Thursday, January 5, 2012

(Attock VU Group) Re: (VUStudyMasti) ...............CS610 Solved about 180 MCQs

Thanks for sharing............

On Fri, Jan 6, 2012 at 11:31 AM, Shazia <shazia277@gmail.com> wrote:

Computer Networks (CS610)

 

________ of TCP/IP layering model, corresponds to basic network hardware.

·                     Physical Layer

·                     Network Interface Layer

·                     Internet Layer

·                     Transport Layer

 

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

·                     Physical Layer

·                     Network Interface Layer

·                     Internet Layer

·                     Transport Layer

 

________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.

·                     IP

·                     UDP

·                     TCP

·                     None of the given

 

____________ uses distance vector approach to define routing

·                     BGP

·                     OSPF

·                     RIP

·                     None of the given

 

_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

·                     Flood-and -Prune

·                     Configuration-and -Tunneling

·                     Core-Based Discovery

·                     None of the given

 

Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source address

·                     3

·                     2

·                     1

·                     0

 

Protocol addresses are abstractions provided by ___________.

·                     hardware

·                     software

·                     operating system

·                     internet

 

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

·                     True

·                     False

 

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

·                     32, 48

·                     24, 32

·                     32, 64

·                     32, 128

 

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.

·                     False

·                     True

 

In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T

·                     D

·                     C

·                     T, C

 

Which method of Address Resolution Protocol is useful with any hardware?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T

·                     C

·                     D

·                     C, D

 

In which method of Address Resolution Protocol the implimentation is more difficult?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T, C

·                     T

·                     C

·                     D

 

Which method of Address Resolution Protocol resolution with minimum delay?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T, D

·                     c

·                     T

·                     T, C

 

The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.

·                     True

·                     False

 

To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.

·                     True

·                     False

 

------------- was especially concerned about the lack of high powered computers.

·                     IEEE

·                     APRA (wrong spelling)

·                     EIA

·                     None

 

Missing eot indicates sending computer crashed in frame format.

·                     True

·                     False

 

The -------------term refers to the general concept of a small block of data.

·                     Packets

·                     Data

·                     Frame

·                     None of given

 

CRC can detect more errors than a simple checksum.

·                     True

·                     False

 

The network that uses a -------------, usually consist of a single long cable to which computer attach.

·                     Star topology

·                     Bus topology

·                     Ring topology

·                     None of the given

 

LAN that use ATM technology have a -------------

·                     Star topology

·                     Bus topology

·                     Ring topology

·                     None of the given

 

A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame.

·                     Source address, destination address.

·                     Destination adress, destination address.

·                     Destination adress, source address.

·                     source adress, source address.

 

--------------- has a jitter zero

·                     Virtual Private Network

·                     Isochronous Network

·                     Asynchronous Network

·                     None of the given

 

The network with Throughput T and Delay D has a total --------------- bits in transit at a time.

·                     D + T

·                     D – T

·                     D X T

·                     D / T

 

One repeater ---------------, two repeaters --------------- the maximum cable length limitation.

·                     Double, triple

·                     Double, 4 time

·                     half, triple

·                     Double, half

 

End-to-end delivery service is connection oriented.

·                     True

·                     False

 

A single networking technology is best for all needs.

·                     True

·                     False

 

Twice NAT allows a site to run servers. 

·                     True

·                     False

 

________ device is used for multicasting. 

·                     Hub

·                     Switch

·                     Router

·                     none of the given

 

___________ does not depend on any particular unicast routing protocol. 

·                     PIM-DM

·                     PIM-SM

·                     PIM-AM

·                     none of the given

 

A routing table contains_______ 

·                     The destination network ID

·                     The hop count to reach the network

·                     The router ID of the next hop

·                     All of the given

 

_______ can be used to propagate information about remote networks. 

·                     Dynamic routing

·                     Static routing

·                     Address resolution

·                     None of the given

 

________ protocol is designed to use within an organization. 

·                     OSPF

·                     MEOSPF

·                     MOSPF

·                     none of the given

 

NAPT stands for ________________ 

·                     Network Address and Protocol Translation

·                     Network Address and Port Translation

·                     Network Address and Packet Translation

·                     None of the given

 

In dynamic routing, the routing table is initialized when system boots. 

