type of transmission b. Wavelength of the signal
impairment in which the signal loses strength c. Distortion factor
due to the resistance of the transmission d. Distance a signal or bit has traveled.
medium.
a. Attenuation 25. Propagation time is ____________
b. Distortion proportional to distance and ___________
c. Noise proportional to propagation speed.
d. Decibel a. Inversely; directly
b. Directly; inversely
19. _______________ is a type of transmission c. Inversely; inversely
impairment in which the signal loses strength d. Directly; directly
due to the different propagation speeds of each
frequency that makes up the signal. 26. Wavelength is __________ proportional to
a. Attenuation propagation speed and __________ proportional
b. Distortion to period.
c. Noise a. Inversely; directly
d. Decibel b. Directly; inversely
c. Inversely; inversely
20. ______________ is a type of transmission d. Directly; directly
impairment in which an outside source such as
crosstalk corrupts a signal. 27. The wavelength of a signal depends on the
a. Attenuation ______________.
b. Distortion a. Frequencies of the signal
c. Noise b. Medium
d. Decibel c. Phase of the signal
d. A and B
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 3: Signals
1. Unipolar, bipolar and polar encoding are 8. The Nyquist theorem specifies the minimum
types of _______ encoding sampling rate to be _______.
a. Line a. Equal to the lowest frequency of a signal
b. Block b. Equal to the highest frequency of a
c. NRZ signal
d. Manchester c. Twice the bandwidth of a signal
d. Twice the highest frequency of a
2. If a symbol is composed of 3 bits, there are signal
__________ data levels.
a. 2 9. One factor in the accuracy of a reconstructed
b. 4 PCM signal is the __________.
c. 8 a. Signal bandwidth
d. 16 b. Carrier frequency
c. Number of bits used for quantization
3. Pulse rate is always ______ the bit rate d. Baud rate
a. Greater than
b. Less than 10. Which encoding type always has nonzero
c. Greater than or equal to average amplitude
d. Less than or equal to a. Unipolar
b. Polar
4. ________ encoding has a transition at the c. Bipolar
middle of each bit. d. All the above
a. RZ
b. Manchester 11. Which of the following encoding methods
c. Differential Manchester does not provide for synchronization?
d. All the above a. NRZ-L
b. RZ
5. ________ encoding has a transition at the c. NRZ-I
beginning of each 0 bit. d. Manchester
a. RZ
b. Manchester 12. Which encoding method uses alternating
c. Differential Manchester positive and negative values for 1s?
d. All the above a. NRZ-I
b. RZ
6. PCM is an example of ______ conversion. c. Manchester
a. Digital-to-digital d. AMI
b. Digital-to-analog
c. Analog-to-analog 13. In PCM, an analog-to-____________
d. Analog-to-Digital conversion occurs.
a. Analog
7. If the frequency spectrum of a signal has b. Digital
bandwidth of 500 Hz with the highest frequency c. QAM
at 600 Hz, what should be the sampling rate, d. Differential
according to the Nyquist theorem?
a. 200 samples/s 14. If the maximum value of a PCM signal is 31
b. 500 samples/s and the minimum value is -31, how many bits
c. 1000 samples/s were used for conding?
d. 1200 samples/s a. 4
b. 5
c. 6
d. 7
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 4: Digital Transmission
15. RZ encoding involves _________ signal levels. 22. In asynchronous transmission, the gap time
a. Two between bytes is ________.
b. Three a. Fixed
c. Four b. Variable
d. Five c. A function of the data rate
d. Zero
16. Which quantization level results in a more
faithful reproduction of the signal 23. Synchronous transmission does not have
a. 2 __________.
b. 8 a. A start bit
c. 16 b. A stop bit
d. 32 c. Gaps between bytes
d. All the above
17. Which encoding technique attempts to solve
the loss of synchronization due to long strings
of 0s.
a. BnZS
b. NRZ
c. AMI
d. (a) and (b)
1. ASK, PSK, FSK nad QAM are examples of 8. If the bit rate for a QAM signal is 3000 bps
__________ modulation. and a signal unit is represented by a tribit,
a. Digital-to-analog what is the baud rate?
b. Digital-to-analog a. 300
c. Analog-to-analog b. 400
d. Analog-to-digital c. 1000
d. 1200
2. AM and FM are examples of ___________
modulation. 9. If the baud rate for a QAM signal is 3000 and
a. Digital-to-analof a signal unit is represented by a tribit, what is
b. Digital-to-analog the bit rate?
c. Analog-to-analog a. 300
d. Analog-to-digital b. 400
c. 1000
3. In QAM, both phase and ____________ of a d. 9000
carrier frequency are varied.
a. Amplitude 10. If the baud rate for a QAM signal is 1800
b. Frequency anf the bit rate is 9000, how many bits are
c. Bit rate there per signal unit?
d. Baud rate a. 3
b. 4
4. Which of the following is most affected by c. 5
noise? d. 6
a. PSK
b. ASK 11. In 16-QAM, there are 16 __________.
c. FSK a. Combination of phase and amplitude
d. QAM b. Amplitudes
c. Phases
5. If the baud rate is 400 for a 4-PSK signal, the d. Bps
bit rate is _________ bps.
a. 100 12. Which modulation technique involves
b. 400 tribits, eight different phase shifts, and one
c. 800 amplitude?
d. 1600 a. FSK
b. 8-PSK
6. If the bit rate for an ASK signal is 1200 bps, c. ASK
the baud rate is __________. d. 4-PSK
a. 300
b. 400 13. Given an AM radio signal with a bandwidth
c. 600 of 10 KHz and the highest-frequency
d. 1200 component at 705 KHz, what is the frequency of
the carrier signal?
7. If the bit rate for an FSK signal is 1200 bps, a. 700 KHz
the baud rate is __________. b. 705 KHz
a. 300 c. 710 KHz
b. 400 d. Cannot be determined from given
c. 600 information
d. 1200
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 5: Analog Transmission
14. A modulated signal is formed by ________. 20. For a telephone line, the bandwidth for
a. Changing the modulating signal by the voice is usually _________ the bandwidth for
carrier wave data.
b. Changing the carrier wave by the a. Equivalent to
modulating signal b. Less than
c. Quantization of the source data c. Greater than
d. Sampling at the Nyquist frequency d. Twice
15. If FCC regulations are followed, the carrier 21. For a given bit rate, the minimum
frequencies of adjacent AM radio station are bandwidth for ASK is ______ the minimum
_________ apart. bandwidth for FSK.
a. 5 KHz a. Equivalent to
b. 10 KHz b. Less than
c. 200 KHz c. Greater than
d. 530 KHz d. Twice
16. If FCC regulations are followed, ___________ 22. As the bit rate of an FSK signal increases,
potential FM stations are theoretically possible the bandwidth ___________.
in a given area. a. Decreases
a. 50 b. Increases
b. 100 c. Remains the same
c. 133 d. Doubles
d. 150
23. For FSK, as the difference between the two
17. When an ASK signal is decomposed, the carrier frequencies increases, the bandwidth
result is _____________. ________.
a. Always one sine wave a. Decreases
b. Always two sine waves b. Increases
c. An infinite number of sine waves c. Remains the same
d. None of the above d. Halves
18. The bandwidth of an FM signal requires 10 24. Which ITU-T modems standard uses trellis
times the bandwidth of the __________ signal. coding
a. Carrier a. V.32
b. Modulating b. V.33
c. Bipolar c. V.34
d. Sampling d. (a) and (b)
19. Modulation of an analog signal can be 25. In trellis coding the number of data bits is
accomplished through changing the ______ of _________ the number of transmitted bits.
the carrier signal. a. Equal to
a. Amplitude b. Less than
b. Frequency c. More than
c. Phase d. Double that of
d. Any of the above
26. What is the object of trellis coding?
a. To narrow the bandwidth
b. To simplify modulation
c. To increases the data rate
d. To reduce the error rate
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 5: Analog Transmission
1. The sharing of a medium and its link by two 7. In AT&T’s FDM hierarchy, the bandwidth of
more devices is called ______. each group type can be found by multiplying
a. Modulation ______ and adding extra bandwidth for guard
b. Encoding bands.
