1.
_________ is the transmission mechanism used by TCP/IP.
Correct Answer
A. IP
Explanation
IP (Internet Protocol) is the transmission mechanism used by TCP/IP. TCP/IP is a suite of protocols that enables communication between devices over the internet. IP is responsible for routing and addressing packets of data across networks. It ensures that data is delivered to the correct destination by assigning unique IP addresses to each device and using routing protocols to determine the most efficient path for data transmission. TCP (Transmission Control Protocol) is built on top of IP and provides reliable, connection-oriented communication between devices.
2.
__________ layer in TCP/IP is combined of session, presentation and application layers in the OSI model.
Correct Answer
A. Application
Explanation
The correct answer is "Application." In the TCP/IP model, the Application layer combines the functionality of the Session, Presentation, and Application layers in the OSI model. This layer is responsible for providing high-level protocols and interfaces for applications to communicate over the network. It handles tasks such as data formatting, encryption, and session management.
3.
IP transports data in packets called as _______
Correct Answer
A. Datagrams
Explanation
IP transports data in packets called datagrams. A datagram is a self-contained unit of data that includes the source and destination IP addresses, as well as the actual data being transmitted. These datagrams are sent over IP networks and are responsible for delivering the data from the source to the destination.
4.
_________ addresses change from hop to hop.
Correct Answer
A. Physical
Explanation
The term "physical" refers to the actual hardware components and physical connections involved in the network. As data travels from one hop to another in a network, it passes through different physical devices and connections. Therefore, the correct answer is "physical" as it addresses the change that occurs at each hop in terms of the hardware and physical connections.
5.
In __________, a network is divided into several smaller subnetworks.
Correct Answer
A. Subnetting
Explanation
Subnetting is the process of dividing a network into smaller subnetworks, allowing for more efficient use of IP addresses and better network management. By dividing the network into subnets, it becomes easier to control network traffic, manage security, and improve overall network performance. Subnetting helps in organizing and optimizing the network infrastructure, making it a crucial aspect of network design and administration.
6.
________ mask is the reverse of a subnet mask.
Correct Answer
A. Supernet
Explanation
A supernet mask is the reverse of a subnet mask because it is used to combine multiple smaller subnets into a larger network. It is a method of aggregating IP addresses to reduce the number of routing table entries. Instead of dividing a network into smaller subnets with a subnet mask, a supernet mask combines multiple subnets into a single larger network. This allows for more efficient routing and reduces the size of the routing table.
7.
In _________ addressing, the whole address is divided into variable length blocks.
Correct Answer
A. Classless
Explanation
Classless addressing is a type of addressing scheme where the whole address is divided into variable length blocks. Unlike classful addressing, which divides the address into fixed length blocks, classless addressing allows for more flexibility in assigning addresses. This means that the blocks can be of different sizes, allowing for efficient allocation of IP addresses and better utilization of address space. Classless addressing is commonly used in modern networks, as it allows for more efficient routing and subnetting.
8.
_________ is the delivery mechanism used by the TCP/IP protocol.
Correct Answer
A. IPv4
Explanation
The TCP/IP protocol uses IPv4 as its delivery mechanism. IPv4 is the fourth version of the Internet Protocol and is widely used for identifying and routing network traffic on the internet. It uses a 32-bit addressing system, allowing for approximately 4.3 billion unique addresses. TCP/IP relies on IPv4 to deliver data packets across networks, ensuring that they reach their intended destinations.
9.
_____________ is used by the source to predetermine a route for the datagram as it travels through the internet.
Correct Answer
A. Strict source route
Explanation
Strict source route is used by the source to predetermine a route for the datagram as it travels through the internet. In a strict source route, the source specifies the exact sequence of intermediate routers that the datagram should pass through. This allows the source to have full control over the path that the datagram takes, ensuring that it follows a specific predetermined route. This can be useful in certain situations where the source wants to avoid certain routers or take a specific path for security or performance reasons.
10.
_________ is used to record the time of datagram processing by a router.
Correct Answer
A. Timestamp
Explanation
A timestamp is used to record the time of datagram processing by a router. A timestamp is a record of the exact time when an event occurred. In the context of a router, it is used to keep track of the time it takes for a datagram (a unit of data) to be processed. This information can be useful for network administrators to analyze and optimize the performance of the router.
11.
The unit of communication in TCP/IP at physical layer is ______
Correct Answer
A. Bit
Explanation
The unit of communication in TCP/IP at the physical layer is a bit. A bit is the smallest unit of data in a computer and is represented as either a 0 or a 1. In TCP/IP, data is transmitted over a network in the form of bits, which are then grouped into larger units such as bytes, frames, or segments at higher layers of the protocol stack. However, at the physical layer, the data is transmitted as individual bits over the physical medium.
12.
