Welcome to your networking quiz Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender?BroadcastingUnicastingPacket switchingCircuit switching Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit?FINRSTSYNPSH Which are the two modes of IP security?Transport and certificateTransport and tunnelCertificate and tunnelPreshared and transport A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is :CTTOEWMROPNRUEKMROUEKCTTPNROEWOEWPNRCTTUEKMROUEKPNRMROOEWCTT Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits?32 kbps64 kbps128 kbps256 kbps The maximum payload of a TCP segment is :65,53565,51565,49565,475 In a binary Hamming Code the number of check digits is r then number of message digits is equal to :2^r – 12^r – r – 12^r – r + 12^r + r – 1 In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps?10 bps100 bps1000 bps10000 bps Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide.30,00032,70033,00033,000 None of the above Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC).32-bit64-bit6-bytenone of the above You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?100 kbps10 Mbps1 Mbps2 Mbps How many bytes are in Ethernet address?6543 How different computers are connected to a LAN by a cable?.Interface cardModemDSLDSLAM How many bits are there in the Ethernet address?64 bits48 bits32 bits16 bits On an Ethernet network, this is the unit of data that is transmitted between network points. It has explicit minimum and maximum lengths and a set of required pieces of information that must appear within it.data-chunkframedata packetpacket _____ transmission technology (based on Ethernet) provides a data rate of 1 billion bits per second.10BASE-T EthernetStandard EthernetFast EthernetGigabit Ethernet A personal computer or workstation on an Ethernet network must have one of these cards.TDINICPCINone of the above This is a device that can be used to connect one Ethernet network to another nearby Ethernet network.gatewayswitchbridgeforwarder What is the hexadecimal equivalent of the Ethernet address 01011010 00010001 01010101 00011000 10101010 00001111?5A:88:AA:18:55:F05A:81:BA:81:AA:0F5A:18:5A:18:55:0F5A:11:55:18:AA:0F The GSM network is divided into the following three major systems :SS, BSS, OSSBSS, BSC, MSCCELL, BSC, OSSSS, CELL, MSC The Mobile Application Protocol (MAP) typically runs on top of which protocol ?SNMP (Simple Network Management Protocol)SMTP (Simple Mail Transfer Protocol)SS7 (Signalling System 7)HTTP (Hyper Text Transfer Protocol) If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment.FirstMiddleLastAll of the above The design issue of Datalink Layer in OSI Reference Model isFramingRepresentation of bitsSynchronization of bitsConnection control Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75Ω used forCable TVEthernetThin EthernetThick Ethernet AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits.5, 7, 1510, 12, 145, 6, 200720, 12, 14 Data Encryption Techniques are particularly used for _______.protecting data in Data Communication Systemreduce Storage Space Requirementenhances Data Integritydecreases Data Integrity An example of a layer that is absent in broadcast networks is:Physical layerPresentation layerNetwork layerApplication layer The ATM cell is48 bytes long53 bytes long64 bytes long69 bytes long The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known asBit stuffingPiggy backingPipeliningBroadcasting Using RSA algorithm, what is the value of cipher text C, if the plain text M = 5 and p = 3, q = 11 & d = 7 ?3352526 In classful addressing, an IP address 123.23.156.4 belongs to ______ class format..A.BCD When data and acknowledgement are sent in the same frame, this is called asPiggy packingPiggy backingBack packingGood packing Encryption and Decryption is the responsibility of ___ Layer.PhysicalNetworkApplicationDatalink An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are ________ and ____________4000 bauds \ sec & 1000 bps2000 bauds \ sec & 1000 bps1000 bauds \ sec & 500 bps1000 bauds \ sec & 4000 bps The VLF and LF bauds use propagation for communicationGroundSkyLine of sightSpace Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is101105103107 Which of the following is widely used inside the telephone system for long-haul data traffic?ISDNATMFrame RelayISTN The message 11001001 is to be transmitted using the CRC polynomial x3 +1 to protect it from errors. The message that should be transmitted is :1100100110011100100111001001100100111001001011 What is the bit rate for transmitting uncompressed 800 x 600 pixel colour frames with 8 bits/pixel at 40 frames/second?2.4 Mbps15.36 Mbps153.6 Mbps1536 Mbps In IPV 4, the IP address 200.200.200.200 belongs toClass AClass BClass CClass D Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to 'ensure correct re-composition from end to end of the network?'PhysicalData-linkTransportApplication 26.A client-server system uses a satellite network, With the satellite at a height of 40,000 kms. What is the best-case delay in response to a request (Note that the speed of light in air is 3,00,000 km/second).133.33 m sec266.67 m sec400.00 m sec533.33 m sec The start and stop bits are used in serial communication forerror detectionerror correctionsynchronizationslowing down the communication ___________ is a type of transmission impairment in which the SIgnal looses strength due to The resistance of the transmission medium.AttenuationDistortionNoiseDecible An analog signal has a bit rate of 6000 bps and a baud rate of 2000 baud. How many data elements are carried by each signal element?0.336 bits baud3 bits baud120,00,000 bits baudNone of the above In a classful addressing, first four bits in Class A IP address is1010110010111110 How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key?16171819 Which of the following algorithms is not a broadcast routing algorithm?FloodingMulti-destination routingReverse path forwardingAll of the above 35.The period of a signal is 10 ms. What is its frequency in Hertz?10100100010000 For n devices in a network, ____ , number of duplex-mode links are required, for a mesh topology.n(n + 1)n(n - 1)n(n + 1) /2n(n - 1)/2 How many characters per second (7 bits + 1 parity) can be transmitted over a 3200 bps line if the transfer is asynchronous? (Assuming 1 start bit and 1 stop bit)300320360400 Which of the following is not a field in TCP header ?Sequence number.Fragment offSetChecksumWindow size _________________ is a bit-oriented protocol for communication over point-to-point and multi-point links .Stop-and-waitHDLCSliding windowGo-back-N What is the propagation time if the distance between the two points is 48,900 ? Assume the propagation speed to be 2.4 x 108 meter/second in cable.0.5 ms20 ms50 ms200 ms Which one of the following is true for asymmetric-key cryptography?Private key is kept