Networking Test Questions - Set 2

1)   The communication structure that we need in socket programming is called as _________.

a. System calls
b. Socket
c. Procedure
d. Table space
Answer  Explanation 

ANSWER: Socket

Explanation:
No explanation is available for this question!


2)   What is the use of TPDU in socket programming?

a. It creates new socket in the transport entity when it requests for a connection.
b. It allocates the table space within the transport entity.
c. It is used for establishing the connection.
d. None of the above.
Answer  Explanation 

ANSWER: It creates new socket in the transport entity when it requests for a connection.

Explanation:
No explanation is available for this question!


3)   Abbreviate the term TPDU in socket programming.

a. Transport Protocol Distribution Unit
b. Transcranial Pulsed Doppler Ultrasound
c. Transport Protocol Data Unit
d. Terminal Power Distribution Unit
Answer  Explanation 

ANSWER: Transport Protocol Data Unit

Explanation:
No explanation is available for this question!


4)   Which of the following is true about “Threshold”?

a. Threshold is a value.
b. Threshold has value levels, such as minimum level, maximum level, equal level.
c. If the data value doesn't suit the threshold value, then it indicates that this data value might lead to poor performance of the network.
d. All of the above
Answer  Explanation 

ANSWER: All of the above

Explanation:
No explanation is available for this question!


5)   What is Quality of Service?

a. It is the capability of a network to provide better service to selected network traffic over various technologies.
b. It is a priority network that provides dedicated bandwidth, controlled jitter and latency.
c. Both a and b
d. None of the above
Answer  Explanation 

ANSWER: Both a and b

Explanation:
No explanation is available for this question!


6)   Which of the following is true about Manchester encoding?

a. Each bit period is divided into two equal intervals.
b. It requires more bandwidth than 8B/10B encoding.
c. It is a form of digital encoding.
d. All of the above
Answer  Explanation 

ANSWER: All of the above

Explanation:
No explanation is available for this question!


7)   Differential Manchester encoding is also known as ___________ .

a. Clock Signals
b. Condition Diphase encoding
c. Bipolar encoding
d. Biphase mark code
Answer  Explanation 

ANSWER: Condition Diphase encoding

Explanation:
No explanation is available for this question!


8)   What is the difference between Token Ring and Ethernet?

a. Ethernet network interface cards cannot operate on a passive hub but Token ring can operate on a passive hub.
b. Ethernet does have an access for priority system but Token ring doesn't have any access for priority system on the token.
c. Ethernet supports a direct cable connection while Token ring doesn't support a direct cable connection as it requires additional hardware and software to operate on a direct cable connection setup.
d. Ethernet can support MAC address. Token ring cannot support MAC address.
Answer  Explanation 

ANSWER: Ethernet supports a direct cable connection while Token ring doesn't support a direct cable connection as it requires additional hardware and software to operate on a direct cable connection setup.

Explanation:
No explanation is available for this question!


9)   What is/are the advantages of Token ring?

a. It doesn't provide a priority system that allow administrators to use the network more frequently.
b. Multiple identical MAC addresses are supported on Token ring.
c. All of the above
d. None of the above.
Answer  Explanation 

ANSWER: Multiple identical MAC addresses are supported on Token ring.

Explanation:
No explanation is available for this question!


10)   Which of the following is/are the disadvantages of fragmentation?

a. All the packets should exit via the same gateway
b. Overhead doesn't required to repeatedly fragment.
c. Dos attack will encounter.
d. All of the above
Answer  Explanation 

ANSWER: All the packets should exit via the same gateway

Explanation:
No explanation is available for this question!


11)   Why was the Ipv6 protocol introduced?

a. IP security
b. Better Quality of Service support
c. Larger address space (128-bit in Ipv6, compared to the 32-bit address space in Ipv4)
d. All of the above
Answer  Explanation 

ANSWER: All of the above

Explanation:
No explanation is available for this question!


12)   Why Ipv6 replaces ARP by using the ND protocol?

a. The ARP address statically bound.
b. The security issues are apply.
c. Both a and b
d. The interface identifier portion of an Ipv6 address is directly derived from MAC address.
Answer  Explanation 

ANSWER: The interface identifier portion of an Ipv6 address is directly derived from MAC address.

Explanation:
No explanation is available for this question!


