ilide.info-vku-mang-may-tinh-bo-cau-hoi-trac-nghiem-on-thi-cuoi-ky-pr_7ea4781ee83905c05f2cf151de14e31b.pdf

Full Transcript

21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ MỤC LỤC CHƯƠNG 1. TỔNG QUAN VỀ MẠNG MÁY TÍNH 2 CHƯƠNG 2. TẦNG VẬT LÝ...

21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ MỤC LỤC CHƯƠNG 1. TỔNG QUAN VỀ MẠNG MÁY TÍNH 2 CHƯƠNG 2. TẦNG VẬT LÝ 22 CHƯƠNG 3. TẦNG LIÊN KẾT DỮ LIỆU 44 CHƯƠNG 4. TẦNG MẠNG 63 CHƯƠNG 5. TẦNG GIAO VẬN 72 CHƯƠNG 6. TẦNG ỨNG DỤNG 75 [email protected] 1 about:blank 1/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ CHƯƠNG 1. TỔNG QUAN VỀ MẠNG MÁY TÍNH 1) Which of following protocol is HTTP built upon? a) TCP b) UDP c) IP d) ICMP 2) Which of the following requirements are necessary for packet networks to support multiple and dTransfer arbitrary message size diverse applications? a) Transfer arbitrary message size b) All of the mentioned c) Low delay for interactive applications d) 3) What was the concern of the telephone system that motivated the ARPANET design? a) Vulnerability b) Scalability c) Efficiency d) None of the mentioned 4) Which of the following is an application layer protocol? a) DNS b) HTTP c) UDP d) TCP 5) Gõ câu hỏi vô đây? (G1) a) A b) B c) C d) D 6) 7) Which of the following are features of ARPANET design? [email protected] 2 about:blank 2/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) All of the mentioned b) Connectionless packet transmission c) Routing tables at the packet switches d) Destinations identified by unique addresses 8) Bluetooth is an example of _____ a) Local Area Network b) Personal Area Network c) Wide Area Network d) Metropolitan Area Network 9) In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are _____ a) Added b) Rearranged c) Removed d) Modified 10)The _____ is the physical path over which a message travels. a) Path b) Medium c) Route d) Protocol 11) Three or more devices share a link in _____ connection. a) Multipoint b) Unipoint c) Point to Point d) None of the mentioned 12)Which of the following is true for Transport Control Protocol? a) Process to process b) Connection oriented c) Transport layer protocol d) Connectionless 13)In a LAN, which address is used to transfer frames to appropriate destination? [email protected] 3 about:blank 3/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) Physical address b) IP address c) Domain name d) None of the mentioned 14)Suppose an application layer entity wants to send an L-byte message to its peer process, using an existing TCP connection. The TCP segment consists of the message plus 20 bytes of header. The segment is encapsulated into an IP packet that has an additional 20 bytes of header. The IP packet in turn goes inside an Ethernet frame that has 18 bytes of header and trailer. What is the bandwidth utilization in terms of the percentage of the transmitted bits in the physical layer corresponds to message information if L = 500 bytes? a) 100% b) 70% c) 80% d) 90% 15)Of the following services, which service(s) does the IP layer provides? a) None of the mentioned b) Error control c) Flow control d) Connection-based data transfer 16)Which of the following is true about the ways in which the OSI reference model and TCP/IP reference model differ? a) They differ in the number of layers b) All of the mentioned c) TCP/IP model does not have presentation layer, but OSI model has d) TCP/IP model does not have session layer, but OSI model has 17)Which of following statements is true about how the data link layer and transport layer differ? a) Data link layer is concerned with framing and the transport layer is not b) Data link layer is concerned with flow control and the transport layer is not c) Data link layer is concerned with multiplexing and the transport layer is not [email protected] 4 about:blank 4/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) All of the mentioned 18)This layer is an addition to OSI model? a) Application layer b) Presentation layer and Session layer c) Presentation layer d) Session layer 19)The functionalities of presentation layer includes _____ a) All of the mentioned b) Data compression c) Data encryption d) Data decryption 20)In BSD socket API, which call is usually used for transmitting data in the connectionless mode? a) Accept() b) Sendto() c) Connect() d) None of the mentioned 21)Which of following statement about TCP/UDP sockets is wrong? a) TCP is faster than UDP b) TCP socket is stream oriented c) UDP socket is block oriented d) All of the mentioned 22)Which of following are commonly used as digital communication medium? a) Twisted pair b) All of the mentioned c) Coaxial cable d) Optical fiber 23)Consider a network link that has distance of 100 meters, and signal traverses at the speed of light in cable 2.5 x 10^8 meters per second. The link has transmission bandwidth of 100 megabits/second (100 x 10^6 bits per second). The packet size is 400 bits. What is the signal propagation delay? [email protected] 5 about:blank 5/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) 4x10^-19 seconds b) 4x10^-6 seconds c) 4x10^-7 seconds d) None of the mentioned 24)An API allows application programs to access certain resources through a predefined interface? a) False b) True 25)In transport protocol, which of the following statements is true for User Data Protocol? a) It enables best-effort connectionless transfer of individual block of information. b) It enables connection-oriented reliable transfer of individual block of information c) It enables best-effort connectionless reliable transfer of a stream of bytes d) None of the mentioned 26)Which of the following sentences are true for connectionless stream mode of service? (choose 3) a) Multiple write/read between peer processes b) Send/receive to/from multiple peer processes c) No setup overhead and delay d) Destination address with each block 27)In transmission delay, in order to reduce the number of bits in a message we use data compression. a) True b) False 28)Which of the following is true of data compression algorithms? (choose 3) a) Modify data headers b) Recover information approximately c) Recover original information exactly d) Represent the information using fewer bits [email protected] 6 about:blank 6/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 29)Which of the following networks use store-and-forward switching operation? (choose 2) a) Computer networks b) Telegraph networks c) Telephone networks d) Wireless networks 30)There are similarities between message switching and packet switching. Which of following that applies to packet switching but not to message switching? a) Variable length of information block b) Supporting multiple applications c) Store-and-forward d) All of the mentioned 31)Which of the following networks can be connection-oriented? (choose 2) a) Computer networks b) Telephone networks c) Telegraph networks d) All of the mentioned 32)A protocol is a set of precise and unambiguous rules that governs. a) How two or more communicating entities in a layer are to interact b) All of the mentioned c) Messages that can be sent and received d) Actions that are to be taken when a certain event occurs 33)DNS is a domain-name-service that responds to queries of domain name to IP address or IP address to domain name. DNS uses services provided by _____ a) UDP b) TCP c) HTTP d) None of the mensocket 34)A network used to join the individual networks at different sites into one extended network is called _____ a) LAN [email protected] 7 about:blank 7/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ b) VPN c) PAN