الخميس، 25 ديسمبر 2014

Interview Questions on Network Layer in OSI Model set-1


1) The ......... provides two well-defined classes of services, namely connectionless and connection oriented services to the numerous nodes or hosts communicating through subnet.

A. physical layer

B. data link layer

C. network layer

D. transport layer


2) In computer networking the term .......... refers to selecting paths in a computer network along which to send data.

A. routing

B. inter-networking

C. internal organization

D. congestion control


3) ............ Routing algorithms do not base their routing decisions on measurements or estimates of the current traffic and topology.

A. Static or Non-adaptive

B. Static or adaptive

C. Dynamic or Non-adaptive

D. Dynamic or adaptive


4) ............. Routing algorithm in contrast change their routing decisions to reflect changes in topology and usually the traffic as well.

A. Static or Non-adaptive

B. Static or adaptive

C. Dynamic or Non-adaptive

D. Dynamic or adaptive


5) ........... is also a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on.

A. Shortest Path Algorithm

B. Flooding

C. Distance Vector Routing

D. Hierarchical Routing


6) .......... is basically a vector that keeps track of best known distance to each destination and which line to use to get there.

A. Shortest Path Algorithm

B. Flooding

C. Distance Vector Routing

D. Hierarchical Routing


7) In addresses for .......... networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host.

A. class A

B. class C

C. class B

D. class D


8) In .......... , the routers are divided into regions. Each router knows all details about how to route packets to destinations within its own region.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing


9) In .......... , each node uses as its fundamental data a map of the network in the form of a graph.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing


10) ......... protocols are simple and efficient in small networks, and require little, if any management.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing



11) In ........... routing algorithm, each router knows all details about how to route packets to destinations within its own region. But does not have any idea about internal structure of other regions.

A. Shortest Path Algorithm

B. Link state Routing

C. Distance Vector Routing

D. Hierarchical Routing


12) The set of optimal routers from source to a given destination from a tree rooted at the destination called a ........ tree.

A. sink

B. optimal

C. rooted

D. routing


13) .......... is a simple mathematical computation used to check for bit-level errors in the IPV4 header.

A. Identification

B. Protocol

C. Checksum

D. Time-to-Live(TTL)


14) The number of network segments on which the datagram is allowed to travel before a router should discard it is called .......

A. Identification

B. Protocol

C. Checksum

D. Time-to-Live(TTL)


15) .......... is an identifier of the upper-layer protocol to which the IPV4 payload must be passed.

A. Identification

B. Protocol

C. Checksum

D. Time-to-Live(TTL)


16) The IPV4 address of the intermediate or final destination of the IPV4 packet is called .......

A. Source IP Address

B. Destination IP Address

C. Identification

D. Checksum


17) .......... type of IPV4 address is assigned to all network interfaces located on a subnet, used for one-to-everyone on a subnet communication.

A. Unicast

B. Multicast

C. Broadcast

D. Anycast


18) The ......... header field of IPV6 indicates the number of likes on which the packet is allowed to travel before being discarded by a router.

A. Source Address

B. Destination Address

C. Next Header

D. Hop Limit


19) ......... is an identifier for either the IPV6 extension header immediately following the IPV6 header or an upper layer protocol, such as ICMPv6, TCP or UDP.

A. Source Address

B. Destination Address

C. Next Header

D. Hop Limit


20) The internet addresses are ......... bits in length in IPV4 addressing scheme.

A. 16

B. 64

C. 32

D. 48



Answers:


1) C. network layer
2) A. routing  
3) A. Static or Non-adaptive
4) D. Dynamic or adaptive
5) B. Flooding 
6) C. Distance Vector Routing
7) C. class B
8) D. Hierarchical Routing
9) B. Link state Routing
10) C. Distance Vector Routing
11) D. Hierarchical Routing
12) A. sink
13) C. Checksum
14) D. Time-to-Live(TTL)
15) B. Protocol
16) B. Destination IP Address
17) C. Broadcast
18) D. Hop Limit
19) C. Next Header
20) C. 32


Related Posts: 

For more MCQ's on Computer Networks: Click Here

الأربعاء، 24 ديسمبر 2014

Solved Objective Questions on Data Link Layer in OSI Model set-1


1) The .......... layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames.

