1) The communication structure that we need in socket programming is called as _________.
a. System calls
b. Socket
c. Procedure
d. Table space
Answer
Explanation
|
ANSWER: Socket
Explanation: No explanation is available for this question!
|
|
2) What is the use of TPDU in socket programming?
a. It creates new socket in the transport entity when it requests for a connection.
b. It allocates the table space within the transport entity.
c. It is used for establishing the connection.
d. None of the above.
Answer
Explanation
|
ANSWER: It creates new socket in the transport entity when it requests for a connection.
Explanation: No explanation is available for this question!
|
|
3) Abbreviate the term TPDU in socket programming.
a. Transport Protocol Distribution Unit
b. Transcranial Pulsed Doppler Ultrasound
c. Transport Protocol Data Unit
d. Terminal Power Distribution Unit
Answer
Explanation
|
ANSWER: Transport Protocol Data Unit
Explanation: No explanation is available for this question!
|
|
4) Which of the following is true about “Threshold”?
a. Threshold is a value.
b. Threshold has value levels, such as minimum level, maximum level, equal level.
c. If the data value doesn't suit the threshold value, then it indicates that this data value might lead to poor performance of the network.
d. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
5) What is Quality of Service?
a. It is the capability of a network to provide better service to selected network traffic over various technologies.
b. It is a priority network that provides dedicated bandwidth, controlled jitter and latency.
c. Both a and b
d. None of the above
Answer
Explanation
|
ANSWER: Both a and b
Explanation: No explanation is available for this question!
|
|
6) Which of the following is true about Manchester encoding?
a. Each bit period is divided into two equal intervals.
b. It requires more bandwidth than 8B/10B encoding.
c. It is a form of digital encoding.
d. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
7) Differential Manchester encoding is also known as ___________ .
a. Clock Signals
b. Condition Diphase encoding
c. Bipolar encoding
d. Biphase mark code
Answer
Explanation
|
ANSWER: Condition Diphase encoding
Explanation: No explanation is available for this question!
|
|
8) What is the difference between Token Ring and Ethernet?
a. Ethernet network interface cards cannot operate on a passive hub but Token ring can operate on a passive hub.
b. Ethernet does have an access for priority system but Token ring doesn't have any access for priority system on the token.
c. Ethernet supports a direct cable connection while Token ring doesn't support a direct cable connection as it requires additional hardware and software to operate on a direct cable connection setup.
d. Ethernet can support MAC address. Token ring cannot support MAC address.
Answer
Explanation
|
ANSWER: Ethernet supports a direct cable connection while Token ring doesn't support a direct cable connection as it requires additional hardware and software to operate on a direct cable connection setup.
Explanation: No explanation is available for this question!
|
|
9) What is/are the advantages of Token ring?
a. It doesn't provide a priority system that allow administrators to use the network more frequently.
b. Multiple identical MAC addresses are supported on Token ring.
c. All of the above
d. None of the above.
Answer
Explanation
|
ANSWER: Multiple identical MAC addresses are supported on Token ring.
Explanation: No explanation is available for this question!
|
|
10) Which of the following is/are the disadvantages of fragmentation?
a. All the packets should exit via the same gateway
b. Overhead doesn't required to repeatedly fragment.
c. Dos attack will encounter.
d. All of the above
Answer
Explanation
|
ANSWER: All the packets should exit via the same gateway
Explanation: No explanation is available for this question!
|
|
11) Why was the Ipv6 protocol introduced?
a. IP security
b. Better Quality of Service support
c. Larger address space (128-bit in Ipv6, compared to the 32-bit address space in Ipv4)
d. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
12) Why Ipv6 replaces ARP by using the ND protocol?
a. The ARP address statically bound.
b. The security issues are apply.
c. Both a and b
d. The interface identifier portion of an Ipv6 address is directly derived from MAC address.
Answer
Explanation
|
ANSWER: The interface identifier portion of an Ipv6 address is directly derived from MAC address.
Explanation: No explanation is available for this question!
|
|
13) What is the difference between Delay and Jitter?
a. Delay takes less time for buffering while jitter takes more time for buffering.
b. Delay is defined as the end to end time required for the signal to travel from transmitter to receiver and Jitter is defined as the variation of delay for packets belonging to the same flow.
c. Time delay is a variable in delay but not in jitter.
d. All of the above
Answer
Explanation
|
ANSWER: Delay is defined as the end to end time required for the signal to travel from transmitter to receiver and Jitter is defined as the variation of delay for packets belonging to the same flow.
