Sei sulla pagina 1di 18

6/21/2020 Computer Networks Test 2

Computer Networks Test 2


* Required

COMPUTER NETWORK

Total Number No of Questions = 50


Each Questions = 2 Marks
Total Time Duration = 1 Hrs

1) The address of a class B host is to be split into subnets with a 6 - bit subnet 2 points

number. What is the maximum number of subnets and maximum number of hosts in
each subnet? *

(1) 62 subnets and 1022 hosts

(2) 64 subnets and 1024 hosts

(3) 62 subnets and 254 hosts

(4) 64 subnets and 256 hosts

2) Which of the following devices takes data sent from one network device and 2 points
forwards it to the destination node based on MAC address? *

(1) Hub

(2) Modem

(3) Switch
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 1/18
6/21/2020 Computer Networks Test 2
(3) S tc

(4) Gateway

3) .................. do not take their decisions on measurements or estimates of the 2 points


current traffic and topology. *

(1) Static algorithms

(2) Adaptive algorithms

(3) Non - adaptive algorithms

(4) Recursive algorithms

4) Station A uses 32 byte packets to transmit messages to station B using sliding 2 points
window protocol. The round trip delay between A and B is 40 milli seconds and the
bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window
size of A is *

(1) 20

(2) 10

(3) 30

(4) 40

5) In a packet switching network, if the message size is 48 bytes and each packet 2 points
contains a header of 3 bytes. If 24 packets are required to transmit the message, the
packet size is ................ *

(1) 2 bytes

(2) 1 byte
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 2/18
6/21/2020 Computer Networks Test 2

(3) 4 bytes

(4) 5 bytes

6) A node X on a 10 Mbps network is regulated by a token bucket. The token bucket 2 points
is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The
maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs. *

(1) 1

(2) 2

(3) 3

(4) 4

7) The maximum size of the data that the application layer can pass on to the TCP 2 points
layer below is ......... *

(1) 216 bytes

(2) 216 bytes + TCP header length

(3) 216 bytes - TCP header length

(4) 215 bytes

8) A packet whose destination is outside the local TCP/IP network segment is sent to 2 points
.............. *

(1) File server

(2) DNS server

(3) DHCP server

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 3/18
6/21/2020 Computer Networks Test 2

(4) Default gateway

9) Distance vector routing algorithm is a dynamic routing algorithm. The routing 2 points

tables in distance vector routing algorithm are updated ........... *

(1) automatically

(2) by server

(3) by exchanging information with neighbour nodes.

(4) with back up database

10) In link state routing algorithm after construction of link state packets, new routes 2 points

are computed using: *

(1) DES algorithm

(2) Dijkstra's algorithm

(3) RSA algorithm

(4) Packets

11) If link transmits 4000 frames per second and each slot has 8 bits, the transmission 2 points

rate of circuit of this TDM is ............... *

(A) 64 Kbps

(B) 32 Mbps

(C) 32 Kbps

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 4/18
6/21/2020 Computer Networks Test 2

(D) 64 Mbps

12) Given the following statements: (a) Frequency Division Multiplexing is a 2 points

technique that can be applied when the bandwidth of a link is greater than combined
bandwidth of signals to be transmitted.(b) Wavelength Division Multiplexing
(WDM) is an analog multiplexing Technique to combine optical signals. (c) WDM is
a Digital Multiplexing Technique. (d) TDM is a Digital Multiplexing Technique.
Which of the following is correct? *

(A) (a), (b), (c) and (d) are true.

(B) (a), (b), (c) and (d) are false.

(C) (a), (b) and (d) are false; (c) is true.

(D) (a), (b) and (d) are true; (c) is false.