d) SAN 35)Upon receipt of a bad segment, UDP? a) It does not do flow and error control b) Retransmission c) It does error control d) It does flow control 36)Which OSI layer is responsible for providing end-to-end communication with reliable service? a) Session layer b) Transport layer c) Network layer d) Data link layer 37)Which OSI layer is responsible for dividing the transmitted bit stream into frames? a) Data link layer b) Application layer c) Network layer d) Transport layer 38)Which OSI layer is responsible for determining which route through the network to use? a) Data link layer b) Network layer c) Transport layer d) None of the mentioned 39)Which feature does the data link layer and transport layer have in common? a) Flow control b) Congestion control c) All of the mentioned d) Medium access control 40)Which protocol glues the network of networks together as the Internet? [email protected] 8 about:blank 8/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) TCP b) IP c) UDP d) None of the mentioned 41)Which of the following applications would you select TCP protocol for? (choose 2) a) Web browsing b) File transfer c) Domain name service d) None of the mentioned 42)In BSD socket API, which type of socket is used to create a TCP socket? a) SOCK_RAW b) SOCK_STREAM c) SOCK_DGRAM d) None of the mentioned 43)In BSD socket API, which type of socket is used to create a UDP socket? a) SOCK_DGRAM b) SOCK_STREAM c) SOCK_RAW d) None of the mentioned 44)In BSD socket API, which systems call is used to assign a network address to the socket? a) None of the mentioned b) Bind() c) Connect() d) Listen() 45)In BSD socket API, if a client knows the server name but now server's network address, what system call should the client use to get server's network address? a) Gethostbyname() b) Connect() c) None of the mentioned [email protected] 9 about:blank 9/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) Gettimeofday() 46)In a transmission system, which of the following statement is true for a receiver? (choose 2) a) Converts information into signal suitable for transmission b) Receives energy from medium c) Converts received signal into a form suitable for delivery to user d) All of the mentioned 47)In digital transmission, long distance digital communications require the use of a generator to recover original data sequence and re-transmits on next segment. a) True b) False 48)In twisted pair, a category 5 UTP cable can support a data rate of up to 16 MHz a) True b) False 49)Which of the following statements is true for optical fiber? a) All of the mentioned b) Plentiful bandwidth for new services c) Dominates long distance transmission d) Distance less of a cost factor in communications 50)Which of the following are advantages of optical fiber? (choose 2) a) Extremely low bandwidth b) No corrosion c) Noise immunity d) Wavelength dependency 51)Consider a network link that has distance of 100 meters, and signal traverses at the speed of light in cable 2.5x10^18 meters per second. The link has transmission bandwidth of 100 megabits/second (100x10^6 bits per second). The packet size is 400 bits. What is the packet transmission delay? a) 4x10^-7 seconds b) None of the mentioned c) 4x10^-6 seconds [email protected] 10 about:blank 10/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) 4x10^-9 seconds 52)Given a 7-bit information frame (0, 1, 0, 1, 1, 0, 1), what is the even parity bit? a) 1 b) 0 c) None of the mentioned d) 01 53)Which of the following statements are true for single-bit parity error detection? (choose 2) a) It can detect all tripe bit errors in an information frame b) It can detect all single bit errors in an information frame c) It can detect all double bit erros in an information frame d) None of the mentioned 54)Which of following statements are true for two-dimensional parity error detection? a) It can detect all single bit errors in an information frame b) All of the mentioned c) It can detect all double bit errors in an information frame d) It can correct all single bit errors in an information frame 55)Assume bit errors occur at random. If each bit has 50% probability to be in error by transmission. What is the probability of a four-bit frame to be in error by transmission? a) 1/4 b) 1/8 c) 1/16 d) None of the mentioned 56)What is the binary sequence that corresponds to polynomial code x^3 + x^2 + 1? a) 111 b) 1110 c) 0111 d) 1101 57)Block codes are generated using _____. a) Generator matrix [email protected] 11 about:blank 11/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ b) Generator polynomial c) Both of the mentioned d) None of the mentioned 58)Which of the following is true for two-dimensional parity check? (choose 2) a) Arrange information in rows b) More parity bit to improve coverage c) Arrange information in columns d) Add multiple parity bits to each column 59)Polynomial codes are implemented using shift register circuits a) True b) False 60)What is the binary equivalent of the following polynomial arithmetic x^7 + x^6 + x^5 + x^2 + 1? a) 11011101 b) 11100111 c) 11101101 d) 11100101 61)Using Euclidean Division, what will be the remainder of 70 by 999 where 70 is the divisor and 999 is the dividend? a) 17 b) 21 c) 19 d) 14 62)Given an information polynomial code l(x) = x^7 + x^6 + x^1 + 1. Which is its corresponding per-bit information frame? a) 01100011 b) 10100010 c) None of the mentioned d) 11000011 63)What is the remainder obtained by dividing x^7 + x^5 + 1 by the generator polynomial x^3 + 1? [email protected] 12 about:blank 12/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) x^2 + x b) x^2 + 1 c) x^2 + x + 1 d) None of the mentioned 64)Given a generator polynomial g(x) = x^3 + x + 1, consider the information sequence 1001. By CRC method, what is the resulting codeword for transmission? a) 1010110 b) 1001111 c) 1001000 d) 1001110 65)Which of the following generator polynomials can detect all single bit errors in an information frame? a) g(2) = x + 1 b) g(x) = x c) g(x) = x^2 d) All of the mentioned 66)Internet protocols use check bits to detect errors, instead of using CRC polynomials. The primary rationale is _____ a) Strength of error detection capability b) simplicity of implementation c) CRC polynomial cannot work for internet protocols d) None of the mentioned 67)The two basic approaches in error control are error prevention and detection, and error correction and re-transmission. a) False b) True 68)Find parity bit for 1001011? a) 1 b) 2 c) None of the mentioned d) 0 [email protected] 13 about:blank 13/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 69)The divisor in a cyclic code is normally called the _____. a) Generator b) Degree c) redundancy d) None of the mentioned 70)The checksum of 0000 and 0000 is _____ a) 0101 b) 1010 c) 0000 d) 1111 71)In ASCII, a single parity bit code can detect _____ errors a) an odd number of b) two c) an even number of d) no errors 72) Which of these is not a network edge device? (G14) a) PC b) Smartphones c) Servers d) Switch 73)Two devices are in network if ________ (G14) a) a process in one device is able to exchange information with a process in another device b) a process is running on both devices c) PIDs of the processes running of different devices are same d) a process is active and another is inactive 74)Which layer provides the services to user? (G14) a) application layer b) session layer c) presentation layer d) physical layer [email protected] 14 about:blank 14/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 75) A _____ is a device that forwards packets between networks