Saint Com548 All Exams Latest 2019 March Question # 00600743 Subject: Education Due on: 04/27/2019 Posted On: 04/27/2019 04:46 AM Tutorials: 1 Rating: 4.6/5
COM548
Advanced Networking Protocols
EXAM 1
Question 1 Host and end-system have the
same meaning.
Question 1 options:
True
False
Question 2 Which of the following is not a
common task found in TCP/IP?
Question 2 options:
Encryption
Connection setup
Segmentation and reassembly
Flow control
Question 3 Which internet service is not
popular in an urban area?
Question 3 options:
Fiber-to-the-home
Cable Modem
Satellite
Dial-up
Question 4 Which of the following layer
does not belong to TCP/IP?
Question 4 options:
Transport
Application
Network
Presentation
Question 5 A circuit-switched network
cannot guarantee a certain amount of end-to-end bandwidth.
Question 5 options:
True
False
Question 6 Network Core includes the
following:
Question 6 options:
servers.
all of the above.
routers.
switches.
Question 7 A __________ specifies how
networked data is formatted into discrete units, such as packets or frames.
Question 7 options:
topology
communications medium
router
protocol
Question 8 Which type of delay takes the
error-checking into account?
Question 8 options:
Queueing delay
Processing delay
Transmission delay
Propagation delay
Question 9 Can store-and-forward be used in
a circuit-switched network?
Question 9 options:
Yes
No
Question 10 If an application is sending
out 500 kb of data per second and the host transmission rate is 500kbps, would
the host be able to handle all the data from the application?
Question 10 options:
Yes
No
COM548
Advanced Networking Protocols
EXAM 2
Question 1 Suppose Host A is sending Host B
a large file over a TCP connection. The number of unacknowledged bytes that
Host A sends cannot exceed the size of the receiver buffer.
Question 1 options:
True
False
Question 2 Suppose Host A is sending Host B
a large file to Host B over a TCP connection. If the sequence number for a
segment of this connection is m, then the sequence number for the subsequent
segment will necessarily be m+1.
Question 2 options:
True
False
Question 3 Consider congestion control in
TCP. When the timer expires at the sender, the value of ssthresh is set to one
half of its previous value.
Question 3 options:
True
False
Question 4 Host A is sending Host B a large
file over a TCP connection. Assume Host B has no data to send Host A. Host B
will not send acknowledgements to Host A because Host B cannot piggyback the
acknowledgements on data.
Question 4 options:
True
False
Question 5 Voice and video traffic is often
sent over TCP.
Question 5 options:
True
False
Question 6 CMP is primarily used for:
Question 6 options:
addressing.
error and diagnostic functions.
none of the above.
forwarding.
Question 7 The function(s) of network layer
in a virtual-circuit network is/are:
Question 7 options:
all of the above.
routing.
forwarding.
call setup.
Question 8 Routers in both datagram
networks and virtual-circuit networks both use forwarding tables.
Question 8 options:
True
False
Question 9 The network layer concerns with
__________.
Question 9 options:
none of the above.
frames
bits
packets
Question 10 It has been said that when IPv6
tunnels through IPv4 routers, IPv6 treats the IPv4 tunnels as link-layer
protocols.
Question 10 options:
True
False
Question 11 A circuit-switched network
cannot guarantee a certain amount of end-to-end bandwidth.
Question 11 options:
True
False
Question 12 Which of the following protocol
is used for Electronic Mail?
Question 12 options
TELNET
HTTP
SMTP
NNTP
Question 13 Network architecture refers to
the organization of the communication process into layers.
Question 13 options:
True
False
Question 14 Host and end-system have the
same meaning.
Question 14 options:
True
False
Question 15 Which of the following is not a
transmission rate of Ethernet LAN?
Question 15 options:
10 Mbps
100 Gbps
1 Gbps
100 Mbps
Question 16 Can store-and-forward be used
in a circuit-switched network?
Question 16 options:
No
Yes
Question 17 Which of the following is true?
Question 17 options:
SMTP and HTTP do not use handshake
SMTP uses handshake, HTTP does not
SMTP and HTTP use handshake
SMTP does not use handshake, HTTP does
Question 18 A __________ specifies how
networked data is formatted into discrete units, such as packets or frames.
