Sunteți pe pagina 1din 6

MC0015 COMPUTER NETWORK [1 MARK EACH] 1) 2) 3) a) b) c) d) 4) 5) Two or more networks are connected to form an------ (Internet) State true

or false: FDDI can be used as backbone What does internet working scheme use Hardware Network Software None of these WWW stands for -------- (World Wide Web) I S P stand for------- (Internet service provider) True

6) To allow packet to loop b/w backbones all major backbones connect at the --------(Nero access point) 7) ------------ improves reliability (Redundancy)

8) Computers that interconnected two networks and pass pockets from one to another are called.------------&---------------. (Gateway and route) 9) 10) 11) 12) 13) a) b) c) d) 14) 15) 16) 17) State T or F Internet is a network of network. True State T or F Internet is restricted in size . False ARPA is stands for _______________(Advanced Research Projects Agency) Internet ures --------- reference model. (TCP / IP) Which one is not layer of TCP / IP model? Physical Internet Transport Refrence State T or F file transfer service is reliable. E-mail is not a reliable service. The most widely used protocol in internet. (TCP / IP) An IP address is a unique address. True False False

18) The linkage of users IP address to his name is publicity available inform ation. False 19) The given address is of ------24 bits--------------------------------0 Network ID Host ID a) Class A b) Class B c) Class C d) Class E

20) ---------------------27 bits----------1 1 1 1 0 unused this is a address of a) Class A b) Class B c) Class C d) Class E 21) Interpreting all zero to mean --------------- (This host)

22) IP address are often expressed four decimal numbers each separated by a dot. This format is called------------------- (Dotted decimal notation) 23) The range of class A will be from------------to-------------------to 127 .255.255.255 24) ICANN stands for ------------------- (Internet Corporation for Assigned names and numbers) 25) The classful A, B and C octet boundaries were easy to understand and imp lement. a) True b) False 26) IPVU address did not foster the efficient allocation of a finite address space. a) True b) False 27) a) b) c) d) 28) a) b) c) d) 29) a) b) c) d) 30) 31) 32) a) b) c) d) 33) a) b) c) A / 24 networks supports how may hosts 225 226 228 254 If physical address is 02-60-8A-01-02-04 corresponding IP address is 192.168.0.1 192.168.0.2 192.168.0.3 192.168.0.5 ARP RFC RFC RFC RFC is defined in 826 827 829 286 to IP address is done by _________(DNS)

The mapping of

PGP encrypts data by using a block clipper called (IDEA) PGP uses how many bit keys 128 126 125 122 DES uses how may bit key. 56 bit 58 bit 59 bit

d) 34) s)

55 bit The art of breaking art of cipher is called--------------- (Cryptanalysi

35) S / MIME stand for ------------------------- (Secure / multipurpose inte rnet merit extent ion) 36) People authenticate other people by faces, voices and handwriting. True/ False 37) At the physical layer firewalls can be installed True/ False

38) The messages types which BGP defines are a) One b) Two c) Three d) Four 39) __________________ (Videoconference) technology finds extensively helpfu l for remote school. 40) _____________ (Session & presentation) layers are not there in TCP / IP reference model. [2 MARKS EACH] 41) The feistel(f) function, DES operates on ----------------- at a time and consists of -----------stages. (32, 4) 42) Theommon reasons for applying a digital signature are ------------&---------------(Authentication, integrity 43) If the plain text is ATTACK and cipher text after substitution is CVVCEM t hen the key is --------------------- (+2) 44) a) b) c) d) 45) a) b) 46) a) b) c) d) 47) a) b) c) d) The output of the encryption process known as Cipher text English text Plain text None The different types of intruders are Active Passive The plain text is ATTACK it can be encrypted as with key used ATTACK BUUBDL CRACED BATAKT Network security problems can be divided mainly into categories 1 2 3 None

48) Network security mainly divided into --------------,---------------&-----------------. (Secrecy, Authentication and Non-repudiation)

49) Internet E-mail messages consist of -----------------major sections. The y are--------------- (Two, Header and body) 50) IRC is --------------------and it is ------------------users.(Internet r elay chat, mulh) 51) With gopher, every document has a defined ------------and gopher client functionally was quickly duplicated by early web browsers such as -------------( Format type, mosaic) 52) ) The source of the name -------------is columned to be threefold (Gopher

53) The two main popular browsers are ___________ & ______________-(Internet explorer, Netscape navigator) 54) -----------------defined a standard procedure to support the sub netting . (RFC 950) 55) , IP) 56) a) b) c) d) 57) a) b) c) d) Is this Frame reader is subdivided into___________and _______________. (Physical How many addresses are in between 194.24.0.0 to 194.24.31.255 that are 1024 address 1026 address 1022 address None In BGP-4 messages types the meaning of Open initialize communication Up date advertise or withdraw route Notification response to an incorrect message Keep alive actively test peer connectivity statement true or false?

True

58) BGP messages type are _________,___________,_________and ____________. ( Open message, up date message , Notification message, keep active message) 59) Fields of hello messages formats are _________,_________and ________,___ _____. ( Network mask , Dead timer , Hello inter , Gway prio) 60) Inter NIC is known as a) International Net Information Communication b) Inter Network Information Command c) International Network Institute Center d) International Network Information Center [4 MARKS EACH] 61) The main four layers used in TCP / IP refrence model are_________,_________, ___ _________and ______________. i. Physical ii. Network interface iii. Internet iv. Transport 62) Few application level services are_________,________,________&_________. (E-mail, FTP, Remote login, World Wide Web)

63) Few network level services are _________________and _______________. (Connectionless packet delivery services , Reliable stream transport services) 64) Different classes of IP addresses are ______, _________, ________, ________ & ________. (Class A , Class B , Class C, Class D, Class E) 65) The internet address is _________and ____________IP address is _________bit long. (48 bit and 32 bit) 66) ARP is defined in RFC ___________and it is a current internet standard______ ___. (826 and STD 37) 67) ARP reply frame header is subdivided again into _________and_________. (hysical address , IP address) 68) ail secure system consisting of ________,___________&______________. (PGP, PEM, S/MIME) 69) The precedence value is ____________integer Default value for lifetime is __ _____. (Twos complement, 30 minutes) 70) _________and_______class cant accommodate more than 254 hosts. (Class A, Class B) 71) Match the following Host ID Classes Class A Class B Class C a) 1-b, 2-a, 3-c b) 1-b, 2-c,3-a c) 1-a, 2-b, 3-c d) None 72) Match the following Physical address IP address 02-60-8A-01-02-04 (a) 192.168.0.1 08-03-8A-01-02-04 (b) 192.168.0.2 08-03-8A-01-02-04 (c) 192.168.0.3 a) 1-a, 2-b, 3-c b) 1-b, 3-c, 2-a c) 1-b, 3-a, 2-c d) 1-c, 2-b, 3-a 73) OSPF supports three kinds of connection and networks. a) Point to point lines b/w exactly two routers. b) Multi-access networks with broadcasting. c) Multi-access networks without broadcasting. d) All of the above 74) The three steps needed for inter area routing are _________,_______and _____ ____. (Go from source to backbone , Go across the backbone to the destination area, Go to the destination) 75) The address reserved for private networks is

a) b) c) d)

172.16.255.0 173.15.256.1 173.15.258.2 None

S-ar putea să vă placă și