department of information technology ...kamarajengg.edu.in/it_learning/mcq/mcn.pdfdepartment of...

12
QUESTION BANK DEPARTMENT OF INFORMATION TECHNOLOGY Academic year : 2020-2021 Subject Code : CS8591 Year / Semester : III / VI Course Code (as per NBA) :R17C302 Name of the Subject :COMPUTER NETWORKS Name of Staff with designation/Department :Ms.Kaviya.P, AP/IT Course Outcomes (COs) CO Code CO Statement Blooms Taxonomy Level R17C302.1 Describe the functionalities of each of the layers of standard reference models and differentiate the types of switching mechanisms in the physical layer K2 R17C302.2 Solve simple problems on error checking and error correction mechanisms and Explain the functionalities of the Datalink Layer in both wired and wireless medium K2 R17C302.3 Explain network addressing protocols and solve simple problem on routing protocols K2 R17C302.4 Compare & contrast the services of TCP and UDP protocols K2 R17C302.5 Expla in working principle of the application layer protocols K2 Prepared by Name &Signature of Staff member Signature of HOD

Upload: others

Post on 21-Aug-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

QUESTION BANK

DEPARTMENT OF INFORMATION TECHNOLOGY

Academic year : 2020-2021 Subject Code : CS8591

Year / Semester : III / VI Course Code (as

per NBA) :R17C302

Name of the Subject :COMPUTER NETWORKS

Name of Staff with

designation/Department :Ms.Kaviya.P, AP/IT

Course Outcomes (COs)

CO Code CO Statement

Blooms

Taxonomy

Level

R17C302.1

Describe the functionalities of each of the layers of

standard reference models and differentiate the types of switching mechanisms in the physical layer

K2

R17C302.2 Solve simple problems on error checking and error correction mechanisms and Explain the functionalities of the Datalink Layer in both wired and wireless medium

K2

R17C302.3 Explain network addressing protocols and solve simple problem on routing protocols

K2

R17C302.4 Compare & contrast the services of TCP and UDP protocols

K2

R17C302.5 Explain working principle of the application layer

protocols K2

Prepared by

Name &Signature of Staff member Signature of HOD

Page 2: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

DEPARTMENT OF INFORMATION TECHNOLOGY

Subject Code: CS8591 Class: III IT

Subject Name: Computer Networks Semester: V

Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD

UNIT I - Quiz

Date: 07.08.2020 & 10.08.2020

1. The ____________ model is 7-layer architecture where each layer is having some

specific functionality to perform.

a) TCP/IP b) Cloud c) OSI d) OIS

2. The full form of OSI is OSI model is ______________.

a) Open Systems Interconnection b) Open Software Interconnection

c) Open Systems Internet d) Open Software Internet

3. The process-to-process responsibility of the entire message is the responsibility of

the ______________ layer.

a) Network b) Transport c) Application d) Physical

4. The _____________ layer is the layer closest to the transmission medium.

a) Physical b) Data link c) Network d) Transport

5. In the OSI model, encryption and decryption are functions of the ______________

layer.

a) Transport b) Session c) Presentation d) Application

6. When a host on network A sends a message to a host on network B, which address

does the router look at?

a) Port b) Logical c) Physical d) None of the these

7. To deliver a message to the correct application program running on a host, the

_____________ address must be consulted.

a) Port b) IP c) Physical d) None of these

8. The ___________ layer is responsible for moving frames from one hop (node) to the

next.

a) Physical b) Data link c) Network d) Transport

9. The ___________ layer establishes, maintains and synchronizes the interactions

between communication devices.

a) Transport b) Network c) Session d) Physical

Page 3: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

10. The TCP/IP ____________ layer is equivalent to the combined session, presentation

and application layers of OSI model.

a) Application b) IP c) Transport d) Sub-Network

11. The ______________ address uniquely defines a host on the Internet.

a) Physical b) IP c) Port d) Specific

12. The ___________ layer ensures interoperability between communicating devices

through transformation of data into a mutually agreed upon format.

a) Transport b) Network c) Data link d) Presentation

13. Mail services are available to network users through the ____________ layer.

a) Data link b) Physical c) Transport d) Application

14. As the data packets moves from the upper to the lower layers, headers are _______.

a) Added b) Removed c) Rearranged d) Modified

15. IPv6 has ___________ -bit addresses.

a) 32 b) 64 c)128 d) Variable

16. Number of bits transmitted per second is _______________.

a) Bandwidth b) Delay c) Jitter d) Average Delay

17. _______________ is the measure of how fast we can actually send data through a

network.

