Professional Documents
Culture Documents
Security,Feasibility
Mesh
B)
Star
C)
Bus
D)
Ring
simplex
B)
half-duplex
C)
full-duplex
D)
automatic
In a _______ connection, more than two devices can share a single link.
A)
point-to-point
B)
multipoint
C)
primary
D)
secondary
simplex
B)
half-duplex
C)
full-duplex
D)
half-simplex
IMPs,Host computers,Networks,Routers
CSNET,NSFNET,ANSNET,ARPANET
ITU-T,IEEE,FCC,ISOC
above
EIA,ITU-T,ANSI,ISO
TCP/IP,NCP,UNIX,ACM
_______ refers to the structure or format of the data, meaning the order in
which they are presented.
A)
_______ refers to two characteristics: when data should be sent and how
fast it can be sent.
A)
Semantics
B)
Syntax
C)
Timing
D)
Multipoint,
B)
point-to-point
C)
D)
MAN
B)
LAN
C)
WAN
D)
Three,Five,Seven,Eight
Network,Transport,Application,Physical
Physical,Data link,Network,Transport
Mail services are available to network users through the _______ layer.
A)
Data link,Physical,Transport,Application
As the data packet moves from the upper to the lower layers, headers are
_______.
A)
Added,Removed,Rearranged,Modified
The _______ layer lies between the network layer and the application layer.
A)
Layer 2 lies between the physical layer and the _______ layer.
A)
When data are transmitted from device A to device B, the header from A's
layer 4 is read by B's _______ layer.
A)
The _______ model shows how the network functions of a computer ought
to be organized.
A)
CCITT,OSI,ISO,ANSI
The physical layer is concerned with the movement of _______ over the
physical medium.
A)
Programs,Dialogs,Protocols,Bits
A)
Three,Five,Seven,Eight
In the OSI model, as a data packet moves from the lower to the upper
layers, headers are _______.
A)
Added,Removed,Rearranged,Modified
In the OSI model, when data is transmitted from device A to device B, the
header from A's layer 5 is read by B's _______ layer.
A)
Physical,Transport,Session,Presentation
In the OSI model, what is the main function of the transport layer?
A)
Node-to-node delivery,Process-to-process message
delivery,Synchronization,Updating and maintenance of routing tables
In the OSI model, encryption and decryption are functions of the ________
layer.
A)
Transport,Session,Presentation,Application
A)
32,64,128,Variable
IGMP,ARP,RARP,a and b
The ______ layer is responsible for moving frames from one hop (node) to
the next.
A)
The ______ layer adds a header to the packet coming from the upper layer
that includes the logical addresses of the sender and receiver.
A)
The ________ address, also known as the link address, is the address of a
node as defined by its LAN or WAN.
A)
The ____ created a model called the Open Systems Interconnection, which
allows diverse systems to communicate.
A)
The physical, data link, and network layers are the ______ support layers.
A)
The session, presentation, and application layers are the ____ support
layers.
A)
User
B)
network
C)
D)
The _______ layer links the network support layers and the user support
layers.
A)
Transport,Network,Data link,Session
Transport,Network,Data link,Physical
The _______ layer is responsible for delivering data units from one station
to the next without errors.
A)
transport
B)
network
C)
data link
D)
physical
transport
B)
network
C)
data link
D)
physical
transport
B)
network
C)
data link
D)
physical
Transport,Network,Session,Physical
Transport,Network,Data link,Presentation
Transport,Application,Data link,Physical
TCP/IP is a ______ hierarchical protocol suite developed ____ the OSI model.
A)
after
A)
Application,Network,Data link,Physical
The ________ address, also known as the link address, is the address of a
node as defined by its LAN or WAN.
A)
Physical,IP,Port,Specific
Physical,IP,Port,Specific
physical
B)
IP
C)
port
D)
specific
Peak amplitude,Frequency,Phase,Slope
Signal amplitude,Frequency,Phase,Time
Given two sine waves A and B, if the frequency of A is twice that of B, then
the period of B is ________ that of A.
A)
2,1,-2,between -2 and 2
Attenuation,Distortion,Noise,Decibel
Attenuation
B)
Distortion
C)
Noise
D)
Decibel
Attenuation
B)
Distortion
C)
Noise
D)
Decibel
Analog
B)
Digital
C)
(a) or (b)
D)
Amplitude,Time,Frequency,Voltage
Frequency,Phase,Amplitude,Voltage
A sine wave in the ______ domain can be represented by one single spike
in the _____ domain.
A)
The _____ of a composite signal is the difference between the highest and
the lowest frequencies contained in that signal.
A)
Frequency,Period,Bandwidth,Amplitude
low-pass
B)
bandpass
C)
low rate
D)
high rate
For a ______ channel, the Nyquist bit rate formula defines the theoretical
maximum bit rate.
A)
noisy
B)
noiseless
C)
bandpass
D)
low-pass
For a ______ channel, we need to use the Shannon capacity to find the
maximum bit rate.
A)
Noisy,Noiseless,Bandpass,Low-pass
A)
The _________ product defines the number of bits that can fill the link.
A)
amplitude
Bandwidth-period,Frequency-amplitude,Bandwidth-delay,Delay-
Line,Block,NRZ,Manchester
Digital-to-digital,Digital-to-analog,Analog-to-analog,Analog-to-digital
A)
Equal to the lowest frequency of a signal,Equal to the highest
frequency of a signal,Twice the bandwidth of a signal,Twice the highest frequency
of a signal
NRZ-L,RZ,NRZ-I,Manchester
Which encoding method uses alternating positive and negative values for
1s?
A)
NRZ-I,RZ,Manchester,AMI
2,8,16,32
A)
In _______ transmission, a start bit and a stop bit frame a character byte.
A)
asynchronous serial
B)
synchronous serial
C)
parallel
D)
Analog-to-digital,Digital-to-analog,Analog-to-analog,Digital-to-digital
A)
Block coding
B)
Line coding
C)
Scrambling
D)
______ finds the value of the signal amplitude for each sample; ____ finds
the change from the previous sample.
A)
While there is (are) only _____ way(s) to send parallel data, there is (are)
three subclass(es) of serial transmission.
A)
synchronous
B)
asynchronous
C)
isochronous
D)
The ________ mode provides synchronization for the entire stream of bits
must. In other words, it guarantees that the data arrive at a fixed rate.
A)
synchronous
B)
asynchronous
C)
isochronous
D)
Self-synchronizing,Self-modulated,Self-transmitted,None of the
The ________ rate defines the number of data elements sent in 1s; the
______ rate is the number of signal elements sent in 1s.
A)
In a _____ scheme, all the signal levels are on one side of the time axis,
either above or below.
A)
In ______ schemes, the voltages are on the both sides of the time axis. For
example, the voltage level for 0 can be positive and the voltage level for 1 can
be negative.
A)
polar
B)
bipolar
C)
unipolar
D)
In _____, the level of the voltage determines the value of the bit.
A)
NRZ-I
B)
NRZ-L
C)
D)
The idea of RZ and the idea of NRZ-L are combined into the ________
scheme.
A)
(b)
The idea of RZ and the idea of NRZ-I are combined into the ________
scheme.
A)
Manchester
B)
differential Manchester
C)
D)
In _______ encoding, the duration of the bit is divided into two halves. The
voltage remains at one level during the first half and moves to the other level in
the second half. The transition at the middle of the bit provides synchronization.
A)
Manchester
B)
differential Manchester
C)
D)
In ___________ there is always a transition at the middle of the bit, but the
bit values are determined at the beginning of the bit. If the next bit is 0, there is
a transition; if the next bit is 1, there is none.
A)
Manchester
B)
differential Manchester
C)
D)
The _____ scheme uses data patterns of size 2 and encodes the 2-bit
patterns as one signal element belonging to a four-level signal.
A)
The ______ scheme uses three levels (+V, 0, and -V) and three transition
rules to move between the levels.
A)
4B5B
B)
2B1Q
C)
MLT-3
D)
Digital-to-digital,Digital-to-analog,Analog-to-analog,Analog-to-digital
Digital-to-digital,Digital-to-analog,Analog-to-analog,Analog-to-digital
A)
Frequency and amplitude,Phase and frequency,Amplitude and
phase,None of the above
If the baud rate is 400 for a QPSK signal, the bit rate is ________ bps.
A)
If the bit rate for an ASK signal is 1200 bps, the baud rate is ________.
A)
100,400,800,1600a
300,400,600,1200
If the bit rate for an FSK signal is 1200 bps, the baud rate is ________.
A)
300
B)
400
C)
600
D)
1200
If the bit rate for a 16-QAM signal is 4000 bps, what is the baud rate?
A)
300
B)
400
C)
1000
D)
1200
If the baud rate for a 64-QAM signal is 2000, what is the bit rate?
A)
300
B)
400
C)
1000
D)
12000
9
Given an AM radio signal with a bandwidth of 10 KHz and the highestfrequency component at 705 KHz, what is the frequency of the carrier signal?
A)
700 KHz,705 KHz,710 KHz,Cannot be determined from given
information
10
_______ conversion is the process of changing one of the characteristics of
an analog signal based on the information in the digital data.
A)
Digital-to-analog,Analog-to-analog,Analog-to-digital,Digital-to-digital
11
ASK,PSK,FSK,AM
12
In ________, the amplitude of the carrier signal is varied to create signal
elements. Both frequency and phase remain constant.
A)
ASK,PSK,
C)
FSK
D)
QAM
13
In _________, the frequency of the carrier signal is varied to represent data.
Both peak amplitude and phase remain constant.
A)
ASK
B)
PSK
C)
FSK
D)
QAM
14
In ________, the phase of the carrier is varied to represent two or more
different signal elements. Both peak amplitude and frequency remain constant.
A)
ASK
B)
PSK
C)
FSK
D)
QAM
15
A constellation diagram shows us the __________ of a signal element,
particularly when we are using two carriers (one in-phase and one quadrature).
A)
Amplitude and phase,Amplitude and frequency,Frequency and
phase,None of the above
16
17
________ uses two carriers, one in-phase and the other quadrature.
A)
ASK,PSK,FSK,QAM
18
_________ conversion is the representation of analog information by an
analog signal.
A)
Digital-to-analog,Analog-to-analog,Analog-to-digital,Digital-to-digital
19
Analog-to-analog conversion is needed if the available bandwidth is
_______.
A)
20
AM,PM,FM,QAM
21
In _____ transmission, the carrier signal is modulated so that its amplitude
varies with the changing amplitudes of the modulating signal.
A)
22
In _____ transmission, the frequency of the carrier signal is modulated to
follow the changing voltage level (amplitude) of the modulating signal. The peak
amplitude and phase of the carrier signal remain constant, but as the amplitude
of the information signal changes, the frequency of the carrier changes
correspondingly.
A)
AM
B)
PM
C)
FM
D)
23
In _____ transmission, the phase of the carrier signal is modulated to follow
the changing voltage level (amplitude) of the modulating signal.
A)
AM
B)
PM
C)
FM
D)
24
In _______, the peak amplitude of one signal level is 0; the other is the
same as the amplitude of the carrier frequency.
A)
25
26
27
28
29
B)
C)
D)
B)
C)
D)
B)
C)
D)
B)
C)
D)
30
31
32
B)
C)
D)
B)
C)
D)
33
The Federal Communications Commission (FCC) allows ______kHz for each
AM station.
A)
34
The Federal Communications Commission (FCC) allows ______ kHz for each
FM station.
A)
The sharing of a medium and its link by two or more devices is called
_______.
A)
Modulation,Encoding,Line discipline,Multiplexing
4
Which multiplexing technique shifts each signal to a different carrier
frequency?
A)
5
In synchronous TDM, for n signal sources of the same data rate, each
frame contains _______ slots.
A)
6
In TDM, the transmission rate of the multiplexed path is usually _______ the
sum of the transmission rates of the signal sources.
A)
8
_________ utilization is the use of available bandwidth to achieve specific
goals.
A)
9
________ can be achieved by using multiplexing; ______ can be achieved by
using spreading.
A)
Efficiency; privacy and antijamming,Privacy and antijamming;
efficiency,Privacy and efficiency; antijamming,Efficiency and antijamming;
privacy
10
________ is the set of techniques that allows the simultaneous transmission
of multiple signals across a single data link.
A)
11
12
The word ______ refers to the portion of a _______ that carries a
transmission.
A)
13
______ can be applied when the bandwidth of a link (in hertz) is greater
than the combined bandwidths of the signals to be transmitted.
A)
14
FSM is an _________technique.
A)
15
16
FDM,
B)
TDM
C)
WDM
D)
17
_____ is a digital process that allows several connections to share the high
bandwidth of a link.
A)
FDM,TDM,WDM
D)
18
_____ is a digital multiplexing technique for combining several low-rate
channels into one high-rate one.
A)
FDM
B)
TDM
C)
WDM
D)
19
FDM
B)
TDM
C)
WDM
D)
20
In ________ TDM, each input connection has an allotment in the output
even if it is not sending data.
A)
21
In ________ TDM, slots are dynamically allocated to improve bandwidth
efficiency.
A)
22
In ________, we combine signals from different sources to fit into a larger
bandwidth.
A)
23
_______ is designed to be used in wireless applications in which stations
must be able to share the medium without interception by an eavesdropper and
without being subject to jamming from a malicious intruder.
A)
24
The _______ technique uses M different carrier frequencies that are
modulated by the source signal. At one moment, the sign modulates one carrier
frequency; at the next moment, the signal modulates another carrier frequency.
A)
FDM,DSSS,FHSS,TDM
25
The ______ technique expands the bandwidth of a signal by replacing each
data bit with n bits.
1.
A)
FDM
B)
DSSS
C)
FHSS
D)
TDM
A)
Fixed or unfixed,Guided or unguided,Determinate or
indeterminate,Metallic or nonmetallic
Physical,Network,Transport,Application
3
_______ cable consists of an inner copper core and a second conducting
outer sheath.
A)
Twisted-pair,Coaxial,Fiber-optic,Shielded twisted-pair
Light,Radio,Infrared,Very low-frequency
A)
Cellular telephone system,Local telephone system,Satellite
communications,Radio broadcasting
7
What is the major factor that makes coaxial cable less susceptible to noise
than twisted-pair cable?
A)
material
Glass or plastic,Copper,Bimetallic,Liquid
10
When a beam of light travels through media of two different densities, if
the angle of incidence is greater than the critical angle, _______ occurs.
A)
Reflection,Refraction,Incidence,Criticism
11
When the angle of incidence is _______ the critical angle, the light beam
bends along the interface.
A)
12
13
Signals with a frequency between 2 MHz and 30 MHz use ______
propagation.
A)
14
15
ground
B)
sky
C)
line-of-sight
D)
16
Omnidirectional,Bidirectional,Unidirectional,Horn
A(n) _____ medium provides a physical conduit from one device to another.
A)
A)
17
18
A)
19
20
Coaxial
B)
Fiber-optic
C)
Twisted-pair
D)
_____ cable can carry signals of higher frequency ranges than _____ cable.
A)
Twisted-pair; Fiber-optic,Coaxial; fiber-optic,Coaxial; twistedpair,None of the above
21
______ cables are composed of a glass or plastic inner core surrounded by
cladding, all encased in an outside jacket.
