Unit 6 - Practice Quiz

CSE306 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which layer of the OSI model is primarily responsible for process-to-process delivery of the entire message?

A. Session Layer
B. Data Link Layer
C. Network Layer
D. Transport Layer

2 The Transport Layer creates a connection between the source and destination ports. This type of addressing is known as:

A. Physical addressing
B. Service-point (Port) addressing
C. Logical addressing
D. Domain addressing

3 Which of the following services is NOT typically provided by the Transport Layer?

A. Routing
B. Error Control
C. Flow Control
D. Segmentation and Reassembly

4 In the context of the Transport Layer, what is multiplexing?

A. Connecting multiple routers together
B. Sending data from multiple processes to the network layer via a single transport protocol
C. Splitting one signal into multiple frequencies
D. Distributing incoming packets to different processes

5 What is the size of the Sequence Number field in the TCP header?

A. 16 bits
B. 64 bits
C. 8 bits
D. 32 bits

6 The minimum and maximum lengths of a TCP header are, respectively:

A. 20 bytes and 60 bytes
B. 20 bytes and 40 bytes
C. 20 bytes and 65535 bytes
D. 8 bytes and 20 bytes

7 In the TCP header, the Window Size field is used for:

A. Flow Control
B. Connection Establishment
C. Error Detection
D. Congestion Control

8 Which flag in the TCP header is set to 1 to initiate a connection?

A. SYN
B. FIN
C. URG
D. RST

9 If a TCP sender sends a segment with Sequence Number and payload length , what will be the Acknowledgement Number in the receiver's response (assuming successful receipt)?

A.
B.
C.
D.

10 Which of the following correctly describes the TCP Three-Way Handshake?

A. SYN ACK FIN
B. REQ RES ACK
C. SYN ACK SYN-ACK
D. SYN SYN-ACK ACK

11 The HLEN (Header Length) field in the TCP header is 4 bits. What is the multiplier used to calculate the total header size in bytes?

A. 1 byte
B. 8 bytes
C. 4 bytes
D. 16 bytes

12 What is the purpose of the Urgent Pointer field in the TCP header?

A. It requests an immediate acknowledgement.
B. It indicates the sequence number of the last byte of urgent data.
C. It resets the connection immediately.
D. It points to the beginning of the next segment.

13 In TCP, the PSH (Push) flag informs the receiver to:

A. Prioritize this packet over others in the network.
B. Push the data to the application layer immediately without buffering.
C. Push the connection termination request.
D. Retransmit the previous segment.

14 Which TCP field includes information from the IP header (source IP, dest IP, protocol, length) to ensure the segment reached the correct destination?

A. Window Size
B. Options
C. Padding
D. Pseudo-header (used in Checksum calculation)

15 The standard size of a UDP header is fixed at:

A. 16 bytes
B. 8 bytes
C. 32 bytes
D. 20 bytes

16 Which of the following fields is NOT present in a UDP header?

A. Destination Port
B. Checksum
C. Source Port
D. Sequence Number

17 Why is UDP often referred to as a connectionless protocol?

A. It only works on wireless networks.
B. It does not use IP addresses.
C. It requires a 2-way handshake instead of 3-way.
D. It does not establish a virtual circuit or handshake before transmitting data.

18 In the UDP header, the Length field includes:

A. Only the size of the data payload.
B. The size of the pseudo-header.
C. Only the size of the header.
D. The size of the header plus the data.

19 Which application would typically prefer UDP over TCP?

A. Real-time Video Streaming
B. Email (SMTP)
C. Web Browsing (HTTP)
D. File Transfer (FTP)

20 The calculation of the Checksum in UDP is:

A. Always Mandatory
B. Optional in IPv4, Mandatory in IPv6
C. Mandatory in IPv4, Optional in IPv6
D. Always Optional

21 The Domain Name System (DNS) primarily uses which Transport Layer protocol for standard queries?

A. ICMP
B. UDP
C. TCP
D. SCTP

22 Which standard port number is assigned to DNS?

A. 53
B. 25
C. 80
D. 21

23 In DNS, a Recursive Query puts the burden of resolution on the:

A. ISP
B. Root Server only
C. Client (Resolver)
D. Contacted Name Server

24 Which DNS record type maps a hostname to an IPv4 address?

A. MX
B. AAAA
C. CNAME
D. A

25 What is the structure of the DNS namespace?

A. Linear
B. Mesh
C. Circular
D. Inverted Tree (Hierarchical)

26 Which protocol is used to push email from a client to a mail server?

A. SMTP
B. HTTP
C. IMAP
D. POP3

27 Post Office Protocol version 3 (POP3) is primarily used for:

A. Encrypting email content
B. Sending emails between servers
C. Resolving domain names
D. Retrieving emails from a server to a client

28 What is the main advantage of IMAP over POP3?

A. IMAP does not require authentication.
B. IMAP allows managing emails directly on the server (folders, flags).
C. IMAP uses UDP for reliability.
D. IMAP is faster.

