Question
The following application layer protocol spec specifies support for both TCP and UDP at the transport layer:
a. DNS
b. FTP
c. Telnet
d. HTTP
The correct answer is: DNS
Question
The transport protocol on which SMTP runs is:
A. TCP
B. UDP
C. IP
D. None of the above
The correct answer is: TCP
Question
Which of the statements below does not apply to Circuit Switched Networks?
a. Can be implemented using Time Domain Multiplexing as well as Frequency Domain Multiplexing
b. A call set up is required before the data can be sent from the source to the destination
c. Dedicated resources used for transmission from source to destination
d. Once a particular call has been set up between the source and destination, data fragmented at the routers can be sent along different paths to the destination
The correct answer is: Once a particular call has been set up between the source and destination, data fragmented at the routers can be sent along different paths to the destination
Question
Among the network topologies listed below, which would be the preferred WAN design to implement for a company with a hierarchical structure i.e. with main, regional and branch offices, where information is exchanged from main to regional to branch offices and vice-versa?a. Partial Mesh
b. Double-Ring
c. Tree
d. Ring
The correct answer is: Partial Mesh
Question
An organization’s LAN that connects the end systems of the users to the edge router is part of :
A. Network Edge Laye
B. Network Core Layer
C. Network Access Layer
D. None
The correct answer is: Network Access Layer
Question
Applications that need to talk across a network uses __________ for communication with the end-node (destination)
a. Sockets
b. Semaphores
c. Message queues
d. Shared memory
The correct answer is: Sockets
Question
Which of the status codes is returned as part of the HTTP Response if the requested content on the server is unchanged?
302
306
304
301
The correct answer is: 304
Question
Which one of the following statements is NOT about HTTP cookies?
a. Cookies can be used to track the browsing pattern of a user at a particular site.
b. Cookies are a piece of code that has the potential to compromise the security of an Internet user.
c. Cookies get access to the client computer through an HTTP header.
d. Cookies have expiry time.
The correct answer is: Cookies are a piece of code that has the potential to compromise the security of an Internet user.
Question
DNS servers that give us access to DNS records to map the names of hosts to IP addresses are called:
A. TLD DNS servers
B. Authoritative DNS servers
C. Root DNS servers
D. Local DNS servers
a. C
b. B
c. D
d. A
The correct answer is: B
Question
What is the size of Urgent pointer in TCP segment
a. 24 bits
b. 8 bits
c. 32 bits
d. 16 bits
The correct answer is: 16 bits
Question
What is often needed for UDP functioning
a. PPP and CHAP
b. DNS and SNMP
c. Frame relay and X.25
d. SMTP and POP3
The correct answer is: DNS and SNMP
Question
Which of the following is/are example(s) of stateful application layer protocols?
(i) HTTP
(ii) FTP
(iii) TCP
(iv) POP3
a. 1,3,4
b. 2,3
c. 1,2,3
d. 2,4
The correct answer is: 2,4
Question
Choose the right answer: DNS is used for:
i) Mail server aliasing
ii) Load distribution
iii) Host aliasing
a. i,iii
b. i,ii,iii
c. i,ii
d. iii,i
The correct answer is: i,ii,iii
Question
What is the major application of UDP
a. Multimedia
b. Scheduling
c. Small office network
d. LAN communication
The correct answer is: Multimedia
Question
Error Control and Flow Control are responsibilities ofa.
a. data link and Physical Layer
b. data link and Transport Layer
c. data link and network Layers
d. Application and Presentation Layer
The correct answer is: data link and Transport Layer
Question
Which of the following statements regarding the Internet Structure is FALSE?
a. Each Tier 2 or Regional ISP is a customer of one or more Tier 1 ISPs
b. A Tier 2 ISP cannot peer privately with one or more Tier-2 ISPs
c. A Tier 1 ISP has a national or international coverage over a wide area, and has a network consisting of high end routers and links with high bandwidth
d. A Tier 3 or Local ISP may decide to be a direct customer of a Tier 1 ISP
The correct answer is: A Tier 2 ISP cannot peer privately with one or more Tier-2 ISPs
Question
9.Which of the following applications uses peer-to-peer paradigm?
a. FTP
b. Skype
c. Email
d. World-Wide-Web
The correct answer is: Skype
Question
Sequence the following actions for the interaction between a web browser and a web server.
