Assignment 1
1.A router works in
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Ans:Network Layer
2.Which of the following network device is used for interconnecting two LANs working on the same protocol?
Repeater
Hub
Bridge
None of these
Ans:Bridge
3.Which of the following is a transport layer protocol?
SMTP
UDP
ICMP
SSH
Ans:UDP
4.In which layer NICs work?
Network Layer
Data Link Layer
Transport Layer
Application Layer
Ans:Data Link Layer
5.Which of the following network device filters network traffic based on the MAC addresses?
Bridge
Router
Repeater
Hub
Ans:Bridge
6.Telephone system network is the one of example of
Circuit switching
Packet switch
None of these
Ans:Circuit Switching
7.A file of 'x bits' is sent from host A to host B over a circuit switched network that uses TDM with 'h slots’ and have a bit rate of 'R Mbps'. The circuit establish time is k seconds. Find the
total time
(x*h)/R secs
((x*h/R + k) secs
(x)/R secs
(x/R+k) secs
Ans:((x*h/R + k) secs
8.A Datagram switching is a
Connection-oriented packet switching
Connectionless packet switching
None of these
Ans:Connectionless packet switching
9.Which protocol is used to acquire the MAC address of a host whose IP address is known?
Dynamic Host Control Protocol
Address Resolution Protocol
User Datagram Protocol
None of these
Ans:Address Resolution Protocol
10.Which of these following protocol prevents out-of-order delivery of data?
DNS
UDP
TCP
None of these
Ans:TCP
Assignment 2
1.Which of the following is a remote login application?
Telnet
DNS
SMTP
FTP
Ans:Telnet
2.Which of the following network management command is used for querying the DNS?
Netstat
Nslookup
whois
None of these
Ans:Nslookup
3.Which of the following file is used to configure DNS in the client side?
Hosts
Nsswitch.conf
Resolv.conf
ntp.conf
Ans:Resolv.conf
4.Which of the following system call puts the server socket in a passive mode and waits for the client to approach the server to make a connection?
Connect
Accept
Listen
bind
Ans:Listen
5.FTP control connection is initiated on port number
20
21
80
143
Ans:21
6.HTTP cookie is stored in
user's computer
Server
None of these
Ans:user's computer
7.Which port does HTTP use in transport layer?
80
443
20
21
Ans:80
8.Telnet does not use any security mechanism and transfers the data over network internet in a plain-text form including the passwords.
True
False
Ans:True
9.SMTP servers commonly use the TCP on port number
21
22
23
25
Ans:25
10.SNMP is an application layer protocol which is used to
transfer mail from one user to another
monitor the network, detect network faults etc.
move files between local and remote file systems
transports messages between devices
Ans:transports messages between devices
Assignment 3
1.Which of the following layer provides host-to-host communication services for applications?
Data Link Layer
Network Layer
Transport layer
Application Layer
Ans:Network Layer
2.Datagram mode communication used by the IP and UDP protocols, where data may be delivered out of order.
True
False
Ans:True
3.Which of the following is a reliable protocol?
TCP
UDP
None of these
Ans:TCP
4.Congestion control prevents senders from overwhelming the_____________
the sender from overwhelming the__________________
receiver, network
network, receiver
sender, receiver d. None of these
Ans:network, receiver
5.To establish a connection, TCP uses a three way handshake because both sender and receiver need to synchronize their segment sequence numbers used during their transmission
True
False
Ans:True
6.The Protocol Data Unit (PDU) of the transport layer is called
Packet
Bit
Frame
Segment
Ans:Segment
7.The ------------------ field contains the next segment that the sender of the acknowledgement expects to receive.
Sequence number
Acknowledgment number
Ans:Acknowledgment number
8.In ----------------, duplicate packets from a previous connection (which has been closed) between the two nodes might still be floating on the network
2-way handshake
3-way handshake
Ans:2-way handshake
9.Which of the following is the correct statement?
