Sdp9 From The Photos

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Daniyar
D
Daniyar
Community Contributor
Quizzes Created: 2 | Total Attempts: 963
| Attempts: 182 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1.
  1. The entire hostname has a maximum of ___________

Explanation

The correct answer is 255. In the domain name system (DNS), a hostname is a label assigned to a device connected to a computer network. The maximum length of a fully-qualified domain name (FQDN) is 255 characters, including the hostname and the domain name. This limit is imposed by the DNS protocol and ensures compatibility and efficient functioning of the system.

Submit
Please wait...
About This Quiz
Sdp9 From The Photos - Quiz

SDP9 from the photos explores key concepts in network communications, including packet delivery, network architecture, and data transfer methods. This quiz assesses understanding of fundamental internet technologies, enhancing... see moreskills relevant for IT and computer science fields. see less

2. Small piece of data sent from a website and stored on the users computer by the users web browser while the user is browsing

Explanation

Cookies are small pieces of data that are sent from a website and stored on the user's computer by the user's web browser while they are browsing. These cookies are used to remember information about the user, such as their preferences or login information, and are commonly used to enhance the browsing experience. By storing this data on the user's computer, websites can retrieve it later to personalize the user's experience or track their activities.

Submit
3. _______ is a repository of information linked together from points all over the world

Explanation

The answer "www" is correct because it stands for World Wide Web, which is a system of interconnected documents and other resources, linked by hyperlinks and URLs. It is a repository of information that is accessible from points all over the world.

Submit
4. Which of the following statements best describes the purpose of the SNMP protocol

Explanation

The correct answer explains that the purpose of the SNMP protocol is to gather data about network conditions and perform remote actions on managed devices. This means that SNMP allows for monitoring and managing network devices by collecting information and enabling remote control over them.

Submit
5. Andalyn says complete 48-bit MAC addresses are allocated to NIC manufacturers from the IEEE. Buster says the IEEE only assigns the first 24 bits to manufacturers. Carlos says the IEEE assigns only the last 24 bits to manufacturers.Who is correct?

Explanation

Buster is correct because the IEEE assigns the first 24 bits (the first 3 bytes) of a 48-bit MAC address to manufacturers. The remaining 24 bits (the last 3 bytes) are typically assigned by the manufacturers themselves to identify individual network interface cards (NICs). Therefore, Carlos is incorrect in stating that the IEEE assigns only the last 24 bits to manufacturers. Andalyn is also incorrect in stating that complete 48-bit MAC addresses are allocated to NIC manufacturers from the IEEE.

Submit
6. A single channel is shared by multiple signals by

Explanation

Multiplexing is the process of combining multiple signals into a single channel for transmission. It allows multiple signals to share the same channel by dividing the available bandwidth into smaller sub-channels, each carrying a different signal. This enables efficient utilization of the channel and increases the capacity for transmitting multiple signals simultaneously. Analog modulation and digital modulation are techniques used to modify the characteristics of a carrier signal to carry information, but they do not specifically address the sharing of a single channel by multiple signals. Therefore, the correct answer is multiplexing.

Submit
7. The size of the TCP RcvWindow never changes throughout the duration of the connection

Explanation

The size of the TCP RcvWindow can change throughout the duration of the connection. The TCP RcvWindow represents the amount of data that the receiver is willing to accept at any given time. It can be dynamically adjusted based on network conditions, congestion levels, and available buffer space on the receiver's side. Therefore, it is not fixed and can change during the connection.

Submit
8. How to understand the connection-oriented protocol?

Explanation

The correct answer explains that understanding the connection-oriented protocol means that before the client and server can start to send data to each other, they first need to handshake and establish a TCP connection. This handshake process ensures that both parties are ready and able to communicate effectively, creating a reliable and ordered transmission of data. By establishing a connection, the protocol ensures that data is sent and received in the correct order and without errors.

Submit
9. Network clients use well-known _______ numbers to contact well-defined network services. such as Telnet and DNS servers

Explanation

Network clients use well-known port numbers to contact well-defined network services. A port is a virtual endpoint for communication in an operating system. It allows multiple applications to use the network simultaneously by assigning a unique number to each application. Well-known port numbers are reserved for specific services such as Telnet and DNS servers. By using these port numbers, clients can establish a connection with the appropriate network service and communicate effectively.

Submit
10. An 802 11 frame includes

Explanation

An 802.11 frame includes four address fields, a sequence number field, and an acknowledgement field. This means that all of the mentioned fields are present in an 802.11 frame. The address fields are used to specify the source and destination MAC addresses. The sequence number field is used for reliable data transmission and to detect and discard duplicate frames. The acknowledgement field is used to confirm the successful reception of a frame. Therefore, all of these fields are included in an 802.11 frame.

Submit
11. Small piece of data sent from a website and stored in the user's web browser while the user is browsing

Explanation

Cookies are small pieces of data that are sent from a website and stored in the user's web browser while the user is browsing. They are used to track and remember user preferences, store login information, and provide personalized experiences. Cookies are commonly used by websites to enhance user experience and improve website functionality.

Submit
12. In IPv4 protocol, each datagram is handled

Explanation

In IPv4 protocol, each datagram is handled independently. This means that each datagram, or packet of data, is treated as a separate entity and is processed individually. This allows for efficient routing and delivery of data across the network, as each packet can take its own path and be processed separately from others. Handling packets independently also ensures that if there is an issue with one packet, it does not affect the processing of other packets, improving overall network reliability and performance.

Submit
13. Communication between a computer and a keyboard involves ______________ transmission

Explanation

The correct answer is "Single direction" because communication between a computer and a keyboard is typically one-way. The keyboard sends input signals to the computer, but the computer does not send any signals back to the keyboard. This makes it a single direction transmission.

Submit
14. FTP uses ____ parallel TCP connections to transfer a file

Explanation

FTP uses 2 parallel TCP connections to transfer a file. One connection is used for control information and the other connection is used for data transfer. The control connection is responsible for sending commands and receiving responses, while the data connection is used to transfer the actual file data. This separation allows for efficient and reliable file transfers.

Submit
15. Which of the following is most likely to be a MAC address assigned to a NIC?

Explanation

The MAC address is a unique identifier assigned to a network interface card (NIC). It consists of six pairs of hexadecimal digits separated by colons or hyphens. The given option "23.4f.17.8a.4c.10" follows this format and is therefore most likely to be a MAC address assigned to a NIC. The other options are IP addresses or phone numbers, which do not match the format of a MAC address.

Submit
16. Local DNS name servers

Explanation

Local DNS name servers cache resource records to improve the efficiency of DNS lookups. By storing recently accessed resource records, the name server can quickly respond to subsequent requests for the same information without having to query external DNS servers. However, to ensure the accuracy and timeliness of the information, these cached records are discarded after a certain period of time, typically a few days. This allows the name server to periodically update its cache with fresh information from authoritative DNS servers.

Submit
17. An 802.11 frame includes

Explanation

An 802.11 frame includes a sequence number field, an acknowledgement field, and four address fields. The sequence number field is used to keep track of the order of frames being transmitted. The acknowledgement field is used to confirm that a frame has been successfully received. The four address fields are used to specify the source and destination addresses of the frame. Therefore, all of the options mentioned in the question are correct.

Submit
18. How much data can a typical frame contain?

Explanation

A typical frame can contain up to 1500 bytes of data. This refers to the maximum amount of information that can be transmitted within a single frame in a network communication system. Frames are used to package data for transmission over a network, and the size of a frame determines the amount of data that can be sent at once. In this case, 1500 bytes is the correct answer as it represents the typical maximum capacity of a frame.

Submit
19.
  1. FTP uses _ parallel TCP connection to transfer

Explanation

FTP uses 2 parallel TCP connections to transfer data. One connection is used for control information, such as commands and responses, while the other connection is used for the actual data transfer. This allows for efficient and reliable transfer of files over the network.

Submit
20. The internet protocol defines the __ layer of the Internet protocol stack

Explanation

The internet protocol defines the network layer of the Internet protocol stack. This layer is responsible for routing and forwarding data packets across different networks. It ensures that data packets are delivered to the correct destination by using logical addresses and establishing connections between different networks. The network layer also handles congestion control and error handling.

Submit
21.
  1. Suppose a client sends an HTTP request message with the If-modified-since: header. Suppose the object in a server has not 1changed since the last time a client retrieved the object. Then the server will send a response message with the status code

Explanation

When a client sends an HTTP request message with the If-modified-since header, it means that the client is requesting a resource only if it has been modified since a certain date. In this scenario, the object on the server has not changed since the last time the client retrieved it. Therefore, the server will send a response message with the status code 304 Not Modified. This status code indicates that the requested resource has not been modified and the client can use its cached version without downloading it again.

Submit
22. How much data can a typical frame contain?

Explanation

A typical frame can contain a maximum of 1500 bytes of data. This is a common limit set by network protocols like Ethernet. Frames are used to transmit data over a network, and the size of the frame determines the amount of data that can be sent in a single transmission. The 1500-byte limit helps to ensure efficient and reliable data transfer by balancing the amount of data that can be sent in each frame with the overhead required for addressing and error checking.

Submit
23. Ethernet provides which of the following services to the network layer

Explanation

Ethernet provides error detection to the network layer. Error detection is a service provided by Ethernet to ensure that data transmitted over the network is received without any errors. This is done by using techniques such as checksums or cyclic redundancy checks (CRC) to detect any errors in the data. By providing error detection, Ethernet helps to ensure the integrity and reliability of data transmission in the network.

Submit
24. Link layer data is

Explanation

The correct answer is "frame" because in the link layer of the network protocol stack, data is divided into frames. Frames contain both the payload (data) and control information necessary for transmitting the data over the physical network. Frames are used to ensure reliable and efficient transmission of data between network devices.

Submit
25. For BitTorrent, which of the following is true:

Explanation

BitTorrent is a peer-to-peer file sharing protocol where peers exchange chunks of a file. The first statement is true because peers prioritize requesting chunks that are rare in the torrent to increase availability. The second statement is true because BitTorrent allows for reciprocal uploading, where a peer can upload to another peer even if they are not receiving anything in return. The third statement is true because although a peer can have multiple TCP connections, it typically sends data to only a subset of those connections at any given time. Therefore, all of the statements are true.

Submit
26. Packets sent by two stations in 802.11 can collide because

Explanation

The correct answer is "All of the above". This means that all of the given options can lead to packet collision in 802.11. When the random backoff values of two stations are the same, they may attempt to transmit at the same time, resulting in a collision. Similarly, if the packets are sent to different Access Points (APs) but on the same channel, they can interfere with each other and collide. Additionally, if the two stations are hidden from each other, they may not be able to detect each other's transmissions and collide.

Submit
27.
  1. Andalyn says complete 48-bit MAC addresses are allocated to NIC manufacturers from the IEEE. Buster says the IEEE only assigns the first 24 bits to manufacturers. Carlos says the IEEE assigns only the last 24 bits to manufacturers. Who is correct?

Explanation

Buster is correct because the IEEE assigns the first 24 bits, also known as the Organizationally Unique Identifier (OUI), to manufacturers. The remaining 24 bits are assigned by the manufacturers themselves to create unique MAC addresses for their network interface cards (NICs). Therefore, Carlos is incorrect in stating that the IEEE assigns only the last 24 bits to manufacturers. Andalyn is also incorrect in stating that complete 48-bit MAC addresses are allocated to NIC manufacturers by the IEEE.

