Saint Com548 All Exams Latest 2019 March Question # 00600743 Subject: Education Due on: 04/27/2019 Posted On: 04/27/2019 04:46 AM Tutorials: 1 Rating: 4.6/5

Question

Dot Image

COM548
Advanced Networking Protocols

EXAM 1

Question 1 Host and end-system have the
same meaning.

Question 1 options:

True

False

Question 2 Which of the following is not a
common task found in TCP/IP?

Question 2 options:

Encryption

Connection setup

Segmentation and reassembly

Flow control

Question 3 Which internet service is not
popular in an urban area?

Question 3 options:

Fiber-to-the-home

Cable Modem

Satellite

Dial-up

Question 4 Which of the following layer
does not belong to TCP/IP?

Question 4 options:

Transport

Application

Network

Presentation

Question 5 A circuit-switched network
cannot guarantee a certain amount of end-to-end bandwidth.

Question 5 options:

True

False

Question 6 Network Core includes the
following:

Question 6 options:

servers.

all of the above.

routers.

switches.

Question 7 A __________ specifies how
networked data is formatted into discrete units, such as packets or frames.

Question 7 options:

topology

communications medium

router

protocol

Question 8 Which type of delay takes the
error-checking into account?

Question 8 options:

Queueing delay

Processing delay

Transmission delay

Propagation delay

Question 9 Can store-and-forward be used in
a circuit-switched network?

Question 9 options:

Yes

No

Question 10 If an application is sending
out 500 kb of data per second and the host transmission rate is 500kbps, would
the host be able to handle all the data from the application?

Question 10 options:

Yes

No

COM548
Advanced Networking Protocols

EXAM 2

Question 1 Suppose Host A is sending Host B
a large file over a TCP connection. The number of unacknowledged bytes that
Host A sends cannot exceed the size of the receiver buffer.

Question 1 options:

True

False

Question 2 Suppose Host A is sending Host B
a large file to Host B over a TCP connection. If the sequence number for a
segment of this connection is m, then the sequence number for the subsequent
segment will necessarily be m+1.

Question 2 options:

True

False

Question 3 Consider congestion control in
TCP. When the timer expires at the sender, the value of ssthresh is set to one
half of its previous value.

Question 3 options:

True

False

Question 4 Host A is sending Host B a large
file over a TCP connection. Assume Host B has no data to send Host A. Host B
will not send acknowledgements to Host A because Host B cannot piggyback the
acknowledgements on data.

Question 4 options:

True

False

Question 5 Voice and video traffic is often
sent over TCP.

Question 5 options:

True

False

Question 6 CMP is primarily used for:

Question 6 options:

addressing.

error and diagnostic functions.

none of the above.

forwarding.

Question 7 The function(s) of network layer
in a virtual-circuit network is/are:

Question 7 options:

all of the above.

routing.

forwarding.

call setup.

Question 8 Routers in both datagram
networks and virtual-circuit networks both use forwarding tables.

Question 8 options:

True

False

Question 9 The network layer concerns with
__________.

Question 9 options:

none of the above.

frames

bits

packets

Question 10 It has been said that when IPv6
tunnels through IPv4 routers, IPv6 treats the IPv4 tunnels as link-layer
protocols.

Question 10 options:

True

False

Question 11 A circuit-switched network
cannot guarantee a certain amount of end-to-end bandwidth.

Question 11 options:

True

False

Question 12 Which of the following protocol
is used for Electronic Mail?

Question 12 options

TELNET

HTTP

SMTP

NNTP

Question 13 Network architecture refers to
the organization of the communication process into layers.

Question 13 options:

True

False

Question 14 Host and end-system have the
same meaning.

Question 14 options:

True

False

Question 15 Which of the following is not a
transmission rate of Ethernet LAN?

Question 15 options:

10 Mbps

100 Gbps

1 Gbps

100 Mbps

Question 16 Can store-and-forward be used
in a circuit-switched network?

Question 16 options:

No

Yes

Question 17 Which of the following is true?

Question 17 options:

SMTP and HTTP do not use handshake

SMTP uses handshake, HTTP does not

SMTP and HTTP use handshake

SMTP does not use handshake, HTTP does

Question 18 A __________ specifies how
networked data is formatted into discrete units, such as packets or frames.

