Download as pdf or txt
Download as pdf or txt
You are on page 1of 67

www.rejinpaul.

com

2. Two devices are in network if __________


a) a process in one device is able to exchange
EC8551 information with a process in another device
b) a process is running on both devices
COMMUNICATION c) PIDs of the processes running of different
devices are same

om
NETWORKS d) a process is active and another is inactive

Answer: a
ECE - 5th Semester Explanation: A computer network, or data
network, is a digital telecommunications
network which allows nodes to share
Regulations 2017

.c
resources. In computer networks, computing
devices exchange data with each other using
connections between nodes. The nodes have
certain processes which enable them to share

ul
a specific type of data using a distinct
UNIT I FUNDAMENTALS protocol.

& LINK LAYER pa 3. Which of the following computer networks


is built on the top of another network?
a) prior network
TOPIC 1.1 OVERVIEW OF DATA b) chief network
COMMUNICATIONS c) prime network
NETWORKS d) overlay network
jin
1. When collection of various computers Answer: d
seems a single coherent system to its client, Explanation: An overlay network is a
then it is called _________ computer network that is built on top of
a) computer network another network. Some examples of an
.re

b) distributed system overlay network are Virtual Private Networks


c) networking system (VPN) and Peer-to-Peer Networks (P2P).
d) mail system 4. In computer network nodes are _________
a) the computer that originates the data
Answer: b
b) the computer that routes the data
w

Explanation: A Computer network is defined


as a collection of interconnected computers c) the computer that terminates the data
which uses a single technology for d) all of the mentioned
connection.
w

Answer: d
A distributed system is also the same as Explanation: In a computer network, a node
computer network but the main difference is can be anything that is capable of sending
that the whole collection of computers data or receiving data or even routing the data
w

appears to its users as a single coherent


to its destination. Routers, Computers and
system.
Smartphones are some examples of network
Example:- World wide web
nodes.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

5. Communication channel is shared by all a) protocol architecture


the machines on the network in ________ b) protocol stack
a) broadcast network c) protocol suite
b) unicast network d) protocol system
c) multicast network
d) anycast network Answer: b

om
Explanation: A protocol stack refers to a
Answer: a group of protocols that are running
Explanation: In a broadcast network, concurrently that are employed for the
information is sent to all stations in a network implementation of network protocol suite.
whereas in a multicast network the data or Each layer in the network model has to use
information is sent to a group of stations in one specific protocol from the protocol stack.
the network. In unicast network, information

.c
is sent to only one specific station. The 9. Network congestion occurs _________
broadcast address of the network is the last a) in case of traffic overloading
assigned address of the network. b) when a system terminates
c) when connection between two nodes

ul
6. Bluetooth is an example of __________ terminates
a) personal area network d) in case of transfer failure
b) local area network
Answer: a
c) virtual private network
d) wide area network
pa Explanation: Network congestion occurs
when traffic in the network is more than the
Answer: a network could handle. To avoid network
Explanation: Bluetooth is a wireless congestion, the network management uses
technology used to create a wireless personal various open-loop and closed-loop congestion
jin
area network for data transfer up to a distance control techniques.
of 10 meters. It operates on 2.45 GHz
frequency band for transmission. 10. Which of the following networks extends
a private network across public networks?
7. A __________ is a device that forwards a) local area network
.re

packets between networks by processing the b) virtual private network


routing information included in the packet. c) enterprise private network
a) bridge d) storage area network
b) firewall
c) router Answer: b
w

d) hub Explanation: A virtual private network


extends a private network across a public
Answer: c network, and enables users to send and
Explanation: A router is a networking device receive data across shared or public networks
w

that forwards data packets between computer as if their computing devices were directly
networks. Routers perform the traffic connected to the private network.VPN
directing functions on the Internet. They provides enhanced security and online
w

make use of routing protocols like RIP to find anonymity to users on the internet. It is also
the cheapest path to the destination. used to unblock websites which are
unavailable in certain regions.
8. A list of protocols used by a system, one
protocol per layer, is called ________

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

TOPIC 1.2 BUILDING send a message or data to other nodes, this


data passes through all other nodes in the
NETWORK AND ITS TYPES network through the cable. It is really simple
to install but it’s not secure enough to be used
1. Physical or logical arrangement of network in most of the computer network applications.
is __________

om
a) Topology 4. Data communication system spanning
b) Routing states, countries, or the whole world is
c) Networking ________
d) Control a) LAN
b) WAN
Answer: a c) MAN
Explanation: Topology in networks is the d) PAN

.c
structure or pattern in which each and every
node in the network is connected. There are Answer: b
many topologies in networking like bus, tree, Explanation: WAN is the abbreviation for
ring, star, mesh, and hybrid topology. There is Wide Area Network. This network extends

ul
no particular best topology and a suitable over a large geographical area. WANs are
topology can be chosen based on the kind of used to connect cities, states or even
application of the network . pa countries. A wireless connection is required
to build a WAN. The best example of WAN is
2. Which network topology requires a central the Internet.
controller or hub?
a) Star 5. Data communication system within a
b) Mesh building or campus is________
c) Ring a) LAN
jin
d) Bus b) WAN
c) MAN
Answer: a d) PAN
Explanation: In star topology, no computer is
connected to another computer directly but all Answer: a
.re

the computers are connected to a central hub. Explanation: LAN is an abbreviation for
Every message sent from a source computer Local Area Network. This network
goes through the hub and the hub then interconnects computers in a small area such
forwards the message only to the intended as schools, offices, residence etc. It is the
destination computer. most versatile kind of data communication
w

system where most of the computer network


3. _______ topology requires a multipoint concepts can be visibly used.
connection.
a) Star 6. WAN stands for __________
w

b) Mesh a) World area network


c) Ring b) Wide area network
d) Bus c) Web area network
w

d) Web access network


Answer: d
Explanation: In bus topology, there is a Answer: b
single cable to which all the network nodes Explanation: WAN is the abbreviation for
are connected. So whenever a node tries to Wide Area Network. This network extends

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

over a large geographical area. These are used 1. What is internet?


to connect cities, states or even countries. a) a single network
They can be connected through leased lines b) a vast collection of different networks
or satellites. c) interconnection of local area networks
d) interconnection of wide area networks
7. In TDM, slots are further divided into

om
__________ Answer: b
a) Seconds Explanation: Internet is nothing but an
b) Frames interconnected computer network providing a
c) Packets variety of communication facilities,
d) Bits consisting of a huge amount of small
networks using standardized communication
Answer: b protocols.

.c
Explanation: TDM is the abbreviation for
Time division multiplexing. It is technique for 2. To join the internet, the computer has to be
combining several low rate channels to a connected to a _________
single high rate channel. For a certain time a) internet architecture board

ul
slot, the several channels could use the b) internet society
maximum bandwidth. Each channel is c) internet service provider
inactive for a period of time too. Some other
pa d) different computer
multiplexing techniques are Frequency
division multiplexing and Phase division Answer: c
multiplexing. Explanation: The ISPs (Internet Service
Providers) are the main agents through which
8. _____ is the multiplexing technique that every computer is connected to the internet.
shifts each signal to a different carrier They are licensed to allot public IP addresses
jin
frequency. to its customers in order to connect them to
a) FDM the internet.
b) TDM
c) Both FDM & TDM 3. Internet access by transmitting digital data
d) PDM over the wires of a local telephone network is
.re

provided by _______
Answer: a a) leased line
Explanation: FDM is an abbreviation for b) digital subscriber line
Frequency Division Multiplexing. This c) digital signal line
technique is used when the bandwidth of the d) digital leased line
w

channel is greater than the combined


bandwidth of all the signals which are to be Answer: b
transmitted. The channel is active at all times Explanation: DSL (Digital Subscriber Line)
unless a collision occurs with another channel is the technology designed to use the existing
w

trying to use the same frequency. Some other telephone lines to transport high-bandwidth
multiplexing techniques are Time division data to service subscribers. DSL was used to
multiplexing and Phase division multiplexing. allow the early users access to the internet
w

and it provides dedicated, point-to-point,


public network access.
TOPIC 1.3 OVERVIEW OF
INTERNET 4. ISP exchanges internet traffic between
their networks by __________

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

a) internet exchange point Answer: a


b) subscriber end point Explanation: Packet switching is the method
c) isp end point based on which the internet works. Packet
d) internet end point switching features delivery of packets of data
between devices over a shared network.
Answer: a

om
Explanation: ISPs exchange internet traffic 8. Which one of the following is not an
between their networks by using Internet application layer protocol used in internet?
Exchange Points. ISPs and CDNs are a) remote procedure call
connected to each other at these physical b) internet relay chat
locations are they help them provide better c) resource reservation protocol
service to their customers. d) local procedure call

.c
5. Which of the following protocols is used in Answer: c
the internet? Explanation: Resource reservation protocol
a) HTTP is a transport layer protocol used on the
b) DHCP internet. It operates over IPv4 and IPv6 and is

ul
c) DNS designed to reserve resources required by the
d) DNS, HTTP and DNS network layer protocols.

Answer: d 9. Which protocol assigns IP address to the


pa
Explanation: HTTP is used to browse all the
websites on the World Wide Web, DHCP is
client connected in the internet?
a) DHCP
used to allot IPs automatically to the users on b) IP
the internet, and DNS is used to connect the c) RPC
users to the host servers on the internet based d) RSVP
jin
on the Domain Name.
Answer: a
6. The size of an IP address in IPv6 is Explanation: DHCP stands for Domain Host
_________ Control Protocol. It is responsible to remotely
a) 32 bits assign IP address to the clients connected to
.re

b) 64 bits the internet. The server that performs this


c) 128 bits fuction is called the DHCP server.
d) 265 bits
10. Which one of the following is not used in
Answer: c media access control?
w

Explanation: An IPv6 address is 128 bits a) ethernet


long. Therefore, 2128 i.e. 340 undecillion b) digital subscriber line
addresses are possible in IPv6. IPv4 has only c) fiber distributed data interface
4 billion possible addresses and IPv6 would d) packet switching
w

be a brilliant alternative in case IPv4 runs out


of possible new addresses. Answer: d
Explanation: Packet switching is not really
w

7. Internet works on _______ related to media access control as it just


a) packet switching features delivery of packets of data between
b) circuit switching devices over a shared network. Internet is
c) both packet switching and circuit switching actually based on packet switching.
d) data switching

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

TOPIC 1.4 PROTOCOL c) Bridges and switches


d) Routers, Bridges and Switches
LAYERING
Answer: d
1. Which level is the network layer in the OSI Explanation: This layer contains hardware
model? devices such as routers, bridges, firewalls,

om
a) Third level and switches, but it actually creates a logical
b) Fourth level image of the most efficient communication
c) Second level rout and implements it with a physical
d) Fifth layer medium.

Answer: a 5. Network layer protocol exits in _________


Explanation: The network layer is the third a) Host

.c
level of the open system interconnection b) Switches
model and the layer that provides data routing c) Packets
paths for network communication. d) Bridges

ul
2. Data in network layer is transferred in the Answer: a
form of ____________ Explanation: Network layer protocols exits
a) Layers in every host or router. The router examines
the header fields of all the IP packets that
b) Packets
c) Bytes
d) Bits
pa pass through it.

6. What are the common protocols associated


Answer: b with the network layer?
Explanation: Data is transferred in the form a) Address Resolution Protocol
jin
of packets via logical network paths in an b) Reverse Address Resolution Protocol
ordered format controlled by the network c) Internet protocol
layer. d) Neighbour Discovery Protocol

3. The network layer is considered as the Answer: c


.re

_______ of the network layer. Explanation: Internet protocol and Netware


a) backbone IPX/SPX are the most common protocols
b) packets associated with the network layer.
c) bytes
d) bits 7. The network layer responds to request from
w

which layer?
Answer: a a) Transport layer
Explanation: The network layer is b) Data layer
considered as the backbone of the network c) Application layer
w

layer. It selects and manages the best logical d) Session layer


path for data transfer between nodes.
Answer: a
w

4. The network layer contains which Explanation: In OSI model, we are having 7
hardware device? layers in which the network layer responds to
a) Routers, Bridges request from the layer above it called
b) Bridges only Transport Layer.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

8. The network layer issues request to which 12. ICMP stands for __________
layer? a) Internet Coordinate Message Protocol
a) Transport layer b) Internet Control Message Protocol
b) Data layer c) Interconnect Control Message Protocol
c) Application layer d) Interconnect Coordinate Message Protocol
d) Session layer

om
Answer: b
Answer: b Explanation: The Internet Protocol is the key
Explanation: In OSI model, we are having 7 network layer protocol that implements the
layers in which the network layer issues TCP/IP Protocol suites. Since IP is the
request to the layer below it called Data Link protocol that provides the mechanism for
Layer. delivering datagrams, between devices, it is
designed to be relatively basic, and to

.c
9. IP is connectionless. function with few “bell and whistles”.
a) True
b) False 13. Packets will be transferred in how many
types?

ul
Answer: a a) 5 types
Explanation: IP is connectionless, is that a b) 4 types
data packet can travel from a sender to a c) 2 types
receiver without the recipient having to send
pa
an acknowledgment connection-oriented
protocols exits at other, higher layers of the
d) 3 types

Answer: d
OSI model. Explanation: Routing deals with determining
how packet will routed (transferred) from
10. Does network layer in TCP/IP and OSI source to destination. It can of three types : 1.
jin
Model are same. Static
a) True 2. Dynamic
b) False 3. Semi Dynamic.
Answer: b 14. DDP stands for _________
.re

Explanation: The TCP/IP Internet layer is in a) Datagram Delivery Protocol


fact only a subset of functionality of the b) Device Delivery Protocol
network layer. It describes only one type of c) Datagram Device Protocol
network architecture, the Internet. d) Device Datagram Protocol
w

11. What are called routers? Answer: a


a) The devices that operates at session layer Explanation: Datagram Delivery Protocol is
b) The devices that operates at data layer a member of the AppleTalk networking
c) The devices that operates at application protocol suite. Its main responsibility is for
w

layer socket to socket delivery of datagram over an


d) The devices that operates at network AppleTalk network.
w

Answer: d 15. RIP stands for ________


Explanation: The network interconnection a) Reduced Information Protocol
devices that operate at the network layer are b) Routing Internet Protocol
usually called routes, which at this point c) Routing Information Protocol
should hopefully come as no surprise to you. d) Reduced Internet Protocol

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: c not an example of physical layer


Explanation: The Routing Information vulnerability. The rest three – Physical theft
Protocol is one of the oldest distance vector of data & hardware, damage or destruction of
routing protocols which employ the hop count data & hardware and keystroke & Other Input
as a routing metric. Logging are physical layer vulnerabilities.

om
4. In __________________ layer,
TOPIC 1.5 OSI MODEL vulnerabilities are directly associated with
physical access to networks and hardware.
1. The ____________ model is 7-layer a) physical
architecture where each layer is having some b) data-link
specific functionality to perform. c) network
a) TCP/IP d) application

.c
b) Cloud
c) OSI Answer: a
d) OIS Explanation: In the physical layer,
vulnerabilities are directly associated with

ul
Answer: c physical access to networks and hardware
Explanation: The OSI model is 7-layer such as unauthorised network access, damage
architecture where each layer is having some
pa or destruction of data & hardware and
specific functionality to perform. All these keystroke & Other Input Logging.
layers work in collaboration for transmitting
the data from 1 person to another worldwide. 5. Loss of power and unauthorized change in
the functional unit of hardware comes under
2. The full form of OSI is OSI model is problems and issues of the physical layer.
______________ a) True
jin
a) Open Systems Interconnection b) False
b) Open Software Interconnection
c) Open Systems Internet Answer: a
d) Open Software Internet Explanation: Loss of power and
unauthorized change in the functional unit of
.re

Answer: a hardware comes under problems and issues of


Explanation: The OSI model is 7-layer the physical layer. Other such issues are
architecture where each layer is having some unauthorised network access, damage or
specific functionality to perform. All these destruction of data & hardware and keystroke
layers work in collaboration for transmitting & Other Input Logging.
w

the data from 1 person to another worldwide.


6. Which of the following is not a
3. Which of the following is not physical vulnerability of the data-link layer?
layer vulnerability? a) MAC Address Spoofing
w

a) Physical theft of data & hardware b) VLAN circumvention


b) Physical damage or destruction of data & c) Switches may be forced for flooding traffic
hardware to all VLAN ports
w

c) Unauthorized network access d) Overloading of transport-layer mechanisms


d) Keystroke & Other Input Logging
Answer: d
Answer: c Explanation: MAC Address Spoofing,
Explanation: Unauthorized network access is VLAN circumvention and switches may be

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

forced for flooding traffic to all VLAN ports 10. Which of the following is an example of
are examples of data-link layer vulnerability. physical layer vulnerability?
a) MAC Address Spoofing
7. ____________ is data-link layer b) Physical Theft of Data
vulnerability where stations are forced to c) Route spoofing
make direct communication with another d) Weak or non-existent authentication

om
station by evading logical controls.
a) VLAN attack Answer: b
b) VLAN Circumvention Explanation: Physical theft of data is an
c) VLAN compromisation method example of physical layer vulnerability. Other
d) Data-link evading such issues are unauthorized network access,
damage or destruction of data & hardware
Answer: b and keystroke & Other Input Logging.

