Uploaded by Lam Kha Thanh Cong (K14 HCM)

Answer for the questions in NWC203c

advertisement
1. Which of this is NOT a network edge device?
A. PC
B. Smartphones
C. Servers
D. Switch
2. Each computer in the network is called a _______
A. Server
B. System
C. Computer
D. Node
3. In CSMN\CD, what happens if a node receives a jam signal?
A. It stops receiving frame in.
B. It continues sending frame out.
C. It continues receiving frame in.
D. It stops sending frame out.
4. __________ are tools that allow the user to find specific document through key words
or menu choices.
A. HTTP
B. URL
C. E-mails
D. Search Engines
5. What happens If part of an FTP message is not delivered to the destination?
A. The message is lost because FTP does not use a reliable delivery method.
B. The FTP source host sends a query to the destination host.
C. The part of the FTP message that was lost is re-sent.
D. The entire FTP message is re-sent.
6. Why IS UDP desirable for that make a simple request and reply to transactions?
A. Flow Control
B. Low overhead
C. Reliability
D. Same-order delivery
7. Which of the following is a stateless best-effort delivery transport layer protocol?
A. ICMP
B. IP
C. TCP
D. UDP
8. A communication network which is used by large organizations over regional, national
or global area is called __________
A. LAN
B. MAN
C. WAN
D. Internet
9. _______ is responsible for routing the packets to a desired destination.
A. IP
B. TCP/IP
C. TCP
D. Data
10. You have an IP of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class
of the address, subnet address and broadcast address?
A. Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
B. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
C. Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
D. Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
11. This command Identifies the content of the mail message.
A. SUBJECT
B. CONTENT
C. DATA
D. BODY
E. RCPT TO
12. What is a three-way handshake?
A. The process to connect three hosts.
B. The procedure that TCP uses to connect three processes.
C. The procedure that TCP uses to establish a connection.
D. The procedure that UDP uses to establish a connection.
13. Which of these ports are used by FTP?
A. 20 and 21
B. 21 and 25
C. 20 and 25
D. 25and 110
14. _____ bits are there In the Ethernet address.
A. 16 bits
B. 32 bits
C. 48 bits
D. 64 bits
15. Given the IP 201.14.78.65 and mask 255.255.255.224, what is the subnet address?
A. 201.14.78.64
B. 201.14.78.32
C. 201.14.78.48
D. 201.14.78.0
E. 201.14.78.65
16. Which transport layer protocol would be used for VoIP application?
A. Session Information Protocol (SIP)
B. Transmission Control Protocol (TCP)
C. User Datagram Protocol (UDP)
D. VoIP Transfer Protocol
17. Suppose that Host A then sends two segments to Host B over a TCP connection. The first
and second segments contain 20 and 40 bytes of data, respectively. In the first the
sequence number is 145. What are the sequence numbers in the second segment?
A. 205
B. 185
C. 165
D. 125
E. 146
18. Which layer is responsible for establishing a temporary communication session between
the source and destination host applications?
A. application layer
B. data link layer
C. network layer
D. physical layer
E. transport layer
19. In RIP operation, which of the following statement is correct?
A. Router sends update message to neighbors every 30 sec
B. To deal with changes in topology such as a link failure, a router expects an update
from each of its neighbors within 180 sec
C. Convergence speeds up by triggered updates
D. All of the others
20. Full form of NIC
A. National Interface Card
B. Network Inter Connection
C. Network International Connection
D. Network Interface Card
21. What is incorrect about Web cache (proxy server)?
A. Web cache increases the performance of P2P applications significantly.
B. Web cache substantially reduces the response time for a client request to a web
server.
C. Web caches can substantially reduce traffic of access link from one Institution to the
Internet
D. Web caches can improve Internet performance in general.
E. None of the others
22. Which of the following is true about the ways in which the OSI reference model and
TCP/IP reference differ?
