Professional Documents
Culture Documents
Fourozan MCQ From 4th Edition
Fourozan MCQ From 4th Edition
Fourozan MCQ From 4th Edition
CHAPTER 1
1: The _______ is the physical path over which a message travels.
a. Protocol
b. Medium
c. Signal
d. All the above
3:
Frequency of failure and network recovery time after a failure measured as the _______ of a network.
(A) Performance (B) Security (C) Reliability (D) Feasibility
10: In a _______ connection, more than two devices can share a single link.
a. point-to-point
b. multipoint
c. primary
d. secondary
11: In _______ transmission, the channel capacity is shared by both communicating devices at all times.
a. simplex
b. half-duplex
c. full-duplex
d. half-simplex
12: In the original ARPANET, _______ were directly connected together.
a. IMPs
b. host computers
c. networks
d. routers
14: Which organization has authority over interstate and international commerce in the communications
field?
a. ITU-T
b. IEEE
c. FCC
d. ISOC
15: _______ are special-interest groups that quickly test, evaluate, and standardize new technologies.
a. Forums
b. Regulatory agencies
c. Standards organizations
d. All of the above
16: Which agency developed standards for physical connection interfaces and electronic signaling
specifications?
a. EIA
b. ITU-T
c. ANSI
d. ISO
19: ________ defines how a particular pattern to be interpreted, and what action is to be taken based on
that interpretation.
a. Semantics
b. Syntax
c. Timing
d. None of the above
20: _______ refers to two characteristics: when data should be sent and how fast it can be sent.
a. Semantics
b. Syntax
c. Timing
d. none of the above
21: Data flow between two devices can occur in a _______ way.
a. simplex
b. half-duplex
c. full-duplex
d. all of the above
22: In a ______ connection, two and only two devices are connected by a dedicated link.
a. multipoint
b. point-to-point
c. (a) and (b)
d. none of the above
26: A _______ is a data communication system within a building, plant, or campus, or between nearby
buildings.
a. MAN
b. LAN
c. WAN
d. none of the above
27: A ______ is a data communication system spanning states, countries, or the whole world.
a. MAN
b. LAN
c. WAN
d. none of the above
CHAPTER 2
1: The Internet model consists of _______ layers.
a. Three
b. Five
c. Seven
d. Eight
2: The process-to-process delivery of the entire message is the responsibility of the _______ layer.
a. Network
b. Transport
c. Application
d. Physical
4: Mail services are available to network users through the _______ layer.
a. Data link
b. Physical
c. Transport
d. Application
5: As the data packet moves from the upper to the lower layers, headers are _______.
a. Added
b. Removed
c. Rearranged
d. Modified
6: The _______ layer lies between the network layer and the application layer.
a. Physical
b. Data link
c. Transport
d. None of the above
7: Layer 2 lies between the physical layer and the _______ layer.
a. Network
b. Data link
c. Transport
d. None of the above
8: When data are transmitted from device A to device B, the header from A's layer 4 is read by B's
_______ layer.
a. Physical
b. Transport
c. Application
d. None of the above
12: The _______ model shows how the network functions of a computer ought to be organized.
a. CCITT
b. OSI
c. ISO
d. ANSI
13: The physical layer is concerned with the movement of _______ over the physical medium.
a. programs
b. dialogs
c. protocols
d. bits
14: The OSI model consists of _______ layers.
a. three
b. five
c. seven
d. eight
15: In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.
a. added
b. removed
c. rearranged
d. modified
16: In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is
read by B's _______ layer.
a. physical
b. transport
c. session
d. presentation
17: In the OSI model, what is the main function of the transport layer?
a. node-to-node delivery
b. process-to-process message delivery
c. synchronization
d. updating and maintenance of routing tables
18: In the OSI model, encryption and decryption are functions of the ________ layer.
a. transport
b. session
c. presentation
d. application
19: When a host on network A sends a message to a host on network B, which address does the router
look at?
a. port
b. logical
c. physical
d. none of the above
20: To deliver a message to the correct application program running on a host, the _______ address
must be consulted.
a. port
b. IP
c. physical
d. none of the above
23: The ______ layer is responsible for moving frames from one hop (node) to the next.
a. physical
b. data link
c. transport
d. none of the above
24: The ______ layer adds a header to the packet coming from the upper layer that includes the logical
addresses of the sender and receiver.
a. physical
b. data link
c. network
d. none of the above
25: The_________ layer is responsible for the delivery of a message from one process to another.
a. physical
b. transport
c. network
d. none of the above
27: _______ is a process-to-process protocol that adds only port addresses, checksum error control,
and length information to the data from the upper layer.
a. TCP
b. UDP
c. IP
d. none of the above
29: The ________ address, also known as the link address, is the address of a node as defined by its
LAN or WAN.
a. port
b. physical
c. logical
d. none of the above
30: Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC).
a. 32-bit
b. 64-bit
c. 6-byte
d. none of the above
32: The ____ created a model called the Open Systems Interconnection, which allows diverse systems
to communicate.
a. OSI
b. ISO
c. IEEE
d. none of the above
33: The seven-layer _____ model provides guidelines for the development of universally compatible
networking protocols.
a. OSI
b. ISO
c. IEEE
d. none of the above
34: The physical, data link, and network layers are the ______ support layers.
a. user
b. network
c. both (a) and (b)
d. neither (a) nor (b)
35: The session, presentation, and application layers are the ____ support layers.
a. user
b. network
c. both (a) and (b)
d. neither (a) nor (b)
36: The _______ layer links the network support layers and the user support layers.
a. transport
b. network
c. data link
d. session
37: The _______ layer coordinates the functions required to transmit a bit stream over a physical
medium.
a. transport
b. network
c. data link
d. physical
38: The _______ layer is responsible for delivering data units from one station to the next without errors.
a. transport
b. network
c. data link
d. physical
39: The ______ layer is responsible for the source-to-destination delivery of a packet across multiple
network links.
a. transport
b. network
c. data link
d. physical
40: The ________ layer is responsible for the process-to-process delivery of the entire message.
a. transport
b. network
c. data link
d. physical
41: The ______ layer establishes, maintains, and synchronizes the interactions between communicating
devices.
a. transport
b. network
c. session
d. physical
42: The _______ layer ensures interoperability between communicating devices through transformation
of data into a mutually agreed upon format.
a. transport
b. network
c. data link
d. presentation
43: The _________ layer enables the users to access the network.
a. transport
b. application
c. data link
d. physical
44: TCP/IP is a ______ hierarchical protocol suite developed ____ the OSI model.
a. seven-layer; before
b. five-layer; before
c. six-layer; before
d. five-layer; after
45: The TCP/IP _______ layer is equivalent to the combined session, presentation, and application
layers of the OSI model.
a. application
b. network
c. data link
d. physical
46: The ________ address, also known as the link address, is the address of a node as defined by its
LAN or WAN.
a. physical
b. IP
c. port
d. specific
CHAPTER 3
1: Before data can be transmitted, they must be transformed to ________.
a. periodic signals
b. electromagnetic signals
c. aperiodic signals
d. low-frequency sine waves
8: Given two sine waves <i>A</i> and <i>B</i>, if the frequency of <i>A</i> is twice that of <i>B</i>,
then the period of <i>B</i> is ________ that of <i>A</i>.
a. one-half
b. twice
c. the same as
d. indeterminate from
10: If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ________ V.
a. 2
b. 1
c. -2
d. between -2 and 2
11: A signal is measured at two different points. The power is <i>P</i><sub>1</sub> at the first point and
<i>P</i><sub>2</sub> at the second point. The dB is 0. This means ________.
a. <i>P</i><sub>2</sub> is zero
b. <i>P</i><sub>2</sub> equals <i>P</i><sub>1</sub>
c. <i>P</i><sub>2</sub> is much larger than <i>P</i><sub>1</sub>
d. <i>P</i><sub>2</sub> is much smaller than <i>P</i><sub>1</sub>
12: ________ is a type of transmission impairment in which the signal loses strength due to the
resistance of the transmission medium.
a. Attenuation
b. Distortion
c. Noise
d. Decibel
13: ________ is a type of transmission impairment in which the signal loses strength due to the different
propagation speeds of each frequency that makes up the signal.
a. Attenuation
b. Distortion
c. Noise
d. Decibel
14: ________ is a type of transmission impairment in which an outside source such as crosstalk corrupts
a signal.
a. Attenuation
b. Distortion
c. Noise
d. Decibel
15: When propagation speed is multiplied by propagation time, we get the ________.
a. throughput
b. wavelength of the signal
c. distortion factor
d. distance a signal or bit has traveled
18: _______ data have discrete states and take discrete values.
a. Analog
b.Digital
c. (a) or (b)
d. None of the above
25: A sine wave in the ______ domain can be represented by one single spike in the _____ domain.
a. time; frequency
b. frequency; time
c. time; phase
d. phase; time
26: A _________ sine wave is not useful in data communications; we need to send a _______ signal.
a. composite; single-frequency
b. single-frequency; composite
c. single-frequency; double-frequency
d. none of the above
27: The _____ of a composite signal is the difference between the highest and the lowest frequencies
contained in that signal.
a. frequency
b. period
c. bandwidth
d. amplitude
29: Baseband transmission of a digital signal is possible only if we have a ____ channel.
a. low-pass
b. bandpass
c. low rate
d. high rate
30: If the available channel is a ____ channel, we cannot send a digital signal directly to the channel.
a. low-pass
b. bandpass
c. low rate
d. high rate
31: For a ______ channel, the Nyquist bit rate formula defines the theoretical maximum bit rate.
a. noisy
b. noiseless
c. bandpass
d. low-pass
32: For a ______ channel, we need to use the Shannon capacity to find the maximum bit rate.
a. noisy
b. noiseless
c. bandpass
d. low-pass
34: The _________ product defines the number of bits that can fill the link.
a. bandwidth-period
b. frequency-amplitude
c. bandwidth-delay
d. delay-amplitude
CHAPTER 4
1: Unipolar, bipolar, and polar encoding are types of _______ encoding.
a. line
b. block
c. NRZ
d. Manchester
5: If the frequency spectrum of a signal has a bandwidth of 500 Hz with the highest frequency at 600 Hz,
what should be the sampling rate, according to the Nyquist theorem?
a. 200 samples/s
b. 500 samples/s
c. 1000 samples/s
d. 1200 samples/s
7: Which of the following encoding methods does not provide for synchronization?
a. NRZ-L
b. RZ
c. NRZ-I
d. Manchester
8: Which encoding method uses alternating positive and negative values for 1s?
a. NRZ-I
b. RZ
c. Manchester
d. AMI
11: In _______ transmission, bits are transmitted simultaneously, each across its own wire.
a. Asynchronous serial
b. Synchronous serial
c. Parallel
d. (a) and (b)
12: In _______ transmission, bits are transmitted over a single wire, one at a time.
a. asynchronous serial
b. synchronous serial
c. parallel
d. (a) and (b)
13: In _______ transmission, a start bit and a stop bit frame a character byte.
a. asynchronous serial
b. synchronous serial
c. parallel
d. (a) and (b)
15: ___________ conversion involves three techniques: line coding, block coding, and scrambling.
a. Analog-to-digital
b. Digital-to-analog
c. Analog-to-analog
d. Digital-to-digital
17: _______ provides redundancy to ensure synchronization and inherent error detection.
a. Block coding
b. Line coding
c. Scrambling
d. None of the above
18: ________ is normally referred to as <i>mB/nB</i> coding; it replaces each <i>m</i>-bit group with
an <i>n</i>-bit group.
a. Block coding
b. Line coding
c. Scrambling
d. None of the above
21: The most common technique to change an analog signal to digital data is called __________.
a. PAL
b. PCM
c. sampling
d. none of the above
24: ______ finds the value of the signal amplitude for each sample; ____ finds the change from the
previous sample.
a. DM; PCM
b. PCM; DM
c. DM; CM
d. none of the above
25: While there is (are) only _____ way(s) to send parallel data, there is (are) three subclass(es) of serial
transmission.
a. one; two
b. two; three
c. one; three
d. none of the above
26: In ______ transmission, we send 1 start bit (0) at the beginning and 1 or more stop bits (1s) at the
end of each byte.
a. synchronous
b. asynchronous
c. isochronous
d. none of the above
27: In _________ transmission, we send bits one after another without start or stop bits or gaps. It is the
responsibility of the receiver to group the bits.
a. synchronous
b. asynchronous
c. isochronous
d. none of the above
28: The ________ mode provides synchronization for the entire stream of bits must. In other words, it
guarantees that the data arrive at a fixed rate.
a. synchronous
b. asynchronous
c. isochronous
d. none of the above
29: A _________ digital signal includes timing information in the data being transmitted.
a. self-synchronizing
b. self-modulated
c. self-transmitted
d. none of the above
30: In decoding a digital signal, the receiver calculates a running average of the received signal power,
called the _______.
a. baseline
b. base
c. line
d. none of the above
31: The ________ rate defines the number of data elements sent in 1s; the ______ rate is the number of
signal elements sent in 1s.
a. data; signal
b. signal; data
c. baud; bit
d. none of the above
34: In a _____ scheme, all the signal levels are on one side of the time axis, either above or below.
a. polar
b. bipolar
c. unipolar
d. all of the above
35: In ______ schemes, the voltages are on the both sides of the time axis. For example, the voltage
level for 0 can be positive and the voltage level for 1 can be negative.
a. polar
b. bipolar
c. unipolar
d. all of the above
36: In _____, the level of the voltage determines the value of the bit.
a. NRZ-I
b. NRZ-L
c. both (a) and (b)
d. neither (a) nor (b)
37: In ______, the change or lack of change in the level of the voltage determines the value of the bit.
