Computer Network Past Paper 2021-2022 PDF
Document Details
Uploaded by SteadiestOganesson861
University of Da Nang
2021
Tags
Summary
This is a past paper for a Computer Networks course from the University of Da Nang, Vietnam. The exam paper covers concepts such as computer networks, OSI model, TCP/IP model and more.
Full Transcript
lOMoARcPSD|19994399 ĐỀ THI CUỐI KỲ I MẠNG MÁY TÍNH NĂM HỌC 2021-2022 Computer network (Trường Đại học Công nghệ Thông tin và Truyền thông Việt - Hàn) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or uni...
lOMoARcPSD|19994399 ĐỀ THI CUỐI KỲ I MẠNG MÁY TÍNH NĂM HỌC 2021-2022 Computer network (Trường Đại học Công nghệ Thông tin và Truyền thông Việt - Hàn) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ĐẠI HỌC ĐÀ NẴNG TRƯỜNG ĐH CÔNG NGHỆ THÔNG TIN ĐỀ THI CUỐI KỲ I NĂM HỌC 2021-2022 VÀ TRUYỀN THÔNG VIỆT - HÀN HỌC PHẦN: MẠNG MÁY TÍNH Giảng viên ra đề Duyệt của Khoa (Ký, ghi rõ họ tên) (Ký, ghi rõ họ tên) Thời gian làm bài: 60 phút......................... TM nhóm GV MMT Mã đề thi: VKU-MMT-2021...................... THÔNG TIN SINH VIÊN Họ tên:...........................................Mã số SV:.........................................Lớp sinh hoạt:................. (Ghi chú : Đề thi không cho phép sử dụng tài liệu) ĐỀ THI: Số lượng đề thi: 07 Số lượng câu hỏi mỗi đề thi: 60 Phương án tạo đề thi: xuất ngẫu nhiên trong bộ ngân hàng 200 câu trắc nghiệm trên hệ thống Ngân hàng 200 câu hỏi trắc nghiệm như sau: 1. Computer network is ___________________. { ~ Collection of hardware components and computers. ~ Interconnected by communication channels. ~ Sharing of resources and information. = All of the mentioned answers. } //----------------------------------------------------------------------------------- 2. Which of the following networks is considered as the first computer network? { = ARPANET. ~ CNNET. ~ NSFNET. ~ ASAPNET. } //----------------------------------------------------------------------------------- 3. How many layers does OSI Model have? { ~ 4. ~ 5. ~ 6. = 7. } //----------------------------------------------------------------------------------- 4. Which layers of the OSI model are host-to-host layers? { = Transport, Session, Presentation, Application. ~ Network, Transport, Session, Presentation. ~ Datalink, Network, Transport, Session. Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ~ Physical, Datalink, Network, Transport. } //----------------------------------------------------------------------------------- 5. How many layers are in the TCP/IP model? { = 4 layers. ~ 5 layers. ~ 6 layers. ~ 7 layers. } //----------------------------------------------------------------------------------- 6. A computer network operating spanning states, countries, or the whole world is ____________________. { ~ PAN. ~ LAN. ~ MAN. = WAN. } //----------------------------------------------------------------------------------- 7. A computer network operating within a building or campus is _________. { ~ PAN. = LAN. ~ MAN. ~ WAN. } //----------------------------------------------------------------------------------- 8. Which layer in the OSI model is concerned with the syntax and semantics of the information transmitted? { ~ Application. = Presentation. ~ Session. ~ Transport. } //----------------------------------------------------------------------------------- 9. Which layer in the OSI model determines how packets are routed from source to destination? { ~ Application. ~ Presentation. ~ Transport. = Network. } //----------------------------------------------------------------------------------- 10. Which layers of the OSI model are operating as same function as the Application layer of the TCP/IP model? { ~ Transport, Session, Application. ~ Network, Transport, Presentation. ~ Network, Transport, Session. = Session, Presentation, Application. } Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 //----------------------------------------------------------------------------------- 11. Which layer of OSI model provides inter network connectivity? { ~ Physical. ~ Data Link. = Network. ~ Transport. } //----------------------------------------------------------------------------------- 12. Which of the followings is a function of the Data link layer? { ~ Defines the electrical characteristics of signals passed between the computer and communication devices. = Provides error detection and correction. ~ Select path for transferring data. ~ None of the mentioned. } //----------------------------------------------------------------------------------- 13. Which of the followings is the correct arrangement of data units of the OSI model based on top-down approach? { ~ Data, Frame, Packet, Segment, Bit. ~ Data, Packet, Segment, Frame, Bit. = Data, Segment, Packet, Frame, Bit. ~ Data, Segment, Frame, Packet, Bit. } //----------------------------------------------------------------------------------- 14. Which of the following types of networks are classified by scale? { ~ Peer – to – Peer, Client – Server. ~ Circuit Switching. = PAN, LAN, MAN, WAN. ~ Wired, Wireless. } //----------------------------------------------------------------------------------- 15. Which of the following types of networks are classified by function? { = Peer – to – Peer, Client – Server. ~ Packet Switching. ~ PAN, LAN, MAN, WAN. ~ Wired, Wireless. } //----------------------------------------------------------------------------------- 16. A ________________ communication network takes messages from a single sender and transmits to all endpoints on the network. { ~ Point – to – Point. = Broadcast. ~ Multicast. ~ None of the mentioned. } //----------------------------------------------------------------------------------- 17. A _________________ is a set of established rules that dictates how to format, transmit and receive data. Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 { ~ Host. = Protocol. ~ Application. ~ Server. } //----------------------------------------------------------------------------------- 18. What is the commonly used unit for measuring the speed of data transmission? { ~ Byte. = Bit per second. ~ Nano second. ~ Mega Hertz. } //----------------------------------------------------------------------------------- 19. _________________ is inflexible once a path is established for transmission, it doesn’t change during the duration of a session. { = Circuit Switching. ~ Packet Switching. ~ Broadcast. ~ None of the mentioned. } //----------------------------------------------------------------------------------- 20. ________________ is flexible as each packet may travel through a different route to reach its destination. { ~ Circuit Switching. = Packet Switching. ~ Peer-to-peer. ~ None of the mentioned. } //----------------------------------------------------------------------------------- 21. Which layer of the OSI model does a Hub work in? { = Physical layer. ~ Data link layer. ~ Network layer. ~ Transport layer. } //----------------------------------------------------------------------------------- 22. Which layer of the OSI model does a Switch work in? { ~ Physical layer. = Data link layer. ~ Network layer. ~ Transport layer. } //----------------------------------------------------------------------------------- 23. Which layer of the OSI model does a Router work in? { ~ Physical layer. ~ Data link layer. Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 = Network layer. ~ Transport layer. } //----------------------------------------------------------------------------------- 24. What is the use of Ping command? { ~ To test a bug in an application. ~ To test a hard disk fault. = To test a device on the network is reachable. ~ To test a printer quality. } //----------------------------------------------------------------------------------- 25. Which of the following commands is used to manage the IP address assigned to the machine that it is running in? { ~ Ping. ~ Route. ~ Nslookup. = Ipconfig. } //---------------------------------------------------------------------------------- 26. A data unit on physical layer is known as ______________. { = Bit. ~ Frame. ~ Packet. ~ Segment. } //----------------------------------------------------------------------------------- 27. Which layer of the OSI model are operating as same function as the Internet layer of the TCP/IP model? { ~ Transport. ~ Presentation. ~ Session. = Network. } //----------------------------------------------------------------------------------- 28. UTP cable has __________________ cables. { ~ 2 pair. ~ 3 pair. = 4 pair. ~ 5 pair. } //----------------------------------------------------------------------------------- 29. What is the purpose of twisting of the wires for twisted pair cable? { ~ Increase electric interference. = Reduce cross-talk interference. ~ Distinguish cable pairs. ~ Protect cable pairs. } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 30. How to classify twisted pair UTP cables? { ~ Length of cable. ~ Material. = Length of twist. ~ All of the mentioned answers. } //----------------------------------------------------------------------------------- 31. Category 5e UTP cable is most often used in ______________ network. { = Ethernet. ~ Telephone. ~ Wireless. ~ None of the mentioned. } //----------------------------------------------------------------------------------- 32. The maximum end-to-end cable length of a single UTP cable that is sufficient for data communication over a computer network is _____________. { ~ 120m. = 100m. ~ 150m. ~ 90m. } //----------------------------------------------------------------------------------- 33. The maximum end-to-end cable length of a single coaxial cable that is sufficient for data communication over a computer network is _____________. { ~ 200m. ~ 300m. ~ 400m. = 500m. } //----------------------------------------------------------------------------------- 34. The maximum end-to-end cable length of a single fiber optic cable that is sufficient for data communication over a computer network is ___________. { ~ 1 km. = 2 km. ~ 3 km. ~ 4 km. } //----------------------------------------------------------------------------------- 35. Which of the following cables is not affected by electromagnetic interference? { = Fiber optic cable. ~ Coaxial cable. ~ UTP. ~ STP. } //----------------------------------------------------------------------------------- 36. Which of the following physical phenomena is applied in optical fiber transmission? { ~ Scattering phenomenon. Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 = Total internal reflection. ~ Dispersion phenomenon. ~ Refraction. } //----------------------------------------------------------------------------------- 37. Which of the following cables is usually used for cable television? { ~ Fiber optic cable. = Coaxial cable. ~ UTP. ~ STP. } //----------------------------------------------------------------------------------- 38. Which device is used for increasing the power of a signal and retransmitting it? { ~ Hub. ~ Switch. ~ Router. = Repeater. } //----------------------------------------------------------------------------------- 39. Which of the following radiations can be used for communication? { ~ Radio wave, microwave, infrared radiation. ~ Visible light, ultraviolet radiation. ~ X-rays, Gamma rays. = All of the mentioned answers. } //----------------------------------------------------------------------------------- 40. Which applications/services are radio waves used? { ~ Radar, radio and TV communication. ~ Microwave ovens. ~ Sterilizing purpose. = All of the mentioned answers. } //----------------------------------------------------------------------------------- 41. Which of the following types of waves are commonly used in remote control devices? { ~ Radio waves. ~ Microwaves. = Infrared waves. ~ Gamma rays. } //----------------------------------------------------------------------------------- 42. Given the following types of waves: (1) Radio waves; (2) Microwaves; (3) Infrared waves, which one is omnidirectional? { = (1) ~ (2) ~ (3) ~ (1), (2), (3) } Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 //----------------------------------------------------------------------------------- 43. Given the following types of waves: (1) Radio waves; (2) Microwaves; (3) Infrared waves, which one is directional? { ~ (1), (2) = (2), (3) ~ (1), (3) ~ (1), (2), (3) } //----------------------------------------------------------------------------------- 44. What is the difference between wired network and wireless network? { ~ Mobility. ~ Security. ~ Speed. = All of the mentioned answers. } //----------------------------------------------------------------------------------- 45. The process of encoding bits into their corresponding signals is called _____________________. { = Digital line coding. ~ Multiplexing. ~ De-multiplexing. ~ None of mentioned answers. } //----------------------------------------------------------------------------------- 46. Which of the following technique is used for combining multiple signals into one signal over a shared medium? { ~ Digital modulation. = Multiplexing. ~ De-multiplexing. ~ None of mentioned answers. } //----------------------------------------------------------------------------------- 47. Which of the following technique is used for reconverting a signal containing multiple signal streams back into the original separate and unrelated signals? { ~ Digital modulation. ~ Multiplexing. = De-multiplexing. ~ None of mentioned answers. } //----------------------------------------------------------------------------------- 48. Which of the following cables is used for connecting computers to switches? { = Straight-through cable. ~ Crossover cable. ~ Rollover cable. ~ None of mentioned answers. } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 49. Which of the following cables is used for connecting computers together directly? { ~ Straight through cable. = Crossover cable. ~ Rollover cable. ~ None of mentioned answers. } //----------------------------------------------------------------------------------- 50. What is the color code for T568A standard? { ~ White/Green, Green, White/Orange, Orange, White/Blue, Blue, White/Brown, Brown. = White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown. ~ White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown, Brown. ~ White/Green, Green, White/Orange, Blue, Orange, White/Blue, White/Brown, Brown. } //----------------------------------------------------------------------------------- 51. What is the difference between wiring codes T568A and T568B? { = Difference in color codes wires. ~ Difference in number of wires. ~ Difference in length of wires. ~ Difference in manufactures standards. } //----------------------------------------------------------------------------------- 52. Which of the following metric is used for measuring of data transferring speed? { ~ b/s. ~ Mb/s. ~ Tb/s. = All of the mentioned answers. } //----------------------------------------------------------------------------------- 53. What does “bps” stand for? { = bits per second. ~ bytes per second. ~ kilobits per second. ~ None of mentioned answers. } //----------------------------------------------------------------------------------- 54. Which layer in the OSI model controls transmission errors? { ~ Physical. = Data Link. ~ Network. ~ Presentation. } //----------------------------------------------------------------------------------- 55. Which of the following functions of data link layer helps slow receivers are not swamped by fast senders? { ~ Providing a well-defined service interface to the network layer. ~ Dealing with transmission errors. = Regulating the flow of data. Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ~ None of mentioned answers. } //----------------------------------------------------------------------------------- 56. A data unit on data link layer is known as ______________. { ~ Bit. = Frame. ~ Packet. ~ Segment. } //----------------------------------------------------------------------------------- 57. How many bits are there in the MAC address? { ~ 64 bits. = 48 bits. ~ 32 bits. ~ 16 bits. } //----------------------------------------------------------------------------------- 58. Which of the following addresses is the physical address? { ~ 0F-1F-2F-3F-4F. = 0F-1F-2F-3F-4F-5F. ~ 0F-1F-2F-3F-4F-5F-6F. ~ 0F-1F-2F-3F-4F-5F-6F-7F. } //----------------------------------------------------------------------------------- 59. A _______________ is a unique identifier assigned to a network interface controller. { ~ Port address. = MAC address. ~ IP address. ~ Port and IP address. } //----------------------------------------------------------------------------------- 60. Assume that the original data is 00001111 00110011 01111110. Determine the bit sequence to be transmitted with the framing technique using flag bytes with byte stuffing? With byte FLAG = 01111110 and byte ESC = 00001111. { ~ 01111110 00001111 00110011 01111110 01111110. ~ 00001111 00110011 00110011 00110011 01111110. = 00001111 00001111 00110011 00001111 01111110. ~ 01111110 00001111 00110011 00001111 01111110. } //----------------------------------------------------------------------------------- 61. Assume that the original data is 10000011 00001111 01111110. Determine the bit sequence to be transmitted with the framing technique using flag bytes with byte stuffing? With byte FLAG = 01111110 and byte ESC = 00001111. { ~ 00001111 10000011 00001111 00001111 01111110. ~ 00001111 00001111 01111110 00001111 00001111. ~ 10000011 00001111 00001111 01111110 00001111. = 10000011 00001111 00001111 00001111 01111110. } Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 //----------------------------------------------------------------------------------- 62. Assume that receiver receives a correct data frame containing a bit sequence: 10111110 0000111 00001111 0000111 01111110 00110011. Determine the original data by using flag bytes with byte stuffing of the framing technique? With byte FLAG = 01111110 and byte ESC = 00001111. { ~ 00001111 10111110 01111110 00110011. = 10111110 00001111 01111110 00110011. ~ 00110011 00001111 01111110 10111110. ~ 01111110 00001111 10111110 00110011. } //----------------------------------------------------------------------------------- 63. Assume that receiver receives a correct data frame containing a bit sequence: 00001111 00001111 00111111 00001111 01111110 Determine the original data by using flag bytes with byte stuffing of the framing technique? With byte FLAG = 01111110 and byte ESC = 00001111. { ~ 00001111 00111111 00001111. ~ 00111111 00001111 01111110. ~ 00001111 00001111 01111110. = 00001111 00111111 01111110. } //----------------------------------------------------------------------------------- 64. Assume that the original data is 011000101111. Determine the bit sequence to be transmitted by using single bit parity scheme with odd code? { = 0110001011110. ~ 0110001011111. ~ 0011000101111. ~ 1011000101111. } //----------------------------------------------------------------------------------- 65. Assume that the original data is 011000101111. Determine the bit sequence to be transmitted by using single bit parity scheme with even code? { ~ 0110001011110. = 0110001011111. ~ 0011000101111. ~ 1011000101111. } //----------------------------------------------------------------------------------- 66. Assume that the original data is 11011011000101111. Determine the bit sequence to be transmitted by using single bit parity scheme with odd code? { ~ 011011011000101111. ~ 111011011000101111. ~ 110110110001011111. = 110110110001011110. } //----------------------------------------------------------------------------------- 67. Assume that receiver receives a correct data frame containing a bit sequence: 0110001011110. Determine the original data by using single bit parity scheme with odd code? Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 { = 011000101111. ~ 010001011111. ~ 011000101111. ~ 101100010111. } //---------------------------------------------------------------------------------- 68. Assume that receiver receives a correct data frame containing a bit sequence: 0110001011111. Determine the original data by using single bit parity scheme with even code? { ~ 101100010111. ~ 010001011111. ~ 011000101111. = 011000101111. } //----------------------------------------------------------------------------------- 69. Assume that receiver receives a correct data frame containing a bit sequence: 11010011000101111. Determine the original data by using single bit parity scheme with even code? { ~ 1110011000101111. ~ 1101011000101111. = 1101001100010111. ~ 1010011000101111. } //----------------------------------------------------------------------------------- 70. Which of the following techniques is capable of detecting and correcting single bit error? { ~ Single bit parity scheme. = Two-dimensional parity scheme. ~ Cyclic redundancy check. ~ All of the mentioned answers. } //----------------------------------------------------------------------------------- 71. Assume that the original data is 10101 11110 01110. Determine the bit sequence to be transmitted by using two-dimensional parity scheme with even code and matrix (no. of rows N=3, no. of columns M=5)? { ~ 101010 111100 011101 001011. ~ 101011 111101 011101 001010. = 101011 111100 011101 001010. ~ 101010 111100 011100 001010. } //----------------------------------------------------------------------------------- 72. Assume that receiver receives a correct data frame containing a bit sequence: 101011 111100 