CS610 Solved paper 1 Spring 2010

3,070 views
Skip to first unread message

R@ïñßøwßrïgh±

unread,
Feb 8, 2011, 12:33:51 PM2/8/11
to vu...@googlegroups.com

FINALTERM EXAMINATION

Spring 2010

CS610- Computer Network

Ref No: 1578657

Time: 90 min

Marks: 60

Question No: 1      ( Marks: 1 ) - Please choose one

A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.

 

       Static addressing scheme

       Configurable addressing scheme

       Dynamic addressing scheme

       None of the given


Question No: 2      ( Marks: 1 ) - Please choose one

An interface for thin  Ethernet must have an ____________  connector , and must generate signals according to the_____________ specification.

 

       ► RJ-45, 10 Base T

       RJ-45, 10 Base 5

       BNC, 10 Base 2

       BNC, 10 Base T

 

Question No: 3      ( Marks: 1 ) - Please choose one

A system with redundant bridges might have a problem with_______ in the system.

 

       ► Loop

       Filters

       Spanning Trees

       All given choices

 

Question No: 4      ( Marks: 1 ) - Please choose one

A Bridge can ________

       Filter a frame

       Forward a frame

       Extend a LAN

       Do all the above

 

Question No: 5      ( Marks: 1 ) - Please choose one

________ is used for typical data applications (where the data rate may be unknown and bursty) and allows use of whatever bandwidth is available at a given time.

       Constant Bit Rate (CBR) service

       Variable Bit Rate (VBR) service

       ► Available Bit Rate (ABR) service

       None of the given

 

Question No: 6      ( Marks: 1 ) - Please choose one

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

       21-bit

       22-bit

       23-bit

       ► 24-bit

 

Question No: 7      ( Marks: 1 ) - Please choose one

________ of TCP/IP layering model, corresponds to basic network hardware.

 

       Physical Layer

       Network Interface Layer

       Internet Layer

       Transport Layer

 

Question No: 8      ( Marks: 1 ) - Please choose one

__________ places the boundary between the second and third octets

 

       ► Class A

       Class B

       Class C

       Class D

 

Question No: 9      ( Marks: 1 ) - Please choose one

UDP and TCP are both_________ layer protocols

 

       Physical

       Data link

       Network

       ► Transport

 

Question No: 10      ( Marks: 1 ) - Please choose one

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________

 

       IP

       None of the given

       ► TCP

       UDP

 

Question No: 11      ( Marks: 1 ) - Please choose one

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

       Physical Layer

       Network Interface Layer

       Internet Layer

       Transport Layer

 

Question No: 12      ( Marks: 1 ) - Please choose one

________identifies which application program on receiving computer should receive the data

 

       Logical address

       Source port

       Destination Port

       None of the given

 

Question No: 13      ( Marks: 1 ) - Please choose one

________ identifies the application program that sent the data.

 

        Destination Port

       Source port

       Logical address

       None of the given

 

Question No: 14      ( Marks: 1 ) - Please choose one

Which of the following are interior routing protocols?

 

       ► RIP

       OSPF

       BGP

       RIP and OSPF

 

Question No: 15      ( Marks: 1 ) - Please choose one

The Border Gateway Protocol (BGP) uses_________ for all communication

 

       UDP

       ► TCP

       Both UDP and TCP

       None of the given

 

Question No: 16      ( Marks: 1 ) - Please choose one

__________measures distance in network hops, where each network between the source and destination counts as single hop.

 

       BGP

       OSPF

       ► RIP

       None of the given

 

Question No: 17      ( Marks: 1 ) - Please choose one

OSPF is based on--------

 

       Distance vector routing

       ► Link state routing

       Path vector routing

       Distance vector routing and Link state routing

 

Question No: 18      ( Marks: 1 ) - Please choose one

_________ performs local multicast and uses IP-in-IP encapsulation to send multicast datagrams from one site on the Internet to another.

 

      ► Distance Vector Multicast Routing Protocol (DVMRP)

       Core Based Trees (CBT)

       Protocol Independent Multicast_ Sparse Mode (PIM-SM)

       Protocol Independent Multicast _ Dense Mode (PIM-DM)

 

Question No: 19      ( Marks: 1 ) - Please choose one

The length of time required to send a variable length packet is variable and does not require a complicated interrupt scheme to detect completion of transmission.

 

       True

       ► False


Question No: 20      ( Marks: 1 ) - Please choose one

NEXT HEADER field in the base header defines type of header and it appears at end of fixed-size base header.

 

       ► True

       False

 

Question No: 21      ( Marks: 1 ) - Please choose one

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

 

       ► True

       False

 

Question No: 22      ( Marks: 1 ) - Please choose one

Address mask defines how many bits of address are in suffix?

 

       True

       ► False

 

Question No: 23      ( Marks: 1 ) - Please choose one

A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?

       ► True

       False

 

Question No: 24      ( Marks: 1 ) - Please choose one

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.

 

       False

       ► True

 

Question No: 25      ( Marks: 1 ) - Please choose one

The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.  

       ► itself

       prefix

       suffix

       mask

 

Question No: 26      ( Marks: 1 ) - Please choose one

In which method of Address Resolution Protocol the protocol address independent of hardware address?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

       T, C

       D

       C

       ► T, D

 

Question No: 27      ( Marks: 1 ) - Please choose one

In which method of Address Resolution Protocol the protocol address is determined by hardware address?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

       T

       D

       ► C

       T, C

 

Question No: 28      ( Marks: 1 ) - Please choose one

Reconstruction of original datagram is called reassembly.

 

       ► True

       False

 

Question No: 29      ( Marks: 1 ) - Please choose one

A computer needs a complete stack of protocols to run either a client or a server.

 

       ► True

       False

 

Question No: 30      ( Marks: 1 ) - Please choose one

TCP uses _______ mechanism to control the flow of data.

