Santa Clara University COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AMCOEN 233 Fall 2021 We-Fr Final testDue Dec 8 at 10:50am Points 25 Questions 25 Time Limit 20 Minutes Allowed Attempts Unlimited Attempt HistoryAttempt Time ScoreLATEST Attempt 1 16 minutes 25 out of
...[Show More]
Santa Clara University COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
COEN 233 Fall 2021 We-Fr Final test
Due Dec 8 at 10:50am Points 25 Questions 25
Time Limit 20 Minutes Allowed Attempts Unlimited
Attempt History
Attempt Time Score
LATEST Attempt 1 16 minutes 25 out of 25
! Correct answers will be available Dec 8 at 10:55am - Dec 8 at 11:05am.
Score for this attempt: 25 out of 25
Submitted Dec 8 at 10:46am
This attempt took 16 minutes.
Take the Quiz Again
Question 1 1 / 1 pts
1- ADSL is a data network layer protocol which uses existing
cellular wireless infrastructures.
False
True
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 2 of 11
Question 2 1 / 1 pts
2- Handoff (Handover) is the procedure that MS (Mobile
Subscriber) measures the signal and reports to BSC (Base
Station Controller), the handoff that is performed is Assisted
Handoff.
True
False
Question 3 1 / 1 pts
3- HLR (Home Location Register) is a database which contains last
user’s email on the server stored.
False
True
Question 4 1 / 1 pts
4- In SSL (Secure Socket Layer) Certificate is sent by Server to ask
client to verify server’s identity.
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 3 of 11
True
False
Question 5 1 / 1 pts
5- OFDM (Orthogonal Frequency Multiplexing) provides solution
with the guard band, the spectrum is subdivided in sub-channels
for better performance.
OFDM uses FM (Frequency Modulation)
False
True
Question 6 1 / 1 pts
6- Bridges use flooding, if there is no entry for the arrived frame in
the hash table of switch for this frame’s destination address.
True
False
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 4 of 11
Question 7 1 / 1 pts
7- IEEE 802.11 using CSMA/CD (Collision Media Access Control
with Collision Detection) because the radio received signals are
strong and the station at the same time can transmit and verify the
received signal.
False
True
Question 8 1 / 1 pts
8- In the Bluetooth the master initiates the connection to one or
more masters.
False
True
Question 9 1 / 1 pts
9- In AODV (Ad Hoc on-demand Distance Vector) the routes to
destination are not discovered, they are assigned prior to sending
the traffic.
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 5 of 11
True
False
Question 10 1 / 1 pts
10- In the QoS (Quality of Service) for Differentiated Services the
packets are handled per hop, it uses “Differentiated Service” field
in IP header.
Different classes of services can be offered.
True
False
Question 11 1 / 1 pts
11- In Toke Bucket concept at layer 3 for the QoS (Quality of
Service) allocation a fixed number of tokens are allocated to each
bucket.
In order to send out the bits, the user needs to have a predefined
number of tokens accumulated.
True
False
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 6 of 11
Question 12 1 / 1 pts
12- In the Fair Queuing the packets are queued in buffers and in
the round robin fashion the buffers are sent out, but there is strict
differentiation between flows with large and small packets.
False
True
Question 13 1 / 1 pts
13- In Internetworking, tunneling is used when the Source and
destination are on the same network types.
True
False
Question 14 1 / 1 pts
14- ICMP (Internet Control Protocol) provides management for
data link layer.
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 7 of 11
True
False
Question 15 1 / 1 pts
15- OSPF (Open Short Path First) is an exterior routing protocol
which is used by Autonomous Systems. It is using “Distance
Vector” algorithm.
Supports load balancing, splitting load over one path.
False
True
Question 16 1 / 1 pts
16- In the MPLS (Multi Protocol Label Switching) at egress of the
MPLS domain the labels are not removed because of security and
to sustain allocated bandwidth.
False
True
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 8 of 11
Question 17 1 / 1 pts
17- UDP (User Datagram Protocol) provides multiplexing, de
multiplexing, error detection, congestion control and
retransmission.
False
True
Question 18 1 / 1 pts
18- In the TCP (Transport Control Protocol) ACK Flag will be used
to ACK packets by destination. The window size 0 in ACK packet
means destination is ready to receive more packets.
False
True
Question 19 1 / 1 pts
19- The TCP (Transport Control Protocol) Keep-alive Timer
message will become active when the link becomes idle. This
message will help to keep the connection alive.
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 9 of 11
True
False
Question 20 1 / 1 pts
20- Electronic Mail uses SMTP (Simple Mail Transfer Protocol) to
transfers mail.
True
False
Question 21 1 / 1 pts
21-Plugins are executed and reside in the local browser and
provide codes for pdf, Flash, Media Play.
The browsers have interfaces to communicate with plugins.
True
False
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 10 of 11
Question 22 1 / 1 pts
22- The cookies are generated by client and will be sent to server.
False
True
Question 23 1 / 1 pts
23- XML (eXentsible Markup Language) provides structured
content for faster processing.
True
False
Question 24 1 / 1 pts
24- In the security the receiver uses a unique decryption key,
known as private key.
Receiver should publish its public key for encryption used by
sender.
True
COEN 233 Fall 2021 We-Fr Final test: 36282 Computer Engineering 233:Computer Networks-WF 09:30 AM 12/8/21, 10:46 AM
Page 11 of 11
False
Question 25 1 / 1 pts
25- Cipher Block Chaining provides a method for replacement of
blocks in the ciphered text.
False
True
[Show Less]