Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Computer Networks Final Exam Q&A

Beoordeling
-
Verkocht
-
Pagina's
16
Cijfer
A+
Geüpload op
10-03-2025
Geschreven in
2024/2025

Computer Networks Final Exam Q&A

Instelling
Computer Networks Fi
Vak
Computer Networks Fi

Voorbeeld van de inhoud

Computer Networks Final Exam
Q&A
In Network Encapsulation, when a segment is added with network layer header information, then it is
called a - =Datagram



The application that is used to find the "read" end-to-end internet delay is - =Traceroute



The Packet delay that occurs when a packet travels over a wire is - =Propagation delay



The components of a cable access network is - =Cable Modem, CMTS, Cable Headend, Splitter



The which media, signals propagate in a solid media? - =Guided Media



A fiber optic cable is a - =Glass fiber carrying light pulses and each pulse is a bit



In which one of the following attacks, the attackers make resources (server or bandwidth) unavailable to
legitimate traffic by overwhelming resources with bogus traffic? - =Denial of Service (DoS)



A radio signal is a - =Signal carried in electromagnetic spectrum



In which one of the following attackers, the attacker sits on a promiscuous network interface ad
reads/records all packers (e.g. including passwords) passing by? - =Packet Sniffing



The components of a Digital Subscriber Line (DSL) access network are... - =Splitter, DSL Modem, DSL
Access Multiplexer, Telephone Network



The process where the end-to-end resources are allocated between source and destination to send of
receive data is called as - =Circuit Switching

,The sources of packet delay in an end-to-end transmission are... - =Processing Delay, Propagation Delay,
Queueing delay, Transport Delay



The data rate (bits/sec) at any given point of time is called as - =Instantaneous Throughput



In network encapsulation, when a message is added with transport layer header information, then it is
called - =Segment



A set of rules and formats defined for sending and receiving data among network entities is called -
=Protocol



Internet is also known as - =A network of networks



If traffic intensity is more than (1), then the average queuing delay is - =Approaching infinity



If the traffic intensity is less than 1, then the average queuing delay is - =Large



The process where the hosts break the application layer message into packets is called - =Circuit
switching



In BitTorrent, the file is divided into - =Chunks



The underlying transport layer protocol used by FTP is - =TCP



In which type of DNS query is the load on the local DNS server? - =Iterative Query



The door through which a process sends/receives its messages to/from is called - =Socket



The transport layer protocols are... *********** - =TCP

, In a client—server architecture - =There is an always-on host called the server



The protocol that offers unreliable data transfer is - =UDP



Which one of the following DNS RR records gets the IP address - =A record



What are the "in-band" application layer protocols? - =HTTP



What is the control port for FTP? - =21



The services provided by DNS are... - =Load Distribution, Host Aliasing, Mail Server Aliasing, Host to IP
translation



What are the "out-of-band" application layer protocols? - =FTP



The possible network architectures for network communication are... ********** - =Client-Server
Architecture



The underlying transport layer protocol used by Telnet is... - =TCP



In which type of DNS query is the load in the DNS server? - =Recursive Query



The protocol that offers reliable data transfer is - =TCP



In which of the following methods does the transport layer send data to multiple sockets after removing
the transport layer header? - =Demultiplexing



When the messages reaches the transport layer, which one of the following information is added to the
header? - =Source and Destination IP Addresses

Geschreven voor

Instelling
Computer Networks Fi
Vak
Computer Networks Fi

Documentinformatie

Geüpload op
10 maart 2025
Aantal pagina's
16
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€11,59
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
hurryben
3,0
(1)

Maak kennis met de verkoper

Seller avatar
hurryben Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
12
Lid sinds
2 jaar
Aantal volgers
5
Documenten
1808
Laatst verkocht
11 maanden geleden

3,0

1 beoordelingen

5
0
4
0
3
1
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen