MCA Semester III - COMPUTER NETWORK (MC0075) Question paper

9
Subject Code: MC0075 Subject:COMPUTER NETWORK [1 MARK EACH] 1) Two or more networks are connected to form an------ (Internet) 2) State true or false: FDDI can be used as backbone True 3) What does internet working scheme use a) Hardware b) Network c) Software d) None of these 4) WWW stands for -------- (World Wide Web) 5) I S P stand for------- (Internet service provider) 6) To allow packet to loop b/w backbones all major backbones connect at the --------(Nero access point) 7) ------------ improves reliability (Redundancy) 8) Computers that interconnected two networks and pass pockets from one to another are called.------------ &---------------. (Gateway and route) 9) State T or F “Internet is a network of network”. True 10) State T or F “Internet is restricted in size “. False 11) ARPA is stands for _______________(Advanced Research Projects Agency) 12) Internet ures --------- reference model. (TCP / IP)

Transcript of MCA Semester III - COMPUTER NETWORK (MC0075) Question paper

Page 1: MCA Semester III - COMPUTER NETWORK (MC0075) Question paper

Subject Code: MC0075

Subject:COMPUTER NETWORK

[1 MARK EACH]

1) Two or more networks are connected to form an------ (Internet)

2) State true or false: FDDI can be used as backbone True

3) What does internet working scheme usea) Hardwareb) Networkc) Softwared) None of these

4) WWW stands for -------- (World Wide Web)

5) I S P stand for------- (Internet service provider)

6) To allow packet to loop b/w backbones all major backbones connect at the --------(Nero access point)

7) ------------ improves reliability (Redundancy)

8) Computers that interconnected two networks and pass pockets from one to another are called.------------&---------------. (Gateway and route)

9) State T or F “Internet is a network of network”. True

10) State T or F “Internet is restricted in size “. False

11) ARPA is stands for _______________(Advanced Research Projects Agency)

12) Internet ures --------- reference model. (TCP / IP)

13) Which one is not layer of TCP / IP model?a) Physicalb) Internetc) Transportd) Refrence

14) State T or F file transfer service is reliable. False

15) E-mail is not a reliable service. False

Page 2: MCA Semester III - COMPUTER NETWORK (MC0075) Question paper

16) The most widely used protocol in internet. (TCP / IP)

17) An IP address is a unique address. True

18) The linkage of user’s IP address to his name is publicity available information. False

19) The given address is of ?------24 bits-----?-----------------------------0 Network ID Host IDa) Class Ab) Class Bc) Class Cd) Class E

20) ?---------------------27 bits-----------?1 1 1 1 0 unused this is a address ofa) Class Ab) Class Bc) Class Cd) Class E

21) Interpreting all zero to mean --------------- (“This host”)

22) IP address are often expressed four decimal numbers each separated by a dot. This format is called------------------- (Dotted decimal notation)

23) The range of class A will be from------------to-------------------to 127.255.255.255

24) ICANN stands for ------------------- (Internet Corporation for Assigned names and numbers)

25) The classful A, B and C octet boundaries were easy to understand and implement.a) Trueb) False

26) IPVU address did not foster the efficient allocation of a finite address space.a) Trueb) False

Page 3: MCA Semester III - COMPUTER NETWORK (MC0075) Question paper

27) A / 24 networks supports how may hosts

a) 225b) 226c) 228d) 254

28) If physical address is 02-60-8A-01-02-04 corresponding IP address isa) 192.168.0.1b) 192.168.0.2c) 192.168.0.3d) 192.168.0.5

29) ARP is defined in a) RFC 826b) RFC 827c) RFC 829d) RFC 286

30) The mapping of to IP address is done by _________(DNS)

31) PGP encrypts data by using a block clipper called (IDEA)

32) PGP uses how many bit keys

a) 128b) 126c) 125d) 122

33) DES uses how may bit key.

a) 56 bitb) 58 bitc) 59 bitd) 55 bit

34) The art of breaking art of cipher is called--------------- (Cryptanalysis)

35) S / MIME stand for ------------------------- (Secure / multipurpose internet merit extent ion)

Page 4: MCA Semester III - COMPUTER NETWORK (MC0075) Question paper

36) People authenticate other people by faces, voices and handwriting. True/ False

37) At the physical layer firewalls can be installed True/ False

38) The messages types which BGP defines are

a) One b) Twoc) Three d) Four

39) __________________ (Videoconference) technology finds extensively helpful for remote school.

40) _____________ (Session & presentation) layers are not there in TCP / IP reference model.

