CS610 MidTerm MCQs by Talha Sajid

Download as pdf or txt
Download as pdf or txt
You are on page 1of 42

Mid-Term CS610(Computer Networks) Page 1 of 42

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 2 of 42

1. Program sends a message to a remote computer and reports whether the computer
responds.
a) Ping
b) Traceroute
c) ICMP
d) None of the given

2. For how much time would other computers be in wait while one computer was
transferring 56MB file with transmission speed of 56Kbps
a) 10 Sec
b) 11 Sec
c) 12 Sec
d) 13 Sec

3. ATM is also called___________

a) Label rewriting
b) Label switching system
c) Label rewriting and label switching system
d) All of above

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 3 of 42

4. was especially concerned about the lack of high-powered computers.


a) ARPA
b) IEEE
c) EIA
d) None of the given

5. The most important task a bridge performs is _______


a) Packet switching
b) Line controlling
c) Noise controlling
d) Frame filtering

6. ABR stands for…………….


a) Asynchronous Bit Rate
b) Asynchronous Byte Recovery
c) Asynchronous Bit Redundancy
d) Available Bit Rate

7. The term ________ is used to denote the definition of a packet used with a specific type
of network.
a) Packet
b) Frame
c) Data
d) None of the given

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 4 of 42

8. The maximum cable length of a LAN is _____


a) Fixed
b) Unlimited
c) Fixed and Unlimited in different conditions
d) None of these

9. SMDS is............
a) Connectionless service
b) Connection oriented service
c) Used for delivering blocks of data
d) None of the above

10. ........ is effectively a very short Ethernet with very long AUI cables. It can be connected
into larger Ethernet .
a) RJ-45
b) HUBS
c) 10Base-T
d) None of these

11. _________ have advantages arisen from the size and ease of computation.
a) CRC
b) Parity
c) Checksums
d) None of given

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 5 of 42

12. The maximum size of an Ethernet segment is


a) 250 meters
b) 500 meters
c) 700 meters
d) None of the given

13. places the boundary between the first and second octets
a) Class A
b) Class B
c) Class C
d) Class D

14. Router detects datagram _______than network MTU and then it splits into pieces and
each piece is _________than outbound network MTU.
a) Larger, smaller
b) Larger, larger
c) Smaller, larger
d) Smaller, smaller

15. Which of the following is not a network adapter?


a) 3 com LP III
b) 3 com Etherlink III ISA
c) 3 com Etherlink II Adapter
d) 3 com 3C508 ISA 16 BIT

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 6 of 42

16. UDP offers application programs a Message-Oriented Interface, applications can


depend on protocol to preserve data boundaries.
a) True
b) False

17. In case TCP, retransmission, acknowledgment from a computer on LAN are expected
to arrive within
a) Seconds
b) Micro seconds
c) Milliseconds
d) Nanoseconds

18. Most LANs that employ ring topology use an access mechanism known as________
a) CSMA/CD
b) CSMA/CA
c) TOKEN PASSING
d) None of the given

19. In Direct point to point communication adding the Nth computer requires_______ new
connections.
a) None of the given
b) N2
c) N-1
d) (N2 –N)/2

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 7 of 42

20. The Gigabit Ethernet hardware operates at a rate of ________


a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) None of the given

21. IEEE LLC/SNAP header is _____, which is used to specify the type of data.
a) 8 octets
b) 8 bytes
c) 8 bits
d) None of the given

22. protocols of TCP/IP layering model specify how to ensure reliable transfer.
a) Physical Layer
b) Network Interface Layer
c) Internet Layer
d) Transport Layer

23. The address identifies the physical network to which the computer is attached, while
the identifies an individual computer on that network.
a) prefix , suffix
b) suffix , prefix
c) suffix , suffix
d) None of the given

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 8 of 42

24. places the boundary between the third and fourth octets.
a) Class A
b) Class B
c) Class C
d) Class D

25. Formally named __________ informally known as the twisted pair Ethernet or TP
Ethernet.
a) 10 Base 2
b) 10 Base 5
c) 10 Base T
d) None of the given

