CS509 Exams
![]() |
![]() |
![]() |
Title of test:![]() CS509 Exams Description: Computer Networks |




New Comment |
---|
NO RECORDS |
Exam of 16/06/2022. Check to Start. Routing algorithm determines local forwarding at a router. True. False. Network layer protocols is implemented in every host and router. True. False. Cookies maintain the state between mail agent and mail server. True. False. In router, the switching via bus causes two bus crossings per datagram. True. False. The IMAP is used only to pull emails from mail servers. True. False. In persistent HTTP, at most, one object is sent over a TCP connection and then the connection is closed, so downloading multiple objects require multiple connections. True. False. IPv4 allows datagram fragmentation and variable length of datagram header. True. False. In tunneling, IPv6 datagram is carried as payload in IPv4 datagram among IPv4 routers. True. False. Chrome, Skype and WhatsApp are examples of application layer protocols. True. False. In P2P architecture, there is no always-on server in data center. True. False. User datagram protocol guarantees message delivery and prevents errors. True. False. Link frame is created by appending the link layer header to transport segment. True. False. Switching datagrams from input port(s) to output port(s) inside router is performed in decentralized form without interruptions of router processor. True. False. IPv4 uses four bytes to specify host address while IPv6 uses six bytes. True. False. TCP provides minimum delay, throughput and security guarantees. True. False. Twisted pair, coaxial cable and optical fiber belong to guided transmission media. True. False. Multimedia applications can tolerate some amount of data loss. True. False. Each process uses transport layer services must have a unique port number. True. False. Self-scalability is an important property of P2P network application architecture. True. False. DNS iterative query puts heavy load at the upper levels of DNS servers hierarchy. True. False. ___ are remote controllers computes, which install forwarding tables in routers. (A)RDN. (B) CDN. (C) FDN. (D) SDN. TCP applies ___ approach to control congestion and reduce segments loss. (A)MIAD. (B) AIMD. (C) MDAI. (D) ADMI. Human communication needs ___-way handshake procedure to establish a connection. (A)five. (B) four. (C) three. (D) two. TCP segment retransmission is triggered by the occurrence of at least one of ___ actions. (A)five. (B) four. (C) three. (D) two. The number of DHCP messages is __. (A)five. (B) four. (C) three. (D) two. . A protocol must define ___ aspects for communication. (A)five. (B) four. (C) three. (D) two. ICANN allocates IP addresses, through ___ regional registries who may then reallocate to local registries. (A)five. (B) four. (C) three. (D) two. Types of DNS resource record are ___. (A)five. (B) four. (C) three. (D) two. Computers communication model involves ___ key elements. (A)five. (B) four. (C) three. (D) two. . UDP checksum treats segment contents as a sequence of ___-byte integers. (A) 5. (B) 4. (C) 3. (D) 2. Bit-Torrent divides distributed file into ___ chunks. (A)256Kb. (B) 256KB. (C)256Mb. (D) 256MB. The application layer protocol of ___ is intentionally not available in the public domain because it is not specified in RFCs. (A)Skype. (B) Web. (C) Email. (D) P2P. ___ uses UDP as its underlying transport protocol. (A)HTTP 1.0. (B) HTTP 1.1. (C) HTTP 2.0. (D) HTTP 3.0. . ___ is a wireless medium used for transmission in short distances with limited rates. (A)Satellite. (B) Microwave. (C) Bluetooth. (D) Radio. ___ scheduling policy of queued datagrams in output port buffer inside router guarantees minimum bandwidth per traffic-class. (A)FCFS. (B) RR. (C) WFQ. (D) Priority. . ___ is a malware can record keystrokes, visited web sites, social security numbers, or passwords and upload that info to collection site. (A)Spyware. (B) Virus. (C) Worm. (D) Trojan. . ___control is a mechanism assures that a sending entity does not overwhelm a receiving entity with huge data. (A)Error. (B) Congestion. (C) Flow. (D) Alarm. . ___ DNS servers are responsible for popular domains such as com, org, net, and all country level domains, e.g.: uk, fr, ca, jp. (A)Root. (B) TLD. (C) Authoritative. (D) Local. Presenting an address to ___ memory in router retrieves the stored address with longest prefix matching in one clock cycle, regardless of forward table size. (A)TCAM. (B) SCAM. (C) DCAM. (D) RCAM. . ___ delay of a packet is the time elapsed to push out the full packet onto a link. (A)Queuing. (B) Switching. (C) Transmission. (D) Processing. Exam 17/1/2023. Check to Continue. TCP provides minimum delay, throughput and security guarantees. True. False. IPv4 uses four bytes to specify host address while IPv6 uses six bytes. True. False. Link frame is created by appending the link layer header to transport segment. True. False. Seawater itself is unguided transmission medium. True. False. IP address is conventionally expressed in hexadecimal notation. True. False. User datagram protocol guarantees message delivery and prevents errors. True. False. Twisted pair, coaxial cable and optical fiber belong to guided transmission media. T. F. Self-scalability is an important property of P2P network application architecture. T. F. The forward table of router is stored in the memory of its input port. T. F. Each process uses transport layer services must have a unique port number. T. F. Multimedia applications can tolerate some amount of data loss. T. F. DNS iterative query puts heavy load at the upper levels of DNS servers hierarchy. T. F. Cookies maintain the state between mail agent and mail server. T. F. In NAT, just one IP address needed from provider ISP for all host in local network. T. F. Routing