CS610 - Computer Network
Quiz #3 JAN 14, 2013
NAT device stores state information in translation table.
Select correct option:
True
False
A _____________ address-binding table is used for each physical network.
Select correct option:
new
similar
separate
old
Fragmentation when using ICMP for path MTU should be avoided.
Select correct option:
True
False
Static routing
_______ can be used to propagate information about remote networks.
Select correct option:
Dynamic routing
Static routing
Address resolution
None of the given
TCP stands for _______
Select correct option:
Transport control protocol
Transmission control protocol
The Universal Datagram Protocol is not an end-to-end protocol.
Select correct option:
True
False
For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the given
_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
FalseWhenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix
Select correct option:
True
False
which is not the type of error messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given
Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
HEADER LEN field gives size of extention header.
Select correct option:
False
True
is a ____ protocol.
Select correct option:
Point-to-Point
Multi-Point
Both (a) and (b)
None of the givenCP
NAT device stores state information in translation table.
Select correct option:
True
False
Postfix defines how much of address used to identify network.
Select correct option:
True
False
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of______ possible sizes.
Select correct option:
three
two
four
five
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________Transmission Unit.
Select correct option:Least
Maximum
Fragment
Frame
Twice NAT allows a site to run servers.
Select correct option:
True
False
The maximum segment size of TCP flow control is_________
Select correct option:
3000 octets
2000 octets
1000 octets
none of the given
In IP routing, forwarding refers to ____ transfer.
Select correct option:
packet
datagram
message
None of the given
There are _____ possibilities to detect the destination using Trace-route
Select correct option:
1
2
3
None of the given
dynamic routing, the routing table is initialized when system boots.
Select correct option:
True
False
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
Dotted decimal represents each octet in ______ and uses a dot to separate octets.
Select correct option:
binary
decimal
hexadecimal
Octal
The amount of buffer space available at any time is called the window.
Select correct option:
True
False
In IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers.
Select correct option:
12
14
16
none of the given
______ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
IPV6 address consists of ______
Select correct option:
32 Bits
64 Bits
128 Bits
none of the given
The IP class scheme does not divide the______ address space into equal size class and the classes do not contain the same number of networks.
Select correct option:
16-bit
32-bit
48-bit
64-bit
A datagram cannot be larger than ______ of a network over which it is sent.
Select correct option:
MTU
Size
IP header
None of the given
An Internet Address (IP address) is a unique ________ binary number assigned to a host and used for all communication with host
Select correct option:
48-bit
32-bit
24-bit
None of the given
IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False
Due to revolutionalization of IP-V6 the speed has increased from_____
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
_______uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the givenwindow mechanism
Mapping between a protocol address and a hardware address is called Address Resolution.
Select correct option:
True
False
UPD is operating system independent.
Select correct option:
True
False
A________ is a special-purpose computer dedicated to the task of interconnecting networks.
Select correct option:
Router
Bridge
Switch
None of the given
Network having short intervals has a large timeout and the network having large interval has short timeout.
Select correct option:
True
False_________ places the boundary between the first and second octets
Select correct option:
Class A
Class B
Class C
Class DWhenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix
Select correct option:
True
False
There are three standard implementations to improve computational efficiency: Hashing, Direct Indexing and InDirect Indexing
True
False
IPV6 128 bits address includes network prefix and ______
Select correct option:
Host Suffix
Host prefix
Source Prefix
none of the given
ICMP message transport is acted upon by getting ICMP_______ in IP.
Select correct option:
De-encapsulated
Encapsulated
Segmented
none of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.
Select correct option:
True
False
Twice NAT allows a site to run servers.
Select correct option:
True
False
Preliminary version of IP was called _________.
Select correct option:
IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False
_________ uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given
The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.
Select correct option:
True
False
Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given
________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given
The Source can configure outgoing datagram's to avoid _________
Select correct option:
Segmentation
Defragmentation
Fragmentation
None of the given
The time for acknowledgement to arrive depends on __________
Select correct option:
Distance to destination
Current traffic conditions
Both a and b
none of the given
which is not the type of error messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given
Preliminary version of IP was called _________.
Select correct option:
IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given
HEADER LEN field gives size of extention header.
