VIEWS: 19 PAGES: 14 POSTED ON: 2/1/2012
PC TRAINING INSTITUTE LIMITED Internetworking with TCP/IP 1.Tcp/ip stands for :- a) Transmission control protocol b) Transfer control protocol c) Transmission control prototype d) None of these 2.ip stands for:- a) Internet prototype b) Intranet protocol c) Internet protocol d) None of these 3.OSI stands for:- a) Open source interface b) Object source interface c) Open system interconnection d) None of these 4. tcp/ip protocol layers a) Seven b) Four c) Five d) Eight 5.OSI reference model a) Four b) Five c) Seven d) Eight 6 The decimal range of network address for class B network is between A) 127-190 B) B) 128-190 C) 128-191 D) D) None of the above 7 Which of the following is true? A) TCP/IP account is less expensive then shell account and does not allow graphics to download B) TCP/IP account is more expensive than shell account and does allow graphics to download C) TCP/IP account is more expensive than shell account and allow graphics to download D) None of the above 8 DNS server is used for A) To translate the domain name of another computer into IP address only B) To translate the domain name of another computer into another computer into IP address and vice versa on request C) To translate the IP address to domain name PC Training Institute Ltd., An ISO-9001 Certified Organisation PC TRAINING INSTITUTE LIMITED D) None of the above 9. The leading bit pattern for class c network is A) 0 B) 10 C) 101 D) None of the above 10. Which of the following is true A) TCP/IP link allows your computer to function as an internet host B) Local area network link allows your computer function as an internet host C) TCP/IP link does not allow computer to internet host D) Local area network link cannot be used as interanet host 11.FDDI stands for a) fiber disturbed data interface b) fiber distributed data interface c) fiber distributed data internet d) none of the above 12.ppp stands for a) point to point protocol b) peer to peer protocol c) peer to point protocol d) none of the above 13.ATM stands for a) any time money b) asynchronous transfer mode c) any transfer mode d) none of the above. 14.how many class of IP ADDRESS? a) One b) Three c) Five d) None of the above. 15.what is the binary value of 68. a) 01000100 b) 01010100 c) 11100101 d) 10110111 16.TCP divides the data into chunks called as ______ and gives each chunk a _____. a. Packet, Name b. Packet, number c. Group, data number d. Gateway 17. The ________ Protocol attaches to the packet the address from which the data comes and the address of the system to which is going in a __________. a. TCP, Protocol header b. IP, Protocol header c. IP, Protocol stack d. TCP, Protocol stack 18. . _______ specifies the rules that determine how communication takes place over a network. a. Datagram b. Packet c. Protocol d. All of these We touch the future ☺ we teach ! PC TRAINING INSTITUTE LIMITED 19. A _________ consists of series of bits that include control informations for transmitting the data and data itself. a. Data b. Packet c. Both a & b d. None of the above. 20. The ________ allows exchange of data at a level by two different network systems supporting the functions of a related layer. a. Peer-to-Peer communication b. Open System concept c. TCP/IP d. All of these 21. The purpose of _______ protocol os to provide basic host-to-host communication a. TCP b. IP c. FTP d. HTTP 22. The port number lies in the range of ________. a. 1-65535 b. 1-1024 c. 1-1023 d. None 23. CDSA stands for __________. a. Common Data Security Architecture b. Common Data Server Architecture c. Common Domain Security Architecture d. Computer Data Security Architecture 24.POP stands for_________. a. Public Office Protocol. b. Post Office Protocol. c. Private Office Protocol. d. None 25. VPN stands for ___________. a. Virtual Private Network. b. Virtual Protected Network. c. Virtual Public Network. d. None of these. 