22
A)
Coaxial,Fiber-optic
C)
Twisted-pair
D)
Coaxial
B)
Fiber-optic
C)
Twisted-pair
D)
23
In a fiber-optic cable, the signal is propagated along the inner core by
_______.
A)
24
_________ media transport electromagnetic waves without the use of a
physical conductor.
A)
25
26
Guided,
omnidirectional
B)
unidirectional
C)
bidirectional
D)
27
_______ are used for cellular phone, satellite, and wireless LAN
communications.
A)
28
________ are used for short-range communications such as those between
a PC and a peripheral device.
A)
Radio waves
B)
Microwaves
C)
Infrared waves
D)
Four,Three,Five,Six
four
B)
three
C)
five
D)
two
3
Packet-switched networks can also be divided into ______subcategories:
virtual-circuit networks and datagram networks
A)
Four,Three,Two,Five
4
A ________ network is made of a set of switches connected by physical
links, in which each link is divided into n channels.
A)
Data line,Physical,Network,Transport
6
In _______, the resources need to be reserved during the setup phase; the
resources remain dedicated for the entire duration of data transfer phase until
the teardown phase.
A)
above
10
datagram switching
B)
circuit switching
C)
frame switching
D)
datagram switching
B)
circuit switching
C)
frame switching
D)
datagram switching
B)
circuit switching
C)
frame switching
D)
datagram switching
B)
circuit switching
C)
frame switching
D)
11
A _________ network is a cross between a circuit-switched network and a
datagram network. It has some characteristics of both.
A)
12
13
Crosspoint,Crossbar,TSI,STS
14
A ________ switch is a multistage switch with microswitches at each stage
that route the packets based on the output port represented as a binary string.
A)
15
8,4,3,2
16
In a banyan switch, for 8 inputs and 8 outputs, we have _____
microswitches at each stage.
A)
B)
C)
D)
17
A ________ switch combines space-division and time-division technologies
to take advantage of the best of both.
A)
18
The most popular technology in time-division switching is called the
_________.
A)
19
Based on the Clos criteria, if N = 200, then n must be equal to or greater
than ____.
A)
10,20,30,40
20
Based on the Clos criteria, if N = 200, then k must be equal to or greater
than ____.
A)
21,19,31,41
21
Based on the Clos criteria, if N = 200, then the minimum number of
crosspoints is greater than or equal to _______.
A)
15200,18000,42000,20000
22
In a one-stage space division switch, if N = 200, the number of crosspoints
is ______.
A)
10000,20000,40000,30000
23
In a three-stage space division switch, if N = 200, the number of
crosspoints is ______.
A)
24
A ________ switch combines crossbar switches in several (normally three)
stages.
A)
25
In _______ switching, the paths in the circuit are separated from one
another spatially.
A)
26
Time-division,Space-division,Two-dimensional,Three-dimensional
27
In a ________ network, two types of addressing are involved: global and
local.
A)
28
virtual-circuit
B)
datagram
C)
circuit-switched
D)
29
A switch in a datagram network uses a routing table that is based on the
______ address.
A)
30
The _______ address in the header of a packet in a datagram network
normally remains the same during the entire journey of the packet.
A)
packet-switched
B)
circuit-switched
C)
message-switched
D)
2
The local loop has _______ cable that connects the subscriber telephone to
the nearest end office.
A)
twisted-pair
B)
coaxial
C)
fiber-optic
D)
Data from a computer are _______; the local loop handles _______ signals.
A)
analog; analog
B)
analog; digital
C)
digital; digital
D)
digital; analog
4
_______ is suitable for businesses that require comparable upstream and
downstream data rates.
A)
VDSL
B)
ADSL
C)
SDSL
D)
5
DMT is a modulation technique that combines elements of _______ and
_______.
A)
FDM; TDM
B)
QDM; QAM
C)
FDM; QAM
D)
PSK; FSK
voice communication
B)
upstream data
C)
downstream data
D)
control data
10
A)
VDSL
B)
ADSL
C)
SDSL
D)
HDSL
4B/5B
B)
2B1Q
C)
1B2Q
D)
6B/8T
splitter
B)
fiber node
C)
combiner
D)
head end
upstream
B)
downstream
C)
D)
11
In an HFC network, the downstream data are modulated using the _______
modulation technique.
A)
PSK
B)
QAM
C)
PCM
D)
ASK
12
In an HFC network, the upstream data are modulated using the _______
modulation technique.
13
A)
QAM
B)
QPSK
C)
PCM
D)
ASK
The standard for data transmission over an HFC network is called _______.
A)
MCNS
B)
DOCSIS
C)
CMTS
D)
ADSL
14
The original telephone network, which is referred to as the plain old
telephone system (POTS), was an ________ system.
A)
digital
B)
analog
C)
D)
15
16
17
18
digital
B)
analog
C)
D)
B)
C)
D)
LECs
B)
LATAs
C)
IXCs
D)
POP
B)
IXC
C)
LEC
D)
19
20
POP
B)
IXC
C)
LEC
D)
In ______signaling, the same circuit is used for both signaling and data.
A)
in-band
B)
out-of-band
C)
mixed
D)
21
In ________signaling, a portion of the bandwidth is used for signaling and
another portion for data.
A)
in-band
B)
out-of-band
C)
mixed
D)
22
The protocol that is used for signaling in the telephone network is called
______.
A)
POP
B)
SSS
C)
SS7
D)
23
Telephone companies provide two types of analog services: analog _______
services and analog _____services.
24
A)
switched; in-band
B)
out-of-band; in-band
C)
switched; leased
D)
leased; out-of-band
The two most common digital services are ________ service and ______.
A)
switched/56; switched/64
B)
switched/56; DDS
C)
DDS; swiched 64
D)
leased; out-of-band
25
The term modem is a composite word that refers to the two functional
entities that make up the device: a signal _______ and a signal _______.
26
A)
modulator; demodulator
B)
demodulator; modulator
C)
modern; demo
D)
V-series
B)
X-series
C)
VX-series
D)
27
______technology is a set of technologies develpoed by the telephone
companies to provide high data rate transmission.
28
29
30
A)
ASL
B)
DSL
C)
LDS
D)
twisted-pair
B)
coaxial
C)
fiber-optic
D)
HFC
B)
HCF
C)
CFH
D)
twisted-pair
B)
coaxial
C)
fiber-optic
D)
31
To use a cable network for data transmission, we need two key devices: a
______ and a _________
A)
CM; CMS
B)
CT; CMTS
C)
CM; CMTS
D)
B)
C)
CRC
D)
Checksum
2
Which error detection method consists of just one redundant bit per data
unit?
A)
B)
C)
CRC
D)
Checksum
The divisor
B)
The quotient
C)
The dividend
D)
The remainder
B)
C)
D)
A burst error means that two or more bits in the data unit have changed.
A)
double-bit
B)
burst
C)
single-bit
D)
6
In ________ error correction, the receiver corrects errors without requesting
retransmission.
A)
backward
B)
onward
C)
forward
D)
7
In ________ error correction, the receiver asks the sender to send the data
again.
A)
backward
B)
retransmission
C)
forward
D)
8
We can divide coding schemes into two broad categories: ________ and
______coding.
A)
block; linear
B)
linear; nonlinear
C)
block; convolution
D)
B)
C)
D)
10
In modulo-2 arithmetic, we use the ______ operation for both addition and
subtraction.
11
___.
A)
XOR
B)
OR
C)
AND
D)
In _____ coding, we divide our message into blocks, each of k bits, called
A)
block; blockwords
B)
linear; datawords
C)
block; datawords
D)
12
We add r redundant bits to each block to make the length n = k + r. The
resulting n-bit blocks are called _________.
A)
datawords
B)
blockwords
C)
codewords
D)
13
The ________ between two words is the number of differences between
corresponding bits.
A)
Hamming code
B)
Hamming distance
C)
Hamming rule
D)
14
To guarantee the detection of up to 5 errors in all cases, the minimum
Hamming distance in a block code must be _______.
A)
B)
C)
11
D)
15
To guarantee correction of up to 5 errors in all cases, the minimum
Hamming distance in a block code must be ________.
A)
B)
C)
11
D)
16
In a linear block code, the _______ of any two valid codewords creates
another valid codeword.
17
A)
XORing
B)
ORing
C)
ANDing
D)
an even-number of
B)
two
C)
no errors
D)
an odd-number of
18
_______codes are special linear block codes with one extra property. If a
codeword is rotated, the result is another codeword.
A)
Non-linear
B)
Convolution
C)
Cyclic
D)
19
correction; detection
B)
detection; correction
C)
creation; correction
D)
creation; detection
20
In modulo-11 arithmetic, we use only the integers in the range ______,
inclusive.
21
22
A)
1 to 10
B)
1 to 11
C)
0 to 10
D)
1 and 2
B)
0 and 2
C)
0 and 1
D)
B)
C)
D)
23
24
25
B)
C)
D)
B)
C)
D)
B)
C)
D)
26
In block coding, if n = 5, the maximum Hamming distance between two
codewords is ________.
A)
B)
C)
D)
27
If the Hamming distance between a dataword and the corresponding
codeword is three, there are _____ bits in error.
28
29
A)
B)
C)
D)
range
B)
degree
C)
power
D)
degree
B)
generator
C)
redundancy
D)
30
A generator that contains a factor of ____ can detect all odd-numbered
errors.
A)
B)
x+1
C)
D)
31
B)
C)
D)
32
In one's complement arithmetic, if positive 7 is 0111, then negative 7 is
________.
33
34
A)
1111
B)
1101
C)
1000
D)
1111
B)
0000
C)
1110
D)
0111
1111
B)
0000
C)
1110
D)
0111
1
In a Go-Back-N ARQ, if the window size is 63, what is the range of
sequence numbers?
A)
0 to 63
B)
0 to 64
C)
1 to 63
D)
1 to 64
2
In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the
receiver may send an ACK _______ to the sender.
A)
B)
C)
D)
B)
C)
D)
4
For Stop-and-Wait ARQ, for 10 data packets sent, _______
acknowledgments are needed.
A)
exactly 10
B)
less than 10
C)
more than 10
D)
B)
C)
D)
6
Data link control deals with the design and procedures for ______
communication.
A)
node-to-node
B)
host-to-host
C)
process-to-process
D)
7
_______ in the data link layer separates a message from one source to a
destination, or from other messages going from other sources to other
destinations.
A)
Digitizing
B)
Controlling
C)
Framing
D)
fixed-size
B)
variable-size
C)
standard
D)
9
In ________ framing, we need a delimiter (flag) to define the boundary of
two frames.
A)
fixed-size
B)
variable-size
C)
standard
D)
10
_________framing uses two categories of protocols: character-oriented and
bit-oriented.
A)
Fixed-size
B)
Variable-size
C)
Standard
D)
11
In a ________ protocol, the data section of a frame is a sequence of
characters.
12
A)
bit-oriented
B)
character-oriented
C)
D)
13
A)
byte-oriented
B)
bit-oriented
C)
D)
B)
C)
D)
14
Byte stuffing means adding a special byte to the data section of the frame
when there is a character with the same pattern as the ______.
15
A)
header
B)
trailer
C)
flag
D)
B)
C)
D)
16
Bit stuffing means adding an extra 0 to the data section of the frame when
there is a sequence of bits with the same pattern as the ________.
A)
header
B)
trailer
C)
flag
D)
17
_______ control refers to a set of procedures used to restrict the amount of
data that the sender can send before waiting for acknowledgment.
18
A)
Flow
B)
Error
C)
Transmission
D)
Flow
B)
Error
C)
Transmission
D)
19
The Simplest Protocol and the Stop-and-Wait Protocol are for ______
channels.
A)
noisy
B)
noiseless
C)
D)
20
The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ
are for ______ channels.
21
22
23
A)
noisy
B)
noiseless
C)
D)
Stop-and-Wait
B)
Simplest
C)
Go-Back-N ARQ
D)
Selective-Repeat ARQ
Stop-and-Wait
B)
Simplest
C)
Go-Back-N ARQ
D)
Selective-Repeat ARQ
Stop-and-Wait
B)
Go-Back-N ARQ
C)
Selective-Repeat ARQ
D)
24
In the _____ Protocol, the sender sends its frames one after another with no
regard to the receiver.
A)
Stop-and-Wait
B)
Simplest
C)
Go-Back-N ARQ
D)
Selective-Repeat ARQ
25
In the _____ Protocol, the sender sends one frame, stops until it receives
confirmation from the receiver, and then sends the next frame.
A)
Stop-and-Wait
B)
Simplest
C)
Go-Back-N ARQ
D)
Selective-Repeat ARQ
26
The _________Protocol, adds a simple error control mechanism to the
_______Protocol.
A)
B)
C)
D)
27
In the _________Protocol, if no acknowledgment for a frame has arrived, we
resend all outstanding frames.
A)
Stop-and-Wait ARQ
B)
Go-Back-N ARQ
C)
Selective-Repeat ARQ
D)
28
In the _________ protocol we avoid unnecessary transmission by sending
only frames that are corrupted.
29
A)
Stop-and-Wait ARQ
B)
Go-Back-N ARQ
C)
Selective-Repeat ARQ
D)
sliding frame
B)
sliding window
C)
sliding packet
D)
30
In Go-Back-N ARQ, if 5 is the number of bits for the sequence number,
then the maximum size of the send window must be _____
A)
15
B)
16
C)
31
D)
31
In Go-Back-N ARQ, if 5 is the number of bits for the sequence number,
then the maximum size of the receive window must be _____
A)
15
B)
16
C)
31
D)
32
In Selective Repeat ARQ, if 5 is the number of bits for the sequence
number, then the maximum size of the send window must be _____
A)
15
B)
16
C)
31
D)
33
In Selective Repeat ARQ, if 5 is the number of bits for the sequence
number, then the maximum size of the receive window must be _____
A)
15
B)
16
C)
31
D)
34
High-level Data Link Control (HDLC) is a _______ protocol for
communication over point-to-point and multipoint links.
A)
bit-oriented
B)
byte-oriented
C)
character-oriented
D)
35
The most common protocol for point-to-point access is the Point-to-Point
Protocol (PPP), which is a _________protocol.
A)
bit-oriented
B)
byte-oriented
C)
character-oriented
D)
36
_______ control refers to a set of procedures used to restrict the amount of
data that the sender can send before waiting for acknowledgment.
A)
Flow
B)
Error
C)
Transmission
D)
37
_________control in the data link layer is based on automatic repeat
request, which is the retransmission of data.
A)
Flow
B)
Error
C)
Transmission
D)
38
In Stop-and-Wait ARQ, we use sequence numbers to number the frames.
The sequence numbers are based on __________arithmetic.
A)
modulo-2
B)
modulo-4
C)
modulo-m
D)
39
In Stop-and-Wait ARQ, the acknowledgment number always announces in
______ arithmetic the sequence number of the next frame expected.
A)
modulo-2
B)
modulo-4
C)
modulo-m
D)
40
In the Go-Back-N Protocol, if the size of the sequence number field is 8, the
sequence numbers are in ________ arithmetic,
A)
modulo-2
B)
modulo- 8
C)
modulo-256
D)
41
Stop-and-Wait ARQ is a special case of Go-Back-N ARQ in which the size of
the send window is 1.
