Sunteți pe pagina 1din 19

Unit -I

I. Objective Type Questions:

Multiple Choice Questions:

1. In a network with 25 computers, which topology would require the most


extensive cabling? [ ]

a) mesh b) star c) bus d) ring

2. A __________ connection provides a dedicated link between 2 devices. [ ]

a) Point-to-point

b) multipoint

c) Primary

d) Secondary

3. Why was the OSI model developed? [ ]

a) Manufactures disliked the TCP/IP protocol Suite.

b) The rate of data transfer was increasing exponentially.

c) Standards were needed to allow any 2 systems to communicate.

d) None of the above.

4. As the data packet moves from the lower to upper layers, headers are [ ]

a) Added b) subtracted c) Rearranged d) modified

5. In the_________ layer, the data unit is called a frame. [ ]

a) Physical b) data link c) network d) transport

6. Mackenzie Publishing with head quarters in London and branch offices


through out Asia ,Europe and South America, is probably connected by
a_____________. [ ]

a) LAN b)WAN c)MAN d)NONE


7. Security and privacy are less of an issue for devices in a_________
topology . [ ]

a) mesh b)tree c) bus d) star

8. Session layer check points _________ [ ]

a) Allow just a portion of a file to be resent

b) Detect and recover errors

c) Control the addition of errors

d) Are involved in dialog control

9. Mail services and directory services are available to network users through
the_________ layer. [ ]

a) Data link b)Session c) Transport d)Application

10.Why was the OSI Model developed? [ ]

a) Manufactures disliked the TCP/IP protocol suite.

b) The rate of data transfer was increasing exponentially.

c) Standards were needed to allow any two systems to communicate.

d) None

Fill in the Blanks:

11.The ______layer is the layer closest to the transmission medium.

12.The end -to- end delivery of the entire message is the responsibility of the
____layer.

13.____ are rules that govern a communication exchange.

14.In _____ transmission, the channel capacity is shared by both


communicating devices at all times

15.ATM cells are ______bytes long.

16. ______are rules that govern a communication exchange.


17.The information to be communicated in a data communication system is the
________

18.Which agency created standards for telephone communications (V series)


and for network interfaces and public networks (X series).

19.______is the division of one task among multiple computers.

20.The _____ is the physical path over which a message travels.

ANSWERS:

1) b 2) a 3) c 4) b 5) b

6) b 7) a 8) a 9) d 10) c

11) Physical Layer 12) Transport 13) Protocols 14) Full –Duplex 15) 53

16) protocol 17) message 18) ITU-T 19) Distributed processing 20) medium

Unit -2

I. Objective Type Questions:

Multiple Choice Questions:

1. Which of the following is not a guided medium?

a) Twisted- pair cable b) coaxial cable c) fiber-optic cable d) atmosphere

2. Which ISDN plane is associated with signaling and the D channel?

a) User b) control c) management d) supervisory

3. Which of the following primarily uses guided media?

a) Cellular telephone system

b) Local telephone system

c) Satellite communications

d) Radio broadcasting

4. The RG number gives us information about ___


a) Twisted –pairs

b) Coaxial cables

c) Optical fibers

d) All of the above

5. VLF propagation occurs in _____

a) The troposphere

b) The ionosphere

c) Space

d) All of the above

6. Which of the following is an advantage to using fiber optics data


transmission?
a) resistance to data theft b) fast data transmission rate
c) Low noise level d) all of above
7. Which of the following statement is incorrect?
a) The difference between synchronous and asynchronous transmission is
the clocking derived from the data in synchronous transmission.
b) Half duplex line is a communication line in which data can move in two
directions, but not at the same time.
c) Teleprocessing combines telecommunications and DP techniques in
online activities
d) Batch processing is the preferred processing mode for telecommunication
operation.
8. Which of the following is considered a broad band communication channel?
a) Coaxial cable
b) Fiber optics cable
c) Microwave circuits
d) All of above
9. The transmission signal coding method of TI carrier is called
a) Bipolar
b) NRZ
c) Manchester
d) Binary

10. The physical layer, in reference to the OSI model, defines the interface
between the X.25 network and the Packet mode device.
a) True b) False

Fill in the Blanks:


11._____ converts the information from non –ISDN format to ISDN
format

12. In _____each packet of a message follows the same path from sender to
receiver.

13.____ AAl type is designed to support a data stream that has a constant bit
rate.

14.Radio communication frequencies range from ____

15. Smoke signals are an example of communication through________

16.What is virtual path?


Ans: Along any transmission path from a given source to a given
destination, a group of virtual circuits can be grouped together into what
is called path.
17.What is a NIC?
Ans: Network Interface Card

18. ____ layer decides which physical pathway the data should take.