A. Data Link

B. Physical

C. Network

D. Session


2) The service primitives provide a way for the data link layer on the requesting side to learn whether the request was successfully carried out.

A. Request

B. Indication

C. Response

D. Confirm


3) The different types of services provided by data link layer is/are ...

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. All of the above.


4) .......... is used by the network layer to ask the data link layer to do something.

A. Request

B. Indication

C. Response

D. Confirm


5) In ............... the source machine sends independent frames to the destination machine without having the destination machine acknowledge them.

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. Unacknowledged connection oriented service


6) ........... is the most sophisticated service provided by the data link layer to the network layer. The source and destination machines establish a connection before any data transfer takes place.

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. Unacknowledged connection oriented service


7) In .......... , there are still no connections used, but each frame sent is individually acknowledged.

A. Unacknowledged connectionless service

B. Acknowledged connectionless service

C. Acknowledged connection oriented service

D. Unacknowledged connection oriented service


8) ......... is used to indicate to the network layer that an event has happened, for example, establishment or release of a connection.

A. Request

B. Indication

C. Response

D. Confirm


9) .......... is used on the receiving side by the network layer to reply to a previous indication.

A. Request

B. Indication

C. Response

D. Confirm


10) In .......... we are looking only to see if any error has occurred. The answer is a simple yes or no.

A. error searching

B. error detection

C. error correction

D. error transmission


11) In ........... we need to know the exact number of bits that are corrected and more importantly, their location in the message.

A. error searching

B. error detection

C. error correction

D. error transmission


12) ............ is the process in which the receiver tries to guess the message by using redundant bits.

A. Forward error correction

B. Backward error correction

C. Transmission

D. Retransmission


13) ........... is the technique in which the receiver detects the occurrence of an error and asks the sender to resend the message.

A. Forward error correction

B. Backward error correction

C. Transmission

D. Retransmission


14) In block coding, we divide our message into blocks, each of k bits, called ........

A. Dataword

B. Generator

C. Codeword

D. Checker


15) ............ in the data link layer separates a message from one source to a destination, or from other messages to other destinations, by adding a sender address and a destination address.

A. Transforming

B. Framing

C. Separating

D. Messaging


16) In ............., there is no need for defining the boundaries of the frames; the size itself can be used a delimiter.

A. Standard Size Framing

B. Fixed Size Framing

C. Variable Size Framing

D. Constant Size Framing


17) ............ is prevalent in LANs, we need a way to define the end of the frame and the beginning of the next.

A. Standard Size Framing

B. Fixed Size Framing

C. Variable Size Framing

D. Constant Size Framing


18) Which of the following is/are the methods used for carrying out framing.

A. Character count

B. Starting and ending characters, with character stuffing.

C. Starting and ending flags with bit stuffing.

D. All of the above


19) In ............., the sender sends one frame, stops until it receives confirmation from the receiver, and then sends the next frame.

A. stop and wait protocol

B. simplest protocol

C. sliding window protocol

D. High level Data Link Control Protocol(HDLC)


20) In ......... , the sliding window is an abstract concept that defines the range of sequence numbers that is the concern of the sender and receiver.

A. stop and wait protocol

B. simplest protocol

C. sliding window protocol

D. High level Data Link Control Protocol(HDLC)

Answers:

1) A. Data Link
2) D. Confirm
3) D. All of the above
4) A. Request
5) A. Unacknowledged connectionless service
6) C. Acknowledged connection oriented service
7) B. Acknowledged connectionless service
8) B. Indication
9) B. Indication
10) B. error detection
11) C. error correction
12) A. Forward error correction
13) D. Retransmission
14) A. Dataword
15) B. Framing
16) B. Fixed Size Framing
17) C. Variable Size Framing
18) D. All of the above
19) A. stop and wait protocol
20) C. sliding window protocol


Related Posts:

For more MCQ's on Computer Networks: Click Here

الاثنين، 22 ديسمبر 2014

Solved MCQ on Physical Layer in OSI Reference Model set-1


1) Which of the following is/are the applications of twisted pair cables ......