A)
B)
C)
D)
42
In _________, the station configuration is unbalanced. We have one primary
station and multiple secondary stations.
A)
ABM
B)
NRM
C)
ARM
D)
NBM
43
In _________, the configuration is balanced. The link is point-to-point, and
each station can function as a primary and a secondary.
A)
ABM
B)
NRM
C)
ARM
D)
NBM
44
In PPP, the ________ is responsible for establishing, maintaining,
configuring, and terminating links.
A)
NCP
B)
LCP
C)
CHAP
D)
PAP
45
In PPP, ________ is a simple authentication procedure with a two-step
process:
A)
NCP
B)
LCP
C)
CHAP
D)
PAP
46
In PPP, _______ is a three-way hand-shaking authentication protocol in
which the password is kept secret; it is never sent online.
A)
NCP
B)
LCP
C)
CHAP
D)
PAP
A)
pure ALOHA
B)
slotted ALOHA
C)
D)
In pure ALOHA, the vulnerable time is ______ the frame transmission time.
A)
the same as
B)
two times
C)
three times
D)
12.2
B)
18.4
C)
36.8
D)
4
In __________, each station is forced to send only at the beginning of the
time slot.
A)
pure ALOHA
B)
slotted ALOHA
C)
D)
5
In slotted ALOHA, the vulnerable time is ______ the frame transmission
time.
A)
the same as
B)
two times
C)
three times
D)
12.2
B)
18.4
C)
36.8
D)
the same as
B)
two times
C)
three times
D)
8
In the _________ method, after the station finds the line idle, it sends its
frame immediately. If the line is not idle, it continuously senses the line until it
finds it idle.
A)
nonpersistent
B)
1-persistent
C)
p-persistent
D)
9
In the ________method, a station that has a frame to send senses the line.
If the line is idle, it sends immediately. If the line is not idle, it waits a random
amount of time and then senses the line again.
A)
nonpersistent
B)
1-persistent
C)
p-persistent
D)
10
In the _______method, after the station finds the line idle it sends or refrain
from sending based on the outcome of a random number generator. If the line is
busy, it tries again.
11
A)
nonpersistent
B)
1-persistent
C)
p-persistent
D)
two
B)
three
C)
four
D)
five
12
In ___________ methods, no station is superior to another station and none
is assigned the control over another.
A)
random access
B)
controlled access
C)
channelization
D)
13
In ______, the chance of collision can be reduced if a station senses the
medium before trying to use it.
A)
MA
B)
CSMA
C)
FDMA
D)
CDMA
14
________ requires that each station first listen to the medium before
sending.
15
A)
MA
B)
CSMA
C)
FDMA
D)
CDMA
CSMA/CA
B)
CSMA/CD
C)
D)
16
In ________, a station monitors the medium after it sends a frame to see if
the transmission was successful. If so, the station is finished. If, however, there is
a collision, the frame is sent again.
17
A)
CSMA/CA
B)
CSMA/CD
C)
D)
CSMA/CA
B)
CSMA/CD
C)
D)
18
In _______, collisions are avoided through the use of three strategies: the
interframe space, the contention window, and acknowledgments.
A)
CSMA/CA
B)
CSMA/CD
C)
D)
19
In _______ methods, the stations consult one another to find which station
has the right to send.
A)
random access
B)
controlled access
C)
channelization
D)
20
In _______ methods, a station cannot send unless it has been authorized by
other stations.
21
A)
random access
B)
controlled access
C)
channelization
D)
two
B)
three
C)
four
D)
22
In the ________ method, a station needs to make a reservation before
sending data. Time is divided into intervals.
A)
reservation
B)
polling
C)
token passing
D)
23
In the _____ method, time is divided into intervals. In each interval, a
reservation frame precedes the data frames sent in that interval.
A)
reservation
B)
polling
C)
token passing
D)
24
In the ______ method, all data exchanges must be made through the
primary device even when the ultimate destination is a secondary device.
A)
reservation
B)
polling
C)
token passing
D)
25
In the _______ method, the primary device controls the link; the secondary
devices follow its instructions.
A)
reservation
B)
polling
C)
token passing
D)
26
In the _______ method, the stations in a network are organized in a logical
ring.
A)
reservation
B)
polling
27
C)
token passing
D)
reservation
B)
polling
C)
token passing
D)
28
In the _________ method, a special packet called a ______ circulates through
the ring.
A)
B)
C)
D)
29
_________ is a multiple-access method in which the available bandwidth of
a link is shared in time, frequency, or through code, between different stations.
30
A)
Random access
B)
Controlled access
C)
Channelization
D)
two
31
B)
three
C)
four
D)
FDMA
B)
TDMA
C)
CDMA
D)
32
In ______, each station is allocated a band to send its data. In other words,
each band is reserved for a specific station, and it belongs to the station all the
time.
33
A)
FDMA
B)
TDMA
C)
CDMA
D)
FDMA
B)
TDMA
C)
CDMA
D)
34
In _____, each station is allocated a time slot during which it can send data.
Each station transmits its data in its assigned time slot.
35
36
A)
FDMA
B)
TDMA
C)
CDMA
D)
In _____, each station transmits its data in its assigned time slot.
A)
FDMA
B)
TDMA
C)
CDMA
D)
FDMA
B)
TDMA
C)
CDMA
D)
37
_______ is based on coding theory and uses sequences of numbers called
chips.
A)
FDMA
B)
TDMA
C)
CDMA
D)
38
In _______, the sequences are generated using orthogonal codes such the
Walsh tables.
A)
FDMA
B)
TDMA
C)
CDMA
D)
5A:88:AA:18:55:F0
B)
5A:81:BA:81:AA:0F
C)
5A:18:5A:18:55:0F
D)
5A:11:55:18:AA:0F
2
If an Ethernet destination address is 07:01:02:03:04:05, then this is a
______ address.
A)
unicast
B)
multicast
C)
broadcast
D)
3
If an Ethernet destination address is 08:07:06:05:44:33, then this is a
______ address.
A)
unicast
B)
multicast
C)
broadcast
D)
43:7B:6C:DE:10:00
B)
44:AA:C1:23:45:32
C)
46:56:21:1A:DE:F4
D)
48:32:21:21:4D:34
B7:7B:6C:DE:10:00
B)
7B:AA:C1:23:45:32
C)
7C:56:21:1A:DE:F4
D)
83:32:21:21:4D:34
Token Ring
B)
Token Bus
C)
Ethernet
D)
7
The IEEE 802.3 Standard defines _________ CSMA/CD as the access method
for first-generation 10-Mbps Ethernet.
A)
1-persistent
B)
p-persistent
C)
non-persistent
D)
8
The _______ layer of Ethernet consists of the LLC sublayer and the MAC
sublayer.
A)
data link
B)
physical
C)
network
D)
9
The _____ sublayer is responsible for the operation of the CSMA/CD access
method and framing.
A)
LLC
B)
MII
C)
MAC
D)
10
Each station on an Ethernet network has a unique _______ address
imprinted on its network interface card (NIC).
11
A)
5-byte
B)
32-bit
C)
48-bit
D)
32
B)
80
C)
128
D)
12
13
14
1518
B)
1500
C)
1200
D)
10Base5
B)
10Base2
C)
10Base-T
D)
10Base-F
10Base5
B)
10Base2
C)
10Base-T
D)
10Base-F
15
_________ uses four twisted-pair cables that connect each station to a
common hub.
A)
10Base5
B)
10Base2
C)
10Base-T
D)
16
17
10Base-F
10Base5
B)
10Base2
C)
10Base-T
D)
10Base-F
10
B)
100
C)
1000
D)
10,000
18
In _________, autonegotiation allows two devices to negotiate the mode or
data rate of operation.
19
A)
Standard
B)
Fast Ethernet
C)
Gigabit Ethernet
D)
Ten-Gigabit Ethernet
100Base-TX
B)
100Base-FX
C)
100Base-T4
D)
20
21
22
23
100Base-TX
B)
100Base-FX
C)
100Base-T4
D)
100Base-TX
B)
100Base-FX
C)
100Base-T4
D)
10
B)
100
C)
1000
D)
10,000
half-duplex
B)
full-duplex
C)
D)
24
25
26
27
1000Base-SX
B)
1000Base-LX
C)
1000Base-T
D)
1000Base-SX
B)
1000Base-LX
C)
1000Base-T
D)
1000Base-SX
B)
1000Base-LX
C)
1000Base-T
D)
10GBase-S
B)
10GBase-L
C)
10GBase-E
D)
28
29
10GBase-S
B)
10GBase-L
C)
10GBase-E
D)
10GBase-S
B)
10GBase-L
C)
10GBase-E
D)
30
In Ethernet addressing, if the least significant bit of the first byte is 0, the
address is _________.
A)
unicast
B)
multicast
C)
broadcast
D)
31
In Ethernet addressing, if the least significant bit of the first byte is 1, the
address is _________.
A)
unicast
B)
multicast
32
C)
broadcast
D)
In Ethernet addressing, if all the bits are 1s, the address is _________.
A)
unicast
B)
multicast
C)
broadcast
D)
33
______defines a protocol data unit (PDU) that is somewhat similar to that of
HDLC.
A)
MAC
B)
LLC
C)
LLU
D)
34
The purpose of the _______ is to provide flow and error control for the
upper-layer protocols that actually demand these services
A)
MAC
B)
LLC
C)
LLU
D)
35
In the Ethernet, the _______field is actually added at the physical layer and
is not (formally) part of the frame.
A)
CRC
B)
preamble
C)
address
D)
36
In the Ethernet frame, the _______ field contains error detection
information.
37
38
39
A)
CRC
B)
preamble
C)
address
D)
NRZ
B)
AMI
C)
Manchester
D)
differential Manchester
4B/5B; NRZ
B)
8B/10B; NRZ
C)
4B/5B; MLT-3
D)
8B/10B; NRZ
40
A)
4B/5B; NRZ-I
B)
8B/10B; NRZ
C)
4B/5B; MLT-3
D)
8B/10B; NRZ
NRZ
B)
8B6T
C)
MLT-3
D)
Manchester
41
1000Base-SX, 1000Base-LX, and 1000Base-CX use _________ block coding
and ________ line coding.
42
A)
4B/5B; NRZ
B)
8B/10B; NRZ
C)
4B/5B; MLT-3
D)
8B/10B; NRZ
4D-PAM5
B)
8B6T
C)
MLT-3
D)
Manchester
IEEE has defined the specifications for a wireless LAN, called _______, which
covers the physical and data link layers.
A)
IEEE 802.3
B)
IEEE 802.5
C)
IEEE 802.11
D)
IEEE 802.2
2
In IEEE 802.11, a ___ is made of stationary or mobile wireless stations and
an optional central base station, known as the access point (AP).
A)
ESS
B)
BSS
C)
CSS
D)
an ad hoc architecture
B)
an infrastructure network
C)
D)
an ad hoc architecture
B)
an infrastructure network
C)
D)
5
In IEEE 802.11, communication between two stations in two different BSSs
usually occurs via two ________.
A)
BSSs
B)
ESSs
C)
APs
D)
6
In IEEE 802.11, a station with ________ mobility is either stationary (not
moving) or moving only inside a BSS.
A)
no-transition
B)
BSS-transition
C)
ESS-transition
D)
7
In IEEE 802.11, a station with ________mobility can move from one BSS to
another, but the movement is confined inside one ESS.
A)
no-transition
B)
BSS-transition
C)
ESS-transition
D)
8
In IEEE 802.11, a station with ________ mobility can move from one ESS to
another.
A)
no-transition
B)
BSS-transition
C)
ESS-transition
D)
9
In IEEE 802.11, _______ is an optional access method that can be
implemented in an infrastructure network (not in an ad hoc network).
A)
DCF
B)
PCF
C)
D)
10
In IEEE 802.11, when a frame is going from one station in a BSS to another
without passing through the distribution system, the address flag is _____
A)
00
B)
01
C)
10
D)
11
11
In IEEE 802.11, when a frame is coming from an AP and going to a station,
the address flag is _______.
A)
00
B)
01
C)
10
D)
11
12
In IEEE 802.11, when a frame is going from a station to an AP, the address
flag is _____.
A)
00
B)
01
C)
10
D)
11
13
In IEEE 802.11, when a frame is going from one AP to another AP in a
wireless distribution system, the address flag is _____
A)
00
B)
01
C)
10
D)
11
14
The IEEE 802.11 standard for wireless LANs defines two services: ______
and _______.
15
16
A)
BSS; ASS
B)
ESS; SSS
C)
BSS; ESS
D)
BSS; DCF
In IEEE 802.11, the access method used in the DCF sublayer is _________.
A)
ALOHA
B)
CSMA/CA
C)
CSMA/CD
D)
In IEEE 802.11, the access method used in the PCF sublayer is ______.
A)
contention
B)
controlled
17
18
C)
polling
D)
NAV
B)
BSS
C)
ESS
D)
four
B)
five
C)
six
D)
19
In IEEE 802.11, the addressing mechanism can include up to
______addresses.
20
A)
four
B)
five
C)
six
D)
FHSS
B)
DSSS
21
22
23
24
C)
OFDM
D)
FHSS
B)
DSSS
C)
OFDM
D)
FHSS
B)
DSSS
C)
OFDM
D)
FHSS
B)
DSSS
C)
OFDM
D)
B)
25
26
27
28
C)
11
D)
22
B)
C)
D)
B)
C)
5.5
D)
B)
C)
11
D)
22
four
B)
five
C)
six
D)
29
Bluetooth is a _______ technology that connects devices (called gadgets) in
a small area.
30
31
A)
wired LAN
B)
wireless LAN
C)
VLAN
D)
piconet
B)
scatternet
C)
bluenet
D)
scatternet; piconets
B)
piconets: scatternet
C)
piconets: bluenet
D)
bluenet; scatternet
32
A Bluetooth network consists of _____ primary device(s) and up to ____
secondary devices.
A)
one; five
B)
five; three
C)
two; six
D)
one; seven
33
The RTS and CTS frames in CSMA/CA ____ solve the hidden station
problem. The RTS and CTS frames in CSMA/CA ____ solve the exposed station
problem.
34
A)
can; cannot
B)
cannot; can
C)
can; can
D)
cannot; cannot
B)
C)
11
D)
35
In Bluetooth, the _______ layer is roughly equivalent to the physical layer of
the Internet model.
A)
radio
B)
baseband
C)
L2CAP
D)
36
In Bluetooth, the _____layer is roughly equivalent to the MAC sublayer in
LANs.
A)
radio
B)
baseband
C)
L2CAP
D)
37
In Bluetooth, the L2CAP sublayer, is roughly equivalent to the LLC sublayer
in LANs.
38
A)
radio
B)
baseband
C)
L2CAP
D)
FDMA
B)
TDD-TDMA
C)
CDMA
D)
39
In Bluetooth, the _____ link is used when avoiding latency (delay in data
delivery) is more important than integrity (error-free delivery).
A)
SCO
B)
ACL
C)
ACO
D)
SCL
40
In Bluetooth, the _____ link is used when data integrity is more important
than avoiding latency.
A)
SCO
B)
ACL
C)
ACO
D)
SCL
41
Bluetooth uses ______method in the physical layer to avoid interference
from other devices or other networks.
