Sei sulla pagina 1di 6

1.

The OSI layer manages task dialogs


a. Application
b. Physical
c. Network
d. Session
2. In the Internet Reference model, this layer sends packets over multiple networks
a. Application
b. Transport
c. Internet
d. Link
3. A protocol that operates in the transport layer
a. HTTP
b. RTP
c. IP
d. UDP
4. How does one elect a root node on a spanning tree?
a. Switch with the lowest address
b. Switch with the highest address
c. Router with the lowest address
d. Router with the highest address
5. What protocol is categorically described as the narrow naist of the Internet?
a. HTTP
b. RTP
c. IP
d. UDP
6. The ADSL telecom standard created by ITU is defined in the __ standard.
a. 802.3
b. H.264
c. G.992
d. RFC2616
7. The link layer uses __ as its unit of data.
a. Segment
b. Packet
c. Frame
d. Bit
8. A repeater or a hub operates at the __ layer.
a. Physical
b. Link
c. Network and link
d. Transport
9. A command-line tool to let hosts peek inside a network
a. Ping
b. Whois
c. Arp
d. Traceroute
10. Which of the following has an enormous bandwidth over long distances?

a. Twisted pair
b. Coaxial cable
c. Multimode optical fiber
d. Single mode optical fiber
11. The spanning tree algorithm was proposed by
a. Reeves
b. Jacobson
c. Perlman
d. Djikstra
12. Which of the following error detection schems are used in the Internet?
a. CRC
b. Checksum
c. Parity
d. Hamming code
13. Devices on wireless links relay messages in the form of __.
a. Unicast
b. Multicast
c. Anycast
d. Broadcast
14. Which among these schemes has provision for clock recovery?
a. NRZ
b. AMI
c. NRZ-I
d. Manchester
15. The minimum Hamming distance needed to address a single-bit error correction
a. 1
b. 2
c. 3
d. 4
16. A private IP addresses is translated to a public IP address by
a. VLSM
b. NAT
c. Routing
d. DHCP
17. Which of the following is a common example of a LAN?
a. Bluetooth
b. Ethernet
c. DSL
d. ISP
18. What multiplexing scheme allows users to take turns on a fixed schedule?
a. FDM
b. TDM
c. WDM
d. CDM
19. An approach to analyze the architecture of any network is through
a. Layering

b. Encapsulation
c. De-encapsulation
d. Addressing
20. A flow control mechanism that addresses errors occurring on computer networks
a. Error correction
b. Error detection
c. CRC
d. ARQ
21. Which of the following wireless standards does not operate at the 2.4 Ghz radio
frequency?
a. IEEE802.1a
b. IEEE802.1b
c. IEEE802.1g
d. IEEE802.1n
22. The simplest error detection works on
a. Ones complement
b. Modulo 2
c. Modulo 10
d. Modulo 11
23. Which of the following is the default route?
a. 0.0.0.0
b. 1.1.1.1
c. 10.10.10.10
d. 172.16.10.10
24. Which of the following technologies employ communication via taking turns?
a. Ethernet
b. DSL
c. Token Ring
d. WiFi
25. The RIR of the Asia Pacific region
a. ARIN
b. APNIC
c. LACNIC
d. RIPE

26. A feature used in link state routing to address scalability is the use of
a. Policy
b. Spanning tree
c. Area
d. Bellman-Ford
27. Rotuers use __ matching to send packets to the right next hop
a. Longest prefix
b. Shortest prefix
c. Longest ping
d. Shortest ping

28. The procedure of externally joining multiple more specific prefix into a one larger prefix
a. Subnetting
b. NAT
c. DHCP
d. Aggregation
29. An ICMP message contains all of the following except
a. Type
b. Code
c. Checksum
d. Port
30. This multiplexing scheme is used in TV stations
a. FDM
b. TDM
c. WDM
d. CDM
31. The first step in the Spanning tree algorithm is
a. To grow tree as shortest distance from the root
b. Turn off ports for forwarding that are not in the spanning tree
c. Elect a root node of the free
d. Ping all active nodes
32. According to Shannon capacity, how many levels can one distinguish depends on
a. Voltage
b. SNR
c. Bit rate
d. Eb/ No
33. This IP field is descremented by 1 every router hop
a. Fragment offset
b. IHL
c. Protocol
d. TTL
34. The protocol that computes interdomain routers in the Internet
a. RIP
b. NAT
c. DHCP
d. BGP
35. Twisting is employed on copper wire pairs
a. To increase the bandwidth
b. To detect errors on the line
c. To serve as frame buffers
d. To reduce radiated signals
36. The Viterbi algoritm is a common example of a __ code
a. Cyclic
b. Hamming
c. Redundant
d. Convolutional
37. A protocol that allows a device to automatically get an IP address

a. ARP
b. DHCP
c. NAT
d. OSPF
38. GSM is a wireless cellular technology utilizing
a. FDM
b. TDM
c. WDM
d. CDM
39. Which of the following is a broadcast IP address?
a. 0.0.0.0
b. 1.1.1.1
c. 127.0.0.1
d. 255.255.255.255
40. Which type of multiple access protocols is good for high load or guaranteed quality of
service situations?
a. Randomized
b. Contention free
c. Deterministic
d. Wireless
41. Categorically, different parties of ISPs are called
a. Routers
b. Networks
c. Autonomous systems
d. Tiers
42. Which of the following is NOT a private IP address?
a. 10.10.1.25
b. 172.16.32.14
c. 180.123.1.2
d. 192.168.10.31
43. In the Internet, hosts on same network have IP addresses in
a. The same IP prefix
b. The same host prefix
c. Different broadcast prefix
d. Different multicast prefix
44. This algorithm determines the signel-source shortest paths, given network with nonnegative link costs
a. Distance vector routing
b. Bellman-Ford
c. Djilstra
d. Viterbi
45. A protocol that maps a local IP address to a link layer address
a. DHCP
b. PPP
c. ARP
d. Bootstrap

46. In 18.31.0.0/16, what us the prefix?


a. 18
b. 31
c. 0
d. 16
47. Which of the following protocols uses link-routing techniques?
a. RIP
b. ISIS
c. BGP
d. EIGRP
48. IPv6 uses ___ bit addressing
a. 31
b. 64
c. 128
d. 256
49. A device that supports both IPv4 and IPv6 on the same operation at the same time uses
a. Dual stacking
b. Tunneling
c. Translation
d. Aggregation
50. This mnemonic may be used to remember DHCP operation
a. ADORA
b. DORA
c. RADO
d. ODAR

Potrebbero piacerti anche