Submit
28. A beacon frame sent by an AP includes:

Explanation

A beacon frame is a type of management frame that is periodically broadcasted by an access point (AP) in a Wi-Fi network. It is used to announce the presence of the network and provide essential information to client devices. In this case, the correct answer is "both the AP's MAC address and SSID." This means that the beacon frame includes both the unique identifier (MAC address) of the AP and the network name (SSID) that clients can connect to. This information allows client devices to identify and join the appropriate network.

Submit
29. Suppose a client sends an HTTP request message with the if-modified-since: header. Suppose the object in a server has not changed since the last time a client retrieved the object. Then the server will send a response message with the status code

Explanation

When a client sends an HTTP request message with the if-modified-since header, it means that the client wants to retrieve the requested object only if it has been modified since the last time it was retrieved. In this scenario, if the object in the server has not changed, the server will send a response message with the status code 304 Not Modified. This indicates to the client that the requested object has not been modified and it can continue using the previously cached version.

Submit
30. The packet of information at the application layer is called __________

Explanation

The packet of information at the application layer is called a message. In networking, a message refers to a unit of data that is transmitted between applications. It contains the actual data that needs to be communicated and is typically generated by the application layer protocol. Messages are then broken down into smaller units called segments or packets at lower layers of the network stack for transmission over the network.

Submit
31. In a URL, the _______ is the full name of the file where the information is located

Explanation

The path in a URL refers to the full name of the file where the information is located. It specifies the specific location or directory within a website where the file is stored. The path is an essential component of a URL as it helps to identify the exact location of the file, allowing the web browser to retrieve and display the information correctly.

Submit
32. Three or more devices share a link in ___ connection

Explanation

In a multipoint connection, three or more devices share a single link. This means that multiple devices can communicate with each other simultaneously on the same link. This is in contrast to a point-to-point connection, where only two devices are connected and can communicate with each other. Unipoint and none are not valid terms for describing the type of connection.

Submit
33. For BitTorrent , which of the following is true

Explanation

All of the statements are true for BitTorrent. In BitTorrent, peers prioritize requesting chunks that are relatively rare in the torrent, which helps in distributing the load and ensuring availability of all chunks. Additionally, although a peer can have multiple concurrent TCP connections, it typically sends data to fewer than 10 other peers at any given instant of time. Lastly, in a peer-to-peer network like BitTorrent, it is possible for a peer A to upload data to a peer B even if peer B is not actively sending anything to peer A.

Submit
34. Time it takes for a small packet to travel from client to server and then back to the client

Explanation

RTT stands for Round Trip Time, which refers to the time it takes for a packet to travel from a client to a server and then back to the client. It is a measure of the latency or delay in the network. By calculating the RTT, network administrators can assess the performance of the network and identify any potential issues or bottlenecks.

Submit
35. Which of the following statements is (are) true of network protocols?\n I.A protocol is a set of rules that facilitate communication among network applications.\n II.Only a single protocol may govern any transmission

Explanation

The correct answer is "I only". This is because statement I is true, as a network protocol is indeed a set of rules that enable communication between network applications. However, statement II is false, as multiple protocols can govern a transmission depending on the specific requirements and technologies involved.

Submit
36. Which of the following IP header fields provide simple error detection?

Explanation

The checksum field in the IP header provides a simple error detection mechanism. It is used to verify the integrity of the IP packet during transmission. The sender calculates the checksum by performing a mathematical operation on the contents of the packet, and the receiver recalculates the checksum upon receiving the packet. If the calculated checksum does not match the one in the header, it indicates that the packet has been corrupted or modified during transmission. Therefore, the checksum field helps in detecting errors in the IP packet.

Submit
37. TCP applies fast retransmit to a segment when

Explanation

When TCP receives three ACKs for an earlier segment, it applies fast retransmit. This means that if the sender receives duplicate ACKs for a specific segment, it assumes that the next segment has been lost and immediately retransmits it without waiting for the timer to expire. This helps to improve the efficiency and speed of data transmission by reducing unnecessary delays caused by waiting for the timer to expire.

Submit
38. On a network, the term authentication typically refers to the process of

Explanation

Authentication is the process of verifying the identity of a sender or receiver on a network. It ensures that the person or device claiming to be the sender or receiver is actually who they say they are. This is important for security purposes, as it helps prevent unauthorized access and ensures that only trusted individuals or devices can access the network or communicate with each other. By verifying identities, authentication helps maintain the integrity and confidentiality of network communications.

Submit
39. Determine the correct class of the following IP address : 93.44.123.184

Explanation

The given IP address, 93.44.123.184, falls under Class A. In Class A, the first octet of the IP address is used to identify the network, while the remaining three octets are used to identify the host. Since the first octet of the given IP address is between 1 and 126, it falls within the range of Class A addresses.

Submit
40. How many ports can be per IP address

Explanation

The correct answer is 65,535. This is the maximum number of ports that can be associated with a single IP address. Ports are used to establish connections between devices on a network, and each IP address can have multiple ports available for communication. The range of available ports is from 0 to 65,535, with certain ports reserved for specific services or protocols. Therefore, 65,535 is the correct answer as it represents the total number of ports that can be assigned to a single IP address.

Submit
41. E-mails use ______________ protocol for sending messages

Explanation

SMTP stands for Simple Mail Transfer Protocol. It is the standard protocol used for sending emails over the internet. SMTP is responsible for the transmission of emails from the sender's email client to the recipient's email server. It uses a set of rules to ensure the reliable delivery of messages. Other protocols like FTP, HTTP, and MIME are not specifically designed for sending emails, making SMTP the correct answer.

Submit
42. How many ports can be per IP address

Explanation

The correct answer is 65.535. This is because the maximum number of ports that can be assigned to an IP address is 65,535. Ports are used to identify specific applications or services running on a device connected to a network. Each port is assigned a unique number between 0 and 65,535, allowing for a wide range of possible connections and services.

Submit
43. A packet with no data is sent from host A to host B on an otherwise idle network. The packet is found to have taken 35 milliseconds to reach B. The incremental overhead to send an additional byte (usually called the "throughput") is estimated to be five microseconds by repeatedly measuring the transmission times of long packets. Approximately, how long will an eight Kbytes (8192 bytes) packet take to reach B when sent from A?

Explanation

The given information states that the incremental overhead to send an additional byte is five microseconds. However, it does not provide any information about the transmission time for an eight Kbytes packet. Therefore, it cannot be determined from the given information how long an eight Kbytes packet will take to reach B when sent from A.

Submit
44. What is the type of an "8+1" parity code that outputs 100101011?

Explanation

The given code outputs a sequence of 9 bits, which includes 8 data bits and 1 parity bit. In odd parity, the number of 1s in the code (including the parity bit) should be odd. By counting the number of 1s in the given code, we can see that there are 5 ones. Since 5 is an odd number, the given code follows odd parity.

Submit
45.
  1. The password is sent to the server using _______ command.

Explanation

The password is sent to the server using the "PASS" command.

Submit
46. Consider the latency model for dynamic congestion windows. Which of the following components contribute to latency?

Explanation

All of the mentioned components contribute to latency in the latency model for dynamic congestion windows. The sum of all the stalled times refers to the time spent waiting for congested links to become available. Round trip time (RTT) is the time it takes for a packet to travel from the sender to the receiver and back. The transmission time of the object (O/R) refers to the time it takes to transmit the data object. Therefore, all of these components contribute to the overall latency in the dynamic congestion windows model.

Submit
47. Ethernet provides which of the following services to the network layer

Explanation

Ethernet provides error detection to the network layer. Error detection is a service that allows the network layer to identify and detect errors or corruption in the data being transmitted over the Ethernet network. This helps in ensuring the integrity of the data and allows for prompt error correction or retransmission if necessary.

Submit
48.
  1. Twisted-pair copper wire is no longer present in computer networks.

Explanation

The statement is false because twisted-pair copper wire is still widely used in computer networks. It is commonly used for Ethernet connections and provides a reliable and cost-effective means of transmitting data.

Submit
49. Wireless transmission can be done via

Explanation

Wireless transmission can be done through various means, including radio waves, microwaves, and infrared. These different methods of wireless transmission allow for communication and data transfer without the need for physical wires or cables. Radio waves are commonly used for long-distance communication, while microwaves are often used for shorter distances and higher data rates. Infrared is commonly used for short-range communication, such as remote controls. Therefore, all of the mentioned options are correct as they represent different forms of wireless transmission.

Submit
50. Which one of the following is an architecture paradigms?

Explanation

Both Peer-to-Peer and Client-Server are considered architecture paradigms. Peer-to-Peer architecture allows multiple devices to act as both clients and servers, enabling direct communication between them without the need for a central server. On the other hand, Client-Server architecture involves a central server that provides services to multiple clients. Therefore, both options are valid architecture paradigms.

Submit
51.
  1. When a UDP segment arrives to a host, in order to direct the segment to the appropriate socket, the OS uses

Explanation

When a UDP segment arrives at a host, the operating system (OS) uses the destination port number to direct the segment to the appropriate socket. The destination port number is a unique identifier that specifies which application or service on the host should receive the incoming segment. The source port number and source IP address are not used by the OS for this purpose. Therefore, the correct answer is the destination port number.

Submit
52. Which of the following nmap fields provide simple error detection ?

Explanation

The checksum field in nmap provides simple error detection. A checksum is a value calculated from a data packet to detect errors during transmission. It is used to ensure the integrity of the data by comparing the calculated checksum with the received checksum. If they match, it indicates that the data was transmitted without errors. Therefore, the checksum field in nmap serves as a means of error detection.

Submit
53. A channel partitioning has which of the following characteristics

Explanation

Channel partitioning refers to dividing the available communication channel into separate time slots or frequency bands. This technique ensures that transmitting nodes get the same amount of bandwidth, as each node is allocated a specific time slot or frequency band for communication. Channel partitioning also eliminates collisions, as each node operates in its designated slot or band, preventing interference with other nodes. Additionally, channel partitioning does not involve a master node, meaning that all nodes have equal control over the channel. Therefore, all the characteristics mentioned in the options are true for channel partitioning.

Submit
54.
  1. FTP is built on _____ architecture

Explanation

FTP (File Transfer Protocol) is built on a client-server architecture. In this architecture, the client initiates a connection with the server and sends requests for file transfers. The server, which is always online, responds to these requests by providing access to its file system and allowing the client to upload or download files. This client-server model allows for efficient and secure file transfers, as the server manages the resources and controls access to files while the client interacts with the server to perform the desired actions.

Submit
55. Internet has chosen datagram approach to switching in the

Explanation

The correct answer is Network Layer. The Network Layer is responsible for routing and forwarding data packets across different networks. It chooses the datagram approach to switching, which means that it breaks the data into small packets and sends them individually across the network. This approach allows for efficient and flexible routing of packets, as each packet can take a different path to reach its destination.

Submit
56. __________algorithm computes the least-cost path between source and destination using complete, global knowledge about the network.

Explanation

Global Routing algorithm computes the least-cost path between source and destination using complete, global knowledge about the network. This means that it takes into account the entire network topology and all available information about the network, such as link costs and congestion levels, to determine the best route. It considers the network as a whole and makes decisions based on the overall network state, rather than just local information. This allows it to find the most efficient path from the source to the destination, considering all possible options.

Submit
57. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?

Explanation

Telnet is the correct answer because it is a network protocol that allows a user to establish a remote connection to another site and then pass keystrokes from their local host to the remote host. Telnet provides a virtual terminal interface, enabling users to access and control remote computers as if they were directly connected to them. This makes it possible to execute commands, run programs, and perform various tasks on a remote machine from a local computer.

