MT0051 by jianghongl


									                    PC TRAINING INSTITUTE LIMITED

                     Internetworking with TCP/IP
1.Tcp/ip stands for :-
    a) Transmission control protocol
    b) Transfer control protocol
    c) Transmission control prototype
    d) None of these
2.ip stands for:-
    a) Internet prototype
    b) Intranet protocol
    c) Internet protocol
    d) None of these
3.OSI stands for:-
    a) Open source interface
    b) Object source interface
    c) Open system interconnection
    d) None of these
4. tcp/ip protocol layers
    a) Seven
    b) Four
    c) Five
    d) Eight
5.OSI reference model
    a) Four
    b) Five
    c) Seven
    d) Eight
6 The decimal range of network address for class B network is between
            A) 127-190
            B) B) 128-190
            C) 128-191
            D) D) None of the above
7 Which of the following is true?
         A) TCP/IP account is less expensive then shell account and does not allow
graphics to download
        B) TCP/IP account is more expensive than shell account and does allow graphics
to download
        C) TCP/IP account is more expensive than shell account and allow graphics to
        D) None of the above
8 DNS server is used for
    A) To translate the domain name of another computer into IP address only
    B) To translate the domain name of another computer into another computer
into IP address and vice versa on request
    C) To translate the IP address to domain name

            PC Training Institute Ltd., An ISO-9001 Certified Organisation

  D) None of the above

9. The leading bit pattern for class c network is
            A) 0
            B) 10
            C) 101
            D) None of the above
10. Which of the following is true
      A) TCP/IP link allows your computer to function as an internet host
      B) Local area network link allows your computer function as an internet host
      C) TCP/IP link does not allow computer to internet host
      D) Local area network link cannot be used as interanet host
11.FDDI stands for
    a) fiber disturbed data interface
    b) fiber distributed data interface
    c) fiber distributed data internet
    d) none of the above
12.ppp stands for
    a) point to point protocol
    b) peer to peer protocol
    c) peer to point protocol
    d) none of the above
13.ATM stands for
    a) any time money
    b) asynchronous transfer mode
    c) any transfer mode
    d) none of the above. many class of IP ADDRESS?
    a) One
    b) Three
    c) Five
    d) None of the above.
15.what is the binary value of 68.
    a) 01000100
    b) 01010100
    c) 11100101
    d) 10110111
16.TCP divides the data into chunks called as ______ and gives each chunk a _____.
        a. Packet, Name         b. Packet, number c. Group, data number            d.
17. The ________ Protocol attaches to the packet the address from which the data
   comes and the address of the system to which is going in a __________.
        a. TCP, Protocol header                b. IP, Protocol header
        c. IP, Protocol stack                  d. TCP, Protocol stack
18. . _______ specifies the rules that determine how communication takes place over
    a network.
        a. Datagram       b. Packet     c. Protocol d. All of these

                         We touch the future ☺ we teach !

19. A _________ consists of series of bits that include control informations for
    transmitting the data and data itself.
        a. Data         b. Packet      c. Both a & b            d. None of the above.
20. The ________ allows exchange of data at a level by two different network
    systems supporting the functions of a related layer.
        a. Peer-to-Peer communication           b. Open System concept
        c. TCP/IP                               d. All of these
21. The purpose of _______ protocol os to provide basic host-to-host communication
        a. TCP                 b. IP            c. FTP          d. HTTP
22. The port number lies in the range of ________.
        a. 1-65535      b. 1-1024      c. 1-1023        d. None
23. CDSA stands for __________.
        a. Common Data Security Architecture
        b. Common Data Server Architecture
        c. Common Domain Security Architecture
        d. Computer Data Security Architecture
24.POP stands for_________.
        a. Public Office Protocol.
        b. Post Office Protocol.
        c. Private Office Protocol.
        d. None
25. VPN stands for ___________.
        a. Virtual Private Network.             b. Virtual Protected Network.
        c. Virtual Public Network.              d. None of these.
26 Satellite Communication channels is the example of
    a) Simple Duplex
    b) Half Duplex
    c) Full Duplex
    d) None
27. Smallest unit of Data speed that u know is –
        a) Byte per second
        b) Bits per second
        c) Both
        d) None
28. Baud is –
        a) Electrical Signal over transmission lines
        b) Analog signal over transmission lines
        c) Satellite signal
        d) None
29.Data is transmitted one bit at time, it is –
        a) Asynchronous Serial Transmission
        b) Synchronous Serial Transmission
        c) Any
        d) None
30.……………..Technology an upper limit for block size is kept?
        a) Message Switching

