Vladislav Kulymbetov
Quiz by , created more than 1 year ago

Quiz on NP, created by Vladislav Kulymbetov on 22/05/2018.

645
3
0
No tags specified
Vladislav Kulymbetov
Created by Vladislav Kulymbetov over 6 years ago
Close

NP

Question 1 of 65

1

Layers four and five of the Internet protocol stack are implemented in the end systems but not in the routers in the network core.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 65

1

With ADSL, each subscriber gets more downstream bandwidth than upstream bandwidth.

Select one of the following:

  • True
  • False

Explanation

Question 3 of 65

1

Twisted-pair cooper wire is no longer present in computer networks.

Select one of the following:

  • True
  • False

Explanation

Question 4 of 65

1

Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination:

Select one of the following:

  • in any order, after having traversed the same route.

  • only in the order A-B, after possibly having traversed different routes.

  • in any order, after possibly having traversed different routes.

  • only in the order A-B, after having traversed the same route.

Explanation

Question 5 of 65

1

Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination:

Select one of the following:

  • in any order, after possibly having traversed different routes.

  • in the order A-B, after having traversed the same route.

  • in any order, after having traversed the same route.

  • in the order A-B, after possibly having traversed different routes.

Explanation

Question 6 of 65

1

The Internet received its name in the 1980s because:

Select one of the following:

  • it was an interim (temporary) design of what it later became, but the name stuck.

  • it was meant to be a network internal to the United States Department of Defense.

  • it consisted of many interconnected networks.

  • it achieved international scope with the addition of the City University of London.

Explanation

Question 7 of 65

1

DNS lookups often involve a combination of recursive and iterative queries.

Select one of the following:

  • True
  • False

Explanation

Question 8 of 65

1

The Date: header in the HTTP response message indicates when the object in the response was last modified.

Select one of the following:

  • True
  • False

Explanation

Question 9 of 65

1

Skype relay nodes are typically peers under the control of Skype users.

Select one of the following:

  • True
  • False

Explanation

Question 10 of 65

1

The process that sends messages into, and receives messages from, the network through a software interface is called a socket.

Select one of the following:

  • True
  • False

Explanation

Question 11 of 65

1

In a P2P File Distribution architecture, the server must sequentially send (upload) file copies.

Select one of the following:

  • True
  • False

Explanation

Question 12 of 65

1

SMTP is used to:

Select one of the following:

  • to transfer messages from one mail server to another.

  • to transfer messages from mail server to a user agent.

  • to define the format of message headers.

  • all of the above.

Explanation

Question 13 of 65

1

Suppose a DNS resource record has Type=MX. Then:

Select one of the following:

  • Value is the hostname of the DNS server that is authoritative for Name.

  • Value is the IP address of the mail server that has the alias hostname Name.

  • Value is the hostname of the mail server that has the alias hostname Name.

  • none of the above.

Explanation

Question 14 of 65

1

Local DNS name servers:

Select one of the following:

  • cache resource records, but discard them after a period of time that is on the order of a few days.

  • cache resource records and never discard them.

  • obtain resource records from Web caches.

  • never cache resource records.

Explanation

Question 15 of 65

1

Consider an HTTP Web server using persistent connections. Suppose the server spawns a
separate process for each client that connects to the server. Then each of these spawned processes will have different server port numbers.

Select one of the following:

  • True
  • False

Explanation

Question 16 of 65

1

The size of the TCP RcvWindow never changes throughout the duration of the connection.

Select one of the following:

  • True
  • False

Explanation

Question 17 of 65

1

When a TCP segment arrives to a host, the socket to which the segment is directed depends on

Select one of the following:

  • the source IP address of the datagram that encapsulated the segment.

  • the destination port number.

  • the source port number.

  • all of the above.

Explanation

Question 18 of 65

1

UDP has which of the following characteristics:

Select one of the following:

  • regulated send rate.

  • connection state at the server.

  • three-way hand shake for connection establishment.

  • none of the above.

Explanation

Question 19 of 65

1

When a UDP segment arrives to a host, in order to direct the segment to the appropriate socket, the OS uses:

Select one of the following:

  • the source port number.

  • the source IP address.

  • the destination port number.

  • all of the above.

Explanation

Question 20 of 65

1

Suppose a client sends an HTTP request message with the If-modified-since: header. Suppose the object in a server has not changed since the last time a client retrieved the object. Then the server will send a response message with the status code:

Select one of the following:

  • 404 Not Found.

  • 200 OK.

  • 304 Not Modified.

  • none of the above.

Explanation

Question 21 of 65

1

Streams are not needed in which of the following programs:

Select one of the following:

  • TCPserver.

  • UDPserver

  • TCPclient

  • UDPclient

Explanation

Question 22 of 65

1

Consider the minimum time for P2P file distribution, as discussed in Section 2.6. Suppose the upload rate of the server is10 Mbps, the upload rates of all peers is 1 Mbps, and the download rates of all peers is 10 Mbps. Further suppose that there are 100 peers and the file is 100 million bits. The minimum distribution time is

Select one of the following:

  • approximately 100 seconds.

  • approximately 10 seconds.

