Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

6.

 
1.  What is a HUB?
What does PoP stand for? Software
Pre Office Protocol Computing device
Post Office Protocol Network device
Protocol of Post Calculating device 82
None 7. 
What does a set of rules define?
2.  SMTP 85
What is the port number of PoP? FTP
35 IMAP
43 Protocol
110 8. 
25 Identify among the following which is mainly used to host web site.
3.  Mail server
What is the number of layers in the OSI model? Webserver
2 layers Database server
4 layers None
7 layers 9. 
9 layers Identify the full form of HTTP?
4.  HyperText Transfer Protocol
The full form of OSI is? HyperText Transfer Package
Operating System interface Hyper Transfer Text Package
Optical System interconnection Hyper Transfer Text Practice
Operating System Internet 10. 
Open system interconnection Identify the protocol primarily used for browsing data.
5.  FTP
Identify the layer which provides service to the user. TCP
Session layer TFTP
Application layer HTTP
Presentation error
Physical layer
11. 
Identify the total versions of IP. 16. 
1 What is the collection of the hyperlinked document on the internet known as?
2 HTML
3 Email
4 WWW
12.  Internet
Identify the first network which was based on TCP/IP protocol. 17. 
ARPANET What is the location of a resource on the internet given by?
HUB Email
Ethernet Card IP
Router Protocol
13.  URL
Choose among the following, which is the most common internet protocol. 18. 
PPP Identify the incorrect network topology,
FTP Bus
TCP/IP Star
SMTP P2P
14.  Ring
What does TCP/IP stand for? 19. 
Telephone control protocol / Internet Protocol Choose the port number of FTP.
Transmission control protocol/Internet protocol 23
Transmission control protocol/International protocol 21
None 110
15.  143
Which of the following layer isn’t present in the TCP/IP model but is included in the OSI model? 20. 
Network layer What is the length of the IPv4 address?
Session layer 8 bits
Application layer 16 bits
Transport layer 32 bits
128 bits
21.  26. 
What is the length of the IPv6 address? Identify among the following the network device used to connect two dis-similar types of networks.
8 bits Switch
16 bits Hub
32 bits Bridge
128 bits Gateway
22.  27. 
What is the term used when the main server sends mail to another mail server? Identify the device used to boost up a weak signal.
FTP Modem
SMTP Repeater
TCP/IP Switch
MIME Router
23.  28. 
What is the port number of SMTP? What does MAC stand for?
110 Media Access Control
143 Mass Access Control
25 Media Access Carriage
99 None
24.  29. 
What does MIME stand for? What is the length of the MAC address?
Multipurpose Internet Mail Extra 8 bits
Multi Internet Mail End 16 bits
Multipurpose Internet Mail Email 32 bits
Multipurpose Internet Mail Extension 48 bits
25.  30. 
What does port number 143 refer to? Which of the following is used to allocate and manage resources for a network?
SMTP Bluetooth
FTP Server
IMAP Node
POP None of the above
31.The data link layer takes the packets from _________ and encapsulates them into 36. When 2 or more bits in a data unit has been changed during the transmission,
frames for transmission. the error is called ____________
a) network layer a) random error
b) physical layer b) burst error
c) transport layer c) inverted error
d) application layer d) double error

32.Which of the following tasks is not done by data link layer? 37. CRC stands for __________
a) framing a) cyclic redundancy check
b) error control b) code repeat check
c) flow control c) code redundancy check
d) channel coding d) cyclic repeat check

33.Which sublayer of the data link layer performs data link functions that depend 38. Which of the following is a data link protocol?
upon the type of medium? a) ethernet
a) logical link control sublayer b) point to point protocol
b) media access control sublayer c) hdlc
c) network interface control sublayer d) all of the mentioned
d) error control sublayer
39. Which of the following is the multiple access protocol for channel access
34. Header of a frame generally contains ______________ control?
a) synchronization bytes a) CSMA/CD
b) addresses b) CSMA/CA
c) frame identifier c) Both CSMA/CD & CSMA/CA
d) all of the mentioned d) HDLC

