MCQ

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 29

1) Which of the following is not the requirement of routing function?

A. Correctness
B. Robustness
C. Delay time
D. Stability
2) The ......... protocol allows the administrator to assign a cost, called the metric, to
each route.
A. OSPF
B. RIP
C. BGP
D. BBGP
3) If there is only one routing sequence for each source destination pair, the scheme
is known as .....
A. static routing
B. fixed alternative routing
C. standard routing
D. dynamic routing
4) The Open Shortest Path First(OSPF) protocol is an intra domain routing
protocol based on ........ routing.
A. distance vector
B. link state
C. path vector
D. non distance vector
5) An/A ..........routing scheme is designed to enable switches to react to changing
traffic patterns on the network.
A. static routing
B. fixed alternative routing
C. standard routing
D. dynamic routing
6) The Routing Information Protocol(RIP) is an intra domain routing based
on ........routing.
A. distance vector
B. link state
C. path vector
D. distance code

7) The term ........ refers to which node or nodes in the network are responsible for
the routing decision.
A. decision place
B. routing place
C. node place
D. switching place
8) In ....... routing the least cost route between any two nodes is the minimum
distance.
A. path vector
B. distance vector
C. link state
D. switching
9) For centralized routing the decision is made by some designated node called ......
A. designated center
B. control center
C. network center
D. network control center
10) For purposes of routing, the Internet is divided into .......
A. wide area networks
B. autonomous networks
C. local area networks
D. autonomous system
11) In .......... a route is selected for each destination pair of nodes in the network.
A. flooding
B. variable routing
C. fixed routing
D. random routing
12) To create a neighborhood relationship, a router running BGP sends an ..........
message.
A. open
B. update
c. keep alive
D. close

13) The technique which requires no network information required is ....


A. flooding
B. variable routing
C. fixed routing
D. random routing
14) An area is ....
A. part of an AS
B. composed of at least two AS
C. another term for an AS
D. composed more than two AS
15) Which of the following produces high traffic network?
A. Variable routing
B. Flooding
C. Fixed routing
D. Random routing
16) In ........... routing, we assume that there is one node (or more) in each
autonomous system that acts on behave of the entire autonomous system.
A. distant vector
B. path vector
C. link state
D. multipoint
17) When a direct delivery is made, both the deliverer and receiver have the same .
A. routing table
B. host id
C. IP address
D. Net id
18) In OSPF, a ......... link is a network with several routers attached to it.
A. point-to-point
B. transient
C. stub
D. multipoint

19) In ....... routing, the mask and the destination address are both 0.0.0.0 in routing
table.
A. next-hop
B. host-specific
C. network-specific
D. default
20) In .......... the router forwards the receive packet through only one of its
interfaces.
A. unicasting
B. multicasting
C. broadcasting
D. point to point
Answers:
1) C. Delay time
2) A. OSPF
3) B. fixed alternative routing
4) B. link state
5) C. standard routing
6) A. distance vector
7) A. decision place
8) B. distance vector
9) D. network control center
10) D. autonomous system
11) C. fixed routing
12) B. update
13) A. flooding
14) A. part of an AS
15) B. Flooding
16) B. path vector
17) D. Net id
18) B. transient
19) D. default
20) B. multicasting

Internet security

. Which of the following are the solutions to network security?


i) Encryption
ii) Authentication
iii) Authorization
iv) Non-repudiation
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv
2. is to protect data and passwords.
A) Encryption
B) Authentication
C) Authorization
D) Non-repudiation
3. The following protocols and system are commonly used to provide various
degrees of security services in computer network.
i) IP filtering
ii) Reverse Address Translation
iii) IP security Architecture (IPsec)
iv) Firewalls
v) Socks
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
4. A firewall is installed at the point where the secure internal network and
untrusted external network meet which is also known as
A) Chock point
B) meeting point
C) firewall point
D) secure point
5. Which of the following is / are the types of firewall?
A) Packet Filtering Firewall
B) Dual Homed Gateway Firewall
C) Screen Host Firewall
D) All of the above

