1. The --------- bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and 0s that allow the receiver’s hardware to synchronize with the incoming signal.
Ø 64
Ø 32
Ø 16
Ø 8
2. Ethernet uses a ------ static addressing scheme in which each device is assigned a unique address by the manufacturer.
Ø 64
Ø 48
Ø 32
Ø 8
3. The third field of the header consists of ------ bit Ethernet frame type.
Ø 48
Ø 32
Ø 16
Ø 8
4. IEEE LLC/SNAP header is --------, which is used to specify the type of data.
Ø 8 octets
Ø 8 bytes
Ø 8 bits
Ø None of the given
5. Formally named __________ informally known as the thick wire Ethernet or Thick net.
Ø 10 Base 2
Ø 10 Base 5
Ø 10 Base T
Ø None of the given
6. Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
Ø DMA(Direct Memory Access)
Ø Multiplexer
Ø Transceiver
Ø None of the given
7. An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
Ø RJ-45, 10 Base T
Ø RJ-45, 10 Base 5
Ø BNC, 10 Base 2
Ø BNC, 10 Base T
8. _____________ sense a signal on one cable and then transmits an amplified copy on the other cable.
Ø Repeater
Ø Bridge
Ø Hub
Ø None of the given
9. The maximum size of an Ethernet segment is___________
Ø 250 meters
Ø 500 meters
Ø 700 meters
Ø None of the given
10. A bridge uses the ___________ to determine which computers connect to which segment, and uses the __________ to determine whether to forward a copy of frame.
Ø Source address, Destination address
Ø Destination address, Source address
Ø Destination address, Destination address
Ø None of the given
11. A bridges function in the _________ layers(s).
Ø Physical (MAC)
Ø Data link
Ø Network and
Ø and (b)
12. A system with redundant bridges might have a problem with_______ in the system.
Ø Loop
Ø Filters
Ø Spanning Trees
Ø All the above
13. A Bridge can ________
Ø Filter a frame
Ø Forward a frame
Ø Extend a LAN
Ø Do all the above
14. A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________
Ø Layer 2 source address
Ø Source node’s physical address
Ø Layer 2 destination address
Ø Layer 3 destination address
15. Which of the following is a connecting device?
Ø Bridge
Ø Repeater
Ø Hub
Ø All the given
16. Which of the following type of routing protocols is used within an autonomous system?
Ø IGP
Ø BGP
Ø EGP
Ø BGGP
Ø EGBP
17. Which of the following protocols usually determines the best path based on how far the destination is?
Ø RIP
Ø IGRP
Ø BGP
Ø Both a and b
Ø Both b and c
18. A Link state routing protocol considers which of the following metric to choose the best path?
Ø Delay
Ø Bandwidth
Ø Load
Ø Reliability
Ø Number of Hops
19. If there are two paths towards a destination, what will the distance vector routing protocol do to determine the best path.
Ø It will choose the path with the smallest hop-count.
Ø It will choose the path with the minimum load in it.
Ø It will choose the path with the maximum bandwidth.
Ø It will choose one of the two routes randomly.
Ø It will choose the path with maximum number of hops, thus having more reliability.
20. The neighbor router information is gathered continuously in case of
Ø Link state routing protocols
Ø Distance vector routing protocol
Ø IGRP
Ø All the Interior gateway protocols
Ø None of the above
21. Which of the following does not use any routing metric?
Ø EGP
Ø IGP
Ø RIP
Ø OSPF
Ø All link state routing protocols
22. When a network link changes state a notification, is flooded to
Ø All the next routers in the path
Ø All the previous routers in the path
Ø All the routers within autonomous systems
Ø All the routers outside the autonomous system
Ø To all the neighboring routers and thus to all the network
23. Suppose there are 3 paths towards a certain destination, in a routing table. The metric of path 1 is 8, path 2 is 7 and of path 3 is 9, which path the router be adopting incase of distance vector routing?
Ø Path 1
Ø Path 2
Ø Path 3
Ø The router will be confused among the 3 paths and will discard the packet.
Ø It will be adopting any path randomly between the three.
24. Most of the ISPs (internet service providers) are considered as stub autonomous systems
Ø True
Ø False
25. Static routing is inflexible as it can not accommodate with the network failures
Ø True
Ø False
26. ________ protocols of TCP/IP layering model specify the format of packets sent across internet as well as the mechanisms used to forward packets from a computer through one or more routers to a final destination.
Ø Physical Layer
Ø Network Interface Layer
Ø Internet Layer
Ø Transport Layer
27. Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.
Ø 8-bit
Ø 16-bit
Ø 32-bit
Ø 64-bit
28. A _____________ address-binding table is used for each physical network.
Ø New
Ø Similar
Ø Separate
Ø Old
29. ________ of TCP/IP layering model, corresponds to basic network hardware.
Ø Physical Layer
Ø Network Interface Layer
Ø Internet Layer
Ø Transport Layer
30. Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Ø True
Ø False
31. ___________ places the boundary between the first and second octets
Ø Class A
Ø Class B
Ø Class C
Ø Class D
32. As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.
Ø True
Ø False
33. _______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
Ø Physical Layer
Ø Network Interface Layer
Ø Internet Layer
Ø Transport Layer
34. As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes.
Ø Three
Ø Two
Ø Four
Ø Five
35. In Closed-form computation, the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.
Ø Arithmetic
Ø XOR
Ø Shift
Ø XNOR