Q.no 1. How Many Versions Available of IP?
Q.no 1. How Many Versions Available of IP?
testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Seat No -
Total number of questions : 60
PWD12897_COMPUTER NETWORKS CN
Time : 1hr
Max Marks : 50
N.B
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
A : 6 version
B : 4 version
C : 2 version
D : 1 version
Q.no 2. Data communication system spanning states, countries, or the whole world is
________
A : LAN
B : WAN
C : MAN
D : PAN
A : Star
B : Tree
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 1/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : Ring
D : LAN
A : IPv6
B : IPv4
D : IPv6 or IPv4
A : Four
B : Eight
C : Six
D : Seven
A : Communication
B : Standard
C : Metropolitian communication
D : Bandwidth
Q.no 7. Name server designated as the recipient of forwarded queries is known as _____
A : Class B
B : Class c
C : Forwarder
D : Class D
A : 10Base 5
B : 10Base 2
C : 10Base T
D : 10Base F
A : ethernet
B : Internet protocol
A : ipconfig /displaydns
B : ipconfig /flushdns
D : ipconfig /registerdns
Q.no 12. A ___ error means that 2 or more bits in the data unit have changed.
A : unibit
B : burst
C : channel
D : noisy
Q.no 13. How many layers does OSI Reference Model has?
A:4
B:5
C:6
D:7
Q.no 14. Which methods are commonly used in Server Socket class?
A : simplex
B : complex
C : duplex
D : half duplex
A : bar
B : uni
C : cyclic
D : hash
A : reliable, character-oriented
B : reliable, message-oriented
C : unreliable, message-oriented
D : unreliable, byte-oriented
A : SAN
B : PAN
D : WAN
A : 1000Base LX
B : 1000Base T
C : 1000Base SX
D : 100Base Fx
Q.no 20. The technique in which a congested node stops receiving data from the immediate
upstream node or nodes is called as _______
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 4/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Admission policy
B : Backpressure
C : Forward signaling
D : Backward signaling
B : Pure Aloha
C : Slotted Aloha
C : RTCP itself does not provide any flow encryption or authentication methods
Q.no 24. DHCP uses UDP port _________ for sending data to the server.
A : 66
B : 67
C : 68
D : 69
A : Seconds
B : Frames
C : Packets
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 5/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Bits
A : 6Mbps
B : 11Mbps
C : 22Mbps
D : 54Mbps
Q.no 27. _____ is the multiplexing technique that shifts each signal to a different carrier
frequency.
A : FDM
B : TDM
D : PDM
A : negotiation
B : association
C : transmission
D : reception
A : Multicast Scope
B : Super Scope
C : Subnet Mask
D : Automatic Backups
A : Ring topology
B : Bus topology
C : Star topology
D : Mesh topology
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 6/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : One only has to be connected to the server to send and receive email
Q.no 32. In FTP protocol, a client contacts a server using ______ as the transport protocol.
Q.no 34. In HDLC which frames are used to transport user data and control information
relating to user data (piggybacking)?
A : S-Frames
B : I-Frames
C : V-frames
D : U-Frame
A : Only one
B : Two
C : Three
D : Four
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 7/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Fixed length
B : Variable length
C : Global length
D : Zero length
Q.no 38. Which of the following network device has the slowest type of connection?
A : DSL
B : Router
C : Bridges
D : Dial-up modems
A:2
B:4
C:5
D:3
A : TCP
B : PPP
C : IP
D : IPX
Q.no 41. In PPP, the default maximum length of the information field is ________
A : 1500 bytes
B : 15000 bytes
C : 150 bytes
D : 15 bytes
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 8/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 42. HTTP client requests by establishing a __________ connection to a particular port
on the server.
Q.no 43. Peer-to-peer processes are processes on two or more devices communicating at a
A : same layer
B : different layer
D : none of above
Q.no 44. In PPP, the ________ is responsible for establishing, maintaining, configuring, and
terminating links.
A : PAP
B : CHAP
C : SAP
D : LCP
Q.no 45. Define the type of the following destination MAC address 4A:30:10:21:10:1A
A : IEEE 802.11 wireless LAN runs CSMA with collision detection protocol
C : CSMA with collision detection is not suitable for a high propagation delay network like satellite
network
Q.no 47. In class C , if subnet mask is 255.255.255.224 then calculates number of subnet?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 9/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A:6
B:8
C:4
D : 10
Q.no 48. For Stop-and-Wait ARQ, for 20 data packets sent, _______ acknowledgments are
needed.
A : less than 10
B : 19
C : 21
D : 20
Q.no 49. HDLC supports two types of transfer modes ________ and ________
C : each station can send either command or respond to commands but not both
Q.no 51. A slotted ALOHA network transmits 200 bit frames using a shared channel with a
200 kbps bandwidth. Find the throughput if the system (all stations together) produces 1000
frames per second
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
Q.no 52. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only one
segment?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 10/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : 10000
B : 10001
C : 12001
D : 11001
Q.no 53. _____ is a bit oriented protocol for communication over point to point and
multipoint links.
Q.no 54. For which one of the following reasons does Internet Protocol (IP) use the timeto-
live (TTL) field in the IP datagram header
D : Limit the time for which the packet gets queued in intermediate routers
Q.no 55. The dump of a UDP header in hexadecimal is CB84000D001C001C. What is the total
length of the user datagram?
A : 24Bytes
B : 64Bytes
C : 28Bytes
D : 32 Bytes
Q.no 56. Each frame in HDLC protocol may contain up ___ fields
A:4
B:5
C:6
D:7
Q.no 57. A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps
What is the requirement to make this frame collision free
A : multicast address
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 11/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Broadcast address
C : Unicast address
D : Anycast address
A : Application layer protocols are used by both source and destination devices during a
communication session
Q.no 59. In OSI model, when data is sent from device A to device B, the 5th layer to receive
data at B is _________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
Q.no 60. The right to use a domain name is delegated by domain name registers which are
accredited by _______
B : internet society
B : control chunks
C : data chunks
A : p persistent
B : nonpersistent
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 12/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : 1 persistent
D : Persistent
A : Transport Layer
C : Application Layer
D : Physical Layer
Q.no 4. When displaying a web page, the application layer uses the _____________
A : HTTP protocol
B : FTP protocol
C : SMTP protocol
D : TCP protocol
A : Star
B : Mesh
C : Ring
D : Bus
A : Connection-oriented
B : Unreliable
D : Low overhead
A : Packet is lost
B : Packet is corrupted
C : Packet is needed
D : Packet is error-free
B : Application Layer
C : Transport Layer
D : Network Layer
A : 20
B : 21
C : 22
D : 23
Q.no 11. Which one of the following is TRUE about interior Gateway routing protocols -
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)
A : RIP uses distance vector routing and OSPF uses link state routing
B : OSPF uses distance vector routing and RIP uses link state routing
B : easier
C : similar
Q.no 13. A simple protocol used for fetching email from a mail box is
A : POP3
B : IMAP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 14/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : SMTP
D : POP2
Q.no 14. The Maximum throughput for pure aloha is____ percent
C : Pure Aloha
D : Slotted Aloha
A : Packet switched
B : Circuit switched
C : Bit switched
D : Line switched
B : message unformatted
Q.no 18. TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________
A : Socket
B : IP Address
C : Protocol
D : MAC Address
D : All of these
Q.no 21. Which one of the following is not a function of network layer?
A : routing
B : inter-networking
C : congestion control
D : error control
Q.no 22. The maximum size of payload field in ethernet frame is __________
A : IEEE 802.3
B : IEEE 802.11
C : IEEE 802.2
D : IEEE 802.15
Q.no 24. Find the FTP reply whose message is wrongly matched.
Q.no 25. Which layer of the OSI model are host-to-host layer?
A : Physical layer
B : Network layer
C : Datalink layer
A : packet switching
B : circuit switching
C : line switching
D : frequency switching
Q.no 27. Bit stuffing means adding extra 0 to the data section of the frame when there is a
sequence of bits with the same pattern as the _____
A : header
B : trailer
C : payload
D : flag
Q.no 28. Error control in the data link layer is based on_______
A : hamming code
B : parity generator
C : retransmission of data
D : data duplication
A : 121.12.12.248
B : 130.12.12.248
C : 128.12.12.248
D : 129.12.12.248
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 17/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : public-key cryptography
B : private-key cryptography
A : FTP
B : TCP
C : IP
D : Telnet
Q.no 32. In which protocol sender sends one frame, stops until it receives confirmation from
the receiver?
A : MQTT protocol
B : Wait Protocol
C : Stop-and-Wait Protocol
D : Stop Protocol
A : 2.4 GHz
B : 5 GHz
C : 2.4 Gbps
D : 5 Gbps
Q.no 34. DHCP uses UDP port _________ for sending data to the server.
A : 66
B : 67
C : 68
D : 69
Q.no 35. The maximum length (in bytes) of an IPv4 datagram is?
A : 32
B : 1024
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 18/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : 65535
D : 512
A : p persistent
B : nonpersistent
C : 1 persistent
D : Persistent
A : 16-bits
B : 32-bits
C : 48-bits
D : 64-bits
Q.no 38. In sliding window protocol, the send window can slide one or more slots when valid
____ arrives.
A : bit
B : request
C : flag
D : acknowledgement
A : Sender
B : Receiver
C : Router
D : Switch
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 19/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : RFC822
B : RFC 800
C : Ethernet
D : RFC 1521
Q.no 42. The process of modifying IP address information in IP packet headers while in
transit across a traffic routing device is called
C : Address mapping
D : Port mapping
Q.no 43. A slotted ALOHA network transmits 200 bit frames using a shared channel with a
200 kbps bandwidth. Find the throughput if the system (all stations together) produces 500
frames per second
A : 2msec
B : 4msec
C : 2sec
D : 4sec
Q.no 44. After obtaining the IP address, to prevent the IP conflict the client may use
_________
Q.no 45. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all stations together) produces 1000 frames per second
A : 92 frames
B : 368 frames
C : 276 frames
D : 151 frames
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 20/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 46. In the IPv4 addressing format, the number of networks allowed under Class C
addresses is
A : 2 rest to 14
B : 2 rest to 7
C : 2 rest to 21
D : 2 rest to 24
Q.no 48. In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
Q.no 50. ______ is a communication protocol of the data link layer that is used to transmit
multiprotocol data between two directly connected computers.