26 Satellite Communication channels is the example of a) Simple Duplex b) Half Duplex c) Full Duplex d) None 27. Smallest unit of Data speed that u know is – a) Byte per second b) Bits per second c) Both d) None 28. Baud is – a) Electrical Signal over transmission lines b) Analog signal over transmission lines c) Satellite signal d) None 29.Data is transmitted one bit at time, it is – a) Asynchronous Serial Transmission b) Synchronous Serial Transmission c) Any d) None 30.……………..Technology an upper limit for block size is kept? a) Message Switching PC Training Institute Ltd., An ISO-9001 Certified Organisation PC TRAINING INSTITUTE LIMITED b) Packet Switching c) Circuit switching d) None 31.For long distance communication ---------- transmission mode is used. a) Serial Mode b) Parallel Mode c) Both d) None 32. The term topology describes ----------- way in which computers are organized and connected in a network – a) Illogical b) Logical c) Syntactical d) None 33.In ------------- Networks transmitting and receiving equipments are geographically distributed – a) Lan b) Man c) Wan d) None 34.Level 5 UTP cable has speed – a) 100 mbps b) 50 mbps c) 150 mbps d) None 35.BNC connector stands for a) Bayonet Locking b) Broadcast network computing c) Binary network computing d) None 36.CSMA stands for – a) Carrier Sense Multiple Access b) Carrier sent multiple access c) Carrier senseless multi access d) None 37.The flag bit pattern in frame format of HDLC is – a) 01111100 b) 01111101 c) 00111111 d) 01111110 38.Bisync organizes data into blocks of upto ------------- characters a) 256 b) 512 c) 275 d) None 39.for low speed data communications ----------------- protocol is used – We touch the future ☺ we teach ! PC TRAINING INSTITUTE LIMITED a) Synchronous b) FTP c) SNTP d) Asynchronous 40.TCP/IP has ------- layers – a) 7 layers b) 4 layers c) 5 layers d) None 41.SDLC stands for a) Synchronous Data Link Control computer b) Syntactical Data Link Control protocol c) Synchronous Data Link Control protocol d) Synchronous Data Link Computer protocol 42.An ------------- is a network that fits between the LAN and the Internet. a) Internets b) Extranets c) Intranets d) None 43.FDDI stands for – a) Fibre Distributed Data Interface b) Fibre Data Distributed Interface c) File Document Distributed Interface d) None 44.IEEE stands for – a) Institute of Electrical and Electronics Engineering b) Institute of Electronics and Electricity Engineering c) Institute of Electrical and Electronics Engineering d) None 45.FDDI uses ---------- as transmission medium. a) Fibre b) Simple Cable c) Optical Fibre d) None 46Repeaters exist in which layer of OSI reference model – a) Application Layer b) Presentation Layer c) Physical Layer d) Network Layer 47 The network area within which data packets originates and collide is called as - a) Collision Detection b) Collision Domain c) Common Domain d) None 48----------- device used to transmit data packets to two different networks – a) Hub PC Training Institute Ltd., An ISO-9001 Certified Organisation PC TRAINING INSTITUTE LIMITED b) Switch c) Router d) Bridge 49 Bridges filter network traffic depending on ------------- address a) MAC b) CAM c) MAC and CAM d) None 50 IP Address has in total ---------- bytes – a) 32 bytes b) 8 – bytes c) 1 bytes d) 4 - bytes 51 The no. of bits to identify the network in class A is – a) 8 b) 16 c) 32 d) 24 52 Number of bits used for multi cast addresses is – a) 7 b) 14 c) 21 d) 28 53 Starting bit patterns for class C networks is – a) 101 b) 010 c) 110 d) None 54 IP Address from 184.108.40.206 to 220.127.116.11 belongs to ------------------ class a) A b) B c) C d) D 55 ARP request frame is divided into – a) Frame header & MAC b) Frame header & Frame Tail c) Frame header & ARP message d) None 56 ARP Table contains ------------------- address a) Frame Address b) MAC address c) Both d) None 57 ---------------- answers the RARP requests in a network. a) ARP server We touch the future ☺ we teach ! PC TRAINING INSTITUTE LIMITED b) RARP server c) Both d) None 58 Source machine gets MAC address of destination machine using – a) RARP b) MAC c) ARP d) None 59 The LAN’S connection to the -------------- provides WAN connectivity. a) Router b) Bridge c) Hub d) None 60 In hierarchical communications topology FDDI inter connects – a) Client farm b) Server farm c) Both None d) None 61 LAN’S contain ------ distinct functional areas . a) 1 b) 2 c) 3 d) 4 62 In list Oriented approach each resource has – a) Access Control list b) Ticket and list c) Both d) None 63 Discretionary and mandatory are two kinds of – a) Ticket and list policies b) Permission grant policies c) Access control policies d) None 64 An access control mechanism processes user’s requests in three steps. One of them is- a) Authorisation b) Activation c) Authentication d) None 65 SNMP stands for a) Simple Network Management plateform b) Simple Network Mail protocol c) Simple Net Management plateform d) Simple Network Management protocol 66 Transformation of plaintext into cipher text is called – a) Cryptography PC Training Institute Ltd., An ISO-9001 Certified Organisation PC TRAINING INSTITUTE LIMITED b) Decryption c) Encryption d) None 67 The transformed message is known is - a) Cipher Text b) Plain Text c) Digital text d) None 68 SNMP model consists of ------------ number if components. a) 1 b) 2 c) 3 d) 4 69 Encryption is process of changing Intelligent data to unintelligent data. a) True b) False c) Any d) None 70 UTP stands for – a) Unshaped Twisted Pair b) Untapped Transport pair c) Unshielded Twisted Pair d) None 71 CRC stands for – a) Cyclic Redundancy cheque b) Cyclic Redundancy Correction c) Cyclic Redundancy Code d) None 72 Inter NIC is known as – a) International Net Information Communication b) Inter Network Information Command c) International Network Institute Center d) International Network Information Center 73 It is ------------- to have IPAddress for each LAN. a) must b) optional c) your choice d) senseless 74 ATM is – a) Asynchronous Transfer Modifier b) Asynchronous Transformation Modification c) Automated Tool Machine d) Asynchronous Transfer Mode 75 ICMP means for – We touch the future ☺ we teach ! PC TRAINING INSTITUTE LIMITED a) Internet Control message protocol b) Intranet Control message protocol c) Internet Conversion message protocol d) None 76 IGMP means - a) Intranet Group management protocol b) Intranet Group management prototype c) Internet Group management protocol d) Intranet Groups management protocol 77 GGP means – a) Gateway to Gateway Protocol b) Gateways to Gateways Protocol c) Gateway to Group d) None 78 Proxy is – a) An application leverage Gateway b) An application level Game c) An application level Router d) An application level Gateway 79 Firewall contains one or more – a) Software Elements b) Hardware Elements c) Both d) None 80 Network terminology NAT is – a) Network Address Transformation b) Net Address Transformation c) Network Address Transfer d) Network Address Translation 81 RPC standard developed by – a) Sun Microsystems b) Microsoft c) WEA d) None 82 SOCKS is standard for a) Circuit-level gateways b) Packet level gateways c) Switch level gate d) None 83 NFS is – a) Network File security b) Net format support c) Network File System d) None 84 TFTP full form is – a) Trial File Transfer Protocol PC Training Institute Ltd., An ISO-9001 Certified Organisation PC TRAINING INSTITUTE LIMITED b) Trivial File Transformations Protocol c) Trivial File Transfer Protocol d) None 85 Multiplexing actually achieved through – a) Socket b) Protocol c) Port d) None 86 Socket interface is one of several -------------- a) Application Programming Interface b) Application Programming Interface protocol c) Additional Programming Interface d) Application Program Interface 87 GOPHER is a – a) Protocol b) Prototype c) Parameter type protocol d) None 88 TELNET is a ---- a) LAN protocol b) WAN protocol c) MAN protocol D) none 89 Bridge is used for --- a) Connect two network b) Connect two system c) Both d) None 90 DHCP is a ---- a) protocol b) feature c) both d) None 91 DHCP is used to – a) Assign automatically IP Address b) Assign automatically computer name c) Both d) None 92 MMC stands for --- a) Microsoft Management Console b) Microsoft Management Computer c) Microsystems Management Console d) None 93 LCP is used in --- a) PPP Protocol b) ASLIP protocol We touch the future ☺ we teach ! PC TRAINING INSTITUTE LIMITED c) Both None d) None 94 Subnet addresses usually assigned by – a) Normal user