A. In the local loop

B. In the DSL line

C. In the ISDN Network

D. All of the above


2) .......... transmission systems are widely used in the backbone of networks.

A. Unshielded Twisted Pair(UTP)

B. Shielded Twisted Pair(STP)

C. Optical Fiber

D. Wireless


3) ........... has much lower attenuation and can carry signal to longer distances without using amplifiers and repeaters in between.

A. UTP cable

B. STP cable

C. Fiber Optic cable

D. All of the above


4) The major problem(s) suffered for transmission lines on physical layer is/are .........

A. Attenuation distortion

B. Delay distortion

C. Noise

D. All of the above


5) ......... is the lost of energy as the signal propagates outward.

A. Attenuation distortion

B. Delay distortion

C. Noise

D. None of the above


6) .......... is the unwanted energy from sources other than the transmitter.

A. Attenuation distortion

B. Delay distortion

C. Noise

D. Disturbance


7) Which of the following is not the sources of noise?

A. Thermal

B. Magnetic

C. Inter-modulation

D. Cross talk


8) Data rate in data communication depends on which of the following factors.

A. The bandwidth available

B. The level of the signals we use

C. The quality of the channel

D. All of the above


9) ........... is the physical path between the transmitter and receiver.

A. Transmission media

B. Physical media

C. Transmission path

D. Receiving path


10) The key concern in design of data transmission system is Data Rate and .........

A. Data Path

B. Data flow

C. Distance

D. Frequencies



11) A ............ network is none that establishes a dedicated circuit between nodes and terminals before the users may communicate.

A. Message switching

B. Physical switching

C. circuit switching

D. packet switching


12) Which of the following is not the phase involved in circuit switching network?

A. Connection start

B. Connection establishment

C. Data transfer

D. Termination


13) ........... is also known as store and forward switching since the messages are stored at intermediate nodes in route to their destinations.

A. Message switching

B. Physical switching

C. circuit switching

D. packet switching


14) State True or False for the following characteristics of optical fiber cables.

i) The cost of fiber optic cable is more compared to twisted pair and co-axial.

ii) The installation of fiber optic cable is much easier.

A. i-True, ii-True

B. i-False, ii-True

C. i-True, ii-False

D. i-False, ii-False


15) ............ splits traffic data into chunks.

A. Message switching

B. Linear switching

C. circuit switching

D. packet switching


16) ........... is used to optimize the use of the channel capacity available in a network, to minimize the transmission latency and to increase robustness of communication.

A. Message switching

B. Linear switching

C. circuit switching

D. packet switching


17) The term ......... describes the position of the waveform relative to time 0.

A. Frequency

B. Phase

C. Phase Shift

D. Time period


18) If the value of a signal changes over a very short span of time, it's frequency is .......

A. short

B. low

C. high

D. long


19) What is/are the services provided by ISDN?

i. Data applications

ii. Teletext services

iii. Videotext services

iv. Fascimile(FAX)

A. i, ii and iii only

B. ii, iii and iv only

C. i, iii and iv only

D. All i, ii, iii and iv


20) ............. used in telephone network for bi-directional, real time transfer between computers.