6. The components of IP security includes .


A) Authentication Header (AH)
B) Encapsulating Security Payload (ESP)
C) Internet key Exchange (IKE)
D) All of the above
7. .. is used to carry traffic of one protocol over network that does
not support that protocol directly.
A) Tunneling
B) Transferring
C) Trafficking
D) Switching
8. In . Mode, the authentication header is inserted immediately after
the IP header.
A) Tunnel
B) Transport
C) Authentication
D) Both A and B
9. State true or false.
i) Socks are a standard for circuit level gateways.
ii) The NAT is used for small number of the hosts in a private network.
A) True, False
B) False, True
C) True, True
D) False, False
10. A . is an extension of an enterprises private intranet across a
public Network such as the Internet across a public Network such as the Internet,
creating a secure private connection.
A) VNP
B) VPN
C) VSN
D) VSPN
Answers:
1. D) All i, ii, iii and iv 6. D) All of the above
2. A) Encryption
7. A) Tunneling
3. B) i, iii, iv and v only 8. A) Tunnel
4. A) Chock point
9. C) True, True

5. D) All of the above 10. B) VPN


1. The primary goal of the .. protocol is to provide a private
channel between communicating application, which ensures privacy of data
authentication of the partners, and integrity.
A) SSL
B) ESP
C) TSL
D) PSL
2. The . is used to provide integrity check, authentication and
encryption to IP datagram.
A) SSL
B) ESP
C) TSL
D) PSL
3. In . mode, a common technique in packet-switched networks
consists of wrapping a packet in a new one.
A) Tunneling
B) Encapsulation
C) Both A and B
D) None of the above
4. The . Is a collection of protocols designed by Internet
Engineering Task Force(IETF) to provide security for a packet at the Network
level.
A) IPsec
B) Netsec
C) Packetsec
D) Protocolsec
5. At the lower layer of SSL, a protocol for transferring data using a variety of
predefined cipher and authentication combinations called the .
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol

6. While initiating SSL session, the client code recognizes the SSL request and
establishes a connection through TCP Part .. to the SSL code on the
server.
A) 420
B) 1032
C) 443
D) 322
7. On the upper layer of SSL, a protocol for initial authentication and transfer of
encryption keys, called the
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol
8. State whether the following statement are true.
i) An application-level gateway is often referred to as a proxy.
ii) In proxy, a direct connection is established between the client and destination
server.
A) True, False
B) False, True
C) True, True
D) False, False
9. In packet-filtering router, the following information can be external from the
packet header.
i) Source IP address
ii) Destination IP address
iii) TCP/UDP source port
iv) ICMP message type
v) TCP/UDP destination port
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
10. .. mode is used whenever either end of a security association is
gateway.
A) Tunnel
B) Encapsulating
C) Transport

D) Gateway
1.
2.
3.
4.
5.

Answers:
A) SSL
6. C) 443
B) ESP
7. A) SSL hand... protocol
C) Both A and B
8. A) True, False
A) IPsec
9. D) All i, ii, iii, iv and v
C) SSL record protocol
10. A) Tunnel

Routing protocol and algorithm

1) Which of the following is not the requirement of routing function?


A. Correctness
B. Robustness
C. Delay time
D. Stability
2) The ......... protocol allows the administrator to assign a cost, called the metric, to
each route.
A. OSPF
B. RIP
C. BGP
D. BBGP
3) If there is only one routing sequence for each source destination pair, the scheme
is known as .....
A. static routing
B. fixed alternative routing
C. standard routing
D. dynamic routing
4) The Open Shortest Path First(OSPF) protocol is an intra domain routing
protocol based on ........ routing.
A. distance vector

B. link state
C. path vector
D. non distance vector
5) An/A ..........routing scheme is designed to enable switches to react to changing
traffic patterns on the network.
A. static routing
B. fixed alternative routing
C. standard routing
D. dynamic routing
6) The Routing Information Protocol(RIP) is an intra domain routing based
on ........routing.
A. distance vector
B. link state
C. path vector
D. distance code
7) The term ........ refers to which node or nodes in the network are responsible for
the routing decision.
A. decision place
B. routing place
C. node place

D. switching place
8) In ....... routing the least cost route between any two nodes is the minimum
distance.
A. path vector
B. distance vector
C. link state
D. switching
9) For centralized routing the decision is made by some designated node called ......
A. designated center
B. control center
C. network center
D. network control center
10) For purposes of routing, the Internet is divided into .......
A. wide area networks
B. autonomous networks
C. local area networks
D. autonomous system
11) In .......... a route is selected for each destination pair of nodes in the network.
A. flooding

B. variable routing
C. fixed routing
D. random routing
12) To create a neighborhood relationship, a router running BGP sends an ..........
message.
A. open
B. update
c. keep alive
D. close
13) The technique which requires no network information required is ....
A. flooding
B. variable routing
C. fixed routing
D. random routing
14) An area is ....
A. part of an AS
B. composed of at least two AS
C. another term for an AS
D. composed more than two AS

15) Which of the following produces high traffic network?


