Description : In ______, the router forwards thereceived packet through only one of its interfaces. A) unicasting B) multicasting C) broadcasting D) none of the above
Last Answer : unicasting
Description : Emulation of ________ through ___________ is notefficientand may create long delays. A) unicasting; multiple unicasting B) multicasting; multiple unicasting C) broadcasting; multicasting D) none of the above
Last Answer : multicasting; multiple unicasting
Description : There are two types of designs for communication subnets: they are ………… A. Point-to-Point channels and Broadcast channels B. packet-switched subnet and store-and-forward C. Multicasting and Broadcasting D. Point-to-Point channels and store-and-forward
Last Answer : A. Point-to-Point channels and Broadcast channels
Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching
Last Answer : (D) Circuit Switching
Description : In the group-shared tree approach,_________ involved in multicasting. A) only the core router is B) all routers are C) only some routers are D) none of the above
Last Answer : only the core router is
Description : In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ A ... lost B. Only those packets which are lost or corrupted C. Packet from starting D. All the packets
Last Answer : B. Only those packets which are lost or corrupted
Description : The taskof moving the packet from theinput queue to the output queuein a router is done by_________. A) input and output ports B) routing processor C) switching fabrics D) none of the above
Last Answer : switching fabrics
Description : An IP datagram of size 1000 bytes arrives at a router. The router has to forward this packet on a link whose MTU (maximum transmission unit) is 100 bytes. Assume that the size of the IP header is 20 bytes ... the IP datagram will be divided into for transmission is : a. 10 b. 50 c. 12 d. 13
Last Answer : d. 13
Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect
Last Answer : b. Communication Administratively Prohibited
Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub
Last Answer : c) router
Description : addresses are reserved for multicasting. a. Class B b. Class C c. Class D d. Class E
Last Answer : c. Class D
Description : Which of the following is/are correct with reference to Abstract class and interface ? (a) A class can inherit only one Abstract class but may inherit several interfaces. (b) An Abstract class can provide complete and default ... true (C) Both (a) and (b) are true (D) Neither (a) nor (b) is true
Last Answer : Answer: C
Description : A _______ message tells an upstream router to stop sending multicast messages for a specific group through aspecific router. A) weed B) graft C) prune D) none of the above
Last Answer : prune
Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above
Last Answer : 2
Description : The _______ address in theheader ofa packet in adatagram network normally remains thesame during the entire journeyof the packet. A) source B) destination C) local D) none of the above
Last Answer : destination
Description : We cansay thata packet switchhas _______ typesof components. A) two B) three C) four D) none of the above
Last Answer : four
Description : .In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______ a. Added b. Removed c. Rearranged d. Randomized
Last Answer : b. Removed
Description : Application layer is implemented in _______ a. End system b. NIC c. Ethernet d. Packet transport
Last Answer : a. End system
Description : The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure
Last Answer : C. Choke
Description : A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched
Last Answer : b) Circuit switched
Description : In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______ a) Added b) Removed c) Rearranged d) Randomized
Last Answer : b) Removed
Description : A _______ is a device that operates only in the physical layer A) passive hub B) repeater C) bridge D) router
Last Answer : repeater
Description : A _______ is a connecting devicethat operates in the physical and data link layers of theInternet model. A) repeater B) bridge C) router D) none of the above
Last Answer : bridge
Description : The _______ is used by a router in response to a received leave report. A) general query message B) special query message C) membershipreport D) noneof the above
Last Answer : special query message
Description : An IGMP query is sent from a _______to a _______. A) host; host B) host; router C) router; hostor router D) noneof the above
Last Answer : router; hostor router
Description : A _______ message tells an upstream router to start sending multicast messages for a specific groupthrough aspecific router. A) weed B) graft C) prune D) none of the above
Last Answer : graft
Description : In the _______ treeapproach, each router needs tohave oneshortest path tree for each group. A) group-shared B) source-based C) a or b D) none of the above
Last Answer : source-based
Description : The number of network segments on which the datagram is allowed to travel before a router should discard it is called _______. A. Time to Live (TTL) B. Time to Die(TTD) C. self recognition D. both a and b
Last Answer : A. Time to Live (TTL)
Description : Which agency developed standards forphysical connection interfaces and electronic signalingspecifications? A) EIA B) ITU-T C) ANSI D) ISO
Last Answer : EIA
Description : The portion of physical layer that interfaces with the media access control sublayer is called ___________ a. physical signalling sublayer b. physical data sublayer c. physical address sublayer d. physical transport sublayer
Last Answer : a. physical signalling sublayer
Description : The …………………... option tells netstat to display the status of all configured network interfaces. A. -n B. -i C. either a or b D. neither a nor b
Last Answer : B. -i
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : Why are protocols needed? What are the two interfaces provided by it?
Last Answer : A protocol is a set of rules that govern data communication. Provides communication service used to exchange messages. Service interface- defines operations that local objects can perform ... form and meaning of messages exchanged between protocol peers to implement the communication service.
Description : In OSPF, a _______ link is a network with several routersattachedto it. A) point-to-point B) transient C) stub D) none of the above
Last Answer : transient
Description : Which of the following primarily uses guided media? A) cellular telephone system B) local telephone system C) satellite communications D) radio broadcasting
Last Answer : local telephone system
Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above
Last Answer : token passing: token
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above
Last Answer : Down through thelayers of the IP architecture and then up thelayers again
Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network
Last Answer : d. block some hosts from accessing the network
Description : State weather the following statement is true or false for Hierarchical Routing 1). In hierarchical routing, the routers are divided into regions. 2) Each router is having the idea about internal structure of other regions 3). ... C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true
Last Answer : D. 1. true, 2. false, 3. true
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall
Last Answer : 2) Packet Filtering Firewall
Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall
Last Answer : 2 Packet Filtering Firewall
Description : When using access lists, what does a Cisco router check first? * To see if the packet is routable or bridgeable * The destination address * The source address * The packet contents
Last Answer : Correct answer: A The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.
Description : What are the two types of access lists that can be configured on a Cisco router? * Standard * Extended * Filtering * Packet
Last Answer : Correct answer: A & B The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin
Last Answer : Watchdog packet
Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above
Last Answer : circuit-switched