Submit
58. The TCP segment has a field in its header for RcvWindow

Explanation

The TCP segment does indeed have a field in its header for RcvWindow. This field is used to specify the size of the receive window, which is the amount of data that the sender can transmit before receiving an acknowledgment. The RcvWindow field allows for flow control in TCP, ensuring that the sender does not overwhelm the receiver with too much data at once.

Submit
59.
  1. The Internet received its name in the 1980s because:

Explanation

The correct answer is "it consisted of many interconnected networks." This explanation is supported by the fact that the Internet was originally developed as a network of interconnected computers and networks, allowing for communication and data sharing between different systems. This interconnected nature of the Internet is what eventually led to its widespread adoption and global reach. The other options provided in the question do not accurately reflect the true reason for the Internet's name.

Submit
60. The process that sends messages into, and receives messages from, the network through a software interface is called a socket

Explanation

A socket is a software interface that allows communication between a computer program and the network. It enables the program to send and receive messages over the network. Therefore, the statement that the process that sends and receives messages through a software interface is called a socket is true.

Submit
61. Pipelining requires which of the following

Explanation

Pipelining in networking requires all of the mentioned options. It involves transmitting multiple packets before receiving acknowledgements, which helps in improving efficiency and reducing latency. Unique sequence numbers for each in-transit packet are necessary to ensure reliable delivery and maintain order. Sender-side buffering of unacknowledged packets is also essential to handle the flow of data and prevent congestion. Therefore, all of these options are required for effective pipelining in networking.

Submit
62. Nmap is often used to:

Explanation

Nmap is a popular network scanning tool used to perform port scans over a range of ports at a target host. It helps in identifying open ports and services running on those ports, which can be useful for network administrators to ensure the security of their systems. By scanning a range of ports, Nmap can provide information about potential vulnerabilities and weaknesses that could be exploited by attackers. It is an essential tool for network reconnaissance and security testing purposes.

Submit
63. The _______ layer lies between the network layer and the application layer.

Explanation

The transport layer is the correct answer because it is the layer that lies between the network layer and the application layer. The transport layer is responsible for the reliable transmission of data between two hosts and provides services such as segmentation, flow control, and error recovery. It ensures that data is delivered in the correct order and without errors, making it an essential layer in the network communication process.

Submit
64.
  1. Header of datagram in IPv4 has

Explanation

The header of a datagram in IPv4 can have a variable length ranging from 20 to 60 bytes. This is because the header contains various fields such as the source and destination IP addresses, protocol information, and options. The minimum length of the header is 20 bytes, which includes the mandatory fields. However, additional options and extensions can increase the length up to a maximum of 60 bytes.

Submit
65. Determine the correct class of the following ip address: 93.44.123.184

Explanation

The given IP address, 93.44.123.184, falls under Class A of IP addresses. In Class A, the first octet ranges from 1 to 126, and the remaining three octets can vary. The given IP address starts with 93, which is within the range of 1 to 126, indicating that it belongs to Class A.

Submit
66. An IPv4 datagram can encapsulate data from several higher-level protocols such as UDP, ICMP, IGMP and

Explanation

An IPv4 datagram can encapsulate data from several higher-level protocols such as UDP, ICMP, IGMP, and TCP protocols. This means that when using IPv4, the data can be transmitted using any of these protocols depending on the specific requirements of the application. TCP protocols are commonly used for reliable and ordered transmission of data, making them suitable for applications such as web browsing, file transfer, and email.

Submit
67. If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is

Explanation

In a TCP connection, there is a separate connection established for each file transfer. Since there are 5 files being transferred from server A to client B, there will be 5 separate TCP connections established. Additionally, there will be an extra TCP connection for the initial session setup. Therefore, the total number of TCP connections between A and B is 6.

Submit
68. The physical layer is responsible for

Explanation

The physical layer is responsible for all of the mentioned tasks, including line coding, channel coding, and modulation. Line coding involves converting digital data into a specific format for transmission over a physical medium. Channel coding adds redundancy to the transmitted data to ensure error detection and correction. Modulation involves converting the digital signals into analog signals suitable for transmission over the physical medium. Therefore, all these tasks fall under the responsibility of the physical layer.

Submit
69. The transmission of high-quality, interactive voice and video over the current Internet is difficult because today's Internet

Explanation

The correct answer is that the current Internet is unable to guarantee minimum throughput or maximum latency for a given connection. This means that the Internet cannot ensure that a certain level of data transfer speed or delay will be maintained consistently during voice and video transmissions. This lack of guarantee can result in poor quality and interruptions in the transmission of high-quality, interactive voice and video over the Internet.

Submit
70.
  1. SMTP is used to

Explanation

SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol used to transfer email messages from one mail server to another. It is specifically designed for this purpose and ensures the reliable and efficient delivery of email messages across different servers. SMTP is not involved in transferring messages from a mail server to a user agent, nor does it define the format of message headers. Therefore, the correct answer is "to transfer messages from one mail server to another".

Submit
71. When a UDP segment arrives to a host, in order to direct the segment to the appropriate socket, the OS uses

Explanation

The correct answer is "the destination port number." When a UDP segment arrives at a host, the operating system (OS) uses the destination port number to direct the segment to the appropriate socket. The destination port number is a part of the UDP header and helps in identifying the specific application or process that should receive the incoming data. The source port number is used by the sending host to identify the application or process on its end, but it is not used by the OS to direct the segment to the appropriate socket. The source IP address is used for routing the segment to the correct host but not for directing it to the appropriate socket.

Submit
72. UDP has which of the following characteristics

Explanation

UDP (User Datagram Protocol) does not have a regulated send rate, as it does not provide any congestion control mechanisms. It also does not maintain a connection state at the server, as it is a connectionless protocol. Additionally, UDP does not require a three-way handshake for connection establishment, unlike TCP (Transmission Control Protocol). Therefore, the correct answer is "none of the above".

Submit
73. The housing a large number of hosts. is often used to create a powerful virtual server

Explanation

A data center is a facility that houses a large number of hosts, such as servers, storage devices, and networking equipment. It is designed to provide a secure and controlled environment for these hosts, ensuring their optimal performance and availability. By consolidating multiple hosts in a single location, a data center can create a powerful virtual server infrastructure that can handle high volumes of data processing and storage. Therefore, the statement "The housing a large number of hosts is often used to create a powerful virtual server" aligns with the concept of a data center.

Submit
74. There are transport service requirements, for which of the following applications these requirements are demanded: no data loss, elastic throughput, and not time sensitive

Explanation

E-mail is the correct answer because it meets the requirements of no data loss, elastic throughput, and not being time sensitive. E-mail messages can be sent and received without any loss of data, and the throughput can be adjusted based on the network capacity. Additionally, e-mails are not time sensitive as they can be delivered and read at any time, unlike real-time audio/video or text messaging. Games may require real-time interaction and can be time sensitive, making them unsuitable for the given requirements.

Submit
75.
  1. HTTP persistent connection - multiple objects can be sent over single TCP connection between client, server 

Explanation

HTTP persistent connection allows multiple objects to be sent over a single TCP connection between a client and a server. This means that after the initial request and response, subsequent requests and responses can be sent without the need to establish a new TCP connection each time. This helps to reduce the overhead of establishing and tearing down connections, improving the efficiency and performance of the communication between the client and server.

Submit
76.
  1. The packet of information at the application layer is called _____

Explanation

At the application layer, data is divided into smaller units called messages. These messages are then passed down to the lower layers for further processing and transmission. Therefore, the correct answer for the given question is "message".

Submit
77. Twisted-pair copper wire is no longer present in computer networks.

Explanation

The statement "Twisted-pair copper wire is no longer present in computer networks" is false. Twisted-pair copper wire is still widely used in computer networks for Ethernet connections. It is a common type of cable that consists of pairs of insulated copper wires twisted together to reduce electromagnetic interference. This type of cable is known for its reliability and cost-effectiveness, making it a popular choice for networking purposes.

Submit
78.
  1. The stop-and-wait protocol is highly inefficient when there is a

Explanation

The stop-and-wait protocol is highly inefficient when there is a large distance between source and destination and the transmission rate is high because it involves sending one packet at a time and waiting for an acknowledgment before sending the next packet. In a high transmission rate scenario, the time taken for the acknowledgment to reach the source becomes significant due to the large distance, resulting in a significant delay in the overall transmission process. This inefficiency can be mitigated by using other protocols like the sliding window protocol, which allows for the transmission of multiple packets before receiving an acknowledgment.

Submit
79.
  1. Streams are not needed in which of the following programs:

Explanation

Streams are not needed in a UDP server because UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee the delivery of packets or the order in which they are received. Unlike TCP (Transmission Control Protocol), UDP does not establish a connection with the client, so there is no need for continuous data streams. UDP servers simply receive and process individual datagrams as they arrive.

Submit
80. With SYN cookies, when a server receives a SYN segment, it returns a SYNACK with

Explanation

When a server receives a SYN segment, it generates a SYNACK with an initial sequence number that is a hash of the IP addresses and port numbers in the SYN segment, as well as other factors. This approach, known as SYN cookies, helps prevent certain types of denial-of-service (DoS) attacks, such as SYN flood attacks. By using a hash of the IP addresses and port numbers, the server can verify the legitimacy of the connection request without storing any additional state information. This allows the server to conserve resources and handle a larger number of connection requests efficiently.

Submit
81.
  1. FTP client contacts FTP server at port ______, using TCP

Explanation

The FTP client contacts the FTP server at port 21 using TCP. FTP (File Transfer Protocol) is a standard network protocol used for transferring files between a client and a server on a computer network. Port 21 is the default port for FTP connections, and it is used for establishing the initial connection between the client and the server. TCP (Transmission Control Protocol) is the protocol used for reliable and ordered delivery of data packets over a network connection.

Submit
82. Convert the following IP address: 158.0.147.85 to the binary

Explanation

The given IP address, 158.0.147.85, can be converted to binary by converting each octet separately. The first octet, 158, is equal to 10011110 in binary. The second octet, 0, is equal to 00000000 in binary. The third octet, 147, is equal to 10010011 in binary. And the fourth octet, 85, is equal to 01010101 in binary. Therefore, the binary representation of the IP address 158.0.147.85 is 10011110.00000000.10010011.01010101.

Submit
83. Which of the following protocols are essential to the existence of the Traceroute tool? IP 2. ICMP 3.TCP

Explanation

The Traceroute tool relies on the use of IP (Internet Protocol) and TCP (Transmission Control Protocol) protocols to function properly. ICMP (Internet Control Message Protocol) is not essential for the existence of Traceroute, as it is used for diagnostic and error reporting purposes rather than the actual functioning of the tool. Therefore, the correct answer is "I and III only."

Submit
84. Host A is sending host B a large file over a TCP connection. Assume host B has no data to send to A. Host B will not send acknowledgements to host A because host B cannot piggyback the acknowledgement on data.

Explanation

Host B will send acknowledgements to host A even if it does not have any data to send. This is because TCP requires acknowledgements to be sent for every segment received, regardless of whether or not there is data to piggyback the acknowledgement on.

Submit
85. A sender's data link layer uses "bit stuffing " to

Explanation

Bit stuffing is a technique used in data communication to avoid confusing data bits with control bits. It involves adding extra bits to the data stream to ensure that certain patterns, which may be misinterpreted as control bits, do not occur naturally. By inserting additional bits, the sender can ensure that the receiver can correctly distinguish between data and control bits, enhancing the reliability of the communication.

