CS610 Quiz-3 Solution Fall 2022 (22 to 33)

0

  

Vu All Subjects Assignment Quiz GDB Handouts Available here

 

AT THE END Old File in PDF

 Aslam U Alaikum!

Dear Students,

In this post we are providing you CS610 Quiz-3 Solution Fall 2022 (23 to 32) 100% correct or right solution. You'll Download assignment Solution File From below download (Click Here For Download File) link interface.

It is informed that the Quiz No. 3 of this course will be conducted on Jan 28, 2023 to Jan 30, 2023.  You can attempt the online quiz through VU-LMS at any time within 72 Hours. Furthermore, the Quiz will be based on 2multiple choice questions from the topics covered in Lecture No. 21 to Lecture No. 33 as the content is organized on VU-LMS You are advised to prepare and attempt the quiz accordingly.

Note: In case of failure to attempt the quiz due to any reason, no re-take or rescheduling of the quiz will be offered. So, be careful in this regard.

Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.

32-bit

 

_________ protocols of TCP/IP layering model specify how to organize data into frame and how a computer transmits frames over a network.

Network Interface Layer

 

For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.

Efficiency

 

Class A mask is 255.0.0.0 which is used for ______

Subnetting

 

H.LEN shows the header length in units of ____ Bits

32

 

VPNs connections are sometimes called __________.

Tunnels

 

The Current version of IP-Version 4 is _____ old

20

 

IPV6 128 bits address includes network prefix and ________

Host Suffix

 

The Header format of IPv6 is entirely different.

True

 

A separate ___________ table is used for each physical network.

address-binding

 

The process of learning the path MTU is known as path MTU discovery.

T

 

________ field of header indicates whether a datagram is a fragment or a complete datagram.

Flag

 

________ is a type of address used for collection of computers with same prefix.

Cluster

 

The Source can configure outgoing datagram’s to avoid _________ 

Fragmentation

 

________ message is sent in response to incoming datagrams with problems.

ICMP

 

IPV6 address consists of ________

128

 

______________field tells the receiver how to order fragments within a given datagram.

FRAGMENT OFFSET

 

A datagram cannot be larger than ________ of a network over which it is sent.

MTU

 

 

 Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included: 

         Destination address
         Source address
         Rectifier
         Other delivery information
Header contains all information needed to deliver datagram to the destination computer
Destination address
Source address
Identifier
Other delivery information
 
 
________ field is used to identify a specific path through the network 
Flow label
Traffic class
Both a and b
None of the given
Flow label is partitioned into a TRAFFIC CLASS field and a separate FLOW LABEL field used to identify a specific path thorough the network.

The Source can configure outgoing datagram’s to avoid _________ 
         Segmentation
         Defragmentation
         Fragmentation        
Source can configure outgoing datagrams to avoid fragmentation
 
Question
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.
 
 
         Least
         Maximum
         Fragment
         Frame
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the Maximum Transmission Unit (MTU).
 
Question
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
 
         16-bit
         48-bit
         64-bit
         128-bit
ARP is almost always used to bind a 32-bit IP address to a 48-bit Ethernet address
 
Question
Fragmentation when using ICMP for path MTU should be avoided.
 
         True
         False
 
Question
End to End delivery Service of IP datagram is _____
 
         Connection oriented
         Connectionless
         both a and b
         none of the given
End-to-end delivery service is connection less.
Question
HEADER LEN field gives size of extention header.
 
         False
         True
 
Question
_________ Serve Same purpose in Internet as frames on LAN
 
         Packets
         Virtual Packets
         Virtual Frames
         Both b and c
 
VIRTUAL PACKETS:
These packets serve same purpose in Internet as frames on LAN.
Question
 
Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included
 
Destination address
Source address
Rectifier
Other delivery information
Header contains all information needed to deliver datagram to the destination computer
  • Destination address
  • • Source address
  • • Identifier
  • • Other delivery information
 

________ encapsulates IP datagram as data area in hardware frame.



Network Interface Layer

Data link Layer

Network Layer

None of the given

Network interface layer encapsulates IP datagram as data area in hardware frame.


________ field is used to identify a specific path through the network


Flow label

Traffic class

Both a and b

None of the given

Flow label is partitioned into a TRAFFIC CLASS field and a separate FLOW LABEL field used to identify a specific path thorough the network.


IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

96

100

120

none of the given
IPv6 address with 96 leading zeros is interpreted to hold an IPv4 address.


Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
 
 48bit
Other options are missing
 

ARP is almost always used to bind a 32-bit IP address to a 48-bit Ethernet address


For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.

Efficiency

Security

Accuracy

Anomalies

For efficiency, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes


_______ is a technique used to Limit datagram size to small MTU of any network


Segmentation

Fragmentation

Encapsulation

none of the given

FRAGMENTATION:
One technique is to limit datagram size to smallest MTU of any network

Class A mask is 255.0.0.0 which is used for ______


Unicasting

Multicasting

Subnetting

All of the given
class A mask is 255.0.0.0 which is used for subnetting.


When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.

True

False
Technically, placing a message inside a frame for transport is called encapsulationQuestion
Which one of these is not a main feature of connectionless service:
 
It includes extension of LAN abstraction.

It has universal addressing and the data is delivered in packets frames), each with a header.

It combines collection of physical networks into a single virtual network.

It has universal addressing and the data is delivered in packets frames), without a header.

The main features of connectionless service are
It includes extension of LAN abstraction. It has universal addressing and the data is delivered in packets (frames), each with a header. It combines collection of physical networks into a single virtual network


 
Which protocol is used to test different tools
 
ICMP

IGMP

TCP/IP
none of the given
ICMP can also be used to test different tools.


________ message is sent in response to incoming datagrams with problems.


TCP/IP

IGMP

ICMP

none of the given

ICMP message is sent in response to incoming datagrams with problems. ICMP message is not sent for ICMP message.


Which one is NOT the function of ping program
 
Traceability

Reach ability

Both a and b

None of the given

Ping program tests reachability


IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:

96

100

120

none of the given

IPv6 address with 96 leading zeros is interpreted to hold an IPv4 address


 
A datagram cannot be larger than ________ of a network over which it is sent.
Select correct option:

MTU

Size

IP header

None of the given

Datagram encapsulated in a hardware frame must be smaller than the MTU for that hardware


The Source can configure outgoing datagram’s to avoid _________

Segmentation

Defragmentation

Fragmentation

None of the given

Fragmentation should be avoided. Source can configure outgoing datagrams to avoid fragmentation


Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.


Least

Maximum

Fragment

Frame
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the Maximum Transmission Unit (MTU).


_____ Protocol provides error reporting mechanism.

IGMP

SNMP

ICMP

none of the given
Internet Control Message Protocol (ICMP) provides error reporting mechanism.

_______ Source is responsible for fragmentation.


IPV4

IPV6

IPv6 source (not intermediate routers) is responsible for fragmentation
 
MTU Stands for _______
 
Mininum transmission unit

Maximum transmission unit

Multicast transmission unit

None of the given
 
MTU (Maximum Transmission Unit). 


  1. Due to revolutionalization of IP-V6 the speed has increased from ________.

    1. 56kbps to 512kbps
    2. 512kbps to 1gbps
    3. 56kbps to 1gbps
    4. none of the given
  2. Missing ________ in a frame format indicates receiving computer missed beginning of the message.

    1. soh
    2. eoh
    3. eot
    4. sot
  3. The topology each computer is connected to a central hub is called

    1. Ring topology
    2. Star topology
    3. Tree topology
    4. Mesh topology
  4. In ________ all computers are attached to a central hub.

    1. Star Topology
    2. Bus Topology
    3. Hub Topology
    4. Ring Topology
  5. Which of the following is a benefit of source independence?

    1. It allows fast and efficient routing.
    2. Packet switch do not need to have complete information about all destinations
    3. Network functions even if topology changes
    4. All of the above
  6. Which type of network consists of wired computers in a university classroom?

    1. WAN
    2. LAN
    3. MAN
    4. PAN
  7. Even parity can be used to check for ________ bit/bits of errors.

    1. 1
    2. 2
    3. 3
    4. 0
  8. The number of connections needed for 8 computers in direct point to point communication is equal to ________.

    1. 28
    2. 8
    3. 7
    4. 26
  9. We need packets rather than bits because ________.

    1. To compress the data
    2. Packets move faster
    3. Sender and receiver need to coordinate to detect transmission errors.
    4. Packets can only move between two terminals
  10. Each computer in LAN is identified by a physical address, usually imprinted on the ________.

    1. Router
    2. Switch
    3. Network Interface Card
    4. Modem
  11. Fragmentation when using ICMP for path MTU should be avoided.