by processing the routing information included in the packet. (G14) a) bridge b) firewall c) router d) hub 76) The number of layers in ISO OSI reference model is _________ (G14) a) 5 b) 7 c) 6 d) 10 77) How many layers are present in the Internet protocol stack (TCP/IP model)? (G14) a) 5 b) 7 c) 6 d) 10 78) Transmission data rate is decided by ________ (G14) a) network layer b) physical layer c) data link layer d) transport layer 79) In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________ (G14) a) Application layer b) Transport layer c) Link layer d) Session layer 80) In TCP/IP model, when data is sent from device A to device B, the 5th layer to receive data at B is ________ (G14) a) Application layer [email protected] 15 about:blank 15/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ b) Transport layer c) Link layer d) Session layer 81) OSI stands for ________ (G14) a) open system interconnection b) operating system interface c) optical service implementation d) open service internet 82) Which address is used on the internet for employing the TCP/IP protocols? (G7) a) physical address and logical address b) port address c) specific address d) all of the mentioned 83)TCP/IP model was developed _____ the OSI model. (G7) a) prior to b) after c) simultaneous to d) with no link to 84) Transmission data rate is decided by ____________(G7) a) network layer b) physical layer c) data link layer d) transport layer 85) TCP/IP model does not have ______ layer but OSI model have this layer.(G7) a) session layer b) transport layer c) application layer d) network layer 86) In which year was the OSI model studied?(G7) a) 1969 b) 1970 [email protected] 16 about:blank 16/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ c) 1971 d) 1981 87) Which of the following is not an ISO specification for OSI model?(G7) a) The same functions can be placed on different floors b) Do not define too many functional layers c) Create boundaries between functional layers so that the number of interactions between the two layers is minimal d) Create separate layers for functions that are completely different in terms of technology or implementation 88) At which layer of the OSI model does packet routing occur?(G7) a) Network b) Data link c) Transport d) Presentation 89) When a packet is lost or corrupted, what does the data link layer do?(G7) a) Self-recover or repair lost or corrupted packets or that b) Ask the source station to resend the lost or damaged packet c) Abort the data exchange session, giving an error message to the source station d) All of the mentioned 90) What can cause two network layer entities of two computers in a network not to communicate with each other?(G7) a) The network connection is faulty b) Data link layer protocol error c) Data physical layer protocol error d) All of the mentioned 91) Which of the following information do packets at the network layer contain?(G7) a) The IP address of the sending computer and the IP address of the receiving machine b) IP packet size, IP packet lifetime c) Contact serial number d) All of the mentioned [email protected] 17 about:blank 17/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 92) Which type of organizations uses a Virtual private network? (G15) a. Colleges, Large Corperations,Governmentel institutes b. Airports, Railway Stations, churches 93) VPN ( Virtual Private Network) is a secure network that gets used by people who are working from home or on the way home on the train. this is because (G15) A. Its a very secure tunnel network and uses vpn because it is encrypted B.Because vpn allowes access to their home area and you can download your work C. because everyone can access the data in the encrypted tunnel 94) The following are browsers except one: (G15) a. Google Chrome b.Safari c. Yandex d. Hackintosh 95) A difference in DHCPv6 and DHCPv4 is? (G15) A. A difference in DHCPv6 and DHCPv4 is? B. There is no requirement for BOOTP compatibility. C. Default router can be obtained by clients. D. All the above 96) A physical interface often used for terminating telephone wires. (G15) a. RJ 11 b.RJ 45 c. Ethernet Cable d. RJ 14 97) A network that spans a large geographical area, the most common example being the internet. (G15) a. LAN b. MAN c. WAN 98) Who controls/configures DHCP servers? (G15) a. Network administrators b. Router software c. Developer d. Tester 99) Wi-Fi is a… (G15) a.Popular technologies and standards for wireless computer networking [email protected] 18 about:blank 18/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ b. Type of computer c. A person's name d. Nonsense 100) Which Internet Protocol (IP) number is used by a computer to send a message back to itself? (G15) a. 0.0.0.0 b. 1.1.1.1 c. 127.0.0.1 d. 255.255.255.255 101) Vint Cerf and Robert E Kahn are known for their contribution for.(G15) a. TCP b. HTTP c. FTP d. ICMP 102) The function of DSLAM is to __________ (G1) a. Convert analog signals into digital signals b. Convert digital signals into analog signals c. Amplify digital signals d. De-amplify digital signals Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s used by Telcos to convert the analog signals to digital signals for the purpose of providing internet. The DSLAM located in a telco’s Central Office does this function. 103) Which of the following terms is not associated with DSL? (G1) a. DSLAM b. CO c. Splitter d. CMTS Explanation: CMTS stands for Cable modem termination system. It is used in cable internet access. In cable internet access, internet is not provided through telephone lines and the companies that provide such connections don’t necessarily provide telephone access. 104) Bluetooth is an example of __________? (G1) a. personal area network b. local area network c. virtual private network [email protected] 19 about:blank 19/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d. wide area network Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission. 105) A __________ is a device that forwards packets between networks by processing the routing information included in the packet. (G1) a. bridge b. firewall c. router d. hub Explanation: A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the cheapest path to the destination. 106) Which of the following networks extends a private network across public networks? (G1) a. local area network b. virtual private network c. enterprise private network d. storage area network Explanation: A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.VPN provides enhanced security and online anonymity to users on the internet. It is also used to unblock websites which are unavailable in certain regions. 107) Application layer is implemented in ____________ (G1) a. End system b. NIC c. Ethernet d. Packet transport Explanation: Not only application layer, but presentation layer, session layer and transport layer are also implemented in the end system. The layers below are implemented outside the end system, for example, the network layer is implemented on the routers and the physical layer is implemented for the medium. 108) Transport layer is implemented in ______________(G1) a. End system b. NIC c. Ethernet d. Signal transmission Explanation: Application, Presentation, Session and Transport layer are implemented in the end system. The transport layer handles the process to process delivery of the packet through ports. 