19. ISDN is an example of ______ network

20. X.25 is an example of ______ network

ANSWERS:

1) d 2) b 3) b 4) b 5) d 6) d 7) d 8) d 9) a 10) a
11) Terminal Adapter 12) virtual Circuit switching 13) AAl1
14) 3 KHz to 300GH 15) UN guided media 18) Physical
19) Circuit switched 20) Packet switched
UNIT III

Objective Type Questions:

Multiple Choice Questions:

1. Which error detection method involves polynomials? []

a) VRC b) LRC c) CRC d) checksum

2. An ACK 3 in sliding window flow control (window size of 7) means that


frame ____ is next []

a) 2 b) 3 c) 4 d) 8

3. Piggy backing means []

a) Sending an acknowledgement separate.

b) Sending an acknowledgement and data frames simultaneously.

c) Sending only data frames.

d) None

4. In stop - and -wait ARQ, if data1 has an error, the receiver sends a ____
frame. []

a) NAK 0 b) NAK 1 c) NAK 2 d) NAK

5. Polling and Selecting are functions of the _____ in HDLC protocol. []

a) I -frame b) S-frame c) U – frame d) a&b

6. Which layer is responsible for flow control with sliding windows and
reliability with sequence numbers and acknowledgments?
a) Transport b) Application c) Internet d) Network Interface

7. IEEE subdivided the data link layer to provide for environments that need
connectionless or connection-oriented services. What are the two layers
called?
a) Physical b) MAC, LLC c) Session d) IP
8. Is the following statement true of the Go-back-N error control strategy?
A transmitter may send up to N packets before it receives an
acknowledgment.

a) True b) False

9. In stop and wait ARQ, if data1 has an error, the receiver sends a
_______frame.

a) NAK 0 b) NAK 1 c) NAK 2 d) NAK

10. Flow control is needed to prevent________

a) Bit errors b) Overflow of the sender buffer

c) Overflow of the receiver buffer d) collision b/w sender and receiver.

Fill in the Blanks:

11.HDLC is a _________ protocol

12.ARQ stands for ____________

13.In sliding flow control, if the window size is 63 ____ is the range of
sequence numbers.

14.The Hamming Code is a_________ method.

15. In CRC there is no error if the remainder at the receiver is _____

16.What is SLIP

Ans: It is a very simple protocol used for transmission of IP data grams


across a serial line.

17. Poll/select line discipline requires ________ to identify the packet recipient.

18. Write the functions of data link layer?

19. The HDLC _________field defines the beginning and end of a frame.

20.The Address field of a frame in HDLC protocol contains the address of the
________station.
Answers:

1) c 2) c 3) b 4) d 5) d 6) c7) b 8)a 9)d 10)c

11) Bit oriented protocol 12) Automatic Repeat Request 13) 0 to 63 14) Error
Correction 15) Zero 17) dedicated line 18)line discipline, flow control and
error control 19) flag 20) secondary.

UNIT IV

Objective Type Questions:

Multiple Choice Questions:

1. Which of the following is not an internet working device?

a) Bridge b) Gateway c) Router d) All of them

2. The maximum throughput of SLOTTED ALOHA is

a) 1/e b) 1/2e c) e d) 2e

1. 3. Which project 802 standard provides for a collision-free protocol?

a) 802.2 b) 802.3 c) 802.5 d) 802.6

4. The ____ is a product of the LLC sub layer

a) 802.2 frame b) 802.5 frame c) PDU d) preamble

5. ______ uses a physical star topology

a) 10 Base 5

b) 10 Base 2

c) 10 Base T

d) None

1. What is a MAC?
a) A Computer made by Apple
b) Memory Address Corruption
c) Mediocre Apple Computer
d) Media Access Control
2. The ________is a product of the LLC sub layer.
a) 802.3 frame b) 802.5 frame c) PDU d) preamble

3. IEEE project 802 divides the data link layer into an


upper_________sublayer and a lower ________sub layer.
a) LLC,MAC b) MAC,LLC c) PDU,HDLC d)HDLC,PDU
4. Bridges function in the _______layers.
a) Physical b) Data link c) network d) a & b.
5. Repeaters function in the _______layers.
a) Physical b) Data link c) network d) a & b.

Fill in the Blanks:

6. 10 Base 2 and 10 Base 5 have different_______

7. In transparent bridge ,both source and destinations are in the same LAN,
then a frame is ________

8. _______ Sub layer performs the channel allocation.

9. The monitor station in the ___ standard ensures that one and only one
token is circulating.

10. Another term for CSMA/CD and the IEEE802.3 standard is _____

11. ______________ Architecture uses CSMA/CD access method?

12. DQDB is an acronym for________

13. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?