 

       door

       ► window

       acknowledgment

       retransmission

clip_image002.gif

Zubair Hussain

unread,
Feb 8, 2011, 2:16:19 PM2/8/11
to vu...@googlegroups.com
I crossed checked all the mcqs. To my best knowledge all are correct.

Very nice work. thank you very much for all this.

Regards

Zubair Hussain
www.vuzs.net



--
--
Please visit www.vuzs.net For Current & Old Papers, Quizzes, Assignments and study material.
--
You received this message because you are subscribed to the Google
Groups "vuZs" group.
--
To post a new message on this group, send email to vu...@googlegroups.com
--
Message Posting Rules: http://groups.google.com/group/vuZs/web/vuzs-basic-rules-for-posting-messages
--
To unsubscribe from this group, send email to vuZs+uns...@googlegroups.com
--
For more info, visit the main page of vuZs group at http://groups.google.com/group/vuZs
--
To join this group Send blank email from your virtual university email address to
vuZs+su...@googlegroups.com
or visit
http://groups.google.com/group/vuZs/subscribe?hl=en

clip_image002.gif

meerib fatima fatima

unread,
Feb 9, 2011, 9:32:34 AM2/9/11
to vu...@googlegroups.com
bhai jan jo long quation tha wo bhe solve kr dayta . ya hm ko bhe ayta
tha zara mushikal kaam bhe diea kro

On 2/8/11, Zubair Hussain <zub...@vuzs.net> wrote:
> *I crossed checked all the mcqs. To my best knowledge all are correct.*
> *
> *
> *Very nice work. thank you very much for all this.
> *
>
> Regards
>
> Zubair Hussain
> *www.vuzs.net*


>
>
>
> On Tue, Feb 8, 2011 at 9:33 PM, R@ïñßøwßrïgh± <dngd...@gmail.com> wrote:
>
>> FINALTERM EXAMINATION
>>
>> Spring 2010
>>
>> CS610- Computer Network
>>
>> Ref No: 1578657
>>
>> Time: 90 min
>>
>> Marks: 60
>>
>> Question No: 1 ( Marks: 1 ) - Please choose one
>>

>> A ---------- relies on the hardware manufacturer to assign a unique
>> physical address to each network interface.
>>
>>
>>

>> ► *Static addressing scheme*


>>
>> ► Configurable addressing scheme
>>
>> ► Dynamic addressing scheme
>>
>> ► None of the given
>>
>>
>> Question No: 2 ( Marks: 1 ) - Please choose one
>>

>> An interface for thin Ethernet must have an ____________ connector , and
>> must generate signals according to the_____________ specification.
>>
>>
>>
>> ► RJ-45, 10 Base T
>>
>> ► RJ-45, 10 Base 5
>>

>> ► *BNC, 10 Base 2*


>>
>> ► BNC, 10 Base T
>>
>>
>>
>> Question No: 3 ( Marks: 1 ) - Please choose one
>>

>> A system with redundant bridges might have a problem with_______ in the
>> system.
>>
>>
>>

>> * ► Loop***


>>
>> ► Filters
>>
>> ► Spanning Trees
>>
>> ► All given choices
>>
>>
>>
>> Question No: 4 ( Marks: 1 ) - Please choose one
>>
>> A Bridge can ________
>>
>> ► Filter a frame
>>
>> ► Forward a frame
>>
>> ► Extend a LAN
>>

>> ► *Do all the above*


>>
>>
>>
>> Question No: 5 ( Marks: 1 ) - Please choose one
>>
>> ________ is used for typical data applications (where the data rate may be
>> unknown and bursty) and allows use of whatever bandwidth is available at a
>> given time.
>>
>> ► Constant Bit Rate (CBR) service
>>
>> ► Variable Bit Rate (VBR) service
>>

>> * ► Available Bit Rate (ABR) service***


>>
>> ► None of the given
>>
>>
>>
>> Question No: 6 ( Marks: 1 ) - Please choose one
>>

>> ATM assigns each VC a _____________ identifier that is divided two parts
>> to produce a hierarchy.
>>
>> ► 21-bit
>>
>> ► 22-bit
>>
>> ► 23-bit
>>

>> *► 24-bit***


>>
>>
>>
>> Question No: 7 ( Marks: 1 ) - Please choose one
>>

>> ________ of TCP/IP layering model, corresponds to basic network hardware.
>>
>>
>>

>> ► *Physical Layer*
>>
>> * ► *Network Interface Layer* ***


>>
>> ► Internet Layer
>>
>> ► Transport Layer
>>
>>
>>
>> Question No: 8 ( Marks: 1 ) - Please choose one
>>
>> __________ places the boundary between the second and third octets
>>
>>
>>
>> ► Class A
>>

>> * ► **Class B***


>>
>> ► Class C
>>
>> ► Class D
>>
>>
>>
>> Question No: 9 ( Marks: 1 ) - Please choose one
>>

>> UDP and TCP are both_________ layer protocols
>>
>>
>>
>> ► Physical
>>
>> ► Data link
>>
>> ► Network
>>

>> * ► Transport***


>>
>>
>>
>> Question No: 10 ( Marks: 1 ) - Please choose one
>>

>> Connection-oriented service, Point-to-point, Complete reliability,
>> Full-duplex communication, Stream interface, Reliable connection startup
>> and
>> Graceful connection shutdown are the services provided by__________
>>
>>
>>
>> ► IP
>>
>> ► None of the given
>>

>> * ► TCP***


>>
>> ► UDP
>>
>>
>>
>> Question No: 11 ( Marks: 1 ) - Please choose one
>>
>> _______ protocols of TCP/IP layering model specify how to ensure reliable
>> transfer.
>>
>> ► Physical Layer
>>
>> ► Network Interface Layer
>>
>> ► Internet Layer
>>

