1) Which information form/type is used for transferring the data in Packet switching?
a. Morse
b. ASCII
c. Binary
d. Baudot
Answer
Explanation
|
ANSWER: Binary
Explanation: No explanation is available for this question!
|
|
2) Which type of addressing scheme is used in Message switching?
a. Hierarchical addresses
b. Geographical addresses
c. Manual addresses
d. All of the above
Answer
Explanation
|
ANSWER: Geographical addresses
Explanation: No explanation is available for this question!
|
|
3) Which of the following methods is/are used in Packet switching?
a. Datagram Packet Switching
b. Virtual-circuit Packet Switching
c. Both a and b
d. None of the above
Answer
Explanation
|
ANSWER: Both a and b
Explanation: No explanation is available for this question!
|
|
4) How many layers are there in OSI model?
a. 7
b. 3
c. 5
d. 4
Answer
Explanation
|
ANSWER: 7
Explanation: No explanation is available for this question!
|
|
5) Which of the following methods is/are used in Message switching?
a. Store and Forward
b. Switch to Switch
c. Both a and b
d. None of the above
Answer
Explanation
|
ANSWER: Both a and b
Explanation: No explanation is available for this question!
|
|
6) Which connection does the OSI model support in networking?
a. Connection-oriented
b. Connectionless
c. Both a and b
d. None of the above
Answer
Explanation
|
ANSWER: Both a and b
Explanation: No explanation is available for this question!
|
|
7) Which of the following fundamental model helps to know the key problems for the designers of distributed system?
a. OSI model
b. Hybrid model
c. TCP/IP model
d. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
8) What is/are the advantages of the OSI model?
a. The OSI model is not a truly general model.
b. The protocols are hidden in the OSI model so they can easily replaced by new protocols when the technology changes
c. Both a and b
d. None of the above
Answer
Explanation
|
ANSWER: The protocols are hidden in the OSI model so they can easily replaced by new protocols when the technology changes
Explanation: No explanation is available for this question!
|
|
9) What is/are the advantages of the TCP/IP?
a. TCP/IP provides reliable communication across the internet.
b. Information on the internet is carried in packets.
c. TCP/IP is a robust and scalable network.
d. All of the above.
Answer
Explanation
|
ANSWER: All of the above.
Explanation: No explanation is available for this question!
|
|
10) How many layers are used in Hybrid model?
a. 7
b. 3
c. 5
d. 4
Answer
Explanation
|
ANSWER: 5
Explanation: No explanation is available for this question!
|
|
11) Which of the following statements is/are true for connectionless network?
a. Not required so much information for storing
b. No need to established a connection.
c. Randomly packets distributed.
d. All of the above.
e. None of the above.
Answer
Explanation
|
ANSWER: All of the above.
Explanation: No explanation is available for this question!
|
|
12) Which of the following statements is/are not true for connection-oriented network?
a. It doesn't give guarantee of service.
b. It takes less time for sending the packets.
c. Utilization of resources is good.
d. Both a and c
e. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
13) What is/are the advantages of Data link layer?
a. Data link is not required for the effective exchange of data between source and destination.
b. Provide services to the session layer.
c. The errors can be detected and corrected during the transmission of data from source to destination.
d. All of the above.
Answer
Explanation
|
ANSWER: The errors can be detected and corrected during the transmission of data from source to destination.
Explanation: No explanation is available for this question!
|
|
14) Abbreviate SMTP
a. Simple Mail Transport Protocol
b. Single Mail Transfer Protocol
c. Simple Mail Transfer Protocol
d. Single Mail Transport Protocol
Answer
Explanation
|
ANSWER: Simple Mail Transfer Protocol
Explanation: No explanation is available for this question!
|
|
15) What is the full form of TFTP?
a. Transmission File Transport Protocol
b. Trivial File Transfer Protocol
c. Transport File Transfer Protocol
d. None of the above
Answer
Explanation
|
ANSWER: Trivial File Transfer Protocol
Explanation: No explanation is available for this question!
|
|
16) Authentication is done in FTP while in TFTP it cannot be done.