algorithm determines local forwarding at a router. T. F. Human communications needs 2-way handshake procedure to setup a connection. T. F. In tunneling, IPv6 datagram is carried as payload in IPv4 datagram among IPv4 routers. True. False. HTTP protocol is implemented in host and router. True. False. End-point authentication is the best defense mechanism against DoS attacks. True. False. In CIDR, x means the number of bits in subnet portion of address format: True. False. Connectionless service must first set up a connection between two involved hosts. True. False. The IMAP is used only to pull emails from mail servers. True. False. The Discover and Offer broadcast messages of DHCP are mandatory. True. False. In P2P, any host can be client and server at the same time. True. False. HTTP protocol is stateless. True. False. Chrome, Skype and WhatsApp are examples of application layer protocols. True. False. Transport segment is created by appending a transport header to an application packet. True. False. In persistent HTTP, at most, one object is sent over a TCP connection and then the connection is closed, so downloading multiple objects require multiple connections. True. False. Switching datagrams from input port(s) to output port(s) inside router is performed in decentralized form without interruptions of router processor. True. False. . Presenting an address to ___ memory in router retrieves the stored address with longest prefix matching in one clock cycle, regardless of forward table size. (A)TCAM. (B) SCAM. (C) DCAM. (D) RCAM. . ___control is a mechanism assures that a sending entity does not overwhelm a receiving entity with huge data. (A)Flow. (B) Exception. (C) Error. (D) Congestion. . ___ delay of a packet is the time elapsed to push out that full packet onto a link. (A) Processing. (B) Switching. (C)Queuing. (D) Transmission. In router, the switching via memory causes ___ bus crossings per datagram. (A)two. (B) three. (C) four. (D) five. . ___ is a malware can record keystrokes, visited web sites, social security numbers, or passwords and upload that info to collection site. (A)Virus. (B) Trojan. (C) Worm. (D) Spyware. . ___ DNS servers are responsible for popular domains such as com, org, net, and all country level domains, e.g.: uk, fr, ca, jp. (A)Root. (B) Authoritative. (C) TLD. (D) Local. Bit-Torrent divides distributed file into ___ chunks. (A)256MB. (B) 256Mb. (C) 256KB. (D) 256Kb. ___ is a wireless medium used for transmission in short distances with limited rates. (A)Microwave. (B) Satellite. (C) Radio. (D) Bluetooth. The standard Open System Interconnection model consists of ___ layers. (A)seven. (B) six. (C) five. (D) four. ___ uses UDP as its underlying transport protocol. (A) HTTP 1.0. (B) HTTP 2.0. (C) HTTP 3.0. (D) HTTP 4.0. The application layer protocol of ___ is intentionally not available in the public domain because it is not specified in RFCs. (A) Web. (B) Email. (C) P2P. (D) Skype. UDP checksum treats segment contents as sequence of ___-byte integers. (A)2. (B) 4. (C) 6. (D) 16. . ___ are remote controllers computes, which install forwarding tables in routers. (A)FDN. (B) SDN. (C) RDN. (D) CDN. ICANN allocates IP addresses, through ___ regional registries who may then reallocate to local registries. (A)two. (B) three. (C) four. (D) five. TCP applies ___ approach to control congestion and reduce segments loss. (A)MDAI. (B) ADMI. (C) AIMD. (D) MIAD. DNS resource record have ___ types. (A)five. (B) three. (C) four. (D) two. In HTTP, the ___ method sends user inputs in the URL field of the message request line. (A)POST. (B) HEAD. (C) GET. (D) PUT. Computers communication model involves ___ key elements. (A)two. (B) three. (C) four. (D) five. Hosts and DNS servers communicate over UDP using port ___. (A)53. (B) 80. (C) 20. (D) 25. Protocol must define ___ aspects for communication. (A)five. (B) four. (C) three. (D) two. . ___ is the incentive mechanism for file distribution in Bit-Torrent. (A)Step-By-Step. (B) Tit-For-Tat. (C) One-After-One. (D) Back-To-Back. The occurrence of at least one of ___ actions triggers TCP segment retransmission. (A)two. (B) three. (C) four. (D) five. To reduce processing time at each hop, IPv6 removed ___ field that was in IPv4 header. (A)hop limit. (B) checksum. (C) version. (D) flow label. The number of all DHCP messages is ___. (A)five. (B) four. (C) three. (D) two. In communication model, the ___ means the host that generates data to be transmitted. (A)source. (B) destination. (C) transmitter. (D) receiver. . ___ services are provided by DNS server to hosts. (A)Two. (B) Three. (C) Four. (D) Five. . ___-scheduling policy of queued datagrams in output port buffer inside router guarantees minimum bandwidth per traffic-class. (A)FCFS. (B) WFQ. (C) Priority. (D) RR. . ___ main pieces of information are returned by DHCP server to host. (A)Five. (B) Four. (C) Three. (D) Two. To transmit at the wider frequency band, ___ allocates periodic time slot(s) for a call. (A)FDM. (B) SDM. (C) TDM. (D) WDM. To schedule frames and mitigate HOL blocking, ___ divides objects to be sent into frames. (A)HTTP 3.0. (B) HTTP 2.0. (C) HTTP 1.1. (D) HTTP 1.0. IPv6 uses ___ bits for specifying host address. (A)32. (B) 48. (C) 64. (D) 128. . Police radios transmission is a ___ type of communication. (A)simplex. (B) duplex. (C) half-duplex. (D) full-duplex. . ___ layer is directly responsible for transporting TCP segment between two connected hosts from source to destination. (A)Transport. (B) Network. (C) Link. (D) Physical. HTTP 1.1 provides ___ method types in the request line of its request message. (A)two. (B) three. (C) four. (D) five. Cryptography is the best defense against ___ attack. (A)IP spoofing. (B) denial of service. (C) DNS tunneling. (D) packet sniffing. |