Professional Documents
Culture Documents
Quiz CN
Quiz CN
1 Which of the following statements about wired and wireless LANs is correct?
A) Both operate in the lower two layers of the TCP/IP protocol suite.
B) Wired LANs operate in the lower two layers and wireless LANs operate in the lower
three layers of the TCP/IP protocol suite.
C) Wired LANs operate in the lower three layers and wireless LANs operate in the lower
two layers of the TCP/IP protocol suite.
D) Both operate in the lower three layers of the TCP/IP protocol suite.
2 IEEE has defined the specifications for a wireless LAN, called _______, which covers the
physical and data-link layers.
A) IEEE 802.3
B) IEEE 802.5
C) IEEE 802.11
D) IEEE 802.2
4 In IEEE 802.11, a ___ is made of stationary or mobile wireless stations and an optional
central base station, known as the access point (AP).
A) ESS
B) BSS
C) CSS
D) None of the choices are correct
7 In IEEE 802.11, communication between two stations in two different BSSs usually
occurs via two ________.
A) BSSs
B) ESSs
C) APs
D) None of the choices are correct
8 In IEEE 802.11, a station with ________ mobility is either stationary (not moving) or
moving only inside a BSS.
A) no-transition
B) BSS-transition
C) ESS-transition
D) None of the choices are correct
9 In IEEE 802.11, a station with ________mobility can move from one BSS to another, but
the movement is confined inside one ESS.
A) no-transition
B) BSS-transition
C) ESS-transition
D) None of the choices are correct
10 In IEEE 802.11, a station with ________ mobility can move from one ESS to another.
A) no-transition
B) BSS-transition
C) ESS-transition
D) None of the choices are correct
11 In IEEE 802.11, distributed coordination function (DCF) uses _______ as the access
method.
A) CSMA/CA
B) CSMA/CD
C) ALOHA
D) None of the choices are correct
12 In IEEE 802.11, when a frame is going from one station in a BSS to another station in
the same BSS, the address flag is _____.
A) 00
B) 01
C) 10
D) 11
13 In IEEE 802.11, when a frame is coming from an AP and going to a station, the address
flag is _______.
A) 00
B) 01
C) 10
D) 11
14 In IEEE 802.11, when a frame is going from a station to an AP, the address flag is _____.
A) 00
B) 01
C) 10
D) 11
16 In IEEE 802.11, the access method used in the PCF sublayer is ______.
A) contention
B) controlled
C) polling
D) None of the choices are correct
17 In IEEE 802.11, the ______ is a time period used for collision avoidance.
A) NAV
B) BSS
C) ESS
D) None of the choices are correct
25 The IEEE 802.11a, IEEE 802.11g, or IEEE 802.11n OFDM uses ______ modulation.
A) ASK
B) FSK
C) PSK
D) None of the choices are correct
31 In Bluetooth, the _____ link is used when data integrity is more important than avoiding
latency.
A) SCO
B) ACL
C) ACO
D) SCL
32 Bluetooth uses ______ in the physical layer to avoid interference from other devices or
other networks.
A) DSSS
B) FHSS
C) FDMA
D) None of the choices are correct
9 When the load in the network reaches the network capacity, the packet delay
___________ and the network throughput
reaches ______________.
A) increases sharply; its minimum
B) increases sharply; its maximum
C) decreases sharply; its minimum
D) decreases sharply; its maximum
14 In classful addressing, the IPv4 address space is divided into _______ classes.
A) 3
B) 4
C) 5
D) None of the choices are correct
22 In DHCP, the client uses ________ port and the server uses _________port.
A) an ephemeral; a well-known
B) a well-known; a well-known
C) a well-known; an ephemeral
D) None of the choices are correct
24 _________ allows a site to use a set of private addresses for internal communication
and a set of global Internet addresses for
communication with the rest of the world.
A) DHCP
B) NAT
C) IMCP
D) None of the choices are correct
25 The idea of address aggregation was designed to alleviate the increase in routing table
entries when using ________
addressing.
A) classful
B) classless
C) classful or classless
D) None of the choices are correct
26 The use of hierarchy in routing tables can ________ the size of the routing tables.
A) reduce
B) increase
C) neither reduce nor increase
D) None of the choices are correct
1 IP is a _________ protocol.
A) connection-oriented unreliable
B) connection-oriented reliable
C) connectionless unreliable
D) connectionless reliable
7 The total length field defines the total length of the datagram _________.
A) including the header
B) excluding the header
C) excluding the option length
D) None of the choices are correct
3 In _______ routing, the least cost route between any two nodes is the route with the
minimum distance.