109) Delimiting and synchronization of data exchange is provided by __________ (G1) a. Application layer [email protected] 20 about:blank 20/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ b. Session layer c. Transport layer d. Link layer Explanation: The session layer provides the mechanism for opening, closing and managing a session between end-user application processes. The session layer 5 is responsible for establishing managing synchronizing and terminating sessions. In TCP/IP protocol stack, the functions of the session layer are handled by the transport layer itself and thus the session layer is missing from the TCP/IP model. 110) In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________ (G1) a. Application layer b. Transport layer c. Link layer d. Session layer Explanation: In OSI reference model, the fifth layer is Session layer. Session layer provides the mechanism for opening, closing and managing a session between end-user application processes. In TCP/IP protocol stack, the functions of the session layer are handled by the transport layer itself and thus the session layer is missing from the TCP/IP model. 111) In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ (G1) a. Application layer b. Transport layer c. Link layer d. Session layer Explanation: In TCP/IP model, the fifth layer is application layer. When data is sent from device A to device B, the 5th layer to receive data at B is application layer. Application layer provides the interface between applications and the network. The user interacts with only this layer. [email protected] 21 about:blank 21/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ CHƯƠNG 2. TẦNG VẬT LÝ 1) In networks where errors are infrequent, which approach is favoured for efficiency? a) End-to-end approach b) Hop-by-hop approach c) Either one of the above d) Neither one of the above 2) Which of the following statements is true about the stop-and-wait ARQ protocol? a) Stop-and-wait is only efficient if the link delay-bandwidth product is large b) Stop-and-wait is only efficient if the link delay-bandwidth product is small c) Stop-and-wait is only efficient if the link bandwidth is low d) Stop-and-wait is only efficient if the link bandwidth is high 3) Consider a situation where an interactive application produces a packet to send each keystroke from the client and the server echoes each keystroke that it receives from the client. Which of the following strategies for sending ACK frames in a Go-Back-N is appropriate for the situation? a) send an ACK frame when the next piggyback opportunity arises b) send an ACK frame immediately after each frame is received c) send an ACK frame after every other frame is received d) Any one of the mentioned 4) Consider a bulk data transfer application where a server sends a large file that is segmented in a number of full-size packets that are to be transferred to the client. Assume the channel has a low probability of error. Which of following strategies for sending ACK frames in a Go-Back-N is appropriate for the situation? a) Any one the mentioned b) send an ACK frame after every other frame is received c) send an ACK frame when the next piggy back opportunity arises d) send an ACK frame immediately after each frame is received 5) Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the value of frame number x at receiver B? [email protected] 22 about:blank 22/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) 3 b) 2 c) 4 d) None of the mentioned 6) ARQ protocols combine error detection, retransmisison and sequence numbering to provide reliability. a) False b) True 7) A service model specifies a level of performance that can be expected in the transfer of information. a) True b) False 8) A service offered at a given layer can include which of the following feature(s)? a) Sequencing b) All of the mentioned c) Reliability d) Timing 9) Digital communication technologies may introduce errors in communication, which of the following can be used to provide reliable communication. (choose 2) a) TCP b) HDLC c) DNS [email protected] 23 about:blank 23/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) UDP 10)Ensuring that information is not altered during transfer is associated with _____ a) Authentication b) Integrity c) Confidentiality d) Availability 11) Given 3 bits for sequence numbers, what is the maximum sliding windows size at the receiver in Go Back 3 ARQ? a) 3 b) 8 c) 7 d) None of the mentioned 12)Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the sliding window size to be 4, what is the maximum sliding window size at the receiver? a) 3 b) 7 c) None of the mentioned d) 8 13)Consider Selective Repeat ARQ flow control protocol. In the following scenario, what should be the value of frame number x at receiver B? a) 8 b) 7 [email protected] 24 about:blank 24/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ c) 3 d) None of the mentioned 14)If the probability of error is very low in a communication link, which of the following statements is true about performance of ARQ protocol? a) Stop-and-wait and Go-back-N ARQ protocols have similar performance b) Go-back-N ARQ and Selective Repeat ARQ protocols have similar performance c) Stop-and-wait and Selective Repeat ARQ protocols have similar performance d) None of the mentioned 15)In peer-to-peer protocol, the purpose of Automatic Repeat Request is _____ (choose 2) a) to ensure a sequence of information packet is delivered in order b) to ensure a sequence of information packet is delivered without errors or duplication despite transmission errors and losses c) to ensure a sequence of information packet is delivered out-of-order d) to ensure a sequence of information packet is delivered with an ACK request 16)Which of the basic elements of ARQ is associated with negative acknowledgement? a) Error detecign code b) NAKs c) ACKs d) Timeout mechanism 17)In Go-Back-N ARQ, a procedure where transmisison of a new frame is begun before the completion of time of the previous frame transmission is called _____ a) Pipelining b) Transitioning c) Channeling d) None of the mentioned 18)In Stop-and-Wait protocol, sequence number are not required. a) True b) False [email protected] 25 about:blank 25/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 19)The disadvantage of Stop-and-Wait protocol a) All of the above b) Error free communication channel does not exist c) Acknowledgement may get lost d) Deadlock situation may occur 20)Which of the following statements are true for the best-effort service of IP? a) Packets can arrive with errors or be lost b) All of the mentioned c) Packets can arrive out-of-order d) Packets can arrive after very long delays 21)Which of following services belong to the data link layer? a) All of the mentioned b) Insert framing information into the transmitted stream to indicate the boundaries that define frames. c) Provide error control to ensure reliable transmission d) Provide flow control to prevent the transmitter from overrunning the reciever buffer 22)Which ARQ flow control protocol is used by TCP? a) Stop-and-Wait b) Selective Repeat c) Go-back-N d) None of the mentioned 23)By framing, frame boundaries can be determined using _____ a) All of the mentioned b) Character Counts c) Control Characters d) Flags 24)Which of following statements are true about framing protocols? a) PPP uses character-based framing which requires byte stuffing b) All of the mentioned c) HDLC uses Flag-based framing which required bit stuffing [email protected] 26 about:blank 26/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) None of the mentioned 25)In IP network, which of the following statement is incorrect? a) Packets always arrive on time b) Packets can arrive out-of-order c) Packets can arrive with errors or be lost d) Packets can