B : Internet Protocol
Q.no 51. Which is the correct expression for the length of UDP datagram?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 21/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 52. Simplex protocol of Data Link Layer works on ____ channels
A : noiseless
B : broadband
C : noisy
D : creative
Q.no 53. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 54. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps
What is the throughput if the system (all stations together) produces 500 frames per second
A : 92 frames
B : 368 frames
C : 276 frames
D : 151 frames
Q.no 55. Which layer is responsible for process to process delivery in a general network
model?
A : network layer
B : transport layer
C : session layer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 22/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
Q.no 57. IPv6 does not support which of the following addressing modes?
A : unicast addressing
B : multicast addressing
C : broadcast addressing
D : anycast addressing
Q.no 58. ____ refers to a set of procedures used to restrict the amount of data
that the sender can send before waiting for acknowledgment.
A : Flow control
B : Speed control
C : Error control
D : Data control
Q.no 59. In _________, the configuration is balanced. The link is point-to-point, and each
station can function as a primary and a secondary.
A : ARM
B : ABM
C : NBM
D : NRM
Q.no 60. When collection of various computers seems a single coherent system to its client,
then it is called _________
A : computer network
B : distributed system
C : networking system
D : mail system
Q.no 1. In point to point protocol ____ field of PPP Frame carries the user data.
A : flag
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 23/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : payload
C : Protocol
D : FCS
Q.no 2. TCP process may not write and read data at the same speed. So we need __________
for
A : Packets
B : Buffers
C : Segments
D : Stacks
Q.no 3. Which one of the following is an internet standard protocol for managing devices on
IP network?
Q.no 4. In which method is used for large waiting time or backoff time
A : Bus
B : star
C : Ring
D : Mesh
A : media stream
B : expansion
C : media modification
D : security
Q.no 6. The protocol which is used for defining the legal request and replies is called ______ .
A : FTP
B : SMTP
C : TCP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 24/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : HTTP
A : Bluetooth
B : WAN
C : WLAN
D : LAN
Q.no 8. When a host on network A sends a message to a host on network B, which address
does the router look at?
A : Port
B : IP
C : Physical
D : Subnet Mask
Q.no 9. An email client needs to know the _________ of its initial SMTP server.
A : IP address
B : MAC address
C : URL
D : Name
Q.no 10. Which networking device connect one LAN to other LAN using same protocol?
A : Router
B : Switch
C : Bridge
D : Modem
Q.no 11. Which protocol provides the synchronization between media streams?
A : RTP
B : RTCP
C : RPC
D : RTCT
Q.no 12. FTP server listens for connection on port number _________
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 25/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : 20
B : 21
C : 22
D : 23
A : 802.3
B : 802.11
C : 802.15
D : 802.16
A : 000D
B : CB84
C : 001C
D : 001D
A : Firewall
B : Gateway
C : Router
D : Virus checker
A : Protocols
B : Standards
C : RFCs
D : Servers
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 26/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : 802.3 z
B : 802.3
C : 802.3 u
D : 802.11
Q.no 19. _____. Is the process of placing timestamps on dynamically registered records
A : Aging
B : IP
C : AIPAA
D : tcp
Q.no 20. IEEE created Gigabit Ethernet under the name ______
A : Four
B : Eight
C : Six
D : Seven
Q.no 21. Which of the following layer of OSI model also called end-to-end layer?
A : Presentation layer
B : Network layer
C : Session layer
D : Transport layer
Q.no 22. The data link layer pack bits into ____.
A : segments
B : clusters
C : packets
D : frames
A : Appliation layer
B : Transport layer
C : Network layer
D : Datalink layer
Q.no 24. In the _________ method, after the station finds the line idle, it sends its frame
immediately. If the line is not idle, it continuously senses the line until it finds it idle
A : nonpersistent
B : Pure Aloha
Q.no 25. Which protocol is a signaling communication protocol used for controlling
multimedia communication sessions?
Q.no 26. What are the Methods to move data through a network of links and switches?
A : 8 bits
B : 4 bits
C : 2 bits
D : 9 bits
Q.no 28. framing, flow and error control are the functionalities of ______
A : Physical layer
C : network layer
D : Transport layer
Q.no 29. IEEE has defined the specifications for a wireless LAN called,_______ which covers
the physical and data link layers
A : 550 m
B : 25 m
C : 5000 m
D : 100 m
Q.no 30. In Inet Address class, which method returns the host name of the IP Address?
D : Public getByName()
Q.no 31. Which access method is used for the half duplex approach in fast ethernet
A : 4B/5B
B : NRZ-I
C : MLT-3
D : 8B/6T
Q.no 32. In File Transfer Protocol, data transfer cannot be done in __________
A : stream mode
B : block mode
C : compressed mode
D : message mode
Q.no 33. Which protocol gives a full route table update every 30 seconds?
A : IEGRP
B : RIP
C : ICMP
D : IP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 29/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 34. In Go-Back-N window, when the timer of the packet times out, several packets have
to be resent even some may have arrived safe. Whereas in Selective Repeat window, the
sender resends ___________
Q.no 36. Which of the following is not a congestion policy at network layer?
D : Routing Algorithm
Q.no 38. In the slow-start algorithm, the size of the congestion window increases __________
until it reaches a threshold.
A : exponentially
B : additively
C : multiplicatively
D : suddenly
Q.no 39. In SMTP, the command to write receiver’s mail address is written with the
command _______
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 30/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : SEND TO
B : RCPT TO
C : MAIL TO
D : RCVR TO
Q.no 40. In FTP protocol, client contacts server using ____ as the transport protocol.
Q.no 41. In HDLC which frames are used only to transport control information?
A : S-Frames
B : I-Frames
C : V-frames
D : U-Frame
Q.no 42. _______ is responsible for tunneling multicast packets to the Mobile Station’s
currently subscribed FA.
B : Mobile multicast
C : Mobile station
D : Base station
Q.no 43. In PPP, the default maximum length of the information field is ________
A : 1500 bytes
B : 15000 bytes
C : 150 bytes
D : 15 bytes
A : Socket
B : IP Address
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 31/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : Protocol
D : MAC Address
A : base 64 encoding
B : base 32 encoding
C : base 16 encoding
D : base 8 encoding
Q.no 46. Port number used by Network Time Protocol (NTP) with UDP is ________
A : 161
B : 123
C : 162
D : 124
Q.no 47. The dump of a UDP header in hexadecimal is CB84000D001C001C. What is source
port number.
A : 000D
B : CB84
C : 001C
D : 001D
Q.no 49. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
A : Request line
B : Header line
C : Status line
D : Entity body
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 32/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 50. a character-oriented approach and a bit-oriented approaches used in which type of
framing?
A : fixed size
B : zero size
C : variable-size
D : cells
Q.no 51. The port number is “ephemeral port number”, if the source host is _______
A : NTP
B : Echo
C : Server
D : Client
Q.no 52. Peer-to-peer processes are processes on two or more devices communicating at a
A : same layer
B : different layer
D : none of above
Q.no 53. A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps
What is the requirement to make this frame collision free
A : multicast address
B : Broadcast address
C : Unicast address
D : Anycast address
Q.no 54. Which one of the following algorithm is not used for congestion control?
B : admission control
C : load shedding
A : 124.201.3.1.52
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 33/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : 300.142.210.64
C : 10110011.32.16.8
D : 128.64.0.0
A : Automatic
B : Half-duplex
C : Full-duplex
D : Simplex
A : Application layer protocols are used by both source and destination devices during a
communication session
Q.no 58. _____ is used in PPP payload field whenever the flag sequence appears in the
message, so that the receiver does not consider it as the end of the frame.
A : extra stuffing
B : bit stuffing
C : character stuffing
D : Byte stuffing
Q.no 59. HDLC supports two types of transfer modes ________ and ________
Q.no 60. Which of the following routing protocol used for network layer design?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 34/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Aging
B : IP
C : AIPAA
D : tcp
A : Communication
B : Standard
C : Metropolitian communication
D : Bandwidth
Q.no 3. Bytes of data being transferred in each connection are numbered by TCP. These
numbers start with a _________
A : Fixed number
C : One
Q.no 4. A ___ error means that 2 or more bits in the data unit have changed.
A : unibit
B : burst
C : channel
D : noisy
A : 8 bytes
B : 8 bits
C : 16 bytes
D : 124 bytes
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 35/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Connection-oriented
B : Process-to-process
D : Unreliable
A : ethernet
B : Internet protocol
Q.no 8. Which Method can be used for to reduce the collision but canot eliminate it
A : 6 version
B : 4 version
C : 2 version
D : 1 version
Q.no 10. Which type of network is used for small geographical area such as in a one building?
A : WLAN
B : MAN
C : LAN
D : WAN
A : Multiport Hub
B : Multiport Switch
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 36/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : Multiport Bridge
D : Multiport NIC
Q.no 12. Which one of the following protocol delivers/stores mail to reciever server?
