Unit 6 - Practice Quiz

CSE306

1 Which layer of the OSI model is primarily responsible for process-to-process delivery of the entire message?

A. Network Layer
B. Transport Layer
C. Data Link Layer
D. Session Layer

2 The Transport Layer creates a connection between the source and destination ports. This type of addressing is known as:

A. Physical addressing
B. Logical addressing
C. Service-point (Port) addressing
D. Domain addressing

3 Which of the following services is NOT typically provided by the Transport Layer?

A. Flow Control
B. Error Control
C. Routing
D. Segmentation and Reassembly

4 In the context of the Transport Layer, what is multiplexing?

A. Sending data from multiple processes to the network layer via a single transport protocol
B. Splitting one signal into multiple frequencies
C. Distributing incoming packets to different processes
D. Connecting multiple routers together

5 What is the size of the Sequence Number field in the TCP header?

A. 16 bits
B. 32 bits
C. 64 bits
D. 8 bits

6 The minimum and maximum lengths of a TCP header are, respectively:

A. 20 bytes and 40 bytes
B. 20 bytes and 60 bytes
C. 8 bytes and 20 bytes
D. 20 bytes and 65535 bytes

7 In the TCP header, the Window Size field is used for:

A. Congestion Control
B. Flow Control
C. Error Detection
D. Connection Establishment

8 Which flag in the TCP header is set to 1 to initiate a connection?

A. FIN
B. RST
C. SYN
D. URG

9 If a TCP sender sends a segment with Sequence Number and payload length , what will be the Acknowledgement Number in the receiver's response (assuming successful receipt)?

A.
B.
C.
D.

10 Which of the following correctly describes the TCP Three-Way Handshake?

A. SYN SYN-ACK ACK
B. SYN ACK FIN
C. REQ RES ACK
D. SYN ACK SYN-ACK

11 The HLEN (Header Length) field in the TCP header is 4 bits. What is the multiplier used to calculate the total header size in bytes?

A. 1 byte
B. 4 bytes
C. 8 bytes
D. 16 bytes

12 What is the purpose of the Urgent Pointer field in the TCP header?

A. It indicates the sequence number of the last byte of urgent data.
B. It points to the beginning of the next segment.
C. It resets the connection immediately.
D. It requests an immediate acknowledgement.

13 In TCP, the PSH (Push) flag informs the receiver to:

A. Push the data to the application layer immediately without buffering.
B. Push the connection termination request.
C. Prioritize this packet over others in the network.
D. Retransmit the previous segment.

14 Which TCP field includes information from the IP header (source IP, dest IP, protocol, length) to ensure the segment reached the correct destination?

A. Padding
B. Options
C. Pseudo-header (used in Checksum calculation)
D. Window Size

15 The standard size of a UDP header is fixed at:

A. 20 bytes
B. 8 bytes
C. 16 bytes
D. 32 bytes

16 Which of the following fields is NOT present in a UDP header?

A. Source Port
B. Destination Port
C. Sequence Number
D. Checksum

17 Why is UDP often referred to as a connectionless protocol?

A. It does not use IP addresses.
B. It requires a 2-way handshake instead of 3-way.
C. It does not establish a virtual circuit or handshake before transmitting data.
D. It only works on wireless networks.

18 In the UDP header, the Length field includes:

A. Only the size of the data payload.
B. Only the size of the header.
C. The size of the header plus the data.
D. The size of the pseudo-header.

19 Which application would typically prefer UDP over TCP?

A. File Transfer (FTP)
B. Email (SMTP)
C. Real-time Video Streaming
D. Web Browsing (HTTP)

20 The calculation of the Checksum in UDP is:

A. Mandatory in IPv4, Optional in IPv6
B. Optional in IPv4, Mandatory in IPv6
C. Always Mandatory
D. Always Optional

21 The Domain Name System (DNS) primarily uses which Transport Layer protocol for standard queries?

A. TCP
B. UDP
C. SCTP
D. ICMP

22 Which standard port number is assigned to DNS?

A. 21
B. 25
C. 53
D. 80

23 In DNS, a Recursive Query puts the burden of resolution on the:

A. Client (Resolver)
B. Contacted Name Server
C. Root Server only
D. ISP

24 Which DNS record type maps a hostname to an IPv4 address?

A. MX
B. CNAME
C. AAAA
D. A

25 What is the structure of the DNS namespace?

A. Linear
B. Circular
C. Inverted Tree (Hierarchical)
D. Mesh

26 Which protocol is used to push email from a client to a mail server?

A. POP3
B. IMAP
C. SMTP
D. HTTP

27 Post Office Protocol version 3 (POP3) is primarily used for:

A. Sending emails between servers
B. Resolving domain names
C. Retrieving emails from a server to a client
D. Encrypting email content

28 What is the main advantage of IMAP over POP3?

A. IMAP is faster.
B. IMAP allows managing emails directly on the server (folders, flags).
C. IMAP does not require authentication.
D. IMAP uses UDP for reliability.

