1. Which of this is NOT a network edge device? A. PC B. Smartphones C. Servers D. Switch 2. Each computer in the network is called a _______ A. Server B. System C. Computer D. Node 3. In CSMN\CD, what happens if a node receives a jam signal? A. It stops receiving frame in. B. It continues sending frame out. C. It continues receiving frame in. D. It stops sending frame out. 4. __________ are tools that allow the user to find specific document through key words or menu choices. A. HTTP B. URL C. E-mails D. Search Engines 5. What happens If part of an FTP message is not delivered to the destination? A. The message is lost because FTP does not use a reliable delivery method. B. The FTP source host sends a query to the destination host. C. The part of the FTP message that was lost is re-sent. D. The entire FTP message is re-sent. 6. Why IS UDP desirable for that make a simple request and reply to transactions? A. Flow Control B. Low overhead C. Reliability D. Same-order delivery 7. Which of the following is a stateless best-effort delivery transport layer protocol? A. ICMP B. IP C. TCP D. UDP 8. A communication network which is used by large organizations over regional, national or global area is called __________ A. LAN B. MAN C. WAN D. Internet 9. _______ is responsible for routing the packets to a desired destination. A. IP B. TCP/IP C. TCP D. Data 10. You have an IP of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of the address, subnet address and broadcast address? A. Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127 B. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127 C. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255 D. Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255 11. This command Identifies the content of the mail message. A. SUBJECT B. CONTENT C. DATA D. BODY E. RCPT TO 12. What is a three-way handshake? A. The process to connect three hosts. B. The procedure that TCP uses to connect three processes. C. The procedure that TCP uses to establish a connection. D. The procedure that UDP uses to establish a connection. 13. Which of these ports are used by FTP? A. 20 and 21 B. 21 and 25 C. 20 and 25 D. 25and 110 14. _____ bits are there In the Ethernet address. A. 16 bits B. 32 bits C. 48 bits D. 64 bits 15. Given the IP 201.14.78.65 and mask 255.255.255.224, what is the subnet address? A. 201.14.78.64 B. 201.14.78.32 C. 201.14.78.48 D. 201.14.78.0 E. 201.14.78.65 16. Which transport layer protocol would be used for VoIP application? A. Session Information Protocol (SIP) B. Transmission Control Protocol (TCP) C. User Datagram Protocol (UDP) D. VoIP Transfer Protocol 17. Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first the sequence number is 145. What are the sequence numbers in the second segment? A. 205 B. 185 C. 165 D. 125 E. 146 18. Which layer is responsible for establishing a temporary communication session between the source and destination host applications? A. application layer B. data link layer C. network layer D. physical layer E. transport layer 19. In RIP operation, which of the following statement is correct? A. Router sends update message to neighbors every 30 sec B. To deal with changes in topology such as a link failure, a router expects an update from each of its neighbors within 180 sec C. Convergence speeds up by triggered updates D. All of the others 20. Full form of NIC A. National Interface Card B. Network Inter Connection C. Network International Connection D. Network Interface Card 21. What is incorrect about Web cache (proxy server)? A. Web cache increases the performance of P2P applications significantly. B. Web cache substantially reduces the response time for a client request to a web server. C. Web caches can substantially reduce traffic of access link from one Institution to the Internet D. Web caches can improve Internet performance in general. E. None of the others 22. Which of the following is true about the ways in which the OSI reference model and TCP/IP reference differ? A. TCP/IP model does not have session layer, but OSI model has. B. All of them C. TCP/IP model does not have presentation layer, but OSI model has. D. They differ in number of layers. 23. Which transport layer protocol ensures reliable same-order delivery? A. ICMP B. IP C. TCP D. UDP 24. In Head of Line (HOL) priority queuing, which of the following statement is a feature for this approach. A. Provides differential QoS. B. High- priority classes can hog all of the bandwidth and starve lower priority classes. C. Need to provide some isolation between classes. D. All of the others 25. To create a TCP connection, the client has to send which flag to the server. A. FIN B. ACK C. SEQ D. SYN 26. Which UDP datagram reassembly statement is true? A. UDP does not reassemble the data. B. UDP reassembles the data in the order that it was received. C. UDP reassembles the data using control bits. D. UDP reassembles the data using sequence numbers. 