Ans: All these 3 are related to ethernet cables, where 10base2 can define as
maximum rate of data transfer is 10megabits per second ,B stands for baseband
signaling and 2 is for 200 meter of length... this is same for 10base5 but where
in 10baset T stands for twisted pair of cable

14. DQDB operates in the _______layers.

15. SMDS is an acronym for_____________.

Answers:
1) a 2) a 3) b 4) a 5) c 6) d 7) c8)a 9)d 10)a

11) Same data rate 12) Discarded 13) Mac14) 802.4 15) Ethernet 16)
ethernet17) distributed queue dual bus 19) physical and data link layer 20)
switched multi mega bit data services

UNIT V:

Objective Type Questions:

Multiple Choice Questions:

1. Sending a message to a group is ____and routing algorithm is _____

a) Multi cast and multi casting routing

b) Broadcast and broad casting routing

c) Multi destination and multi destination routing

d) None

2. In hierarchical routing the routers are divided into ____

a) Sections b) Blocks c) Regions d) none

3. The shortest path in routing can refer to ____

a) The least expensive path

b) The least distant path

c) The path with the smallest no of hops

d) Any or a combination of above

4. Which routing algorithm requires more traffic between routers for setup
and updating?

a) Distance vector b) link state c) dijkstra d) vector link

5. In distance vector routing, each router receives vectors from ______

a) Every router in the network

b) Every router less than two units away


c) A table stored by the software

d) Its neighbors only

6. Select which protocols use distance vector routing?

a) OSPF b) RIP c) IGRP d) PPP

7. The End-to end delivery is the movement of a message from _________


a) One stations to the other station b) one n/w to the next n/w
c) Source to destination d) none.
8. The PSTN is an example of a_____network.
a) Packet switched b) Circuit switched
c) Message switched d)none.
9. In a time division switch a_______governs the destination of a packet
stored in RAM.
a) TDM bus b) Cross Point c) Crossbar d) control unit.
10. A permanent virtual circuit involves________
a) Connection establishment b) data transfer
c) Connection release d) all of the above.

Fill in the Blanks:

11. Routers function in the ______layer.

12. _____algorithm, in which every incoming packet is sent out on every


outgoing line except the one it arrived on.

13. The other name of the Distance Vector routing algorithm is __________

14. Sending a packet to all destinations simultaneously is _______

15. A________ is a subset of the subnet that includes all the routers but contains
no loops.

16. ARP stands for ______


17. RARP stands for ______
18. Can we use static and dynamic routing in one network?
19. What is region?
ans: When hierarchical routing is used, the routers are divided into what we
will call regions, with each router knowing all the details about how to route
packets to destinations within its own region, but knowing nothing about the
internal structure of other regions.

20. What is multicast routing?

Ans: Sending a message to a group is called multicasting, and its routing algorithm
is called multicast routing.

Answers:

1) a 2)c 3)d 4) c5) d 6) d7) c 8) b9) d10)d

11) Network 12) flooding 13) Bellman-ford 14) broadcasting 15) spanning tree16)
Address resolution protocol17) Reverse Address resolution protocol 18) yes

UNIT VI

Objective Type Questions:

Multiple Choice Questions:

1. Each network in an internetwork is independent of all the others is referred


to as

a) Autonomous System

b) Internetworking

c) Non –Autonomous System

d) None

2. Which IP address class has few hosts per network?

a) A b) B c) C d) D

3. For what does the data link layer look for as it sends a frame from one link
to another?

a) Host ID b) IP address c) Domain name d) Station address

4. Which of the following is a class C host address?

a) 230.0.0.0 b) 130.4.5.6 c) 200.1.2.3 d)30.4.5.6


5. When a host knows its physical address but not its IP address ,it can use____

a) ICMP b) IGMP c) ARP d) RARP

6. What does ICMP stand for?


a) Internet Connection Modem Protocol
b) Intranet Control Message Program
c) Internal Conflict Management Program
d) Internet Control Message Protocol
7. What are the three commonly used methods of flow control
used for handling network congestion?

a) Buffering b) Source-quench messages c) a,b&d d) Windowing


8.
9.
10.

Fill in the Blanks:

11.The purpose of ARP on a network is to find the ____given the _____

12.TCP/IP ‘s _____layer corresponds to the OSI model’s top 3 layers.

13.DHCP stands for ____________

14.Tunneling is used for _________

15.When too many packets are present in the subnet ,performance degrades is
_____

16.What is the minimum and maximum length of the header in the TCP
segment and IP datagram?
Ans: The header should have a minimum length of 20 bytes and can have a
maximum length of 60 bytes.

17.What is BGP (Border Gateway Protocol)?

It is a protocol used to advertise the set of networks that can be reached with
in an autonomous system. BGP enables this information to be shared with
the autonomous system. This is newer than EGP (Exterior Gateway Protocol
18.________ Protocol data units is employed at the network layer.

