Escolar Documentos
Profissional Documentos
Cultura Documentos
connection-oriented, unreliable
datagram to the correct application process B. connectionless, reliable
C. connectionless, unreliable
A. port D. connection, reliable
B. application
C. internet 8) DHCP in TCP/IP network assigns an IP address
D. intranet for a limited period of time. Such a network address
is called a ......
2) The ........ was originally developed as a
mechanism to enable disk-less hosts to be remotely A. lease
booted over a network as workstations, routers, B. limited network
terminal concentrators and so on. C. timed network
D. assigned network
A. ICMP
B. BOOTP 9) UDP does not add anything to the services of IP
C. UDP except for providing .......... communication.
D. ARP
A. node to node
3) Which of the following does UDP guarantee? B. process to process
C. host to host
A. Flow control D. interface to interface
B. Connection-oriented delivery
C. Data control 10) The use of ......... allows centralized configuration
D. None of the above of multiple clients.
A. the sending computer 12) ............ is where users typically interact with the
B. the receiving computer TCP/IP network.
C. the process running on the sending computer
D. the process running on the receiving computer A. Link layer
B. Network layer
6) The mechanisms supported by DHCP for IP C. Transport layer
address allocation on a TCP/IP network is/are ... D. Application layer
A. Automatic allocation 13) The local host and the remote host are defined
B. Dynamic allocation using IP addresses. To define the processes, we need
C. Manual allocation second identifiers called .........
D. All of th above
A. UDP addresses
7) UDP is called a .......... transport protocol. B. transport addresses
C. port addresses
D. TCP addresses A. application
B. transport
14) The ............. is responsible for communicating C. IP
with the actual network hardware. D. interface
A. flow control
B. multiplexing 1. The computer network is
C. demultiplexing A) Network computer with cable
D. data control B) Network computer without cable
C) Both of the above
18) .......... provides full transport layer services to D) None of the above
applications.
2. FDDI used which type of physical topology?
A. TCP A) Bus
B. UDP B) Ring
C. IP C) Star
D. ARP
3. FTP stands for
19) UDP uses ...... to handle incoming user datagrams A) File transfer protocol
that go to different processes on the same host. B) File transmission protocol
C) Form transfer protocol
A. flow control D) Form transmission protocol
B. multiplexing
C. demultiplexing 4. Ethernet system uses which of the following
D. data control technology.
A) Bus
20) In the sending computer, UDP receives a data B) Ring
unit from the ......... layer. C) Star
D) Tree
5. Which of the following are the network a maximum cable length of about 600 feet.
services? A) Star
A) File service B) Ring
B) Print service C) Bus
C) Database service D) Tree
D) All of the above
13) …………… is a set of connecting links
6. If all devices are connected to a central hub, between LANs.
then topology is called A) CAN
A) Bus Topology B) WAN
B) Ring Topology C) CLAN
C) Star Topology D) IAN
D) Tree Topology
14) A ………. line considered as a fast WAN link,
7. FDDI stands for transmits at 1.5 Mbps, or 1 million bits per
A) Fiber Distributed Data Interface second.
B) Fiber Data Distributed Interface A) L1
C) Fiber Dual Distributed Interface B) F1
D) Fiber Distributed Data Interface C) W1
D) T1
8. Which of the following is an application layer
service? 15) The …………….. elements are specialized
A) Network virtual terminal computers to connect two or more transmission
B) File transfer, access and management lines.
C) Mail service A) Networking
D) All of the above B) Broadcasting
C) Switching
9. Which is the main function of transport layer? D) Transfering
A) Node to node delivery
B) End to end delivery 16) In …………… the network contains
C) Synchronization numerous cables or leased telephone line, each
D) Updating and maintaining routing tables one connecting a pair or IMPs.