             PC Training Institute Ltd., An ISO-9001 Certified Organisation

        b) Packet Switching
        c) Circuit switching
        d) None
31.For long distance communication ---------- transmission mode is used.
        a) Serial Mode
        b) Parallel Mode
        c) Both
        d) None
32. The term topology describes ----------- way in which computers are organized and
connected in a network –
        a) Illogical
        b) Logical
        c) Syntactical
        d) None
33.In ------------- Networks transmitting and receiving equipments are geographically
distributed –
         a) Lan
         b) Man
         c) Wan
         d) None
34.Level 5 UTP cable has speed –
        a) 100 mbps
        b) 50 mbps
        c) 150 mbps
        d) None
35.BNC connector stands for
        a) Bayonet Locking
        b) Broadcast network computing
        c) Binary network computing
        d) None
36.CSMA stands for –
        a) Carrier Sense Multiple Access
        b) Carrier sent multiple access
        c) Carrier senseless multi access
        d) None
37.The flag bit pattern in frame format of HDLC is –
        a) 01111100
        b) 01111101
        c) 00111111
        d) 01111110
38.Bisync organizes data into blocks of upto ------------- characters
        a) 256
        b) 512
        c) 275
        d) None
39.for low speed data communications ----------------- protocol is used –

                        We touch the future ☺ we teach !

        a) Synchronous
        b) FTP
        c) SNTP
        d) Asynchronous
40.TCP/IP has ------- layers –
        a) 7 layers
        b) 4 layers
        c) 5 layers
        d) None
41.SDLC stands for
        a) Synchronous Data Link Control computer
        b) Syntactical Data Link Control protocol
        c) Synchronous Data Link Control protocol
        d) Synchronous Data Link Computer protocol
42.An ------------- is a network that fits between the LAN and the Internet.
        a) Internets
        b) Extranets
        c) Intranets
        d) None
43.FDDI stands for –
        a) Fibre Distributed Data Interface
        b) Fibre Data Distributed Interface
        c) File Document Distributed Interface
        d) None
44.IEEE stands for –
        a) Institute of Electrical and Electronics Engineering
        b) Institute of Electronics and Electricity Engineering
        c) Institute of Electrical and Electronics Engineering
        d) None
45.FDDI uses ---------- as transmission medium.
        a) Fibre
        b) Simple Cable
        c) Optical Fibre
        d) None
46Repeaters exist in which layer of OSI reference model –
        a) Application Layer
        b) Presentation Layer
        c) Physical Layer
        d) Network Layer
47 The network area within which data packets originates and collide is called as -
        a) Collision Detection
        b) Collision Domain
        c) Common Domain
        d) None
48----------- device used to transmit data packets to two different networks –
        a) Hub

             PC Training Institute Ltd., An ISO-9001 Certified Organisation

       b) Switch
       c) Router
       d) Bridge
49 Bridges filter network traffic depending on ------------- address
       a) MAC
       b) CAM
       c) MAC and CAM
       d) None
50 IP Address has in total ---------- bytes –
       a) 32 bytes
       b) 8 – bytes
       c) 1 bytes
       d) 4 - bytes
51 The no. of bits to identify the network in class A is –
       a) 8
       b) 16
       c) 32
       d) 24
52 Number of bits used for multi cast addresses is –
       a) 7
       b) 14
       c) 21
       d) 28

53 Starting bit patterns for class C networks is –
        a) 101
        b) 010
        c) 110
        d) None
54 IP Address from to belongs to ------------------ class
        a) A
        b) B
        c) C
        d) D
55 ARP request frame is divided into –
        a) Frame header & MAC
        b) Frame header & Frame Tail
        c) Frame header & ARP message
        d) None
56 ARP Table contains ------------------- address
        a) Frame Address
        b) MAC address
        c) Both
        d) None
57 ---------------- answers the RARP requests in a network.
        a) ARP server

                         We touch the future ☺ we teach !

        b) RARP server
        c) Both
        d) None
58 Source machine gets MAC address of destination machine using –
        a) RARP
        b) MAC
        c) ARP
        d) None
59 The LAN’S connection to the -------------- provides WAN connectivity.
        a) Router
        b) Bridge
        c) Hub
        d) None
60 In hierarchical communications topology FDDI inter connects –
        a) Client farm
        b) Server farm
        c) Both None
        d) None
61 LAN’S contain ------ distinct functional areas .
        a) 1
        b) 2
        c) 3
        d) 4