A. TCP/IP model does not have session layer, but OSI model has.
B. All of them
C. TCP/IP model does not have presentation layer, but OSI model has.
D. They differ in number of layers.
23. Which transport layer protocol ensures reliable same-order delivery?
A. ICMP
B. IP
C. TCP
D. UDP
24. In Head of Line (HOL) priority queuing, which of the following statement is a feature for
this approach.
A. Provides differential QoS.
B. High- priority classes can hog all of the bandwidth and starve lower priority classes.
C. Need to provide some isolation between classes.
D. All of the others
25. To create a TCP connection, the client has to send which flag to the server.
A. FIN
B. ACK
C. SEQ
D. SYN
26. Which UDP datagram reassembly statement is true?
A. UDP does not reassemble the data.
B. UDP reassembles the data in the order that it was received.
C. UDP reassembles the data using control bits.
D. UDP reassembles the data using sequence numbers.
27. Which of the following protocols uses both TCP and UDP?
A. Telnet
B. SMTP
C. DNS
D. FTP
28. The receiver window is found in _________
A. only ACKS
B. SYN & SYN-ACK
C. Only SYN
D. All TCP headers
E. an option
29. P2P stands for
A. Pair to Pair
B. Past to Past
C. Peer to Peek
D. Peer to Peer
30. Satellite, Microwave and Infrared are types of ________
A. Transmission protocols
B. Transmission media
C. Communication modes
D. Networks
31. The number of layers in Internet protocol stack
A. 5
B. 6
C. 7
D. None of the others
32. MAN stands for
A. Micro area network
B. Mix area network.
C. Macro area network
D. Metropolitan area network
33. Which of the following statement is true for DHCP?
A. Used extensively to assign temporary IP addresses to hosts.
B. Allows ISP to maximize usage of their limited IP addresses.
C. Time threshold to enforce lease time.
D. All of the others
34. FTP services are presented in which layer?
A. Layer 4 of the TCP/IP model
B. Layer 5 of the TCP/IP model
C. Layer 5 the OSI model
D. Layer 4 of the OSI model
35. Although HTTP is stateless, If the webserver wants to Identify the users, is used
A. Cookies
B. Caches
C. Password
D. ID
36. Which of the following IS the Individual characteristic of switch?
A. Maintain a routing table.
B. Examining the destination MAC address of incoming frame, to select the outgoing
link for this frame.
C. All nodes connected to device can collide with one another.
D. Transport layer device.
37. In Generic Framing Procedure (GFP), which of the following sentences are correct.
(Choose three answers)
A. GFP uses an explicit payload length indicator provided in its frame header to
accommodate variable length PDUs.
B. GFP uses a variation of HEC-based self-delineation technique.
C. GFP provides flexible encapsulation framework that supports either a fixed or
variable length frame structure.
D. GFP rely on byte-stuffing mechanism to delineate protocol data units (PDUs)
38. Consider a token bucket approach for traffic shaping. A token is generated every five
micro-sec packets that can hold 48 bytes of data. What is the sustainable data
transmission rate by the token?
(Choose one answer)
A. 7.68 Mbps
B. 76.8 Mbps
C. 768 Mbps
D. None of the others
39. The first AT Systems have
(Choose one answer)
A. 12-bit ISA Bus
B. 16-bit ISA Bus
C. 18-bit ISA Bus
D. 14-bit ISA Bus
40. Which of the following techniques is for Time-To-Line (TTL)?
A. A technique used to best-effort delivery systems to avoid endlessly Imping packetsB. A technique by in which a lover level protocol accepts a message from a higher-level
protocol and places it in the data portion of the law level frame.
C. One of the pieces that results when an IP gateway divides an IP datagram into smaller
pieces for transmission across a network that cannot handle the original datagram see.
D. All of the Others
41. SMTP, FTP and DNS are applications of the ___ layer.
A. Application
B. Network
C. Data link
D. Transport
42. A peer with which a mobile is communicating is called.
(Choose one answer)
A. Mobile
B. Foreign
C. Home agent
D. Correspondent node
43. ________indicates the link to other sites.