    1. true
    2. false
  12. ________ Source is responsible for fragmentation.

    1. IPV4
    2. IPV6
  13. The recent executed instruction ________ in temporal aspect of the locality of reference.

    1. won't be executed soon
    2. is temporarily not referenced
    3. will be wxwcuted soon again
    4. will be showing the final results
  14. SMDS is ________.

    1. Connectionless service
    2. Connection oriented service
    3. Used for delivering blocks of data
    4. None of the given
  15. ________ is less complex and easy to understand.

    1. TCP
    2. UDP
    3. IP
    4. None of the given
  16. Point-to-point topology is

    1. Size Based
    2. Mobility Based
    3. Connectivity Based
    4. Medium Based
  17. Which of the following is not a benefit of Source Independence?

    1. It allows fast and efficient routing.
    2. Packet switch need not hove complete information about all destinations.
    3. network functions even if topology changes.
    4. None of the given
  18. ________ places the boundary between the second and third octets

    1. Class A
    2. Class B
    3. Class C
    4. Class D
  19. ATM header is about ________ of the cell.

    1. 100 %
    2. 10 %
    3. 20 %
    4. 50 %
  20. The sharing of a ________ among the workers in an office is a goal of resource sharing.

    1. Mouse
    2. Printer
    3. Keyboard
    4. Motherboard
  21. Which of the following statement is true regarding ATM?

    1. It is a single technology for voice, video and data.
    2. It has low jitter and high capacity.
    3. It uses fixed size, small cells, 48 octet’s data.
    4. All of the above
  22. Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.

    1. true
    2. false
  23. When an application _________ data, it makes a copy of the data available to all other computers on the network.

    1. Broadcasting
    2. Multicasting
    3. Unicasting
    4. None of the given
  24. ________ cannot be extended arbitrarily far or to handle arbitrarily many computers.

    1. WAN
    2. LAN
    3. MAN
    4. LED
  25. In Direct point to point communication adding the Nth computer requires ________ new connections.

    1. (N^2 - N)/2
    2. N^2
    3. N(N - 1)
    4. N - 1
  26. The network occupies larger areas like cities & countries is called

    1. LAN
    2. WAN
    3. MAN
    4. All of the above
  27. Which of the following cannot be used to extend a LAN?

    1. Repeaters
    2. Switches
    3. Routers
    4. Fiber Modems
  28. Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.

    1. true
    2. false
  29. ATM offers high speed and ________ delay.

    1. High
    2. Low
    3. Moderate
    4. All of the above
  30. ________ is a tool that sends a message to a remote computer and reports whether the computer responds.

    1. Ping
    2. Flag
    3. Fragment offset
    4. TCP
  31. Twice NAT fails if an application uses the IP addresses instead of Domain Name.

    1. true
    2. false
  32. The Ethernet standard specifies that frames are sent using the ________ scheme.

    1. Differential Manchester
    2. Not Return to Zero (NRZ)
    3. Return to Zero (RZ)
    4. Manchester Encodind
  33. Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included:

    1. Destination address
    2. Source address
    3. Rectifier
    4. Other delivery information
  34. Which of the following technologies can extend the diameter of LAN medium?

    1. Fiber optic
    2. Repeaters
    3. Diameter of LAN medium is not extendable
    4. Both Fiber Optic and Repeaters
  35. ________ are more frequently being designed to allow specification of the quality of service required by users.

    1. Switch
    2. VPI
    3. VCI
    4. Networks
  36. The maximum cable length of a LAN is ________.

    1. Fixed
    2. Unlimited
    3. Fixed and Unlimited in different conditions
    4. None of these
  37. The physical addressing in a WAN is similar as in LAN in the way __________.

    1. The data is transmitted in packets equivalent to frames.
    2. Each packet has a format with header.
    3. The packet header includes destination and source addresses.
    4. All of the above
  38. The frame format of any LAN technology must consists of ________ and ________.

    1. Payload and CRC
    2. Payload and Frame type
    3. Frame header and pay load
    4. Frame header and CRC
  39. The length of time required to send a variable length packet is ________.

    1. 5 seconds
    2. Variable
    3. Constant
    4. Fix
  40. EGPs stand for ________.

    1. Exterior Gateway Protocols
    2. External Gateway Protocols
    3. Extra Gateway Protocols
    4. None of the given
  41. Which multiplexing technique transmits analog signals?