a) Bandwidth b) Delay c) Jitter d) Throughput

18. ___________ defines how long it takes for an entire message to completely arrive at

the destination from the time the first bit is sent out from the source.

a) Bandwidth b) Delay c) Jitter d) Throughput

19. What is the propagation time if the distance between the two points is 24,000 km?

Assume the propagation speed to be 2.4 × 108 m/s in cable.

a) 0.05 s b) 0.1 s c) 0.5 s d) 1 s

20. What is the transmission time for a 7-MB (megabyte) message (an image) if the

bandwidth of the network is 1 Mbps? Assume that the distance between the sender

and the receiver is 12,000 km and that light travels at 2.4 × 108 m/s.

a) 56 s b) 72 s c) 65 s d) 40 s

Page 4: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

Assignment II – Crossword Puzzle

Date: 17.08.2020

Questions:

1. ____________________ is defined as a medium that can carry information from a source

to a destination.

2. Bayonet Neill-Concelman (BNC) connector used to connect ______________ cables.

3. ________________ cables accept and transport signal in the form of electrical signals.

4. _______________ made of glass or plastic and transmits signals in the form of light.

5. ________________ uses step-index fiber and a highly focused source of light that limits

beams to a small range of angles, all close to the horizontal.

6. _____________ is a strong material used in the fabrication of bulletproof vests to

strengthen fiber optic cables.

7. _________________ waves are omnidirectional.

8. _______________ need unidirectional antennas that send out signals in one direction.

9. _____________ used for short-range communication in a closed area using line-of-sight

propagation.

10. ____________ connectors used to connect Unshielded Twisted Pair wires.

Instructions

1. Left to Right

2. Left to Right

3. Top to Bottom

4. Top to Bottom

5. Top to Bottom

6. Top to Bottom

7. Top to Bottom

8. Top to Bottom

9. Right to Left

10. Left to Right

Page 5: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

3.

6.

4.

1. 7. 5. 8.

9. 10.

2.

Answers:

1. Transmission Media

2. Coaxial

3. Twisted Pair

4. Fiber Optic

5. Single-Mode

6. Kevlar

7. Radio

8. Microwaves

9. Infrared

10. RJ-45

Page 6: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

Assignment III – Quiz

Date: 24.08.2020

1. A ________________ network is made of a set of switches connected by physical

links, in which each link is divided into n channels.

a) Line-Switched b) Frame-Switched c) Circuit-Switched d) Packet-Switched

2. Circuit switching takes place at the ______________ layer.

a) Data link b) Physical c) Network d) Transport

3. In _________________, the resources need to be reserved during the setup phase;

the resources remain dedicated for the entire duration of data transfer phase until

the teardown phase.

a) Line-Switched b) Datagram-Switched c) Circuit-Switched d) Packet-Switched

4. In _______________, resources are allocated on demand.

a) Datagram Switched b)Line-Switched c) Frame-Switched d)Circuit-Switched

5. Datagram switching takes place at the ______________ layer.

a) Data link b) Physical c) Network d) Transport

6. A _____________________ network is a cross between a circuit-switched network

and a datagram network.

a) Virtual circuit-Switched b)Line-Switched c)Circuit-Switched d)Datagram-Switched

7. A local telephone network is an example of a ______________ network.

a) Packet-Switched b) Circuit-Switched c) Bit-Switched d) Line-Switched

8. Virtual circuit switching takes place at the ________________ layer.

a) Data link b) Physical c) Network d) Transport

9. Which frame completes the entries in the switching tables?

a) Acknowledgement frame b) Request frame c) Setup frame d) None of these

10. Virtual-Circuit networks and Datagram networks are the sub categories of _______.

a) Message-Switched b) Packet-Switched c) Circuit-Switched d) Line-Switched

Page 7: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

DEPARTMENT OF INFORMATION TECHNOLOGY

Subject Code: CS8591 Class: III IT

Subject Name: Computer Networks Semester: V

Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD

UNIT II – Quiz

Date: 05.10.2020

1. _______________ is used to find link-layer address.

a. ARP b. RARP c. IP d. TCP

2. Which is referred as one-to-one communication?

a. Multicast Address b. Unicast Address c. Broadcast Address d. Anycast.