Submit
86. A browser will generate header lines as a function of:

Explanation

A browser generates header lines as a function of the browser type and version, the user configuration of the browser, and whether the browser has a cached version of the requested object. All of these factors contribute to the generation of header lines by the browser.

Submit
87. Determine the correct class of the following IP address: 160.23.244.224

Explanation

The given IP address, 160.23.244.224, falls under Class B. In Class B, the first two octets are used to identify the network, while the remaining two octets are used to identify the host. In this case, the first octet is 160, which falls within the range of 128-191, indicating a Class B network.

Submit
88.
  1. The transfer of an html file from one host to another is:

Explanation

The transfer of an HTML file from one host to another is considered loss-intolerant because any loss or corruption of the file during the transfer could result in a broken or incomplete webpage. Additionally, it is time-insensitive because the speed of the transfer does not affect the functionality or integrity of the HTML file.

Submit
89. Which of the following allows a host to be assigned an IP address automatically?

Explanation

The dynamic host configuration protocol (DHCP) allows a host to be assigned an IP address automatically. DHCP is a network management protocol that dynamically assigns IP addresses to devices on a network. It eliminates the need for manual IP address configuration, as the DHCP server automatically assigns and manages IP addresses for devices connected to the network. This simplifies network administration and ensures efficient allocation of IP addresses.

Submit
90. A channel partitioning protocol has which of the following characteristics:

Explanation

A channel partitioning protocol refers to a method of dividing a communication channel among multiple transmitting nodes. In this case, the given answer "all of the above" is correct. This implies that all the characteristics mentioned in the question are true for a channel partitioning protocol. Firstly, there is no master node, meaning that there is no central authority controlling the channel. Secondly, this protocol ensures that there are no collisions, where two or more nodes transmit data simultaneously and interfere with each other. Lastly, all transmitting nodes receive an equal amount of bandwidth, ensuring fairness in the allocation of resources.

Submit
91. In version field of IPv4 header, when machine is using some other version of IPv4 then datagram is

Explanation

When the version field of the IPv4 header indicates that the machine is using a different version of IPv4 than expected, the datagram is rejected. This means that the receiving machine does not process or forward the datagram, as it is not compatible with the expected version of IPv4.

Submit
92. When the data link layer applies "framing" to the data to be transmitted. it

Explanation

The data link layer enhances the data with extra data that allows the receiver to synchronize with the sender. This extra data includes control information such as sequence numbers, acknowledgments, and error detection codes. By including this additional information, the receiver can accurately receive and interpret the transmitted data, ensuring that both the sender and receiver are synchronized and can effectively communicate with each other.

Submit
93. E-mail is _________

Explanation

An elastic application refers to a software program or system that can dynamically allocate and deallocate resources based on demand. It can scale up or down its resource usage to efficiently handle varying workloads. In the context of email, an elastic application would be able to adapt to changing email traffic, allocating more resources during peak times and reducing resources during low traffic periods. This allows for optimal resource utilization and ensures that the email system remains responsive and efficient regardless of the workload.

Submit
94. Consider an HTTP Web server using persistent connections. Suppose the server spawns a separate process for each client that connects to the server. Then each of these spawned processes will have different server port numbers.

Explanation

False. In an HTTP Web server using persistent connections, the server does not spawn a separate process for each client. Instead, it maintains a pool of worker threads or processes that handle multiple client connections concurrently. Each client connection is assigned a unique socket, but the server port number remains the same for all connections.

Submit
95. How we call the delay, when packet waits to be transmitted onto the link

Explanation

Queuing delay refers to the delay experienced by a packet when it waits in a queue to be transmitted onto the link. This delay occurs when there are other packets already in the queue, and the packet has to wait for its turn to be transmitted. It is a result of congestion or limited resources in the network, causing packets to wait in a queue before they can be transmitted.

Submit
96. A router is installed to interconnect 4 subnetworks with MTUs of 1024, 2048, 576, and 1556 bytes respectively. Nodes A and B are connected to the first and second subnets, respectively. An application on node A sends a 4096-byte datagram (e.g., using UDP) to an application on node B. How many IP fragments will the router process as a result?

Explanation

The correct answer is 5. When the router receives the 4096-byte datagram from node A, it will need to fragment it into smaller packets to fit the MTUs of the subnetworks it is connecting. The largest MTU is 2048 bytes, so the router will need to divide the datagram into two fragments of 2048 bytes each. However, the next largest MTU is 1556 bytes, so the second fragment will need to be further divided into two fragments of 1556 bytes and 492 bytes. Therefore, the router will process a total of 5 IP fragments.

Submit
97. Dividing the network into smaller portions called

Explanation

Dividing a network into smaller portions is known as subnetting. Subnetting allows for better management and organization of network resources, as well as improved security and performance. By creating subnets, it becomes easier to allocate IP addresses and control network traffic within specific segments. Subnetting is achieved by using a subnet mask, which determines the network and host portions of an IP address.

Submit
98. Application layer data is

Explanation

The correct answer is "message" because in the application layer of the OSI model, data is referred to as a message. This layer is responsible for interacting with the end user and generating or receiving data that needs to be transmitted over the network. The data is then encapsulated into segments, frames, or datagrams at lower layers of the OSI model for transmission. However, at the application layer, the data is simply referred to as a message.

Submit
99. Below provided a typical HTTP response message. Let's take a careful look at this response message. It has three sections: an initial status line, six header lines, and then the entity body In this example, the status line.

Explanation

The correct answer indicates that the server is using HTTP/1.1 and that everything is OK. This is because the status line in an HTTP response message provides information about the status of the request. In this case, the status line indicates that the server is using the HTTP/1.1 protocol version and that the request was successful, with no errors or issues.

Submit
100. In order to maintain network stability while Transmission Control Protocol (TCP) probes for additional bandwidth, rate increases are______ and rate decreases are____

Explanation

When TCP probes for additional bandwidth, rate increases are additive, which means that the rate at which data is transmitted is gradually increased by adding a fixed amount of data. On the other hand, rate decreases are multiplicative, meaning that the rate at which data is transmitted is reduced by multiplying it by a fixed factor. This approach helps maintain network stability by gradually increasing the data rate and quickly reducing it when necessary.

Submit
101. On a network, the term authentication typically refers to the process of

Explanation

Authentication is the process of verifying the identity of a sender or receiver on a network. This involves confirming that the individual or device claiming to be a certain user or system is indeed who they say they are. It is important for security purposes to ensure that unauthorized users cannot gain access to sensitive information or perform malicious activities. By verifying identities, network administrators can control access to resources and ensure that only authorized users are granted permission to perform certain actions.

Submit
102. TCP applies fast retransmit to a segment when

Explanation

Fast retransmit is a mechanism used by TCP to quickly retransmit a lost segment without waiting for the retransmission timer to expire. It is triggered when the sender receives three duplicate acknowledgments (ACKs) for the same segment. This indicates that the receiver has received subsequent segments correctly but is still missing the one being acknowledged. Therefore, the sender assumes that the segment was lost and immediately retransmits it to avoid unnecessary delays in the data transmission.

Submit
103. For Ethernet, if an adapter determines that a frame it has just received is addressed to a different adapter

Explanation

When an Ethernet adapter receives a frame that is addressed to a different adapter, it simply discards the frame without sending an error message to the network layer. This is because Ethernet operates at the data link layer, and it is the responsibility of the network layer to handle addressing and routing. The adapter does not need to notify the network layer about the discarded frame as it is not relevant to its operation.

Submit
104.
  1. Host A is sending host B a large file over a TCP connection. Assume host B has no data to send to A. Host B will not send acknowledgements to host A because host B cannot piggyback the acknowledgement on data

Explanation

Host B will not send acknowledgements to host A because host B cannot piggyback the acknowledgement on data. This statement is false. In a TCP connection, host B is expected to send acknowledgements to host A to confirm the successful receipt of data. Piggybacking the acknowledgement on data is a common practice in TCP to optimize network efficiency. However, if host B has no data to send to host A, it can still send a standalone acknowledgement packet without any data.

Submit
105. A cookie is made by the ________ and eaten by the _______

Explanation

The correct answer is "Sever; server". In the context of computer networks, a cookie is a small piece of data that is created by the server and sent to the client's web browser. The client's web browser then stores the cookie and sends it back to the server with subsequent requests. Therefore, the cookie is made by the server (sever) and eaten (used) by the server.

Submit
106. Suppose host A sends host B one segment with sequence number 38 and 4 bytes of data. Then in this same segment the acknowledgement number is necessarily 42

Explanation

The statement is false because the acknowledgement number in a TCP segment represents the next expected sequence number, not the sequence number of the last received segment. In this case, since host A sends host B a segment with sequence number 38, the acknowledgement number should be 39, indicating that host B expects the next segment to have a sequence number of 39. Therefore, the correct answer is false.

Submit
107. What is the purpose of a presentation service?

Explanation

The purpose of a presentation service is to encode, transmit, and translate data from one machine-specific format to another. This means that it is responsible for converting data into a format that can be easily understood and displayed by different devices or systems. This service ensures that data can be effectively communicated and shared across various platforms and technologies.

Submit
108. Which of the following allows a host to be assigned an IP address automatically?

Explanation

The dynamic host configuration protocol (DHCP) allows a host to be assigned an IP address automatically. DHCP is a network protocol that enables a server to assign IP addresses to network devices dynamically. It eliminates the need for manual IP address configuration, making it easier to manage and maintain large networks. With DHCP, hosts can obtain IP addresses, subnet masks, default gateways, and other network configuration parameters automatically, simplifying the process of connecting devices to a network.

Submit
109.
  1. Define to which level of the network protocols are belong to:
Submit
110. Link  communication generally refers to data that is

Explanation

The correct answer is "sent from one host to several hosts simultaneously." Link communication refers to the transmission of data between multiple hosts, where one host sends information to multiple hosts at the same time. This type of communication allows for efficient sharing of information and can be seen in various network scenarios such as broadcasting or multicasting.

Submit
111. Typically the TCP port used by SMTP is

Explanation

SMTP (Simple Mail Transfer Protocol) is the standard protocol used for sending email messages between servers. It operates on TCP port 25 by default. Therefore, the correct answer is 25.

Submit
112. Ethernet (IEEE 802.3) is an example of

Explanation

Ethernet (IEEE 802.3) started as a de facto standard, meaning it was widely adopted and used in practice before being officially recognized as a de jure standard. This means that Ethernet was initially developed and implemented by various companies and organizations without any formal standardization process. However, due to its success and widespread adoption, it eventually became a recognized and formalized standard by the appropriate standards organizations.

Submit
113. To record Internet routers of IPv4, that handles datagram is responsibility of

Explanation

The responsibility of recording Internet routers of IPv4, that handles datagram, lies with the "Record Route" option. This option allows the source host to record the IP addresses of the routers that the datagram passes through on its way to the destination. This information can be useful for troubleshooting network issues and analyzing the path taken by the datagram.

Submit
114.
  1. Transport layer data is

Explanation

In computer networking, the transport layer is responsible for breaking down the data into smaller units called segments. These segments contain the necessary information to ensure reliable delivery of the data. The transport layer adds headers to the segments, including source and destination port numbers, to facilitate the communication between the sender and the receiver. Therefore, the correct answer is "segment."

Submit
115. Below provided a typical HTTP response message. Let's take a careful look at this response message <img src \= "@@PLUGINFILE@@/image00jpg" alt \= ""> What three sections has HTTP response message ?