26. The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address
a) itself
b) prefix
c) suffix
d) mask

27. Find the class of the address.


10100111 11011011 10001011 01101111
a) A
b) B
c) E

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 9 of 42

d) C

28. An interface for twisted pair Ethernet must have an ____________ connector, and
must generate signals according to the_____________ specification.
a) RJ-45, 10 Base T
b) RJ-45, 10 Base 5
c) BNC, 10 Base 2
d) BNC, 10 Base T

29. Find the class of the address:


11110011 10011011 11111011 00001111
a) A
b) C
c) E
d) B

30. TCP uses mechanism to control the flow of data.


a) door
b) window
c) acknowledgment
d) retransmission

31. Computer networks are often called ________ because they use packet technology.
a) Ethernet
b) Switch networks

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 10 of 42

c) Packet networks
d) None of the given

32. A bridges function in the _________ layers(s).


a) Physical (MAC)
b) Data link
c) Network
d) Physical (MAC) and Data link

33. An_______ method, the network hardware designers specify how type information is
included in the frame and the value use to identify various frame types.
a) Explicit frame type
b) Ideal frame type
c) Implicit frame type
d) None of the given

34. An interface for thin Ethernet must have an connector, and must generate signals
according to the specification.
a) RJ-45, 10 Base T
b) RJ-45, 10 Base 5
c) BNC, 10 Base 2
d) BNC, 10 Base T

35. A Bridge forwards or filters a frame by comparing the information in its address table
to the frame’s

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 11 of 42

a) Layer 2 source address


b) Source node’s physical address
c) Layer 2 destination address
d) Layer 3 destination address

36. of TCP/IP layering model, corresponds to basic network hardware.


a) Physical Layer
b) Network Interface Layer
c) Internet Layer
d) Transport Layer

37. _________is called an end-to-end protocol because it provide a connection directly


from an application on one computer to an application on a remote computer.
a) IP
b) UDP
c) TCP
d) None of the given

38. A Bridge can ________


a) Filter a frame
b) Forward a frame
c) Extend a LAN
d) Do all the above

39. Protocol addresses are abstractions provided by_______

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 12 of 42

a) hardware
b) software
c) operating system
d) internet

40. In the 1970s large organizations began to acquire multiple networks. Each network in
the organization formed island. Employees needed to choose a computer appropriate for
each task. So they needed multiple screens, keyboards and computers.
a) False
b) True

41. A Bridge forwards or filters a frame by comparing the information in its address table
to the frame’s_____
a) Layer 2 source address
b) Source node’s physical address
c) Layer 2 destination address
d) Layer 3 destination address

42. The general form of an IP datagram is with a header followed by data. The header
contains information that controls where and how the datagram is to be sent.
a) True
b) False

43. Which of the following is a correct representation of the IPv6?


a) 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 13 of 42

b) 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255
c) 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
d) 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

44. ______ computes shortest paths in a graph by using weights on edges as a measure of
distance.
a) Greedy algorithm
b) Distance vector algorithm
c) Dijksta’s algorithm
d) None of the given

45. The number of connections needed for N computer in direct point to point
communication is equal to:
a) (N2 –N)/2
b) N(N- 1)
c) N2
d) None of the given

46. A system with redundant bridges might have a problem with in the system.
a) Loop
b) Filters
c) Spanning Trees
d) All given choices

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 14 of 42

47. Connectionless service, Message-Oriented protocol, best effort delivery service,


arbitrary interaction and operating system independent are the characteristics of
a) TCP
b) UDP
c) IP
d) None of the given

48. _________ is used for audio and video, since these have predefined maximum data
rates
a) Constant Bit Rate (CBR) service
b) Variable Bit Rate (VBR) service
c) Available Bit Rate (ABR) service
d) None of the given

49. The process of using a routing table to select a next hop for a given datagram is called
a) Encapsulation
b) Reassembling
c) Routing or forwarding
d) None of the given

50. uses distance vector approach to define routing


a) BGP
b) OSPF
c) RIP
d) None of the given

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 15 of 42

51. Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service)
offers_______.
a) Connectionless service paradigm
b) Connection oriented service paradigm
c) Both Connectionless and Connection-oriented service paradigm
d) None of the given

52. Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
a) T
b) C
c) D
d) C, D

53. We use the term ________to refer to a measure of the path that routing software use
when choosing a route.
a) routing path
b) routing metric
c) routing
d) switching

54. A network with throughput T and delay D has a total of ________ bit in transit at any
time.
a) T / D

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 16 of 42

b) T x D
c) T + D
d) None of the given

55. SMDS is............


a) Connectionless service
b) Connection oriented service
c) Used for delivering blocks of data
d) None of the above

56. All destinations on same switch have same


a) Router
b) Information
c) Next hop
d) None of the above

57. If a link or a packet switch fails then which one of the following would possibly
happen?
a) Link would be reestablished
b) Request to change failed hardware would appear
c) The packet switch will modify the tables
d) None of the above

58. ATM is designed to work on___________.


a) Twisted Pair

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 17 of 42

b) Coaxial
c) Radio Frequency
d) Fiber

59. A _______ Relies on the hardware manufacturer to assign a unique physical address to
each network interface.
a) Static addressing scheme
b) Configurable addressing scheme
c) Dynamic addressing scheme
d) None of the given

60. Computers attached to an Ethernet use ------ in which a computer waits for the ether
to be idle before transmitting a frame.
a) CSMA/CD
b) CSMA/CA
c) TOKEN PASSING
d) None of the given

61. ATM assigns each VC a identifier that is divided two parts to produce a hierarchy.
a) 21-bit
b) 22-bit
c) 23-bit
d) 24-bit

62. identifies which application program on receiving computer should receive the data

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 18 of 42

a) Logical address
b) Source port
c) Destination Port
d) None of the given

63. Which of the following are interior routing protocols?


a) RIP
b) OSPF
c) BGP
d) RIP and OSPF

64. FDDI can transmits data at a rate of __________


a) 100 million bits per second
b) 10 million bits per second
c) 1000 million bits per second
d) None of the given

65. No error detection scheme is perfect because transmission errors can affect the
additional information as well as the data.
a) True
b) False

66. A ---------- provide a mechanism that a customer can use to set a physical address.
a) Static addressing scheme
b) Configurable addressing scheme

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 19 of 42

c) Dynamic addressing scheme


d) None of the given

67. In Point-to-Point topology there are two topologies.


a) Star and Tree
b) Tree and Ring
c) Star and Ring
d) Star and Tree

68. measures distance in network hops, where each network between the source and
destination counts as single hop.
a) BGP
b) OSPF
c) RIP
d) None of the given

69. In -------------, network occupies the smaller area like a room a floor or a building
a) LAN
b) WAN
c) MAN
d) None of the given

70. Program sends a message to a remote computer and reports whether the computer
responds.
a) Ping

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 20 of 42

b) Traceroute
c) ICMP
d) Non of the given

71. _________ provide Application to application communication it also called end to end
communication
a) IP
b) TP
c) RIP
d) None of the given

72. A routing table contains.


a) The destination network ID
b) The hop count to reach the network
c) The router ID of the next hop
d) All of the given

73. __________ has no way to determine the cause of the problem.


a) ICMP
b) Ping
c) Trace route
d) Non of the given

74. One repeater ________, two repeaters _________ the maximum cable length
limitation.

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 21 of 42

a) Double, triple
b) Double, 4 time
c) half, triple
d) Double, half

75. Address mask defines how many bits of address are in suffix?
a) True
b) False

76. Router detects datagram ___________than network MTU


a) Larger
b) Smaller
c) None of given
d) Equal

77. Information can flow in either or both direction between


a) Clients
b) Clients and servers
c) Servers
d) None of given

78. On of the design goals for unicast route propagation is


.
a) consistency
b) inconsistency

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 22 of 42

c) stability
d) dynamic addressing

79. IPV6 address consists of


a) 32 Bits
b) 64 Bits
c) 128 Bits
d) none of the given

80. The term_________ refers to the general concept of a small block of data
a) Packet
b) Frame
c) Data
d) None of the given

81. Hardware that calculates a CRC uses two simple components.


a) AND unit and XOR unit
b) Shift register and XOR unit
c) Shift register and AND unit
d) None of the given

