Computer Network Exam - 2021-2022
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which service is considered an application layer service?

  • Network virtual terminal
  • All of the mentioned (correct)
  • File transfer, access, and management
  • Mail service
  • SMTP is not used to deliver messages to which of the following?

  • User’s email server
  • User’s email client
  • User’s mailbox
  • User’s word processor (correct)
  • When sending multimedia data over SMTP, what encoding must it undergo?

  • ASCII (correct)
  • Hash
  • Binary
  • Signal
  • What is the purpose of port 20 in File Transfer Protocol (FTP)?

    <p>Data Connection</p> Signup and view all the answers

    Which of the following protocols is primarily used for email transfer?

    <p>Simple Mail Transfer Protocol (SMTP)</p> Signup and view all the answers

    How many layers are in the TCP/IP model?

    <p>5 layers</p> Signup and view all the answers

    What type of computer network operates spanning states, countries, or the whole world?

    <p>WAN</p> Signup and view all the answers

    Which layer in the OSI model is responsible for the syntax and semantics of the information transmitted?

    <p>Presentation</p> Signup and view all the answers

    Which layer in the OSI model is responsible for routing packets from source to destination?

    <p>Network</p> Signup and view all the answers

    Which layers of the OSI model perform the same function as the Application layer of the TCP/IP model?

    <p>Session, Presentation, Application</p> Signup and view all the answers

    Which layer of the OSI model provides inter-network connectivity?

    <p>Network</p> Signup and view all the answers

    Which of the following is a function of the Data Link layer?

    <p>Provides error detection and correction</p> Signup and view all the answers

    A computer network operating within a building or campus is referred to as what?

    <p>LAN</p> Signup and view all the answers

    Which of these options is not an application layer protocol?

    <p>TCP</p> Signup and view all the answers

    What is the datagram at the application layer called?

    <p>Message</p> Signup and view all the answers

    Which one of the following represents an architecture paradigm?

    <p>Both Peer to peer and Client-server</p> Signup and view all the answers

    The File Transfer Protocol is built on which type of architecture?

    <p>Client server architecture</p> Signup and view all the answers

    Telnet protocol is used to establish a connection to which TCP port number?

    <p>TCP port number 23</p> Signup and view all the answers

    Which of the following statements is true for E-mail applications?

    <p>Elastic application</p> Signup and view all the answers

    FTP is built on which type of architecture?

    <p>Client-server</p> Signup and view all the answers

    What does FTP stand for?

    <p>File Transfer Protocol</p> Signup and view all the answers

    What is the fixed-length header size of an IPv6 datagram?

    <p>40 bytes</p> Signup and view all the answers

    Which statement accurately describes fragmentation in IPv6?

    <p>Fragmentation is not allowed for IPv6.</p> Signup and view all the answers

    How many 8-bit octets are in an IPv6 address?

    <p>16</p> Signup and view all the answers

    What is the primary goal of a routing algorithm?

    <p>To find the least-cost path.</p> Signup and view all the answers

    What type of routing algorithm is Dijkstra's?

    <p>Link-state routing algorithm</p> Signup and view all the answers

    Which category does the Bellman-Ford routing algorithm belong to?

    <p>Distance vector routing protocol</p> Signup and view all the answers

    After running Dijkstra's algorithm for the second time at node u, which nodes are selected next?

    <p>u, w</p> Signup and view all the answers

    Which potential issue might Dijkstra's routing algorithm encounter?

    <p>Inaccurate link costs.</p> Signup and view all the answers

    Which cable is used for connecting computers directly?

    <p>Crossover cable</p> Signup and view all the answers

    What is the correct color code for the T568A standard?

    <p>White/Green, Green, White/Orange, Orange, White/Blue, Blue, White/Brown, Brown</p> Signup and view all the answers

    What differentiates wiring codes T568A and T568B?

    <p>Difference in color codes</p> Signup and view all the answers

    Which metric measures data transfer speed?

    <p>bps</p> Signup and view all the answers

    What does the abbreviation 'bps' represent?

    <p>Bits per second</p> Signup and view all the answers

    Which layer of the OSI model is responsible for controlling transmission errors?

    <p>Data Link layer</p> Signup and view all the answers

    What function of the data link layer prevents fast senders from overwhelming slow receivers?

    <p>Flow control</p> Signup and view all the answers

    What is a data unit called in the Data Link layer?

    <p>Frame</p> Signup and view all the answers

    How many segments will the network layer receive for a 4000-byte datagram with an MTU of 1500 bytes?

    <p>=3</p> Signup and view all the answers

    Which Boolean operator is used by a router to determine the network address from an IP address and net/subnet mask?

    <p>=AND</p> Signup and view all the answers

    What is the maximum number of subnets that can be organized with a class C subnet mask of 255.255.255.192?

    <p>=4</p> Signup and view all the answers

    Which of the following sets of IP addresses are classified as private IP addresses?

