Computer Networks Final Exam
Q&A
In Network Encapsulation, when a segment is added with network layer header information, then it is
called a - =Datagram
The application that is used to find the "read" end-to-end internet delay is - =Traceroute
The Packet delay that occurs when a packet travels over a wire is - =Propagation delay
The components of a cable access network is - =Cable Modem, CMTS, Cable Headend, Splitter
The which media, signals propagate in a solid media? - =Guided Media
A fiber optic cable is a - =Glass fiber carrying light pulses and each pulse is a bit
In which one of the following attacks, the attackers make resources (server or bandwidth) unavailable to
legitimate traffic by overwhelming resources with bogus traffic? - =Denial of Service (DoS)
A radio signal is a - =Signal carried in electromagnetic spectrum
In which one of the following attackers, the attacker sits on a promiscuous network interface ad
reads/records all packers (e.g. including passwords) passing by? - =Packet Sniffing
The components of a Digital Subscriber Line (DSL) access network are... - =Splitter, DSL Modem, DSL
Access Multiplexer, Telephone Network
The process where the end-to-end resources are allocated between source and destination to send of
receive data is called as - =Circuit Switching
,The sources of packet delay in an end-to-end transmission are... - =Processing Delay, Propagation Delay,
Queueing delay, Transport Delay
The data rate (bits/sec) at any given point of time is called as - =Instantaneous Throughput
In network encapsulation, when a message is added with transport layer header information, then it is
called - =Segment
A set of rules and formats defined for sending and receiving data among network entities is called -
=Protocol
Internet is also known as - =A network of networks
If traffic intensity is more than (1), then the average queuing delay is - =Approaching infinity
If the traffic intensity is less than 1, then the average queuing delay is - =Large
The process where the hosts break the application layer message into packets is called - =Circuit
switching
In BitTorrent, the file is divided into - =Chunks
The underlying transport layer protocol used by FTP is - =TCP
In which type of DNS query is the load on the local DNS server? - =Iterative Query
The door through which a process sends/receives its messages to/from is called - =Socket
The transport layer protocols are... *********** - =TCP
, In a client—server architecture - =There is an always-on host called the server
The protocol that offers unreliable data transfer is - =UDP
Which one of the following DNS RR records gets the IP address - =A record
What are the "in-band" application layer protocols? - =HTTP
What is the control port for FTP? - =21
The services provided by DNS are... - =Load Distribution, Host Aliasing, Mail Server Aliasing, Host to IP
translation
What are the "out-of-band" application layer protocols? - =FTP
The possible network architectures for network communication are... ********** - =Client-Server
Architecture
The underlying transport layer protocol used by Telnet is... - =TCP
In which type of DNS query is the load in the DNS server? - =Recursive Query
The protocol that offers reliable data transfer is - =TCP
In which of the following methods does the transport layer send data to multiple sockets after removing
the transport layer header? - =Demultiplexing
When the messages reaches the transport layer, which one of the following information is added to the
header? - =Source and Destination IP Addresses
Q&A
In Network Encapsulation, when a segment is added with network layer header information, then it is
called a - =Datagram
The application that is used to find the "read" end-to-end internet delay is - =Traceroute
The Packet delay that occurs when a packet travels over a wire is - =Propagation delay
The components of a cable access network is - =Cable Modem, CMTS, Cable Headend, Splitter
The which media, signals propagate in a solid media? - =Guided Media
A fiber optic cable is a - =Glass fiber carrying light pulses and each pulse is a bit
In which one of the following attacks, the attackers make resources (server or bandwidth) unavailable to
legitimate traffic by overwhelming resources with bogus traffic? - =Denial of Service (DoS)
A radio signal is a - =Signal carried in electromagnetic spectrum
In which one of the following attackers, the attacker sits on a promiscuous network interface ad
reads/records all packers (e.g. including passwords) passing by? - =Packet Sniffing
The components of a Digital Subscriber Line (DSL) access network are... - =Splitter, DSL Modem, DSL
Access Multiplexer, Telephone Network
The process where the end-to-end resources are allocated between source and destination to send of
receive data is called as - =Circuit Switching
,The sources of packet delay in an end-to-end transmission are... - =Processing Delay, Propagation Delay,
Queueing delay, Transport Delay
The data rate (bits/sec) at any given point of time is called as - =Instantaneous Throughput
In network encapsulation, when a message is added with transport layer header information, then it is
called - =Segment
A set of rules and formats defined for sending and receiving data among network entities is called -
=Protocol
Internet is also known as - =A network of networks
If traffic intensity is more than (1), then the average queuing delay is - =Approaching infinity
If the traffic intensity is less than 1, then the average queuing delay is - =Large
The process where the hosts break the application layer message into packets is called - =Circuit
switching
In BitTorrent, the file is divided into - =Chunks
The underlying transport layer protocol used by FTP is - =TCP
In which type of DNS query is the load on the local DNS server? - =Iterative Query
The door through which a process sends/receives its messages to/from is called - =Socket
The transport layer protocols are... *********** - =TCP
, In a client—server architecture - =There is an always-on host called the server
The protocol that offers unreliable data transfer is - =UDP
Which one of the following DNS RR records gets the IP address - =A record
What are the "in-band" application layer protocols? - =HTTP
What is the control port for FTP? - =21
The services provided by DNS are... - =Load Distribution, Host Aliasing, Mail Server Aliasing, Host to IP
translation
What are the "out-of-band" application layer protocols? - =FTP
The possible network architectures for network communication are... ********** - =Client-Server
Architecture
The underlying transport layer protocol used by Telnet is... - =TCP
In which type of DNS query is the load in the DNS server? - =Recursive Query
The protocol that offers reliable data transfer is - =TCP
In which of the following methods does the transport layer send data to multiple sockets after removing
the transport layer header? - =Demultiplexing
When the messages reaches the transport layer, which one of the following information is added to the
header? - =Source and Destination IP Addresses