A)
DSSS
B)
FHSS
C)
FDMA
D)
physical
B)
data link
C)
network
D)
2
A _______ regenerates a signal, connects segments of a LAN, and has no
filtering capability.
A)
repeater
B)
bridge
C)
router
D)
3
A _______ is a connecting device that operates in the physical and data link
layers of the Internet model.
A)
repeater
B)
bridge
C)
router
D)
4
A ________ bridge can forward and filter frames and automatically build its
forwarding table.
A)
simple
B)
dual
C)
transparent
D)
binary tree
B)
spanning tree
C)
multiway tree
D)
backbone
B)
wireless
C)
wired
D)
10
bus
B)
star
C)
D)
software
B)
physical wiring
C)
hardware
D)
port numbers
B)
MAC addresses
C)
IP addresses
D)
VLANs can_________.
A)
B)
C)
D)
11
An active hub
B)
A passive hub
C)
D)
12
In a star-topology Ethernet LAN, _______ is just a point where the signals
coming from different stations collide; it is the collision point.
A)
An active hub
B)
A passive hub
C)
D)
13
________ is part of the media; its location in the Internet model is below the
physical layer.
14
A)
An active hub
B)
A passive hub
C)
D)
passive hub
B)
repeater
C)
bridge
D)
router
15
A ________receives a signal and, before it becomes too weak or corrupted,
regenerates the original bit pattern. It then sends the refreshed signal.
16
A)
passive hub
B)
repeater
C)
bridge
D)
router
passive hub
B)
repeater
C)
bridge
D)
router
17
________ is actually a multiport repeater. It is normally used to create
connections between stations in a physical star topology.
18
A)
An active hub
B)
A passive hub
C)
D)
A ________ operates in both the physical and the data link layer.
A)
passive hub
19
20
B)
repeater
C)
bridge
D)
router
passive hub
B)
repeater
C)
bridge
D)
router
passive hub
B)
repeater
C)
bridge
D)
21
A ________ is a device in which the stations are completely unaware of its
existence.
A)
passive hub
B)
repeater
C)
simple bridge
D)
transparent bridge
22
IEEE 802.1d specification, defines _________ criteria for a transparent
bridges.
23
A)
two
B)
three
C)
four
D)
node
B)
branch
C)
loop
D)
arc
24
In a bridged LAN, the _______ algorithm creates a topology in which each
LAN can be reached from any other LAN through one path only.
25
26
A)
spanning tree
B)
binary tree
C)
unary tree
D)
repeater
B)
bridge
C)
router
D)
A)
repeater
B)
bridge
C)
router
D)
27
Some new two-layer switches, called _______ switches, have been
designed to forward the frame as soon as they check the MAC addresses in the
header of the frame.
A)
cut-through
B)
go-through
C)
come-through
D)
28
A _______ is a three-layer device that handles packets based on their
logical addresses.
A)
repeater
B)
bridge
C)
router
D)
29
A ______ normally connects LANs and WANs in the Internet and has a table
that is used for making decisions about the route.
A)
repeater
B)
bridge
C)
router
D)
30
two-layer
B)
three-layer
C)
four-layer
D)
31
A ________ is normally a computer that operates in all five layers of the
Internet model or seven layers of OSI model.
A)
repeater
B)
bridge
C)
router
D)
gateway
32
A _____ can be used as a connecting device between two internetworks
that use different models.
33
A)
repeater
B)
bridge
C)
router
D)
gateway
bus
B)
ring
C)
star
D)
34
A ________ link acts as a LAN in a remote backbone connected by remote
bridges.
35
A)
point-to-point
B)
multipoint
C)
multidrop
D)
unicast
B)
multicast
C)
broadcast
D)
36
In a(n) _______ configuration, the administrator types the port numbers,
the IP addresses, or other characteristics, using the VLAN software.
A)
manual
B)
automatic
C)
semiautomatic
D)
37
In a(n) _____ configuration, the stations are automatically connected or
disconnected from a VLAN using criteria defined by the administrator.
A)
manual
B)
automatic
C)
semiautomatic
D)
38
In a(n) ______ configuration, the initializing is done manually, with
migrations done automatically.
A)
manual
B)
automatic
C)
semiautomatic
D)
AMPS
B)
D-AMPS
C)
GSM
D)
AMPS
B)
D-AMPS
C)
GSM
D)
GSM
B)
D-AMPS
C)
IS-95
D)
GSM
B)
D-AMPS
C)
IS-95
D)
5
________ is a second-generation cellular phone system based on CDMA and
DSSS.
A)
GSM
B)
D-AMPS
C)
IS-95
D)
6
The __________ cellular phone system will provide universal personal
communication.
A)
first-generation
B)
second-generation
C)
third-generation
D)
7
In a ______ handoff, a mobile station only communicates with one base
station.
A)
hard
B)
soft
C)
medium
D)
8
In a ______ handoff, a mobile station can communicate with two base
stations at the same time.
10
A)
hard
B)
soft
C)
medium
D)
AMPS
B)
D-AMPS
C)
GSM
D)
800-MHz
B)
900-MHz
C)
1800-MHz
D)
11
12
13
14
800
B)
900
C)
1000
D)
B)
C)
D)
FDMA
B)
TDMA
C)
CDMA
D)
FDMA
B)
TDMA
C)
CDMA
D)
15
16
17
18
B)
C)
D)
FDMA
B)
TDMA
C)
CDMA
D)
FDMA
B)
CDMA
C)
DSSS
D)
800-MHz
B)
900-MHz
C)
1900-MHz
D)
19
20
21
22
GPS
B)
Teledesic
C)
Iridium
D)
B)
C)
D)
IMT-DS
B)
IMT-MC
C)
IMT-TC
D)
IMT-SC
IMT-DS
B)
IMT-MC
C)
IMT-TC
D)
IMT-SC
23
In the third generation of cellular phones, ______ uses a combination of WCDMA and TDMA.
24
A)
IMT-DS
B)
IMT-MC
C)
IMT-TC
D)
IMT-SC
IMT-DS
B)
IMT-MC
C)
IMT-TC
D)
IMT-SC
25
The period of a satellite, the time required for a satellite to make a
complete trip around the Earth, is determined by _________ law.
A)
Kepler's
B)
Newton's
C)
Ohm's
D)
26
The signal from a satellite is normally aimed at a specific area called the
_________.
A)
path
B)
effect
C)
footprint
D)
27
28
29
30
one
B)
two
C)
many
D)
B)
C)
D)
1000
B)
2000
C)
3000
D)
GPS
B)
Teledesic
C)
Iridium
D)
31
32
33
equatorial
B)
polar
C)
inclined
D)
equatorial
B)
polar
C)
inclined
D)
GEO
B)
MEO
C)
LEO
D)
34
________ satellites provide time and location information for vehicles and
ships.
A)
GPS
B)
Iridium
C)
Teledesic
D)
35
GEO
B)
MEO
C)
LEO
D)
36
________ satellites can provide direct universal voice and data
communications for handheld terminals.
37
38
A)
GPS
B)
Iridium
C)
Teledesic
D)
GEO
B)
MEO
C)
LEO
D)
GPS
B)
Iridium
C)
Teledesic
D)
SONET
B)
SDH
C)
D)
SONET
B)
SDH
C)
D)
STSs
B)
STMs
C)
D)
STSs
B)
STMs
C)
D)
OC-n
B)
TDM-n
C)
FDM-n
D)
two
B)
three
C)
four
D)
five
asynchronous
B)
synchronous
C)
statistical
D)
STS multiplexers
B)
regenerators
C)
add/drop multiplexers
D)
10
11
12
1000
B)
2000
C)
4000
D)
8000
20
B)
64
C)
128
D)
B)
C)
90
D)
B)
C)
90
D)
13
14
15
16
B)
C)
27
D)
B)
90
C)
270
D)
linear
B)
ring
C)
mesh
D)
point-to-point
B)
multipoint
C)
D)
17
unidirectional
B)
bidirectional.
C)
D)
18
To make SONET backward-compatible with the current hierarchy, its frame
design includes a system of.
19
20
A)
OCs
B)
STMs
C)
STSs
D)
VTs
A ________ is a repeater.
A)
regenerator
B)
ADM
C)
STS multiplexer/demultiplexer
D)
regenerators
B)
ADMs
C)
STS multiplexer/demultiplexers
D)
21
22
section
B)
line
C)
path
D)
section
B)
line
C)
path
D)
23
A ______is the end-to-end portion of the network between two STS
multiplexers.
A)
section
B)
line
C)
path
D)
24
The ______ layer is responsible for the movement of a signal from its
optical source to its optical destination.
A)
section
B)
line
C)
path
D)
photonic
25
The ____ layer is responsible for the movement of a signal across a
physical line.
A)
section
B)
line
C)
path
D)
photonic
26
The ______ layer is responsible for the movement of a signal across a
physical section.
27
28
A)
section
B)
line
C)
path
D)
photonic
The _______ layer corresponds to the physical layer of the OSI model.
A)
section
B)
line
C)
path
D)
photonic
one-layer
B)
two-layer
29
30
31
32
C)
three-layer
D)
four-layer
one-layer
B)
two-layer
C)
three-layer
D)
four-layer
one-layer
B)
two-layer
C)
three-layer
D)
four-layer
B)
C)
D)
B)
33
34
35
36
C)
two at a time
D)
three at a time
bit
B)
byte
C)
frame
D)
B)
C)
D)
18
B)
C)
D)
18
B)
C)
D)
18
37
In ________ APS, there are normally two lines: one working line and one
protection line. Both lines are active all the time.
A)
one-plus-one
B)
one-to-one
C)
one-to-many
D)
38
In ______ APS, there is one working line and one protection line. The data
are normally sent on the working line until it fails.
A)
one-plus-one
B)
one-to-one
C)
one-to-many
D)
39
In ________APS, there is only one protection line for many working lines.
When a failure occurs in one of the working lines, the protection line takes
control until the failed line is repaired.
A)
one-plus-one
B)
one-to-one
C)
one-to-many
D)
A)
X.25
B)
Frame Relay
C)
ATM
D)
PVCs
B)
SVCs
C)
D)
PVC
B)
SVC
C)
DLCIs
D)
4
In Frame Relay, when a _____ is selected, the corresponding table entry is
recorded for all switches by the administrator
A)
PVC
B)
SVC
C)
D)
5
In Frame Relay, when. ______ is selected, it requires establishing and
terminating phases
A)
a PVC
B)
an SVC
C)
D)
B)
C)
D)
7
At the data link layer, Frame Relay uses a protocol that supports
_____control.
A)
flow
B)
error
C)
D)
only 2
B)
2 to 3
C)
2 to 4
D)
9
In Frame Relay, the EA field defines the number of bytes; it is _____ in the
last byte of the address.
A)
B)
C)
D)
10
To handle frames arriving from other protocols, Frame Relay uses a device
called a _________.
A)
VOFR
B)
FRAD
C)
MUX
D)
11
Frame Relay networks offer an option called ______________ that sends
voice through the network.
A)
VOFR
B)
FRAD
C)
MUX
D)
12
________ is the cell relay protocol designed by the corresponding Forum
and adopted by the ITU-T.
A)
X.25
B)
Frame Relay
C)
ATM
D)
13
14
15
16
frame
B)
packet
C)
cell
D)
VPI
B)
VCI
C)
DLCI
D)
two
B)
three
C)
four
D)
five
B)
12
C)
16
D)
17
18
24
B)
12
C)
16
D)
24
40
B)
50
C)
52
D)
53
19
______ eliminates the varying delay times associated with different-size
packets.
20
A)
X.25
B)
Frame Relay
C)
ATM
D)
UNI
B)
NNI
C)
NNN
D)
21
UNI
B)
NNI
C)
NNN
D)
22
In ATM, connection between two endpoints is accomplished through
_______.
A)
TPs
B)
VPs
C)
VCs
D)
23
In ATM, the _______layer accepts transmissions from upper-layer services
and maps them into ATM cells.
A)
physical
B)
ATM
C)
AAL
D)
24
In ATM, the ______ layer provides routing, traffic management, switching,
and multiplexing services.
A)
physical
B)
ATM
C)
AAL
D)
25
In ATM, the _____ layer defines the transmission medium, bit transmission,
encoding, and electrical-to-optical transformation.
26
27
28
A)
physical
B)
ATM layer
C)
AAL
D)
two
B)
three
C)
four
D)
AAL1
B)
AAL2
C)
AAL3/4
D)
AAL5
AAL1
B)
AAL2
C)
AAL3/4
D)
AAL5
29
In ATM, _____ is for conventional packet switching (virtual-circuit approach
or datagram approach).
A)
AAL1
B)
AAL2
C)
AAL3/4
D)
AAL5
30
In ATM, ______ is for packets requiring no sequencing and no error control
mechanism.
31
32
A)
AAL1
B)
AAL2
C)
AAL3/4
D)
AAL5
X.25
B)
Frame Relay
C)
ATM
D)
A)
pure
B)
legacy
C)
mixed architecture
D)
33
In a _______ ATM LAN, the backbone that connects traditional LANs uses
ATM technology.
A)
pure
B)
legacy
C)
mixed architecture
D)
34
A _______ ATM LAN combines features of a pure ATM LAN and a legacy ATM
LAN.
A)
pure
B)
legacy
C)
mixed architecture
D)
A)
B)
C)
32
D)
64
In IPv4, class _______ has the greatest number of addresses in each block.
A)
B)
C)
D)
B)
C)
D)
B)
C)
D)
B)
C)
D)
10
A)
255
B)
15
C)
D)
255
B)
15
C)
D)
254
B)
14
C)
D)
192
B)
65
C)
64
D)
11
12
13
A)
255.255.255.254
B)
255.255.224.0
C)
255.148.0.0
D)
all are
65,534
B)
16,777,216
C)
256
D)
65,536
B)
16,777,216
C)
256
D)
65,534
B)
16,777,216
C)
256
D)
14
The number of addresses assigned to an organization in classless
addressing _______.
A)
B)
C)
must be a power of 2
D)
15
The first address assigned to an organization in classless addressing
_______.
A)
must be a power of 4
B)
C)
D)
16
Which address could be the beginning address of a block of 32 classless
addresses?
A)
2.4.6.5
B)
2.4.6.16
C)
2.4.6.64
D)
17
Which address could be the beginning address of a block of 16 classless
addresses?
A)
2.4.6.5
B)
2.4.6.15
C)
2.4.6.62
D)
18
Which address could be the beginning address of a block of 256 classless
addresses?
A)
2.4.6.5
B)
2.4.6.15
C)
2.4.6.0
D)
19
What is the first address of a block of classless addresses if one of the
addresses is 12.2.2.76/27?
A)
12.2.2.0
B)
12.2.2.32
C)
12.2.2.64
D)
20
What is the first address of a block of classless addresses if one of the
addresses is 12.2.2.76/10?
A)
12.0.0.0
B)
12.2.0.0
C)
12.2.2.2
D)
21
What is the first address of a block of classless addresses if one of the
addresses is 12.2.2.127/28?
A)
12.2.2.0
B)
12.2.2.96
C)
12.2.2.112
D)
22
Find the number of addresses in a block of classless addresses if one of
the addresses is 12.2.2.7/24.
A)
32
B)
64
C)
256
D)
23
Find the number of addresses in a block of classless addresses if one of
the addresses is 12.2.2.7/30.