c. Line Encoding a. The number of voice channels by 4000
d. Multiplexing Hz
b. The sampling rate by 4000 Hz
2. Which multiplexing technique transmits c. The number of voice channels by 8 bits/
analog signals? sample
a. FDM d. The sampling rate by 8 bits/sample
b. TDM
c. WDM 8. DS-1 through DS-4 are __________ while T-1
d. (a) and (c) through T-4 ___________.
a. Services; multiplexers
3. Which multiplexing technique transmits b. Services; signals
digital signals? c. Services; lines
a. FDM d. Multiplexers; signals
b. TDM
c. WDM 9. In a T-1 line, ____________ interleaving
d. None of the above occurs.
a. Bit
4. Which multiplexing technique shifts each b. Byte
signal to a different carrier frequency? c. DS-0
a. FDM d. Switch
b. TDM
c. Both (a) and (b) 10. Guard bands increase the bandwidth for
d. None of the above ____________.
a. FDM
5. In TDM, for n signal sources of the same b. TDM
data rate, each frame contains __________ slots. c. Both (a) and (b)
a. n d. None of the above
b. n + 1
c. n – 1 11. Which multiplexing technique involves
d. 0 to n signals composed of light bemas?
a. FDM
6. In TDM. The transmission rate of the b. TDM
multiplexed path is usually _______ the sum of c. WDM
the transmission rate of the signal sources. d. None of the above
a. Greater than
b. Less than
c. Equal to
d. 1 less than
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 7: Transmission Media
1. Transmission media are usually categorized 8. Which of the following primarily uses guided
as _____. media?
a. Fixed or unfixed a. Cellular telephone system
b. Guided or unguided b. Local Telephone System
c. Determinate and indeterminate c. Satellite communications
d. Metallic and nonmetallic d. Radio Broadcasting
2. Transmission media are closest to the ______ 9. Which of the following is not a guided
layer medium?
a. Physical a. Twisted-pair cable
b. Network b. Coaxial cable
c. Transport c. Fiber-Optic Cable
d. Application d. Atmosphere
3. Category 1 UTP cable is most often used in 10. In an environment with many high-voltage
_____ networks. devices, the best transmission medium would
a. Fast Ethernet be _____.
b. Traditional Ethernet a. Twisted-pair cable
c. Infrared b. Coaxial cable
d. Telephone c. Optical cable
d. The Atmosphere
4. BNC connectors are used by _____ cables.
a. UTP 11. What is the major factor that makes
b. STP coaxial-cable less susceptible to noise than
c. Coaxial twisted-pair cable?
d. Fiber-Optic a. Inner conductor
b. Diameter of cable
5. _____ cable consists of an inner copper and a c. Outer conductor
second conducting outer sheath. d. Insulating material
a. Twisted pair
b. Coaxial 12. The RG number gives us information about
c. Fiber-Optic _____.
d. Shielded twisted pair a. Twisted pairs
b. Coaxial cable
6. In fiber optics, the signal source is _____ c. Optical fibers
waves. d. All of the above
a. Light
b. Radio 13. In an optical fiber, the inner core is _____
c. Infrared the cladding.
d. Very low-frequency a. Denser than
b. Less dense than
7. Smoke signal are example of communication c. The same density as
though _____. d. Another name for
a. A guided medium
b. An unguided medium 14. The inner core of an optical fiber is _____ in
c. A refractive medium composition.
d. A small or large medium a. Glass or plastic
b. Copper
c. Bimetalic
d. Liquid
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 7: Transmission Media
15. Optical fibers, unlike wire media, are highly 21. When we talk about unguided media,
resistant to _____. usually we are referring to _____.
a. High-frequency transmission a. Metallic wires
b. Low-frequency transmission b. Nonmetallic wires
c. Electromagnetic interference c. The air
d. Refraction d. None of the above
16. When a beam of light travels through media 22. Radio wave and microwave frequencies
of two different densities, if the angle of range from ______.
incidence is greater than the critical angle, a. 3 to 300 KHz
_____ occurs. b. 300 KHz to 300 GHz
a. Reflection c. 3 KHz to 300 GHz
b. Refraction d. 3 KHz to 3000 GHz
c. Incidence
d. Criticism 23. In _____ propagation, low frequency radio
waves hug the earth.
17. When the angle of incidence is _____ the a. Ground
critical angle, the light beam bends along the b. Sky
interface. c. Line of sight
a. More than d. Space
b. Less than
c. Equal to 24. The VLF and LF bands use _____
d. None of the above propagation for communications.
a. Ground
18. In _____ propagation, the beam of b. Sky
propagated light is almost horizontal, and the c. Line of sight
low-density core has a small diameter d. Space
compared to the cores of the other propagation
modes. 25. A parabolic dish antenna is a(n) _____
a. Multimode step-index antenna.
b. Multiple graded-index a. Omnidirectional
c. Multimode single-index b. Bidirectional
d. Single-mode c. Unidirectional
d. Horn
19. _____ is the propagation method subject to
the greatest distortion.
a. Multimode step-index 26. The _____ is an association that sponsors
b. Multimode Graded-index the use of infrared waves.
c. Multiple single-index a. IrDA
d. Single-mode b. EIA
c. FCC
20. In _____ propagation, the core is varying d. PUD
densities.
a. Multimode step-index
b. Multimode graded-index
c. Multimode single-index
d. Single-mode
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 8: Circuit Switching and Telephone
Networks
1. The _____ is a device that connects n inputs 7. Which of the following is a time-division
to m outputs. switch ?
a. Crosspoint a. TSI
b. Crossbar b. TDM bus
c. Modem c. Crosspoint
d. RAM d. (a) and (b)
2. How many crosspoints are needed in a 8. In a time-division switch a _____ governs the
single-stage switch with 40 inputs and 40 destination of a packet stored in RAM.
outputs? a. TDM Bus
a. 40 b. Crosspoint
b. 50 c. Crosbar
c. 90 d. Control Unit
d. 2000
9. A telephone network is an example of _____
3. In a crossbar with 1000 crosspoints, network.
approximately how many are in use at any a. Message Switch
time? b. Packet Switched
a. 100 c. Circuit Switched
b. 250 d. None of the above
c. 500
d. 1000 10. The local loop has _____ cable that
connects the subscriber telephone to the
4. The _____ of a TSI controls the order of nearest end office.
delivery of slot values that are stored in RAM. a. Twisted-Pair
a. Crossbar b. Coaxial
b. Crosspoint c. Fiber-Optic
c. Control unit d. (b) and (c)
d. Transceiver
11. Trunks are transmission media such as
5. In _____ circuit switching, delivery of data is _____ the handle the telephone communication
delayed because data must be stored and between offices.
retrieved from RAM. a. Twisted-pair cable
a. Space-division b. Fiber-optic cable
b. Time-Division c. Satellite links
c. Virtual d. (b) and (c)
d. Packet
12. The established telephone company that
6. To create a _____, combine crossbar switches provided services in a LATA before 1966 and
in stages. owns the cabling system is called _____.
a. Multistage switch a. An ILEC
b. Crosspoint b. A CLEC
c. Packet Switch c. An IXC
d. TSI d. A POP
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 8: Circuit Switching and Telephone
Networks
1._____ has a higher transmission rate in the 7. _____ is a device at the telephone company
downstream direction than in the upstream site that can packetize data to be sent to the
direction. ISP Server.
a. VDSL a. A DSLAM
b. ADSL b. An ADSL modem
c. SDSL c. A filter
d. (a) and (b) d. A splitter
2. _____ is suitable for businesses that require 8. ______ was designed as an alternative to the
comparable upstream and downstream data T-1 line.
rates. a. VSL
a. VDSL b. ADSL
b. ADSL c. SDSL
c. SDSL d. HDSL
d. (a) and (b)
9. HDSL encodes data using _______
3. _____ limit the bandwidth of the local loop to a. 4B/5B
4 KHz. b. 2B1Q
a. Fiber Nodes c. 1B2Q
b. Filters d. 6B/8T
c. Repeaters
d. Hubs 10. _____ encoded signal is more susceptible to
attenuation than _____ encoded signal.