by the receiver and public key is announced to the publicPublic key is kept by the receiver and private key is announced to the publicBoth private key and public key are kept by the receiverBoth private key and public key are announced to the public A Trojan horse isA program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonationA piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferredA program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processesAll of the above In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the textpolyalphabeticmono alphabetictranspositionalmultialphabetic Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNEBUTAEEZSUZANNEXYZABCDABCDXYZ Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions?Session Maintenance ProtocolReal - time Streaming ProtocolReal - time Transport Control ProtocolSession Initiation Protocol Which of the following is not associated with the session layer ?Dialog controlToken managementSemantics of the information transmittedSynchronization What is the size of the 'total length' field in IPv4 datagram ?4 bits8 bits16 bits16 bits Which of the following is/are restriction(s) in classless addressing ?The number of addresses needs to be a power of 2The mask needs to be included in the address to define the blockThe starting address must be divisible by the number of addresses in the blockAll of the above The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called :StrobingAmplificationConditioningQuantization A terminal multiplexer has six 1200 bps' terminals and 'n' 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ?481628 Which of the following is used in the options field of IPv4 ?Strict source routingLoose source routingtime stampAll of the above Which layers of the OSI reference model are host-to-host layers ?Transport, Session, Presentation, ApplicationNetwork, Transport, Session, PresentationData-link, Network, Transport, SessionPhysical, Data-link, Network, Transport A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?1024204840968192 Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ?481516 A Multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ?100 Kbps200 Kbps400 Kbps1000 Kbps In a fully connected mesh network with 10 computers, total ______ number of cables are required and ____ number of ports are required for each device.40,945,1045,950,10 In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination.PhysicalHost to networkApplicationNone of the above If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:NN-1N*(N-1)/2N*(N+1)/2 Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle..equal toless thangreater thanless than or equal to An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ..............Masquerade AttackReplay AttackPassive AttackDenial of Service Attack The maximum size of the data that the application layer can pass on to the TCP layer below is .........2^16 bytes2^16 bytes + TCP header lengthAny size2^16 bytes - TCP header length A packet whose destination is outside the local TCP/IP network segment is sent to ..............File serverDNS serverDHCP serverDefault gateway Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ...........automaticallyby serverby exchanging information with neighbor nodeswith back up database In link state routing algorithm after the construction of link state packets, new routes are computed using:DES algorithmDijkstra's algorithmRSA algorithmPackets Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is ..................nP(1-P)^n-1nPP(1-P)^n-1n^P(1-P)^n-1 Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is20103040 Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be:(1+x) is factor of G(x)(1-x) is factor of G(x)(1+x^2) is factor of G(x)x is factor of G(x) In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................2 bytes1 byte4 bytes5 bytes A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs.1234 Which of the following statements is not true with respect to microwaves?Electromagnetic waves with frequencies from 300 GHz to 400 THz.Propagation is line-of-sight.Very high-frequency waves cannot penetrate walls.Use of certain portions of the band requires permission from authorities. In a fast Ethernet cabling, 100 Base-TX uses ........... cable and maximum segment size is ............twisted pair, 100 metrestwisted pair, 200 metresfibre optics, 1000 metres.fibre optics, 2000 metres A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network ?1 Mbps2 Mbps10 Mbps12 Mbps Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine?POP3IMAPSMTPDMSP An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as ..............Denial of service attackMasquarade attackSimple attackComplex attack Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is ................2 sec3 sec4 sec1 sec Consider the following statements :High speed Ethernet works on optic fiber.A point to point protocol over Ethernet is a network protocol for encapsulating PPP frames inside Ethernet frames.High speed Ethernet does not work on optic fiber.A point to point protocol over Ethernet is a network protocol for encapsulating Ethernet frames inside PPP frames. Which of the following is correct ?a and b are true; c and d are falsea and b are true; c and d are false a and b are false; c and d are truea, b, c and d are truea, b, c and d are false Which address is used in an internet employing the TCP/IP protocols?physical address and logical addressport addressspecific addressall of the mentioned Which address identifies a process on a host?physical addresslogical addressport addressspecific address Transmission data rate is decided bynetwork layerphysical layerdata link layertransport layer When collection of various computers seems a single coherent system to its client, then it is calledcomputer networkdistributed systemboth (a) and (b)none of the mentioned Two devices are in network ifprocess in one device is able to exchange information with a process in another deviceprocess is running on both devicesPIDs of the processes running of different devices are samenone of the mentioned Which one of the following computer network is built on the top of another network?prior networkchief networkprime networkoverlay network In computer network nodes arethe computer that originates the datathe computer that routes the datathe computer that terminates the dataall of the mentioned Communication channel is shared by all the machines on the network inunicast networkmulticast networkbroadcast networknone of the mentioned Bluetooth is an example ofpersonal area networklocal area networkvirtual private networknone of the mentioned A _____ is a device that forwards packets between networks by processing the routing information included in the packet..bridgefirewallrouterall of the mentioned Time is Up!