A : Gateways
B : Linux
C : Routers
D : Firewalls
C : Bootstrap Protocol
A : Protocol
B : URL
C : E-mail address
D : website
Q.no 19. The Maximum throughput for pure aloha is____ percent
C : Pure Aloha
D : Slotted Aloha
Q.no 20. How does a DHCP server dynamically assign IP address to host?
A : Addresses are allocated after a negotiation between the server and the host to determine the
length of the agreement.
B : Addresses are assigned for a fixed period of time. At the end of period, a new quest for an
address must be made, and another address is then assigned.
C : Addresses are leased to host. A host will usually keep the same address by periodically
contacting the DHCP sever to renew the lease.
D : Addresses are permanently assigned so that the host uses the same address at all times.
A : to connect LANs
B : to separate LANs
Q.no 22. _____ is the multiplexing technique that shifts each signal to a different carrier
frequency.
A : FDM
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 38/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : TDM
D : PDM
Q.no 23. The maximum size of payload field in ethernet frame is __________
A : IEEE 802.3
B : IEEE 802.11
C : IEEE 802.2
D : IEEE 802.15
Q.no 24. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
Q.no 26. Which one of the following fields of an IP header is NOT modified by a typical IP
router?
A : Checksum
B : Source address
D : Length
A : Seconds
B : Frames
C : Packets
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 39/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Bits
A : Ethernet
C : Token Ring
D : ATM
Q.no 29. Which network is able to connect and send data to each computer via central hub or
switch without looking where the data is sent?
A : Star
B : Router
C : Bus
D : LAN
A : Flow control
B : Three-Way Handshaking
C : Forwarding
D : Synchronization
B : addressing
C : forwarding
D : routing
Q.no 32. Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91
respectively and they both use the same netmask N. Which of the values of N given below
should not be used if A and B should belong to the same network?
A : 255.255.255.0
B : 255.255.255.128
C : 255.255.255.192
D : 255.255.255.224
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 40/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 33. In CSMA with collision detection the energy level of channel can have three values:
Normal , Zero, and abnormal which of the following is correct sequence
A : Wired network
B : Wireless Network
A : Distance vector
B : Flooding
C : Path vector
D : Link state
Q.no 36. The ______ field is used to detect errors over the entire user datagram.
A : udp header
B : checksum
C : source port
D : destination port
A : sliding window
B : sliding frame
C : sliding packet
D : sliding door
A : TSN
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 41/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : SI
C : SSN
D : GSN
Q.no 39. DHCP uses UDP port _________ for sending data to the server.
A : 66
B : 67
C : 68
D : 69
Q.no 40. In ___ protocol, if no acknowledgement for the sent frame has arrived to the sender,
it resends all the oustanding frames.
B : go-Back-N ARQ
C : simplest
Q.no 41. Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host?
A : HTTP
B : FTP
C : Telnet
D : TCP
Q.no 42. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps
What is the throughput if the system (all stations together) produces 250 frames per second
A : 92 frames
B : 368 frames
C : 49 frames
D : 151 frames
Q.no 43. The _________Protocol, adds a simple error control mechanism to the
_______Protocol.
Q.no 44. In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
B : an SMTP extension
Q.no 46. The right to use a domain name is delegated by domain name registers which are
accredited by _______
B : internet society
Q.no 47. HTTP client requests by establishing a __________ connection to a particular port
on the server.
Q.no 48. In OSI model, when data is sent from device A to device B, the 5th layer to receive
data at B is _________
A : Application layer
B : Transport layer
C : Link layer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 43/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Session layer
Q.no 49. In _________, the station configuration is unbalanced. We have one primary station
and multiple secondary stations.
A : ARM
B : NBM
C : NRM
D : ABM
Q.no 50. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 51. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps
What is the throughput if the system (all stations together) produces 500 frames per second
A : 92 frames
B : 368 frames
C : 276 frames
D : 151 frames
Q.no 52. To achieve reliable transport in TCP, ___________ is used to check the safe and
sound arrival of data.
A : Packet
B : Buffer
C : Segment
D : Acknowledgment
Q.no 53. Which of the following statements is TRUE about CSMA with collision detection
A : 135 frames
B : 92 frames
C : 38 frames
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 44/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : 156 frames
Q.no 54. Byte stuffing means adding a special byte to the data section of the frame when there
is a character with the same pattern as the ______.
A : trailer
B : header
C : payload
D : flag
Q.no 55. In wireless network most of the energy is lost during transmission. How many
percentage of additional energy is added if there is collision
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
Q.no 56. A slotted ALOHA network transmits 200 bit frames using a shared channel with a
200 kbps bandwidth. Find the throughput if the system (all stations together) produces 1000
frames per second
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
Q.no 57. Beyond IP, UDP provides additional services such as _______
Q.no 58. In class C , if subnet mask is 255.255.255.224 then calculates number of subnet?
A:6
B:8
C:4
D : 10
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 45/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 59. The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for
______ channels.
A : signal
B : wireless
C : noisy
D : noiseless
Q.no 60. In the IPv4 addressing format, the number of networks allowed under Class C
addresses is
A : 2 rest to 14
B : 2 rest to 7
C : 2 rest to 21
D : 2 rest to 24
A : receiver
B : bit
C : byte
D : both b & c
A : 12.2
B : 18.4
C : 36.8
D : 13.5
A : Star
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 46/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Mesh
C : Ring
D : Bus
Q.no 5. If DHCP snooping is configured on a LAN switch, then clients having specific ______
can access the network.
A : MAC Address
B : IP Address
D : MAC or IP address
A : Routers
B : Firewalls
C : bridge
D : Modems
Q.no 7. When displaying a web page, the application layer uses the _____________
A : HTTP protocol
B : FTP protocol
C : SMTP protocol
D : TCP protocol
A : Modulus
B : Modem
C : Mod switch
D : Mod access
Q.no 9. When a host on network A sends a message to a host on network B, which address
does the router look at?
A : Port
B : IP
C : Physical
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 47/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Subnet Mask
A : Data Link
B : Network
C : Physical
D : Transport
A : MAC address
B : IP address
C : port address
D : specific address
Q.no 12. The client in socket programming must know which information?
A : IP address of Server
B : Port number
Q.no 13. The ___________layer of ethernet consist of LLC sublayer and MAC sublayer
B : Transmission time
B : control chunks
C : data chunks
Q.no 15. _____ allows the receiver to inform the sender of any frames lost or damaged in
transmission and coordinates the retransmission of those frames by the sender.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 48/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Error control
B : data control
C : Transmission Control
D : Speed control
A : Mesh
B : Star
C : Ring
D : Bus
Q.no 17. TCP process may not write and read data at the same speed. So we need __________
for
A : Packets
B : Buffers
C : Segments
D : Stacks
A : transport layer
B : application layer
C : network layer
Q.no 19. ______is used in dealing with error detection and error correction
A : Samming distance
B : Hamming distance
C : Tamming distance
D : Spamming distance
Q.no 20. How many layers does OSI Reference Model has?
A:4
B:5
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 49/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C:6
D:7
Q.no 21. In File Transfer Protocol, data transfer cannot be done in __________
A : stream mode
B : block mode
C : compressed mode
D : message mode
C : One only has to be connected to the server to send and receive email
A : 6Mbps
B : 11Mbps
C : 22Mbps
D : 54Mbps
A : Physical layer
C : Network layer
D : Transport layer
Q.no 25. _______ provides a connection-oriented reliable service for sending messages
A : TCP
B : IP
C : UDP
D : DHCP
A : 16 and 32 bytes
B : 16 and 32 bits
C : 20 and 60 bytes
D : 20 and 60 bits
Q.no 27. To detect or correct errors, we need to send _____ with data.
B : error bits
C : hamming distance
D : hash keys
Q.no 28. Which layer of the OSI model are host-to-host layer?
A : Physical layer
B : Network layer
C : Datalink layer
Q.no 29. The frame transmission and collision detection is a continuous process which method
is used for this condition
Q.no 30. Which of the following fields in IPV4 datagram is not related to fragmentation?
A : Type of service
B : Fragment offset
C : Flags
D : Identification
Q.no 31. Which one of the following is not an application layer protocol?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 51/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A:1
B:2
C:3
D:4
C : RTCP itself does not provide any flow encryption or authentication methods
Q.no 34. Which of the following layer of OSI model also called end-to-end layer?
A : Presentation layer
B : Network layer
C : Session layer
D : Transport layer
A:2
B:4
C:5
D:3
A : Bits
B : Frames
C : Packets
D : Bytes
B : acting as a backup
Q.no 38. DHCP (dynamic host configuration protocol) provides __________ to the client.
A : IP address
B : MAC Address
C : Port Address
D : Physical Address
Q.no 39. Which protocol is a signaling communication protocol used for controlling
multimedia communication sessions?
A : 121.12.12.248
B : 130.12.12.248
C : 128.12.12.248
D : 129.12.12.248
Q.no 41. In PPP, the ________ is responsible for establishing, maintaining, configuring, and
terminating links.
A : PAP
B : CHAP
C : SAP
D : LCP
Q.no 42. a character-oriented approach and a bit-oriented approaches used in which type of
framing?
A : fixed size
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 53/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : zero size
C : variable-size
D : cells
Q.no 43. Peer-to-peer processes are processes on two or more devices communicating at a
A : same layer
B : different layer
D : none of above
Q.no 44. Which layer is responsible for process to process delivery in a general network
model?
A : network layer
B : transport layer
C : session layer
A : RFC822
B : RFC 800
C : Ethernet
D : RFC 1521
Q.no 46. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only one
segment?
A : 10000
B : 10001
C : 12001
D : 11001
Q.no 47. IPv6 does not support which of the following addressing modes?
