Advance Networking Data Security Quiz

CS 4404: ADVANCED NETWORKING AND DATA SECURITY

What is the purpose of the retransmission timer?

Select one:

  1. Timeouts when expected packet is not received 
  2. Records reception times in packets
  3. Sets the retransmission timeout value
  4. is known as exponential backoff

 

The correct answer is: Timeouts when expected packet is not received


Question 
2

TCP sends segments in bursts (or, groups of segments), every burst containing the number of segments limited by.

Select one:

  1. Packet size
  2. the current window size 
  3. Segment size
  4. Burst speed

 

The correct answer is: the current window size


Question 
3

TCP protocol determines the optimal window size by what method?

Select one:

  1. Predefined
  2. Dynamically 
  3. Traffic analysis
  4. QoS

 

The correct answer is: Dynamically


Question 
4

Which is not a method to introduce IPv4 to IPV6 to the public Internet?

Select one:

  1. Dual Stack
  2. Masking 
  3. Tunneling
  4. Dual stack approach

 

The correct answer is: Masking


Question 
5

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
6

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
7

The receive buffer is used to store in-order and out-of-order packets?

Select one:

True 

False

 

The correct answer is 'True'.


Question 
8

The IPv6 Hop-by-Hop Options header carries optional information for the routers that will be visited and must not be examined by every node along a packet’s delivery path?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
9

Routing Information Protocol (RIP) is a not distance-vector routing protocol?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
10

Network Address Translation (NAT) is an Internet Engineering Task Force (IETF) standard used to allow multiple computers on a private network (using private address ranges such as 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16) to share a single, globally routable IPv4 address.?

Select one:

True 

False

 

The correct answer is 'True'.

Which is NOT a network topology?

Select one:

  1. Centralized
  2. Decentralized
  3. Star 
  4. Distributed

 

The correct answer is: Star


Question 
2

Which layer is known as the “physical layer” of the reference architecture?

Select one:

  1. Physical 
  2. Link
  3. End to end
  4. Network

 

The correct answer is: Physical


Question 
3

Packets from higher layers become nested inside the packets of higher layers as they are passed down the protocol stack

Select one:

True

False 

 

The correct answer is 'False'.


Question 
4

Lost or damaged packets should be:

Select one:

  1. Discarded
  2. Retransmitted 
  3. Stored
  4. Forwarded

 

The correct answer is: Retransmitted


Question 
5

Real-world systems are designed with sub-peak capacity for economic reasons. As a result, they experience congestion and delays during off-peak usage periods.

Select one:

True

False 

 

The correct answer is 'False'.


Question 
6

Which of the following is NOT A type of delay associated with packet transmissions.

Select one:

  1. Processing
  2. Transmission
  3. Propagation
  4. Routing 

 

The correct answer is: Routing


Question 
7

Which retransmission strategy is the most efficient?

Select one:

  1. Go back
  2. Stop and wait
  3. Selective Repeat
  4. Sliding window 

 

The correct answer is: Sliding window


Question 
8

Broadcast links allow connecting multiple network nodes via the same link. Hence, when one node transmits, all or most other nodes on the link can hear the transmission. If two or more nodes are transmitting simultaneously, their signals will interfere with each other, which technique will NOT avoid this situation?

Select one:

  1. Timed transmissions
  2. Listening before speaking
  3. Statistical Multiplexing 
  4. Retransmission of corrupted information

 

The correct answer is: Statistical Multiplexing


Question 
9

The amount of processing required at the bridge, as opposed to a switch is minimal because bridged networks use the same protocols.

Select one:

True 

False

 

The correct answer is 'True'.


Question 
10

Which of the following is an example of dotted decimal notation for IP addresses:

Select one:

  1. 128 . 6 . 29 . 131 
  2. 10000000 00000110 00011101 10000011
  3. my.uopeople.org/
  4. 192.168.1.1/24

 

The correct answer is: 128 . 6 . 29 . 131

 

CallTutors Guarantees

  • Work Within Deadline
  • Lowest Price Guranteed
  • Plagiarism Free Guranteed
  • 24 * 7 Availability
  • Native Experienced Experts
  • Free Revisions

Avg Client Rating: 4.8/5

Total Reviews: 9,835

Linux Software Assignment Help04/21/2019

I ordered a Linux software development assignment from you last week. It was an urgent service so I was kinda hoping for on-time delivery, not very much about the content quality. The assignment I got was worthy of my money. I loved the content, the examples in it. There was no mistake in the work.

Eversons B
On Time Delivery and Professional Support04/21/2019

Thanks to experts for making my computer science assignment a piece of perfection. I loved everything about it. Even my teacher praised me.

Nancy Mehta
SQL Assignment Help04/19/2019

I am satisfied with your work. And thanks to your tutors who have been completed my assignment on time. But some instructions are not used well.

Hermer Bell
Psychology Assignment Help04/19/2019

Usually, I try to write papers on my own, but this time I had no time for this that is why I started asking my friends which writing service they use. So I ordered my Psychology assignment from your expert. And its quality was good.

Hanink
A Grade Assignment Help04/18/2019

Just wanted to say thanks on the great efforts you guys put in completing my Econometric Assignment and provide me authentic sources as my professor want. My professor was appreciated me a lot.

Vendramelli

Read More...