19.RIP stands for _______

Answers:

1) a 2) c 3) d 4) c 5) d 6) d7) c 8) 9) 10)

11) Physical, IP address 12) Transport 13) Dynamic Host Configuration protocol

14) Handling the two different networks interwork 15) Congestion

18) segments 19) Routing information protocol 20)

UNIT VII

Objective Type Questions:

Multiple Choice Questions:

1. End –to – End delivery is the movement of a message from ___

a) One to the next station

b) One network to the next network

c) Source to destination

d) None

2. In the transport layer ___ is a connection less service.

a) Cons

b) Clns

c) Cots

d) Clts

3. In ____services connections must be established and terminated

a) Connectionless

b) Connection-oriented
c) Segmentation

d) None

4. Making sure that data segments arrive in the correct order is ____ control

a) Error b) Sequence c ) Loss d) Duplication

5. Which of the following applies to both UDP and TCP

a) Transport layer protocols

b) Port –to- Port communication

c) Services of IP layer used

d) All of the above

6. The TCP/IP application layer corresponds to the OSI models_____layers.

a) Physical,datalink,network b) transport and network

c) Session and transport d) session, presentation & application

7. TCP connections are full-duplex. (True/False)

8. There are _6__ Flags in TCP header.

9. A segment consists of a fixed _20_ byte header plus an optional part


followed by _0 or more___ bytes.
10. The source and destination addresses are __16__ bits long.

Fill in the Blanks:

1. TPDU stands for ______

2. To call a remote procedure ,the client program must be bound with a small
library procedure called _____

3. RTP has a little sister protocol called ______

4. A TCP connection is a _____ stream

5. The hardware (or) software with in the transport layer that does the work is
called _____
6. What are the duties of transport layer?

7. What are the difference between TCP and UDP?

Ans: TCP: Connection oriented protocol, acknowledged one, Point to point


communication. UDP: Connection less protocol, unreliable, less traffic

8. What is the way to establish a TCP connection?

Ans: By using acknowledgement.


9. What is the difference between flow control and error control?

Ans: Flow control: adjust and confirm data flow rate for successful transmission. Error
Control: a way to recover corrupted data.

10. You have one IP: 192.168.10.29. In which layer this IP works?

Ans: Network layer.


ANSWERS:

1) b 2) b 3) b 4) a 5) d 6)d 7)8)9)10)

11) Transport protocol data unit

12) Client stub 13) RTCP

14) Bit 15) Transport entity16) end-to end delivery,addressing,errorcontrol,flow


control and multiplexing17)18)19)20)

UNIT VIII:

Objective Type Questions:

Multiple Choice Questions:

1. Which of the following is not an interpreter?

a) HTTP

b) HTML

c) CGI

d) Java
2. Remote login can involve_______

a) NVT

b) TELNET

c) TCP/IP

d) All of the above

3. The purpose of the MTA is________

a) Message preparation

b) Envelope creation

c) Transferal of message across the internet

d) A and B

4. In secret key encryption, the secret key is used for_______

a) Encryption

b) Decryption

c) Hashing

d) A and B

5. To create a digest, we can use_________

a) a hash function

b) a secret key

c) a nonce

6. Mail services are available to network users through the ______ layer.
a. Data link b. Physical c. Transport d. Application
7. An SNMP manager can send ______messages
a) GetRequest b) SetRequest c) GetNextRequest d)all
8. An SNMP agent can send ______messages
b) GetResponse b) GetRequest c) GetNextRequest d) SetRequest
9. MIME allows ____ data to be sent through SMTP
a) Audio b)non-ASCII data c)image d)all

10. The RSA algorithm is the basis of a ___encryption method


a) Public key b)private key c) conventional d) denominational

Fill in the Blanks:

11.JPEG stands for_________________

12.MPEG stands for_________________

13.Digital signature can provide ______________ for a n/w .

14.Cryptography means_________

15. Hypertext documents are linked through________

16.What protocol is used by DNS name servers

DNS uses UDPfor communication between servers. It is a better choice


than TCP because of the improved speed a connectionless protocol offers.
Of course, transmission reliability suffers with UDP.

17.SNMP stands for _____

18. _______runs the SNMP client program;_________runs the SNMP


server program.

19. HTML has similarities to both ___and _____

20.Encryption and decryption are functions of the ___layer

Answers:

1) a 2) b 3) c 4) a 5) a6)7)d8)a9)a10)a

11) Joint Photographic Experts Group 12) Motion Picture Experts Group

13) Authentication, Integrity, Non-repudation 14) Secret writing

15) Home Pages.16)17)18)19)a manager and an agent20)Presentation layer

S-ar putea să vă placă și