A : unicast addressing
B : multicast addressing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 54/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : broadcast addressing
D : anycast addressing
Q.no 48. Which one of the following algorithm is not used for congestion control?
B : admission control
C : load shedding
Q.no 49. For Stop-and-Wait ARQ, for 20 data packets sent, _______ acknowledgments are
needed.
A : less than 10
B : 19
C : 21
D : 20
A : Application layer protocols are used by both source and destination devices during a
communication session
Q.no 51. ______ is a communication protocol of the data link layer that is used to transmit
multiprotocol data between two directly connected computers.
B : Internet Protocol
Q.no 52. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all stations together) produces 1000 frames per second
A : 92 frames
B : 368 frames
C : 276 frames
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 55/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : 151 frames
Q.no 53. In HDLC which frames are used only to transport control information?
A : S-Frames
B : I-Frames
C : V-frames
D : U-Frame
Q.no 55. ____ refers to a set of procedures used to restrict the amount of data
that the sender can send before waiting for acknowledgment.
A : Flow control
B : Speed control
C : Error control
D : Data control
Q.no 56. Define the type of the following destination MAC address 4A:30:10:21:10:1A
A : IEEE 802.11 wireless LAN runs CSMA with collision detection protocol
C : CSMA with collision detection is not suitable for a high propagation delay network like satellite
network
Q.no 57. In _________, the configuration is balanced. The link is point-to-point, and each
station can function as a primary and a secondary.
A : ARM
B : ABM
C : NBM
D : NRM
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 56/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 58. In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are ___________
A : Added
B : Removed
C : Rearranged
D : Modified
Q.no 59. Port number used by Network Time Protocol (NTP) with UDP is ________
A : 161
B : 123
C : 162
D : 124
A : Socket
B : IP Address
C : Protocol
D : MAC Address
B : easier
C : similar
A : Packet is lost
B : Packet is corrupted
C : Packet is needed
D : Packet is error-free
Q.no 3. When the mail server sends mail to other mail servers it becomes ____________
A : SMTP server
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 57/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : SMTP client
C : Peer
D : Master
A : Bluetooth
B : WAN
C : WLAN
D : LAN
Q.no 5. In the congestion avoidance algorithm, the size of the congestion window increases
____________ until congestion is detected.
A : exponentially
B : additively
C : multiplicatively
D : suddenly
Q.no 6. Data communication system spanning states, countries, or the whole world is
________
A : LAN
B : WAN
C : MAN
D : PAN
A : 20
B : 101
C : 80
D : 60
A : simplex
B : complex
C : duplex
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 58/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : half duplex
Q.no 9. In which method is used for large waiting time or backoff time
A : Bus
B : star
C : Ring
D : Mesh
Q.no 10. _____. Is the process of placing timestamps on dynamically registered records
A : Aging
B : IP
C : AIPAA
D : tcp
A : Packet switched
B : Circuit switched
C : Bit switched
D : Line switched
A : Transport Layer
C : Application Layer
D : Physical Layer
Q.no 13. In pure Aloha what is maximum number of retransmission attempts if frame get
congested in the channel
A : Two half
B : One Half
C : Three half
D : Four half
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 59/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : 0 to 20 bytes
B : 20 to 40 bytes
C : 20 to 60 bytes
D : 20 to 80 bytes
Q.no 17. A simple protocol used for fetching email from a mail box is
A : POP3
B : IMAP
C : SMTP
D : POP2
A : Topology
B : Routing
C : Networking
D : Control
A : p persistent
B : nonpersistent
C : 1 persistent
D : Persistent
A : Multicast Scope
B : Super Scope
C : Subnet Mask
D : Automatic Backups
A : public-key cryptography
B : private-key cryptography
A : TCP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 61/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : PPP
C : IP
D : IPX
Q.no 26. A wireless LAN defined by IEEE 802.11 has categories of frames which are those
A : 1000 bytes
B : 1200 bytes
C : 1300 bytes
D : 1500 bytes
Q.no 27. Which access method is used for the half duplex approach in fast ethernet
A : 4B/5B
B : NRZ-I
C : MLT-3
D : 8B/6T
Q.no 28. What is the maximum data rate for the 802.11g standard
A : 10 to 15 percent
B : 5 to 10 percent
C : 0 to 5 percent
D : 15 to 20 percent
B : Coaxial cable
C : Wireless LAN
D : Copper wire
A : 38 percent
B : 36 percent
C : 34 percent
D : 37 percent
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 62/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : On stub networks- which have only one exit path out of the network
B : Which have more than one exit path out of the network
Q.no 32. Find the FTP reply whose message is wrongly matched.
Q.no 33. The ____________ translates internet domain and host names to IP address.
A : Only one
B : Two
C : Three
D : Four
A : Persistent
B : Non-persistent
D : P- Persistent
Q.no 36. Network layer at source is responsible for creating a packet from data coming from
another ________
A : Station
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 63/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Link
C : Node
D : Protocol
Q.no 37. Which of the following is not a congestion policy at network layer?
D : Routing Algorithm
Q.no 39. In byte stuffing (or character stuffing), a special byte known as _____ is added to the
data section of the frame when there is a character with the same pattern as the flag.
A : excuse character
B : entry character
C : exit character
D : escape character
Q.no 40. In sliding window protocol, the send window can slide one or more slots when valid
____ arrives.
A : bit
B : request
C : flag
D : acknowledgement
A : network layer
B : physical layer
D : transport layer
Q.no 42. In the IPv4 addressing format, the number of networks allowed under Class C
addresses is
A : 2 rest to 14
B : 2 rest to 7
C : 2 rest to 21
D : 2 rest to 24
Q.no 43. The dump of a UDP header in hexadecimal is CB84000D001C001C. What is the total
length of the user datagram?
A : 24Bytes
B : 64Bytes
C : 28Bytes
D : 32 Bytes
A : Automatic
B : Half-duplex
C : Full-duplex
D : Simplex
Q.no 45. The process of modifying IP address information in IP packet headers while in
transit across a traffic routing device is called
C : Address mapping
D : Port mapping
Q.no 46. Each frame in HDLC protocol may contain up ___ fields
A:4
B:5
C:6
D:7
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 65/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 47. HDLC supports two types of transfer modes ________ and ________
Q.no 48. The _________Protocol, adds a simple error control mechanism to the
_______Protocol.
Q.no 49. In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
Q.no 50. Byte stuffing means adding a special byte to the data section of the frame when there
is a character with the same pattern as the ______.
A : trailer
B : header
C : payload
D : flag
Q.no 51. To achieve reliable transport in TCP, ___________ is used to check the safe and
sound arrival of data.
A : Packet
B : Buffer
C : Segment
D : Acknowledgment
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 66/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 52. A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps
What is the requirement to make this frame collision free
A : multicast address
B : Broadcast address
C : Unicast address
D : Anycast address
Q.no 53. In class C , if subnet mask is 255.255.255.224 then calculates number of subnet?
A:6
B:8
C:4
D : 10
Q.no 54. Which of the following routing protocol used for network layer design?
Q.no 55. The right to use a domain name is delegated by domain name registers which are
accredited by _______
B : internet society
Q.no 56. The port number is “ephemeral port number”, if the source host is _______
A : NTP
B : Echo
C : Server
D : Client
B : an SMTP extension
A : 124.201.3.1.52
B : 300.142.210.64
C : 10110011.32.16.8
D : 128.64.0.0
Q.no 59. After obtaining the IP address, to prevent the IP conflict the client may use
_________
Q.no 60. In OSI model, when data is sent from device A to device B, the 5th layer to receive
data at B is _________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
Q.no 1. In Slotted Aloha, the vulnerable time is reduced to ______ equal to the frame
transmission time
A : Pure Aloha
B : Slotted Aloha
C : CSMA
D : FDMA
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 68/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 5. TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________
A : Socket
B : IP Address
C : Protocol
D : MAC Address
Q.no 6. Which networking device connect one LAN to other LAN using same protocol?
A : Router
B : Switch
C : Bridge
D : Modem
A : ipconfig /displaydns
B : ipconfig /flushdns
D : ipconfig /registerdns
A : Protocols
B : Standards
C : RFCs
D : Servers
B : Application Layer
C : Transport Layer
D : Network Layer
Q.no 10. In _______ framing, there is no need for defining the boundaries of frames.
A : standard
B : fixed-size
C : variable-size
D : character
B : Multiple links
Q.no 13. In pure Aloha, the vulnerable time is ______ the frame transmission time
A : 10
B : 15
C : 16
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 70/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : 17
A : Communication
B : Standard
C : Metropolitian communication
D : Bandwidth
Q.no 15. The client in socket programming must know which information?
A : IP address of Server
B : Port number
A : MAC address
B : IP address
C : port address
D : specific address
Q.no 17. Which one of the following is TRUE about interior Gateway routing protocols -
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)
A : RIP uses distance vector routing and OSPF uses link state routing
B : OSPF uses distance vector routing and RIP uses link state routing
B : message unformatted
Q.no 19. Which one of the following protocol delivers/stores mail to reciever server?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 71/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Mesh
B : Star
C : Ring
D : Bus
Q.no 21. In the slow-start algorithm, the size of the congestion window increases __________
until it reaches a threshold.
A : exponentially
B : additively
C : multiplicatively
D : suddenly
Q.no 22. Which protocol gives a full route table update every 30 seconds?
A : IEGRP
B : RIP
C : ICMP
D : IP
Q.no 23. In FTP protocol, a client contacts a server using ______ as the transport protocol.
Q.no 24. Which classes are used for connection-less socket programming?
A : Datagram Socket
B : Datagram Packet
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 72/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Server Socket
A : Appliation layer
B : Transport layer
C : Network layer
D : Datalink layer
Q.no 27. In HDLC which frames are used to transport user data and control information
relating to user data (piggybacking)?