·                     True

·                     False

 

OSPF includes ________ address mask with each address. 

·                     30Bit

·                     32Bit

·                     34Bit

·                     none of the given

 

Twice NAT fails if an application uses the IP addresses instead of Domain Name. 

·                     True

·                     False

 

_________ uses window mechanism to control the flow of data. 

·                     IP

·                     UDP

·                     TCP

·                     none of the given

 

TCP uses _______ mechanism to control the flow of data.

·                     door

·                     window

·                     acknowledgment

·                     retransmission

 

IGPs stand for _________ 

·                     Internal Gateway Protocols 

·                     Interior Gateway Protocols

·                     Intermediate Gateway Protocols 

·                     None of the given

 

________ protocol uses distance vector algorithm. 

·                     IGP

·                     BGP

·                     RIP

·                     none of the given

 

__________measures distance in network hops, where each network between the source and destination counts as single hop. 

·                     BGP

·                     OSPF

·                     RIP

·                     Non of these

 

Network Address Translation (NAT) requires device to perform packet translation. 

·                     True

·                     False

 

We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

·                     routing path

·                     routing metric

·                     routing

·                     switching

 

Which of the following is a correct representation of the IPv6?

·                     105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

·                     105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255

·                     105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256

·                     105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

 

Part of the 3-way handshake used to create a connection, requires each end to generate a random _____ sequence number.

·                     32 bit

·                     16 bit

·                     8 bit

·                     64 bit

 

Reconstruction of original datagram is called reassembly.

·                     True

·                     False

 

Reliability is the responsibility of the ______ layer.

·                     Transport

·                     Network

·                     Physical

·                     Internet

 

_______    is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

·                     Flood-and -Prune

·                     Configuration-and -Tunneling

·                     Core-Based Discovery

·                     None of the given

 

In Direct point to point communication adding the Nth computer requires------------ new connections.

·                     None of the given

·                     N2

·                     N-1

·                     (N2 –N)/2

 

The number of connections needed for N computer in direct point to point communication is equal to:

·                     (N2-N)/2

·                     N(N-1)

·                     N2

·                     None of the given

 

Hardware that calculates a CRC uses two simple components.

·                     AND unit and XOR unit

·                     Shift register and XOR unit

·                     Shift register and AND unit

·                     None of the given

 

The Gigabit Ethernet hardware operates at a rate of --------

·                     10 Mbps

·                     100 Mbps

·                     1000 Mbps

·                     None of the given

 

________ computes shortest paths in a graph by using weights on edges as a measure of distance.

·                     Greedy algorithm

·                     Distance vector algorithm

·                     Dijksta's algorithm

·                     Non of the given

 

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

·                     Connectionless service paradigm

·                     Connection-oriented service paradigm

·                     Both Connectionless and Connection-oriented service paradigm

·                     None of the given

 

An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host

·                     48-bit

·                     32-bit

·                     24-bit

·                     None of the given

 

The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.

·                     prefix , suffix

·                     suffix , prefix

·                     suffix , suffix

·                     None of the given

 

___________ places the boundary between the first and second octets

·                     Class A

·                     Class B

·                     Class C

·                     Class D

 

___________ places the boundary between the second and third octets.

·                     Class A

·                     Class B

·                     Class C

·                     Class D

 

___________ places the boundary between the third and fourth octets.

·                     Class A

·                     Class B

·                     Class C

·                     Class D

 

________ field of header indicates whether a datagram is a fragment or a complete datagram.

·                     FLAGS

·                     FLAGMENT OFFSET

·                     IDENTIFICATION

·                     None of the given

 

______ provides connectionless service.

·                     TCP

·                     UDP

·                     IP

·                     None of the given

 

UDP and TCP are both_________ layer protocols

·                     Physical

·                     Data link

·                     Network

·                     Transport

 

________identifies which application program on receiving computer should receive the data

Logical address

·                     Source port

·                     Source port

·                     Destination Port

·                     None of the given

 

________ identifies the application program that sent the data.

·                     Destination Port

·                     Source port

·                     Logical address

·                     None of the given

 

The Border Gateway Protocol (BGP) uses_________ for all communication

·                     UDP

·                     TCP

·                     Both UDP and TCP

·                     None of the given

 

Which of the following protocols allows the sender and receiver to enforce polices.

