Internetworking with TCP/IP

  

 

1-Marks Questions

 

QS 1. The ISOC sponsors the --------, a technical advisory group that sets internet standards publishes RFCs and oversees the internet standards process.

  1. IANA
  2. IAB
  3. IRTF
  4. IETF

Qs 2. The standards for TCP are published in a series of documents called----------

  1. IETF
  2. IAB
  3. RFCs
  4. none of the above

Qs 3. Transmission control Protocol / Internet protocol is an industry standard suite of protocols that is designed for large networks consisting of network segments that are connected by routers.

  1. True
  2. false

 

Qs 4.The four layers of the -------------- Model are application, transport, internet and Network interface

  1. Network
  2. DARPA
  3. none of the above
  4. all of the above

Qs 5. The protocol data unit (PDU) that exists at the internet layer and comprises an IP header and payload.

  1. Correct
  2. Incorrect

Qs 6.IPv4 also known as IP and Network interface layer also called as Network access layer

  1. true
  2. false

Qs 7. Addressing , packaging and routing functions are the responsibilities that comes under the ---------- layer.

  1. Network
  2. Internet
  3. Transport
  4. Application layer

Qs 8. The Routing information Protocol (RIP) is a protocol that routers use to exchange routing information on an IP network

  1. true
  2. false

Qs 9. FDDI stands for ------------

  1. fiber distributed data interface
  2. foreign distributed data interface
  3. flexible distributed digital interaction
  4. frequent digital data interface

Qs 10. the 802.2 Logical link control (LLC) layer above IEEE 802.3 uses a concept known as -------------

  1. link service access point (LSAP)
  2. Load service advanced point
  3. local service access point
  4. none of the above

Qs 11. The TCP /IP protocol family runs over a variety of network media -----------

  1. IEEE 802.3, satellite links
  2. 802.5 LANs, serial lines
  3. X.25 lines
  4. all of the above are correct

Qs 12. ------------ is a network-specific standard protocol and it is described in RFC 1661 and RFC 1662

  1. TCP /IP
  2. FTP
  3. PPP
  4. SMTP

Qs 13. The ISDN --------- usually supports two B-channels with a capacity of 64 kbps each and a 16 kbps each and a 16 kbps D-channel for control information.

  1. BRI (Basic rate Interface)
  2. X.25
  3. LCP
  4. NCP

Qs 14. ----------contain the necessary information to identify the protocol carried within the protocol data unit thus allowing the receiver to properly process the incoming packet.

  1. Packets
  2. Frames
  3. Layers
  4. none of the above

Qs 15. The address resolution in an ATM logical IP subnet is done by the ATM -----------based on RFC 826 .

  1. Address resolution protocol (ATMARP)
  2. Accurate result protocol
  3. Access resolution protocol
  4. Acquire resolution protocol

Qs 16. PPS uses ------------ for establishing, configuring and testing the data link connection.

  1. LCP
  2. ARP
  3. NCP
  4. PVCs

Qs 17. IP is the protocol that hides the underlying physical network by creating ------

  1. logical view
  2. virtual view
  3. physical view
  4. all of the above

Qs 18. The unit of transfer in an IP network is called an ----------------- .

  1. packets
  2. frame
  3. IP datagram
  4. all of the above

Qs 19. Each physical network has a ------------ frame size this is called the -------------frame size

  1. maximum, minimum
  2. minimum, maximum
  3. maximum, maximum
  4. minimum, minimum

Qs 20. the netstat command can not be used on some IP hosts to list the details of fragmentation.

  1. correct
  2. Incorrect

Qs 21. SACK stands for ---------

  1. selective Acknowledgement
  2. serial acknowledgement
  3. serial access
  4. all are correct

Qs 22. There are two indications of packet loss : a timeout occurs and duplicate Acks are received during ----------

  1. slow start
  2. congestion avoidance
  3. fast retransmit
  4. fast recovery

Qs 23.During the fast recovery algorithum , after fast retransmit sends what appears to be the missing segment, congestion avoidance, but not slow start is performed.

