You are on page 1of 28

OS & CN Quiz

Contents
Quiz 01 OS ........................................................................................................................... 2
Quiz 02 OS ........................................................................................................................... 5
Quiz 03 OS ........................................................................................................................... 8
Quiz 04 OS ......................................................................................................................... 10
Quiz 05 OS ......................................................................................................................... 15
Quiz 01 CN ......................................................................................................................... 18
Quiz 02 CN ......................................................................................................................... 20
Quiz 03 CN ......................................................................................................................... 23
Quiz 04 CN ......................................................................................................................... 27

Quiz 01 OS
Which of these statements about address space are not true?
Select one:
a. Address space is the abstraction that is referenced to the set of addresses a process
b. None of others
c. Address space is decoupled from the physical memory
_________________________________________________________________________
Which of these statements about files are true?
Select one or more:
a.
b.
c.
d.

File is a collection of related information


File is an abstraction of data stored on HDD
File provides a place to keep files or a way of grouping file together
File includes block special tiles and character special files

_________________________________________________________________________
Which of these statements about address space are true?
Select one or more:
a. Address space is the abstraction that is referenced to the set of addresses a process
b. Address space is a space contain the address of variables
c. Address space is decoupled from the physical memory
_________________________________________________________________________
Server OS serves multiple users at once over a network and allow the users to share --------and ------------ resources
Select one:
a.
b.
c.
d.

Hardware, firmware
Hardware, software
Software, firmware
Firmware, hardware

_________________________________________________________________________
Symbian, Palm, Windows Mobile, Windows CE are --------Select one:
a.
b.
c.
d.

Handheld OS
Multiprocessor OS
PC OS
Mainframe OS

_________________________________________________________________________
Which of these statements about files are not true?
Select one:

a. File is an abstraction of data stored on HDD


b. File provides a place to keep files or a way of grouping files together
c. File contains correlated information: path name, root directory, file descriptor,
Mourited file system, special file, a pipe
d. File includes block special files and character special files
_________________________________________________________________________
Embedded OS is located in ----------Select one:
a.
b.
c.
d.

DISK
RAM
BIOS
ROM

_________________________________________________________________________
------------systems are used in time-critical environments where reliability is key and data
must be processed within a strict time limit
Select one:
a.
b.
c.
d.

Embedded
Real-time
Hybrid
Interactive

_________________________________________________________________________
MainframeOS offers 3 kinds of services ----------Select one:
a.
b.
c.
d.

Batch, time-sharing, scheduler


Real-time, batch, time-sharing
Real-time, time sharing, protection
Transaction processing, batch, time-sharing

_________________________________________________________________________
------------------ process routine job without interactive user present
Select one:
a.
b.
c.
d.

Transaction processing systems


Time sharing systems
Batch systems
Real-time systems

_________________________________________________________________________
---------------- runs on systems that have many CPUs (multi-processors, multi-cores, multichips)
Select one:
a. Multiprocessor OS

b. Embedded OS
c. PC OS
d. Server OS
_________________________________________________________________________
Which of these statements about processes are not true?
Select one or more:
a.
b.
c.
d.
e.

In modern OS, only single process exists at time


Process table stores all the information of processes
Process is a program on disk
Associated with each process is its file and directory
Associated with each process is set of resources such as executable code, data,
stack, CPU registers value, and other information needing to run a program

_________________________________________________________________________
Which of these statements about processes are true?
Select one or more:
a. A program in execution
b. Process table stores all the information of processes
c. Associated with each process is set of resources such as executable code, data,
stack, CPU registers value, and other information needing to run a program
d. A program on disk
e. Associated with each process is its file and directory
_________________________________________________________________________
------------- serves multiple users at once over a network and allow the users to share
hardware and software resources
Select one:
a.
b.
c.
d.

Mainframe OS
PC OS
Server OS
Multiprocessor OS

_________________________________________________________________________
Real-time system has ----------- and -------------- real-time system types
Select one or more:
a.
b.
c.
d.

Paper
Soft
Firm
Hard

_________________________________________________________________________
------------ offers 3 kinds of services: batch, transaction processing, timesharing
Select one:

a.
b.
c.
d.