62 In list Oriented approach each resource has –
        a) Access Control list
        b) Ticket and list
        c) Both
        d) None
63 Discretionary and mandatory are two kinds of –
        a) Ticket and list policies
        b) Permission grant policies
        c) Access control policies
        d) None
64 An access control mechanism processes user’s requests in three steps. One of them is-
        a) Authorisation
        b) Activation
        c) Authentication
        d) None
65 SNMP stands for
        a) Simple Network Management plateform
        b) Simple Network Mail protocol
        c) Simple Net Management plateform
        d) Simple Network Management protocol
66 Transformation of plaintext into cipher text is called –
        a) Cryptography

            PC Training Institute Ltd., An ISO-9001 Certified Organisation

         b) Decryption
         c) Encryption
         d) None
67 The transformed message is known is -
         a) Cipher Text
         b) Plain Text
         c) Digital text
         d) None
68 SNMP model consists of ------------ number if components.
         a) 1
         b) 2
         c) 3
         d) 4
69 Encryption is process of changing Intelligent data to unintelligent data.
         a) True
         b) False
         c) Any
         d) None
70 UTP stands for –
         a) Unshaped Twisted Pair
         b) Untapped Transport pair
         c) Unshielded Twisted Pair
         d) None
71 CRC stands for –
         a) Cyclic Redundancy cheque
         b) Cyclic Redundancy Correction
         c) Cyclic Redundancy Code
         d) None
72 Inter NIC is known as –
         a) International Net Information Communication
         b) Inter Network Information Command
         c) International Network Institute Center
         d) International Network Information Center
73 It is ------------- to have IPAddress for each LAN.
         a) must
         b) optional
         c) your choice
         d) senseless
74 ATM is –
         a) Asynchronous Transfer Modifier
         b) Asynchronous Transformation Modification
         c) Automated Tool Machine
         d) Asynchronous Transfer Mode

75 ICMP means for –

                         We touch the future ☺ we teach !

       a) Internet Control message protocol
       b) Intranet Control message protocol
       c) Internet Conversion message protocol
       d) None
76 IGMP means -
       a) Intranet Group management protocol
       b) Intranet Group management prototype
       c) Internet Group management protocol
       d) Intranet Groups management protocol
77 GGP means –
       a) Gateway to Gateway Protocol
       b) Gateways to Gateways Protocol
       c) Gateway to Group
       d) None
78 Proxy is –
       a) An application leverage Gateway
       b) An application level Game
       c) An application level Router
       d) An application level Gateway
79 Firewall contains one or more –
       a) Software Elements
       b) Hardware Elements
       c) Both
       d) None
80 Network terminology NAT is –
       a) Network Address Transformation
       b) Net Address Transformation
       c) Network Address Transfer
       d) Network Address Translation
81 RPC standard developed by –
       a) Sun Microsystems
       b) Microsoft
       c) WEA
       d) None
82 SOCKS is standard for
       a) Circuit-level gateways
       b) Packet level gateways
       c) Switch level gate
       d) None
83 NFS is –
       a) Network File security
       b) Net format support
       c) Network File System
       d) None
84 TFTP full form is –
       a) Trial File Transfer Protocol

           PC Training Institute Ltd., An ISO-9001 Certified Organisation

       b) Trivial File Transformations Protocol
       c) Trivial File Transfer Protocol
       d) None
85 Multiplexing actually achieved through –
       a) Socket
       b) Protocol
       c) Port
       d) None
86 Socket interface is one of several --------------
       a) Application Programming Interface
       b) Application Programming Interface protocol
       c) Additional Programming Interface
       d) Application Program Interface
87 GOPHER is a –
       a) Protocol
       b) Prototype
       c) Parameter type protocol
       d) None
88 TELNET is a ----
       a) LAN protocol
       b) WAN protocol
       c) MAN protocol
       D) none
89 Bridge is used for ---
       a) Connect two network
       b) Connect two system
       c) Both
       d) None
90 DHCP is a ----
       a) protocol
       b) feature
       c) both
       d) None
91 DHCP is used to –
       a) Assign automatically IP Address
       b) Assign automatically computer name
       c) Both
       d) None
92 MMC stands for ---
       a) Microsoft Management Console
       b) Microsoft Management Computer
       c) Microsystems Management Console
       d) None
93 LCP is used in ---
       a) PPP Protocol
       b) ASLIP protocol

                       We touch the future ☺ we teach !

