ASET GROUP OF INSTITUTE
ASET GROUP OF INSTITUTE
BY PASS FATEHPUR SIKRI AGRA
UNIT -2
1. Physical or logical arrangement of network is __________
a) Topology
b) Routing
c) Networking
d) Control
View Answer
Explanation: Topology in networks is the structure or pattern in which each and every node in the network is connected. There are many topologies in networking like bus, tree, ring, star, mesh, and hybrid topology. There is no particular best topology and a suitable topology can be chosen based on the kind of application of the network .
2. Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Explanation: In star topology, no computer is connected to another computer directly but all the computers are connected to a central hub. Every message sent from a source computer goes through the hub and the hub then forwards the message only to the intended destination computer.
3. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Explanation: In bus topology, there is a single cable to which all the network nodes are connected. So whenever a node tries to send a message or data to other nodes, this data passes through all other nodes in the network through the cable. It is really simple to install but it’s not secure enough to be used in most of the computer network applications.
4. Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
d) PAN
View Answer
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. WANs are used to connect cities, states or even countries. A wireless connection is required to build a WAN. The best example of WAN is the Internet.
5. Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) PAN
View Answer
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects computers in a small area such as schools, offices, residence etc. It is the most versatile kind of data communication system where most of the computer network concepts can be visibly used.
6. WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network
View Answer
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. These are used to connect cities, states or even countries. They can be connected through leased lines or satellites.
7. In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits
View Answer
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing.
8. _____ is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
View Answer
1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
View Answer
Explanation: Multiplexing is a method using which one can send multiples signals through a shared medium at the same time. This helps in using less resources and thus saving the cost of sending messages.
2. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
View Answer
Explanation: Circuit switching is a switching method by which one can obtain a physical path between end points. Circuit switching method is also called a connection oriented network. Two nodes must be physically and logically connected to each other to create a circuit switching network.
3. Which multiplexing technique used to transmit digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
View Answer
Explanation: TDM abbreviation for Time Division Multiplexing is a method used for digital signals. Whereas FDM and WDM abbreviation for Frequency Division Multiplexing, and Wavelength Division Multiplexing, are used for analog signals. TDM is used in applications like ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network).
4. If there are n signal sources of same data rate, then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n
View Answer
Explanation: In TDM, the total unit of time is divided equally among all the signal sources and each and every source has access to the complete channel bandwidth during its allotted time slot. When the time slot of the source is not active, it remains idle and waits for its slot to begin.
5. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
View Answer
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
6. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period
View Answer
Explanation: There are instances when connection between two endpoints has been established, but no communication or transfer of messages occurs. This period of time is called silent period. The silent period ends when either of the two endpoints starts the communication.
7. Multiplexing provides _________
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy
View Answer
Explanation: Multiplexing helps us to transfer our messages over a shared channel. This brings up the issue of privacy and efficiency. Fortunately, Multiplexing has high efficiency and high privacy when implemented because in the implementation, the transport layer of the OSI network model handles the function of multiplexing through interfaces called ports which provide the required efficiency and privacy.
8. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
View Answer
Explanation: In TDM the transmission rate provided by the path that is multiplexed will always be greater than the sum of transmission rates of the single sources. This happens because the transmission rate is provided to each source only for a small period of time.
9. In TDM, slots are further divided into _________
a) Seconds
b) Frames
c) Packets
d) Bits
View Answer
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing.
1. Which topology has Multipoint connection:
a)Ring
b)Bus
c)Star
d)Mesh
e.both b and c
Answer b
2.Mesh topology, have devices which are connected via
a)single and multiple links
b)Multipoint link
c)Point to point link
d)No Link
e)None of the above
answer c
3.The topology which requires a central controller or hub is
a)Mesh
b)Star
c)Bus
d)Ring
e)both b and c
answer b
4.LAN has mostly used the topologies
a)Bus
b)ring
c)star
d)both of these
e)None of these
answer d
5.Which topologies have two or more Combination:
a) multigrid
b)Star Topology
c)Bus Topology
d)Ring topology
e)Hybrid
Answer e
6.In a mesh topology, each device has a dedicated topology of
b.Point to point linking
c.None of Above
d.Both a and b
e.Single and multiple links
answer a
7.Which topology has the highest reliability?
a.Mesh topology
b.Star topology
c.Ring Topology
d.Bus Topology
e.none of these
answer a
8.Star Topology is basically based on a central device __________ ?