A. Browser requests a webpage using HTTP.
B. Browser establishes a TCP connection with the web server.
C. Server sends the requested webpage using HTTP.
D. Browser resolves the domain name using DNS.
a. 4,2,1,3
b. 2,3,4,1
c. 1,3,2,4
d. 1,2,3,4
The correct answer is: 4,2,1,3
Question
Suppose within your web browser you click on a link to obtain a Web page. The IP address of the associated URL is cached in your local host, so a DNS lookup is not necessary to obtain the IP address. Suppose that the webpage associated with the link contains exactly one object consisting of a small amount of HTML text, which references 10 very small objects on the same server. Let RTT' denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object. How much time is needed to get the to retrieve the web page fully, in the following cases:
a. Non-persistent HTTP with no parallel TCP connections?
b. Persistent HTTP?
a. 20RTT', 3RTT'
b. 22RTT', 2RTT'
c. 22RTT', 3RTT'
d. 20RTT', 2RTT'
The correct answer is: 22RTT', 3RTT'
Question
Which of the following statements is ?
a. Queuing delay depends on the congestion of the router
b. A greater length of physical link will always lead to an increased transmission delay
c. Greater the bandwidth of the physical link, lesser is the propagation delay
d. If the bandwidth remains the same, the transmission delay increases with the size of the packet
The correct answer is: A greater length of physical link will always lead to an increased transmission delay
Question
Collaborative Web and Semantic Web are also referred as:
a. Web 1.0 and Web 2.0 respectively
b. Web 2.0 and Web 3.0 respectively
c. Both Web 2.0
d. Both Web 3.0
The correct answer is: Web 2.0 and Web 3.0 respectively
Question
The time difference between the instant at which a transport connection is requested and the instant at which it is confirmed is called as ........
a. Transit delay
b. Connection establishment delay
c. Protection delay
d. Priority delay
The correct answer is: Transit delay
Question
Which of the following statements regarding network devices is ?
a. Hubs operate at the data link layer
b. Repeaters operate at the physical layer
c. Switches may operate both at the data link and the network layer
d. Bridges operate at the data link layer
The correct answer is: Hubs operate at the data link layer
Question
Which of the statements below about HTTP is ?
a. Cookies are used to maintain state at sender/receiver over multiple connections
b. Compared to using a persistent connection, a non-persistent connection leads to more round trips between the client and server
c. HTTP is basically a stateless protocol where the Web server does not maintain information about past requests from a client
d. If HTTP Version 1.1 is used, connections between client and server are non-persistent by default
The correct answer is: If HTTP Version 1.1 is used, connections between client and server are non-persistent by default
Question
What is the size of the checksum field of UDP Checksum
a. 32 bits
b. 16 bits
c. 24 bits
d. 8 bits
The correct answer is: 16 bits
Question
Which of the methods mentioned below is not a valid Request Header?
a. Set-Cookie
b. Host
c. If-Modified-Since
d. Accept-Language
The correct answer is: Set-Cookie
Question
Which of the following request methods uploads the file enclosed in the entity body of the request to the path specified in the URL of the request line?
a. POST
b. PUT
c. GET
d. HEAD
The correct answer is: PUT
Question
Which of the following are the protocol data units at the Application and Network Layer respectively?
a. Segment, Packet
b. Message, Segment
c. Message, Packet
d. Packet, Segment
The correct answer is: Message, Packet
Question
What is the total size of source field of UDP Checksum
a. 16 bits
b. 24 bits
c. 32 bits
d. 8 bits
The correct answer is: 32 bits
Question
Which command provides information about delay measurement from source to destination?