a) Network Administrator b) Anyone c) None 95 Destination address is determined using – a) a) Protocol address b) Subnet mask c) Subnet address d) Any 96 --------- ------- are used for multicast and future use. a) class A and class B b) class C and class B c) class D and class B d) class D and class E 97 Repeaters exist in --------- layer of OSI reference model. a) Application b) Presentation c) Physical d) All the 98 Routers are another type of internetworking --------------- a) protocol b) format c) device d) None 99 Bridge operate at ---- a) Network Layer b) Application Layer c) Presentation d) Data Link layer 100 -------- device serves as center of a network . a) Repeater b) Bridge c) Hub d) Router 101) -------- used to increase the extent of the network a) Repeaters b) Bridge c) Hub d) Router 102 -------- used to increase the number of network nodes. a) Repeaters b) Bridge c) Hub PC Training Institute Ltd., An ISO-9001 Certified Organisation PC TRAINING INSTITUTE LIMITED d) Router 103 Each HDLC fame has a ----------- bit pattern, called flag. a) 01111100 b) 10000001 c) 00110011 d) 01111110 104 HDLC is developed by the --------- a) ISO b) IBM c) SUN d) None 105 Accessing remote files, remote databases etc. is supported by – a) Network Layer b) Data Link layer c) Application Layer d) Session layer 106 If sender sends 1 bits then ------- bits should be received by receiver. a) 0 b) 1 c) both d) None 107 Routing Algorithms are used to build and maintain the ----- a) FAT table b) Protocol table c) IP routing table d) None 108 BOOTP is – a) booting process on a client b) booting process on a server c) bootstrap protocol d) boot protocol 109 ---------- layer is concerned with controlling the operation of the subnet. a) Transport b) Session c) Physical d) Network 110 Protocol stack is ----- a) certain protocol per layer b) certain protocol per application c) certain protocol per system d) none 111protocol is set of ---- a) prototypes b) protons c) rules and regulations d) None We touch the future ☺ we teach ! PC TRAINING INSTITUTE LIMITED 112--------- protocol is used basically for low speed data communication. a) DLC b) BSC c) SDLC d) HDLC 113Internet is interconnection of – a) geographically dispersed homogeneous computers system. b) Locally dispersed homogeneous computers system. c) Metropolitans dispersed homogeneous computers system. d) geographically dispersed heterogeneous computers system.d 114Ethernet which is widely used type of LAN based on IEEE ---------- a) IEEE 802.1 b) IEEE 802.2 c) IEEE 803.3 d) None 115-------- standard specifies the protocol and access mechanism for a Metropolitan Area Network. – a) IEEE 802.5 b) IEEE 802.6 c) IEEE 802.2 d) IEEE 802.1 116Digital certificate is defined as a method to verify electronically --- a) for authenticity b) for authorization c) for credentials d) None 117CRL is - a) Certification Revocation List b) Certificate Revocation laws c) Certificate Revocation List d) None 118 CRL is maintained by – a) Protocol Authority b) Governments Authority c) Certificate Authority d) None 119Fast cryptographic algorithm which is used for generating message digests is – a) One-way hash functions b) Two – way has functions c) Only hash functions d) None 120 Transposition ciphers are based on the rearrangement of each character in the plain text message to produce a cipher text. a) True b) False c) Any PC Training Institute Ltd., An ISO-9001 Certified Organisation PC TRAINING INSTITUTE LIMITED d) None 121.Firewall should be situated ___________. a. inside a corporate network b. outside a corporate network c. between a corporate network and the outside world d. none of these 122 Firewall is a specialized form of a ___________. a. bridge b. disk c. printer d. router 123 A packet filter examines __________ packets. a. all b. no c. some d. alternate 124 __________ adapts itself to the changing conditions. a. Stateless static filter b. Static packet filter c. Adaptive packet filter d. Stateful packet filter 125. Application gateways are _________ packet filters. a. less secure than b. more secure than c. equally secure to d. slower We touch the future ☺ we teach !