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: No explanation is available for this question!
|
|
17) What is the default port of TFTP?
a. 3214
b. 69
c. 4012
d. 101
Answer
Explanation
|
ANSWER: 69
Explanation: No explanation is available for this question!
|
|
18) Which protocol does TFTP use while working on the network?
a. ARP
b. FTP
c. UDP
d. TCP
Answer
Explanation
|
ANSWER: UDP
Explanation: No explanation is available for this question!
|
|
19) Which protocol does FTP use for transferring the files in the network?
a. UDP
b. TCP
c. ICMP
d. ARP
Answer
Explanation
|
ANSWER: TCP
Explanation: No explanation is available for this question!
|
|
20) What kind of task does MIME do in the SMTP protocol?
a. It only transfers the email and not receive them.
b. It transfers a message from the SMTP sender to the SMTP receiver over a TCP/IP.
c. It works under the Mail Transfer Agent (MAT).
d. It encodes the binary files and send.
Answer
Explanation
|
ANSWER: It encodes the binary files and send.
Explanation: No explanation is available for this question!
|
|
21) Data transfer is _______ in FTP.
a. efficient
b. reliable
c. secure
d. unreliable
Answer
Explanation
|
ANSWER: reliable
Explanation: No explanation is available for this question!
|
|
22) Which of the following is true about Domain Name System (DNS)?
a. DNS is the client server application.
b. It uses alias names for identifying the sender and receiver instead of an IP address. So the alias address has to be mapped to the IP address.
c. It identifies sender and receiver so they should be known to each other.
d. All of the above.
Answer
Explanation
|
ANSWER: All of the above.
Explanation: No explanation is available for this question!
|
|
23) What is Packetizing?
a. It is a process of dividing a long message into smaller ones.
b. It is a process of encapsulating the packets into the data fields of the transport layer packet.
c. It is a process of an adding headers to each packet to allow the transport layer for performing its other functions.
d. All of the above.
Answer
Explanation
|
ANSWER: All of the above.
Explanation: No explanation is available for this question!
|
|
24) Connection-oriented is a _______ connection.
a. secure
b. virtual
c. stable
d. reliable
Answer
Explanation
|
ANSWER: virtual
Explanation: No explanation is available for this question!
|
|
25) Which of the following is/are the advantages of connection-oriented networking
a. Quality of service
b. No Priority service
c. Bandwidth utilization
d. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
26) The connection oriented service is a dedicated connection between the users before the data is exchanged.
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: No explanation is available for this question!
|
|
27) Which of the following statements is/are not true about Persistent HTTP?
a. TCP connection is closed after the interval timeout by the http server.
b. The new connection is established and maintained for each request object.
c. Persistent will use HTTP version 1.1.
d. None of the above
Answer
Explanation
|
ANSWER: TCP connection is closed after the interval timeout by the http server.
Explanation: No explanation is available for this question!
|
|
28) Which of the following statements is/are correct about Non Persistent HTTP?
a. Non Persistent HTTP connection is also called as HTTP keep-alive.
b. All the requests and responses between client and server can be sent over the same connection.
c. Non persistent uses HTTP version 2.0
d. All of the above
Answer
Explanation
|
ANSWER: All the requests and responses between client and server can be sent over the same connection.
Explanation: No explanation is available for this question!
|
|
29) What is the default port of HTTP?
a. 20
b. 101
c. 80
d. 60
Answer
Explanation
|
ANSWER: 80
Explanation: No explanation is available for this question!
|
|
30) The protocol which is used for defining the legal request and replies is called ______ .
a. FTP
b. SMTP
c. TCP
d. HTTP
Answer
Explanation
|
ANSWER: HTTP
Explanation: No explanation is available for this question!
|
|
31) Three way handshake technique in TCP is used __________.
a. to indicate the problems.
b. to solve the problem of delayed duplicate packet.
c. for data transmission
d. all of the above
Answer
Explanation
|
ANSWER: to solve the problem of delayed duplicate packet.