a. NRZ-I
b. NRZ-L
c. both (a) and (b)
d. neither (a) nor (b)
38: The idea of RZ and the idea of NRZ-L are combined into the ________ scheme.
a. Manchester
b. differential Manchester
c. both (a) and (b)
d. neither (a) nor (b)
39: The idea of RZ and the idea of NRZ-I are combined into the ________ scheme.
a. Manchester
b. differential Manchester
c. both (a) and (b)
d. neither (a) nor (b)
40: In _______ encoding, the duration of the bit is divided into two halves. The voltage remains at one
level during the first half and moves to the other level in the second half. The transition at the middle of
the bit provides synchronization.
a. Manchester
b. differential Manchester
c. both (a) and (b)
d. neither (a) nor (b)
41: In ___________ there is always a transition at the middle of the bit, but the bit values are determined
at the beginning of the bit. If the next bit is 0, there is a transition; if the next bit is 1, there is none.
a. Manchester
b. differential Manchester
c. both (a) and (b)
d. neither (a) nor (b)
42: In Manchester and differential Manchester encoding, the transition at the middle of the bit is used for
__________.
a. bit transfer
b. baud transfer
c. synchronization
d. none of the above
43: The minimum bandwidth of Manchester and differential Manchester is ____ that of NRZ.
a. the same as
b. twice
c. thrice
d. none of the above
45: The _____ scheme uses data patterns of size 2 and encodes the 2-bit patterns as one signal
element belonging to a four-level signal.
a. 4B5B
b. 2B1Q
c. MLT-3
d. none of the above
46: The ______ scheme uses three levels (+V, 0, and -V) and three transition rules to move between the
levels.
a. 4B5B
b. 2B1Q
c. MLT-3
d. none of the above
CHAPTER 5
1: ASK, PSK, FSK, and QAM are examples of ________ conversion.
a. digital-to-digital
b. digital-to-analog
c. analog-to-analog
d. analog-to-digital
4: If the baud rate is 400 for a QPSK signal, the bit rate is ________ bps.
a. 100
b. 400
c. 800
d. 1600
5: If the bit rate for an ASK signal is 1200 bps, the baud rate is ________.
a. 300
b. 400
c. 600
d. 1200
6: If the bit rate for an FSK signal is 1200 bps, the baud rate is ________.
a. 300
b. 400
c. 600
d. 1200
7: If the bit rate for a 16-QAM signal is 4000 bps, what is the baud rate?
a. 300
b. 400
c. 1000
d. 1200
8: If the baud rate for a 64-QAM signal is 2000, what is the bit rate?
a. 300
b. 400
c. 1000
d. 12000
9: Given an AM radio signal with a bandwidth of 10 KHz and the highest-frequency component at 705
KHz, what is the frequency of the carrier signal?
a. 700 KHz
b. 705 KHz
c. 710 KHz
d. Cannot be determined from given information
10: _______ conversion is the process of changing one of the characteristics of an analog signal based
on the information in the digital data.
a. Digital-to-analog
b. Analog-to-analog
c. Analog-to-digital
d. Digital-to-digital
12: In ________, the amplitude of the carrier signal is varied to create signal elements. Both frequency
and phase remain constant.
a. ASK
b. PSK
c. FSK
d. QAM
13: In _________, the frequency of the carrier signal is varied to represent data. Both peak amplitude
and phase remain constant.
a. ASK
b. PSK
c. FSK
d. QAM
14: In ________, the phase of the carrier is varied to represent two or more different signal elements.
Both peak amplitude and frequency remain constant.
a. ASK
b. PSK
c. FSK
d. QAM
15: A constellation diagram shows us the __________ of a signal element, particularly when we are
using two carriers (one in-phase and one quadrature).
a. amplitude and phase
b. amplitude and frequency
c. frequency and phase
d. none of the above
17: ________ uses two carriers, one in-phase and the other quadrature.
a. ASK
b. PSK
c. FSK
d. QAM
22: In _____ transmission, the frequency of the carrier signal is modulated to follow the changing voltage
level (amplitude) of the modulating signal. The peak amplitude and phase of the carrier signal remain
constant, but as the amplitude of the information signal changes, the frequency of the carrier changes
correspondingly.
a. AM
b. PM
c. FM
d. none of the above
23: In _____ transmission, the phase of the carrier signal is modulated to follow the changing voltage
level (amplitude) of the modulating signal.
a. AM
b. PM
c. FM
d. none of the above
24: In _______, the peak amplitude of one signal level is 0; the other is the same as the amplitude of the
carrier frequency.
a. PSK
b. OOK
c. FSK
d. none of the above
33: The Federal Communications Commission (FCC) allows ______kHz for each AM station.
a. 5
b. 10
c. 20
d. none of the above
34: The Federal Communications Commission (FCC) allows ______ kHz for each FM station.
a. 20
b. 100
c. 200
d. none of the above
CHAPTER 6
1: The sharing of a medium and its link by two or more devices is called _______.
a. modulation
b. encoding
c. line discipline
d. multiplexing
5: In synchronous TDM, for <i>n</i> signal sources of the same data rate, each frame contains _______
slots.
a. <i>n</i>
b. <i>n</i> + 1
c. <i>n</i> - 1
d. 0 to <i>n</i>
6: In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission
rates of the signal sources.
a. greater than
b. less than
c. equal to
d. not related to
9: ________ can be achieved by using multiplexing; ______ can be achieved by using spreading.
a. Efficiency; privacy and antijamming
b. Privacy and antijamming; efficiency
c. Privacy and efficiency; antijamming
d. Efficiency and antijamming; privacy
10: ________ is the set of techniques that allows the simultaneous transmission of multiple signals
across a single data link.
a. Demodulating
b. Multiplexing
c. Compressing
d. None of the above
13: ______ can be applied when the bandwidth of a link (in hertz) is greater than the combined
bandwidths of the signals to be transmitted.
a. TDM
b. FDM
c. Both (a) or (b)
d. Neither (a) or (b)
15: ____ is designed to use the high bandwidth capability of fiber-optic cable.
a. FDM
b. TDM
c. WDM
d. None of the above
17: _____ is a digital process that allows several connections to share the high bandwidth of a link.
a. FDM
b. TDM
c. WDM
d. None of the above
18: _____ is a digital multiplexing technique for combining several low-rate channels into one high-rate
one.
a. FDM
b. TDM
c. WDM
d. None of the above
19: We can divide ____ into two different schemes: synchronous or statistical.
a. FDM
b. TDM
c. WDM
d. none of the above
20: In ________ TDM, each input connection has an allotment in the output even if it is not sending data.
a. synchronous
b. statistical
c. isochronous
d. none of the above
21: In ________ TDM, slots are dynamically allocated to improve bandwidth efficiency.
a. synchronous
b. statistical
c. isochronous
d. none of the above
22: In ________, we combine signals from different sources to fit into a larger bandwidth.
a. spread spectrum
b. line coding
c. block coding
d. none of the above
23: _______ is designed to be used in wireless applications in which stations must be able to share the
medium without interception by an eavesdropper and without being subject to jamming from a malicious
intruder.
a. Spread spectrum
b. Multiplexing
c. Modulation
d. None of the above.
24: The _______ technique uses M different carrier frequencies that are modulated by the source signal.
At one moment, the sign modulates one carrier frequency; at the next moment, the signal modulates
another carrier frequency.
a. FDM
b. DSSS
c. FHSS
d. TDM
25: The ______ technique expands the bandwidth of a signal by replacing each data bit with <i>n</i>
bits.
a. FDM
b. DSSS
c. FHSS
d. TDM
CHAPTER 7
1: Transmission media are usually categorized as _______.
a. fixed or unfixed
b. guided or unguided
c. determinate or indeterminate
d. metallic or nonmetallic
3: _______ cable consists of an inner copper core and a second conducting outer sheath.
a. Twisted-pair
b. Coaxial
c. Fiber-optic
d. Shielded twisted-pair
7: What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable?
a. inner conductor
b. diameter of cable
c. outer conductor
d. insulating material
10: When a beam of light travels through media of two different densities, if the angle of incidence is
greater than the critical angle, _______ occurs.
a. reflection
b. refraction
c. incidence
d. criticism
11: When the angle of incidence is _______ the critical angle, the light beam bends along the interface.
a. more than
b. less than
c. equal to
d. none of the above
12: Signals with a frequency below 2 MHz use _______ propagation.
a. ground
b. sky
c. line-of-sight
d. none of the above
13: Signals with a frequency between 2 MHz and 30 MHz use ______ propagation.
a. ground
b. sky
c. line-of-sight
d. none of the above
16: A(n) _____ medium provides a physical conduit from one device to another.
a. guided
b. unguided
c. either (a) or (b)
d. none of the above
17: ________ cable consists of two insulated copper wires twisted together.
a. Coaxial
b. Fiber-optic
c. Twisted-pair
d. none of the above
18: _______ cable is used for voice and data communications.
a. Coaxial
b. Fiber-optic
c. Twisted-pair
d. none of the above
20: _____ cable can carry signals of higher frequency ranges than _____ cable.
a. Twisted-pair; fiber-optic
b. Coaxial; fiber-optic
c. Coaxial; twisted-pair
d. none of the above
21: ______ cables are composed of a glass or plastic inner core surrounded by cladding, all encased in
an outside jacket.
a. Coaxial
b. Fiber-optic
c. Twisted-pair
d. none of the above
23: In a fiber-optic cable, the signal is propagated along the inner core by _______.
a. reflection
b. refraction
c. modulation
d. none of the above
24: _________ media transport electromagnetic waves without the use of a physical conductor.
a. Guided
b. Unguided
c. Either (a) or (b)
d. None of the above
25: Radio waves are _________.
a. omnidirectional
b. unidirectional
c. bidirectional
d. none of the above
27: _______ are used for cellular phone, satellite, and wireless LAN communications.
a. Radio waves
b. Microwaves
c. Infrared waves
d. none of the above
28: ________ are used for short-range communications such as those between a PC and a peripheral
device.
a. Radio waves
b. Microwaves
c. Infrared waves
d. none of the above
CHAPTER 8
1: Traditionally, _____ methods of switching have been important.
a. four
b. three
c. five
d. six
4: A ________ network is made of a set of switches connected by physical links, in which each link is
divided into <i>n</i> channels.
a. line-switched
b. frame-switched
c. circuit-switched
d. none of the above
6: In _______, the resources need to be reserved during the setup phase; the resources remain
dedicated for the entire duration of data transfer phase until the teardown phase.
a. datagram switching
b. circuit switching
c. frame switching
d. none of the above
11: A _________ network is a cross between a circuit-switched network and a datagram network. It has
some characteristics of both.
a. virtual-circuit
b. packet-switched
c. frame-switched
d. none of the above
12: We can say that a packet switch has _______ types of components.
a. two
b. three
c. four
d. none of the above
14: A ________ switch is a multistage switch with microswitches at each stage that route the packets
based on the output port represented as a binary string.
a. crossbar
b. TSI
c. banyan
d. none of the above
15: In a banyan switch, for 8 inputs and 8 outputs, we have _____ stages.
a. 8
b. 4
c. 3
d. 2
16: In a banyan switch, for 8 inputs and 8 outputs, we have _____ microswitches at each stage.
a. 8
b. 4
c. 3
d. 2
17: A ________ switch combines space-division and time-division technologies to take advantage of the
best of both.
a. TST
b. SSS
c. TTT
d. none of the above
18: The most popular technology in time-division switching is called the _________.
a. STI
b. ITS
c. TSI
d. none of the above
19: Based on the Clos criteria, if N = 200, then <i>n</i> must be equal to or greater than ____.
a. 10
b. 20
c. 30
d. 40
20: Based on the Clos criteria, if N = 200, then <i>k</i> must be equal to or greater than ____.
a. 21
b. 19
c. 31
d. 41
21: Based on the Clos criteria, if N = 200, then the minimum number of crosspoints is greater than or
equal to _______.
a. 15,200
b. 18,000
c. 42,000
d. 20,000
22: In a one-stage space division switch, if N = 200, the number of crosspoints is ______.
a. 10,000
b. 20,000
c. 40,000
d. 30,000
23: In a three-stage space division switch, if N = 200, the number of crosspoints is ______.
a. 40,000
b. greater than 40,000
c. less than 40,000
d. greater than 100,000
24: A ________ switch combines crossbar switches in several (normally three) stages.
a. multistage
b. multiple crossbar
c. multiple path
d. none of the above
25: In _______ switching, the paths in the circuit are separated from one another spatially.
a. time-division
b. space-division
c. two-dimensional
d. three-dimensional
29: A switch in a datagram network uses a routing table that is based on the ______ address.
a. source
b. destination
c. local
d. none of the above
30: The _______ address in the header of a packet in a datagram network normally remains the same
during the entire journey of the packet.
a. source
b. destination
c. local
d. none of the above
CHAPTER 9
1: A local telephone network is an example of a _______ network.
a. packet-switched
b. circuit-switched
c. message-switched
d. none of the above
2: The local loop has _______ cable that connects the subscriber telephone to the nearest end office.
a. twisted-pair
b. coaxial
c. fiber-optic
d. none of the above
3: Data from a computer are _______; the local loop handles _______ signals.
a. analog; analog
b. analog; digital
c. digital; digital
d. digital; analog
4: _______ is suitable for businesses that require comparable upstream and downstream data rates.
a. VDSL
b. ADSL
c. SDSL
d. (a) and (b)
11: In an HFC network, the downstream data are modulated using the _______ modulation technique.
a. PSK
b. QAM
c. PCM
d. ASK
12: In an HFC network, the upstream data are modulated using the _______ modulation technique.