4. DMT is a modulation technique that a. An AMI; a 2B2Q
combines elements of _____ and _____. b. A 2B1Q; an AMI
a. FDM; TDM c. An AMI; a 2B1Q
b. QDM; QAM d. None of the above
c. FDM; QAM 11. Another name for the cable TV office is the
d. PSK; FSK _____.
a. Splitter
5. The largest portion of the bandwidth for b. Fiber node
ADSL carries _____. c. Combiner
a. Voice Communication d. Head end
b. Upstream data
c. Downstream data 12. A traditional Cable TV network transmits
d. Control data signals _____.
a. Upstream
6. The actual bit rate of ADSL downstream data b. Downstream
is _____. c. Upstream and Downstream
a. 64 Kbps to 1 Mbps d. None of the above
b. 6 to 30 Kbps
c. 31 Kbps to 225 Mbps 13. An HFC network uses _____ as the medium
d. 500 Kbps to 8 Mbps from the switch to the fiber node.
a. Optical Fiber
b. Coaxial Cable
c. UTP
d. STP
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 9: High Speed Digital Access
14. In an HFC network, the distribution hub 21. SONET in an acronym for _____ Network.
handles the _____ of signals. a. Synchronous Optical
a. Modulation b. Standard Optical
b. Distribution c. Symmetric Open
c. Splitting d. Standard Open
d. (a) and (b)
22. In a SONET system, _____ can remove
15. A TV channel in an HFC network needs a signals from a path.
_____- MHz bandwidth. a. An STS multiplier
a. 6 b. A regenerator
b. 100 c. An Add/Drop multiplier
c. 250 d. A repeater
d. 369
23. The synchronous payload envelope of an
16. _____ data go from the subscriber to the STS-1 frame contains _____.
Internet. a. Pointers
a. Upstream b. User data
b. Downstream c. Overhead
c. Midstream d. (b) and (c)
d. None of the above
1. Which error detection method consists of a 7. If the ASCII character H is sent and the
parity bit for each data unit as well as an entire character I is received, what type of error is
data unit of parity bits? this?
a. Simple parity check a. Single-bit
b. Two-dimensional parity check b. Multiple-bit
c. CRC c. Burst
d. Checksum d. Recoverable
2. Which error detection method uses ones 8. In cyclic redundancy checking, what is the
complement arithmetic? CRC?
a. Simple parity check a. The divisor
b. Two-dimensional parity check b. The quotient
c. CRC c. The dividend
d. Checksum d. The remainder
3. Which error detection method consists of just 9. In cyclic redundancy checking, the divisor is
one redundant bit per data unit? _______ the CRC.
a. Simple parity check a. The same size as
b. Two-dimensional parity check b. 1 bit less than
c. CRC c. 1 bit more than
d. Checksum d. 2 bits more than
4. Which error detection method involves 10. If the data unit is 111111, the divisor 1010,
polynomials? and the remainder 110, what is the dividend at
a. Simple parity check the receiver?
b. Two-dimensional parity check a. 111111011
c. CRC b. 111111110
d. Checksum c. 1010110
d. 110111111
5. Which of the following best describes a
single-bit error? 11. If the data unit is 111111 and the divisor
a. A single bit is inverted. 1010, what is the dividend at the transmitter?
b. A single bit is inverted per data unit. a. 111111000
c. A single bit is inverted per transmission. b. 1111110000
d. Any of the above c. 111111
d. 1111111010
6. If the ASCII character G is sent and the
character D is received, what type of error is 12. If odd parity is used for ASCII error
this? detection, the number of 0s per 8-bit symbol is
a. Single-bit _______.
b. Multiple-bit a. Even
c. Burst b. Odd
d. Recoverable c. Indeterminate
d. 42
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 10: Error Detection And Correction
13. The sum of the checksum and data at the 20. At the CRC generator, _______ added to the
receiver is _______ if there are no errors. data unit before the division process.
a. -0 a. 0s are
b. +0 b. 1s are
c. The complement of the checksum c. The polynomial is
d. The complement of the data d. The CRC remainder is
14. The Hamming code is a method of _______. 21. At the CRC generator, _______ added to the
a. Error detection data unit after the division process.
b. Error correction a. 0s are
c. Error encapsulation b. 1s are
d. (a) and (b) c. The polynomial is
d. The CRC remainder is
15. In CRC there is no error if the remainder at
the receiver is _______. 22. At the CRC checker, _______ means that the
a. Equal to the remainder at the sender data unit is damaged.
b. Zero a. A string of 0s
c. Nonzero b. A string of 1s
d. The quotient at the sender c. A string of alternating 1s and 0s
d. A nonzero remainder
16. In CRC the quotient at the sender _______.
a. Becomes the dividend at the receiver
b. Becomes the divisor at the receiver
c. Is discarded
d. Is the remainder
1. In a Go-Back-N ARQ, if the window size is 8. For Stop-and-Wait ARQ, for n data packets
63, what is the range of sequence numbers? sent, _______ acknowledgments are needed.
a. 0 to 63 a. n
b. 0 to 64 b. 2n
c. 1 to 63 c. n - 1
d. 1 to 64 d. n + 1
3. In Go-Back-N ARQ, if frames 4, 5, and 6 are 10. The address field of a frame in HDLC
received successfully, the receiver may send an protocol contains the address of the _______
ACK _______ to the sender. station.
a. 5 a. Primary
b. 6 b. Secondary
c. 7 c. Tertiary
d. Any of the above d. (a) or (b)
4. For a sliding window of size n - 1 (n sequence 11. The HDLC _______ field defines the
numbers), there can be a maximum of _______ beginning and end of a frame.
frames sent but unacknowledged. a. Flag
a. 0 b. Address
b. n – 1 c. Control
c. n d. FCS
d. n + 1
12. What is present in all HDLC control fields?
5. In _______ ARQ, if a NAK is received, only the a. P/F bit
specific damaged or lost frame is retransmitted. b. N(R)
a. Stop-and-Wait c. N(S)
b. Go-Back-N d. Code bits
c. Selective Repeat
d. (a) and (b) 13. The shortest frame in HDLC protocol is
usually the _______ frame.
6. ARQ stands for _______. a. Information
a. Automatic repeat quantization b. Supervisory
b. Automatic repeat request c. Management
c. Automatic retransmission request d. None of the above
d. Acknowledge repeat request
14. When data and acknowledgment are sent
7. A timer is set when _______ is (are) sent out. on the same frame, this is called _______.
a. A data frame a. Piggybacking
b. An ACK b. Backpacking
c. A NAK c. Piggypacking
d. All the above d. A good idea
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 12: Point-to-Point Access (PPP)
1. According to the PPP transition state 7. In the PPP frame, the _______ field has a
diagram, exchange of user control and data value of 11111111 to indicate the broadcast
packets occurs in the _____________ state. address of HDLC.
a. Establishing a. Address
b. Authenticating b. Control
c. Networking c. Protocol
d. Terminating d. FCS
2. According to the PPP transition state 8. In the PPP frame, the ________ field is for
diagram, options are negotiated in the _______ error control.
state. a. Flag
a. Establishing b. Control
b. Authenticating c. Protocol
c. Networking d. FCS
d. Terminating
9. What is the purpose of LCP packets?
3. According to the PPP transition state a. Configuration
diagram, verification of user identification b. Termination
occurs in the _______state. c. Option negotiation
a. Establishing d. All of the above
b. Authenticating
c. Networking 10. ___________ is a three-way handshake for
d. Terminating user verification.
a. PPP
4. According to the PPP transition state b. CHAP
diagram, the link is disconnected in the c. PAP
__________ state. d. (b) and (c)
a. Establishing
b. Authenticating 11. A PAP packet and a CHAP packet can be
c. Networking distinguished by the value of the ________ field
d. Terminating of the PPP frame.
a. Address
5. In the PPP frame, the ________ field defines b. Control
the contents of the data field. c. Protocol
a. Flag d. FCS
b. Control
c. Protocol 12. PAP requires __________ and ___________
d. FCS from the user.
a. A password; a calculated value
6. In the PPP frame, the ________ field is similar b. Authentication identification; a
to that of the U-frame in HDLC. password
a. Flag c. A challenge value; a password
b. Control d. Authentication identification; a
c. Protocol calculated value
d. FCS
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 12: Point-to-Point Access (PPP)
1. What is the hexadecimal equivalent of the 8. A _______-station Ethernet LAN uses a four-
Ethernet address 01011010 00010001 port bridge. Each station has an effective
01010101 00011000 10101010 00001111? average data rate of 1.25 Mbps.