(Choose one answer)
A. Hyperlink
B. Hypertext
C. Hyperwebs
D. Hypermedia
44. Consider a Gigabit Ethernet hub with stations at a 100-meter distance and average
frame. Assume the propagation speed is at 2/3 of light speed. What is the value of
normalized delay produced?
(Choose one answer)
A. 0.0122
B. 0.122
C. 1.22
D. None of the others
45. In a software defined network (SDN), which of the architectural layers is responsible for
switching and forwarding instruction?
(Choose one answer)
A. Middle layer
B. Infrastructure layer
C. Security layer
D. None of the others
46. The _______ is the physical path over which a message travels.
(Choose I answer)
A. Route
B. Path
C. Protocol
D. Medium
47. Application layer is implemented in.
(Choose one answer)
A. Ethernet
B. End system
C. None of the others
D. NIC
48. In media access control, which of the following statements are true for Channelization.
(Choose three answers)
A. Inflexible in allocating bandwidth to users with different requirements
B. Does not scale well to large numbers of users.
C. Inefficient for bursty traffic
D. Widely used in internet traffic
49. Which of the following is the pipelining protocol?
(Choose one answer)
A. Sliding Window
B. Premature Timeout
C. Stop and Wait Automatic Repeat Request
D. Selective Repeat
50. To create a ____, personal computers can connect together.
(Choose one answer)
A. Network
B. Server
C. Supercomputer
D. Enterprise
51. Which multiplexing technique can transmit analog signals?
(Choose one answer)
A. Synchronous TOM
B. None of the others
C. Asynchronous TOM
D. FDM
52. Setting what TCP flag bit will start a handshake to terminate a TCP connection.
(Choose 1 answer)
A.
B.
C.
D.
F
A
S
P
E. R
53. What was the concern of the telephone system that motivated the ARPANET design?
A. Scalability
B. None of the others
C. Efficiency
D. Vulnerability
54. The divisor in a cyclic code IS normally called the ____________.
A. None of the others
B. Redundancy
C. Degree
D. Generator
55. Given a subnet mask 255.255.255.240, how many hosts the subnet can support?
A. 14
B. 30
C. 62
D. None of the others
56. Which of the following is a stateless best-effort delivery transport layer protocol?
A. ICMP
B. UDP
C. TCP
D. IP
57. Polling is a scheduling approach for dynamic medium access control. Which of following
statement is correct?
A. Polling can provide fairness through regulated access opportunities.
B. All of them are correct.
C. Polling performance can deteriorate with large delay-bandwidth product.
D. Polling can provide bounds on access delay to the shared medium.
58. Which of the following is not a disadvantage of wireless LAN?
A. Slower data transmission
B. Higher error rate
C. All of the others
D. Interference of transmissions from different computers
59. A subset of a network that includes all the routers but contains no loops is called
A. Broadcast structure
B. Spanning tree
C. Multi-destination routing structure
D. None of the others
60. In Closed-Loop flow control, which of the following mechanisms is used in congestion
control flow from sources into network.
(Choose 2 answers)
A. Round-Trip Time
B. Packet header size
C. Buffer length
D. Link utilization
61. Three or more devices share a link in ___________ connection.
A. Multipoint
B. Point to Point
C. None of the others
D. Unipoint
62. In Go-Back-N ARQ, a procedure where transmission of a new frame is begun before the
core of the previous frame transmission is called
A. Transitioning
B. Pipelining
C. Channeling
D. None of the others
63. How many duplicate ack-numbers trigger the Fast Retransmission mode?
A. 1
B. 3
C. An option
D. No. retransmissions are triggered by timeout event.
E. 2
64. What is a big advantage to using fiber-optic cable?
A. Fiber is not affected by Electromagnetic interference.
B. Fiber is a common glass. Therefore, it's cheaper.
C. Making custom cable lengths is easier with fiber.
D. All that orange fiber looks impressive in the network closet.
65. LJDP is a protocol that lives on this layer.
A. Data Link
B. Transport
C. Application
D. Network
66. The destination address field in an Ethernet frame is
A. 4-byte long
B. 16-byte long
C. 6-byte long
D. 48-byte long
67. In a LAN, which address is used to transfer frames to appropriate destination?
A. IP address
B. Physical address
C. Domain name
D. None of the others
68. What information is used as the entry of the lookup table in a Network Address
Translation
A. TCP port number
B. UDP port number
C. IP address
D. All of the others
69. Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the
sliding window size to be 4, what is the maximum sliding window size at the receiver?