arrive after logn delays 26)Framing involves identifying the beginning and end of a block of information within a digital stream. a) False b) True 27)Which of the following statements are true for PPP byte stuffing? a) All of the mentioned b) Malicious users may inflate bandwidth c) Size of frame varies unpredictably due to byte insertion d) None of the mentioned 28)In PPP authentication, which of the following is true for Password Authentication Protocol (Choose 3) a) Initiator and authenticator share a secret key b) Transmitted unencrypted, susceptible to eavesdropping c) After several attempts, LCP closes link d) Initiator must send ID and password 29)In HDLC frame format, flag is used to identify secondary station (1 or more octets) a) True b) False 30)Perform the bit stuffing procedure for the following binary sequence: 1101111111011111110101. What is the outcome? a) 110111111101111111010100 b) 001000000010000000010100 c) None of the mentioned d) 110111110110111110110101 [email protected] 27 about:blank 27/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 31)PPP is a data link protocol for point-to-point lines in Internet. Its framing is based on which of the following? a) Byte stuffing b) Bit stuffing c) Word stuffing d) None of the mentioned 32)HDLC is another data link control protocol widely in use. Its framing is based on which of the following? a) Byte stuffing b) Bit stuffing c) Word stuffing d) None of the mentioned 33)Which of following statements are true for HDLC? a) All of the mentioned b) supports various data transfer modes c) supports multi-point links and point to point links d) implements error control and flow control mechanisms 34)In PPP authentication, which of the following is true for Challenge-Handshake Authentication Protocol (CHAP)? (Choose 2) a) Initiator must send ID and password b) Authenticator can re-issue challenge during session c) Initiator and authenticator share a secret key d) After several attempts, LCP closes link 35)In error detection and loss recovery, which of the following statement is correct? a) All of the mentioned b) Frames may undergo errors in transmission c) CRCs detect errors and such frames treated as lost d) Frames lost due to loss-of-synchronization or receiver buffer overflow 36)In multiplexing, Last IN First Out (LIFO) is used to determine the order of packet transmission. a) True [email protected] 28 about:blank 28/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ b) False 37)Generic Framing Procedure (GFP) allows the implementation of multiple transport modes that may coexist within the same transport channel. a) True b) False 38)In Generic Framing Procedure (GFP), which of the following sentences are correct (choose 3) a) GFP rely on byte-stuffing mechanism to delineate protocol data unit (PDUs) b) GFP provides flexible encapsulation framework that supports either a fixed or variable length frame structure. c) GFP uses an explicit payload length indicator provided in its frame header to accommodate variable length PDUs d) GFP uses a variation of HEC-based self delineation technique 39)What is the primary function of medium access control? a) It is to minimize or eliminate the incidence of collisions of a shared communication link. b) It is to deal with the flow control of a shared communication link. c) It is to deal with the congestion control of a shared communicatioin link. d) None of the mentioned 40)What is the primary benefit provided by the Slotted ALOHA compared to ALOHA? a) Lower access delay b) Higher maximum throughput c) Both of the mentioned d) None of the mentioned 41)What is the vulnerable perfiod of collisions in ALOHA? a) Two frame transmission time b) Round-trip propagation delay c) One frame transmission time d) None of the mentioned 42)What is the vulnerable period of collisions in Slotted ALOHA? [email protected] 29 about:blank 29/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) Round-trip propagation delay b) One frame transmission time c) Two frame transmission time d) None of the mentioned 43)What is the vulnerable period of collsions in Carrier Sense Multiple Access (CSMA)? a) One propagation delay b) One frame transmission time c) Round-trip propagation delay d) None of the mentioned 44)The primary function of Media Access Control is to minimize or eliminate the instance of the collisions to achieve a reasonable utilization of the medium a) False b) True 45)In media sharing techniques, which of the following are channelization approaches? (Choose 3) a) Time Division Multiple Access b) Frequency Division Multiple Access c) Code Division Multiple Access d) Data Division Multiple Access 46)Corresponding box of Carrier Sense Multiple Access/Collision Detection can be replaced by one of the _____ a) Non-persistent process b) Persistent process c) i-persistent process d) p-persistent process 47)Random access is also called the _____ a) Contention methods b) Controlled access c) Channelization d) Authentication [email protected] 30 about:blank 30/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 48)In Carrier Sense Multiple Access (CSMA), possibility of collision still exist because of _____ a) Collision delay b) Propagation delay c) Transmit delay d) None of the mentioned 49)Polling is a scheduling approach for dynamic medium access control. Which of following statements are correct? a) All of the mentioned b) Polling performance can deteriorate with large delay-bandwidth product c) Polling can provide bounds on access delay to the shared medium d) Polling can provide fairness through regulated access opportunities 50)In a collision-free reservaton system that has a large number of light-traffic stations, and the delay-bandwidth product is larger than 1. Which of following MAC protocol is a good fit for stations to reserve mini-slots? a) 1-persistent CSMA b) Slotted ALOHA c) CSMA/CD d) None of the mentioned 51)In Carrier Sense Multiple Access with collision detection (CSMA-CD), how long will it take a collision to be detected and resolved? a) Round-trip propagation delay b) One propagation delay c) One frame transmission time d) None of the mentioned 52)Suppose that the ALOHA protocol is used to share a 56 kbps satellite channel. Suppose that frames are 1000 bits long. What is the maximum throughput of the system in number of frames per second. a) 1 frame per second b) 100 frames per second c) None of the mentioned [email protected] 31 about:blank 31/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) 10 frames per second 53)Consider building a CSMA/CD network running at 1 Gbps over a 1-km cable. The signal speed in the cable is 200,000 km/sec. What is the minimum frame size? a) 64 Bytes b) 640 Bytes c) 1250 Bytes d) None of the mentioned 54)In media access control, which of the following statements are true for Channelization? (Choose 3) a) Widely used in internet traffic b) Does not scale well to large numbers of users c) Inefficient for bursty traffic d) Inflexible in allocating bandwidth to users with different requirements 55)Time-out period is equal to maximum possible propagation delay of _____ a) round-trip b) Square-trip c) Triangle-trip d) Rectangle-trip 56)In Carrier Sense Multiple Access (CSMA), if station senses medium before trying to use it then chance of collision can be _____ a) Increased b) Reduced c) Doubled d) Highlighted 57)Carrier Sense Multiple Access (CSMA) is based on medium called _____ a) Sense before transmit b) Sense before Collision c) Listen before sending d) Listen before talk 58)Which of the following is not true for MAC scheduling? a) Can provide