    <p>=10.10.10.1; 172.16.0.1; 192.168.1.2</p> Signup and view all the answers

    Which server is responsible for automatically assigning IP addresses to devices in a network?

    <p>=DHCP</p> Signup and view all the answers

    What is the function of NAT in a router?

    <p>=NAT</p> Signup and view all the answers

    What is the size of an IPv6 address?

    <p>=128 bits</p> Signup and view all the answers

    What is the size of the IP v6 datagram header?

    <p>=40 bytes</p> Signup and view all the answers

    Study Notes

    Computer Network Exam - 2021-2022

    • The exam covers computer networking concepts.
    • The exam was given at the Vietnam-Korea University of Information Technology.
    • The exam duration is 60 minutes.
    • The exam consists of multiple-choice questions.
    • The questions originate from a bank of 200 multiple-choice questions.

    Question 1

    • The computer network is a collection of hardware components and computers interconnected by communication channels.
    • It facilitates the sharing of resources and information.
    • All options are correct

    Question 2

    • ARPANET is considered the first computer network.

    Question 3

    • The OSI Model has seven layers.

    Question 4

    • The host-to-host layers are Transport, Session, Presentation, and Application.

    Question 5

    • The TCP/IP model has four layers.

    Question 6

    • A computer network spanning multiple countries or the entire world is called a WAN (Wide Area Network).

    Question 7

    • A computer network operating within a building or campus is called a LAN (Local Area Network).

    Question 8

    • The layer in the OSI model concerned with the syntax and semantics of information transmitted is the Presentation layer.

    Question 9

    • The layer in the OSI model that determines how packets are routed is the Network layer.

    Question 10

    • The layers (OSI) functioning similarly to the Application Layer (TCP/IP) are Session, Presentation, and Application.

    Question 11

    • The layer in the OSI model responsible for network connectivity is the Network layer.

    Question 12

    • The Data Link Layer is responsible for error detection and correction.

    Question 13

    • The correct arrangement of data units in the OSI model (top-down) is Data, Segment, Packet, Frame, Bit.

    Question 14

    • Networks are classified by scale: PAN, LAN, MAN, WAN.

    Question 15

    • Networks are classified by function: Peer-to-Peer and Client-Server

    Question 16

    • A broadcast communication network distributes messages from a single sender to all participants.

    Question 17

    • A protocol defines rules for formatting, transmitting, and receiving data.

    Question 18

    • The unit for measuring data transmission speed is bits per second (bps).

    Question 19

    • Circuit switching is inflexible after a connection path is established.

    Question 20

    • Packet switching dynamically routes packets to their destinations.

    Question 21

    • A Hub operates in the Physical layer of the OSI model.

    Question 22

    • A Switch operates in the Data Link layer of the OSI model.

    Question 23

    • A Router operates in the Network layer of the OSI model.

    Question 24

    • The Ping command is used to check if a device is reachable on a network.

    Question 25

    • The Ipconfig command manages IP addresses on a machine.

    Question 26

    • The fundamental data unit at the physical layer is a bit.

    Question 27

    • The Internet Layer (TCP/IP) functions similarly to the Network Layer (OSI).

    Question 28

    • UTP cables typically have four pairs of wires.

    Question 29

    • Twisted pair cables are twisted to reduce cross-talk interference.

    Question 30

    • UTP cables are classified by length of twist.

    Question 31

    • Category 5e UTP cable is frequently used in Ethernet networks.

    Question 32

    • The maximum length of a single UTP cable for data communication is 100 meters.

    Question 33

    • The maximum length of a single coaxial cable for data communication is 500 meters.

    Question 34

    • The maximum length of a single fiber optic cable for data communication is 2 kilometers.

    Question 35

    • Fiber optic cables are not susceptible to electromagnetic interference.

    Question 36

    • Total internal reflection is utilized in optical fiber transmission.

    Question 37

    • Coaxial cable is commonly used for cable television.

    Question 38

    • A repeater increases the power of a signal and retransmits it.

    Question 39

    • Several types of radiation (radio waves, microwaves, infrared radiation, visible light; ultraviolet radiation; X-rays, gamma rays) are used for communication.

    Question 40

    • Radio waves are used in radar, radio and TV communication, and microwave ovens.

    Question 41

    • Infrared waves are often used in remote control devices.

    Question 42

    • Radio waves are omnidirectional.

    Question 43

    • Microwaves and infrared waves are directional.

    Question 44

    • Wired and wireless networks vary in mobility, security, and speed.

    Question 45

    • Digital line coding is the process of encoding bits into signals.

    Question 46

    • Multiplexing combines multiple signals into one signal.

    Question 47

    • Demultiplexing separates multiple signals into their original signals.

    Question 48

    • Straight-through cables connect computers directly with switches.

    Question 49

    • Crossover cables are used to connect computers together directly.

    Question 50

    • White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown. is the color code for T568A.

    Question 51

    • Wiring standards T568A and T568B differ in wire color codes.