Explanation

The HTTP response message consists of an initial status line, followed by six header lines, and then the entity body. The initial status line provides information about the status of the request, such as the HTTP version, status code, and status message. The header lines contain additional information about the response, such as content type, content length, and server information. Finally, the entity body contains the actual content of the response, such as HTML, text, or binary data.

Submit
116. The FDDI protocol is based on

Explanation

The FDDI protocol is based on the token ring protocol. FDDI, which stands for Fiber Distributed Data Interface, is a standard for transmitting data on optical fiber cables. It uses a token passing mechanism, similar to the token ring protocol, to control access to the network. In a token ring network, a token is passed from one device to another, allowing only the device holding the token to transmit data. This ensures fair and efficient access to the network. Therefore, the FDDI protocol is based on the token ring protocol.

Submit
117. Multicast communication generally refers to data that is

Explanation

Multicast communication refers to the process of sending data from one host to multiple hosts simultaneously. Unlike unicast communication, where data is sent from one host to another host, multicast allows for the efficient distribution of data to multiple recipients. This is commonly used in applications such as video streaming, online gaming, and audio conferencing, where the same data needs to be transmitted to multiple users at the same time.

Submit
118. The Date: header in the HTTP response message indicates when the object in the response was last modified.

Explanation

The Date: header in the HTTP response message does not indicate when the object in the response was last modified. Instead, the Last-Modified header is used for this purpose. The Date: header indicates the date and time when the response message was generated by the server.

Submit
119. How are routing paths calculated?

Explanation

Routing paths are calculated by routing algorithms. These algorithms analyze various factors such as network topology, available bandwidth, and congestion levels to determine the most efficient path for data packets to travel from the source to the destination. By considering these factors, routing algorithms can dynamically adjust the paths based on network conditions, ensuring optimal data transmission and minimizing delays or packet loss.

Submit
120. In asynchronous serial communication the physical layer provide

Explanation

In asynchronous serial communication, the physical layer provides both start and stop signaling and flow control. Start and stop signaling is used to indicate the beginning and end of a data frame, ensuring that the receiver can properly interpret the data. Flow control is used to manage the rate of data transmission between the sender and receiver, preventing data loss or overflow. Therefore, the correct answer is both start & stop signaling and flow control.

Submit
121. Set of rules that the sending of rules that the sending program must follow so that the Internet can deliver the data to the destination program is called.

Explanation

An Application Programming Interface (API) is a set of rules and protocols that govern the communication between software programs. In the context of the given question, an API ensures that the sending program follows the necessary rules for the Internet to successfully deliver data to the destination program. It provides a standardized way for different software components to interact and exchange information, enabling seamless communication and data transfer over the Internet.

Submit
122. To deliver a message to the correct application program running on a host, the _______ address must be consulted

Explanation

To deliver a message to the correct application program running on a host, the port address must be consulted. The port address is a numerical identifier that specifies a particular process or service on a host. It helps in directing the message to the correct application program, ensuring that it reaches the intended destination. The IP address identifies the host, while the MAC address is used for identifying the network interface card. Therefore, the port address is the most relevant in this context.

Submit
123. When a student in Hong Kong uses her computer to have a voice conversation with a teacher in Pittsburgh, the application she uses requires that the network deliver bits at a modest but constant bit rate. This is because, even though voice can be faithfully encoded in less than 64 Kbps, the late arrival of a voice sample produces a noticeable and unpleasant sound effect. Which of the following switching options will give you better quality?

Explanation

Circuit-switched networks establish a dedicated communication path between the sender and receiver for the duration of the conversation. This ensures a constant and reliable bit rate, which is important for voice conversations where late arrival of a voice sample can cause unpleasant sound effects. Packet-switched networks, on the other hand, divide the data into small packets that can be sent over different paths, leading to potential delays and variations in bit rate. Message-switched and space-switched networks are not commonly used for voice communication and may not provide the necessary constant bit rate required for high-quality voice conversations.

Submit
124.
  1. Which of the following IP header fields is designed to prevent a packet from remaining indefinitely in a routing loop?

Explanation

The Time to Live (TTL) field in the IP header is designed to prevent a packet from remaining indefinitely in a routing loop. It is a counter that is decremented by each router the packet passes through. If the TTL reaches zero, the packet is discarded, preventing it from continuously circulating in the network. This mechanism ensures that packets do not consume excessive network resources and helps to avoid routing loops.

Submit
125. In contrast to standards developed by traditional standards organizations like the International Telecommunications Union (ITU) or the International Standards Organization (ISO), standards developed by the Internet Engineering Task Force (IETF) can be

Explanation

Standards developed by the Internet Engineering Task Force (IETF) are extensively critiqued and modified by individuals, without requiring them to have special membership status. This means that anyone can participate in the development of these standards, providing their expertise and insights to improve them. Unlike traditional standards organizations, the IETF allows for a more open and inclusive process, encouraging collaboration and input from a wide range of individuals. This helps to ensure that the standards are thoroughly reviewed and refined before they are finalized and implemented.

Submit
126. In HTTP, the first line in a request message is called a _____ line; the first line in the response message is called the______ line

Explanation

The correct answer is "None". This is because the question is asking for the terms used to describe the first line in a request message and the first line in a response message in HTTP. However, "None" is not a valid term for either of these lines. The request line and the status line are the correct terms for the first lines in a request message and a response message, respectively.

Submit
127. The primary role of a router is to forward datagrams from input links to output links

Explanation

A router is a networking device that is responsible for directing data packets from one network to another. It examines the destination IP address of each packet and determines the best path for it to reach its destination. The router then forwards the packet to the appropriate output link, ensuring that it reaches the intended recipient. Therefore, the statement that the primary role of a router is to forward datagrams from input links to output links is true.

Submit
128. How does an operating system identify the application to which data coming in from the network should be relayed.

Explanation

An operating system identifies the application to which data coming in from the network should be relayed by the port number carried by the transport protocol. Each application is assigned a unique port number, and when data is received, the operating system checks the port number to determine which application should receive the data. This allows for proper routing and delivery of network data to the correct application.

Submit
129.
  1. Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination:

Explanation

In a connectionless communication network, packets are sent independently and do not follow a specific route or sequence. Therefore, it is possible for the packets to arrive at the destination in any order. Additionally, since the packets can traverse different routes, there is also a possibility that they may have taken different paths before reaching the destination. Thus, the correct answer is that the packets can arrive in any order, after possibly having traversed different routes.

Submit
130. Which of the following features of Ethernet has not remained constant since the advent of the technology?

Explanation

Transmission bandwidth refers to the amount of data that can be transmitted over a network in a given period of time. Since the advent of Ethernet technology, the transmission bandwidth has significantly increased. With advancements in technology, the capacity of Ethernet networks has improved, allowing for faster and more efficient data transmission. Therefore, the transmission bandwidth is the feature of Ethernet that has not remained constant over time.

Submit
131. Which of the following is the network-layer protocol of the Internet?

Explanation

IP (Internet Protocol) is the correct answer because it is the network-layer protocol of the Internet. IP is responsible for routing packets of data between different networks, allowing for communication and data transfer across the Internet. Ethernet is a data link layer protocol, Telnet is an application layer protocol, and HTTP is also an application layer protocol used for web communication.

Submit
132. In a broadcast-based network, longer propagation delays

Explanation

In a broadcast-based network, longer propagation delays significantly decrease the benefit of sensing the carrier before transmitting. This is because longer propagation delays mean that it takes more time for a signal to reach its destination. If the carrier sensing mechanism waits for the signal to reach its destination before transmitting, it will result in a significant delay in transmitting data. Therefore, the benefit of sensing the carrier before transmitting is diminished in the presence of longer propagation delays.

Submit
133. The protocols of the various layers are called ___________

Explanation

The correct answer is "protocol stack" because the protocols of the various layers in a network are organized in a stack-like structure, where each layer interacts with the layers above and below it. This allows for a modular and hierarchical approach to network communication, where each layer performs specific functions and passes data to the next layer in the stack. The term "protocol stack" accurately describes this arrangement of protocols in a layered system.

Submit
134. What is the purpose of the SNMP SetRequest message?

Explanation

The purpose of the SNMP SetRequest message is to allow a managing entity to set the values of one or more MIB objects in a managed device. This message enables the managing entity to remotely configure and control the managed device by modifying the values of the MIB objects. It provides a means for the managing entity to make changes and updates to the configuration and behavior of the managed device through SNMP.

Submit
135. Which of the following internet applications typically transmit(s) packets over Transmission Control Protocol (TCP)? I.FTP client II. Audio streaming III. Web browser

Explanation

FTP client and web browser typically transmit packets over TCP. FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, making it reliable and ensuring that all packets are delivered in the correct order. Similarly, web browsers use TCP to establish a connection with web servers and transmit HTTP requests and receive HTTP responses, ensuring the reliable delivery of data packets. Audio streaming, on the other hand, can use either TCP or UDP (User Datagram Protocol) depending on the specific application or streaming service.

Submit
136. Time needed to transmit L-bit packet into link = L (bits) / R (bits/sec)

Explanation

The given formula calculates the time needed to transmit an L-bit packet into a link. It is obtained by dividing the size of the packet (L bits) by the transmission rate (R bits/sec). This formula is used to determine the delay in transmitting a packet from the source to the destination. Therefore, the correct answer is "packet transmission delay."

Submit
137. HTTP non-persistent connection - multiple objects can be sent over single TCP connection between client, server

Explanation

The statement is false. In a non-persistent HTTP connection, only one object can be sent over a single TCP connection between the client and server. After the object is sent, the connection is closed, and a new connection needs to be established for sending another object. This is different from a persistent connection, where multiple objects can be sent over the same TCP connection without closing it.

Submit
138. Which of the following is a protocol used for communication between aa web server and a web browser?

Explanation

HTTP (Hypertext Transfer Protocol) is the correct answer because it is the protocol used for communication between a web server and a web browser. It allows for the transfer of hypertext, which includes text, images, links, and other multimedia content, over the Internet. HTTP is the foundation of data communication for the World Wide Web and enables the retrieval and display of web pages. FTP (File Transfer Protocol) is used for transferring files, Telnet is used for remote access to computers, and the World Wide Web (WWW) is the collection of web pages and websites accessible through the Internet.

Submit
139. With ADSL, each subscriber gets more downstream bandwidth than upstream bandwidth

Explanation

ADSL (Asymmetric Digital Subscriber Line) is a type of internet connection that provides unequal bandwidth for downloading and uploading data. In ADSL, the downstream bandwidth, which refers to the speed at which data is received from the internet, is higher than the upstream bandwidth, which is the speed at which data is sent to the internet. This is because most internet users tend to consume more data by downloading files, streaming videos, etc., rather than uploading large amounts of data. Therefore, the statement that each subscriber gets more downstream bandwidth than upstream bandwidth in ADSL is true.

Submit
140. The IP address space is organized in a hierarchy (I) to make the routing task more scalable, (II) to decrease inefficient fragmentation of the address space (III) to give institutions managing local-area networks autonomous control over the assignment of addresses to computers

Explanation

The IP address space is organized in a hierarchy to make the routing task more scalable. This means that the IP addresses are grouped and organized in a way that allows for efficient routing of data packets across the internet. Additionally, the hierarchy allows institutions managing local-area networks to have autonomous control over the assignment of addresses to computers within their network. This gives them the flexibility and control to manage their network's addressing needs. Therefore, the correct answer is I and III only.

Submit
141. Which of the following is a disadvantage of connection based protocols?

