Description : In _______delivery, both thedeliverer of the IP packet and the destination are on the same network. A) aconnectionless B) a direct C) an indirect D) none of the above
Last Answer : a direct
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above
Last Answer : destination
Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec
Last Answer : a. 2 sec
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : In virtual circuit network each packet contains ___________ a. full source and destination address b. a short VC number c. only source address d. only destination address
Last Answer : b. a short VC number
Description : In virtual circuit network each packet contains ___________ A. full source and destination address B. a short VC number C. only source address D. only destination address
Last Answer : B. a short VC number
Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above
Last Answer : best-effort delivery
Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five
Last Answer : two
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance
Last Answer : a. You can control where traffic goes in the three networks
Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these
Last Answer : b. Packet switching
Description : In computer networks _________ is a characteristic that a flow needs where Lack of it means losing a packet or acknowledgment, which entails retransmission. A. Reliability B. Delay C. Jitter D. Bandwidth
Last Answer : A. Reliability
Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub
Last Answer : c) router
Description : Determine from the following the basic mode of transmission system in the public data network in which data are transferred from the source to the network and from the network to the destination in the frame format. A. Voice mode B. Asynchronous mode C. Synchronous mode D. Packet mode
Last Answer : D. Packet mode
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall
Last Answer : 2) Packet Filtering Firewall
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall
Last Answer : 2 Packet Filtering Firewall
Description : When using access lists, what does a Cisco router check first? * To see if the packet is routable or bridgeable * The destination address * The source address * The packet contents
Last Answer : Correct answer: A The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway
Last Answer : Answer: 4
Description : Which of the following comments about object oriented design of software, is not true ? Objects inherit the properties of class Classes are defined based on the attributes of objects an object can belong to two classes classes are always different
Last Answer : an object can belong to two classes
Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Description : Which tool allows a user to simulate real networks? a.artificial intelligence b.Packet Tracer c.internet d.PAN
Last Answer : b.Packet Tracer
Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin
Last Answer : Watchdog packet
Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above
Last Answer : token passing: token
Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above
Last Answer : circuit-switched
Description : We cansay thata packet switchhas _______ typesof components. A) two B) three C) four D) none of the above
Last Answer : four
Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above
Last Answer : virtual-circui
Description : In _________, thereis no resource allocation for a packet. A) datagram switching B) circuit switching C) frame switching D) none of the above
Last Answer : datagram switching
Description : The ATM data packet is acell composed of ______bytes. A) 40 B) 50 C) 52 D) 53
Last Answer : 53
Description : A _______is defined as a small, fixed-size block of information. A) frame B) packet C) cell D) none of the above
Last Answer : cell
Description : Which of the following is anecessary part of the IPv6 datagram? A) Base header B) Extension header C) Data packet from the upper layer D) (a) and (c)
Last Answer : Base header
Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above
Last Answer : 2
Description : An IGMP packet is carried in an __________ packet. A) UDP B) IP C) Ethernet frame D) noneof the above
Last Answer : IP
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : hedestination IP address in the datagram header
Description : RPB guarantees that eachdestinationreceives _________ of the packet. A) one copy B) no copies C) multiplecopies D) none of the above
Last Answer : one copy
Description : RPF guarantees that eachnetwork receives only ____ of the multicast packet. A) one copy B) two copies C) a or b D) none of the above
Last Answer : none of the above
Description : In _______, the router may forwardthereceived packet through several of its interfaces. A) unicasting B) multicasting C) broadcasting D) none of the above
Last Answer : multicasting
Description : In ______, the router forwards thereceived packet through only one of its interfaces. A) unicasting B) multicasting C) broadcasting D) none of the above
Last Answer : unicasting
Description : The taskof moving the packet from theinput queue to the output queuein a router is done by_________. A) input and output ports B) routing processor C) switching fabrics D) none of the above
Last Answer : switching fabrics
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above
Last Answer : Down through thelayers of the IP architecture and then up thelayers again
Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network
Last Answer : d. block some hosts from accessing the network
Description : In the OSI model, as a data packet moves from the lower to the upper layers, headers are a. Added b. Removed c. Rearranged d. Randomized
Last Answer : b. Removed
Description : Which of the following is not a congestion policy at network layer? a. Flow Control Policy b. Packet Discard Policy c. Packet Lifetime Management Policy d. Routing Algorithm
Last Answer : a. Flow Control Policy
Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13
Last Answer : d. 13