Vladislav Kulymbetov
Test por , creado hace más de 1 año

Test sobre NP, creado por Vladislav Kulymbetov el 22/05/2018.

636
3
0
Sin etiquetas
Vladislav Kulymbetov
Creado por Vladislav Kulymbetov hace casi 6 años
Cerrar

NP

Pregunta 1 de 65

1

Layers four and five of the Internet protocol stack are implemented in the end systems but not in the routers in the network core.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 2 de 65

1

With ADSL, each subscriber gets more downstream bandwidth than upstream bandwidth.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 3 de 65

1

Twisted-pair cooper wire is no longer present in computer networks.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 4 de 65

1

Two packets A and B are sent in that order through a connection-oriented communication network. They could arrive at the destination:

Selecciona una de las siguientes respuestas posibles:

  • in any order, after having traversed the same route.

  • only in the order A-B, after possibly having traversed different routes.

  • in any order, after possibly having traversed different routes.

  • only in the order A-B, after having traversed the same route.

Explicación

Pregunta 5 de 65

1

Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination:

Selecciona una de las siguientes respuestas posibles:

  • in any order, after possibly having traversed different routes.

  • in the order A-B, after having traversed the same route.

  • in any order, after having traversed the same route.

  • in the order A-B, after possibly having traversed different routes.

Explicación

Pregunta 6 de 65

1

The Internet received its name in the 1980s because:

Selecciona una de las siguientes respuestas posibles:

  • it was an interim (temporary) design of what it later became, but the name stuck.

  • it was meant to be a network internal to the United States Department of Defense.

  • it consisted of many interconnected networks.

  • it achieved international scope with the addition of the City University of London.

Explicación

Pregunta 7 de 65

1

DNS lookups often involve a combination of recursive and iterative queries.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 8 de 65

1

The Date: header in the HTTP response message indicates when the object in the response was last modified.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 9 de 65

1

Skype relay nodes are typically peers under the control of Skype users.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 10 de 65

1

The process that sends messages into, and receives messages from, the network through a software interface is called a socket.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 11 de 65

1

In a P2P File Distribution architecture, the server must sequentially send (upload) file copies.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 12 de 65

1

SMTP is used to:

Selecciona una de las siguientes respuestas posibles:

  • to transfer messages from one mail server to another.

  • to transfer messages from mail server to a user agent.

  • to define the format of message headers.

  • all of the above.

Explicación

Pregunta 13 de 65

1

Suppose a DNS resource record has Type=MX. Then:

Selecciona una de las siguientes respuestas posibles:

  • Value is the hostname of the DNS server that is authoritative for Name.

  • Value is the IP address of the mail server that has the alias hostname Name.

  • Value is the hostname of the mail server that has the alias hostname Name.

  • none of the above.

Explicación

Pregunta 14 de 65

1

Local DNS name servers:

Selecciona una de las siguientes respuestas posibles:

  • cache resource records, but discard them after a period of time that is on the order of a few days.

  • cache resource records and never discard them.

  • obtain resource records from Web caches.

  • never cache resource records.

Explicación

Pregunta 15 de 65

1

Consider an HTTP Web server using persistent connections. Suppose the server spawns a
separate process for each client that connects to the server. Then each of these spawned processes will have different server port numbers.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 16 de 65

1

The size of the TCP RcvWindow never changes throughout the duration of the connection.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 17 de 65

1

When a TCP segment arrives to a host, the socket to which the segment is directed depends on

Selecciona una de las siguientes respuestas posibles:

  • the source IP address of the datagram that encapsulated the segment.

  • the destination port number.

  • the source port number.

  • all of the above.

Explicación

Pregunta 18 de 65

1

UDP has which of the following characteristics:

Selecciona una de las siguientes respuestas posibles:

  • regulated send rate.

  • connection state at the server.

  • three-way hand shake for connection establishment.

  • none of the above.

Explicación

Pregunta 19 de 65

1

When a UDP segment arrives to a host, in order to direct the segment to the appropriate socket, the OS uses:

Selecciona una de las siguientes respuestas posibles:

  • the source port number.

  • the source IP address.

  • the destination port number.

  • all of the above.

Explicación

Pregunta 20 de 65

1

Suppose a client sends an HTTP request message with the If-modified-since: header. Suppose the object in a server has not changed since the last time a client retrieved the object. Then the server will send a response message with the status code:

Selecciona una de las siguientes respuestas posibles:

  • 404 Not Found.

  • 200 OK.

  • 304 Not Modified.

  • none of the above.

Explicación

Pregunta 21 de 65

1

Streams are not needed in which of the following programs:

Selecciona una de las siguientes respuestas posibles:

  • TCPserver.

  • UDPserver

  • TCPclient

  • UDPclient

Explicación

Pregunta 22 de 65

1

Consider the minimum time for P2P file distribution, as discussed in Section 2.6. Suppose the upload rate of the server is10 Mbps, the upload rates of all peers is 1 Mbps, and the download rates of all peers is 10 Mbps. Further suppose that there are 100 peers and the file is 100 million bits. The minimum distribution time is

Selecciona una de las siguientes respuestas posibles:

  • approximately 100 seconds.