A)
B)
C)
D)
24
What is the last address of a block of classless addresses if one of the
addresses is 12.2.2.127/28?
A)
12.2.2.16
B)
12.2.2.112
C)
12.2.2.127
D)
25
What is the last address of a block of classless addresses if one of the
addresses is 12.2.2.6/30?
A)
12.2.2.2
B)
12.2.2.6
C)
12.2.2.7
D)
26
An organization is granted a block; one address is 2.2.2.64/20. The
organization needs 10 subnets. What is the subnet prefix length?
A)
/20
B)
/24
C)
/25
D)
27
An organization is granted a block; one address is 2.2.2.64/25. If the
subnet prefix length is /28, what is the maximum number of subnets?
A)
B)
C)
D)
28
An organization is granted a block of classless addresses with the starting
address 199.34.76.64/28. How many addresses are granted?
A)
B)
16
C)
32
D)
29
An organization is granted a block of classless addresses with the starting
address 199.34.76.128/29. How many addresses are granted?
A)
B)
16
C)
32
D)
30
An organization is granted a block of classless addresses with the starting
address 199.34.32.0/27. How many addresses are granted?
31
32
A)
B)
16
C)
32
D)
/9
B)
/8
C)
/16
D)
/9
B)
/8
C)
/16
D)
33
/24
B)
/8
C)
/16
D)
34
In classless addressing, the ______ is another name for the common part of
the address range.
A)
suffix
B)
prefix
C)
netid
D)
35
In classless addressing, the _______ is the varying part (similar to the
hostid).
36
A)
suffix
B)
prefix
C)
hostid
D)
netid
B)
hostid
C)
mask
D)
37
38
39
40
255.255.255.0
B)
255.255.242.0
C)
255.255.0.0
D)
255.254.0.0
B)
255.255.255.0
C)
255.255.255.128
D)
/20
B)
/28
C)
/18
D)
32
B)
64
C)
128
D)
41
42
B)
C)
16
D)
dotted decimal
B)
hexadecimal colon
C)
both a and b
D)
43
In hexadecimal colon notation, a 128-bit address is divided into _______
sections, each _____ hexadecimal digits in length.
44
A)
8: 2
B)
8: 3
C)
8: 4
D)
B)
C)
D)
45
46
16
B)
32
C)
D)
a unicast
B)
a multicast
C)
an anycast
D)
47
In IPv6, ____ address defines a group of computers with addresses that
have the same prefix.
48
A)
a unicast
B)
a multicast
C)
an anycast
D)
a unicast
B)
a multicast
C)
an anycast
D)
49
type
B)
purpose
C)
both a and b
D)
50
In IPv6, the___________ address is generally used by a normal host as a
unicast address.
A)
provider-based unicast
B)
link local
C)
site local
D)
51
In IPv6, a _________address comprises 80 bits of zero, followed by 16 bits of
one, followed by the 32-bit IPv4 address.
A)
link local
B)
site local
C)
mapped
D)
52
In IPv6, a ___________ address is an address of 96 bits of zero followed by
32 bits of IPv4 address.
A)
link local
B)
site local
C)
mapped
D)
53
In IPv6, a _______ address is used if a LAN uses the Internet protocols but is
not connected to the Internet for security reasons.
A)
link local
B)
site local
C)
mapped
D)
54
In IPv6, a ______address is used if a site with several networks uses the
Internet protocols but is not connected to the Internet for security reasons.
A)
link local
B)
site local
C)
mapped
D)
A)
error checking
B)
error correction
C)
datagram acknowledgment
D)
B)
C)
D)
3
In IPv4, what is the value of the total length field in bytes if the header is
28 bytes and the data field is 400 bytes?
A)
428
B)
407
C)
107
D)
427
4
In IPv4, what is the length of the data field given an HLEN value of 12 and
total length value of 40,000?
A)
39,988
B)
40,012
C)
40,048
D)
39,952
5
An IPv4 datagram is fragmented into three smaller datagrams. Which of
the following is true?
A)
B)
C)
D)
In IPv4, if the fragment offset has a value of 100, it means that _______.
A)
B)
C)
D)
7
In IPv4, what is needed to determine the number of the last byte of a
fragment?
A)
Identification number
B)
Offset number
C)
Total length
D)
is 20 to 60 bytes long
B)
C)
D)
Base header
B)
Extension header
C)
D)
10
In IPv6, the _______ field in the base header restricts the lifetime of a
datagram.
A)
version
B)
next-header
C)
hop limit
D)
neighbor-advertisement
11
The ________ protocol is the transmission mechanism used by the TCP/IP
suite.
12
A)
ARP
B)
IP
C)
RARP
D)
an unreliable
B)
a connectionless
C)
both a and b
D)
13
The term ________ means that IP provides no error checking or tracking. IP
assumes the unreliability of the underlying layers and does its best to get a
transmission through to its destination, but with no guarantees.
A)
reliable delivery
B)
connection-oriented delivery
C)
best-effort delivery
D)
14
B)
C)
D)
15
In IPv4, which field or bit value unambiguously identifies the datagram as
a fragment?
16
A)
B)
C)
D)
is 20 to 60 bytes long
B)
is 20 bytes long
C)
is 60 bytes long
D)
17
In IPv4, when a datagram is encapsulated in a frame, the total size of the
datagram must be less than the _______.
A)
MUT
B)
MAT
C)
MTU
D)
18
The IPv4 header field formerly known as the service type field is now
called the _______ field.
A)
IETF
B)
checksum
C)
differentiated services
D)
19
In IPv6, options are inserted between the _________ and the ___________
data.
20
A)
B)
C)
D)
more
B)
less
C)
D)
21
In IPv6, when a datagram needs to be discarded in a congested network,
the decision is based on the _______ field in the base header.
A)
hop limit
B)
priority
C)
next header
D)
22
In IPv6, the _______ field in the base header and the sender IP address
combine to indicate a unique path identifier for a specific flow of data.
A)
flow label
B)
next header
C)
hop limit
D)
destination IP address
A)
physical
B)
logical
C)
a and b
D)
port
B)
IP
C)
D)
physical
B)
logical
C)
a and b
D)
4
If the sender is a host and wants to send a packet to another host on the
same network, the logical address that must be mapped to a physical address is
______.
A)
B)
C)
either a or b
D)
5
If the sender is a host and wants to send a packet to another host on
another network, the logical address that must be mapped to a physical address
is ______.
A)
B)
C)
either a or b
D)
6
The sender is a router that has received a datagram destined for a host on
another network. The logical address that must be mapped to a physical address
is ______.
A)
B)
C)
either a or b
D)
7
The sender is a router that has received a datagram destined for a host on
the same network. The logical address that must be mapped to a physical
address is ______.
A)
B)
C)
either a or b
D)
8
In _______, a table associating a logical address with a physical address is
updated manually.
A)
static mapping
B)
dynamic mapping
C)
physical mapping
D)
9
_______ is a dynamic mapping protocol in which a physical address is found
for a given logical address.
10
A)
ARP
B)
RARP
C)
both a and b
D)
0x000000000000
B)
0.0.0.0
C)
variable
D)
class dependent
11
12
13
14
broadcast
B)
multicast
C)
unicast
D)
broadcast
B)
multicast
C)
unicast
D)
ARP
B)
RARP
C)
proxy ARP
D)
ARP
B)
RARP
C)
proxy ARP
D)
15
16
17
18
data link
B)
transport
C)
network
D)
B)
C)
D)
a 16-byte
B)
a 32-byte
C)
an 8-byte
D)
A)
message.
B)
C)
D)
none is true
19
A)
message.
B)
fragment.
20
21
C)
D)
none is true
UDP
B)
TCP
C)
ICM
D)
an error reporting
B)
a group management
C)
a transmission
D)
22
IGMP helps a ________ router create and update a list of loyal members
related to each router interface.
A)
broadcast
B)
unicast
23
24
25
26
C)
multicast
D)
locally
B)
globally
C)
both a and b
D)
host; host
B)
host; router
C)
D)
B)
C)
membership report
D)
multicast router
B)
host
27
28
C)
multicast group
D)
The _______ field of the IGMP message is all zeros in a query message.
A)
version
B)
type
C)
group address
D)
B)
C)
D)
29
In networks that do not support physical multicast addressing,
multicasting can be accomplished through _______.
A)
mapping
B)
queries
C)
tunneling
D)
30
If four hosts on a network belong to the same group, a total of _______ sent
in response to a general query message.
A)
31
32
33
B)
C)
D)
once
B)
twice
C)
three times
D)
B)
explicitly defines a
C)
D)
UDP
B)
IP
C)
Ethernet frame
D)
34
The IP packet that carries an IGMP packet has a value of _______ in its
protocol field.
A)
B)
C)
D)
A)
physical
B)
logical
C)
a and b
D)
port
B)
IP
C)
D)
physical
B)
logical
C)
a and b
D)
4
If the sender is a host and wants to send a packet to another host on the
same network, the logical address that must be mapped to a physical address is
______.
A)
B)
C)
either a or b
D)
5
If the sender is a host and wants to send a packet to another host on
another network, the logical address that must be mapped to a physical address
is ______.
A)
B)
C)
either a or b
D)
6
The sender is a router that has received a datagram destined for a host on
another network. The logical address that must be mapped to a physical address
is ______.
A)
B)
C)
either a or b
D)
7
The sender is a router that has received a datagram destined for a host on
the same network. The logical address that must be mapped to a physical
address is ______.
A)
B)
C)
either a or b
D)
8
In _______, a table associating a logical address with a physical address is
updated manually.
A)
static mapping
B)
dynamic mapping
C)
physical mapping
D)
9
_______ is a dynamic mapping protocol in which a physical address is found
for a given logical address.
10
11
A)
ARP
B)
RARP
C)
both a and b
D)
0x000000000000
B)
0.0.0.0
C)
variable
D)
class dependent
broadcast
B)
multicast
C)
unicast
D)
12
13
14
15
broadcast
B)
multicast
C)
unicast
D)
ARP
B)
RARP
C)
proxy ARP
D)
ARP
B)
RARP
C)
proxy ARP
D)
data link
B)
transport
C)
network
D)
16
17
18
B)
C)
D)
a 16-byte
B)
a 32-byte
C)
an 8-byte
D)
A)
message.
19
B)
C)
D)
none is true
A)
message.
B)
fragment.
C)
D)
20
21
none is true
UDP
B)
TCP
C)
ICM
D)
an error reporting
B)
a group management
C)
a transmission
D)
22
IGMP helps a ________ router create and update a list of loyal members
related to each router interface.
23
A)
broadcast
B)
unicast
C)
multicast
D)
locally
B)
globally
C)
both a and b
D)
24
25
26
27
host; host
B)
host; router
C)
D)
B)
C)
membership report
D)
multicast router
B)
host
C)
multicast group
D)
The _______ field of the IGMP message is all zeros in a query message.
A)
version
B)
type
C)
group address
D)
28
B)
C)
D)
29
In networks that do not support physical multicast addressing,
multicasting can be accomplished through _______.
A)
mapping
B)
queries
C)
tunneling
D)
30
If four hosts on a network belong to the same group, a total of _______ sent
in response to a general query message.
31
A)
B)
C)
D)
once
B)
twice
32
33
C)
three times
D)
B)
explicitly defines a
C)
D)
UDP
B)
IP
C)
Ethernet frame
D)
34
The IP packet that carries an IGMP packet has a value of _______ in its
protocol field.
A)
B)
C)
D)
In _______ delivery, both the deliverer of the IP packet and the destination
are on the same network.
A)
a connectionless
B)
a direct
C)
an indirect
D)
2
In _______ delivery, the deliverer of the IP packet and the destination are
on different networks.
A)
a connection-oriented
B)
a direct
C)
an indirect
D)
3
In _______ forwarding, the full IP address of a destination is given in the
routing table.
A)
next-hop
B)
network-specific
C)
host-specific
D)
default
4
In _______ forwarding, the mask and destination addresses are both 0.0.0.0
in the routing table.
A)
next-hop
B)
network-specific
C)
host-specific
D)
default
5
In _______ forwarding, the destination address is a network address in the
routing table.
A)
next-hop
B)
network-specific
C)
host-specific
D)
default
6
In _______ forwarding, the routing table holds the address of just the next
hop instead of complete route information.
A)
next-hop
B)
network-specific
C)
host-specific
D)
default
7
The idea of address aggregation was designed to alleviate the increase in
routing table entries when using ________.
A)
classful addressing
B)
classless addressing
C)
both a and b
D)
8
The principle of ________ states that the routing table is sorted from the
longest mask to the shortest mask.
A)
B)
C)
D)
9
The use of hierarchy in routing tables can ________ the size of the routing
tables.
10
11
A)
reduce
B)
increase
C)
both a and b
D)
_______ deals with the issues of creating and maintaining routing tables.
A)
Forwarding
B)
Routing
C)
Directing
D)
static
B)
dynamic
C)
hierarchical
D)
12
A _______ routing table is updated periodically using one of the dynamic
routing protocols.
A)
static
B)
dynamic
C)
hierarchical
D)
13
The input and output ports of a router perform the ________ layer functions
of the router.
A)
B)
network
C)
transport
D)
14
The routing processor of a router performs the ________ layer functions of
the router.
A)
B)
network
C)
transport
D)
15
The task of moving the packet from the input queue to the output queue
in a router is done by _________.
16
A)
B)
routing processor
C)
switching fabrics
D)
B)
C)
either a or b
D)
17
18
B)
C)
either a or b
D)
B)
autonomous networks
C)
autonomous systems
D)
19
____________ is a group of networks and routers under the authority of a
single administration.
20
A)
An autonomous system
B)
An area
C)
a and b
D)
interdomain routing
B)
intradomain routing
C)
both a and b
D)
21
interdomain routing
B)
intradomain routing
C)
both a and b
D)
22
In _______ routing, the least cost route between any two nodes is the route
with the minimum distance.
A)
path vector
B)
distance vector
C)
link state
D)
23
In ________, each node maintains a vector (table) of minimum distances to
every node.
A)
path vector
B)
distance vector
C)
link state
D)
24
In distance vector routing, each node periodically shares its routing table
with _________ and whenever there is a change.
A)
B)
C)
one neighbor
D)
25
The Routing Information Protocol (RIP) is an intradomain routing based on
_________ routing.
26
27
A)
distance vector
B)
link state
C)
path vector
D)
OSPF
B)
RIP
C)
BGP
D)
The _________ routing uses the Dijkstra algorithm to build a routing table.
A)
distance vector
B)
link state
C)
path vector
D)
28
The Open Shortest Path First (OSPF) protocol is an intradomain routing
protocol based on _______ routing.
A)
distance vector
B)
link state
C)
path vector
D)
29
The _______ protocol allows the administrator to assign a cost, called the
metric, to each route.
A)
OSPF
B)
RIP
C)
BGP
D)
30
In OSPF, a ________ link connects two routers without any other host or
router in between.
31
A)
point-to-point
B)
transient
C)
stub
D)
point-to-point
B)
transient
C)
stub
D)
32
point-to-point
B)
transient
C)
stub
D)
33
In OSPF, when the link between two routers is broken, the administration
may create a _________ link between them using a longer path that probably goes
through several routers.