011101 001010. Determine the original data by using two-dimensional parity scheme with even code and matrix (no. of rows N=3, no. of columns M=5)? { ~ 10101 11100 01101 01011. ~ 11011 11110 01110 00101. = 10101 11110 01110 00101. ~ 11010 11100 01110 00101. } Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 //----------------------------------------------------------------------------------- 73. Determine the bit pattern from the international standards generator CRC-12= x12 + x11 + x3 + x2 + x +1? { ~ 1110000001111. ~ 1100000001110. = 1100000001111. ~ 1100000011111. } //----------------------------------------------------------------------------------- 74. Determine the bit pattern from the international standards generator CRC-16= x16 + x15 + x2 +1? { = 11000000000000101. ~ 11000000000000111. ~ 11000000000000100. ~ 11000000000000011. } //----------------------------------------------------------------------------------- 75. Determine the bit pattern from the international standards generator CRC-CCITT= x16 + x12 + x5 +1? { ~ 10001000000010001. ~ 10001000000100010. ~ 10001000000100011. = 10001000000100001. } //----------------------------------------------------------------------------------- 76. Assume that the original data is 10100001. Determine the bit sequence to be transmitted by using Cyclic Redundancy Check (CRC) technique with Generator G(x) = x3+1? { ~ 10100001 101 ~ 10100001 110 ~ 10100001 011 = 10100001 111. } //----------------------------------------------------------------------------------- 77. Assume that the original data is 10100011. Determine the bit sequence to be transmitted by using Cyclic Redundancy Check (CRC) technique with Generator G(x) = x3+1? { ~ 10100011 100. ~ 10100011 001. = 10100011 101. ~ 10100011 111. } //----------------------------------------------------------------------------------- 78. Which of the following protocols is responsible for resolving IP address to MAC address? { = ARP. ~ HTTP. ~ ICMP. ~ DHCP. } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 79. Which of the following devices forwarding data based on the destination MAC address? { ~ Hub. = Switch. ~ Router. ~ Repeater. } //----------------------------------------------------------------------------------- 80. Which of the followings is a characteristic of the Switch? { ~ Plug-and-play. ~ Self-learning. ~ Routing. = Plug-and-play and Self-learning. } //----------------------------------------------------------------------------------- 81. Which of the following methods is usually applied for controlling multiple accesses in a computer network? { ~channel partitioning =random access ~token passing ~no need an access control method. } //----------------------------------------------------------------------------------- 82. Which of the following protocols is the random accessing protocols applying for the MAC layer of a computer network? { ~TDMA ~FDMA =ALOHA ~CDMA } //----------------------------------------------------------------------------------- 83. Which of the following statements is true for the Slotted ALOHA protocol? { ~In the Slotted ALOHA, time is divided into equal size slots and nodes transmit data at the end of each time-slot. = In the Slotted ALOHA, time is divided into equal size slots and nodes transmit data at the start of each time-slot. ~ In the Slotted ALOHA, time is divided into equal size slots and node transmits data immediately once it has data. ~ In the Slotted ALOHA, time is divided into variable size slots and node transmits data immediately once it has data. } //----------------------------------------------------------------------------------- 84. Which of the following statements is true for the ALOHA protocol? Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 { ~In the ALOHA, time is divided into equal size slots and nodes transmit data at the end of each time-slot. ~In the ALOHA, time is divided into equal size slots and nodes transmit data at the start of each time-slot. ~ In the ALOHA, time is divided into equal size slots and node immediately transmits data once it has. =In the ALOHA, node immediately transmits data once it has. } //----------------------------------------------------------------------------------- 85. Considering transmission efficiency of three protocols: ALOHA, Slotted ALOHA and CSMA protocols. Which of the following answers is true if the transmission efficiency of those protocols is in ascent order? { ~CSMA – ALOHA – Slotted ALOHA =ALOHA – Slotted ALOHA – CSMA ~Slotted ALOHA – ALOHA – CSMA ~CSMA – Slotted ALOHA - ALOHA } //----------------------------------------------------------------------------------- 86. Which of the random access protocols does the Ethernet apply? { =CSMA/CD ~CSMA/CA ~ALOHA ~Slotted ALOHA } //----------------------------------------------------------------------------------- 87. Which of the random access protocols does the Wi-Fi apply? { ~CSMA/CD =CSMA/CA ~ALOHA ~Slotted ALOHA } //----------------------------------------------------------------------------------- 88. Given the following statement regarding to mechanism for controlling medium access of a computer network: “When the medium is idle for a period of greater than a Distributed InterFrame Space (DIFS), node can transmit data immediately”. Which of the following computer networks applies above-mentioned mechanism? { ~WiMAX ~Ethernet =Wi-Fi ~Bluetooth Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 } //----------------------------------------------------------------------------------- 89. What is the size of the MAC address? { =48 bits ~16 bits ~32 bit ~64 bits } //----------------------------------------------------------------------------------- 90. Which of the following addresses is considered as a MAC address? { ~192.168.1.1 ~172.16.10.0/24 ~FE80::250:56FF:FE87:20FB =60-F6-77-BE-A3-2F } //----------------------------------------------------------------------------------- 91. Which of the following statements is true for the Address Resolution Protocol (ARP)? { ~It is used to resolve IP addresses to domain names. =It is used to translate IP addresses to MAC addresses. ~It is used to translate MAC addresses to domain names. ~It is used to resolve domain names to IP addresses. } //----------------------------------------------------------------------------------- 92. In the Slotted ALOHA, collisions could be occurred at { =the beginning of the slot ~the end of the slot ~in the middle of the slot ~in any point of the slot } //----------------------------------------------------------------------------------- 93. Which of the following statements is true for the Slotted ALOHA and ALOHA (suppose that the network has N nodes)? { ~the maximum efficiency of the Slotted ALOHA is equal to that of ALOHA. =the maximum efficiency of the Slotted ALOHA is double to that of ALOHA. ~the maximum efficiency of the Slotted ALOHA is smaller than that of ALOHA. ~the maximum efficiency of the Slotted ALOHA is 100%. } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 94. Which of the following algorithms that a network node running CSMA/CA applies for delaying the transmission in order to avoid the collision? { =the exponential back-off