13) Assume that we need to download text documents at the rate of 100 pages per 2 points

minute. A page is an average of 24 lines with 80 characters in each line and each
character requires 8 bits. Then the required bit rate of the channel is ................ *

(A) 1.636 Kbps

(B) 1.636 Mbps

(C) 2.272 Mbps

(D) 3.272 Kbps

14) A multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What 2 points
is the bit rate? *

(A) 100 Kbps


https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 5/18
6/21/2020 Computer Networks Test 2
(A) 100 Kbps

(B) 200 Kbps

(C) 400 kbps

(D) 1000 Kbps

15) In a fully-connected mesh network with 10 computers, total .............. number of 2 points
cables are required and ................ number of ports are required for each device. *

(A) 40, 9

(B) 45, 10

(C) 45, 9

(D) 50, 10

16) In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject 2 points

packets into any network and travel them independently to the destination. *

(A) Physical

(B) Transport

(C) Application

(D) Host-to-network

17) If there are N people in the world and are using secret key encryption/decryption 2 points
for privacy purpose, then number of secret keys required will be: *

(A) N

(B) (N-1)

(C) N(N-1)/2

(D) N(N+1)/2
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 6/18
6/21/2020 Computer Networks Test 2
( ) ( )

18) Optical fiber uses reflection to guide light through a channel, in which angle of 2 points
incidence is ................. the critical angle.

(A) equal to

(B) less than

(C) greater than

(D) less than or equal to

19) Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from 2 points
source to destination and each packet p contains 8000 bits. Total end to end delay in
sending packet P is ................ *

(A) 2 sec

(B) 3 sec

(C) 4 sec

(D) 1 sec

20) Consider the following statements : a. High speed Ethernet works on optic fiber. 2 points
b. A point to point protocol over Ethernet is a network protocol for encapsulating
PPP frames inside Ethernet frames. c. High speed Ethernet does not work on optic
fiber. d. A point to point protocol over Ethernet is a network protocol for
encapsulating Ethernet frames inside PPP frames. Which of the following is correct ?
*

(A) a and b are true; c and d are false.


https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 7/18
6/21/2020 Computer Networks Test 2
( )

(B) a and b are false; c and d are true.

(C) a, b, c and d are true.

(D) a, b, c and d are false.

21) In CRC checksum method, assume that given frame for transmission is 1101011011 2 points
and the generator polynomial is G(x) = x4 + x + 1.After implementing CRC encoder,
the encoded word sent from sender side is ............. *

(A) 11010110111110

(B) 11101101011011

(C) 110101111100111

(D) 110101111001111

22) An analog signal has a bit rate of 8000 bps and a baud rate of 1000.Then analog 2 points
signal has .............. signal elements and carry ............ data elements in each signal. *

(A) 256, 8 bits

(B) 128, 4 bits

(C) 256, 4 bits

(D) 128, 8 bits

23) The plain text message BAHI encrypted with RSA algorithm using e=3, d=7 and 2 points
n=33 and the characters of the message are encoded using the values 00 to 25 for
letters A to Z. Suppose character by character encryption was implemented. Then,
the Cipher Text message is ............ *

(A) ABHI

(B) HAQC
https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 8/18
6/21/2020 Computer Networks Test 2

(C) IHBA

(D) BHQC

24) If a datagram router goes down then .............. * 2 points

(A) all packets will suffer

(B) only those packets which are queued in the router at that time will suffer

(C) only those packets which are not queued in the router at that time will suffer

(D) no packets will suffer

25) The PSTN is an example of a ..................... network. * 2 points

(A) packet switched

(B) circuit switched

(C) message switched

(D) None of these

26) A normal Flooding technique is an example of .................. * 2 points

(A) Multicasting

(B) Unicasting

(C) Telecasting

(D) Broadcasting

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 9/18
6/21/2020 Computer Networks Test 2

27)The processes that keep track of hosts whose home is in the area, but who 2 points
currently visiting another area is ................. *

(A) Home agent

(B) Mobile agent

(C) Foreign agent

(D) User agent

28) What is it goal of congestion control? * 2 points

(A) making sure that subnet is not able to carry the offered traffic

(B) making sure that subnet will allow more than the offered packets

(C) making sure that subnet is able to carry the offered traffic

(D) making sure that subnet will not allow any traffic

29)In transport layer, End to End delivery is the movement of data from ................... 2 points
*

(A) one station to the next station

(B) one network to the other network

(C) source to destination

(D) one router to another router

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 10/18
6/21/2020 Computer Networks Test 2

