Welcome to Networking Quiz, Intermediate Level !!

Question 1. Which of the following technique is used for fragment?

a technique used in best-effort delivery systems to avoid endlessly looping packets

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

all of the above

Question 2. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is

the method of determining which device has access to the transmission medium at any time.

a medium access control technique for multiple access transmission media

a form of TDMA in which circuit switching is used to dynamically change the channel assignments

all of the above

Question 3. Which of the following device is used to connect two systems, especially if the systems use different protocols?

Hub

Bridge

GateWay

Repeater

Question 4. The Fiber Distributed Data Interface (FDDI) standard calls for nodes to be:

attached to a data bus in the form of a transmissive star coupler.

attached to a pair of fiber rings carrying signals in opposite directions.

attached to a network of star couplers that detect collisions and transmit only one signal to the next level.

attached to fibers by passive T couplers.

Question 5. Which of the following statement is incorrect?

if a host moves from one network to another, its IP address must change

routing uses the network portion of the IP address, the path taken by packets travelling to a host with multiple IP addresses depends on the address used.

IP addresses encode both a network and a host on that network, they do not specify an individual machine, but a connection to a network.

all of the above

Question 6. In CRC there is no error if the remainder at the receiver is ----.

equal to the remainder at the sender

zero

non-zero

the quotient at the sender

Question 7. Error detection at a data link level is achieved by

bit stuffing

cyclic redundancy codes

Hamming codes

equalization

Question 8. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?

500 bps

1500 bps

5 bps

1000 bps

Question 9. You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?

255.255.255.192

255.255.255.224

255.255.255.240

255.255.255.248

Question 10. If the ASCII character G is sent and the character D is received, what type of error is this?

single-bit

multiple-bit

burst

recoverable