·                     RIP

·                     OSPF

·                     BGP

·                     RIP and OSPF

 

ICMP message transport is acted upon by getting ICMP encrypted in IP.

·                     True

·                     False

 

These ICMP message transport is acted upon ________ as frames on ______

·                     Intranet, LAN

·                     Internet, WAN

·                     Intranet, WAN

·                     Internet, LAN

 

Address mask defines how many bits of address are in suffix?

·                     True

·                     False

 

A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?

·                     True

·                     False

 

The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.

·                     itself

·                     prefix

·                     suffix

·                     mask

 

Find the class of the address:

11110011 10011011 11111011 00001111

·                     A

·                     C

·                     E

·                     B

 

Find the class of the address.

10100111 11011011 10001011 01101111

·                     A

·                     B

·                     E

·                     C

 

On of the design goals for unicast route propagation is __________.

·                     consistency

·                     inconsistency

·                     stability

·                     dynamic addressing

 

Propagation multicast routing information differs dramatically from unicast route propagation?

·                     True

·                     False

 

The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.

·                     one or more (????)

·                     only one

·                     no

·                     many

 

In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.

·                     Anycast

·                     Unicast

·                     Multicast

·                     Non of the given

 

Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.

·                     Unicast

·                     Anycast

·                     Multicast

·                     Non of the given

 

UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.

·                     True

·                     False

 

The time for acknowledgement to arrival of packet depends on.

·                     Distance to destination and Current traffic conditions

·                     Current traffic conditions

·                     Distance to destination

·                     non of these

 

Cost, effort, risks, and resources are the factors included in--------

·                     Estimation

·                     Testing

·                     Development

·                     Maintenance

 

 

Final Quizs

 

 

There are _______ possibilities to detect the destination using Trace-route 

·                     1 

·                     2

·                     3 

·                     None of the given 

 

 _______ is used for single destination computer. 

·                     Multicast

·                     Broadcast

·                     unicast

·                     none of the given

·                      

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address. 

·                     16-bit

·                     48-bit

·                     64-bit

·                     128-bit

 

Which is not the type of error messages defined by ICMP. 

·                     Source quench

·                     Time exceeded

·                     Destination unreachable

·                     none of the given

 

End to End delivery Service of IP datagram is _____ 

·                     Connection oriented

·                     Connectionless

·                     both a and b

·                     none of the given

 

________ is a type of address used for collection of computers with same prefix. 

·                     Cluster

·                     unicast

·                     Multicast

·                     none of the given

IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram's larger than network 

·                     Destination

·                     Intermediate routers

·                     Source

·                     Medium

 

_______ Source is responsible for fragmentation. 

·                     IPV4

·                     IPV6

 

________ message is sent in response to incoming datagrams with problems. 

·                     TCP/IP 

·                     IGMP

·                     ICMP

·                     none of the given

 

 ________ field is used to identify a specific path through the network 

·                     FLOW LABEL

·                     TRAFFIC CLASS

·                     Both a and b

·                     none of the given

 

Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction & operating system independent are the characteristics of ___________________

·                     TCP

·                     UDP

·                     IP

·                     None of the given

 

The process of using a routing table to select a next hop for a given datagram is called __________.

·                     Encapsulation

·                     Reassembling

·                     Routing or forwarding

·                     None of the given

 

A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called __________

·                     Distance Vector Multicast Routing Protocol (DVMRP)

·                     Core Based Tree (CBT)

·                     Protocol Independent Multicast_Sparse Mode (PIM-SM)

·                     Protocol Independent Multicast_Dense Mode (PIM-DM)

 

Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.