A) path vector
B) distance vector
C) link state
D) None of the choices are correct
5 In distance vector routing, each node periodically shares its routing table with
_________ and whenever there is a change.
A) every other node
B) its immediate neighbors
C) one neighbor
D) None of the choices are correct
8 In RIP, the ________ timer controls the advertising of regular update messages.
A) garbage collection
B) expiration
C) periodic
D) None of the choices are correct
9 In RIP, the ________ timer is used to purge invalid routes from the table.
A) garbage collection
B) expiration
C) periodic
D) None of the choices are correct
12 The _________ routing uses the Dijkstra algorithm to build a routing table.
A) distance vector
B) link state
C) path vector
D) None of the choices are correct
13 The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol
based on _______ routing.
A) distance vector
B) link state
C) path vector
D) None of the choices are correct
14 The _______ protocol allows the administrator to assign a cost, called the metric, to
each route.
A) OSPF
B) RIP
C) BGP
D) None of the choices are correct
15 In OSPF, a ________ link connects two routers without any other host or router in
between.
A) point-to-point
B) transient
C) stub
D) None of the choices are correct
1 One of the main duties of the transport layer is to provide ____________ communication.
A) node-to-node
B) host-to-host
C) process-to-process
D) None of the choices are correct
2 A client program normally uses ____________ port number. A server program normally
uses __________ port number.
A) a well-known; an ephemeral
B) an ephemeral; a well-known
C) a private; a well-known
D) None of the choices are correct
4 ______________ means accepting items from more than one source. ______________
means delivering items to more than one source.
A) Demultiplexing; Multiplexing
B) Multiplexing; Demultiplexing
C) Encapsulation; Decapsulation
D) Pulling; Pushing
5 ________ means the producer delivers the items when they are produced. _______
means the consumer takes the items when it is ready to do so.
A) Pushing; Pulling
B) Pulling; Pushing
C) Forwarding; Accepting
D) None of the choices are correct
6 In the stop-and-wait protocol, the maximum send window size is ______ and the
maximum receive window size is _______, where m is the number of bits in
the sequence.
A) 1; 1
B) 2m; 1
C) 1; 2m
D) 2m ; 2m
7 In the Go-Back-N protocol, the maximum send window size is ______ and the maximum
receive window size is _______, where m is related to the number of
bits in the sequence number.
A) 1; 1
B) 1; 2m
C) 2m − 1; 1
D) 2m − 1; 2m – 1
8 In the selective-repeat protocol, the maximum send window size is ______ and the
maximum receive window size is _______, where m is the number of bits
in the sequence.
A) 1; 1
B) 1; 2m − 1
C) 2m − 1; 1
D) 2m − 1; 2m – 1
11 At the transport layer, to define the processes, we need two identifiers called
____________.
A) logical addresses
B) physical addresses
C) port addresses
D) None of the choices are correct
12 The ports ranging from 0 to 1,023 are called the ___________ ports. The ports ranging
from 1,024 to 49,151 are called ___________ ports. The ports
ranging from 49,152 to 65,535 are called the ___________ ports.
A) well-known; registered; dynamic or private
19 In Selective Repeat, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo
= 5, the window ________.
A) slides two slots
B) slides one slot
C) slides three slots
D) does not slide
4 The source port number on the UDP user datagram header defines _______.
A) the sending computer
B) the receiving computer
C) the process running on the sending computer
D) None of the choices are correct
8 TCP is a __________protocol.
A) byte-oriented
B) message-oriented
C) block-oriented
D) None of the choices are correct
12 TCP uses _________________ to check the safe and sound arrival of data.
A) an acknowledgment mechanism
B) out-of-band signaling
C) the services of another protocol
D) None of the choices are correct
13 The bytes of data being transferred in each connection are numbered by TCP. The
numbering starts with a __________________.
A) 0
B) 1
C) randomly generated number
D) None of the choices are correct
14 In TCP, the sequence number for each segment is the number of the _______ byte
(virtual byte) carried in that segment.
A) first
B) last
C) middle
D) None of the choices are correct
16 In TCP, the value of the acknowledgment field in a sent segment defines the sequence
number related to the ______byte a party expects to receive next.
A) first
B) last
C) next
D) None of the choices are correct
22 The SYN flooding attack belongs to a group of security attacks known as a _____
attack.
