1) Which of the following is true about Domain Name System (DNS)? a. DNS is the client server application. b. It uses alias names for identifying the sender and receiver instead of an IP address. So the alias address has to be mapped to the IP address. c. It identifies sender and receiver so they should be known to each other. d. All of the above.
|
||||
2) What is Packetizing? a. It is a process of dividing a long message into smaller ones. b. It is a process of encapsulating the packets into the data fields of the transport layer packet. c. It is a process of an adding headers to each packet to allow the transport layer for performing its other functions. d. All of the above.
|
||||
3) Connection-oriented is a _______ connection. a. secure b. virtual c. stable d. reliable
|
||||
4) Which of the following is/are the advantages of connection-oriented networking a. Quality of service b. No Priority service c. Bandwidth utilization d. All of the above
|
||||
5) The connection oriented service is a dedicated connection between the users before the data is exchanged. a. True b. False
|
||||
6) Which of the following statements is/are not true about Persistent HTTP? a. TCP connection is closed after the interval timeout by the http server. b. The new connection is established and maintained for each request object. c. Persistent will use HTTP version 1.1. d. None of the above
|
||||
7) Which of the following statements is/are correct about Non Persistent HTTP? a. Non Persistent HTTP connection is also called as HTTP keep-alive. b. All the requests and responses between client and server can be sent over the same connection. c. Non persistent uses HTTP version 2.0 d. All of the above
|
||||
8) What is the default port of HTTP? a. 20 b. 101 c. 80 d. 60
|
||||
9) The protocol which is used for defining the legal request and replies is called ______ . a. FTP b. SMTP c. TCP d. HTTP
|
||||
10) Three way handshake technique in TCP is used __________. a. to indicate the problems. b. to solve the problem of delayed duplicate packet. c. for data transmission d. all of the above
|
||||
11) What is/are the parameters of Quality of Service? a. Connection establishment delay b. Connection establishment failure probability c. Protection and Priority d. All of the above e. None of the above
|
||||
12) What is the difference between TCP and UDP? a. TCP guarantees that a packet will reach the destination without any duplication while UDP does not provide this guarantee. b. The order of data will be same in TCP but that won't be so in UDP. c. TCP is unreliable protocol but UDP is a reliable protocol. d. Only a and b e. Only b and c
|
||||
13) Which algorithm is best for use in TCP congestion avoidance? a. MIMD b. AIAD c. Both a and b d. AlMD
|
||||
14) Which of the following congestion control will not give converge in TCP congestion avoidance? a. MIMD b. AIAD c. Both a and b d. AIMD
|
||||
15) Which of the following statements is/are true if the transport layer is removed from the TCP/IP protocol stack? a. Flow control will be handled b. Data transfer will be reliable. c. Byte stream won't be transferred to another machine. d. None of the above
|
||||
16) If all the links on the internet provide reliable delivery services, then will this TCP delivery service be redundant? a. Yes b. No
|
||||
17) Abbreviate RSVP a. Resource Service Virtual Protocol b. Resource Reservation Protocol c. Receiver Service Virtual Protocol d. Receiver Reservation Protocol
|
||||
18) What is/are the characteristics of RSVP? a. It doesn’t provide reservations for bandwidth in multicast trees. b. It is a receiver oriented. c. Both a and b d. None of the above
|
||||
19) Consider the following things which RSVP cannot do in the network? a. It doesn’t specify the exactly reservation of the bandwidth. b. It is not a routing protocol. c. It does not perform any signaling operation. d. All of the above.
|
||||
20) Which of the following statements is/are not correct about Leaky Bucket Algorithm? a. It is a bucket with a hole at bottom. b. Packets are never lost. c. A variant on the leaky bucket is the token bucket. d. Leaky bucket doesn't have the finite queue length.
|