[2 MARKS EACH]41) The feistel(f) function, DES operates on ----------------- at a time and consists of -----------stages. (32, 4)

42) Theommon reasons for applying a digital signature are ------------&----------------(Authentication, integrity

43) If the plain text is ATTACK and cipher text after substitution is “CVVCEM” then the key is --------------------- (+2) 44) The output of the encryption process known as

a) Cipher textb) English textc) Plain textd) None

45) The different types of intruders area) Active b) Passive46) The plain text is “ATTACK” it can be encrypted as with key used

a) ATTACKb) BUUBDLc) CRACEDd) BATAKT

Page 5: MCA Semester III - COMPUTER NETWORK (MC0075) Question paper

47) Network security problems can be divided mainly into categoriesa) 1b) 2c) 3d) None

48) Network security mainly divided into --------------,---------------&------------------.(Secrecy, Authentication and Non-repudiation)

49) Internet E-mail messages consist of -----------------major sections. They are--------------- (Two, Header and body)

50) IRC is --------------------and it is ------------------users.(Internet relay chat, mulh)

51) With gopher, every document has a defined ------------and gopher client functionally was quickly duplicated by early web browsers such as -------------(Format type, mosaic)

52) The source of the name -------------is columned to be threefold (Gopher )

53) The two main popular browsers are ___________ & ______________-(Internet explorer, Netscape navigator)

54) -----------------defined a standard procedure to support the sub netting. (RFC 950)

55) Frame reader is subdivided into___________and _______________. (Physical, IP)

56) How many addresses are in between 194.24.0.0 to 194.24.31.255 that area) 1024 addressb) 1026 address c) 1022 address d) None57) In BGP-4 messages types the meaning of a) Open initialize communicationb) Up date advertise or withdraw routec) Notification response to an incorrect messaged) Keep alive actively test peer connectivityIs this statement true or false? True

58) BGP messages type are _________,___________,_________and ____________. (Open message, up date message , Notification message, keep active message)

Page 6: MCA Semester III - COMPUTER NETWORK (MC0075) Question paper

59) Fields of hello messages formats are _________,_________and ________,________.( Network mask , Dead timer , Hello inter , Gway prio)

60) Inter NIC is known as – a) International Net Information Communicationb) Inter Network Information Commandc) International Network Institute Centerd) International Network Information Center

[4 MARKS EACH]61) The main four layers used in TCP / IP refrence model are_________,_________, ___ _________and ______________.i. Physicalii. Network interfaceiii. Internet iv. Transport

62) Few application level services are_________,________,________&_________.(E-mail, FTP, Remote login, World Wide Web)

63) Few network level services are _________________and _______________.(Connectionless packet delivery services , Reliable stream transport services)

64) Different classes of IP addresses are ______, _________, ________, ________ & ________.(Class A , Class B , Class C, Class D, Class E)

65) The internet address is _________and ____________IP address is _________bit long. (48 bit and 32 bit)

66) ARP is defined in RFC ___________and it is a current internet standard_________.(826 and STD 37)

67) ARP reply frame header is subdivided again into _________and_________.(physical address , IP address)

68) ail secure system consisting of ________,___________&______________.(PGP, PEM, S/MIME)

69) The precedence value is ____________integer Default value for lifetime is _______.(Two’s complement, 30 minutes)

Page 7: MCA Semester III - COMPUTER NETWORK (MC0075) Question paper

70) _________and_______class can’t accommodate more than 254 hosts.(Class A, Class B)

71) Match the followingHost ID ClassesClass AClass BClass Ca) 1-b, 2-a, 3-cb) 1-b, 2-c,3-ac) 1-a, 2-b, 3-cd) None

72) Match the followingPhysical address IP address02-60-8A-01-02-04 (a) 192.168.0.108-03-8A-01-02-04 (b) 192.168.0.208-03-8A-01-02-04 (c) 192.168.0.3a) 1-a, 2-b, 3-cb) 1-b, 3-c, 2-ac) 1-b, 3-a, 2-cd) 1-c, 2-b, 3-a

73) OSPF supports three kinds of connection and networks.a) Point to point lines b/w exactly two routers.b) Multi-access networks with broadcasting.c) Multi-access networks without broadcasting.d) All of the above

74) The three steps needed for inter area routing are _________,_______and _________.(Go from source to backbone , Go across the backbone to the destination area, Go to the destination)

75) The address reserved for private networks is a) 172.16.255.0 b) 173.15.256.1c) 173.15.258.2d) None