Explanation: No explanation is available for this question!
|
|
32) What is/are the parameters of Quality of Service?
a. Connection establishment delay
b. Connection establishment failure probability
c. Protection and Priority
d. All of the above
e. None of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
33) What is the difference between TCP and UDP?
a. TCP guarantees that a packet will reach the destination without any duplication while UDP does not provide this guarantee.
b. The order of data will be same in TCP but that won't be so in UDP.
c. TCP is unreliable protocol but UDP is a reliable protocol.
d. Only a and b
e. Only b and c
Answer
Explanation
|
ANSWER: Only a and b
Explanation: No explanation is available for this question!
|
|
34) Which algorithm is best for use in TCP congestion avoidance?
a. MIMD
b. AIAD
c. Both a and b
d. AlMD
Answer
Explanation
|
ANSWER: AlMD
Explanation: No explanation is available for this question!
|
|
35) Which of the following congestion control will not give converge in TCP congestion avoidance?
a. MIMD
b. AIAD
c. Both a and b
d. AIMD
Answer
Explanation
|
ANSWER: Both a and b
Explanation: No explanation is available for this question!
|
|
36) Which of the following statements is/are true if the transport layer is removed from the TCP/IP protocol stack?
a. Flow control will be handled
b. Data transfer will be reliable.
c. Byte stream won't be transferred to another machine.
d. None of the above
Answer
Explanation
|
ANSWER: Byte stream won't be transferred to another machine.
Explanation: No explanation is available for this question!
|
|
37) If all the links on the internet provide reliable delivery services, then will this TCP delivery service be redundant?
a. Yes
b. No
Answer
Explanation
|
ANSWER: No
Explanation: No explanation is available for this question!
|
|
38) Abbreviate RSVP
a. Resource Service Virtual Protocol
b. Resource Reservation Protocol
c. Receiver Service Virtual Protocol
d. Receiver Reservation Protocol
Answer
Explanation
|
ANSWER: Resource Reservation Protocol
Explanation: No explanation is available for this question!
|
|
39) What is/are the characteristics of RSVP?
a. It doesn’t provide reservations for bandwidth in multicast trees.
b. It is a receiver oriented.
c. Both a and b
d. None of the above
Answer
Explanation
|
ANSWER: It is a receiver oriented.
Explanation: No explanation is available for this question!
|
|
40) Consider the following things which RSVP cannot do in the network?
a. It doesn’t specify the exactly reservation of the bandwidth.
b. It is not a routing protocol.
c. It does not perform any signaling operation.
d. All of the above.
Answer
Explanation
|
ANSWER: All of the above.
Explanation: No explanation is available for this question!
|
|
41) Which of the following statements is/are not correct about Leaky Bucket Algorithm?
a. It is a bucket with a hole at bottom.
b. Packets are never lost.
c. A variant on the leaky bucket is the token bucket.
d. Leaky bucket doesn't have the finite queue length.
Answer
Explanation
|
ANSWER: Leaky bucket doesn't have the finite queue length.
Explanation: No explanation is available for this question!
|
|
42) What kind of task does the Leaky Bucket algorithm do in traffic shaping technique?
a. Control congestion in network traffic.
b. Working on routing protocol.
c. Data flow control.
d. None of the above
Answer
Explanation
|
ANSWER: Control congestion in network traffic.
Explanation: No explanation is available for this question!
|
|
43) Which queue operation is used for holding the packets in Leaky Bucket implementation?
a. LIFO
b. FILO
c. FIFO
d. All of the above
Answer
Explanation
|
ANSWER: FIFO
Explanation: No explanation is available for this question!
|
|
44) What is the difference between Class based QoS and Flow based QoS?
a. Class based QoS does not provide flexible service differentiation. Flow based QoS provide flexible service differentiation.
b. Class based QoS is a perception of users and it is more important than Flow based while Flow based QoS is not more important than class based.
c. Both a and b
d. None of the above.
Answer
Explanation
|
ANSWER: Class based QoS does not provide flexible service differentiation. Flow based QoS provide flexible service differentiation.