    Question 52

    • Transfer speeds are measured in bits per second (bps), megabits per second (Mbps), and gigabits per second (Gbps).

    Question 53

    • bps stands for bits per second.

    Question 54

    • The Data Link layer controls transmission errors.

    Question 55

    • The Data Link layer manages the flow of data to avoid overwhelming slow receivers.

    Question 56

    • The data unit at the Data Link layer is a frame.

    Question 57

    • A MAC address is typically 48 bits long.

    Question 58

    • 0F-1F-2F-3F-4F-5F is a valid MAC address.

    Question 59

    • A MAC address uniquely identifies a network interface controller.

    Question 60

    • Bit stuffing and flag bytes are part of the framing technique.

    Question 61

    • Bit stuffing and flag bytes are used in the framing technique.

    Questions 62-72

    • Require bit sequences to be determined and transmitted by using bit parity scheme with even or odd code.
    • These questions require calculations related to bit transmission strategies.

    Question 73

    • The bit pattern from the international standard generator CRC-12 is 1100000001111.

    Question 74

    • The bit pattern from the international standard generator CRC-16 is 11000000000000101.

    Question 75

    • The bit pattern from the international standard generator CRC-CCITT is 10001000000100001.

    Question 76

    • The bit sequence for CRC calculation using generator G(x) = x²+1 with data 10100001 is 10100001111.

    Question 77

    • The bit sequence for CRC calculation using generator G(x) = x³+1 with data 10100011 is 10100011101.

    Question 78

    • ARP resolves IP addresses to MAC addresses.

    Question 79

    • Switches forward data based on the destination MAC address.

    Question 80

    • Switches are characterized by plug-and-play and self-learning capabilities.

    Question 81

    • Random access methods like random access, token passing, and channel partitioning regulate multiple access occurrences in a network.

    Question 82

    • ALOHA is a random-access protocol used at the MAC layer.

    Question 83

    • In Slotted ALOHA, collisions can occur at the start of a time slot.

    Question 84

    • In ALOHA, collisions are possible at any time in a slot.

    Questions 85-88

    • These questions involve considerations of network protocols, such as ALOHA, Slotted ALOHA, CSMA/CD, CSMA/CA, and their efficiencies within different scenarios (e.g., Wi-Fi, Ethernet).

    Question 89

    • The length of a MAC address is 48 bits or 6 octets.

    Question 90

    • 60-F6-77-BE-A3-2F is a valid MAC address.

    Question 91

    • ARP translates IP addresses into MAC addresses.

    Question 92

    • Collisions in Slotted ALOHA can occur at the start of a time slot.

    Question 93

    • Maximum efficiency for Slotted ALOHA is twice that of ALOHA.

    Questions 94-98

    • These questions cover algorithms and standards related to network communication mechanisms like CSMA/CA, FDMA, and TDMA, and network standards like IEEE 802.11 (Wi-Fi) and IEEE 802.3 (Ethernet).

    Questions 99-103

    • These questions deal with network specifications and address assignments.

    Questions 104-108

    • These cover protocol structures and mechanisms for network data transfer.

    Questions 109-113

    • These relate to the structure of IP addresses, including special addresses used for communication.

    Questions 113-118

    • These questions concentrate on IP addresses and datagram structures.
    • These include finding the network addresses given network masks.
    • These cover the size of IP addresses and routing procedures.

    Questions 119-123

    • These questions address IP addressing, including private IP addresses and determining the network address from IP addresses and network masks.

    Questions 124-129

    • These concern the specifics of IPV4/IPV6 addressing, including address sizes and routing algorithm specifications.

    Questions 130-137

    • Explore routing protocols.
    • Describe routing protocols that are used for Inter-AS and Intra-AS routing.

    Questions 138-143

    • Deal with network management protocols.
    • Cover protocols for managing networks and transporting messages (eg. DHCP, DNS, TCP, UDP), and address and port specifications.

    Questions 144-150

    • Focus on transport layer communication and protocols.

    Questions 151-163

    • These involve transport layer specifications and details regarding TCP/IP-related data transfer procedures.
    • These cover addressing (ports, sockets).

    Questions 164-171

    • These questions concentrate on frame relay networks, protocol functionalities and other crucial elements of network communication structures.

    Questions 172-179

    • These cover the definitions and properties of application-layer protocols and their communication methods.
    • They deal with services (e.g. HTTP, FTP) operating at the application layer.

    Questions 180-188

    • These are focussed on detailed operation descriptions, including how messages are transmitted.
    • They relate to protocols used for message transmission and network service details.

    Questions 189-200

    • These cover various details about Internet protocols (e.g., message handling, network management, email transfer).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on computer networking concepts with this quiz designed for the Computer Network Exam at Vietnam-Korea University of Information Technology. It includes multiple-choice questions covering topics such as the OSI Model, TCP/IP layers, and WAN definitions. Challenge yourself and see how well you understand the principles of networking!

    More Like This

    Use Quizgecko on...
    Browser
    Browser