29 SMTP uses which port number by default?

A. 23
B. 110
C. 21
D. 25

30 Which standard extends email to support non-ASCII text, audio, and video attachments?

A. FTP
B. NVT
C. TELNET
D. MIME

31 FTP (File Transfer Protocol) establishes two connections between client and server. They are:

A. Upload connection and Download connection
B. Control connection and Data connection
C. TCP connection and UDP connection
D. Primary connection and Backup connection

32 Which port is used for the FTP Control Connection?

A. 21
B. 80
C. 22
D. 20

33 In FTP, the control connection is considered "out-of-band". What does this mean?

A. It has higher bandwidth.
B. It uses a different frequency.
C. It operates outside the internet.
D. It uses a separate channel/socket from the data transfer.

34 What is SD-WAN (Software Defined Wide Area Network)?

A. A protocol strictly for fiber optics.
B. A hardware-only solution for connecting LANs.
C. A new version of the internet protocol.
D. A virtual WAN architecture that decouples network software services from underlying hardware.

35 A key benefit of SD-WAN regarding transport independence is:

A. It only works with MPLS.
B. It allows the aggregation of multiple connection types (MPLS, 4G, Broadband, LTE).
C. It requires satellite connections.
D. It removes the need for IP addresses.

36 In SD-WAN, what is ZTP?

A. Zone Transfer Protocol
B. Zero Touch Provisioning
C. Zigzag Transmission Path
D. Zero Transmission Protocol

37 Unlike traditional router-based WANs, SD-WAN manages the network via:

A. Manual CLI configuration on every device
B. Peer-to-peer negotiation
C. A Centralized Controller
D. The Physical Layer

38 What is the primary function of a CDN (Content Delivery Network)?

A. To distribute content to edge servers closer to users to reduce latency.
B. To replace the DNS system.
C. To generate dynamic content for websites.
D. To compress files for storage.

39 In a CDN architecture, the Point of Presence (PoP) refers to:

A. A physical location where CDN servers reside.
B. The user's computer.
C. The protocol used for caching.
D. The central database.

40 Which DNS mechanism is commonly used by CDNs to direct a user to the nearest edge server?

A. Reverse DNS Lookup
B. Geo-DNS / Anycast DNS
C. Static Hosts File
D. DHCP

41 Which of the following is a security benefit often provided by CDNs?

A. Virus scanning of local hard drives
B. End-to-end encryption of the physical cable
C. DDoS (Distributed Denial of Service) mitigation
D. Automatic password generation

42 In the context of CDN, what is the Origin Server?

A. The first server ever built.
B. The server where the original, definitive version of the content resides.
C. The nearest edge server.
D. The user's laptop requesting the file.

43 What happens in a CDN when a requested file is not in the cache (Cache Miss)?

A. The user gets a 404 error.
B. The user is redirected to a different website.
C. The connection is dropped.
D. The edge server requests the file from the Origin Server, delivers it, and caches it.

44 SD-WAN capability to identify traffic based on Layer 7 (Application) information is called:

A. Port Forwarding
B. Application Awareness
C. Packet Switching
D. Circuit Switching

45 Which TCP mechanism prevents a sender from overwhelming the receiver?

A. Congestion Control
B. Slow Start
C. Fast Retransmit
D. Flow Control

46 Which TCP mechanism prevents a sender from overwhelming the network?

A. Error Control
B. Congestion Control
C. Keep-alive
D. Flow Control

47 In TCP connection termination, how many segments are typically exchanged?

A. 2
B. 6
C. 4
D. 3

48 What is the primary role of the User Agent in an email system?

A. To route emails through the internet.
B. To store emails permanently.
C. To maintain the DNS records for the mail server.
D. To allow the user to compose, read, and reply to messages.

49 In FTP, 'Anonymous FTP' allows a user to login with the username:

A. root
B. admin
C. anonymous
D. guest

50 Which of the following is an example of a Recent Trend in networking that moves computation closer to the source of data generation?

A. Batch Processing
B. Mainframe Computing
C. Edge Computing
D. Client-Server Architecture