A)
point-to-point
B)
transient
C)
stub
D)
34
In ________ routing, we assume that there is one node (or more) in each
autonomous system that acts on behalf of the entire autonomous system.
35
A)
distant vector
B)
path vector
C)
link state
D)
BGP
B)
RIP
C)
OSPF
D)
36
To create a neighborhood relationship, a router running BGP sends an
________ message.
37
A)
open
B)
update
C)
keepalive
D)
An area is _______.
A)
part of an AS
B)
C)
D)
38
A one-to-all communication between one source and all hosts on a
network is classified as a _______ communication.
A)
unicast
B)
multicast
C)
broadcast
D)
39
A one-to-many communication between one source and a specific group of
hosts is classified as a _______ communication.
A)
unicast
B)
multicast
C)
broadcast
D)
40
A one-to-one communication between one source and one destination is
classified as a _______ communication.
A)
unicast
B)
multicast
C)
broadcast
D)
41
In ______, the router forwards the received packet through only one of its
interfaces.
A)
unicasting
B)
multicasting
C)
broadcasting
D)
42
In _______, the router may forward the received packet through several of
its interfaces.
A)
unicasting
B)
multicasting
C)
broadcasting
D)
43
Emulation of ________ through ___________ is not efficient and may create
long delays.
A)
B)
C)
broadcasting; multicasting
D)
44
In unicast routing, each router in the domain has a table that defines a
______ path tree to possible destinations.
A)
average
B)
longest
C)
shortest
D)
45
In multicast routing, each involved router needs to construct a ________
path tree for each group.
A)
average
B)
longest
C)
shortest
D)
46
In the _______ tree approach, each router needs to have one shortest path
tree for each group.
A)
group-shared
B)
source-based
C)
a or b
D)
47
48
B)
C)
D)
source-based
B)
group-shared
C)
a or b
D)
49
The Multicast Open Shortest Path First (MOSPF) protocol is an extension of
the OSPF protocol that uses multicast routing to create source-based trees. The
protocol is based on _______ routing.
50
A)
distance vector
B)
link state
C)
path vector
D)
data-driven
B)
command-driven
C)
both a and b
D)
51
Forwarding
B)
Flooding
C)
Backwarding
D)
52
In RPF, a router forwards only the copy that has traveled the _______ path
from the source to the router.
53
A)
shortest
B)
longest
C)
average
D)
forwarding
B)
backwarding
C)
flooding
D)
54
RPF guarantees that each network receives only ____ of the multicast
packet.
A)
one copy
B)
two copies
C)
a or b
D)
55
RPB creates a shortest path _______ tree from the source to each
destination.
56
A)
unicast
B)
multicast
C)
broadcast
D)
one copy
B)
no copies
C)
multiple copies
D)
57
In ________, the multicast packet must reach only those networks that have
active members for that particular group.
A)
RPF
B)
RPB
C)
RPM
D)
58
_______ adds pruning and grafting to _______ to create a multicast shortest
path tree that supports dynamic membership changes.
A)
RPM; RPB
B)
RPB; RPM
C)
RPF: RPM
D)
59
__________ is an implementation of multicast distance vector routing. It is a
source-based routing protocol, based on RIP.
60
61
A)
MOSPF
B)
DVMRP
C)
CBT
D)
source-based
B)
group-shared
C)
both a and b
D)
RPF
B)
RPB
C)
RPM
D)
62
A _______ message tells an upstream router to stop sending multicast
messages for a specific group through a specific router.
A)
weed
B)
graft
C)
prune
D)
63
A _______ message tells an upstream router to start sending multicast
messages for a specific group through a specific router.
64
65
66
A)
weed
B)
graft
C)
prune
D)
CBT is a ________ protocol that uses a core as the root of the tree.
A)
source-based
B)
group-shared
C)
a or b
D)
dense
B)
sparse
C)
a or b
D)
A)
dense
B)
sparse
C)
a or b
D)
67
In _______, a logical tunnel is established by encapsulating the multicast
packet inside a unicast packet.
A)
UNIBONE
B)
MULTBONE
C)
MBONE
D)
A)
host-to-host
B)
process-to-process
C)
node-to-node
D)
connectionless, reliable
B)
connection-oriented, unreliable
C)
connectionless, unreliable
D)
3
UDP does not add anything to the services of IP except for providing
_______ communication.
A)
node-to-node
B)
process-to-process
C)
host-to-host
D)
B)
C)
D)
5
Although there are several ways to achieve process-to-process
communication, the most common is through the __________ paradigm.
A)
client-server
B)
client-client
C)
server-server
D)
6
The local host and the remote host are defined using IP addresses. To
define the processes, we need second identifiers called ____________.
A)
UDP addresses
B)
transport addresses
C)
port addresses
D)
7
The ports ranging from 49,152 to 65,535 can be used as temporary or
private port numbers. They are called the ________ ports.
10
A)
well-known
B)
registered
C)
dynamic
D)
In the sending computer, UDP receives a data unit from the _______ layer.
A)
application
B)
transport
C)
IP
D)
In the sending computer, UDP sends a data unit to the _______ layer.
A)
application
B)
transport
C)
IP
D)
data link
B)
network
C)
transport
D)
11
12
process-to-process communication
B)
host-to-host communication
C)
D)
delivery is complete
B)
C)
a header is added
D)
13
UDP needs the _______ address to deliver the user datagram to the correct
application process.
14
A)
port
B)
application
C)
internet
D)
B)
16
C)
32
D)
15
16
flow control
B)
connection-oriented delivery
C)
flow control
D)
The source port address on the UDP user datagram header defines _______.
A)
B)
C)
D)
17
The combination of an IP address and a port number is called a
____________.
18
A)
transport address
B)
network address
C)
socket address
D)
four
B)
two
C)
three
D)
19
20
21
user datagrams
B)
segments
C)
frames
D)
16
B)
C)
40
D)
an Ethernet frame
B)
an TCP segment
C)
an IP datagram
D)
22
UDP uses ________ to handle outgoing user datagrams from multiple
processes on one host.
A)
flow control
B)
multiplexing
C)
demultiplexing
D)
23
UDP uses _______ to handle incoming user datagrams that go to different
processes on the same host.
24
A)
flow control
B)
multiplexing
C)
demultiplexing
D)
TCP is a __________protocol.
A)
stream-oriented
B)
message-oriented
C)
block-oriented
D)
25
TCP allows the sending process to deliver data as a _______of bytes and
allows the receiving process to obtain data as a _________ of bytes.
A)
message; message
B)
stream; stream
C)
block; block
D)
26
Because the sending and the receiving processes may not write or read
data at the same speed, TCP ________.
A)
B)
27
28
29
30
C)
uses buffers
D)
user datagram
B)
segment
C)
datagram
D)
connection-oriented
B)
connectionless
C)
both a and b
D)
unreliable
B)
best-effort delivery
C)
reliable
D)
TCP uses _________________ to check the safe and sound arrival of data.
A)
an acknowledgment mechanism
B)
out-of-band signalling
C)
D)
31
The bytes of data being transferred in each connection are numbered by
TCP. The numbering starts with a __________________.
A)
B)
C)
D)
32
TCP assigns a sequence number to each segment that is being sent. The
sequence number for each segment is the number of the _______ byte carried in
that segment.
33
A)
first
B)
last
C)
middle
D)
simplex
B)
half-duplex
C)
full-duplex
D)
34
The value of the acknowledgment field in a segment defines the number
of the ______byte a party expects to receive.
35
36
37
38
A)
first
B)
last
C)
next
D)
independent
B)
randomly generated
C)
cumulative
D)
the sender
B)
the receiver
C)
D)
optional
B)
mandatory
C)
D)
39
40
A)
an IP datagram
B)
an Ethernet frame
C)
D)
two-way
B)
four-way
C)
one-way
D)
no
B)
one
C)
two
D)
41
A SYN + ACK segment cannot carry data; it consumes _____ sequence
number(s).
A)
no
B)
three
C)
two
D)
42
An ACK segment, if carrying no data, consumes ______ sequence
number(s).
A)
no
B)
one
C)
two
D)
43
The connection establishment procedure in TCP is susceptible to a serious
security problem called the _________ attack.
A)
ACK flooding
B)
FIN flooding
C)
SYN flooding
D)
44
The SYN flooding attack belongs to a group of security attacks known as a
_____ attack.
A)
denial of service
B)
replay
C)
man-in-the middle
D)
45
The FIN segment consumes ____ sequence numbers if it does not carry
data.
A)
two
B)
three
C)
no
D)
46
The FIN + ACK segment consumes _____ sequence number(s) if it does not
carry data.
A)
two
B)
three
C)
one
D)
47
In TCP, one end can stop sending data while still receiving data. This is
called a ______.
A)
half-close
B)
half-open
C)
one-way termination
D)
48
A(n) _________ machine is a machine that goes through a limited number of
states.
A)
infinite state
B)
finite state
C)
both a and b
D)
49
__________ control regulates the amount of data a source can send before
receiving an acknowledgment from the destination.
A)
Error
B)
Flow
50
51
C)
Congestion
D)
limited-size
B)
sliding
C)
fixed-size
D)
packet
B)
segment
C)
byte
D)
52
ACK segments consume _______ sequence number(s) and _______
acknowledged.
53
A)
B)
C)
no; are
D)
all
B)
no
C)
some
D)
54
IP is responsible for _______ communication while TCP is responsible for
_______ communication.
A)
host-to-host; process-to-process
B)
process-to-process; host-to-host
C)
process-to-process; network-to-network
D)
55
If a segment carries data along with an acknowledgment, this is called
_______.
A)
backpacking
B)
piggybacking
C)
piggypacking
D)
56
Multiply the header length field by _______ to find the total number of
bytes in the TCP header.
A)
B)
C)
D)
57
Urgent data requires the urgent pointer field as well as the URG bit in the
_______ field.
58
59
A)
control
B)
offset
C)
sequence number
D)
The options field of the TCP header ranges from 0 to _______ bytes.
A)
10
B)
20
C)
40
D)
If the ACK value is 200, then byte _______ has been received successfully.
A)
199
B)
200
C)
201
D)
60
Stream Control Transmission Protocol (SCTP) is a new
_____________protocol.
61
A)
reliable, character-oriented
B)
reliable, message-oriented
C)
unreliable, message-oriented
D)
62
63
64
A)
single stream
B)
multistream
C)
double stream
D)
B)
multiple IP addresses
C)
D)
a TSN
B)
an SI
C)
an SSN
D)
a TSN
B)
an SI
C)
an SSN
D)
65
To distinguish between different data chunks belonging to the same
stream, SCTP uses ___________.
66
67
68
A)
TSNs
B)
SIs
C)
SSNs
D)
packets; segments
B)
segments; packets
C)
segments; frames
D)
B)
control chunks
C)
data chunks
D)
B)
C)
no data chunks
D)
69
In SCTP, the acknowledgment number and window size are part of each
________.
A)
data chunk
B)
control chunk
C)
a or b
D)
70
There is no need for a header length field in SCTP because
________________.
71
72
A)
B)
C)
both a and b
D)
16
B)
32
C)
64
D)
B)
C)
either a or b
D)
73
In SCTP, control information and data information are carried in _______
chunks.
A)
B)
different chunks
C)
either a or b
D)
74
In SCTP, acknowledgment numbers are used to acknowledge
_____________.
75
76
A)
B)
C)
D)
after
B)
before
C)
a or b
D)
B)
C)
no other chunk
D)
77
negotiation
B)
association
C)
transmission
D)
A)
congestion control
B)
quality of service
C)
D)
congestion control
B)
quality of service
C)
D)
controls
B)
descriptors
C)
values
D)
A)
B)
C)
effective bandwidth
D)
5
The________ normally refers to the maximum length of time the traffic is
generated at the peak rate.
A)
B)
C)
effective bandwidth
D)
6
The ________ is a function of three values: average data rate, peak data
rate, and maximum burst size.
A)
B)
C)
effective bandwidth
D)
A _________ traffic model has a data rate that does not change.
A)
B)
C)
bursty
D)
8
In the ________ traffic model, the rate of the data flow changes in time,
with the changes smooth instead of sudden and sharp.
A)
B)
C)
bursty
D)
9
In the ______ traffic model, the data rate changes suddenly in a very short
time.
10
A)
B)
C)
bursty
D)
Congestion
B)
Jamming
C)
Error
D)
11
Congestion in a network or internetwork occurs because routers and
switches have _______.
A)
tables
B)
queues
C)
crosspoints
D)
12
In a network, when the load is much less than the capacity of the network,
the delay is _________.
A)
at a maximum
B)
at a minimum
C)
constant
D)
13
In a network, when the load reaches the network capacity, the delay
_______.
A)
increases sharply
B)
decreases sharply
C)
remains constant
D)
cannot be predicted
14
In a network, when the load is below the capacity of the network, the
throughput ______________.
15
A)
increases sharply
B)
C)
declines sharply
D)
increases sharply
B)
C)
declines sharply
D)
16
In ________ congestion control, policies are applied to prevent congestion
before it happens.
A)
open-loop
B)
closed-loop
C)
D)
17
In _______ congestion control, mechanisms are used to alleviate congestion
after it happens.
A)
open-loop
B)
closed-loop
C)
D)
18
The technique of ________refers to a congestion control mechanism in
which a congested node stops receiving data from the immediate upstream node
or nodes.
A)
backpressure
B)
choke packet
C)
implicit signaling
D)
explicit signaling
19
A ___________ is a packet sent by a node to the source to inform it of
congestion.
A)
backpressure
B)
choke packet
C)
implicit signaling
D)
explicit signaling
20
In __________, there is no communication between the congested node or
nodes and the source. The source guesses that there is a congestion somewhere
in the network from other symptoms.
A)
backpressure
B)
choke packet
C)
implicit signaling
D)
explicit signaling
21
In the __________ method, the signal is included in the packets that carry
data.
A)
backpressure
B)
choke packet
C)
implicit signaling
D)
explicit signaling
22
In the ________ algorithm of TCP, the size of the congestion window
increases exponentially until it reaches a threshold.
A)
slow-start
B)
congestion avoidance
C)
congestion detection
D)
23
In the _________ algorithm of TCP, the size of the congestion window
increases additively until congestion is detected.
A)
slow-start
B)
congestion avoidance
C)
congestion detection
D)
24
In the ___________ algorithm of TCP, the size of the threshold is dropped to
one-half, a multiplicative decrease.
A)
slow-start
B)
congestion avoidance
C)
congestion detection
D)
25
In Frame Relay, the ________ bit warns the sender of congestion in the
network.
A)
BECN
B)
FECN
C)
D)
26
In Frame Relay, the ________ bit is used to warn the receiver of congestion
in the network.
A)
BECN
27
B)
FECN
C)
D)
two
B)
three
C)
four
D)
five
28
_________ is a characteristic that a flow needs. Lack of it means losing a
packet or acknowledgment, which entails retransmission.
A)
Reliability
B)
Delay
C)
Jitter
D)
Bandwidth
29
_______ is a flow characteristic that applications can tolerate in different
degrees.
30
A)
Reliability
B)
Delay
C)
Jitter
D)
Bandwidth
________ is the variation in delay for packets belonging to the same flow.
A)
Reliability
B)
Delay
C)
Jitter
D)
Bandwidth
31
In ________, queuing packets wait in a buffer (queue) until the node (router
or switch) is ready to process them.