>> ► *Transport Layer*


>>
>>
>>
>> Question No: 12 ( Marks: 1 ) - Please choose one
>>

>> ________identifies which application program on receiving computer should
>> receive the data
>>
>>
>>
>> ► Logical address
>>
>> ► Source port
>>

>> ► *Destination Port*


>>
>> ► None of the given
>>
>>
>>
>> Question No: 13 ( Marks: 1 ) - Please choose one
>>
>> ________ identifies the application program that sent the data.
>>
>>
>>
>> ► Destination Port
>>

>> ► *Source port*


>>
>> ► Logical address
>>
>> ► None of the given
>>
>>
>>
>> Question No: 14 ( Marks: 1 ) - Please choose one
>>

>> Which of the following are interior routing protocols?
>>
>>
>>
>> ► RIP
>>
>> ► OSPF
>>
>> ► BGP
>>

>> *► **RIP and OSPF***


>>
>>
>>
>> Question No: 15 ( Marks: 1 ) - Please choose one
>>

>> The Border Gateway Protocol (BGP) uses_________ for all communication
>>
>>
>>
>> ► UDP
>>

>> * ► TCP***


>>
>> ► Both UDP and TCP
>>
>> ► None of the given
>>
>>
>>
>> Question No: 16 ( Marks: 1 ) - Please choose one
>>
>> __________measures distance in network hops, where each network between
>> the
>> source and destination counts as single hop.
>>
>>
>>
>> ► BGP
>>
>> ► OSPF
>>

>> *► RIP***


>>
>> ► None of the given
>>
>>
>>
>> Question No: 17 ( Marks: 1 ) - Please choose one
>>

>> OSPF is based on--------
>>
>>
>>
>> ► Distance vector routing
>>

>> *► Link state routing***


>>
>> ► Path vector routing
>>
>> ► Distance vector routing and Link state routing
>>
>>
>>
>> Question No: 18 ( Marks: 1 ) - Please choose one
>>

>> _________ performs local multicast and uses IP-in-IP encapsulation to send
>> multicast datagrams from one site on the Internet to another.
>>
>>
>>

>> * ► Distance Vector Multicast Routing Protocol (DVMRP)***
>>
>> ► Core Based Trees (CBT)
>>
>> ► Protocol Independent Multicast_ *Sparse Mode (PIM-SM)*
>>
>> ► Protocol Independent Multicast _ *Dense Mode (PIM-DM)***


>>
>>
>>
>> Question No: 19 ( Marks: 1 ) - Please choose one
>>
>> The length of time required to send a variable length packet is variable
>> and does not require a complicated interrupt scheme to detect completion
>> of
>> transmission.
>>
>>
>>
>> ► True
>>

>> * ► False***


>>
>>
>> Question No: 20 ( Marks: 1 ) - Please choose one
>>

>> NEXT HEADER field in the base header defines type of header and it appears
>> at end of fixed-size base header.
>>
>>
>>

>> * ► True***


>>
>> ► False
>>
>>
>>
>> Question No: 21 ( Marks: 1 ) - Please choose one
>>

>> Although message exchange can be used to bind addresses, sending a request
>> for each binding is hopelessly inefficient.
>>
>>
>>

>> * ► True***


>>
>> ► False
>>
>>
>>
>> Question No: 22 ( Marks: 1 ) - Please choose one
>>
>> Address mask defines how many bits of address are in suffix?
>>
>>
>>
>> ► True
>>

>> * ► False***


>>
>>
>>
>> Question No: 23 ( Marks: 1 ) - Please choose one
>>
>> A computer attached to a given network can only communicate with other
>> computers attached to the same network. Is this a problem with multiple
>> networks?
>>

>> * ► True***


>>
>> ► False
>>
>>
>>
>> Question No: 24 ( Marks: 1 ) - Please choose one
>>

>> In the 1970s large organizations began to acquire multiple networks. Each
>> network in the organization formed island. Employees needed to choose a
>> computer appropriate for each task. So they needed multiple screens,
>> keyboards and computers.
>>
>>
>>
>> ► False
>>

>> *► True***


>>
>>
>>
>> Question No: 25 ( Marks: 1 ) - Please choose one
>>

>> The term self-identifying is used for Classful IP addresses because the
>> class of the address can be computed from the address__________.
>>

>> * ► itself***


>>
>> ► prefix
>>
>> ► suffix
>>
>> ► mask
>>
>>
>>
>> Question No: 26 ( Marks: 1 ) - Please choose one
>>

>> In which method of Address Resolution Protocol the protocol address
>> independent of hardware address?
>>

>> *Were "T" stands for Table lookup, "C" for Closed-form Computation and "D"
>> for Data Exchange?*
>>
>> ► T, C
>>
>> ► D
>>
>> ► C
>>
>> * ► T, D***


>>
>>
>>
>> Question No: 27 ( Marks: 1 ) - Please choose one
>>

>> In which method of Address Resolution Protocol the protocol address is
>> determined by hardware address?
>>

>> *Were "T" stands for Table lookup, "C" for Closed-form Computation and "D"
>> for Data Exchange?*
>>
>> ► T
>>
>> ► D
>>
>> * ► C***


>>
>> ► T, C
>>
>>
>>
>> Question No: 28 ( Marks: 1 ) - Please choose one
>>

>> Reconstruction of original datagram is called reassembly.
>>
>>
>>

>> * ► True***


>>
>> ► False
>>
>>
>>
>> Question No: 29 ( Marks: 1 ) - Please choose one
>>

>> A computer needs a complete stack of protocols to run either a client or a
>> server.
>>
>>
>>

>> * ► True***


>>
>> ► False
>>
>>
>>
>> Question No: 30 ( Marks: 1 ) - Please choose one
>>

>> TCP uses _______ mechanism to control the flow of data.
>>
>>
>>
>> ► door
>>

>> * ► window***

R@ïñßøwßrïgh±

unread,
Feb 9, 2011, 1:12:52 PM2/9/11
to vu...@googlegroups.com

FINALTERM  EXAMINATION

Fall 2008

CS610- Computer Network

Ref No: 325806

Time: 120 min

Marks: 70

 

Question No: 1      ( Marks: 1 ) - Please choose one

Computer networks are often called -------------- because they use packet technology.

