0

Computer Networks

Description: This test covers topics from Computer Networks.
Number of Questions: 15
Created by:
Tags: Computer Networks
Attempted 0/15 Correct 0 Score 0

Which of the following application layer protocols can be used for downloading an email from a mailbox server to a user-level mail client?

Fourth-generation firewalls operate up to layer 4 (transport layer) of the OSI model.

  1. SMTP

  2. HTTP

  3. TELNET

  4. IMAP

  5. Webmail


Correct Option: D
Explanation:

The Internet Message Access Protocol (commonly known as IMAP) is an application layer internet protocol that allows an e-mail client to access e-mail on a remote mail server.

Which of the following functions cannot be accomplished by the fourth-generation firewalls?

Fourth generation firewalls operate upto layer 4 (transport layer) of the OSI model.

  1. Block ICMP packets

  2. Understand FTP

  3. Block incoming traffic from a specific user on a single user system

  4. Block outgoing traffic to a specific IP address on a single user system

  5. Block TCP traffic from a specific user on a multi-user system


Correct Option: B
Explanation:

A fourth generation firewall cannot understand FTP as FTP operates in application layer, which resides higher than transport layer. A fourth-generation firewall can understand protocols upto layer 4 only.

What is the IP address 255.255.255.255 used for?

  1. It is reserved as former Class E network

  2. Current network

  3. Loop back

  4. Multicasting

  5. Broadcasting


Correct Option: E
Explanation:

255.255.255.255 is reserved for Broadcast.

What type of protocol is IPv4?

  1. Connectionless for use on packet-switched networks

  2. Connection oriented for use on packet-switched networks

  3. Connection oriented for use on circuit-switched networks

  4. Connectionless for use on circuit-switched networks

  5. Connection oriented for use on virtual circuit switching networks


Correct Option: A
Explanation:

IPv4 is a connectionless protocol for use on packet-switched networks. It operates on a best effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol (TCP).

What is the length of the checksum field of IPv4 header?

  1. 4-bit

  2. 16-bit

  3. 6-bit

  4. 8-bit

  5. 10-bit


Correct Option: B
Explanation:

The 16-bit checksum field is used for error-checking of the header. When a packet arrives at a router, the router calculates the checksum of the header and compares it to the checksum field. If the values do not match, the router discards the packet. Errors in the data field must be handled by the encapsulated protocol. Both UDP and TCP have checksum fields.

Which of the following is an error control method for data transmission to achieve reliable data transmission over an unreliable service?

  1. BGP

  2. RIP

  3. ARQ

  4. ARP

  5. NDP


Correct Option: C
Explanation:

Automatic Repeat reQuest (ARQ), is an error-control method for data transmission that uses acknowledgements (messages sent by the receiver indicating that it has correctly received a data frame or packet) and timeouts (specified periods of time allowed to elapse before an acknowledgment is to be received) to achieve reliable data transmission over an unreliable service. If the sender does not receive an acknowledgment before the timeout, it usually re-transmits the frame/packet until the sender receives an acknowledgment or exceeds a predefined number of re-transmissions.

Which of the following protocols can be used for managing networks?

  1. Gopher

  2. NETCONF

  3. Finger

  4. NFS

  5. DNS


Correct Option: B
Explanation:

The Network Configuration Protocol (NETCONF), is an IETF network management protocol.NETCONF provides mechanisms to install, manipulate, and delete the configuration of network devices. Its operations are realized on top of a simple Remote Procedure Call (RPC) layer.

What type of network is ATM?

  1. Connection oriented packet switched

  2. Connectionless packet switched

  3. Connection oriented with virtual circuit

  4. Connectionless circuit switched

  5. Either connectionless or connection oriented virtual circuit


Correct Option: C
Explanation:

ATM uses a connection-oriented model in which a virtual circuit must be established between two endpoints before the actual data exchange begins.These virtual circuits may be “permanent”, i.e. dedicated connections that are usually preconfigured by the service provider, or “switched”, i.e. set up on a per-call basis using signalling and disconnected when the call is terminated.

Why is spanning tree protocol used for bridged ethernet local area network?

  1. For minimizing contention

  2. For a loop free topology

  3. For fault tolerance

  4. For minimizing collisions

  5. For increasing the network bandwidth


Correct Option: B
Explanation:

The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged ethernet local area network. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them.

Which of the following is not true regarding TCP connections?

  1. TCP connections are full-duplex.

  2. TCP connections are point-to-point.

  3. TCP connections support multicasting.

  4. TCP connections do not support broadcasting.

  5. TCP connections are byte stream.


Correct Option: C
Explanation:

Since each connection has exactly two end points, therefore, multicasting is not possible with this connection.

Which OSI layer is concerned with the syntax and semantics of the information transmitted?

  1. Network layer

  2. Transport layer

  3. Session layer

  4. Presentation layer

  5. Application layer


Correct Option: D
Explanation:

In the seven-layer OSI model of computer networking, the presentation layer is layer 6 and serves as the data translator for the network. It is sometimes called the syntax layer.

Which OSI layer connects hosts within the same network?

  1. Physical layer

  2. Data link layer

  3. Network layer

  4. Transport layer

  5. Session layer


Correct Option: B
Explanation:

The data link layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the physical layer. It connects hosts within the same network.

What is the way of operation of LAN interfaces called, in which all frames are given to the computer,not just those addressed to it?

  1. Hardware virtualisation

  2. Packet analyzer

  3. Monitor mode

  4. Promiscuous mode

  5. MAC spoofing


Correct Option: D
Explanation:

In computer networking, promiscuous mode or promisc mode is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is intended to receive.

Which field of the IP header helps to prevent datagrams from persisting on an internet?

  1. Destination address

  2. Source address

  3. Flag

  4. TTL

  5. Header checksum


Correct Option: D
Explanation:

An eight-bit time to live field helps prevent datagrams from persisting (e.g. going in circles) on an internet. This field limits a datagram's lifetime. It is specified in seconds, but time intervals less than 1 second are rounded up to 1. In practice, the field has become a hop count—when the datagram arrives at a router, the router decrements the TTL field by one. When the TTL field hits zero, the router discards the packet and typically sends an ICMP Time Exceeded message to the sender.

Which of the following protocols is used when the delivery protocol encapsulates a different payload protocol?

Users can sometimes sneak through a firewall, using a protocol that the firewall would normally block, but wrapped inside a protocol that the firewall does not block, such as HTTP. If the firewall policy does not specifically exclude this kind of wrapping, this trick can function to get around the intended firewall policy.

  1. Proxy server

  2. HTTP

  3. Firewall

  4. Tunneling

  5. Pseudo wire


Correct Option: D
Explanation:

Computer networks use a tunneling protocol when one network protocol (the delivery protocol) encapsulates a different payload protocol. By using tunneling one can (for example) carry a payload over an incompatible delivery-network, or provide a secure path through an untrusted network.

- Hide questions