A. Variable routing
B. Flooding
C. Fixed routing
D. Random routing
16) In ........... routing, we assume that there is one node (or more) in each
autonomous system that acts on behave of the entire autonomous system.
A. distant vector
B. path vector
C. link state
D. multipoint
17) When a direct delivery is made, both the deliverer and receiver have the
same ....
A. routing table
B. host id
C. IP address
D. Net id
18) In OSPF, a ......... link is a network with several routers attached to it.
A. point-to-point

B. transient
C. stub
D. multipoint
19) In ....... routing, the mask and the destination address are both 0.0.0.0 in routing
table.
A. next-hop
B. host-specific
C. network-specific
D. default
20) In .......... the router forwards the receive packet through only one of its
interfaces.
A. unicasting
B. multicasting
C. broadcasting
D. point to point

Answers:
1) C. Delay time
2) A. OSPF
3) B. fixed alternative routing
4) B. link state
5) C. standard routing

6) A. distance vector
7) A. decision place
8) B. distance vector
9) D. network control center
10) D. autonomous system
11) C. fixed routing
12) B. update
13) A. flooding
14) A. part of an AS
15) B. Flooding
16) B. path vector
17) D. Net id
18) B. transient
19) D. default
20) B. multicasting

1) Alternate and adaptive routing algorithm belongs to ..........


A. static routing
B. permanent routing
C. standard routing
D. dynamic routing
2) .......... protocol is a popular example of a link state routing protocol.
A. SPF
B. BGP
C. RIP
D. OSPF

3) An example of routing algorithm is ...


A. TELNET
B. TNET
C. ARPANET
D. ARNET
4) The Enhanced Interior Gateway Routing Protocol(EIGRP) is categorized as
a ........
A. Distance vector routing protocols
B. Link state routing protocols
C. Hybrid routing protocols
D. Automatic state routing protocols
5) In .......... routing, the routing table hold the address of just the next hop instead
of complete route information.
A. next-hop
B. host-specific
C. network-specific
D. default
6) .......... was originally developed to provide a loop-free method of exchanging
routing information between autonomous systems.
A. OSPF

B. EIGRP
C. BGP
D. RIP
7) In ............ routing, the destination address is a network address in the routing
tables.
A. next-hop
B. host-specific
C. network-specific
D. default
8) Logical partitioning of the network, authentication and faster convergence rate
are the advantages of ....
A. OSPF
B. EIGRP
C. BGP
D. RIP
9) The .......... flag indicates the availability of a router.
A. up
B. host specific
C. gateway
D. added by redirection

10) The types of autonomous system defined by BGP is/are ..


A. Stub
B. Multi-homed
C. Transit
D. All of the above
11) For a direct deliver, the ........ flag is on.
A. up
B. host specific
C. gateway
D. added by redirection
12) A .......... AS has connections to two or more autonomous systems and carries
both local and transit traffic.
A. Stub
B. Multi-homed
C. Transit
D. All of the above
13) In unicast routing, each router in the domain has a table that defines a .........
path tree to possible destinations.
A. average

B. longest
C. shortest
D. very longest
14) .............. supports the simultaneous use of multiple unequal cost paths to a
destination.
A. OSPF
B. EIGRP
C. BGP
D. RIP
15) In multicast routing, each involved router needs to construct a ......... path tree
for each group.
A. average
B. longest
C. shortest
D. very longest
16) Which of the following is/are the benefits provided by EIGRP?
i) Faster convergence
ii) partial routing updates
iii) High bandwidth utilization

iv) Route summarization


A. i, iii and iv only
B. i, ii and iii only
C. ii, iii and iv only
D. i, ii and iv only
17) In OSPF, a .......... link is a network is connected to only one router.
A. point-to-point
B. transient
C. stub
D. multipoint
18) ......... is the process of consolidating multiple contiguous routing entries into a
single advertisement.
A. Faster convergence
B. Partial routing updates
C. Route summarization
D. Multiple protocols
19) In OSPF, when the link between two routers is broken, the administration may
create a ........ link between them using a longer path that probably goes through
several routers.
A. point-to-point

B. transient
C. stub
D. multipoint
20) ........... is the process of introducing external routers into an OSPF network.
A. Route redistribution
B. Route summarization
C. Route reintroducing
D. Route recreation