A) denial of service
B) replay
C) man-in-the middle
D) None of the choices are correct
23 In TCP, a FIN segment consumes ____ sequence numbers if it does not carry data.
A) two
B) three
C) no
D) one
24 In TCP, a FIN + ACK segment consumes _____ sequence number(s) if it does not carry
data.
A) two
B) three
C) one
D) no
25 In TCP, one end can stop sending data while still receiving data. This is called a ______
termination.
A) half-close
B) half-open
C) full-close
D) None of the choices are correct
27 In TCP, the size of the send window is the ________ of rwnd and cwnd.
A) maximum
B) sum of
C) minimum
D) None of the choices are correct
29 In TCP, the receiver can temporarily shut down the window; the sender, however, can
always send a segment of _____ byte(s) after the window is shut
down.
A) ten
B) zero
C) one
D) None of the choices are correct
30 A serious problem can arise in the sliding window operation when either the sending
application program creates data slowly or the receiving application
program consumes data slowly, or both. This problem is called the ______.
A) silly window syndrome
B) unexpected syndrome
C) window bug
D) None of the choices are correct
31 Nagle's algorithm can solve the silly window syndrome created by the _________.
A) sender
B) receiver
C) both sender and receiver
D) None of the choices are correct
32 Clark's solution can solve the silly window syndrome created by the _________.
A) sender
B) receiver
C) both sender and receiver
D) None of the choices are correct
33 Delayed acknowledgment can solve the silly window syndrome created by the
_________.
A) sender
B) receiver
C) both sender and receiver
D) None of the choices are correct
34 In TCP, an ACK segments that carry no data consumes _______ sequence number(s).
A) no
B) one
C) two
D) None of the choices are correct
C) several
D) None of the choices are correct
38 We need to multiply the header length field by _______ to find the total number of bytes
in the TCP header.
A) 2
B) 4
C) 6
D) None of the choices are correct
39 In TCP, urgent data requires the urgent pointer field as well as the URG bit (to be set) in
the _______ field.
A) control
B) offset
C) sequence number
D) None of the choices are correct
40 In TCP, if the ACK value is 200, then byte _______ has been received successfully.
A) 199
B) 200
C) 201
D) None of the choices are correct
41 __________ control refers to the mechanisms and techniques to keep the load below
the capacity.
A) Flow
B) Error
C) Congestion
D) None of the choices are correct
42 In TCP's ________ algorithm the size of the congestion window increases exponentially
until it reaches a threshold.
A) congestion avoidance
B) congestion detection
C) slow start
D) None of the choices are correct
43 In TCP's __________ algorithm the size of the congestion window increases additively
until congestion is detected.
A) congestion avoidance
B) congestion detection
C) slow start
D) None of the choices are correct
44 ________ treats the two signs of congestion detections, timeout and three duplicate
ACKs, in the same way.
A) Taho TCP
B) Reno TCP
C) New Reno TCP
D) None of the choices are correct
45 In ______ TCP, when the connection is established, TCP starts the slow start algorithms
and sets the ssthresh variable to a pre-agreed value (normally 64 or
128 kilobytes) and the cwnd variable to 1 MSS.
A) Taho
B) Reno
C) new Reno
D) None of the choices are correct
46 The ___________ added a new state to the congestion control FSM, called the fast
recovery state.
A) Taho TCP
B) Reno TCP
C) new Reno TCP
D) None of the choices are correct
47 The ___________ treated the two signals of congestion, timeout and arrival of three
duplicate ACKs, differently.
A) Taho TCP
B) Reno TCP
C) new Reno TCP
D) None of the choices are correct
48 The __________ state in Reno TCP is a state somehow between the slow start and the
congestion avoidance states.
A) congestion avoidance
B) congestion detection
C) slow recovery
D) None of the choices are correct
49 In the Reno TCP, when TCP enters the fast recovery, if duplicate ACKs continue to
come, TCP ____________________________________.
A) stays in this state, but the cwnd grows additively
B) stays in this state, but the cwnd grows exponentially
C) moves to slow start state
D) moves to the congestion avoidance state but deflate the size of the cwnd to ssthresh
value
50 In the Reno TCP, when TCP enters the fast recovery, if a timeout occurs, TCP
____________________________________.
51 In the Reno TCP, when TCP enters the fast recovery, if a new (non duplicate) ACK
arrives, TCP ____________________________________.
A) stays in this state, but the cwnd grows additively
B) stays in this state, but the cwnd grows exponentially
C) moves to slow start state
D) moves to the congestion avoidance state but deflates the size of the cwnd to ssthresh
value
52 A later version of TCP, called ______ TCP, made an extra optimization on the _______
TCP.