PC OS
Mainframe OS
Server OS
Multiprocessor OS

_________________________________________________________________________
Allow multiple remote users to run jobs on the computer at once
Select one:
a.
b.
c.
d.

Real-time systems
Batch systems
Time sharing systems
Transaction processing systems

_________________________________________________________________________
Handling large numbers of small requests
Select one:
a.
b.
c.
d.

Real-time systems
Time sharing systems
Batch systems
Transaction processing systems

_________________________________________________________________________
---------- supports with dozens of programs started up at the boot time
Select one:
a.
b.
c.
d.

Multi-scheduling
Multi-processor
Multi-core
Multi-programming

_________________________________________________________________________

Quiz 02 OS
How much time is reasonable for the quantum in Round-Robin algorithm ?
Select one:
a.
b.
c.
d.

46 msec
16 msec
64 msec
128 msec

_________________________________________________________________________
Which statement is correct?
Select one:
a. Process and thread are similar
b. A thread can create many processes

c. A process can create many threads


d. A process can only own a thread
_________________________________________________________________________
In which situation does race condition occur?
Select one:
a.
b.
c.
d.

Two threads in a process update their stacks


Two threads in a process modify a global variable
Two processes communicate using socket
A parent process creates a child process

_________________________________________________________________________
In a batch system, scheduling by SJF is provably better than FCFS if ------------Select one:
a.
b.
c.
d.

Process requests come simultaneously and Turnaround time is longer


Process requests come simultaneously and Turnaround time is shorter
Process requests come consequently and Turnaround time is shorter
Process requests come consequently and Turnaround time is longer

_________________________________________________________________________
If a process finishes a time interval with CPU, its state switches -----------Select one:
a.
b.
c.
d.

From blocked to ready


From running to blocked
From running to ready
From ready to running

_________________________________________________________________________
Two or more processes accessing to a shared memory is an example of ----------Select one:
a.
b.
c.
d.

Mutual exclusion
Interprocess communication
Race condition
Critical region

_________________________________________________________________________
Which system requires pre-emptive scheduling algorithm?
Select one:
a.
b.
c.
d.

Interactive systems
Quantum systems
All of the others
Batch systems

_________________________________________________________________________

What happen if 2 processes have same priority in the Priority scheduling algorithm?
Select one:
a. Serve the process that has shorter burst time first, let the process that has longer
burst time wait
b. None of the others
c. Use Priority-inheritance solution.
d. Serve the process that comes first, let the process that comes later wait
_________________________________________________________________________
Which event cannot cause process creation?
Select one:
a.
b.
c.
d.

A running process creates a set of threads


A running process performs a process creation system call
An operating system initializes a service
A user executes a program

_________________________________________________________________________
Which event causes process involuntary termination?
Select one:
a.
b.
c.
d.

Error exit
Fatal error
Fatal exit
Kill exit

_________________________________________________________________________
Which statement is correct?
Select one:
a.
b.
c.
d.

Shortest process next is advantageous for long jobs


Round-robin with high quantum is advantageous for long jobs
Shortest job first is advantageous for long jobs
First come first serve is advantageous for short jobs

_________________________________________________________________________
Which of the following is the benefit of thread?
Select one:
a.
b.
c.
d.

Synchronization
All of the others
Dependence
Resource sharing

_________________________________________________________________________
All threads in a process share
Select one:

a.
b.
c.
d.

Address space
Register
Program counter
Stack

_________________________________________________________________________
Choose the correct solution(s) for the process synchronization problems
Select one:
a.
b.
c.
d.

Busy waiting
Semaphore
Sleep and Wakeup
All of the others

_________________________________________________________________________

Quiz 03 OS
Memory compaction is a mechanism to ---------Select one:
a.
b.
c.
d.

Increase virtual memory size


Reduce memory fragmentation
Load a page into memory due to page fault
Replace a page by another page for a process

_________________________________________________________________________
A page table entry does not provide information about -----------Select one:
a.
b.
c.
d.