3. In ARP operation, which query is broadcast over the link using the link-layer broadcast

address?

a. ARP Response b. ARP Discovery c. ARP Request d. RTS

4. Two or more bits in the data unit have changed from 1 to 0 or from 0 to 1 is called

________.

a. Single-bit Error b. Burst Error c. Both a & b d. None of these

5. Data link layer translates a stream of bits from the physical layer into the larger

aggregate (or) discrete unit called _______________.

a. Frames b. Segments c. Datagram d. Message

6. _____________ is the process of adding one extra 0 whenever five consecutive 1s follow

a 0 in the data, so that the receiver does not mistake the pattern 0111110 for a flag.

a. Byte Stuffing b. Character Stuffing c. Bit Stuffing d. All of these

7. Sender sends one frame at a time stops until it receives the confirmation from the

receiver and then sends the next frame.

a. Stop and Wait b. Sliding Window c. Sender Window d. Receiver Window

8. Sender can transmit several frames continuously before needing an ACK.

a. Stop and Wait b. Sliding Window c. Sender Window d. Receiver Window

9. Sender only retransmits frames for which NAK is received.

a. Stop and Wait ARQ b. Go Back-N ARQ c. Selective Repeat ARQ

d. Sliding Window ARQ

Page 8: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

10. _________________ is a bit-oriented protocol and uses stop and wait for

communication over point-to-point and multipoint links.

a. HDLC b. PPP c. CRC d. Hamming Distance

11. _________________ used the Character Stuffing.

a. HDLC b. PPP c. CRC d. Hamming Distance

12. Protocols used by Point-to-Point protocol are:

a. Link Control Protocol b. Authentication Protocol c. Network Control Protocol

d. All of these

13. Ethernet uses ____________________ technology.

a. ALOHA b. CSMA/CD c. CSMA/CA d. CSMA

14. ___________________ is the building blocks of a wireless LAN.

a. Basic Service Set b. Extended Service Set c. Access Point d. None

15. ________________ is made up of two or more BSSs with APs.

a. Basic Service Set b. Extended Service Set c. Access Point d. None

16. Ethernet is capable of transmit maximum of _____________ bytes.

a. 1000 b. 512 c. 1500 d. 15000

17. In Bluetooth, ________________ can have up to eight stations, one of which is called the

primary; the rest are called secondaries.

a. Scatternet b. Piconet c. Slownet d. Fastnet

18. ______________ a device that operates only in the physical layer.

a. Hub b. Switch c. Router d. Gateway

19. ____________ operates in both the physical and the data-link layers and does not

change the link-layer (MAC) addresses in a frame.

a. Hub b. Switch c. Router d. Gateway

20. ______________ a three-layer (physical, data-link, and network) device and changes the

link-layer address of the packet.

a. Hub b. Switch c. Router d. Gateway

Page 9: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

DEPARTMENT OF INFORMATION TECHNOLOGY

Subject Code: CS8591 Class: III IT

Subject Name: Computer Networks Semester: V

Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD

UNIT III – Quiz

Date: 30.10.2020

1. The network layer is concerned with __________ of data.

a. Bits b. Frames c. Packets d. Bytes

2. Which one of the following is not a function of network layer?

a. Routing b. Inter-networking c. Congestion Control d. Error Control

3. A 4 byte IP address consists of __________.

a. Only network address b. Only host address

c. Network address & host address d. Network address & MAC address

4. In virtual circuit network each packet contains ___________.

a. Full source and destination address b. A short VC number

c. Only source address d. Only destination address

5. Which of the following routing algorithms can be used for network layer design?

a. Path Vector Routing b. Distance vector routing

c. Link state routing d. All of these

6. A subset of a network that includes all the routers but contains no loops is called

________.

a. Spanning tree b. Spider structure c. Spider tree d. Special tree

7. The network layer protocol for internet is __________.

a. Ethernet b. Internet Protocol c. HTTP d. FTP

8. ICMP is primarily used for __________.

a. Error and diagnostic functions b. Addressing

c. Forwarding d. Routing

9. The length of an IPv6 address is _______________.

a. 32 bits b. 48 bits c. 64 bits d. 128 bits

10. Which of the following address belongs class A?

a. 121.12.12.248 b. 130.12.12.248 c. 128.12.12.248 d. 129.12.12.248

Page 10: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

11. Which of the following is correct IPv4 address?

a. 124.201.3.1.52 b. 300.142.210.64 c. 10110011.32.16.8 d. 128.64.0.0

12. Which of the following IP addresses can be used as (a) loop-back addresses?

a. 0.0.0.0 b. 127.0.0.1 c. 255.255.255.255 d. 0.255.255.255

13. A network administrator needs to configure a router with a distance vector protocol

that allows classless routing. Which of the following satisfies those requirements?