Error detection method used by the TCP/IP protocol is called __________.
Correct Answer
A. Checksum
Explanation
The error detection method used by the TCP/IP protocol is called checksum. This method involves calculating a numerical value based on the data being transmitted and appending it to the data. When the data is received, the receiver recalculates the checksum and compares it to the transmitted value. If they match, it indicates that the data was received without errors. If they don't match, it suggests that errors may have occurred during transmission. Therefore, the checksum is an important mechanism for ensuring data integrity in TCP/IP communication.
13.
______________ does not change the contents of the packet.
Correct Answer
A. Packet sniffing
Explanation
Packet sniffing refers to the act of intercepting and analyzing network traffic. It allows an individual to capture and view the contents of packets being transmitted over a network. However, packet sniffing itself does not alter or modify the contents of the packets. It is purely a passive activity that involves monitoring and observing network traffic for various purposes such as network troubleshooting, security analysis, or performance monitoring.
14.
_____________ guarantees that the packet is not modified during the transmission.
Correct Answer
A. Data Integrity
Explanation
Data integrity ensures that the packet remains unchanged during transmission. This means that the data in the packet, including its content and structure, remains intact and has not been altered or corrupted in any way. Data integrity is crucial for maintaining the accuracy and reliability of the transmitted data, ensuring that it can be trusted and used effectively by the recipient.
15.
________ table used by the fragmentation module to find the MTU interface.
Correct Answer
A. MTU
Explanation
The correct answer is "MTU" because the question is asking for the table used by the fragmentation module to find the MTU interface. MTU stands for Maximum Transmission Unit, which refers to the largest size of a packet that can be transmitted over a network. Therefore, it makes sense that the fragmentation module would use a table specifically dedicated to MTU values in order to determine the appropriate interface for packet transmission.
16.
___________ is used by the forwarding module to determine the next hop address of the packet.
Correct Answer
A. Routing table
Explanation
The forwarding module uses the routing table to determine the next hop address of the packet. The routing table contains information about the network topology and available paths, allowing the forwarding module to make informed decisions on how to route the packet towards its destination. By looking up the destination address in the routing table, the forwarding module can determine the appropriate next hop address to forward the packet to.
17.
________ stores the datagram coming from the data link layer.
Correct Answer
A. Input queue
Explanation
The correct answer is "Input queue" because the input queue is responsible for storing the datagrams that are received from the data link layer. This queue acts as a buffer, allowing the network device to temporarily hold incoming data until it can be processed by the network layer. The input queue ensures that the data is received in the correct order and can be efficiently processed by the network layer protocols.
18.
In _______ address packet is sent to the intended recipient.
Correct Answer
A. Unicast
Explanation
In unicast, the address packet is sent to the intended recipient. Unicast is a type of communication where a message is sent from one sender to one specific receiver. It is commonly used in most network communication scenarios, such as email, web browsing, and file transfers. Unlike multicast or broadcast, unicast ensures that the packet reaches only the intended recipient, making it suitable for private or personalized communication.
19.
In __________ each member of the group receives a copy.
Correct Answer
A. Multicasting
Explanation
In multicasting, each member of the group receives a copy of the data being transmitted. This is different from unicasting, where data is sent to a specific recipient, and tunneling, where data is encapsulated and sent through a virtual tunnel. Linking, on the other hand, refers to connecting different parts of a program or system. Therefore, multicasting is the most suitable option for the given statement as it implies the distribution of data to multiple recipients.
20.
_______________ is applied to notation if there are consecutive zeros only.
Correct Answer
A. Zero compression
Explanation
Zero compression is applied to notation if there are consecutive zeros only. This means that if there are multiple zeros in a row, they can be compressed or represented in a shorter form to save space or simplify the notation. This compression technique is commonly used in data storage and transmission to reduce the size of files or messages.
21.
Physical address is also known as ______ address.
Correct Answer
A. Link
Explanation
Physical address is also known as a link address. This is because the physical address, also known as the MAC (Media Access Control) address, is used to uniquely identify network devices at the data link layer of the OSI model. The physical address is assigned to the network interface card (NIC) of each device and is used for communication within a local area network (LAN).
22.
_________________ is address of 96 bits of zero followed by 32 bits of IPv4 address.
Correct Answer
A. Compatible address
Explanation
A compatible address is an address that consists of 96 bits of zero followed by 32 bits of IPv4 address. This address format is used in IPv6 to represent IPv4 addresses. It allows IPv4 and IPv6 networks to coexist and communicate with each other. By using a compatible address, IPv4 addresses can be embedded within IPv6 addresses, facilitating the transition from IPv4 to IPv6.
23.
The first _____ bits of a global unicast address are called global routing prefix.