A. Message switching

B. Circuit switching

C. Packet switching

D. Circular switching


Answers:


1) D. All of the above
2) C. Optical Fiber
3) C. Fiber Optic cable
4) D. All of the above
5) A. Attenuation distortion
6) C. Noise
7) B. Magnetic
8) D. All of the above
9) A. Transmission media
10) C. Distance
11) C. circuit switching
12) A. Connection start
13) A. Message switching
14) C. i-True, ii-False
15) D. packet switching
16) D. packet switching
17) B. Phase
18) C. high
19) D. All i, ii, iii and iv
20) B. Circuit switching


Related Posts:

For more MCQ's on Computer Networks: Click Here


    Solved MCQ on Network Layer in Computer Networks set-1


    1. The ........ layer links the network support layers and the user support layers.

    A. transport

    B. network

    C. data link

    D. session


    2) The ............. layer changes bits into electromagnetic signals.

    A. physical

    B. data link

    C. transport

    D. network


    3) The .......... layer coordinates the functions required to transmit a bit stream over a physical medium.

    A. transport

    B. network

    C. data link

    D. physical


    4) Which of the following is an application layer service?

    A. remote log-in.

    B. file transfer and access.

    C. mail service

    D. all of the above


    5) The ......... layer is responsible for the source-to-destination delivery of a packet across multiple network links.

    A. transport

    B. network

    C. data link

    D. session


    6) The .......... layer is the layer closest to the transmission medium.

    A. physical

    B. data link

    C. network

    D. transport


    7) The ...........layer is responsible for the process-to-process delivery of th entire message.

    A. transport

    B. network

    C. data link

    D. physical


    8) Mail services are available to network users through the .......... layer.

    A. data link

    B. physical

    C. transport

    D. application


    9) The ........... layer establishes, maintains, and synchronizes the interactions between communicating devices.

    A. transport

    B. network

    C. session

    D. physical


    10) The .......... layer lies between the network layer and the application layer.

    A. physical

    B. data link

    C. transport

    D. session


    11) The .......... layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format.

    A. transport

    B. network

    C. data link

    D. presentation


    12) Transmission media lies below the .........layer.

    A. physical

    B. network

    C. transport

    D. application


    13) The ........... layer enables the users to access the network.

    A. session

    B. application

    C. data link

    D. physical


    14) Circuit switching takes place at the .......... layer.

    A. data link

    B. physical

    C. network

    D. transport


    15) The ............ layer is responsible for moving frames form one node to the next.

    A. physical

    B. data link

    C. transport

    D. session


    16) The routing processor of a router performs the ........ layer functions of the router.

    A. physical and data link

    B. network

    C. transport

    D. session


    17) The ............. layer adds a header to the packet coming from the upper layer that includes the logical address of the sender and receiver.

    A. physical

    B. data link

    C. network

    D. transport


    18) Network layer lies on .......... layer.

    A. physical

    B. data link

    C. network

    D. transport


    19) The ...........layer is responsible for the delivery of a message from one process to another.

    A. physical

    B. transport

    C. network

    D. session


    20) The data link layer takes the packet it gets from the network layer and encapsulates them into ......

    A. cells

    B. frames

    C. packet

    D. trailer


    Answers:


    1) A. transport
    2) A. physical
    3) D. physical
    4) D. all of the above
    5) B. network
    6) A. physical
    7) A. transport
    8) D. application
    9) C. session
    10) C. transport
    11) D. presentation
    12) A. physical
    13) B. application
    14) B. physical
    15) B. data link
    16) B. network
    17) C. network
    18) A. physical
    19) B. transport
    20) B. frames


    Related Posts:

    For more MCQ's on Computer Networks: Click Here

    الأحد، 21 ديسمبر 2014

    Interview Questions on TCP/IP and UDP in Computer Networks set-2


    1) UDP needs the ........... address to deliver the user datagram to the correct application process

    A. port

    B. application

    C. internet

    D. intranet


    2) The ........ was originally developed as a mechanism to enable disk-less hosts to be remotely booted over a network as workstations, routers, terminal concentrators and so on.

    A. ICMP

    B. BOOTP

    C. UDP

    D. ARP


    3) Which of the following does UDP guarantee?

    A. Flow control

    B. Connection-oriented delivery

    C. Data control

    D. None of the above


    4) .......... provides a framework for passing configuration information to hosts on a TCP/IP network.