What page frame number is


What page size is
Whether a page is modified or not
Whether a page is present in memory or not

_________________________________________________________________________
How many linear address spaces does paging provide?
Select one:
a.
b.
c.
d.

Maximum RAM space


Unlimited
1024
1

_________________________________________________________________________
What happen if there is no memory abstraction?
Select one:
a. Only one program can write to the memory
b. A program can prevent others to access memory

c. Programs physical memory could be accessed by others


d. Only one program can read the memory while others can write
_________________________________________________________________________
What is the problem of swapping memory?
Select one:
a.
b.
c.
d.

All of the others


Difficult to know where to allocate a program
Difficult to know how to monitor a memory hole
Difficult to know how much memory should be allocated for a program

_________________________________________________________________________
In a swapping system, memory consists of the following block sizes in memory order: 12KB,
20 KB, 7KB, 9KB, 5KB, and 11KB. Which block is taken for a request of 10KB using the best
fit algorithm?
Select one:
a.
b.
c.
d.

20KB
12KB
9KB
11KB

_________________________________________________________________________
Global page replacement policy -------------Select one:
a.
b.
c.
d.

Uses the first-in-first-out page for replacement


Uses a page belonging to the same process for replacement
Uses the least recently used page for replacement
Uses a page belonging to another process for replacement

_________________________________________________________________________
Which statement is incorrect for a page?
Select one:
a.
b.
c.
d.

A page can be relocated to a different chunk of physical address during operation


A page is mapped to a contiguous chunk of physical address
A page is a contiguous chunk of virtual address
A page can get various sizes in an operating system

_________________________________________________________________________
The replacement policy replaces the page that has not been referenced for the longest time
Select one:
a.
b.
c.
d.

Least recently used (LRU) policy


Clock policy
Optimal policy
First in first out (FIFO) policy

_________________________________________________________________________
Which technique requires the programmer to be aware that it is being used?
Select one:
a.
b.
c.
d.

Not Recently Used


Least Recently Used
Pure Segmentation
Paging

_________________________________________________________________________
What is the best fit to allocate free memory to programs?
Select one:
a.
b.
c.
d.

Search entire list, find the hole close to the actual size
Search entire list, finds the hole has the largest size
None of the others
Search entire list, finds the hole match with the actual size

_________________________________________________________________________
Using virtual memory allows ------------Select one:
a.
b.
c.
d.

Fewer programs to be executed at the same time


More programs to be executed at the same time
More complex programs to be executed at the same time
Smaller programs to be executed at the same time

_________________________________________________________________________
The worst fit algorithm allocates memory to a request by ------------------Select one:
a. Choosing the first available memory block that is large enough from the location of
the last placement
b. Choosing the largest available memory block
c. Choosing the memory block that is closest in size to the request
d. Choosing the first available memory block that is large enough from the beginning of
the memory
_________________________________________________________________________

Quiz 04 OS
The 775 mode of a file in UNIX indicates ---------------Select one:
a. This file has read and execute permissions for all users
b. This file has read permissions for all users, execute permissions for group owner,
and write permission for file owner
c. This file has read, write and execute permissions for file owner only

d. This file has read and execute permissions for all users and write permission for file
owner
_________________________________________________________________________
Calls to modify file content based on file descriptor such as read() or write() on Unix are
referred to as --------------------Select one:
a.
b.
c.
d.

Function calls
Procedure calls
System calls
User calls

_________________________________________________________________________
A --------------- is created when a user opens an account to access the computer system.
Select one:
a.
b.
c.
d.

Directory
Volume
MFD
Subdirectory

_________________________________________________________________________
Allocating a single set of blocks with the first block and length to a file at the time of creating
is referred to as -------------Select one:
a.
b.
c.
d.

i-node allocation
contiguous allocation
link list allocation
chained allocation

_________________________________________________________________________
Step 01. MBR locates the active partition, reads in its boot block and executes it
Step 02. The computer is booted, the BIOS reads in and executes the MBR
Step 03. The program in boot block loads the OS contained in that partition
Mechanism of booted computer is
Select one:
a.
b.
c.
d.