.c
Explanation: VLAN Circumvention is data-
link layer vulnerability where stations are 11. Which of the following is an example of
forced to make direct communication with data-link layer vulnerability?
another station by evading logical controls a) MAC Address Spoofing

ul
implemented using subnets and firewalls. b) Physical Theft of Data
c) Route spoofing
8. ________________may be forced for d) Weak or non-existent authentication
flooding traffic to all VLAN ports allowing

connected to a VLAN.
pa
interception of data through any device that is Answer: a
Explanation: MAC Address spoofing is an
a) Switches example of data-link layer vulnerability.
b) Routers VLAN circumvention, as well as switches,
c) Hubs may be forced for flooding traffic to all
jin
d) Repeaters VLAN ports are some other examples of
data-link layer vulnerability.
Answer: a
Explanation: Switches may be forced for 12. Which of the following is an example of
flooding traffic to all VLAN ports allowing network layer vulnerability?
.re

interception of data through any device that a) MAC Address Spoofing


are connected to a VLAN. It is a vulnerability b) Physical Theft of Data
of data link layer. c) Route spoofing
d) Weak or non-existent authentication
9. Which of the following is not a
w

vulnerability of the network layer? Answer: c


a) Route spoofing Explanation: Route spoofing is an example
b) Identity & Resource ID Vulnerability of network layer vulnerability. Other
c) IP Address Spoofing examples of network layer vulnerabilities are
w

d) Weak or non-existent authentication IP Address Spoofing and Identity & Resource


ID Vulnerability.
Answer: d
w

Explanation: Weak or non-existent 13. Which of the following is an example of


authentication is a vulnerability of the session physical layer vulnerability?
layer. Route spoofing, identity & resource ID a) MAC Address Spoofing
vulnerability & IP Address Spoofing are b) Route spoofing
examples of network layer vulnerability.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) Weak or non-existent authentication a) coaxial cable


d) Keystroke & Other Input Logging b) twisted pair cable
c) optical fiber
Answer: d d) electrical cable
Explanation: Keystroke & other input
logging is an example of physical layer Answer: c

om
vulnerability. Other such physical layer Explanation: Fiber optics is considered to
vulnerabilities are unauthorized network have the highest transmission speed among
access, damage or destruction of data & the all mentioned above. The fiber optics
hardware and keystroke & Other Input transmission runs at 1000Mb/s. It is called as
Logging. 1000Base-Lx whereas IEEE standard for it is
802.3z. It is popularly used for modern day
14. Which of the following is an example of network connections due to its high

.c
data-link layer vulnerability? transmission rate.
a) Physical Theft of Data
b) VLAN circumvention 3. Bits can be sent over guided and unguided
c) Route spoofing media as analog signal by ___________

ul
d) Weak or non-existent authentication a) digital modulation
b) amplitude modulation
Answer: b c) frequency modulation
Explanation: VLAN circumvention is an
pa
example of data-link layer vulnerability.
MAC Address Spoofing, as well as switches,
d) phase modulation

Answer: a
may be forced for flooding traffic to all Explanation: In analog modulation, digital
VLAN ports are some other examples of low frequency baseband signal (digital bit
data-link layer vulnerability. stream) is transmitted over a higher
jin
frequency. Whereas in digital modulation the
only difference is that the base band signal is
TOPIC 1.6 PHYSICAL LAYER of discrete amplitude level. The bits are
represented by only two frequency levels, one
1. The physical layer is concerned with for high and one for low.
.re

___________
a) bit-by-bit delivery 4. The portion of physical layer that interfaces
p) process to process delivery with the media access control sublayer is
c) application to application delivery called ___________
d) port to port delivery a) physical signalling sublayer
w

b) physical data sublayer


Answer: a c) physical address sublayer
Explanation: Physical layer deals with bit to d) physical transport sublayer
bit delivery in networking. The data unit in
w

the physical layer is bits. Process to process Answer: a


delivery or the port to port delivery is dealt in Explanation: The portion of physical layer
the transport layer. The various transmission that interfaces with the medium access
w

mediums aid the physical layer in performing control sublayer is Physical Signaling
its functions. Sublayer. The main function of this layer is
character encoding, reception, decoding and
2. Which transmission media provides the performs optional isolation functions. It
highest transmission speed in a network?

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

handles which media connection the signal responsible for line coding, channel coding
should be forwarded to physically. and modulation that is needed for the
transmission of the information. The physical
5. The physical layer provides __________ configuration including pins, connectors and
a) mechanical specifications of electrical the electric current used is dealt in the
connectors and cables physical layer based on the requirement of the

om
b) electrical specification of transmission line network application.
signal level
c) specification for IR over optical fiber 8. The physical layer translates logical
d) all of the mentioned communication requests from the ______ into
hardware specific operations.
Answer: d a) data link layer
Explanation: Anything dealing with a b) network layer

.c
network cable or the standards in use – c) trasnport layer
including pins, connectors and the electric d) application layer
current used is dealt in the physical layer
(Layer 1). Physical layer deals with bit to bit Answer: a

ul
delivery of the data aided by the various Explanation: Physical layer accepts data or
transmission mediums. information from the data link layer and
converts it into hardware specific operations
6. In asynchronous serial communication the
physical layer provides ___________
a) start and stop signalling
pa so as to transfer the message through physical
cables. Some examples of the cables used are
optical fiber cables, twisted pair cables and
b) flow control co-axial cables.
c) both start & stop signalling and flow
control 9. A single channel is shared by multiple
jin
d) only start signalling signals by ____________
a) analog modulation
Answer: c b) digital modulation
Explanation: In asynchronous serial c) multiplexing
communication, the communication is not d) phase modulation
.re

synchronized by clock signal. Instead of a


start and stop signaling and flow control Answer: c
method is followed. Unlike asynchronous Explanation: In communication and
serial communication, in synchronous serial computer networks, the main goal is to share
communication a clock signal is used for a scarce resource. This is done by
w

communication, so the start and stop method multiplexing, where multiple analog or digital
is not really required. signals are combined into one signal over a
shared medium. The multiple kinds of signals
7. The physical layer is responsible for are designated by the transport layer which is
w

__________ the layer present on a higher level than the


a) line coding physical layer.
b) channel coding
w

c) modulation 10. Wireless transmission of signals can be


d) all of the mentioned done via ___________
a) radio waves
Answer: d b) microwaves
Explanation: The physical layer is

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) infrared Answer: d
d) all of the mentioned Explanation: Some of the properties of
Fourier transform are duality property, time
Answer: d scaling property, time shifting property,
Explanation: Wireless transmission is carried modulation property and many more.
out by radio waves, microwaves and IR

om
waves. These waves range from 3 Khz to 4. A base-band signal can be up-converted
above 300 Ghz and are more suitable for using
wireless transmission. Radio waves can a) Sine wave
penetrate through walls and are used in radio b) Cosine wave
communications, microwaves and infrared c) Filtering
(IR) waves cannot penetrate through walls d) None of the mentioned
and are used for satellite communications and

.c
device communications respectively. Answer: b
Explanation: A base-band signal can be up-
converted to band-pass filter by applying
TOPIC 1.7 OVERVIEW OF DATA cosine wave.

ul
AND SIGNALS
5. A band-pass signal can be down-converted
1. In the digital communication system, using
a) Sine wave
a) Orthogonal
b) Non orthogonal
pa
signals in different frequency bands are
b) Cosine wave
c) Time delayed wave
c) Orthogonal & Non orthogonal d) None of the mentioned
d) None of the mentioned
Answer: b
jin
Answer: a Explanation: For down-conversion of a
Explanation: In digital communication band-pass signal also cosine signal is used
system, signals from different frequency and multiplied with it.
bands are orthogonal thus interference won’t
6. In down-conversion multiplication with
.re

occur.
cosine wave is followed by
2. Properties of impulse function are a) Low pass filter
a) Symmetry b) High pass filter
b) Time scaling c) Bandpass filter
c) Shifting d) Bandstop filter
w

d) All of the mentioned


Answer: a
Answer: d Explanation: Downconversion of bandpass
Explanation: Some of the properties of signal includes multiplication with sine wave
w

impulse function are symmetry, time scaling followed by low pass filtering.
and shifting.
7. ADSL has _____ information channels.
w

3. Properties of Fourier transform are a) One


a) Duality property b) Three
b) Time shifting property c) Four
c) Modulation property d) None of the mentioned
d) All of the mentioned

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: b c) Infinity
Explanation: Asymmetric digital subscriber d) Cannot be determined
line has three information channels – a high
speed downstream channel, ISDN channel Answer: b
and medium speed duplex channel. Explanation: A band-pass signal has a
Fourier transform equal to zero for all value

om
8. Fourier transform of a signal gives the in both frequency and time domain.
a) Frequency content
b) Bandwidth 12. A band-pass signal has
c) Frequency content & Bandwidth a) DC component
d) None of the mentioned b) No DC component
c) No side lobes
Answer: c d) Cannot be determined

.c
Explanation: Fourier transform of a signal
give the frequency content and also Answer: b
determines the bandwidth of the signal. Explanation: A band-pass signal has no DC
components and has Fourier transform equal

ul
9. Random things in a communication system to zero. Outside the band it will not be exactly
are zero. Thus this results in presence of side
a) Timing offset lobes.
b) Device frequency
c) Attenuation
d) All of the mentioned
pa 13. Which are orthonormal signal
representation?
a) Sine and cosine at same frequency
Answer: d b) Wavelets
Explanation: Some of the random things in c) Complex sinusoids at a different frequency
jin
the communication system are noise in the d) All of the mentioned
channel, attenuation, fading, channel filtering,
device frequency, phase and timing offset. Answer: d
Explanation: Some of the common
10. Which can be used for periodic and non orthonormal signal representations are sine
.re

periodic? and cosine at the same frequency, Fourier


a) Fourier series serier, sinc functions centered at sampling
b) Fourier transforms times, wavelets etc.
c) Fourier series & transforms
d) None of the mentioned 14. Constellation diagram is plotted in
w

a) Constellation space
Answer: b b) Signal space
Explanation: Fourier series is limited to only c) Orthogonal space
periodic signals where as Fourier transforms d) Boundary space
w

and laplace transforms can be used for both


periodic and non periodic signals. Answer: b
Explanation: The constellation diagram is
w

11. A band-pass signal has a Fourier plotted in a space called as signal space.
transform equal to
a) One 15. Cumulative distributive function is
b) Zero a) Non negative
b) Non decreasing

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) Non negative & decreasing c) flow control


d) None of the mentioned d) channel coding

Answer: c Answer: d
Explanation: Cumulative distribution Explanation: Channel coding is the function
function is non negative and non decreasing of physical layer. Data link layer mainly deals

om
function. with framing, error control and flow control.
Data link layer is the layer where the packets
16. Which are non negative functions? are encapsulated into frames.
a) PDF
b) PMF 3. Which sublayer of the data link layer
c) PDF & PMF performs data link functions that depend upon
d) None of the mentioned the type of medium?

.c
a) logical link control sublayer
Answer: c b) media access control sublayer
Explanation: PDF, PMF and CDF are non c) network interface control sublayer
negative functions. d) error control sublayer

ul
Answer: b
TOPIC 1.8 INTRODUCTION TO Explanation: Media access control (MAC)
DATA LINK LAYER deals with transmission of data packets to and
pa
1. The data link layer takes the packets from
from the network-interface card, and also to
and from another remotely shared channel.
_________ and encapsulates them into The MAC sublayer also prevents collision
frames for transmission. using protocols like CSMA/CD.
a) network layer
jin
b) physical layer 4. Header of a frame generally contains
c) transport layer ______________
d) application layer a) synchronization bytes
b) addresses
Answer: a c) frame identifier
.re

Explanation: In computer networks, the data d) all of the mentioned


from application layer is sent to transport
layer and is converted to segments. These Answer: d
segments are then transferred to the network Explanation: In a frame, the header is a part
layer and these are called packets. These of the data that contains all the required
w

packets are then sent to data link layer where information about the transmission of the file.
they are encapsulated into frames. These It contains information like synchronization
frames are then transferred to physical layer bytes, addresses, frame identifier etc. It also
where the frames are converted to bits. Error contains error control information for
w

control and flow control data is inserted in the reducing the errors in the transmitted frames.
frames at the data link layer.
5. Automatic repeat request error
w

2. Which of the following tasks is not done by management mechanism is provided by


data link layer? ________
a) framing a) logical link control sublayer
b) error control b) media access control sublayer

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) network interface control sublayer c) hdlc


d) application access control sublayer d) all of the mentioned

Answer: a Answer: d
Explanation: The logical link control is a Explanation: There are many data link layer
sublayer of data link layer whose main protocols. Some of them are SDLC

om
function is to manage traffic, flow and error (synchronous data link protocol), HDLC
control. The automatic repeat request error (High level data link control), SLIP (serial
management mechanism is provided by the line interface protocol), PPP (Point to point
LLC when an error is found in the received protocol) etc. These protocols are used to
frame at the receiver’s end to inform the provide the logical link control function of
sender to re-send the frame. the Data Link Layer.

.c
6. When 2 or more bits in a data unit has been 9. Which of the following is the multiple
changed during the transmission, the error is access protocol for channel access control?
called ____________ a) CSMA/CD
a) random error b) CSMA/CA

ul
b) burst error c) Both CSMA/CD & CSMA/CA
c) inverted error d) HDLC
d) double error
Answer: c
Answer: b
pa
Explanation: When a single bit error occurs
Explanation: In CSMA/CD, it deals with
detection of collision after collision has
in a data, it is called single bit error. When occurred, whereas CSMA/CA deals with
more than a single bit of data is corrupted or preventing collision. CSMA/CD is
has error, it is called burst error. If a single bit abbreviation for Carrier Sensing Multiple
jin
error occurs, the bit can be simply repaired by Access/Collision detection. CSMA/CA is
inverting it, but in case of a burst error, the abbreviation for Carrier Sensing Multiple
sender has to send the frame again. Access/Collision Avoidance. These protocols
are used for efficient multiple channel access.
7. CRC stands for __________
.re

a) cyclic redundancy check 10. The technique of temporarily delaying


b) code repeat check outgoing acknowledgements so that they can
c) code redundancy check be hooked onto the next outgoing data frame
d) cyclic repeat check is called ____________
a) piggybacking
w

Answer: a b) cyclic redundancy check


Explanation: Cyclic redundancy check is a c) fletcher’s checksum
code that is added to a data which helps us to d) parity check
identify any error that occurred during the
w

transmission of the data. CRC is only able to Answer: a


detect errors, not correct them. CRC is Explanation: Piggybacking is a technique in
inserted in the frame trailer. which the acknowledgment is temporarily
w

delayed so as to be hooked with the next


8. Which of the following is a data link outgoing data frame. It saves a lot of channel
protocol? bandwidth as in non-piggybacking system,
a) ethernet some bandwidth is reserved for
b) point to point protocol acknowledgement.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

TOPIC 1.9 LINK LAYER Answer: b


Explanation: Media access control (MAC)
ADDRESSING deals with transmission of data packets to and
from the network-interface card, and also to
1. The data link layer takes the packets from and from another remotely shared channel.
_________ and encapsulates them into The MAC sublayer also prevents collision

om
frames for transmission. using protocols like CSMA/CD.
a) network layer
b) physical layer 4. Header of a frame generally contains
c) transport layer ______________
d) application layer a) synchronization bytes
b) addresses
Answer: a c) frame identifier

.c
Explanation: In computer networks, the data d) all of the mentioned
from application layer is sent to transport
layer and is converted to segments. These Answer: d
segments are then transferred to the network Explanation: In a frame, the header is a part

ul
layer and these are called packets. These of the data that contains all the required
packets are then sent to data link layer where information about the transmission of the file.
they are encapsulated into frames. These
pa It contains information like synchronization
frames are then transferred to physical layer bytes, addresses, frame identifier etc. It also
where the frames are converted to bits. Error contains error control information for
control and flow control data is inserted in the reducing the errors in the transmitted frames.
frames at the data link layer.
5. Automatic repeat request error
2. Which of the following tasks is not done by management mechanism is provided by
jin
data link layer? ________
a) framing a) logical link control sublayer
b) error control b) media access control sublayer
c) flow control c) network interface control sublayer
d) application access control sublayer
.re

d) channel coding

Answer: d Answer: a
Explanation: Channel coding is the function Explanation: The logical link control is a
of physical layer. Data link layer mainly deals sublayer of data link layer whose main
with framing, error control and flow control. function is to manage traffic, flow and error
w

Data link layer is the layer where the packets control. The automatic repeat request error
are encapsulated into frames. management mechanism is provided by the
LLC when an error is found in the received
3. Which sublayer of the data link layer frame at the receiver’s end to inform the
w

performs data link functions that depend upon sender to re-send the frame.
the type of medium?
a) logical link control sublayer 6. When 2 or more bits in a data unit has been
w

b) media access control sublayer changed during the transmission, the error is
c) network interface control sublayer called ____________
d) error control sublayer a) random error
b) burst error

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) inverted error c) Both CSMA/CD & CSMA/CA


d) double error d) HDLC

Answer: b Answer: c
Explanation: When a single bit error occurs Explanation: In CSMA/CD, it deals with
in a data, it is called single bit error. When detection of collision after collision has

om
more than a single bit of data is corrupted or occurred, whereas CSMA/CA deals with
has error, it is called burst error. If a single bit preventing collision. CSMA/CD is
error occurs, the bit can be simply repaired by abbreviation for Carrier Sensing Multiple
inverting it, but in case of a burst error, the Access/Collision detection. CSMA/CA is
sender has to send the frame again. abbreviation for Carrier Sensing Multiple
Access/Collision Avoidance. These protocols
7. CRC stands for __________ are used for efficient multiple channel access.

.c
a) cyclic redundancy check
b) code repeat check 10. The technique of temporarily delaying
c) code redundancy check outgoing acknowledgements so that they can
d) cyclic repeat check be hooked onto the next outgoing data frame

ul
is called ____________
Answer: a a) piggybacking
Explanation: Cyclic redundancy check is a b) cyclic redundancy check
code that is added to a data which helps us to
pa
identify any error that occurred during the
transmission of the data. CRC is only able to
c) fletcher’s checksum
d) parity check

detect errors, not correct them. CRC is Answer: a


inserted in the frame trailer. Explanation: Piggybacking is a technique in
which the acknowledgment is temporarily
jin
8. Which of the following is a data link delayed so as to be hooked with the next
protocol? outgoing data frame. It saves a lot of channel
a) ethernet bandwidth as in non-piggybacking system,
b) point to point protocol some bandwidth is reserved for
c) hdlc acknowledgement.
.re

d) all of the mentioned

Answer: d TOPIC 1.10 ERROR DETECTION


Explanation: There are many data link layer AND CORRECTION
protocols. Some of them are SDLC
w

(synchronous data link protocol), HDLC 1. In layering, n layers provide service to


(High level data link control), SLIP (serial a) n layer
line interface protocol), PPP (Point to point b) n-1 layer
protocol) etc. These protocols are used to c) n+1 layer
w

provide the logical link control function of d) none of the mentioned


the Data Link Layer.
Answer: c
w

9. Which of the following is the multiple Explanation: In layering n layer provides


access protocol for channel access control? service to n+1 layer and use the service
a) CSMA/CD provided by n-1 layer.
b) CSMA/CA

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

2. Which can be used as an intermediate a) 4 bits


device in between transmitter entity and b) 8 bits
receiver entity? c) 9 bits
a) IP router d) 16 bits
b) Microwave router
c) Telephone switch Answer: c

om
d) All of the mentioned Explanation: In synchronous transmission,
receiver must stay synchronous for 9 bits.
Answer: d
Explanation: IP router, microwave router and 7. How error detection and correction is
telephone switch can be used as an done?
intermediate device between communication a) By passing it through equalizer
of two entities. b) By passing it through filter

.c
c) By amplifying it
3. Which has comparatively high frequency d) By adding redundancy bits
component?
a) Sine wave Answer: d

ul
b) Cosine wave Explanation: Error can be detected and
c) Square wave corrected by adding additional information
d) None of the mentioned pa that is by adding redundancy bits.