27. Which of the following protocols uses both TCP and UDP? A. Telnet B. SMTP C. DNS D. FTP 28. The receiver window is found in _________ A. only ACKS B. SYN & SYN-ACK C. Only SYN D. All TCP headers E. an option 29. P2P stands for A. Pair to Pair B. Past to Past C. Peer to Peek D. Peer to Peer 30. Satellite, Microwave and Infrared are types of ________ A. Transmission protocols B. Transmission media C. Communication modes D. Networks 31. The number of layers in Internet protocol stack A. 5 B. 6 C. 7 D. None of the others 32. MAN stands for A. Micro area network B. Mix area network. C. Macro area network D. Metropolitan area network 33. Which of the following statement is true for DHCP? A. Used extensively to assign temporary IP addresses to hosts. B. Allows ISP to maximize usage of their limited IP addresses. C. Time threshold to enforce lease time. D. All of the others 34. FTP services are presented in which layer? A. Layer 4 of the TCP/IP model B. Layer 5 of the TCP/IP model C. Layer 5 the OSI model D. Layer 4 of the OSI model 35. Although HTTP is stateless, If the webserver wants to Identify the users, is used A. Cookies B. Caches C. Password D. ID 36. Which of the following IS the Individual characteristic of switch? A. Maintain a routing table. B. Examining the destination MAC address of incoming frame, to select the outgoing link for this frame. C. All nodes connected to device can collide with one another. D. Transport layer device. 37. In Generic Framing Procedure (GFP), which of the following sentences are correct. (Choose three answers) A. GFP uses an explicit payload length indicator provided in its frame header to accommodate variable length PDUs. B. GFP uses a variation of HEC-based self-delineation technique. C. GFP provides flexible encapsulation framework that supports either a fixed or variable length frame structure. D. GFP rely on byte-stuffing mechanism to delineate protocol data units (PDUs) 38. Consider a token bucket approach for traffic shaping. A token is generated every five micro-sec packets that can hold 48 bytes of data. What is the sustainable data transmission rate by the token? (Choose one answer) A. 7.68 Mbps B. 76.8 Mbps C. 768 Mbps D. None of the others 39. The first AT Systems have (Choose one answer) A. 12-bit ISA Bus B. 16-bit ISA Bus C. 18-bit ISA Bus D. 14-bit ISA Bus 40. Which of the following techniques is for Time-To-Line (TTL)? A. A technique used to best-effort delivery systems to avoid endlessly Imping packetsB. A technique by in which a lover level protocol accepts a message from a higher-level protocol and places it in the data portion of the law level frame. C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram see. D. All of the Others 41. SMTP, FTP and DNS are applications of the ___ layer. A. Application B. Network C. Data link D. Transport 42. A peer with which a mobile is communicating is called. (Choose one answer) A. Mobile B. Foreign C. Home agent D. Correspondent node 43. ________indicates the link to other sites. (Choose one answer) A. Hyperlink B. Hypertext C. Hyperwebs D. Hypermedia 44. Consider a Gigabit Ethernet hub with stations at a 100-meter distance and average frame. Assume the propagation speed is at 2/3 of light speed. What is the value of normalized delay produced? (Choose one answer) A. 0.0122 B. 0.122 C. 1.22 D. None of the others 45. In a software defined network (SDN), which of the architectural layers is responsible for switching and forwarding instruction? (Choose one answer) A. Middle layer B. Infrastructure layer C. Security layer D. None of the others 46. The _______ is the physical path over which a message travels. (Choose I answer) A. Route B. Path C. Protocol D. Medium 47. Application layer is implemented in. (Choose one answer) A. Ethernet B. End system C. None of the others D. NIC 48. In media access control, which of the following statements are true for Channelization. (Choose three answers) A. Inflexible in allocating bandwidth to users with different requirements B. Does not scale well to large numbers of users. C. Inefficient for bursty traffic D. Widely used in internet traffic 49. Which of the following is the pipelining protocol? (Choose one answer) A. Sliding Window B. Premature Timeout C. Stop and Wait Automatic Repeat Request D. Selective Repeat 50. To create a ____, personal computers can connect together. (Choose one answer) A. Network B. Server C. Supercomputer D. Enterprise 51. Which multiplexing technique can transmit analog signals? (Choose one answer) A. Synchronous TOM B. None of the others C. Asynchronous TOM D. FDM 52. Setting what TCP flag bit will start a handshake to terminate a TCP connection. (Choose 1 answer) A. B. C. D. F A S P E. R 53. What was the concern of the telephone system that motivated the ARPANET design? A. Scalability B. None of the others C. Efficiency D. Vulnerability 54. The divisor in a cyclic code IS normally called the ____________. A. None of the others B. Redundancy C. Degree D. Generator 55. Given a subnet mask 255.255.255.240, how many hosts the subnet can support? A. 14 B. 30 C. 62 D. None of the others 56. Which of the following is a stateless best-effort delivery transport layer protocol? A. ICMP B. UDP C. TCP D. IP 57. Polling is a scheduling approach for dynamic medium access control. Which of following statement is correct? A. Polling can provide fairness through regulated access opportunities. B. All of them are correct. C. Polling performance can deteriorate with large delay-bandwidth product. D. Polling can provide bounds on access delay to the shared medium. 