Advance Networking Data Security Quiz

CS 4404: ADVANCED NETWORKING AND DATA SECURITY

What is the purpose of the retransmission timer?

Select one:

  1. Timeouts when expected packet is not received 
  2. Records reception times in packets
  3. Sets the retransmission timeout value
  4. is known as exponential backoff

 

The correct answer is: Timeouts when expected packet is not received


Question 
2

TCP sends segments in bursts (or, groups of segments), every burst containing the number of segments limited by.

Select one:

  1. Packet size
  2. the current window size 
  3. Segment size
  4. Burst speed

 

The correct answer is: the current window size


Question 
3

TCP protocol determines the optimal window size by what method?

Select one:

  1. Predefined
  2. Dynamically 
  3. Traffic analysis
  4. QoS

 

The correct answer is: Dynamically


Question 
4

Which is not a method to introduce IPv4 to IPV6 to the public Internet?

Select one:

  1. Dual Stack
  2. Masking 
  3. Tunneling
  4. Dual stack approach

 

The correct answer is: Masking


Question 
5

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
6

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
7

The receive buffer is used to store in-order and out-of-order packets?

Select one:

True 

False

 

The correct answer is 'True'.


Question 
8

The IPv6 Hop-by-Hop Options header carries optional information for the routers that will be visited and must not be examined by every node along a packet’s delivery path?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
9

Routing Information Protocol (RIP) is a not distance-vector routing protocol?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
10

Network Address Translation (NAT) is an Internet Engineering Task Force (IETF) standard used to allow multiple computers on a private network (using private address ranges such as 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16) to share a single, globally routable IPv4 address.?

Select one:

True 

False

 

The correct answer is 'True'.

Which is NOT a network topology?

Select one:

  1. Centralized
  2. Decentralized
  3. Star 
  4. Distributed

 

The correct answer is: Star


Question 
2

Which layer is known as the “physical layer” of the reference architecture?

Select one:

  1. Physical 
  2. Link
  3. End to end
  4. Network

 

The correct answer is: Physical


Question 
3

Packets from higher layers become nested inside the packets of higher layers as they are passed down the protocol stack

Select one:

True

False 

 

The correct answer is 'False'.


Question 
4

Lost or damaged packets should be:

Select one:

  1. Discarded
  2. Retransmitted 
  3. Stored
  4. Forwarded

 

The correct answer is: Retransmitted


Question 
5

Real-world systems are designed with sub-peak capacity for economic reasons. As a result, they experience congestion and delays during off-peak usage periods.

Select one:

True

False 

 

The correct answer is 'False'.


Question 
6

Which of the following is NOT A type of delay associated with packet transmissions.

Select one:

  1. Processing
  2. Transmission
  3. Propagation
  4. Routing 

 

The correct answer is: Routing


Question 
7

Which retransmission strategy is the most efficient?

Select one:

  1. Go back
  2. Stop and wait
  3. Selective Repeat
  4. Sliding window 

 

The correct answer is: Sliding window


Question 
8

Broadcast links allow connecting multiple network nodes via the same link. Hence, when one node transmits, all or most other nodes on the link can hear the transmission. If two or more nodes are transmitting simultaneously, their signals will interfere with each other, which technique will NOT avoid this situation?

Select one:

  1. Timed transmissions
  2. Listening before speaking
  3. Statistical Multiplexing 
  4. Retransmission of corrupted information

 

The correct answer is: Statistical Multiplexing


Question 
9

The amount of processing required at the bridge, as opposed to a switch is minimal because bridged networks use the same protocols.

Select one:

True 

False

 

The correct answer is 'True'.


Question 
10

Which of the following is an example of dotted decimal notation for IP addresses:

Select one:

  1. 128 . 6 . 29 . 131 
  2. 10000000 00000110 00011101 10000011
  3. my.uopeople.org/
  4. 192.168.1.1/24

 

The correct answer is: 128 . 6 . 29 . 131

 

CallTutors Guarantees

  • Work Within Deadline
  • Lowest Price Guranteed
  • Plagiarism Free Guranteed
  • 24 * 7 Availability
  • Native Experienced Experts
  • Free Revisions

Avg Client Rating: 4.8/5

Total Reviews: 9,835

5 star rating case study assignment help08/18/2018

The case study assignment writing your team provide was awesome and your services are excellent. I will definitely ask my friends to use your services once.

Morse Becker
hospitality management assignment writings08/18/2018

I am very much satisfied and happy to receive such a great quality hospitality management assignment help from your writers. Thanks a lot, team Calltutors!

Morgan Hancock
Brilliant management assignment writings08/18/2018

The management assignment helps your team of expert offered was truly great and I am very satisfied. Thanks for such great support writers.

Misael Cantu
Great relationship marketing assignment help08/18/2018

The piece of work done by the experts was very nice. Except for a few grammatical mistakes, everything was answered correctly. I am sending you another assignment, thanks to my relationship marketing assignment.

Michelle Meng
project management assignment services08/17/2018

The assignment helpers at Students Assignment Help completed my project management homework well. It was of top quality and help me score well.

Manning Dale

Read More...