Answer: c 8. Which is more efficient?


Explanation: Square wave has comparatively a) Parity check
high frequency component in them. b) Cyclic redundancy check
c) Parity & Cyclic redundancy check
4. Which has continuous transmission? d) None of the mentioned
jin
a) Asynchronous
b) Synchronous Answer: b
c) Asynchronous & Synchronous Explanation: Cyclic redundancy check is
d) None of the mentioned more efficient than parity check.
.re

Answer: b 9. Which can detect two bit errors?


Explanation: Synchronous has continuous a) Parity check
transmission where as asynchronous have b) Cyclic redundancy check
sporadic transmission. c) Parity & Cyclic redundancy check
d) None of the mentioned
w

5. Which requires bit transitions?


a) Asynchronous Answer: b
b) Synchronous Explanation: CRC is more powerful and it
c) Asynchronous & Synchronous can detect various kind of errors like 2 bit
w

d) None of the mentioned errors.

Answer: b 10. CRC uses


a) Multiplication
w

Explanation: Synchronous transmission


needs bit transition. b) Binary division
c) Multiplication & Binary division
6. In synchronous transmission, receiver must d) None of the mentioned
stay synchronous for

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: c Data link layer is the layer where the packets


Explanation: CRC uses more math like are encapsulated into frames.
multiplication and binary division.
3. Which sublayer of the data link layer
performs data link functions that depend upon
the type of medium?

om
a) logical link control sublayer
UNIT II MEDIA ACCESS b) media access control sublayer
c) network interface control sublayer
& INTERNETWORKING d) error control sublayer

TOPIC 2.1 OVERVIEW OF DATA Answer: b


Explanation: Media access control (MAC)
LINK CONTROL AND MEDIA

.c
deals with transmission of data packets to and
ACCESS CONTROL from the network-interface card, and also to
and from another remotely shared channel.
1. The data link layer takes the packets from The MAC sublayer also prevents collision

ul
_________ and encapsulates them into using protocols like CSMA/CD.
frames for transmission.
a) network layer 4. Header of a frame generally contains
______________
b) physical layer
c) transport layer
d) application layer
pa a) synchronization bytes
b) addresses
c) frame identifier
Answer: a d) all of the mentioned
Explanation: In computer networks, the data
jin
from application layer is sent to transport Answer: d
layer and is converted to segments. These Explanation: In a frame, the header is a part
segments are then transferred to the network of the data that contains all the required
layer and these are called packets. These information about the transmission of the file.
It contains information like synchronization
.re

packets are then sent to data link layer where


they are encapsulated into frames. These bytes, addresses, frame identifier etc. It also
frames are then transferred to physical layer contains error control information for
where the frames are converted to bits. Error reducing the errors in the transmitted frames.
control and flow control data is inserted in the
frames at the data link layer. 5. Automatic repeat request error
w

management mechanism is provided by


2. Which of the following tasks is not done by ________
data link layer? a) logical link control sublayer
a) framing b) media access control sublayer
w

b) error control c) network interface control sublayer


c) flow control d) application access control sublayer
d) channel coding
w

Answer: a
Answer: d Explanation: The logical link control is a
Explanation: Channel coding is the function sublayer of data link layer whose main
of physical layer. Data link layer mainly deals function is to manage traffic, flow and error
with framing, error control and flow control. control. The automatic repeat request error

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

management mechanism is provided by the line interface protocol), PPP (Point to point
LLC when an error is found in the received protocol) etc. These protocols are used to
frame at the receiver’s end to inform the provide the logical link control function of
sender to re-send the frame. the Data Link Layer.

6. When 2 or more bits in a data unit has been 9. Which of the following is the multiple

om
changed during the transmission, the error is access protocol for channel access control?
called ____________ a) CSMA/CD
a) random error b) CSMA/CA
b) burst error c) Both CSMA/CD & CSMA/CA
c) inverted error d) HDLC
d) double error
Answer: c

.c
Answer: b Explanation: In CSMA/CD, it deals with
Explanation: When a single bit error occurs detection of collision after collision has
in a data, it is called single bit error. When occurred, whereas CSMA/CA deals with
more than a single bit of data is corrupted or preventing collision. CSMA/CD is

ul
has error, it is called burst error. If a single bit abbreviation for Carrier Sensing Multiple
error occurs, the bit can be simply repaired by Access/Collision detection. CSMA/CA is
inverting it, but in case of a burst error, the
pa abbreviation for Carrier Sensing Multiple
sender has to send the frame again. Access/Collision Avoidance. These protocols
are used for efficient multiple channel access.
7. CRC stands for __________
a) cyclic redundancy check 10. The technique of temporarily delaying
b) code repeat check outgoing acknowledgements so that they can
c) code redundancy check be hooked onto the next outgoing data frame
jin
d) cyclic repeat check is called ____________
a) piggybacking
Answer: a b) cyclic redundancy check
Explanation: Cyclic redundancy check is a c) fletcher’s checksum
code that is added to a data which helps us to d) parity check
.re

identify any error that occurred during the


transmission of the data. CRC is only able to Answer: a
detect errors, not correct them. CRC is Explanation: Piggybacking is a technique in
inserted in the frame trailer. which the acknowledgment is temporarily
delayed so as to be hooked with the next
w

8. Which of the following is a data link outgoing data frame. It saves a lot of channel
protocol? bandwidth as in non-piggybacking system,
a) ethernet some bandwidth is reserved for
b) point to point protocol acknowledgement.
w

c) hdlc
d) all of the mentioned
TOPIC 2.2 ETHERNET (802.3)
w

Answer: d
Explanation: There are many data link layer 1. Ethernet frame consists of ____________
protocols. Some of them are SDLC a) MAC address
(synchronous data link protocol), HDLC b) IP address
(High level data link control), SLIP (serial

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) Default mask 5. Ethernet in metropolitan area network


d) Network address (MAN) can be used as ___________
a) pure ethernet
Answer: a b) ethernet over SDH
Explanation: The Ethernet frame has a c) ethernet over MPLS
header that contains the source and d) all of the mentioned

om
destination MAC address. Each MAC address
is of 48 bits. Answer: d
Explanation: A metropolitan area network
2. What is start frame delimeter (SFD) in (MAN) that is based on Ethernet standards is
ethernet frame? called an Ethernet MAN. It is commonly used
a) 10101010 to connect nodes to the Internet. Businesses
b) 10101011 also use Ethernet MANs to connect their own

.c
c) 00000000 offices to each other.
d) 11111111
6. A point-to-point protocol over ethernet is a
Answer: b network protocol for __________

ul
Explanation: The start frame delimiter is a 1 a) encapsulating PPP frames inside ethernet
byte field in the Ethernet frame that indicates frames
that the preceding bits are the start of the b) encapsulating ehternet framse inside PPP
frame. It is always set to 10101011.

3. MAC address is of ___________


pa frames
c) for security of ethernet frames
d) for security of PPP frames
a) 24 bits
b) 36 bits Answer: a
c) 42 bits Explanation: PPoE or Point-to-Point
jin
d) 48 bits protocol over Ethernet was first introduced in
1999. It is popularly used by modern day
Answer: d Internet Service Providers for Dial-up
Explanation: MAC address is like a local connectivity.
address for the NIC that is used to make a
.re

local Ethernet (or wifi) network function. It is 7. High speed ethernet works on _________
of 48 bits. a) coaxial cable
b) twisted pair cable
4. What is autonegotiation? c) optical fiber
a) a procedure by which two connected d) unshielded twisted pair cable
w

devices choose common transmission


parameters Answer: c
b) a security algorithm Explanation: Fast Ethernet is mostly used in
c) a routing algorithm networks along with Category 5 (Cat-5)
w

d) encryption algorithm copper twisted-pair cable, but it also works


with fiber-optic cable. Based on the cable
Answer: a being used, There can be three types of Fast
w

Explanation: autonegotiation is a procedure Ethernet.


by which two connected devices choose
common transmission parameters. It is a 8. The maximum size of payload field in
signaling mechanism used in Ethernet over ethernet frame is __________
Twisted pair cables. a) 1000 bytes

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

b) 1200 bytes devices itself


c) 1300 bytes d) all the nodes in the network
d) 1500 bytes
Answer: a
Answer: d Explanation: Access point in a wireless
Explanation: The minimum size of the network is any device that will allow the

om
payload field is 40 bytes and the maximum wireless devices to a wired network. A router
size is 1500 bytes. If the payload size exceeds is the best example of an Access Point.
1500 bytes, the frame is called a jumbo
frame. 2. In wireless ad-hoc network _________
a) access point is not required
9. What is interframe gap? b) access point is must
a) idle time between frames c) nodes are not required

.c
b) idle time between frame bits d) all nodes are access points
c) idle time between packets
d) idle time between networks Answer: a
Explanation: An ad-hoc wireless network is

ul
Answer: a a decentralized kind of a wireless network.
Explanation: The inter-frame gap is the idle An access point is usually a central device
time for the receiver between the incoming and it would go against the rules of the ad-
frame flow. The inter-frame gap must be as hoc network to use one. Hence it is not
pa
low as possible for idle connections. required.

10. An ethernet frame that is less than the 3. Which multiple access technique is used by
IEEE 802.3 minimum length of 64 octets is IEEE 802.11 standard for wireless LAN?
called _______ a) CDMA
jin
a) short frame b) CSMA/CA
b) runt frame c) ALOHA
c) mini frame d) CSMA/CD
d) man frame
Answer: b
.re

Answer: b Explanation: CSMA/CA stands for Carrier-


Explanation: An ethernet frame that is less sense multiple access/collision avoidance. It
than the IEEE 802.3 minimum length of 64 is a multiple access protocol used by IEEE
octets is called a runt frame. Such frames are 802.11 standard for wireless LAN. It’s based
a result of collisions or software on the principle of collision avoidance by
w

malfunctions. using different algorithms to avoid collisions


between channels.
TOPIC 2.3 WIRELESS LANS 4. In wireless distribution system __________
w

a) multiple access point are inter-connected


1. What is the access point (AP) in a wireless with each other
LAN? b) there is no access point
w

a) device that allows wireless devices to c) only one access point exists
connect to a wired network d) access points are not required
b) wireless devices itself
c) both device that allows wireless devices to Answer: a
connect to a wired network and wireless Explanation: A Wireless Distribution System

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

allows the connection of multiple access a) collision detection


points together. It is used to expand a wireless b) acknowledgement of data frames
network to a larger network. c) multi-mode data transmission
d) connection to wired networks
5. A wireless network interface controller can
work in _______ Answer: a

om
a) infrastructure mode Explanation: Collision detection is not
b) ad-hoc mode possible in wireless LAN with no extensions.
c) both infrastructure mode and ad-hoc mode Collision detection techniques for multiple
d) WDS mode access like CSMA/CD are used to detect
collisions in Wireless LANs.
Answer: c
Explanation: A wireless network interface 9. What is Wired Equivalent Privacy (WEP)?

.c
controller works on the physical layer and the a) security algorithm for ethernet
data link layer of the OSI model. b) security algorithm for wireless networks
Infrastructure mode WNIC needs access point c) security algorithm for usb communication
but in ad-hoc mode access point is not d) security algorithm for emails

ul
required.
Answer: b
6. In wireless network an extended service set Explanation: WEP is a security algorithm for
is a set of ________ wireless network which intended to provide
a) connected basic service sets
b) all stations
pa data confidentiality comparable to that of
traditional wired networks. It was introduced
c) all access points in 1997.
d) connected access points
10. What is WPA?
jin
Answer: a a) wi-fi protected access
Explanation: The extended service set is a b) wired protected access
part of the IEEE 802.11 WLAN architecture c) wired process access
and is used to expand the range of the basic d) wi-fi process access
service set by allowing connection of multiple
.re

basic service sets. Answer: a


Explanation: WPA or WiFi Protected Access
7. Mostly ________ is used in wireless LAN. is a security protocol used to provide users
a) time division multiplexing and firms with strong data security and
b) orthogonal frequency division multiplexing protection for their wireless networks (WiFi)
w

c) space division multiplexing to give them confidence that only authorized


d) channel division multiplexing users can access their network.

Answer: b
w

Explanation: In orthogonal frequency TOPIC 2.4 AVAILABLE


division multiplexing, digital data is encoded PROTOCOLS
on multiple carrier frequencies. It is also used
w

in digital television and audio broadcasting in 1. Protocol is a set of


addition to Wireless LANs. a) Formats
b) Procedures
8. Which one of the following event is not c) Formats & Procedures
possible in wireless LAN? d) None of the mentioned

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: c b) Virtual circuits, datagrams


Explanation: Protocol is a set of procedures c) Datagrams
and formats that entities use to communicate d) None of the mentioned
information.
Answer: b
2. The time required to transmit frame Explanation: Datagram is connection-less

om
depends on and virtual circuits are connection oriented.
a) Frame size
b) Channel capacity 7. Which uses UDP?
c) Frame size & Channel capacity a) Echo
d) None of the mentioned b) Time
c) Domain name server
Answer: c d) All of the mentioned

.c
Explanation: The time to transmit frame is
given by the ratio of frame size and channel Answer: d
capacity. Explanation: The protocols using UDP are
echo, time, domain name server, network file

ul
3. Window given the number of system etc.
a) Bytes
b) Frames 8. Which uses TCP?
c) Bytes & Frames a) Simple mail transfer protocol
d) None of the mentioned
pa b) Simple network management protocol
c) Simple mail transfer & network
Answer: c management protocol
Explanation: Window gives the number of d) None of the mentioned
frames or bytes that can be in transit
jin
unacknowledged. Answer: a
Explanation: Some of the protocols using
4. Routing is TCP are http, telnet, file transfer protocol,
a) Static simple mail transfer protocol etc.
b) Dynamic
.re

c) Static & Dynamic 9. Which tells about low level transmission


d) None of the mentioned and framing?
a) V series
Answer: c b) X series
Explanation: Routing can be static and c) G series
w

dynamic. d) Q series

5. Routing is performed only centrally. Answer: c


a) True Explanation: G series tells about level
w

b) False transmission, modulation and framing.

Answer: a 10. Which tells about signalling?


Explanation: Routing is performed centrally a) V series
w

and also in fully distributed way. b) X series


c) G series
6. Which is connection oriented and which is d) Q series
connection-less?
a) Datagrams, virtual circuits

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: d of 10 meters. It operates on 2.45 GHz


Explanation: Q series tells about signalling. frequency band for transmission.

