Description : Identify the correct order in which a server process must invoke the function calls accept, bind, listen, and recv according to UNIX socket API a. listen, accept, bind recv b. bind, listen, accept, recv c. bind, accept, listen, recv d. accept, listen, bind, recv
Last Answer : b. bind, listen, accept, recv
Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets
Last Answer : C. Prevent before congestion occurs
Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
Last Answer : a) Cybergaming crime
Description : What does SSL stands for ? System socket layer Secure system login Secure socket layer Secure system login
Last Answer : Secure socket layer
Description : An endpoint of an inter-process communication flow across a computer network is called a. socket b. pipe c. port d. machine
Last Answer : a. socket
Description : Socket-style API for windows is called ____________ a. wsock b. winsock c. wins d. sockwi
Last Answer : b. winsock
Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol used to monitor computers
Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above
Last Answer : a protocol that handles error andcontrol messages
Description : Which command does not show that two devices are failing to route packets between them successfully? A. show interface B. trace C. telnet D. ping
Last Answer : show interface
Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. A) exactly 10 B) less than10 C) more than 10 D) none of the above
Last Answer : exactly 10
Description : A ________ switch is a multistageswitch with microswitches at each stagethat route the packets based on theoutput port representedas a binary string. A) crossbar B) TSI C) banyan D) none of the above
Last Answer : banyan
Description : In ATM,______ is for packets requiring no sequencing and noerror control mechanism. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5
Last Answer : AAL5
Description : In ATM,_______is for short packets. A) AAL1 B) AAL2 C) AAL3/4 D) AAL5
Last Answer : AAL2
Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove
Last Answer : ATM
Description : The packets switching concept was first proposed A. in the late1980s for the Defense Ministry of US. B. in the early 1960s for military communication systems, mainly to handle speech C. in the late 1950s for Defense Ministry of US D. All of theabove E. None of the above
Last Answer : in the early 1960s for military communication systems, mainly to handle speech
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which of the following condition is usedto transmit two packets overa medium at the same time? A. Contention B. Collision C. Synchronous D. Asynchronous E. None of the above
Last Answer : Collision
Description : A station in a network forwards incoming packets byplacing them on its shortest output queue. Whatrouting algorithm is being used? A. hot potatorouting B. flooding C. static routing D. delta routing E. None of the above
Last Answer : hot potatorouting
Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B
Last Answer : a. A & B
Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams
Last Answer : d. Datagrams
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly
Last Answer : a. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : Consider a source computer(S) transmitting a file of size 106 bits to a destination computer (D)over a network of two routers (R1 and R2) and three links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to ... file from S to D? a. 1005 ms b. 1010 ms c. 3000 ms d. 3003 ms Answer: Option(a)
Last Answer : a. 1005 ms
Description : Packets will be transferred in how many types? a. 5 types b. 4 types c. 2 types d. 3 types
Last Answer : d. 3 types
Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges
Last Answer : a. Host
Description : Which of the following is not correct in relation to multi-destination routing? a. is same as broadcast routing b. contains the list of all destinations c. data is not sent by packets d. there are multiple receivers
Last Answer : c. data is not sent by packets
Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes
Last Answer : c. packets
Description : Consider a link with packet loss probability of 0.2. What is the expected number of transmissions it would take to transfer 200 packets given that the stop and wait protocol is used? a. 125 b. 250 c. 225
Last Answer : b. 250
Description : Which of the following statement is False about the efficiency of the given channel? a. If we want to send big packets on the channel, then Stop and Wait is good choice. b. If length ... is directly proportional to efficiency of channel. d. Efficient might be less if capacity of channel is high
Last Answer : Distance between sender and receiver is directly proportional to efficiency of channel.
Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320
Last Answer : b. 40
Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails
Description : Each IP address can identify the ………... or ………... of IP packets. A. source, destination B. length, size C. source, length D. Size , destination
Last Answer : A. source, destination
Description : Flooding is also a……... algorithm, usually generates ………... of duplicate packets. A. Static, vast number B. dynamic , vast number C. Static, less number D. dynamic , less number
Last Answer : A. Static, vast number
Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c
Last Answer : A. Flooding
Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b
Last Answer : C. Congestion
Description : With Slotted Aloha, a …………. sends out small clock tick packets to the outlying stations. A. distributed clock B. synchronized clock C. centralized clock D. Digital clock
Last Answer : C. centralized clock
Description : In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ A ... lost B. Only those packets which are lost or corrupted C. Packet from starting D. All the packets
Last Answer : B. Only those packets which are lost or corrupted
Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly
Last Answer : A. all UDP packets are treated independently by transport layer
Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes
Last Answer : C. packets
Description : For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed A. exactly 10 B. less than 10 C. more than 10 D. none of the above
Last Answer : B. High-level data link control
Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly
Last Answer : all UDP packets are treated independently by transport layer
Description : The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes
Last Answer : c) packets
Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer
Last Answer : a) network layer
Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub
Last Answer : c) router
Description : ------------------- is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. a. Interface b. Reference model c. Protocol d. None of these
Last Answer : c. Protocol