    A. Dynamic Host Configuration Protocol(DHCP)

    B. Address Resolution Protocol(ARP)

    C. Internet Protocol(IP)

    D. Internet Control Message Protocol(ICMP)


    5) The source port address on the UDP user datagram header defines .........

    A. the sending computer

    B. the receiving computer

    C. the process running on the sending computer

    D. the process running on the receiving computer


    6) The mechanisms supported by DHCP for IP address allocation on a TCP/IP network is/are ...

    A. Automatic allocation

    B. Dynamic allocation

    C. Manual allocation

    D. All of th above


    7) UDP is called a .......... transport protocol.

    A. connection-oriented, unreliable

    B. connectionless, reliable

    C. connectionless, unreliable

    D. connection, reliable


    8) DHCP in TCP/IP network assigns an IP address for a limited period of time. Such a network address is called a ......

    A. lease

    B. limited network

    C. timed network

    D. assigned network


    9) UDP does not add anything to the services of IP except for providing .......... communication.

    A. node to node

    B. process to process

    C. host to host

    D. interface to interface


    10) The use of ......... allows centralized configuration of multiple clients.

    A. ICMP

    B. BOOTP

    C. UDP

    D. ARP


    11) UDP is an acronym for ............

    A. User Delivery Protocol

    B. User Datagram Procedure

    C. User Datagram Protocol

    D. User Delivery Procedure


    12) ............ is where users typically interact with the TCP/IP network.

    A. Link layer

    B. Network layer

    C. Transport layer

    D. Application layer


    13) The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called .........

    A. UDP addresses

    B. transport addresses

    C. port addresses

    D. TCP addresses


    14) The ............. is responsible for communicating with the actual network hardware.

    A. Link layer

    B. Network layer

    C. Transport layer

    D. Application layer


    15) UDP packets are encapsulated in .......

    A. an Ethernet frame

    B. an TCP segment

    C. an IP datagram

    D. an Ethernet packets


    16) ............ is the protocol suite for the current Internet.

    A. TCP/IP

    B. NCP

    C. UDP

    D. ACM


    17) UDP uses ........ to handle outgoing user datagrams from multiple processes on one host.

    A. flow control

    B. multiplexing

    C. demultiplexing

    D. data control


    18) .......... provides full transport layer services to applications.

    A. TCP

    B. UDP

    C. IP

    D. ARP


    19) UDP uses ...... to handle incoming user datagrams that go to different processes on the same host.

    A. flow control

    B. multiplexing

    C. demultiplexing

    D. data control


    20) In the sending computer, UDP receives a data unit from the ......... layer.

    A. application

    B. transport

    C. IP

    D. interface

    Answers:

    1) A. port
    2) B. BOOTP
    3) D. None of the above
    4) A. Dynamic Host Configuration Protocol(DHCP)
    5) C. the process running on the sending computer
    6) D. All of th above 
    7) C. connectionless, unreliable
    8) A. lease
    9) B. process to process
    10) B. BOOTP
    11) C. User Datagram Protocol
    12) D. Application layer
    13) C. port addresses
    14) A. Link layer
    15) C. an IP datagram
    16) A. TCP/IP
    17) B. multiplexing
    18) A. TCP
    19) C. demultiplexing
    20) A. application



    Related Posts:

    For more MCQ's on Computer Networks: Click Here

    السبت، 20 ديسمبر 2014

    Solved MCQ on TCP/IP and UDP in Computer Networks set-1


    1) TCP is a .......... protocol.

    A. stream-oriented

    B. message-oriented

    C. block-oriented

    D. packet-oriented


    2) Which of the following is not the layer of TCP/IP protocol.

    A. Physical layer

    B. link layer

    C. network layer

    D. transport layer.


    3) TCP groups a number of bytes together into a packet called a ....

    A. user datagram

    B. segment

    C. datagram

    D. packet


    4) The .......... of TCP/IP protocol is responsible for figuring out how to get data to its destination.