a.HUB
b.Switch
c.gates
d.Both a and b
e.none of these
answer d
9. A topology that is responsible for describing the geometric arrangement of components that make up the LAN.
a) Complex
b) Physical
c) Logical
d) Incremental
Answer: b
10. LAN topology describes the possible connections between pairs of networked end-points that can communicate.
a) Complex
b) Physical
c) decrement
d) Incremental
e) Logical
Answer: e
11.In a network, participating computers are referred to as:
a) Clients
b) Servers
c) Nodes
d) CPUs
e) both a and c
Answer: c
12.Tokens are involved in a topology.
a) Star
b) hybrid
c) Bus
d) Daisy Chaining
e) Ring
Answer: e
13. A ______WAN can be developed by using any other transmission facility:
a) Multi-peer
b) peer-to-peer
c) Two-tiered
d) Three-tiered
e) Hybrids
Answer: b
14. The source computer sent the information along with?
a) data
b) module
c) token
d) element
e) both a and b
Answer: c
15. All the hubs of networks have a serially connected system of?
a) Bus
b) Ring
c) multi-peer
d) Star
e) Daisy chains
View Answer
Answer: e
1._______ field in the base header restricts the lifetime of a datagram In IPv6,
A) version
B) next-header
C) hop limit
D) neighbor-advertisement
Answer: C
2. An HLEN value of decimal 10 means _______In IPv4 header
A) 10 bytes of options
B) 40 bytes of options
C) 10 bytes in the header
D) 40 bytes in the header
Answer: D
3. In IPv4, an HLEN value of decimal 10 means _______.
A) 10 bytes of options
B) 40 bytes of options
C) 40 bytes in the header
D) none of the above
Answer: C
4._______ field in the base header and the sender IP address combine to indicate a unique path identifier In IPv6.
A) flow label
B) next header
C) hop limit
D) destination IP address
Answer: A
5. what is the value of the total length field in bytes In IPv4?
A) 428
B) 407
C) 107
D) 427
Answer: A
6.________ term means that IP provides no error checking.
A) reliable delivery
B) connection-oriented delivery
C) best-effort delivery
D) none of the above
Answer: C
7. ________ protocol is the transmission used by the TCP/IP suite.
A) ARP
B) IP
C) RARP
D) none of the above
Answer: B
8. what is the length of the data field given an HLEN value of 12 and the total length is 40,000 In IPv4?
A) 39,988
B) 40,012
C) 40,048
D) 39,952
Answer: D
9.what is needed to determine the number of the last byte of a fragment In IPv4?
A) Identification number
B) Offset number
C) Total length
Answer: D
10. _______size in the IPv4 header.
A) 20 to 60 bytes long
B) 20 bytes long
C) 60 bytes long
D) none of the above
Answer: A
11. In IPv6, the decision is based on the _______ field in the base header.
A) hop limit
B) priority
C) next header
D) none of the above
Answer: B
12.which bit value unambiguously identifies the datagram as a fragment In IPv4?
A) Do not bit? 0
B) More bit? 0
C) offset = 1000
D) none of the above
Answer: C
13. Which necessary part of the IPv6 datagram?
A) Base header
B) Extension header
C) Data packet from the upper layer
D) (a) and (c)
Answer: A
14. In IPv4, the total size of the datagram must be less than the _______.
A) MUT
B) MAT
C) MTU
D) none of the above
Answer: C
15.options are inserted between _________ and ___________ data,In IPv6, .
A) base header; extension header
B) base header; upper-layer data
C) base header; frame header
D) none of the above
Answer: B
16. datagram is fragmented into three smaller datagrams An IPv4. Which is true?
A) They do not fragment bit is set to 1 for all datagrams.
B) The more fragment bit is set to 0 for all datagrams.
C) The identification field is the same for all datagrams.
D) The offset field is the same
Answer: C
17. if the fragment offset has a value of 100, it means that _______ In IPv4,
A) datagram has not been fragmented
B) datagram is 100 bytes in size
C) the first byte of the datagram is byte 100
D) the first byte of the datagram is byte 800
Answer: D
18. IP is _________ datagram protocol.
A) an unreliable
B) a connectionless
C) both a and b
D) none of the above
Answer: C
19. IPv6 allows _________ security provisions than IPv4.
A) more
B) less
C) the same level
D) none of the above
Answer: A
20. The formerly IPv4 header field known as the service type field is now called?
A) IETF
B) checksum
C) differentiated services
D) none of the above
Answer: C
21. delivery service such as IPv4.
