Saturday 20 January 2018

Mock Test on Computer Network Questions and Answers


Mock Test on Computer Network Questions and Answers-1

 
1. What is the major application of UDP

Select one:
 a.  Small office network
 b.   Multimedia
 c.    Scheduling
 d.    LAN communication

Feedback
The  answer is:   Multimedia

 2. Which of the methods mentioned below is not a valid Request Header?

Select one:
 a.      Host
 b.  Accept-Language
 c.   Set-Cookie
 d.   If-Modified-Since

Feedback
The  answer is:   Set-Cookie

 3. How long does it take to send a file of 384,000 bits from host A to host B over a circuit-switched network?

Assume the following:
• All link speeds are 1.536 Mbps
• Each link uses TDM with 8 slots/sec
• 400 msec are required to establish end-to-end circuit
           
Select one:
 a.  2.4 secs
 b.  0.9 secs
 c.   2.04 secs
 d. 0.65 secs

Feedback
The  answer is:  0.9 secs

 4. What is the total size of TCP Segment

Select one:
 a. 16 bits
 b. 8 bits
 c. 64 bits
 d. 32 bits

Feedback
The  answer is:  32 bits

 5. Suppose within your web browser you click on a link to obtain a Web  page. The IP address of the associated URL is cached in your local host, so a DNS lookup is not necessary to obtain the IP address.  Suppose that the webpage associated with the link contains exactly one object consisting of a small amount  of  HTML text, which references 10 very small objects on the same server. Let  RTT' denote the  RTT between  the local host and the server containing the object. Assuming zero transmission time of the object. How much time is needed to get the to retrieve the web page fully, in the following cases:

a. Non-persistent HTTP with no parallel TCP connections?
b. Persistent HTTP?

.Select one:
a. 22RTT', 3RTT'
b. 20RTT', 3RTT'
c. 20RTT', 2RTT'
d. 22RTT', 2RTT'

Feedback
The  answer is: 22RTT', 3RTT'

 6.  ......... is designed for the connectionless protocol such as User Datagram Protocol(UDP).

Select one:
 a. Stream socket
 b. Raw socket
 c. Datagram socket
 d. Berkeley socket

Feedback
The  answer is: Datagram socket

 7. Which of the following statements regarding the Internet Structure is FALSE?

Select one:
 a.   A Tier 3 or Local ISP may decide to be a direct customer of a  Tier 1 ISP
 b.   Each Tier 2 or Regional ISP is a customer of  one or more Tier 1 ISPs
 c.   A Tier 1 ISP  has a national or international coverage over a wide area, and has a network consisting of high end routers and  links with high bandwidth
 d.  A Tier 2 ISP cannot peer privately with one or more Tier-2 ISPs

Feedback
The  answer is:  A Tier 2 ISP cannot peer privately with one or more Tier-2 ISPs

 8. What is the solution for Silly Window syndrome in TCP

Select one:
 a.  Karn Partridge Algorithm
 b.  Nagles Algorithm
 c.  Sliding Window Protocol
 d. Go-Back N protocol

Feedback
The  answer is:  Nagles Algorithm

 9. The time difference between the  instant at which a transport connection is requested and the instant at which it is confirmed is called as ........

Select one:
 a. Priority delay
 b.  Protection delay
 c. Transit delay
 d. Connection establishment delay

Feedback
The  answer is: Transit delay

 10. What is the average rate for fairness in TCP for K sessions with R bandwidth

Select one:
 a. (R/K )+1
 b. K/R
 c. (K/R)+1
 d. R/K

Feedback
The  answer is: R/K

 11. Sequence the following actions for the interaction between a web browser and a web server.

A. Browser requests a webpage using HTTP.
B. Browser establishes a TCP connection with the web server.
C. Server sends the requested webpage using HTTP.
D. Browser resolves the domain name using DNS.

Select one:
 a. 1,3,2,4
 b. 4,2,1,3
 c. 1,2,3,4
 d. 2,3,4,1

Feedback
The  answer is: 4,2,1,3

 12. Which command provides  information about delay measurement from source to  destination?

Select one:
 a.  Traceroute
 b.   Nslookup
 c. Netstat
 d. None

Feedback
The  answer is:  Traceroute

 13. In the following which term , refers to a set of procedures used to restrict amount of data that sender can send before waiting for acknowledgment is

Select one:
A. error control
B. flow control
C. ADSL
D. byte stuffing

Feedback

The  answer is:A. flow control

 14. .......... needs ports or service access points.

Select one:
 a. Network layer
 b. Data Link layer
 c. Physical Layer
 d. Transport layer

Feedback
The  answer is: Transport layer

 15. Applications that need to talk across a network uses __________ for communication with the end-node (destination)

Select one:
 a. Sockets
 b. Semaphores
 c. Shared memory
 d.  Message queues

Feedback
The  answer is: Sockets

 16. Among  the network topologies listed below, which  would be the preferred WAN design to implement for a company with  a hierarchical structure i.e. with main, regional and branch offices,  where information is exchanged  from main to regional to branch offices and vice-versa?

