Computer Networking II
MKSSS's            Shri Siddhivinayak Mahila Mahavidyalaya , Karve Nagar, Pune-52
      Department of Computer Science                                                    TYBSc(CS) SEM II CS-343 Computer Networking II Question Bank
Sr.   Question                                                                          Option 1                      Option 2                   Option 3                      Option 4
No.
1     Physical or logical arrangement of network is ______                              Topology                      Routing                    Networking                    Control
2     Which network topology requires a central controller or hub                       Star                          Mesh                       Ring                          Bus
3     _______ topology requires a multipoint connection.                                Star                          Mesh                       Ring                          Bus
4     Data communication system spanning states, countries, or the whole world is       LAN                           WAN                        MAN                           PAN
      ________
5     Data communication system within a building or campus is________                  LAN                           WAN                        MAN                           PAN
6     WAN stands for __________                                                         World area network            Wide area network          Web area network              Web access network
7     In TDM, slots are further divided into __________                                 Seconds                       Frames                     Packets                       Bits
8     WLANs use high power levels and generally require a license for spectrum          true                          FALSE
      use.
9     Which of the following specifies a set of media access control (MAC) and          IEEE 802.16                   IEEE 802.3                 IEEE 802.11                   IEEE 802.15
      physical layer specifications for implementing WLANs?
10    The network layer is concerned with __________ of data.                           bits                          frames                     packets                       bytes
11    Which one of the following is not a function of network layer?                    routing                       inter-networking           congestion control            error control
12    A 4 byte IP address consists of __________                                        only network address          only host address          network address & host        network address & MAC
                                                                                                                                                 address                       address
13    In virtual circuit network each packet contains ___________                       full source and destination   a short VC number          only source address           only destination address
                                                                                        address
14    Which of the following is not correct in relation to multi-destination routing?   is same as broadcast          contains the list of all   data is not sent by packets   there are multiple receivers
                                                                                        routing                       destinations
15    A subset of a network that includes all the routers but contains no loops is      spanning tree                 spider structure           spider tree                   special tree
      called ________
16    Which one of the following algorithm is not used for congestion control?          traffic aware routing         admission control          load shedding                 routing information protoco
17    The network layer protocol for internet is ________                               ethernet                      internet protocol          hypertext transfer protocol   file transfer protocol
18    Which is a reason for avoiding doing route redistribution on two routers          Higher cost of two routers    Routing feedback           Cisco IOS incompatibility     Not possible to use two
      between the same two routing domains?                                                                                                                                    routers
19    Which of the following is false with respect to TCP?                              Connection-oriented           Process-to-process         Transport layer protocol      Unreliable
20    In TCP, sending and receiving data is done as ______                              Stream of bytes               Sequence of characters     Lines of data                 Packets
21    TCP process may not write and read data at the same speed. So we need             Packets                       Buffers                    Segments                      Stack
      __________ for storage.
22    TCP groups a number of bytes together into a packet called _______                Packets                       Buffers                    Segments                      Stack
23    Communication offered by TCP is ________                                          Full-duplex                   Half-duplex                Semi-duplex                   Byte by byte
                                                                                                                                                                                                       1
                                                                                                                                                                         Computer Networking II
24   To achieve reliable transport in TCP, ___________ is used to check the safe        Packet                     Buffer                     Segments                   Acknowledgment
     and sound arrival of data.
25   In segment header, sequence number and acknowledgement number fields               Byte number                Buffer number              Segment number             Acknowledgment
     refer to _______
26   Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is 10000                        10001                      12001                      11001
     numbered 10001. What is the sequence number of the segment if all data is
     sent in only one segment?