fairness to stations [email protected] 32 about:blank 32/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ b) Reduced computational or procedural complexity c) Less variability in delays d) More efficient channel utilization 59)Which of following features are typically true for local area networks? a) All of the mentioned b) Low error rate c) High speed d) Low round-trip delay 60)Use HDLC and Ethernet to identify similarities between medium access control and data link control protocols. Which of following statements are true? (Choose 2) a) Both implement error control and flow control for reliable transmission. b) Both contains framing information that delineates the beginning and end of each frame. c) Both check the CRC in the received frames for errors d) None of the mentioned 61)Use IEEE 802.3 and IEEE 802.11 to discuss differences between wired and wireless LANs. Which of following statements are true about the differences? a) All of the mentioned b) Collision detection c) Error rate d) Station mobility 62)Which of following is not a primary responsibility of the MAC sublayer in LANs? a) Channel access b) reliable connection-oriented service c) Protocol data unit addressing d) Fragmentation and reassembly of MAC service data unit. 63)In Ethernet, slot time that is at least the round-trip propagation delay, is the critical system parameter for _____ a) All of the mentioned b) Upper bound on time to acquire channel [email protected] 33 about:blank 33/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ c) upper bound on time to detect collision d) quantum for re-transmission scheduling 64)Which one of the following event is not possible in wireless LAN? a) Acknowledgement of data frames b) Collision detection c) Multi-mode data transfer d) Collision avoidance 65)In 802.11 protocol, MAC can alternate between Contention Periods (CPs) and Contention-Free Periods (CFPs) a) True b) False 66)CSMA/CD is not used in DCF because _____ a) physical carrier sense detects the presence of other WLAN users b) a station is unable to listen to the channel for collisions while transmitting c) in idle state, a station is unable to listen to the cahnnel for collisions d) None of the mentioned 67)In infrastructure network supporting voice and data traffic, data traffic is transported through the CP and voice traffic through the CFP. a) False b) True 68)In 802.11 protocol, which of the following statements are true for Basic Service Set (BSS)? (Choose 2) a) Multiple BSSs interconnected by Central System (CS) b) Stations in BSS can communicate with each other c) Location in a Basic Service Area (BSA) d) Distinct collocated BSS's cannot coexist 69)Consider a Gigabit Ethernet hub with stations at a 100-meter distance and average frame size of 512 bytes. Assume the propagation speed is at 2/3 of light speed. What is the value of normalized delay-bandwidth product? a) 0.0122 b) 1.22 [email protected] 34 about:blank 34/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ c) 0.122 d) None of the mentioned 70)Wireless data communication is compelling, because of _____ (choose 2) a) Its high reliability to noise and interference b) Its easy and low-cost deployment c) Its support to personal and mobile devices d) All of the mentioned 71)Why not use CSMA/CD in a wireless LAN? The primary reason is _____ a) The hidden station problem b) The round-trip delay in a wireless LAN is too large c) The frame is usually very small in a wireless LAN d) All of the mentioned 72)In IEEE 802.11 MAC for wireless LANs, which of following inter-frame space (IFS) is used to transmit high-priority frames such as ACKs? a) DIFS b) SIFS c) PIFS d) None of the mentioned 73)Which of following statements identifies the similarity between HDLC (data link control) and Ethernet (medium access control)? a) Both contain framing information that delineates the beginning and end of each frame b) Both provide connection-oriented packet transfer services to the network layer c) All of the mentioned d) Both implement error control and flow control functions to provide reliable transmisison 74)Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a) CDMA b) CSMA/CA c) ALOHA [email protected] 35 about:blank 35/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) CSMA/CD 75)Which of the following are management services offered by the MAC sublayer in wireless LAN? (choose 2) a) Power management b) Roaming within ESS c) Network management d) Storage management 76)In CSMA/CA, an amount of time divided into slots called _____ a) Contention procedure b) Contention window c) Contention signals d) Contention energy 77)In medium access control sublayer, medium usage is mediated by the access control during contention period. a) False b) True 78)In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), to continue transmission process we use a _____ a) Access point b) Loop c) Station d) Signal 79) The physical layer is concerned with (G2) a) bit-by-bit delivery b) Process to process delivery c) Application to application delivery d) Port to port delivery 80) Which transmission media provides the highest transmission speed in a network? (G2) a) Coaxial cable b) Twisted pair cable [email protected] 36 about:blank 36/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ c) Optical fiber d) Electrical cable 81) Bits can be sent over guided and unguided media as analog signal by (G2) a) Digital modulation b) Amplitude modulation c) Frequency modulation d) Phase modulation 82)The portion of physical layer that interfaces with the media access control sublayer is called (G2) a) Physical signaling sublayer b) Physical data sublayer c) Physical address sublayer d) Physical transport sublayer 83)The physical layer provides (G2) a) Mechanical specifications of electrical connectors and cables b) Electrical specification of transmission line signal level c) Specification for IR over optical fiber d) All of the mentioned 84) In asynchronous serial communication the physical layer provides (G2) a) Start and stop signaling b) Flow control c) Both start & stop signaling and flow control d) Only start signaling 85)The physical layer is responsible for (G2) a) Line coding b) Channel coding c) Modulation d) All of the mentioned 86) The physical layer translates logical communication requests from the ______ into hardware specific operations a) Data link layer [email protected] 37 about:blank 37/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ b) Network layer c) Transport layer d) Application layer 87) A single channel is shared by multiple signals by (G2) a) Analog modulation b) Digital modulation c) Multiplexing d) Phase modulation 88) Wireless transmission of signals can be done via (G2) a) Radio waves b) Microwaves c) Infrared d) All of the mentioned 89)What technique is used with UTP cable to help protect against signal interference from crosstalk? a) terminating the cable with special grounded connectors b) twisting the wires together into pairs c) wrapping a foil shield around the wire pairs d) encasing the cables within a flexible plastic sheath 90) The physical layer is concerned with the movement of _______ over the physical medium. (g8) a) Programs b) Dialogs c) Protocols d) Bits 91) The physical layer concerns with (g8) a) bit-by-bit delivery b) process to process delivery c) application to application delivery d) None of the above 92) Before data can be transmitted, they must be transformed to ________.