2, 3, 1
None of others
1, 2, 3
3, 2, 1

_________________________________________________________________________
A symbolic link in a file system on Unix is ----------------Select one:

a.
b.
c.
d.

A file copied to appear in more than one directory


A directory to store special files
A name created to point to a file naming another file
A file created to provide a backup of another file

_________________________________________________________________________
The purpose of an extension is to -----------Select one:
a.
b.
c.
d.

Identify the type of file


Identify the file size
Identify the file owner
Identify the directory in which the file is stored

_________________________________________________________________________
------------- allocation allows files to use any storage space available on the disk.
Select one:
a.
b.
c.
d.

Add-on storage
Noncontiguous storage
Contiguous storage
Fragmented storage

_________________________________________________________________________
The File Manager is in charge of the systems ------------- components.
Select one:
a.
b.
c.
d.

Electronic
Physical
Data
Software

_________________________________________________________________________
File descriptor of the standard error by default is an integer value --------------Select one:
a.
b.
c.
d.

2
3
1
0

_________________________________________________________________________
Which one is not file structure?
Select one:
a.
b.
c.
d.

Sequence of bytes
Sequence of records
Tree structure
Star structure

_________________________________________________________________________
When using random access files, the program used to store the data follows a set of
instructions, called a ------------- algorithm, that transforms each key into a number, the
records logical address.
Select one:
a.
b.
c.
d.

Lookup
Grouping
Translation
Hashing

_________________________________________________________________________
The files type includes ------------Select one:
a.
b.
c.
d.

Regular, Directories, Character Special


Regular, Binary, Character Special, CD-ROM
Regular, Directories, Character Special, Block Special
Regular, Directories, Character Special, Device Driver

_________________________________________________________________________
Which of these statements about the Linked List Allocation are true?
Select one or more:
a. First word of each block is used as pointer to the next one and the rest of the block is
for data
b. The amount of data storage in a block is not a power of two because the pointer
takes up a few bytes
c. Random access is extremely slow
d. Internal and External fragmentation are generated
_________________________________________________________________________
The 1^(st) block in each partition is called ---------Select one:
a.
b.
c.
d.

Super block
MBR
Boot block
Free block

_________________________________________________________________________
The requirements for long-term information storage are -------------Select one or more:
a.
b.
c.
d.

Multiple processes must be able to access the information concurrently


The information must be survived the termination of process using it
All of others
It must be possible to store a very large amount of address

_________________________________________________________________________
----------- are special files with listings of filenames and their attributes.
Select one:
a.
b.
c.
d.

Programs
Databases
Directories
Data files

_________________________________________________________________________
The file systems function are ------------Select one or more:
a.
b.
c.
d.

Mapping files onto address space


Hiding the complexity of storage hardware devices
None of others
Providing the users a uniform logical view of the information stored on these devices

_________________________________________________________________________
System calls for managing directories exclude ---------Select one:
a.
b.
c.
d.

Opendir
Link
Seed
Unlink

_________________________________________________________________________
A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. What
represents the root directory is ------------.
Select one:
a.
b.
c.
d.

usr
/
flynn
imfst

_________________________________________________________________________
The files structure includes ------------Select one:
a.
b.
c.
d.

unstructured sequence of bytes, binary sequence, tree


unstructured sequence of bytes, text, tree
unstructured sequence of bytes, random, tree
unstructured sequence of bytes, record sequence, tree

_________________________________________________________________________

As long as users refer to files in the ------------- directory, they can access their files without
entering the complete name from the highest level to the lowest.
Select one:
a.
b.
c.
d.

home
working
default
root

_________________________________________________________________________
On magnetic disks, files can be organized in one of three ways; ------------Select one
a.
b.
c.
d.

sequential, direct, or indexed sequential


indexed direct, indexed indirect, or random
sequential, random, or indirect
sequential, indirect, or direct

_________________________________________________________________________
---------- are having one directory containing all files
Select one:
a.
b.
c.
d.

Mono-Level Directory Systems


Multi-Level Directory Systems
Single-Level Directory Systems
Hierarchical Directory Systems

Quiz 05 OS
The controllers job to convert the --------- into a block of bytes and perform any ---------necessary
Select one:
a.
b.
c.
d.

