Cdac Technical Paper
Cdac Technical Paper
Cdac Technical Paper
C-DAC
Select the Best Choice(s):
1. A set of rules, which enable orderly exchange of information between two devices.
a) Topologyb) Protocolc) Transmission Mediad) None of the above
6. Topology, which connects every single node in the network to every other node, is
a) Starb) Ring c) Meshd) Bus
9. Coaxial cable, UTP cable, STP cable and fibre cables are popular network media today. Order these in increasing
order of data security
a) Coaxial, UTP, STP, Fibre
b) UTP, Coaxial, STP, Fibre
c) UTP, STP, Coaxial, Fibre
d) None of the above
10. Bridges are simple devices that are used to connect LANs of
a) Different Architecture (eg. Ethernet to Token Ring)
b) Same architecture (eg. Ethernet to Ethernet)
c) Architecture does not matter
e) None of the above
11. Which application uses existing CSMA/VD over existing twisted-pair cable with bandwidths of 100 mbps?
a) 10BaseFb) 100BaseXc) 100VG-AnyLANd) 10BaseFD
12. What model divides the network communication process into seven layers?
a) Layered Modelb) TCP/IPc) OSId) X.25
13. B-ISDN uses fiber as a transmission medium and _______ as the switching infrastructure
a) Ethernetb) FDDIc) ATMd) None of the above
14. ______ is the only standards based technology that has been designed from the beginning to accommodate the
simultaneous transmission of voice, video and data
a) Home cable networkb) Satellite TVc) ATMd) All of the above
15. Which of the following common LAN protocols extend to OSI network layer.
a) NetBIOSb) NetBEUIc) TCP/IPd) All of the above
16. Portability standards are discussed widely in four areas, which of the following is not one of them.
a) Operating Systems
b) Data Management
c) Programming Languages
d) Hardware
17. Which of the following is not an essential feature of Data Link Layer protocols as defined by ISO/OSI model
a) Message orientation
b) Error Detection
c) Error correction by re-transmission
d) None of the above
18. Which of the following describes the OSI Class 3 transport (TP3)
a) Do nothing
b) Signaled Error Recovery
c) Multiplexing
d) Signalled error recovery and multiplexing
20. In the OSI model, the responsibility for negotiating the encodings to be used in any perticular connection is
entrusted upon
a) Application Layerb) Session Layerc) Presentation Layerd) None of the above
25. The Synchronous Optical Network is an ANSI standard. A similar standard established in Europe is
a) Synchronous Digital Hierarchy
b) SONET
c) Switched Multi megabit Data Service
d) Distributed Queue Duel Bus
26. In the TCP/IP protocol family ___________ provides reliable transport service.
a) Transport Protocolb) Transport Layerc) TCPd)All of above
28. An IP address when logically ANDed with netmask, the result is _________________.
a) Host Addressb) Network Addressc) Broadcast Addressd) None of the above
29. Remote boot uses _______ protocol to discover IP address of diskless machine.
a) ICMPb) SNMP c) ARPd) RARP
31. The source quench _________ message is used to control the rate at which datagrams are transmitted.
a) IPb) ICMP c) SNMPd) TCP
32. TCP establishes an end to end _______________ between the sender and receiver.
a) Connectionb) Virtual Circuitc) Pathd) None of above
35. ______ is a complex data structure that contains details about a connection
a) Socketb) Port c) TCBd) None of above
39. For block devices all I/O occurs through the _________________
a) Blocksb) Devicec) Buffer cached) None of above
40. _______ is a international standard file format for describing interactive 3D multimedia on the Internet.
a) DHTMLb) XML c) VRMLd) None of above
42. IPng provides security through Authentication Headers and the default encryption method is ________
a) SSLb) Public Keyc) MD5d) None of above
48. 100BASET4 operates at 100 mbps using base band signaling and the media is
a) Two stands of fiber
b) Two pairs of data grade UTP
c) Four pairs of telephone grade UTP
d) None of the above
59. Applications running on a single host are identified by service access points at Transport layer and Session layer
interface. These SAPs are known as
a) Portsb) Socketsc) Both A and Bd) None of the above
62. Application data is converted in a form suitable for transmission on the network by
a) Network Layerb) MAC Layerc) Session Layerd) Presentation Layer
64. Mapping between Internet Protocol address and MAC layer address are resolved using
a) RARPb) RIP c) ARPd) TCP/IP
94. A host has an IP address of 192.168.6.209 and a net mask of 255.255.255.0. Which one of the following
statements is true?
a) The subnet number is 192.168.6.0, and the host number is 209.
b) The subnet number is 192.168.6.192, and the host number is 17.
c) The subnet number is 192.168.6.200, and the host number is 9.
d) The subnet number is 192.168.6.208, and the host number is 1.