a. 5A-88-AA-18-55-F0 a. 32
b. 5A-81-BA-81-AA-0F b. 40
c. 5A-18-5A-18-55-0F c. 80
d. 5A-11-55-18-AA-0F d. 160
2. If an Ethernet destination address is 07-01- 9. Forty stations are on an Ethernet LAN. A 10-
02-03-04-05, then this is a ______ address. port bridge segments the LAN. What is the
a. Unicast effective average data rate of each station?
b. Multicast 1.0 Mbps
c. Broadcast 2.0 Mbps
d. Any of the above a. 2.5 Mbps
b. 5.0 Mbps
3. If an Ethernet destination address is 08-07-
06-05-44-33, then this is a ______ address. 10. An 80-station traditional Ethernet is divided
a. Unicast into four collision domains. This means that a
b. Multicast maximum of _______ stations contend for
c. Broadcast medium access at any one time.
d. Any of the above a. 320
b. 80
4. Which of the following could not be an c. 76
Ethernet source address? d. 20
a. 8A-7B-6C-DE-10-00
b. EE-AA-C1-23-45-32 11. What is the efficiency of 4B/5B block
c. 46-56-21-1A-DE-F4 encoding?
d. 8B-32-21-21-4D-34 a. 20 percent
b. 40 percent
5. Which of the following could not be an c. 60 percent
Ethernet unicast destination? d. 80 percent
a. 43-7B-6C-DE-10-00
b. 44-AA-C1-23-45-32 12. What is the efficiency of a frame in half-
c. 46-56-21-1A-DE-F4 duplex Gigabit Ethernet carrying 46 bytes of
d. 48-32-21-21-4D-34 data?
a. 97 percent
6. Which of the following could not be an b. 70 percent
Ethernet multicast destination? c. 56 percent
a. B7-7B-6C-DE-10-00 d. 12 percent
b. 7B-AA-C1-23-45-32
c. 7C-56-21-1A-DE-F4 13. Which of the following is a four-wire Gigabit
d. 83-32-21-21-4D-34 Ethernet implementation?
a. 1000Base-SX
7. A 10-station Ethernet LAN uses a _______- b. 1000Base-LX
port bridge if the effective average data rate for c. 1000Base-CX
each station is 2 Mbps. d. 1000Base-T
a. 1
b. 2 14. What is the efficiency of 8B/10B encoding?
c. 5 a. 20 percent
d. 10 b. 40 percent
c. 60 percent
d. 80 percent
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 15: Wireless Lans
1. A wireless LAN using FHSS hops 10 times 7. In an ESS the _____ station is not mobile.
per cycle. If the bandwidth of the original signal a. AP
is 10 MHz, the spread spectrum is _____ MHz. b. Server
a. 10 c. BSS
b. 100 d. None of the above
c. 1000
d. 10,000 8. In an ESS the _____ stations are part of a
wired LAN.
2. A wireless LAN using FHSS hops 10 times a. AP
per cycle. If the bandwifth of the original signal b. Server
is 10 MHz and 2 GHz is the lowest frequency, c. BSS
the highest frequency of the system is _____ d. All of the above
GHz.
a. 1.0 9. A station with _____ mobility can move from
b. 2.0 one BSS to another.
c. 2.1 a. No-transition
d. 3.0 b. BSS-transition
c. ESS-transition
3. An FHSS wireless LAN has a spread d. B and C
spectrum of 1 GHz. The bandwidth of the
original signal is 250 MHz, and there are _____ 10. A station with _____ mobility can move from
hops per cycle. one ESS to another.
a. 1 a. No transition
b. 2 b. BSS-transition
c. 3 c. ESS-transition
d. 4 d. B and C
4. A wireless LAN using DSSS with an 8-bit 11. A station with _____ mobility is either
chip code needs _____ MHz for sending data stationary or moving only inside a BSS.
that originally required a 10-MHz bandwidth. a. No-transition
a. 2 b. BSS
b. 8 c. ESS
c. 20 d. A and B
d. 80
12. A _____ frame usually precedes a CTS
5. A wireless LAN using DSSS with _____-bit frame.
chip code needs 320 MHz for sending data that a. DIFS
originally required a 20-MHz bandwidth. b. SIFS
a. A 2 c. RTS
b. An 8 d. Any of the above
c. A 16
d. A 32 13. A _____ frame usually precedes an RTS
frame.
6. A wireless LAN using DSSS with a 4-bit chip a. DIFS
code needs 10-MHz for sending data that b. CIFS
originally required a _____-MHz bandwidth. c. CTS
a. 2.5 d. None of the above
b. 20
c. 25
d. 40
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 15: Wireless Lans
14. Stations do not sense the medium during 21. A wireless LAN uses ______ frames for
_____ time. acknowledgement.
a. RTS a. Management
b. CTS b. Control
c. SIFS c. Data
d. NAV d. None of the above
15. Wireless transmission is _____ prone to 22. A wireless LAN uses ______ frames for the
error than/as wired transmission. initial communication between stations and the
a. More access points.
b. Less a. Management
c. Half as b. Control
d. None of the above c. Data
d. None of the above
16. Which MAC sublayer does IEEE 802.11
define? 23. A Bluetooth network can have ______
a. LLC meter(s).
b. PCF a. One
c. DCF b. Two
d. B and C c. Three
d. Eight
17. What is the basic access method for
wireless LANs as defined by IEEE 802.11? 24. ______ combine to form a scatternet.
a. LLC a. BSSs
b. DCF b. ESSs
c. PCF c. APs
d. BFD d. Piconets
18. The access method for wireless LANs as 25. Bluetooth uses _____ in the physical layer.
defined by IEEE 802.11 is based on ______. a. FHSS
a. CSMA b. DSSS
b. CSMA/CD c. DHSS
c. CSMA/CA d. OFDM
d. Token passing
26. A bluetooth frame needs ______ μs for
19. FHSS, DSSS, and OFDM are ______ layer hopping and control mechanisms.
specifications. a. 625
a. Physical b. 259
b. Data link c. 3
c. Network d. a multiple of 259
d. Transport
1. Which of the following is a connecting 8. A bridge has access to the _______ address of
device? a station on the same network.
a. Bridge a. Physical (MAC)
b. Repeater b. Network
c. Hub c. Service access point
d. All of the above d. All of the above
16. The signal from a satellite is aimed at a 23. Teledesic is a _________ LEO satellite system
specific area called the __________. a. little
a. period b. big
b. footprint c. passband
c. orbit d. broadband
d. uplink
24. __________ has 66 satellites in six LEOs.
17. Which orbit has the highest altitude? a. Globalstar
a. GEO b. Iridium
b. MEO c. Teledesic
c. LEO d. GPS
d. HEO
25. __________ has 48 satellites in six polar
18. MEO satellites orbit _______ Van Allen belts. orbits.
a. in the a. Globastar
b. between the b. Iridium
c. above both c. Teledesic
d. below both d. GPS
19. Transmission from the earth to the satellite 26. __________ will have 288 satellites in 12
is called _________. polar orbits.
a. footlink a. Globalstar
b. up print b. Iridium
c. downlink c. Teledesic
d. uplink d. GPS
1. Frame Relay operates in the _______. 8. _______ is a protocol to control and manage
a. Physical layer interfaces in Frame Relay networks.
b. Data link layer a. LMI
c. Physical and data link layers b. VOFR
d. Physical, data link, and network layers c. FRAD
d. DLCI
2. In the data link layer, Frame Relay uses
_____________. 9. _______ is a Frame Relay option that
a. BSC protocol transmits voice through the network.
b. A simplified HDLC protocol a. LMI
c. LAPB b. VOFR
d. Any ANSI standard protocol c. FRAD
d. DLCI
3. Routing and switching in Frame Relay are
performed by the _______ layer. 10. In data communications, ATM is an
a. Physical acronym for _______.
b. Data link a. Automated Teller Machine
c. Network b. Automatic Transmission Model
d. (b) and (c) c. Asynchronous Telecommunication
Method
4. Frame Relay is unsuitable for ________ due to d. Asynchronous Transfer Mode
possible delays in transmission resulting from
variable frame sizes. 11. Because ATM _______, which means that
a. Real-time video cells follow the same path, the cells do not
b. File transfers usually arrive out of order.