30) The basic protocol used by TCP entities is ............... * 2 points

(A) Sliding window protocol

(B) IP

(C) ARP

(D) HTTP

31)Which of the following is required to communicate between two computers? * 2 points

(A) communications software

(B) protocol

(C) communication hardware

(D) all of above including access to transmission medium

32) LANs can be connected by a device called ................. * 2 points

(A) Routers

(B) Modems

(C) Ethernet card

(D) Bridges

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 11/18
6/21/2020 Computer Networks Test 2

33) FDDI is an acronym for ............... * 2 points

(A) Fast data delivery interface

(B) Fiber distributed data interface

(C) Fiber distributed digital interface

(D) fast distributed data interface

34) Repeater function in the ...................... layer. * 2 points

(A) Physical

(B) Data link

(C) Network

(D) None of these

35) How many cross points are needed in a single stage switch with 40 inputs and 50 2 points
outputs. *

(A) 40

(B) 50

(C) 90

(D) 2000

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 12/18
6/21/2020 Computer Networks Test 2

36) What is the port number for (Trivial File Transfer Protocol) TFTP? * 2 points

(A) 65

(B) 67

(C) 63

(D) 69

37) Firewalls are used for ................ * 2 points

(A) routing

(B) security

(C) tunnelling

(D) congestion control

38) Fragmentation means ................... * 2 points

(A) adding of small packets to form large packet

(B) breaking large packet into small packets

(C) combining large packets in to a single packet

(D) forwarding a packet through different networks

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 13/18
6/21/2020 Computer Networks Test 2

39) Bridges are used at ................ layer. * 2 points

(A) Physical layer

(B) MAC layer

(C) Network

(D) Transport

40) HDLC is an acronym for .................... * 2 points

(A) high - duplex line communication

(B) high -level data link control

(C) half - duplex digital link combination

(D) host double level circuit

41) Decryption and Encryption of data are the responsibility of which of the 2 points
following layer? *

(A) Session layer

(B) Network layer

(C) Transport layer

(D) Presentation layer

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 14/18
6/21/2020 Computer Networks Test 2

42) Which IEEE 802 standard provides for a collision-free protocol? * 2 points

(A) 802.2

(B) 892.3

(C) 802.1

(D) 802.5

43)Window size in TCP header indicates ................ * 2 points

(A) number of bytes the receiver is willing to accept

(B) number of bytes the sender is willing to accept

(C) number of bytes the sender transmitting in each segment

(D) number of bytes in the receiver

44) The address field of a frame in HDLC protocol contains the address of the 2 points
.................. station. *

(A) primary

(B) secondary

(C) tertiary

(D) a station

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 15/18
6/21/2020 Computer Networks Test 2

45) Flow control policy is implemented in ...................... * 2 points

(A) network layer

(B) transport layer

(C) application layer

(D) physical layer

46) Routers are used at ................. layer. * 2 points

(A) Physical layer

(B) MAC layer

(C) Network

(D) Transport

47) In Token Ring, Which of the following is not a transceiver function ? * 2 points

(A) Transmission and receipt of data

(B) Checking of line voltages

(C) Addition and subtraction of header

(D) Collision

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 16/18
6/21/2020 Computer Networks Test 2

48) The size of the TCP congestion window depends on ................. * 2 points

(A) bandwidth

(B) retransmission time

(C) threshold parameter

(D) traffic

49)............ protocol is widely used on LAN in the MAC sub layer. * 2 points

(A) CSMA

(B) TCP

(C) CSMA/CD

(D) GSM

50) ..………..is used to validate the identity of the message sender to the recipient * 2 points

(A) Encryption

(B) Decryption

(C) Digital certificate

(D) None of these

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 17/18
6/21/2020 Computer Networks Test 2

Send me a copy of my responses.

Back Submit

Never submit passwords through Google Forms.

reCAPTCHA
Privacy Terms

This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy

 Forms

https://docs.google.com/forms/d/e/1FAIpQLSf6Kkh3WVGGyU1nVMt4HvDG2Mmbl4ZPaQvCfGhuqi36oUxvSg/formResponse 18/18

Potrebbero piacerti anche