Computer Architecture And Organization Set 9

On This Page

This set of Computer Architecture and Organization Multiple Choice Questions & Answers (MCQs) focuses on Computer Architecture And Organization Set 9

Q1 | Several techniques can make size of routing table manageable and also handle issues such as                      
  • maturity
  • error reporting
  • tunneling
  • security
Q2 | Host-specific routing is used for purposes such as checking route or providing            
  • network measures
  • security measures
  • routing measures
  • delivery measures
Q3 | In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a                  
  • graph
  • tree
  • network
  • link
Q4 | In Multicast Routing Protocol, flooding is used to broadcast packets but it creates
  • gaps
  • loops
  • holes
  • links
Q5 | The computation of the shortest path in OSPF is usually done by                          
  • bellman-ford algorithm
  • routing information protocol
  • dijkstra’s algorithm
  • distance vector routing
Q6 | Which of the following is false with respect to the features of OSPF?
  • support for fixed-length subnetting by including the subnet mask in the routing message
  • more flexible link cost than can range from 1 to 65535
  • use of designated router
  • distribution of traffic over multiple paths that have equal cost to the destination
Q7 | In OSPF, which protocol is used to discover neighbour routers automatically?
  • link state protocol
  • error-correction protocol
  • routing information protocol
  • hello protocol
Q8 | Which of the following is not a type of OSPF packet?
  • hello
  • link-state request
  • link-state response
  • link-state ack
Q9 | In OSPF header, which field is used to detect errors in the packet?
  • type
  • area id
  • authentication type
  • checksum
Q10 | In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to                          
  • 1
  • 0
  • more
  • -1
Q11 | In OSPF database descriptor packet, which field is used to indicate that the router is master?
  • m
  • ms
  • i
  • options
Q12 | In OSPF database descriptor packet, which field is used to detect a missing packet?
  • lsa header
  • ms
  • database descriptor sequence number
  • options
Q13 | The size of an IP address in IPv6 is
  • 4 bytes
  • 128 bits
  • 8 bytes
  • 100 bits
Q14 | The header length of an IPv6 datagram is
  • 10bytes
  • 25bytes
  • 30bytes
  • 40bytes
Q15 | In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
  • fragmentation field
  • fast-switching
  • tos field
  • option field
Q16 | IPv6 does not use                    type of address.
  • broadcast
  • multicast
  • anycast
  • unicast
Q17 | Which among the following features is
  • hop limit
  • ttl
  • next header
  • type of traffic
Q18 | Dual-stack approach refers to                    
  • implementing ipv4 with 2 stacks
  • implementing ipv6 with 2 stacks
  • node has both ipv4 and ipv6 support
  • implementing a mac address with 2 stacks
Q19 | The                    field determines the lifetime of IPv6 datagram
  • use dual-stack approach
  • tunneling
  • no solution
  • replace the system
Q20 | Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits              
  • 96 to 127
  • 0 to 63
  • 80 to 95
  • 64 to 79
Q21 | An endpoint of an inter-process communication flow across a computer network is called                      
  • socket
  • pipe
  • port
  • machine
Q22 | Which one of the following is a version of UDP with congestion control?
  • datagram congestion control protocol
  • stream control transmission protocol
  • structured stream transport
  • user congestion control protocol
Q23 | Which of the following is a transport layer protocol?
  • stream control transmission protocol
  • internet control message protocol
  • neighbor discovery protocol
  • dynamic host configuration protocol
Q24 | 2 USER DATAGRAM PROTOCOLS (UDP)
  • connection-oriented
  • unreliable
  • transport layer protocol
  • low overhead
Q25 | Return value of the UDP port “Chargen” is
  • string of characters
  • string of integers
  • array of characters with integers
  • array of zero’s and one’s