A) Point-to-Point channels
10. The ………… layer change bits onto B) Pair-to-Pair channels
electromagnetic signals. C) Broadcast channels
A) Physical D) Interface channels
B) Transport
C) Data Link 17) The entities comprising the corresponding
D) Presentation layers on different layers on different machines
are called …………. processes.
A) entity
11. A group of computers and other devices B) peer
connected together is called a network, and the C) peer-to-peer
concept of connected computers sharing resources D) layred
is called ………
A) Networking 18) …………….. entities are entities in the same
B) Inter-Network layer on different machines.
C) Inter-Connection A) Software
D) Computer Group B) Service
C) Peer
12. A simple cabling method, known as the D) Interface
………… topology, allows about 30 computers on
19) To use a …………………. network service, the C) Session D) Transport
service user first establishes a connection, uses the
connection, and terminates the connection. 3. Which of the transport layer protocols is
A) connection-oriented connection-less?
B) connection-less
C) service-oriented A) UDP B) TCP
D) service-less
C) FTP D) Nvt
20) In ……………………… service, each message
carries the full destination address, and each one 4. Which of the following applications allows a
is routed through the system independent of all user to access and change remote files without
others. actual transfer?
A) connection-oriented
B) connection-less A) DNS B) FTP
C) service-oriented
D) service-less C) NFS D) Telnet
A) Application B) Presentation
C) Multiplexer D) Full duplex file 17. The standard suit of protocols used by the
Internet, Intranets, extra-nets and some other
10. Which layers of the OSI determines the networks.
interface often system with the user?
A) TCP/IP B) Protocol
A) Network B) Application
C) Open system D) Internet work processor
C) Data link D) Session
18. State whether the following is True or False.
11. Which of the following of the TCP/IP
protocols is the used for transferring files from i) In bus topology, heavy Network traffic slows down
one machine to another? the bus speed.
12. In which OSI layers does the FDDI protocol C) False, True D) False, False
operate?
19. Which of the following is the logical topology?
A) Physical B) Data link
A) Bus B) Tree
C) Network D) A and B
C) Star D) Both A and B
13. In FDDI, data normally travel on
……………… 20. Which of the following is/ are the drawbacks
of Ring Topology?
A) The primary ring B) The Secondary ring
A) Failure of one computer, can affect the whole
C) Both rings D) Neither ring network
14. The …………layer of OSI model can use the B) Adding or removing the computers disturbs the
trailer of the frame for error detection. network activity.
A) Physical B) Data link C) If the central hub fails, the whole network fails to
operate.
C) Transport D) Presentation
D) Both of A and B
15. In a …………….topology, if there are n
devices in a network, each device has n-1 ports for Answers:
cables.
6. What is the name of the network topology in 13) The ………………….. layer Provides the end-to-
which there are bi-directional links between each end data transfer by delivering data from an
possible node? application to its remote peer.
A) Ring A) Transport
B) Star B) Application
C) Tree C) Internetwork
D) Mesh D) Network interface
14) …………….. provides connection-oriented 2. ………………. address use 7 bits for the
reliable data delivery, duplicate data suppression, <network> and 24 bits for the <host> portion of the
congestion control, and flow control. IP address.
A) TCP A) Class A
B) IP B) Class B
C) UDP C) Class C
D) ICMP D) Class D
15) ………………. is used by applications that need 3. …………. addresses are reserved for multi-
a fast transport mechanism and can tolerate the loss casting.
of some data. A) Class B
A) TCP B) Class C
B) IP C) Class D
C) UDP D) Class E
D) ICMP
4. State the following statement is true or false.
16) ……………… is a connection-less protocol that i) In class B addresses a total of more than 1 billion
does not assume reliability from lower layers, which addresses can be formed.
does not provide reliability, flow control, or error ii) Class E addresses are reserved for future or
recovery. experimental use.
A) Transmission control protocol A) True, False
B) Internet protocol B) True, True
C) User Datagram Protocol C) False, True
D) Simple Mail Transfer Protocol D) False, False