·                     postfix, Infix

·                     non of these

·                     Infix, prefix

·                     prefix, suffix

 

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________

·                     None of the given

·                     TCP

·                     UDP

·                     IP

 

_____ Protocol provides error reporting mechanism.

·                     IGMP

·                     SNMP

·                     ICMP

·                     none of the given

 

________ encapsulates IP datagram as data area in hardware frame.

·                     Network Interface Layer

·                     Datalink Layer

·                     Network Layer

·                     None of the given

 

TTL stands for __________

·                     Time to Learn

·                     Time to Leave

·                     Time to Live

·                     none of the given

 

______ layer Provides reliable delivery of datagram.

·                     Network

·                     Transport

·                     Datalink

·                     none of the given

 

Which protocol is used to test different tools.

·                     ICMP

·                     IGMP

·                     TCP/IP

·                     none of the given

 

Routers use _______ to forward datagrams along prearranged path.

·                     Traffic class

·                     Flow label

·                     Destination address

·                     none of the given

 

NEXT HEADER field in the base header defines type of header it appears at the end of fixed-size base header.

·                     TRUE

·                     FALSE

 

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.

·                     Least

·                     Maximum

·                     Fragment

·                     Frame

 

Postfix defines how much of address used to identify network.

·                     TRUE

·                     FALSE

 

______ contains all information needed to deliver datagram to the destination.

·                     Header

 

The Source can configure outgoing datagram's to avoid _________

·                     Segmentation

·                     Defragmentation

·                     Fragmentation

·                     None of the given

 

The Current version of IP-Version 4 is _____ old

·                     18 years

·                     20 years

·                     22 years

·                     none of given

 

The Header format of IPv6 is entirely different.

·                     TRUE

·                     FALSE

 

_______ shows senders preference for low latency, high Reliability.

·                     TYPE

·                     SERVICE TYPE

·                     SERVICE PRIORITY

·                     None of the given

 

The Network Layer Protocol ICMP stands for____________

·                     Instant Control Message Protocol

·                     Internet Control Message Protocol

·                     Initial Control Message Protocol

·                     None of the given

 

IPV6 address consists of ________

·                     32 Bits

·                     64 Bits

·                     128 Bits

·                     none of the given

 

_______ is a technique used to Limit datagram size to small MTU of any network

·                     Segmentation

·                     Fragmentation

·                     Encapsulation

·                     none of the given

 

ICMP message transport is acted upon by getting ICMP _________ in IP.

·                     De-encapsulated

·                     Encapsulated

·                     Segmented

·                     none of the given

 

IETF stands for _____________ 

·                     Internet Engineering Task Force

·                     Internal Efficient Task Force

·                     Internet Engineering Technical Force

·                     none of the given

 

Which of the following protocols provide the routing information at the autonomous system level? 

·                     BGP

·                     OSPF

·                     RIP

·                     OSPF and RIP

 

A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication. 

·                     Unicast

·                     Multicast

·                     Broadcast

·                     Unicast & Multicast

 

_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted. 

·                     RIP

·                     OSPF

·                     BGP

·                     None of the given

 

In TCP when a computer sends a segment, the__________ and _______ fields refer to incoming data. 

·                     ACKNOWLEGE NUMBER, WINDOW

·                     SEQUENCE NUMBER, WINDOW

·                     ACKNOWLGEGE NUMBER, SEQUENCE NUMBER

·                     None of the given

 

 _________ is used to attach two autonomous systems.

·                     BGP

·                     IGP

·                     EGP

·                     none of the given

 

Routing inserts or changes values in _______

·                     MAC address

·                     routing table

·                     both (a) and (b)

·                     None of the given

 

NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.

·                     True

·                     False

 

Each autonomous system used to communicate among autonomous systems by chooses an IGP.

·                     True

·                     False

 

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.

·                     True

·                     False

 

The computer uses _________ to inform Local router about the last application when it leaves.

·                     ICMP

·                     IGMP

·                     SNMP

·                     None of the given

 

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

·                     96

·                     100

·                     120

·                     none of the given

 

For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.

·                     Efficiency

·                     Security

·                     Accuracy

·                     Anomalies

 

Class A mask is 255.0.0.0 which is used for ______

·                     Unicasting

·                     Multicasting

·                     Subnetting

·                     All of the given

 

When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.

·                     True

·                     False

 

Which one of these is not a main feature of connectionless service:

·                     It includes extension of LAN abstraction.