A)
FIFO
B)
priority
C)
weighted fair
D)
32
In ________ queuing, packets are first assigned to a priority class. Each
class has its own queue.
A)
FIFO
B)
priority
C)
weighted fair
D)
33
In _________ queuing, the packets are assigned to different classes and
admitted to different queues. The queues, however, are weighted based on the
priority of the queues; higher priority means a higher weight. The system
processes packets in each queue in a round-robin fashion with the number of
packets selected from each queue based on the corresponding weight.
A)
FIFO
B)
priority
C)
weighted fair
D)
34
In the ______ bucket algorithm, bursty chunks are stored in the bucket and
sent out at an average rate.
A)
leaky
B)
token
C)
D)
35
The _______ bucket algorithm allows idle hosts to accumulate credit for the
future in the form of tokens.
A)
leaky
B)
token
C)
D)
36
In _________, when a source makes a reservation, it needs to define a flow
specification.
37
A)
Integrated Services
B)
Differentiated Services
C)
Connectionless
D)
Connection-Oriented
Integrated Services
B)
Differentiated Services
38
C)
Connectionless
D)
Connection-Oriented
access rate
B)
C)
D)
39
In Frame Relay, a ___________ is the maximum number of bits in a
predefined time that the network is committed to transfer without discarding any
frame or setting the DE bit.
A)
access rate
B)
C)
D)
40
In Frame Relay, the _____________ defines an average rate in bits per
second.
A)
access rate
B)
C)
D)
41
In Frame Relay, the ___________ is the maximum number of bits in excess
of Bc that a user can send during a predefined time.
A)
access rate
B)
C)
D)
42
In ATM, the _________ class is designed for customers who need real-time
audio or video services. The service is similar to that provided by a dedicated
line such as a T line.
A)
CBR
B)
VBR
C)
ABR
D)
UBR
43
In ATM, the _________ class is divided into two subclasses: real-time (VBRRT) and non-real-time (VBR-NRT). VBR-RT is designed for those users who need
real-time services (such as voice and video transmission) and use compression
techniques to create a variable bit rate. VBR-NRT is designed for those users who
do not need real-time services but use compression techniques to create a
variable bit rate.
A)
CBR
B)
VBR
C)
ABR
D)
UBR
44
In ATM, the _________ class delivers cells at a minimum rate. If more
network capacity is available, this minimum rate can be exceeded.
A)
CBR
B)
VBR
C)
ABR
D)
UBR
45
In ATM, the _________ class is a best-effort delivery service that does not
guarantee anything.
A)
CBR
B)
VBR
C)
ABR
D)
UBR
1
In a _______ name space, a name is assigned to an address. A name in this
space is a sequence of characters without structure.
A)
flat
B)
hierarchical
C)
organized
D)
flat
B)
hierarchical
C)
organized
D)
domain space
B)
domain name
C)
D)
a linear list
B)
an inverted-tree
C)
a graph
D)
5
Each node in the tree has a _______, which is a string with a maximum of
___ characters.
A)
label; 127
B)
name; 255
C)
label; 63
D)
a string of characters
B)
a string of 63 characters
C)
an empty string
D)
semicolons
B)
dots
10
11
C)
colons
D)
PQDN
B)
FQDN
C)
SQDN
D)
PQDN
B)
FQDN
C)
SQDN
D)
label
B)
name
C)
domain
D)
domain
B)
label
12
13
14
C)
zone
D)
domain server
B)
zone server
C)
root server
D)
primary
B)
secondary
C)
zone
D)
primary
B)
secondary
C)
zone
D)
15
When the secondary downloads information from the primary, it is called
______ transfer.
A)
domain
B)
zone
C)
label
D)
16
In the Internet, the domain name space (tree) is divided into _______
different sections:
A)
three
B)
two
C)
four
D)
17
The _______ domains define registered hosts according to their generic
behavior.
18
19
A)
generic
B)
country
C)
inverse
D)
The first level in the generic domains section allows ______ possible labels.
A)
10
B)
12
C)
16
D)
generic
20
B)
country
C)
inverse
D)
generic
B)
country
C)
inverse
D)
21
In __________ resolution, the resolver expects the server to supply the final
answer.
A)
iterative
B)
recursive
C)
straight
D)
22
In __________ resolution, the server returns the IP address of the server that
it thinks can resolve the query.
23
A)
iterative
B)
recursive
C)
straight
D)
24
A)
chal
B)
atc
C)
edu
D)
chal
B)
atc
C)
fhda
D)
25
A host with the domain name pit.arc.nasa.gov. is on the _______ level of
the DNS hierarchical tree. (The root is level one.)
26
27
A)
third
B)
fourth
C)
fifth
D)
inverse
B)
reverse
C)
root
D)
DNS can use the services of ________ using the well-known port 53.
A)
UDP
B)
TCP
C)
D)
terminal network
B)
telephone network
C)
telecommunication network
D)
specific-purpose
B)
general-purpose
C)
both a and b
D)
3
When a user logs into a local time-sharing system, it is called ________
login.
A)
local
B)
remote
C)
temporary
D)
4
When a user wants to access an application program or utility located on a
remote machine, he or she performs ___________ login.
A)
local
B)
remote
C)
temporary
D)
NVT uses two sets of characters, one for _____and one for __________.
A)
sending; receiving
B)
request; reply
C)
data; control
D)
6
For data, NVT uses US ASCII characters with the highest order bit set to
______.
A)
B)
C)
a or b
D)
7
For control, NVT uses US ASCII characters with the highest order bit set to
______.
A)
B)
C)
a or b
D)
8
TELNET uses only one TCP connection. The server uses ________ port and
the client uses ________ port.
A)
B)
C)
a well-known; an ephemeral
D)
9
To distinguish data from control characters, each sequence of control
characters is preceded by a special control character called ________.
10
A)
ICA
B)
IAC
C)
AIC
D)
default
B)
character
C)
line
D)
11
In the _______ mode, each character typed is sent by the client to the
server.
A)
default
B)
character
C)
line
D)
12
In the ____ mode, line editing (echoing, character erasing, line erasing, and
so on) is done by the client.
A)
default
B)
character
C)
line
D)
13
The _______ is software residing on the remote system that allows the
remote system to receive characters from a TELNET server.
14
A)
terminal driver
B)
pseudoterminal driver
C)
TELNET client
D)
terminal driver
B)
TELNET client
C)
TELNET server
D)
15
The _______ translates NVT characters into a form acceptable by the
remote operating system.
A)
terminal driver
B)
TELNET client
16
17
C)
TELNET server
D)
WILL
B)
DO
C)
WONT
D)
WILL
B)
DO
C)
WONT
D)
18
If the sender wants an option disabled by the receiver, it sends a _______
command.
A)
WILL
B)
DO
C)
DONT
D)
19
If the sender wants an option enabled by the receiver, it sends a _______
command.
A)
WILL
B)
DO
C)
WONT
D)
20
_______ is the standard mechanism provided by TCP/IP for copying a file
from one host to another.
21
A)
TELNET
B)
SMTP
C)
TFTP
D)
UDP
B)
IP
C)
TCP
D)
22
In FTP, the well-known port ____ is used for the control connection and the
well-known port ________ for the data connection.
A)
21; 22
B)
21; 20
C)
20; 21
D)
23
In FTP, _______ is the service type used by the IP protocol because this is
an interactive connection between a user (human) and a server.
24
25
26
A)
maximize throughput
B)
minimize delay
C)
minimize error
D)
For the control connection, FTP uses the __________ character set
A)
regular ASCII
B)
EBCDIC
C)
NVT ASCII
D)
exactly once
B)
exactly twice
C)
D)
exactly once
B)
exactly twice
C)
D)
27
In FTP, a file can be organized into records, pages, or a stream of bytes.
These are types of an attribute called _______.
28
29
30
A)
file types
B)
data structures
C)
transmission modes
D)
In FTP, there are three types of _______: stream, block, and compressed.
A)
file types
B)
data structures
C)
transmission modes
D)
file type
B)
data structure
C)
transmission mode
D)
retrieve a file
B)
retrieve a list
C)
a and c
D)
31
retrieve a file
B)
store a file
C)
retrieve a list
D)
32
________ is part of a local hard drive, a special file with permission
restrictions.
A)
A message
B)
A response
C)
An agent
D)
33
When the sender and the receiver of an email are on the same system, we
need only ___________.
A)
one UA
B)
two UAs
C)
D)
34
When the sender and the receiver of an email are on different systems, we
need only _____________.
A)
one MTA
B)
two UAs
C)
D)
35
When the sender is connected to the mail server via a LAN or a WAN, we
need ______________.
A)
two MTA
B)
C)
D)
36
When both sender and receiver are connected to a mail server via a LAN
or a WAN, we need ___________________.
A)
B)
C)
D)
37
________ provides service to the user to make the process of sending and
receiving a message easier.
38
A)
An MTA
B)
An MAA
C)
A UA
D)
composing messages
B)
reading messages
39
C)
replying messages
D)
all are
command-driven; data-driven
B)
command-driven; GUI-based
C)
D)
40
The ________ usually contains the sender address, the receiver address,
and other information.
41
A)
message
B)
envelope
C)
both a and b
D)
header; envelop
B)
header; body
C)
envelop; body
D)
42
In the Internet, the email address consists of two parts: a _______ and a
_______.
A)
B)
C)
D)
43
_________ is a supplementary protocol that allows non-ASCII data to be sent
through email.
44
A)
JPEG
B)
MPEG
C)
MIME
D)
UAs
B)
MTAs
C)
MAAs
D)
45
The formal protocol that defines the MTA client and server in the Internet
is called ___________.
46
A)
SMTP
B)
SNMP
C)
TELNET
D)
47
48
49
A)
two
B)
four
C)
five
D)
SMTP is a __________protocol.
A)
pull
B)
push
C)
both a and b
D)
pull
B)
push
C)
both a and b
D)
UA
B)
MTA
C)
MAA
D)
50
Currently two message access protocols are available: _______ and
_________.
A)
POP3; IMAP2
B)
POP4; IMAP1
C)
POP3; IMAP4
D)
51
Which part of the mail created by the UA contains the sender and receiver
names?
A)
envelope
B)
address
C)
header
D)
52
The MIME _______ header uses text to describe the type of data in the body
of the message.
53
A)
content-type
B)
content-transfer-encoding
C)
content-description
D)
POP3; IMAP4
B)
IMAP4; POP3
C)
SMTP; POP3
D)
1
_________ is a repository of information linked together from points all over
the world.
A)
The WWW
B)
HTTP
C)
HTML
D)
2
The WWW today is a _______ client-server service, in which a client using a
browser can access a service using a server.
A)
limited
B)
vast
C)
distributed
D)
3
The _________ is a standard for specifying any kind of information on the
Internet.
A)
URL
B)
ULR
C)
RLU
D)
4
In a URL, the _______ is the client-server program used to retrieve the
document.
A)
path
B)
protocol
C)
host
D)
path
B)
protocol
C)
host
D)
6
In a URL, an optional ________ can be inserted between the host and the
path, and it is separated from the host by a colon.
A)
path
B)
protocol
C)
host
D)
7
In a URL, the _______ is the full name of the file where the information is
located.
A)
path
B)
protocol
C)
host
D)
client; client
B)
client; server
C)
server; server
D)
The documents in the WWW can be grouped into ______ broad categories.
A)
two
B)
three
C)
four
D)
10
A _______ document is a fixed-content document that is created and stored
in a server. The client can get a copy of the document only.
11
A)
static
B)
dynamic
C)
active
D)
HTTP
B)
HTML
C)
FTTP
D)
12
A _______ document is created by a Web server whenever a browser
requests the document.
A)
static
B)
dynamic
13
C)
active
D)
GIC
B)
CGI
C)
GCI
D)
14
Dynamic documents are sometimes referred to as _________ dynamic
documents.
A)
client-site
B)
server-site
C)
both a and b
D)
15
For many applications, we need a program or a script to be run at the
client site. These are called _______________ documents.
16
A)
static
B)
dynamic
C)
active
D)
CGI
B)
C)
Java applets
D)
17
Active documents are sometimes referred to as _________ dynamic
documents.
18
A)
client-site
B)
server-site
C)
both a and b
D)
UDP
B)
IP
C)
TCP
D)
19
In HTTP, the first line in a request message is called a _______ line; the first
line in the response message is called the ________ line.
A)
request; response
B)
response; request
C)
response; status
D)
20
In a ___________ connection, one TCP connection is made for each
request/response.
A)
persistent
B)
nonpersistent
C)
both a and b
D)
21
In a ___________connection, the server leaves the connection open for more
requests after sending a response.
22
A)
persistent
B)
nonpersistent
C)
both a and b
D)
persistent
B)
nonpersistent
C)
both a and b
D)
23
In HTTP, a _______ server is a computer that keeps copies of responses to
recent requests.
A)
regular
B)
proxy
C)
both a and b
D)
24
B)
C)
D)
25
Which of the following is present in both an HTTP request line and a status
line?
A)
B)
URL
C)
status code
D)
26
The HTTP request line contains a _______ method to request a document
from the server.
A)
GET
B)
POST
C)
COPY
D)
27
A user needs to send the server some information. The request line
method is _______.
A)
OPTION
B)
PATCH
C)
POST
D)
28
The HTTP request line contains a _______ method to get information about
a document without retrieving the document itself.
29
30
A)
HEAD
B)
POST
C)
COPY
D)
B)
C)
D)
a static
B)
an active
C)
a passive
D)
a dynamic
1
SNMP defines the ___________________ to be sent from a manager to an
agent and vice versa.
A)
B)
C)
number of packets
D)
client
B)
server
C)
both a and b
D)
client
B)
server
C)
both a and b
D)
MIB; SMTP
B)
SMI; MIB
C)
FTP; SMI
D)
5
________ defines the general rules for naming objects, defining object
types, and showing how to encode objects and values.
A)
MIB
B)
BER
C)
SMI
D)
6
We can compare the task of network management to the task of writing a
program. Both tasks need rules. In network management this is handled by
___________.
A)
SMNP
B)
MIB
C)
SMI
D)
7
We can compare the task of network management to the task of writing a
program. Both tasks need variable declarations. In network management this is
handled by _________.
A)
SMNP
B)
MIB
C)
SMI
D)
8
We can compare the task of network management to the task of writing a
program. Both tasks have actions performed by statements. In network
management this is handled by _______.
A)
SMNP
B)
MIB
C)
SMI
D)
9
SMI emphasizes three attributes to handle an object: _____, ________, and
_________.
A)
B)
C)
D)
10
To name objects globally, SMI uses an object identifier, which is a
hierarchical identifier based on a _______ structure
A)
linear
B)
tree
C)
graph
D)
11
All objects managed by SNMP are given an object identifier. The object
identifier always starts with _______.
A)
1.3.6.1.2.1
B)
1.3.6.1.2.2
C)
1.3.6.1.2.3
D)
12
To define the data type, SMI uses fundamental _______ definitions and adds
some new definitions.
A)
AMS.1
B)
ASN.1
C)
ASN.2
D)
13
14
15
SMI has two broad categories of data type: _______ and _______.