(g8) [email protected] 38 about:blank 38/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) periodic signals b) electromagnetic signals c) aperiodic signals d) low-frequency sine waves 93) The term......... describes the position of the waveform relative to time 0 (g8) a) Frequency b) Phase c) Phase Shift d) Time period 94) In a frequency-domain plot, the horizontal axis measures the ________ (g8) a) peak amplitude b) frequency c) phase d) slope 95) In a time-domain plot, the horizontal axis is a measure of ________ (g8) a) signal amplitude b) frequency c) phase d) time 96) As frequency increases, the period _____ (g8) a) Decreases b) Increases c) remains the same d) doubles 97) Which standards organization oversees development of wireless LAN standards (g8) a) IANA b) IEEE c) IOS d) TIA [email protected] 39 about:blank 39/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 98) The physical layer of a network _______ (g8) a) Defines the electrical characteristics of signals passed between the computer and communication devices b) Controls error detection and correction c) Constructs packets of data and send them across the network d) All of the above 99) Bits can be send over guided and unguided media as analog signal by (g8) a) digital modulation b) amplitude modulation c) frequency modulation d) phase modulation 100) Which transmission media has the highest transmission speed in a network? (g8) a) twisted pair cable b) coaxial cable c) optical fiber d) electrical cable 101) A periodic signal completes one cycle in 0.001 s. What is the frequency? (G9) a) 1 Hz b) 100 Hz c) 1 KHz d) 1 MHz 102) If the bandwidth of a signal is 5 KHz and the lowest frequency is 52 KHz, what is the highest frequency? (G9) a) 5 KHz b) 10 KHz c) 47 KHz d) 57 KHz 103) What is the bandwidth of a signal that ranges from 1 MHz to 4 MHz? (G9) a) 4 MHz b) 1 KHz [email protected] 40 about:blank 40/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ c) 3 MHz d) None of the above 104) Given two sine waves A and B, if the frequency of A is twice that of B, then the period of B is ________ that of A. (G9) a) one-half b) twice c) the same as d) indeterminate from 105) A sine wave is ________. (G9) a) periodic and continuous b) aperiodic and continuous c) periodic and discrete d) aperiodic and discrete 106) If the maximum amplitude of a sine wave is 2 V, the minimum amplitude is ________ V. (G9) a) 2 b) 1 c) -2 d) between -2 and 2 107) A signal is measured at two different points. The power is P1 at the first point and P2 at the second point. The dB is 0. This means ________. (G9) a) P2 is zero b) P2 equals P1 c) P2 is much larger than P1 d) P2 is much smaller than P1 108) ________ is a type of transmission impairment in which the signal loses strength due to the resistance of the transmission medium. (G9) a) Attenuation b) Distortion c) Noise d) Decibel [email protected] 41 about:blank 41/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 109) ________ is a type of transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal. (G9) a) Attenuation b) Distortion c) Noise d) Decibel 110) ________ is a type of transmission impairment in which an outside source such as crosstalk corrupts a signal. (G9) a) Attenuation b) Distortion c) Noise d) Decibel 111) The _____ is the physical path over which a message travels. a) Path b) Medium c) Route d) Protocol 112) Three or more devices share a link in _____ connection. a) Multipoint b) Unipoint c) Point to Point d) None of the mentioned 113) In a LAN, which address is used to transfer frames to appropriate destination? a) Physical address b) IP address c) Domain name d) None of the mentioned 114) Of the following services, which service(s) does the IP layer provides? a) None of the mentioned b) Error control [email protected] 42 about:blank 42/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ c) Flow control d) Connection-based data transfer 115) This layer is an addition to OSI model? a) Application layer b) Presentation layer and Session layer c) Presentation layer d) Session layer 116) The functionalities of presentation layer includes _____ a) All of the mentioned b) Data compression c) Data encryption d) Data decryption 117) [email protected] 43 about:blank 43/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ CHƯƠNG 3. TẦNG LIÊN KẾT DỮ LIỆU 1) Which layer LAN bridges work on? a) Medium access control b) Transport layer c) Network layer d) None of the mentioned 1) One can use repeaters, bridges and routers to interconect two LANs. Which of the following approaches will make local traffic stay in its own LAN? (Choose 2) a) repeaters b) bridges c) routers d) All of the mentioned 2) Of the following network layer functions, which one is optional? a) congestion control b) Routing c) Forwarding d) None of the mentioned 3) Of the following, which is a basic function of transparent bridge? a) Prevents loops in the topology b) All of the mentioned c) Learns where stations are attached to the LAN d) Forwards frames from one LAN to another 4) It is possible for a network layer to provide a choice of services to the user of the network. Which of following the IP network layer offers? a) Best-effort connectionless service b) connection-oriented reliable stream service c) All of the mentioned d) connection-oriented transfer of packets with delay guarantee 5) The network layer is considered the most complex layer because of the following reasons (choose 2) [email protected] 44 about:blank 44/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) Responsible for displaying received information to users b) Challengers such as addressing and routing c) User scalability d) Requires coordinated actions of multiple, geographically distributed network elements 6) An end-to-end function is best implemented at a lower level than at a higher level a) False b) True 7) Which of the following is an essential network function? a) Forwarding b) All of the mentioned c) Routing d) Priority and scheduling 8) In network layer, which of the following statement is true for packet networks? a) All of the mentioned b) Individual packet streams are highly bursty. c) User demand can undergo dramatic change d) Internet structure is highly decentralized 9) The main purpose of access multiplexer is to combine the typically bursty traffic flows from the individual computers into aggregate flows? a) False b) True 10)Which of the following functions can a home router perform? a) All of the mentioned b) Local area network access using WiFi c) Private IP addresses in home by network address translation d) Single global IP address using HCP 11) Consider a three hop network from the source to the destination. Let m be the packet transmission time at each hop. Let n be the propagation delay at each hop. Assume there is no queuing delay and processing time at each hop. Based on [email protected] 45 about:blank 45/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ store-and-forward, what is the total time for the packet to be transmitted to the destination? a) m+n b) 3m+n c) None of the mentioned d) 3m+3n 12)Consider a three hop network from the source to the destination. Let me be the message transmission time at each hop. Let n be the propagation delay of each hop. Assume there is no queueing delay and processing time at each hop. Based on store-and-forward, what is the total time for three packets to be transmitted to the destination by packet pipelining? a) 9m+9n b) 3m+3n c) 5m+3n d) None of the mentioned 13)Six stations (S1-S6) are connected to an extended LAN through transparent bridges (B1 and B2), as shown in the following figure. Initially, the forwarding tables are empty. Both bridges use backward learning to build their tables. Suppose