a. QAM
b. QPSK
c. PCM
d. ASK
13: The standard for data transmission over an HFC network is called _______.
a. MCNS
b. DOCSIS
c. CMTS
d. ADSL
14: The original telephone network, which is referred to as the plain old telephone system (POTS), was
an ________ system.
a. digital
b. analog
c. digital as well as analog
d. none of the above
18: The carrier that handles intra-LATA services is called a(n) _____ .
a. POP
b. IXC
c. LEC
d. none of the above
19: The carrier that handles inter-LATA services is called a(n) _______.
a. POP
b. IXC
c. LEC
d. none of the above
20: In ______signaling, the same circuit is used for both signaling and data.
a. in-band
b. out-of-band
c. mixed
d. none of the above
21: In ________signaling, a portion of the bandwidth is used for signaling and another portion for data.
a. in-band
b. out-of-band
c. mixed
d. none of the above
22: The protocol that is used for signaling in the telephone network is called ______.
a. POP
b. SSS
c. SS7
d. none of the above
23: Telephone companies provide two types of analog services: analog _______ services and analog
_____services.
a. switched; in-band
b. out-of-band; in-band
c. switched; leased
d. leased; out-of-band
24: The two most common digital services are ________ service and ______.
a. switched/56; switched/64
b. switched/56; DDS
c. DDS; swiched 64
d. leased; out-of-band
25: The term <i>modem</i> is a composite word that refers to the two functional entities that make up
the device: a signal _______ and a signal _______.
a. modulator; demodulator
b. demodulator; modulator
c. modern; demo
d. none of the above
27: ______technology is a set of technologies develpoed by the telephone companies to provide high
data rate transmission.
a. ASL
b. DSL
c. LDS
d. none of the above
29: The second generation of cable networks is called a(n) _________ network.
a. HFC
b. HCF
c. CFH
d. none of the above
31: To use a cable network for data transmission, we need two key devices: a ______ and a _________
a. CM; CMS
b. CT; CMTS
c. CM; CMTS
d. none of the above
CHAPTER 10
1: Which error detection method uses one's complement arithmetic?
a. Simple parity check
b. Two-dimensional parity check
c. CRC
d. Checksum
2: Which error detection method consists of just one redundant bit per data unit?
a. Simple parity check
b. Two-dimensional parity check
c. CRC
d. Checksum
6: In ________ error correction, the receiver corrects errors without requesting retransmission.
a. backward
b. onward
c. forward
d. none of the above
7: In ________ error correction, the receiver asks the sender to send the data again.
a. backward
b. retransmission
c. forward
d. none of the above
8: We can divide coding schemes into two broad categories: ________ and ______coding.
a. block; linear
b. linear; nonlinear
c. block; convolution
d. none of the above
10: In modulo-2 arithmetic, we use the ______ operation for both addition and subtraction.
a. XOR
b. OR
c. AND
d. none of the above
11: In _____ coding, we divide our message into blocks, each of <i>k</i> bits, called ___.
a. block; blockwords
b. linear; datawords
c. block; datawords
d. none of the above
12: We add <i>r</i> redundant bits to each block to make the length <i>n</i> = <i>k</i> + <i>r</i>. The
resulting <i>n</i>-bit blocks are called _________.
a. datawords
b. blockwords
c. codewords
d. none of the above
13: The ________ between two words is the number of differences between corresponding bits.
a. Hamming code
b. Hamming distance
c. Hamming rule
d. none of the above
14: To guarantee the detection of up to 5 errors in all cases, the minimum Hamming distance in a block
code must be _______.
a. 5
b. 6
c. 11
d. none of the above
15: To guarantee correction of up to 5 errors in all cases, the minimum Hamming distance in a block
code must be ________.
a. 5
b. 6
c. 11
d. none of the above
16: In a linear block code, the _______ of any two valid codewords creates another valid codeword.
a. XORing
b. ORing
c. ANDing
d. none of the above
18: _______codes are special linear block codes with one extra property. If a codeword is rotated, the
result is another codeword.
a. Non-linear
b. Convolution
c. Cyclic
d. none of the above
20: In modulo-11 arithmetic, we use only the integers in the range ______, inclusive.
a. 1 to 10
b. 1 to 11
c. 0 to 10
d. none of the above
26: In block coding, if n = 5, the maximum Hamming distance between two codewords is ________.
a. 2
b. 3
c. 5
d. none of the above
27: If the Hamming distance between a dataword and the corresponding codeword is three, there are
_____ bits in error.
a. 3
b. 4
c. 5
d. none of the above
CHAPTER 11
1: In a Go-Back-<i>N</i> ARQ, if the window size is 63, what is the range of sequence numbers?
a. 0 to 63
b. 0 to 64
c. 1 to 63
d. 1 to 64
2: In Go-Back-<i>N</i> ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an
ACK _______ to the sender.
a. 5
b. 6
c. 7
d. any of the above
4: For Stop-and-Wait ARQ, for <i>10</i> data packets sent, _______ acknowledgments are needed.
a. exactly 10
b. less than 10
c. more than 10
d. none of the above
6: Data link control deals with the design and procedures for ______ communication.
a. node-to-node
b. host-to-host
c. process-to-process
d. none of the above
7: _______ in the data link layer separates a message from one source to a destination, or from other
messages going from other sources to other destinations.
a. Digitizing
b. Controlling
c. Framing
d. none of the above
14: Byte stuffing means adding a special byte to the data section of the frame when there is a character
with the same pattern as the ______.
a. header
b. trailer
c. flag
d. none of the above
16: Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits
with the same pattern as the ________.
a. header
b. trailer
c. flag
d. none of the above
17: _______ control refers to a set of procedures used to restrict the amount of data that the sender can
send before waiting for acknowledgment.
a. Flow
b. Error
c. Transmission
d. none of the above
19: The Simplest Protocol and the Stop-and-Wait Protocol are for ______ channels.
a. noisy
b. noiseless
c. either (a) or (b)
d. neither (a) nor (b)
20: The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for ______ channels.
a. noisy
b. noiseless
c. either (a) or (b)
d. neither (a) nor (b)
21: The ____ Protocol has neither flow nor error control.
a. Stop-and-Wait
b. Simplest
c. Go-Back-N ARQ
d. Selective-Repeat ARQ
22: The _______Protocol has flow control, but not error control.
a. Stop-and-Wait
b. Simplest
c. Go-Back-N ARQ
d. Selective-Repeat ARQ
23: The _______Protocol has both flow control and error control.
a. Stop-and-Wait
b. Go-Back-N ARQ
c. Selective-Repeat ARQ
d. both (b) and (c)
24: In the _____ Protocol, the sender sends its frames one after another with no regard to the receiver.
a. Stop-and-Wait
b. Simplest
c. Go-Back-N ARQ
d. Selective-Repeat ARQ
25: In the _____ Protocol, the sender sends one frame, stops until it receives confirmation from the
receiver, and then sends the next frame.
a. Stop-and-Wait
b. Simplest
c. Go-Back-N ARQ
d. Selective-Repeat ARQ
26: The _________Protocol, adds a simple error control mechanism to the _______Protocol.
a. Stop-and-Wait ARQ; Stop-and-Wait
b. Go-Back-N ARQ; Stop-and-Wait
c. Selective Repeat ARQ; Go-Back-N ARQ
d. none of the above
27: In the _________Protocol, if no acknowledgment for a frame has arrived, we resend all outstanding
frames.
a. Stop-and-Wait ARQ
b. Go-Back-N ARQ
c. Selective-Repeat ARQ
d. none of the above
28: In the _________ protocol we avoid unnecessary transmission by sending only frames that are
corrupted.
a. Stop-and-Wait ARQ
b. Go-Back-N ARQ
c. Selective-Repeat ARQ
d. none of the above
30: In Go-Back-<i>N</i> ARQ, if 5 is the number of bits for the sequence number, then the maximum
size of the send window must be _____
a. 15
b. 16
c. 31
d. 1
31: In Go-Back-N ARQ, if 5 is the number of bits for the sequence number, then the maximum size of the
receive window must be _____
a. 15
b. 16
c. 31
d. 1
32: In Selective Repeat ARQ, if 5 is the number of bits for the sequence number, then the maximum size
of the send window must be _____
a. 15
b. 16
c. 31
d. 1
33: In Selective Repeat ARQ, if 5 is the number of bits for the sequence number, then the maximum size
of the receive window must be _____
a. 15
b. 16
c. 31
d. 1
34: High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-point
and multipoint links.
a. bit-oriented
b. byte-oriented
c. character-oriented
d. none of the above
35: The most common protocol for point-to-point access is the Point-to-Point Protocol (PPP), which is a
_________protocol.
a. bit-oriented
b. byte-oriented
c. character-oriented
d. none of the above
36: _______ control refers to a set of procedures used to restrict the amount of data that the sender can
send before waiting for acknowledgment.
a. Flow
b. Error
c. Transmission
d. none of the above
37: _________control in the data link layer is based on automatic repeat request, which is the
retransmission of data.
a. Flow
b. Error
c. Transmission
d. none of the above
38: In Stop-and-Wait ARQ, we use sequence numbers to number the frames. The sequence numbers
are based on __________arithmetic.
a. modulo-2
b. modulo-4
c. modulo-m
d. none of the above
39: In Stop-and-Wait ARQ, the acknowledgment number always announces in ______ arithmetic the
sequence number of the next frame expected.
a. modulo-2
b. modulo-4
c. modulo-m
d. none of the above
40: In the Go-Back-N Protocol, if the size of the sequence number field is 8, the sequence numbers are
in ________ arithmetic,
a. modulo-2
b. modulo- 8
c. modulo-256
d. none of the above
41: Stop-and-Wait ARQ is a special case of Go-Back-N ARQ in which the size of the send window is 1.
a. 2
b. 1
c. 8
d. none of the above
42: In _________, the station configuration is unbalanced. We have one primary station and multiple
secondary stations.
a. ABM
b. NRM
c. ARM
d. NBM
43: In _________, the configuration is balanced. The link is point-to-point, and each station can function
as a primary and a secondary.
a. ABM
b. NRM
c. ARM
d. NBM
44: In PPP, the ________ is responsible for establishing, maintaining, configuring, and terminating links.
a. NCP
b. LCP
c. CHAP
d. PAP
46: In PPP, _______ is a three-way hand-shaking authentication protocol in which the password is kept
secret; it is never sent online.
a. NCP
b. LCP
c. CHAP
d. PAP
CHAPTER 12
1: In ________ each station sends a frame whenever it has a frame to send.
a. pure ALOHA
b. slotted ALOHA
c. both (a) and (b)
d. neither (a) nor (b)
2: In pure ALOHA, the vulnerable time is ______ the frame transmission time.
a. the same as
b. two times
c. three times
d. none of the above
4: In __________, each station is forced to send only at the beginning of the time slot.
a. pure ALOHA
b. slotted ALOHA
c. both (a) and (b)
d. neither (a) nor (b)
5: In slotted ALOHA, the vulnerable time is ______ the frame transmission time.
a. the same as
b. two times
c. three times
d. none of the above
8: In the _________ method, after the station finds the line idle, it sends its frame immediately. If the line
is not idle, it continuously senses the line until it finds it idle.
a. nonpersistent
b. 1-persistent
c. <i>p</i>-persistent
d. none of the above
9: In the ________method, a station that has a frame to send senses the line. If the line is idle, it sends
immediately. If the line is not idle, it waits a random amount of time and then senses the line again.
a. nonpersistent
b. 1-persistent
c. <i>p</i>-persistent
d. none of the above
10: In the _______method, after the station finds the line idle it sends or refrain from sending based on
the outcome of a random number generator. If the line is busy, it tries again.
a. nonpersistent
b. 1-persistent
c. <i>p</i>-persistent
d. none of the above
12: In ___________ methods, no station is superior to another station and none is assigned the control
over another.
a. random access
b. controlled access
c. channelization
d. none of the above
13: In ______, the chance of collision can be reduced if a station senses the medium before trying to
use it.
a. MA
b. CSMA
c. FDMA
d. CDMA
14: ________ requires that each station first listen to the medium before sending.
a. MA
b. CSMA
c. FDMA
d. CDMA
16: In ________, a station monitors the medium after it sends a frame to see if the transmission was
successful. If so, the station is finished. If, however, there is a collision, the frame is sent again.
a. CSMA/CA
b. CSMA/CD
c. either (a) or (b)
d. both (a) and (b)
18: In _______, collisions are avoided through the use of three strategies: the interframe space, the
contention window, and acknowledgments.
a. CSMA/CA
b. CSMA/CD
c. either (a) or (b)
d. both (a) and (b)
19: In _______ methods, the stations consult one another to find which station has the right to send.
a. random access
b. controlled access
c. channelization
d. none of the above
20: In _______ methods, a station cannot send unless it has been authorized by other stations.
a. random access
b. controlled access
c. channelization
d. none of the above
22: In the ________ method, a station needs to make a reservation before sending data. Time is divided
into intervals.
a. reservation
b. polling
c. token passing
d. none of the above
23: In the _____ method, time is divided into intervals. In each interval, a reservation frame precedes the
data frames sent in that interval.
a. reservation
b. polling
c. token passing
d. none of the above
24: In the ______ method, all data exchanges must be made through the primary device even when the
ultimate destination is a secondary device.
a. reservation
b. polling
c. token passing
d. none of the above
25: In the _______ method, the primary device controls the link; the secondary devices follow its
instructions.
a. reservation
b. polling
c. token passing
d. none of the above
26: In the _______ method, the stations in a network are organized in a logical ring.