Explanation: No explanation is available for this question!
|
|
14) Which cell does Asynchronous Transfer Mode (ATM) use?
a. Bridges
b. Switches
c. Routers
d. Hubs
Answer
Explanation
|
ANSWER: Switches
Explanation: No explanation is available for this question!
|
|
15) Both HDLC and PPP both are Data link layer protocol.
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: No explanation is available for this question!
|
|
16) Which of the following is the communication protocol developed by ISO?
a. MPLS
b. PPP
c. HDLC
d. CRC
Answer
Explanation
|
ANSWER: HDLC
Explanation: No explanation is available for this question!
|
|
17) Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?
a. LCP
b. NCP
c. Both a and b
d. TCP
Answer
Explanation
|
ANSWER: Both a and b
Explanation: No explanation is available for this question!
|
|
18) What does the Link Control Protocol (LCP) do in PPP?
a. Set-up configure
b. Maintaining a link
c. Terminating a link
d. Both b and c
e. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
19) Which of the following protocol is used to allow the encapsulation of data coming from the network layer protocol?
a. TCP
b. NCP
c. LCP
d. HDLC
Answer
Explanation
|
ANSWER: NCP
Explanation: No explanation is available for this question!
|
|
20) Which protocol is used after authentication has been completed?
a. User Datagram Protocol
b. PPP Protocol
c. Transmission Control Protocol
d. Network Control Protocol
Answer
Explanation
|
ANSWER: Network Control Protocol
Explanation: No explanation is available for this question!
|
|
21) Which of the following is true about Network Control Protocol (NCP)?
a. It is strictly used for data authentication.
b. It decides the encapsulation of network layer data into the data link frame
c. It is useful to set-up configure, maintain and terminate a link connection.
d. All of the above.
Answer
Explanation
|
ANSWER: It decides the encapsulation of network layer data into the data link frame
Explanation: No explanation is available for this question!
|
|
22) What is Frame Check Sequence (FCS)?
a. FCS is an error recovery process.
b. FCS is an upper layer data.
c. FCS is an error detecting code.
d. FCS is a communication protocol.
Answer
Explanation
|
ANSWER: FCS is an error detecting code.
Explanation: No explanation is available for this question!
|
|
23) What is/are the characteristics of Connection Oriented Service?
a. The connection oriented services are reliable because there is a minimization of data loss and retransmission of lost bits is possible.
b. Connection oriented service is suitable for short communication.
c. Both a and b
d. The connection is not established in the connection oriented service.
Answer
Explanation
|
ANSWER: The connection oriented services are reliable because there is a minimization of data loss and retransmission of lost bits is possible.
Explanation: No explanation is available for this question!
|
|
24) Which of the following statement is true about Connectionless service?
a. The connection is established in connectionless service.
b. Connectionless service is suitable for bursty transmission.
c. Connectionless services can give services guarantees.
d. Connectionless services can avoid bottleneck problem.
Answer
Explanation
|
ANSWER: Connectionless service is suitable for bursty transmission.
Explanation: No explanation is available for this question!
|
|
25) What is the difference between MPLS and Virtual Circuit?
a. The forwarding table is mostly used in MPLS but not in Virtual Circuit.
b. The forwarding table is not constructed in Virtual Circuit but it is constructed in MPLS.
c. In virtual-circuit, the user establishes new connection and launches a set up packet and created the path while there is no set up for each connection in MPLS.
d. All of the above.
Answer
Explanation
|
ANSWER: In virtual-circuit, the user establishes new connection and launches a set up packet and created the path while there is no set up for each connection in MPLS.
Explanation: No explanation is available for this question!
|
|
26) Both HDLC and PPP are data link layer protocols.
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: No explanation is available for this question!
|
|
27) HDLC is developed by ________ .
a. ISI
b. ISO
c. FPO
d. ITC
Answer
Explanation
|
ANSWER: ISO
Explanation: No explanation is available for this question!
|
|
28) Which of the following are the HTTP methods (request types)?