29 SMTP uses which port number by default?

A. 21
B. 23
C. 25
D. 110

30 Which standard extends email to support non-ASCII text, audio, and video attachments?

A. NVT
B. MIME
C. FTP
D. TELNET

31 FTP (File Transfer Protocol) establishes two connections between client and server. They are:

A. Upload connection and Download connection
B. Control connection and Data connection
C. Primary connection and Backup connection
D. TCP connection and UDP connection

32 Which port is used for the FTP Control Connection?

A. 20
B. 21
C. 22
D. 80

33 In FTP, the control connection is considered "out-of-band". What does this mean?

A. It uses a different frequency.
B. It uses a separate channel/socket from the data transfer.
C. It operates outside the internet.
D. It has higher bandwidth.

34 What is SD-WAN (Software Defined Wide Area Network)?

A. A hardware-only solution for connecting LANs.
B. A protocol strictly for fiber optics.
C. A virtual WAN architecture that decouples network software services from underlying hardware.
D. A new version of the internet protocol.

35 A key benefit of SD-WAN regarding transport independence is:

A. It only works with MPLS.
B. It allows the aggregation of multiple connection types (MPLS, 4G, Broadband, LTE).
C. It removes the need for IP addresses.
D. It requires satellite connections.

36 In SD-WAN, what is ZTP?

A. Zero Transmission Protocol
B. Zone Transfer Protocol
C. Zero Touch Provisioning
D. Zigzag Transmission Path

37 Unlike traditional router-based WANs, SD-WAN manages the network via:

A. Manual CLI configuration on every device
B. A Centralized Controller
C. Peer-to-peer negotiation
D. The Physical Layer

38 What is the primary function of a CDN (Content Delivery Network)?

A. To generate dynamic content for websites.
B. To distribute content to edge servers closer to users to reduce latency.
C. To replace the DNS system.
D. To compress files for storage.

39 In a CDN architecture, the Point of Presence (PoP) refers to:

A. The central database.
B. The user's computer.
C. A physical location where CDN servers reside.
D. The protocol used for caching.

40 Which DNS mechanism is commonly used by CDNs to direct a user to the nearest edge server?

A. Static Hosts File
B. Geo-DNS / Anycast DNS
C. Reverse DNS Lookup
D. DHCP

41 Which of the following is a security benefit often provided by CDNs?

A. End-to-end encryption of the physical cable
B. DDoS (Distributed Denial of Service) mitigation
C. Automatic password generation
D. Virus scanning of local hard drives

42 In the context of CDN, what is the Origin Server?

A. The first server ever built.
B. The server where the original, definitive version of the content resides.
C. The user's laptop requesting the file.
D. The nearest edge server.

43 What happens in a CDN when a requested file is not in the cache (Cache Miss)?

A. The user gets a 404 error.
B. The edge server requests the file from the Origin Server, delivers it, and caches it.
C. The connection is dropped.
D. The user is redirected to a different website.

44 SD-WAN capability to identify traffic based on Layer 7 (Application) information is called:

A. Packet Switching
B. Application Awareness
C. Port Forwarding
D. Circuit Switching

45 Which TCP mechanism prevents a sender from overwhelming the receiver?

A. Congestion Control
B. Flow Control
C. Fast Retransmit
D. Slow Start

46 Which TCP mechanism prevents a sender from overwhelming the network?

A. Flow Control
B. Congestion Control
C. Error Control
D. Keep-alive

47 In TCP connection termination, how many segments are typically exchanged?

A. 2
B. 3
C. 4
D. 6

48 What is the primary role of the User Agent in an email system?

A. To store emails permanently.
B. To route emails through the internet.
C. To allow the user to compose, read, and reply to messages.
D. To maintain the DNS records for the mail server.

49 In FTP, 'Anonymous FTP' allows a user to login with the username:

A. guest
B. anonymous
C. admin
D. root

50 Which of the following is an example of a Recent Trend in networking that moves computation closer to the source of data generation?

A. Mainframe Computing
B. Edge Computing
C. Client-Server Architecture
D. Batch Processing