  1. true
  2. false

Qs 24. Interior Gateway protocols allows routers to exchange information within an ------

  1. Autonomous system (AS)
  2. Network system
  3. stand alone system
  4. none of the above

Qs 25. Distance vector protocols ,Link state protocols , Path vector protocols and hyprid protocols are the protocols that supports ---------

  1. static routing
  2. dynamic routing
  3. both of the above
  4. none of the above

Qs 26. Static routing uses preprogrammed definitions representing paths through the network.

  1. true
  2. false

 

   Qs 27. Distance vector algorithums are examples of ------- routing protocols . These algorithums allow each device in the network to automatically build and maintain a local IP routing table.

  1. static
  2. dynamic

Qs 28. Each router advertises a list of all directly connected network links and the associated cost of each link this is performed through the exchange of --------with other routers in the network

  1. link state advertisement (LSAs)
  2. local state access
  3. Logical state advertisement
  4. Link sequence advertisement

Qs 29. RIP stands for ---------

  1. Routing information protocol
  2. Request information protocol
  3. Response information protocol
  4. none of the above

Qs 30. RIP packets are not transmitted using UDP (user datagram protocol).

  1. correct
  2. Incorrect

Qs 31. ------------ is one of the first protocols developed for communication between autonomous system.

  1. EIGRP
  2. EGP
  3. RIP-2
  4. UDP

Qs 32. Route redistribution is the process of introducing external routes into an -----------network

  1. BGP
  2. OSPF
  3. Hybrid
  4. EGP

Qs 33. The Internet Group Management Protocol is used by hosts to join or leave a multicast host group.

  1. true
  2. false

Qs 34. IGMPv3 group record fields are : ------

  1. record type and current state
  2. filter mode change
  3. source list change
  4. all of the above

Qs 35. DVMRP is an ------------ gateway protocol.

  1. exterior
  2. interior
  3. intermediate
  4. all of the above

Qs 36. PIM (protocol independent multicast) provides the ability to switch between spare mode and dense mode.

  1. true
  2. false

Qs 37. ---------- manages the forwarding of different packets stream in hosts and routers based on their service class using queue mgmt and scheduling algorithums

  1. packet classifier
  2. packet scheduler
  3. admission control
  4. none of the above

Qs 38. the ----------- identifies packets of an IP flow in hosts and routers that will receive a certain level of service.

  1.  packet classifier
  2. packet scheduler
  3. admission control
  4. none of the above

Qs 39. RSVP means

  1. Resource Reservation Protocol
  2. Response Resource protocol
  3. Response required protocol
  4. Resource response protocol

Qs 40. The Adspec object is used to provide ----------information to the traffic control modules in the RSVP nodes along the path.

  1. network
  2. advertising
  3. packet
  4. datagram

 

 

 

 

2-Marks Questions

 

Qs 1. A firewall can be ---------- . A firewall can consists of one or more of the following functional requirements -----------

  1. PC, packet-filtering router
  2. Midrange mainframe , application levell gateway
  3. unix workstation or router , circuit level gateway
  4. all of the above , all of the above

Qs 2. FTP an be used in modes --------- FTP proxy in the firewall can be configured to deny PUT and MPUT commands

  1. normal mode, true
  2. passive mode, false
  3. both (normal and passive ), true statement
  4. none of the above is correct

 

Qs 3. A ------------- is a system that enforces a security policy between a secure internal network and an untrusted network such as internet. ----------- is a type of Firewall consisting of a packet-filtering router and an application-level gateway.

  1. firewall , screened host firewall
  2. Encryption , screened host firewall
  3. Password , screened client firewall
  4. Encryption, server firewall

Qs 4. ------------ is a way to resolve meaningful and easy-to-remember names to IP addresses. IP address resolution to hosts on the internet or for local hosts are the major tasks of DNS.

  1. IP, false
  2. DNS, True statement
  3. DNS , False statement
  4. TCP /IP, true statement

Qs 5. The DNS uses the concepts of a ---------- . symbolic names are grouped into zones of authority , more commonly referred to as -----------.