95. Which of the following protocols is used for network management and monitoring?
a) X.500b) SNMP c) SMTPd) X.400
96. Your network segment has a default gateway of 205.222.45.126 and a subnet mask of 255.255.255.192. Which
of the following is true?
a) The valid range for hosts is 205.222.1.126 through 205.222.44.126 and all the hosts must use the same subnet
mask.
b) The valid range for hosts is 205.222.45.126 through 205.222.45.126 and all the hosts must increase the
subnetmask by one.
c) The valid range for hosts is 205.222.45.65 through 205.222.45.125 and all the hosts must use the same
subnetmask.
d) The valid range for hosts is 205.222.1.65 through 205.222.45.126 and all the hosts must use the same
subnetmask.
97. When developers write TCP/IP software, they have two mechanisms for transporting data from applications:
TCP and UDP. Why, in many cases, is UDP used as the protocol for communications?
a) UDP has a smaller packet size, and thus can be sent around the network with more speed.
b) TCP has no mechanism to support short, choppy bursts of data, which some applications tend to produce.
c) UDP is never used for applications. It is simply a routing protocol.
d) UDP provides reliable delivery acknowledgements, which many applications need for success.
98. In a token-passing network, what can each and every device on the network be described as behaving like?
a) A proxy.b) A router.c) A bridge.d) Repeater
99. You have become increasingly concerned with the activity at the Logical Link Layer of the IPX/SPX stack on a
certain workstation. What data form should you be concentrating on at this level?
a) Framesb) Packetsc) Datagramsd) Bits
100. TCP/IP Protocol Architecture was designed to carry data over the ARPANET. What type of network is the
ARPANET?
a) Message switching network.
b) Packet switching network.
c) Packet routing network.
d) A hybrid of a packet and message routing network.
101. Your company has been assigned a Class B IP address. You are administrating a country-wide network with 45
individual subnets. Over the next year, you will be adding 60 subnets. What subnet mask should you use that will
allow the most hosts per subnet?
a) 255.255.252.0b) 255.255.254.0c) 255.0.0.0d) 255.255.0.0
102. What layer of the OSI model handles such issues as file access and transfer and virtual terminal emulation?
a) Applicationb) Networkc) Transportd) Session
103. You have implemented RSA encryption technology on your network. It seems to be working well. However,
one station always receives encrypted emails as garbled text, meaning the protocol stack is corrupted. What OSI
layer above can be assumed to be faulty?
a) Data Link Layerb) Presentation Layerc) Session Layerd) Transport Layer
106. You have been given the Class C address of 205.222.5.0. What size subnet mask will give you the greatest
possible number of hosts?
a) An 8-bit mask of 255.255.255.255 for 254 hosts.
b) An 8-bit mask of 255.255.255.0 for 254 hosts.
c) An 8-bit mask of 255.255.0.0 for 65,534 hosts.
d) An 8-bit mask of 255.255.0.0 for 8190 hosts.
109. Which one of the following statements correctly describes differences between a bridge and a layer two
switch?
a) A layer two switch is a high speed, multi-port bridge.
b) A layer two switch cannot use the Spanning Tree Protocol to learn a network’s topology, while
c) A layer two switch can support multiple network media types, such as twisted pair, fiber, and coax, while a bridge
is limited to supporting a single network mediatype.
d) A layer two switch is than an Ethernet hub that supports different speeds on different ports, while a bridge
requires all ports to have the same speed.
110. How are packet forwarding decisions made in an OSI reference model layer three device?
a) The device compares the destination MAC address to an internal table that associates MAC addresses to
particular ports.
b) In a layer three device, every packet is sent out of every port.
c) In a layer three device, packets are forwarded based on node name.
d) The device compares the destination network address to an internal table that associates network addresses to
particular ports.
113. Network cards in computers communicate with each other using unique MAC addresses, similar to street
addresses. Where do these unique addresses come from?
a) The network administrator makes up addresses to use and then programs them into the software.
b) The manufacturer publishes a range of addresses in the manual that you choose from.
c) The network card searches the network and then assigns itself a unique address from an elaborate algorithm
using the alread-allocated addresses.
d) The IEEE assigns every manufacturer a prefix and a block of address range, typically expressed in hexadecimala
bridge can.
Similar Categories
more





ONLINE TESTS


HCL
Mu-Sigma
TCS
Amazon
CTS
Online Quantitative test
Online Verbal Ability Test
Online Reasoning Test
Online Data Interpretation Test
Online Assesment Test
Technical Online Tests
IT companies Online Test
Non IT companies And Bank Online Test
Basic General Knowledge
Basic General Knowledge Level-2
Online Current Affairs Test
Online GATE Test
Online CAT Test