Select one:
 a. Partial Mesh
 b. Ring
 c. Tree
 d. Double-Ring

Feedback
The  answer is: Partial Mesh

 17. Error Control and Flow Control are responsibilities of

Select one:
 a. data link and network Layers
 b. data link and Physical Layer
 c.Application and Presentation Layer
 d.data link and Transport Layer

Feedback
The  answer is:
A. data link and Transport Layer

 18. What is the size of Urgent pointer in TCP segment

Select one:
 a.  16 bits
 b. 8 bits
 c.  32 bits
 d. 24 bits

Feedback
The  answer is:  16 bits

 19. What is the total size of source field of UDP Checksum

Select one:
 a. 16 bits
 b. 24 bits
 c. 8 bits
 d. 32 bits

Feedback
The  answer is:32 bits

 20. The following application layer protocol spec specifies support for both TCP and UDP at the transport layer:

Select one:
 a. HTTP
 b. Telnet
 c.  FTP
 d. DNS

Feedback
The  answer is: DNS

 21. Collaborative Web and Semantic Web are also referred   as:

Select one:
 a.  Both  Web 3.0
 b.  Web 2.0 and Web 3.0 respectively
 c.   Both  Web 2.0
 d.  Web 1.0  and Web 2.0 respectively

Feedback
The  answer is:  Web 2.0 and Web 3.0 respectively

 22. Which  of the following statements regarding network devices is in?

Select one:
 a. Switches may operate both at the data link and the network layer
 b. Bridges operate at the data link layer
 c. Repeaters  operate  at the physical layer
 d. Hubs operate at the data link layer

Feedback
The  answer is: Hubs operate at the data link layer

 23. Which of the following is/are example(s) of stateful application layer protocols?

(i)  HTTP
(ii) FTP
(iii) TCP
(iv) POP3

Select one:
 a. 1,2,3
 b. 2,4
 c. 1,3,4
 d. 2,3

Feedback
The  answer is: 2,4

 24. What is the header size of the UDP packet format

Select one:
 a. 24 bits
 b. 8 bytes
 c. 32 bits
 d. 16 bytes

Feedback
The  answer is:  8 bytes

 25. Which of the following are the protocol data units at the Application and Network Layer respectively?

Select one:
 a. Packet,  Segment
 b. Message,  Segment
 c. Segment, Packet
 d. Message, Packet

Feedback
The  answer is: Message, Packet

 26. Which of the statements below does not apply to  Circuit Switched Networks?

Select one:
 a.  Dedicated resources used for transmission from source to destination
 b. A call set up is required before the data can be sent from the source to the destination
 c.  Once a particular call has been set up between the source and destination,  data fragmented at the routers can be sent along different paths to the destination
 d.  Can be implemented using Time Domain Multiplexing as well as  Frequency Domain Multiplexing

Feedback
The  answer is:  Once a particular call has been set up between the source and destination,  data fragmented at the routers can be sent along different paths to the destination

 27. An organization’s LAN that connects the end systems of the users  to the edge router   is part of :

Select one:
 A. Network Edge Laye
 B. Network Core Layer
 C. Network Access  Layer
 D. None

Feedback
The  answer is:     Network Access  Layer

 28.Which of the status codes  is returned as part of the HTTP Response if the requested content on the server is unchanged?

Select one:
 304
 301
 306
 302

Feedback
The  answer is: 304

 29. In a TCP connection between a sender and receiver, which variables are maintained by the sender and receiver, respectively, for flow control?

Select one:
 a. Sender: LastByteRead, LastByteRcvd; Receiver: LastByteSent, LastByteAcked
 b. Sender: LastByteSent, LastByteAcked; Receiver: LastByteRead, LastByteRcvd
 c. Sender: LastByteSent, LastByteRcvd; Receiver: LastByteRead, LastByteAcked
 d. Sender: LastByteRead, LastByteAcked; Receiver: LastByteSent, LastByteRcvd

Feedback
The  answer is: Sender: LastByteSent, LastByteAcked; Receiver: LastByteRead, LastByteRcvd

 30. Which of the statements below about HTTP is in?

Select one:
 a. Compared to using a persistent connection,   a non-persistent connection  leads to more round trips between the client and server
 b.  Cookies are used to maintain state at sender/receiver over multiple connections
 c. If HTTP Version 1.1  is used,  connections between client and server are   non-persistent by default
 d.  HTTP is basically a stateless protocol where the Web server does not maintain information about past requests from a client

Feedback
The  answer is: If HTTP Version 1.1  is used,  connections between client and server are   non-persistent by default


No comments:

Post a Comment

Featured post

Freecharge Recharge Hack Trick 100% Cashback