I. GET II. POST III. PATCH IV. BODY V. CREATE VI. OPTION
a. I, II, III, IV, V
b. I, II
c. IV, V, VI
d. I, II, III, VI
Answer
Explanation
|
ANSWER: I, II, III, VI
Explanation: No explanation is available for this question!
|
|
29) Define the term DHCP server.
a. administrator requires to add an entry for each computer in DHCP.
b. assigned a permanent address to the server software.
c. doesn't allow a computer to join a new network.
d. None of the above.
Answer
Explanation
|
ANSWER: assigned a permanent address to the server software.
Explanation: No explanation is available for this question!
|
|
30) What type of addresses does DHCP server use?
a. Permanent address
b. Local address
c. Pool address
d. Both a and b
e. Both a and c
Answer
Explanation
|
ANSWER: Both a and c
Explanation: No explanation is available for this question!
|
|
31) Which of the following protocol is widely used in Dynamic assignment?
a. BOOTP
b. DHCP
c. RARP
d. DCHP
Answer
Explanation
|
ANSWER: DHCP
Explanation: No explanation is available for this question!
|
|
32) Match the following List 1 to List 2 1. DHCP Server ------------ i) works as a virtual post office 2. Proxy Server ------------- ii) automatically provides an internet protocol. 3. Mail Server ---------------- iii) make indirect network connections to other network services.
a. 1-iii, 2i-, 3-ii
b. 1-iii, 2-ii, 3-i
c. 1-ii, 2-iii-, 3-i
d. 1-ii, 2i-, 3-iii
Answer
Explanation
|
ANSWER: 1-ii, 2-iii-, 3-i
Explanation: No explanation is available for this question!
|
|
33) Which of the following statements is/are correct about the UDP header?
a. application programs use to send data to other application programs.
b. distinguish port numbers between multiple programs on a single device.
c. UDP have limited size header of 8 bytes.
d. Both a and b
e. Both a and c
Answer
Explanation
|
ANSWER: Both a and b
Explanation: No explanation is available for this question!
|
|
34) What is the purpose of using pseudo header in UDP?
a. The data packets are delivered sequentially.
b. Find out the destination port number and source port number.
c. Sends the context of a particular internet destination address to UDP.
d. Verifying the UDP packet has reached its correct destination.
Answer
Explanation
|
ANSWER: Verifying the UDP packet has reached its correct destination.
Explanation: No explanation is available for this question!
|
|
35) When too many packets are present in a part of a subnet the performance degrades, this situation is called as Congestion.
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: No explanation is available for this question!
|
|
36) Which architectures is/are required to QoS?
a. Integrated Services
b. Differentiated Services
c. Reserved Services
d. Both a and b
e. Both b and c
Answer
Explanation
|
ANSWER: Both a and b
Explanation: No explanation is available for this question!
|
|
37) Match the following List 1 to List 2
1. Ping ------------ i) discover the routes 2.Traceroute ----- ii) method for troubleshooting the accessibility of devices 3. Netstat --------- iii) control the network connections on Windows NT/XP 4. Ipconfig -------- iv) finding problems in the network
a. 1-iii, 2-i, 3-iv, 4-ii
b. 1-ii, 2-i, 3-iv, 4-iii
c. 1-i, 2-iii, 3-ii, 4-iv
d. 1-iv, 2-ii, 3-iii, 4-ii
Answer
Explanation
|
ANSWER: 1-ii, 2-i, 3-iv, 4-iii
Explanation: No explanation is available for this question!
|
|
38) ICMP stands for ______________ .
a. Internet Component Mail Protocol
b. Internet Control Mail Protocol
c. Information Component Mail Protocol
d. Internet Control Message Protocol
Answer
Explanation
|
ANSWER: Internet Control Message Protocol
Explanation: No explanation is available for this question!
|
|
39) Consider the following types,
I. Destination unreachable II. Source quench III. Query Messages IV. Time exceeded V . Redirection In the above, which is/are the error reporting types?
a. I, II, III
b. I, II, IV, V
c. III, IV, V
d. III, II, IV, V
Answer
Explanation
|
ANSWER: I, II, IV, V
Explanation: No explanation is available for this question!
|
|
40) Which of the following statements is/are correct about distance vector?
a. Router don’t knows the identity of other router.
b. Cost of each couple is not equal to destination.
c. Each router maintains a distance vector.
d. All of the above.
Answer
Explanation
|
ANSWER: Each router maintains a distance vector.