A : S-Frames
B : I-Frames
C : V-frames
D : U-Frame
Q.no 28. IEEE has defined the specifications for a wireless LAN called,_______ which covers
the physical and data link layers
A : 550 m
B : 25 m
C : 5000 m
D : 100 m
Q.no 29. In ___ protocol, if no acknowledgement for the sent frame has arrived to the sender,
it resends all the oustanding frames.
B : go-Back-N ARQ
C : simplest
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 73/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : sliding window
B : sliding frame
C : sliding packet
D : sliding door
A : 2.4 GHz
B : 5 GHz
C : 2.4 Gbps
D : 5 Gbps
A : Fixed length
B : Variable length
C : Global length
D : Zero length
Q.no 33. The data link layer at the receiver site receives a frame from its ____ layer, extracts
data from the frame, and delivers the data to its _____ layer.
A : physical, network
B : physical, Transport
C : Application, network
D : Transport, network
Q.no 35. In version field of IPv4 header, when machine is using some other version of IPv4
then datagram is __________
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 74/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Discarded
B : Accepted
C : Interpreted
D : Interpreted incorrectly
A : 121.12.12.248
B : 130.12.12.248
C : 128.12.12.248
D : 129.12.12.248
B : addressing
C : forwarding
D : routing
Q.no 38. Error control in the data link layer is based on_______
A : hamming code
B : parity generator
C : retransmission of data
D : data duplication
Q.no 39. Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91
respectively and they both use the same netmask N. Which of the values of N given below
should not be used if A and B should belong to the same network?
A : 255.255.255.0
B : 255.255.255.128
C : 255.255.255.192
D : 255.255.255.224
Q.no 40. What is minimum and maximum payload length of 802.3 frame is
D : Aloha
Q.no 41. Define the type of the following destination MAC address 4A:30:10:21:10:1A
A : IEEE 802.11 wireless LAN runs CSMA with collision detection protocol
C : CSMA with collision detection is not suitable for a high propagation delay network like satellite
network
Q.no 42. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps
What is the throughput if the system (all stations together) produces 250 frames per second
A : 92 frames
B : 368 frames
C : 49 frames
D : 151 frames
Q.no 43. Which one of the following algorithm is not used for congestion control?
B : admission control
C : load shedding
Q.no 44. In PPP, the default maximum length of the information field is ________
A : 1500 bytes
B : 15000 bytes
C : 150 bytes
D : 15 bytes
Q.no 46. When collection of various computers seems a single coherent system to its client,
then it is called _________
A : computer network
B : distributed system
C : networking system
D : mail system
Q.no 47. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all stations together) produces 1000 frames per second
A : 92 frames
B : 368 frames
C : 276 frames
D : 151 frames
Q.no 48. Which layer is responsible for process to process delivery in a general network
model?
A : network layer
B : transport layer
C : session layer
Q.no 49. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only one
segment?
A : 10000
B : 10001
C : 12001
D : 11001
Q.no 50. Simplex protocol of Data Link Layer works on ____ channels
A : noiseless
B : broadband
C : noisy
D : creative
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 77/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : base 64 encoding
B : base 32 encoding
C : base 16 encoding
D : base 8 encoding
Q.no 52. Which is the correct expression for the length of UDP datagram?
A : RFC822
B : RFC 800
C : Ethernet
D : RFC 1521
C : each station can send either command or respond to commands but not both
Q.no 55. Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host?
A : HTTP
B : FTP
C : Telnet
D : TCP
Q.no 56. The dump of a UDP header in hexadecimal is CB84000D001C001C. What is source
port number.
A : 000D
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 78/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : CB84
C : 001C
D : 001D
Q.no 57. For which one of the following reasons does Internet Protocol (IP) use the timeto-
live (TTL) field in the IP datagram header
D : Limit the time for which the packet gets queued in intermediate routers
Q.no 58. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 59. _______ is responsible for tunneling multicast packets to the Mobile Station’s
currently subscribed FA.
B : Mobile multicast
C : Mobile station
D : Base station
Q.no 60. _____ is a bit oriented protocol for communication over point to point and
multipoint links.
Q.no 1. Which network is able to connect to each computer through a common central line?
A : Bus
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 79/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Star
C : router
D : WAN
A : 4 layers
B : 5 layers
C : 6 layers
D : 7 layers
Q.no 3. An email client needs to know the _________ of its initial SMTP server.
A : IP address
B : MAC address
C : URL
D : Name
A : 802.3
B : 802.11
C : 802.15
D : 802.16
Q.no 5. The technique in which a congested node stops receiving data from the immediate
upstream node or nodes is called as _______
A : Admission policy
B : Backpressure
C : Forward signaling
D : Backward signaling
Q.no 6. The receiver of the data controls the amount of data that are to be sent by the sender
is referred to as ___________
A : Flow control
B : Error control
C : Congestion control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 80/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Error detection
Q.no 7. Name server designated as the recipient of forwarded queries is known as _____
A : Class B
B : Class c
C : Forwarder
D : Class D
A : RTP
B : RTCP
C : RPC
D : RTCT
A : Connection-oriented
B : Process-to-process
D : Unreliable
A : 32
B : 48
C : 128
D : 16
Q.no 11. In a bit-oriented protocol, the data section of a frame is a sequence of ___
A : bits
B : byes
C : megabytes
D : megabits
A : Stream of bytes
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 81/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Sequence of characters
C : Lines of data
D : Packets
Q.no 13. IEEE created Fast Ethernet under the name ______
A : 10Base 5
B : 10Base 2
C : 10Base T
D : 10Base F
A : 8 bytes
B : 8 bits
C : 16 bytes
D : 124 bytes
Q.no 17. In which method is used for large waiting time or backoff time
A : Bus
B : star
C : Ring
D : Mesh
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 82/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 18. IEEE created Gigabit Ethernet under the name ______
A : Four
B : Eight
C : Six
D : Seven
A : 802.3 z
B : 802.3
C : 802.3 u
D : 802.11
A : bar
B : uni
C : cyclic
D : hash
Q.no 22. DHCP (dynamic host configuration protocol) provides __________ to the client.
A : IP address
B : MAC Address
C : Port Address
D : Physical Address
A : Flow control
B : Three-Way Handshaking
C : Forwarding
D : Synchronization
Q.no 25. Which LAN Protocols are designed for Fast Ethernet to compete
Q.no 26. In File Transfer Protocol, data transfer cannot be done in __________
A : stream mode
B : block mode
C : compressed mode
D : message mode
Q.no 27. Which one of the following is not a function of network layer?
A : routing
B : inter-networking
C : congestion control
D : error control
Q.no 28. Which one of the following is not an application layer protocol?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 84/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 29. _____ is the multiplexing technique that shifts each signal to a different carrier
frequency.
A : FDM
B : TDM
D : PDM
A : 8 bits
B : 4 bits
C : 2 bits
D : 9 bits
A : bit
B : byte
C : gigabyte
D : megabyte
A : TSN
B : SI
C : SSN
D : GSN
Q.no 33. In Three-Way Handshaking process, the situation where both the TCP’s issue an
active open is ___________
A : Mutual open
B : Mutual Close
C : Simultaneous open
D : Simultaneous close
A : Collection of WANS
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 85/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Network of networks
C : Collection of LANS
Q.no 35. In the _________ method, after the station finds the line idle, it sends its frame
immediately. If the line is not idle, it continuously senses the line until it finds it idle
A : nonpersistent
B : Pure Aloha
Q.no 37. Bit stuffing means adding extra 0 to the data section of the frame when there is a
sequence of bits with the same pattern as the _____
A : header
B : trailer
C : payload
D : flag
A : Full-duplex
B : Half-duplex
C : Semi-duplex
D : Byte by byte
Q.no 39. DHCP uses UDP port _________ for sending data to the server.
A : 66
B : 67
C : 68
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 86/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : 69
A : Sender
B : Receiver
C : Router
D : Switch
Q.no 41. In _________, the configuration is balanced. The link is point-to-point, and each
station can function as a primary and a secondary.
A : ARM
B : ABM
C : NBM
D : NRM
Q.no 42. The _________Protocol, adds a simple error control mechanism to the
_______Protocol.
B : an SMTP extension
Q.no 44. For Stop-and-Wait ARQ, for 20 data packets sent, _______ acknowledgments are
needed.
A : less than 10
B : 19
C : 21
D : 20
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 87/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
Q.no 46. In wireless network most of the energy is lost during transmission. How many
percentage of additional energy is added if there is collision
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
Q.no 47. a character-oriented approach and a bit-oriented approaches used in which type of
framing?
A : fixed size
B : zero size
C : variable-size
D : cells
Q.no 48. A slotted ALOHA network transmits 200 bit frames using a shared channel with a
200 kbps bandwidth. Find the throughput if the system (all stations together) produces 1000
frames per second
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
Q.no 49. Peer-to-peer processes are processes on two or more devices communicating at a
A : same layer
B : different layer
D : none of above
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 88/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 50. Beyond IP, UDP provides additional services such as _______
Q.no 51. In _________, the station configuration is unbalanced. We have one primary station
and multiple secondary stations.
A : ARM
B : NBM
C : NRM
D : ABM
A : Socket
B : IP Address
C : Protocol
D : MAC Address
Q.no 54. In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
A : network layer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 89/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : physical layer
D : transport layer
Q.no 56. Which of the following routing protocol used for network layer design?
Q.no 57. Each frame in HDLC protocol may contain up ___ fields
A:4
B:5
C:6
D:7
Q.no 58. ____ refers to a set of procedures used to restrict the amount of data
that the sender can send before waiting for acknowledgment.
