Which one of the following is NOT part of the network protocol stack?
a) session layer
b) application layer
c) synchronization layer
d) link layer
c) synchronization layer
Bluetooth is an example of
a) local area network
b) personal area network
c) virtual private network
d) none of the above
b) personal area network
Which of the following is NOT a correct statement?
a) Router forwards packets
b) Router has multiple IP addresses
c) Routers build the backbone of the Internet
d) Routers examine packets up to transport layer.
d) Routers examine packets up to transport layer.
The time required to examine the packet's header and determine where to direct the packet is part of
a) Transmission delay
b) Queuing delay
c) Nodal Processing delay
d) All of the above
c) Nodal Processing delay
In the transfer of file between server and client over four hops (links), if the transmission rates along
the path is 40Mbps, 30Mbps, 20Mbps, 10Mbps, the throughput of the connection between server
and client is
a) 10Mbps
b) 20Mbps
c) 30Mbps
d) 40Mbps
a) 10Mbps
If a packet size is 1500 bits and the rate at which a router can pump out packets is 10 Mega bits per
second, then the transmission delay is:
a) 10 milliseconds
b) 150 milliseconds
c) 150 microseconds
d) None of the above
c) 150 microseconds
, 1 GBps is equivalent to
a) 8Gbps
b) 80 Gbps
c) 54 MBps
d) None of the above.
a) 8Gbps
In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
a) Added
b) Removed
c) Rearranged
d) Modified
a) Added
A set of rules that governs data communication is known as
a) Protocols
b) Standards
c) RFCs
d) None of the above
a) Protocols
Multicasting communication is
a) When a packet is sent from a single source to a single destination
b) When a packet is sent from a single source to multiple destinations
c) When a packet is sent from multiple sources to a single destination
d) None of the above
b) When a packet is sent from a single source to multiple destinations
Network security is about:
a) preventing unauthorized reading of information
b) preventing unauthorized writing of information
c) to make sure data is available in a timely manner when needed
d) all of the above
d) all of the above
Application layer protocol defines:
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the above
d) all of the above
The transport layer protocol serving HTTP for web browsing is
a) RTP
b) TCP
c) UDP
d) all of the above
b) TCP