Answers:
1) D. dynamic routing
2) D. OSPF
3) C. ARPANET
4) C. Hybrid routing protocols
5) A. next-hop
6) C. BGP
7) C. network-specific
8) A. OSPF
9) D. added by redirection
10) D. All of the above
11) C. gateway
12) C. Transit
13) C. shortest
14) B. EIGRP
15) C. shortest
16) D. i, ii and iv only
17) C. stub

18) C. Route summarization


19) D. multipoint
20) A. Route redistribution
1) The principle of ...........states that the routing table is stored from the longest
mask to the shortest mask.
A. first mask matching
B. shortest mask matching
C. longest mask matching
D. very shortest mask matching
2) ............ are two popular examples of distance vector routing protocols.
A. OSPF and RIP
B. RIP and BGP
C. BGP and OSPF
D. BGP and SPF
3) ...... deals with the issues of creating and maintaining routing tables.
A. Forwarding
B. Routing
C. Directing
D. None directing

4) During an adverse condition, the length of time for every device in the network
to produce an accurate routing table is called the ..........
A. accurate time
B. integrated time
C. convergence time
D. average time
5) A ......... routing table contains information entered manually.
A. static
B. dynamic
C. hierarchical
D. non static
6) Which of the following is/are the uses of static routing methods.
A. To manually define a default route.
B. To provide more secure network environment.
C. To provide more efficient resource utilization.
D. All of the above
7) A .......... routing table is updated periodically using one of the dynamic routing
protocols.
A. static
B. dynamic

C. hierarchical
D. non static
8) Which of the following is not the category of dynamic routing algorithm.
A. Distance vector protocols
B. Link state protocols
C. Hybrid protocols
D. Automatic state protocols
9) In ......... forwarding, the full IP address of a destination is given in the routing
table.
A. next-hop
B. network-specific
C. host-specific
D. default
10) To build the routing table, ........... algorithms allow routers to automatically
discover and maintain awareness or the paths through the network.
A. Static routing
B. Dynamic routing
C. Hybrid routing
D. Automatic routing

11) In .......... forwarding, the mask and destination addresses are both 0.0.0.0 in the
routing table.
A. next-hop
B. network-specific
C. host-specific
D. default
12) To build the routing table, ........... method use preprogrammed definitions
representing paths through the network.
A. Static routing
B. Dynamic routing
C. Hybrid routing
D. Automatic routing
13) In .......... forwarding, the destination addresses is a network address in the
routing table.
A. next-hop
B. network-specific
C. host-specific
D. default
14) ......... allow routers to exchange information within an AS.
A. Interior Gateway Protocol(IGP)

B. Exterior Gateway Protocol(EGP)


C. Border Gateway Protocol(BGP)
D. Static Gateway Protocol(SGP)
15) In .......... forwarding, the routing table holds the address of just the next hop
instead of complete route information.
A. next-hop
B. network-specific
C. host-specific
D. default
16) Which of the following is an example of Exterior Gateway Protocol.
A. Open Short Path First(OSPF)
B. Border Gateway Protocol(BGP)
C. Routing Information Protocol(RIP)
D. All of the above
17) A one-to-all communication between one source and all hosts on a network is
classified as a .........
A. unicast
B. multicast
C. broadcast

D. point to point
18) ........ allow the exchange of summary information between autonomous
systems.
A. Interior Gateway Protocol(IGP)
B. Exterior Gateway Protocol(EGP)
C. Border Gateway Protocol(BGP)
D. Dynamic Gateway Protocol(DGP)
19) A robust routing protocol provides the ability to ......... build and manage the
information in the IP routing table.
A. dynamically
B. statically
C. hierarchically
D. All of the above
20) State True of False for definition of an autonomous system(AS).
i) An AS is defined as a physical portion of a larger IP network.
ii) An AS is normally comprised of an internetwork within an organization.
A. i-True, ii-True
B. i-True, ii-False
C. i-False, ii-True
D. i-False, ii-False

Answers:
1) C. longest mask matching
2) B. RIP and BGP
3) B. Routing
4) C. convergence time
5) A. static
6) D. All of the above
7) B. dynamic
8) D. Automatic state protocols
9) C. host-specific
10) B. Dynamic routing
11) D. default
12) A. Static routing
13) B. network-specific
14) A. Interior Gateway Protocol(IGP)
15) A. next-hop
16) B. Border Gateway Protocol(BGP)
17) C. broadcast
18) B. Exterior Gateway Protocol(EGP)
19) A. dynamically
20) C. i-False, ii-True

You might also like