13)   What is the difference between Delay and Jitter?

a. Delay takes less time for buffering while jitter takes more time for buffering.
b. Delay is defined as the end to end time required for the signal to travel from transmitter to receiver and Jitter is defined as the variation of delay for packets belonging to the same flow.
c. Time delay is a variable in delay but not in jitter.
d. All of the above
Answer  Explanation 

ANSWER: Delay is defined as the end to end time required for the signal to travel from transmitter to receiver and Jitter is defined as the variation of delay for packets belonging to the same flow.

Explanation:
No explanation is available for this question!


14)   Which cell does Asynchronous Transfer Mode (ATM) use?

a. Bridges
b. Switches
c. Routers
d. Hubs
Answer  Explanation 

ANSWER: Switches

Explanation:
No explanation is available for this question!


15)   Both HDLC and PPP both are Data link layer protocol.

a. True
b. False


Answer  Explanation 

ANSWER: True

Explanation:
No explanation is available for this question!


16)   Which of the following is the communication protocol developed by ISO?

a. MPLS
b. PPP
c. HDLC
d. CRC
Answer  Explanation 

ANSWER: HDLC

Explanation:
No explanation is available for this question!


17)   Which protocol does the PPP protocol provide for handling the capabilities of the  connection/link on the network?

a. LCP
b. NCP
c. Both a and b
d. TCP
Answer  Explanation 

ANSWER: Both a and b

Explanation:
No explanation is available for this question!


18)   What does the Link Control Protocol (LCP) do in PPP?

a. Set-up configure
b. Maintaining a link
c. Terminating a link
d. Both b and c
e. All of the above
Answer  Explanation 

ANSWER: All of the above

Explanation:
No explanation is available for this question!


19)   Which of the following protocol is used to allow the encapsulation of data coming from the network layer protocol?

a. TCP
b. NCP
c. LCP
d. HDLC
Answer  Explanation 

ANSWER: NCP

Explanation:
No explanation is available for this question!


20)   Which protocol is used after authentication has been completed?

a. User Datagram Protocol
b. PPP Protocol
c. Transmission Control Protocol
d. Network Control Protocol
Answer  Explanation 

ANSWER: Network Control Protocol

Explanation:
No explanation is available for this question!


21)   Which of the following is true about Network Control Protocol (NCP)?

a. It is strictly used for data authentication.
b. It decides the encapsulation of network layer data into the data link frame
c. It is useful to set-up configure, maintain and terminate a link connection.
d. All of the above.
Answer  Explanation 

ANSWER: It decides the encapsulation of network layer data into the data link frame

Explanation:
No explanation is available for this question!


22)   What is Frame Check Sequence (FCS)?

a. FCS is an error recovery process.
b. FCS is an upper layer data.
c. FCS is an error detecting code.
d. FCS is a communication protocol.
Answer  Explanation 

ANSWER: FCS is an error detecting code.

Explanation:
No explanation is available for this question!


23)   What is/are the characteristics of Connection Oriented Service?

a. The connection oriented services are reliable because there is a minimization of data loss and retransmission of lost bits is possible.
b. Connection oriented service is suitable for short communication.
c. Both a and b
d. The connection is not established in the connection oriented service.
Answer  Explanation 

ANSWER: The connection oriented services are reliable because there is a minimization of data loss and retransmission of lost bits is possible.

Explanation:
No explanation is available for this question!


24)   Which of the following statement is true about Connectionless service?

a. The connection is established in connectionless service.
b. Connectionless service is suitable for bursty transmission.
c. Connectionless services can give services guarantees.
d. Connectionless services can avoid bottleneck problem.
Answer  Explanation 

ANSWER: Connectionless service is suitable for bursty transmission.

Explanation:
No explanation is available for this question!


25)   What is the difference between MPLS and Virtual Circuit?

a. The forwarding table is mostly used in MPLS but not in Virtual Circuit.
b. The forwarding table is not constructed in Virtual Circuit but it is constructed in MPLS.
c. In virtual-circuit, the user establishes new connection and launches a set up packet and created the path while there is no set up for each connection in MPLS.
d. All of the above.
Answer  Explanation 

ANSWER: In virtual-circuit, the user establishes new connection and launches a set up packet and created the path while there is no set up for each connection in MPLS.

Explanation:
No explanation is available for this question!


26)   Both HDLC and PPP are data link layer protocols.

a. True
b. False


Answer  Explanation 

ANSWER: True

Explanation:
No explanation is available for this question!


27)   HDLC is developed by ________ .

a. ISI
b. ISO
c. FPO
d. ITC
Answer  Explanation 

ANSWER: ISO

Explanation:
No explanation is available for this question!


28)   Which of the following are the HTTP methods (request types)?