 

       ► Ethernet

       ► Switch networks

        Packet networks

       ► None of the given

 

 Question No: 2      ( Marks: 1 ) - Please choose one

A network uses a ------arranges for computers to be connected in a closed loop.

 

       ► Star Topology

       ► Ring Topology

       ► Bus Topology

       ► None of the given

 

Question No: 3      ( Marks: 1 ) - Please choose one

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

 

       ► Explicit frame type

        ► Ideal frame type

        ► Implicit frame type

        ► None of the given

 

Question No: 4      ( Marks: 1 ) - Please choose one

An interface for thin Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.

 

       ► RJ-45, 10 Base T 

        ► RJ-45, 10 Base 5

        ► BNC, 10 Base 2

        ► BNC, 10 Base T

 

Question No: 5      ( Marks: 1 ) - Please choose one

A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_________

 

       ► Layer 2 source address

       ► Source node’s physical address

       ► Layer 2 destination address    

       ► Layer 3 destination address

 

 Question No: 6      ( Marks: 1 ) - Please choose one

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________

 

        ► Hierarchal address

        ► Default route

        ► Shortest path

        ► None of the given

 

Question No: 7      ( Marks: 1 ) - Please choose one

________ of TCP/IP layering model, corresponds to basic network hardware.

 

       ► Physical Layer

       ► Network Interface Layer

       ► Internet Layer

        Transport Layer

 

Question No: 8      ( Marks: 1 ) - Please choose one

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

 

       ► Physical Layer

       ► Network Interface Layer

       ► Internet Layer

       ► Transport Layer

 

Question No: 9      ( Marks: 1 ) - Please choose one

________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.

 

       ► IP

       ► UDP

       ► TCP

       ► None of the given

 

Question No: 10      ( Marks: 1 ) - Please choose one

____________ uses distance vector approach to define routing

 

      ► BGP

      ► OSPF

      ► RIP

      ► None of the given

 

Question No: 11      ( Marks: 1 ) - Please choose one

_______    is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

 

       ► Flood-and -Prune

       ► Configuration-and -Tunneling

       ► Core-Based Discovery

       ► None of the given


Question No: 12      ( Marks: 1 ) - Please choose one

Router that decrements TTL to __ sends ICMP time exceeded message, with router’s address as source address

 

       ► 3

       ► 2

       ► 1

       ► 0

 

Question No: 13      ( Marks: 1 ) - Please choose one

Protocol addresses are abstractions provided by ___________.

 

       ► hardware

       ► software

       ► operating system

       ► internet

 

Question No: 14      ( Marks: 1 ) - Please choose one

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

 

       ► True

       ► False

 

  Question No: 15      ( Marks: 1 ) - Please choose one

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

 

       ► 32, 48

       ► 24, 32

       ► 32, 64

       ► 32, 128

 

Question No: 16      ( Marks: 1 ) - Please choose one

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.

 

        ► False

        ► True

 

Question No: 17      ( Marks: 1 ) - Please choose one

In which method of Address Resolution Protocol the protocol address is determined by hardware address?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?


Features

 

Types of

Resolution

Use full with any hardware

T

Address change affects all hosts

T

Protocol address is determined by hardware address

C

       ► T

       ► D

       ► C

       ► T, C

 

 

 

 

 

Question No: 18      ( Marks: 1 ) - Please choose one

 

The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.

       ► True

       ► False

 

Question No: 19      ( Marks: 1 ) - Please choose one

To save traffic, an EGP does not summarize routing information from the autonomous system before passing it to another autonomous system.

       ► True

       ► False

 

Question No: 20      ( Marks: 1 ) - Please choose one

Which of the following is a correct representation of the IPv6?

       ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255 

       ► 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255 

       ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256

       ► 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

Zubair Hussain

unread,
Feb 10, 2011, 5:55:33 AM2/10/11
to vu...@googlegroups.com, dngd...@gmail.com
Thanks, once again all are correct 

Regards

Zubair Hussain
www.vuzs.net



--

R@ïñßøwßrïgh±

unread,
Feb 10, 2011, 2:02:54 PM2/10/11
to vu...@googlegroups.com

 

Computer Networks (CS610)

 

________ of TCP/IP layering model, corresponds to basic network hardware.

·                     Physical Layer

·                     Network Interface Layer

·                     Internet Layer

·                     Transport Layer

 

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

·                     Physical Layer

·                     Network Interface Layer

·                     Internet Layer

·                     Transport Layer

 

________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.

·                     IP

·                     UDP

·                     TCP

·                     None of the given

 

____________ uses distance vector approach to define routing

·                     BGP

·                     OSPF

·                     RIP

·                     None of the given

 

_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

·                     Flood-and -Prune

·                     Configuration-and -Tunneling

·                     Core-Based Discovery

·                     None of the given

 

Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source address

·                     3

·                     2

·                     1

·                     0

 

Protocol addresses are abstractions provided by ___________.

·                     hardware

·                     software

·                     operating system

·                     internet

 

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

·                     True

·                     False

 

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

·                     32, 48

·                     24, 32

·                     32, 64

·                     32, 128

 

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.