Correct Answer
A. 48
Explanation
The first 48 bits of a global unicast address are called global routing prefix. This prefix is used to identify the network portion of the address and is assigned by the Internet Assigned Numbers Authority (IANA). The remaining bits in the address are used to identify the host within the network.
24.
IPv6 is also known as _____
Correct Answer
A. IPng
Explanation
IPv6, also known as IPng, stands for Internet Protocol next generation. It is the successor to IPv4 and was designed to address the limitations of IPv4, such as the depletion of available IP addresses. IPv6 provides a larger address space, improved security features, and better support for mobile devices and emerging technologies. The term IPng is commonly used to refer to IPv6 as it represents the next generation of the Internet Protocol.
25.
_______________ is used when two computers using IPv6 want to communicate with each other and packet must pass through a region that uses IPv4.
Correct Answer
A. Tunneling
Explanation
Tunneling is used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4. Tunneling encapsulates the IPv6 packet within an IPv4 packet, allowing it to travel through the IPv4 network. This ensures that the packet can reach its destination by going through the IPv4 region and then being decapsulated back into IPv6 at the receiving end.
26.
Communication at the network layer is __________
Correct Answer
A. End to end
Explanation
Communication at the network layer is end to end. This means that the communication between the source and destination nodes is established and maintained throughout the entire network, regardless of the number of hops or intermediate nodes. The network layer is responsible for routing and forwarding packets across different networks, ensuring that the packets reach their intended destination. Therefore, the communication at this layer is not limited to a specific node or hop, but rather spans the entire network from the source to the destination.
27.
________ layer is responsible for the source to destination delivery of a packet.
Correct Answer
A. Network
Explanation
The network layer is responsible for the source to destination delivery of a packet. It is responsible for routing the packets through different networks and ensuring that they reach their intended destination. This layer adds the necessary addressing and routing information to the packet headers, allowing them to be properly transmitted across the network. The network layer also handles any necessary fragmentation and reassembly of packets, ensuring that they can be successfully delivered to the destination.
28.
_____________ layer is responsible for translation, compression and encryption.
Correct Answer
A. Presentation
Explanation
The presentation layer is responsible for translating, compressing, and encrypting data. It ensures that the data format used by the application layer is understood by the receiving device. It also handles data compression to reduce the amount of data that needs to be transmitted. Additionally, the presentation layer provides encryption services to secure the data being transmitted, protecting it from unauthorized access or tampering.
29.
__________ layer is responsible for dialog control and synchronization.
Correct Answer
A. Session
Explanation
The session layer is responsible for dialog control and synchronization. It establishes, maintains, and terminates connections between two communicating hosts. It also handles the coordination and synchronization of data exchange, ensuring that the data is delivered in the correct order and without errors. The session layer is responsible for managing sessions and providing services such as session establishment, session maintenance, and session termination.
30.
In the ____________ mode two devices can send and receive but not at the same time.
Correct Answer
A. Half duplex
Explanation
In half duplex mode, two devices can send and receive data, but not simultaneously. This means that one device can transmit data while the other device can only receive it, and vice versa. The communication between the two devices is not bidirectional at the same time, but rather switches between transmitting and receiving. This mode is commonly used in situations where simultaneous communication is not required or feasible, such as walkie-talkies or traditional landline telephones.
31.
_____________ layer divides the stream of bits into frames.
Correct Answer
A. Data link
Explanation
The data link layer is responsible for dividing the stream of bits into frames. This layer adds a header and a trailer to the data, creating a frame that can be transmitted over the network. By dividing the data into frames, the data link layer ensures that each frame can be individually transmitted and received, allowing for efficient and reliable data transfer.
32.
In ___________ topology every device is on a common link.
Correct Answer
A. Bus
Explanation
In a bus topology, every device is connected to a common link called a bus. This means that all devices share the same communication medium, and data is transmitted in a linear fashion from one device to another. Each device on the bus receives all transmitted data, but only the intended recipient processes it. This topology is relatively simple and inexpensive to set up, making it suitable for small networks. However, if the bus link fails, the entire network can be affected.
33.
________________ is achieved through a trailer which is added to the end of the frame.
Correct Answer
A. Error control
Explanation
Error control is achieved through a trailer which is added to the end of the frame. This trailer contains error detection codes or checksums that allow the receiver to verify the integrity of the data. By checking the trailer, the receiver can detect if any errors occurred during transmission and request for retransmission if necessary. This ensures that the data is delivered accurately and any errors are controlled.
34.
A technology which provide the mapping between private and universal addresses and supports virtual network is known as _______
Correct Answer
A. NAT
Explanation
NAT, which stands for Network Address Translation, is a technology that enables the mapping between private and universal addresses. It allows multiple devices within a private network to share a single public IP address. NAT also supports virtual networks by providing a way to translate IP addresses between different network domains. This technology is commonly used in home and office networks to allow multiple devices to access the internet using a single public IP address.