Advance Networking Data Security Quiz

CS 4404: ADVANCED NETWORKING AND DATA SECURITY

What is the purpose of the retransmission timer?

Select one:

  1. Timeouts when expected packet is not received 
  2. Records reception times in packets
  3. Sets the retransmission timeout value
  4. is known as exponential backoff

 

The correct answer is: Timeouts when expected packet is not received


Question 
2

TCP sends segments in bursts (or, groups of segments), every burst containing the number of segments limited by.

Select one:

  1. Packet size
  2. the current window size 
  3. Segment size
  4. Burst speed

 

The correct answer is: the current window size


Question 
3

TCP protocol determines the optimal window size by what method?

Select one:

  1. Predefined
  2. Dynamically 
  3. Traffic analysis
  4. QoS

 

The correct answer is: Dynamically


Question 
4

Which is not a method to introduce IPv4 to IPV6 to the public Internet?

Select one:

  1. Dual Stack
  2. Masking 
  3. Tunneling
  4. Dual stack approach

 

The correct answer is: Masking


Question 
5

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
6

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
7

The receive buffer is used to store in-order and out-of-order packets?

Select one:

True 

False

 

The correct answer is 'True'.


Question 
8

The IPv6 Hop-by-Hop Options header carries optional information for the routers that will be visited and must not be examined by every node along a packet’s delivery path?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
9

Routing Information Protocol (RIP) is a not distance-vector routing protocol?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
10

Network Address Translation (NAT) is an Internet Engineering Task Force (IETF) standard used to allow multiple computers on a private network (using private address ranges such as 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16) to share a single, globally routable IPv4 address.?

Select one:

True 

False

 

The correct answer is 'True'.

Which is NOT a network topology?

Select one:

  1. Centralized
  2. Decentralized
  3. Star 
  4. Distributed

 

The correct answer is: Star


Question 
2

Which layer is known as the “physical layer” of the reference architecture?

Select one:

  1. Physical 
  2. Link
  3. End to end
  4. Network

 

The correct answer is: Physical


Question 
3

Packets from higher layers become nested inside the packets of higher layers as they are passed down the protocol stack

Select one:

True

False 

 

The correct answer is 'False'.


Question 
4

Lost or damaged packets should be:

Select one:

  1. Discarded
  2. Retransmitted 
  3. Stored
  4. Forwarded

 

The correct answer is: Retransmitted


Question 
5

Real-world systems are designed with sub-peak capacity for economic reasons. As a result, they experience congestion and delays during off-peak usage periods.

Select one:

True

False 

 

The correct answer is 'False'.


Question 
6

Which of the following is NOT A type of delay associated with packet transmissions.

Select one:

  1. Processing
  2. Transmission
  3. Propagation
  4. Routing 

 

The correct answer is: Routing


Question 
7

Which retransmission strategy is the most efficient?

Select one:

  1. Go back
  2. Stop and wait
  3. Selective Repeat
  4. Sliding window 

 

The correct answer is: Sliding window


Question 
8

Broadcast links allow connecting multiple network nodes via the same link. Hence, when one node transmits, all or most other nodes on the link can hear the transmission. If two or more nodes are transmitting simultaneously, their signals will interfere with each other, which technique will NOT avoid this situation?

Select one:

  1. Timed transmissions
  2. Listening before speaking
  3. Statistical Multiplexing 
  4. Retransmission of corrupted information

 

The correct answer is: Statistical Multiplexing


Question 
9

The amount of processing required at the bridge, as opposed to a switch is minimal because bridged networks use the same protocols.

Select one:

True 

False

 

The correct answer is 'True'.


Question 
10

Which of the following is an example of dotted decimal notation for IP addresses:

Select one:

  1. 128 . 6 . 29 . 131 
  2. 10000000 00000110 00011101 10000011
  3. my.uopeople.org/
  4. 192.168.1.1/24

 

The correct answer is: 128 . 6 . 29 . 131

 

CallTutors Guarantees

  • Work Within Deadline
  • Lowest Price Guranteed
  • Plagiarism Free Guranteed
  • 24 * 7 Availability
  • Native Experienced Experts
  • Free Revisions

Avg Client Rating: 4.8/5

Total Reviews: 9,835

Term Paper Help12/18/2018

You provided very quality work, all terms are flowed very well and received good feedback from my professor

Reuben
Business Assignment Help12/18/2018

You delivered my assignment just before the deadline...thanks for your hard work! i was expecting more than that.

Abelson
Writing Assignment Help12/18/2018

I was about to give up on my assignment until my classmate told me about Calltutors.com and they offer assignment writing services. I am pleased to get help from you..Thanks a lot..

Jane
Best Assignment Service12/18/2018

I would like to appreciate the online tutors of the Calltutors.com. This was the best service ever I had experience.

Ace
Research Paper Help12/17/2018

Just Wow! The research paper help, your expert has given me.... made me score ‘A’ grade in my yearly report.

Addams

Read More...