A _____ is a TCP name for a transport service access point.
1.port
2. pipe
3. node
4.None of the mentioned
In asymmetric key cryptography, the private key is kept by:
1.sender
2.receiver
3.sender and receiver
4.all the connected devices to the network
In cryptography, the order of the letters in a message is rearranged by:
1.transpositional ciphers
2.substitution ciphers
3.both (a) and (b)
4.none of the mentioned
Socket-style API for windows is called:
1.wsock
2.winsock
3.wins
4.None of the mentioned
The first line of HTTP request message is called ____
1.Request line
2.Header line
3.Status line
4.Entity line
A list of protocols used by a system, one protocol per layer, is called:
1.protocol architecture
2.protocol stack
3.protocol suit
4.none of the mentioned
A point-to-point protocol over ethernet is a network protocol for:
1.encapsulating PPP frames inside ethernet frames
2.encapsulating ehternet frames inside PPP frames
3.for security of ethernet frames
4.for security of PPP frames
A set of rules that governs data communication:
1.Protocols
2.Standards
3.RFCs
4.None of the mentioned
A _____ is a device that forwards packets between networks by processing the routing information included in the packet.
1.bridge
2.firewall
3.router
4.all of the mentioned
An endpoint of an inter-process communication flow across a computer network is called:
1. socket
2.pipe
3.port
4.None of the mentioned
An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called:
1.short frame
2.run frame
3.mini frame
4.man frame
Automatic repeat request error management mechanism is provided by:
1.logical link control sublayer
2.media access control sublayer
3.network interface control sublayer
4.none of the mentioned
Bluetooth is an example of:
1.personal area network
2.local area network
3.virtual private network
4.none of the mentioned
Communication between a computer and a keyboard involves ______________ transmission.
1.Automatic
2.Half-duplex
3.Full-duplex
4.Simplex
Communication channel is shared by all the machines on the network in:
1.broadcast network
2.unicast network
3. multicast network
4.none of the mentioned
CRC stands for:
1.cyclic redundancy check
2.code repeat check
3.code redundancy check
4.cyclic repeat check
Cryptanalysis is used:
1.to find some insecurity in a cryptographic scheme
2.to increase the speed
3.to encrypt the data
4.none of the mentioned
Cryptographic hash function takes an arbitrary block of data and returns:
1.fixed size bit string
2.variable size bit string
3.both (a) and (b)
4.none of the mentioned
ElGamal encryption system is:
1.symmetric key encryption algorithm
2.asymmetric key encryption algorithm
3.not an encryption algorithm
4.none of the mentioned
Ethernet frame consists of:
1.MAC address
2.IP address
3.both (a) and (b)
4.none of the mentioned
Ethernet in metropolitan area network (MAN) can be used as:
1. pure ethernet
2.ethernet over SDH
3.ethernet over MPLS
4.all of the mentioned
Find the oddly matched HTTP status codes
1.200 OK
2.400 Bad Request
3.301 Moved permanently
4.304 Not Found
Header of a frame generally contains:
1.synchronization bytes
2.addresses
3.frame identifier
4.all of the mentioned
High speed Ethernet works on:
1.coaxial cable
2.twisted pair cable
3.optical fiber
4.none of the mentioned
I In asymmetric key cryptography, the private key is kept by:
1.sender
2.receiver
3.sender and receiver
4.all the connected devices to the network
In computer network nodes are:
1.the computer that originates the data
2. the computer that routes the data
3.the computer that terminates the data
4.All of the mentioned
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are:
1.Added
2.Removed
3.Rearranged
4.Modified
In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs.
1.2
2.1
3.4
4.3
MAC address is of:
1.24 bits
2.36 bits
3.42 bits
4.48 bits
Network congestion occurs:
1.in case of traffic overloading
2.when a system terminates
3.when connection between two nodes terminates
4.none of the mentioned
The conditional GET mechanism
1.Imposes conditions on the objects to be requested
2.Limits the number of response from a server
3.Helps to keep a cache upto date
4.None of the mentioned
The data link layer takes the packets from _____ and encapsulates them into frames for transmission.
1.network layer
2.physical layer
3.transport layer
4.application layer
The default connection type used by HTTP is _____
1.Persistent
2.Non-persistent
3.Either of the mentioned
4.None of the mentioned
The first Network:
1.CNNET
2.NSFNET
3.ASAPNET
4.ARPANET
The HTTP request message is sent in ____ part of three-way handshake.
1.First
2.Second
3.Third
4.None of the mentioned
The HTTP response message leaves out the requested object when _____ method is used
1.GET
2.POST
3.HEAD
4.PUT
The IETF standards documents are called:
1.RFC
2.RCF
3.ID
4.None of the mentioned
The maximum size of payload field in ethernet frame is:
1.1000 bytes
2.1200 bytes
3.1300 bytes
4.1500 bytes
The number of objects in a Web page which consists of 4 jpeg images and HTML text is ______
1.4
2.1
3.5
4.None of the mentioned
The structure or format of data is called:
1.Syntax
2.Semantics
3.Struct
4.None of the mentioned
The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
1.piggybacking
2.cyclic redundancy check
3.fletcher's checksum
4.none of the mentioned
The time taken by a packet to travel from client to server and then back to the client is called ____
1.STT
2.RTT
3.PTT
4.None of the mentioned
The values GET, POST, HEAD etc are specified in ____ of HTTP message
1.Request line
2.Header line
3.Status line
4.Entity body
The ______ method when used in the method field, leaves entity body empty.