A)
simple; complex
B)
simple; structured
C)
structured; unstructured
D)
structure
B)
simple
C)
both a and b
D)
sequence; atomic
B)
sequence; sequence of
C)
D)
16
SMI uses another standard, ___________, to encode data to be transmitted
over the network.
A)
MIB
B)
ANS.1
C)
BER
D)
17
The _________ ordering enables a manager to access a set of variables one
after another by defining the first variable.
A)
lexicographic
B)
linear
C)
non-linear
D)
18
The GetRequest PDU is sent from the _______ to the __________ to retrieve
the value of a variable or a set of variables.
A)
client; server
B)
server; client
C)
server; network
D)
19
The Response PDU is sent from the ______ to the ______ in response to
GetRequest or GetNextRequest.
20
A)
server; client
B)
client; server
C)
network; host
D)
The Trap PDU is sent from the ______ to the _______ to report an event.
A)
server; client
B)
client; server
C)
network; host
D)
21
SNMP uses the services of UDP on two well-known ports, _______ and
_______.
A)
161; 162
B)
160; 161
C)
160; 162
D)
22
_______ runs the SNMP client program; _______ runs the SNMP server
program.
A)
A manager; a manager
B)
An agent; an agent
C)
A manager; an agent
D)
An agent; a manager
23
INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used
by SMI.
24
A)
MIB
B)
SNMP
C)
ASN.1
D)
25
26
27
28
A)
1.3.6.1.2.1.1
B)
1.3.6.1.2.2.1
C)
2.3.6.1.2.1.2
D)
B)
C)
a and b
D)
For a 1-byte length field, what is the maximum value for the data length?
A)
127
B)
128
C)
255
D)
variable; table
B)
table; variable
C)
D)
29
A)
GetRequest
B)
SetRequest
C)
Trap
D)
Response
B)
GetRequest
C)
SetRequest
D)
30
The _______ field in the SNMP PDU is an offset that points to the variable in
error.
31
A)
community
B)
enterprise
C)
error index
D)
The _______ field in the SNMP PDU reports an error in a response message.
A)
community
B)
enterprise
C)
error status
D)
32
The _______ field in the SNMP PDU consists of a sequence of variables and
their corresponding values.
A)
version
B)
community
C)
VarBindList
D)
We can divide audio and video services into _______ broad categories.
A)
three
B)
two
C)
four
D)
2
________ audio/video refers to on-demand requests for compressed
audio/video files.
A)
Streaming live
B)
Streaming stored
C)
Interactive
D)
3
___________ audio/video refers to the broadcasting of radio and TV
programs through the Internet.
A)
Interactive
B)
Streaming live
C)
Streaming stored
D)
4
_________ audio/video refers to the use of the Internet for interactive
audio/video applications.
A)
Interactive
B)
Streaming live
C)
Streaming stored
D)
5
According to the Nyquist theorem, we need to sample an analog signal
________times the highest frequency.
A)
three
B)
two
C)
four
D)
6
In ________ encoding, the differences between the samples are encoded
instead of encoding all the sampled values.
A)
predictive
B)
perceptual
C)
both a and b
D)
7
__________ encoding is based on the science of psychoacoustics, which is
the study of how people perceive sound.
A)
Predictive
B)
Perceptual
C)
both a and b
D)
10
11
MPEG
B)
JPEG
C)
either a or b
D)
MPEG
B)
JPEG
C)
either a or b
D)
DCT transformation
B)
quantization
C)
data compression
D)
DCT transformation
B)
quantization
C)
data compression
D)
12
13
DCT transformation
B)
quantization
C)
data compression
D)
B)
C)
both a and b
D)
14
To prevent _________, we can timestamp the packets and separate the
arrival time from the playback time.
15
A)
error
B)
jitter
C)
either a or b
D)
playback
B)
reordering
C)
sorting
D)
16
17
timestamp
B)
sequence number
C)
both a and b
D)
broadcasting
B)
multicasting
C)
both a and b
D)
18
__________ means changing the encoding of a payload to a lower quality to
match the bandwidth of the receiving network.
19
A)
Translation
B)
Mixing
C)
both a and b
D)
Translation
B)
Mixing
C)
both a and b
D)
20
_________ is not suitable for interactive multimedia traffic because it
retransmits packets in case of errors.
A)
UDP
B)
TCP
C)
both a and b
D)
21
__________ is the protocol designed to handle real-time traffic on the
Internet.
22
23
A)
TCP
B)
UDP
C)
RTP
D)
UDP
B)
TCP
C)
both a and b
D)
RTP
B)
RTCP
C)
UDP
D)
24
RTCP uses an odd-numbered _______ port number that follows the port
number selected for RTP.
A)
UDP
B)
TCP
C)
both a and b
D)
25
___________ is an application protocol that establishes, manages, and
terminates a multimedia session
A)
RIP
B)
SIP
C)
DIP
D)
26
_______ is a standard to allow telephones on the public telephone network
to talk to computers connected to the Internet.
A)
SIP
B)
H.323
C)
Q.991
D)
27
A real-time video performance lasts 10 min. If there is jitter in the system,
the viewer spends _______ minutes watching the performance.
A)
less than 10
B)
more than 10
C)
exactly 10
D)
28
A _______ shows the time a packet was produced relative to the first or
previous packet.
29
A)
timestamp
B)
playback buffer
C)
sequence number
D)
Timestamps
B)
Playback buffers
C)
Sequence numbers
D)
30
In a real-time video conference, data from the server is _______ to the
client sites.
31
A)
unicast
B)
multicast
C)
broadcast
D)
A)
timestamp
B)
sequence number
C)
mixer
D)
32
A _______ changes the format of a high-bandwidth video signal to a lower
quality narrow-bandwidth signal.
33
A)
timestamp
B)
sequence number
C)
translator
D)
B)
a TCP segment
C)
an IP datagram
D)
34
When there is more than one source, the _______ identifier defines the
mixer.
A)
synchronization source
B)
contributor
C)
timestamp
D)
________ is the science and art of transforming messages to make them secure
and immune to attacks.
A)
Cryptography
B)
Cryptoanalysis
C)
D)
ciphertext
B)
plaintext
C)
secret-text
D)
ciphertext
B)
plaintext
C)
secret-text
D)
encryption
B)
decryption
C)
D)
A)
encryption
B)
decryption
C)
D)
6
A combination of an encryption algorithm and a decryption algorithm is
called a ________.
A)
cipher
B)
secret
C)
key
D)
cipher
B)
secret
C)
key
D)
8
In a(n) ________ cipher, the same key is used by both the sender and
receiver.
A)
symmetric-key
B)
asymmetric-key
C)
D)
10
11
12
symmetric-key
B)
asymmetric-key
C)
D)
symmetric-key
B)
asymmetric-key
C)
D)
private
B)
public
C)
D)
private
B)
public
C)
D)
13
substitution
B)
transposition
C)
D)
14
_________ ciphers can be categorized into two broad categories:
monoalphabetic and polyalphabetic.
A)
Substitution
B)
Transposition
C)
D)
15
The _______ cipher is the simplest monoalphabetic cipher. It uses modular
arithmetic with a modulus of 26.
16
A)
transposition
B)
additive
C)
shift
D)
transposition
B)
additive
C)
shift
D)
17
The ________ cipher reorders the plaintext characters to create a
ciphertext.
A)
substitution
B)
transposition
C)
D)
18
A(n) ______ is a keyless substitution cipher with N inputs and M outputs
that uses a formula to define the relationship between the input stream and the
output stream.
A)
S-box
B)
P-box
C)
T-box
D)
19
A(n) _______is a keyless transposition cipher with N inputs and M outputs
that uses a table to define the relationship between the input stream and the
output stream.
A)
S-box
B)
P-box
C)
T-box
D)
20
A modern cipher is usually a complex _____cipher made of a combination
of different simple ciphers.
A)
round
B)
circle
21
22
23
24
C)
square
D)
symmetric-key
B)
asymmetric-key
C)
D)
DES has an initial and final permutation block and _________ rounds.
A)
14
B)
15
C)
16
D)
B)
C)
D)
32-bit
B)
48-bit
25
C)
54-bit
D)
42-bit
________ DES was designed to increase the size of the DES key
A)
Double
B)
Triple
C)
Quadruple
D)
26
_______ is a round cipher based on the Rijndael algorithm that uses a 128bit block of data.
27
28
A)
AEE
B)
AED
C)
AER
D)
AES
two
B)
three
C)
four
D)
five
block
B)
stream
C)
field
D)
29
One commonly used public-key cryptography method is the ______
algorithm.
30
A)
RSS
B)
RAS
C)
RSA
D)
RAA
The ________ method provides a one-time session key for two parties.
A)
Diffie-Hellman
B)
RSA
C)
DES
D)
AES
31
The _________ attack can endanger the security of the Diffie-Hellman
method if two parties are not authenticated to each other.
A)
man-in-the-middle
B)
ciphertext attack
C)
plaintext attack
D)
Message ________ means that the sender and the receiver expect privacy.
A)
confidentiality
B)
integrity
C)
authentication
D)
2
Message_____ means that the data must arrive at the receiver exactly as
sent.
A)
confidentiality
B)
integrity
C)
authentication
D)
3
Message _______ means that the receiver is ensured that the message is
coming from the intended sender, not an imposter.
A)
confidentiality
B)
integrity
C)
authentication
D)
4
_________ means that a sender must not be able to deny sending a
message that he sent.
A)
Confidentiality
B)
Integrity
C)
Authentication
D)
Nonrepudiation
5
________ means to prove the identity of the entity that tries to access the
system's resources.
A)
Message authentication
B)
Entity authentication
C)
Message confidentiality
D)
6
A(n) _________ can be used to preserve the integrity of a document or a
message.
A)
message digest
B)
message summary
C)
encrypted message
D)
encryption
B)
decryption
C)
hash
D)
two
B)
three
C)
four
D)
keyless
10
B)
keyed
C)
D)
MDC
B)
MAC
C)
D)
11
A ________ signature is included in the document; a _______ signature is a
separate entity.
12
13
A)
conventional; digital
B)
digital; digital
C)
D)
authentication
B)
nonrepudiation
C)
D)
integrity
14
15
16
B)
confidentiality
C)
nonrepudiation
D)
authentication
integrity
B)
confidentiality
C)
nonrepudiation
D)
authentication
symmetric-key
B)
asymmetric-key
C)
D)
something known
B)
something possessed
C)
something inherent
D)
17
In _______, a claimant proves her identity to the verifier by using one of the
three kinds of witnesses.
A)
message authentication
B)
entity authentication
C)
message confidentiality
D)
message integrity
18
Password-based authentication can be divided into two broad categories:
_______ and _______.
A)
fixed; variable
B)
time-stamped; fixed
C)
fixed; one-time
D)
19
In ________ authentication, the claimant proves that she knows a secret
without actually sending it.
20
A)
password-based
B)
challenge-response
C)
D)
symmetric-key ciphers
B)
asymmetric-key ciphers
C)
keyed-hash functions
D)
21
A(n) _____ is a trusted third party that assigns a symmetric key to two
parties.
22
A)
KDC
B)
CA
C)
KDD
D)
A(n)______ creates a secret key only between a member and the center.
A)
CA
B)
KDC
C)
KDD
D)
23
The secret key between members needs to be created as a ______ key
when two members contact KDC.
A)
public
B)
session
C)
complimentary
D)
24
__________ is a popular session key creator protocol that requires an
authentication server and a ticket-granting server.
A)
KDC
B)
Kerberos
C)
CA
D)
25
A(n) ________is a federal or state organization that binds a public key to an
entity and issues a certificate.
A)
KDC
B)
Kerberos
C)
CA
D)
26
A(n) ______ is a hierarchical system that answers queries about key
certification.
A)
KDC
B)
PKI
C)
CA
D)
27
The _______ criterion states that it must be extremely difficult or impossible
to create the message if the message digest is given.
28
A)
one-wayness
B)
weak-collision-resistance
C)
strong-collision-resistance
D)
one-wayness
B)
weak-collision-resistance
C)
strong-collision-resistance
D)
29
The _______criterion ensures that we cannot find two messages that hash
to the same digest.
A)
one-wayness
B)
weak-collision-resistance
C)
strong-collision-resistance
D)
1
_________ is a collection of protocols designed by the IETF (Internet
Engineering Task Force) to provide security for a packet at the network level.
A)
IPSec
B)
SSL
C)
PGP
D)
IPSec
B)
SSL
C)
PGP
D)
3
In the ______ mode, IPSec protects information delivered from the transport
layer to the network layer.
A)
transport
B)
tunnel
C)
D)
transport
B)
tunnel
C)
D)
5
The _______ mode is normally used when we need host-to-host (end-toend) protection of data.
A)
transport
B)
tunnel
C)
D)
6
In the _______ mode, IPSec protects the whole IP packet, including the
original IP header.
A)
transport
B)
tunnel
C)
D)
A)
AH; SSL
B)
PGP; ESP
C)
AH; ESP
D)
AH
B)
ESP
C)
PGP
D)
SSL
9
______ provides either authentication or encryption, or both, for packets at
the IP level.
10
A)
AH
B)
ESP
C)
PGP
D)
SSL
SAD
B)
SAB
C)
SADB
D)
11
______ is the protocol designed to create security associations, both
inbound and outbound.
12
13
14
A)
SA
B)
CA
C)
KDC
D)
IKE
SSL
B)
PGP
C)
IPSec
D)
VP
two
B)
three
C)
four
D)
five
Oakley
B)
SKEME
C)
ISAKMP
D)
15
16
17
18
private
B)
public
C)
semi-private
D)
semi-public
intranet
B)
internet
C)
extranet
D)
intranet
B)
internet
C)
extranet
D)
intranets
B)
internets
C)
extranets
D)
19
A ______ provides privacy for LANs that must communicate through the
global Internet.
A)
VPP
B)
VNP
C)
VNN
D)
VPN
20
A _______ layer security protocol provides end-to-end security services for
applications.
21
22
A)
data link
B)
network
C)
transport
D)
TLS; TSS
B)
SSL; TLS
C)
TLS; SSL
D)
SSL; SLT
SSL
B)
TLS
C)
D)
23
______ is designed to provide security and compression services to data
generated from the application layer.
A)
SSL
B)
TLS
C)
D)
24
Typically, ______ can receive application data from any application layer
protocol, but the protocol is normally HTTP.
25
A)
SSL
B)
TLS
C)
D)
message integrity
B)
confidentiality
C)
compression
D)
26
The combination of key exchange, hash, and encryption algorithms
defines a ________ for each SSL session.
A)
list of protocols
B)
cipher suite
C)
list of keys
D)
27
In _______, the cryptographic algorithms and secrets are sent with the
message.
28
29
30
A)
IPSec
B)
SSL
C)
TLS
D)
PGP
IPSec
B)
SSL
C)
PGP
D)
IPSec
B)
SSL
C)
PGP
D)
IPSec
B)
SSL
C)
PGP
D)
31
secret
B)
public
C)
D)
32
In ______, there is a single path from the fully trusted authority to any
certificate.
A)
X509
B)
PGP
C)
KDC
D)
33
In _____, there can be multiple paths from fully or partially trusted
authorities.
34
A)
X509
B)
PGP
C)
KDC
D)
X509
B)
PGP
C)
KDC
D)