·                     False

·                     True

 

In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T

·                     D

·                     C

·                     T, C

 

Which method of Address Resolution Protocol is useful with any hardware?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T

·                     C

·                     D

·                     C, D

 

In which method of Address Resolution Protocol the implimentation is more difficult?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T, C

·                     T

·                     C

·                     D

 

Which method of Address Resolution Protocol resolution with minimum delay?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T, D

·                     c

·                     T

·                     T, C

 

The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.

·                     True

·                     False

 

To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.

·                     True

·                     False

 

------------- was especially concerned about the lack of high powered computers.

·                     IEEE

·                     APRA (wrong spelling)

·                     EIA

·                     None

 

Missing eot indicates sending computer crashed in frame format.

·                     True

·                     False

 

The -------------term refers to the general concept of a small block of data.

·                     Packets

·                     Data

·                     Frame

·                     None of given

 

CRC can detect more errors than a simple checksum.

·                     True

·                     False

 

The network that uses a -------------, usually consist of a single long cable to which computer attach.

·                     Star topology

·                     Bus topology

·                     Ring topology

·                     None of the given

 

LAN that use ATM technology have a -------------

·                     Star topology

·                     Bus topology

·                     Ring topology

·                     None of the given

 

A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame.

·                     Source address, destination address.

·                     Destination adress, destination address.

·                     Destination adress, source address.

·                     source adress, source address.

 

--------------- has a jitter zero

·                     Virtual Private Network

·                     Isochronous Network

·                     Asynchronous Network

·                     None of the given

 

The network with Throughput T and Delay D has a total --------------- bits in transit at a time.

·                     D + T

·                     D – T

·                     D X T

·                     D / T

 

One repeater ---------------, two repeaters --------------- the maximum cable length limitation.

·                     Double, triple

·                     Double, 4 time

·                     half, triple

·                     Double, half

 

End-to-end delivery service is connection oriented.

·                     True

·                     False

 

A single networking technology is best for all needs.

·                     True

·                     False

 

Twice NAT allows a site to run servers. 

·                     True

·                     False

 

________ device is used for multicasting. 

·                     Hub

·                     Switch

·                     Router

·                     none of the given

 

___________ does not depend on any particular unicast routing protocol. 

·                     PIM-DM

·                     PIM-SM

·                     PIM-AM

·                     none of the given

 

A routing table contains_______ 

·                     The destination network ID

·                     The hop count to reach the network

·                     The router ID of the next hop

·                     All of the given

 

_______ can be used to propagate information about remote networks. 

·                     Dynamic routing

·                     Static routing

·                     Address resolution

·                     None of the given

 

________ protocol is designed to use within an organization. 

·                     OSPF

·                     MEOSPF

·                     MOSPF

·                     none of the given

 

NAPT stands for ________________ 

·                     Network Address and Protocol Translation

·                     Network Address and Port Translation

·                     Network Address and Packet Translation

·                     None of the given

 

In dynamic routing, the routing table is initialized when system boots. 

·                     True

·                     False

 

OSPF includes ________ address mask with each address. 

·                     30Bit

·                     32Bit

·                     34Bit

·                     none of the given

 

Twice NAT fails if an application uses the IP addresses instead of Domain Name. 

·                     True

·                     False

 

_________ uses window mechanism to control the flow of data. 

·                     IP

·                     UDP

·                     TCP

·                     none of the given

 

TCP uses _______ mechanism to control the flow of data.

·                     door

·                     window

·                     acknowledgment

·                     retransmission

 

IGPs stand for _________ 

·                     Internal Gateway Protocols 

·                     Interior Gateway Protocols

·                     Intermediate Gateway Protocols 

·                     None of the given

 

________ protocol uses distance vector algorithm. 

·                     IGP

·                     BGP

·                     RIP

·                     none of the given

 

__________measures distance in network hops, where each network between the source and destination counts as single hop. 

·                     BGP

·                     OSPF

·                     RIP

·                     Non of these

 

Network Address Translation (NAT) requires device to perform packet translation. 

·                     True

·                     False

 

We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

·                     routing path

·                     routing metric

·                     routing

·                     switching

 

Which of the following is a correct representation of the IPv6?

·                     105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

·                     105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255

·                     105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256

·                     105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

 

Part of the 3-way handshake used to create a connection, requires each end to generate a random _____ sequence number.

·                     32 bit

·                     16 bit

·                     8 bit

·                     64 bit

 

Reconstruction of original datagram is called reassembly.

·                     True

·                     False

 

Reliability is the responsibility of the ______ layer.

·                     Transport

·                     Network

·                     Physical

·                     Internet

 

_______    is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

·                     Flood-and -Prune

·                     Configuration-and -Tunneling

·                     Core-Based Discovery

·                     None of the given

 

In Direct point to point communication adding the Nth computer requires------------ new connections.

·                     None of the given

·                     N2

·                     N-1

·                     (N2 –N)/2

 

The number of connections needed for N computer in direct point to point communication is equal to:

·                     (N2-N)/2

·                     N(N-1)

·                     N2

·                     None of the given

 

Hardware that calculates a CRC uses two simple components.

·                     AND unit and XOR unit

·                     Shift register and XOR unit

·                     Shift register and AND unit

·                     None of the given

 

The Gigabit Ethernet hardware operates at a rate of --------

·                     10 Mbps

·                     100 Mbps

·                     1000 Mbps

·                     None of the given

 

________ computes shortest paths in a graph by using weights on edges as a measure of distance.

·                     Greedy algorithm

·                     Distance vector algorithm

·                     Dijksta’s algorithm

·                     Non of the given

 

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

·                     Connectionless service paradigm

·                     Connection-oriented service paradigm

·                     Both Connectionless and Connection-oriented service paradigm

·                     None of the given

 

An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host

·                     48-bit

·                     32-bit

·                     24-bit

·                     None of the given

 

The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.