Explanation

Connection-based protocols require establishing a connection between the sender and receiver before data transmission can occur. This process incurs high startup costs, as it involves additional overhead and resources to establish and maintain the connection. These costs can include time, processing power, and network bandwidth. Therefore, high startup costs are a disadvantage of connection-based protocols.

Submit
142. How we call the link-layer packets ?

Explanation

Link-layer packets are called frames. In computer networking, a frame is a unit of data that is transmitted over a physical link or network. It contains the source and destination addresses, error checking information, and the actual data being transmitted. Frames are used in the link layer of the OSI model to encapsulate and transmit data between network devices.

Submit
143.
  1. What is the segment?

Explanation

The segment refers to a unit of data that is generated at the transport layer of the OSI model. This layer is responsible for ensuring reliable communication between the source and destination systems. The transport-layer packet contains the segment along with additional information such as source and destination port numbers. This packet is then encapsulated into a network-layer packet for further transmission across the network.

Submit
144. The throughput of a network link for an HTTP session is measured in two ways. Measurement A is the total amount of data received by the browser, divided by the duration of the session. Measurement B is the total amount of data received by the operating system on behalf of the browser, divided by the duration of the session. Which of the following statements about A and B is true?

Explanation

Measurement A calculates the throughput based on the total amount of data received by the browser, while Measurement B calculates the throughput based on the total amount of data received by the operating system on behalf of the browser. Since the operating system may receive additional data on behalf of the browser, Measurement B will generally be larger than Measurement A. Therefore, the statement "A is smaller than B" is true.

Submit
145. Layers four and five of the Internet protocol stack are implemented in the end systems but not in the routers in the network core.    

Explanation

Layers four and five of the Internet protocol stack, namely the transport layer and the session layer, are responsible for functions such as establishing and terminating connections, managing data flow, and providing error detection and correction. These layers are implemented in the end systems, such as computers and mobile devices, as they directly interact with the applications and users. On the other hand, routers in the network core are responsible for forwarding packets based on the information in the network layer (layer three) and do not need to implement layers four and five. Therefore, the statement that layers four and five are implemented in the end systems but not in the routers in the network core is true.

Submit
146. DNS resource record has Type\=MX

Explanation

The correct answer is "Value is the hostname of the mail server that has the alias hostname Name." This is because MX (Mail Exchanger) records are used to specify the mail server responsible for accepting email messages on behalf of a domain. The value in the MX record is the hostname of the mail server that should handle incoming mail for the specified domain.

Submit
147. A university has 20 computers in a laboratory that is currently served by several small 10 Base-T "Ethernet" hubs that are directly connected to each other. The network performance has been found to be lacking, and an upgrade is planned. The computers are identical and place a comparable load on the network that is relatively constant and modest for each computer (in the order of 500 Kbps). What would you suggest for the upgrade?

Explanation

Upgrading to a small 10 Base-T switch to connect the existing hub would be the best suggestion. This is because the current network performance is lacking and the computers in the laboratory place a modest and constant load on the network. By using a switch, the network can handle the load more efficiently and effectively, resulting in improved network performance. Replacing the hubs with 100 Base-T hub or 10 Base-T switches might be excessive for the modest load, and a new bank of dial-up modems would not be suitable for improving network performance in this scenario.

Submit
148. There are transport service requirements, for which of the following applications these requirements are demanded: no data loss, elastic throughput, and not time sensitive

Explanation

Web documents do not require real-time transmission, as they are not time-sensitive. They also do not require elastic throughput, as the amount of data transferred is typically small. Additionally, web documents do not involve real-time audio/video or interactive gaming, so there is no risk of data loss. Therefore, the transport service requirements of no data loss, elastic throughput, and not being time-sensitive are demanded for web documents.

Submit
149. Which of the following OSI layers converts the ones and zeroes to electrical signals and places these signals on the cable?

Explanation

The Physical layer of the OSI model is responsible for converting digital data into electrical signals and transmitting them over the physical medium, such as cables. It takes the ones and zeroes of the data and encodes them into a format that can be transmitted as electrical signals. Therefore, the Physical layer is the correct answer for this question.

Submit
150. IEEE standard ethernet CSMA/CD provides which of the following services to the network layer? reliable data transfer

Explanation

IEEE standard Ethernet CSMA/CD provides error detection services to the network layer. This means that it is capable of detecting errors that may occur during data transmission. However, it does not provide error correction or reliable data transfer services. Error detection is important as it allows the network layer to identify and handle any errors that may have occurred during the transmission process, ensuring the integrity of the data being transmitted.

Submit
151. Consider an application running on host cs.cmu.edu that wants to send a packet to host ee.cmu.edu. Assuming no information is cached, the send request on cs.cmu.edu will cause which of the following events to happen first?

Explanation

When the application running on host cs.cmu.edu wants to send a packet to host ee.cmu.edu, the first event that will happen is a DNS lookup. This is because the application needs to resolve the domain name (ee.cmu.edu) to an IP address before it can send the packet. The DNS lookup will query the DNS server to obtain the IP address associated with the domain name, allowing the application to establish a connection and send the packet.

Submit
152. Most packets use these as the inputs to the links. This means that the packet switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link

Explanation

Store and Forward is the correct answer because it refers to a packet-switching technique where the packet switch receives the entire packet before transmitting any part of it. This means that the switch stores the entire packet in its memory and checks for errors before forwarding it to the outbound link. This technique ensures reliable data transmission as it allows for error checking and correction before forwarding the packet. It also introduces queuing delays as the switch needs to wait for the entire packet to be received before transmitting it.

Submit
153. A forwarding table is

Explanation

A forwarding table is used to find the proper interface to which the input interface should forward a packet. It helps the router determine the next hop for a packet based on its destination IP address. The forwarding table is usually populated through routing protocol messages received by the router, which allows it to learn about the network topology and make informed forwarding decisions. The table is not configured using a centralized routing algorithm, as mentioned in option B, but rather it is dynamically updated based on the routing information received from neighboring routers.

Submit
154. Below provided a typical HTTP response message. Let's take a careful look at this response message. It has three sections: an initial status line , six header lines, and then the entity body <img src \= "@@PLUGINFILE@@/image002.jpg" alt \= ""> body is the meat of the message -it contains.

Explanation

The correct answer is the requested object itself (represented by data data data data data). This is because the entity body in an HTTP response message contains the actual content or data that was requested by the client. In this case, the entity body is represented by the text "data data data data data". The other sections of the response message, such as the status line and header lines, provide additional information about the response and the server, but the entity body is where the requested object is found.

Submit
155. This is the amount of time required to push all of the packet's bits into the link

Explanation

Transmission delay refers to the amount of time it takes to push all of the packet's bits into the link. It includes the time required to transmit the packet from the sender to the receiver over the physical medium. The transmission delay is influenced by factors such as the bandwidth of the link and the size of the packet.

Submit
156. Network layer data is

Explanation

In the network layer, data is divided into smaller units called datagrams. These datagrams contain the necessary information to route the data across different networks. Unlike frames or segments, which are specific to the data link and transport layers respectively, datagrams are specifically used in the network layer for efficient routing and delivery of data packets.

Submit
157. Which of the following network exploration tools can be used to determine information about possible paths between one network host and another?

Explanation

Traceroute is a network exploration tool that can be used to determine information about possible paths between one network host and another. It works by sending packets with increasing TTL (Time to Live) values and recording the IP addresses of the routers that the packets pass through. By analyzing the list of routers, the tool can provide information about the route taken by the packets, including the number of hops, the round-trip time, and any potential network congestion or failures along the way. This information can be useful for diagnosing network connectivity issues and optimizing network performance.

Submit
158. The MSS is the maximum size of a TCP segment including headers

Explanation

The MSS (Maximum Segment Size) is the largest amount of data that can be sent in a single TCP segment, excluding the TCP headers. The headers themselves do not contribute to the size of the segment. Therefore, the given statement that the MSS includes headers is incorrect.

Submit
159. Match the following
Submit
160. ____ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer

Explanation

UDP (User Datagram Protocol) is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. Unlike TCP, UDP does not provide reliable, ordered delivery of data or congestion control mechanisms. It is often used for applications that require low latency and are tolerant of packet loss, such as streaming media, online gaming, and DNS. UDP is a simpler and faster protocol compared to TCP, making it suitable for scenarios where speed is prioritized over reliability.

Submit
161. Link layer encapsulates datagrad in a

Explanation

The link layer encapsulates data in a frame. A frame is a unit of transmission that includes both the data being transmitted and control information. The link layer is responsible for transmitting data over a physical link and ensuring its reliable delivery. By encapsulating the data in a frame, the link layer adds necessary information such as source and destination addresses, error checking codes, and flow control mechanisms. This allows the data to be transmitted across the network and delivered to the correct destination.

Submit
162. Registered users may look up all meetings in their agenda in a given interval of time

Explanation

The given correct answer suggests that registered users have the capability to search for and retrieve information about all the meetings in their agenda within a specific time frame. This implies that the system allows users to access their scheduled meetings and view them based on a specified interval of time. The answer aligns with the other options provided, such as user registration, adding meetings, deleting meetings, and clearing meetings, as these functionalities are all related to managing and organizing meetings within the system.

Submit
163.
  1. Before sending a packet into a datagram network, the source must determine all of the links that packet will traverse between source and destination

Explanation

The statement is false because in a datagram network, the source does not need to determine all of the links that the packet will traverse between the source and destination. In a datagram network, each packet is treated independently and is routed individually based on the destination address. The network itself determines the best path for each packet, and the source does not have to have knowledge of the specific links or routing decisions made by the network.

Submit
164. ____________is a physical-layer device that acts on individual bits rather than frames

Explanation

A hub is a physical-layer device that acts on individual bits rather than frames. Hubs are simple devices that operate at the physical layer of the OSI model, and they simply repeat the incoming signal to all connected devices. They do not have the capability to analyze or interpret the data being transmitted, and therefore do not operate at the frame level. Hubs are often used to expand the number of available ports in a network, but they do not provide any intelligence or control over the network traffic.

Submit
165. Convert the following IP address: 192.224.224.15 to the binary

Explanation

The given IP address 192.224.224.15 is converted to binary as 11000000. 11100000. 11100000. 00001111. Each octet of the IP address is represented by 8 bits in binary form. The binary representation of the IP address is obtained by converting each decimal value in the IP address to its binary equivalent. In this case, 192 is converted to 11000000, 224 is converted to 11100000, 224 is converted to 11100000, and 15 is converted to 00001111.

Submit
166. The term packetization refers to the process of

Explanation

Packetization refers to the process of splitting a message into fragments for network transmission. This is done to efficiently transmit data over a network by breaking it into smaller packets. These packets can then be transmitted individually and reassembled at the receiving end to reconstruct the original message. This fragmentation allows for better utilization of network resources and ensures that data can be transmitted smoothly even in the presence of network congestion or errors.

Submit
167. Which of the following is an application layer service?

Explanation

All of the given options are application layer services. The application layer is the topmost layer of the OSI model and it provides services directly to the end-user. Remote log-in, mail service, and file transfer and access are all examples of services that operate at the application layer. These services allow users to remotely access systems, send and receive emails, and transfer files over a network. Therefore, the correct answer is "all".

Submit
168. __________provides full transport layer services to applications

Explanation

TCP (Transmission Control Protocol) provides full transport layer services to applications. TCP ensures reliable and ordered delivery of data packets between devices on a network. It establishes a connection-oriented communication between the sender and receiver, guaranteeing that all packets are received and in the correct order. TCP also handles flow control, congestion control, and error recovery, making it a reliable choice for applications that require these services.