Question 18 options:
router
topology
protocol
communications medium
Question 19 Which of the following is true
about TCP?
Question 19 options:
A guarantee that a certain value for
throughput will be maintained
Data transfer is intact
A guarantee that data will be delivered
within a specified amount of time
Providing Confidentiality
Question 20 How many parallel connections
does FTP maintain simultaneously?
Question 20 options:
2
4
3
5
COM548
Advanced Networking Protocols
EXAM 3
Question 1 __________ is a technique where
a new task will be started before the old task is finished.
Question 1 options:
Suppressing
Waiting
Pipelining
Queueing
Question 2 When two or more bits in a data
unit have been changed during the transmission, the error is called __________.
Question 2 options:
random error
burst error
inverted error
none of the above
Question 3 Which of the following is not a
characteristic of token passing in a broadcast channel of rate R bits per
second?
Question 3 options:
When only one node has data to send, that
node has a throughput of R bps.
When M nodes have data to send, each of
these nodes has a throughput of R/M bps.
The protocol is decentralized.
None of the above.
Question 4 The advantage of the polling
protocol is in __________ prevention by controlling the media and letting only
one station send it frames at a time.
Question 4 options:
collision
error
competition
throttling
Question 5 Suppose that N switches
supporting VLAN groups are to be connected via a trunking protocol. How many
ports are needed to connect the switches?
Question 5 options:
2N-1
2N-2
2N
2N+1
Question 6 Signal blurred during
transmission is caused by __________.
Question 6 options:
multipath
path loss
crosstalk
interference
Question 7 RTS threshold is used when a
data frame is greater than a predefined threshold.
Question 7 options:
True
False
Question 8 Can any laptop be used as an
Access Point in default configuration?
Question 8 options:
No
Yes
Question 9 Is it possible for the two
mobile nodes to use the same care-of-address in mobile IP?
Question 9 options:
True
False
Question 10 IEEE has defined the
specifications for a wireless LAN, called ____________, which covers the
physical and data link layers.
Question 10 options:
IEEE 802.5
IEEE 802.2
IEEE 802.3
IEEE 802.11
Advanced Networking Protocols
EXAM 4
Question 1 Consider WEP for 802.11. Suppose
that the data is 10101100 and the keystream is 11110000. What is the resulting
ciphertext?
Question 1 options:
01010010
01011100
01011010
01010100
Question 2 An application gateway works in
conjunction with a router filter because:
Question 2 options:
it
will provide more services.
traffic is forced to go to the application
gateway first before the filter.
the
filter forces the users to first connect to the application gateway.
all
of the above.
Question 3 The Authentication Header (AH)
protocol provides source authentication and data integrity but does not provide
confidentiality.
Question 3 options:
True
False
Question 4 Suppose an SSL session employs a
block cipher with CBC. The server sends to the client the IV in the clear.
Question 4 options:
True
False
Question 5 In what way does the public-key
encrypted message hash provide a better digital signature than the public-key
encrypted message?
Question 5 options:
More
secure (hashing and encrypting)
Faster
More
convenience
All
of the above
Question 6 A firewall sits between the
organization’s network and the public network.
Question 6 options:
True
False
Question 7 A Certification Authority
verifies that an entity is who it says it is, and creates a certificate that
binds the public key of the entity to the identity.
Question 7 options:
True
False
Question 8 A message authentication code
(MAC) does not require an encryption algorithm.
Question 8 options:
True
False
Question 9 The security of RSA relies on
the fact that there are no know algorithms for quickly factoring a number.
Question 9 options:
True
False
Question 10 To encipher means to decrypt, decode,
or convert, ciphertext into the equivalent plaintext.
Question 10 options:

Having Trouble Meeting Your Deadline?
Get your assignment on Saint Com548 All Exams Latest 2019 March Question # 00600743 Subject: Education Due on: 04/27/2019 Posted On: 04/27/2019 04:46 AM Tutorials: 1 Rating: 4.6/5 completed on time. avoid delay and – ORDER NOW
True
False