Error correction / serial bit stream


Serial byte stream / interrupt
Interrupt / serial byte stream
Serial bit stream / error correction

_________________________________________________________________________
Without DMA, the ----------- is responsible for the physical movement of data between main
memory and the device.
Select one:
a.
b.
c.
d.

CPU
Memory controller
Bus
Disk

_________________________________________________________________________
I / O devices are ------------

Select one:
a.
b.
c.
d.

Video card, compact flash card, Ethernet card, wireless card


SATA disk drive, mainboard, SCSI disk, modem
CD-ROM, USB, monitor, scanner
Keyboard, mouse, printer, RAM memory

_________________________________________________________________________
Which statement is incorrect for device driver?
Select one:
a. Device driver normally operates as a part of the operating system kernel
b. Device driver is device control register and device data buffer
c. Device driver is generally written by the devices manufacturer and delivered along
with the device
d. Device driver is some device-specific code for controlling a device
_________________________________________________________________________
A disk queue with requests for I/O blocks on cylinders in orders: 10, 22, 20, 2, 40, 6, 38.
Assume that the disk head is initially at cylinder 18 and the head move downward. How
many cylinders does Total head movement move when the elevator algorithms are used?
Select one:
a.
b.
c.
d.

62
54
144
60

_________________________________________________________________________
Of the three components of access time in a movable-head Disk Arm Scheduling Algorithms,
------------ is the longest.
Select one:
a.
b.
c.
d.

Delay time
Search time
Seek time
Transfer time

_________________________________________________________________________
------------- control the transfer of information between the disk drives and the rest of the
computer system.
Select one:
a.
b.
c.
d.

System controllers
Disk drive controllers
Disk drive interfaces
System interfaces

_________________________________________________________________________
I/O software is typically organized in four layers as following

Select one:
a. Program counter handlers, device drivers, device-independent operating system
software, user-level I/O software
b. Interrupt handlers, system-level I/O software, device-independent operating system
software, user-level I/O software
c. Interrupt handlers, device drivers, device-independent operating system software,
user-level I/O software
d. Interrupt handlers, device drivers, device-independent operating system software,
system-level I/O software
_________________________________________________________________________
------------ devices are assigned to only one job at a time.
Select one:
a.
b.
c.
d.

Static
Dedicated
Shared
Virtual

_________________________________________________________________________
Which one is not a property of a precise interrupt?
Select one:
a.
b.
c.
d.

No instruction beyond the one pointed to by the PC has been executed


The execution state of the instruction pointed to by the PC is known
All instructions before the one pointed to by the PC have partially executed
The PC (Program Counter) is saved in a known place

_________________________________________________________________________
Which DVD format provides the largest storage capacity?
Select one:
a.
b.
c.
d.

Dual-layer, single-sided
Single-layer, single-sided
Single-layer, double-sided
Dual-layer, double-sided

_________________________________________________________________________
Mapping all the control registers into the memory space allows ------------Select one:
a.
b.
c.
d.

The CPU to communicate with the control register and the device data buffers
Processes to communicate with their threads
Processes to communicate with other processes
The CPU to communicate with the RAM memory and processes

_________________________________________________________________________

Quiz 01 CN
Which of the following can not a host ?
Select one:
a.
b.
c.
d.

PDA
Computer
Router
Smartphone

_________________________________________________________________________
Which layer interprets the meaning of data?
Select one:
a.
b.
c.
d.

Presentation
Session
Data link
Transport

_________________________________________________________________________
Which method is not about switching?
Select one:
a.
b.
c.
d.

Frequency Division Multiplexing


Packet Switching
Transmission Rate
Time Division Multiplexing

_________________________________________________________________________
What statement is incorrect about protocols?
Select one:
a.
b.
c.
d.

Protocols define order of messages in network


All communication activity in network governed by protocols
Protocols define format of messages in network
Protocols define communication between a human to another human

_________________________________________________________________________
What is the reason that UDP is best effort data delivery protocol?
Select one:
a.
b.
c.
d.