82. The header indicates whether a datagram is a fragment or a complete datagram.


a) FLAGS
b) FLAGMENT OFFSET
c) IDENTIFICATION

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 23 of 42

d) None of the given

83. Local Talk is a LAN technology that employs _______


a) Bus topology
b) Ring topology
c) Star topology
d) None of the given

84. ICMP message transport is acted upon by getting ICMP encrypted in IP.
a) True
b) False

85. These packets serve same purpose on as frames on


a) Intranet, LAN
b) Internet, WAN
c) Intranet, WAN
d) Internet, LAN

86. The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address
a) itself
b) prefix
c) suffix
d) mask

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 24 of 42

87. Ethernet uses a ------ bit static addressing scheme in which each device is assigned a
unique address by the manufacturer.
a) 64
b) 48
c) 32
d) 8

88. 11110011 10011011 11111011 00001111


a) A
b) C
c) E
d) B

89. Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
a) T, D
b) c
c) T
d) T, C

90. In which method of Address Resolution Protocol the implementation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
a) T, C

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 25 of 42

b) T
c) C
d) D

91. In IPv6 the type of address used for collection of computers with same prefix. Are
known as
.
a) Anycast
b) Unicast
c) Multicast
d) None of the given

92. The time for acknowledgement to arrival of packet depends on.


a) Distance to destination and Current traffic conditions
b) Current traffic conditions
c) Distance to destination.
d) none of these

93________ has a jitter zero


a) None of the given
b) Virtual Private Network
c) Isochronous Network
d) Asynchronous Network

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 26 of 42

94. An ________method, the network hardware designers specify how type information is
included in the frame and the value use to identify various frame types.
a) Explicit frame type
b) Ideal frame type
c) Implicit frame type
d) None of the given

95. A Bridge forwards or filters a frame by comparing the information in its address table
to the frame’s
a) Layer 2 source address
b) Source node’s physical address
c) Layer 2 destination address
d) Layer 3 destination address

96. Most WAN systems include a mechanism that can be used to eliminate the common
case of duplication routing is called
a) Hierarchal address
b) Default route
c) Shortest path
d) None of the given

97. Formally named __________ informally known as the thick wire Ethernet or Thick
net.
a) 10 Base 2
b) 10 Base 5
c) 10 Base T
d) None of the given

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 27 of 42

98. of TCP/IP layering model, corresponds to basic network hardware.


a) Physical Layer
b) Network Interface Layer
c) Internet Layer
d) Transport Layer

99. protocols of TCP/IP layering model specify how to ensure reliable transfer.
a) Physical Layer
b) Network Interface Layer
c) Internet Layer
d) Transport Layer

100. Protocol addresses are abstractions provided by


a) hardware
b) software
c) operating system
d) internet

101. ARP is almost always used to bind a bit IP address to a bit Ethernet address.
a) 32, 48
b) 24, 32
c) 32, 64
d) 32, 128

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 28 of 42

102. The number of connections needed for N computer in direct point to point
communication is equal to:
a) (N2 –N)/2
b) N(N- 1)
c) N2
d) None of the given

103. The maximum size of an Ethernet segment is___________


a) 250 meters
b) 500 meters
c) 700 meters
d) None of the given

104. The process of using a routing table to select a next hop for a given datagram is called
a) Encapsulation
b) Reassembling
c) Routing or forwarding
d) None of the given

105. _________is used for compressed audio and video where the data rate depends on the
level of compression that can be achieved.
a) Constant Bit Rate (CBR) service
b) Variable Bit Rate (VBR) service
c) Available Bit Rate (ABR) service
d) None of the given

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 29 of 42

106. Which method of Address Resolution Protocol is useful with any hardware?
Were "T" for Computation and "D" for Data Exchange?
a) T
b) C
c) D
d) C, D

107. We use the term to refer to a measure of the path that routing software use when
choosing a route.
a) routing path
b) routing metric
c) routing
d) switching