·                     prefix , suffix

·                     suffix , prefix

·                     suffix , suffix

·                     None of the given

 

___________ places the boundary between the first and second octets

·                     Class A

·                     Class B

·                     Class C

·                     Class D

 

___________ places the boundary between the second and third octets.

·                     Class A

·                     Class B

·                     Class C

·                     Class D

 

___________ places the boundary between the third and fourth octets.

·                     Class A

·                     Class B

·                     Class C

·                     Class D

 

________ field of header indicates whether a datagram is a fragment or a complete datagram.

·                     FLAGS

·                     FLAGMENT OFFSET

·                     IDENTIFICATION

·                     None of the given

 

______ provides connectionless service.

·                     TCP

·                     UDP

·                     IP

·                     None of the given

 

UDP and TCP are both_________ layer protocols

·                     Physical

·                     Data link

·                     Network

·                     Transport

 

________identifies which application program on receiving computer should receive the data

Logical address

·                     Source port

·                     Source port

·                     Destination Port

·                     None of the given

 

________ identifies the application program that sent the data.

·                     Destination Port

·                     Source port

·                     Logical address

·                     None of the given

 

The Border Gateway Protocol (BGP) uses_________ for all communication

·                     UDP

·                     TCP

·                     Both UDP and TCP

·                     None of the given

 

Which of the following protocols allows the sender and receiver to enforce polices.

·                     RIP

·                     OSPF

·                     BGP

·                     RIP and OSPF

 

ICMP message transport is acted upon by getting ICMP encrypted in IP.

·                     True

·                     False

 

These ICMP message transport is acted upon ________ as frames on ______

·                     Intranet, LAN

·                     Internet, WAN

·                     Intranet, WAN

·                     Internet, LAN

 

Address mask defines how many bits of address are in suffix?

·                     True

·                     False

 

A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?

·                     True

·                     False

 

The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.

·                     itself

·                     prefix

·                     suffix

·                     mask

 

Find the class of the address:

11110011 10011011 11111011 00001111

·                     A

·                     C

·                     E

·                     B

 

Find the class of the address.

10100111 11011011 10001011 01101111

·                     A

·                     B

·                     E

·                     C

 

On of the design goals for unicast route propagation is __________.

·                     consistency

·                     inconsistency

·                     stability

·                     dynamic addressing

 

Propagation multicast routing information differs dramatically from unicast route propagation?

·                     True

·                     False

 

The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.

·                     one or more (????)

·                     only one

·                     no

·                     many

 

In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.

·                     Anycast

·                     Unicast

·                     Multicast

·                     Non of the given

 

Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.

·                     Unicast

·                     Anycast

·                     Multicast

·                     Non of the given

 

UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.

·                     True

·                     False

 

The time for acknowledgement to arrival of packet depends on.

·                     Distance to destination and Current traffic conditions

·                     Current traffic conditions

·                     Distance to destination

·                     non of these

 

Cost, effort, risks, and resources are the factors included in--------

·                     Estimation

·                     Testing

·                     Development

·                     Maintenance

 

 

Final Quizs

 

 

There are _______ possibilities to detect the destination using Trace-route 

·                     1 

·                     2

·                     3 

·                     None of the given 

 

 _______ is used for single destination computer. 

·                     Multicast

·                     Broadcast

·                     unicast

·                     none of the given

·                      

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address. 

·                     16-bit

·                     48-bit

·                     64-bit

·                     128-bit

 

Which is not the type of error messages defined by ICMP. 

·                     Source quench

·                     Time exceeded

·                     Destination unreachable

·                     none of the given

 

End to End delivery Service of IP datagram is _____ 

·                     Connection oriented

·                     Connectionless

·                     both a and b

·                     none of the given

 

________ is a type of address used for collection of computers with same prefix. 

·                     Cluster

·                     unicast

·                     Multicast

·                     none of the given

IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram’s larger than network 

·                     Destination

·                     Intermediate routers

·                     Source

·                     Medium

 

_______ Source is responsible for fragmentation. 

·                     IPV4

·                     IPV6

 

________ message is sent in response to incoming datagrams with problems. 

·                     TCP/IP 

·                     IGMP

·                     ICMP

·                     none of the given

 

 ________ field is used to identify a specific path through the network 

·                     FLOW LABEL

·                     TRAFFIC CLASS

·                     Both a and b

·                     none of the given

 

Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction & operating system independent are the characteristics of ___________________

·                     TCP

·                     UDP

·                     IP

·                     None of the given

 

The process of using a routing table to select a next hop for a given datagram is called __________.

·                     Encapsulation

·                     Reassembling

·                     Routing or forwarding

·                     None of the given

 

A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called __________

·                     Distance Vector Multicast Routing Protocol (DVMRP)

·                     Core Based Tree (CBT)

·                     Protocol Independent Multicast_Sparse Mode (PIM-SM)

·                     Protocol Independent Multicast_Dense Mode (PIM-DM)

 

Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.

·                     postfix, Infix

·                     non of these

·                     Infix, prefix

·                     prefix, suffix

 

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________

·                     None of the given

·                     TCP

·                     UDP

·                     IP

 

_____ Protocol provides error reporting mechanism.

·                     IGMP

·                     SNMP

·                     ICMP

·                     none of the given

 

________ encapsulates IP datagram as data area in hardware frame.

·                     Network Interface Layer

·                     Datalink Layer

·                     Network Layer

·                     None of the given

 

TTL stands for __________

·                     Time to Learn

·                     Time to Leave

·                     Time to Live

·                     none of the given

 

______ layer Provides reliable delivery of datagram.

·                     Network

·                     Transport

·                     Datalink

·                     none of the given

 

Which protocol is used to test different tools.

·                     ICMP

·                     IGMP

·                     TCP/IP

·                     none of the given

 

Routers use _______ to forward datagrams along prearranged path.