TCP is unreliable, IP is unreliable
TCP is reliable, IP is reliable
TCP is unreliable, IP is reliable
TCP is reliable, IP is unreliable
Ans:TCP is reliable, IP is unreliable
10.Which of the following is the correct statement?
Go Back N ARQ rejects out-of-order packets
In Selective Repeat ARQ, out-of-order delivery can not happen
In Go Back N ARQ. number of retransmissions in case of packet drop is 1
In Stop and Wait ARQ, lost data problem is resolved by sequence number
Ans:Go Back N ARQ rejects out-of-order packets
Assignment 4
1.Consider the bandwidth as 50 Kbps, one way transit time=240 msec and the segment size is 1000 bit. Consider the event of a segment transmission and the corresponding ACK reception Find the maximum number of segments that can be outstanding during this duration.
23
24
25
26
Ans:25
2.In the sender, application data is sent from the transport layer to the IP layer by the --- call.
read()
write()
receive()
Ans:write()
3.Sender and receiver needs to dynamically adjust buffer allocations for
flow control
congestion control
Reliability
connection establishment
Ans:flow control
Congestion control
4.Transport layer is implemented in
User space
Kernel
Ans:Kernel
5.In order to avoid congestion, the sending rate should be
<=receiver rate
maximum(network rate, receiver rate)
<=network rate
minimum(network rate, receiver rate)
Ans:minimum(network rate, receiver rate)
6.If congestion is detected, the AIMD algorithm
decreases sending rate additively
increases sending rate multiplicatively
decreases sending rate multiplicatively
increases sending rate additively
Ans:decreases sending rate multiplicatively
7.------- uniquely identifies an application within a computer.
Port number
IP address
Ans:Port number
8.TCP supports multicasting.
True
False
Ans:False
9.TCP segments are of same size
True
False
Ans:False
10.TCP sequence number field is of
8 bit
16 bit
24 bit
32 bit
Ans:32 bit
Assignment 5
1.TCP uses a sliding window flow control algorithm with go back N ARQ principle.
True
False
Ans:True
2.How long does the receiver wait before it sends a delayed acknowledgment for receiving
few more packets?
RTT
2*RTT
250 ms
500 ms
Ans:500ms
3.Nagle's algorithm states that send a short packets in a TCP connection unless the
previous short packets are acknowledged by the receiver.
True
False
Ans:False
4.Whenever the receiver advertises a large window size, silly window syndrome
happens.
True
False
Ans:False
5.The solution to silly window syndrome problem is are
Nagle's algorithm
Clark's solution
Jacobson's algorithm
None of these
Ans:Nagle's algorithm
Clark's solution
6.TCP stores the out of order data if there is space in receiver window, and sends a
duplicate ACK.
True
False
Ans:True
7.Jacobson's algorithm is used to
solve silly window syndrome problem
handle out of order data problem
calculate dynamic time out timer
Ans:calculate dynamic time out timer
8.Which of the following TCP timers avoid deadlock when receiver buffer is
announced as zero?
Time wait timer
Retransmission timer
Keepalive timer
Persistent timer
Ans:Persistent timer
9.Karn's Algorithm ignores retransmitted segments when updating the round-trip
time estimate.
True
False
Ans:True
10.In the slow start phase in TCP congestion control the congestion window is
increased
Linearly
Exponentially
none of these
Ans:Exponentially
Assignment 6
1.The network layer doesn't guarantee delivery of each packet, and doesn't promise to
deliver them in the same order.
True
False
Ans:True
2.Which of the following protocol is used by the routers to send error messages when
communicating with another IP address?
IP
ICMP
MQTT
NTP
Ans:ICMP
3.What is the maximum number of hosts that can be attached to a Class A in the IPv4
addressing system ?