Submit
169. Time for a small packet to travel from client to server and back

Explanation

RTT stands for Round Trip Time, which refers to the time it takes for a packet of data to travel from a client to a server and back again. It measures the total time it takes for the packet to make a round trip journey. This includes the time it takes for the packet to be transmitted from the client to the server, the processing time at the server, and the time it takes for the response to be transmitted back to the client. RTT is an important metric in network communication as it helps to assess the latency or delay in the network connection.

Submit
170. A corporate information systems manager is interested in collecting statistics on the frequency of computer failures within the organization. Most failures result in an automatic reboot, so the failed computer is typically back on the network in less than a minute. The corporate network connects 1,500 computers in far-flung locations to which the average latency of a packet is 40 milliseconds. The manager asks you to write a tool that will collect the times at which failures occurred in which computers. She wants it by tomorrow, so the tool will have to be simple. On which protocol will you base your implementation?

Explanation

The correct answer is SNMP (Simple Network Management Protocol). SNMP is commonly used for network management and monitoring. It allows for the collection and organization of information about network devices, such as computers, routers, and switches. In this scenario, the manager wants to collect statistics on the frequency of computer failures within the organization. SNMP can be used to monitor the status and performance of network devices, including detecting and reporting computer failures. It is a simple and efficient protocol for this purpose.

Submit
171. Network layer at source is responsible for creating a packet from data coming from another

Explanation

The network layer at the source is responsible for creating a packet from data coming from another protocol. This means that the network layer takes the data received from another protocol and organizes it into a packet format that can be transmitted over the network. The protocol is the set of rules and procedures that govern the communication between devices on a network. Therefore, the correct answer is protocol.

Submit
172. An ARP query packet is encapsulated in

Explanation

An ARP query packet is encapsulated in a link-layer broadcast frame. This is because an ARP query is used to find the MAC address of a specific IP address on the local network. Since the MAC address is needed to send a frame to a specific adapter, the ARP query is broadcasted to all devices on the network using a link-layer broadcast frame. This allows the sender to receive the MAC address of the device with the specified IP address.

Submit
173.
  1. The process that waits to be contacted to begin the session is the ______.(use lowercase)

Explanation

The process that waits to be contacted to begin the session is the server.

Submit
174. A difference between routers and switches is that

Explanation

Routers parse, process, and modify IP headers. This means that routers examine the IP headers of incoming packets, make decisions on how to forward the packets based on the destination IP address, and can modify the IP headers if necessary. This functionality allows routers to direct traffic between different networks and ensure that packets are delivered to the correct destination. Switches, on the other hand, do not perform these functions and are primarily used to connect devices within a local network.

Submit
175. At which of the following layers of the OSI protocol stack can the Internet Control Message Protocol be implement. 1Network, 2transport, 3Data link

Explanation

ICMP (Internet Control Message Protocol) is implemented at the network layer (Layer 3) of the OSI protocol stack. It is responsible for sending error messages and operational information related to IP (Internet Protocol) packets. ICMP messages are used by network devices to communicate network status and diagnostic information, such as ping requests and replies. Therefore, the correct answer is "I only" as ICMP can be implemented at the network layer.

Submit
176. Compared to the wired transmission, wireless transmission typically has _____ attenuation and _____ maximum distance

Explanation

Wireless transmission typically has higher attenuation compared to wired transmission. This means that the signal strength decreases more rapidly over distance in wireless transmission. However, wireless transmission also typically has a longer maximum distance compared to wired transmission. This means that the signal can travel over a greater distance in wireless transmission before it becomes too weak to be received effectively.

Submit
177. Which of the following best describes an IP address?

Explanation

An IP address is a unique identifier assigned to a network interface card (NIC) by software. It is represented in dotted decimal notation, which consists of four sets of numbers separated by periods. This notation allows for easier readability and understanding of the address. The IP address is not burned into the NIC, but rather assigned to it by software.

Submit
178. Find the FTP reply whose message is wrongly matched

Explanation

The FTP reply message "452 - Can't open data connection" is wrongly matched because this message is typically associated with the error "452 - Error writing file". The correct message for "Can't open data connection" is usually "425 - Can't open data connection".

Submit
179. Convert the following IP address: 93.44.123.184 to the binary

Explanation

To convert an IP address to binary, each octet is converted separately. In this case, the octets are 93, 44, 123, and 184. To convert 93 to binary, we divide it by 2 repeatedly and record the remainders. The binary representation of 93 is 01011101. Similarly, the binary representations of 44, 123, and 184 are 00101100, 01111011, and 10111000 respectively. Therefore, the given IP address 93.44.123.184 is represented in binary as 01011101.00101100.01111011.10111000.

Submit
180. Which of the following maps IP addresses onto datalink addresses?

Explanation

The Address Resolution Protocol (ARP) is responsible for mapping IP addresses onto datalink addresses. ARP allows devices on a network to discover and associate the MAC address (datalink address) of a device with its corresponding IP address. This mapping is necessary for devices to communicate with each other on a local network. SNMP is a protocol used for managing and monitoring network devices, CIDR is a method for allocating and routing IP addresses, and DNS is used for translating domain names into IP addresses. None of these protocols are specifically designed for mapping IP addresses onto datalink addresses.

Submit
181. The time required to examine the packet's header and determine where to direct the packet is part of the

Explanation

The time required to examine the packet's header and determine where to direct the packet is part of the processing delay. This delay occurs when the network device analyzes the packet's header information, such as source and destination addresses, to make decisions about routing and forwarding. It includes the time taken for the device to process the packet and make the necessary forwarding decisions before it can be transmitted to the next hop in the network.

Submit
182. CCT stands for

Explanation

CCT stands for Congestion Controlled Traffic. This means that it refers to a type of traffic or data transmission that is regulated or managed in order to prevent congestion or excessive traffic on a network or system. By controlling the flow of traffic, it helps to ensure that the network operates efficiently and effectively, minimizing delays and bottlenecks.

Submit
183. What is not a application layer protocol?

Explanation

TCP (Transmission Control Protocol) is not an application layer protocol. It is a transport layer protocol that provides reliable, connection-oriented communication between devices on a network. Application layer protocols, on the other hand, are responsible for specific functions required by applications, such as file transfer (FTP), email transfer (SMTP), and web browsing (HTTP). TCP is used by these application layer protocols to ensure the reliable delivery of data packets.

Submit
184. Which of the following can be used by a router to report a dropped packet to the packet's sender?

Explanation

ICMP is a network protocol that is used by routers and other network devices to send error messages and operational information. When a router drops a packet, it can use ICMP to send an error message, known as an ICMP error message, back to the packet's sender. This allows the sender to be notified about the dropped packet and take appropriate action if needed. SNMP, BGP, and DHCP are other network protocols, but they are not specifically designed for reporting dropped packets to the sender.

Submit
185. Computer networks that provide only a connection service at the network layer are called

Explanation

Virtual-circuit networks are computer networks that provide a connection service at the network layer. In this type of network, a virtual circuit is established between the sender and receiver before data transmission occurs. This virtual circuit guarantees the delivery of packets in the correct order and with minimal delay. Unlike datagram networks, which do not establish a pre-determined path for data transmission, virtual-circuit networks offer a more reliable and efficient communication service. Therefore, the correct answer for this question is virtual-circuit networks.

Submit
186. Application layer offers _______ service

Explanation

The application layer offers end to end service. This means that it provides services directly to the end users, ensuring that the communication between the sender and receiver is reliable and error-free. The application layer is responsible for tasks such as data formatting, encryption, and authentication, ensuring that the data is delivered accurately and securely. It also handles the processing of application-specific protocols and provides a user interface for interaction with the network.

Submit
187. Which layer of the TCP/IP model involves routing?

Explanation

The network layer of the TCP/IP model involves routing. This layer is responsible for the logical addressing and routing of data packets between different networks. It determines the most efficient path for data to travel from the source to the destination by using routing protocols and algorithms. Routing involves the process of selecting the best path for data transmission based on factors like network congestion, cost, and distance. Therefore, the network layer plays a crucial role in ensuring that data is properly routed across different networks in the TCP/IP model.

Submit
188. 331 Username OK , password required - status code refers to (protocol type)(OPEN QUESTION)

Explanation

The correct answer is FTP. The given status code "331 Username OK, password required" indicates that the protocol being referred to is FTP (File Transfer Protocol). This status code is typically used in FTP to inform the client that the username provided is valid and accepted, but a password is required to complete the authentication process. FTP is a standard network protocol used for transferring files between a client and a server on a computer network.

Submit
189. A specific CSMA-CD network such as 10-BASET "Ethernet

Explanation

The given answer states that a specific CSMA-CD network, such as 10-BASET Ethernet, suffers performance degradation as nodes are added. This means that as more nodes are added to the network, the overall performance of the network decreases. This could be due to increased collisions and congestion on the network as more nodes try to access the shared medium. Therefore, the more nodes that are added, the slower the network becomes.

Submit
190. A network entity that satisfies HTTP requests on the behalf of an origin Web server

Explanation

A proxy server is a network entity that acts as an intermediary between a client and an origin web server. It receives HTTP requests from the client and forwards them to the web server on behalf of the client. The proxy server then retrieves the requested resources from the web server and sends them back to the client. This helps in improving performance, security, and privacy by caching content, filtering requests, and hiding the client's IP address.

Submit
191. Two packets A and B are sent in that order through a connection-oriented communication network. They could  arrive at the destination .

Explanation

In a connection-oriented communication network, packets are sent in a specific order and follow a predetermined route. Therefore, the packets A and B can only arrive at the destination in the order A-B, after having traversed the same route. The other options are not possible because they either allow for different routes or any order of arrival, which is not characteristic of a connection-oriented network.

Submit
192. DNS provides a few other important services in addition to translating hostnames to IP addresses:

Explanation

DNS provides several important services in addition to translating hostnames to IP addresses. Host aliasing allows multiple hostnames to be associated with a single IP address, making it easier to manage and access different services on a single server. Mail server aliasing enables multiple email servers to be associated with a single domain, improving redundancy and load balancing for email delivery. Load distribution involves distributing network traffic across multiple servers to improve performance and prevent overload on a single server. These services enhance the efficiency, reliability, and scalability of network infrastructure.

Submit
193.
  1. All store-and-forward networks are:

Explanation

Store-and-forward networks are networks that receive and store the entire message or packet before forwarding it to the next node. This type of network is commonly used in packet or message switched networks, where data is divided into packets and transmitted separately. In contrast, broadcast networks transmit data to all nodes on the network simultaneously. Connection-based networks establish a dedicated connection between sender and receiver before transmitting data, while connectionless networks do not establish a dedicated connection and each packet is routed independently. Therefore, the correct answer is packet or message switched networks.

Submit
194. Identify the incorrect statement

Explanation

The incorrect statement is "FTP sends its control information in-band". In FTP, control information is sent out-of-band, meaning it is sent over a separate connection from the data connection. This allows for more efficient and reliable communication between the client and server.

Submit
195. Which of the following was designed to solve the problem of IP address space fragmentation?

Explanation

Classless Inter Domain Routing (CIDR) was designed to solve the problem of IP address space fragmentation. CIDR allows for more efficient allocation of IP addresses by allowing for the use of variable length subnet masks. This means that instead of having to allocate large blocks of IP addresses to networks, CIDR allows for more precise allocation of IP addresses, reducing wastage and fragmentation of the IP address space. By implementing CIDR, organizations can conserve IP address space and ensure more efficient routing of IP packets on the internet.