a. reservation
b. polling
c. token passing
d. none of the above
27: In the _______ method, each station has a predecessor and a successor.
a. reservation
b. polling
c. token passing
d. none of the above
28: In the _________ method, a special packet called a ______ circulates through the ring.
a. reservation: control frame
b. polling: poll request
c. token passing: token
d. none of the above
29: _________ is a multiple-access method in which the available bandwidth of a link is shared in time,
frequency, or through code, between different stations.
a. Random access
b. Controlled access
c. Channelization
d. none of the above
32: In ______, each station is allocated a band to send its data. In other words, each band is reserved
for a specific station, and it belongs to the station all the time.
a. FDMA
b. TDMA
c. CDMA
d. none of the above
33: In _______, the stations share the bandwidth of the channel in time.
a. FDMA
b. TDMA
c. CDMA
d. none of the above
34: In _____, each station is allocated a time slot during which it can send data. Each station transmits
its data in its assigned time slot.
a. FDMA
b. TDMA
c. CDMA
d. none of the above
35: In _____, each station transmits its data in its assigned time slot.
a. FDMA
b. TDMA
c. CDMA
d. none of the above
36: In ______, the stations use different codes to achieve multiple access.
a. FDMA
b. TDMA
c. CDMA
d. none of the above
37: _______ is based on coding theory and uses sequences of numbers called chips.
a. FDMA
b. TDMA
c. CDMA
d. none of the above
38: In _______, the sequences are generated using orthogonal codes such the Walsh tables.
a. FDMA
b. TDMA
c. CDMA
d. none of the above
CHAPTER 13
1: What is the hexadecimal equivalent of the Ethernet address 01011010 00010001 01010101 00011000
10101010 00001111?
a. 5A:88:AA:18:55:F0
b. 5A:81:BA:81:AA:0F
c. 5A:18:5A:18:55:0F
d. 5A:11:55:18:AA:0F
7: The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-
Mbps Ethernet.
a. 1-persistent
b. p-persistent
c. non-persistent
d. none of the above
8: The _______ layer of Ethernet consists of the LLC sublayer and the MAC sublayer.
a. data link
b. physical
c. network
d. none of the above
9: The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
a. LLC
b. MII
c. MAC
d. none of the above
10: Each station on an Ethernet network has a unique _______ address imprinted on its network
interface card (NIC).
a. 5-byte
b. 32-bit
c. 48-bit
d. none of the above
12: The maximum frame length for 10-Mbps Ethernet is ________ bytes.
a. 1518
b. 1500
c. 1200
d. none of the above
18: In _________, autonegotiation allows two devices to negotiate the mode or data rate of operation.
a. Standard
b. Fast Ethernet
c. Gigabit Ethernet
d. Ten-Gigabit Ethernet
24: __________ uses two optical fibers and a short-wave laser source,
a. 1000Base-SX
b. 1000Base-LX
c. 1000Base-T
d. none of the above
30: In Ethernet addressing, if the least significant bit of the first byte is 0, the address is _________.
a. unicast
b. multicast
c. broadcast
d. none of the above
31: In Ethernet addressing, if the least significant bit of the first byte is 1, the address is _________.
a. unicast
b. multicast
c. broadcast
d. none of the above
32: In Ethernet addressing, if all the bits are 1s, the address is _________.
a. unicast
b. multicast
c. broadcast
d. none of the above
33: ______defines a protocol data unit (PDU) that is somewhat similar to that of HDLC.
a. MAC
b. LLC
c. LLU
d. none of the above
34: The purpose of the _______ is to provide flow and error control for the upper-layer protocols that
actually demand these services
a. MAC
b. LLC
c. LLU
d. none of the above
35: In the Ethernet, the _______field is actually added at the physical layer and is not (formally) part of
the frame.
a. CRC
b. preamble
c. address
d. none of the above
36: In the Ethernet frame, the _______ field contains error detection information.
a. CRC
b. preamble
c. address
d. none of the above
38: 100Base-TX uses _________ block coding and ________ line coding.
a. 4B/5B; NRZ
b. 8B/10B; NRZ
c. 4B/5B; MLT-3
d. 8B/10B; NRZ
39: 100Base-FX uses _________ block coding and ________ line coding.
a. 4B/5B; NRZ-I
b. 8B/10B; NRZ
c. 4B/5B; MLT-3
d. 8B/10B; NRZ
41: 1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding and ________ line
coding.
a. 4B/5B; NRZ
b. 8B/10B; NRZ
c. 4B/5B; MLT-3
d. 8B/10B; NRZ
2: In IEEE 802.11, a ___ is made of stationary or mobile wireless stations and an optional central base
station, known as the access point (AP).
a. ESS
b. BSS
c. CSS
d. none of the above
5: In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two
________.
a. BSSs
b. ESSs
c. APs
d. none of the above
6: In IEEE 802.11, a station with ________ mobility is either stationary (not moving) or moving only
inside a BSS.
a. no-transition
b. BSS-transition
c. ESS-transition
d. none of the above
7: In IEEE 802.11, a station with ________mobility can move from one BSS to another, but the
movement is confined inside one ESS.
a. no-transition
b. BSS-transition
c. ESS-transition
d. none of the above
8: In IEEE 802.11, a station with ________ mobility can move from one ESS to another.
a. no-transition
b. BSS-transition
c. ESS-transition
d. none of the above
9: In IEEE 802.11, _______ is an optional access method that can be implemented in an infrastructure
network (not in an ad hoc network).
a. DCF
b. PCF
c. either (a) or (b)
d. neither (a) nor (b)
10: In IEEE 802.11, when a frame is going from one station in a BSS to another without passing through
the distribution system, the address flag is _____
a. 00
b. 01
c. 10
d. 11
11: In IEEE 802.11, when a frame is coming from an AP and going to a station, the address flag is
_______.
a. 00
b. 01
c. 10
d. 11
12: In IEEE 802.11, when a frame is going from a station to an AP, the address flag is _____.
a. 00
b. 01
c. 10
d. 11
13: In IEEE 802.11, when a frame is going from one AP to another AP in a wireless distribution system,
the address flag is _____
a. 00
b. 01
c. 10
d. 11
14: The IEEE 802.11 standard for wireless LANs defines two services: ______ and _______.
a. BSS; ASS
b. ESS; SSS
c. BSS; ESS
d. BSS; DCF
15: In IEEE 802.11, the access method used in the DCF sublayer is _________.
a. ALOHA
b. CSMA/CA
c. CSMA/CD
d. none of the above
16: In IEEE 802.11, the access method used in the PCF sublayer is ______.
a. contention
b. controlled
c. polling
d. none of the above
17: In IEEE 802.11, the ______ is a timer used for collision avoidance.
a. NAV
b. BSS
c. ESS
d. none of the above
18: In IEEE 802.11, the MAC layer frame has ______ fields.
a. four
b. five
c. six
d. none of the above
28: The IEEE 802.11 wireless LANs use ________ types of frames.
a. four
b. five
c. six
d. none of the above
29: Bluetooth is a _______ technology that connects devices (called gadgets) in a small area.
a. wired LAN
b. wireless LAN
c. VLAN
d. none of the above
32: A Bluetooth network consists of _____ primary device(s) and up to ____ secondary devices.
a. one; five
b. five; three
c. two; six
d. one; seven
33: The RTS and CTS frames in CSMA/CA ____ solve the hidden station problem. The RTS and CTS
frames in CSMA/CA ____ solve the exposed station problem.
a. can; cannot
b. cannot; can
c. can; can
d. cannot; cannot
34: In Bluetooth, the current data rate is ____Mbps
a. 2
b. 5
c. 11
d. none of the above
35: In Bluetooth, the _______ layer is roughly equivalent to the physical layer of the Internet model.
a. radio
b. baseband
c. L2CAP
d. none of the above
36: In Bluetooth, the _____layer is roughly equivalent to the MAC sublayer in LANs.
a. radio
b. baseband
c. L2CAP
d. none of the above
37: In Bluetooth, the L2CAP sublayer, is roughly equivalent to the LLC sublayer in LANs.
a. radio
b. baseband
c. L2CAP
d. none of the above
39: In Bluetooth, the _____ link is used when avoiding latency (delay in data delivery) is more important
than integrity (error-free delivery).
a. SCO
b. ACL
c. ACO
d. SCL
40: In Bluetooth, the _____ link is used when data integrity is more important than avoiding latency.
a. SCO
b. ACL
c. ACO
d. SCL
41: Bluetooth uses ______method in the physical layer to avoid interference from other devices or other
networks.
a. DSSS
b. FHSS
c. FDMA
d. none of the above
CHAPTER 15
1: A repeater is a connecting device that operates in the _______ layer of the Internet model.
a. physical
b. data link
c. network
d. all of the above
2: A _______ regenerates a signal, connects segments of a LAN, and has no filtering capability.
a. repeater
b. bridge
c. router
d. none of the above
3: A _______ is a connecting device that operates in the physical and data link layers of the Internet
model.
a. repeater
b. bridge
c. router
d. none of the above
4: A ________ bridge can forward and filter frames and automatically build its forwarding table.
a. simple
b. dual
c. transparent
d. none of the above
12: In a star-topology Ethernet LAN, _______ is just a point where the signals coming from different
stations collide; it is the collision point.
a. An active hub
b. A passive hub
c. either (a) or (b)
d. neither (a) nor (b)
13: ________ is part of the media; its location in the Internet model is below the physical layer.
a. An active hub
b. A passive hub
c. either (a) or (b)
d. neither (a) nor (b)
15: A ________receives a signal and, before it becomes too weak or corrupted, regenerates the original
bit pattern. It then sends the refreshed signal.
a. passive hub
b. repeater
c. bridge
d. router
17: ________ is actually a multiport repeater. It is normally used to create connections between stations
in a physical star topology.
a. An active hub
b. A passive hub
c. either (a) or (b)
d. neither (a) nor (b)
18: A ________ operates in both the physical and the data link layer.
a. passive hub
b. repeater
c. bridge
d. router
19: A _______ can check the MAC addresses contained in the frame.
a. passive hub
b. repeater
c. bridge
d. router
21: A ________ is a device in which the stations are completely unaware of its existence.
a. passive hub
b. repeater
c. simple bridge
d. transparent bridge
22: IEEE 802.1d specification, defines _________ criteria for a transparent bridges.
a. two
b. three
c. four
d. none of the above
24: In a bridged LAN, the _______ algorithm creates a topology in which each LAN can be reached from
any other LAN through one path only.
a. spanning tree
b. binary tree
c. unary tree
d. none of the above
27: Some new two-layer switches, called _______ switches, have been designed to forward the frame
as soon as they check the MAC addresses in the header of the frame.
a. cut-through
b. go-through
c. come-through
d. none of the above
28: A _______ is a three-layer device that handles packets based on their logical addresses.
a. repeater
b. bridge
c. router
d. none of the above
29: A ______ normally connects LANs and WANs in the Internet and has a table that is used for making
decisions about the route.
a. repeater
b. bridge
c. router
d. none of the above
31: A ________ is normally a computer that operates in all five layers of the Internet model or seven
layers of OSI model.
a. repeater
b. bridge
c. router
d. gateway
32: A _____ can be used as a connecting device between two internetworks that use different models.
a. repeater
b. bridge
c. router
d. gateway
34: A ________ link acts as a LAN in a remote backbone connected by remote bridges.
a. point-to-point
b. multipoint
c. multidrop
d. none of the above
36: In a(n) _______ configuration, the administrator types the port numbers, the IP addresses, or other
characteristics, using the VLAN software.
a. manual
b. automatic
c. semiautomatic
d. none of the above
37: In a(n) _____ configuration, the stations are automatically connected or disconnected from a VLAN
using criteria defined by the administrator.
a. manual
b. automatic
c. semiautomatic
d. none of the above
38: In a(n) ______ configuration, the initializing is done manually, with migrations done automatically.
a. manual
b. automatic
c. semiautomatic
d. none of the above
CHAPTER 16
1: _______ is a first-generation cellular phone system.
a. AMPS
b. D-AMPS
c. GSM
d. none of the above
6: The __________ cellular phone system will provide universal personal communication.
a. first-generation
b. second-generation
c. third-generation
d. none of the above
7: In a ______ handoff, a mobile station only communicates with one base station.
a. hard
b. soft
c. medium
d. none of the above
8: In a ______ handoff, a mobile station can communicate with two base stations at the same time.
a. hard
b. soft
c. medium
d. none of the above
13: AMPS uses ______ to divide each 25-MHz band into channels.
a. FDMA
b. TDMA
c. CDMA
d. none of the above
14: D-AMPS uses ______ to divide each 25-MHz band into channels.
a. FDMA
b. TDMA
c. CDMA
d. both (a) and (b)
23: In the third generation of cellular phones, ______ uses a combination of W-CDMA and TDMA.
a. IMT-DS
b. IMT-MC
c. IMT-TC
d. IMT-SC
25: The period of a satellite, the time required for a satellite to make a complete trip around the Earth, is
determined by _________ law.
a. Kepler's
b. Newton's
c. Ohm's
d. none of the above
26: The signal from a satellite is normally aimed at a specific area called the _________.
a. path
b. effect
c. footprint
d. none of the above
32: A GEO is at the ________ orbit and revolves in phase with Earth.
a. equatorial
b. polar
c. inclined
d. none of the above
34: ________ satellites provide time and location information for vehicles and ships.
a. GPS
b. Iridium
c. Teledesic
d. none of the above
36: ________ satellites can provide direct universal voice and data communications for handheld
terminals.
a. GPS
b. Iridium
c. Teledesic
d. none of the above
CHAPTER 17
1: _______ is a standard developed by ANSI for fiber-optic networks.