2^16
2^16 - 2
2^24
2^24 - 2
Ans:2^24 - 2
4.The address of a class B host is to be split into subnets with a 6-bit subnet number. What
is the maximum number of subnets and the maximum number of hosts in each subnet?
62 subnets and 262142 hosts.
64 subnets and 262142 hosts.
62 subnets and 1022 hosts.
64 subnets and 1024 hosts
Ans:62 subnets and 1022 hosts
5.Given IP Address : 172.16.0.0/25, find the number of subnets and the number of hosts per
subnet.
514 subnets and 128 hosts per subnet
512 subnets and 126 hosts per subnet
514 subnets and 126 hosts per subnet
512 subnets and 128 hosts per subnet
Ans:512 subnets and 126 hosts per subnet
6.In the IPv4 addressing format, the number of networks allowed under Class C addresses
is
2^14
2^7
2^21
2^24
Ans:2^21
7.Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91
respectively and they both use the same netmask N. Which of the values of N given below
should not be used if A and B should belong to the same network?
255.255.255.0
255.255.255.128
255.255.255.192
255.255.255.224
Ans:255.255.255.224
8.NAT can help to balance the load of multiple identical server accessible from a single IP
address.
True
False
Ans:True
9.IPv6 supports broadcast mechanisms.
True
False
Ans:False
10.Which of the following is/are not a valid IPv6 address?
AE82::1:800:23E7:F5DB
FC80:2:7:1:800:23E7:A:FSDB
DE62:6A42: 1:5AC::800:23E7-F5DB
AEC6: 1:600:23E7F5DB
Ans:AEC6: 1:600:23E7F5DB
Assignment 7
1.Here two computers are connected via a link. The bandwidth of the link is 4Mbps (1Mbps -
10 bits per second) and the delay is 500milliseconds. Assume that you are sending a SMIB
(1Mebibyte (MIB) - 2"bytes) file from A to B. What will be the transmission delay and the
propagation delay?
Transmission delay: 0.5sec, propagation delay: 1.51509 sec
Transmission delay: 10.48576sec, propagation delay: 0.5sec
Transmission delay: 4sec, propagation delay: 1.31072
Transmission delay: 1.31072sec, propagation delay: 4sec
Ans:Transmission delay: 10.48576sec, propagation delay: 0.5sec
2.What is a service level agreement?
It is the agreement to maintain constant bitrate.
It is the agreement to maintain a reliable connection between two hosts.
It is the agreement to maintain QoS.
It is the agreement to maintain connectivity
Ans:It is the agreement to maintain QoS.
3.What does traffic shaping do in QoS?
It regulates the incoming traffic rate.
It regulates the outgoing traffic rate.
It prioritizes the outgoing flow as per policy.
It prioritizes the incoming flow as per policy.
Ans:It regulates the outgoing traffic rate.
4.Assume there is a token buffer traffic shaper with token arrival rate r and bucket size t. If
packets arrive in bursts with a burst interval of time t and an arrival rate of p, what is the
maximum departure rate from the traffic shaper?
P
r
b/t
(p+rt)/t
Ans:p
5.Given the arrival rate in the table, how long will it take to clear the traffic with a leaky
bucket traffic shaper having a leak rate of Spkt per sec and bucket size 20pkts. How many
packets does it need to drop?
12.4 sec, 20 packets dropped
13.4 sec, 15 packets dropped
14.4 sec, 10 packets dropped
15.4 sec, 5 packets dropped
Ans:15.4 sec, 5 packets dropped
6.What is (are) true for Intserv and DiffServ?
DiffServ provides Qos by differentiating traffic based on the information available in the packet while IntServ provides Ons based on the service agreement
IntServ architecture is suitable for the Internet-scale service while DiffServ provides guaranteed end-to end Qos.
