You are on page 1of 4

ECE118 FINAL EXAM

NAME _______________________________
Enricle the correct answer.
1. The OSI layer manages task dialogs
a. Application
b. Physical
c. Network
d. Session
2. In the Internet Reference model, this
layer sends packets over multiple
networks
a. Application
b. Transport
c. Internet
d. Link
3. A protocol that operates in the
transport layer
a. HTTP
b. RTP
c. IP
d. UDP
4. How does one elect a root node on a
spanning tree?
a. Switch with the lowest address
b. Switch with the highest address
c. Router with the lowest address
d. Router with the highest address
5. What protocol is categorically
described as the narrow waist of the
Internet?
a. HTTP
b. RTP
c. IP
d. UDP
6. The ADSL telecom standard created
by ITU is defined in the __ standard.
a. 802.3
b. H.264
c. G.992
d. RFC2616
7. The link layer uses __ as its unit of
data.
a. Segment
b. Packet
c. Frame
d. Bit
8. A repeater or a hub operates at the __
layer.
a. Physical
b. Link
c. Network and link
d. Transport
9. A command-line tool to let hosts peek
inside a network
a. Ping
b. Whois
c. Arp
d. Traceroute
10. Which of the following has an
enormous bandwidth over long
distances?
a. Twisted pair
b. Coaxial cable
c. Multimode optical fiber
d. Single mode optical fiber
11. The spanning tree algorithm was
proposed by
a. Reeves
b. Jacobson
c. Perlman
d. Djikstra
12. Which of the following error detection
schemes are used in the Internet?
a. CRC
b. Checksum
c. Parity
d. Hamming code
13. Devices on wireless links relay
messages in the form of __.
a. Unicast
b. Multicast
c. Anycast
d. Broadcast
14. Which among these schemes has
provision for clock recovery?
a. NRZ
b. AMI
c. NRZ-I
d. Manchester
15. The minimum Hamming distance
needed to address a single-bit error
correction
a. 1
b. 2
c. 3
d. 4
16. A private IP addresses is translated to
a public IP address by
a. VLSM
b. NAT
c. Routing
d. DHCP
17. Which of the following is a common
example of a LAN?
a. Bluetooth
b. Ethernet
c. DSL
d. ISP
18. What multiplexing scheme allows
users to take turns on a fixed
schedule?
a. FDM
b. TDM
c. WDM
d. CDM
19. An approach to analyze the
architecture of any network is through
a. Layering
b. Encapsulation
c. De-encapsulation
d. Addressing
20. A flow control mechanism that
addresses errors occurring on
computer networks
a. Error correction
b. Error detection
c. CRC
d. ARQ
21. Which of the following wireless
standards does not operate at the 2.4
Ghz radio frequency?
a. IEEE802.1a
b. IEEE802.1b
c. IEEE802.1g
d. IEEE802.1n
22. The simplest error detection works on
a. Ones complement
b. Modulo 2
c. Modulo 10
d. Modulo 11
23. Which of the following is the default
route?
a. 0.0.0.0
b. 1.1.1.1
c. 10.10.10.10
d. 172.16.10.10
24. Which of the following technologies
employ communication via taking
turns?
a. Ethernet
b. DSL
c. Token Ring
d. WiFi
25. The RIR of the Asia Pacific region
a. ARIN
b. APNIC
c. LACNIC
d. RIPE
26. A feature used in link state routing to
address scalability is the use of
a. Policy
b. Spanning tree
c. Area
d. Bellman-Ford
27. Routers use __ matching to send
packets to the right next hop
a. Longest prefix
b. Shortest prefix
c. Longest ping
d. Shortest ping
28. The procedure of externally joining
multiple more specific prefix into a one
larger prefix
a. Subnetting
b. NAT
c. DHCP
d. Aggregation
29. An ICMP message contains all of the
following except
a. Type
b. Code
c. Checksum
d. Port
30. This multiplexing scheme is used in TV
stations
a. FDM
b. TDM
c. WDM
d. CDM
31. The first step in the Spanning tree
algorithm is
a. To grow tree as shortest
distance from the root
b. Turn off ports for forwarding
that are not in the spanning tree
c. Elect a root node of the free
d. Ping all active nodes
32. According to Shannon capacity, how
many levels can one distinguish
depends on
a. Voltage
b. SNR
c. Bit rate
d. Eb/ No
33. This IP field is decremented by 1 every
router hop
a. Fragment offset
b. IHL
c. Protocol
d. TTL
34. The protocol that computes
interdomain routers in the Internet
a. RIP
b. NAT
c. DHCP
d. BGP
35. Twisting is employed on copper wire
pairs
a. To increase the bandwidth
b. To detect errors on the line
c. To serve as frame buffers
d. To reduce radiated signals
36. The Viterbi algorithm is a common
example of a __ code
a. Cyclic
b. Hamming
c. Redundant
d. Convolutional
37. A protocol that allows a device to
automatically get an IP address
a. ARP
b. DHCP
c. NAT
d. OSPF
38. GSM is a wireless cellular technology
utilizing
a. FDM
b. TDM
c. WDM
d. CDM
39. Which of the following is a broadcast
IP address?
a. 0.0.0.0
b. 1.1.1.1
c. 127.0.0.1
d. 255.255.255.255
40. Which type of multiple access
protocols is good for high load or
guaranteed quality of service
situations?
a. Randomized
b. Contention free
c. Deterministic
d. Wireless
41. Categorically, different parties of ISPs
are called
a. Routers
b. Networks
c. Autonomous systems
d. Tiers
42. Which of the following is NOT a private
IP address?
a. 10.10.1.25
b. 172.16.32.14
c. 180.123.1.2
d. 192.168.10.31
43. In the Internet, hosts on same network
have IP addresses in
a. The same IP prefix
b. The same host prefix
c. Different broadcast prefix
d. Different multicast prefix
44. This algorithm determines the single-
source shortest paths, given network
with non-negative link costs
a. Distance vector routing
b. Bellman-Ford
c. Djikstra
d. Viterbi
45. A protocol that maps a local IP
address to a link layer address
a. DHCP
b. PPP
c. ARP
d. Bootstrap
46. In 18.31.0.0/16, what us the prefix?
a. 18
b. 31
c. 0
d. 16
47. Which of the following protocols uses
link-routing techniques?
a. RIP
b. ISIS
c. BGP
d. EIGRP
48. IPv6 uses ___ bit addressing
a. 31
b. 64
c. 128
d. 256
49. A device that supports both IPv4 and
IPv6 on the same operation at the
same time uses
a. Dual stacking
b. Tunneling
c. Translation
d. Aggregation
50. This mnemonic may be used to
remember DHCP operation
a. ADORA
b. DORA
c. RADO
d. ODAR

You might also like