Networking
Networking
Networking
PART I
1. In one of the pairs of protocols given below, both the protocols can use multiple TCP
connections between the same client and the server. Which one is that?
a) HTTP, FTP
b) HTTP. TELNET
c) FTP, SMTP
d) HTTP, SMTP
2. Ethernet frame consists of
a) MAC address
b) IP address
c) both MAC address and IP address
d) none of the mentioned
3. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
4. Which layer of the OSI reference model does PPTP work at?
a) Presentation Layer
b) Transmission Layer
c) Application Layer
d) Network Layer
5. Firewalls are often configured to block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
6. Pretty good privacy (PGP) is used in
a) browser security
b) email security
c) FTP security
d) none of the mentioned
7. UTP is commonly used in __________
a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
8. An RPC application requires
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned
9. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
10. As the resouces are reserved between two communicating end systems in circuit
switching, this is achieved ___________
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
13. The technique of temporarily delaying outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned
PART II
21. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
a) 14
b) 15
c) 16
d) 30
22. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is
your class of address, subnet address, and broadcast address?
a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
23.A network administrator is connecting hosts A and B directly through their Ethernet
interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful.
What can be done to provide connectivity between the hosts?
24. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which
classful subnet mask would you use
a) 255.255.255.192
b) 255.255.255.224
c) 255.255.255.240
d) 255.255.255.248
25. The network address of 172.16.0.0/19 provides how many subnets and hosts?
a) 7 subnets, 30 hosts each
b) 8 subnets, 8,190 hosts each
c) 8 subnets, 2,046 hosts each
d) 7 subnets, 2,046 hosts each
26. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the
following can be valid host IDs on the LAN interface attached to the router?
1. 172.16.1.100
2. 172.16.1.198
3. 172.16.2.255
4. 172.16.3.0
a) 1 only
b) 2 and 3 only
c) 3 and 4 only
d) None of the mentioned
27. For the IEEE 802.11 MAC protocol for wireless communication, which of the
following statement is/are TRUE?
i) At least three non-overlapping channels are available for transmissions.
ii) The RTS-CTS mechanism is used for collision detection.
iii) Unicast frames are Acknowledged.
a) All I,II, and III
b) I and III only
c) II and III only
d) II only
28. Suppose two hosts use a TCP connection to transfer a large file. Which of the
following
statements is/are FALSE with respect to the TCP connection?
I. If the sequence number of a segment is m, then the sequence number of the subsequent
segment is always m+1.
II. If the estimated round trip time at any given point of time is t sec, the value of the
retransmission timeout is always set to greater than or equal to t sec.
III. The size of the advertised window never changes during the course of the TCP
connection.
IV. The number of unacknowledged bytes at the sender is always less than or
equal to the advertised window
a) III only
b) I and III only
c) I and IV only
d) II and IV only
29. Which of the following is the broadcast address for a Class B network ID using the
default subnet mask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
30. An organization has a class B network and wishes to form subnets for 64
departments. The subnet mask would be:
(a) 255.255.0.0
(b) 255.255.64.0
(c) 255.255.128.0
(d) 255.255.252.0
31. Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53
and netmask 255.255.128.0. C2 has IP address 203.197.75.201 and netmask
255.255.192.0. which one of the following statements is true?
a) C1 and C2 both assume they are on the same network
b) C2 assumes C1 is on same network, but C1 assumes C2 is on a different network
c) C1 assumes C2 is on same network, but C2 assumes C1 is on a different network
d) C1 and C2 both assume they are on different networks.
32. Station A needs to send a message consisting of 9 packets to Station B using a sliding
window (window size 3) and go-back-n error control strategy. All packets are ready and
immediately available for transmission. If every 5th packet that A transmits gets lost (but
no acks from B ever get lost), then what is the number of packets that A will transmit for
sending the message to B?
a) 12
b) 14
c) 16
d) 18
a) 225.100.123.71
b) 225.100.123.72
c) 225.100.123.75
d) It does not has any network ID
34. Packets of the same session may be routed through different paths in:
a) TCP, but not UDP
b) TCP and UDP
c) UDP, but not TCP
d) Neither TCP nor UDP
35. Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91
respectively and they both use the same netmask N. Which of the values of N given
below should not be used if A and B should belong to the same network?
a) 255.255.255.0
b) 255.255.255.128
c) 255.255.255.192
d) 255.255.255.224
36. The correct format of packet in tunnel that uses IPv4 region is
1. IPv6 header
2. Payload
3. IPv4 header
a) 3-1-2
b) 3-2-1
c) 1-2-3
d) 1-3-2
PART III
For each IP address in Group-I identify the correct choice of the next hop from Group-II
using the entries from the routing table above.
List-I List-II
A. 128.96.171.92 1. Interface 0
B. 128.96.167.151 2. Interface 1
C. 128.96.163.121 3. R2
D. 128.96.165.121 4. R3
5. R4
ABCD
a) 1 3 5 4
b) 1 4 2 5
c) 2 3 4 5
d) 2 3 5 4
List-I List-II
A. SMTP 1. Application layer
B. BGP 2. Transport layer
C. TCP 3. Data link layer
B. PPP 4. Network layer
5. Physical layer
ABCD
a) 2 1 3 5
b) 1 4 2 3
c) 1 4 2 5
d) 2 4 1 3