DullServ aware routers Implement per-hop Qos behaviors while IntServ maintains end-to end Qos by resource reservation
Bandwidth broker is required in IntServ architecture while RSVP is required for DiffServ architecture
Ans:DiffServ provides Qos by differentiating traffic based on the information available in the
packet while IntServ provides Ons based on the service agreement
DullServ aware routers Implement per-hop Qos behaviors while IntServ maintains
end-to end Qos by resource reservation
7.What is true for a resource reservation protocol?
It is a routing protocol
It tries to reserve the required resources throughout the path
RSVP demon talks to only remote routing protocol daemon.
RSVP daemon runs in all the devices including end hosts and intermediate routers
Ans:It tries to reserve the required resources throughout the path
RSVP daemon runs in all the devices including end hosts and intermediate routers
8.What happens in traffic classification and conditioning?
Mapping packets to a forwarding class supported in the next DS domain
Choosing the correct path for a packet to forward to the next network
Reserving the resources in next JS domain to provide IntServ.
None of the above
Ans:Mapping packets to a forwarding class supported in the next DS domain
9.Random Early Detection (RED) queue is used to
avoid congestion in the network before it occurs.
drop random packets from the queue to make space for a new packet.
provide fair queuing among the different classes of traffic.
smooth out drop probability across all the flows.
Ans:avoid congestion in the network before it occurs.
smooth out drop probability across all the flows.
10.Why is TCP traffic elastic traffic?
TCP sends traffic at a constant rate.
TCP adjusts traffic rate based on congestion.
TCP maintains end-to-end flow control.
None of the above
Ans:TCP adjusts traffic rate based on congestion.
Assignment 8
1.What does the router do?
Route packets from one port to another in the same sub-network.
Route packets from one network to another network.
The router is another name of the HTTP server, it serves web pages.
None of the above.
Ans:Route packets from one network to another network.
2.What is the network address for the following IP addresses:
i) IP Address: 10.5.27.15, IP Mask: 255.255.248.0
ii) IP Address: 172.18.12.100, IP Mask: 255,240.0.0
Select the correct option
i) 10.5.24.0, ii) 172.18.12.0
i) 10.5.27.0, ii) 172.18.12.0
i) 10.5.24.0, ii) 172.16.0.0
i) 10.5.27.0, ii) 172.16.0.0
Ans:i) 10.5.24.0, ii) 172.16.0.0
3.How does the router decide the destination if multiple entries in routing tables match with
the destination address?
It picks the first one,
It picks the destination with the longest prefix matching
It picks the destination with the shortest prefix matching
It picks the last matched destination
Ans:It picks the destination with the longest prefix matching
4.What are the correct statements in the context of an autonomous system (AS)?
i) A transit AS carries traffic from one AS to another.
ii) Transit AS is by default multi-home AS.
iii) A stub AS can not carry any transit traffic
Select the correct options
ii
iii & ii
ii & i
i & iii
Ans:i & iii
5.For the following network, what will be the routing table information for node E lf we use a
link-state routing protocol?
Ans:
6.RIP is a
Distance vector routing protocol.
Link state routing protocol.
Path vector routing protocol.
Hybrid routing protocol.
Ans:Distance vector routing protocol
7.Select the correct statements.
i) Every AS need two different sets of routing protocol.
ii) BGP is an interior gateway routing protocol.
iii) Exterior gateway protocol exchanges information between ASs.
iv)OSPF can be used as EGP.
iv & iii
iv & i
ii & iii
iii & i
Ans:iii & i
8.How does the exterior gateway routing protocol (EGP) differ from the interior gateway
routing protocol (IGP)?
Flooding is not feasible in EGP
Network policies need to be implemented for EGP but are not needed for IGP
Loop prevention is not required for EGP.
IGP need to know the complete path.
Ans:Flooding is not feasible in EGP
Network policies need to be implemented for EGP but are not needed for IGP
9.BGP communication packet types are
SYNC
OPEN
UPDATE
FINISH
NOTIFICATION
KEEPALIVE
Ans:OPEN
UPDATE
NOTIFICATION
KEEPALIVE
10.Which of the following data structure is better suited for the longest prefix matching?