4. Bluetooth uses __________


TOPIC 2.5 BLUETOOTH, a) frequency hopping spread spectrum
BLUETOOTH LOW ENERGY b) orthogonal frequency division multiplexing

om
c) time division multiplexing
1. An interconnected collection of piconet is d) channel division multiplexing
called ___________
a) scatternet Answer: a
b) micronet Explanation: Frequency hopping spread
c) mininet spectrum is a method of transmitting radio
d) multinet signals by rapidly changing the carrier

.c
frequency and is controlled by the codes
Answer: a known to the sender and receiver only.
Explanation: Piconet is the basic unit of a
bluetooth system having a master node and 5. Unauthorised access of information from a

ul
upto seven active slave nodes. A collection of wireless device through a bluetooth
piconets is called scatternet and a slave node connection is called _________
of a piconet may act as a master in a piconet a) bluemaking
b) bluesnarfing
that is part of the scatternet.
pa
2. In a piconet, there can be up to ________
c) bluestring
d) bluescoping
parked nodes in the network.
a) 63 Answer: b
b) 127 Explanation: Unauthorised access of
jin
c) 255 information from a wireless device through a
d) 511 bluetooth connection is called Bluesnarfing. It
is done through exploiting the vulnerabilities
Answer: c of the Bluetooth device to steal the
Explanation: A slave node in a piconet can transmitted information.
.re

be instructed by the master node to go into


parked mode. Then the slave node enters the 6. What is A2DP (advanced audio
parked mode in which the node is not distribution profile)?
disconnected from the network but is inactive a) a bluetooth profile for streaming audio
unless the master wakes it up. b) a bluetooth profile for streaming video
w

c) a bluetooth profile for security


3. Bluetooth is the wireless technology for d) a bluetooth profile for file management
__________
a) local area network Answer: a
w

b) personal area network Explanation: A2DP stands for Advanced


c) metropolitan area network Audio Distribution Profile is a transfer
d) wide area network standard use to transmit high definition audio
w

through Bluetooth. It is mainly used in


Answer: b Bluetooth speakers and wireless headphones.
Explanation: Bluetooth is a wireless
technology used to create a wireless personal 7. In a piconet, one master device ________
area network for data transfer up to a distance a) can not be slave

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

b) can be slave in another piconet Answer: a


c) can be slave in the same piconet Explanation: A scatternet can have
d) can be master in another piconet maximum of 10 piconets and minimum of 2
piconets. To connect these piconets, a slave
Answer: b node of one piconet may act as a master in a
Explanation: In a scatternet, a slave node of piconet that is part of the scatternet.

om
one piconet may act as a master in a piconet
that is part of the scatternet. The scatternet
uses this property to connect many piconets TOPIC 2.6 WIFI
together to create a larger network.
1. What is the access point (AP) in a wireless
8. Bluetooth transceiver devices operate in LAN?
______ band. a) device that allows wireless devices to

.c
a) 2.4 GHz ISM connect to a wired network
b) 2.5 GHz ISM b) wireless devices itself
c) 2.6 GHz ISM c) both device that allows wireless devices to
d) 2.7 GHz ISM connect to a wired network and wireless

ul
devices itself
Answer: a d) all the nodes in the network
Explanation: Bluetooth operates on 2.45
GHz frequency ISM band for transmission. It
pa
is used to create a wireless personal area
network for data transfer up to a distance of
Answer: a
Explanation: Access point in a wireless
network is any device that will allow the
10 meters. wireless devices to a wired network. A router
is the best example of an Access Point.
9. Bluetooth supports _______
jin
a) point-to-point connections 2. In wireless ad-hoc network _________
b) point-to-multipoint connection a) access point is not required
c) both point-to-point connections and point- b) access point is must
to-multipoint connection c) nodes are not required
d) multipoint to point connection d) all nodes are access points
.re

Answer: c Answer: a
Explanation: In Bluetooth, each slave node Explanation: An ad-hoc wireless network is
communicates with the master of the piconet a decentralized kind of a wireless network.
independently i.e. each master-slave An access point is usually a central device
w

connection is independent. The slave is not and it would go against the rules of the ad-
allowed to communicate with other slaves hoc network to use one. Hence it is not
directly. required.
w

10. A scatternet can have maximum 3. Which multiple access technique is used by
__________ IEEE 802.11 standard for wireless LAN?
a) 10 piconets a) CDMA
w

b) 20 piconets b) CSMA/CA
c) 30 piconets c) ALOHA
d) 40 piconets d) CSMA/CD

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: b service set by allowing connection of multiple


Explanation: CSMA/CA stands for Carrier- basic service sets.
sense multiple access/collision avoidance. It
is a multiple access protocol used by IEEE 7. Mostly ________ is used in wireless LAN.
802.11 standard for wireless LAN. It’s based a) time division multiplexing
on the principle of collision avoidance by b) orthogonal frequency division multiplexing

om
using different algorithms to avoid collisions c) space division multiplexing
between channels. d) channel division multiplexing

4. In wireless distribution system __________ Answer: b


a) multiple access point are inter-connected Explanation: In orthogonal frequency
with each other division multiplexing, digital data is encoded
b) there is no access point on multiple carrier frequencies. It is also used

.c
c) only one access point exists in digital television and audio broadcasting in
d) access points are not required addition to Wireless LANs.

Answer: a 8. Which one of the following event is not

ul
Explanation: A Wireless Distribution System possible in wireless LAN?
allows the connection of multiple access a) collision detection
points together. It is used to expand a wireless b) acknowledgement of data frames
c) multi-mode data transmission
network to a larger network.
pa
5. A wireless network interface controller can
d) connection to wired networks

work in _______ Answer: a


a) infrastructure mode Explanation: Collision detection is not
b) ad-hoc mode possible in wireless LAN with no extensions.
jin
c) both infrastructure mode and ad-hoc mode Collision detection techniques for multiple
d) WDS mode access like CSMA/CD are used to detect
collisions in Wireless LANs.
Answer: c
Explanation: A wireless network interface 9. What is Wired Equivalent Privacy (WEP)?
.re

controller works on the physical layer and the a) security algorithm for ethernet
data link layer of the OSI model. b) security algorithm for wireless networks
Infrastructure mode WNIC needs access point c) security algorithm for usb communication
but in ad-hoc mode access point is not d) security algorithm for emails
required.
w

Answer: b
6. In wireless network an extended service set Explanation: WEP is a security algorithm for
is a set of ________ wireless network which intended to provide
a) connected basic service sets data confidentiality comparable to that of
w

b) all stations traditional wired networks. It was introduced


c) all access points in 1997.
d) connected access points
w

10. What is WPA?


Answer: a a) wi-fi protected access
Explanation: The extended service set is a b) wired protected access
part of the IEEE 802.11 WLAN architecture c) wired process access
and is used to expand the range of the basic d) wi-fi process access

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: a layer specification for constrained nodes


Explanation: WPA or WiFi Protected Access supporting HTTP and Web integration.
is a security protocol used to provide users
and firms with strong data security and 4. ________ tags, devices, smart phones
protection for their wireless networks (WiFi) useful in identification.
to give them confidence that only authorized a) IETF 6LoWPAN

om
users can access their network. b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN
TOPIC 2.7 6LOWPAN–ZIGBEE
Answer: c
1. Which protocol is used to link all the Explanation: RFID/NFC – tags, devices,
devices in the IoT? smart phones useful in product / object

.c
a) TCP/IP identification and gathering associated
b) Network information.
c) UDP
d) HTTP 5. ________ supports low energy radio

ul
operation.
Answer: a a) IETF 6LoWPAN
Explanation: The internet of Thing is the b) IEFT CoAP
c) RFID/NFC
pa
global system of interconnected computer
networks that use the Internet Protocol suite
(TCP/IP) to link billions of devices
d) Bluetooth

worldwide. Answer: d
Explanation: Bluetooth SMART devices
2. ________ enables seamless integration of support low energy radio operations like,
jin
LoWPAN devices with internet leveraging. heart rate monitors, blood glucose monitors
a) IETF 6LoWPAN suitable for health care and fitness etc.
b) IEFT CoAP
c) RFID/NFC 6. ________ specification defining the PHY
d) IEEE 802.15.4.LoWPAN and MAC layer of low power devices.
.re

a) IETF 6LoWPAN
Answer: a b) IEFT CoAP
Explanation: IETF 6LoWPAN enables c) RFID/NFC
seamless integration of LoWPAN devices d) IEEE 802.15.4.LoWPAN
with internet leveraging IPv6 large address
w

space and appln. Layer protocol reuse. Answer: d


Explanation: IEEE 802.15.4.LoWPAN –
3. ________ enables open application layer specification defining the PHY and MAC
for constrained nodes. layer of low power devices supporting 250
w

a) IETF 6LoWPAN Kb/s data rate, small packet size 127 bytes.
b) IEFT CoAP
c) RFID/NFC 7. 6LoWPAN Adaption layer contains?
w

d) IEEE 802.15.4.LoWPAN a) Header compression


b) Fragmentation
Answer: b c) Layer 2 forwarding
Explanation: IETF CoAP – open application d) Header compression, Fragmentation, and
Layer 2 forwarding

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: d HTTP. CoAP resources are identified by


Explanation: 6LoWPAN Adaption Layer: Uniform Resource Identifiers.
Header compression
Fragmentation 11. Which protocol interacts asynchronously
Layer 2 forwarding. over UDP?
a) HMTP

om
8. ________ is an application layer protocol b) CoAP
for resource constrained devices. c) MQTT
a) CoAP d) TCP/IP
b) HMTP
c) MQTT Answer: b
d) TCP/IP Explanation: CoAP is an application layer
protocol (IETF draft) for resource constrained

.c
Answer: a devices. It is Asynchronous message
Explanation: CoAP is an application layer interactions over UDP, Request/Response
protocol (IETF draft) for resource constrained semantics CoAP resources are identified by
devices. Adheres to the Restful approach for Uniform Resource Identifiers.

ul
managing the resources and support mapping
to HTTP. 12. CoAP messages are short.
a) True
9. Adheres to ________ approach for b) False

HTTP.
pa
managing resources and support mapping to
Answer: a
a) RETful Explanation: CoAP messages are short – 4
b) IoT bytes header followed by options (Typically,
c) Restful 10-20 bytes header).
jin
d) RESTful
13. How many messages types are there in
Answer: d CoAP?
Explanation: CoAP is an application layer a) 2
protocol (IETF draft) for resource constrained b) 5
.re

devices. Adheres to RESTful approach for c) 3


managing resources and support mapping to d) 4
HTTP.
Answer: d
10. ________ resources are identified by Explanation: Four message types are:
w

Uniform Resource Identifiers. Confirmable


a) CoAP Non confirmable
b) HMTP Acknowledgments
c) MQTT Reset.
w

d) TCP/IP
14. Number of methods in CoAP?
Answer: a a) 2
w

Explanation: CoAP is an application layer b) 5


protocol (IETF draft) for resource constrained c) 4
devices. Adheres to Restful approach for d) 3
managing resources and support mapping to

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: c Answer: d
Explanation: Four CoAP methods: Explanation: In the OSI model, network
GET layer is the third layer and it provides data
POST routing paths for network communications.
PUT Error control is a function of the data link
DELETE. layer and the transport layer.

om
15. WSN stands for __________ 3. A 4 byte IP address consists of
a) Wired Sensor Network __________
b) Wireless Sensor Network a) only network address
c) Wired Service Network b) only host address
d) Wireless Service Network c) network address & host address
d) network address & MAC address

.c
Answer: b
Explanation: WSN – Wireless Sensor Answer: c
Network comprises of motes running a WSN Explanation: An ip address which is 32 bits
application and a light weight CoAP server. long, that means it is of 4 bytes and is

ul
composed of a network and host portion and
it depends on address class. The size of the
TOPIC 2.8 NETWORK LAYER host address and network address depends
SERVICES
pa
1. The network layer is concerned with
upon the class of the address in classful IP
addressing.

__________ of data. 4. In virtual circuit network each packet


a) bits contains ___________
b) frames a) full source and destination address
jin
c) packets b) a short VC number
d) bytes c) only source address
d) only destination address
Answer: c
Explanation: In computer networks, the data Answer: b
.re

from the application layer is sent to the Explanation: A short VC number also called
transport layer and is converted to segments. as VCID (virtual circuit identifier) is a type of
These segments are then transferred to the identifier which is used to distinguish
network layer and these are called packets. between several virtual circuits in a
These packets are then sent to data link layer connection oriented circuit switched network.
w

where they are encapsulated into frames. Each virtual circuit is used to transfer data
These frames are then transferred to physical over a larger packet switched network.
layer where the frames are converted to bits.
5. Which of the following routing algorithms
w

2. Which one of the following is not a can be used for network layer design?
function of network layer? a) shortest path algorithm
a) routing b) distance vector routing
w

b) inter-networking c) link state routing


c) congestion control d) all of the mentioned
d) error control
Answer: d
Explanation: The routing algorithm is what

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

decides where a packet should go next. There Answer: d


are several routing techniques like shortest Explanation: The Routing Information
path algorithm, static and dynamic routing, Protocol (RIP) is used by the network layer
decentralized routing, distance vector routing, for the function of dynamic routing.
link state routing, Hierarchical routing etc. Congestion control focuses on the flow of the
The routing algorithms go hand in hand with traffic in the network and uses algorithms like

om
the operations of all the routers in the traffic aware routing, admission control and
networks. The routers are the main load shedding to deal with congestion.
participants in these algorithms.
9. The network layer protocol for internet is
6. Which of the following is not correct in __________
relation to multi-destination routing? a) ethernet
a) is same as broadcast routing b) internet protocol

.c
b) contains the list of all destinations c) hypertext transfer protocol
c) data is not sent by packets d) file transfer protocol
d) there are multiple receivers
Answer: b

ul
Answer: c Explanation: There are several protocols
Explanation: In multi-destination routing, used in Network layer. Some of them are IP,
there is more than one receiver and the route
pa ICMP, CLNP, ARP, IPX, HRSP etc.
for each destination which is contained in a Hypertext transfer protocol is for application
list of destinations is to be found by the layer and ethernet protocol is for data link
routing algorithm. Multi-destination routing layer.
is also used in broadcasting.
10. ICMP is primarily used for __________
7. A subset of a network that includes all the a) error and diagnostic functions
jin
routers but contains no loops is called b) addressing
________ c) forwarding
a) spanning tree d) routing
b) spider structure
c) spider tree Answer: a
.re

d) special tree Explanation: ICMP abbreviation for Internet


Control Message Protocol is used by
Answer: a networking devices to send error messages
Explanation: Spanning tree protocol (STP) is and operational information indicating a host
a network protocol that creates a loop free or router cannot be reached. ICMP operates
w

logical topology for ethernet networks. It is a over the IP packet to provide error reporting
layer 2 protocol that runs on bridges and functionality as IP by itself cannot report
switches. The main purpose of STP is to errors.
ensure that you do not create loops when you
w

have redundant paths in your network.


TOPIC 2.9 PACKET SWITCHING
8. Which one of the following algorithm is
w

not used for congestion control? 1. A local telephone network is an example of


a) traffic aware routing a _______ network.
b) admission control a) Packet switched
c) load shedding b) Circuit switched
d) routing information protocol

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) Bit switched 4. What are the Methods to move data


d) Line switched through a network of links and switches?
a) Packet switching and Line switching
Answer: b b) Circuit switching and Line switching
Explanation: Circuit switching is connection c) Line switching and bit switching
oriented switching technique, whereas in the d) Packet switching and Circuit switching

om
case of packet switching, it is connectionless.
Circuit switching is implemented in the Answer: d
Physical layer, whereas packet switching is Explanation: Packet switching and Circuit
implemented in the Network layer. Internet switching are two different types of switching
too is based on the concept of circuit methods used to connect the multiple
switching. communicating devices with one another.
Packet switching is used in conventional

.c
2. Most packet switches use this principle LAN systems and circuit switching is used in
____________ telephonic systems.
a) Stop and wait
b) Store and forward 5. The required resources for communication

ul
c) Store and wait between end systems are reserved for the
d) Stop and forward duration of the session between end systems
in ________ method.
Answer: b
pa
Explanation: The packet switch will not
transmit the first bit to outbound link until it
a) Packet switching
b) Circuit switching
c) Line switching
receives the entire packet. If the entire packet d) Frequency switching
is not received and the time-out period
expires, the packet switch will inform the Answer: b
jin
sender to resend the part of packet or the Explanation: In circuit switching, a physical
entire packet based on the algorithm being path between the sender and receiver is
used. established. This path is maintained until the
connection is needed. Circuit switching is
3. If there are N routers from source to implemented in the Physical layer and is used
.re

destination, the total end to end delay in in telephonic systems.


sending packet P(L-> number of bits in the
packet R-> transmission rate) is equal to 6. As the resources are reserved between two
______________ communicating end systems in circuit
a) N switching, ___________ is achieved.
w

b) (N*L)/R a) authentication
c) (2N*L)/R b) guaranteed constant rate
d) L/R c) reliability
d) store and forward
w

Answer: b
Explanation: The equation to find the end to Answer: b
end delay when no. of bits, transmission rate Explanation: Circuit switching is connection
w

and no. of routers is given by (N*L)/R. The oriented and is always implemented in the
total end to end delay, that is, nodal delay is physical layer. Once a path is set, all
the sum of all, the processing delay, queuing transmission occurs through the same path. It
delay, transmission delay and propagation is used since the early times in telephonic
delay. systems.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

7. In _________ systems, resources are 2. Which of the following field in IPv4


allocated on demand. datagram is not related to fragmentation?
a) packet switching a) Flags
b) circuit switching b) Offset
c) line switching c) TOS
d) frequency switching d) Identifier

om
Answer: a Answer: c
Explanation: In packet switching, the bits are Explanation: TOS-type of service identifies
received in out of order and need to be the type of packets. It is not related to
assembled at the receiver end, whereas in the fragmentation but is used to request specific
case of Circuit switching, all the bits are treatment such as high throughput, high
received in order. All transmissions may not reliability or low latency for the IP packet

.c
occur through the same path in case of packet depending upon the type of service it belongs
switching. to.