    A. application layer

    B. link layer

    C. network layer

    D. transport layer.


    5) TCP is a(n) ........... transport protocol.

    A. protocol delivery

    B. reliable

    C. best-effort delivery

    D. effortless delivery


    6) ......... is the protocol that hides the underlying physical network by creating a virtual network view.

    A. Internet Protocol(IP)

    B. Internet Control Message Protocol(ICMP)

    C. Address Resolution Protocol(ARP)

    D. Bootstrap Protocol(BOOTP)


    7) To use the services of UDP, we need ......... socket addresses.

    A. four

    B. two

    C. three

    D. four


    8) Which of the following is not the name of Regional Internet Registries(RIR) to administer the network number portion of IP address.

    A. American Registry for Internet Numbers(ARIN)

    B. Reseaux IP Europeans(RIPE)

    C. Europeans Registry for Internet Numbers(ERIN)

    D. Asia Pacific Network Information Center(APNIC)


    9) UDP packets are called .......

    A. user datagrams

    B. segments

    C. frames

    D. packets


    10) ............ addresses use 21 bits for the and 8 bits for the portion of the IP address for TCP/IP network.

    A. Class A

    B. Class B

    C. Class C

    D. Class D


    11) UDP packets have fixed-size header of .......... bytes.

    A. 16

    B. 8

    C. 32

    D. 64


    12) .......... messages are never sent in response to datagrams with a broadcast or a multicast destination address.

    A. ICMP

    B. ARP

    C. IP

    D. BOOTP


    13) TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is number of the ....... byte carried in that segment.

    A. first

    B. last

    C. middle

    D. zero


    14) .......... is responsible for converting the higher level protocol address (IP addresses) to physical network addresses.

    A. Internet Protocol(IP)

    B. Internet Control Message Protocol(ICMP)

    C. Address Resolution Protocol(ARP)

    D. Bootstrap Protocol(BOOTP)


    15) UDP and TCP are both ......... layer protocols.

    A. data link

    B. network

    C. transport

    D. interface


    16) ........... is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from upper layer.

    A. TCP

    B. UDP

    C. IP

    D. ARP


    17) Which of the following functions does UDP perform?

    A. Process-to-process communication

    B. Host-to-host communication

    C. End-to-end reliable data delivery

    D. Interface-to-interface communication.


    18) A port address in TCP/IP is .........bits long.

    A. 32

    B. 48

    C. 16

    D. 64


    19) When the IP layer of a receiving host receives a datagram, .....

    A. delivery is complete

    B. a transport layer protocol takes over

    C. a header is added

    D. a session layer protocol takes over


    20) TCP/IP is a .......... hierarchical protocol suite developed before the OSI model.

    A. seven-layer

    B. five-layer

    C. six-layer

    D. four-layer



    Answers:


    1) A. stream-oriented
    2) A. Physical layer
    3) B. segment
    4) C. network layer
    5) B. reliable
    6) A. Internet Protocol(IP)
    7) B. two
    8) C. Europeans Registry for Internet Numbers(ERIN)
    9) A. user datagrams
    10) C. Class C
    11) B. 8
    12) A. ICMP
    13) A. first
    14) C. Address Resolution Protocol(ARP)
    15) C. transport
    16) B. UDP
    17) A. Process-to-process communication
    18) C. 16
    19) B. a transport layer protocol takes over
    20) B. five-layer



    Related Posts:

    For more MCQ's on Computer Networks: Click Here


    الجمعة، 19 ديسمبر 2014

    Objective Questions on Routing protocol in computer networks set-3


    1) The principle of ...........states that the routing table is stored from the longest mask to the shortest mask.

    A. first mask matching

    B. shortest mask matching

    C. longest mask matching

    D. very shortest mask matching


    2) ............ are two popular examples of distance vector routing protocols.

    A. OSPF and RIP

    B. RIP and BGP

    C. BGP and OSPF

    D. BGP and SPF


    3) ...... deals with the issues of creating and maintaining routing tables.