108. performs local multicast and uses IP-in-IP encapsulation to send multicast datagrams
from one site on the Internet to another.
a) Distance Vector Multicast Routing Protocol (DVMRP)
b) Core Based Trees (CBT)
c) Protocol Independent Multicast_ Sparse Mode (PIM-SM)
d) Protocol Independent Multicast _ Dense Mode (PIM-DM)

109. In broadcast topology there are two categories____.


a) SATELLITE\RADIO
b) RING TOPOLOGY

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 30 of 42

c) Both a & b
d) None of the above

110. OSPF is based on______


a) Distance vector routing
b) Link state routing
c) Path vector routing
d) Distance vector routing and Link state routing

111. The product of delay and throughput measures the _____ of data that can be present
on the network.
a) Area
b) Volume
c) Length
d) None of the given

112. CRC can detect more errors than a simple checksum……


a) True
b) False

113. An interface for thin Ethernet must have an connector, and must enerate signals
according to the specification.
a) RJ-45, 10 Base T
b) RJ-45, 10 Base 5
c) BNC, 10 Base 2

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 31 of 42

d) BNC, 10 Base T

114. One repeater _______, two repeaters ________ the maximum cable length limitation.
a) doubles, triple
b) square roots, cude roots
c) and, triple
d) doubles, cancel

115. What will be the bandwidth rate for short distance 10Base-T?
a) 16 MHz
b) 20 MHz
c) 100 MHz
d) 150 MHz

116. LAN interface may use __________ to copy frame data directly from main memory.
a) DMA
b) FDDI
c) CSMA/CD
d) None of the given

117. A network uses a _______ if all computers attach to a central point


a) Star Topology
b) Ring Topology
c) Bus Topology
d) None of the given

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 32 of 42

118. The Ethernet standard specifies that frames are sent using the_______
a) Differential Manchester
b) Not Return to Zero (NRZ)
c) Manchester Encoding
d) Return to Zero (RZ)

119. For how much time would other computers be in wait while one computer was
transferring 56MB file with packet size of 1000 bytes and transmission speed of 56Kbps
a) 0.143 sec
b) 0.243 0.343
c) 0.343 0.343
d) 0.443 0.343

120. Some applications have large data transfer. In this way they hold the network for
long time. This problem can be eliminated by
a) Divide the application into small block or chunks called ‘Packets’.
b) Divide the application into small block or chunks called ‘Segments’.
c) Divide the data into small block or chunks called ‘Segments’.
d) Divide the data into small block or chunks called ‘Packets’.

121. ________ is also called self-healing network


a) ATM
b) FDDI
c) Token Ring

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 33 of 42

d) None of the given

122. A typical port on an ATM switch operates at __________ or higher.


a) OC-2 speed (155Mbps)
b) OC-3 speed (100Mbps)
c) OC-3 speed (155Mbps)
d) OC-3 speed (155Gbps)

123. No error detection scheme is perfect because transmission errors can affect
_________.
Select correct option:
a) Data
b) Additional Information
c) Additional information & data
d) Transmission medium

124. A network uses _______ to arrange computers to be connected in a single closed loop.
a) Star Topology
b) Dual Ring Topology
c) Ring Topology
d) Bus Topology

125. Which of the following is a connecting device?


a) Bridge
b) Repeater

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 34 of 42

c) Hub
d) All the given

126. Which of the following protocols allows the sender and receiver to enforce polices.
a) RIP
b) OSPF
c) BGP
d) RIP and OSPF

127. include a 32-bits address mask with each address, which allows the address to be
classful, classless, or sub netted.
a) RIP
b) OSPF
c) BGP
d) None of the given

128. The third field of the header consists of ______bit Ethernet frame type.
a) 48
b) 32
c) 16
d) 8

129. A multicast routing scheme in which the protocol software builds a delivery tree from
a central point is called_____
a) Distance Vector Multicast Routing Protocol (DVMRP)

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 35 of 42

b) Core Based Trees (CBT)


c) Protocol Independent Multicast_ Sparse Mode (PIM-SM)
d) Protocol Independent Multicast _ Dense Mode (PIM-DM)

130. ISO stands for____


a. International Standard Organization
b. International Student Organization
c. Integrated Services Organization
d. Internet Services Organization