c. Fixed-rate data communication a. Is asynchronous
d. All the above b. Is multiplexed
c. Is a network
5. Frame relay provides _____ connections. d. Uses virtual circuit routing
a. PVC
b. SVC 12. Which layer in ATM protocol reformats the
c. (a) and (b) data received from other networks?
d. None of the above a. Physical
b. ATM
6. The Frame Relay address field is _______ in c. Application adaptation
length. d. Data adaptation
a. 4 bytes
b. 2 bytes 13. Which layer in ATM protocol has a 53-byte
c. 3 bytes cell as an end product?
d. Any of the above a. Physical
b. ATM
7. A device called a(n) _______ allows frames c. Application adaptation
from an ATM network to be transmitted across d. Cell transformation
a Frame Relay network.
a. LMI 14. Which AAL type is designed to support a
b. VOFR data stream that has a constant bit rate?
c. FRAD a. AAL1
d. DLCI b. AAL2
c. AAL3/4
d. AAL5
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 18: Virtual Circuit Switching (Frame
Relay and ATM)
1. In which type of switching do all the packets 8. A subnet mask in class B can have _______
of a message follow the same channels of a 1s with the remaining bits 0s.
path? a. Nine
a. Datagram packet switching b. Fourteen
b. Virtual circuit packet switching c. Seventeen
c. Message switching d. Three
d. None of the above
9. A subnet mask in class C can have _______
2. In _______, each packet of a message need 1s with the remaining bits 0s.
not follow the same path from sender to a. Ten
receiver. b. Twenty-five
a. Message switching c. Twelve
b. The virtual approach to packet switching d. Seven
c. The datagram approach to packet
switching 10. A subnet mask in class A has fourteen 1s.
d. None of the above How many subnets does it define?
a. 32
3. An IP address consists of _______ bits. b. 8
a. 4 c. 64
b. 8 d. 128
c. 32
d. Any of the above 11. A subnet mask in class B has nineteen 1s.
How many subnets does it define?
4. Identify the class of IP address 4.5.6.7. a. 8
a. Class A b. 32
b. Class B c. 64
c. Class C d. 128
d. Class D
12. A subnet mask in class C has twenty-five
5. Identify the class of IP address 229.1.2.3. 1s. How many subnets does it define
a. Class A a. 2
b. Class B b. 8
c. Class C c. 16
d. Class D d. 0
6. Identify the class of IP address 191.1.2.3. 13. Given the IP address 201.14.78.65 and the
a. Class A subnet mask 255.255.255.224, what is the
b. Class B subnet address?
c. Class C a. 201.14.78.32
d. Class D b. 201.14.78.65
c. 201.14.78.64
7. A subnet mask in class A can have _______ d. 201.14.78.12
1s with the remaining bits 0s.
a. Nine 14. Given the IP address 180.25.21.172 and the
b. Four subnet mask 255.255.192.0, what is the
c. Thirty-three subnet address?
d. Three a. 180.25.21.0
b. 180.25.0.0
c. 180.25.8.0
d. 180.0.0.0
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 19: Host-To-Host Delivery
(Internetworking, Addressing and Routing)
15. Given the IP address 18.250.31.14 and the 21. In _______ routing, the full IP address of a
subnet mask 255.240.0.0, what is the subnet destination is given in the routing table.
address? a. Next-hop
a. 18.0.0.14 b. Network-specific
b. 18.31.0.14 c. Host-specific
c. 18.240.0.0. d. Default
d. 18.9.0.14
22. In _______ routing, the mask and
16. Class _________ has the greatest number of destination addresses are both 0.0.0.0 in the
hosts per given network address. routing table.
a. A a. Next-hop
b. B b. Network-specific
c. C c. Host-specific
d. D d. Default
17. _______ is a client-server program that 23. In _______ routing, the destination address
provides an IP address, subnet mask, IP is a network address in the routing table.
address of a router, and IP address of a name a. Next-hop
server to a computer. b. Network-specific
a. NAT c. Host-specific
b. CIDR d. Default
c. ISP
d. DHCP
3. The target hardware address on an Ethernet 10. In IPv4, what is the length of the data field
is _______ in an ARP request. given an HLEN value of 12 and total length
a. 0x000000000000 value of 40,000?
b. 0.0.0.0 a. 39,998
c. Variable b. 40,012
d. Class-dependent c. 40,048
d. 39,952
4. An ARP reply is _______ to _______.
a. Broadcast; all hosts 11. A datagram is fragmented into three smaller
b. Multicast; one host datagrams. Which of the following is true?
c. Unicast; one host a. The do not fragment bit is set to 1 for all
d. Unicast; one host three datagrams.
b. The more fragment bit is set to 0 for all
5. An ARP request is _______ to _______. three datagrams.
a. Broadcast; all hosts c. The identification field is the same for
b. Multicast; one host all three datagrams.
c. Unicast; one host d. The offset field is the same for all three
d. Unicast; one host datagrams
6. What is the maximum size of the data 12. If the fragment offset has a value of 100, it
portion of the IP datagram? means that ______________.
a. 65,535 bytes a. The datagram has not been fragmented
b. 65,515 bytes b. The datagram is 100 bytes in size
c. 65,475 bytes c. The first byte of the datagram is byte 100
d. 65,460 bytes d. The first byte of the datagram is byte
800
7. A best-effort delivery service such as IP does
not include _______. 13. What is needed to determine the number of
a. Error checking the last byte of a fragment?
b. Error correction a. Identification number
c. Datagram acknowledgment b. Offset number
d. All the above c. Total length
d. (b) and (c)
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 20: Network Layer Protocols
(ARP, IPV4, ICMP, IPV6 AND ICMPV6)
14. The IP header size ___________. 21. Errors in the header or option fields of an IP
a. Is 20 to 60 bytes long datagram require a ______ error message
b. Is 20 bytes long a. Parameter-problem
c. Is 60 bytes long b. Source-quench
d. Depends on the MTU c. Router-solicitation
d. Redirection
15. If a host needs to synchronize its clock with 22. A ______ can learn about network ______ by
another host, it sends a _______ message. sending out a router-solicitation packet.
a. Time-stamp request a. Router; routers
b. Source-quench b. Router; hosts
c. Routert-advertisement c. Host; hosts
d. Time-exceeded d. Host; routers
16. Which of the following types of ICMP 23. One method to alert a source host of
messages needs to be encapsulated into an IP congestion is the _______ message.
datagram? a. Redirection
a. Time-exceeded b. Echo-request
b. Multicasting c. Source-quench
c. Echo reply d. Destination-unreachable
d. All the above
24. A time-exceeded message is generated if
17. The purpose of echo request and echo reply _______.
is to ________________. a. The round-trip time between hosts is
a. Report errors close to zero
b. Check node-to-node communication b. The time-to-live field has a zero value
c. Check packet lifetime c. Fragments of a message do not arrive
d. Find IP addresses within a set time
d. (b) and (c)
18. In error reporting the encapsulated ICMP
packet goes to _______. 25. To determine whether a node is reachable,
a. The sender _____________ message can be sent.
b. The receiver a. An echo-reply
c. A router b. An echo-request
d. Any of the above c. A redirection
d. A source-quench
19. When the hop-count field reaches zero and
the destination has not been reached, a _______ 26. Which of the following is a necessary part of
error message is sent. the IPv6 datagram?
a. Destination-unreachable a. Base header
b. Time-exceeded b. Extension header
c. Parameter-problem c. Data packet from the upper layer
d. Redirection d. (a) and (c)
20. When not all fragments of a message have 27. In IPv6, the _______ field in the base header
been received within the designated amount of restricts the lifetime of a datagram.
time, a _______ error message is sent. a. Version
a. Source-quench b. Priority
b. Time-exceeded c. Next-header
c. Parameter-problem d. Hop limit
d. Time-stamp request e. Neighbor-advertisement
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 21: Unicast and Multicast Routing
(Routing Protocols)
5. Router B receives an update from router A 12. Which of the following usually has the least
that indicates Net1 is two hops away. The next number of connections to othe areas?
update from A says Net1 is five hops away. a. An area
What value is entered in B’s routing table for b. An autonomous system
Net1? Assume the basic RIP is being used. c. A transient link
a. 2 d. A stub link
b. 3
c. 6 13. Which type of network using the OSPF
d. 7 protocol always consists of just two connected
routers?