    A. Forwarding

    B. Routing

    C. Directing

    D. None directing


    4) During an adverse condition, the length of time for every device in the network to produce an accurate routing table is called the ..........

    A. accurate time

    B. integrated time

    C. convergence time

    D. average time


    5) A ......... routing table contains information entered manually.

    A. static

    B. dynamic

    C. hierarchical

    D. non static


    6) Which of the following is/are the uses of static routing methods.

    A. To manually define a default route.

    B. To provide more secure network environment.

    C. To provide more efficient resource utilization.

    D. All of the above


    7) A .......... routing table is updated periodically using one of the dynamic routing protocols.

    A. static

    B. dynamic

    C. hierarchical

    D. non static


    8) Which of the following is not the category of dynamic routing algorithm.

    A. Distance vector protocols

    B. Link state protocols

    C. Hybrid protocols

    D. Automatic state protocols


    9) In ......... forwarding, the full IP address of a destination is given in the routing table.

    A. next-hop

    B. network-specific

    C. host-specific

    D. default


    10) To build the routing table, ........... algorithms allow routers to automatically discover and maintain awareness or the paths through the network.

    A. Static routing

    B. Dynamic routing

    C. Hybrid routing

    D. Automatic routing


    11) In .......... forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table.

    A. next-hop

    B. network-specific

    C. host-specific

    D. default


    12) To build the routing table, ........... method use preprogrammed definitions representing paths through the network.

    A. Static routing

    B. Dynamic routing

    C. Hybrid routing

    D. Automatic routing


    13) In .......... forwarding, the destination addresses is a network address in the routing table.

    A. next-hop

    B. network-specific

    C. host-specific

    D. default


    14) ......... allow routers to exchange information within an AS.

    A. Interior Gateway Protocol(IGP)

    B. Exterior Gateway Protocol(EGP)

    C. Border Gateway Protocol(BGP)

    D. Static Gateway Protocol(SGP)


    15) In .......... forwarding, the routing table holds the address of just the next hop instead of complete route information.

    A. next-hop

    B. network-specific

    C. host-specific

    D. default


    16) Which of the following is an example of Exterior Gateway Protocol.

    A. Open Short Path First(OSPF)

    B. Border Gateway Protocol(BGP)

    C. Routing Information Protocol(RIP)

    D. All of the above


    17) A one-to-all communication between one source and all hosts on a network is classified as a .........

    A. unicast

    B. multicast

    C. broadcast

    D. point to point


    18) ........ allow the exchange of summary information between autonomous systems.

    A. Interior Gateway Protocol(IGP)

    B. Exterior Gateway Protocol(EGP)

    C. Border Gateway Protocol(BGP)

    D. Dynamic Gateway Protocol(DGP)


    19) A robust routing protocol provides the ability to ......... build and manage the information in the IP routing table.

    A. dynamically

    B. statically

    C. hierarchically

    D. All of the above


    20) State True of False for definition of an autonomous system(AS).

    i) An AS is defined as a physical portion of a larger IP network.

    ii) An AS is normally comprised of an internetwork within an organization.

    A. i-True, ii-True

    B. i-True, ii-False

    C. i-False, ii-True

    D. i-False, ii-False

       

    Answers:


    1) C. longest mask matching
    2) B. RIP and BGP
    3) B. Routing
    4) C. convergence time
    5) A. static
    6) D. All of the above
    7) B. dynamic
    8) D. Automatic state protocols
    9) C. host-specific
    10) B. Dynamic routing
    11) D. default
    12) A. Static routing
    13) B. network-specific
    14) A. Interior Gateway Protocol(IGP)
    15) A. next-hop
    16) B. Border Gateway Protocol(BGP)
    17) C. broadcast
    18) B. Exterior Gateway Protocol(EGP)
    19) A. dynamically
    20) C. i-False, ii-True


    Related Posts:

    For more MCQ's on Computer Networks: Click Here