algorithm ~the collision avoidance (CA) algorithm ~the carrier sense (CS) algorithm ~the multiple access (MA) algorithm } //----------------------------------------------------------------------------------- 95. In FDMA, channel spectrum is divided into fixed frequency bands and each station is assigned to one of those frequency bands. How the FDMA deals with an assigned frequency band having no data for transmission? { ~Remove it. ~Share it to other stations. =Let it idle. ~Assign to another station. } //---------------------------------------------------------------------------------- 96. In TDMA, channel is divided into fixed length time slots and each station is assigned to one of those time slots. How the TDMA deals with an assigned time slot having no data for transmission? { ~Remove it. ~Share it to other stations. =Let it idle. ~Assign to another station. } //----------------------------------------------------------------------------------- 97. Which of the following standard is recommended for the Wi-Fi network? { ~IEEE 802.16 ~IEEE 802.3 ~IEEE802.15 =IEEE 802.11 } //----------------------------------------------------------------------------------- 98. Which of the following standard is recommended for the Ethernet network? { ~IEEE 802.16 =IEEE 802.3 ~IEEE802.15 ~IEEE 802.11 } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 99. Which of the following standard is recommended for the WiMAX network? { =IEEE 802.16 ~IEEE 802.3 ~IEEE802.15 ~IEEE 802.11 } //----------------------------------------------------------------------------------- 100. The frame format of the Ethernet is given below, in which the Preamble field contains a pattern of 10101010 in sequence of 7 bytes. What is the purpose of those sequence bytes? { ~It is used to start the transmission between the sender and the receiver. ~It is used to finish the transmission between the sender and the receiver. ~It is used to inform other stations to avoid a collision. =It is used to “wake up” the receiving adapter and synchronize the receiver’s clock with the sender’s clock. } //----------------------------------------------------------------------------------- 101. Suppose that the IP address and the Subnet mask of a computer is 172.25.114.250/24. What are its network address and broadcast address? { ~172.25.114.250 & 172.25.114.0 =172.25.114.0 & 172.25.114.255 ~172.25.114.250 & 255.255.255.0 ~172.25.114.250 & 172.25.114.255 } //----------------------------------------------------------------------------------- 102. Suppose that the IP address and the Subnet mask of a computer is 172.25.114.250/16. What are its network address and broadcast address? { ~172.25.114.250 & 172.25.114.0 ~172.25.0.0 & 172.25.0.255 ~172.25.114.250 & 255.255.255.0 =172.25.0.0 & 172.25.255.255 } //----------------------------------------------------------------------------------- 103. Suppose that the IP address of a LAN is 192.168.10.0/24. How many IP addresses are available to be assigned to the hosts (or PCs) of that LAN (including special IP addresses)? { ~255 =256 Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ~24 ~224 } //----------------------------------------------------------------------------------- 104. What are following planes organized for to the network layer of the computer network? { ~Physical plane – Data link plane ~MAC plane – Data link plane =Control plane – Data plane ~Data link plane – Transport plane } //----------------------------------------------------------------------------------- 105. What is the average buffer size B of a router used for routing packets over a link which has the throughput of C = 10 Gbps? Assume the round-trip-time (RTT) of 250 ms. { =2.5 Gigabit ~2.5 Kilobit ~40 Kilobit ~40 Gigabit } //----------------------------------------------------------------------------------- 106. What is the average buffer size B of a router used for routing 800 flows of data over a link which has the throughput of C = 10 Gbps? Assume that the round-trip-time (RTT) is 250 ms. { ~3.125 bit =3125 bit ~2000 Gigabit ~8000 Gigabit } //----------------------------------------------------------------------------------- 107. What is the size of an IP v4 address? { =32 bit ~48 bit ~24 bit ~8 bit } //----------------------------------------------------------------------------------- 108. Which field in the header is applied for determining the priority of an IP v4 packet when forwarding it in a computer network? { ~Time-to-live (TTL) =Type-of-service (TOS) ~Type-of-data (TOD) Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ~Acknowledge (ACK) } //----------------------------------------------------------------------------------- 109. What is the size of the checksum field used for checking error of an IP v4 header? { ~32 bit ~24 bit =16 bit ~8 bit } //----------------------------------------------------------------------------------- 110. The checksum computation in IP v4 header includes: { =IP v4 header only ~IP v4 data (payload) only ~IP v4 header and data ~IP header and Pseudo header } //----------------------------------------------------------------------------------- 111. Given the IP address of a computer to be: 192.168.1.1. What is its corresponding binary format? { ~11000000. 10101000. 00000001. 10000000 =11000000. 10101000. 00000001. 00000001 ~10000011. 10100000. 00000001. 00000001 ~11000000. 10101000. 00000001. 10000001 } //----------------------------------------------------------------------------------- 112. What are the following parts matched to the format of an IP v4 address? { ~Domain – Host ~Domain – Network – Host ~Domain – Network =Network – Host } //----------------------------------------------------------------------------------- 113. What are the following IP v4 addresses to be considered as the special addresses? { =0.0.0.0 ~1.1.1.1 ~111.111.111.111 ~100.100.100.100 } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 114. Which of the following IP v4 addresses is considered as the loopback address of a computer? { ~1.1.1.1 ~0.0.0.0 ~255.255.255.0 =127.0.0.1 } //----------------------------------------------------------------------------------- 115. What is the queuing model applied for packet scheduling inside a router? { =First-in-First-out (FIFO) ~Last-in-First-out (LIFO) ~First-in-Last-out (FILO) ~Last-in-Last-out (LILO) } //----------------------------------------------------------------------------------- 116. Suppose that the value recorded in the Time-To-Live (TTL) field of an IP v4 header is 100. What does it mean? { ~That IP packet has a life-time of 100 seconds ~That IP packet has a life-time of 100 hours =That IP packet could traverse maximum of100 hops ~That IP packet could traverse maximum of 100 km } //----------------------------------------------------------------------------------- 117. What is the size of the IP v4 header? { ~8 bytes ~16 bytes =20 bytes ~24 bytes } //----------------------------------------------------------------------------------- 118. Suppose that the Maximum Transmission Unit (MTU) of the Data link layer is 1500 bytes, how many segments received by the network layer (from the transport layer) for sending a 4000-byte datagram? { ~0.375 ~2.5 =3 ~4 } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 119. Which of the following Boolean operators that a router applies for determining the network address of a computer from the given IP address and net/subnet mask? { =AND ~OR ~XOR ~NOT } //----------------------------------------------------------------------------------- 120. Assume that the subnet mask assigned for a computer network working in class C is 255.255.255.192, how many subnets could be organized for that network? { ~2 ~3 =4 ~5 } //----------------------------------------------------------------------------------- 121. Which of the following IP addresses are the private IP addresses? { =10.10.10.1; 172.16.0.1; 192.168.1.2 ~11.11.11.1; 173.16.0.1; 193.168.1.2 ~12.12.12.1; 174.16.0.1; 194.168.1.2 ~13.13.13.1; 175.16.0.1; 195.168.1.2 } //----------------------------------------------------------------------------------- 122. Which the following server is responsible for automatically assigning IP addresses for computers in the network? { ~DNS ~DBMS =DHCP ~IP Server } //----------------------------------------------------------------------------------- 123. Which of the following function of a router is responsible for translating IP addresses from the local network to the global network (the Internet) and vice versa? { ~Routing ~Forwarding =NAT ~Firewall } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 124. What is the size of the IP v6 address? { ~32 bits ~64 bits =128 bits ~256 bits } //---------------------------------------------------------------------------------- 125. Which of the following statement is correct for IP v6 datagram format? { ~The IP v6 datagram format has a 20-byte header. ~The IP v6 datagram format has a 32-byte header. ~The IP v6 datagram format has a 40-byte with optional header. =The IP v6 datagram format has a 40-byte fixed-length header. } //----------------------------------------------------------------------------------- 126. Which of the following statement is correct? { =Fragmentation is not allowed for IP v6. ~Fragmentation is allowed for IP v6. ~Fragmentation is optional for IP v6. ~Fragmentation is fixed for IP v6. } //----------------------------------------------------------------------------------- 127. How many 8-bit octets for an IP v6 address? { ~4 ~8 ~12 =16 } //----------------------------------------------------------------------------------- 128. Which of the following statement is true for a routing algorithm? { ~A routing algorithm is to find the highest-cost path between the source and the destination for forwarding the data. ~A routing algorithm is to find the longest-cost path between the source and the destination for forwarding the data. = A routing algorithm is to find the least-cost path between the source and the destination for forwarding the data. ~ A routing algorithm is to find the average-cost path between the source and the destination for forwarding the data. } //----------------------------------------------------------------------------------- 129. The Dijkstra routing algorithm is categorized as Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 { =A link-state routing algorithm ~A distance vector routing protocol ~A hierarchical routing protocol ~An inter-AS routing protocol } //----------------------------------------------------------------------------------- 130. The Bellman-Ford routing algorithm is categorized as { ~A link-state routing algorithm =A distance vector routing protocol ~A hierarchical routing protocol ~An inter-AS routing protocol } //----------------------------------------------------------------------------------- 131. A graph represented a computer network is given below According to the Dijkstra algorithm, which nodes are selected for constructing the routing table after second round of running the algorithm at node u? { ~u,x ~u,v =u,w ~u,z } //----------------------------------------------------------------------------------- 132. Which problem does the Dijkstra routing algorithm possibly face? { =Routing oscillation ~Route congestion ~Route break ~Route restart } //----------------------------------------------------------------------------------- 133. In Bellman-Ford routing, which of following statement is appropriate? { Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 =Each network node constructs its distance vector based on routing information shared among neighbor nodes. ~Each network node constructs its distance vector based on its local routing information. ~Each network node constructs its distance vector based on its link state information. ~Each network node constructs its distance vector based on measuring the distance to neighbor nodes. } //----------------------------------------------------------------------------------- 134. Which problem does the Bellman-Ford routing algorithm possibly face? { ~Route Congestion ~Route break ~Route restart =Count to infinitive } //----------------------------------------------------------------------------------- 135. A computer network is represented by a graph below. How many iterations does the Bellman-Ford routing protocol need to run to reach the stable state if the link cost between x and y changes from 4 to 60 (see figure)? { ~4 =44 ~56 ~60 } //----------------------------------------------------------------------------------- 136. Which of the following routing protocols are suitable for intra-AS routing? { ~SNMP/TCP/UDP ~FTP/HTTP/HTTPS =RIP/OSPF/IGRP ~TCP/UDP/ICMP } //----------------------------------------------------------------------------------- 137. Which of the following routing protocols is suitable for inter-AS routing? { ~RIP ~OSPF =BGP ~UDP } Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 //----------------------------------------------------------------------------------- 138. Which of the following protocol is used for error reporting in a computer network? { ~DHCP ~DNS =ICMP ~SNMP } //----------------------------------------------------------------------------------- 139. Which of the following statements is true for the network management framework? { ~A managed device contains only one managed object. ~A managed device does not have a database for management purpose. ~A network device cannot be managed. =A managed device can contain many managed objects whose data is stored in the Management Information Base (MIB). } //----------------------------------------------------------------------------------- 140. Which of following modes are used by the Simple Network Management Protocol (SNMP) to convey information to/from Management Information Base (MIB)? { =request-response mode and trap mode ~request mode only ~response mode only ~trap mode only } //----------------------------------------------------------------------------------- 141. Which layer should receive the data after the Transport layer aggregates data from different applications into a single stream before passing it ? { =Network layer ~Data link layer ~Application layer ~Physical layer } //----------------------------------------------------------------------------------- 142. Which layer should receive the data after the Transport layer aggregates data from different applications