A. 8
B. 3
C. None of the others
D. 7
70. Very popular browser-based email services such as Hotmail or Yahoo! Mail use ______
to transfer email between the client and the server.
A. HTTP
B. POP3
C. SMTP
D. FTP
E. IMAP
71. Which of the following is associated with the application layer (layer 7) of the OSI
model?
A. Ping
B. UDP
C. Telnet
D. None of the others
72. The time-to-live (TTL) field in the datagram is included to ensure that datagrams____
A. Do not return to the source.
B. Do not circulate forever in the network.
C. Do not congest the network.
D. To discard when desired.
E. To reach the destination on time.
73. ISP the abbreviation for?
A. Internet Exchange Point
B. Internet Service Provider
C. Routers and link-layer switches
D. Customer and provider
74. Polling is a scheduling approach for dynamic medium access control. Which of following
statement is correct?
A. Polling performance can deteriorate with large delay-bandwidth.
B. Polling can provide fairness through regulated access opportunities.
C. Polling can provide bounds on access delay to the shared medium.
D. All of the others
75. In congestion warning, the feedback mechanism can be implicit or explicit. Which of the
following example of implicit feedback
A. A time-out due to missing acknowledgement
B. The warning bit in ACKs
C. Choke packets to the source
D. None of the others
76. A ______ network is a high-speed network using fiber optic cable.
A. FDDI
B. Ring
C. Bus
D. Hybrid
77. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
A. CSMA/CD
B. ALOHA
C. CDMA
D. CSMA/CA
78. What field is used to provide flow control?
A. Source Port
B. Destination Port
C. Sequence Number
D. Control bits
E. Window size
79. Which of the following statements about leaky bucket is wrong?
A. Leaky bucket is a flow-level traffic management mechanism.
B. In the leaky bucket. the packet output rate can be variable.
C. In the leaky bucket. The packet output rate is always constant.
D. In leaky bucket. when the bucket is full. the new arriving packets may be discarded.
80. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what
would address of this host?
A. 172.16.255.0
B. 172.16.112.0
C. 172.16.96.0
D. 172.16.0.0
81. Two or more computers connected to each other for sharing information form a
A. Tunnel
B. Router
C. Server
D. Network
82. The functionalities of presentation layer include
A. Data compression
B. Data encryption
C. Data decryption
D. All of the others
83. Consider a Class B network, where the subnet ID takes 9 bits. What will be the subnet
mask
A. 1111111 11111111 11111110 00000000
B. 1111111 11111111 11111111 10000000
C. 1111111 11111111 00000000 00000000
D. None of the others
84. Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels.
C. Sharing of resources and information.
D. All of the others
85. In internet, switching is done by using datagram approach to packet switching at the
A. Data link layer
B. Application layer
C. Network layer
D. Physical layer
86. Each page on the internet is called a_________
A. Web
B. Webpage
C. WWW
D. Host
87. The DNS protocol runs over _______ and uses port ________
A. UDP….51
B. TCP….51
C. TCP….52
D. UDP….53
E. HTTP….53
88. What is the remainder obtained by dividing x^7 + x^5 + 1 by the generator x^3 + 1
A. x^2 + 1
B. x^2 + x + 1
C. x^2 + x
D. None of the others
89. Which of the following is the protocol?
A. Stop and Wait Automatic Repeat Request
B. Selective Repeat
C. Sliding Window
D. Premature Timeout
90. What happens when you can connect to the FTP server by typing Ethernet 112.158.25.4
21" but you cannot connect to the same FTP server by typing "telnet ftp.example.com
21?
