Welcome to Networking Quiz, Advanced Level !!

Question 1. Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology

Ethernet, because it is cabled using fiber-optic cable

Token-Ring, because it uses a MAU

Ethernet, because it can be set up with most topologies and can use multiple transfer speeds

Question 2. How can you see the address of the DHCP server from which a client received its IP address?

By using Advanced Properties of TCP/IP

By using IPCONFIG/ALL

By using DHCPINFO

By pinging DHCP

Question 3. What technological progress has allowed the full usage of fiber optics within parallel computer architechture?
I. There are compilers and programming that recognise and exploit parallelism.
II. Widely tunable semiconductor lasers allow maultiple wavelength system.
III. Newly designed operating system for parallel processing.
IV. Migration of architectural features previously found on mainframes onto single-chip microprocessors.

I and III only.

II, III and IV only.

I, II and IV only.

I, II, III and IV.

Question 4. Which of the following technique is used for encapsulation?

a technique used in best-effort delivery systems to avoid endlessly looping packets.

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.

One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

all of the above

Question 5. Which of the following technique is used for Time-To-Line (TTL)?

a technique used in best-effort delivery system to avoid endlessly looping packets.

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.

all of the above

Question 6. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?

192

224

240

248

Question 7. Which Protocol uses port 123?

RPC

NTP

POP3

NNTP

Question 8. What is a valid IPv6 Address?

3EF4B4:05A8AA:046B63:000000:000000:000000:700800:6EF3AB

3EF4:0A8A:04B3:0000:0000:0000:0000:6EF3

3EF4:0A8K:04F3::76HY:0000:0000:6EF3

3EF4:0A8A:04B3::74A9:0000::6EF3

Question 9. Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost.

P I (K + 1)

KIK (1 + F)

1/ (1 - F)

K I (K - P)

Question 10. Which of the following statement is incorrect?

The Addresses Resolution Protocol, ARP, allows a host to find the physical address of a target host on the same physical network, given only the target IP address.

The sender's IP - to- physical address binding is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet.

ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP-addresses of our choice to every machine.

all of the above