6. If the routing table contains four new entries, a. Point-to-point
how many updates messages must the router b. Transient
send to its neighbour router? c. Stub
a. 1 d. Virtual
b. 2
c. 3 14. Which type of network using the OSPF
d. 4 protocol is the result of a break in a link
between the two routers?
7. The cost field of a router’s first table form a. Point-to-point
itself always has a value of b. Transient
a. 0 c. Stub
b. 1 d. Virtual
c. Infinity
d. Some positive integer
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 21: Unicast and Multicast Routing
(Routing Protocols)
15. Which type of network using the OSPF 22. BGP is based on ___________.
protocol can have five routers attached to it? a. Distance vector routing
a. Point-to-point b. Link state routing
b. Transient c. Path vector routing
c. Stub d. a and b
d. All of the above
23. Which type of BGP message creates a
16. A WAN using the OSPF protocol that relationship between two routers?
connects two routers is an example of a a. Open
_________ type of OSPF network. b. Update
a. Point-to-point c. Keep-alive
b. Transient d. Notification
c. Stub
d. Virtual 24. Which type of BGP message announces a
route to a new destination?
17. An Ethernet LAN using the OSPF protocol a. Open
with five attached routers can be called a b. Update
________ network. c. Keep-alive
a. Point-to-point d. Notification
b. Transient
c. Stub 25. Which type of BGP message is sent by a
d. Virtual system to notify another router of the sender’s
existence?
18. Which layer produces the OSPF message? a. Open
a. Data link b. Update
b. Network c. Keep-alive
c. Transport d. Notification
d. Application
26. Which type of BGP message is sent by a
19. Which of the following is an exterior routing router to close a connection?
protocol? a. Open
a. RIP b. Update
b. OSPF c. Keep-alive
c. BGP d. Notification
d. a and b
27. The ________ is an IGMP message.
20. Which of the following is an interior routing a. Query message
protocol? b. Membership report
a. RIP c. Leave report
b. OSPF d. All of the above
c. BGP
d. a and b 28. An IGMP query is sent from a _________ to a
_________.
21. OSPF is based on ____________. a. Host; host
a. Distance vector routing b. Host; router
b. Link state routing c. Router; router
c. Path vector routing d. Router; host or router
d. a and b
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 21: Unicast and Multicast Routing
(Routing Protocols)
30. The ________ field of the IGMP message is all 36. ___________ is a multicasting application.
zeros in a query message. a. Teleconferencing
a. Version b. Distance learning
b. Type c. Information dissemination
c. Checksum d. All of the above
d. Group address
37. A __________ is a data structure with nodes
31. The _________ field of the IGMP message is and edges and a hierarchical structure.
0x11 for a query message. a. Tree
a. Version b. Graph
b. Type c. Leaf
c. Checksum d. Root
d. a and b
38. A system uses source-based trees for
32. If four hosts on a network belong to the multicasting. If there are 100 sources and 5
same group, a total of _________ sent in groups, there is a maximum of _________
response to a general query message. different trees.
a. One membership report is a. 5
b. Two membership reports are b. 20
c. Three membership reports are c. 100
d. Four membership reports are d. 500
41. A system uses group-shared trees for 47. A _________ message tells an upstream
multicasting. If there are 100 sources and 5 router to start sending multicast messages for a
groups, there is a maximum of ____________ specific group through a specific router.
different trees. a. Weed
a. 5 b. Graft
b. 20 c. Prune
c. 100 d. Plum
d. 500
48. __________ uses multicast link state routing
42. ___________ is a multicast routing protocol concepts to create source-based trees.
using source-based trees. a. DVMRP
a. DVRMP b. MOSPF
b. MOSPF c. CBT
c. CBT d. BVD
d. a and b
49. In the __________ protocol, a multicast
43. ___________ is a multicast routing protocol packet is encapsulated inside a unicast packet
using group-shared trees. with the core router as the destination.
a. DVRMP a. DVMRP
b. MOSPF b. MOSPF
c. CBT c. CBT
d. a and b d. BVD
44. In _________ a network can receive a 50. ____________ is used in a dense multicast
multicast packet from a particular source only environment while __________ is used in a
through a designated parent router. sparse multicast environment.
a. RPF a. PIM-DM; PIM-SM
b. RPB b. PIM-SM; PIM-DM
c. RPM c. PIM; PIM-DM
d. All of the above d. PIM; PIM-SM
45. Pruning and grafting are strategies used in 51. When a multicast router is not directly
a. RPF connected to another multicast router, a
b. RPB _________ can be formed to connect the two.
c. RPM a. Physical tunnel
d. All of the above b. Logical tunnel
c. Logical core
46. A __________ message tells an upstream d. Spanning tree
router to stop sending multicast messages for a
specific group through a specific router.
a. Weed
b. Graft
c. Prune
d. Plum
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 22: Process-to-Process Delivery
(UDP AND TCP)
1. UDP and TCP are both _____ layer protocols 8. Which of the following is not part of the UDP
a. Physical user datagram header?
b. Data Link a. Length of header
c. Network b. Source port address
d. Transport c. Checksum
d. Destination port address
2. Which of the following functions does UDP
perform? 9. The ______ defines the client program
a. Process-to-process communication a. Ephemeral port number
b. Host-to-host communication b. IP address
c. End-to-end reliable data delivery c. Well-known port number
d. All of the above d. Physical address
3. UDP needs the _____ address to deliver the 10. The _______ defines the server program
user datagram to the correct application a. Ephemeral port number
program. b. IP address
a. Port c. Well-known port number
b. Application d. Physical address
c. Internet
d. Physical 11. IP is responsible for ____ communication
while TCP is responsible for ________
4. Which is a legal port address? communication
a. 0 a. Host-to-host; process-to-process
b. 513 b. Process-to-process; host-to-host
c. 65,535 c. Process-to-process; node-to-node
d. All of the above d. Node-to-node; process-to-process
5. The definition of reliable delivery includes 12. A host can be identified by _______ while a
____ program running on the host can be identified
a. Error-free delivery by _____
b. Receipt of the complete message a. An IP address ; a port number
c. In-order delivery b. A port number ; an IP address
d. All of the above c. An IP address ; a host address
d. An IP address ; a well-known port
6. Which of the following does the UDP
guarantee? 13. The ______ address uniquely identifies a
a. Sequence numbers on each user running application program
datagram a. IP address
b. Acknowledgments to the sender b. Host
c. Flow control c. NIC
d. None of the above d. Socket
7. The source port address on the UDP user 14. The ______ field is used to order packets of a
datagram header defines ___ message.
a. The sending computer a. Urgent pointer
b. The receiving computer b. Checksum
c. The application program on the c. Sequence number
sending computer d. Acknowledgment number
d. The application program on the receiving
computer
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 22: Process-to-Process Delivery
(UDP AND TCP)
15. The _____ field is used for error detection. 22. The _____ timer prevents a long idle
a. Urgent pointer connection between two TCPs
b. Checksum a. Retransmission
c. Sequence number b. Persistence
d. Acknowledgement number c. Keep-alive
d. Time-waited
16. Multiply the header length field by _______
to find the total number of bytes in the TCP 23. The ____ timer is needed to handle the zero
header window-size advertisement
a. 2 a. Retransmission
b. 4 b. Persistence
c. 6 c. Keep-alive
d. 8 d. Time-waited
17. Urgent data require the urgent pointer field 24. Karn’s algorithm is used in calculations by
as well as the URG bit in the _____ field the ______ timer
a. Control a. Retransmission
b. Offset b. Persistence
c. Sequence number c. Keep-alive
d. Reserved d. Time-waited
18. In ______, data are sent or processed at a 25. The ____ timer is used in the termination
very inefficient rate, such as one byte at a time phase
a. Nagle’s syndrome a. Retransmission
b. Silly window syndrome b. Persistence
c. Sliding window syndrome c. Keep-alive
d. Delayed acknowledgement d. Time-waited
19. To prevent silly window syndrome created 26. The _____ timer keeps track of the time
by a receiver that processes data at a very slow between the sending of a segment and the
rate, _____ can be used. receipt of an acknowledgment
a. Clark’s solution a. Retransmission
b. Nagle’s algorithm b. Persistence
c. Delayed acknowledgment c. Keep-alive
d. (a) or (c) d. Time-waited
20. To prevent silly window syndrome created 27. Connection establishment involves a
by a sender that processes data at a very slow _______handshake.