·                     Traffic class

·                     Flow label

·                     Destination address

·                     none of the given

 

NEXT HEADER field in the base header defines type of header it appears at the end of fixed-size base header.

·                     TRUE

·                     FALSE

 

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.

·                     Least

·                     Maximum

·                     Fragment

·                     Frame

 

Postfix defines how much of address used to identify network.

·                     TRUE

·                     FALSE

 

______ contains all information needed to deliver datagram to the destination.

·                     Header

 

The Source can configure outgoing datagram’s to avoid _________

·                     Segmentation

·                     Defragmentation

·                     Fragmentation

·                     None of the given

 

The Current version of IP-Version 4 is _____ old

·                     18 years

·                     20 years

·                     22 years

·                     none of given

 

The Header format of IPv6 is entirely different.

·                     TRUE

·                     FALSE

 

_______ shows senders preference for low latency, high Reliability.

·                     TYPE

·                     SERVICE TYPE

·                     SERVICE PRIORITY

·                     None of the given

 

The Network Layer Protocol ICMP stands for____________

·                     Instant Control Message Protocol

·                     Internet Control Message Protocol

·                     Initial Control Message Protocol

·                     None of the given

 

IPV6 address consists of ________

·                     32 Bits

·                     64 Bits

·                     128 Bits

·                     none of the given

 

_______ is a technique used to Limit datagram size to small MTU of any network

·                     Segmentation

·                     Fragmentation

·                     Encapsulation

·                     none of the given

 

ICMP message transport is acted upon by getting ICMP _________ in IP.

·                     De-encapsulated

·                     Encapsulated

·                     Segmented

·                     none of the given

 

IETF stands for _____________ 

·                     Internet Engineering Task Force

·                     Internal Efficient Task Force

·                     Internet Engineering Technical Force

·                     none of the given

 

Which of the following protocols provide the routing information at the autonomous system level? 

·                     BGP

·                     OSPF

·                     RIP

·                     OSPF and RIP

 

A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication. 

·                     Unicast

·                     Multicast

·                     Broadcast

·                     Unicast & Multicast

 

_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted. 

·                     RIP

·                     OSPF

·                     BGP

·                     None of the given

 

In TCP when a computer sends a segment, the__________ and _______ fields refer to incoming data. 

·                     ACKNOWLEGE NUMBER, WINDOW

·                     SEQUENCE NUMBER, WINDOW

·                     ACKNOWLGEGE NUMBER, SEQUENCE NUMBER

·                     None of the given

 

 _________ is used to attach two autonomous systems.

·                     BGP

·                     IGP

·                     EGP

·                     none of the given

 

Routing inserts or changes values in _______

·                     MAC address

·                     routing table

·                     both (a) and (b)

·                     None of the given

 

NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.

·                     True

·                     False

 

Each autonomous system used to communicate among autonomous systems by chooses an IGP.

·                     True

·                     False

 

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.

·                     True

·                     False

 

The computer uses _________ to inform Local router about the last application when it leaves.

·                     ICMP

·                     IGMP

·                     SNMP

·                     None of the given

 

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

·                     96

·                     100

·                     120

·                     none of the given

 

For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.

·                     Efficiency

·                     Security

·                     Accuracy

·                     Anomalies

 

Class A mask is 255.0.0.0 which is used for ______

·                     Unicasting

·                     Multicasting

·                     Subnetting

·                     All of the given

 

When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.

·                     True

·                     False

 

Which one of these is not a main feature of connectionless service:

·                     It includes extension of LAN abstraction.

·                     It has universal addressing and the data is delivered in packets frames), each with a header.

·                     It combines collection of physical networks into a single virtual network.

·                     It has universal addressing and the data is delivered in packets frames), without a header.

 

Which one is NOT the function of ping program?

·                     Traceability

·                     Reach ability

·                     Both a and b

·                     None of the given

 

A datagram cannot be larger than ________ of a network over which it is sent.

·                     MTU

·                     Size

·                     IP header

·                     None of the given

 

MTU Stands for _______

·                     Minimum transmission unit

·                     Maximum transmission unit

·                     Multicast transmission unit

·                     None of the given

 

Fragmentation when using ICMP for path MTU should be avoided.

·                     True

·                     False

 

HEADER LEN field gives size of extention header.

·                     False

·                     True

 

The process of learning the path MTU is known as path MTU discovery.

·                     True

·                     False

 

________ is less complex and easy to understand.

·                     TCP

·                     UDP

·                     IP

·                     None of the given

 

IPV6 128 bits address includes network prefix and ________

·                     Host sufix

·                     Host prefix

·                     source Prefix

·                     None of the given

 

The Universal Datagram is not an end-to-end protocol.

·                     True

·                     False

 

 

MID Term Papers

 

Ethernet uses a ____________ static addressing scheme in which each device is assigned a unique address by the manufacturer.

·                     64

·                     48

·                     32

·                     8

 

The --------- bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and 0s that allow the receiver’s hardware to synchronize with the incoming signal.

·                     64

·                     32

·                     16

·                     8

 

The third field of the header consists of ------ bit Ethernet frame type.

·                     48

·                     32

·                     16

·                     8

 

An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals according to the_____________ specification.

 

·                     BNC- t base 10

·                     RJ 45- t base 10

·                     BNC-t base 5

·                     RJ 45-t base 2

 

A bridge uses the ___________ to determine which computers connect to which segment, and uses the __________ to determine whether to forward a copy of frame.

 

·                     Source , destination

·                     Source , source

·                     Destination, source

·                     None from above

 

Formally named __________ informally known as the thick wire Ethernet or Thick net.

·                     10 Base 2

·                     10 Base 5

·                     10 Base T

·                     None of the given

 

Formally named --------------- informally known as thin wire Ethernet or thin net.