Select correct option:
False
True
_______ shows senders preference for low latency, high Reliability.
Select correct option:
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False
________ field of header indicates whether a datagram is a fragment or a complete datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATIONNo.3
None of the given (not sure) Page 105
In ______________, the protocol address assigned to a computer is chosen carefully so that computer's hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.
Select correct option:
Address Resolution
Table Lookup
Message Exchange
Closed-form Computation Page 94
Postfix defines how much of address used to identify network.
Select correct option:
True
False
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGSNo.4
FRAGMENT OFFSET
IDENTIFICATION
None of the given (not sure) Page 105
H.LEN shows the header length in units of ____ Bits
Select correct option:
34
32 Page 105
30
None of the given
In Closed-form computation, the protocol address assigned to a computer is chosen carefully so
that computer's hardware address can be computed from the protocol address using basic Boolean and _________ operations.
Select correct option:
arithmetic
XOR
Shift
XNORNo.5
For _____________, information about forwarding is stored in a routing table, which is initialized atsystem initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless Page 120
both a and b
none of the given
______ contains all information needed to deliver datagram to the destination.
Select correct option:
Header
Data AreaPage No.6
Identifier
none of the given
IPV6 addresses are _____ bits.
Select correct option:
32
64
128
256
The Header format of IPv6 is entirely different.
Select correct option:
True
False
____ contains all information needed to deliver datagram to the destination.
Select correct option:
Header
Data Area
Identifier
none of the given
Which one of these is not a main feature of connectionless service:
Select correct option:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.
H.LEN shows the header length in units of __ Bits
Select correct option:
34
32
30
None of the given
____ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
Routers use _______ to forward datagrams along prearranged path.Select correct option:
Traffic class
Flow label
Destination address
none of the given
______ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given
_____ is a technique used to Limit datagram size to small MTU of any network
Select correct option:
Segmentation
Fragmentation
Encapsulation
none of the given
The Current version of IP-Version 4 is _____ oldSelect correct option:
18 years
20 years
22 years
none of given
The protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent.
Select correct option:
Encrypted
Decrypted
Translated
Non of these
Inside a computer, each address mask is stored as a __-bit value.
Select correct option:
48
64
16
32
_____ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame
IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
MTU Stands for _______
Select correct option:
Mininum transmission unit
Maximun transmission unit
Multicast transmission unit
None of the givenAs the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ______ possible sizes.
Select correct option:
three
two
four
five
End to End delivery Service of IP datagram is ___
Select correct option:
Connection oriented
Connectionless
Both a and b
None of the given
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATION
None of the given
Postfix defines how much of address used to identify network.
Select correct option:
True
False
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame
_____ shows senders preference for low latency, high Reliability.
Select correct option:
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given
IPV6 address consists of ______
Select correct option:
32 Bits
64 Bits
128 Bits
None of the given
There are two standard implementations to improve computational efficiency: Hashing and direct indexing
Select correct option:
True
False
________ field of header indicates whether a datagram is a fragment or a complete datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATION
None of the given
The Header format of IPv6 is entirely different.
Select correct option:
True
False
Inside a computer, each address mask is stored as a __-bit value.
Select correct option:
48
64
16
32
The protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent.
Select correct option:
Encrypted
Decrypted
Translated
Non of these
HEADER LEN field gives size of extension header.
Select correct option:
False
True
In ____________, the protocol address assigned to a computer is chosen carefully so that computer's hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.
Select correct option:
Address Resolution
Table Lookup
Message Exchange
Closed-form Computation
_____ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
The routers within an autonomous system use a _____________ to exchange routing information.
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
UDP datagram format is _____ bits.
Select correct option:
8
16
32
64
A routing table contains_______
Select correct option:
The destination network ID
The hop count to reach the network
The router ID of the next hop
All of the given
NAT device stores state information in translation table.
Select correct option:
True
False
TCP achieves _________ by retransmission.
Select correct option:
Efficiency
Accuracy
Reliability
none of the given
________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given
_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given
Routing refers to the _________ of routing information.
Select correct option:
transmission
propagation
communication
None of the given
______ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given
TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False
TCP is a ______ protocol.
Select correct option:
Point-to-Point
Multi-Point
Both (a) and (b)
None of the given
Routing inserts or changes values in _______
Select correct option:
MAC address
routing table
both (a) and (b)
None of the given
Network Address Translation (NAT) requires device to perform packet translation.