8. Which of the following is not an 3. The TTL field has value 10. How many

ul
application layer service? routers (max) can process this datagram?
a) Network virtual terminal a) 11
b) File transfer, access, and management
pa b) 5
c) Mail service c) 10
d) Error control d) 1

Answer: d Answer: c
Explanation: Application layer is the Explanation: TTL stands for Time to Live.
topmost layer in the OSI model. Network This field specifies the life of the IP packet
jin
virtual terminal, mail service, file transfer, based on the number of hops it makes
access and management are all services of the (Number of routers it goes through). TTL
application layer. It uses protocols like HTTP, field is decremented by one each time the
FTP, and DNS etc. to provide these services. datagram is processed by a router. When the
value is 0, the packet is automatically
.re

destroyed.
TOPIC 2.10 IPV4 ADDRESS
4. If the value in protocol field is 17, the
1. Which of the following is not applicable transport layer protocol used is
for IP? _____________
w

a) Error reporting a) TCP


b) Handle addressing conventions b) UDP
c) Datagram format c) ICMP
d) Packet handling conventions d) IGMP
w

Answer: a Answer: b
Explanation: The Internet Protocol is the Explanation: The protocol field enables the
w

networking protocol which establishes the demultiplexing feature so that the IP protocol
internet by relaying datagrams across network can be used to carry payloads of more than
boundaries. ICMP is a supporting protocol for one protocol type. Its most used values are 17
IP which handles the Error Reporting and 6 for UDP and TCP respectively. ICMP
functionality. and IGMP are network layer protocols.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

5. The data field cannot carry which of the c) overlapping of fragments.


following? d) all of the mentioned
a) TCP segment
b) UDP segment Answer: d
c) ICMP messages Explanation: Fragmentation makes the
d) SMTP messages implementation of the IP protocol complex

om
and can also be exploited by attackers to
Answer: c create a DOS attack such as a teardrop attack.
Explanation: Data field usually has transport Fragmentation won’t be required if the
layer segments, but it can also carry ICMP transport layer protocols perform wise
messages. SMTP is an application layer segmentation.
protocol. First it must go through the
transport layer to be converted into TCP 9. Which field helps to check rearrangement

.c
segments and then it can be inserted into IP of the fragments?
packets. a) offset
b) flag
6. What should be the flag value to indicate c) ttl

ul
the last fragment? d) identifer
a) 0
b) 1 Answer: a
Explanation: The Fragment Offset field
c) TTl value
d) Protocol field value
pa specifies where the fragment fits in the
original datagram. The offset of the first
Answer: a fragment will always be 0. The size of the
Explanation: The Flag field in the IP header field (13 bits) is 3-bits shorter than the size of
is used to control and identify the fragments. the total length field (16 bits).
jin
It contains three bits: reserved, don’t
fragment and more fragments. If the more
fragments bit is 0, it means that the fragment
TOPIC 2.11 NETWORK LAYER
is the last fragment. PROTOCOLS ( IP, ICMP,
MOBILE IP)
.re

7. Which of these is not applicable for IP


protocol? 1. The network layer is concerned with
a) is connectionless __________ of data.
b) offer reliable service a) bits
c) offer unreliable service b) frames
w

d) does not offer error reporting c) packets


d) bytes
Answer: b
Explanation: IP does not provide reliable
w

Answer: c
delivery service for the data. It’s dependent Explanation: In computer networks, the data
upon the transport layer protocols like TCP to from the application layer is sent to the
offer reliability. transport layer and is converted to segments.
w

These segments are then transferred to the


8. Which of the following demerits does
network layer and these are called packets.
Fragmentation have?
These packets are then sent to data link layer
a) complicates routers
where they are encapsulated into frames.
b) open to DOS attack

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

These frames are then transferred to physical 5. Which of the following routing algorithms
layer where the frames are converted to bits. can be used for network layer design?
a) shortest path algorithm
2. Which one of the following is not a b) distance vector routing
function of network layer? c) link state routing
a) routing d) all of the mentioned

om
b) inter-networking
c) congestion control Answer: d
d) error control Explanation: The routing algorithm is what
decides where a packet should go next. There
Answer: d are several routing techniques like shortest
Explanation: In the OSI model, network path algorithm, static and dynamic routing,
layer is the third layer and it provides data decentralized routing, distance vector routing,

.c
routing paths for network communications. link state routing, Hierarchical routing etc.
Error control is a function of the data link The routing algorithms go hand in hand with
layer and the transport layer. the operations of all the routers in the
networks. The routers are the main

ul
3. A 4 byte IP address consists of participants in these algorithms.
__________
a) only network address 6. Which of the following is not correct in
b) only host address
c) network address & host address
d) network address & MAC address
pa relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
Answer: c d) there are multiple receivers
Explanation: An ip address which is 32 bits
jin
long, that means it is of 4 bytes and is Answer: c
composed of a network and host portion and Explanation: In multi-destination routing,
it depends on address class. The size of the there is more than one receiver and the route
host address and network address depends for each destination which is contained in a
upon the class of the address in classful IP list of destinations is to be found by the
.re

addressing. routing algorithm. Multi-destination routing


is also used in broadcasting.
4. In virtual circuit network each packet
contains ___________ 7. A subset of a network that includes all the
a) full source and destination address routers but contains no loops is called
w

b) a short VC number ________


c) only source address a) spanning tree
d) only destination address b) spider structure
c) spider tree
w

Answer: b d) special tree


Explanation: A short VC number also called
as VCID (virtual circuit identifier) is a type of Answer: a
w

identifier which is used to distinguish Explanation: Spanning tree protocol (STP) is


between several virtual circuits in a a network protocol that creates a loop free
connection oriented circuit switched network. logical topology for ethernet networks. It is a
Each virtual circuit is used to transfer data layer 2 protocol that runs on bridges and
over a larger packet switched network. switches. The main purpose of STP is to

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

ensure that you do not create loops when you functionality as IP by itself cannot report
have redundant paths in your network. errors.

8. Which one of the following algorithm is


not used for congestion control?
a) traffic aware routing
UNIT III ROUTING

om
b) admission control
c) load shedding
d) routing information protocol
TOPIC 3.1 ROUTING
Answer: d
Explanation: The Routing Information 1. Which type of Ethernet framing is used for
Protocol (RIP) is used by the network layer TCP/IP and DEC net?

.c
for the function of dynamic routing. a) Ethernet 802.3
Congestion control focuses on the flow of the b) Ethernet 802.2
traffic in the network and uses algorithms like c) Ethernet II
traffic aware routing, admission control and

ul
d) Ethernet SNAP
load shedding to deal with congestion.
Answer: c
9. The network layer protocol for internet is Explanation: The Ethernet 802.3 framing is
__________
a) ethernet
b) internet protocol
pa used for NetWare versions 2 to 3.11, and the
Ethernet 802.2 framing is used for NetWare
versions 3.12 and later plus OSI routing,
c) hypertext transfer protocol Ethernet II is used with TCP/IP and DEC net,
d) file transfer protocol and Ethernet SNAP is used with TCP/IP and
AppleTalk. The type field in Ethernet 802.2
jin
Answer: b frame is replaced by a length field in Ethernet
Explanation: There are several protocols 802.3.
used in Network layer. Some of them are IP,
ICMP, CLNP, ARP, IPX, HRSP etc. 2. Consider a situation in which you are a
Hypertext transfer protocol is for application
.re

system administrator on a NetWare network,


layer and ethernet protocol is for data link you are running NetWare 4.11 and you cannot
layer. communicate with your router. What is the
likely problem?
10. ICMP is primarily used for __________ a) NetWare 4.11 defaults to 802.2
a) error and diagnostic functions encapsulation
w

b) addressing b) NetWare 4.11 defaults to 802.3


c) forwarding encapsulation
d) routing c) Cisco routers only work with NetWare 3.11
w

d) NetWare 3.11 defaults to 802.2


Answer: a encapsulation
Explanation: ICMP abbreviation for Internet
Control Message Protocol is used by Answer: a
w

networking devices to send error messages Explanation: The default encapsulation on


and operational information indicating a host Cisco routers is Novell Ethernet_802.3 and
or router cannot be reached. ICMP operates NetWare 3.12and later defaults to 802.2
over the IP packet to provide error reporting encapsulation, 3.11 and earlier defaults to
802.3.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

3. NetWare IPX addressing uses a network SAP (Service Advertisement Protocol)


number and a node number. Which statement advertises network services. NCP (NetWare
is not true? Core Protocol) provides client-to-server
a) The network address is administratively connections and applications. RIP is a
assigned and can be up to 16 hexadecimal distance vector routing protocol. NLSP was
digits long developed by Novell to replace RIP routing

om
b) The node address is always protocols.
administratively assigned
c) The node address is usually the MAC 6. As a system administrator, you want to
address debug IGRP but are worried that the “debug
d) If the MAC address is used as the node IP IGRP transaction” command will flood the
address, then IPX eliminates the use of ARP console. What is the command that you
should use?

.c
Answer: b a) Debug IP IGRP event
Explanation: The network address can be up b) Debug IP IGRP-events
to 16 hexadecimal digits in length. The node c) Debug IP IGRP summary
number is 12 hexadecimal digits. The node d) Debug IP IGRP events

ul
address is usually the MAC address. An
example IPX address is 4a1d.0000.0c56.de33. Answer: d
The network part is 4a1d. The node part is
pa Explanation: The “debug IP IGRP events” is
0000.0c56.de33. The network number is used to display a short summary of IGRP
assigned by the system administrator of the routing information. You can append an IP
Novell network and the MAC address/node address onto either console’s command-line
address is not assigned by the administrator. to see only the IGRP updates from a
neighbor. The command will only give a short
4. Which NetWare protocol works on layer 3– summary and hence won’t flood the
jin
network layer—of the OSI model? command line.
a) IPX
b) NCP 7. What does the following series of
c) SPX commands “Router IGRP 71 network”
accomplish?
.re

d) NetBIOS
10.0.0.0 router IGRP 109 network 172.68.7.0
Answer: a a) It isolates networks 10.0.0.0 and 172.68.7.0
Explanation: IPX (Internetwork Packet b) It loads IGRP for networks 109 and 71
Exchange) is the NetWare network layer 3 c) It disables RIP
protocol used for transferring information on d) It disables all routing protocols
w

LANs that use Novell’s NetWare.


Answer: a
5. Which NetWare protocol provides link- Explanation: It isolates network 10.0.0.0 and
state routing? 172.68.7.0 and associates autonomous
w

a) NLSP systems 109 and71 with IGRP. IGRP does not


b) RIP disable RIP, both can be used at the same
c) SAP time.
w

d) NCP
8. The “IPX delay number” command will
Answer: a allow an administrator to change the default
Explanation: NetWare Link Services settings. What are the default settings?
Protocol (NLSP) provides link-state routing. a) For LAN interfaces, one tick; for WAN

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

interfaces, six ticks c) It is the default for Cisco IPX load sharing
b) For LAN interfaces, six ticks; for WAN d) It enables load sharing on 2 paths if the
interfaces, one tick paths are unequal metric paths
c) For LAN interfaces, zero ticks; for WAN
interfaces, five ticks Answer: a
d) For LAN interfaces, five ticks; for WAN Explanation: It enables load sharing on 2

om
interfaces, zero Ticks paths if the paths are equal metric paths. The
default is 1 path and the maximum is 512
Answer: a paths. The value must always be greater than
Explanation: Tick is basically the update rate 1 and must be a natural number.
of clients in the network. The IPX delay
number will give the ticks at a certain time. 11. You want to enable both arpa and snap
The default ticks are–for LAN interfaces, one encapsulation on one router interface. How

.c
tick, and for WAN interfaces, six ticks. do you do this?
a) The interface can handle multiple
9. As a system administrator, you need to set encapsulation types with no extra
up one Ethernet interface on the Cisco router configuration

ul
to allow for both sap and Novell-ether b) Assign two network numbers, one for each
encapsulations. Which set of commands will encapsulation type
accomplish this? pa c) Enable Novell-ether to run multiple
a) Interface Ethernet 0.1 IPX encapsulation encapsulation types
Novell-ether IPX network 9e interface d) Both arpa and snap are enabled by default
Ethernet 0.2 IPX network 6c so you don’t have to configure anything
b) Interface Ethernet 0 IPX encapsulation
Novell-ether IPX network 9e interface Answer: b
Ethernet 0 IPX encapsulation sap IPX Explanation: To assign multiple network
jin
network 6c numbers, you usually use sub interfaces. A
c) Interface Ethernet 0.1 IPX encapsulation sample configuration follows: IPXEthernet
Novell-ether interface Ethernet 0.2 IPX 0.1 IPX encapsulation novell-ether ipx
encapsulation sap network 9e interface ethernet 0.2 ipx
encapsulation sap ipx network 6c
.re

d) Interface Ethernet 0.1ipx encapsulation


Novell-ether IPX network 9e interface
Ethernet 0.2 IPX encapsulation sap IPX 12. By default, Cisco routers forward GNS
network 6c SAPs to remote networks.
a) False
Answer: d b) True
w

Explanation: The following commands setup


the sub interfaces to allow for two types of Answer: a
encapsulation:interface Ethernet 0.1 IPX Explanation: GNS is Novell’s protocol to
encapsulation Novell-ether IPX network 9e Get Nearest Server. If there is a server on the
w

interface Ethernet0.2 IPX encapsulation sap local network,that server will respond. If
IPX network 6c. there isn’t, the Cisco router has to be
configured to forward theGNS SAP.
w

10. What does the “IPX maximum-paths 2”


command accomplish? 13. To prevent Service Advertisements
a) It enables load sharing on 2 paths if the (SAPs) from flooding a network, Cisco
paths are equal metric paths routers do not forward them. How are
b) It sets up routing to go to network 2 services advertised to other networks?

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

a) Each router builds its own SAP table and b) Urgent


forwards that every 60 seconds c) Forwarding
b) Each router assigns a service number and d) Delivering
broadcasts that
c) SAPs aren’t necessary with Cisco routers Answer: c
d) Cisco routers filter out all SAPs Explanation: Forwarding is done by the

om
nodes in the path from source to destination,
Answer: a that are not the intended destination for the
Explanation: Cisco routers build SAP tables packet in order to pass the packet to the next
and forward the table every 60 seconds. All node in the path. The destination machine
SAPs can’t befiltered even with 4.x since does not forward the packet to any other
NDS and time synchronization uses SAPs. node.

.c
14. Novell’s implementation of RIP updates 2. A second technique to reduce routing table
routing tables every _________ seconds. and simplify searching process is called
a) 60 _________
b) 90 a) Network-Specific Method

ul
c) 10 b) Network-Specific Motion
d) 30 c) Network-Specific Maintaining
d) Network-Specific Membership
Answer: a
pa
Explanation: Novell’s RIP updates routing
tables every 60 seconds, Apple’s RTMP is
Answer: a
Explanation: In the network specific
every 10 seconds, routers ARP every 60 forwarding method, there is only one record,
seconds, IGRP signal every 90 seconds, and the destination of the packet, in the routing
Banyan VINES signals every 90 seconds. table and not the other hosts of the network.
jin
The other two forwarding methods are the
15. In Novell’s use of RIP, there are two default method and the next-hop method.
metrics used to make routing decisions.
Select the correct metrics. 3. Next-Hop Method is used to reduce
a) Ticks & Hops contents of a _________
.re

b) Hops & Loops a) Revolving table


c) Loops & Counts b) Rotating Table
d) Counts & Ticks c) Routing Table
d) Re-allocate table
Answer: a
w

Explanation: It first uses ticks (which is Answer: c


about 1/18 sec.); if there is a tie, it uses hops; Explanation: In the next-hop forwarding
if hops are equal, then it uses an method, the routing table of each router in the
administratively assigned tiebreaker. path contains the address of only the next hop
w

in the path of packet. This method is suitable


for short distances only.
TOPIC 3.2 UNICAST ROUTING
ALGORITHMS
w

4. Several techniques can make size of


routing table manageable and also handle
1. The term that is used to place packet in its issues such as __________
route to its destination is called __________ a) Maturity
a) Delayed b) Error reporting

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) Tunneling c) Network
d) Security d) Link

Answer: d Answer: a
Explanation: The size of the routing table in Explanation: The Djikstra’s shortest path
the technique must be manageable for the algorithm is the fastest among the algorithms

om
network nodes i.e. it must not be too big. for finding the shortest path in a graph. But it
Security of the forwarding packet is the is a greedy method based algorithm so it does
highest priority for a technique and must be not guarantee the shortest path every time.
high enough so that only authorized senders
and receivers can access the packet’s content. 8. In Multicast Routing Protocol, flooding is
used to broadcast packets but it creates
5. Host-specific routing is used for purposes ________

.c
such as checking route or providing _____ a) Gaps
a) Network Measures b) Loops
b) Security Measures c) Holes
c) Routing Measures d) Links

ul
d) Delivery Measures
Answer: b
Answer: b Explanation: In multicast routing, there is
Explanation: In host-specific routing, the one sender and many receivers. So flooding is
pa
route of the packet is defined based on the
exact match of the packet’s IP with the
the most basic method to forward packets to
many receivers. The one issue with flooding
routing table entry of the host. It provides the is that it creates routing loops. One loop
best security for the packet as the packet is prevention method is that the routers will not
forwarded only to routers in the pre-defined send the packet to a node where the packet
jin
path. has been received before.

6. In Unicast routing, if instability is between 9. RPF stands for __________


three nodes, stability cannot be ________ a) Reverse Path Forwarding
a) Stable b) Reverse Path Failure
.re

b) Reversed c) Reverse Packet Forwarding


c) Guaranteed d) Reverse Protocol Failure
d) Forward
Answer: a
Answer: c Explanation: Reverse Path Forwarding is a
w

Explanation: In Unicast routing, there is only loop-free forwarding method for multi-cast
sender and one receiver. So, if there is routing in modern systems. The method
instability between three nodes, in which one focuses on forwarding the packet away from
is sender, one is receiver and one is the router the source IP in each iteration to make sure
w

in the path, there is no other path available for there is no loops.


the packet and the stability of the network is
not guaranteed. 10. LSP stands for __________
w

a) Link Stable Packet


7. In Unicast Routing, Dijkstra algorithm b) Link State Packet
creates a shortest path tree from a ________ c) Link State Protocol
a) Graph d) Link State Path
b) Tree

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: b c) Static & Dynamic


Explanation: A Link State Packet is a packet d) None of the mentioned
created by a router that lists its neighboring
nodes and routers in link state routing Answer: c
protocol. It is shared with other routers to find Explanation: Routing can be static and
the shortest path from a source to the dynamic.

om
destination.
5. Routing is performed only centrally.
a) True
TOPIC 3.3 PROTOCOLS b) False

1. Protocol is a set of Answer: a


a) Formats Explanation: Routing is performed centrally

.c
b) Procedures and also in fully distributed way.
c) Formats & Procedures
d) None of the mentioned 6. Which is connection oriented and which is
connection-less?

ul
Answer: c a) Datagrams, virtual circuits
Explanation: Protocol is a set of procedures b) Virtual circuits, datagrams
and formats that entities use to communicate c) Datagrams
d) None of the mentioned
information.
pa
2. The time required to transmit frame Answer: b
depends on Explanation: Datagram is connection-less
a) Frame size and virtual circuits are connection oriented.
b) Channel capacity
jin
c) Frame size & Channel capacity 7. Which uses UDP?
d) None of the mentioned a) Echo
b) Time
Answer: c c) Domain name server
Explanation: The time to transmit frame is d) All of the mentioned
.re

given by the ratio of frame size and channel


capacity. Answer: d
Explanation: The protocols using UDP are
3. Window given the number of echo, time, domain name server, network file
a) Bytes system etc.
w

b) Frames
c) Bytes & Frames 8. Which uses TCP?
d) None of the mentioned a) Simple mail transfer protocol
b) Simple network management protocol
w

Answer: c c) Simple mail transfer & network


Explanation: Window gives the number of management protocol
frames or bytes that can be in transit d) None of the mentioned
w

unacknowledged.
Answer: a
4. Routing is Explanation: Some of the protocols using
a) Static TCP are http, telnet, file transfer protocol,
b) Dynamic simple mail transfer protocol etc.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

9. Which tells about low level transmission Answer: a


and framing? Explanation: In the network specific
a) V series forwarding method, there is only one record,
b) X series the destination of the packet, in the routing
c) G series table and not the other hosts of the network.
d) Q series The other two forwarding methods are the

om
default method and the next-hop method.
Answer: c
Explanation: G series tells about level 3. Next-Hop Method is used to reduce
transmission, modulation and framing. contents of a _________
a) Revolving table
10. Which tells about signalling? b) Rotating Table
a) V series c) Routing Table