Submit
196. Which of the following statements are true about the TCP service model?

Explanation

TCP delivers a stream of bytes from one end to the other, reliably and in-sequence, on behalf of an application. This means that TCP ensures that the data sent from the sender is received by the receiver in the same order and without any errors. TCP achieves this by using acknowledgments, retransmissions, and sequencing mechanisms.

Submit
197. Each time an end system wants to send a packet, it stamps the packet with the address of the destination end system and then pops the packet into the network

Explanation

In a datagram network, each packet is individually addressed with the destination end system's address before being sent into the network. This means that each packet can take a different path through the network and arrive at the destination independently. This is in contrast to virtual-circuit networks, where a predetermined path is established for a series of packets. The given statement suggests that the packet is stamped with the destination address before entering the network, which aligns with the characteristics of a datagram network. Therefore, the correct answer is Datagram network.

Submit
198. Filtering in a firewall can be based on:

Explanation

Filtering in a firewall can be based on source and destination IP addresses. This means that the firewall can block or allow traffic based on the IP addresses of the source and destination of the network packets. By filtering based on IP addresses, the firewall can effectively control access to specific networks or hosts, providing an additional layer of security.

Submit
199. The 802.11 protocol does not implement collision detection because

Explanation

The correct answer is "it is costly to build wireless hardware that detects collisions" and "collision detection was found to be useless in wired Ethernet". The 802.11 protocol does not implement collision detection because it would be expensive to build wireless hardware that can accurately detect collisions in a wireless environment. Additionally, collision detection was already determined to be ineffective in wired Ethernet networks, so it is not implemented in the wireless protocol. Therefore, both reasons contribute to the decision of not including collision detection in the 802.11 protocol.

Submit
200. The network interface card of a Web server that you manage has developed sporadic problems. You measure the packet loss rate from your desktop computer and immediately decide to replace the network card. After this simple operation, the Web server successfully rejoins the network, as confirmed by your officemate using her desktop computer. You eagerly go to your desktop to measure the improvement, but find instead that the Web server is not responding to any of your packets. What is your diagnosis?

Explanation

The correct diagnosis is that the desktop computer is still trying to contact the server's old network card. This is indicated by the fact that the Web server successfully rejoins the network and is confirmed to be working by the officemate using her desktop computer. The lack of response from the Web server to the packets sent from the desktop computer suggests that the desktop computer is still attempting to communicate with the old network card, which is no longer in use.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 19, 2019
    Quiz Created by
    Daniyar
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The entire hostname has a maximum of ___________
Small piece of data sent from a website and stored on the users...
_______ is a repository of information linked together from points all...
Which of the following statements best describes the purpose of the...
Andalyn says complete 48-bit MAC addresses are allocated to NIC...
A single channel is shared by multiple signals by
The size of the TCP RcvWindow never changes throughout the duration of...
How to understand the connection-oriented protocol?
Network clients use well-known _______ numbers to contact well-defined...
An 802 11 frame includes
Small piece of data sent from a website and stored in the user's web...
In IPv4 protocol, each datagram is handled
Communication between a computer and a keyboard involves...
FTP uses ____ parallel TCP connections to transfer a file
Which of the following is most likely to be a MAC address assigned to...
Local DNS name servers
An 802.11 frame includes
How much data can a typical frame contain?
FTP uses _ parallel TCP connection to transfer
The internet protocol defines the __ layer of the Internet protocol...
Suppose a client sends an HTTP request message with the...
How much data can a typical frame contain?
Ethernet provides which of the following services to the network layer
Link layer data is
For BitTorrent, which of the following is true:
Packets sent by two stations in 802.11 can collide because
Andalyn says complete 48-bit MAC addresses are allocated to NIC...
A beacon frame sent by an AP includes:
Suppose a client sends an HTTP request message with the...
The packet of information at the application layer is called...
In a URL, the _______ is the full name of the file where the...
Three or more devices share a link in ___ connection
For BitTorrent , which of the following is true
Time it takes for a small packet to travel from client to server and...
Which of the following statements is (are) true of network...
Which of the following IP header fields provide simple error...
TCP applies fast retransmit to a segment when
On a network, the term authentication typically refers to the process...
Determine the correct class of the following IP address :...
How many ports can be per IP address
E-mails use ______________ protocol for sending messages
How many ports can be per IP address
A packet with no data is sent from host A to host B on an otherwise...
What is the type of an "8+1" parity code that outputs 100101011?
The password is sent to the server using _______ command.
Consider the latency model for dynamic congestion windows. Which of...
Ethernet provides which of the following services to the network layer
Twisted-pair copper wire is no longer present in computer networks.
Wireless transmission can be done via
Which one of the following is an architecture paradigms?
When a UDP segment arrives to a host, in order to direct the segment...
Which of the following nmap fields provide simple error detection ?
A channel partitioning has which of the following characteristics
FTP is built on _____ architecture
Internet has chosen datagram approach to switching in the
__________algorithm computes the least-cost path between source and...
Which one of the following allows a user at one site to establish a...
The TCP segment has a field in its header for RcvWindow
The Internet received its name in the 1980s because:
The process that sends messages into, and receives messages from, the...
Pipelining requires which of the following
Nmap is often used to:
The _______ layer lies between the network layer and the application...
Header of datagram in IPv4 has
Determine the correct class of the following ip address: 93.44.123.184
An IPv4 datagram can encapsulate data from several higher-level...
If 5 files are transferred from server A to client B in the same...
The physical layer is responsible for
The transmission of high-quality, interactive voice and video over the...
SMTP is used to
When a UDP segment arrives to a host, in order to direct the segment...
UDP has which of the following characteristics
The housing a large number of hosts. is often used to create a...
There are transport service requirements, for which of the following...
HTTP persistent connection - multiple objects can be sent over single...
The packet of information at the application layer is called _____
Twisted-pair copper wire is no longer present in computer networks.
The stop-and-wait protocol is highly inefficient when there is a
Streams are not needed in which of the following programs:
With SYN cookies, when a server receives a SYN segment, it returns a...
FTP client contacts FTP server at port ______, using TCP
Convert the following IP address: 158.0.147.85 to the binary
Which of the following protocols are essential to the existence of the...
Host A is sending host B a large file over a TCP connection. Assume...
A sender's data link layer uses "bit stuffing " to
A browser will generate header lines as a function of:
Determine the correct class of the following IP address:...
The transfer of an html file from one host to another is:
Which of the following allows a host to be assigned an IP address...
A channel partitioning protocol has which of the following...
In version field of IPv4 header, when machine is using some other...
When the data link layer applies "framing" to the data to be...
E-mail is _________
Consider an HTTP Web server using persistent connections. Suppose the...
How we call the delay, when packet waits to be transmitted onto the...
A router is installed to interconnect 4 subnetworks with MTUs of 1024,...
Dividing the network into smaller portions called
Application layer data is
Below provided a typical HTTP response message. Let's take a careful...
In order to maintain network stability while Transmission Control...
On a network, the term authentication typically refers to the process...
TCP applies fast retransmit to a segment when
For Ethernet, if an adapter determines that a frame it has just...
Host A is sending host B a large file over a TCP connection. Assume...
A cookie is made by the ________ and eaten by the _______
Suppose host A sends host B one segment with sequence number 38 and 4...
What is the purpose of a presentation service?
Which of the following allows a host to be assigned an IP address...
Define to which level of the network protocols are belong to:
Link  communication generally refers to data that is
Typically the TCP port used by SMTP is
Ethernet (IEEE 802.3) is an example of
To record Internet routers of IPv4, that handles datagram is...
Transport layer data is
Below provided a typical HTTP response message. Let's take a careful...
The FDDI protocol is based on
Multicast communication generally refers to data that is
The Date: header in the HTTP response message indicates when the...
How are routing paths calculated?
In asynchronous serial communication the physical layer provide
Set of rules that the sending of rules that the sending program must...
To deliver a message to the correct application program running on a...
When a student in Hong Kong uses her computer to have a voice...
Which of the following IP header fields is designed to prevent a...
In contrast to standards developed by traditional standards...
In HTTP, the first line in a request message is called a _____ line;...
The primary role of a router is to forward datagrams from input links...
How does an operating system identify the application to which data...
Two packets A and B are sent in that order through a connectionless...
Which of the following features of Ethernet has not remained constant...
Which of the following is the network-layer protocol of the Internet?
In a broadcast-based network, longer propagation delays
The protocols of the various layers are called ___________
What is the purpose of the SNMP SetRequest message?
Which of the following internet applications typically transmit(s)...
Time needed to transmit L-bit packet into link = L (bits) / R...
HTTP non-persistent connection - multiple objects can be sent over...
Which of the following is a protocol used for communication between aa...
With ADSL, each subscriber gets more downstream bandwidth than...
The IP address space is organized in a hierarchy (I) to make the...
Which of the following is a disadvantage of connection based...
How we call the link-layer packets ?
What is the segment?
The throughput of a network link for an HTTP session is measured in...
Layers four and five of the Internet protocol stack are implemented in...
DNS resource record has Type\=MX
A university has 20 computers in a laboratory that is currently served...
There are transport service requirements, for which of the following...
Which of the following OSI layers converts the ones and zeroes to...
IEEE standard ethernet CSMA/CD provides which of the following...
Consider an application running on host cs.cmu.edu that wants to send...
Most packets use these as the inputs to the links. This means that the...
A forwarding table is
Below provided a typical HTTP response message. Let's take a careful...
This is the amount of time required to push all of the packet's...
Network layer data is
Which of the following network exploration tools can be used to...
The MSS is the maximum size of a TCP segment including headers
Match the following
____ is a process-to-process protocol that adds only port addresses,...
Link layer encapsulates datagrad in a
Registered users may look up all meetings in their agenda in a given...
Before sending a packet into a datagram network, the source must...
____________is a physical-layer device that acts on individual bits...
Convert the following IP address: 192.224.224.15 to the binary
The term packetization refers to the process of
Which of the following is an application layer service?
__________provides full transport layer services to applications
Time for a small packet to travel from client to server and back
A corporate information systems manager is interested in collecting...
Network layer at source is responsible for creating a packet from data...
An ARP query packet is encapsulated in
The process that waits to be contacted to begin the session is the...
A difference between routers and switches is that
At which of the following layers of the OSI protocol stack can the...
Compared to the wired transmission, wireless transmission typically...
Which of the following best describes an IP address?
Find the FTP reply whose message is wrongly matched
Convert the following IP address: 93.44.123.184 to the binary
Which of the following maps IP addresses onto datalink addresses?
The time required to examine the packet's header and determine where...
CCT stands for
What is not a application layer protocol?
Which of the following can be used by a router to report a dropped...
Computer networks that provide only a connection service at the...
Application layer offers _______ service
Which layer of the TCP/IP model involves routing?
331 Username OK , password required - status code refers to (protocol...
A specific CSMA-CD network such as 10-BASET "Ethernet
A network entity that satisfies HTTP requests on the behalf of an...
Two packets A and B are sent in that order through a...
DNS provides a few other important services in addition to translating...
All store-and-forward networks are:
Identify the incorrect statement
Which of the following was designed to solve the problem of IP address...
Which of the following statements are true about the TCP service...
Each time an end system wants to send a packet, it stamps the packet...
Filtering in a firewall can be based on:
The 802.11 protocol does not implement collision detection because
The network interface card of a Web server that you manage has...
Alert!

Advertisement