a. SONET
b. SDH
c. either (a) or (b)
d. neither (a) nor (b)
23: A ______is the end-to-end portion of the network between two STS multiplexers.
a. section
b. line
c. path
d. none of the above
24: The ______ layer is responsible for the movement of a signal from its optical source to its optical
destination.
a. section
b. line
c. path
d. photonic
25: The ____ layer is responsible for the movement of a signal across a physical line.
a. section
b. line
c. path
d. photonic
26: The ______ layer is responsible for the movement of a signal across a physical section.
a. section
b. line
c. path
d. photonic
27: The _______ layer corresponds to the physical layer of the OSI model.
a. section
b. line
c. path
d. photonic
31: In SONET, for each frame, the bytes are transmitted __________.
a. from left to the right, top to bottom
b. from right to the left, bottom to top
c. from left to the right, bottom to top
d. from right to the left, top to bottom
32: In SONET, for each byte, the bits are transmitted ____________.
a. from least significant to the most significant
b. from most significant to the least significant
c. two at a time
d. three at a time
33: Each ________in a SONET frame can carry a digitized voice channel.
a. bit
b. byte
c. frame
d. none of the above
37: In ________ APS, there are normally two lines: one working line and one protection line. Both lines
are active all the time.
a. one-plus-one
b. one-to-one
c. one-to-many
d. none of the above
38: In ______ APS, there is one working line and one protection line. The data are normally sent on the
working line until it fails.
a. one-plus-one
b. one-to-one
c. one-to-many
d. none of the above
39: In ________APS, there is only one protection line for many working lines. When a failure occurs in
one of the working lines, the protection line takes control until the failed line is repaired.
a. one-plus-one
b. one-to-one
c. one-to-many
d. none of the above
CHAPTER 18
1: ________ is a virtual-circuit wide-area network that was designed in response to demands for a new
type of WAN in the late 1980s and early 1990s.
a. X.25
b. Frame Relay
c. ATM
d. none of the above
4: In Frame Relay, when a _____ is selected, the corresponding table entry is recorded for all switches
by the administrator
a. PVC
b. SVC
c. either (a) or (b)
d. neither (a) nor (b)
5: In Frame Relay, when. ______ is selected, it requires establishing and terminating phases
a. a PVC
b. an SVC
c. either (a) or (b)
d. neither (a) nor (b)
7: At the data link layer, Frame Relay uses a protocol that supports _____control.
a. flow
b. error
c. either (a) or (b)
d. neither (a) nor (b)
9: In Frame Relay, the EA field defines the number of bytes; it is _____ in the last byte of the address.
a. 0
b. 1
c. 2
d. 3
10: To handle frames arriving from other protocols, Frame Relay uses a device called a _________.
a. VOFR
b. FRAD
c. MUX
d. none of the above
11: Frame Relay networks offer an option called ______________ that sends voice through the network.
a. VOFR
b. FRAD
c. MUX
d. none of the above
12: ________ is the cell relay protocol designed by the corresponding Forum and adopted by the ITU-T.
a. X.25
b. Frame Relay
c. ATM
d. none of the above
13: A _______ is defined as a small, fixed-size block of information.
a. frame
b. packet
c. cell
d. none of the above
19: ______ eliminates the varying delay times associated with different-size packets.
a. X.25
b. Frame Relay
c. ATM
d. all of the above
20: A(n) ______ is the interface between a user and an ATM switch.
a. UNI
b. NNI
c. NNN
d. None of the above
23: In ATM, the _______layer accepts transmissions from upper-layer services and maps them into ATM
cells.
a. physical
b. ATM
c. AAL
d. none of the above
24: In ATM, the ______ layer provides routing, traffic management, switching, and multiplexing services.
a. physical
b. ATM
c. AAL
d. none of the above
25: In ATM, the _____ layer defines the transmission medium, bit transmission, encoding, and electrical-
to-optical transformation.
a. physical
b. ATM layer
c. AAL
d. none of the above
29: In ATM, _____ is for conventional packet switching (virtual-circuit approach or datagram approach).
a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
INCORRECT
30: In ATM, ______ is for packets requiring no sequencing and no error control mechanism.
a. AAL1
b. AAL2
c. AAL3/4
d. AAL5
31: ________ technology can be adapted for use in a LAN (ATM LAN).
a. X.25
b. Frame Relay
c. ATM
d. none of the above
33: In a _______ ATM LAN, the backbone that connects traditional LANs uses ATM technology.
a. pure
b. legacy
c. mixed architecture
d. none of the above
34: A _______ ATM LAN combines features of a pure ATM LAN and a legacy ATM LAN.
a. pure
b. legacy
c. mixed architecture
d. none of the above
CHAPTER 19
1: An IPv4 address consists of _______ bits.
a. 4
b. 8
c. 32
d. 64
2: In IPv4, class _______ has the greatest number of addresses in each block.
a. A
b. B
c. C
d. D
16: Which address could be the beginning address of a block of 32 classless addresses?
a. 2.4.6.5
b. 2.4.6.16
c. 2.4.6.64
d. none of the above
17: Which address could be the beginning address of a block of 16 classless addresses?
a. 2.4.6.5
b. 2.4.6.15
c. 2.4.6.62
d. none of the above
18: Which address could be the beginning address of a block of 256 classless addresses?
a. 2.4.6.5
b. 2.4.6.15
c. 2.4.6.0
d. none of the above
19: What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/27?
a. 12.2.2.0
b. 12.2.2.32
c. 12.2.2.64
d. none of the above
20: What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/10?
a. 12.0.0.0
b. 12.2.0.0
c. 12.2.2.2
d. none of the above
21: What is the first address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
a. 12.2.2.0
b. 12.2.2.96
c. 12.2.2.112
d. none of the above
22: Find the number of addresses in a block of classless addresses if one of the addresses
is 12.2.2.7/24.
a. 32
b. 64
c. 256
d. none of the above
23: Find the number of addresses in a block of classless addresses if one of the addresses
is 12.2.2.7/30.
a. 2
b. 4
c. 8
d. none of the above
24: What is the last address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
a. 12.2.2.16
b. 12.2.2.112
c. 12.2.2.127
d. none of the above
25: What is the last address of a block of classless addresses if one of the addresses is 12.2.2.6/30?
a. 12.2.2.2
b. 12.2.2.6
c. 12.2.2.7
d. none of the above
26: An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets.
What is the subnet prefix length?
a. /20
b. /24
c. /25
d. none of the above
27: An organization is granted a block; one address is 2.2.2.64/25. If the subnet prefix length is /28, what
is the maximum number of subnets?
a. 2
b. 4
c. 8
d. none of the above
28: An organization is granted a block of classless addresses with the starting address 199.34.76.64/28.
How many addresses are granted?
a. 8
b. 16
c. 32
d. none of the above
30: An organization is granted a block of classless addresses with the starting address 199.34.32.0/27.
How many addresses are granted?
a. 8
b. 16
c. 32
d. none of the above
34: In classless addressing, the ______ is another name for the common part of the address range.
a. suffix
b. prefix
c. netid
d. none of the above
35: In classless addressing, the _______ is the varying part (similar to the hostid).
a. suffix
b. prefix
c. hostid
d. none of the above
43: In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____
hexadecimal digits in length.
a. 8: 2
b. 8: 3
c. 8: 4
d. none of the above
47: In IPv6, ____ address defines a group of computers with addresses that have the same prefix.
a. a unicast
b. a multicast
c. an anycast
d. none of the above
49: In IPv6, the ________ prefix defines the purpose of the address.
a. type
b. purpose
c. both a and b
d. none of the above
50: In IPv6, the___________ address is generally used by a normal host as a unicast address.
a. provider-based unicast
b. link local
c. site local
d. none of the above
51: In IPv6, a _________address comprises 80 bits of zero, followed by 16 bits of one, followed by the
32-bit IPv4 address.
a. link local
b. site local
c. mapped
d. none of the above
52: In IPv6, a ___________ address is an address of 96 bits of zero followed by 32 bits of IPv4 address.
a. link local
b. site local
c. mapped
d. none of the above
53: In IPv6, a _______ address is used if a LAN uses the Internet protocols but is not connected to the
Internet for security reasons.
a. link local
b. site local
c. mapped
d. none of the above
54: In IPv6, a ______address is used if a site with several networks uses the Internet protocols but is not
connected to the Internet for security reasons.
a. link local
b. site local
c. mapped
d. none of the above
CHAPTER 20
1: A best-effort delivery service such as IPv4 includes _______.
a. error checking
b. error correction
c. datagram acknowledgment
d. none of the above
3: In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is
400 bytes?
a. 428
b. 407
c. 107
d. 427
4: In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of
40,000?
a. 39,988
b. 40,012
c. 40,048
d. 39,952
5: An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true?
a. The <i>do not fragment</i> bit is set to 1 for all three datagrams.
b. The <i>more fragment</i> bit is set to 0 for all three datagrams.
c. The identification field is the same for all three datagrams.
d. The offset field is the same for all three datagrams.
6: In IPv4, if the fragment offset has a value of 100, it means that _______.
a. the datagram has not been fragmented
b. the datagram is 100 bytes in size
c. the first byte of the datagram is byte 100
d. the first byte of the datagram is byte 800
7: In IPv4, what is needed to determine the number of the last byte of a fragment?
a. Identification number
b. Offset number
c. Total length
d. (b) and (c)
10: In IPv6, the _______ field in the base header restricts the lifetime of a datagram.
a. version
b. next-header
c. hop limit
d. neighbor-advertisement
11: The ________ protocol is the transmission mechanism used by the TCP/IP suite.
a. ARP
b. IP
c. RARP
d. none of the above
13: The term ________ means that IP provides no error checking or tracking. IP assumes the
unreliability of the underlying layers and does its best to get a transmission through to its destination, but
with no guarantees.
a. reliable delivery
b. connection-oriented delivery
c. best-effort delivery
d. none of the above
15: In IPv4, which field or bit value unambiguously identifies the datagram as a fragment?
a. <i>Do not fragment</i> bit ? 0
b. <i>More Fragment</i> bit ? 0
c. Fragment offset = 1000
d. none of the above
17: In IPv4, when a datagram is encapsulated in a frame, the total size of the datagram must be less
than the _______.
a. MUT
b. MAT
c. MTU
d. none of the above
18: The IPv4 header field formerly known as the service type field is now called the _______ field.
a. IETF
b. checksum
c. differentiated services
d. none of the above
19: In IPv6, options are inserted between the _________ and the ___________ data.
a. base header; extension header
b. base header; upper-layer data
c. base header; frame header
d. none of the above
21: In IPv6, when a datagram needs to be discarded in a congested network, the decision is based on
the _______ field in the base header.
a. hop limit
b. priority
c. next header
d. none of the above
22: In IPv6, the _______ field in the base header and the sender IP address combine to indicate a
unique path identifier for a specific flow of data.
a. flow label
b. next header
c. hop limit
d. destination IP address
CHAPTER 21
1: A _______ address is an internetwork address with universal jurisdiction.
a. physical
b. logical
c. a and b
d. none of the above
4: If the sender is a host and wants to send a packet to another host on the same network, the logical
address that must be mapped to a physical address is ______.
a. the destination IP address in the datagram header
b. the IP address of the router found in the routing table
c. either a or b
d. none of the above
5: If the sender is a host and wants to send a packet to another host on another network, the logical
address that must be mapped to a physical address is ______.
a. the destination IP address in the datagram header
b. the IP address of the router found in the routing table
c. either a or b
d. none of the above
6: The sender is a router that has received a datagram destined for a host on another network. The
logical address that must be mapped to a physical address is ______.
a. the destination IP address in the datagram header
b. the IP address of the router found in the routing table
c. either a or b
d. none of the above
7: The sender is a router that has received a datagram destined for a host on the same network. The
logical address that must be mapped to a physical address is ______.
a. the destination IP address in the datagram header
b. the IP address of the router found in the routing table
c. either a or b
d. none of the above
8: In _______, a table associating a logical address with a physical address is updated manually.
a. static mapping
b. dynamic mapping
c. physical mapping
d. none of the above
9: _______ is a dynamic mapping protocol in which a physical address is found for a given logical
address.
a. ARP
b. RARP
c. both a and b
d. none of the above
16: ICMP messages are divided into two broad categories: _____________.
a. query and error reporting messages
b. request and response messages
c. request and reply messages
d. none of the above
17: An ICMP message has _____ header and a variable-size data section.
a. a 16-byte
b. a 32-byte
c. an 8-byte
d. none of the above
26: The least significant 23 bits in a 48-bit Ethernet address identify a ________.
a. multicast router
b. host
c. multicast group
d. none of the above
27: The _______ field of the IGMP message is all zeros in a query message.
a. version
b. type
c. group address
d. none of the above
30: If four hosts on a network belong to the same group, a total of _______ sent in response to a general
query message.
a. one membership report is
b. two membership reports are
c. three membership reports are
d. none of the above
34: The IP packet that carries an IGMP packet has a value of _______ in its protocol field.
a. 3
b. 2
c. 1
d. none of the above
CHAPTER 22
1: In _______ delivery, both the deliverer of the IP packet and the destination are on the same network.
a. a connectionless
b. a direct
c. an indirect
d. none of the above
2: In _______ delivery, the deliverer of the IP packet and the destination are on different networks.
a. a connection-oriented
b. a direct
c. an indirect
d. none of the above
3: In _______ forwarding, the full IP address of a destination is given in the routing table.
a. next-hop
b. network-specific
c. host-specific
d. default
4: In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table.
a. next-hop
b. network-specific
c. host-specific
d. default
5: In _______ forwarding, the destination address is a network address in the routing table.