Explanation: No explanation is available for this question!
|
|
45) Which of the following policies is/are related to Network layer?
a. Window policy
b. Traffic shaping
c. Traffic policing
d. Packet services
Answer
Explanation
|
ANSWER: Packet services
Explanation: No explanation is available for this question!
|
|
46) Which of the following statements is/are true about Traffic shaping?
a. It is an open loop control.
b. It will not regulate the average rate of data transmission.
c. It is also known as traffic policing.
d. All of the above.
Answer
Explanation
|
ANSWER: It is an open loop control.
Explanation: No explanation is available for this question!
|
|
47) What kind of task does the Token Bucket Algorithm do on the network?
a. Drops data packets.
b. Allows for varying output rates.
c. Give low priority to the data packets.
d. Doesn't manage the queue regulator.
Answer
Explanation
|
ANSWER: Allows for varying output rates.
Explanation: No explanation is available for this question!
|
|
48) What is the difference between IPv4 and IPv6?
a. The IPv4 address is written in hexadecimal value while the IPv6 address is written by dotted-decimal notation.
b. In IPV4 source and destination address is 128 bits while in IPv6 it is 32 bits.
c. The IPv4 node has only stateful auto-configuration while the IPv6 node has both a stateful and a stateless address auto-configuration.
d. In IPv4 the IPsec support is required while in IPv6 it is optional.
Answer
Explanation
|
ANSWER: The IPv4 node has only stateful auto-configuration while the IPv6 node has both a stateful and a stateless address auto-configuration.
Explanation: No explanation is available for this question!
|
|
49) What is the use of ICMP protocol in the network?
a. It provides a mechanism for host and management queries.
b. There is no flow control and congestion control.
c. It doesn't provide error reporting mechanism.
d. All of the above
Answer
Explanation
|
ANSWER: It provides a mechanism for host and management queries.
Explanation: No explanation is available for this question!
|
|
50) What is the difference between IP and ICMP?
a. IP is a reliable protocol while ICMP is an unreliable protocol.
b. In IP, error checking and control are not concerns while in ICMP it concerns.
c. IP provides assistance mechanisms while ICMP doesn't provide assistance mechanisms.
d. None of the above.
Answer
Explanation
|
ANSWER: In IP, error checking and control are not concerns while in ICMP it concerns.
Explanation: No explanation is available for this question!
|
|
51) What is the difference between Virtual Circuit and Datagram?
a. The quality of service is easy in Virtual Circuit while it is difficult in Datagram.
b. In the connection oriented service, a connection is called as Virtual Circuit while in the connectionless service, the independent packets are called as Datagrams.
c. The services are independent in Virtual Circuit but that won't be so in Datagrams.
d. Both a and b
e. Both b and c
Answer
Explanation
|
ANSWER: In the connection oriented service, a connection is called as Virtual Circuit while in the connectionless service, the independent packets are called as Datagrams.
Explanation: No explanation is available for this question!
|
|
52) Cluster is a group of ___________ .
a. regions
b. zones
c. resources.
d. parameters
Answer
Explanation
|
ANSWER: regions
Explanation: No explanation is available for this question!
|
|
53) When hierarchical routing is used on the internet?
a. Total number of routers are divided into different regions.
b. Routers cannot handle network traffic efficiently.
c. Router increases the network size.
d. None of the above
Answer
Explanation
|
ANSWER: Routers cannot handle network traffic efficiently.
Explanation: No explanation is available for this question!
|
|
54) Which of the following is/are the Routing algorithms?
a. Nonadaptive algorithm and Adaptive algorithm
b. Static routing and Dynamic routing
c. Distance vector routing and link state routing
d. Both a and b
e. All of the above
Answer
Explanation
|
ANSWER: Both a and b
Explanation: No explanation is available for this question!
|
|
55) OSPF stands for _______ .
a. Object Service Priority First
b. Open Shortest Path First
c. Open Space Preservation Fund
d. Ocular Sun Protective Factor
Answer
Explanation
|
ANSWER: Open Shortest Path First
Explanation: No explanation is available for this question!
|
|
56) Which of the following statements is/are true about OSPF?
a. error detecting process.
b. interior routing protocol.
c. widely used in TCP/IP.
d. create traffic load on multiple links.