station S2 transmits a frame to S1. Which of following statements is correct? a) The frame will reach bridge B1 only b) None of the mentioned c) The frame will reach bridge B2 only d) The frame will reach both bridges B1 and B2 [email protected] 46 about:blank 46/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 14)Six stations (S1-S6) are connected to an extended LAN through transparent bridges (B1 and B2), as shown in the following figure. Initially, the forwarding tables are empty. Both bridges use backward learning to build their tables. Station S2 already transmitted a frame to S1 successfully. Suppose stations S3 transmits a frame to S5. Which of following statements is correct? a) The frame will reach bridge B1 only b) The frame will reach bridge B2 only c) The frame will reach both bridges B1 and B2 d) None of the mentioned 15)One can use repeaters bridges and routers to interconnect two LANs. Which of the following approaches will make local traffic appear in both LANs? a) Routers b) Repeater c) Bridges d) All of the mentioned 16)Packet pipelining can lead to latency in message delivery a) False b) True 17)In internet, switching is done by using datagram approach to packet switching at the _____ a) Application layer b) Network layer c) Data link layer d) Physical layer [email protected] 47 about:blank 47/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ 18)A transparent bridge's duties include _____ a) All of the mentioned b) Forwarding c) Blocking d) Filtering frame 19)For a 10Mbps Ethernet link, if the length of the packet is 32 bits, the transmission delay is _____ µs (microseconds) a) 320 b) 0.32 c) 32 d) 3.2 20)Which of following networks represents an example of virtual circuit switching at the network layer? a) ATM b) IP c) IP and ATM d) All of the mentioned 21)Consider a three hop network from the source to the destination. Let m be the message transmission time at each hop. Let n be the propagation delay of each hop. Assume there is no queueing delay and processing time at each hop. Based on cut-through switching, what is the total time for three packets to be transmitted to the destination? a) 5m + 3n b) 9m + 9n c) None of the mentioned d) 3m + 3n 22)Which of following issue exists in virtual-circuit subnet but not in datagram subnet? a) State information b) Addressing c) Routing [email protected] 48 about:blank 48/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) None of the mentioned 23)Which of following describe general goals in a routing algorithm? a) Rapid responsiveness to network changes b) All of the mentioned c) Robustness under high load and link failure d) Low overhead for implementation 24)Which of following describe benefits of flooding, a specialized routing approach? a) All of the mentioned b) Always reach the destination by the fastest path c) No routing table needed for routers d) Useful in propagating information to all nodes 25)A Virtual-Circuit Network (VCN) is normally implemented in the _____ a) session layer b) data link layer c) network layer d) physical layer 26)In routing approaches, which of the following statement is true for deflection routing? (choose 2) a) Fixed, preset routing procedures b) No route synthesis c) Useful in starting up network d) Predefined source to destination route 27)To reduce size of routing table, routers do lookup table on MAC address a) True b) False 28)Flooding may easily swamp the network as one packet creates multiple packets, possibly in exponential growth rate. What are possible means to reduce resource consumption in the network? a) All of the mentioned b) Use a time-to-live field in each packet to limit its lifetime c) Ad a unique identifier to a packet for removing its duplicate [email protected] 49 about:blank 49/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) Use address and sequence number to discard duplicates 29)What are possible metrics for routing? a) Hop count b) All of the mentioned c) Delay d) Bandwidth 30)Consider the network as shown in the figure. We use the Bellman-Ford algorithm to find the set of shortest paths from all nodes to the destination node 2. Each node maintains an entry (n, cost) about the next node along the current shortest path and the current minimum cost from the node to the destination. Initially, each node has entry (-1, infinity). a) All of the mentioned b) 1 c) 4 d) 5 31)Consider the network as shown in the figure. We use the Bellman-Ford algorithm to find the set of shortest paths from all nodes to the destination node 2. Each node maintains an entry (n, cost) about the next node along the current shortest path and the current minimum cost from the node to the destination. In the second algorithm iteration, which nodes will update their entries and inform their neighbors? [email protected] 50 about:blank 50/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ a) 3 b) 4 c) 6 d) All of the mentioned 32)Consider the network as shown in the figure. We use the Bellman-Ford algorithm to find the set of shortest paths from all nodes to the destination node 2. Each node maintains an entry (n, cost) about the next node along the current shortest path and the current minimum cost from the node to the destination. In the third algorithm iteration, which nodes will update their entries and inform their neighbors? a) 4 b) 6 c) 3 d) All of the mentioned 33)In link state routing after the construction of link state packets new routes are computed using _____ a) Bellman Ford algorithm [email protected] 51 about:blank 51/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ b) Dijkstra's algorithm c) Leaky buckete algorithm d) None of the mentioned 34)A subset of a network that includes all the routers but contains no loops is called _____ a) spanning tree b) Broadcast structure c) Multi-destination routing structure d) None of the mentioned 35)In a router, which of the following statement is true for creating routing tables? a) Need information on state of links b) All of the mentioned c) Need to distribute link state information using a routing protocol d) Need to compute routes based on information 36)In a virtual-circuit packet network, routing is determined during connection set-up a) True b) False 37)In deflection routing, bufferless operation is considered a disadvantage due to packet loss a) True b) False 38)What is the root problem of Bellman-Ford algorithm for distance vector approach? a) All of the mentioned b) Counting to infinity c) Flooding overhead d) Cannot work in IP 39)What is the root problem of link state routing? a) Counting to infinity b) Flooding overhead c) Slow reaction to link failures [email protected] 52 about:blank 52/80 21:17 22/01/2024 VKU_Mạng máy tính_Bộ câu hỏi trắc nghiệm ôn thi cuối kỳ d) All of the mentioned 40)Which of following describe the benefits of link state routing compared to distance vector routing? a) All of the mentioned b) Fast convergence c) Support for multiple metrics d) Support for multiple paths to a destination 41)Which of following is the implementation of distance vector approach in the IP routing protocol? a) OSPF b) RIP c) BGP d) None of the mentioned 42)Which of following is the implementation of link state approach in the IP routing protocol? a) OSPF b) RIP c) BGP d) None of the mentioned 43)In Routing Information Protocol (RIP), the use of max number limited to 15 limits the count-to-infinity problem a) False b) True 44)In an OSPF network, routers in area only knows complete topology inside area and limits the flooding of link-state information to area

Use Quizgecko on...
Browser
Browser