CSE307 | Internet Working Essentials | MCQS

CoderIndeed
0
  1. ________ is the rate of successful message delivery over a communication channel.

    1. Processing Delay
    2. Queuing Delay
    3. Throughput
    4. Packet Loss
    Show Answer
    Answer :     Option ( c )
  2. Denote the length of the packet by L bits, and denote the transmission rate of the link from router to router by R bits/sec. ____________________ is L/R.

    1. Processing Delay
    2. Queuing Delay
    3. Transmission Delay
    4. Propagation Delay
    Show Answer
    Answer :     Option ( c )
  3. Full name of MAN is ____

    1. Metro Area Network
    2. Master Area Network
    3. Metropolitan Area Network
    4. Mega Area Network
    Show Answer
    Answer :     Option ( c )
  4. In message switching, the whole _______ is treated as a data unit and is transferred in its entirety.

    1. Packet
    2. Byte
    3. Message
    4. Block
    Show Answer
    Answer :     Option ( c )
  5. Lowest layer of OSI model is

    1. Transport Layer
    2. Network Layer
    3. Session Layer
    4. Physical Layer
    Show Answer
    Answer :     Option ( d )
  6. OSI Reference Model has _____ layers

    1. 5
    2. 7
    3. 6
    4. 8
    Show Answer
    Answer :     Option ( b )
  7. Techniques used in data communnications to transfer data

    1. Connection-oriented method
    2. Connectionless method
    3. TCP
    4. Connection-oriented method and connectionless method
    Show Answer
    Answer :     Option ( d )
  8. Techniques used in data communications to transfer data

    1. Connection-oriented method
    2. Connectionless method
    3. TCP
    4. Connection-oriented method and Connectionless method
    Show Answer
    Answer :     Option ( d )
  9. The speed with which data is moved from one place to another on a network

    1. Packet
    2. Speed
    3. Bandwidth
    4. LAN
    Show Answer
    Answer :     Option ( c )
  10. The time required to examine the packet;s header and determine where to direct the packet is part of _____

    1. Processing Delay
    2. Queuind Delay
    3. Transmission Delay
    4. Packet Loss
    Show Answer
    Answer :     Option ( a )
  11. Which Protocol is known as pull protocol?

    1. HTTP
    2. SMTP
    3. FTP
    4. TCP
    Show Answer
    Answer :     Option ( a )
  12. Within same host, two proxesses communicate using____

    1. Inter Process Communication
    2. Message Passing
    3. Using Protocols
    4. Can't Communicate
    Show Answer
    Answer :     Option ( a )
  13. Which protocol is used to transfer mail from senders user agent to senders mail server?

    1. HTTP
    2. POP3
    3. SMTP
    4. FTP
    Show Answer
    Answer :     Option ( c )
  14. What is the full name of UDP?

    1. Used Data Protocol
    2. Used Datagram Protocol
    3. User Datagram Protocol
    4. User Data Protocol
    Show Answer
    Answer :     Option ( c )
  15. Which protocol provides reliable transport?

    1. TCP
    2. UDP
    3. HTTP
    4. SMTP
    Show Answer
    Answer :     Option ( a )
  16. Program under exection is called ____

    1. Operating System
    2. Process
    3. Message
    4. None
    Show Answer
    Answer :     Option ( b )
  17. TCP is ______ protocol

    1. connection oriented
    2. connectionless services
    3. mail
    4. routing
    Show Answer
    Answer :     Option ( a )
  18. What is HTTP response time of non-persisent HTTP?

    1. 2RTT
    2. RTT
    3. 2RTT + file transmission time
    4. RTT + file transmission time
    Show Answer
    Answer :     Option ( c )
  19. In ___ HTTP multiple objects can be sent over single TCP connection

    1. non-persistenet HTTP
    2. persistent HTTP
    3. Single HTTP
    4. Multiple HTTP
    Show Answer
    Answer :     Option ( b )
  20. What should be included in cookes component?

    1. cookie header line of HTTP response message
    2. cookie file kept on user's host, managed by user's browser
    3. back-end database at Web Site
    4. all
    Show Answer
    Answer :     Option ( d )
  21. From the following find the ones which is not a network app?

    1. E-mail
    2. Social Networking
    3. Protocols
    4. Text Messaging
    Show Answer
    Answer :     Option ( c )
  22. Which protocol is known as push protocol?

    1. HTTP
    2. SMTP
    3. FTP
    4. TCP
    Show Answer
    Answer :     Option ( b )
  23. FTP uses how many TCP connections to transfer a file?