  1. Distributed name space , zones
  2. Common name , regions
  3. unique name , areas
  4. none of the above is correct

Qs 6. (i)Gethostbyname() system call asks for the IP address of a host by passing the host name

(ii)Gethostname() system call asks for a host name of a host by passing the IP address.

  1. (i) true (ii)false
  2. (i) false(ii)false
  3. (i) false(ii)true
  4. (i) true (ii)true

Qs 7. a ----------- server that does not have authority for any zone is called a caching –only name server. A ----------- loads a zone’s information from disk and has authority over the zone.

  1. name, secondary name server
  2. name , primary name server
  3. name, name server
  4. all are correct

Qs 8. The domain name system’s distributed database is composed of ----------.

Resource records provide a mapping between domain names and ---------------

 

  1. Resource records, network objects
  2. Reused records. Objects
  3. Authority records, network objects
  4. none of the above , all of the objects are valid

Qs 9. SOA and NS stands for

  1. Series of Authority, name Server
  2. start authority, primary name server
  3. start authority, secondary name server
  4. Start of Authority, Name server

Qs 10. Country domains are also called as -----------. If domain name does not end in a dot, it is incomplete and the -------- may complete this by appending a suffix.

  1. National domains, DNS resolver
  2. Geographic , DNS resolver
  3. International , Server
  4. State, DNS

 

Qs 11. Telnet is a standard protocol with STD number -------. Its status is recommended . it is described in RFC 854- telnet protocol specification and RFC 855- telnet option specifications.

  1. 3, true
  2. 8 , true
  3. 2, false
  4. 8, false

Qs 12. NVT and IAC means --------- and ------------- respectively

  1. Network virtual terminal, Imagine as command
  2. Network visual terminal, Imagine as command
  3. Network visual terminal, Interpret as call
  4. Network virtual terminal, Interpret as command

Qs 13. (i)An NVT is an imaginary device with a basic structure common to a wide range of real terminals

(ii)WONT command shows refusal to use or continue to use options

  1. (i)False (ii)True
  2. (i)False (ii)false
  3. (i)False (ii)True
  4. (i)True (ii)True

Qs 13. In an active transfer the FTP client sends a PORT command to the FTP server, indicating ----------- and ------------ on which the client will listen for a connection.

  1. IP address, Port number
  2. login ID, terminal number
  3. IP address, terminal number
  4. machine name , terminal name

Qs 14. POP stands for ------------ and IMAP stands for -----------

  1. Post office protocol, Internal message access protocol
  2. Post office protocol , internet message access protocol
  3. Periodic office protocol, Interpret message access protocol
  4. Post office protocol, Interpret message access protocol

Qs 15. The post office protocol version 3, is a standard protocol with STD number 53. its status is elective and it is described in -------- . the older POP version 2 is defined in ------

  1. RFC 1987, RFC 0937
  2. RFC 1987, RFC 0947
  3. RFC 1989, RFC 0937
  4. RFC 1939, RFC 0937

Qs 16.The SMTP destination addresses also known as the ------------ . Sending mail through a mail gateway can alter the ----------- delivery specification.

  1. mailbox addresses, end-to-end
  2. mailing , peer-to-peer
  3. mass mailing, point to point
  4. all are correct

Qs 17. (i)the sender SMTP establishes a 3-way connection with a receiver SMTP

(ii)Each POP3 argument can be up to 40 characters long

  1. (i)True (ii)false
  2. (i)false(ii)false
  3. (i)True (ii)true
  4. (i)false(ii)true

Qs 18. PSTN and VOIP means

  1. (i)Public switched telephone network (ii)voice over internet protocol

      2.   (i)Private switched telephone network (ii)voice over internet protocol

      3. (i)Public switched telephone network (ii)visual over internet protocol

      4. (i)Public switched telephone network (ii)variant over internet protocol

Qs 19. ATAs typically have two ports : a telephone jack (FXS port ) and -------------- the complexity of the CODEC is -----------

  1. a LAN port , 30 MIPS
  2. a WAN port , 30 MIPS
  3. a LAN port , 10 MIPS
  4. a LAN port , 30 MIPS

Qs 20. -------- are used in RTP to synchronize packets from different sources. ------- provides a transport mechanism between SIP entities that exchange a large number of messages.