UDP try to send packets as fast as it can


UDP does not setup the connection before sending messages
All of the others
UDP sends packets without checking whether the packets arrives to the receiver or
not

_________________________________________________________________________
Two main elements related to network-core functions are

Select one:
a.
b.
c.
d.

Forwarding table and queueing algorithm


Output link algorithm and forwarding algorithm
Routing algorithm and forwarding table
Routing algorithm and queueing algorithm

_________________________________________________________________________
Store and forward technique that entire packet must arrive at router before it can be
transmitted on next link exists in
Select one:
a.
b.
c.
d.

Circuit switching
None of circuit switching and package switching
Both of circuit switching and package switching
Package switching

_________________________________________________________________________
The fourth layer in OSI network model is ---------Select one:
a.
b.
c.
d.

Transport
Application
Network
Session

_________________________________________________________________________
In the transmission delay calculation t = L/R, what is R?
Select one:
a.
b.
c.
d.

Link bandwidth of the link


Time to process at router
Speed of switching
Propagation speed in medium

_________________________________________________________________________
The data that the Network layer processes is called --------Select one:
a.
b.
c.
d.

Segment
Frame
Message
Datagram

_________________________________________________________________________
What is maximum data rate for fiber cable?
Select one:
a. 100Gbps

b. 10Gbps
c. 100Mbps
d. 1Gbps
_________________________________________________________________________
Sources of packet delay does not include
Select one:
a.
b.
c.
d.

Processing time at node


Waiting time on loss
Propagation time on medium
Waiting time in buffer

_________________________________________________________________________
In OSI model, as data packet moves from the lower to the upper layer header are --------Select one:
a.
b.
c.
d.

Added
Modified
Removed
Rearranged

_________________________________________________________________________
Network protocols define
Select one:
a.
b.
c.
d.

Connection configuration and message order between network entities


Routing information and algorithm in networks
Message format and action taken on message transmission
Communication link configuration and packet forwarding

_________________________________________________________________________
Packet loss and delay are usually caused by
Select one:
a.
b.
c.
d.

Low packet arrival rate and small output link capacity


High packet arrival rate and large output link capacity
Low packet arrival rate and large output link capacity
High packet arrival rate and small output link capacity

_________________________________________________________________________

Quiz 02 CN
------------ is a protocol to transfer file to / from remote host using client / server model.
Select one:
a. FTP
b. HTTP
c. SSH

d. Telnet
_________________________________________________________________________
------------- is a protocol to deliver / store email to / on receivers server.
Select one:
a.
b.
c.
d.

SMTP
IMAP
HTTP
POP3

_________________________________________________________________________
What is the characteristic of a network application?
Select one:
a.
b.
c.
d.

Connect routers to end systems.


Run on routers.
Help routers find end systems.
Run on end systems.

_________________________________________________________________________
------------ is an HTTP method that allows users to upload input data to server.
Select one:
a.
b.
c.
d.

DOWNLOAD method
POST method
SHOW method
GET method

_________________________________________________________________________
Which of the following is hybrid of client-server and P2P?
Select one:
a.
b.
c.
d.
e.

Skype
EBay
DNS
BitTorrent
Telnet

_________________________________________________________________________
A DNS query resolution mechanism that repeatedly sends a query to different servers is
referred to as -----------Select one:
a.
b.
c.
d.

Semantic query resolution


Iterated query resolution
Keyword query resolution
Recursive query resolution

_________________________________________________________________________
Which statement is incorrect about peer-to-peer (P2P) networks?
Select one:
a.
b.
c.
d.

Peers directly connect to all other peers in a P2P network


Peers can join and leave a P2P network arbitrarily
File distribution on a P2P network is faster than on a client-server network
Peers can play roles of server and client in a P2P network

_________________________________________________________________________
How does the HTTP protocol implement caching?
Select one:
a.
b.
c.
d.
e.