Select correct option:
True
False
EGPs stand for ________
Select correct option:
Exterior Gateway Protocols
External Gateway Protocols
Extra Gateway Protocols
None of the given
________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
In dynamic routing, the routing table is initialized when system boots.
Select correct option:
True
False
Fragmentation when using ICMP for path MTU should be avoided.
Select correct option:
True
False
UDP provides connection-oriented service.
Select correct option:
True
False
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet
Routing Protocol.
True
False
A routing table contains_______
The destination network ID
The hop count to reach the network
The router ID of the next hop
All of the given
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
48-bit
32-bit
24-bit
None of the given
UDP provides connection-oriented service.
Select correct option:
True
False
Network having short intervals has a large timeout and the network having large interval has short timeout.
Select correct option:
True
False
TCP is a connectionless and reliable transport protocol.
Select correct option:True
False
_______ is used for single destination computer.
Multicast
Broadcast
unicast
none of the given
_____ is a technique used to Limit datagram size to small MTU of any network
Segmentation
Fragmentation
Encapsulation
none of the given
The UDP stands for________.
Select correct option:
Universal Datagram Protocol
User Datagram Protocol
United Datagram Protocol
None of the given
In 3-way handshake TCP requires to generate a random ______ sequence number
30 bit
32 bit
34 bitnone of the given
The TCP/IP suite contains________ transport protocols
Internet Protocol and Transmission Control Protocol
Internet Protocol and user Datagram Protocol
User datagram and Transmission control Protocol
None of the given
Protocol of TCP/IP layering model specify how to ensure reliable transfer
Physical
Layer
Network Interface Layer
Internet Layer
Transport Layer
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses, ARP is almost always used to bind a 32-bit IP address to a _______ Ethernet address.
16-bits
48-bits
64-bits
128-bits
The Universal datagram Protocol is not an end-to-end protocol.
True
False
A _______ is a special-purpose computer dedicated to the task of interconnecting networsk.
Router
Bridge
Switch
None of the given
TCP provides reliable connection startup
True
False
TCP provides ____communication
Half-duplex
Full-duplex
Both (a) and (b)
None of the given
The process of using a routing table to select a next hop for a given datagram is called_______.
Select correct option:
EncapsulationReassembling
Routing or forwarding
None of the given
Question # 2 of 10 ( Start time: 01:54:12 PM ) Total Marks: 1
Basic NAT does not work well for communication initiated from the Internet. Select correct option:
True
False
Question # 3 of 10 ( Start time: 01:55:02 PM ) Total Marks: 1
In dynamic routing, the routing table is initialized when system boots. Select correct option:
True
False
The address ________ identifies the physical network to which the computer is attached, while the _____ identifies an individual computer on that network.
Select correct option:prefix , suffix
suffix , prefix
suffix , suffix
None of the given
HEADER LEN field gives size of extention header.
Select correct option:False
True
Network Address and Port Translation (NAPT) is by far the most popular form of
Select correct option:
Network Address Transmission
Network Address Translation
Network Address TransformationNone of the given
TCP uses _____ format for all messages.
Select correct option:
single
double
multiple
None of the given
There are two standard implementations to improve computational efficiency: Hashing and Direct indexing
True
False
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
____ layer Provides reliable delivery of datagram
Network
Transport
Datalinknone of the given
_____ is used for single destination computer.
Multicast
Broadcast
unicastnone of the given
IPV6 addresses are ___ bits.
Select correct option:
32
64
128
256
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False
In TCP/IP, ____ provides reliable transport service.
Select correct option:IP
TCP
Both IP and TCP
None of the given
UDP uses best-effort delivery service.
Select correct option:
True
False
IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120none of the given
Routers use _____ to forward datagrams along prearranged path. Select correct option:
Traffic class
Flow label
Destination address
none of the given
The Header format of IPv6 is entirely different.
Select correct option:True
False
________ protocols of TCP/IP layering model specify how to organize data into frame and how a computer transmits frames over a network.
Select correct option:
Physical Layer
Network Interface Layer
Internet LayerTransport Layer
IPv6 ____________ is responsible for fragmentation. Routers simply drop datagram's larger than network
Select correct option:
DestinationIntermediate routers
SourceMedium
Inside a computer, each address mask is stored as a __-bit value. Select correct option:
48
64
16
32
The Network Layer Protocol ICMP stands for____________
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False
TCP provides reliable connection startup.