RB tree
Heap
Patricia tree
All
Ans:Patricia tree
Assignment 9
1.A router contains two hardware components, a router processor and multiple network interfaces. Match the task done by these different hardwares.
Tasks: i) execution of routing protocol, ii) FIB lookup, iii) maintenance of routing table
iv) packet forwarding. v) route calculations
Router processor: iii, v, i; Network interfaces: i, iv
Router processor: iii, ii, i; Network interfaces: v, iv
Router processor: ii, iv, i; Network interfaces: iii, v
Router processor: iii, v, iv; Network Interfaces: ii, i
Ans:Router processor: iii, v, i; Network interfaces: i, iv
2.Which is true for Forwarding Information Base (F18)?
It resides at the RAM
In a specialized hardware. It is implemented using TCAM.
It contains a subset of the routing table.
The routing table is a subset of the FIB
Ans:In a specialized hardware. It is implemented using TCAM.
It contains a subset of the routing table.
3.which of these statements are true?
RAM Is accessed via the content while CAM is accessed via the address where the content is stored
CAM is optimized for performing a query on the content while RAM is optimized to fetch and store data based on the address
CAM can be used to search forwarding host in one cycle while RAM needs linear search or Patricia tree
None of the above are true
Ans:CAM is optimized for performing a query on the content while RAM is optimized to fetch
and store data based on the address
CAM can be used to search forwarding host in one cycle while RAM needs linear
search or Patricia tree
4.A router needs to be configured in a way such that it forwards all packets whose destination IPs are in the range of 172.24.0.0 to 172.25.255.255 to the gateway 192.168.2.38 through the interface enp0s2.
Select the correct command
ip route add 172.24.0.0/15 dev enp0s2
ip route add 172.24.0.0 via 192.168.2.38/16 dev enp0s2
ip route add 172.24.0.0/16 via 192.168.2.38 dev enp0s2
ip route add 172.24.0.0/15 via 192.168.2.38 dev enp0s2
Ans:ip route add 172.24.0.0/15 via 192.168.2.38 dev enp0s2
5.Which options are true for SDN?
SDN moves the control plane to a centralized server.
Switches in the SDN need to be very smart.
All the traffic in the SDN needs to go through the controller.
The switches contact SDN when a packet does not match with any of the existing rules.
Ans:SDN moves the control plane to a centralized server.
The switches contact SDN when a packet does not match with any of the existing rules.
6.Select the OpenFlow controller.
NS3
Ryu
OMNET++
OpenDayLight
Ans:Ryu
OpenDayLight
7.) What is the advantage of using a network emulator over a network simulator?
Emulator allows calculating things that have to go through the network instead of actually sending them
It allows the user to set up an arbitrary network in a single hardware
it can be used in real network applications.
A Mathematical model can be executed without implementing them in a real network
Ans:It allows the user to set up an arbitrary network in a single hardware
it can be used in real network applications.
8.How to create the following network using mininet command?
mn --topo single,3,4
mn --topo single,4,3
mn --topo linear,3,4
mn --topo linear,4,3
Ans:mn --topo linear,4,3
9.What is true for the north-bound interface in SDN?
North-bound interface communicates traffic with the higher plane in the SDN.
Communication between data plane and control plane happens via the north-bound interface.
All the automation and orchestration of the system takes place via the north-bound interface.
The controller controls the packet through a north-bound interface.
Ans:North-bound interface communicates traffic with the higher plane in the SDN
All the automation and orchestration of the system takes place via the north-bound i
interface.
10.What does a data-plane do?
Decide where to send a packet based on a central policy
Forward the data packet
Configure the hardware
None of them
Ans:Forward the data packet
Assignment 10
1.What is the difference between MAC sublayer and LLC sublayer?