27   Bytes of data being transferred in each connection are numbered by TCP.          Fixed number                 Random sequence of 0’s     One                        Sequence of zero’s and
     These numbers start with a ________                                                                           and 1’s                                               one’s
28   The value of acknowledgement field in a segment defines _______                    sequence number of the     total number of bytes to   sequence number of the     sequence of zeros and ones
                                                                                        byte received previously   receive                    next byte to be received
29   In the layer hierarchy as the data packet moves from the upper to the lower        Added                      Removed                    Rearranged                 Modified
     layers, headers are ___________
30   Communication between a computer and a keyboard involves                           Automatic                  Half-duplex                Full-duplex                Simplex
     ______________ transmission
31   Which of this is not a network edge device?                                        PC                         Smartphones                Servers                    Switch
32   Protocols are set of rules to govern _________                                     Communication              Standard                   Metropolitan               Bandwidth
                                                                                                                                              communication
33   An internet is a __________                                                        Collection of WANS         Network of networks        Collection of LANS         Collection of identical
                                                                                                                                                                         LANS and WANS
34   Checksum is used in Internet by several protocols although not at the              Session layer              Transport layer            Network layer              Data link layer
     _________
35   In version field of IPv4 header, when machine is using some other version of       Discarded                  Accepted                   Interpreted                Interpreted incorrectly
     IPv4 then datagram is ______
36   Network layer at source is responsible for creating a packet from data coming      Station                    Link                       Node                       Protocol
     from another ______
37   Header of datagram in IPv4 has _________                                           0 to 20 bytes              20 to 40 bytes             20 to 60 bytes             20 to 80 bytes
38   In IPv4 layer, datagram is of ________                                             Fixed length               Variable length            Global length              Zero length
39   In IPv4, service type of service in header field, first 3 bits are called ______   Type of service            Code bits                  Sync bits                  Precedence bits
40   Which is a link layer protocol?                                                    ARP                        TCP                        UDP                        HTTP
41   Which of the following is false with respect to UDP?                               Connection-oriented        Unreliable                 ransport layer protocol    Low overhead
42   Beyond IP, UDP provides additional services such as _______                        Routing and switching      Sending and receiving of   Multiplexing and           Demultiplexing and error
                                                                                                                   packets                    demultiplexing             checking
43   What is the main advantage of UDP?                                                 More overload              Reliable                   Low overhead               Fast
44   The ______ field is used to detect errors over the entire user datagram.           udp header                 checksum                   source port                destination port
45   Which of the following is not applicable for IP?                                   Error reporting            Handle addressing          Datagram format            Packet handling
                                                                                                                   conventions                                           conventions
                                                                                                                                                                                                   2
                                                                                                                                                                              Computer Networking II
46   Which of the following field in IPv4 datagram is not related to fragmentation        Flags                     Offset                       TOS                          Identifier
47   Which of these is not applicable for IP protocol?                                    is connectionless         offer reliable service       offer unreliable service     does not offer error
                                                                                                                                                                              reporting
48   Which field helps to check rearrangement of the fragments?                           offset                    flag                         ttl                          identifer
49   IP Security operates in which layer of the OSI model?                                Network                   Transport                    Application                  Physical
50   Two broad categories of congestion control are                                       Open-loop and Closed-loop Open-control and Closed-     Active control and Passive   Active loop and Passive
                                                                                                                    control                      control                      loop
51   In open-loop control, policies are applied to _________                              Remove after congestion   Remove after sometime        Prevent before congestion    Prevent before sending
                                                                                          occurs                                                 occurs                       packets
52   . Retransmission of packets must not be done when ____                               Packet is lost            Packet is corrupted          Packet is needed             Packet is error-free
53   Closed-Loop control mechanisms try to _____                                          Remove after congestion   Remove after sometime        Prevent before congestion    Prevent before sending
                                                                                          occurs                                                 occurs                       packets
54   The technique in which a congested node stops receiving data from the                Admission policy          Backpressure                 Forward signaling            Backward signaling
     immediate upstream node or nodes is called as _______
55   Backpressure technique can be applied only to __                                     Congestion networks       Closed circuit networks      Open circuit networks        Virtual circuit networks
56   The packet sent by a node to the source to inform it of congestion is called         Explicit                  Discard                      Choke                        Backpressure
     _______
57   In the slow-start algorithm, the size of the congestion window increases             exponentially             additively                   multiplicatively             suddenly
     __________ until it reaches a threshold
58   The address that is unique in the scope of the network or internationally if the     Global address            Network address              Physical address             IP address
     network is part of an international network is called as ______
59   The Identifier that is used for data transfer in virtual circuit network is called   Global address            Virtual circuit identifier   Network identifier           IP identifier
     _____
60   During teardown phase, the source, after sending all the frames to destination, teardown response              teardown request             termination request          termination response
     sends a _____ to notify termination.
61   The data link layer takes the packets from _________ and encapsulates them           network layer             physical layer               transport layer              application layer
     into frames for transmission.
62   Which of the following tasks is not done by data link layer?                         framing                   error control                flow control                 channel coding
63   CRC stands for __________                                                            cyclic redundancy check   code repeat check            code redundancy check        cyclic repeat check
64   Which of the following is a data link protocol?                                      ethernet                  point to point protocol      hdlc                         all of the mentioned
65   The technique of temporarily delaying outgoing acknowledgements so that              piggybacking              cyclic redundancy check      fletcher’s checksum          parity check
     they can be hooked onto the next outgoing data frame is called ___
66   . Expansion of FTP is __________                                                     Fine Transfer Protocol    File Transfer Protocol       First Transfer Protocol      Fast Transfer Protocol
67   FTP is built on _____ architecture.                                                  Client-server             P2P                          Data centric                 Service oriented
68   FTP uses _________ parallel TCP connections to transfer a file.                      1                         2                            3                            5
69   Identify the incorrect statement regarding FTP.                                      FTP stands for File       FTP uses two parallel TCP    FTP sends its control        FTP sends exactly one file
                                                                                          Transfer Protocol         connections                  information in-band          over the data connection
                                                                                                                                                                                                       3
                                                                                                                                                                      Computer Networking II
70   FTP server _____________                                                     Maintains state information Is stateless                Has single TCP connection Has UDP connection for
                                                                                                                                          for a file transfer       file transfer
71   The password is sent to the server using ________ command                    PASSWD                       PASS                       PASSWORD                    PWORD
72   Simple mail transfer protocol (SMTP) utilizes _________ as the transport     TCP                          UDP                        DCCP                        SCTP
     layer protocol for electronic mail transfer.