Using proxy server


Using cookie
Using hidden input
Using client cache
Using the If-modified-since header

_________________________________________________________________________
What can be used to identify the process?
Select one:
a. Both IP address of the host running the process and the port associated with that
process.
b. Process ID assigned by server
c. Name of the application running on the host
d. Port associated with that process
_________________________________________________________________________
What is the protocol used to obtain email from / to an email server?
Select one:
a.
b.
c.
d.

IMAP
SNMP
SMTP
IGMP

_________________________________________________________________________
The ---------------- that together implement the DNS distributed database, store -----------------for the hostname to IP address mappings.
Select one:
a.
b.
c.
d.
e.

Root servers ------------ IP address


Root servers ------------ IP address and post number
Authoritative servers ------------ Entries
Name servers --------- Resource Records
Resource Records ------------- Name servers

_________________________________________________________________________
Assume the RTT 200ms, the transmission time of a Web object 10ms, how long does it take
to download that object from a Web server to a client if using non-persistent HTTP?
Select one:
a.
b.
c.
d.
e.

210ms
240ms
420ms
410ms
220ms

_________________________________________________________________________
For what is a Telnet client used?
Select one:
a.
b.
c.
d.

To see the endpoints of your sessions


To see your IP address and configuration details
To see the route an IP packet takes across multiple routers
To issue commands to a remote server

_________________________________________________________________________
The client-server model significantly relies on -------------- infrastructure servers, the Peer-toPeer model, instead, pairs of interminably connected peers, communicates ------------ with
each other
Select one:
a.
b.
c.
d.

Usually-off ----------- directly


Always-off ----------- indirectly
Always-on ----------- directly
Usually-on ----------- directly

_________________________________________________________________________
What happen when you can connect to the FTP server by typing telnet 112.158.25.4.21 but
you can not connect to the same FTP server by typing telnet ftp.example.com 21?
Select one:
a.
b.
c.
d.

No DNS configuration
ADSL connection has problem
All of the others.
Server is shutdown

_________________________________________________________________________
Assume a website has only 5 different small images, using persistent HTTP, a client needs --------- to be server
Select one:
a. 4 UDP connections
b. A single TCP connection
c. Multiple TCP connections

d. 4 TCP connections
_________________________________________________________________________
Which two protocols are used to control the transfer of web resources from a web server to a
client browser?
Select one:
a.
b.
c.
d.

FTP, HTTP
ASP, HTML
HTTP, HTTPS
HTML, HTTP

Quiz 03 CN
RDT can be applicable with supporting of --------Select one:
a.
b.
c.
d.

UDP
GBN
FSM
TCP

_________________________________________________________________________
------------ applications typically use ----------Select one:
a.
b.
c.
d.

Elastic ------ DNS


Loss-tolerant ------- UDP
Loss-tolerant ------- TCP
Elastic ------- HTTP

_________________________________________________________________________
Chose the application(s) where UDP protocol can be used?
Select one or more:
a.
b.
c.
d.

Web
DNS
Audio stream
Video stream

_________________________________________________________________________
Which three features allow TCP to reliably and accurately track the transmission of data from
source to destination?
Select one:
a.
b.
c.
d.

Encapsulation, session establishment, best effort delivery


None of the others
Flow control, session establishment, numbering and sequencing
Encapsulation, flow control, connectionless services

_________________________________________________________________________
What is the purpose of checksum code in UDP segment header?
Select one:
a.
b.
c.
d.

To verify error in protocols segment


To verify error in header
To verify error in datagram
To verify error in IP address

_________________________________________________________________________
What is purpose of port in IP address?
Select one:
a.
b.
c.
d.

To determine what is destination process socket at destination host


To determine what channel is used at destination host
To know what memory is used at destination host
To determine what cable is used at destination host

_________________________________________________________________________
Multiplexing is capability of Transport Layer to -------------Select one:
a.
b.
c.
d.

Forward sockets packages through


Handle one sockets package to send
Handle multiple sockets packages to send
Split sockets packages to send

_________________________________________________________________________
What are main different aspects between Transport Layer and Network Layer?
Select one:
a.
b.
c.
d.

Physical communication
Logical communication
Target objects in communication
Destination host in communication

_________________________________________________________________________
How many basic protocols supported by Transport Layer?
Select one:
a.
b.
c.
d.