35. Automatic repeat request error management mechanism is provided by 40. The technique of temporarily delaying outgoing acknowledgements so that they
________ can be hooked onto the next outgoing data frame is called ____________
a) logical link control sublayer a) piggybacking
b) media access control sublayer b) cyclic redundancy check
c) network interface control sublayer c) fletcher’s checksum
d) application access control sublayer d) parity check
41.  46. The network layer is concerned with __________ of data.
The arrangement where all data pass through a central computer is known as a) bits
Ring topology b) frames
Mesh topology c) packets
Star topology d) bytes
Bus topology 47. Which one of the following is not a function of network layer?
42.  a) routing
What of the following device is used in the network layer? b) inter-networking
Application gateway c) congestion control
Switch d) error control
Router 48. A 4 byte IP address consists of __________
Repeaters a) only network address
43.  b) only host address
Identify if the following statement is True or False: Network Interface Card(NIC) is an I/O device. c) network address & host address
True d) network address & MAC address
False
Depends on usage 49. In virtual circuit network each packet contains ___________
None a) full source and destination address
44.  b) a short VC number
What is required to use a Simple Network Management System? c) only source address
Servers d) only destination address
Protocols 50. Which of the following routing algorithms can be used for network layer
Rules design?
IP a) shortest path algorithm
45.  b) distance vector routing
Identify the major difference between SNMPv3 and SNMPv2. c) link state routing
Classification d) all of the mentioned
Integration
Management
Enhanced security
51. 
Identify the network which extends a private network across a public network. 56. Which of the following is not correct in relation to multi-destination
Storage Area network routing?
Virtual private network a) is same as broadcast routing
Enterprise Private network b) contains the list of all destinations
Local area network c) data is not sent by packets
52.  d) there are multiple receivers
Identify the layer which is responsible for data translating. 57. A subset of a network that includes all the routers but contains no loops is
Network called ________
Datalink a) spanning tree
Presentation b) spider structure
Application c) spider tree
53.  d) special tree
Identify the layer which determines the interface of the system with the user. 58. Which one of the following algorithm is not used for congestion control?
Network a) traffic aware routing
Datalink b) admission control
Presentation c) load shedding
Application d) routing information protocol
54.  59. The network layer protocol for internet is __________
Which of the following topology arrangements is a point-to-point line configuration? a) ethernet
RIng b) internet protocol
Mesh c) hypertext transfer protocol
Star d) file transfer protocol
All of the above 60. ICMP is primarily used for __________
55.  a) error and diagnostic functions
Identify the device which links two homogeneous packed broadcast local networks. b) addressing
Hub c) forwarding
Router d) routing
Bridge
Gateway
61.  66. 
Why are parity bits used? Identify the switching method in which the message is divided into small packets.
To encrypt data Virtual switching
To detect error Packet switching
To identify user Message switching
None None
62.  67. 
Identify among the following which belongs to class A. What is a proxy server also known as?
121.12.12.248 Application-level gateway
128.12.12.248 Proxy tools
129.12.12.248 Application proxy
130.12.12.248 None
63.  68. 
What does LAN stand for? Identify among the following servers which allow LAN users to share data.
Local Array Network Communication server
Local Area Network Point server
Local Area Net Data server
None File server
64.  69. 
Who keeps the private key in asymmetric key cryptography? Choose the correct formula for the total vulnerable time value of pure ALOHA.
Sender ½ Tfr
Receiver Tfr
Both Sender and Receiver 2*Tfr
None 4*Tfr
65.  70. 
Calculate the maximum efficiency of pure ALOHA at G = 0.5? Choose among the following which is a bit-oriented protocol.
16% SSL
1.89% HDLC
18.4% HTTP
18.999% All of the above
71. What are the functions of the transport layer? 76. Using which method in transport layer data integrity can be ensured?
a) Multiplexing/ Demultiplexing a) Checksum
b) Connection less Services b) Repetition codes
c) Connection oriented service c) Cyclic redundancy checks
d) Congestion control d) Error correcting codes
72. Which services are provided by transport layer? 77. Buffer overrun can be reduced by using what?
a) Error control a) Traffic control
b) Connection service b) Flow control
c) Connection less service c) Byte orientation
d) Congestion control d) Data integrity
73. TCP and UDP are called ________ 78. Transport layer can identify the symptoms of overload nodes using _________
a) Application protocols a) Flow control
b) Session protocols b) Traffic control
c) Transport protocols c) Byte orientation
d) Network protocols d) Data integrity
79. Transport layer receives data in the form of __________
74. Security based connection is provided by which layer? a) Packets
a) Network layer b) Byte streams
b) Session layer c) Bits stream
c) Application layer d) Both packets and Byte stream
d) Transport layer 80. Transport layer is which layer in OSI model?
75. TCP is the standard protocol with std no? a) Fourth layer
a) 5 b) Third layer
b) 4 c) Second layer
c) 7 d) Fifth layer
d) 3
81. Congestion control can control traffic entry into a telecommunications network, so to avoid
_________
a) Congestive connection
b) Connection collapse
c) Congestive collapse
d) Collapse congestive
82. FCP stands for _________
a) Fiber Channel Protocol
b) Field Channel Protocol
c) Fast Channel Protocol
d) Fiber Carrying Protocol
83. UDP packets are called as _________
a) Segments
b) Checksum
c) Frames
d) Datagrams
84. _________ does not provide reliable end to end communication.
a) TCP
b) UDP
c) Both TCP and UDP
d) Neither TCP nor UDP
85. ARQ stands for __________
a) Automatic Repeat Request
b) Automatic Request Repeat
c) Application Repeat Request
d) Application Request Repeat

You might also like