58. Which of the following is not a disadvantage of wireless LAN? A. Slower data transmission B. Higher error rate C. All of the others D. Interference of transmissions from different computers 59. A subset of a network that includes all the routers but contains no loops is called A. Broadcast structure B. Spanning tree C. Multi-destination routing structure D. None of the others 60. In Closed-Loop flow control, which of the following mechanisms is used in congestion control flow from sources into network. (Choose 2 answers) A. Round-Trip Time B. Packet header size C. Buffer length D. Link utilization 61. Three or more devices share a link in ___________ connection. A. Multipoint B. Point to Point C. None of the others D. Unipoint 62. In Go-Back-N ARQ, a procedure where transmission of a new frame is begun before the core of the previous frame transmission is called A. Transitioning B. Pipelining C. Channeling D. None of the others 63. How many duplicate ack-numbers trigger the Fast Retransmission mode? A. 1 B. 3 C. An option D. No. retransmissions are triggered by timeout event. E. 2 64. What is a big advantage to using fiber-optic cable? A. Fiber is not affected by Electromagnetic interference. B. Fiber is a common glass. Therefore, it's cheaper. C. Making custom cable lengths is easier with fiber. D. All that orange fiber looks impressive in the network closet. 65. LJDP is a protocol that lives on this layer. A. Data Link B. Transport C. Application D. Network 66. The destination address field in an Ethernet frame is A. 4-byte long B. 16-byte long C. 6-byte long D. 48-byte long 67. In a LAN, which address is used to transfer frames to appropriate destination? A. IP address B. Physical address C. Domain name D. None of the others 68. What information is used as the entry of the lookup table in a Network Address Translation A. TCP port number B. UDP port number C. IP address D. All of the others 69. Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the sliding window size to be 4, what is the maximum sliding window size at the receiver? A. 8 B. 3 C. None of the others D. 7 70. Very popular browser-based email services such as Hotmail or Yahoo! Mail use ______ to transfer email between the client and the server. A. HTTP B. POP3 C. SMTP D. FTP E. IMAP 71. Which of the following is associated with the application layer (layer 7) of the OSI model? A. Ping B. UDP C. Telnet D. None of the others 72. The time-to-live (TTL) field in the datagram is included to ensure that datagrams____ A. Do not return to the source. B. Do not circulate forever in the network. C. Do not congest the network. D. To discard when desired. E. To reach the destination on time. 73. ISP the abbreviation for? A. Internet Exchange Point B. Internet Service Provider C. Routers and link-layer switches D. Customer and provider 74. Polling is a scheduling approach for dynamic medium access control. Which of following statement is correct? A. Polling performance can deteriorate with large delay-bandwidth. B. Polling can provide fairness through regulated access opportunities. C. Polling can provide bounds on access delay to the shared medium. D. All of the others 75. In congestion warning, the feedback mechanism can be implicit or explicit. Which of the following example of implicit feedback A. A time-out due to missing acknowledgement B. The warning bit in ACKs C. Choke packets to the source D. None of the others 76. A ______ network is a high-speed network using fiber optic cable. A. FDDI B. Ring C. Bus D. Hybrid 77. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? A. CSMA/CD B. ALOHA C. CDMA D. CSMA/CA 78. What field is used to provide flow control? A. Source Port B. Destination Port C. Sequence Number D. Control bits E. Window size 79. Which of the following statements about leaky bucket is wrong? A. Leaky bucket is a flow-level traffic management mechanism. B. In the leaky bucket. the packet output rate can be variable. C. In the leaky bucket. The packet output rate is always constant. D. In leaky bucket. when the bucket is full. the new arriving packets may be discarded. 80. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would address of this host? A. 172.16.255.0 B. 172.16.112.0 C. 172.16.96.0 D. 172.16.0.0 81. Two or more computers connected to each other for sharing information form a A. Tunnel B. Router C. Server D. Network 82. The functionalities of presentation layer include A. Data compression B. Data encryption C. Data decryption D. All of the others 83. Consider a Class B network, where the subnet ID takes 9 bits. What will be the subnet mask A. 1111111 11111111 11111110 00000000 B. 1111111 11111111 11111111 10000000 C. 1111111 11111111 00000000 00000000 D. None of the others 84. Computer Network is A. Collection of hardware components and computers B. Interconnected by communication channels. C. Sharing of resources and information. D. All of the others 85. In internet, switching is done by using datagram approach to packet switching at the A. Data link layer B. Application layer C. Network layer D. Physical layer 86. Each page on the internet is called a_________ A. Web B. Webpage C. WWW D. Host 87. The DNS protocol runs over _______ and uses port ________ A. UDP….51 B. TCP….51 C. TCP….52 D. UDP….53 E. HTTP….53 88. What is the remainder obtained by dividing x^7 + x^5 + 1 by the generator x^3 + 1 A. x^2 + 1 B. x^2 + x + 1 C. x^2 + x D. None of the others 89. Which of the following is the protocol? A. Stop and Wait Automatic Repeat Request B. Selective Repeat C. Sliding Window D. Premature Timeout 90. What happens when you can connect to the FTP server by typing Ethernet 112.158.25.4 21" but you cannot connect to the same FTP server by typing "telnet ftp.example.com 21? A. No DNS configuration B. ADSL connection has a problem. C. Server is shutdown. D. The Internet is too slow. 91. Which of the following would be valid source and destination ports for a host connecting to a DNS server? A. Source: 1812. Destination: 49152 B. Source: 49152. Destination 53 C. Source: 53. Destination: 49152 D. Source: 49152. Destination: 1812 92. Which two applications would use the IJDP transport layer protocol? A. FTP and HTTP B. HTTP and TFTP C. TFTP and VoIP D. FTP and VolP 93. Which of the following statements about TCP/LJDP sockets is wrong? A. TCP sockets are stream oriented. B. UDP socket is block oriented. C. TCP is faster than UDP. D. None of the other. 94. In a ring topology, the computer in possession of the _______ can transmit data. A. Access method B. Data C. Pocket D. Token 95. Which of the following are commonly used as digital communication medium? A. All of them B. Twisted pair. C. Coaxial cable D. Optical fiber 96. Which one of the following is a layer protocol? A. neighbor discovery protocol B. dynamic host configuration protocol C. internet control message protocol D. stream control transmission protocol 97. Which UDP header statement is true? A. It consists of 4 fields in a 8-byte header. B. It consists of 20 fields in a 40-byte header. C. It consists of 8 fields in a 10-byte header. D. It consists of 10 fields in a 20-byte header. 98. In error detection and loss recovery, which of the following statement is correct. A. Frames may undergo errors in transmission. B. CRCs detect errors and such frames treated as lost. C. Frames lost due to loss-of-synchronization or receiver buffer overflow. D. All of the others 99. Which of the following sentences are true for connectionless stream mode of Service (Choose 1 answer) A. Send/receive to/from multiple peer processes. B. Destination address with each block C. Multiple write/read between peers processes. D. No setup overhead and delay 100. What are metrics for routing? A. Hop count. B. Delay C. Bandwidth D. All of the others 101. ______ unit(s) in a single bus structure communicate at a time. A. Three B. One C. Four D. Two 102. How does a networked server manage requests from multiple clients for different services? A. Each request has a combination of source and destination port numbers. coming from a unique IP address. B. The server uses IP addresses to identify different services. C. Each request is tracked through the physical address of the client. D. The server sends all requests through a default gateway. 103. In Open Shortest Path First (OSPF), which of the following statements are correct A. OSPF typically converges slower than RIP when there is a failure in the network. B. Enables each router to learn complete network topology. C. Allow routers to build the shortest path tree with router as root. D. Each router builds an identical link-state database. 104. A ______ is a system to digital message formats and rules for exchanging those messages in or between computing systems and in telecommunications A. DNS B. Modem C. Router D. Communication Protocol 105. Which of the following are management services offered by the MAC sublayer in wireless LAN A. Network management B. Storage management C. Roaming within ESS D. Power management 106. An example of a protocol converter counter value is A. ACK/NAK count B. ACK/NAK delay C. Data rate D. Bit delay 107. Which one is NOT in UDP segment header? A. Receiving Window Size B. Checksum C. Source port D. Length E. Destination port 108. In buffer management, which feature requires packet to drop when buffer is full A. Fairness B. Drop priorities. C. Drop strategy. D. Aggregation 109. Which of the following techniques can be used for transitioning from IPv4 to IPv6? A. Network address translation B. Dynamic host configuration protocol C. IP tunneling D. All of the others 110. In IP fragmentation, a datagram is fragmented into two packets, then the first packet has A. Offset \= packet size and FragFlag \=1 B. Offset\=0 and FragFlag \=0 C. Offset\=1 and FragFlag\=1 D. Offset\=1 and FragFlag\=0 E. Offset\=0 and FragFlag\=1