Question 18 options:

router

topology

protocol

communications medium

Question 19 Which of the following is true
about TCP?

Question 19 options:

A guarantee that a certain value for
throughput will be maintained

Data transfer is intact

A guarantee that data will be delivered
within a specified amount of time

Providing Confidentiality

Question 20 How many parallel connections
does FTP maintain simultaneously?

Question 20 options:

2

4

3

5

COM548
Advanced Networking Protocols

EXAM 3

Question 1 __________ is a technique where
a new task will be started before the old task is finished.

Question 1 options:

Suppressing

Waiting

Pipelining

Queueing

Question 2 When two or more bits in a data
unit have been changed during the transmission, the error is called __________.

Question 2 options:

random error

burst error

inverted error

none of the above

Question 3 Which of the following is not a
characteristic of token passing in a broadcast channel of rate R bits per
second?

Question 3 options:

When only one node has data to send, that
node has a throughput of R bps.

When M nodes have data to send, each of
these nodes has a throughput of R/M bps.

The protocol is decentralized.

None of the above.

Question 4 The advantage of the polling
protocol is in __________ prevention by controlling the media and letting only
one station send it frames at a time.

Question 4 options:

collision

error

competition

throttling

Question 5 Suppose that N switches
supporting VLAN groups are to be connected via a trunking protocol. How many
ports are needed to connect the switches?

Question 5 options:

2N-1

2N-2

2N

2N+1

Question 6 Signal blurred during
transmission is caused by __________.

Question 6 options:

multipath

path loss

crosstalk

interference

Question 7 RTS threshold is used when a
data frame is greater than a predefined threshold.

Question 7 options:

True

False

Question 8 Can any laptop be used as an
Access Point in default configuration?

Question 8 options:

No

Yes

Question 9 Is it possible for the two
mobile nodes to use the same care-of-address in mobile IP?

Question 9 options:

True

False

Question 10 IEEE has defined the
specifications for a wireless LAN, called ____________, which covers the
physical and data link layers.

Question 10 options:

IEEE 802.5

IEEE 802.2

IEEE 802.3

IEEE 802.11

COM548
Advanced Networking Protocols

EXAM 4

Question 1 Consider WEP for 802.11. Suppose
that the data is 10101100 and the keystream is 11110000. What is the resulting
ciphertext?

Question 1 options:

01010010

01011100

01011010

01010100

Question 2 An application gateway works in
conjunction with a router filter because:

Question 2 options:

it
will provide more services.

traffic is forced to go to the application
gateway first before the filter.

the
filter forces the users to first connect to the application gateway.

all
of the above.

Question 3 The Authentication Header (AH)
protocol provides source authentication and data integrity but does not provide
confidentiality.

Question 3 options:

True

False

Question 4 Suppose an SSL session employs a
block cipher with CBC. The server sends to the client the IV in the clear.

Question 4 options:

True

False

Question 5 In what way does the public-key
encrypted message hash provide a better digital signature than the public-key
encrypted message?

Question 5 options:

More
secure (hashing and encrypting)

Faster

More
convenience

All
of the above

Question 6 A firewall sits between the
organization’s network and the public network.

Question 6 options:

True

False

Question 7 A Certification Authority
verifies that an entity is who it says it is, and creates a certificate that
binds the public key of the entity to the identity.

Question 7 options:

True

False

Question 8 A message authentication code
(MAC) does not require an encryption algorithm.

Question 8 options:

True

False

Question 9 The security of RSA relies on
the fact that there are no know algorithms for quickly factoring a number.

Question 9 options:

True

False

Question 10 To encipher means to decrypt, decode,
or convert, ciphertext into the equivalent plaintext.

Question 10 options:

Having Trouble Meeting Your Deadline?

Get your assignment on Saint Com548 All Exams Latest 2019 March Question # 00600743 Subject: Education Due on: 04/27/2019 Posted On: 04/27/2019 04:46 AM Tutorials: 1 Rating: 4.6/5 completed on time. avoid delay and – ORDER NOW

True

False

Dot Image

Order Solution Now

Similar Posts