LLC multiplexes data from network layer and demultiplexes data to network layer, MAC layer provides mechanism to access the physical medium to receive and transmit data
LLC allows a network device to be uniquely identified in a LAN, MAC multiplexes data from network layer and demultiplexes data to network layer,
LLC is optional if error control is not required, MAC is optional If flow control is not required.
LLC provides flow control and error control over two devices in a LAN, MAC layer uniquely identifies a network card in a LAN
Ans:LLC multiplexes data from network layer and demultiplexes data to network layer, MAC
layer provides mechanism to access the physical medium to receive and transmit data
LLC provides flow control and error control over two devices in a LAN, MAC layer
uniquely identifies a network card in a LAN
2.As per 802.3 standard, what is the length of MAC address?
128 bits
32 bits
48 bits
none of them
Ans:48 bits
3.Which options are true?
CSMA/CD should be used when the transmitter and the receiver can not be turned on simultaneously
CSMA/CD have less collision probability than that of Aloha
Slotted Aloha does not sense before sending data
A node can start transmitting data only at beginning of a slot in slotted aloha
Ans:CSMA/CD have less collision probability than that of Aloha
Slotted Aloha does not sense before sending data
A node can start transmitting data only at beginning of a slot in slotted aloha
4.Aloha (slotted or pure) used lIn wireless medium because---
It is not always possible to detect collision apriori due to hidden node
It can detect collision faster than CSMA/CD
It detects hidden nodes before transmitting data
it clears the paths before any transmission
Ans:It is not always possible to detect collision apriori due to hidden node
5.What is the difference between a repeater and a hub?
A repeater relays/amplifies/regenerates incoming signals and forwards. Hub forwards incoming signal to all the outgoing ports
A repeater allows multiple computers to be connected. A hub increases the coverage of a signal.
A repeater is an analog device, while a hub is a digital device
Multiple repeaters can be connected in the form of a chain to increase range, multiple hubs can be connected in the form of a tree to connect more devices
Ans:A repeater relays/amplifies/regenerates incoming signals and forwards. Hub forwards
incoming signal to all the outgoing ports
Multiple repeaters can be connected in the form of a chain to increase range, multiple
hubs can be connected in the form of a tree to connect more devices
6.What are the properties of switched ethernet?
Filter segments based on IP address
High utilization of computer networks
Unencrypted data leakage can be avoided
Collision rate is very high
Ans:High utilization of computer networks
Unencrypted data leakage can be avoided
7.What does preamble do In an ethernet frame?
Provides packet-level synchronization
Provides frame level synchronization
Provides byte-level synchronization
Provides bit-level synchronization
Ans:Provides bit-level synchronization
8.What is true for bridged ethernet?
Collision is not at all possible in bridged ethernet
Bridged ethernet breaks the collision domain by separating LAN
Bridged network reduce the overall throughput as result of excess overhead
Bridge networks efficiency lesser than that of switched network
Ans:Bridged ethernet breaks the collision domain by separating LAN
Bridge networks efficiency lesser than that of switched network
9.What is the purpose of random exponential backoff?
It guaranteed that collision will not happen on next try
It decrease the chance of collision during next try
it increases congestion in the network
It decreases latency in of packets
Ans:It decrease the chance of collision during next try
10.What are the options that are true for channel access methods?
Token passing channel access methods provide better utilization of channel bandwidth under heavy load
Contention based channel access methods provide better flower transition latency under light load
Contention based channel access methods provide better (lower) transmission latency under heavy load
Token passing channel access methods provide better utilization of channel bandwidth under the load
Ans:Token passing channel access methods provide better utilization of channel bandwidth
under heavy load
Contention based channel access methods provide better flower transition latency
under light load
Assignment 11
1.Which of the following TCP/IP protocols is used by a diskless machine to obtain its IP
address from a server?
RIP
RARP
RDP
ARP
Ans:RARP
2.Which statement describes a spanning tree network that has converged?