a. Traceroute
b. Nslookup
c. Netstat
d. None
Question
Select one:
a. Message sent to www.hotmail.com
b. Message sent to Mr. Computer’s email
c. Message sent to all the computers of your organisations network.
d.Message sent to all the computers in the accounts department on your network
The correct answer is: Message sent to all the computers in the accounts department on your network
Question
The following application layer protocol spec specifies support for both TCP and UDP at the transport layer:
a. DNS
b. FTP
c. Telnet
d. HTTP
The correct answer is: DNS
Question
The transport protocol on which SMTP runs is:
A. TCP
B. UDP
C. IP
D. None of the above
The correct answer is: TCP
Question
Which of the statements below does not apply to Circuit Switched Networks?
a. Can be implemented using Time Domain Multiplexing as well as Frequency Domain Multiplexing
b. A call set up is required before the data can be sent from the source to the destination
c. Dedicated resources used for transmission from source to destination
d. Once a particular call has been set up between the source and destination, data fragmented at the routers can be sent along different paths to the destination
The correct answer is: Once a particular call has been set up between the source and destination, data fragmented at the routers can be sent along different paths to the destination
Question
Among the network topologies listed below, which would be the preferred WAN design to implement for a company with a hierarchical structure i.e. with main, regional and branch offices, where information is exchanged from main to regional to branch offices and vice-versa?a. Partial Mesh
b. Double-Ring
c. Tree
d. Ring
The correct answer is: Partial Mesh
Question
An organization’s LAN that connects the end systems of the users to the edge router is part of :
A. Network Edge Laye
B. Network Core Layer
C. Network Access Layer
D. None
The correct answer is: Network Access Layer
Question
Applications that need to talk across a network uses __________ for communication with the end-node (destination)
a. Sockets
b. Semaphores
c. Message queues
d. Shared memory
The correct answer is: Sockets
Question
Which of the status codes is returned as part of the HTTP Response if the requested content on the server is unchanged?
302
306
304
301
The correct answer is: 304
Question
Which one of the following statements is NOT about HTTP cookies?
a. Cookies can be used to track the browsing pattern of a user at a particular site.
b. Cookies are a piece of code that has the potential to compromise the security of an Internet user.
c. Cookies get access to the client computer through an HTTP header.
d. Cookies have expiry time.
The correct answer is: Cookies are a piece of code that has the potential to compromise the security of an Internet user.
Question
DNS servers that give us access to DNS records to map the names of hosts to IP addresses are called:
A. TLD DNS servers
B. Authoritative DNS servers
C. Root DNS servers
D. Local DNS servers
a. C
b. B
c. D
d. A
The correct answer is: B
Question
What is the size of Urgent pointer in TCP segment
a. 24 bits
b. 8 bits
c. 32 bits
d. 16 bits
The correct answer is: 16 bits
Question
What is often needed for UDP functioning
a. PPP and CHAP
b. DNS and SNMP
c. Frame relay and X.25
d. SMTP and POP3
The correct answer is: DNS and SNMP
Question
Which of the following is/are example(s) of stateful application layer protocols?
(i) HTTP
(ii) FTP
(iii) TCP
(iv) POP3
a. 1,3,4
b. 2,3
c. 1,2,3
d. 2,4
The correct answer is: 2,4
Question
Choose the right answer: DNS is used for:
i) Mail server aliasing
ii) Load distribution
iii) Host aliasing
a. i,iii
b. i,ii,iii
c. i,ii
d. iii,i
The correct answer is: i,ii,iii
Question
What is the major application of UDP
a. Multimedia
b. Scheduling
c. Small office network
d. LAN communication
The correct answer is: Multimedia
Question
Error Control and Flow Control are responsibilities ofa.
a. data link and Physical Layer
b. data link and Transport Layer
c. data link and network Layers
d. Application and Presentation Layer
The correct answer is: data link and Transport Layer
Question
Which of the following statements regarding the Internet Structure is FALSE?