a. next-hop
b. network-specific
c. host-specific
d. default
6: In _______ forwarding, the routing table holds the address of just the next hop instead of complete
route information.
a. next-hop
b. network-specific
c. host-specific
d. default
7: The idea of address aggregation was designed to alleviate the increase in routing table entries when
using ________.
a. classful addressing
b. classless addressing
c. both a and b
d. none of the above
8: The principle of ________ states that the routing table is sorted from the longest mask to the shortest
mask.
a. first mask matching
b. shortest mask matching
c. longest mask matching
d. none of the above
9: The use of hierarchy in routing tables can ________ the size of the routing tables.
a. reduce
b. increase
c. both a and b
d. none of the above
10: _______ deals with the issues of creating and maintaining routing tables.
a. Forwarding
b. Routing
c. Directing
d. None of the above
12: A _______ routing table is updated periodically using one of the dynamic routing protocols.
a. static
b. dynamic
c. hierarchical
d. none of the above
13: The input and output ports of a router perform the ________ layer functions of the router.
a. physical and data link
b. network
c. transport
d. none of the above
14: The routing processor of a router performs the ________ layer functions of the router.
a. physical and data link
b. network
c. transport
d. none of the above
15: The task of moving the packet from the input queue to the output queue in a router is done by
_________.
a. input and output ports
b. routing processor
c. switching fabrics
d. none of the above
19: ____________ is a group of networks and routers under the authority of a single administration.
a. An autonomous system
b. An area
c. a and b
d. none of the above
22: In _______ routing, the least cost route between any two nodes is the route with the minimum
distance.
a. path vector
b. distance vector
c. link state
d. none of the above
23: In ________, each node maintains a vector (table) of minimum distances to every node.
a. path vector
b. distance vector
c. link state
d. none of the above
24: In distance vector routing, each node periodically shares its routing table with _________ and
whenever there is a change.
a. every other node
b. its immediate neighbors
c. one neighbor
d. none of the above
25: The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.
a. distance vector
b. link state
c. path vector
d. none of the above
27: The _________ routing uses the Dijkstra algorithm to build a routing table.
a. distance vector
b. link state
c. path vector
d. none of the above
28: The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______
routing.
a. distance vector
b. link state
c. path vector
d. none of the above
29: The _______ protocol allows the administrator to assign a cost, called the metric, to each route.
a. OSPF
b. RIP
c. BGP
d. none of the above
30: In OSPF, a ________ link connects two routers without any other host or router in between.
a. point-to-point
b. transient
c. stub
d. none of the above
31: In OSPF, a _______ link is a network with several routers attached to it.
a. point-to-point
b. transient
c. stub
d. none of the above
33: In OSPF, when the link between two routers is broken, the administration may create a _________
link between them using a longer path that probably goes through several routers.
a. point-to-point
b. transient
c. stub
d. none of the above
34: In ________ routing, we assume that there is one node (or more) in each autonomous system that
acts on behalf of the entire autonomous system.
a. distant vector
b. path vector
c. link state
d. none of the above
36: To create a neighborhood relationship, a router running BGP sends an ________ message.
a. open
b. update
c. keepalive
d. none of the above
38: A one-to-all communication between one source and all hosts on a network is classified as a
_______ communication.
a. unicast
b. multicast
c. broadcast
d. none of the above
39: A one-to-many communication between one source and a specific group of hosts is classified as a
_______ communication.
a. unicast
b. multicast
c. broadcast
d. none of the above
40: A one-to-one communication between one source and one destination is classified as a _______
communication.
a. unicast
b. multicast
c. broadcast
d. none of the above
41: In ______, the router forwards the received packet through only one of its interfaces.
a. unicasting
b. multicasting
c. broadcasting
d. none of the above
42: In _______, the router may forward the received packet through several of its interfaces.
a. unicasting
b. multicasting
c. broadcasting
d. none of the above
43: Emulation of ________ through ___________ is not efficient and may create long delays.
a. unicasting; multiple unicasting
b. multicasting; multiple unicasting
c. broadcasting; multicasting
d. none of the above
44: In unicast routing, each router in the domain has a table that defines a ______ path tree to possible
destinations.
a. average
b. longest
c. shortest
d. none of the above
45: In multicast routing, each involved router needs to construct a ________ path tree for each group.
a. average
b. longest
c. shortest
d. none of the above
46: In the _______ tree approach, each router needs to have one shortest path tree for each group.
a. group-shared
b. source-based
c. a or b
d. none of the above
48: Multicast link state routing uses the _______ tree approach.
a. source-based
b. group-shared
c. a or b
d. none of the above
49: The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that
uses multicast routing to create source-based trees. The protocol is based on _______ routing.
a. distance vector
b. link state
c. path vector
d. none of the above
52: In RPF, a router forwards only the copy that has traveled the _______ path from the source to the
router.
a. shortest
b. longest
c. average
d. none of the above
54: RPF guarantees that each network receives only ____ of the multicast packet.
a. one copy
b. two copies
c. a or b
d. none of the above
55: RPB creates a shortest path _______ tree from the source to each destination.
a. unicast
b. multicast
c. broadcast
d. none of the above
56: RPB guarantees that each destination receives _________ of the packet.
a. one copy
b. no copies
c. multiple copies
d. none of the above
57: In ________, the multicast packet must reach only those networks that have active members for that
particular group.
a. RPF
b. RPB
c. RPM
d. none of the above
58: _______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports
dynamic membership changes.
a. RPM; RPB
b. RPB; RPM
c. RPF: RPM
d. none of the above
62: A _______ message tells an upstream router to stop sending multicast messages for a specific
group through a specific router.
a. weed
b. graft
c. prune
d. none of the above
63: A _______ message tells an upstream router to start sending multicast messages for a specific
group through a specific router.
a. weed
b. graft
c. prune
d. none of the above
64: CBT is a ________ protocol that uses a core as the root of the tree.
a. source-based
b. group-shared
c. a or b
d. none of the above
65: PIM-DM is used in a _______ multicast environment, such as a LAN.
a. dense
b. sparse
c. a or b
d. none of the above
67: In _______, a logical tunnel is established by encapsulating the multicast packet inside a unicast
packet.
a. UNIBONE
b. MULTBONE
c. MBONE
d. none of the above
CHAPTER 23
1: One of the responsibilities of the transport layer protocol is to create a ______ communication.
a. host-to-host
b. process-to-process
c. node-to-node
d. none of the above
3: UDP does not add anything to the services of IP except for providing _______ communication.
a. node-to-node
b. process-to-process
c. host-to-host
d. none of the above
5: Although there are several ways to achieve process-to-process communication, the most common is
through the __________ paradigm.
a. client-server
b. client-client
c. server-server
d. none of the above
6: The local host and the remote host are defined using IP addresses. To define the processes, we need
second identifiers called ____________.
a. UDP addresses
b. transport addresses
c. port addresses
d. none of the above
7: The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are
called the ________ ports.
a. well-known
b. registered
c. dynamic
d. none of the above
8: In the sending computer, UDP receives a data unit from the _______ layer.
a. application
b. transport
c. IP
d. none of the above
9: In the sending computer, UDP sends a data unit to the _______ layer.
a. application
b. transport
c. IP
d. none of the above
13: UDP needs the _______ address to deliver the user datagram to the correct application process.
a. port
b. application
c. internet
d. none of the above
16: The source port address on the UDP user datagram header defines _______.
a. the sending computer
b. the receiving computer
c. the process running on the sending computer
d. none of the above
22: UDP uses ________ to handle outgoing user datagrams from multiple processes on one host.
a. flow control
b. multiplexing
c. demultiplexing
d. none of the above
23: UDP uses _______ to handle incoming user datagrams that go to different processes on the same
host.
a. flow control
b. multiplexing
c. demultiplexing
d. none of the above
26: Because the sending and the receiving processes may not write or read data at the same speed,
TCP ________.
a. speeds up the slower process
b. slows down the faster process
c. uses buffers
d. none of the above
27: TCP groups a number of bytes together into a packet called a ___________.
a. user datagram
b. segment
c. datagram
d. none of the above
30: TCP uses _________________ to check the safe and sound arrival of data.
a. an acknowledgment mechanism
b. out-of-band signalling
c. the services of another protocol
d. none of the above
31: The bytes of data being transferred in each connection are numbered by TCP. The numbering starts
with a __________________.
a. 0
b. 1
c. randomly generated number
d. none of the above
32: TCP assigns a sequence number to each segment that is being sent. The sequence number for
each segment is the number of the _______ byte carried in that segment.
a. first
b. last
c. middle
d. none of the above
34: The value of the acknowledgment field in a segment defines the number of the ______byte a party
expects to receive.
a. first
b. last
c. next
d. none of the above
40: A SYN segment cannot carry data; it consumes _____ sequence number(s).
a. no
b. one
c. two
d. none of the above
41: A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s).
a. no
b. three
c. two
d. none of the above
43: The connection establishment procedure in TCP is susceptible to a serious security problem called
the _________ attack.
a. ACK flooding
b. FIN flooding
c. SYN flooding
d. none of the above
44: The SYN flooding attack belongs to a group of security attacks known as a _____ attack.
a. denial of service
b. replay
c. man-in-the middle
d. none of the above
45: The FIN segment consumes ____ sequence numbers if it does not carry data.
a. two
b. three
c. no
d. none of the above
46: The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data.
a. two
b. three
c. one
d. none of the above
47: In TCP, one end can stop sending data while still receiving data. This is called a ______.
a. half-close
b. half-open
c. one-way termination
d. none of the above
48: A(n) _________ machine is a machine that goes through a limited number of states.
a. infinite state
b. finite state
c. both a and b
d. none of the above
49: __________ control regulates the amount of data a source can send before receiving an
acknowledgment from the destination.
a. Error
b. Flow
c. Congestion
d. none of the above
52: ACK segments consume _______ sequence number(s) and _______ acknowledged.
a. no; are not
b. one; are not
c. no; are
d. none of the above
54: IP is responsible for _______ communication while TCP is responsible for _______ communication.
a. host-to-host; process-to-process
b. process-to-process; host-to-host
c. process-to-process; network-to-network
d. none of the above
55: If a segment carries data along with an acknowledgment, this is called _______.
a. backpacking
b. piggybacking
c. piggypacking
d. none of the above
56: Multiply the header length field by _______ to find the total number of bytes in the TCP header.
a. 2
b. 4
c. 6
d. none of the above
57: Urgent data requires the urgent pointer field as well as the URG bit in the _______ field.
a. control
b. offset
c. sequence number
d. none of the above
58: The options field of the TCP header ranges from 0 to _______ bytes.
a. 10
b. 20
c. 40
d. none of the above
59: If the ACK value is 200, then byte _______ has been received successfully.
a. 199
b. 200
c. 201
d. none of the above
65: To distinguish between different data chunks belonging to the same stream, SCTP uses
___________.
a. TSNs
b. SIs
c. SSNs
d. none of the above
69: In SCTP, the acknowledgment number and window size are part of each ________.
a. data chunk
b. control chunk
c. a or b
d. none of the above
70: There is no need for a header length field in SCTP because ________________.
a. there are no options in the general header
b. the size of the header is fixed
c. both a and b
d. none of the above
73: In SCTP, control information and data information are carried in _______ chunks.
a. the same chunk
b. different chunks
c. either a or b
d. none of the above
76: In SCTP, ___________ can be carried in a packet that carries an INIT chunk.
a. only data chunks
b. only control chunks
c. no other chunk
d. none of the above
CHAPTER 24
1: In ________ we try to avoid traffic congestion.
a. congestion control
b. quality of service
c. either (a) or (b)
d. both (a) and (b)
5: The________ normally refers to the maximum length of time the traffic is generated at the peak rate.
a. peak data rate
b. maximum burst size
c. effective bandwidth
d. none of the above
6: The ________ is a function of three values: average data rate, peak data rate, and maximum burst
size.
a. peak data rate
b. maximum burst size
c. effective bandwidth
d. none of the above
7: A _________ traffic model has a data rate that does not change.
a. constant bit rate
b. variable bit rate
c. bursty
d. none of the above
8: In the ________ traffic model, the rate of the data flow changes in time, with the changes smooth
instead of sudden and sharp.
a. constant bit rate
b. variable bit rate
c. bursty
d. none of the above
9: In the ______ traffic model, the data rate changes suddenly in a very short time.
a. constant bit rate
b. variable bit rate
c. bursty
d. none of the above
11: Congestion in a network or internetwork occurs because routers and switches have _______.
a. tables
b. queues
c. crosspoints
d. none of the above
12: In a network, when the load is much less than the capacity of the network, the delay is _________.
a. at a maximum
b. at a minimum
c. constant
d. none of the above
13: In a network, when the load reaches the network capacity, the delay _______.
a. increases sharply
b. decreases sharply
c. remains constant
d. cannot be predicted
14: In a network, when the load is below the capacity of the network, the throughput ______________.
a. increases sharply
b. increases proportionally with the load
c. declines sharply
d. declines proportionally with the load
15: In a network, after the load reaches the capacity, throughput _______.
a. increases sharply
b. increases proportionally with the load
c. declines sharply
d. declines proportionally with the load
16: In ________ congestion control, policies are applied to prevent congestion before it happens.
a. open-loop
b. closed-loop
c. either (a) or (b)
d. neither (a) nor (b)
17: In _______ congestion control, mechanisms are used to alleviate congestion after it happens.
a. open-loop
b. closed-loop
c. either (a) or (b)
d. neither (a) nor (b)
18: The technique of ________refers to a congestion control mechanism in which a congested node
stops receiving data from the immediate upstream node or nodes.
a. backpressure
b. choke packet
c. implicit signaling
d. explicit signaling
20: In __________, there is no communication between the congested node or nodes and the source.