·                     It has universal addressing and the data is delivered in packets frames), each with a header.

·                     It combines collection of physical networks into a single virtual network.

·                     It has universal addressing and the data is delivered in packets frames), without a header.

 

Which one is NOT the function of ping program?

·                     Traceability

·                     Reach ability

·                     Both a and b

·                     None of the given

 

A datagram cannot be larger than ________ of a network over which it is sent.

·                     MTU

·                     Size

·                     IP header

·                     None of the given

 

MTU Stands for _______

·                     Minimum transmission unit

·                     Maximum transmission unit

·                     Multicast transmission unit

·                     None of the given

 

Fragmentation when using ICMP for path MTU should be avoided.

·                     True

·                     False

 

HEADER LEN field gives size of extention header.

·                     False

·                     True

 

The process of learning the path MTU is known as path MTU discovery.

·                     True

·                     False

 

________ is less complex and easy to understand.

·                     TCP

·                     UDP

·                     IP

·                     None of the given

 

IPV6 128 bits address includes network prefix and ________

·                     Host sufix

·                     Host prefix

·                     source Prefix

·                     None of the given

 

The Universal Datagram is not an end-to-end protocol.

·                     True

·                     False

 

 

MID Term Papers

 

Ethernet uses a ____________ static addressing scheme in which each device is assigned a unique address by the manufacturer.

·                     64

·                     48

·                     32

·                     8

 

The --------- bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and 0s that allow the receiver's hardware to synchronize with the incoming signal.

·                     64

·                     32

·                     16

·                     8

 

The third field of the header consists of ------ bit Ethernet frame type.

·                     48

·                     32

·                     16

·                     8

 

An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals according to the_____________ specification.

 

·                     BNC- t base 10

·                     RJ 45- t base 10

·                     BNC-t base 5

·                     RJ 45-t base 2

 

A bridge uses the ___________ to determine which computers connect to which segment, and uses the __________ to determine whether to forward a copy of frame.

 

·                     Source , destination

·                     Source , source

·                     Destination, source

·                     None from above

 

Formally named __________ informally known as the thick wire Ethernet or Thick net.

·                     10 Base 2

·                     10 Base 5

·                     10 Base T

·                     None of the given

 

Formally named --------------- informally known as thin wire Ethernet or thin net.

·                     10 Base 2

·                     10 Base 5

·                     10 Base T

·                     None of the given

 

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

·                     10 Base 2

·                     10 Base 5

·                     10 Base T

·                     None of the given

 

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.

·                     DMA(Direct Memory Access)

·                     Multiplexer

·                     Transceiver

·                     None of the given

 

A system with redundant bridges might have a problem with_______ in the system.

·                     Loop

·                     Filters

·                     Spamming

·                     All above

 

A Bridge can ________

·                     Filter a frame

·                     Forward a frame

·                     Extend a LAN

·                     Do all the above

 

________ has a jitter zero

  • None of the given
  • Virtual Private Network
  • Isochronous Network
  • Asynchronous Network

 

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .

  • Connectionless service paradigm
  • Connection oriented service paradigm
  • Both Connectionless and Connection-oriented service paradigm
  • None of the given

 

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

·                     21-bit

·                     22-bit

·                     23-bit

·                     24-bit

 

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________

·                     Hierarchal address

·                     Default route

·                     Shortest path

·                     None of the given

 

The next hop to which a packet is sent depends only on

·                     Packet's destination

·                     Packet's original source

·                     Path the packet has taken

·                     Non of the given

 

When an application--------------- data, it makes a copy of the data available to all other computers on the network?

·                     Broadcasting

·                     Multicasting

·                     Unicasting

·                     None of the given

 

A ----------  provide a mechanism that a customer can use to set a physical  address.

·                     Static addressing scheme

·                     Configurable addressing scheme

·                     Dynamic addressing scheme

·                     None of the given

 

_____________ sense a signal on one cable and then transmits an amplified copy on the other cable.

·                     Repeater

·                     Bridge

·                     Hub

·                     None of the given

 

The maximum size of an Ethernet segment is___________

·                     250 meters

·                     500 meters

·                     700 meters

·                     None of the given

 

FDDI can transmits data at a rate of -----

·                     1000 million bits per second

·                     100 million bits per second

·                     10 million bits per second

·                     None of the given

 

Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.