Select correct option:
True
False
UPD is operating system independent.
Select correct option:
True
False
In ____________, the protocol address assigned to a computer is chosen carefully so that computer's hardware address can be computed from the protocol address using basic
Boolean and arithmetic operations.
Select correct option:Address Resolution
Table LookupMessage Exchange
Closed-form Computation
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False
The maximum segment size of TCP flow control is ___________ Select correct option:
3000 octets
2000 octets
1000 octetsnone of the given
______ of TCP/IP layering model, corresponds to basic network hardware. Select correct option:
Physical Layer
Network Interface Layer
Internet LayerTransport Layer
Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.
Select correct option:
False
True
One of the parameters, which motivated IP for change is address space. The
___________ address space allows for over a million networks. But most networks are class C and too small for many organizations.
Select correct option:
32-bit
128-bit
16-bit
64-bit
TCP is a ____ protocol.
Select correct option:
Point-to-PointMulti-Point
Both (a) and (b)
None of the given
IGPs stand for _________
Select correct option:
Internal Gateway Protocols
Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given
The Universal Datagram Protocol is not an end-to-end protocol
True
False
The TCP/IP suite contains ________ transport protocols.
Internet Protocol and Transmission Control Protocol
Internet Protocol and User Datagram Protocol
User Datagram Protocol and Transmission Control Protocol
None of the given
Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix
Select correct option:
TrueFalse
Question # 4 of 10 ( Start time: 02:33:13 PM ) Total Marks: 1 IPV6 address consists of ________
Select correct option:
32 Bits
64 Bits
128 Bitsnone of the given
____ contains all information needed to deliver datagram to the destination.
Header
Data Area
Identifiernone of the given
Fragmentation when using ICMP for path MTU should be avoided. Select correct option:
True
False
Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.
Select correct option:
False
True
_____ Source is responsible for fragmentation.
Select correct option:IPV4
IPV6
There are _____ possibilities to detect the destination using Trace-route
1
2
3None of the given
Which of the following statements is wrong regarding PVC?
PVC last as long as the customer pay the periodic fee for its uses
Forwarding tables are automatically restored after power of equipments failure.
Forwarding table entries for PVC's are dynamically configured
All of the above are wrong.
Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.
8-bit
16-bit
32-bit
64-bit
Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection
True
False
________ encapsulates IP datagram as data area in hardware frame.
Network Interface Layer
Datalink Layer
Network Layer
None of the given
Class A mask is 255.0.0.0 which is used for ______
Unicasting
Multicasting
Subnetting
All of the given
QoS specifications are of ………… types
2
3
4
5
_________ Serve Same purpose in Internet as frames on LAN
Packets
Virtual Packets
Virtual Frames
Both b and c
Which of the following statement is true
CBR is one of the types of QoS specifications
CBR is a networking technique depending on data type
CBR is used for compressed audio and video
All of the above
The term signaling is used to describe------------
Communication about the internet
Communication about the extranet
Communication about the network
None of above
VBR stands for…………….
Virtual Bit Rate
Virtual Byte Rate
Variable Byte Redundancy
Variable Bit Rate
CBR stands for…………….
Select correct option:
Constant Byte Rate
Constant Bit Rate
Connection break Recovery
None of the above
--Zindagi mein 2 Logo ka buhat khayal rahkoooo
Ist woh jiss ney tumhari jeet ke Liye buhat kuch hara hoo(Father)2nd woh jiss ko tum ney har dukh me pukaara hoo (Mother)
--Regards,Umair Saulat Mc100403250
Please visit http://vusr.net for Old and Latest Papers, Assignments, Quiz and GDBs.
http://VUSR.net The ultimate VU Study Resource
You received this message because you are subscribed to the Google
Groups "VUSR" group.
To unsubscribe
vusr+unsubscribe@googlegroups.com
To Visit Group Home Page
http://groups.google.com/group/vusr?hl=en?hl=en
--
Please visit http://vusr.net for Old and Latest Papers, Assignments, Quiz and GDBs.
http://VUSR.net The ultimate VU Study Resource
You received this message because you are subscribed to the Google
Groups "VUSR" group.
To unsubscribe
vusr+unsubscribe@googlegroups.com
To Visit Group Home Page
http://groups.google.com/group/vusr?hl=en?hl=en
No comments:
Post a Comment