into a single stream before passing it ? { =Network layer ~Data link layer Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ~Application layer ~Physical layer } //----------------------------------------------------------------------------------- 143. Which of the following protocols are used in transport layer? { ~TCP and FTP ~UDP and HTTP =TCP and UDP ~HTTP and FTP } //----------------------------------------------------------------------------------- 144. Which is the correct statement for the transmission control protocol? { ~Is a connection-oriented protocol ~Uses a three way handshake to establish a connection ~Receives data from application as a single stream =All of the mentioned } //----------------------------------------------------------------------------------- 145. One endpoint of a two-way communication link between two programs running on the network is called? { =socket ~pipe ~port ~machine } //----------------------------------------------------------------------------------- 146. Which one of the followings is a version of UDP with congestion control? { =Datagram congestion control protocol ~Stream control transmission protocol ~Structured stream transport Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ~User congestion control protocol } //----------------------------------------------------------------------------------- 147. Transport layer protocols deals with ____________. { ~Application to application communication ~Process to process communication =Node to node communication ~Man to man communication } //----------------------------------------------------------------------------------- 148. The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports. { ~well-known =registered ~dynamic ~User ports } //----------------------------------------------------------------------------------- 149. Which of the followings is a transport layer protocol? { =Stream control transmission protocol ~Internet control message protocol ~Neighbor discovery protocol ~Dynamic host configuration protocol } //----------------------------------------------------------------------------------- 150. The field is used to detect errors over the entire user datagram? { ~UDP header ~source port =checksum ~destination port Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 } //----------------------------------------------------------------------------------- 151. A port address in TCP/IP is ______ bits long. How many bits long is the port address in TCP/IP { ~32 ~48 =16 ~None of these } //----------------------------------------------------------------------------------- 152. _______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.? { ~TCP =UDP ~IP ~ FTP } //----------------------------------------------------------------------------------- 153. The_________ layer is responsible for the delivery of a message from one process to another. { ~physical =transport ~network ~none of the mentioned } //----------------------------------------------------------------------------------- 154. To deliver a message to the correct application running on a host, the _______ address must be consulted. { =port ~IP ~physical Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ~ socket } //----------------------------------------------------------------------------------- 155. Which of the following services uses TCP? { ~DHCP =SMTP ~ SIP ~ RTP } //----------------------------------------------------------------------------------- 156. Which of the following layer is responsible for process to process delivery? { =Transport layer ~Network layer ~Presentation layer ~Data link layer } //----------------------------------------------------------------------------------- 157. Which one of the following protocols does the transport layer use for communication over the Internet? { ~TCP ~UDP = TCP and UDP ~IP } //----------------------------------------------------------------------------------- 158. In FTP protocol, a client contacts a server using ______ as the transport protocol. { =Transmission control protocol ~ User datagram protocol ~ Datagram congestion control protocol ~ Stream control transmission protocol Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 } //----------------------------------------------------------------------------------- 159. Which of the following statements is true for the TCP? { ~connection oriented protocol ~uses a three way handshake to establish a connection ~receives data from application as a single stream =all of the mentioned } //----------------------------------------------------------------------------------- 160. An endpoint of an inter-process communication flow across a computer network is known as: { =socket ~pipe ~port ~none of the mentioned } //----------------------------------------------------------------------------------- 161. Socket-style API for windows is known as? { ~wsock =winsock ~wins ~None of these } //----------------------------------------------------------------------------------- 162. What is the main advantage of UDP? { ~More overload ~Reliable =Low overhead ~Fast } Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 //----------------------------------------------------------------------------------- 163. A _____ is a TCP name for a transport service access point. { =port ~pipe ~node ~socket } //----------------------------------------------------------------------------------- 164. In frame relay networks, extended address is used ________. { ~ for error detection = to increase the range of data link connection identifiers ~ for encryption ~ for error recovery } //----------------------------------------------------------------------------------- 165. An attempt to make a computer resource unavailable to its intended users is called ______ { = Denial-of-service attack ~ Virus attack ~ Worms attack ~ Botnet process } //----------------------------------------------------------------------------------- 166. Which of following protocols provides a reliable communication? { =TCP ~IP ~UDP ~HTTP } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 167. The _______ provides a connection-oriented reliable service for sending messages? { =TCP ~IP ~UDP ~All of the mentioned } //----------------------------------------------------------------------------------- 168. Which of the following protocol is/are defined in Transport layer? { ~FTP ~TCP ~UDP =TCP and UDP } //----------------------------------------------------------------------------------- 169. What does the port number in a TCP connection specify? { =It specifies the communication process on the two end systems ~It specifies the quality of the data & connection ~It specify the size of data ~It specify the type of data } //----------------------------------------------------------------------------------- 170. What is the typical range of Ephemeral ports? { ~1 to 80 ~1 to 1024 ~80 to 8080 =1024 to 65535 } //----------------------------------------------------------------------------------- 171. What is the purpose of the PUSH flag in the TCP header? { Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 =Typically used to indicate end of message ~Typically used to indicate