Answer
Explanation
|
ANSWER: interior routing protocol.
Explanation: No explanation is available for this question!
|
|
57) Consider the following features,
I. Load Balancing II. Security III. Easy to configure IV. Supports authentication
What is/are the features of OSPF?
a. II, IV
b. II, III
c. I, II, IV
d. I, II, III
Answer
Explanation
|
ANSWER: I, II, IV
Explanation: No explanation is available for this question!
|
|
58) Match the following List 1 to List 2
1. Application Layer --------- i) Repeater or Hub 2. Network Layer ------------- ii) Gateway or five layer switch 3. Data link Layer ------------ iii) Bridge or two layer switch 4. Physical Layer -------------- iv) Router or three layer switch
a. 1-i, 2-iv, 3-iii, 4-iv
b. 1-ii, 2-iii, 3-i, 4-iv
c. 1-ii, 2-iv, 3-iii, 4-i
d. 1-i, 2-ii, 3-iv, 4-iii
Answer
Explanation
|
ANSWER: 1-ii, 2-iv, 3-iii, 4-i
Explanation: No explanation is available for this question!
|
|
59) Which of the following types is/are the network connecting devices?
a. Repeaters and Hubs
b. Bridges and Routers
c. Gateway and switches
d. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
60) Abbreviate MPLS.
a. Multi Protocol Label Switching
b. Multiple Lable Storage
c. Multiplicative Label Switching
d. Multi Process Label Switching
Answer
Explanation
|
ANSWER: Multi Protocol Label Switching
Explanation: No explanation is available for this question!
|
|
61) Match the following List 1 to List 2
1. Repeaters ------------- i) Connects multiple device segments. 2. Bridges ----------------- ii) Provide translation services between incompatible LANs. 3. Routers ----------------- iii) Receives a signal and retransmits it at a higher level. 4. Gateways -------------- iv) Provide links between two seperate devices but same type LANs.
a. 1-i, 2-iv, 3-ii, 4- iii
b. 1-iii, 2-i, 3-iv, 4-ii
c. 1-ii, 2iv-, 3-iii, 4-i
d. 1-iii, 2-iv, 3-i, 4-ii
Answer
Explanation
|
ANSWER: 1-iii, 2-i, 3-iv, 4-ii
Explanation: No explanation is available for this question!
|
|
62) Why was the IETF developed?
a. to support quality of service
b. to create standardized protocols
c. for IP security
d. All of the above
Answer
Explanation
|
ANSWER: to create standardized protocols
Explanation: No explanation is available for this question!
|
|
63) Match the following List 1 to List 2
1. Label --------------- i) 3 bit 2. QoS ----------------- ii) 1 bit 3. S-field -------------- iii) 8 bit 4. TTL ------------------ iv) 20 bit
a. 1- ii, 2-iii, 3-iv, 4-i
b. 1-iii, 2-iv, 3-i, 4-ii
c. 1-iv, 2-i, 3-ii, 4-iii
d. 1-i, 2-iv, 3-ii, 4-iii
Answer
Explanation
|
ANSWER: 1-iv, 2-i, 3-ii, 4-iii
Explanation: No explanation is available for this question!
|
|
64) Which of the following aspects is/are mostly covered in the FEC?
a. How many packets are there.
b. What type of service class is there
c. Which packets are going to be used.
d. Where the packets are going.
Answer
Explanation
|
ANSWER: Where the packets are going.
Explanation: No explanation is available for this question!
|
|
65) Which of the following statements is/are true about MPLS packets?
a. It creates a virtual circuit for transmission of data packets.
b. The label is used as an index for determining which outgoing line and new label is to be used. This new label contains the address of next MPLS router.
c. MPLS packet hits a router, that router will contact the next router where the packet will be going to generate a label for the flow.
d. Both b and c
e. Both a and c
Answer
Explanation
|
ANSWER: The label is used as an index for determining which outgoing line and new label is to be used. This new label contains the address of next MPLS router.
Explanation: No explanation is available for this question!
|
|