    1. FDM
    2. TDM
    3. WDM
    4. Both (a) and (c)
  42. Which multiplexing technique shifts each signal to a different carrier frequency?

    1. TDM
    2. FDM
    3. Both a and b
    4. None of the above
  43. Thick Ethernet also requires ________ to avoid signal reflectance.

    1. Terminators
    2. Drop cable
    3. Transceivers
    4. AUI cable
  44. ________ protocol uses three way handshake to begin a connection.

    1. UDP
    2. TCP
    3. IP
    4. none of the given
  45. What will be the bandwidth rate for older, low-speed network, and analog telephones?

    1. 16 MHz
    2. 20 MHz
    3. 24 MHz
    4. 30 MHz
  46. IPV6 128 bits address includes network prefix and ________

    1. Host Suffix
    2. Host prefix
    3. Source Prefix
    4. none of the given
  47. Which layer of the OSI Model directly communicates and controls the transmission medium:

    1. Transmission
    2. Physical
    3. Application
    4. Network
  48. The mechanism extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _______ and bandwidth is very _______.

    1. Low, High
    2. High, Low
    3. High, High
    4. Low, Low
  49. How many methods exist for computing routing table?

    1. 5
    2. 4
    3. 3
    4. 2
  50. Frame relay is ________.

    1. Connection oriented service
    2. Connectionless service
    3. It is typically ranges from 5Mbps to 1000Mbps
    4. None of the given
  51. The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.

    1. Djikstra
    2. Shortest path first
    3. Vector distance
    4. Distributed Spanning Tree
  52. If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each other at which speed they can communicate?

    1. 11 Megabit
    2. 100 Megabit
    3. 1 Gigabit
    4. 1.1 Gigabit
  53. NAT device stores state information in translation table.

    1. true
    2. false
  54. In CSMA, if simultaneous transmission occurs, the ________ interfere with each other and this phenomenon is called collision.

    1. Computers
    2. Network
    3. Frames
    4. Cable wires
  55. The information about ________ is kept in routing tables.

    1. Entries
    2. Destinations
    3. Source
    4. Packets
  56. The switch that has computers attached with it is called ________ switch.

    1. Exterior
    2. Interior
    3. Packet
    4. Front
  57. In FDDI, in case of a station failure, remaining stations loop back and ________.

    1. Re-route data through spare ring
    2. Data frames are discarded
    3. Re-transmit data through the same ring
    4. Collision will occur
  58. The Fast Ethernet hardware operates at a rate of ________.

    1. 10 Mbps
    2. 1000 Mbps
    3. 1000 bps
    4. 100 Mbps
  59. As a result of ARPA research, the first network was established which was named as ________.

    1. ARPANET
    2. PACKET NETWORK
    3. ARPNET
    4. INTERNETWORKING
  60. ________ is inflexible.

    1. Routing
    2. Searching
    3. Processing
    4. Static routing
  61. In a ping command result, time denotes the ________.

    1. TLT
    2. BRT
    3. TTL
    4. RTT
  62. ________ and ________ are the two types of frame type.

    1. Internal and external
    2. Single and dual
    3. Implicit and explicit
    4. Multicast and broadcast
  63. The protocol address of the next hop must be _____________ to an equivalent hardware address before a packet can be sent.

    1. Encrypted
    2. Decrypted
    3. Translated
    4. Non of these
  64. Physical Addressing is a WAN is similar to LAN as each packet has format with ________.

    1. Header
    2. Title
    3. Frame
    4. Address
  65. According to a bridge performance, if both the source and destination are on the same segment.

    1. It forwards the frame to the other segment
    2. It does not forward the frame to the other segment
    3. It does not forward the frame to the same segment
    4. It forwards the frame to every other segment
  66. To span long distances or many computers, networks must replace shared medium with _________.

    1. segment transformation
    2. fiber optices
    3. packet switches
    4. None of the above
  67. The first automated tool required to see whether the given computer is online or not was

    1. Probing program
    2. PING program
    3. status program
    4. None of the above
  68. If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called ________.

    1. collision
    2. delayed transmission
    3. packet loss
    4. coordination
  69. Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.

    1. 8-bit
    2. 16-bit
    3. 32-bit
    4. 64-bit
  70. A ________ is a special-purpose computer dedicated to the task of interconnecting networks.

    1. Router
    2. Bridge
    3. Switch
    4. None of the given
  71. NIC connection in a physical network is known as __________.