    1. 1
    2. 2
    3. 3
    4. 4
    Show Answer
    Answer :     Option ( b )
  24. To use the services of UDP, wee need ____ socket address

    1. four
    2. two
    3. three
    4. one
    Show Answer
    Answer :     Option ( b )
  25. Transport layer protocols deals with

    1. application to application communication
    2. process to process communication
    3. node to node communication
    4. routing
    Show Answer
    Answer :     Option ( b )
  26. In stop and wait protocol _____

    1. Sequence number are required
    2. Sequence number are not required
    3. Waiting Sequence
    4. Ack required
    Show Answer
    Answer :     Option ( b )
  27. Multiplexing done at ___ side

    1. Sender
    2. Reciever
    3. Channel
    4. Routing
    Show Answer
    Answer :     Option ( a )
  28. For stop-and-wait- ARQ, for 10 data packets sent ___ acknowledgements are needed

    1. exactly 10
    2. less than 10
    3. more than 10
    4. only one
    Show Answer
    Answer :     Option ( a )
  29. Transport layer aggregates data from different applications into a single stream before passing it to _____

    1. data link layer
    2. appplication layer
    3. physical layer
    4. network layer
    Show Answer
    Answer :     Option ( d )
  30. Each segment as an independent packet and delivers it to the transport layer at the destination machine is called _____

    1. Connection Oriented
    2. Connectionless
    3. Segmentation
    4. Reassembly
    Show Answer
    Answer :     Option ( b )
  31. ____ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for ackowledgement.

    1. Flow
    2. Error
    3. Transmission
    4. Data
    Show Answer
    Answer :     Option ( a )
  32. The sending side if rdt simply accepts data from the upper layer via the ____ event

    1. rdt_rcv()
    2. rdt_rcv(data)
    3. udt_send(data)
    4. rdt_send(data)
    Show Answer
    Answer :     Option ( d )
  33. In case odf rdt2.2 reciever can send ___ reply to sender

    1. Only ACK
    2. Only NAK
    3. Both ACK and NAK
    4. Nothing
    Show Answer
    Answer :     Option ( a )
  34. Demultiplexing done at ___ side

    1. Sender
    2. Reciever
    3. Both Side
    4. Channel
    Show Answer
    Answer :     Option ( b )
  35. The checksum is used for ____

    1. data recovery
    2. data transfer
    3. error detection
    4. error recovery
    Show Answer
    Answer :     Option ( c )
  36. A ____ protocol provides logical communication between processes running on different hosts

    1. transport-layer
    2. application-layer
    3. network-layer
    4. session-layer
    Show Answer
    Answer :     Option ( a )
  37. ___ is not a function of network layer

    1. routing
    2. inter-networking
    3. congestion control
    4. error control
    Show Answer
    Answer :     Option ( d )
  38. A 4 byte IP address = ____ + ____

    1. network address + mac address
    2. host address + mac address
    3. network address + host address
    4. mac address + ip address
    Show Answer
    Answer :     Option ( c )
  39. In virtual circuit network each packet holds _____

    1. full source and destination address
    2. a short VC number
    3. only source address
    4. only destination address
    Show Answer
    Answer :     Option ( b )
  40. The network layer protocol for internet is ____

    1. ethernet
    2. internet protocol
    3. hypertext transfer protocol
    4. file transfer protocol
    Show Answer
    Answer :     Option ( b )
  41. ICMP is primarily used for

    1. error and diagnostic functions
    2. addressing
    3. forwarding
    4. routing
    Show Answer
    Answer :     Option ( a )
  42. How many assignable address does this combination of IP address and subnet mask have 172.16.1.0 and 255.255.255.252?

    1. 0
    2. 1
    3. 30
    4. 2
    Show Answer
    Answer :     Option ( d )
  43. Find the broadcast address for a class B network ID with the help of the default subnetmask.

    1. 172.16.10.255
    2. 255.255.255.255
    3. 172.16.255.255
    4. 172.255.255.255
    Show Answer
    Answer :     Option ( c )
  44. I need to create 10 subnets with a class C network ID, so. _____ subnet mask is used?

    1. 255.255.255.252
    2. 255.255.255.255
    3. 255.255.255.240
    4. 255.255.255.248
    Show Answer
    Answer :     Option ( c )
  45. You have a network that needs 20 subnets while maximizing the number of host address available on each subnet. How many bits you must borrow from the host field to provide the correct subnet mask?

    1. 2
    2. 3
    3. 4
    4. 5
    Show Answer
    Answer :     Option ( d )
  46. Size of IPv4 = ___ and IPv6 = _____ ?

    1. 32 bit, 128 bit
    2. 32 bytes, 128 bytes
    3. 32 bytes, 128 bits
    4. 32 bits, 128 bytes
    Show Answer
    Answer :     Option ( a )
Tags

Post a Comment

0Comments

Post a Comment (0)

#buttons=(Accept !) #days=(20)

Our website uses cookies to enhance your experience. Check Now
Accept !