A) error checking
B) error correction
C) datagram acknowledgment
D) none of the above
Answer: D
22. The IPv4 header size _______.
A) 20 to 60 bytes long
B) 20 bytes long
C) 60 bytes long
D) none of the above
Answer: A
23. Which network layer from the sender to receiver deals with the necessity of a three-way handshake transmission of data?
A) Path determination
B) Forwarding
C) Call Set-up
D) All of the above
Answer: C
24.Transmission purpose is basically a combination of __________
A) group of bits
B) source & destination addresses
C) both a & b
D) none of the above
Answer: C
25.__________crucial role in functions of network layer?
A) Network Service Data Unit (NSDU)
B) Medium Access Control Unit (MACU)
C) Network Address Translation Unit (NATU)
D) None of the above
Answer: A
26._________form of byte assigning strategy is adopted in class B?
A) Network.Node.Node.Node
B) Network.Network.Node.Node
C) Network.Network.Network.Node
D) Network.Node.Node.Node
Answer: B
27. which size of the block depends on classless?
A) Nature & size of an entity
B) Number of addresses
C) Availability of the address space
D) All of the above
Answer: A
28. Which is the ability of a single network to span multiple physical networks?
A) Subnetting
B) Masking
C) Fragmenting
D) Hopping
Answer: A
29. Which field/s of ICMPv6 packet header has minimal integrity levels?
a. Type
b. Code
c. Checksum
d. All of the above
Answer:C
Choose the address of class D is
(A) Unicast
(B) Reserved
(C) Multicast
(D) None of the above
Answer(C) Multicast
Select the wrong class.
(A) CLASS A = 1 to 126
(B) CLASS C = 192 to 220
(C) CLASS B = 128 to 191
(D) CLASS D = 224 to 239
Answer (B) CLASS C = 192 to 220
Select the bits from where the class A address starts.
(A) 110
(B) 10
(D) 1111
Answer (C) 0
MCQ No – 23
Select the bits from where the class B address starts
(A) 0
(B) 110
(C) 10
(D) 1111
Answer (C) 10
Select the bits from where the class C address starts
(A) 0
(B) 10
(C) 110
(D) 1111
Answer (C) 110
Select which one of these is not a class of IP addresses.
(A) Class A
(B) Class F
(C) Class E
(D) Class B
Answer (B) Class F
Select the address of class A, B and C are
(A) Reserved
(B) Multicast
(C) Unicast
(D) None of the above
Answer (C) Unicast
Select the bits from where the class D address starts
(A) 0
(B) 10
(C) 110
(D) 1110
Answer (D) 1110
How many bits are in Version 6 of IP address?
(A) 64 bits
(B) 32 bits
(C) 128 bits
(D) 256 bits
Answer (C) 128 bits
Select the stands for IANA stands.
(A) Internal Associative Numbers Authority
(B) Internal Assigned Numbers Authority
(C) Internet Associative Numbers Authoritative
(D) Internet Assigned Numbers Authority
Answer (D) Internet Assigned Numbers Authority
RIR stands for ________
a) Regional Internal Registries
b) Registries Internet Regional
c) Regional Internet Registries
d) Registries Internal Regional
Answer Regional Internet Registries
Select from the following how many version /s of IP’s are there.
(A) 4 versions
(B) 3 versions
(C) 2 versions
(D) 1 version
Answer (C) 2 versions
Which one are the stands of VLSM?
(A) Version Length Subnet Masking
(B) Version Length Surface Masking
(C) Variable Length Surface Masking
(D) Variable Length Subnet Masking
Answer (D) Variable Length Subnet Masking
Which protocol include in desktops and operating systems.
(A) IPv3 protocol
(B) IPv4 protocol
(C) Both IPv6 and IPv4 protocol
(D) IPv6 protocol
Answer (D) IPv6 protocolIPv6 protocol
Select the field is specified by how the datagram should be handled?
(A) Type of Service
(B) Identification
(C) Header length
(D) Flags
(A) Type of Service
Select the number of bits has assigned to the identification field.
(A) 3
(B) 16
(C) 8
(D) 32
Answer (C) 8
Choose how many bits have assigned to the flag field.
(A) 2
(B) 8
(C) 3
(D) 16
Answer (B) 8
Select the flag value to identify the last fragment?