73   SMTP connections secured by SSL are known as __________                      SMTPS                        SSMTP                      SNMP                        STARTTLS
74   SMTP uses which of the following TCP port?                                   22                           23                         74                          25
75   Which one of the following protocol is used to receive mail messages?        SMTP                         POP                        IMAP                        FTP
76   What is on-demand mail relay (ODMR)?                                         protocol for SMTP security   an SMTP extension          protocol for web pages      protocol for faster mail
                                                                                                                                                                      transfer
78   An email client needs to know the _________ of its initial SMTP server.      IP address                   MAC address                URL                         Name
79   An SMTP session may not include _______                                      zero SMTP transaction        one SMTP transaction       more than one SMTP          one HTTP transaction
                                                                                                                                          transaction
80   SMTP defines _______                                                         message transport            message encryption         message content             message password
81   Which one of the following is an SMTP server configured in such a way that   open mail relay              wide mail reception        open mail reception         short mail reception
     anyone on the internet can send e-mail through it?
82   SMTP is not used to deliver messages to ______                               user’s terminal              user’s mailbox             user’s word processor       user’s email client
83   An asymmetric-key cipher uses                                                1 Key                        2 Key                      3 key                       4 key
84   .Which one of the following protocol is used to secure HTTP connection?      Resource reservation         Transport layer security   Xplicit congestion          Stream control transmission
                                                                                  protocol                     (TSL)                      notification (ECN)          protocol (SCTP)
85   Cryptography term is used to transforming messages to make them secure and Change                         Defend                     Idle                        Attacks
     to prevent from
86   Shift cipher is also referred to as the                                      Caesar cipher                cipher text                Shift cipher                None of the above
87   Which one is the Heart of Data Encryption Standard (DES)?                    DES function                 Encryption                 Rounds                      Cipher
88   DES stands for…………………                                                        Data Encryption Slots        Data Encryption            Data Encryption Standard    Data Encryption Solutions
                                                                                                               Subscription
89   Encryption algorithm is used to transforms plaintext into……………               Simple Text                  Cipher Text                Empty Text                  None of the above
90   What is cipher in Cryptography ?                                             Algorithm for performing     Algorithm for performing   Encrpted Messages           Both algorithm for
                                                                                  encryption                   decryption                                             performing encryption and
                                                                                                                                                                      Decryption and encrypted
                                                                                                                                                                      message
91   The message before being transformed, is                                     Simple Text                  Cipher Text                Empty Text                  plain text
92   Which technique is used for data protection ?.                               Data piracy                  Authentication             Encryption                  None of these
93   ________are the types of firewalls.                                          Packet Filtering             Dual Homed Gateway         Both A and B                None of these
94   In networks protocol TCP/ IP stands for.                                     Transaction control          Transmission control       Transmission contribution   None of these
                                                                                  protocol                     protocol                   protocol
95   Which of the following services use TCP?                                     DHCP                         SMTP                       HTTP                        TFTP
                                                                                                                                                                                                 4
                                                                                                                                                                Computer Networking II
96    What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI   Application              Host-to-Host             Internet               Network Access
      model?
97    You want to implement a mechanism that automates the IP configuration,       SMTP                         SNMP                     DHCP                   ARP
      including IP address, subnet mask, default gateway, and DNS information.
      Which protocol will you use to accomplish this?
98    The DoD model (also called the TCP/IP stack) has four layers. Which layer of Application                  Host-to-Host             Internet               Network Access
      the DoD model is equivalent to the Network layer of the OSI model?
99    Which of the following services use UDP?                                         DHCP                     SMTP                     SNMP                   TFTP
100   Which statements are true regarding ICMP packets?                                ICMP guarantees datagram ICMP can provide hosts   ICMP is encapsulated   ICMP is encapsulated
                                                                                       delivery.                with information about   within IP datagrams.   within UDP datagrams.
                                                                                                                network problems.
101   Which layer 4 protocol is used for a Telnet connection?                          IP                       TCP                      TCP/IP                 UDP