  • approximately 10 seconds.

  • approximately 1 second.

  • approximately 1000 seconds.

Explicación

Pregunta 23 de 65

1

For BitTorrent, which of the following is true:

Selecciona una de las siguientes respuestas posibles:

  • Although a peer may have 50 concurrent TCP connections with other peers, at any given instant of time it sends data to less than 10 other peers.

  • At a given instant of time, a peer A may upload to a peer B, even if peer B is not sending anything to A.

  • Among the chunks that a peer does not have, the peer will request chunks that appear to be relatively rare in the torrent.

  • All of the above.

Explicación

Pregunta 24 de 65

1

Consider the latency model for dynamic congestion windows. Which of the following components contribute to latency?

Selecciona una de las siguientes respuestas posibles:

  • the sum of all the stalled times.

  • round trip time, RTT.

  • the transmission time of the object, O/R.

  • all of the above.

Explicación

Pregunta 25 de 65

1

TCP applies fast retransmit to a segment when:

Selecciona una de las siguientes respuestas posibles:

  • it estimates unusually large RTTs.

  • it receives three ACKs for an earlier segment.

  • the segment's timer expires.

  • none of the above.

Explicación

Pregunta 26 de 65

1

Nmap is often used to:

Selecciona una de las siguientes respuestas posibles:

  • do port scans over a range of ports at a target host.

  • measure throughput between hosts.

  • measure round-trip times between hosts.

  • decipher encrypted traffic.

Explicación

Pregunta 27 de 65

1

With SYN cookies, when a server receives a SYN segment, it returns a SYNACK with:

Selecciona una de las siguientes respuestas posibles:

  • an initial sequence number that is a hash of the IP addresses and port numbers in the SYN segment (as well as of other things).

  • initial sequence number 1.

  • a randomly chosen initial sequence number.

  • none of the above.

Explicación

Pregunta 28 de 65

1

Before sending a packet into a datagram network, the source must determine all of the links that packet will traverse between source and destination.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 29 de 65

1

The primary role of a router is to forward datagrams from input links to output links.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 30 de 65

1

Forwarding involves transferring a packet from the router’s input link to the appropriate output link.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 31 de 65

1

A forwarding table is:

Selecciona una de las siguientes respuestas posibles:

  • a. Used to find the proper interface to which the input interface should forward a packet.

  • b. Configured using a centralized routing algorithm.

  • c. Configured through routing protocol messages received by router.

  • A and C.

  • B and C.

Explicación

Pregunta 32 de 65

1

How are routing paths calculated?

Selecciona una de las siguientes respuestas posibles:

  • The full route is mapped out in the datagram’s header.

  • Paths are calculated by routing algorithms.

  • Datagrams always flow on the same path and don’t need to be calculated.

  • The path is calculated based on available network bandwidth.

Explicación

Pregunta 33 de 65

1

Guaranteed Delivery:

Selecciona una o más de las siguientes respuestas posibles:

  • Guarantees that the packet will eventually arrive at its destination

  • Guarantees the amount of time between the transmission of two successive packets at the sender is equal to the amount of time between their receipt at the destination.

  • Guarantees delivery within a specified host-to-host delay bound.

Explicación

Pregunta 34 de 65

1

Guaranteed Delivery with Bounded Delay

Selecciona una o más de las siguientes respuestas posibles:

  • Guarantees delivery within a specified host-to-host delay bound

  • Guarantees a packet will arrive at its destination.

  • Guarantees the amount of time between the transmission of two successive packets at the sender is equal to the amount of time between their receipt at the destination.

Explicación

Pregunta 35 de 65

1

Guaranteed Maximum Jitter

Selecciona una de las siguientes respuestas posibles:

  • Guarantees the amount of time between the transmission of two successive packets at the sender is equal to the amount of time between their receipt at the destination

  • Guarantees a packet will arrive at its destination.

  • Guarantees delivery within a specified host-to-host delay bound.

Explicación

Pregunta 36 de 65

1

All link layer protocols that support IP have the same frame structure (i.e., length of frame, number and length of header fields).

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 37 de 65

1

CRC error detection, as used in Ethernet, is always able to detect whether there is an error in a frame.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 38 de 65

1

The even parity bit scheme can correct single bit errors.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 39 de 65

1

With CDMA, each sender uses the same code, cm, m=1,...,M.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 40 de 65

1

Each LAN adapter has a unique LAN address.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 41 de 65

1

A channel partitioning protocol has which of the following characteristics forwarding table is:

Selecciona una de las siguientes respuestas posibles:

  • it does not generate collisions.

  • all transmitting nodes get the same amount of bandwidth.

  • there is no master node.

  • all of the above.

Explicación

Pregunta 42 de 65

1

In slotted ALOHA with N active nodes, the probability that no node transmits in a given slot is

Selecciona una de las siguientes respuestas posibles:

  • (1-p)^N

  • (1-p)N

  • p^N

  • 1-p

Explicación

Pregunta 43 de 65

1

An ARP query packet is encapsulated in

Selecciona una de las siguientes respuestas posibles:

  • an IP datagram.