1.POST
2.GET
3.Both of the mentioned
4.None of the mentioned
The _______ is the physical path over which a message travels:
1.Ppath
2.Medium
3.Protocol
4.Route
Three or more devices share a link in ________ connection:
1.Unipoint
2.Multipoint
3.Point to point
4.None of the mentioned
Transmission control protocol is:
1.connection oriented protocol
2.uses a three way handshake to establish a connection
3.recievs data from application as a single stream
4.All of the mentioned
Transport layer aggregates data from different applications into a single stream before passing it to:
1.network layer
2.data link layer
3.application layer
4. physical layer
Two devices are in network if:
1.a process in one device is able to exchange information with a process in another device
2.a process is running on both devices
3.PIDs of the processes running of different devices are same
4.none of the mentioned
User datagram protocol is called connectionless because:
1.all UDP packets are treated independently by transport layer
2.it sends data as a stream of related packets
3.both (a) and (b)
4.None of the mentioned
Voice privacy in GSM cellular telephone protocol is provided by:
1.A5/2 cipher
2.b5/4 cipher
3.b5/6 cipher
4.b5/8 cipher
Voice privacy in GSM cellular telephone protocol is provided by:
1.A5/2 cipher
2.b5/4 cipher
3.b5/6 cipher
4.b5/8 cipher
What is autonegotiation?
1.a procedure by which two connected devices choose common transmission parameters
2.a security algorithm
3.a routing algorithm
4.none of the mentioned
What is data encryption standard (DES)?
1.block cipher
2.stream cipher
3.bit cipher
4.none of the mentioned
What is interframe gap?
1.idle time between frames
2.idle time between frame bits
3.idle time between packets
4.none of the mentioned
What is stat frame delimeter (SFD) in ethernet frame? 0
1.10101010
2.10101011
3.00000000
4.11111111
When 2 or more bits in a data unit has been changed during the transmission, the error is called:
1.random error
2.burst error
3.inverted error
4.none of the mentioned
When collection of various computers seems a single coherent system to its client, then it is called:
1.computer network
2.distributed system
3. both (a) and (b)
4.None of the mentioned
Which of the following is not correct ?
1.Web cache doesnt has its own disk space
2.Web cache can act both like server and client
3.Web cache might reduce the response time
4.Web cache contains copies of recently requested objects
Which of the following is present in both an HTTP request line and a status line?
1.HTTP version number
2.URL
3.Method
4.None of the mentioned
Which of this is not a network edge device?
1.PC
2.Smartphones
3.Servers
4.Switch
Which one of the following algorithm is not used in asymmetric-key cryptography?
1.RSA algorithm
2.diffie-hellman algorithm
3.electronic code book algorithm
4.none of the mentioned
Which one of the following algorithm is not used in asymmetric-key cryptography?
1.RSA algorithm
2.diffie-hellman algorithm
3.electronic code book algorithm
4.none of the mentioned
Which one of the following computer network is built on the top of another network?
1. prior network
2.chief network
3.prime network
4.overlay network
Which one of the following extends a private network across public networks?
1.local area network
2.virtual private network
3.enterprise private network
4.storage area network
Which one of the following is a cryptographic protocol used to secure HTTP connection?
1.stream control transmission protocol (SCTP)
2.transport layer security (TSL)
3.explicit congestion notification (ECN)
4.resource reservation protocol
Which one of the following is a cryptographic protocol used to secure HTTP connection?
1.stream control transmission protocol (SCTP)
2.transport layer security (TSL)
3.explicit congestion notification (ECN)
4.resource reservation protocol
Which one of the following is a data link protocol?
1.ethernet
2.point to point protocol
3.HDLC
4.all of the mentioned
Which one of the following is a transport layer protocol used in internet?
1.TCP
2.UDP
3.both (a) and (b)
4.none of the mentioned
Which one of the following is a transport layer protocol?
1. stream control transmission protocol
2. internet control message protocol
3.neighbor discovery protocol
4.dynamic host configuration protocol
Which one of the following is the multiple access protocol for channel access control?
1.CSMA/CD
2.CSMA/CA
3.both (a) and (b)
4.none of the mentioned
Which one of the following task is not done by data link layer?
1.framing
2.error control
3.flow control
4.channel coding
Which organization has authority over interstate and international commerce in the communications field?
1.ITU-T
2.IEEE
3.FCC
4.ISOC
Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
1.logical link control sublayer
2.media access control sublayer
3.network interface control sublayer
4.none of the mentioned
Which transmission media has the highest transmission speed in a network?
1.coaxial cable
2.twisted pair cable
3.optical fiber
4.electrical cable