The source guesses that there is a congestion somewhere in the network from other symptoms.
a. backpressure
b. choke packet
c. implicit signaling
d. explicit signaling
21: In the __________ method, the signal is included in the packets that carry data.
a. backpressure
b. choke packet
c. implicit signaling
d. explicit signaling
22: In the ________ algorithm of TCP, the size of the congestion window increases exponentially until it
reaches a threshold.
a. slow-start
b. congestion avoidance
c. congestion detection
d. none of the above
23: In the _________ algorithm of TCP, the size of the congestion window increases additively until
congestion is detected.
a. slow-start
b. congestion avoidance
c. congestion detection
d. none of the above
24: In the ___________ algorithm of TCP, the size of the threshold is dropped to one-half, a
multiplicative decrease.
a. slow-start
b. congestion avoidance
c. congestion detection
d. none of the above
25: In Frame Relay, the ________ bit warns the sender of congestion in the network.
a. BECN
b. FECN
c. either (a) or (b)
d. neither (a) nor (b)
26: In Frame Relay, the ________ bit is used to warn the receiver of congestion in the network.
a. BECN
b. FECN
c. either (a) or (b)
d. neither (a) nor (b)
28: _________ is a characteristic that a flow needs. Lack of it means losing a packet or
acknowledgment, which entails retransmission.
a. Reliability
b. Delay
c. Jitter
d. Bandwidth
29: _______ is a flow characteristic that applications can tolerate in different degrees.
a. Reliability
b. Delay
c. Jitter
d. Bandwidth
30: ________ is the variation in delay for packets belonging to the same flow.
a. Reliability
b. Delay
c. Jitter
d. Bandwidth
31: In ________, queuing packets wait in a buffer (queue) until the node (router or switch) is ready to
process them.
a. FIFO
b. priority
c. weighted fair
d. none of the above
32: In ________ queuing, packets are first assigned to a priority class. Each class has its own queue.
a. FIFO
b. priority
c. weighted fair
d. none of the above
33: In _________ queuing, the packets are assigned to different classes and admitted to different
queues. The queues, however, are weighted based on the priority of the queues; higher priority means a
higher weight. The system processes packets in each queue in a round-robin fashion with the number of
packets selected from each queue based on the corresponding weight.
a. FIFO
b. priority
c. weighted fair
d. none of the above
34: In the ______ bucket algorithm, bursty chunks are stored in the bucket and sent out at an average
rate.
a. leaky
b. token
c. either (a) or (b)
d. neither (a) nor (b)
35: The _______ bucket algorithm allows idle hosts to accumulate credit for the future in the form of
tokens.
a. leaky
b. token
c. either (a) or (b)
d. neither (a) nor (b)
36: In _________, when a source makes a reservation, it needs to define a flow specification.
a. Integrated Services
b. Differentiated Services
c. Connectionless
d. Connection-Oriented
39: In Frame Relay, a ___________ is the maximum number of bits in a predefined time that the
network is committed to transfer without discarding any frame or setting the DE bit.
a. access rate
b. committed burst size
c. committed information rate
d. excess burst size
40: In Frame Relay, the _____________ defines an average rate in bits per second.
a. access rate
b. committed burst size
c. committed information rate
d. excess burst size
41: In Frame Relay, the ___________ is the maximum number of bits in excess of Bc that a user can
send during a predefined time.
a. access rate
b. committed burst size
c. committed information rate
d. excess burst size
42: In ATM, the _________ class is designed for customers who need real-time audio or video services.
The service is similar to that provided by a dedicated line such as a T line.
a. CBR
b. VBR
c. ABR
d. UBR
43: In ATM, the _________ class is divided into two subclasses: real-time (VBR-RT) and non-real-time
(VBR-NRT). VBR-RT is designed for those users who need real-time services (such as voice and video
transmission) and use compression techniques to create a variable bit rate. VBR-NRT is designed for
those users who do not need real-time services but use compression techniques to create a variable bit
rate.
a. CBR
b. VBR
c. ABR
d. UBR
44: In ATM, the _________ class delivers cells at a minimum rate. If more network capacity is available,
this minimum rate can be exceeded.
a. CBR
b. VBR
c. ABR
d. UBR
45: In ATM, the _________ class is a best-effort delivery service that does not guarantee anything.
a. CBR
b. VBR
c. ABR
d. UBR
CHAPTER 25
1: In a _______ name space, a name is assigned to an address. A name in this space is a sequence of
characters without structure.
a. flat
b. hierarchical
c. organized
d. none of the above
5: Each node in the tree has a _______, which is a string with a maximum of ___ characters.
a. label; 127
b. name; 255
c. label; 63
d. none of the above
11: What a server is responsible for or has authority over is called a _________.
a. domain
b. label
c. zone
d. none of the above
13: A ________ server loads all information from the disk file.
a. primary
b. secondary
c. zone
d. none of the above
14: A ________ server loads all information from the primary server.
a. primary
b. secondary
c. zone
d. none of the above
15: When the secondary downloads information from the primary, it is called ______ transfer.
a. domain
b. zone
c. label
d. none of the above
16: In the Internet, the domain name space (tree) is divided into _______ different sections:
a. three
b. two
c. four
d. none of the above
17: The _______ domains define registered hosts according to their generic behavior.
a. generic
b. country
c. inverse
d. none of the above
18: The first level in the generic domains section allows ______ possible labels.
a. 10
b. 12
c. 16
d. none of the above
21: In __________ resolution, the resolver expects the server to supply the final answer.
a. iterative
b. recursive
c. straight
d. none of the above
22: In __________ resolution, the server returns the IP address of the server that it thinks can resolve
the query.
a. iterative
b. recursive
c. straight
d. none of the above
23: In the domain name <i>chal.atc.fhda.edu</i>, _______ is the least specific label.
a. chal
b. atc
c. edu
d. none of the above
24: In the domain name <i>chal.atc.fhda.edu</i>, _______ is the most specific label.
a. chal
b. atc
c. fhda
d. none of the above
25: A host with the domain name <i>pit.arc.nasa.gov</i>. is on the _______ level of the DNS hierarchical
tree. (The root is level one.)
a. third
b. fourth
c. fifth
d. none of the above
27: DNS can use the services of ________ using the well-known port 53.
a. UDP
b. TCP
c. either (a) or (b)
d. none of the above
CHAPTER 26
1: TELNET is an abbreviation for ____________.
a. terminal network
b. telephone network
c. telecommunication network
d. none of the above
2: TELNET is a ________ client-server application program.
a. specific-purpose
b. general-purpose
c. both a and b
d. none of the above
3: When a user logs into a local time-sharing system, it is called ________ login.
a. local
b. remote
c. temporary
d. none of the above
4: When a user wants to access an application program or utility located on a remote machine, he or she
performs ___________ login.
a. local
b. remote
c. temporary
d. none of the above
5: NVT uses two sets of characters, one for _____and one for __________.
a. sending; receiving
b. request; reply
c. data; control
d. none of the above
6: For data, NVT uses US ASCII characters with the highest order bit set to ______.
a. 1
b. 0
c. a or b
d. none of the above
7: For control, NVT uses US ASCII characters with the highest order bit set to ______.
a. 1
b. 0
c. a or b
d. none of the above
8: TELNET uses only one TCP connection. The server uses ________ port and the client uses
________ port.
a. a well-known; another well-known
b. an ephemeral; another ephemeral
c. a well-known; an ephemeral
d. none of the above
9: To distinguish data from control characters, each sequence of control characters is preceded by a
special control character called ________.
a. ICA
b. IAC
c. AIC
d. none of the above
11: In the _______ mode, each character typed is sent by the client to the server.
a. default
b. character
c. line
d. none of the above
12: In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the
client.
a. default
b. character
c. line
d. none of the above
13: The _______ is software residing on the remote system that allows the remote system to receive
characters from a TELNET server.
a. terminal driver
b. pseudoterminal driver
c. TELNET client
d. none of the above
15: The _______ translates NVT characters into a form acceptable by the remote operating system.
a. terminal driver
b. TELNET client
c. TELNET server
d. none of the above
18: If the sender wants an option disabled by the receiver, it sends a _______ command.
a. WILL
b. DO
c. DONT
d. none of the above
19: If the sender wants an option enabled by the receiver, it sends a _______ command.
a. WILL
b. DO
c. WONT
d. none of the above
20: _______ is the standard mechanism provided by TCP/IP for copying a file from one host to another.
a. TELNET
b. SMTP
c. TFTP
d. none of the above
22: In FTP, the well-known port ____ is used for the control connection and the well-known port
________ for the data connection.
a. 21; 22
b. 21; 20
c. 20; 21
d. none of the above
23: In FTP, _______ is the service type used by the IP protocol because this is an interactive connection
between a user (human) and a server.
a. maximize throughput
b. minimize delay
c. minimize error
d. none of the above
24: For the control connection, FTP uses the __________ character set
a. regular ASCII
b. EBCDIC
c. NVT ASCII
d. none of the above
27: In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an
attribute called _______.
a. file types
b. data structures
c. transmission modes
d. none of the above
28: In FTP, there are three types of _______: stream, block, and compressed.
a. file types
b. data structures
c. transmission modes
d. none of the above
29: In FTP, ASCII, EBCDIC, and image define an attribute called _______.
a. file type
b. data structure
c. transmission mode
d. none of the above
30: In FTP, when we _______, it is copied from the server to the client.
a. retrieve a file
b. retrieve a list
c. a and c
d. none of the above
31: In FTP, when we _______, it is copied from the client to the server.
a. retrieve a file
b. store a file
c. retrieve a list
d. none of the above
32: ________ is part of a local hard drive, a special file with permission restrictions.
a. A message
b. A response
c. An agent
d. None of the above
33: When the sender and the receiver of an email are on the same system, we need only ___________.
a. one UA
b. two UAs
c. one UA and one MTA
d. none of the above
34: When the sender and the receiver of an email are on different systems, we need only
_____________.
a. one MTA
b. two UAs
c. two UAs and one pair of MTAs
d. none of the above
35: When the sender is connected to the mail server via a LAN or a WAN, we need ______________.
a. two MTA
b. two UAs and two pairs of MTAs
c. two UAs and a pair of MTAs
d. none of the above
36: When both sender and receiver are connected to a mail server via a LAN or a WAN, we need
___________________.
a. two UAs, two pairs of MTAs, and a pair of MAAs
b. two UAs, and two pairs of MTAs
c. two UAs, two pairs of MTAs, and two pairs of MAAs
d. none of the above
37: ________ provides service to the user to make the process of sending and receiving a message
easier.
a. An MTA
b. An MAA
c. A UA
d. none of the above
39: There are two types of user agents: _________ and ___________.
a. command-driven; data-driven
b. command-driven; GUI-based
c. command-based and data-based
d. none of the above
40: The ________ usually contains the sender address, the receiver address, and other information.
a. message
b. envelope
c. both a and b
d. none of the above
42: In the Internet, the email address consists of two parts: a _______ and a _______.
a. local part; domain name
b. global part; domain name
c. label; domain name
d. none of the above
43: _________ is a supplementary protocol that allows non-ASCII data to be sent through email.
a. JPEG
b. MPEG
c. MIME
d. none of the above
45: The formal protocol that defines the MTA client and server in the Internet is called ___________.
a. SMTP
b. SNMP
c. TELNET
d. none of the above
49: The third stage in an email transfer uses a(n) ________ protocol.
a. UA
b. MTA
c. MAA
d. none of the above
50: Currently two message access protocols are available: _______ and _________.
a. POP3; IMAP2
b. POP4; IMAP1
c. POP3; IMAP4
d. none of the above
51: Which part of the mail created by the UA contains the sender and receiver names?
a. envelope
b. address
c. header
d. none of the above
52: The MIME _______ header uses text to describe the type of data in the body of the message.
a. content-type
b. content-transfer-encoding
c. content-description
d. none of the above
CHAPTER 27
1: _________ is a repository of information linked together from points all over the world.
a. The WWW
b. HTTP
c. HTML
d. none of the above
2: The WWW today is a _______ client-server service, in which a client using a browser can access a
service using a server.
a. limited
b. vast
c. distributed
d. none of the above
3: The _________ is a standard for specifying any kind of information on the Internet.
a. URL
b. ULR
c. RLU
d. none of the above
4: In a URL, the _______ is the client-server program used to retrieve the document.
a. path
b. protocol
c. host
d. none of the above
6: In a URL, an optional ________ can be inserted between the host and the path, and it is separated
from the host by a colon.
a. path
b. protocol
c. host
d. none of the above
7: In a URL, the _______ is the full name of the file where the information is located.
a. path
b. protocol
c. host
d. none of the above
10: A _______ document is a fixed-content document that is created and stored in a server. The client
can get a copy of the document only.
a. static
b. dynamic
c. active
d. none of the above
12: A _______ document is created by a Web server whenever a browser requests the document.
a. static
b. dynamic
c. active
d. none of the above
15: For many applications, we need a program or a script to be run at the client site. These are called
_______________ documents.
a. static
b. dynamic
c. active
d. none of the above
16: One way to create an active document is to use __________.
a. CGI
b. Java stand-alone programs
c. Java applets
d. none of the above
19: In HTTP, the first line in a request message is called a _______ line; the first line in the response
message is called the ________ line.
a. request; response
b. response; request
c. response; status
d. none of the above
20: In a ___________ connection, one TCP connection is made for each request/response.
a. persistent
b. nonpersistent
c. both a and b
d. none of the above
21: In a ___________connection, the server leaves the connection open for more requests after sending
a response.