  • approximately 1 second.

  • approximately 1000 seconds.

Explanation

Question 23 of 65

1

For BitTorrent, which of the following is true:

Select one of the following:

  • Although a peer may have 50 concurrent TCP connections with other peers, at any given instant of time it sends data to less than 10 other peers.

  • At a given instant of time, a peer A may upload to a peer B, even if peer B is not sending anything to A.

  • Among the chunks that a peer does not have, the peer will request chunks that appear to be relatively rare in the torrent.

  • All of the above.

Explanation

Question 24 of 65

1

Consider the latency model for dynamic congestion windows. Which of the following components contribute to latency?

Select one of the following:

  • the sum of all the stalled times.

  • round trip time, RTT.

  • the transmission time of the object, O/R.

  • all of the above.

Explanation

Question 25 of 65

1

TCP applies fast retransmit to a segment when:

Select one of the following:

  • it estimates unusually large RTTs.

  • it receives three ACKs for an earlier segment.

  • the segment's timer expires.

  • none of the above.

Explanation

Question 26 of 65

1

Nmap is often used to:

Select one of the following:

  • do port scans over a range of ports at a target host.

  • measure throughput between hosts.

  • measure round-trip times between hosts.

  • decipher encrypted traffic.

Explanation

Question 27 of 65

1

With SYN cookies, when a server receives a SYN segment, it returns a SYNACK with:

Select one of the following:

  • an initial sequence number that is a hash of the IP addresses and port numbers in the SYN segment (as well as of other things).

  • initial sequence number 1.

  • a randomly chosen initial sequence number.

  • none of the above.

Explanation

Question 28 of 65

1

Before sending a packet into a datagram network, the source must determine all of the links that packet will traverse between source and destination.

Select one of the following:

  • True
  • False

Explanation

Question 29 of 65

1

The primary role of a router is to forward datagrams from input links to output links.

Select one of the following:

  • True
  • False

Explanation

Question 30 of 65

1

Forwarding involves transferring a packet from the router’s input link to the appropriate output link.

Select one of the following:

  • True
  • False

Explanation

Question 31 of 65

1

A forwarding table is:

Select one of the following:

  • a. Used to find the proper interface to which the input interface should forward a packet.

  • b. Configured using a centralized routing algorithm.

  • c. Configured through routing protocol messages received by router.

  • A and C.

  • B and C.

Explanation

Question 32 of 65

1

How are routing paths calculated?

Select one of the following:

  • The full route is mapped out in the datagram’s header.

  • Paths are calculated by routing algorithms.

  • Datagrams always flow on the same path and don’t need to be calculated.

  • The path is calculated based on available network bandwidth.

Explanation

Question 33 of 65

1

Guaranteed Delivery:

Select one or more of the following:

  • Guarantees that the packet will eventually arrive at its destination

  • Guarantees the amount of time between the transmission of two successive packets at the sender is equal to the amount of time between their receipt at the destination.

  • Guarantees delivery within a specified host-to-host delay bound.

Explanation

Question 34 of 65

1

Guaranteed Delivery with Bounded Delay

Select one or more of the following:

  • Guarantees delivery within a specified host-to-host delay bound

  • Guarantees a packet will arrive at its destination.

  • Guarantees the amount of time between the transmission of two successive packets at the sender is equal to the amount of time between their receipt at the destination.

Explanation

Question 35 of 65

1

Guaranteed Maximum Jitter

Select one of the following:

  • Guarantees the amount of time between the transmission of two successive packets at the sender is equal to the amount of time between their receipt at the destination

  • Guarantees a packet will arrive at its destination.

  • Guarantees delivery within a specified host-to-host delay bound.

Explanation

Question 36 of 65

1

All link layer protocols that support IP have the same frame structure (i.e., length of frame, number and length of header fields).

Select one of the following:

  • True
  • False

Explanation

Question 37 of 65

1

CRC error detection, as used in Ethernet, is always able to detect whether there is an error in a frame.

Select one of the following:

  • True
  • False

Explanation

Question 38 of 65

1

The even parity bit scheme can correct single bit errors.

Select one of the following:

  • True
  • False

Explanation

Question 39 of 65

1

With CDMA, each sender uses the same code, cm, m=1,...,M.

Select one of the following:

  • True
  • False

Explanation

Question 40 of 65

1

Each LAN adapter has a unique LAN address.

Select one of the following:

  • True
  • False

Explanation

Question 41 of 65

1

A channel partitioning protocol has which of the following characteristics forwarding table is:

Select one of the following:

  • it does not generate collisions.

  • all transmitting nodes get the same amount of bandwidth.

  • there is no master node.

  • all of the above.

Explanation

Question 42 of 65

1

In slotted ALOHA with N active nodes, the probability that no node transmits in a given slot is

Select one of the following:

  • (1-p)^N

  • (1-p)N

  • p^N

  • 1-p

Explanation

Question 43 of 65

1

An ARP query packet is encapsulated in

Select one of the following:

  • an IP datagram.

  • a link-layer frame addressed to a specific adapter.

  • a link-layer broadcast frame.

  • none of the above.