I. GET
II. POST
III. PATCH
IV. BODY
V. CREATE
VI. OPTION


a. I, II, III, IV, V
b. I, II
c. IV, V, VI
d. I, II, III, VI
Answer  Explanation 

ANSWER: I, II, III, VI

Explanation:
No explanation is available for this question!


29)   Define the term DHCP server.

a. administrator requires to add an entry for each computer in DHCP.
b. assigned a permanent address to the server software.
c. doesn't allow a computer to join a new network.
d. None of the above.
Answer  Explanation 

ANSWER: assigned a permanent address to the server software.

Explanation:
No explanation is available for this question!


30)   What type of addresses does DHCP server use?

a. Permanent address
b. Local address
c. Pool address
d. Both a and b
e. Both a and c
Answer  Explanation 

ANSWER: Both a and c

Explanation:
No explanation is available for this question!


31)   Which of the following protocol is widely used in Dynamic assignment?

a. BOOTP
b. DHCP
c. RARP
d. DCHP
Answer  Explanation 

ANSWER: DHCP

Explanation:
No explanation is available for this question!


32)   Match the following List 1 to List 2
      
1. DHCP Server ------------ i) works as a virtual post office
2. Proxy Server ------------- ii) automatically provides an internet protocol.
3. Mail Server ---------------- iii) make indirect network connections to other network services.


a. 1-iii, 2i-, 3-ii
b. 1-iii, 2-ii, 3-i
c. 1-ii, 2-iii-, 3-i
d. 1-ii, 2i-, 3-iii
Answer  Explanation 

ANSWER: 1-ii, 2-iii-, 3-i

Explanation:
No explanation is available for this question!


33)   Which of the following statements is/are correct about the UDP header?

a. application programs use to send data to other application programs.
b. distinguish port numbers between multiple programs on a single device.
c. UDP have limited size header of 8 bytes.
d. Both a and b
e. Both a and c
Answer  Explanation 

ANSWER: Both a and b

Explanation:
No explanation is available for this question!


34)   What is the purpose of using pseudo header in UDP?

a. The data packets are delivered sequentially.
b. Find out the destination port number and source port number.
c. Sends the context of a particular internet destination address to UDP.
d. Verifying the UDP packet has reached its correct destination.
Answer  Explanation 

ANSWER: Verifying the UDP packet has reached its correct destination.

Explanation:
No explanation is available for this question!


35)   When too many packets are present in a part of a subnet the performance degrades, this situation is called as Congestion.

a. True
b. False


Answer  Explanation 

ANSWER: True

Explanation:
No explanation is available for this question!


36)   Which architectures is/are required to QoS?

a. Integrated Services
b. Differentiated Services
c. Reserved Services
d. Both a and b
e. Both b and c
Answer  Explanation 

ANSWER: Both a and b

Explanation:
No explanation is available for this question!


37)   Match the following  List 1 to List 2

1. Ping ------------ i) discover the routes
2.Traceroute ----- ii) method for troubleshooting the accessibility of devices
3. Netstat --------- iii) control the network connections on Windows NT/XP
4. Ipconfig -------- iv) finding problems in the network


a. 1-iii, 2-i, 3-iv, 4-ii
b. 1-ii, 2-i, 3-iv, 4-iii
c. 1-i, 2-iii, 3-ii, 4-iv
d. 1-iv, 2-ii, 3-iii, 4-ii
Answer  Explanation 

ANSWER: 1-ii, 2-i, 3-iv, 4-iii

Explanation:
No explanation is available for this question!


38)   ICMP stands for ______________ .

a. Internet Component Mail Protocol
b. Internet Control Mail Protocol
c. Information Component Mail Protocol
d. Internet Control Message Protocol
Answer  Explanation 

ANSWER: Internet Control Message Protocol

Explanation:
No explanation is available for this question!


39)   Consider the following types,

I. Destination unreachable
II. Source quench
III. Query Messages
IV. Time exceeded
V . Redirection
   
In the above, which is/are the error reporting types?


a. I, II, III
b. I, II, IV, V
c. III, IV, V
d. III, II, IV, V
Answer  Explanation 

ANSWER: I, II, IV, V

Explanation:
No explanation is available for this question!


40)   Which of the following statements is/are correct about distance vector?

a. Router don’t knows the identity of other router.
b. Cost of each couple is not equal to destination.
c. Each router maintains a distance vector.
d. All of the above.
Answer  Explanation 

ANSWER: Each router maintains a distance vector.

Explanation:
No explanation is available for this question!


