Computer Architecture And Organization Set 9
On This Page
This set of Computer Architecture and Organization Multiple Choice Questions & Answers (MCQs) focuses on Computer Architecture And Organization Set 9
Q1 | Several techniques can make size of routing table manageable and also handle issues such as
- maturity
- error reporting
- tunneling
- security
Q2 | Host-specific routing is used for purposes such as checking route or providing
- network measures
- security measures
- routing measures
- delivery measures
Q3 | In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a
- graph
- tree
- network
- link
Q4 | In Multicast Routing Protocol, flooding is used to broadcast packets but it creates
- gaps
- loops
- holes
- links
Q5 | The computation of the shortest path in OSPF is usually done by
- bellman-ford algorithm
- routing information protocol
- dijkstra’s algorithm
- distance vector routing
Q6 | Which of the following is false with respect to the features of OSPF?
- support for fixed-length subnetting by including the subnet mask in the routing message
- more flexible link cost than can range from 1 to 65535
- use of designated router
- distribution of traffic over multiple paths that have equal cost to the destination
Q7 | In OSPF, which protocol is used to discover neighbour routers automatically?
- link state protocol
- error-correction protocol
- routing information protocol
- hello protocol
Q8 | Which of the following is not a type of OSPF packet?
- hello
- link-state request
- link-state response
- link-state ack
Q9 | In OSPF header, which field is used to detect errors in the packet?
- type
- area id
- authentication type
- checksum
Q10 | In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to
- 1
- 0
- more
- -1
Q11 | In OSPF database descriptor packet, which field is used to indicate that the router is master?
- m
- ms
- i
- options
Q12 | In OSPF database descriptor packet, which field is used to detect a missing packet?
- lsa header
- ms
- database descriptor sequence number
- options
Q13 | The size of an IP address in IPv6 is
- 4 bytes
- 128 bits
- 8 bytes
- 100 bits
Q14 | The header length of an IPv6 datagram is
- 10bytes
- 25bytes
- 30bytes
- 40bytes
Q15 | In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
- fragmentation field
- fast-switching
- tos field
- option field
Q16 | IPv6 does not use type of address.
- broadcast
- multicast
- anycast
- unicast
Q17 | Which among the following features is
- hop limit
- ttl
- next header
- type of traffic
Q18 | Dual-stack approach refers to
- implementing ipv4 with 2 stacks
- implementing ipv6 with 2 stacks
- node has both ipv4 and ipv6 support
- implementing a mac address with 2 stacks
Q19 | The field determines the lifetime of IPv6 datagram
- use dual-stack approach
- tunneling
- no solution
- replace the system
Q20 | Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
- 96 to 127
- 0 to 63
- 80 to 95
- 64 to 79
Q21 | An endpoint of an inter-process communication flow across a computer network is called
- socket
- pipe
- port
- machine
Q22 | Which one of the following is a version of UDP with congestion control?
- datagram congestion control protocol
- stream control transmission protocol
- structured stream transport
- user congestion control protocol
Q23 | Which of the following is a transport layer protocol?
- stream control transmission protocol
- internet control message protocol
- neighbor discovery protocol
- dynamic host configuration protocol
Q24 | 2 USER DATAGRAM PROTOCOLS (UDP)
- connection-oriented
- unreliable
- transport layer protocol
- low overhead
Q25 | Return value of the UDP port “Chargen” is
- string of characters
- string of integers
- array of characters with integers
- array of zero’s and one’s