A : Flow control
B : Speed control
C : Error control
D : Data control
Q.no 59. Byte stuffing means adding a special byte to the data section of the frame when there
is a character with the same pattern as the ______.
A : trailer
B : header
C : payload
D : flag
Q.no 60. The values GET, POST, HEAD etc are specified in ____________ of HTTP message
A : Request line
B : Header line
C : Status line
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 90/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Entity body
B : Multiple links
A : Communication
B : Standard
C : Metropolitian communication
D : Bandwidth
Q.no 3. In Slotted Aloha, the vulnerable time is reduced to ______ equal to the frame
transmission time
A : Pure Aloha
B : Slotted Aloha
C : CSMA
D : FDMA
A : Data Link
B : Network
C : Physical
D : Transport
Q.no 6. Which one of the following is an internet standard protocol for managing devices on
IP network?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 91/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 7. Data communication system spanning states, countries, or the whole world is
________
A : LAN
B : WAN
C : MAN
D : PAN
Q.no 8. A simple protocol used for fetching email from a mail box is
A : POP3
B : IMAP
C : SMTP
D : POP2
A : ethernet
B : Internet protocol
A : Star
B : Mesh
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 92/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : Ring
D : Bus
Q.no 12. The Maximum throughput for pure aloha is____ percent
C : Pure Aloha
D : Slotted Aloha
Q.no 13. If DHCP snooping is configured on a LAN switch, then clients having specific
______ can access the network.
A : MAC Address
B : IP Address
D : MAC or IP address
Q.no 14. Which type of network is used for small geographical area such as in a one building?
A : WLAN
B : MAN
C : LAN
D : WAN
Q.no 15. In Active mode FTP, the client initiates both the control and data connections.
A : true
B : false
C : None
A : 12.2
B : 18.4
C : 36.8
D : 13.5
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 93/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 17. Which one of the following is TRUE about interior Gateway routing protocols -
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)
A : RIP uses distance vector routing and OSPF uses link state routing
B : OSPF uses distance vector routing and RIP uses link state routing
A : MAC address
B : IP address
C : port address
D : specific address
B : easier
C : similar
A : 000D
B : CB84
C : 001C
D : 001D
Q.no 21. In Stop-And-Wait ARQ, sequence numbers are based on ____ arithmatic.
A : modulo-2
B : modulo-4
C : modulo-8
D : modulo-n
A : Ring topology
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 94/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Bus topology
C : Star topology
D : Mesh topology
A : Seconds
B : Frames
C : Packets
D : Bits
A : modulo-2
B : modulo-4
C : modulo-8
D : modulo-n
Q.no 26. To detect or correct errors, we need to send _____ with data.
B : error bits
C : hamming distance
D : hash keys
Q.no 27. Which of the following network device has the slowest type of connection?
A : DSL
B : Router
C : Bridges
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 95/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Dial-up modems
Q.no 28. Which of the following layers is an addition to OSI model when compared with TCP
IP model?
A : Application layer
B : Presentation layer
C : Session layer
Q.no 29. Find the FTP reply whose message is wrongly matched.
Q.no 31. The data link layer pack bits into ____.
A : segments
B : clusters
C : packets
D : frames
Q.no 32. In CSMA with collision detection the energy level of channel can have three values:
Normal , Zero, and abnormal which of the following is correct sequence
A : Wired network
B : Wireless Network
Q.no 33. Which of the following fields in IPV4 datagram is not related to fragmentation?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 96/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Type of service
B : Fragment offset
C : Flags
D : Identification
A : 16-bits
B : 32-bits
C : 48-bits
D : 64-bits
A : TCP
B : IP
C : UDP
Q.no 36. The ______ field is used to detect errors over the entire user datagram.
A : udp header
B : checksum
C : source port
D : destination port
Q.no 37. The data link layer at the receiver site receives a frame from its ____ layer, extracts
data from the frame, and delivers the data to its _____ layer.
A : physical, network
B : physical, Transport
C : Application, network
D : Transport, network
Q.no 38. Error control in the data link layer is based on_______
A : hamming code
B : parity generator
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 97/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : retransmission of data
D : data duplication
Q.no 39. DHCP uses UDP port _________ for sending data to the server.
A : 66
B : 67
C : 68
D : 69
Q.no 40. A place where there is a field of signal through which you can access WiFi internet is
called –
A : WiFi Hotspots
B : WiFi Internet
C : WiFi Zone
D : WiFi Range
Q.no 41. In class C , if subnet mask is 255.255.255.224 then calculates number of subnet?
A:6
B:8
C:4
D : 10
Q.no 42. In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are ___________
A : Added
B : Removed
C : Rearranged
D : Modified
Q.no 44. When collection of various computers seems a single coherent system to its client,
then it is called _________
A : computer network
B : distributed system
C : networking system
D : mail system
Q.no 45. Which is the correct expression for the length of UDP datagram?
Q.no 46. In PPP, the ________ is responsible for establishing, maintaining, configuring, and
terminating links.
A : PAP
B : CHAP
C : SAP
D : LCP
A : base 64 encoding
B : base 32 encoding
C : base 16 encoding
D : base 8 encoding
Q.no 48. _______ is responsible for tunneling multicast packets to the Mobile Station’s
currently subscribed FA.
B : Mobile multicast
C : Mobile station
D : Base station
A : Automatic
B : Half-duplex
C : Full-duplex
D : Simplex
Q.no 50. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps
What is the throughput if the system (all stations together) produces 250 frames per second
A : 92 frames
B : 368 frames
C : 49 frames
D : 151 frames
A : Application layer protocols are used by both source and destination devices during a
communication session
Q.no 52. HTTP client requests by establishing a __________ connection to a particular port
on the server.
C : each station can send either command or respond to commands but not both
Q.no 54. Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host?
A : HTTP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 100/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : FTP
C : Telnet
D : TCP
Q.no 55. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 56. The right to use a domain name is delegated by domain name registers which are
accredited by _______
B : internet society
Q.no 57. Port number used by Network Time Protocol (NTP) with UDP is ________
A : 161
B : 123
C : 162
D : 124
Q.no 58. The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for
______ channels.
A : signal
B : wireless
C : noisy
D : noiseless
A : RFC822
B : RFC 800
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 101/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : Ethernet
D : RFC 1521
Q.no 60. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only one
segment?
A : 10000
B : 10001
C : 12001
D : 11001
A : Packet is lost
B : Packet is corrupted
C : Packet is needed
D : Packet is error-free
A : 802.3 z
B : 802.3
C : 802.3 u
D : 802.11
Q.no 3. A ___ error means that 2 or more bits in the data unit have changed.
A : unibit
B : burst
C : channel
D : noisy
Q.no 4. When displaying a web page, the application layer uses the _____________
A : HTTP protocol
B : FTP protocol
C : SMTP protocol
D : TCP protocol
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 102/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 5. ______is used in dealing with error detection and error correction
A : Samming distance
B : Hamming distance
C : Tamming distance
D : Spamming distance
A : 10Base 5
B : 10Base 2
C : 10Base T
D : 10Base F
Q.no 7. The technique in which a congested node stops receiving data from the immediate
upstream node or nodes is called as _______
A : Admission policy
B : Backpressure
C : Forward signaling
D : Backward signaling
Q.no 8. Which Method can be used for to reduce the collision but canot eliminate it
Q.no 9. In which method is used for large waiting time or backoff time
A : Bus
B : star
C : Ring
D : Mesh
Q.no 10. In pure Aloha, the vulnerable time is ______ the frame transmission time
A : 10
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 103/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : 15
C : 16
D : 17
A : simplex
B : complex
C : duplex
D : half duplex
Q.no 12. The ___________layer of ethernet consist of LLC sublayer and MAC sublayer
B : Transmission time
A : reliable, character-oriented
B : reliable, message-oriented
C : unreliable, message-oriented
D : unreliable, byte-oriented
A : 802.3
B : 802.11
C : 802.15
D : 802.16
Q.no 15. FTP server listens for connection on port number _________
A : 20
B : 21
C : 22
D : 23
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 104/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : media stream
B : expansion
C : media modification
D : security
Q.no 17. Which network is able to connect to each computer through a common central line?
A : Bus
B : Star
C : router
D : WAN
A : 0 to 20 bytes
B : 20 to 40 bytes
C : 20 to 60 bytes
D : 20 to 80 bytes
Q.no 20. ____ protocol has neither flow control nor error control
B : simplest
C : easiest
D : ARQ
Q.no 21. In Go-Back-N window, when the timer of the packet times out, several packets have
to be resent even some may have arrived safe. Whereas in Selective Repeat window, the
sender resends ___________
Q.no 22. _____ is the multiplexing technique that shifts each signal to a different carrier
frequency.
A : FDM
B : TDM
D : PDM
Q.no 23. A wireless LAN defined by IEEE 802.11 has categories of frames which are those
A : 1000 bytes
B : 1200 bytes
C : 1300 bytes
D : 1500 bytes
Q.no 24. In ___ protocol, if no acknowledgement for the sent frame has arrived to the sender,
it resends all the oustanding frames.
B : go-Back-N ARQ
C : simplest
Q.no 25. Which network is able to connect and send data to each computer via central hub or
switch without looking where the data is sent?
A : Star
B : Router
C : Bus
D : LAN
B : addressing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 106/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : forwarding
D : routing
Q.no 27. framing, flow and error control are the functionalities of ______
A : Physical layer
C : network layer
D : Transport layer
A : public-key cryptography
B : private-key cryptography
A : Distance vector
B : Flooding
C : Path vector
D : Link state
Q.no 30. DHCP (dynamic host configuration protocol) provides __________ to the client.
