Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CN Objective

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Computer Networks Important Bits.

1. A _____ is a TCP name for a transport service access point.


a) port
b) pipe
c) node
d) none of the mentioned
2. Transport layer aggregates data from different applications into a single stream before
passing it to
a) network layer
b) data link layer
c) application layer
d) physical layer
3. ICMP is primarily used for
a) error and diagnostic functions
b) addressing
c) forwarding
d) none of the mentioned
4. Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
5. Which one of the following is an architecture paradigms?
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
7. DNS database contains _______
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
8. what is the header size of UDP packet?
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
9.During error reporting, ICMP always reports error messages to
a) Destination
b) Source
c) Next router
d) Previous router
10. A proxy firewall filters at?
a) Physical layer
b) Data link layer
c) Network layer
d) Application layer
11. Which of the following is true with respect to TCP
a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) All of the mentioned
12. In TCP, sending and receiving data is done as
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
13. In segment header, sequence number and acknowledgement number field refers to
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
14. Which one of the following is a transport layer protocol used in networking?
a) TCP
b) UDP
c) Both TCP and UDP
d) None of the mentioned
15. The default connection type used by HTTP is _________
a) Persistent
b) Non-persistent
c) Can be either persistent or non-persistent depending on connection request

d) None of the mentioned


16. Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned
17. what is the header size of UDP packet?
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
18. Network layer firewall works as a
a) frame filter
b) packet filter
c) both frame filter and packet filter
d) none of the mentioned
19. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
20. In open-loop control, policies are applied to __________
a) Remove after congestion occurs
b) Remove after sometime
c) Prevent before congestion occurs
d) Prevent before sending packets

1. The technique in which a congested node stops receiving data from the immediate
upstream node or nodes is called as Backpressure .
2. Default administrative distance of Static Route________1____________.
3. The light weight protocol is known as lightweight directory access protocol .
4. The first line of HTTP request message is called status line.
5. The size of IP address in IPv6 is 128 bits.
6. IPsec is designed to provide the security at the network layer.
7.OSPF is the fastest routing algorithm for network transmission.
8. URL stands for Uniform Resource Locator .
9. Internet Control Message Protocol (ICMP) has designed to compensate error reporting
and query messages.
10. Ingress filtering is used to filter packets from strange networks.
11. A firewall is installed at the point where the secure internal network and untrusted
external network meet which is also known as choke point.
12. In OSPF database descriptor packet, if more database descriptor packet flows, ‘M’ field
is set to 1.
13. In Multicast Routing Protocol, flooding is used to broadcast packets but it creates loops .
14. EIGRP send the hello message after every 5 seconds.
15. Application layer offers end to end service.
16. When displaying a web page, the application layer uses the Http protocol.
17. The time taken by a packet to travel from client to server and then back to the client is
called round trip time(RTT).
18. Bluetooth transceiver devices operate in 2.4GHZ ISM band.
19. Mostly orthogonal frequency division multiplexing is used in wireless LAN.
20. FTP uses two parallel TCP connections to transfer a file

You might also like