a. Each Tier 2 or Regional ISP is a customer of one or more Tier 1 ISPs
b. A Tier 2 ISP cannot peer privately with one or more Tier-2 ISPs
c. A Tier 1 ISP has a national or international coverage over a wide area, and has a network consisting of high end routers and links with high bandwidth
d. A Tier 3 or Local ISP may decide to be a direct customer of a Tier 1 ISP
The correct answer is: A Tier 2 ISP cannot peer privately with one or more Tier-2 ISPs
Question
9.Which of the following applications uses peer-to-peer paradigm?
a. FTP
b. Skype
c. Email
d. World-Wide-Web
The correct answer is: Skype
Question
Sequence the following actions for the interaction between a web browser and a web server.
A. Browser requests a webpage using HTTP.
B. Browser establishes a TCP connection with the web server.
C. Server sends the requested webpage using HTTP.
D. Browser resolves the domain name using DNS.
a. 4,2,1,3
b. 2,3,4,1
c. 1,3,2,4
d. 1,2,3,4
The correct answer is: 4,2,1,3
Question
Suppose within your web browser you click on a link to obtain a Web page. The IP address of the associated URL is cached in your local host, so a DNS lookup is not necessary to obtain the IP address. Suppose that the webpage associated with the link contains exactly one object consisting of a small amount of HTML text, which references 10 very small objects on the same server. Let RTT' denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object. How much time is needed to get the to retrieve the web page fully, in the following cases:
a. Non-persistent HTTP with no parallel TCP connections?
b. Persistent HTTP?
a. 20RTT', 3RTT'
b. 22RTT', 2RTT'
c. 22RTT', 3RTT'
d. 20RTT', 2RTT'
The correct answer is: 22RTT', 3RTT'
Question
Which of the following statements is ?
a. Queuing delay depends on the congestion of the router
b. A greater length of physical link will always lead to an increased transmission delay
c. Greater the bandwidth of the physical link, lesser is the propagation delay
d. If the bandwidth remains the same, the transmission delay increases with the size of the packet
The correct answer is: A greater length of physical link will always lead to an increased transmission delay
Question
Collaborative Web and Semantic Web are also referred as:
a. Web 1.0 and Web 2.0 respectively
b. Web 2.0 and Web 3.0 respectively
c. Both Web 2.0
d. Both Web 3.0
The correct answer is: Web 2.0 and Web 3.0 respectively
Question
The time difference between the instant at which a transport connection is requested and the instant at which it is confirmed is called as ........
a. Transit delay
b. Connection establishment delay
c. Protection delay
d. Priority delay
The correct answer is: Transit delay
Question
Which of the following statements regarding network devices is ?
a. Hubs operate at the data link layer
b. Repeaters operate at the physical layer
c. Switches may operate both at the data link and the network layer
d. Bridges operate at the data link layer
The correct answer is: Hubs operate at the data link layer
Question
Which of the statements below about HTTP is ?
a. Cookies are used to maintain state at sender/receiver over multiple connections
b. Compared to using a persistent connection, a non-persistent connection leads to more round trips between the client and server
c. HTTP is basically a stateless protocol where the Web server does not maintain information about past requests from a client
d. If HTTP Version 1.1 is used, connections between client and server are non-persistent by default
The correct answer is: If HTTP Version 1.1 is used, connections between client and server are non-persistent by default
Question
What is the size of the checksum field of UDP Checksum
a. 32 bits
b. 16 bits
c. 24 bits
d. 8 bits
The correct answer is: 16 bits
Question
Which of the methods mentioned below is not a valid Request Header?
a. Set-Cookie
b. Host
c. If-Modified-Since
d. Accept-Language
The correct answer is: Set-Cookie
Question
Which of the following request methods uploads the file enclosed in the entity body of the request to the path specified in the URL of the request line?
a. POST
b. PUT
c. GET
d. HEAD
The correct answer is: PUT
Question
Which of the following are the protocol data units at the Application and Network Layer respectively?