  1. time stamps, SCTP (stream control transmission protocol)
  2. cost stamps, SCTP
  3. time stamps, RTP
  4. time stamps, UDP

 

 

4- Marks Questions         

 

Qs 1. An ---------- is the representation of a physical or logical attachment of a node to a subnet. In network two or more subnets connected by --------. LAN segment is a portion of a subnet consisting of a single medium that is bounded by ---------. Protocol above IP that uses IP as its transport is called -------.

1.       Host , bridges, routers, UDP

2.       Interface, routers, bridges, upper layer protocol

3.       Interface , bridges, routers, upper layer protocol

4.       node, routers, bridges, PDU

 

Qs 2. The network interface layer of the DARPA model encompasses the ---------- and physical layers of the OSI model,. The ----------- reports errors and other information to help you diagnose unsuccessful packet delivery. The ------manages IP multicast groups. ---------- working groups

define standards known as RFCs.

 

1.       data link, ICMP, IGMP,IETF

2.       Transport link, ICMP, IGMP,IETF

3.       network, UDP, IGMP, IETF

4.       Transport link, UDP, IGMP,IETF

 

Qs 3. OSPF, EGP, BGP and RIP stands for

1.       ordered shortest path first, external gateway protocol, border gateway protocol, routing information protocol

2.       open shortest path first, exterior gateway protocol, bridge gateway protocol, remote information protocol

3.       open shortest path first, exterior gateway protocol, border gateway protocol, routing information protocol

4.       open shortest path first, external gateway protocol, broad gateway protocol, routing information protocol.

 

Qs 4. Distance vector algorithms are examples of --------- routing protocol. These algorithms allow each device in the network to automatically build and maintain a local IP -------

Each router in the internetwork maintains the distance or cost from itself to ever known destination. During an adverse condition the length of time for every devices in the network to produce an accurate routing table is called the _____. The main advantage of distance vector algorithms is that they are typically easy to _____& debug. EIGRP is an example for________routing.        

 

1. Dynamic routing, Convergence time, Implement, Hybrid.

2. Dynamic routing, Hybrid, Convergence time, Implement.

3.Hybird, Dynamic routing, Implement, Convergence time.

4. Implement, Convergence time, Hybrid, Dynamic routing..

 

Q5 The _____ protocol is a popular example of a link state routing protocol. EIGRP was developed by _______. In RIP, the routing table is automatically sent every_______seconds. Rip datagram’s have a maximum size ________of octets.

 

1.OSPF , Cisco System, Thirty , 512.

2. Cisco System, OSPF, 512, Thirty.

3. 512, Thirty, OSPF, Cisco System.

4. 512, OSPF, Cisco System, Thirty.

 

Q6 ______ uses a low amount of bandwidth. _____ is an exterior gateway protocol of historical merit. _______ is a link state protocol. _____is the process of introducing external routers into an OSPF network

 

1.       EIGRP, EGP, OSPF, Route distribution.

   2. EGP, OSPF ,EIGRP, Route distribution.

   3. EIGRP, Route distribution EGP, OSPF.

   4   OSPF, Route distribution, EIGRP, EGP.

Q7. ____messages are encapsulated in IP datagram’s. _____field in the IGMP message specifies the maximum allowed time a host can wait before sending a corresponding report. The first MBONE points of presence were UNIX system configured with the _________ process. MSDP relies heavily on the _________ for interdomain, not a single router

 

1.       IGMP, Max response time, Mrouted routing, MBGP.

2.       UDP,Min Response time, Mrouted routing, MBGP.

3.       UDP,Max Response time, Mrouted routing ,MBGP.

4.       none of the above

 

Qs 8.(i) DVMRP does not route unicast datagrams

(ii)Multicast addresses are not contained in the range encompassing 224.0.0.0 through 239.255.255.255

(iii)The disadvantage of the centre-based tree algorithm is that it might not build a suboptimal path for some sources and receivers

(iv)The first MBONE points of presence were unix system configured with the mrouted routing.

