To convert the “iith.cse.in” to its IP address, which of the following is needed?
TCP
DNS
ARP
HTTP
Difficulty Level: 1
Positive Marks: 1.00
Negative Marks: 0.33
Which of the following fields are common in both TCP and UDP header?

  1. Length
  2. Checksum
  3. Sequence number
  4. Window size
  5. Flag
I & II
II & III
III &V
II & IV
Difficulty Level: 1
Positive Marks: 1.00
Negative Marks: 0.33
What is the smallest firewall that can be used to block a particular service on a specific host?
Layer 4 firewall
Layer 3 firewall
Layer 2 firewall
Layer 5 firewall
Difficulty Level: 1
Positive Marks: 1.00
Negative Marks: 0.33
Which of the properties is/ are False about following the Routing Algorithm.
In Static Routing, everything is set up manually & requires administration, and In Dynamic Routing, everything is done by routers Automatically.
Static Routing works when traffic predictable & network is simple and Dynamic Routing calculates routes based on received updated network state information.
Static Routing and Dynamic Routing, Adapts to changes in depends on Traffic and topology.
LSR is Static routing algorithm, and DVR is Dynamic routing algorithm
Difficulty Level: 1
Positive Marks: 1.00
Negative Marks: 0.00
Count to infinity is a problem associated with?
Link-state routing protocol
Distance vector routing protocol
DNS while resolving a hostname
TCP for congestion control
Difficulty Level: 1
Positive Marks: 1.00
Negative Marks: 0.33
The address resolution protocol (ARP) is used for
Finding the IP address from the DNS
Finding the IP address of the default gateway
Finding the IP address that corresponds to a MAC address
Finding the MAC address that corresponds to an IP address
Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.66
The Diffie-Hellman key exchange technique is being used to establish a common secret key (session key) between sender Alice and receiver Bob. They agree on n=23 as the modulus and g=7 as the primitive root. Suppose Alice chooses secret key x=3 and Bob chooses secret key y=6 as their own secrets. Their D-H key is:?
13
14
5
None
Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.66
Which of the following statements are correct about routing and flooding methods?
In the Routing method, there is a Routing Table that is the disadvantage in comparison to the flooding method.
In the Routing method, Reliability is less, and in the flooding method Reliability is high.
In the Routing method, There is no duplicate packet, but in the flooding method, there are duplicate packets.
In the Routing method, Traffic is low, but in the flooding method, traffic is high.
Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.00
The subnet with 6 routers with delays shown as a line in the following graph. It uses distance-vector routing to build the tables. Router A has measured its routes to its neighbours B, C, and E. It gets a new distance of 2, 1, 5 for B, C, E respectively. A has received the following vectors from node B: (2,0,2,6,6,5), from node C: (1,4,0,9,7,7) and from node E: (6,8,7,5,0,3). Find which of the following is the new routing table at A.

Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.66
A digital signature cannot provide ____ for the message.
Integrity
Confidentiality
Non-repudiation
Authentication
Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.66
Which of the following functionality supported by IPV6?
Multicasting
Anycast address
Unicasting
All of these
Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.66
Match column A with Column B

1- (iii), 2-(iv), 3-(ii), 4-(i)
1- (iii), 2-(iv), 3-(i), 4-(ii)
1- (iii), 2-(v), 3-(i), 4-(ii)
1- (iii), 2-(v), 3-(ii), 4-(i)
Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.66
Which of the following is/are False?

  1. UDP is a connectionless and unreliable protocol
  2. If an application requires speed rather than reliability, then UDP is the best protocol. Eg. Multimedia application
  3. If an application needs one request & one reply kind of communication. TCP is the better protocol.
Only I
II & III
Only III
Only II
Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.66
Two popular routing algorithms are Distance Vector routing (DVR) and Link State Routing (LSR) routing. Which of the following are true?

  1. Count-to-infinity is a problem only with DVR, not in LSR.
  2. In LSR, the shortest path algorithm is run only at one node.
  3. In DVR, the shortest path algorithm runs only at one node.
  4. DVR requires a lesser number of messages than LSR.
I, II and IV
I, III and IV
II and II
I and IV
Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.66
The RSA algorithm is used by choosing two prime numbers, say p=3 and q=11. If the public key is e=3, then what is the value of private key d and what is the cipher value of the message M=8?
7,17
8,18
11,7
13,17
Difficulty Level: 1
Positive Marks: 2.00
Negative Marks: 0.66