.c
b) X series d) Re-allocate table
c) G series
d) Q series Answer: c
Explanation: In the next-hop forwarding

ul
Answer: d method, the routing table of each router in the
Explanation: Q series tells about signalling. path contains the address of only the next hop
pa in the path of packet. This method is suitable
TOPIC 3.4 MULTICAST for short distances only.
ROUTING AND ITS BASICS 4. Several techniques can make size of
routing table manageable and also handle
1. The term that is used to place packet in its issues such as __________
route to its destination is called __________ a) Maturity
jin
a) Delayed b) Error reporting
b) Urgent c) Tunneling
c) Forwarding d) Security
d) Delivering
Answer: d
.re

Answer: c Explanation: The size of the routing table in


Explanation: Forwarding is done by the the technique must be manageable for the
nodes in the path from source to destination, network nodes i.e. it must not be too big.
that are not the intended destination for the Security of the forwarding packet is the
packet in order to pass the packet to the next highest priority for a technique and must be
w

node in the path. The destination machine high enough so that only authorized senders
does not forward the packet to any other and receivers can access the packet’s content.
node.
5. Host-specific routing is used for purposes
w

2. A second technique to reduce routing table such as checking route or providing _____
and simplify searching process is called a) Network Measures
_________ b) Security Measures
w

a) Network-Specific Method c) Routing Measures


b) Network-Specific Motion d) Delivery Measures
c) Network-Specific Maintaining
d) Network-Specific Membership Answer: b
Explanation: In host-specific routing, the

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

route of the packet is defined based on the the most basic method to forward packets to
exact match of the packet’s IP with the many receivers. The one issue with flooding
routing table entry of the host. It provides the is that it creates routing loops. One loop
best security for the packet as the packet is prevention method is that the routers will not
forwarded only to routers in the pre-defined send the packet to a node where the packet
path. has been received before.

om
6. In Unicast routing, if instability is between 9. RPF stands for __________
three nodes, stability cannot be ________ a) Reverse Path Forwarding
a) Stable b) Reverse Path Failure
b) Reversed c) Reverse Packet Forwarding
c) Guaranteed d) Reverse Protocol Failure
d) Forward

.c
Answer: a
Answer: c Explanation: Reverse Path Forwarding is a
Explanation: In Unicast routing, there is only loop-free forwarding method for multi-cast
sender and one receiver. So, if there is routing in modern systems. The method

ul
instability between three nodes, in which one focuses on forwarding the packet away from
is sender, one is receiver and one is the router the source IP in each iteration to make sure
in the path, there is no other path available for
pa there is no loops.
the packet and the stability of the network is
not guaranteed. 10. LSP stands for __________
a) Link Stable Packet
7. In Unicast Routing, Dijkstra algorithm b) Link State Packet
creates a shortest path tree from a ________ c) Link State Protocol
a) Graph d) Link State Path
jin
b) Tree
c) Network Answer: b
d) Link Explanation: A Link State Packet is a packet
created by a router that lists its neighboring
Answer: a nodes and routers in link state routing
.re

Explanation: The Djikstra’s shortest path protocol. It is shared with other routers to find
algorithm is the fastest among the algorithms the shortest path from a source to the
for finding the shortest path in a graph. But it destination.
is a greedy method based algorithm so it does
not guarantee the shortest path every time.
TOPIC 3.5 OVERVIEW OF
w

8. In Multicast Routing Protocol, flooding is INTRADOMAIN AND


used to broadcast packets but it creates INTERDOMAIN PROTOCOLS
________
w

a) Gaps 1. Open Shortest Path First (OSPF) is also


b) Loops called as _____________
c) Holes a) Link state protocol
w

d) Links b) Error-correction protocol


c) Routing information protocol
Answer: b
d) Border gateway protocol
Explanation: In multicast routing, there is
one sender and many receivers. So flooding is

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: a c) Routing information protocol


Explanation: In OSPF, the link state of each d) Hello protocol
path is checked, and then the shortest path is
chosen among only the open state links. Each Answer: d
OSPF router monitors the cost of the link to Explanation: Hello protocol is used to
each of its neighbors and then floods the link discover neighboring routers automatically. It

om
state information to other routers in the makes sure that the communication between
network. neighbors is bidirectional. It’s similar to the
real world moral construct of saying “Hello”
2. The computation of the shortest path in to initialize the communication.
OSPF is usually done by ____________
a) Bellman-ford algorithm 5. Which of the following is not a type of
b) Routing information protocol OSPF packet?

.c
c) Dijkstra’s algorithm a) Hello
d) Distance vector routing b) Link-state request
c) Link-state response
Answer: c d) Link-state ACK

ul
Explanation: Shortest path in OSPF is
usually computed by Dijkstra’s algorithm. It Answer: c
was proposed by Edsger W. Dijkstra in the Explanation: The five types of OSPF packets
are: Hello, Database description, Link-state
pa
year 1956. It is a greedy method algorithm
and hence may not guarantee the shortest path
every time, but is really fast.
request, Link-state update, and Link-state
ACK. There is no Link-state response packet;
the neighbor router sends a Link-state update
3. Which of the following is false with packet as a response to the Link-state request
respect to the features of OSPF? packet if there is an update in the routing
jin
a) Support for fixed-length subnetting by table.
including the subnet mask in the routing
message 6. What is the correct order of the operations
b) More flexible link cost than can range from of OSPF?
1 to 65535 i – Hello packets
.re

c) Use of designated router ii – Propagation of link-state information and


d) Distribution of traffic over multiple paths building of routing tables
that have equal cost to the destination iii – Establishing adjacencies and
synchronization of database
Answer: a a) i-ii-iii
w

Explanation: OSPF provides support for b) i-iii-ii


variable-length sunbathing by including the c) iii-ii-i
subnet mask in the routing message. For fixed d) ii-i-iii
length subnets, there is no requirement for
w

including the subnet mask in the routing Answer: b


message as there is just one subnet mask for Explanation: OSPF first implements a hello
all the subnets. protocol. Then it later on tries to establish
w

synchronisation with database. Later on


4. In OSPF, which protocol is used to building of routing tables is done.
discover neighbour routers automatically?
a) Link state protocol 7. In OSPF header, which field is used to
b) Error-correction protocol detect errors in the packet?

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

a) Type b) MS
b) Area ID c) Database descriptor sequence number
c) Authentication type d) Options
d) Checksum
Answer: c
Answer: d Explanation: Sequence number field is used

om
Explanation: Checksum field is used to to detect a missing packet. The packets are to
detect errors. It makes sure that the data be received in order of the sequence number,
portions that are being sent are all in integrity. so if the receiver detects that there is a
It can detect duplicated bits. Once an error is sequence number skipped or missing in the
detected, the sender has to re-transmit the order, it stops processing the further received
data as it won’t receive an acknowledgement. packets and informs the sender to retransmit
the packets in sequence.

.c
8. In OSPF database descriptor packet, if
there are more database descriptor packets in
the flow, ‘M’ field is set to ____________ TOPIC 3.6 OVERVIEW OF IPV6
a) 1 ADDRESSING – TRANSITION

ul
b) 0 FROM IPV4 TO IPV6
c) more
d) -1 pa 1. The size of an IP address in IPv6 is
_________
Answer: a
a) 4 bytes
Explanation: The “M” bit is the more bit,
b) 128 bits
which indicates that there are more packets to
c) 8 bytes
be received in the descriptor packet flow
d) 100 bits
whenever it is set to 1. There is also an “I” bit
jin
which indicates if the packet is first in the Answer: b
flow. Explanation: An IPv6 address is 128 bits
long. Therefore, 2128 i.e. 340 undecillion
9. In OSPF database descriptor packet, which
addresses are possible in IPv6. IPv4 has only
field is used to indicate that the router is
.re

4 billion possible addresses and IPv6 would


master?
be a brilliant alternative in case IPv4 runs out
a) M
of possible new addresses.
b) MS
c) I 2. The header length of an IPv6 datagram is
d) Options ___________
w

a) 10bytes
Answer: b
b) 25bytes
Explanation: The MS bit is used to indicate
c) 30bytes
if the origin of the packet is a master or a
w

d) 40bytes
slave. If it is set to 1, the source of the packet
is a master, and if it is set to 0, the source of Answer: d
the packet is a slave. Explanation: IPv6 datagram has fixed header
w

length of 40bytes, which results in faster


10. In OSPF database descriptor packet,
processing of the datagram. There is one
which field is used to detect a missing
fixed header and optional headers which may
packet?
or may not exist. The fixed header contains
a) LSA header
the mandatory essential information about the

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

packet while the optional headers contain the a) Hop limit


optional “not that necessary” information. b) TTL
c) Next header
3. In the IPv6 header, the traffic class field is d) Type of traffic
similar to which field in the IPv4 header?
a) Fragmentation field Answer: a

om
b) Fast-switching Explanation: The Hop limit value is
c) ToS field decremented by one by a router when the
d) Option field datagram is forwarded by the router. When
the value becomes zero the datagram is
Answer: c discarded. The field is 8-bits wide, so an IPv6
Explanation: The traffic class field is used to packet can live up to 255 router hops only.
specify the priority of the IP packet which is a

.c
similar functionality to the Type of Service 7. Dual-stack approach refers to _________
field in the IPv4 header. It’s an 8-bit field and a) implementing Ipv4 with 2 stacks
its values are not defined in the RFC 2460. b) implementing Ipv6 with 2 stacks
c) node has both IPv4 and IPv6 support

ul
4. IPv6 does not use _________ type of d) implementing a MAC address with 2
address. stacks
a) broadcast
b) multicast Answer: c
c) anycast
d) unicast
pa Explanation: Dual-stack is one of the
approaches used to support IPv6 in already
existing systems. ISPs are using it as a
Answer: a method to transfer from IPv4 to IPv6
Explanation: There is no concept of completely eventually due to the lower
jin
broadcast address in IPv6. Instead, there is an number of possible available addresses in
anycast address in IPv6 which allows sending IPv4.
messages to a group of devices but not all
devices in a network. Anycast address is not 8. Suppose two IPv6 nodes want to
standardized in IPv4. interoperate using IPv6 datagrams, but they
.re

are connected to each other by intervening


5. Which among the following features is IPv4 routers. The best solution here is
present in IPv6 but not in IPv4? ________
a) Fragmentation a) Use dual-stack approach
b) Header checksum b) Tunneling
w

c) Options c) No solution
d) Anycast address d) Replace the system

Answer: d Answer: b
w

Explanation: There is an anycast address in Explanation: The IPv4 routers can form a
IPv6 which allows sending messages to a tunnel in which at the sender’s side, the IPv6
group of devices but not all devices in a datagram is encapsulated in to IPv4, and at
w

network. Anycast address is not standardized the receiver’s side of the tunnel, the IPv4
in IPv4. packet is stripped and the IPv6 packet is sent
to the receiver.
6. The _________ field determines the
lifetime of IPv6 datagram

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

9. Teredo is an automatic tunneling technique. c) TCP and UDP


In each client the obfuscated IPv4 address is d) HTTP and FTP
represented by bits ______
a) 96 to 127 Answer: c
b) 0 to 63 Explanation: Both TCP and UDP are
c) 80 to 95 transport layer protocol in networking. TCP is

om
d) 64 to 79 an abbreviation for Transmission Control
Protocol and UDP is an abbreviation for User
Answer: a Datagram Protocol. TCP is connection
Explanation: Teredo is a technique through oriented whereas UDP is connectionless.
which gives the possibility for full IPv6
network connectivity to IPv6 capable hosts 3. User datagram protocol is called
which are currently on an IPv4 network. Bits connectionless because _____________

.c
96 to 127 in the datagram represents a) all UDP packets are treated independently
obfuscated 1Pv4 address of the IPv4 network. by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent

ul
order
d) it sends data very quickly
UNIT IV TRANSPORT
Answer: a
LAYER
pa Explanation: UDP is an alternative for TCP
and it is used for those purposes where speed
TOPIC 4.1 INTRODUCTION TO matters most whereas loss of data is not a
problem. UDP is connectionless whereas TCP
TRANSPORT LAYER is connection oriented.
jin
1. Transport layer aggregates data from 4. Transmission control protocol
different applications into a single stream ___________
before passing it to ____________ a) is a connection-oriented protocol
a) network layer b) uses a three way handshake to establish a
.re

b) data link layer connection


c) application layer c) receives data from application as a single
d) physical layer stream
d) all of the mentioned
Answer: a
w

Explanation: The flow of data in the OSI Answer: d


model flows in following manner Application Explanation: TCP provides reliable and
-> Presentation -> Session -> Transport -> ordered delivery of a stream of bytes between
Network -> Data Link -> Physical. Each and hosts communicating via an IP network.
w

every layer has its own set of functions and Major internet applications like www, email,
protocols to ensure efficient network file transfer etc rely on TCP. TCP is
performance. connection oriented and it is optimized for
w

accurate delivery rather than timely delivery.


2. Which of the following are transport layer
protocols used in networking? 5. An endpoint of an inter-process
a) TCP and FTP communication flow across a computer
b) UDP and HTTP network is called __________

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

a) socket c) node
b) pipe d) protocol
c) port
d) machine Answer: a
Explanation: Just as the IP address identifies
Answer: a the computer, the network port identifies the

om
Explanation: Socket is one end point in a two application or service running on the
way communication link in the network. TCP computer. A port number is 16 bits. The
layer can identify the application that data is combination of IP address preceded with the
destined to be sent by using the port number port number is called the socket address.
that is bound to socket.
9. Transport layer protocols deals with
6. Socket-style API for windows is called ____________

.c
____________ a) application to application communication
a) wsock b) process to process communication
b) winsock c) node to node communication
c) wins d) man to man communication

ul
d) sockwi
Answer: b
Answer: b Explanation: Transport layer is 4th layer in
Explanation: Winsock is a programming TCP/IP model and OSI reference model. It
pa
interface which deals with input output
requests for internet applications in windows
deals with logical communication between
process. It is responsible for delivering a
OS. It defines how windows network message between network host.
software should access network services.
10. Which of the following is a transport
jin
7. Which one of the following is a version of layer protocol?
UDP with congestion control? a) stream control transmission protocol
a) datagram congestion control protocol b) internet control message protocol
b) stream control transmission protocol c) neighbor discovery protocol
c) structured stream transport d) dynamic host configuration protocol
.re

d) user congestion control protocol


Answer: a
Answer: a Explanation: The Stream Control
Explanation: The datagram congestion Transmission Protocol (SCTP) is a transport
control is a transport layer protocol which layer protocol used in networking system
w

deals with reliable connection setup, where streams of data are to be continuously
teardown, congestion control, explicit transmitted between two connected network
congestion notification, and feature nodes. Some of the other transport layer
negotiation. It is used in modern day systems protocols are RDP, RUDP, TCP, DCCP, UDP
w

where there are really high chances of etc.


congestion. The protocol was last updated in
the year 2008.
TOPIC 4.2 USER DATAGRAM
w

8. A _____ is a TCP name for a transport PROTOCOLS (UDP)


service access point.
a) port 1. Which of the following is false with
b) pipe respect to UDP?

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

a) Connection-oriented Answer: c
b) Unreliable Explanation: As UDP does not provide
c) Transport layer protocol assurance of delivery of packet, reliability
d) Low overhead and other services, the overhead taken to
provide these services is reduced in UDP’s
Answer: a operation. Thus, UDP provides low overhead,

om
Explanation: UDP is an unreliable, and higher speed.
connectionless transport layer protocol that
provides message-based data transmission. 5. Port number used by Network Time
TCP is an example of connection-oriented Protocol (NTP) with UDP is ________
protocols. a) 161
b) 123
2. Return value of the UDP port “Chargen” is c) 162

.c
_______ d) 124
a) String of characters
b) String of integers Answer: b
c) Array of characters with integers Explanation: The Network Time Protocol is

ul
d) Array of zero’s and one’s a clock synchronization network protocol
implemented by using UDP port number 123
Answer: a to send and receive time stamps.
Explanation: Using Chargen with UDP on
pa
port 19, the server sends a UDP datagram
containing a random number of characters
6. What is the header size of a UDP packet?
a) 8 bytes
every time it receives a datagram from the b) 8 bits
connecting host. The number of characters is c) 16 bytes
between 0 and 512. d) 124 bytes
jin
3. Beyond IP, UDP provides additional Answer: a
services such as _______ Explanation: The fixed size of the UDP
a) Routing and switching packet header is 8 bytes. It contains four two-
b) Sending and receiving of packets byte fields: Source port address, Destination
.re

c) Multiplexing and demultiplexing port address, Length of packet, and


d) Demultiplexing and error checking checksum.

Answer: d 7. The port number is “ephemeral port


Explanation: De-multiplexing is the number”, if the source host is _______
w

delivering of received segments to the correct a) NTP


application layer processes at the recipients b) Echo
end using UDP. Error checking is done c) Server
through checksum in UDP. d) Client
w

4. What is the main advantage of UDP? Answer: d


a) More overload Explanation: Port numbers from 1025 to
w

b) Reliable 5000 are used as ephemeral port numbers in


c) Low overhead Windows Operating System. Ephemeral port
d) Fast numbers are short-lived port numbers which
can be used for clients in a UDP system
where there are temporary clients all the time.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

8. “Total length” field in UDP packet header datagram as UDP doesn’t have to ensure the
is the length of _________ delivery of the packet.
a) Only UDP header
b) Only data
c) Only checksum
TOPIC 4.3 TRANSMISSION
d) UDP header plus data CONTROL PROTOCOLS (TCP),

om
SERVICES, FEATURES, TCP
Answer: d CONNECTION, STATE
Explanation: Total length is the 16 bit field
which contains the length of UDP header and
TRANSITION DIAGRAM
the data. The maximum value of the Total
length field and the maximum size of a UDP 1. Which of the following is false with
datagram is 65,535 bytes (8 byte header + respect to TCP?