All switch and bridge ports are either blocking or looping
All switch and bridge ports are in either the forwarding state or the blocking state.
All switch and bridge ports are in the forwarding state.
All switch and bridge ports are assigned as either root or designated ports
Ans:All switch and bridge ports are in either the forwarding state or the blocking state.
3.Which is not detected for hidden stations in wireless LAN?
Signal
Collision
Frames
Data
Ans:Collision
4.How does the wireless LAN solve the hidden node problem?
By extending the antenna to different locations
By introducing RTS and CTS
By introducing random backoff
None of the above
Ans:By introducing RTS and CTS
5.A set that makes stationary or mobile wireless station and also have optional central base
station is known as
Extended service set
Network point set
Basic service set
Access point
Ans:Basic service set
6.The address resolution protocol (ARP) is used for
Finding the IP address of the default gateway.
Finding the IP address from the DNS.
Finding the MAC address that corresponds to an IP address
Finding the IP address that corresponds to a MAC address.
Ans:Finding the MAC address that corresponds to an IP address
7.Which component of ARP is responsible for sending a reply to the data link layer?
Input Module
Queue Controller
Cache Controller
Output Module
Ans:Input Module
8.Which of the following describes the function of RARP?
It is used to map a 32-bit IP address to a 48-bit ethernet address.
It is used to map a 32-bit ethernet address to a 48-bit IP address
It is used to map a 48-bit ethernet address to a 32-bit IP address.
It is used to map a 48-bit IP address to a 32-bit ethernet address
Ans:It is used to map a 48-bit ethernet address to a 32-bit IP address
9.Which of the following is used to create a subnetting effect without explicitly declaring a
gateway?
Routing Table
ARP Table
RARP Table
Cache Table
Ans:ARP Table
10.Which of the following is/are provided by VLAN?
Congestion control
Wireless communication
Time efficiency
Reduce network traffic
Ans:Time efficiency
Reduce network traffic
Assignment 12
1.Which of the following is/are true for Time Division multiple access (TDMA)?
Provides different frequency band to different data streams
Provides different code to different spreading code radios
Provides different time slot to different transmitters
None of them
Ans:Provides different time slot to different transmitters
2 What is the maximum magnitude bit rate in a noiseless channel if signal level L=2 and bandwidth=BW is used?
Half of BW
Same as BW
Double of BW
None
Ans:Double of BW
3.What type of signal can be transmitted by Broadband?
Analog
Digital
Both Analog and Digital
None
Ans:Analog
4.Find the correct statement related to IP Security
The transport mode protects the original IP header
The tunnel mode does not protect the original IP header
The transport mode does not protect the original IP header
The tunnel mode protects the original IP header
Ans:The transport mode does not protect the original IP header
The tunnel mode protects the original IP header
5.What attack is used to make a computer resource unavailable?
Denial of service
Backdoors
Buffer overflows
Snooping
Ans:Denial of Service
6.What is the sequence for PCM?
Sampling,Encoding,Quantizing
Sampling,Quantizing,Encoding
Quantizing,Sampling,Encoding
Quantizing,Encoding,Sampling
Ans:Sampling,Quantizing,Encoding
7.Find the channel capacity if the SNR of a telephone line with bandwidth of 3000 Hz is
1023?
3 Kbps
3 bps
30 bps
30 Kbps
Ans:30 Kbps
8.Find the security property if the data of a computer system can be modified only by
authorized parities.
Integrity
Confidentiality
Authenticity
Availability
Ans:Integrity
9.Which type of firewall is used to prevent direct TCP connection between the hosts?
Proxy Server
Circuit-level gateways
Packet filters
Application level gateways
Ans:Circuit-level gateways
10.Which of the following coding techniques is used to get the maximum synchronizing
capability?
Pseudoternary
Non Return to Zero Inverted (NRZI)
Manchester
Non Return to Zero-Level (NRZ-L)
Ans:Manchester
Post a Comment