a. IGRP b. OSPF c. RIP d. EIGRP

14. What is split horizon?

a. Information about a route should not be sent back in the direction from which the

original update came

b. It splits the traffic when you have a large bus physical network

c. It holds the regular updates from broadcasting to a downed link

d. It prevents regular update messages from reinstating a route that has gone down

15. Which statement is true regarding classless routing protocols?

a. The use of discontiguous networks is not allowed

b. The use of variable length subnet masks is permitted

c. RIPv1 is a classless routing protocol

d. IGRP supports classless routing within the same autonomous system

16. The length of an IPv4 address is _______________.

a. 32 bits b. 48 bits c. 64 bits d. 128 bits

17. To configure hosts automatically _____________ protocol is used.

a. IP b. DHCP c. ICMP d. OSPF

18. In network, a node has a message to transfer group of people. Which mechanism it has

to follow?

a. Unicast b. Broadcast c. Multicast d. Anycast

19. Which protocol is an inter-domain routing protocol?

a. BGP b. RIP c. OSPF d. DVR

20. Which protocol is an intra-domain routing protocol?

a. RIP b. OSPF c. Both a & b d. None of these

Page 11: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

DEPARTMENT OF INFORMATION TECHNOLOGY

Subject Code: CS8591 Class: III IT

Subject Name: Computer Networks Semester: V

Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD

UNIT IV – Quiz

Date: 06.11.2020

1. Which of the following are the functionalities of transport layer?

a. Process to process communication b. Flow Control

c. Congestion control d. All of these

2. In ________________, the sender can send several packets before receiving

acknowledgments, but the receiver can only buffer one packet.

a. Stop-and-wait b. Go-Back-N c. Selective Repeat d. Piggybacking

3. ___________________ technique is used to improve the efficiency of the bidirectional

protocols.

a. Stop-and-wait b. Go-Back-N c. Selective Repeat d. Piggybacking

4. Which protocol is suitable for a process that requires simple request-response

communication with little concern for flow and error control?

a. TCP b. UDP c. SCTP d. IP

5. _______________ is a connection oriented and reliable protocol.

a. TCP b. UDP c. SCTP d. IP

6. UDP Header size is _____________ bytes.

a. 10 b. 12 c. 8 d. 4

7. The process starts with the server. The server program tells its TCP that it is ready to

accept a connection. This request is called a ______________.

a. Active open b. Passive open c. Aggressive open d. Half open

8. Which flag is used to TCP connection establishment?

a. URG b. ACK c. PSH d. SYN

9. Consider a scenario, upon receiving the corresponding two ACKs, TCP increments

CongestionWindow by 2 - one for each ACK - and next sends four packets. It follows

which congestion control mechanism?

a. AIMD b. Slow start c. Self-clocking d. Fast retransmit and fast recovery

10. Which protocol is suitable for multimedia communication?

a. TCP b. UDP c. SCTP d. IP

Page 12: DEPARTMENT OF INFORMATION TECHNOLOGY ...kamarajengg.edu.in/it_learning/mcq/MCN.pdfDEPARTMENT OF INFORMATION TECHNOLOGY Subject Code: CS8591 Class: III IT Subject Name: Computer Networks

DEPARTMENT OF INFORMATION TECHNOLOGY

Subject Code: CS8591 Class: III IT

Subject Name: Computer Networks Semester: V

Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD

UNIT V – Quiz

Date: 13.11.2020

1. __________________ is the language used to create hypertext.

a. HTTP b. FTP c. SMTP d. DNS

2. The client and server can exchange multiple request/response messages over the same

TCP connection ________________.

a. Non-Persistent Connection b. Persistent Connection

c. Open Connection d. Closed Connection

3. To copying a file from one host to another which protocol is used?

a. TELNET b. SNMP c. FTP d. MIME

4. ________________ is used to define the format of the message being exchanged.

a. IMAP b. POP3 c. SMTP d. MIME

5. The __________________ protocol is used for message transfer.

a. IMAP b. POP3 c. SMTP d. MIME

6. ______________ protocol is used to retrieve message.

a. IMAP b. SSH c. SMTP d. MIME

7. ___________ exchange several security parameters to establish a secure channel on top

of the TCP.

a. TELNET b. SSH c. SNMP d. DNS

8. Which protocol is used to map a host name to an address?

a. FTP b. SSH c. SNMP d. DNS

9. ___________ is used for managing devices in an internet using the TCP/IP protocol

suite.

a. TELNET b. SMTP c. SNMP d. DNS

10. ____________ solves heterogeneity by defining a universal interface called the Network

Virtual Terminal (NVT) character set.

a. TELNET b. SSH c. SNMP d. DNS