.c
65,527 bytes of data). a) Connection-oriented
b) Process-to-process
9. Which is the correct expression for the c) Transport layer protocol
length of UDP datagram? d) Unreliable

ul
a) UDP length = IP length – IP header’s
length Answer: d
b) UDP length = UDP length – UDP header’s Explanation: TCP is a transport layer
protocol that provides reliable and ordered
length
pa
c) UDP length = IP length + IP header’s
length
delivery of a stream of bytes between hosts
communicating via an IP network.
d) UDP length = UDP length + UDP header’s
length 2. In TCP, sending and receiving data is done
as _______
jin
Answer: a a) Stream of bytes
Explanation: A user datagram is b) Sequence of characters
encapsulated in an IP datagram. There is a c) Lines of data
field in the IP header that defines the total d) Packets
length of the IP packet. There is another field
.re

in the IP header that defines the length of the Answer: a


header. So if we subtract the length of the IP Explanation: TCP provides stream oriented
header that is encapsulated in the IP packet, delivery between hosts communicating via an
we get the length of UDP datagram. IP network and there are no message
boundaries. TCP can concatenate data from a
w

10. The ______ field is used to detect errors number of send () commands into one stream
over the entire user datagram. of data and still transmit it reliably.
a) udp header
b) checksum 3. TCP process may not write and read data at
w

c) source port the same speed. So we need __________ for


d) destination port storage.
a) Packets
w

Answer: b b) Buffers
Explanation: Checksum field is used to c) Segments
detect errors over the entire user datagram. d) Stacks
Though it is not as efficient as CRC which is
used in TCP, it gets the job done for the UDP

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: b a specific time period has passed, it


Explanation: A TCP receiver has a receive retransmits the data.
buffer that is used to store the unprocessed
incoming packets in case the sender is 7. In segment header, sequence number and
sending packets faster than the processing acknowledgement number fields refer to
rate of the received packets. _______

om
a) Byte number
4. TCP groups a number of bytes together b) Buffer number
into a packet called _______ c) Segment number
a) Packet d) Acknowledgment
b) Buffer
c) Segment Answer: a
d) Stack Explanation: As TCP has to ensure ordered

.c
delivery of packets, sequence number and
Answer: c acknowledgement number are used to
Explanation: A segment may be collection of identify the byte number of the packet in the
data from many send () statements. TCP stream of bytes being transmitted.

ul
transmits each segment as a stream of bytes.
8. Suppose a TCP connection is transferring a
5. Communication offered by TCP is file of 1000 bytes. The first byte is numbered
________ 10001. What is the sequence number of the
a) Full-duplex
b) Half-duplex
pa segment if all data is sent in only one
segment?
c) Semi-duplex a) 10000
d) Byte by byte b) 10001
c) 12001
jin
Answer: a d) 11001
Explanation: Data can flow both the
directions at the same time during a TCP Answer: b
communication hence, it is full-duplex. This Explanation: The sequence number given to
is the reason why TCP is used in systems that first byte of a segment, with respect to its
.re

require full-duplex operation such as e-mail order among the previous segments, is the
systems. sequence number of that segment.

6. To achieve reliable transport in TCP, 9. Bytes of data being transferred in each


___________ is used to check the safe and connection are numbered by TCP. These
w

sound arrival of data. numbers start with a _________


a) Packet a) Fixed number
b) Buffer b) Random sequence of 0’s and 1’s
c) Segment c) One
w

d) Acknowledgment d) Sequence of zero’s and one’s

Answer: d Answer: d
w

Explanation: Acknowledgment mechanism Explanation: One might expect the sequence


is used to check the safe and sound arrival of number of the first byte in the stream to be 0,
data. The sender actively checks for or 1. But that does not happen in TCP,
acknowledgement from the receiver and once Instead, the sender has to choose an Initial
Sequence Number (ISN), which is basically a

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

random 32 bit sequence of 0’s and 1’s, during c) Prevent before congestion occurs
the connection handshake. d) Prevent before sending packets

10. The value of acknowledgement field in a Answer: c


segment defines _______ Explanation: Open loop congestion control
a) sequence number of the byte received techniques are used to prevent congestion

om
previously before it even happens by enforcing certain
b) total number of bytes to receive policies. Retransmission policy, window
c) sequence number of the next byte to be policy and acknowledgement policy are some
received policies that might be enforced.
d) sequence of zeros and ones
3. Retransmission of packets must not be
Answer: c done when _______

.c
Explanation: The acknowledgement field in a) Packet is lost
a segment defines the sequence number of the b) Packet is corrupted
byte which is to be received next i.e. c) Packet is needed
sequence number of byte that the sender d) Packet is error-free

ul
should transmit next.
Answer: d
Explanation: Retransmission refers to the
TOPIC 4.4 ERROR AND pa sender having to resend the packet to the
CONGESTION CONTROL - receiver. It needs to be done only when some
CONGESTION AVOIDANCE anomaly occurs with the packet like when the
(DECBIT, RED) – QOS – packet is lost or corrupted.
APPLICATION 4. In Go-Back-N window, when the timer of
jin
REQUIREMENTS the packet times out, several packets have to
be resent even some may have arrived safe.
1. Two broad categories of congestion control Whereas in Selective Repeat window, the
are sender resends ___________
a) Open-loop and Closed-loop a) Packet which are not lost
.re

b) Open-control and Closed-control b) Only those packets which are lost or


c) Active control and Passive control corrupted
d) Active loop and Passive loop c) Packet from starting
d) All the packets
Answer: a
w

Explanation: Open loop congestion control Answer: b


techniques are used to prevent congestion Explanation: In Selective Repeat, the sender
before it even happens by enforcing certain side uses a searching algorithm to find the
policies. Closed loop congestion control packets which need to be retransmitted based
w

techniques are used to treat congestion after it on the negative acknowledgements received
has happened. and then resends only those packets thus
saving bandwidth.
w

2. In open-loop control, policies are applied


to __________ 5. Discarding policy is mainly done by
a) Remove after congestion occurs _______
b) Remove after sometime a) Sender
b) Receiver

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) Router Answer: d
d) Switch Explanation: In Virtual circuit networks,
each node knows the upstream node from
Answer: c which a flow data is coming. So, it makes
Explanation: The discarding policy adopted possible for the congested node to track the
by the routers mainly states that the routers source of the congestion and then inform that

om
discard sensitive or corrupted packets that it node to reduce the flow to remove
receives, thus controlling the integrity of the congestion.
packet flow. The discarding policy is adopted
as an open loop congestion control technique. 9. The packet sent by a node to the source to
inform it of congestion is called _______
6. Closed-Loop control mechanisms try to a) Explicit
_________ b) Discard

.c
a) Remove after congestion occurs c) Choke
b) Remove after sometime d) Backpressure
c) Prevent before congestion occurs
d) Prevent before sending packets Answer: c

ul
Explanation: Choke packet is sent by a node
Answer: a to the source to inform it of congestion. Two
Explanation: In closed loop congestion choke packet techniques can be used for the
control, methods are implemented to remove
pa
congestion after it occurs. Some of the
methods used are backpressure and choke
operation called hop-by-hop choke packet
and source choke packet.

packet. 10. In the slow-start algorithm, the size of the


congestion window increases __________
7. The technique in which a congested node until it reaches a threshold.
jin
stops receiving data from the immediate a) exponentially
upstream node or nodes is called as _______ b) additively
a) Admission policy c) multiplicatively
b) Backpressure d) suddenly
c) Forward signaling
.re

d) Backward signaling Answer: a


Explanation: In slow-start algorithm, the size
Answer: b of the congestion window increases
Explanation: In this closed loop congestion exponentially until it reaches a threshold.
control technique, the congested node When it reaches the threshold, it stops
w

propagates in the opposite direction of the increasing and continues sending packets
data flow to inform the predecessor node to through the threshold window thus preventing
reduce the flow of packets. This is why this congestion.
technique is called a node-to-node congestion
w

control technique. 11. In the congestion avoidance algorithm,


the size of the congestion window increases
8. Backpressure technique can be applied ____________ until congestion is detected.
w

only to _______ a) exponentially


a) Congestion networks b) additively
b) Closed circuit networks c) multiplicatively
c) Open circuit networks d) suddenly
d) Virtual circuit networks

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: b b) Client-server
Explanation: In the congestion avoidance c) HTTP
algorithm, the size of the congestion window d) Both Peer-to-Peer & Client-Server
increases additively until congestion is
detected. Once congestion is detected, the Answer: d
size of congestion window is decreased once Explanation: HTTP is a protocol.

om
and then the packets are transmitted to
achieve congestion avoidance. 4. Application developer has permission to
decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and
UNIT V APPLICATION Maximum buffer size

.c
d) None of the mentioned
LAYER
Answer: c
Explanation: Application layer provides the

ul
TOPIC 5.1 APPLICATION
interface between applications and the
LAYER PARADIGMS network. So application developer can decide
what transport layer to use and what should
be its maximum buffer size.
a) HTTP
b) SMTP
pa
1. Which is not a application layer protocol?

5. Application layer offers _______ service.


c) FTP a) End to end
d) TCP b) Process to process
c) Both End to end and Process to process
jin
Answer: d d) None of the mentioned
Explanation: TCP is transport layer protocol.
Answer: a
2. The packet of information at the Explanation: End to End service is provided
application layer is called __________ in the application layer. Whereas process to
.re

a) Packet process service is provided at the transport


b) Message layer.
c) Segment
d) Frame 6. E-mail is _________
a) Loss-tolerant application
w

Answer: b b) Bandwidth-sensitive application


Explanation: For Application, Presentation c) Elastic application
and Session layers there is no data format for d) None of the mentioned
message. Message is message as such in these
w

three layers. But when it comes to Transport, Answer: c


Network, Data and Physical layer they have Explanation: Because it can work with
data in format of segments, packets, frames available throughput.
w

and bits respectively.


7. Pick the odd one out.
3. Which one of the following is an a) File transfer
architecture paradigms? b) File download
a) Peer to peer

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

c) E-mail 11. Transport services available to


d) Interactive games applications in one or another form
_________
Answer: d a) Reliable data transfer
Explanation: File transfer, File download and b) Timing
Email are services provided by the c) Security

om
application layer and there are message and d) All of the mentioned
data oriented.
Answer: d
8. Which of the following is an application Explanation: The transport services that are
layer service? provided to application are reliable data
a) Network virtual terminal transfer, security and timing. These are very
b) File transfer, access, and management important for proper end to end services.

.c
c) Mail service
d) All of the mentioned 12. Electronic mail uses which Application
layer protocol?
Answer: d a) SMTP

ul
Explanation: The services provided by the b) HTTP
application layer are network virtual terminal, c) FTP
file transfer, access and management, mail d) SIP
services, directory services, various file and
data operations.
pa Answer: a
Explanation: Email uses various protocols
9. To deliver a message to the correct like SMTP, IMAP and POP. The most
application program running on a host, the prominent one used in application layer is
_______ address must be consulted. SMTP.
jin
a) IP
b) MAC
c) Port TOPIC 5.2 CLIENT SERVER
d) None of the mentioned PROGRAMMING
.re

Answer: c 1. RMI stands for?


Explanation: IP address lets you know where a) Remote Mail Invocation
the network is located. Whereas MAC b) Remote Message Invocation
address is a unique address for every device. c) Remaining Method Invocation
Port address identifies a process or service d) Remote Method Invocation
w

you want to carry on.


Answer: d
10. Which is a time-sensitive service? Explanation: The RMI (Remote Method
a) File transfer Invocation) is an API that provides a
w

b) File download mechanism to create distributed applications.


c) E-mail
d) Internet telephony 2. A remote object is an object whose method
w

can be invoked from another virtual


Answer: d environment.
Explanation: Internet telephony is Loss- a) True
tolerant other applications are not. b) False

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: a provides the interface that client and server


Explanation: The statement is true. JVM is application objects use for interaction with
java virtual environment. RMI uses stub and each other.
skeleton object for communication with the
remote object. A remote object is an object 6. A layer which is the binary data protocol
whose method can be invoked from another layer.

om
virtual environment. a) stub layer
b) skeleton layer
3. A typical _________ program creates some c) remote layer
remote objects, makes references to these d) transport protocol
objects accessible, and waits for clients to
invoke methods on these objects. Answer: d
a) Server Explanation: The transport protocol layer is

.c
b) Client the binary data protocol that sends remote
c) Thread object requests over the wire. A client is any
d) Concurrent remote application that communicates with
these server objects.

ul
Answer: a
Explanation: A server program creates 7. A middleware layer between the stub
remote objects. It gives reference to these skeleton and transport.
a) remote layer
methods on these objects.
pa
objects and then waits for clients to invoke
b) instruction layer
c) reference layer
4. A typical __________ program obtains a d) remote reference layer
remote reference to one or more remote
objects on a server and then invokes methods Answer: d
jin
on them. Explanation: The remote reference layer is
a) Server the middleware between the stub/skeleton
b) Client layer and underlying transport protocol.
c) Thread
d) Concurrent 8. An object acting as a gateway for the client
.re

side.
Answer: b a) skeleton
Explanation: A client program obtains a b) stub
remote reference to one or more remote c) remote
objects on a server. It then invokes methods d) server
w

on them.
Answer: b
5. The ___________ layer, which provides Explanation: The stub is an object that acts
the interface that client and server application as a gateway for the client side. The outgoing
w

objects use to interact with each other. requests are passed through the stub.
a) Increasing
b) Count 9. A gateway for the server side object.
w

c) Bit a) skeleton
d) Stub/skeleton b) stub
c) remote
Answer: d d) server
Explanation: The stub or skeleton layer

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: a Answer: b
Explanation: The skeleton is an object, acts Explanation: A dynamic web page provides
as a gateway for the server side object. All the different content every time the user opens it
incoming requests are routed through it. based on some events like new additions or
time of the day. Languages such as JavaScript
10. RMI uses stub and skeleton for are used to respond to client-side events while

om
communication with the ________ object. languages such as PHP as used to respond to
a) client server-side events.
b) remote
c) server 3. What is a web browser?
d) any a) a program that can display a web page
b) a program used to view html documents
Answer: b c) it enables user to access the resources of

.c
Explanation: RMI uses stub and skeleton internet
object for communication with the remote d) all of the mentioned
object. A remote object is an object whose
method can be invoked from another JVM. Answer: d

ul
Explanation: A web browser is an
application program that is used to access the
TOPIC 5.3 WORLD WIDE WEB World Wide Web resources, applications and
AND HTTP
pa
1. A piece of icon or image on a web page
websites. Some examples of web browsers
are Google Chrome, Internet Explorer and
Safari.
associated with another webpage is called
______ 4. Common gateway interface is used to
a) url _______
jin
b) hyperlink a) generate executable files from web content
c) plugin by web server
d) extension b) generate web pages
c) stream videos
Answer: b d) download media files
.re

Explanation: URLs are locators for resources


present on the World Wide Web. A plugin Answer: a
provides extra functionality to the webpage. Explanation: CGI is an interface through
An extension provides modification servers can run execute console-based
allowance for the core functionality of a executable files on a web server that
w

webpage. Hyperlink is piece of icon or image generates dynamic web pages. A CGI script
on a web page associated with another executes only when a request is made. The
webpage. script then generates HTML.
w

2. Dynamic web page ______ 5. URL stands for ________


a) is same every time whenever it displays a) unique reference label
b) generates on demand by a program or a b) uniform reference label
w

request from browser c) uniform resource locator


c) both is same every time whenever it d) unique resource locator
displays and generates on demand by a
program or a request from browser Answer: c
d) is different always in a predefined order Explanation: The Uniform Resource Locator

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

is a locator for the resource to be located by lightweight and active scripting language
HTTP on the World Wide Web. The URL is which can be used on Microsoft Visual Basic.
derived from the Uniform Resource Identifier. It was first released in 1996.

6. A web cookie is a small piece of data that 9. What is document object model (DOM)?
is _______ a) convention for representing and interacting

om
a) sent from a website and stored in user’s with objects in html documents
web browser while a user is browsing a b) application programming interface
website c) hierarchy of objects in ASP.NET
b) sent from user and stored in the server d) scripting language
while a user is browsing a website
c) sent from root server to all servers Answer: a
d) sent from the root server to other root Explanation: DOM is a hierarchical model

.c
servers i.e. a tree used to represent an HTML or
XML document. Every node of the tree an
Answer: a object that represents a part of the document.
Explanation: A web cookie is a small piece

ul
of data sent from a website and stored in 10. AJAX stands for _______
user’s web browser while a user is browsing a) asynchronous javascript and xml
the website and is used to remember stateful b) advanced JSP and xml
c) asynchronous JSP and xml
pa
information about the user’s operations on the
website. This can help the website provide a
better browsing experience to the user.
d) advanced javascript and xml

Answer: a
7. Which one of the following is not used to Explanation: AJAX is a group of
generate dynamic web pages? technologies that works on the client-side to
jin
a) PHP create asynchronous web applications. It is
b) ASP.NET used to modify only a part of a webpage and
c) JSP not the whole webpage whenever some event
d) CSS occurs.
.re

Answer: d
Explanation: CSS alone cannot be used to
TOPIC 5.4 DNS
generate dynamic web pages as it does not
provide many event handling functions. It can 1. The entire hostname has a maximum of
be used along with JavaScript to generate ___________
w

dynamic web pages which are visually a) 255 characters


compelling. b) 127 characters
c) 63 characters
8. An alternative to JavaScript on windows d) 31 characters
w

platform is _______
a) VBScript Answer: a
b) ASP.NET Explanation: An entire hostname can have a
w

c) JSP maximum of 255 characters. Although each


d) PHP label must be from 1 to 63 characters long.
Host name is actually a label that is given to a
Answer: a device in a network.
Explanation: VBScript is a general-purpose,

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

2. A DNS client is called _________ into IP addresses for carrying out


a) DNS updater communication.
b) DNS resolver
c) DNS handler 6. Which one of the following allows client to
d) none of the mentioned update their DNS entry as their IP address
change?

om
Answer: b a) dynamic DNS
Explanation: DNS client also known as DNS b) mail transfer agent
resolver also known as DNS lookup helps to c) authoritative name server
resolve DNS requests using an external DNS d) none of the mentioned
server.
Answer: a
3. Servers handle requests for other domains Explanation: Dynamic DNS or in short

.c
_______ DDNS or DynDNS helps in automatically
a) directly updating a name server in the DNS. This does
b) by contacting remote DNS server not require manual editing.
c) it is not possible

ul
d) none of the mentioned 7. Wildcard domain names start with label
_______
Answer: b a) @
Explanation: Whenever a request is received b) *
pa
at server from other domains, it handles this
situation by contacting remote DNS server.
c) &
d) #

4. DNS database contains _______ Answer: b


a) name server records Explanation: A wildcard DNS record
jin
b) hostname-to-address records matches requests to a non existent domain
c) hostname aliases name. This wildcard DNS record is specified
d) all of the mentioned by using asterisk “*” as the starting of a
domain name.
Answer: d
.re

Explanation: Domain Name system not only 8. The right to use a domain name is
deals with mapping IP addresses with the delegated by domain name registers which
hostname but also deals with exchange of are accredited by _______
information in the server. a) internet architecture board
b) internet society
w

5. If a server has no clue about where to find c) internet research task force
the address for a hostname then _______ d) internet corporation for assigned names
a) server asks to the root server and numbers
b) server asks to its adjcent server
w

c) request is not processed Answer: d


d) none of the mentioned Explanation: The ICANN (Internet
Corporation for Assigned Names and
w

Answer: a Numbers) deals with IP address space


Explanation: Root name servers are actually allocation, protocol identifier assignment,
very important and critical as they are the first generic and country code Top Level domain
step in translating human readable hostnames name system management (gTLD and
ccTLD).