A. No DNS configuration
B. ADSL connection has a problem.
C. Server is shutdown.
D. The Internet is too slow.
91. Which of the following would be valid source and destination ports for a host
connecting to a DNS server?
A. Source: 1812. Destination: 49152
B. Source: 49152. Destination 53
C. Source: 53. Destination: 49152
D. Source: 49152. Destination: 1812
92. Which two applications would use the IJDP transport layer protocol?
A. FTP and HTTP
B. HTTP and TFTP
C. TFTP and VoIP
D. FTP and VolP
93. Which of the following statements about TCP/LJDP sockets is wrong?
A. TCP sockets are stream oriented.
B. UDP socket is block oriented.
C. TCP is faster than UDP.
D. None of the other.
94. In a ring topology, the computer in possession of the _______ can transmit data.
A. Access method
B. Data
C. Pocket
D. Token
95. Which of the following are commonly used as digital communication medium?
A. All of them
B. Twisted pair.
C. Coaxial cable
D. Optical fiber
96. Which one of the following is a layer protocol?
A. neighbor discovery protocol
B. dynamic host configuration protocol
C. internet control message protocol
D. stream control transmission protocol
97. Which UDP header statement is true?
A. It consists of 4 fields in a 8-byte header.
B. It consists of 20 fields in a 40-byte header.
C. It consists of 8 fields in a 10-byte header.
D. It consists of 10 fields in a 20-byte header.
98. In error detection and loss recovery, which of the following statement is correct.
A. Frames may undergo errors in transmission.
B. CRCs detect errors and such frames treated as lost.
C. Frames lost due to loss-of-synchronization or receiver buffer overflow.
D. All of the others
99. Which of the following sentences are true for connectionless stream mode of Service
(Choose 1 answer)
A. Send/receive to/from multiple peer processes.
B. Destination address with each block
C. Multiple write/read between peers processes.
D. No setup overhead and delay
100.
What are metrics for routing?
A. Hop count.
B. Delay
C. Bandwidth
D. All of the others
101.
______ unit(s) in a single bus structure communicate at a time.
A. Three
B. One
C. Four
D. Two
102.
How does a networked server manage requests from multiple clients for
different services?
A. Each request has a combination of source and destination port numbers. coming
from a unique IP address.
B. The server uses IP addresses to identify different services.
C. Each request is tracked through the physical address of the client.
D. The server sends all requests through a default gateway.
103.
In Open Shortest Path First (OSPF), which of the following statements are correct
A. OSPF typically converges slower than RIP when there is a failure in the network.
B. Enables each router to learn complete network topology.
C. Allow routers to build the shortest path tree with router as root.
D. Each router builds an identical link-state database.
104.
A ______ is a system to digital message formats and rules for exchanging those
messages in or between computing systems and in telecommunications
A. DNS
B. Modem
C. Router
D. Communication Protocol
105.
Which of the following are management services offered by the MAC sublayer in
wireless LAN
A. Network management
B. Storage management
C. Roaming within ESS
D. Power management
106.
An example of a protocol converter counter value is
A. ACK/NAK count
B. ACK/NAK delay
C. Data rate
D. Bit delay
107.
Which one is NOT in UDP segment header?
A. Receiving Window Size
B. Checksum
C. Source port
D. Length
E. Destination port
108.
In buffer management, which feature requires packet to drop when buffer is full
A. Fairness
B. Drop priorities.
C. Drop strategy.
D. Aggregation
109.
Which of the following techniques can be used for transitioning from IPv4 to
IPv6?
A. Network address translation
B. Dynamic host configuration protocol
C. IP tunneling
D. All of the others
110.
In IP fragmentation, a datagram is fragmented into two packets, then the first
packet has
A. Offset \= packet size and FragFlag \=1
B. Offset\=0 and FragFlag \=0
C. Offset\=1 and FragFlag\=1
D. Offset\=1 and FragFlag\=0
E. Offset\=0 and FragFlag\=1
Download