a. Segment, Packet
b. Message, Segment
c. Message, Packet
d. Packet, Segment
The correct answer is: Message, Packet
Question
What is the total size of source field of UDP Checksum
a. 16 bits
b. 24 bits
c. 32 bits
d. 8 bits
The correct answer is: 32 bits
Question
Which command provides information about delay measurement from source to destination?
a. Traceroute
b. Nslookup
c. Netstat
d. None
The correct answer is:
Traceroute
Question
Application developer
has permission to decide the following on transport layer side
a) Transport layer
protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
a. d
b. c
c. a
d. b
The correct answer is: c
Question
Piggybacking protocol is
a technique used for
1.ACKs.
2.NAKs.
3.both 1 and 2.
4.None.
a. 1
b. 4
c. 3
d. 2
The correct answer is: 3
Question
Mobile hosts
encapsulates and ______________the packets to mobiles host’s care-of –address
a)binds
b)tunnels
c)fowards
d)None
a. b
b. d
c. a
d. c
The correct answer is: b
Question
OSPF routing tables are
calculated by using______________algorithm
a)Link sate routing
b)Dijkstra’s Algorithm
c)Distance vector
routing
d)Prim’s algorithm
a. a
b. b
c. c
d. d
The correct answer is: b
Question
Which of this is not a
guided media ?
a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire
a. d
b. a
c. c
d. b
The correct answer is: c
Question
BGP is an
________________system routing protocol
a)Autonomous
b)InterAutonomous
c)IntraAutonomous
d)None
a. a
b. b
c. c
d. d
The correct answer is: b
Question
When 2 or more bits in a
data unit has been changed during the transmission, the error is called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
a. a
b. d
c. c
d. b
The correct answer is: b
Question
In slow-start algorithm,
size of congestion window increases exponentially until it reaches a
1.Frame Relay.
2.Congestion Relay.
3.Threshold.
4.IP.
Select one:
a. c
b. a
c. b
d. d
The correct answer is: c
Question
Which one of the
following routing algorithm can be used for network layer design?
a) shortest path
algorithm
b) distance vector
routing
c) link state routing
d) all of the mentioned
a. d
b. b
c. a
d. c
The correct answer is: d
Question
A mechanism to control
amount and rate of traffic sent to network is called
Traffic Congestion.
Traffic Flow.
Traffic Data.
4.Traffic Shaping
Select one:
a. 2
b. 3
c. 1
d. 4
The correct answer is: 4
Question
Which protocol is used
for dynamically assigning IP addresses
to hosts on a LAN
a. ARP
b.RARP
c. TCP/IP
d.DHCP
a. a
b. d
c. b
d. c
The correct answer is: d
Question
MobileIP is built on
____________protocol
a)ICMP
b)IP
c)UDP
d)TCP
a. b
b. a
c. c
d. d
The correct answer is: b
Question
12) The packet of
information at the application layer is called
a) Packet
b) Message
c) Segment
d) Frame
a. a
b. c
c. b
d. d
The correct answer is: b
Question
Header of a frame
generally contains
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
a. c
b. a
c. b
d. d
The correct answer is: d
Question
Which of the following
is congestion control algorithm?