A) new Reno; Reno
B) new Taho; Taho
C) new Reno; Taho
D) new Taho; Reno
53 In the slow start algorithm, the size of the congestion window grows ______________
until ___________________.
A) exponentially; it reaches a threshold
B) exponentially; congestion is detected
C) additively; it reaches a threshold
D) additively; congestion is detected
54 In the congestion avoidance algorithm, the size of the congestion window grows
______________.
A) exponentially; it reaches a threshold
B) exponentially; congestion is detected
C) additively; it reaches a threshold
D) additively; congestion is detected
55 The congestion window size, after it passes the initial slow start state, follows a saw
tooth pattern called _________________________________.
A) exponential increase, additive decrease
B) additive increase, exponential decrease
C) multiplicative increase, additive decrease
D) additive increase, multiplicative decrease
C) unreliable, message-oriented
D) None of the choices are correct
2 In HTTP, the first line in a request message is called a _______ line; the first line in the
response message is called the ________ line.
A) request; response
B) status; response
C) status; status
D) None of the choices are correct
4 In a ___________connection, the server leaves the connection open for more requests
after sending a response.
A) persistent
B) nonpersistent
C) persistent or nonpersistent
D) None of the choices are correct
7 Which of the following is present in both an HTTP request line and a status line?
A) Version number
B) URL
C) Status code
D) Method
12 In FTP, a file can be organized into records, pages, or a stream of bytes. These are
types of an attribute called _______.
A) file types
B) data structures
C) transmission modes
D) None of the choices are correct
13 In FTP, there are three types of _______: stream, block, and compressed.
A) file types
B) data types
C) transmission modes
D) None of the choices are correct
17 ________ provides service to the user to make the process of sending or receiving a
message easier.
A) An MTA
B) An MAA
C) A UA
D) None of the choices are correct
19 In the Internet, an e-mail address consists of two parts: a _______ and a _______.
A) local part; domain name
B) global part; domain name
C) label; domain name
D) local part; label
21 The formal protocol that defines the MTA client and server in the Internet is called
___________.
A) SMTP
B) SNMP
C) TELNET
D) SSH
22 SMTP is a __________protocol.
A) pull
B) push
C) push and pull
D) None of the choices are correct
24 In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and
eventually are sent as 32 bits.
A) 8bit
B) binary
C) base64
D) quoted-printable
27 When a user logs into a local time-sharing system, it is called ________ login.
A) local
B) remote
C) local or remote
D) None of the choices are correct
29 Network Virtual Terminal (NVT) uses two sets of characters, one for _____and one for
__________.
A) sending; receiving
B) request; reply
C) data; control
D) None of the choices are correct
30 For data, NVT uses US ASCII characters with the highest order bit set to ______.
A) 1
B) 0
C) 1 or 0
D) None of the choices are correct
31 For control, NVT uses US ASCII characters with the highest order bit set to ______.
A) 1
B) 0
C) 1 or 0
D) None of the choices are correct
33 The _______ translates NVT characters into a form acceptable by the remote operating
system.
A) terminal driver
B) TELNET client
C) TELNET server
D) pseudoterminal driver
C) hierarchical
D) organized
40 In the domain name space, a full domain name is a sequence of labels separated by
________.
A) colons
B) semicolons
C) dots
D) commas
42 In the domain name space, if a label is not terminated by a null string, it is called a
__________.
A) FQDN
B) PQDN
C) SQDN
D) None of the choices are correct
43 In the domain name space, a _________ is a subtree of the domain name space.
A) label
B) name
C) domain
D) None of the choices are correct
44 In the domain name space, what a server is responsible for or has authority over is
called a _________.
A) domain
B) label
C) zone
D) None of the choices are correct
45 A _______ server is a computer whose zone system consists of the whole tree.
A) domain
B) zone
C) root
D) primary
46 A ________ server is a computer that stores a file about the zone for which it has an
authority.
A) primary
B) secondary
C) zone
D) root
47 A ________ server is a computer that transfers the complete information about a zone
from another server.
A) primary
B) secondary
C) zone
D) root
48 In the Internet, the country domain section uses ___________ country abbreviations.
A) two-character
B) three-character
C) four-character
D) None of the choices are correct
49 In __________ resolution, the resolver expects the server to supply the final answer.
A) iterative
B) recursive
C) straight
D) None of the choices are correct
50 In __________ resolution, the server returns the IP address of the server that it thinks can
resolve the query.
A) iterative
B) recursive
C) straight
D) None of the choices are correct