Welcome to your networking quiz Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? Broadcasting Unicasting Packet switching Circuit switching Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? FIN RST SYN PSH Which are the two modes of IP security? Transport and certificate Transport and tunnel Certificate and tunnel Preshared and transport A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is : CTTOEWMROPNRUEK MROUEKCTTPNROEW OEWPNRCTTUEKMRO UEKPNRMROOEWCTT Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits? 32 kbps 64 kbps 128 kbps 256 kbps The maximum payload of a TCP segment is : 65,535 65,515 65,495 65,475 In a binary Hamming Code the number of check digits is r then number of message digits is equal to : 2^r – 1 2^r – r – 1 2^r – r + 1 2^r + r – 1 In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps? 10 bps 100 bps 1000 bps 10000 bps Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide. 30,000 32,700 33,000 33,000 None of the above Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC). 32-bit 64-bit 6-byte none of the above You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server? 100 kbps 10 Mbps 1 Mbps 2 Mbps How many bytes are in Ethernet address? 6 5 4 3 How different computers are connected to a LAN by a cable? .Interface card Modem DSL DSLAM How many bits are there in the Ethernet address? 64 bits 48 bits 32 bits 16 bits On an Ethernet network, this is the unit of data that is transmitted between network points. It has explicit minimum and maximum lengths and a set of required pieces of information that must appear within it. data-chunk frame data packet packet _____ transmission technology (based on Ethernet) provides a data rate of 1 billion bits per second. 10BASE-T Ethernet Standard Ethernet Fast Ethernet Gigabit Ethernet A personal computer or workstation on an Ethernet network must have one of these cards. TDI NIC PCI None of the above This is a device that can be used to connect one Ethernet network to another nearby Ethernet network. gateway switch bridge forwarder What is the hexadecimal equivalent of the Ethernet address 01011010 00010001 01010101 00011000 10101010 00001111? 5A:88:AA:18:55:F0 5A:81:BA:81:AA:0F 5A:18:5A:18:55:0F 5A:11:55:18:AA:0F The GSM network is divided into the following three major systems : SS, BSS, OSS BSS, BSC, MSC CELL, BSC, OSS SS, CELL, MSC The Mobile Application Protocol (MAP) typically runs on top of which protocol ? SNMP (Simple Network Management Protocol) SMTP (Simple Mail Transfer Protocol) SS7 (Signalling System 7) HTTP (Hyper Text Transfer Protocol) If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment. First Middle Last All of the above The design issue of Datalink Layer in OSI Reference Model is Framing Representation of bits Synchronization of bits Connection control Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75Ω used for Cable TV Ethernet Thin Ethernet Thick Ethernet AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits. 5, 7, 15 10, 12, 14 5, 6, 2007 20, 12, 14 Data Encryption Techniques are particularly used for _______. protecting data in Data Communication System reduce Storage Space Requirement enhances Data Integrity decreases Data Integrity An example of a layer that is absent in broadcast networks is: Physical layer Presentation layer Network layer Application layer The ATM cell is 48 bytes long 53 bytes long 64 bytes long 69 bytes long The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as Bit stuffing Piggy backing Pipelining Broadcasting Using RSA algorithm, what is the value of cipher text C, if the plain text M = 5 and p = 3, q = 11 & d = 7 ? 33 5 25 26 In classful addressing, an IP address 184.108.40.206 belongs to ______ class format. .A .B C D When data and acknowledgement are sent in the same frame, this is called as Piggy packing Piggy backing Back packing Good packing Encryption and Decryption is the responsibility of ___ Layer. Physical Network Application Datalink An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are ________ and ____________ 4000 bauds \ sec & 1000 bps 2000 bauds \ sec & 1000 bps 1000 bauds \ sec & 500 bps 1000 bauds \ sec & 4000 bps The VLF and LF bauds use propagation for communication Ground Sky Line of sight Space Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is 101 105 103 107 Which of the following is widely used inside the telephone system for long-haul data traffic? ISDN ATM Frame Relay ISTN The message 11001001 is to be transmitted using the CRC polynomial x3 +1 to protect it from errors. The message that should be transmitted is : 110010011001 11001001 110010011001001 11001001011 What is the bit rate for transmitting uncompressed 800 x 600 pixel colour frames with 8 bits/pixel at 40 frames/second? 2.4 Mbps 15.36 Mbps 153.6 Mbps 1536 Mbps In IPV 4, the IP address 220.127.116.11 belongs to Class A Class B Class C Class D Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to 'ensure correct re-composition from end to end of the network?' Physical Data-link Transport Application 26.A client-server system uses a satellite network, With the satellite at a height of 40,000 kms. What is the best-case delay in response to a request (Note that the speed of light in air is 3,00,000 km/second). 133.33 m sec 266.67 m sec 400.00 m sec 533.33 m sec The start and stop bits are used in serial communication for error detection error correction synchronization slowing down the communication ___________ is a type of transmission impairment in which the SIgnal looses strength due to The resistance of the transmission medium. Attenuation Distortion Noise Decible An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element? 0.336 bits baud 3 bits baud 120,00,000 bits baud None of the above In a classful addressing, first four bits in Class A IP address is 1010 1100 1011 1110 How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key? 16 17 18 19 Which of the following algorithms is not a broadcast routing algorithm? Flooding Multi-destination routing Reverse path forwarding All of the above 35.The period of a signal is 10 ms. What is its frequency in Hertz? 10 100 1000 10000 For n devices in a network, ____ , number of duplex-mode links are required, for a mesh topology. n(n + 1) n(n - 1) n(n + 1) /2 n(n - 1)/2 How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous? (Assuming 1 start bit and 1 stop bit) 300 320 360 400 Which of the following is not a field in TCP header ? Sequence number .Fragment offSet Checksum Window size _________________ is a bit-oriented protocol for communication over point-to-point and multi-point links . Stop-and-wait HDLC Sliding window Go-back-N What is the propagation time if the distance between the two points is 48,900 ? Assume the propagation speed to be 2.4 x 108 meter/second in cable. 