Sunteți pe pagina 1din 7

Instructions

Part I- Q.No 1 to 20 having one marks each


Part II- Q.No 21 to 36 carries 2 marks each
Part III- Q.No 38 and 39 carries 4 marks

PART I

1. In one of the pairs of protocols given below, both the protocols can use multiple TCP
connections between the same client and the server. Which one is that?
a) HTTP, FTP
b) HTTP. TELNET
c) FTP, SMTP
d) HTTP, SMTP
2. Ethernet frame consists of
a) MAC address
b) IP address
c) both MAC address and IP address
d) none of the mentioned
3. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
4. Which layer of the OSI reference model does PPTP work at?
a) Presentation Layer
b) Transmission Layer
c) Application Layer
d) Network Layer
5. Firewalls are often configured to block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
6. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned
7. UTP is commonly used in __________
a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
8. An RPC application requires
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned

9. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number

10. As the resouces are reserved between two communicating end systems in circuit
switching, this is achieved ___________
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward

11. All telnet operations are sent as


a) 4 bytes
b) 8 bytes
c) 16 bytes
d) 32 bytes

12. Which address identifies a process on a host?


a) physical address
b) logical address
c) port address
d) specific address

13. The technique of temporarily delaying outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned

14. An algorithm in encryption is called _____________


a) Algorithm
b) Procedure
c) Cipher
d) Module

15. SSH uses ___________ to authenticate the remote computer.


a) public-key cryptography
b) private-key cryptography
c) any of public-key or private-key
d) both public-key & private-key
16. In Unicast routing, if instability is between three nodes, stability cannot be
a) Stable
b) Reversed
c) Guaranteed
d) Forward

17. A false positive can be defined as…


a) An alert that indicates nefarious activity on a system that, upon further inspection,
turns out to represent legitimate network traffic or behavior
b) An alert that indicates nefarious activity on a system that is not running on the
network
c) The lack of an alert for nefarious activity
d) Both An alert that indicates nefarious activity on a system that, upon further
inspection, turns out to represent legitimate network traffic or behavior and An alert that
indicates nefarious activity on a system that is not running on the network

18. Which of the following is true of signature-based IDSes?


a) They alert administrators to deviations from “normal” traffic behavior
b) They identify previously unknown attacks
c) The technology is mature and reliable enough to use on production networks
d) They scan network traffic or packets to identify matches with attack-definition files

19. Discarding policy is mainly done by


a) Sender
b) Receiver
c) Router
d) Switch

20. This topology requires multipoint connection


a) Star
b) Mesh
c) Ring
d) Bus

PART II

21. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
a) 14
b) 15
c) 16
d) 30

22. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is
your class of address, subnet address, and broadcast address?
a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
23.A network administrator is connecting hosts A and B directly through their Ethernet
interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful.
What can be done to provide connectivity between the hosts?

1. A crossover cable should be used in place of the straight-through cable.


2. A rollover cable should be used in place of the straight-through cable.
3. The subnet masks should be set to 255.255.255.192.
4. A default gateway needs to be set on each host.
5. The subnet masks should be set to 255.255.255.0.
a) 1 only
b) 2 only
c) 3 and 4 only
d) 1 and 5 only

24. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which
classful subnet mask would you use
a) 255.255.255.192
b) 255.255.255.224
c) 255.255.255.240
d) 255.255.255.248

25. The network address of 172.16.0.0/19 provides how many subnets and hosts?
a) 7 subnets, 30 hosts each
b) 8 subnets, 8,190 hosts each
c) 8 subnets, 2,046 hosts each
d) 7 subnets, 2,046 hosts each

26. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the
following can be valid host IDs on the LAN interface attached to the router?
1. 172.16.1.100
2. 172.16.1.198
3. 172.16.2.255
4. 172.16.3.0
a) 1 only
b) 2 and 3 only
c) 3 and 4 only
d) None of the mentioned

27. For the IEEE 802.11 MAC protocol for wireless communication, which of the
following statement is/are TRUE?
i) At least three non-overlapping channels are available for transmissions.
ii) The RTS-CTS mechanism is used for collision detection.
iii) Unicast frames are Acknowledged.
a) All I,II, and III
b) I and III only
c) II and III only
d) II only

28. Suppose two hosts use a TCP connection to transfer a large file. Which of the
following
statements is/are FALSE with respect to the TCP connection?

I. If the sequence number of a segment is m, then the sequence number of the subsequent
segment is always m+1.
II. If the estimated round trip time at any given point of time is t sec, the value of the
retransmission timeout is always set to greater than or equal to t sec.
III. The size of the advertised window never changes during the course of the TCP
connection.
IV. The number of unacknowledged bytes at the sender is always less than or
equal to the advertised window
a) III only
b) I and III only
c) I and IV only
d) II and IV only

29. Which of the following is the broadcast address for a Class B network ID using the
default subnet mask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
30. An organization has a class B network and wishes to form subnets for 64
departments. The subnet mask would be:
(a) 255.255.0.0
(b) 255.255.64.0
(c) 255.255.128.0
(d) 255.255.252.0

31. Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53
and netmask 255.255.128.0. C2 has IP address 203.197.75.201 and netmask
255.255.192.0. which one of the following statements is true?
a) C1 and C2 both assume they are on the same network
b) C2 assumes C1 is on same network, but C1 assumes C2 is on a different network
c) C1 assumes C2 is on same network, but C2 assumes C1 is on a different network
d) C1 and C2 both assume they are on different networks.

32. Station A needs to send a message consisting of 9 packets to Station B using a sliding
window (window size 3) and go-back-n error control strategy. All packets are ready and
immediately available for transmission. If every 5th packet that A transmits gets lost (but
no acks from B ever get lost), then what is the number of packets that A will transmit for
sending the message to B?
a) 12
b) 14
c) 16
d) 18

33. What is the network ID of the IP address 225.100.123.70?

a) 225.100.123.71
b) 225.100.123.72
c) 225.100.123.75
d) It does not has any network ID

34. Packets of the same session may be routed through different paths in:
a) TCP, but not UDP
b) TCP and UDP
c) UDP, but not TCP
d) Neither TCP nor UDP
35. Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91
respectively and they both use the same netmask N. Which of the values of N given
below should not be used if A and B should belong to the same network?
a) 255.255.255.0
b) 255.255.255.128
c) 255.255.255.192
d) 255.255.255.224
36. The correct format of packet in tunnel that uses IPv4 region is
1. IPv6 header
2. Payload
3. IPv4 header
a) 3-1-2
b) 3-2-1
c) 1-2-3
d) 1-3-2

PART III

37. Consider the following routing table at an IP router

For each IP address in Group-I identify the correct choice of the next hop from Group-II
using the entries from the routing table above.
List-I List-II
A. 128.96.171.92 1. Interface 0
B. 128.96.167.151 2. Interface 1
C. 128.96.163.121 3. R2
D. 128.96.165.121 4. R3
5. R4
ABCD
a) 1 3 5 4
b) 1 4 2 5
c) 2 3 4 5
d) 2 3 5 4

38. Match the following:

List-I List-II
A. SMTP 1. Application layer
B. BGP 2. Transport layer
C. TCP 3. Data link layer
B. PPP 4. Network layer
5. Physical layer
ABCD
a) 2 1 3 5
b) 1 4 2 3
c) 1 4 2 5
d) 2 4 1 3

S-ar putea să vă placă și