  1. (i)True (ii) True (iii)false (iv)true
  2. (i)True (ii) false (iii)false (iv)true
  3. (i)false (ii) false (iii)false (iv)true
  4. (i)false (ii) false (iii)false (iv)false

 

 

Qs 9. The internet group mgmt protocol is used by hosts to join or leave a multicast ---------- group. Group membership information is exchanged between a specific -------- and the nearest multicast router. IGMP is best regarded as an extension to ---------. It occupies the same position in the IP protocol stack. IGMP functions are integrated directly into -------

 

  1. host, host , ICMP, IPV6

     2. host, host , ICMP, IPV6

     3. client, host , ICMP, IPV9

     4. host, host , ICMP, IPV6

 

Qs 10. (i)DVMRP is described as a broadcast and prune multicast routing protocol

(ii) DVMRP computes the set of reverse paths used in the RPF algorithm

(iii) DVMRP manages the return path to the source of a particular multicast datagram

(iv)DVMRP routers dynamically discover each neighbor by periodically sending neighbor probe messages on each local interface.

 

  1. (i)True (ii) True (iii)false (iv)true
  2. (i)True (ii) true (iii)true (iv)true
  3. (i)false (ii) false (iii)false (iv)true
  4. (i)false (ii) false (iii)false (iv)false

 

Qs 11. IANA controls and assigns the ---------------

Fast retransmit avoids having TCP wait for a timeout to ------------

TCP sends data in ------- length segments

----------- protocol used by telnet is TCP

  1. well known ports, resend lost segments , constant , DVMRP
  2. well known ports, resend lost segments , constant , DVMRP
  3. ports, received segments, variable , Transport
  4. well known ports, resend lost segments, variable, Transport

 

Qs 12. RSVP , Qos, Intserv , RTP means

  1. Resource reservation protocol, quality of service, integrated services, Real-time protocol
  2. Required reservation protocol, quantity of service, integrated services, Real-time protocol
  3. Real reservation protocol, quality of service, integrated services, Required time protocol
  4. Resource reservation protocol, quality of service, internet services, Required time protocol

Qs 13. The centre based tree describes method to determine optimum paths between members of a -------- group. Multicast algorithms are used to establish paths through the ---------. And . ----------field in the IGMP message specifies the maximum allowed time a host can wait before sending a corresponding report. -------does not route unicast datagrams.

 

  1. unicast, network, Max resp time, DVMRP
  2. Multicast, network, Max resp time, DVMRP
  3. multicast, network, Min resp time, IP
  4. unicast, network, Min resp time, IP

 

Qs 14. A secondary name server has authority for a zone, but obtains its zone information from a primary server using a process called---------. A name server that does not have authority for any zone is called a -------- name server. The SOA record identifies the ---------- of the zone and TTL is stored in the DNS as an -------- value

  1. zone transfer, catching only, domain name, unsigned 32 bit

     2. zone transfer, catching only, server name, unsigned 64 bit

3.zone transfer, catching only, client name, unsigned 64 bit

     4. zone transfer, catching only, domain name, unsigned 64 bit

 

Qs 15.(i) The stub resolver is implemented by two library routines gethostbyname() and gethostbyaddr()

(ii)Domain name response can be one of two types : authoritative and non-authoritative

(iii)a primary name server loads a zone’s information from disk

(iv) a secondary name server has authority for a zone but obtains its zone information from a primary server using a process called zone transfer.

 

 

  1. (i)True (ii) True (iii)false (iv)true

2 (i)True (ii) true (iii)true (iv)true

3. (i)false (ii) false (iii)false (iv)true

4.(i)false (ii) false (iii)false (iv)false