a. persistent
b. nonpersistent
c. both a and b
d. none of the above
25: Which of the following is present in both an HTTP request line and a status line?
a. HTTP version number
b. URL
c. status code
d. none of the above
26: The HTTP request line contains a _______ method to request a document from the server.
a. GET
b. POST
c. COPY
d. none of the above
27: A user needs to send the server some information. The request line method is _______.
a. OPTION
b. PATCH
c. POST
28: The HTTP request line contains a _______ method to get information about a document without
retrieving the document itself.
a. HEAD
b. POST
c. COPY
d. none of the above
CHAPTER 28
1: SNMP defines the ___________________ to be sent from a manager to an agent and vice versa.
a. format of the packets
b. encoding of the packets
c. number of packets
d. none of the above
5: ________ defines the general rules for naming objects, defining object types, and showing how to
encode objects and values.
a. MIB
b. BER
c. SMI
d. none of the above
6: We can compare the task of network management to the task of writing a program. Both tasks need
rules. In network management this is handled by ___________.
a. SMNP
b. MIB
c. SMI
d. none of the above
7: We can compare the task of network management to the task of writing a program. Both tasks need
variable declarations. In network management this is handled by _________.
a. SMNP
b. MIB
c. SMI
d. none of the above
8: We can compare the task of network management to the task of writing a program. Both tasks have
actions performed by statements. In network management this is handled by _______.
a. SMNP
b. MIB
c. SMI
d. none of the above
9: SMI emphasizes three attributes to handle an object: _____, ________, and _________.
a. name; data type; size
b. name; size; encoding method
c. name; data type; encoding method
d. none of the above
10: To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a
_______ structure
a. linear
b. tree
c. graph
d. none of the above
11: All objects managed by SNMP are given an object identifier. The object identifier always starts with
_______.
a. 1.3.6.1.2.1
b. 1.3.6.1.2.2
c. 1.3.6.1.2.3
d. none of the above
12: To define the data type, SMI uses fundamental _______ definitions and adds some new definitions.
a. AMS.1
b. ASN.1
c. ASN.2
d. none of the above
13: SMI has two broad categories of data type: _______ and _______.
a. simple; complex
b. simple; structured
c. structured; unstructured
d. none of the above
15: SMI defines two structured data types: ________ and _________.
a. sequence; atomic
b. sequence; sequence of
c. a sequence of; array
d. none of the above
16: SMI uses another standard, ___________, to encode data to be transmitted over the network.
a. MIB
b. ANS.1
c. BER
d. none of the above
17: The _________ ordering enables a manager to access a set of variables one after another by
defining the first variable.
a. lexicographic
b. linear
c. non-linear
d. none of the above
18: The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable
or a set of variables.
a. client; server
b. server; client
c. server; network
d. none of the above
19: The Response PDU is sent from the ______ to the ______ in response to GetRequest or
GetNextRequest.
a. server; client
b. client; server
c. network; host
d. none of the above
20: The Trap PDU is sent from the ______ to the _______ to report an event.
a. server; client
b. client; server
c. network; host
d. none of the above
21: SNMP uses the services of UDP on two well-known ports, _______ and _______.
a. 161; 162
b. 160; 161
c. 160; 162
d. none of the above
22: _______ runs the SNMP client program; _______ runs the SNMP server program.
a. A manager; a manager
b. An agent; an agent
c. A manager; an agent
d. An agent; a manager
23: INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI.
a. MIB
b. SNMP
c. ASN.1
d. none of the above
26: For a 1-byte length field, what is the maximum value for the data length?
a. 127
b. 128
c. 255
d. none of the above
27: An object id defines a _______. Add a zero suffix to define the _______.
a. variable; table
b. table; variable
c. variable; variable contents
d. none of the above
30: The _______ field in the SNMP PDU is an offset that points to the variable in error.
a. community
b. enterprise
c. error index
d. none of the above
31: The _______ field in the SNMP PDU reports an error in a response message.
a. community
b. enterprise
c. error status
d. none of the above
32: The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding
values.
a. version
b. community
c. VarBindList
CHAPTER 29
1: We can divide audio and video services into _______ broad categories.
a. three
b. two
c. four
d. none of the above
3: ___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.
a. Interactive
b. Streaming live
c. Streaming stored
d. none of the above
4: _________ audio/video refers to the use of the Internet for interactive audio/video applications.
a. Interactive
b. Streaming live
c. Streaming stored
d. none of the above
5: According to the Nyquist theorem, we need to sample an analog signal ________times the highest
frequency.
a. three
b. two
c. four
d. none of the above
6: In ________ encoding, the differences between the samples are encoded instead of encoding all the
sampled values.
a. predictive
b. perceptual
c. both a and b
d. none of the above
7: __________ encoding is based on the science of psychoacoustics, which is the study of how people
perceive sound.
a. Predictive
b. Perceptual
c. both a and b
d. none of the above
14: To prevent _________, we can timestamp the packets and separate the arrival time from the
playback time.
a. error
b. jitter
c. either a or b
d. none of the above
18: __________ means changing the encoding of a payload to a lower quality to match the bandwidth of
the receiving network.
a. Translation
b. Mixing
c. both a and b
d. none of the above
19: __________ means combining several streams of traffic into one stream.
a. Translation
b. Mixing
c. both a and b
d. none of the above
20: _________ is not suitable for interactive multimedia traffic because it retransmits packets in case of
errors.
a. UDP
b. TCP
c. both a and b
d. none of the above
21: __________ is the protocol designed to handle real-time traffic on the Internet.
a. TCP
b. UDP
c. RTP
d. none of the above
23: ___________ is a protocol for controlling the flow and quality of data.
a. RTP
b. RTCP
c. UDP
d. none of the above
24: RTCP uses an odd-numbered _______ port number that follows the port number selected for RTP.
a. UDP
b. TCP
c. both a and b
d. none of the above
25: ___________ is an application protocol that establishes, manages, and terminates a multimedia
session
a. RIP
b. SIP
c. DIP
d. none of the above
26: _______ is a standard to allow telephones on the public telephone network to talk to computers
connected to the Internet.
a. SIP
b. H.323
c. Q.991
d. none of the above
27: A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends
_______ minutes watching the performance.
a. less than 10
b. more than 10
c. exactly 10
d. none of the above
28: A _______ shows the time a packet was produced relative to the first or previous packet.
a. timestamp
b. playback buffer
c. sequence number
d. none of the above
30: In a real-time video conference, data from the server is _______ to the client sites.
a. unicast
b. multicast
c. broadcast
d. none of the above
31: A _______ adds signals from different sources to create a single signal.
a. timestamp
b. sequence number
c. mixer
d. none of the above
32: A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth
signal.
a. timestamp
b. sequence number
c. translator
d. none of the above
34: When there is more than one source, the _______ identifier defines the mixer.
a. synchronization source
b. contributor
c. timestamp
d. none of the above
CHAPTER 30
1: ________ is the science and art of transforming messages to make them secure and immune to
attacks.
a. Cryptography
b. Cryptoanalysis
c. either (a) or (b)
d. neither (a) nor (b)
8: In a(n) ________ cipher, the same key is used by both the sender and receiver.
a. symmetric-key
b. asymmetric-key
c. either (a) or (b)
d. neither (a) nor (b)
14: _________ ciphers can be categorized into two broad categories: monoalphabetic and
polyalphabetic.
a. Substitution
b. Transposition
c. either (a) or (b)
d. neither (a) nor (b)
15: The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a
modulus of 26.
a. transposition
b. additive
c. shift
d. none of the above
17: The ________ cipher reorders the plaintext characters to create a ciphertext.
a. substitution
b. transposition
c. either (a) or (b)
d. neither (a) nor (b)
18: A(n) ______ is a keyless substitution cipher with <i>N</i> inputs and <i>M</i> outputs that uses a
formula to define the relationship between the input stream and the output stream.
a. S-box
b. P-box
c. T-box
d. none of the above
19: A(n) _______is a keyless transposition cipher with <i>N</i> inputs and <i>M</i> outputs that uses a
table to define the relationship between the input stream and the output stream.
a. S-box
b. P-box
c. T-box
d. none of the above
20: A modern cipher is usually a complex _____cipher made of a combination of different simple ciphers.
a. round
b. circle
c. square
d. none of the above
22: DES has an initial and final permutation block and _________ rounds.
a. 14
b. 15
c. 16
d. none of the above
24: DES uses a key generator to generate sixteen _______ round keys.
a. 32-bit
b. 48-bit
c. 54-bit
d. 42-bit
25: ________ DES was designed to increase the size of the DES key
a. Double
b. Triple
c. Quadruple
d. none of the above
26: _______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
a. AEE
b. AED
c. AER
d. AES
29: One commonly used public-key cryptography method is the ______ algorithm.
a. RSS
b. RAS
c. RSA
d. RAA
30: The ________ method provides a one-time session key for two parties.
a. Diffie-Hellman
b. RSA
c. DES
d. AES
31: The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not
authenticated to each other.
a. man-in-the-middle
b. ciphertext attack
c. plaintext attack
d. none of the above
CHAPTER 31
1: Message ________ means that the sender and the receiver expect privacy.
a. confidentiality
b. integrity
c. authentication
d. none of the above
2: Message_____ means that the data must arrive at the receiver exactly as sent.
a. confidentiality
b. integrity
c. authentication
d. none of the above
3: Message _______ means that the receiver is ensured that the message is coming from the intended
sender, not an imposter.
a. confidentiality
b. integrity
c. authentication
d. none of the above
4: _________ means that a sender must not be able to deny sending a message that he sent.
a. Confidentiality
b. Integrity
c. Authentication
d. Nonrepudiation
5: ________ means to prove the identity of the entity that tries to access the system's resources.
a. Message authentication
b. Entity authentication
c. Message confidentiality
d. none of the above
11: A ________ signature is included in the document; a _______ signature is a separate entity.
a. conventional; digital
b. digital; digital
c. either (a) or (b)
d. neither (a) nor (b)
17: In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.
a. message authentication
b. entity authentication
c. message confidentiality
d. message integrity
18: Password-based authentication can be divided into two broad categories: _______ and _______.
a. fixed; variable
b. time-stamped; fixed
c. fixed; one-time
d. none of the above
19: In ________ authentication, the claimant proves that she knows a secret without actually sending it.
a. password-based
b. challenge-response
c. either (a) or (b)
d. neither (a) nor (b)
21: A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
a. KDC
b. CA
c. KDD
d. none of the above
22: A(n)______ creates a secret key only between a member and the center.
a. CA
b. KDC
c. KDD
d. none of the above
23: The secret key between members needs to be created as a ______ key when two members contact
KDC.
a. public
b. session
c. complimentary
d. none of the above
24: __________ is a popular session key creator protocol that requires an authentication server and a
ticket-granting server.
a. KDC
b. Kerberos
c. CA
d. none of the above
25: A(n) ________is a federal or state organization that binds a public key to an entity and issues a
certificate.
a. KDC
b. Kerberos
c. CA
d. none of the above
26: A(n) ______ is a hierarchical system that answers queries about key certification.
a. KDC
b. PKI
c. CA
d. none of the above
27: The _______ criterion states that it must be extremely difficult or impossible to create the message if
the message digest is given.
a. one-wayness
b. weak-collision-resistance
c. strong-collision-resistance
d. none of the above
28: The ________ criterion ensures that a message cannot easily be forged.
a. one-wayness
b. weak-collision-resistance
c. strong-collision-resistance
d. none of the above
29: The _______criterion ensures that we cannot find two messages that hash to the same digest.
a. one-wayness
b. weak-collision-resistance
c. strong-collision-resistance
d. none of the above
CHAPTER 32
1: _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to
provide security for a packet at the network level.
a. IPSec
b. SSL
c. PGP
d. none of the above
3: In the ______ mode, IPSec protects information delivered from the transport layer to the network
layer.
a. transport
b. tunnel
c. either (a) or (b)
d. neither (a) nor (b)
5: The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.
a. transport
b. tunnel
c. either (a) or (b)
d. neither (a) nor (b)
6: In the _______ mode, IPSec protects the whole IP packet, including the original IP header.
a. transport
b. tunnel
c. either (a) or (b)
d. neither (a) nor (b)
9: ______ provides either authentication or encryption, or both, for packets at the IP level.
a. AH
b. ESP
c. PGP
d. SSL
11: ______ is the protocol designed to create security associations, both inbound and outbound.
a. SA
b. CA
c. KDC
d. IKE
17: An _________ is a network that allows authorized access from outside users.
a. intranet
b. internet
c. extranet
d. none of the above
19: A ______ provides privacy for LANs that must communicate through the global Internet.
a. VPP
b. VNP
c. VNN
d. VPN
20: A _______ layer security protocol provides end-to-end security services for applications.
a. data link
b. network
c. transport
d. none of the above
23: ______ is designed to provide security and compression services to data generated from the
application layer.
a. SSL
b. TLS
c. either (a) or (b)
d. both (a) and (b)
24: Typically, ______ can receive application data from any application layer protocol, but the protocol is
normally HTTP.
a. SSL
b. TLS
c. either (a) or (b)
d. both (a) and (b)
27: In _______, the cryptographic algorithms and secrets are sent with the message.
a. IPSec
b. SSL
c. TLS
d. PGP
31: In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
a. secret
b. public
c. either (a) or (b)
d. both (a) and (b)
32: In ______, there is a single path from the fully trusted authority to any certificate.
a. X509
b. PGP
c. KDC
d. none of the above
33: In _____, there can be multiple paths from fully or partially trusted authorities.
a. X509
b. PGP
c. KDC
d. none of the above