41)   What is the use of LAN bridges in the network?

a. Provides real time and non real time services.
b. Checks the MAC address of source and destination.
c. Provides broadband ISDN for the data packets.
d. None of the above
Answer  Explanation 

ANSWER: Checks the MAC address of source and destination.

Explanation:
No explanation is available for this question!


42)   Abbreviate TDMA.

a. Time Division Multiple Access
b. Tree Diagonal Matrix Algorithm
c. Transmission Devices Media Access
d. Transport Devices Multiple Algorithm
Answer  Explanation 

ANSWER: Time Division Multiple Access

Explanation:
No explanation is available for this question!


43)   What is/are the advantages of TDMA?

a. provide entire bandwidth but not simultaneously
b. cost effective technology
c. offer personal communication
d. All of the above
Answer  Explanation 

ANSWER: All of the above

Explanation:
No explanation is available for this question!


44)   What is the difference between TDMA and CDMA?

a. In CDMA only one user is allowed to share a channel or sub channel . while it is allowed in TDMA.
b. CDMA offers higher transmission quality than TDMA.
c. CDMA is a dominant technology in the wireless market than TDMA.
d. Both a and b
e. Both b and c
Answer  Explanation 

ANSWER: CDMA offers higher transmission quality than TDMA.

Explanation:
No explanation is available for this question!


45)   Ethernet is a multi-access network and most successful local area networking technology.

a. True
b. False


Answer  Explanation 

ANSWER: True

Explanation:
No explanation is available for this question!


46)   What is the default port of SMTP?

a. 85
b. 70
c. 80
d. 25
Answer  Explanation 

ANSWER: 25

Explanation:
No explanation is available for this question!


47)   What is a path vector routing?

a. network routing protocol
b. inter-domain routing
c. exterior gateway protocol
d. None of the above
Answer  Explanation 

ANSWER: network routing protocol

Explanation:
No explanation is available for this question!


48)   Which of the following statements is/are true about path vector routing?

a. Path vector routing is similar to the link state router.
b. Exterior Gateway Protocol (EGP) is used in Path Vector.
c. Maintains the path information and gets updated dynamically.
d. Not flexible in selecting the path while hiding the information.
Answer  Explanation 

ANSWER: Maintains the path information and gets updated dynamically.

Explanation:
No explanation is available for this question!


49)   Which of the following is/are the advantages of hierarchical routing?

a. Portability
b. Scalability
c. Reliability
d. Flexibility
Answer  Explanation 

ANSWER: Scalability

Explanation:
No explanation is available for this question!


50)   Match the following List 1 to List 2

1. Open message --------------- i. To close an active session  
2. Update message ------------ ii. Opens a BGP communications session
3. Keep-alive message -------- iii. Provide routing updates to other BGP system
4. Notification message ------- iv.  Notifies BGP peers device is active


a. 1-ii, 2-i, 3-iv, 4-iii
b. 1-iv, 2-iii, 3-i, 4-ii
c. 1-ii, 2-iii, 3-iv, 4-i
d. 1-i, 2-ii, 3-iii, 4-iv
Answer  Explanation 

ANSWER: 1-ii, 2-iii, 3-iv, 4-i

Explanation:
No explanation is available for this question!


51)   What is the difference between forwarding and routing?

a. Forwarding does not transmit data on outgoing links, but routing does.
b. Forwarding finds suitable path for a packet than routing.
c. Forwarding is a part of decision making while routing is not.
d. Forwarding is used in telephony while routing is used in all networks.
Answer  Explanation 

ANSWER: Forwarding is used in telephony while routing is used in all networks.

Explanation:
No explanation is available for this question!


52)   Why ATM was developed?

a. To handle both traditional high-throughput data traffic and real-time,low-latency content.
b. Designed to unify telecommunication and computer networks.
c. To meet the needs of the Broadband Integrated Services Digital Network.
d. All of the above.
Answer  Explanation 

ANSWER: All of the above.

Explanation:
No explanation is available for this question!


53)   All networks require a central location to bring media segments together. These central locations are called _________ .

a. Bridges
b. Switches
c. Hubs
d. Routers
Answer  Explanation 

ANSWER: Hubs

Explanation:
No explanation is available for this question!


54)   Which of the following is/are functions of header subfields?

I. Router change flag
II. Virtual path identifier
III. Header error control
IV. Cell loss priority


a. III, IV
b. II, III, IV
c. I, II
d. I, III, II
Answer  Explanation 

ANSWER: II, III, IV

Explanation:
No explanation is available for this question!