Google+ COMPUTER TRICKS, TWEAKS AND TUTORIALS: Sovled MCQS CS 601

Sovled MCQS CS 601




1.      The ---------   bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and 0s that allow the receiver’s hardware to synchronize with the incoming signal.
Ø  64                   
Ø  32
Ø  16
Ø  8

2.      Ethernet uses a ------ static addressing scheme in which each device is assigned a unique address by the manufacturer.
Ø  64
Ø  48               
Ø  32
Ø  8

3. The third field of the header consists of ------ bit Ethernet frame type.
Ø  48
Ø  32
Ø  16       
Ø  8

4. IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Ø  8 octets     
Ø  8 bytes
Ø  8 bits
Ø  None of the given

5. Formally named __________ informally known as the thick wire Ethernet or Thick net.
Ø  10 Base 2
Ø  10 Base 5          
Ø  10 Base T
Ø  None of the given

6. Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
Ø  DMA(Direct Memory Access)                  
Ø  Multiplexer
Ø  Transceiver
Ø  None of the given



7. An interface for twisted pair Ethernet must have an ____________  connector , and must generate signals according to the_____________ specification.
Ø  RJ-45, 10 Base T       
Ø  RJ-45, 10 Base 5
Ø  BNC, 10 Base 2
Ø  BNC, 10 Base T

8. _____________ sense a signal on one cable and then transmits an amplified copy on the other cable.
Ø  Repeater             
Ø  Bridge
Ø  Hub
Ø  None of the given

9. The maximum size of an Ethernet segment is___________
Ø  250 meters
Ø  500 meters            
Ø  700 meters
Ø  None of the given

10. A bridge uses the ___________ to determine which computers connect to which segment, and uses the __________ to determine whether to forward a copy of frame.
Ø  Source address, Destination address        
Ø  Destination address, Source address
Ø  Destination address, Destination address
Ø  None of the given

11. A bridges function in the _________ layers(s).
Ø  Physical (MAC)             
Ø  Data link
Ø  Network and
Ø  and (b)

12. A system with redundant bridges might have a problem with_______ in the system.
Ø  Loop        
Ø  Filters
Ø  Spanning Trees
Ø  All the above

13. A Bridge can ________
Ø  Filter a frame
Ø  Forward a frame
Ø  Extend a LAN
Ø  Do all the above   

14. A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________
Ø  Layer 2 source address
Ø  Source node’s physical address
Ø  Layer 2 destination address         
Ø  Layer 3 destination address

15. Which of the following is a connecting device?
Ø  Bridge
Ø  Repeater
Ø  Hub
Ø  All the given   

16. Which of the following type of routing protocols is used within an autonomous system?
Ø  IGP
Ø  BGP
Ø  EGP
Ø  BGGP
Ø  EGBP

17. Which of the following protocols usually determines the best path based on how far the destination is?
Ø  RIP
Ø  IGRP
Ø  BGP
Ø  Both a and b
Ø  Both b and c

18.  A Link state routing protocol considers which of the following metric to choose the best path?
Ø  Delay
Ø  Bandwidth
Ø  Load
Ø  Reliability
Ø  Number of Hops

19.  If there are two paths towards a destination, what will the distance vector routing protocol do to determine the best path.
Ø  It will choose the path with the smallest hop-count.
Ø  It will choose the path with the minimum load in it.
Ø  It will choose the path with the maximum bandwidth.
Ø  It will choose one of the two routes randomly.
Ø  It will choose the path with maximum number of hops, thus having more reliability.

20.  The neighbor router information is gathered continuously in case of
Ø  Link state routing protocols
Ø  Distance vector routing protocol
Ø  IGRP
Ø  All the Interior gateway protocols
Ø  None of the above

21. Which of the following does not use any routing metric?
Ø  EGP
Ø  IGP
Ø  RIP
Ø  OSPF
Ø  All link state routing protocols

22. When a network link changes state a notification, is flooded to
Ø  All the next routers in the path
Ø  All the previous routers in the path
Ø  All the routers within autonomous systems
Ø  All the routers outside the autonomous system
Ø  To all the neighboring routers and thus to all the network

23.  Suppose there are 3 paths towards a certain destination, in a routing table. The metric of path 1 is 8, path 2 is 7 and of path 3 is 9, which path the router be adopting incase of distance vector routing?
Ø  Path 1
Ø  Path 2
Ø  Path 3
Ø  The router will be confused among the 3 paths and will discard the packet.
Ø  It will be adopting any path randomly between the three.

24. Most of the ISPs (internet service providers) are considered as stub autonomous systems
Ø  True
Ø  False

25.  Static routing is inflexible as it can not accommodate with the network failures
Ø  True
Ø  False
26. ________ protocols of TCP/IP layering model specify the format of packets sent across internet as well as the mechanisms used to forward packets from a computer through one or more routers to a final destination.
Ø  Physical Layer
Ø  Network Interface Layer
Ø  Internet Layer
Ø  Transport Layer
27. Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.
Ø  8-bit
Ø  16-bit
Ø  32-bit
Ø  64-bit
28. A _____________ address-binding table is used for each physical network.
Ø  New
Ø  Similar
Ø  Separate
Ø  Old
29. ________ of TCP/IP layering model, corresponds to basic network hardware.
Ø  Physical Layer
Ø  Network Interface Layer
Ø  Internet Layer
Ø  Transport Layer
30. Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Ø  True
Ø  False
31. ___________ places the boundary between the first and second octets
Ø  Class A
Ø  Class B 
Ø  Class C
Ø  Class D
32. As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.
Ø  True
Ø  False
33. _______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
Ø  Physical Layer
Ø  Network Interface Layer
Ø  Internet Layer
Ø  Transport Layer
34. As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes.
Ø  Three
Ø  Two
Ø  Four
Ø  Five
35. In Closed-form computation, the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.
Ø  Arithmetic
Ø  XOR
Ø  Shift
Ø  XNOR