a. leaky bucket
b. token bucket
c. Resource respondes
d. all of above
a. b
b. a
c. d
d. c
The correct answer is: d
Question
The network layer
protocol of internet is
a) ethernet
b) internet protocol
c) hypertext transfer
protocol
d) none of the mentioned
a. b
b. d
c. c
d. a
The correct answer is: b
Question
The data link layer
takes the packets from _____ and encapsulates them into frames for
transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
a. c
b. b
c. a
d. d
The correct answer is: a
Question
A subset of a network that
includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
a. d
b. c
c. a
d. b
The correct answer is: a
Question
Which one of the
following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
a. d
b. a
c. c
d. b
The correct answer is: d
Question
The triplet that
contains the home address, care-of address, and registration lifetime is called
a _______________ for the mobile node
a)binding
b) registration
c)Unique Number
d)Network address
a. a
b. d
c. c
d. b
The correct answer is: a
Question
ICMP is primarily used
for
a) error and diagnostic
functions
b) addressing
c) forwarding
d) none of the mentioned
a. c
b. a
c. d
d. b
The correct answer is: a
Question
This is one of the
architecture paradigm
a) Peer to peer
b) Client-server
c) HTTP
d) Both a and b
a. b
b. c
c. a
d. d
The correct answer is: d
Question
MAC addresses are for which layer
a. Network
b.Application
c. Data Link
d.Physical
Select one:
a. c
b. d
c. a
d. b
The correct answer is: c
Question
OSPF is based on which
routing technique
a)Link state routing
protocol
b)Distance vector routing
protocol
c)Both a & b
d)Path Vector protocol
a. b
b. a
c. c
d. d
The correct answer is: a
Question
In MobileIP
_____________address indicates the network number and thus identifies the
mobile node's point of attachment with respect to the network topology
a)System address
b)IP address
c)Care-off address
d)Home address
Select one:
a. d
b. c
c. b
d. a
The correct answer is: c
Question
A VLAN
a.Can be defined on a
single switch
b.Can span multiple
switches
c.Can be used across
bridges
d. None of the above
Select one:
a. a
b. c
c. d
d. b
The correct answer is: b
Question
Application layer offers
_______ service
a) End to end
b) Process to process
c) Both of the mentioned
d) None of the mentioned
a. a
b. c
c. d
d. b
The correct answer is: a
Question
The metric in RIP is
called ______________
a)cost
b)hop count
c)distance
d)count
The correct answer is: b
Question
In Congestion Control,
packet is put at end of input queue while waiting to be
Checked.
Entered.
Reached.
4.Controlled
Select one:
a. 2
b. 1
c. 3
d. 4
The correct answer is: 1
Question
CRC stands for
a) cyclic redundancy
check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
a. d
b. b
c. c
d. a
The correct answer is: a
Question
Question
Consider a situation where user wants to fetch/transfer the data of size 1MB across a 1 Gbps network with a total transfer time of 108ms. What is the effective through put.
Select one:
a. 1Gbps
b. 84.1 Mbps
c. 74.1Mbps
d. 108 Mpbs
b. 84.1 Mbps
c. 74.1Mbps
d. 108 Mpbs
The correct answer is: 74.1Mbps
Question
If arrival rate (in bits) to link exceeds transmission rate of link for a period of time
If arrival rate (in bits) to link exceeds transmission rate of link for a period of time
Select one:
a. Nothing will happen
b. packets will queue, wait to be transmitted on link
c. packets can be dropped (lost) if memory (buffer) fills up
d. Both a and b
a. Nothing will happen
b. packets will queue, wait to be transmitted on link
c. packets can be dropped (lost) if memory (buffer) fills up
d. Both a and b
The correct answer is: Both a and b
Question
Which of the following is an example of a real-time application on a network
Select one:
a. Videoconferencing
b. Internet Radio
c. File Transfer
d. Email
a. Videoconferencing
b. Internet Radio
c. File Transfer
d. Email
The correct answer is: Videoconferencing
Question
Which of the following represents a multicast messageSelect one:
a. Message sent to www.hotmail.com
b. Message sent to Mr. Computer’s email
c. Message sent to all the computers of your organisations network.
d.Message sent to all the computers in the accounts department on your network
The correct answer is: Message sent to all the computers in the accounts department on your network
Question
Which is correct description of Latency
Select one:
a. Latency = Propagation + Queue + Transmit
b. Latency = Propagation
c. Latency = Propagation + Queue
d. Latency = Propagation + Transmit
a. Latency = Propagation + Queue + Transmit
b. Latency = Propagation
c. Latency = Propagation + Queue
d. Latency = Propagation + Transmit
The correct answer is: Latency = Propagation + Queue + Transmit