    1. LAN wiring scheme
    2. WAN wiring scheme
    3. Color wiring scheme
    4. None of above
  72. SMDS is ________.

    1. Connectionless service
    2. Connection oriented service
    3. Used for delivering blocks of data
    4. None of the given
  73. VBR stands for __________.

    1. Virtual Bit Rate
    2. Virtual Byte Rate
    3. Variable Byte Redundancy
    4. Variable Bit Rate
  74. Which of the following remains same in the header of the packet in a datagram during the entire journey of the packet?

    1. Source Address
    2. Destination Address
    3. Next Node Address
    4. Checksum
  75. Which of the following is not a guided medium?

    1. Twisted-pair cable
    2. Fiber-optic cable
    3. Atmosphere
    4. Coaxial cable
  76. Frames include additional information to detect/correct errors are insert by ________.

    1. Sender
    2. Receiver
    3. Network Devices
    4. Sender and Receiver
  77. ________ is the most popular wiring scheme because of lowest cost.

    1. 5 Base T
    2. 10 Base T
    3. 100 Base T
    4. 1000 Base T
  78. In 3-way handshake TCP requires to generate a random ________ sequence number.

    1. 30 bit
    2. 32 bit
    3. 34 bit
    4. none of the given
  79. The third field of the header consists of ___________ bit Ethernet frame type.

    1. 48
    2. 32
    3. 16
    4. 8
  80. The ________ of errors is easier than the ________ of errors.

    1. correction, detection
    2. detection, correction
    3. correction, creation
    4. detection, manipulation
  81. An interior switch is one with wich ________.

    1. Computers are attached.
    2. No computer is attached.
    3. Computers are attached internally.
    4. None of the above.
  82. Which of the following is called virtual channel?

    1. Connection in VCI
    2. Connection in ATM
    3. Connection in virtual circuit
    4. None of the above
  83. According to size, there are ________ classifications of networks.

    1. 2
    2. 3
    3. 4
    4. 5
  84. If a small set of bits changes near a specific location due to lighting or electric motor starting nearby, this type of errors are called ________.

    1. Burst error
    2. Vertical error
    3. Parity Error
    4. Single bit error
  85. The ________ field of Ethernet frame has the purpose of receiver synchronization.

    1. Preamble
    2. Frame Type
    3. Data
    4. CRC
  86. Bluetooth uses shared medium and ________ instead of coaxial cable.

    1. Radio waves
    2. Low frequency waves
    3. Micro waves
    4. Infrared waves
  87. Hardware that calculates a CRC uses two simple components ________.

    1. Shift register and XOR unit
    2. ANd unit and XOR unit
    3. Shift register and shift XOR unit
    4. Shift register & AND unit
  88. In ________ topology, if the switch goes down all the computers will be disconnected.

    1. Bus
    2. Ring
    3. Mesh
    4. Star
  89. ________ encapsulates IP datagram as data area in hardware frame.

    1. Network Interface Layer
    2. Datalink Layer
    3. Network Layer
    4. None of the given
  90. ________ is a measure of the rate at which data can be sent through the network.

    1. Throughput
    2. Propagation delay
    3. Access delay
    4. Switching delay
  91. LAN interface uses ________ to copy frame data directly from main memory.

    1. DMA
    2. FDDI
    3. Hard disk
    4. Flash
  92. ________ sends ICMP echo messages with increasing TTL.

    1. Ping
    2. Trace route
    3. Tracert
    4. none of the given
  93. ________ is standard wireless LAN that uses radio signals at 2.4HHz.

    1. IEEE 803.16
    2. IEEE 802.3
    3. IEEE 802.15
    4. IEEE 802.11
If you appreciate our work, please share our website vuonlinehelp.blogspot.com with your friends.

We are here to provide Latest Virtual University Assignment Solutions, GDB Solutions, Quiz  Solution, Midterm Past Papers, and Final term Past Papers in this website.

Old File in PDF

You'll Download File in PDF  CS610 Quiz-3 Solution Fall 2022 (23 to 32)   From below download (Download) link interface.

 

If you appreciate our work, please share our website vuonlinehelp.blogspot.com with your friends.

We are here to provide Latest Virtual University Assignment Solutions, GDB Solutions, Quiz  Solution, Midterm Past Papers, and Final term Past Papers in this website.


Post a Comment

0Comments

Thanks everone

Post a Comment (0)