Advance Networking Data Security Quiz

CS 4404: ADVANCED NETWORKING AND DATA SECURITY

What is the purpose of the retransmission timer?

Select one:

  1. Timeouts when expected packet is not received 
  2. Records reception times in packets
  3. Sets the retransmission timeout value
  4. is known as exponential backoff

 

The correct answer is: Timeouts when expected packet is not received


Question 
2

TCP sends segments in bursts (or, groups of segments), every burst containing the number of segments limited by.

Select one:

  1. Packet size
  2. the current window size 
  3. Segment size
  4. Burst speed

 

The correct answer is: the current window size


Question 
3

TCP protocol determines the optimal window size by what method?

Select one:

  1. Predefined
  2. Dynamically 
  3. Traffic analysis
  4. QoS

 

The correct answer is: Dynamically


Question 
4

Which is not a method to introduce IPv4 to IPV6 to the public Internet?

Select one:

  1. Dual Stack
  2. Masking 
  3. Tunneling
  4. Dual stack approach

 

The correct answer is: Masking


Question 
5

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
6

Which routing protocol is a link-state routing protocol?

Select one:

  1. RIP
  2. OSPF 
  3. BGP
  4. AS

 

The correct answer is: OSPF


Question 
7

The receive buffer is used to store in-order and out-of-order packets?

Select one:

True 

False

 

The correct answer is 'True'.


Question 
8

The IPv6 Hop-by-Hop Options header carries optional information for the routers that will be visited and must not be examined by every node along a packet’s delivery path?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
9

Routing Information Protocol (RIP) is a not distance-vector routing protocol?

Select one:

True

False 

 

The correct answer is 'False'.


Question 
10

Network Address Translation (NAT) is an Internet Engineering Task Force (IETF) standard used to allow multiple computers on a private network (using private address ranges such as 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16) to share a single, globally routable IPv4 address.?

Select one:

True 

False

 

The correct answer is 'True'.

Which is NOT a network topology?

Select one:

  1. Centralized
  2. Decentralized
  3. Star 
  4. Distributed

 

The correct answer is: Star


Question 
2

Which layer is known as the “physical layer” of the reference architecture?

Select one:

  1. Physical 
  2. Link
  3. End to end
  4. Network

 

The correct answer is: Physical


Question 
3

Packets from higher layers become nested inside the packets of higher layers as they are passed down the protocol stack

Select one:

True

False 

 

The correct answer is 'False'.


Question 
4

Lost or damaged packets should be:

Select one:

  1. Discarded
  2. Retransmitted 
  3. Stored
  4. Forwarded

 

The correct answer is: Retransmitted


Question 
5

Real-world systems are designed with sub-peak capacity for economic reasons. As a result, they experience congestion and delays during off-peak usage periods.

Select one:

True

False 

 

The correct answer is 'False'.


Question 
6

Which of the following is NOT A type of delay associated with packet transmissions.

Select one:

  1. Processing
  2. Transmission
  3. Propagation
  4. Routing 

 

The correct answer is: Routing


Question 
7

Which retransmission strategy is the most efficient?

Select one:

  1. Go back
  2. Stop and wait
  3. Selective Repeat
  4. Sliding window 

 

The correct answer is: Sliding window


Question 
8

Broadcast links allow connecting multiple network nodes via the same link. Hence, when one node transmits, all or most other nodes on the link can hear the transmission. If two or more nodes are transmitting simultaneously, their signals will interfere with each other, which technique will NOT avoid this situation?

Select one:

  1. Timed transmissions
  2. Listening before speaking
  3. Statistical Multiplexing 
  4. Retransmission of corrupted information

 

The correct answer is: Statistical Multiplexing


Question 
9

The amount of processing required at the bridge, as opposed to a switch is minimal because bridged networks use the same protocols.

Select one:

True 

False

 

The correct answer is 'True'.


Question 
10

Which of the following is an example of dotted decimal notation for IP addresses:

Select one:

  1. 128 . 6 . 29 . 131 
  2. 10000000 00000110 00011101 10000011
  3. my.uopeople.org/
  4. 192.168.1.1/24

 

The correct answer is: 128 . 6 . 29 . 131

 

CallTutors Guarantees

  • Work Within Deadline
  • Lowest Price Guranteed
  • Plagiarism Free Guranteed
  • 24 * 7 Availability
  • Native Experienced Experts
  • Free Revisions

Avg Client Rating: 4.8/5

Total Reviews: 9,835

Consumer Law Assignment Help06/18/2019

It was awesome! Thank you very much. Assignment graded with maximum points!!

Cheema Singh
Online Homework Help Service06/18/2019

Really well prepared as i requested and i refer to friends in future for there work. Thank you very much for homework help.

Tara Khan
Do My Homework06/17/2019

The work was nice and well written, I just faced some issues in the communication and the rest was good.

Wilfred
English Assignment Help06/17/2019

I’d suggest every student to at least try Calltutors for once. They did a good job on my English literature assignment. Thanks

Ivany
Got Excellent Grades!06/15/2019

I have used multiple assignment website till now in my business administration course but none of them did a better job on my assignment. I’d surely suggest this website to anyone.

Gaetan

Read More...