  • a link-layer frame addressed to a specific adapter.

  • a link-layer broadcast frame.

  • none of the above.

Explicación

Pregunta 44 de 65

1

Ethernet provides which of the following services to the network layer

Selecciona una de las siguientes respuestas posibles:

  • error detection.

  • flow control.

  • reliable data transfer.

  • all of the above.

Explicación

Pregunta 45 de 65

1

For Ethernet, if an adapter determines that a frame it has just received is addressed to a different adapter

Selecciona una de las siguientes respuestas posibles:

  • it discards the frame without sending an error message to the network layer.

  • it discards the frame and sends an error message to the network layer.

  • it sends a NACK (not acknowledged frame) to the sending host.

  • it delivers the frame to the network layer, and lets the network layer decide what to do.

Explicación

Pregunta 46 de 65

1

A typical "infrastructure network" wireless network includes base stations.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 47 de 65

1

In CDMA, the chipping rate is typically the same as the original data rate.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 48 de 65

1

The 11 channels in the 802.11 are non-overlapping.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 49 de 65

1

If you enter an Internet café and more than one AP is present, then the packets your host sends are forwarded into the Internet by both APs.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 50 de 65

1

During the 802.11 association handshake protocol, the wireless host gets assigned an IP address.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 51 de 65

1

In CDMA, let Ym be the received value in the mth mini-slot for some slot i. Let cm, m=1,...,M, be the sender's M code values. To determine the bit value the sender sent, the receiver:

Selecciona una de las siguientes respuestas posibles:

  • multiples Ym with the sum of the M code values.

  • multiplies each Ym with the corresponding cm, sums the resulting values and divides by M.

  • simply declares Ym as the sent value.

  • none of the above.

Explicación

Pregunta 52 de 65

1

A beacon frame sent by an AP includes

Selecciona una de las siguientes respuestas posibles:

  • the AP's SSID.

  • the AP's MAC address.

  • both the AP's MAC address and SSID.

  • none of the above.

Explicación

Pregunta 53 de 65

1

The 802.11 protocol does not implement collision detection because (Click all that apply)

Selecciona una o más de las siguientes respuestas posibles:

  • collision detection was found to be useless in wired Ethernet.

  • the adapter would still not be able to detect all collisions due to hidden terminals.

  • it is costly to build wireless hardware that detects collisions.

  • all of the above.

Explicación

Pregunta 54 de 65

1

Packets sent by two stations in 802.11 can collide because

Selecciona una de las siguientes respuestas posibles:

  • at a given time, the random backoff values of the two stations are the same.

  • the packets are sent to different APs but on the same channel.

  • the two stations could be hidden from each other.

  • all of the above.

Explicación

Pregunta 55 de 65

1

An 802.11 frame includes:

Selecciona una de las siguientes respuestas posibles:

  • an acknowledgement field.

  • a sequence number field.

  • four address fields.

  • all of the above.

Explicación

Pregunta 56 de 65

1

In IP spoofing, the attacker interchanges the source and destination addresses in the sender's IP datagram.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 57 de 65

1

Nonce's are often used to combat the playback attack.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 58 de 65

1

Two parties often use public-key encryption to agree on a shared one-time symmetric session key.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 59 de 65

1

For public-key certification, PGP uses certification authorities.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 60 de 65

1

The AH protocol provides secrecy at the network layer.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 61 de 65

1

Which of the following statements best describes the purpose of the SNMP protocol?

Selecciona una de las siguientes respuestas posibles:

  • The SNMP protocol specifies the actions a network manager should take in response to a specific set of network fault conditions.

  • The SNMP protocol is a tool for gathering data about network conditions and executing remote actions at remote managed devices.

  • The SNMP protocol is used by the network manager to provision resources, such as bandwidth, server capacity and other computational/communication resources needed to meet the mission-specific needs of an enterprise.

Explicación

Pregunta 62 de 65

1

Suppose a network manager wanted to query the value of the number of TCP segments received by a host running the Microsoft Windows 2000 operating system in a US-based company. What would be the prefix (leading digits) of the MIB variable that should be queried?

Selecciona una de las siguientes respuestas posibles:

  • 1.2.840.11356

  • 1.2.840

  • 1.3.6.1.2.1.1

Explicación

Pregunta 63 de 65

1

What is the maximum number of received UDP datagrams that can be counted (without overflow) in the MIB-2 UDP module?

Selecciona una de las siguientes respuestas posibles:

  • 2**32 - 1

  • 2**64 -1

  • 2**16 - 1

  • 2**31 - 1

Explicación

Pregunta 64 de 65

1

What is the purpose of a presentation service?

Selecciona una de las siguientes respuestas posibles:

  • To allow a client to inform a server that it (the client) is present and ready to receive data.

  • To encode, transmit, and translate data from one machine-specific format to another.

  • To display data in a format specified by a user.

  • None of the above.

Explicación

Pregunta 65 de 65

1

Filtering in a firewall can be based on:

Selecciona una de las siguientes respuestas posibles:

  • source and destination IP addresses

  • TCP ACK bits

  • source and destination port numbers

  • all of the above

Explicación