rate, _____ can be used. a. One-way
a. Clark’s solution b. Two-way
b. Nagle’s algorithm c. Three-way
c. Delayed acknowledgment d. None of the above
d. (a) or (c)
28. A special segment called a probe is sent by
21. An ACK number of 1000 always means that sending a TCP when the _____ timer goes off.
_____ a. Transmission
a. 999 bytes has been successfully received b. Persistence
b. 1000 bytes has been successfully c. Keep-alive
received d. Time-waited
c. 1001 bytes has been successfully
received
d. None of the above
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 23: Congestion Control and Quality
of Service
1. The maximum length of time that traffic is 8. Slow start is used in conjunction with
generated at the peak rate is called the ______as a TCP congestion control strategy
___________. a. Additive increase
a. Average data rate b. Additive decrease
b. Maximum burst size c. Multiplicative increase
c. Effective bandwidth d. Multiplicative decrease
d. Constant bit rate
9. The FECN informs the _____ of congestion
2. The ____ is the maximum data rate of the while the BECN informs the _____ of congestion
traffic a. Destination; interface
a. Average data rate b. Destination ; sender
b. Peak data rate c. Sender; destination
c. Maximum burst size d. Interface; sender
d. Effective bandwidth
10. _____ is a flow characteristic in which the
3. The effective bandwidth is based on delay varies for packets belonging to the same
_________. flow
a. Average data rate a. Choke point
b. Peak data rate b. Throughput
c. Maximum burst size c. Additive increase
d. All of the above d. Jitter
4. _____traffic features sudden data rate 11. In _____ queuing the first packet into the
changes in very short periods of time. queue is the first packet out of the queue
a. Constant-bit-rate a. FIFO
b. Variable-bit-rate b. LIFO
c. Bursty c. Priority
d. Peak-bit-rate d. Weighted fair
5. When the load is greater than the capacity, 12. The ____ traffic shaping method gives a host
the delay _______ credit for its idle time
a. Decreases a. Leaky bucket
b. Increases linearly b. Token bucket
c. Goes to infinity c. Traffic bucket
d. Goes to zero d. Bursty bucket
6. ______ is a closed loop mechanism to alleviate 13. A flow-based QoS model designated for IP is
congestions called________
a. A choke point a. Integrated services
b. Implicit signaling b. Differentiated services
c. Explicit signaling c. RSVP
d. All of the above d. Multicast trees
7. For a system using TCP, the sender window 14. A signaling protocol that helps IP create a
size is determined by the _____ window size flow is called _____
a. Receiver a. Integrated services
b. Sender b. Differentiated services
c. Congestion c. RSVP
d. (a) and (c) d. Multicast trees
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 23: Congestion Control and Quality
of Service
15. RSVP uses _____ messages 22. In Frame Relay the transmission rate can
a. Path never exceed _____.
b. Resv a. Bc
c. Resource b. Be
d. (a) and (b) c. CIR
d. The access rate
16. In a RSVP reservation style called ______
filter, the router creates a single reservation 23. The cell _______ is the difference between
that can be shared by a set of flows. the CTD maximum and minimum
a. Wild card a. Loss ratio
b. Fixed b. Transfer delay
c. Shared explicit c. Delay variation
d. All of the above d. Error ratio
17. Differentiated services was designed to 24. The cell ____ is the ratio of lost cells to cells
handle the ______ problem associated with sent
Integrated Services a. Loss ratio
a. Scalability b. Transfer delay
b. Stability c. Delay variation
c. Reservation d. Error ratio
d. All of the above
25. The _____ service class is particularly
18. A ____ is a Differentiated Services traffic suitable for applications with bursty data
conditioner a. CBR
a. Meter b. VBR
b. Marker c. ABR
c. Shaper d. UBR
d. All of the above
26. The _____ service class is suitable for
19. When added to Be, Bc should be less than customers who need real-time video
the ________ transmission without compression
a. CIR a. CBR
b. Access rate b. VBR
c. Committed burst size c. ABR
d. (a) and (b) d. UBR
20. What is the relationship between the access 27. The ______ is greater than the SCR.
rate and the CIR? a. PCR
a. CIR is always equal to the access rate b. MCR
b. CIR is greater than the access rate c. CVDT
c. CIR is less than the access rate d. All of the above
d. CIR plus Bc is equal to the access rate
28. ________ measures the variation in cell
21. A Frame Relay network is committed to transmission time
transfer ______ bps without discarding any a. SCR
frames b. PCR
a. Bc c. MCR
b. Be d. CVDT
c. CIR
d. (a) and (b)
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 23: Congestion Control and Quality
of Service
1. _____ can request a service. 8. A client issues _____ when it needs service
a. A socket interface from a server.
b. A port a. An active open
c. A client b. A passive open
d. A server c. An active request
d. A finite open
2. _____ can provide a service.
a. An iterative server 9. A server program, once it issues ______, waits
b. A concurrent server for clients to request its service.
c. A client a. An active open
d. A and B b. A passive open
c. An actuve request
3. The client program is _____ because it d. A finite open
terminates after it has been served.
a. Active 10. _____ processes requests one at a time.
b. Passive a. An iterative client
c. Finite b. An iterative server
d. Infinite c. A concurrent client
d. A concurrent server
4. The server program is ______ because it is
always available, waiting for a client request. 11. _____ processes many requests
a. Active simultaneously.
b. Passive a. An iterative client
c. Finite b. An iterative server
d. Infinite c. A concurrent client
d. A concurrent server
5. A connection-oriented concurrent server uses
_____ ports. 12. In a connection-oriented concurrent server,
a. Ephemeral the _____ is used for connection only.
b. Well-known a. Infinite port
c. Active b. Ephemeral port
d. A and B c. Well-known port
d. B and C
6. A connectionless iterative server uses _____
ports. 13. A _____ is an instance of a _____.
a. Ephemeral a. Process ; program
b. Well-known b. Program ; process
c. Active c. Process ; service
d. A and B d. Structure ; process
7. Machine A requests service X from machine 14. The _____ socket is used with a connection-
B. Machine B requests service Y from machine oriented protocol.
A. What is the total number of application a. Stream
programs required? b. Datagram
a. One c. Raw
b. Two d. Remote
c. Three
d. Four
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 24: Client-Server Model
(Socket Interface)
1. The purpose of the UA is _______. 8. The _______ field in the MIME header has
a. Message preparation type and subtype subfields.
b. Envelope creation a. Content-type
c. Transferral of messages across the b. Content-transfer-encoding
internet c. Content-id
d. (a) and (b) d. Content-description
9. A JPEG image is sent as email. What is the
2. The purpose of the MTA is _______. content-type?
a. Transferral of messages across the a. Multipart/mixed
Internet b. Multipart/image
b. Message preparation c. Image/JPEG
c. Envelope creation d. Image/basic
d. (a) and (b)
10. An email contains a textual birthday
3. Which part of the mail created by the UA greeting, a picture of a cake, and a song. The
contains the sender and receiver names? text must precede the image. What is the
a. Envelope content-type?
b. Header a. Multipart/mixed
c. Address b. Multipart/parallel
d. Body c. Multipart/digest
d. Multipart/alternative
4. In the email address
mackenzie@pit.arc.nasa.gov, what is the 11. An email contains a textual birthday
domain name? greeting, a picture of a cake, and a song. The
a. mackenzie order is not important. What is the content-
b. pit.arc.nasa.gov type?
c. mackenzie@pit.arc.nasa.gov a. Multipart/mixed
d. (a) and (b) b. Multipart/parallel
c. Multipart/digest
5. The _______ field in the MIME header is the d. Multipart/alternative
type of data and the body of the message.
a. Content-type 12. A message is fragmented into three email
b. Content-transfer-encoding messages. What is the content-type?
c. Content-id a. Multipart/mixed
d. Content-description b. Message/RFC822
c. Message/partial
6. The _______ field in the MIME header uses d. Multipart/partial
text to describe the data in the body of the
message. 13. A client machine usually needs _______ to
a. Content-type send email.
b. Content-transfer-encoding a. Only SMTP
c. Content-id b. Only POP
d. Content-description c. Both SMTP and POP
d. None of the above
7. The _______ field in the MIME header
describes the method used to encode the data.