Explanation

Question 44 of 65

1

Ethernet provides which of the following services to the network layer

Select one of the following:

  • error detection.

  • flow control.

  • reliable data transfer.

  • all of the above.

Explanation

Question 45 of 65

1

For Ethernet, if an adapter determines that a frame it has just received is addressed to a different adapter

Select one of the following:

  • it discards the frame without sending an error message to the network layer.

  • it discards the frame and sends an error message to the network layer.

  • it sends a NACK (not acknowledged frame) to the sending host.

  • it delivers the frame to the network layer, and lets the network layer decide what to do.

Explanation

Question 46 of 65

1

A typical "infrastructure network" wireless network includes base stations.

Select one of the following:

  • True
  • False

Explanation

Question 47 of 65

1

In CDMA, the chipping rate is typically the same as the original data rate.

Select one of the following:

  • True
  • False

Explanation

Question 48 of 65

1

The 11 channels in the 802.11 are non-overlapping.

Select one of the following:

  • True
  • False

Explanation

Question 49 of 65

1

If you enter an Internet café and more than one AP is present, then the packets your host sends are forwarded into the Internet by both APs.

Select one of the following:

  • True
  • False

Explanation

Question 50 of 65

1

During the 802.11 association handshake protocol, the wireless host gets assigned an IP address.

Select one of the following:

  • True
  • False

Explanation

Question 51 of 65

1

In CDMA, let Ym be the received value in the mth mini-slot for some slot i. Let cm, m=1,...,M, be the sender's M code values. To determine the bit value the sender sent, the receiver:

Select one of the following:

  • multiples Ym with the sum of the M code values.

  • multiplies each Ym with the corresponding cm, sums the resulting values and divides by M.

  • simply declares Ym as the sent value.

  • none of the above.

Explanation

Question 52 of 65

1

A beacon frame sent by an AP includes

Select one of the following:

  • the AP's SSID.

  • the AP's MAC address.

  • both the AP's MAC address and SSID.

  • none of the above.

Explanation

Question 53 of 65

1

The 802.11 protocol does not implement collision detection because (Click all that apply)

Select one or more of the following:

  • collision detection was found to be useless in wired Ethernet.

  • the adapter would still not be able to detect all collisions due to hidden terminals.

  • it is costly to build wireless hardware that detects collisions.

  • all of the above.

Explanation

Question 54 of 65

1

Packets sent by two stations in 802.11 can collide because

Select one of the following:

  • at a given time, the random backoff values of the two stations are the same.

  • the packets are sent to different APs but on the same channel.

  • the two stations could be hidden from each other.

  • all of the above.

Explanation

Question 55 of 65

1

An 802.11 frame includes:

Select one of the following:

  • an acknowledgement field.

  • a sequence number field.

  • four address fields.

  • all of the above.

Explanation

Question 56 of 65

1

In IP spoofing, the attacker interchanges the source and destination addresses in the sender's IP datagram.

Select one of the following:

  • True
  • False

Explanation

Question 57 of 65

1

Nonce's are often used to combat the playback attack.

Select one of the following:

  • True
  • False

Explanation

Question 58 of 65

1

Two parties often use public-key encryption to agree on a shared one-time symmetric session key.

Select one of the following:

  • True
  • False

Explanation

Question 59 of 65

1

For public-key certification, PGP uses certification authorities.

Select one of the following:

  • True
  • False

Explanation

Question 60 of 65

1

The AH protocol provides secrecy at the network layer.

Select one of the following:

  • True
  • False

Explanation

Question 61 of 65

1

Which of the following statements best describes the purpose of the SNMP protocol?

Select one of the following:

  • The SNMP protocol specifies the actions a network manager should take in response to a specific set of network fault conditions.

  • The SNMP protocol is a tool for gathering data about network conditions and executing remote actions at remote managed devices.

  • The SNMP protocol is used by the network manager to provision resources, such as bandwidth, server capacity and other computational/communication resources needed to meet the mission-specific needs of an enterprise.

Explanation

Question 62 of 65

1

Suppose a network manager wanted to query the value of the number of TCP segments received by a host running the Microsoft Windows 2000 operating system in a US-based company. What would be the prefix (leading digits) of the MIB variable that should be queried?

Select one of the following:

  • 1.2.840.11356

  • 1.2.840

  • 1.3.6.1.2.1.1

Explanation

Question 63 of 65

1

What is the maximum number of received UDP datagrams that can be counted (without overflow) in the MIB-2 UDP module?

Select one of the following:

  • 2**32 - 1

  • 2**64 -1

  • 2**16 - 1

  • 2**31 - 1

Explanation

Question 64 of 65

1

What is the purpose of a presentation service?

Select one of the following:

  • To allow a client to inform a server that it (the client) is present and ready to receive data.

  • To encode, transmit, and translate data from one machine-specific format to another.

  • To display data in a format specified by a user.

  • None of the above.

Explanation

Question 65 of 65

1

Filtering in a firewall can be based on:

Select one of the following:

  • source and destination IP addresses

  • TCP ACK bits

  • source and destination port numbers

  • all of the above

Explanation