131. Fixed network is a type of networks which is classified with respect to the
______factor
a) Size
b) Connectivity
c) Medium
d) Mobility

132. A standalone program that has been modified to work on a LAN by including
concurrency controls such as file and record locking is an example of____
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software

133. What is the max cable length of STP?

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 36 of 42

a) 100 ft
b) 200 ft
c) 100 m
d) 200 m

134. The Fast Ethernet hardware operates at a rate of ________


a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) None of the given

135. What is the max data capacity of STP?


a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps

136. Which of the following statements is wrong regarding PVC?


a) PVC last if the customer pay the periodic fee for its use.
b) Forwarding tables are automatically restored after pow er of equipment failure.
c) Forwarding table entries for PVC’s are dynamically configured.
d) All of the above are wrong

137. In _______, network occupies larger areas like cities & countries.
a) LAN

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 37 of 42

b) WAN
c) MAN
d) None of the given

138. Djikstra’s algorithm is used to compute the__________


a) shortest path between two nodes
b) number of nodes used in the network
c) distance between different nodes
d) None of the above

139. NAPT stands for ________________


a) Network address and protocol translation
b) Network address and port translation
c) Network address and packet translation
d) None of the given

140. Star topology is the kind of_______-


a) Tree topology
b) Point-to-point topology
c) Broadcast topolgy
d) Ring topology

141. Header contains all information needed to deliver datagram to the destination
computer. But which one of the following is not included:
a) Destination address

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 38 of 42

b) Source address
c) Rectifier
d) Other delivery information

142. Every hardware technology specification includes the definition of the maximum size
of the frame data area, which is called the ____________ Transmission Unit.
a) Least
b) Maximum
c) Fragment
d) Frame

143. IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
a) 96
b) 100
c) 120
d) none of the given

144. For __________, information about forwarding is stored in a routing table, which is
initialized at system initialization and must be updated as network topology changes.
a) Efficiency
b) Security
c) Accuracy
d) Anomalies

145. ________is a technique used to Limit datagram size to small MTU of any network

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 39 of 42

a) Segmentation
b) Fragmentation
c) Encapsulation
d) none of the given

146. Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service)
offers_______ .
a) Connectionless service paradigm
b) Connection oriented service paradigm
c) Both Connectionless and Connection-oriented service paradigm
d) None of the given

147. Class A mask is 255.0.0.0 which is used for ______


a) Unicasting
b) Multicasting
c) Subnetting
d) All of the given

148. Which protocol is used to test different tools


a) ICMP
b) IGMP
c) TCP/IP
d) none of the given

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 40 of 42

149. ATM assigns each VC a _____________ identifier that is divided two parts to
produce a hierarchy.
a) 21-bit
b) 22-bit
c) 23-bit
d) 24-bit

150. _____ message is sent in response to incoming datagrams with problems.


a) TCP/IP
b) IGMP
c) ICMP
d) none of the given

151. A datagram cannot be larger than ________ of a network over which it is sent.
a) MTU
b) Size
c) IP header
d) None of the given

152. Most WAN systems include a mechanism that can be used to eliminate the common
case of duplication routing is called___________
a) Hierarchal address
b) Default route
c) Shortest path
d) None of the give

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 41 of 42

153. A popular LAN Technology that uses a shared Bus Topology is called_____
a) WAN
b) CSMA
c) Ethernet
d) Multicast

154. An electronic device that connects LAN segments


a) Ethernet
b) 10Baset
c) Bridge
d) 10Base5

155. The next hop to which a packet is sent depends only on


a) Packet’s destination
b) Packet’s original source
c) Path the packet has taken.
d) None of the give

156. A network technology that uses Collision Avoidance


a) Bridge
b) Broadcast
c) WAN
d) Wireless LAN

Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 42 of 42

157. When an application--------------- data, it makes a copy of the data available to all
other computers on the network.
a) Broadcasting
b) Multicasting
c) Unicasting
d) None of the given

Best of Luck

For Free help, more Mid/Final term Files and for Exam Preparation You Can
Join:

https://chat.whatsapp.com/F094bNv5NKYD23JUH7AAY8

Whatsapp 0328-4090195

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy