Sie sind auf Seite 1von 7

SIT202 Computer Networks

Mock Exam

1. A network protocol defines


a) message format, messages, and actions taken on message transmission and reception,
error control
b) messages, and actions taken on message transmission and reception
c) message format, messages, and actions taken on message transmission and reception,
error control, and flow control
d) message format, messages, order of messages sent and received among network
entities, and actions taken on message transmission and reception
e) none of the above

2. Transmission delay
a) is a function of the packet’s length
b) is a function of the transmission rate of the link
c) is a function of the distance between routers
d) a) and b)
e) b) and c)
f) a) and b) and c)

3. If network protocols are implemented in layers, services are provided


a) to upper layers from lower layers
b) from upper layers to lower layers
c) between protocols of the same layer
d) none of the above

4. A pure P2P architecture is


a) based on a centralized server and many clients
b) a generalization of the client-server architecture
c) supports sharing resources
d) a) and c)
e) b) and c)
f) none of the above

5. A process is
a) a program written in a source language
b) a program in execution
c) an executable
d) none of the above

6. A network is required to be
a) fast
b) connection oriented
c) reliable
d) secure
e) packet based
f) all of the above
g) a) and b) and c)
h) a) and c) and d)

1
7. Distributed processes communicating via the internet are addressed using
a) the unique computer name they run on
b) address / name of the host computer and name / identifier that specifies the
receiving process
c) name /identifier of the receiving process
d) a) and b)
e) none of the above

8. Dimensions of an application’s service requirements are:


a) bandwidth
b) reliable delivery
c) timing
d) a) and b) and c)
e) a) and b)
f) b) and c)
g) a) and c)

9. HTTP is a protocol that


a) provides services to the TCP protocol
b) is provided with services of the TCP protocol
c) does not have any working relationship with the TCP protocol
d) is only associated with the Web
e) c) and d)
f) a) and b) and c)

10. An unreliable transport protocol is used for communication via an unreliable channel.
To serve an application reliably there is a need to
a) do nothing
b) replace the network
c) provide reliable data transfer at the application layer
d) a) and b)
e) b) and c)
f) none of the above

11. TCP
a) provides flow control
b) does not provide congestion control
c) provides reliable data transfer
d) a) and b)
e) b) and c)
f) a) and c)
g) all of the above
h) none of the above

2
12. Persistent HTTP connections are
a) are less efficient than nonpersistent HTTP connections
b) provide better performance than nonpersistent HTTP connections
c) provide comparable performance to that of nonpersistent HTTP connections
d) a) and b)
e) b) and c)
f) none of the above

13. A Web proxy server


a) exploits the concept of caching
b) is a server
c) is a client
d) is a server and a client at the same time
e) a) and b)
f) a) and c)
g) a) and d)
h) none of the above

14. DNS provides the following services: (i) translating host names to IP addresses; (ii) host
aliasing; (iii) mail server aliasing; (iv) load distribution; (v) switching.
a) true
b) false

15. A Web proxy server


a) exploits the concept of caching
b) is a server
c) is a client
d) is a server and a client at the same time
e) a) and b)
f) a) and c)
g) a) and d)
h) none of the above Comment [PCC1]: Same as Q13

16. A transport layer provides:


a) physical communication between distributed processes
b) logical communication between distributed processes
c) connection-oriented communication between distributed processes
d) connectionless communication between distributed processes
e) a) and b) and c)
f) b) and c) and d)
g) a) and b) and c) and d)

17. TCP protocol


a) provides for unreliable delivery between distributed processes
b) provides for reliable delivery between distributed processes
c) does not deal with congestion
d) offers flow control
e) is able to deal with congestion
f) does not provide for flow control
g) b) and d) and e)
h) a) and c) and f)

3
18. What is the UDP checksum of the following three 16 bit words? 0110011001100000,
0101010101010101, 1000111100001100.

a. 1010111010111100
b. 1111100011101010
c. 1100101011010111
d. 1011010100111110
e. 1011010100111101

19. Reliable transport communication


a) can be provided with unreliable network communication
b) requires reliable network communication
c) a circuit-switching based route to be set up
d) a) and b)
e) b) and c)
f) none of the above