·                     CSMA/CD

·                     CSMA/CA

·                     TOKEN PASSING

·                     None of the given

 

-------------- have advantages arisen from the size and ease of computation.

·                     CRC

·                     Parity

·                     Checksums

·                     None of given

 

The term -------- is used to denote the definition of a packet used with a specific type of network.

·                     Packet

·                     Frame

·                     Data

·                     None of the given

 

------ has no way to determine the cause of the problem.

·                     Ping

·                     Trace route

·                     ICMP

·                     Non of the given

 

In -------------, network occupies the smaller area like a room a floor or a building

·                     LAN

·                     WAN

·                     MAN

·                     None of the given

 

In ---------, network occupies larger areas like cities & countries.

·                     LAN

·                     WAN

·                     MAN

·                     None of the given

 

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

·                     False

·                     True

 

A typical port on an ATM switch operates at __________ or higher.

·                     OC-2 speed (155Mbps)

·                     OC-3 speed (100Mbps)

·                     OC-3 speed (155Mbps)

·                     OC-3 speed (155Gbps)

 

The product of delay and throughput measures the _____ of data that can be present on the network.

·                     Area

·                     Volume

·                     Length

·                     None of the given

 

__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

·                     Constant Bit Rate (CBR) service

·                     Variable Bit Rate (VBR) service

·                     Available Bit Rate (ABR) service

·                     None of the given

 

Which of the following is a connecting device?

·                     Bridge

·                     Repeater

·                     Hub

·                     All the given

 

A bridges function in the _________ layers(s).

·                     Physical (MAC)

·                     Data link

·                     Network

·                     Physical (MAC) and Data link

 

A Bridge forwards or filters a frame by comparing the information in its address table to the frame's__________

·                     Layer 2 source address

·                     Source node's physical address

·                     Layer 2 destination address

·                     Layer 3 destination address

 

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

·                     8 octets

·                     8 bytes

·                     8 bits

·                     None of the given

 

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

·                     Explicit frame type

·                     Ideal frame type

·                     Implicit frame type

·                     None of the given

 

Local Talk is a LAN technology that employs -------------

·                     Star topology

·                     Bus topology

·                     Ring topology

·                     None of the given

 

The Fast Ethernet hardware operates at a rate of --------

·                     10 Mbps

·                     100 Mbps

·                     1000 Mbps

·                     None of the given

 

---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

·                     Parity

·                     Checksums

·                     CRC

·                     None of given

 

Computer networks are often called -------------- because they use packet technology.

·                     Ethernet

·                     Switch networks

·                     Packet networks

·                     None of the given

 

------ Program sends a message to a remote computer and reports whether the computer responds.

·                     Ping

·                     Traceroute

·                     ICMP

·                     Non of the given

 

In Point-to-Point topology there are two topologies.

·                     Tree and Ring

·                     Star and Ring

·                     Star and Tree

·                     None of  the given

 

A network uses a ------arranges for computers to be connected in a closed loop.

·                     Star Topology

·                     Ring Topology

·                     Bus Topology

·                     None of the given

 

An interface for thin Ethernet must have an ____________ connector, and must generate signals according to the_____________ specification.

·                     RJ-45, 10 Base T

·                     RJ-45, 10 Base 5

·                     BNC, 10 Base 2

·                     BNC, 10 Base T

 

--
--



--






***Ya Allah! grant us good in this world and good in the hereafter,
and save us from the chastisement of the fire***

--
---------------------------
Complete QURAN
http://www.quranflash.com/en/quranflash.html
http://tanzil.info
~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~
thanks for joing "vustudy&masti" group.
For group Rules view the link
http://groups.google.com.pk/group/vustudymasti/web/group-rules
To post to this group, send email to vustudymasti@googlegroups.com
Current web address: http://groups.google.com.pk/group/vustudymasti
------------------------------------------------------------------------------------------------



--










--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████

No comments:

Post a Comment