(A) 1
(B) 0
(C) 2
(D) 11
Answer (B) 0
Select the field that helps to check the rearrangement of the fragments?
(A) identifier
(B) flags
(C) offset
(D) protocols
Answer (C) offset
Select the field in IPv4 datagram is not about to fragmentation
(A) Flags
(B) TOS
(C) Offset
(D) Identifier
(B) TOS
Select the 1st bit In the flags field
(A) do not fragment a bit
(B) reserved for future use
(C) more fragment bit
(D) none of the above
Answer (B) reserved for future use
Select the field that is used to specify by how long an IP packet can reside in-network before it is finished?
(A) Identification
(B) Options
(C) TOS
(D) Time to live
Answer (D) Time to live
Select the field that is used for network testing, debugging, control routing, timing and management.
(A) Identification
(B) Options
(C) Flags
(D) Time to live
Answer (B) Options
classful addressing is replaced with In IPv4 address
(A) Classful advertising
(B) Classful addressing new version
(C) Classless addressing
(D) Classless advertising
Answer (C) Classless addressing
_____ bytes in dotted-decimal notation, in an IP address.
(A) 3
(B) 5
(C) 4
(D) none of the above
Answer (C) 4
Select the minimum header size of an IP packet.
(A) 16 bytes
(B) 20 bytes
(C) 10 bytes
(D) 10 bytes
Answer (B) 20 bytes
Select the size of Network bits and Host bits of Class A of IP address.
(A) Network bits 7, Host bits 23
(B) Network bits 8, Host bits 24
(C) Network bits 7, Host bits 2
(D) Network bits 8, Host bits 23
Answer (C) Network bits 7, Host bits
Select the uses of subnetting.
(A) It speeds up the speed of the network
(B) It divides the network into network classes
(C) It divides one large network into several smaller ones
(D) None of the above
Answer
(C) It divides one large network into several smaller ones
Select from the following which one is correct about Class B Address of IP address.
(A) Network bit – 18, Host bit – 16
(B) Network bit – 16, Host bit – 14
(C) Network bit – 14, Host bit – 16
(D) Network bit – 12, Host bit – 14\
Answer (C) Network bit – 14, Host bit – 16
Select from the following which represents the last address of IP address.
(A) Unicast address
(B) Broadcast address
(C) Network address
(D) None of the above
Answer (B) Broadcast address
Select the size of Host bits in Class B of IP address.
(A) 16
(B) 08
(C) 04
(D) 32
Answer (A) 16
Select from the following which one application is not for IP protocol
(B) offer reliable service
(C) offer unreliable service
(D) no error checking
Answer (B) offer reliable service
Choose the header of the datagram in the IPv4 has.
(A) 0 to 20 bytes
(B) 20 to 60 bytes
(C) 20 to 40 bytes
(D) 20 to 80 bytes
Answer (B) 20 to 60 bytes
Select the format of the IP address.
(A) 34 bit
(B) 32 bit
(C) 16 bit
(D) 64 bit
Answer (B) 32 bit
Choose the usable size of Network bits in Class B of IP address.
(A) 04
(B) 14
(C) 08
(D) 16
Answer (D) 16
Select the bits for the IP address.
(A) 24
(B) 128
(C) 64
(D) 32
Answer (D) 32
Select the size of the header If the value of HELEN in an IP packet is 0101.
(A) 20
(B) 5
(C) 40
(D) 60
Answer (A) 20
1. OSI stands for __________
a) open system interconnection
b) operating system interface
c) optical service implementation
d) open service Internet
View Answer
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides a structured plan on how applications communicate over a network, which also helps us to have a structured plan for troubleshooting. It is recognized by the ISO as the generalized model for computer network i.e. it can be modified to design any kind of computer network.
2. The number of layers in ISO OSI reference model is __________
a) 4
b) 5
c) 6
d) 7
View Answer
Explanation: In OSI reference model, there are 7 layers namely Application, Presentation, Session, Transport, Network, Data Link and Physical layer. Each layer uses a protocol to perform its designated function, for example, the data link layer uses error detection protocols for error control functions.
3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer
View Answer
Explanation: In OSI reference model, there are two layers which are not present in TCP/IP model. They are Presentation and Session layer. The functions of Presentation and Session layer in the OSI model are handled by the transport layer itself in TCP/IP.
Comments
Post a Comment