Explanation: No explanation is available for this question!
|
|
41) What is the use of LAN bridges in the network?
a. Provides real time and non real time services.
b. Checks the MAC address of source and destination.
c. Provides broadband ISDN for the data packets.
d. None of the above
Answer
Explanation
|
ANSWER: Checks the MAC address of source and destination.
Explanation: No explanation is available for this question!
|
|
42) Abbreviate TDMA.
a. Time Division Multiple Access
b. Tree Diagonal Matrix Algorithm
c. Transmission Devices Media Access
d. Transport Devices Multiple Algorithm
Answer
Explanation
|
ANSWER: Time Division Multiple Access
Explanation: No explanation is available for this question!
|
|
43) What is/are the advantages of TDMA?
a. provide entire bandwidth but not simultaneously
b. cost effective technology
c. offer personal communication
d. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
44) What is the difference between TDMA and CDMA?
a. In CDMA only one user is allowed to share a channel or sub channel . while it is allowed in TDMA.
b. CDMA offers higher transmission quality than TDMA.
c. CDMA is a dominant technology in the wireless market than TDMA.
d. Both a and b
e. Both b and c
Answer
Explanation
|
ANSWER: CDMA offers higher transmission quality than TDMA.
Explanation: No explanation is available for this question!
|
|
45) Ethernet is a multi-access network and most successful local area networking technology.
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: No explanation is available for this question!
|
|
46) What is the default port of SMTP?
a. 85
b. 70
c. 80
d. 25
Answer
Explanation
|
ANSWER: 25
Explanation: No explanation is available for this question!
|
|
47) What is a path vector routing?
a. network routing protocol
b. inter-domain routing
c. exterior gateway protocol
d. None of the above
Answer
Explanation
|
ANSWER: network routing protocol
Explanation: No explanation is available for this question!
|
|
48) Which of the following statements is/are true about path vector routing?
a. Path vector routing is similar to the link state router.
b. Exterior Gateway Protocol (EGP) is used in Path Vector.
c. Maintains the path information and gets updated dynamically.
d. Not flexible in selecting the path while hiding the information.
Answer
Explanation
|
ANSWER: Maintains the path information and gets updated dynamically.
Explanation: No explanation is available for this question!
|
|
49) Which of the following is/are the advantages of hierarchical routing?
a. Portability
b. Scalability
c. Reliability
d. Flexibility
Answer
Explanation
|
ANSWER: Scalability
Explanation: No explanation is available for this question!
|
|
50) Match the following List 1 to List 2
1. Open message --------------- i. To close an active session 2. Update message ------------ ii. Opens a BGP communications session 3. Keep-alive message -------- iii. Provide routing updates to other BGP system 4. Notification message ------- iv. Notifies BGP peers device is active
a. 1-ii, 2-i, 3-iv, 4-iii
b. 1-iv, 2-iii, 3-i, 4-ii
c. 1-ii, 2-iii, 3-iv, 4-i
d. 1-i, 2-ii, 3-iii, 4-iv
Answer
Explanation
|
ANSWER: 1-ii, 2-iii, 3-iv, 4-i
Explanation: No explanation is available for this question!
|
|
51) What is the difference between forwarding and routing?
a. Forwarding does not transmit data on outgoing links, but routing does.
b. Forwarding finds suitable path for a packet than routing.
c. Forwarding is a part of decision making while routing is not.
d. Forwarding is used in telephony while routing is used in all networks.
Answer
Explanation
|
ANSWER: Forwarding is used in telephony while routing is used in all networks.
Explanation: No explanation is available for this question!
|
|
52) Why ATM was developed?
a. To handle both traditional high-throughput data traffic and real-time,low-latency content.
b. Designed to unify telecommunication and computer networks.
c. To meet the needs of the Broadband Integrated Services Digital Network.
d. All of the above.
Answer
Explanation
|
ANSWER: All of the above.
Explanation: No explanation is available for this question!
|
|
53) All networks require a central location to bring media segments together. These central locations are called _________ .
a. Bridges
b. Switches
c. Hubs
d. Routers
Answer
Explanation
|
ANSWER: Hubs
Explanation: No explanation is available for this question!
|
|
54) Which of the following is/are functions of header subfields? I. Router change flag II. Virtual path identifier III. Header error control IV. Cell loss priority
a. III, IV
b. II, III, IV
c. I, II
d. I, III, II
Answer
Explanation
|
ANSWER: II, III, IV
Explanation: No explanation is available for this question!
|
|