A : IP address
B : MAC Address
C : Port Address
D : Physical Address
A : Bits
B : Frames
C : Packets
D : Bytes
B : acting as a backup
A : 6Mbps
B : 11Mbps
C : 22Mbps
D : 54Mbps
Q.no 37. Which protocol defines a profile of RTP that provides cryptographic services for the
transfer of payload data?
A : SRTP
B : RTCP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 108/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : RCP
D : RTCT
A : packet switching
B : circuit switching
C : line switching
D : frequency switching
Q.no 39. In FTP protocol, a client contacts a server using ______ as the transport protocol.
Q.no 40. Which layer of the OSI model are host-to-host layer?
A : Physical layer
B : Network layer
C : Datalink layer
Q.no 41. In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
Q.no 42. Which of the following statements is TRUE about CSMA with collision detection
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 109/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 43. To achieve reliable transport in TCP, ___________ is used to check the safe and
sound arrival of data.
A : Packet
B : Buffer
C : Segment
D : Acknowledgment
Q.no 44. In HDLC which frames are used only to transport control information?
A : S-Frames
B : I-Frames
C : V-frames
D : U-Frame
A : Socket
B : IP Address
C : Protocol
D : MAC Address
Q.no 46. _____ is a bit oriented protocol for communication over point to point and
multipoint links.
A : network layer
B : physical layer
D : transport layer
Q.no 48. Which layer is responsible for process to process delivery in a general network
model?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 110/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : network layer
B : transport layer
C : session layer
Q.no 49. Which of the following routing protocol used for network layer design?
Q.no 50. In the IPv4 addressing format, the number of networks allowed under Class C
addresses is
A : 2 rest to 14
B : 2 rest to 7
C : 2 rest to 21
D : 2 rest to 24
Q.no 51. After obtaining the IP address, to prevent the IP conflict the client may use
_________
Q.no 52. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps
What is the throughput if the system (all stations together) produces 500 frames per second
A : 92 frames
B : 368 frames
C : 276 frames
D : 151 frames
Q.no 53. ______ is a communication protocol of the data link layer that is used to transmit
multiprotocol data between two directly connected computers.
B : Internet Protocol
Q.no 54. The dump of a UDP header in hexadecimal is CB84000D001C001C. What is the total
length of the user datagram?
A : 24Bytes
B : 64Bytes
C : 28Bytes
D : 32 Bytes
Q.no 55. The process of modifying IP address information in IP packet headers while in
transit across a traffic routing device is called
C : Address mapping
D : Port mapping
Q.no 56. IPv6 does not support which of the following addressing modes?
A : unicast addressing
B : multicast addressing
C : broadcast addressing
D : anycast addressing
Q.no 57. Each frame in HDLC protocol may contain up ___ fields
A:4
B:5
C:6
D:7
Q.no 58. The port number is “ephemeral port number”, if the source host is _______
A : NTP
B : Echo
C : Server
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 112/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Client
Q.no 59. Peer-to-peer processes are processes on two or more devices communicating at a
A : same layer
B : different layer
D : none of above
Q.no 60. Which one of the following algorithm is not used for congestion control?
B : admission control
C : load shedding
Q.no 1. The protocol which is used for defining the legal request and replies is called ______ .
A : FTP
B : SMTP
C : TCP
D : HTTP
A:4
B:5
C:6
D:7
B : Multiple links
Q.no 6. Which networking device connect one LAN to other LAN using same protocol?
A : Router
B : Switch
C : Bridge
D : Modem
A : 6 version
B : 4 version
C : 2 version
D : 1 version
A : Mesh
B : Star
C : Ring
D : Bus
D : All of these
Q.no 11. In _______ framing, there is no need for defining the boundaries of frames.
A : standard
B : fixed-size
C : variable-size
D : character
B : Application Layer
C : Transport Layer
D : Network Layer
Q.no 13. The Maximum throughput for pure aloha is____ percent
C : Pure Aloha
D : Slotted Aloha
Q.no 14. When the mail server sends mail to other mail servers it becomes ____________
A : SMTP server
B : SMTP client
C : Peer
D : Master
A : Star
B : Mesh
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 115/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : Ring
D : Bus
Q.no 16. Which protocol provides the synchronization between media streams?
A : RTP
B : RTCP
C : RPC
D : RTCT
A : LAN
B : WAN
C : MAN
D : PAN
A : Gateways
B : Linux
C : Routers
D : Firewalls
A : bar
B : uni
C : cyclic
D : hash
A : sliding window
B : sliding frame
C : sliding packet
D : sliding door
A : Sender
B : Receiver
C : Router
D : Switch
Q.no 26. What are the Methods to move data through a network of links and switches?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 117/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Flow control
B : Three-Way Handshaking
C : Forwarding
D : Synchronization
Q.no 28. The frame transmission and collision detection is a continuous process which method
is used for this condition
Q.no 29. The maximum length (in bytes) of an IPv4 datagram is?
A : 32
B : 1024
C : 65535
D : 512
Q.no 30. In byte stuffing (or character stuffing), a special byte known as _____ is added to the
data section of the frame when there is a character with the same pattern as the flag.
A : excuse character
B : entry character
C : exit character
D : escape character
Q.no 31. What is the maximum data rate for the 802.11g standard
A : 10 to 15 percent
B : 5 to 10 percent
C : 0 to 5 percent
D : 15 to 20 percent
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 118/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Coaxial cable
C : Wireless LAN
D : Copper wire
A:2
B:4
C:5
D:3
Q.no 34. In SMTP, the command to write receiver’s mail address is written with the
command _______
A : SEND TO
B : RCPT TO
C : MAIL TO
D : RCVR TO
C : RTCP itself does not provide any flow encryption or authentication methods
Q.no 36. In FTP protocol, client contacts server using ____ as the transport protocol.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 119/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 39. Which LAN Protocols are designed for Fast Ethernet to compete
Q.no 40. In the slow-start algorithm, the size of the congestion window increases __________
until it reaches a threshold.
A : exponentially
B : additively
C : multiplicatively
D : suddenly
Q.no 41. HDLC supports two types of transfer modes ________ and ________
Q.no 42. In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are ___________
A : Added
B : Removed
C : Rearranged
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 120/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Modified
Q.no 43. _____ is used in PPP payload field whenever the flag sequence appears in the
message, so that the receiver does not consider it as the end of the frame.
A : extra stuffing
B : bit stuffing
C : character stuffing
D : Byte stuffing
Q.no 44. A slotted ALOHA network transmits 200 bit frames using a shared channel with a
200 kbps bandwidth. Find the throughput if the system (all stations together) produces 500
frames per second
A : 2msec
B : 4msec
C : 2sec
D : 4sec
Q.no 45. In PPP, the default maximum length of the information field is ________
A : 1500 bytes
B : 15000 bytes
C : 150 bytes
D : 15 bytes
A : Application layer protocols are used by both source and destination devices during a
communication session
Q.no 47. For which one of the following reasons does Internet Protocol (IP) use the timeto-
live (TTL) field in the IP datagram header
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 121/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Limit the time for which the packet gets queued in intermediate routers
Q.no 48. HTTP client requests by establishing a __________ connection to a particular port
on the server.
Q.no 49. A slotted ALOHA network transmits 200 bit frames using a shared channel with a
200 kbps bandwidth. Find the throughput if the system (all stations together) produces 1000
frames per second
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
Q.no 50. Simplex protocol of Data Link Layer works on ____ channels
A : noiseless
B : broadband
C : noisy
D : creative
Q.no 51. The _________Protocol, adds a simple error control mechanism to the
_______Protocol.
Q.no 52. Which is the correct expression for the length of UDP datagram?
Q.no 53. For Stop-and-Wait ARQ, for 20 data packets sent, _______ acknowledgments are
needed.
A : less than 10
B : 19
C : 21
D : 20
Q.no 54. In _________, the station configuration is unbalanced. We have one primary station
and multiple secondary stations.
A : ARM
B : NBM
C : NRM
D : ABM
B : an SMTP extension
Q.no 56. The dump of a UDP header in hexadecimal is CB84000D001C001C. What is source
port number.
A : 000D
B : CB84
C : 001C
D : 001D
Q.no 57. Beyond IP, UDP provides additional services such as _______
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 123/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : 124.201.3.1.52
B : 300.142.210.64
C : 10110011.32.16.8
D : 128.64.0.0
Q.no 59. ____ refers to a set of procedures used to restrict the amount of data
that the sender can send before waiting for acknowledgment.
A : Flow control
B : Speed control
C : Error control
D : Data control
Q.no 1. _____ allows the receiver to inform the sender of any frames lost or damaged in
transmission and coordinates the retransmission of those frames by the sender.
A : Error control
B : data control
C : Transmission Control
D : Speed control
A : Connection-oriented
B : Process-to-process
D : Unreliable
A : Protocol
B : URL
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 124/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : E-mail address
D : website
A : 10Base 5
B : 10Base 2
C : 10Base T
D : 10Base F
A : simplex
B : complex
C : duplex
D : half duplex
A : Multiport Hub
B : Multiport Switch
C : Multiport Bridge
D : Multiport NIC
A : 802.3 z
B : 802.3
C : 802.3 u
D : 802.11
Q.no 8. Which one of the following protocol delivers/stores mail to reciever server?
A : ipconfig /displaydns
B : ipconfig /flushdns
D : ipconfig /registerdns
A : 8 bytes
B : 8 bits
C : 16 bytes
D : 124 bytes
A : Firewall
B : Gateway
C : Router
D : Virus checker
B : easier
C : similar
Q.no 13. Which Method can be used for to reduce the collision but canot eliminate it
Q.no 15. Which one of the following is an internet standard protocol for managing devices on
IP network?