beginning of message ~Typically used to push the message ~Typically used to indicate stop the message } //----------------------------------------------------------------------------------- 172. Which of the followings is not an application layer protocol? { ~HTTP ~SMTP ~FTP =TCP } //----------------------------------------------------------------------------------- 173. The datagram at the application layer is called? { ~Packet =Message ~Segment ~Frame } //----------------------------------------------------------------------------------- 174. Which one of the following is an architecture paradigms? { ~Peer to peer ~Client-server =Both Peer to peer and Client-server ~HTTP } //----------------------------------------------------------------------------------- 175. The File Transfer Protocol is built on __________ { ~ data centric architecture ~ service oriented architecture Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 = client server architecture ~ connection oriented architecture } //----------------------------------------------------------------------------------- 176. Telnet protocol is used to establish a connection to __________ { ~ TCP port number 21 ~ TCP port number 22 = TCP port number 23 ~ TCP port number 25 } //----------------------------------------------------------------------------------- 177. Which of the following statements is true for the E-mail? { ~Loss-tolerant application ~Bandwidth-sensitive application =Elastic application ~None of mentioned } //----------------------------------------------------------------------------------- 178. FTP is built on _____ architecture { =Client-server ~P2P ~Data centric ~Service oriented } //----------------------------------------------------------------------------------- 179. What FTP is stand for? { ~Fine Transfer Protocol =File Transfer Protocol ~First Transfer Protocol ~Fast Transfer Protocol Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 } //----------------------------------------------------------------------------------- 180. All telnet operations are sent as ________ { ~ 4 bits = 8 bits ~ 16 bits ~ 32 bits } //----------------------------------------------------------------------------------- 181. Which of the following is a time-sensitive service? { ~File transfer ~File download ~E-mail =Internet telephony } //----------------------------------------------------------------------------------- 182. Transport services available to applications in one or another form? { ~Reliable data transfer ~Timing ~Security =All of the mentioned } //----------------------------------------------------------------------------------- 183. Which application layer protocol does the email service use? { =SMTP ~HTTP ~FTP ~SIP } //----------------------------------------------------------------------------------- Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 184. The ____________ translates internet domain and host names to IP address. { =Domain name system ~Routing information protocol ~Network time protocol ~Internet relay chat } //----------------------------------------------------------------------------------- 185. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? { ~HTTP ~FTP =TELNET ~TCP } //----------------------------------------------------------------------------------- 186. Application layer protocol defines? { ~Types of messages exchanged ~Message format, syntax and semantics ~Rules for when and how processes send and respond to messages =All of the mentioned } //----------------------------------------------------------------------------------- 187. What is the ASCII encoding of binary data called? { =Base 64 encoding ~Base 32 encoding ~Base 16 encoding ~Base 8 encoding } //----------------------------------------------------------------------------------- 188. Which one of the following protocol delivers/stores mail to reciever server? Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 { =Simple mail transfer protocol ~Post office protocol ~Internet mail access protocol ~Hypertext transfer protocol } //----------------------------------------------------------------------------------- 189. Which one of the following is an internet standard protocol for managing devices on IP network? { ~Dynamic host configuration protocol =Simple network management protocol ~Internet message access protocol ~Media gateway protocol } //----------------------------------------------------------------------------------- 190. Which one of the following is not an application layer protocol? { ~media gateway protocol ~dynamic host configuration protocol =resource reservation protocol ~session initiation protocol } //----------------------------------------------------------------------------------- 191. When displaying a web page, what protocol is used by the application layer ? { =HTTP protocol ~FTP protocol ~SMTP protocol ~TCP protocol } //----------------------------------------------------------------------------------- 192. SMTP defines _______. { Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 =message transport ~message encryption ~message content ~message password } //----------------------------------------------------------------------------------- 193. An email client needs to know the _________ of its initial SMTP server. { =IP address ~MAC address ~URL ~NAME } //----------------------------------------------------------------------------------- 194. When the mail server sends mail to other mail servers it becomes ____________ { ~ SMTP server =SMTP client ~ Peer ~ Master } //----------------------------------------------------------------------------------- 195. Which of the following TCP ports is used by SMTP? { ~22 ~23 ~24 =25 } //----------------------------------------------------------------------------------- 196. Expansion of SMTP is ________What does SMTP stand for? { ~Simple Message Transfer Protocol ~Simple Mail Transmission Protocol Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ~Simple Message Transmission Protocol =Simple Mail Transfer Protocol } //----------------------------------------------------------------------------------- 197. Which of the following is an application layer service? { ~Network virtual terminal ~File transfer, access, and management ~Mail service =All of the mentioned } //----------------------------------------------------------------------------------- 198. SMTP is not used to deliver messages to ______? { ~user’s email server ~user’s mailbox =user’s word processor ~user’s email client } //----------------------------------------------------------------------------------- 199. If you have to send multimedia data over SMTP it has to be encoded into? { ~Binary ~Signal =ASCII ~Hash } //----------------------------------------------------------------------------------- 200. File Transfer Protocol (FTP), uses the well-known port 21 is used for the control connection and port 20 for the : { ~Data Rate =Data Connection ~Data Protocol Downloaded by Th? Anh ([email protected]) lOMoARcPSD|19994399 ~Data Congestion } //---------------------------------------------------------------------------------------------- ……… HẾT ……… Downloaded by Th? Anh ([email protected])