Advance Networking Data Security Quiz

CS 4404: ADVANCED NETWORKING AND DATA SECURITY

What is the purpose of the retransmission timer?

Select one:

  1. Timeouts when expected packet is not received 
  2. Records reception times in packets
  3. Sets the retransmission timeout value
  4. is known as exponential backoff

 

The correct answer is: Timeouts when expected packet is not received


Question 
2

TCP sends segments in bursts (or, groups of segments), every burst containing the number of segments limited by.

Select one:

  1. Packet size
  2. the current window size 
  3. Segment size
  4. Burst speed

 

The correct answer is: the current window size


Question 
3

TCP protocol determines the optimal window size by what method?

Select one:

  1. Predefined
  2. Dynamically 
  3. Traffic analysis
  4. QoS

 

The correct answer is: Dynamically


Question 
4

Which is not a method to introduce IPv4 to IPV6 to the public Internet?

Select one:

  1. Dual Stack
  2. Masking 
  3. Tunneling
  4. Dual stack approach

 

The correct answer is: Masking


Question 
5

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
6

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
7

The receive buffer is used to store in-order and out-of-order packets?

Select one:

True 

False

 

The correct answer is 'True'.


Question 
8

The IPv6 Hop-by-Hop Options header carries optional information for the routers that will be visited and must not be examined by every node along a packet’s delivery path?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
9

Routing Information Protocol (RIP) is a not distance-vector routing protocol?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
10

Network Address Translation (NAT) is an Internet Engineering Task Force (IETF) standard used to allow multiple computers on a private network (using private address ranges such as 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16) to share a single, globally routable IPv4 address.?

Select one:

True 

False

 

The correct answer is 'True'.

Which is NOT a network topology?

Select one:

  1. Centralized
  2. Decentralized
  3. Star 
  4. Distributed

 

The correct answer is: Star


Question 
2

Which layer is known as the “physical layer” of the reference architecture?

Select one:

  1. Physical 
  2. Link
  3. End to end
  4. Network

 

The correct answer is: Physical


Question 
3

Packets from higher layers become nested inside the packets of higher layers as they are passed down the protocol stack

Select one:

True

False 

 

The correct answer is 'False'.


Question 
4

Lost or damaged packets should be:

Select one:

  1. Discarded
  2. Retransmitted 
  3. Stored
  4. Forwarded

 

The correct answer is: Retransmitted


Question 
5

Real-world systems are designed with sub-peak capacity for economic reasons. As a result, they experience congestion and delays during off-peak usage periods.

Select one:

True

False 

 

The correct answer is 'False'.


Question 
6

Which of the following is NOT A type of delay associated with packet transmissions.

Select one:

  1. Processing
  2. Transmission
  3. Propagation
  4. Routing 

 

The correct answer is: Routing


Question 
7

Which retransmission strategy is the most efficient?

Select one:

  1. Go back
  2. Stop and wait
  3. Selective Repeat
  4. Sliding window 

 

The correct answer is: Sliding window


Question 
8

Broadcast links allow connecting multiple network nodes via the same link. Hence, when one node transmits, all or most other nodes on the link can hear the transmission. If two or more nodes are transmitting simultaneously, their signals will interfere with each other, which technique will NOT avoid this situation?

Select one:

  1. Timed transmissions
  2. Listening before speaking
  3. Statistical Multiplexing 
  4. Retransmission of corrupted information

 

The correct answer is: Statistical Multiplexing


Question 
9

The amount of processing required at the bridge, as opposed to a switch is minimal because bridged networks use the same protocols.

Select one:

True 

False

 

The correct answer is 'True'.


Question 
10

Which of the following is an example of dotted decimal notation for IP addresses:

Select one:

  1. 128 . 6 . 29 . 131 
  2. 10000000 00000110 00011101 10000011
  3. my.uopeople.org/
  4. 192.168.1.1/24

 

The correct answer is: 128 . 6 . 29 . 131

 

CallTutors Guarantees

  • Work Within Deadline
  • Lowest Price Guranteed
  • Plagiarism Free Guranteed
  • 24 * 7 Availability
  • Native Experienced Experts
  • Free Revisions

Reviews

Total Reviews: 190

Awesome term paper writing04/26/2018

All the details in my term paper writings fully satisfied me. I was very much worried about my paper, but your writers vanished all my worries. Thanks to your master writers.

Samantha Ji
Management Assignment04/26/2018

It’s very useful for my work I’ll introduce to my friends. It’s very useful for my work I’ll introduce to my friends.It’s very useful for my work I’ll introduce to my friends.It’s very useful for my work I’ll introduce to my friends.

Alan Dunn
Management Essays04/26/2018

great assignment and definitely I will use your service again. this will help me a lot during my education and be looking forward to getting more help for assignment

Jane Walker
Great reflective essay work04/24/2018

The reflective essay your writers wrote was excellent. I would like to give my all assignments to him/her. I have placed some new orders. Thanks, team! God bless you!

Grace Ling
Significant sociology assignment04/24/2018

I would like to say that the sociology assignments your writer provided were beneficial for me. I would want the same writer for my next assignment if possible. Thanks a lot!

Claudia Jaime

Read More...