1
3
4
2

_________________________________________________________________________
Which statement is correct about protocols in Transport Layer?
Select one:

a.
b.
c.
d.

UCP is connectionless transport protocol


TCP is connectionless transport protocol
TCP is connection-oriented transport protocol
UCP is connection-oriented transport protocol

_________________________________________________________________________
Host A and B are communicating over a TCP connection, host A sends to host B the first
segment with size 105 bytes, sequence number 600, the source port 1028, the destination
port 80. What is the ACK number, the source port number, the destination port number in the
ACK segment sent by host B to host A?
Select one:
a.
b.
c.
d.

ACK number: 700, source port: 80, destination port: 1028


ACK number: 705, source port: 80, destination port: 1028
ACK number: 705, source port: 1028, destination port: 80
ACK number: 706, source port: 1028, destination port: 80

_________________________________________________________________________
What is a disadvantage of using a connection-oriented protocol such as TCP ?
Select one:
a. Packet acknowledgement may add overhead.
b. The application layer must assume responsibility for correct sequencing of the data
packets.
c. Loss or duplication of data packets is more likely to occur.
d. All of the others
_________________________________________________________________________
In Congestion avoidance of TCP flow control, if timeout occurs while the current congestion
window size is 16, the congestion window will -----------Select one:
a.
b.
c.
d.

Reduce to 1
Reduce to 8
Reduce to 0
Remain 16

_________________________________________________________________________
In Reliable Data Transfer 3.0, given 1 Gbps link, 15 ms prop, delay, 16000 bit packet,
calculate Usender
Select one:
a.
b.
c.
d.

0.0027
0.0053
0.00027
0.00533

_________________________________________________________________________

Quiz 04 CN
Which one is NOT an IP address ?
Select one:
a.
b.
c.
d.

235.222.1.1
30.80.80.80
54.258.255.1
90.190.200.0

_________________________________________________________________________
How big is an IPv6 Internet address?
Select one:
a.
b.
c.
d.
e.

20 octets
32 bytes
128 bytes
128 bits
32 bits

_________________________________________________________________________
What information in IP header is used to route packet in router?
Select one:
a.
b.
c.
d.

Destination Address field


Destination Address and Source Address fields
Destination Address, Source Address, and Protocol fields
Source Address field

_________________________________________________________________________
A ----------- routing table is updated periodically using one of the adaptive routing protocols.
Select one:
a.
b.
c.
d.

Hierarchical
Static
Dynamic
Deterministic

_________________________________________________________________________
Which statement is correct about router?
Select one:
a.
b.
c.
d.

All interfaces have the same IP address.


Interfaces does not have IP addresses at all.
Each interface to have a routing table.
Each interface to have an unique IP address.

_________________________________________________________________________
In IP Header, HL field value of decimal 10 means ----------.

Select one:
a.
b.
c.
d.
e.

There are 10 bytes in the header.


None of the above.
There are 40 bytes of options.
There are 40 bytes in the header.
There are 10 bytes of options.

_________________________________________________________________________
What does the time-to-live field (8 bits) do in an IP header?
Select one:
a.
b.
c.
d.
e.

Sets frame priority


Prevents infinite looping
Records the transmission time for tracert functions
Error checking
Frame sequence numbering

_________________________________________________________________________
When you use the ping command to send ICMP message across a network, whats the
request / reply pair you will see?
Select one:
a.
b.
c.
d.

SYN request and ACK reply


Echo off and Echo on
ICMP hold and ICMP send
Echo request and Echo reply

_________________________________________________________________________
If the fragment offset has a value of 100 and fragment flag=0, it means that -------.
Select one:
a.
b.
c.
d.
e.

None of the above.


The datagram has not been fragmented.
The datagram is 100 bytes in size.
This is the last fragment.
The first byte of the datagram is byte 100.

_________________________________________________________________________
Which of the following is a private IP address?
Select one:
a.
b.
c.
d.
e.

12.0.0.1
172.20.14.36
168.172.19.39
190.168.0.2
172.33.194.30

_________________________________________________________________________

You might also like