Networking Test Questions - Set 2

1)   Which of the following is true about Domain Name System (DNS)?

a. DNS is the client server application.
b. It uses alias names for identifying the sender and receiver instead of an IP address. So the alias address has to be mapped to the IP address.
c. It identifies sender and receiver so they should be known to each other.
d. All of the above.
Answer  Explanation 

ANSWER: All of the above.

Explanation:
No explanation is available for this question!


2)   What is Packetizing?

a. It is a process of dividing a long message into smaller ones.
b. It is a process of encapsulating the packets into the data fields of the transport layer packet.
c. It is a process of an adding headers to each packet to allow the transport layer for performing its other functions.
d. All of the above.
Answer  Explanation 

ANSWER: All of the above.

Explanation:
No explanation is available for this question!


3)   Connection-oriented is a _______ connection.

a. secure
b. virtual
c. stable
d. reliable
Answer  Explanation 

ANSWER: virtual

Explanation:
No explanation is available for this question!


4)   Which of the following is/are the advantages of connection-oriented networking

a. Quality of service
b. No Priority service
c. Bandwidth utilization
d. All of the above
Answer  Explanation 

ANSWER: All of the above

Explanation:
No explanation is available for this question!


5)   The connection oriented service is a dedicated connection between the users before the data is exchanged.

a. True
b. False
Answer  Explanation 

ANSWER: True

Explanation:
No explanation is available for this question!


6)   Which of the following statements is/are not true about Persistent HTTP?

a. TCP connection is closed after the interval timeout by the http server.
b. The new connection is established and maintained for each request object.
c. Persistent will use HTTP version 1.1.
d. None of the above
Answer  Explanation 

ANSWER: TCP connection is closed after the interval timeout by the http server.

Explanation:
No explanation is available for this question!


7)   Which of the following statements is/are correct about Non Persistent HTTP?

a. Non Persistent HTTP connection is also called as HTTP keep-alive.
b. All the requests and responses between client and server can be sent over the same connection.
c. Non persistent uses HTTP version 2.0
d. All of the above
Answer  Explanation 

ANSWER: All the requests and responses between client and server can be sent over the same connection.

Explanation:
No explanation is available for this question!


8)   What is the default port of HTTP?

a. 20
b. 101
c. 80
d. 60
Answer  Explanation 

ANSWER: 80

Explanation:
No explanation is available for this question!


9)   The protocol which is used for defining the legal request and replies is called ______ .

a. FTP
b. SMTP
c. TCP
d. HTTP
Answer  Explanation 

ANSWER: HTTP

Explanation:
No explanation is available for this question!


10)   Three way handshake technique in TCP is used __________.

a. to indicate the problems.
b. to solve the problem of delayed duplicate packet.
c. for data transmission
d. all of the above
Answer  Explanation 

ANSWER: to solve the problem of delayed duplicate packet.

Explanation:
No explanation is available for this question!


11)   What is/are the parameters of Quality of Service?

a. Connection establishment delay
b. Connection establishment failure probability
c. Protection and Priority
d. All of the above
e. None of the above
Answer  Explanation 

ANSWER: All of the above

Explanation:
No explanation is available for this question!


12)   What is the difference between TCP and UDP?

a. TCP guarantees that a packet will reach the destination without any duplication while UDP does not provide this guarantee.
b. The order of data will be same in TCP but that won't be so in UDP.
c. TCP is unreliable protocol but UDP is a reliable protocol.
d. Only a and b
e. Only b and c
Answer  Explanation 

ANSWER: Only a and b

Explanation:
No explanation is available for this question!


13)   Which algorithm is best for use in TCP congestion avoidance?

a. MIMD
b. AIAD
c. Both a and b
d. AlMD
Answer  Explanation 

ANSWER: AlMD

Explanation:
No explanation is available for this question!


14)   Which of the following congestion control will not give converge in TCP congestion avoidance?

a. MIMD
b. AIAD
c. Both a and b
d. AIMD
Answer  Explanation 

ANSWER: Both a and b

Explanation:
No explanation is available for this question!


15)   Which of the following statements is/are true if the transport layer is removed from the TCP/IP protocol stack?

a. Flow control will be handled
b. Data transfer will be reliable.
c. Byte stream won't be transferred to another machine.
d. None of the above
Answer  Explanation 

ANSWER: Byte stream won't be transferred to another machine.

Explanation:
No explanation is available for this question!


16)   If all the links on the internet provide reliable delivery services, then will this TCP delivery service be redundant?

a. Yes
b. No
Answer  Explanation 

ANSWER: No

Explanation:
No explanation is available for this question!


17)   Abbreviate RSVP

a. Resource Service Virtual Protocol
b. Resource Reservation Protocol
c. Receiver Service Virtual Protocol
d. Receiver Reservation Protocol
Answer  Explanation 

ANSWER: Resource Reservation Protocol

Explanation:
No explanation is available for this question!


18)   What is/are the characteristics of RSVP?

a. It doesn’t provide reservations for bandwidth in multicast trees.
b. It is a receiver oriented.
c. Both a and b
d. None of the above
Answer  Explanation 

ANSWER: It is a receiver oriented.

Explanation:
No explanation is available for this question!


19)   Consider the following things which RSVP cannot do in the network?

a. It doesn’t specify the exactly reservation of the bandwidth.
b. It is not a routing protocol.
c. It does not perform any signaling operation.
d. All of the above.
Answer  Explanation 

ANSWER: All of the above.

Explanation:
No explanation is available for this question!


20)   Which of the following statements is/are not correct about Leaky Bucket Algorithm?

a. It is a bucket with a hole at bottom.
b. Packets are never lost.
c. A variant on the leaky bucket is the token bucket.
d. Leaky bucket doesn't have the finite queue length.
Answer  Explanation 

ANSWER: Leaky bucket doesn't have the finite queue length.

Explanation:
No explanation is available for this question!