·                     10 Base 2

·                     10 Base 5

·                     10 Base T

·                     None of the given

 

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

·                     10 Base 2

·                     10 Base 5

·                     10 Base T

·                     None of the given

 

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.

·                     DMA(Direct Memory Access)

·                     Multiplexer

·                     Transceiver

·                     None of the given

 

A system with redundant bridges might have a problem with_______ in the system.

·                     Loop

·                     Filters

·                     Spamming

·                     All above

 

A Bridge can ________

·                     Filter a frame

·                     Forward a frame

·                     Extend a LAN

·                     Do all the above

 

________ has a jitter zero

  • None of the given
  • Virtual Private Network
  • Isochronous Network
  • Asynchronous Network

 

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .

  • Connectionless service paradigm
  • Connection oriented service paradigm
  • Both Connectionless and Connection-oriented service paradigm
  • None of the given

 

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

·                     21-bit

·                     22-bit

·                     23-bit

·                     24-bit

 

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________

·                     Hierarchal address

·                     Default route

·                     Shortest path

·                     None of the given

 

The next hop to which a packet is sent depends only on

·                     Packet’s destination

·                     Packet’s original source

·                     Path the packet has taken

·                     Non of the given

 

When an application--------------- data, it makes a copy of the data available to all other computers on the network?

·                     Broadcasting

·                     Multicasting

·                     Unicasting

·                     None of the given

 

A ----------  provide a mechanism that a customer can use to set a physical  address.

·                     Static addressing scheme

·                     Configurable addressing scheme

·                     Dynamic addressing scheme

·                     None of the given

 

_____________ sense a signal on one cable and then transmits an amplified copy on the other cable.

·                     Repeater

·                     Bridge

·                     Hub

·                     None of the given

 

The maximum size of an Ethernet segment is___________

·                     250 meters

·                     500 meters

·                     700 meters

·                     None of the given

 

FDDI can transmits data at a rate of -----

·                     1000 million bits per second

·                     100 million bits per second

·                     10 million bits per second

·                     None of the given

 

Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.

·                     CSMA/CD

·                     CSMA/CA

·                     TOKEN PASSING

·                     None of the given

 

-------------- have advantages arisen from the size and ease of computation.

·                     CRC

·                     Parity

·                     Checksums

·                     None of given

 

The term -------- is used to denote the definition of a packet used with a specific type of network.

·                     Packet

·                     Frame

·                     Data

·                     None of the given

 

------ has no way to determine the cause of the problem.

·                     Ping

·                     Trace route

·                     ICMP

·                     Non of the given

 

In -------------, network occupies the smaller area like a room a floor or a building

·                     LAN

·                     WAN

·                     MAN

·                     None of the given

 

In ---------, network occupies larger areas like cities & countries.

·                     LAN

·                     WAN

·                     MAN

·                     None of the given

 

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

·                     False

·                     True

 

A typical port on an ATM switch operates at __________ or higher.

·                     OC-2 speed (155Mbps)

·                     OC-3 speed (100Mbps)

·                     OC-3 speed (155Mbps)

·                     OC-3 speed (155Gbps)

 

The product of delay and throughput measures the _____ of data that can be present on the network.

·                     Area

·                     Volume

·                     Length

·                     None of the given

 

__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

·                     Constant Bit Rate (CBR) service

·                     Variable Bit Rate (VBR) service

·                     Available Bit Rate (ABR) service

·                     None of the given

 

Which of the following is a connecting device?

·                     Bridge

·                     Repeater

·                     Hub

·                     All the given

 

A bridges function in the _________ layers(s).

·                     Physical (MAC)

·                     Data link

·                     Network

·                     Physical (MAC) and Data link

 

A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________

·                     Layer 2 source address

·                     Source node’s physical address

·                     Layer 2 destination address

·                     Layer 3 destination address

 

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

·                     8 octets

·                     8 bytes

·                     8 bits

·                     None of the given

 

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

·                     Explicit frame type

·                     Ideal frame type

·                     Implicit frame type

·                     None of the given

 

Local Talk is a LAN technology that employs -------------

·                     Star topology

·                     Bus topology

·                     Ring topology

·                     None of the given

 

The Fast Ethernet hardware operates at a rate of --------

·                     10 Mbps

·                     100 Mbps

·                     1000 Mbps

·                     None of the given

 

---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

·                     Parity

·                     Checksums

·                     CRC

·                     None of given

 

Computer networks are often called -------------- because they use packet technology.

·                     Ethernet

·                     Switch networks

·                     Packet networks

·                     None of the given

 

------ Program sends a message to a remote computer and reports whether the computer responds.

·                     Ping

·                     Traceroute

·                     ICMP

·                     Non of the given

 

In Point-to-Point topology there are two topologies.

·                     Tree and Ring

·                     Star and Ring

·                     Star and Tree

·                     None of  the given

 

A network uses a ------arranges for computers to be connected in a closed loop.

·                     Star Topology

·                     Ring Topology

·                     Bus Topology

·                     None of the given

 

An interface for thin Ethernet must have an ____________ connector, and must generate signals according to the_____________ specification.

Zubair Hussain

unread,
Feb 10, 2011, 4:56:50 PM2/10/11
to vu...@googlegroups.com
Thank you very much, Great effort. 

Looking at your 100 % accuracy in your all solutions in past. I assumed all are correct.

All the best for exam. 


Regards

Zubair Hussain
www.vuzs.net



--

Marina khan

unread,
Feb 11, 2011, 1:59:51 AM2/11/11
to vu...@googlegroups.com
dear R@ïñßøwßrïgh± 

really appreciated ....Good luck n keep it up!



Regards

Zubair Hussain
www.vuzs.net



<p style="text-align:justify;t



--

 

Marina khan
www.vuzs.net

Reply all
Reply to author
Forward
0 new messages