a. Content-type
b. Content-transfer-encoding
c. Content-id
d. Content-description
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 26: Electronic Mail (SMTP) and File
Transfer (FTP)
14. Which of the following is true? 21. In FTP, when you _______, it is copied from
a. FTP allows systems with different the client to the server.
directory structures to transfer files. a. Retrieve a file
b. FTP allows a system using ASCII and a b. Store a file
system using EBCDIC to transfer files. c. Retrieve a list
c. FTP allows a PC and a SUN workstation d. (a) and (c)
to transfer files.
d. All the above are true. 22. In anonymous FTP, the user can usually
______.
15. During an FTP session the control a. Retrieve files
connection is opened _______. b. Navigate through directories
a. Exactly once c. Store files
b. Exactly twice d. Do all the above
c. As many times as necessary
d. All of the above
1. HTTP has similarities to both _______ and 8. A user needs to retrieve a document from the
_______. server; the request line contains the _______
a. FTP; SNMP method.
b. FTP; SMTP a. GET
c. FTP; MTV b. HEAD
d. FTP; URL c. POST
d. PUT
2. A request message always contains _______.
a. A header and a body 9. A user needs to send the server some
b. A request line and a header information. The request line method is
c. A status line, a header, and a body ________.
d. A status line and a header a. OPTION
b. PATCH
3. Which of the following is present in both a c. MOVE
request line and a status line? d. POST
a. HTTP version number
b. URL 10. A user needs to move a file to another
c. Status code location. The request line method is _______.
d. Status phrase a. MOVE
b. PUT
4. What does the URL need to access a c. GET
document? d. PATCH
a. Path name 11. A response message always contains
b. Host computer _______.
c. Retrieval method a. A header and a body
d. All the above b. A status line, a header, and a body
c. A request line and a header
5. Which of the following is a retrieval method? d. A status line and a header
a. HTTP
b. FTP 12. The _______ header supplies information
c. TELNET about the body of a document.
d. All of the above a. General
b. Request
6. A user wants to replace a document with a c. Response
newer version; the request line contains the d. Entity
_______ method.
a. GET 13. The _______ header can specify the server
b. POST configuration or provide information about a
c. COPY request.
d. PUT a. General
b. Request
7. A user wants to copy a file to another c. Response
location; the request line contains the _______ d. Entity
method.
a. PUT 14. The _______ header can specify the client
b. PATCH configuration and the client's preferred
c. COPY document format.
d. POST a. General
b. Request
c. Response
d. Entity
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 27: HTTP And WWW
15. Hypertext documents are linked through 22. The _______ of a Web page contains the title
___________. and parameters used by the browser.
a. DNS a. Tags
b. TELNET b. Head
c. Pointers c. Body
d. Homepages d. Attributes
16. Which of the following is not a client 23. In < IMG SRC="Pictures/book1.gif"
program in WWW? ALIGN=middle> ALIGN is _______.
a. FTP a. A tag
b. TELNET b. The head
c. HTTP c. The body
d. HTML d. An attribute
17. Which of the following is an interpreter? 24. An ending tag is usually of the form _______.
a. HTTP a. </tagname>
b. HTML b. <\ tagname>
c. CGI c. < tagname >
d. FTP d. < tagname!>
18. What are the components of a browser? 25. Which category of HTML tags allows the
a. Retrieval method, host computer, path listing of documents?
name a. Image
b. Controller, client program, interpreter b. List
c. Hypertext, hypermedia, HTML c. Hyperlink
d. All the above d. Executable contents
19. Which type of Web document is run at the 26. The __________ tags enclose binary code or
client site? byte code.
a. Static a. Image
b. Dynamic b. List
c. Active c. Hyperlink
d. All the above d. Executable contents
20. Which type of Web document is created at 27. A program can use _____ to write a CGI
the server site only when requested by a client? program.
a. Static a. Bourne shell script
b. Dynamic b. Perl
c. Active c. C
d. All the above d. Any of the above
21. Which type of Web document is fixed- 28. An unemployed actor has posted his
content and is created and stored at the server resume on the Web. This is probably a(n)
site? _______ document.
a. Static a. Active
b. Dynamic b. Static
c. Active c. Passive
d. All the above d. Dynamic
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 27: HTTP And WWW
29. The server receives input from a browser 36. Stock quotations are posted on the Web.
through _________. This is probably a(n) ____________ document.
a. An attribute a. Active
b. A tag b. Static
c. A form c. Passive
d. Any of the above d. Dynamic
30. Output from a CGI program is _______. 37. Updates for a satellite’s coordinates can be
a. Text obtained on the WWW. This is probably a(n)
b. Graphics ________ document.
c. Binary data a. Active
d. Any of the above b. Static
c. Passive
31. Which type of Web document is transported d. Dynamic
from the server to the client in binary form?
a. Static
b. Dynamic
c. Active
d. All of the above
1. For streaming stored audio/video, the 8. A _______ changes the format of a high-
_______ holds information about the bandwidth video signal to a lower-quality
audio/video file narrow-bandwidth signal
a. Alpha file a. Timestamp
b. Beta file b. Sequence number
c. Metafile c. Mixer
d. Jitter d. Translator
3. The audio/video stream is sent by the media 10. TCP is not suitable for real-time traffic
server to the _______. because _______.
a. Browser a. There is no provision for timestamping
b. Web server b. There is no support for multicasting
c. Media player c. Missing packets are retransmitted
d. None of the above d. All of the above
4. A _______ shows when a packet was 11. JPEG encoding involves _______, a process
produced relative to the first or previous packet. that reveals the redundancies in a block.
a. Timestamp a. Blocking
b. Playback buffer b. The DCT
c. Sequence number c. Quantization
d. Threshold d. Vectorization
5. _______ are used to number the packets of a 12. The last step in JPEG, _______, removes
real-time transmission. redundancies.
a. Timestamps a. Blocking
b. Playback buffers b. Quantization
c. Sequence numbers c. Compression
d. Translators d. Vectorization
6. In a real-time video conference, data from the 13. The RTCP _______ message shuts down a
server are _______ to the client sites. stream.
a. Unicast a. Aplication-specific
b. Multicast b. Bye
c. Broadcast c. Source description
d. None of the above d. Farewell
6. A _______ certifies the bonding between a 12. A _______ is a trusted third party that
public key and its owner. establishes a symmetric key between two
a. CA parties who wish to communicate.
b. KDC a. KDC
c. TLS b. CA
d. Firewall c. PKI
d. TGS
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 30: Message Security, User
Authentication and Key Management
1. IPSec requires a logical connection between 7. A _____ can forward or block packets based
two hosts using a signalling protocol called on the information in the network layer and the
_____. transport layer headers.
a. AH a. Proxy firewall
b. SA b. Packet-filter firewall
c. PGP c. Message digest
d. TLS d. Private key
2. The handshake protocol and data exchange 8. The _____ field in the authentication header
protocol are part of _____. and the ESP header define the security method
a. CA used in creating the authenication data.
b. KDC a. Padding
c. TLS b. Sequence number
d. SSH c. Authenticatiin data
d. SPI
3. _____ is a collection of protocols that provide
security at the IP layer level. 9. _____ is a transport layer security protocol.
a. TLS a. TLS
b. SSH b. PGP
c. PGP c. IPSec
d. IPSec d. AH
4. _____ is an IP layer security protocol that 10. A method to provide for the security
only provides integrity and authentication. transport of email is called _____.
a. AH a. TLS
b. PGP b. SA
c. ESP c. PGP
d. IPSec d. IPSec
5. _____ is an IP layer security protocol that 11. A _____ can forward or block messages
provides privacy as well as integrity and based on the information in the message itself.
authentication. a. Proxy firewall
a. AH b. Packet filter firewall
b. PGP c. Message digest
c. ESP d. Private key
d. IPSec
12. A _____ network is totally isolated from the
6. An IP datagram carries an authentication global Internet.
header if the _____ field of the IP header has a a. Private
value of 51. b. Hybrid
a. Next-header c. Virtual private
b. Protocol d. Any of the above
c. Security parameter index
d. Sequence number 13. A _____ network can use a leased line for
intraorganization communication and the
Internet for interorganization communication.
a. Private
b. Hybrid
c. Virtual private
d. Any of the above
DATA COMMUNICATIONS and NETWORKING
3rd Edition by BEHROUZ A. FOROUZAN
Chapter 31: Virtual Private Network