Welcome to Networking Quiz, Advanced Level !!

Question 1. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?

192

224

240

248

Question 2. Which of the following technique is used for encapsulation?

a technique used in best-effort delivery systems to avoid endlessly looping packets.

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.

One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

all of the above

Question 3. Which of the following statement is incorrect?

The Addresses Resolution Protocol, ARP, allows a host to find the physical address of a target host on the same physical network, given only the target IP address.

The sender's IP - to- physical address binding is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet.

ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP-addresses of our choice to every machine.

all of the above

Question 4. Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?

7 slots

5 slots

10 slots

14 slots

Question 5. Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology

Ethernet, because it is cabled using fiber-optic cable

Token-Ring, because it uses a MAU

Ethernet, because it can be set up with most topologies and can use multiple transfer speeds

Question 6. What is a valid IPv6 Address?

3EF4B4:05A8AA:046B63:000000:000000:000000:700800:6EF3AB

3EF4:0A8A:04B3:0000:0000:0000:0000:6EF3

3EF4:0A8K:04F3::76HY:0000:0000:6EF3

3EF4:0A8A:04B3::74A9:0000::6EF3

Question 7. Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost.

P I (K + 1)

KIK (1 + F)

1/ (1 - F)

K I (K - P)

Question 8. How can you see the address of the DHCP server from which a client received its IP address?

By using Advanced Properties of TCP/IP

By using IPCONFIG/ALL

By using DHCPINFO

By pinging DHCP

Question 9. What technological progress has allowed the full usage of fiber optics within parallel computer architechture?
I. There are compilers and programming that recognise and exploit parallelism.
II. Widely tunable semiconductor lasers allow maultiple wavelength system.
III. Newly designed operating system for parallel processing.
IV. Migration of architectural features previously found on mainframes onto single-chip microprocessors.

I and III only.

II, III and IV only.

I, II and IV only.

I, II, III and IV.

Question 10. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is

1200 bands

3200 bands

4800 bands

9600 bands