0.5 ms 20 ms 50 ms 200 ms Which one of the following is true for asymmetric-key cryptography? Private key is kept by the receiver and public key is announced to the public Public key is kept by the receiver and private key is announced to the public Both private key and public key are kept by the receiver Both private key and public key are announced to the public A Trojan horse is A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes All of the above In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text polyalphabetic mono alphabetic transpositional multialphabetic Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE BUTAEEZ SUZANNE XYZABCD ABCDXYZ Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? Session Maintenance Protocol Real - time Streaming Protocol Real - time Transport Control Protocol Session Initiation Protocol Which of the following is not associated with the session layer ? Dialog control Token management Semantics of the information transmitted Synchronization What is the size of the 'total length' field in IPv4 datagram ? 4 bits 8 bits 16 bits 16 bits Which of the following is/are restriction(s) in classless addressing ? The number of addresses needs to be a power of 2 The mask needs to be included in the address to define the block The starting address must be divisible by the number of addresses in the block All of the above The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called : Strobing Amplification Conditioning Quantization A terminal multiplexer has six 1200 bps' terminals and 'n' 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ? 4 8 16 28 Which of the following is used in the options field of IPv4 ? Strict source routing Loose source routing time stamp All of the above Which layers of the OSI reference model are host-to-host layers ? Transport, Session, Presentation, Application Network, Transport, Session, Presentation Data-link, Network, Transport, Session Physical, Data-link, Network, Transport A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ? 1024 2048 4096 8192 Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ? 4 8 15 16 A Multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ? 100 Kbps 200 Kbps 400 Kbps 1000 Kbps In a fully connected mesh network with 10 computers, total ______ number of cables are required and ____ number of ports are required for each device. 40,9 45,10 45,9 50,10 In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination. Physical Host to network Application None of the above If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: N N-1 N*(N-1)/2 N*(N+1)/2 Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle. .equal to less than greater than less than or equal to An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. Masquerade Attack Replay Attack Passive Attack Denial of Service Attack The maximum size of the data that the application layer can pass on to the TCP layer below is ......... 2^16 bytes 2^16 bytes + TCP header length Any size 2^16 bytes - TCP header length A packet whose destination is outside the local TCP/IP network segment is sent to .............. File server DNS server DHCP server Default gateway Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... automatically by server by exchanging information with neighbor nodes with back up database In link state routing algorithm after the construction of link state packets, new routes are computed using: DES algorithm Dijkstra's algorithm RSA algorithm Packets Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is .................. nP(1-P)^n-1 nP P(1-P)^n-1 n^P(1-P)^n-1 Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is 20 10 30 40 Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be: (1+x) is factor of G(x) (1-x) is factor of G(x) (1+x^2) is factor of G(x) x is factor of G(x) In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ 2 bytes 1 byte 4 bytes 5 bytes A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs. 1 2 3 4 Which of the following statements is not true with respect to microwaves? Electromagnetic waves with frequencies from 300 GHz to 400 THz. Propagation is line-of-sight. Very high-frequency waves cannot penetrate walls. Use of certain portions of the band requires permission from authorities. In a fast Ethernet cabling, 100 Base-TX uses ........... cable and maximum segment size is ............ twisted pair, 100 metres twisted pair, 200 metres fibre optics, 1000 metres .fibre optics, 2000 metres A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ? 1 Mbps 2 Mbps 10 Mbps 12 Mbps Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine? POP3 IMAP SMTP DMSP An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. Denial of service attack Masquarade attack Simple attack Complex attack Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is ................ 2 sec 3 sec 4 sec 1 sec Consider the following statements : High speed Ethernet works on optic fiber. A point to point protocol over Ethernet is a network protocol for encapsulating PPP frames inside Ethernet frames. High speed Ethernet does not work on optic fiber. A point to point protocol over Ethernet is a network protocol for encapsulating Ethernet frames inside PPP frames. Which of the following is correct ? a and b are true; c and d are false a and b are true; c and d are false a and b are false; c and d are true a, b, c and d are true a, b, c and d are false Which address is used in an internet employing the TCP/IP protocols? physical address and logical address port address specific address all of the mentioned Which address identifies a process on a host? physical address logical address port address specific address Transmission data rate is decided by network layer physical layer data link layer transport layer When collection of various computers seems a single coherent system to its client, then it is called computer network distributed system both (a) and (b) none of the mentioned Two devices are in network if process in one device is able to exchange information with a process in another device process is running on both devices PIDs of the processes running of different devices are same none of the mentioned Which one of the following computer network is built on the top of another network? prior network chief network prime network overlay network In computer network nodes are the computer that originates the data the computer that routes the data the computer that terminates the data all of the mentioned Communication channel is shared by all the machines on the network in unicast network multicast network broadcast network none of the mentioned Bluetooth is an example of personal area network local area network virtual private network none of the mentioned A _____ is a device that forwards packets between networks by processing the routing information included in the packet. .bridge firewall router all of the mentioned Time is Up!