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

9. The domain name system is maintained by 2. SMTP connections secured by SSL are
_______ known as _____________
a) distributed database system a) SMTPS
b) a single server b) SSMTP
c) a single computer c) SNMP
d) none of the mentioned d) STARTTLS

om
Answer: a Answer: a
Explanation: A domain name system is Explanation: SSMTP is a simple mail
maintained by a distributed database system. transfer program to send mail from a local PC
It is a collection of multiple, logically to a mail host. SNMP is a network
interrelated databases distributed over a management protocol. STARTTLS
computer network. connections are secured by TLS.

.c
10. Which one of the following is not true? 3. SMTP uses which of the following TCP
a) multiple hostnames may correspond to a port?
single IP address a) 22

ul
b) a single hostname may correspond to many b) 23
IP addresses c) 21
c) a single hostname may correspond to a
pa d) 25
single IP address
d) none of the mentioned Answer: d
Explanation: Port 21 is used for FTP control
Answer: c connection, port 22 is used by SSH, and port
Explanation: It need not be that a single 23 is used by TELNET.
hostname will correspond to a ip address. For
jin
example facebook.com and fb.com both 4. Which one of the following protocol is
correspond to same ip address. So there can used to receive mail messages?
be multiple hostnames for a single ip address. a) SMTP
b) Post Office Protocol (POP)
c) Internet Message Access Protocol (IMAP)
.re

TOPIC 5.5 ELECTRONIC MAIL d) FTP


(SMTP, POP3, IMAP, MIME)
Answer: d
1. Simple mail transfer protocol (SMTP) Explanation: FTP is used to share files.
utilizes _________ as the transport layer SMTP, POP and IMAP are the protocols used
w

protocol for electronic mail transfer. to send and receive mails on the internet.
a) TCP
b) UDP 5. What is on-demand mail relay (ODMR)?
c) DCCP a) protocol for SMTP security
w

d) SCTP b) an SMTP extension


c) protocol for web pages
Answer: a d) protocol for faster mail transfer
w

Explanation: Since TCP is a reliable


protocol, it’s more efficient to use TCP Answer: b
protocol for e-mail transfer. TCP also Explanation: ODMR is an extension to
provides more security than other transport SMTP, in which mails are relayed to the
layer protocols. receivers after they are authenticated. It

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

allows only the authorized receivers to c) open mail reception


receive the mail. d) short mail reception

6. An email client needs to know the Answer: a


_________ of its initial SMTP server. Explanation: Anyone can send an e-mail
a) IP address through an Open Mail Relay server so it acted

om
b) MAC address like a free relay for email agents to forward
c) URL their mails through. Open Mail Relays are
d) Name now unpopular because they can be used by
attackers to perform man-in-the-middle
Answer: a attacks.
Explanation: The client needs to know the IP
of its initial SMTP server as it has to send the 10. SMTP is not used to deliver messages to

.c
mail first to that server and then the server ______
forwards the mail ahead on behalf of the user. a) user’s terminal
b) user’s mailbox
7. An SMTP session may not include c) user’s word processor

ul
_______ d) user’s email client
a) zero SMTP transaction
b) one SMTP transaction Answer: c
c) more than one SMTP transaction Explanation: SMTP can only be used to send
d) one HTTP transaction
pa messages to user’s terminal, email client or
mailbox. A stand-alone word processor
Answer: d cannot be connected to a network, so it won’t
Explanation: An SMTP session can only be possible to deliver messages to it.
include SMTP transactions regardless the
jin
number. Any other protocol’s transaction is
not included in an SMTP session. TOPIC 5.6 INTRODUCTION TO
PEER TO PEER NETWORKS
8. SMTP defines _______
a) message transport 1. Which layer is responsible for process-to-
.re

b) message encryption process delivery?


c) message content a) Physical layer
d) message password b) Network layer
c) Transport layer
Answer: a d) Application layer
w

Explanation: As the name suggests, Simple


Mail Transfer Protocol is only responsible for Answer: c
“how” the message is transferred i.e. Explanation: The transport layer is
Transport of the message. Other protocols responsible for process-to-process delivery,
w

such as TCP are used to provide other error control and flow control. It provides an
services like encryption for the messages. interface for the implementation of process to
process delivery through ports. There are
w

9. Which one of the following is an SMTP 65,535 port numbers.


server configured in such a way that anyone
on the internet can send e-mail through it? 2. In process-to-process delivery, two
a) open mail relay processes communicate in which of the
b) wide mail reception following methods?

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

a) Client/Server Answer: d
b) Source/Destination Explanation: IANA divided port numbers
c) Message Transfer into three ranges i.e., Well-known, Registered
d) Peer to Peer and Dynamic ports. Well-known port
numbers range from 0 to 1023, registered port
Answer: a numbers are from 1024 to 49151 and

om
Explanation: The most common method dynamic port numbers are from 49152 to
used for this communication is Client/Server. 65535.
The client requests a service through a
particular port number to the port of the 6. The combination of an IP address and port
server using its socket address. Then the number is called as ________
server responds by giving the requested a) Socket address
service to the client port. b) Port address

.c
c) MAC address
3. Multiple processes on destinations at d) Host address
transport layer are identified by __________
a) Mac address Answer: a

ul
b) Port number Explanation: Socket address is the
c) Host number combination of an IP address and a port
d) Host address pa number and it is used to define the client-end
and server-end processes uniquely.
Answer: b
Explanation: Multiple processes on 7. Which of the following is false with
destinations are identified by a transport layer respect to Connectionless service of transport
address also called as port number. The IP layer protocol?
address along with the port number is called a) Packets are not numbered
jin
the socket address. b) Packets are not delayed
c) No acknowledgement
4. Range of port numbers in Internet model is d) Packet may arrive out of sequence
__________
a) 0 and 32,765(8-bit) Answer: b
.re

b) 0 and 32,765(16-bit) Explanation: There is a high probability in


c) 0 and 65,535(32-bit) connectionless services like UDP that the
d) 0 and 65,535(16-bit) packet gets delayed or lost because there is no
connection made between the two end nodes.
Answer: d No connection means that there is no unique
w

Explanation: Port numbers are 16-bit pathway for the packets to travel.
integers between 0 and 65,535. They are an
interface for the implementation of process to 8. Correct order in the process of Connection-
process delivery for the transport layer. Oriented services is ________
w

i. Data transfer
5. According to Internet Assigned Numbers ii. Connection release
Authority (IANA), which of the following iii. Connection establishment
w

ranges is not a part of port number ranges? a) i-ii-iii


a) Well-known ports b) iii-ii-i
b) Registered ports c) ii-i-iii
c) Dynamic ports d) iii-i-ii
d) Static ports

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: d NETWORK SECURITY


Explanation: First the client has to request a
connection and the server has to accept the
connection to establish a connection. Then 1. Number of phases in the handshaking
data transfer can start between the two ends. protocol?
a) 2
Then both client and server need to terminate
b) 3

om
their ends to terminate the connection.
c) 4
9. In transport layer, Multiplexing is done at d) 5
_________
Answer: c
a) Channel
Explanation: There are 4 phases in the
b) Receiver site
handshaking protocol. These are –
c) Sender site

.c
d) Packet Phase 1 : Establishing security capabilities
Phase 2 : Server Authentication and Key
Answer: c Exchange
Explanation: At the sender’s side, there are Phase 3 : Client Authentication and Key

ul
multiple processes which may want to send Exchange
packets. But there is only one transport layer Phase 4 : Finish/ End.
protocol like TCP or UDP working at a time.
2. In the SSL record protocol operation pad_2
pa
So the transport layer protocol gets the
messages from these processes and separates
them with different port numbers. This
is –
a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 48 times for
process is called multiplexing and it is done
MD5
before sending packets to the receivers side.
c) is the byte 0x5C repeated 48 times for
jin
10. The process of error checking and SHA-1
dropping of the header, delivering messages d) is the byte 0x36 repeated 48 times for
to appropriate process based on port number MD5
is called as _______
Answer: b
a) Delivery of packets
.re

Explanation: pad_2 = is the byte 0x5C


b) Error correction
repeated 48 times for MD5.
c) Multiplexing
d) Demultiplexing
3.In the SSL record protocol operation pad_1
is –
Answer: d
a) is the byte 0x36 repeated 40 times for MD5
w

Explanation: Demultiplexing is the process


of error checking and dropping of the header, b) is the byte 0x5C repeated 40 times for
delivering messages to appropriate process MD5
based on port number. The transport layer c) is the byte 0x5C repeated 48 times for
w

does this on the receiver’s end after the SHA-1


d) is the byte 0x36 repeated 48 times for
packet is received and takes help of the
MD5
header attached by the sender’s side transport
w

layer during multiplexing. Answer: d


Explanation: pad_1 = is the byte 0x36
TOPIC 5.7 NEED FOR repeated 48 times for MD5.
CRYPTOGRAPHY AND

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

4. In the Handshake protocol action, which is c) Fixed Diffie-Hellman


the last step of the Phase 2 : Server d) RSA
Authentication and Key Exchange?
a) server_done Answer: c
b) server_key_exchange Explanation: The Fixed Diffie-Helmann does
c) certificate_request not require the server_key_exchange step in

om
d) crtificate_verify the handshake protocol.

Answer: a 8. The DSS signature uses which hash


Explanation: The last step of the Phase 2 is algorithm?
the server_done step. a) MD5
b) SHA-2
5. Which is the key exchange algorithm used c) SHA-1

.c
in CipherSuite parameter? d) Does not use hash algorithm
a) RSA
b) Fixed Diffie-Hellman Answer: c
c) Ephemeral Diffie-Hellman Explanation: The DSS signature uses SHA-

ul
d) Any of the mentioned 1.

Answer: d 9. The RSA signature uses which hash


Explanation: We can use either of the algorithm?
pa
following for the CipherSuite key exchange-
i) RSA
a) MD5
b) SHA-1
ii) Fixed Diffie-Hellman c) MD5 and SHA-1
iii) Ephemeral Diffie-Hellman d) None of the mentioned.
iv) Anonymous Diffie-Hellman
jin
v) Fortezza. Answer: c
Explanation: The MD5 and SHA-1 hash is
6.The certificate message is required for any concatenated together and the then encrypted
agreed-on key exchange method except with the server’s private key.
_______________
.re

a) Ephemeral Diffie-Hellman 10. What is the size of the RSA signature


b) Anonymous Diffie-Hellman hash after the MD5 and SHA-1 processing?
c) Fixed Diffie-Hellman a) 42 bytes
d) RSA b) 32 bytes
c) 36 bytes
w

Answer: b d) 48 bytes
Explanation: The certificate message is
required for any agreed-on key exchange Answer: c
method except Anonymous Diffie-Hellman. Explanation: The size is 36 bytes after MD5
w

and SHA-1 processing.


7. In the Phase 2 of the Handshake Protocol
Action, the step server_key_exchange is not 11. The certificate_request massage includes
two parameters, one of which is-
w

needed for which of the following cipher


systems? a) certificate_extension
a) Fortezza b) certificate_creation
b) Anonymous Diffie-Hellman c) certificate_exchange
d) certificate_type

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

Answer: d TOPIC 5.8 FIREWALLS


Explanation: The certificate_request
massage includes two parameters :
certificate_type and certificate_authorities. 1. Network layer firewall works as a
__________
12. The client_key_exchange message uses a a) Frame filter

om
pre master key of size – b) Packet filter
a) 48 bytes c) Content filter
b) 56 bytes d) Virus filter
c) 64 bytes
d) 32 bytes Answer: b
Explanation: As you know, firewalls are
Answer: a available as hardware appliances, as software-

.c
Explanation: The client_key_exchange only, or a combination of the two. In every
message uses a pre master key of size 48 case, the purpose of a firewall is to isolate
bytes. your trusted internal network (or your
personal PC) from the dangers of unknown

ul
13. The certificate_verify message involves resources on the Internet and other network
the process defined by the pseudo-code (in connections that may be harmful. The
terms of MD5) – firewall prevents unauthorized access to your
CertificateVerify.signature.md5_hash =
MD5(master_secret || pad_2 ||
pa
MD5(handshake_messages || master_secret ||
internal, trusted network from outside threats.

2. Network layer firewall has two sub-


pad_1). categories as _________
Is there any error? If so, what is it? a) State full firewall and stateless firewall
a) Yes. pad_1 and pad_2 should be b) Bit oriented firewall and byte oriented
jin
interchanged firewall
b) Yes. pad’s should be present towards the c) Frame firewall and packet firewall
end d) Network layer firewall and session layer
c) Yes. master_key should not be used, the firewall
pre_master key should be used
.re

d) No Error Answer: a
Explanation: Most network layer firewalls
Answer: d can operate as stateful or stateless firewalls,
Explanation: The code is correct with no creating two subcategories of the standard
errors. network layer firewall. Stateful firewalls have
w

the advantage of being able to track packets


14. In the handshake protocol which is the over a period of time for greater analysis and
message type first sent between client and accuracy — but they require more memory
server ? and operate more slowly. Stateless firewalls
w

a) server_hello do not analyze past traffic and can be useful


b) client_hello for systems where speed is more important
c) hello_request than security, or for systems that have very
w

d) certificate_request specific and limited needs. For example, a


computer that only needs to connect to a
Answer: b particular backup server does not need the
Explanation: Interaction between the client extra security of a stateful firewall.
and server starts via the client_hello message.

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

3. A firewall is installed at the point where firewall, which is – without additional


the secure internal network and untrusted software – unable to control network traffic
external network meet which is also known as regarding a specific application. There are
__________ two primary categories of application
a) Chock point firewalls, network-based application firewalls
b) Meeting point and host-based application firewalls.

om
c) Firewall point
d) Secure point 6. A packet filter firewall filters at
__________
Answer: a a) Physical layer
Explanation: A firewall can be a PC, a b) Data link layer
router, a midrange, a mainframe, a UNIX c) Network layer or Transport layer
workstation, or a combination of these that d) Application layer

.c
determines which information or services can
be accessed from the outside and who is Answer: c
permitted to use the information and services Explanation: In computing, a firewall is a
from outside. Generally, a firewall is installed network security system that monitors and

ul
at the point where the secure internal network controls the incoming and outgoing network
and untrusted external network meet, which is traffic based on predetermined security rules.
also known as a chokepoint. pa [1] A firewall typically establishes a barrier
between a trusted, secure internal network
4. Which of the following is / are the types of and another outside network, such as the
firewall? Internet, that is assumed not to be secure or
a) Packet Filtering Firewall trusted.[2] Firewalls are often categorized as
b) Dual Homed Gateway Firewall either network firewalls or host-based
c) Screen Host Firewall firewalls.
jin
d) Dual Host Firewall
7. What is one advantage of setting up a DMZ
Answer: a with two firewalls?
Explanation: A firewall can be a PC, a a) You can control where traffic goes in three
midrange, a mainframe, a UNIX workstation, networks
.re

a router, or combination of these. Depending b) You can do stateful packet filtering


on the requirements, a firewall can consist of c) You can do load balancing
one or more of the following functional d) Improved network performance
components: Packet-filtering router
Answer: c
w

5. A proxy firewall filters at _________ Explanation: DMZ stands for De-Militarized


a) Physical layer Zone. In a topology with a single firewall
b) Data link layer serving both internal and external users (LAN
c) Network layer and WAN), it acts as a shared resource for
w

d) Application layer these two zones. So load balancing can be


done by adding another firewall.
Answer: d
w

Explanation: The application firewall is 8. What tells a firewall how to reassemble a


typically built to control all network traffic on data stream that has been divided into
any layer up to the application layer. It is able packets?
to control applications or services a) The source routing feature
specifically, unlike a stateful network b) The number in the header’s identification

Downloaded updated materials from Rejinpaul Network App


www.rejinpaul.com

field the connection is active or not. A routing


c) The destination IP address table ensures the best performance for the
d) The header checksum field in the packet stateful firewall.
header
10. A firewall needs to be __________ so that
Answer: a it can grow proportionally with the network

om
Explanation: The source routing feature that it protects.
provides a path address for the packet to help a) Robust
the firewall to reassemble the data stream that b) Expansive
was divided into packets. After reassembling, c) Fast
the firewall can then filter the stream. d) Scalable

9. A stateful firewall maintains a Answer: b

.c
___________ which is a list of active Explanation: The firewall has to be
connections. expansive because a network is expected to
a) Routing table grow with time and if the firewall is unable to
b) Bridging table grow with it, the firewall won’t be able to

ul
c) State table handle the growing network traffic flow and
d) Connection table will hence fail.

Answer: a
pa
Explanation: The routing table basically
gives the state of each connection i.e. whether
jin
.re
w
w
w

Downloaded updated materials from Rejinpaul Network App

You might also like