        c) Both None
        d) None
94 Subnet addresses usually assigned by –
        a) Normal user
        a) Network Administrator
        b) Anyone
        c) None
95 Destination address is determined using – a)
        a) Protocol address
        b) Subnet mask
        c) Subnet address
        d) Any
96 --------- ------- are used for multicast and future use.
        a) class A and class B
        b) class C and class B
        c) class D and class B
        d) class D and class E
97 Repeaters exist in --------- layer of OSI reference model.
        a) Application
        b) Presentation
        c) Physical
        d) All the
98 Routers are another type of internetworking ---------------
        a) protocol
        b) format
        c) device
        d) None
99 Bridge operate at ----
        a) Network Layer
        b) Application Layer
        c) Presentation
        d) Data Link layer
100 -------- device serves as center of a network .
        a) Repeater
        b) Bridge
        c) Hub
        d) Router
101) -------- used to increase the extent of the network
        a) Repeaters
        b) Bridge
        c) Hub
        d) Router
102 -------- used to increase the number of network nodes.
        a) Repeaters
        b) Bridge
        c) Hub

             PC Training Institute Ltd., An ISO-9001 Certified Organisation

        d) Router
103 Each HDLC fame has a ----------- bit pattern, called flag.
        a) 01111100
        b) 10000001
        c) 00110011
        d) 01111110
104 HDLC is developed by the ---------
        a) ISO
        b) IBM
        c) SUN
        d) None
105 Accessing remote files, remote databases etc. is supported by –
        a) Network Layer
        b) Data Link layer
        c) Application Layer
        d) Session layer
106 If sender sends 1 bits then ------- bits should be received by receiver.
        a) 0
        b) 1
        c) both
        d) None
107 Routing Algorithms are used to build and maintain the -----
        a) FAT table
        b) Protocol table
        c) IP routing table
        d) None
108 BOOTP is –
        a) booting process on a client
        b) booting process on a server
        c) bootstrap protocol
        d) boot protocol
109 ---------- layer is concerned with controlling the operation of the subnet.
        a) Transport
        b) Session
        c) Physical
        d) Network
110 Protocol stack is -----
        a) certain protocol per layer
        b) certain protocol per application
        c) certain protocol per system
        d) none
111protocol is set of ----
        a) prototypes
        b) protons
        c) rules and regulations
        d) None

                         We touch the future ☺ we teach !

112--------- protocol is used basically for low speed data communication.
        a) DLC
        b) BSC
        c) SDLC
        d) HDLC
113Internet is interconnection of –
        a) geographically dispersed homogeneous computers system.
        b) Locally dispersed homogeneous computers system.
        c) Metropolitans dispersed homogeneous computers system.
        d) geographically dispersed heterogeneous computers system.d
114Ethernet which is widely used type of LAN based on IEEE ----------
        a) IEEE 802.1
        b) IEEE 802.2
        c) IEEE 803.3
        d) None
115-------- standard specifies the protocol and access mechanism for a Metropolitan Area
Network. –
        a) IEEE 802.5
        b) IEEE 802.6
        c) IEEE 802.2
        d) IEEE 802.1
116Digital certificate is defined as a method to verify electronically ---
        a) for authenticity
        b) for authorization
        c) for credentials
        d) None
117CRL is -
        a) Certification Revocation List
        b) Certificate Revocation laws
        c) Certificate Revocation List
        d) None
118 CRL is maintained by –
        a) Protocol Authority
        b) Governments Authority
        c) Certificate Authority
        d) None
119Fast cryptographic algorithm which is used for generating message digests is –
        a) One-way hash functions
        b) Two – way has functions
        c) Only hash functions
        d) None
120 Transposition ciphers are based on the rearrangement of each character in the plain
text message to produce a cipher text.
        a) True
        b) False
        c) Any

            PC Training Institute Ltd., An ISO-9001 Certified Organisation

       d) None

121.Firewall should be situated ___________.
       a. inside a corporate network
       b. outside a corporate network
       c. between a corporate network and the outside world
       d. none of these

122 Firewall is a specialized form of a ___________.
       a. bridge                      b. disk
       c. printer                     d. router
123 A packet filter examines __________ packets.
       a. all                         b. no
       c. some                        d. alternate
124 __________ adapts itself to the changing conditions.
       a. Stateless static filter     b. Static packet filter
       c. Adaptive packet filter      d. Stateful packet filter
125. Application gateways are _________ packet filters.
       a. less secure than            b. more secure than
       c. equally secure to           d. slower

                         We touch the future ☺ we teach !

To top