Você está na página 1de 6

1. Which of the following is not applicable for IP?

@@ Error reporting
@@ Handle addressing conventions
@@ Datagram format
@@ Packet handling conventions
2. Which of the following field in IPv4 datagram is not related to fragmentation?
@@ Flags
@@ Offset
@@ TOS
@@ Identifier
3. The TTL field has value 10. How many routers (max) can process this datagram?
@@ 11
@@ 5
@@ 10
@@ 1
4. What should be the flag value to indicate the last fragment?
@@ 0
@@ 1
@@ TTl value
@@ 10
5. Which field helps to check rearrangement of the fragments?
@@ offset
@@ flag
@@ TTL
@@ identifer
6. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
@@ Fragmentation field
@@ Fast-switching
@@ ToS field
@@ Option field
7. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are connected to each other
by intervening IPv4 routers. The best solution here is
@@ use dual-stack approach
@@ Tunneling
@@ No solution
@@ Replace the system
8. Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented
by bits
@@ 96 to 127
@@ 0 to 63
@@ 80 to 95
@@ 64 to 79
9. DHCP uses UDP port ____ for sending data to the server.
@@ 66
@@ 67
@@ 68
@@ 69

10. What is DHCP snooping?


@@ techniques applied to ensure the security of an existing DHCP infrastructure
@@ encryption of the DHCP server requests
@@ algorithm for DHCP
@@ file
11. Remote procedure calls is
@@ inter-process communication
@@ a single process
@@ a single thread
@@ multiple process
12. An RPC application requires
@@ specific protocol for client server communication
@@ a client program
@@ a server program
@@ linked program
13. In SMTP, the command to write recievers mail adress is written with this command
@@ SEND TO
@@ RCPT TO
@@ MAIL TO
@@ SPAM
14. A session may include
@@ Zero or more SMTP transactions
@@ Exactly one SMTP transactions
@@ Always more than one SMTP transactions
@@ Number of SMTP transactions cant be determined
15. When the sender and the receiver of an email are on different systems, we need only ______ .
@@ One MTA
@@ Two UAs
@@ Two UAs and one pair of MTAs
@@ Two UAs and two pairs of MTAs
16. Which standard TCP port is assigned for contacting SSH servers?
@@ port 21
@@ port 22
@@ port 23
@@ port 24
17. SSH-2 does not contain
@@ transport layer
@@ user authentication layer
@@ physical layer
@@ connection layer
18. SCP protocol is evolved from _____ over SSH.
@@ RCP protocol
@@ DHCP protocol
@@ MGCP protocol
@@ DNS
19. The values GET, POST, HEAD etc are specified in ____ of HTTP message
@@ Request line

@@ Header line
@@ Status line
@@ Entity body
20. The HTTP response message leaves out the requested object when _____ method is used
@@ GET
@@ POST
@@ HEAD
@@ PUT
21. In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.
@@ 2
@@ 1
@@ 4
@@ 3
22. _____ command is used to manipulate TCP/IP routing table.
@@ route
@@ Ipconfig
@@ Ifconfig
@@ Traceroute
23. E-mail is
@@ Loss-tolerant application
@@ Bandwidth-sensitive application
@@ Elastic application
@@ Application
24. To deliver a message to the correct application program running on a host, the _______ address must
be consulted
@@ IP
@@ MAC
@@ Port
@@ ROUTE
25) This is a time-sensitive service
@@ File transfer
@@ File download
@@ E-mail
@@ Internet telephony
26. If there are N routers from source to destination, total end to end delay in sending packet P(L>number of bits in the packet R-> transmission rate)
@@ N
@@ (N*L)/R
@@ (2N*L)/R
@@ L/R
27. The resources needed for communication between end systems are reserved for the duration of
session between end systems in ________
@@ Packet switching
@@ Circuit switching
@@ Line switching
@@ Frequency switching
28. As the resouces are reserved between two communicating end systems in circuit switching, this is

achieved
@@ authentication
@@ guaranteed constant rate
@@ reliability
@@ store and forward
29. Which multiplexing technique transmits digital signals ?
@@ FDM
@@ TDM
@@ WDM
@@ RDM
30. If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this
TDM is
@@ 32kbps
@@ 200kbps
@@ 500kbps
@@ 1000kbps
31. If 5 files are transfered from server A to client B in the same session. The number of TCP connection
between A and B is
@@ 5
@@10
@@ 2
@@ 6
32. The commands, from client to server, and replies, from server to client, are sent across the control
connection in ____ bit ASCII format
@@ 8
@@ 7
@@ 3
@@ 5
33. Find the FTP reply whose message is wrongly matched
@@ 331 Username OK, password required
@@ 425 Cant open data connection
@@ 452 Error writing file
@@ 452 Cant open data connection
34. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is(in
milliseconds)
@@ 3.2
@@ 32
@@ 0.32
@@ 0
35. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of
the following delays could be zero
@@ Propogation delay
@@ Queuing delay
@@ Transmission delay
@@ Processing delay
36. What is WPA?
@@ wi-fi protected access
@@ wired protected access

@@ wired process access


@@ wi-fi process access
37. Frame relay has error detection at the
@@ physical layer
@@ data link layer
@@ network layer
@@ transport layer
38. The entire hostname has a maximum of
@@ 255 characters
@@ 127 characters
@@ 63 characters
@@ 31 characters
39. The right to use a domain name is delegated by domain name registers which are accredited by
@@ internet architecture board
@@ internet society
@@ internet research task force
@@ internet corporation for assigned names and numbers
40. Servers handle requests for other domains
@@ directly
@@ by contacting remote DNS server
@@ it is not possible
@@ DHCP server

ANSWERS
1.a

13.b

25.d

37.b

2.c

14.a

26.b

38.a

3.c

15.d

27.b

39.d

4.a

16.b

28.b

40.b

5.a

17.c

29.b

6.c

18.a

30.a

7.b

19.a

31.d

8.a

20.c

32.b

9.b

21.b

33.d

10.a

22.a

34.a

11.a

23.c

35.b

12.a

24.c

36.a

Você também pode gostar