20. If network protocols are implemented in layers, services are provided


a) to upper layers from lower layers
b) from upper layers to lower layers
c) between protocols of the same layer
d) none of the above Comment [PCC2]: Same as Q3

21. Pure P2P architecture


a) is a client server architecture
b) is not always based on a single server
c) where arbitrary end systems directly communicate
d) with peers that are intermittently connected and change IP addresses
e) all of the above
f) a) and b) and c)
g) b) and c) and d)
h) a) and c) and d)

22. The Go-Back-N protocol is


a) worse than the Selective Retransmission protocol because makes communication heavier
b) better than Selective Retransmission protocol because makes buffer management easier
c) better than the Selective Retransmission protocol because makes communication lighter
d) worse than Selective Retransmission protocol because makes buffer management more
difficult
e) a) and b)
f) none of the above

23. The most effective flow control is based on


a) the send-and-wait protocol
b) the sliding window protocol
c) a flow control enhancement provided to an application
d) a) and b)
e) b) and c)
f) none of the above

4
24. TCP takes
a) network-assisted congestion control
b) end-to-end approach Comment [PCC3]: Similar to question
31
25. Virtual circuit networks do not need routing
a) true
b) false

26. A VC consists of:


a) path from source to destination
b) a source address and the destination address
c) VC numbers, one number for each link along path
d) a sequence number
e) entries in forwarding tables in routers along path
f) a) and b) and c)
g) a) and b) and d)
h) a) and c) and e)
i) none of the above

27. Tunneling is
a) the mechanism through which IPv6 packets can be transported through IPv4
networks
b) where the distance between the source and destination is exceedingly long
c) where a router can determine all possible paths for a packet and thus select the
shortest route
d) where one packet encapsulates another
e) (a) and (d)

28. In decentralized routing algorithms


a) a router knows physically-connected neighbors
b) a router knows link costs to neighbors
c) iterative process of computation is exploited
d) exchange of information with neighbors is used
e) all the above
f) a) and b) and c)
g) a) and b) and d)
h) a) and c) and d)

29. Which of the following statements is TRUE?


a) In a decentralized routing algorithm all nodes have complete information about
the costs of all network links
b) A global routing algorithm computes the least-cost path between a source and
destination using complete, global knowledge about the network.
c) Dijkstra’s algorithm is a Link-state Routing algorithm
d) b) and c)
e) a) and c)

5
30. The most effective flow control is based on
a) the send-and-wait protocol
b) the sliding window protocol
c) a flow control enhancement provided to an application
d) a) and b)
e) b) and c)
f) none of the above Comment [PC4]: Same as Q23

31. TCP takes


a) network-assisted congestion control
b) end-to-end approach to congestion control
c) none of the above

32. Is the congestion window size (illustrated in the figure below) determined by
a) additive-increase algorithm
b) additive-increase, multiplicative-decrease algorithm
c) multiplicative-decrease algorithm
d) none of the above

congestion
window

24 Kbytes

16 Kbytes

8 Kbytes

time

33. The network layer services are provided


a) on each end computer
b) only on the routers a message is moving through
c) on each router
d) a) and b)
e) a) and c)
f) b) and c)
g) none of the above

6
34. Virtual circuit networks do not need routing
a) true
b) false Comment [PC5]: Same as Q25

35. CSMA is a token based access protocol


a) true
b) false

36. CSMA/CD performs better than CSMA


a) true
b) false

37. In a local area network a MAC address and IP address are identical
a) true
b) false

38. DES and AES are not used as often as RSA because they are computationally heavier when
providing the same communication security level
a) true
b) false

39. A security threat that renders a network, host or other piece of network infrastructure unusable
by legitimate users is classified as
a) Hijacking
b) Eavesdropping
c) Denial of Service
d) Mapping
e) IP spoofing

40. Fully secure e-mail communication system uses symmetric key cryptography, public key
encryption, a hash function, and a digital signature to provide secrecy, authentication, and
message integrity
a) true
b) false

Das könnte Ihnen auch gefallen