A : Data Link
B : Network
C : Physical
D : Transport
Q.no 17. Data communication system spanning states, countries, or the whole world is
________
A : LAN
B : WAN
C : MAN
D : PAN
A : Topology
B : Routing
C : Networking
D : Control
A : 1000Base LX
B : 1000Base T
C : 1000Base SX
D : 100Base Fx
Q.no 21. Bit stuffing means adding extra 0 to the data section of the frame when there is a
sequence of bits with the same pattern as the _____
A : header
B : trailer
C : payload
D : flag
Q.no 22. DHCP uses UDP port _________ for sending data to the server.
A : 66
B : 67
C : 68
D : 69
Q.no 23. Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91
respectively and they both use the same netmask N. Which of the values of N given below
should not be used if A and B should belong to the same network?
A : 255.255.255.0
B : 255.255.255.128
C : 255.255.255.192
D : 255.255.255.224
Q.no 24. The ____________ translates internet domain and host names to IP address.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 128/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : TSN
B : SI
C : SSN
D : GSN
A : FTP
B : TCP
C : IP
D : Telnet
A : p persistent
B : nonpersistent
C : 1 persistent
D : Persistent
Q.no 29. Which classes are used for connection-less socket programming?
A : Datagram Socket
B : Datagram Packet
D : Server Socket
Q.no 30. framing, flow and error control are the functionalities of ______
A : Physical layer
C : network layer
D : Transport layer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 129/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : 2.4 GHz
B : 5 GHz
C : 2.4 Gbps
D : 5 Gbps
A : Fixed length
B : Variable length
C : Global length
D : Zero length
A : modulo-2
B : modulo-4
C : modulo-8
D : modulo-n
Q.no 35. In the _________ method, after the station finds the line idle, it sends its frame
immediately. If the line is not idle, it continuously senses the line until it finds it idle
A : nonpersistent
B : Pure Aloha
Q.no 36. In which protocol sender sends one frame, stops until it receives confirmation from
the receiver?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 130/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : MQTT protocol
B : Wait Protocol
C : Stop-and-Wait Protocol
D : Stop Protocol
B : Pure Aloha
C : Slotted Aloha
Q.no 38. In version field of IPv4 header, when machine is using some other version of IPv4
then datagram is __________
A : Discarded
B : Accepted
C : Interpreted
D : Interpreted incorrectly
Q.no 39. A place where there is a field of signal through which you can access WiFi internet is
called –
A : WiFi Hotspots
B : WiFi Internet
C : WiFi Zone
D : WiFi Range
Q.no 40. Which one of the following is not a function of network layer?
A : routing
B : inter-networking
C : congestion control
D : error control
Q.no 41. Define the type of the following destination MAC address 4A:30:10:21:10:1A
A : IEEE 802.11 wireless LAN runs CSMA with collision detection protocol
C : CSMA with collision detection is not suitable for a high propagation delay network like satellite
network
Q.no 42. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only one
segment?
A : 10000
B : 10001
C : 12001
D : 11001
Q.no 43. When collection of various computers seems a single coherent system to its client,
then it is called _________
A : computer network
B : distributed system
C : networking system
D : mail system
Q.no 44. The right to use a domain name is delegated by domain name registers which are
accredited by _______
B : internet society
Q.no 45. IPv6 does not support which of the following addressing modes?
A : unicast addressing
B : multicast addressing
C : broadcast addressing
D : anycast addressing
Q.no 46. Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host?
A : HTTP
B : FTP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 132/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : Telnet
D : TCP
Q.no 48. A malicious attacker sends a large number of SYNC segments to a server, pretending
that each of them is coming from a different client by faking the source IP address in the
datagram. Which type of attack is being performed in this situation?
B : Active attack
C : Passive attack
D : Denial-of-service attack
Q.no 49. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps.
What is the throughput if the system (all stations together) produces 1000 frames per second
A : 92 frames
B : 368 frames
C : 276 frames
D : 151 frames
Q.no 50. Byte stuffing means adding a special byte to the data section of the frame when there
is a character with the same pattern as the ______.
A : trailer
B : header
C : payload
D : flag
Q.no 51. In wireless network most of the energy is lost during transmission. How many
percentage of additional energy is added if there is collision
A : 135 frames
B : 92 frames
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 133/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : 38 frames
D : 156 frames
Q.no 52. The dump of a UDP header in hexadecimal is CB84000D001C001C. What is the total
length of the user datagram?
A : 24Bytes
B : 64Bytes
C : 28Bytes
D : 32 Bytes
A : Automatic
B : Half-duplex
C : Full-duplex
D : Simplex
Q.no 54. In class C , if subnet mask is 255.255.255.224 then calculates number of subnet?
A:6
B:8
C:4
D : 10
A : multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
Q.no 56. In _________, the configuration is balanced. The link is point-to-point, and each
station can function as a primary and a secondary.
A : ARM
B : ABM
C : NBM
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 134/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : NRM
Q.no 57. Peer-to-peer processes are processes on two or more devices communicating at a
A : same layer
B : different layer
D : none of above
Q.no 58. In OSI model, when data is sent from device A to device B, the 5th layer to receive
data at B is _________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
Q.no 59. Port number used by Network Time Protocol (NTP) with UDP is ________
A : 161
B : 123
C : 162
D : 124
Q.no 60. Which one of the following algorithm is not used for congestion control?
B : admission control
C : load shedding
A : Star
B : Mesh
C : Ring
D : Bus
Q.no 2. In pure Aloha, the vulnerable time is ______ the frame transmission time
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 135/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : 10
B : 15
C : 16
D : 17
A : media stream
B : expansion
C : media modification
D : security
A : transport layer
B : application layer
C : network layer
A : Connection-oriented
B : Unreliable
D : Low overhead
A : Star
B : Tree
C : Ring
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 136/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : LAN
Q.no 8. TCP process may not write and read data at the same speed. So we need __________
for
A : Packets
B : Buffers
C : Segments
D : Stacks
Q.no 9. A simple protocol used for fetching email from a mail box is
A : POP3
B : IMAP
C : SMTP
D : POP2
A : receiver
B : bit
C : byte
D : both b & c
A : 32
B : 48
C : 128
D : 16
Q.no 13. _____. Is the process of placing timestamps on dynamically registered records
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 137/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Aging
B : IP
C : AIPAA
D : tcp
Q.no 14. In which method is used for large waiting time or backoff time
A : Bus
B : star
C : Ring
D : Mesh
Q.no 15. If DHCP snooping is configured on a LAN switch, then clients having specific
______ can access the network.
A : MAC Address
B : IP Address
D : MAC or IP address
A : Aging
B : IP
C : AIPAA
D : tcp
Q.no 18. The receiver of the data controls the amount of data that are to be sent by the sender
is referred to as ___________
A : Flow control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 138/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Error control
C : Congestion control
D : Error detection
B : message unformatted
Q.no 20. Name server designated as the recipient of forwarded queries is known as _____
A : Class B
B : Class c
C : Forwarder
D : Class D
Q.no 21. In HDLC which frames are used to transport user data and control information
relating to user data (piggybacking)?
A : S-Frames
B : I-Frames
C : V-frames
D : U-Frame
Q.no 23. _______ provides a connection-oriented reliable service for sending messages
A : TCP
B : IP
C : UDP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 139/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : DHCP
Q.no 24. In CSMA with collision detection the energy level of channel can have three values:
Normal , Zero, and abnormal which of the following is correct sequence
A : Wired network
B : Wireless Network
A : bit
B : byte
C : gigabyte
D : megabyte
Q.no 26. To detect or correct errors, we need to send _____ with data.
B : error bits
C : hamming distance
D : hash keys
A : On stub networks- which have only one exit path out of the network
B : Which have more than one exit path out of the network
A : Seconds
B : Frames
C : Packets
D : Bits
Q.no 29. Which of the following fields in IPV4 datagram is not related to fragmentation?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 140/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Type of service
B : Fragment offset
C : Flags
D : Identification
Q.no 30. Find the FTP reply whose message is wrongly matched.
A : 121.12.12.248
B : 130.12.12.248
C : 128.12.12.248
D : 129.12.12.248
A : TCP
B : IP
C : UDP
A : to connect LANs
B : to separate LANs
A : Collection of WANS
B : Network of networks
C : Collection of LANS
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 141/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : Multicast Scope
B : Super Scope
C : Subnet Mask
D : Automatic Backups
A : 16 and 32 bytes
B : 16 and 32 bits
C : 20 and 60 bytes
D : 20 and 60 bits
Q.no 37. In FTP protocol, a client contacts a server using ______ as the transport protocol.
Q.no 38. Which one of the following multimedia formats can not be supported by RTP?
A : MPEG-4
B : MJPEG
C : MPEG
D : TXT
Q.no 39. Which access method is used for the half duplex approach in fast ethernet
A : 4B/5B
B : NRZ-I
C : MLT-3
D : 8B/6T
A : public-key cryptography
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 142/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : private-key cryptography
C : each station can send either command or respond to commands but not both
Q.no 42. In _________, the station configuration is unbalanced. We have one primary station
and multiple secondary stations.
A : ARM
B : NBM
C : NRM
D : ABM
Q.no 43. _____ is a bit oriented protocol for communication over point to point and
multipoint links.
A : 124.201.3.1.52
B : 300.142.210.64
C : 10110011.32.16.8
D : 128.64.0.0
B : an SMTP extension
Q.no 46. Which layer is responsible for process to process delivery in a general network
model?
A : network layer
B : transport layer
C : session layer
A : Socket
B : IP Address
C : Protocol
D : MAC Address
A : base 64 encoding
B : base 32 encoding
C : base 16 encoding
D : base 8 encoding
Q.no 49. In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
Q.no 50. Beyond IP, UDP provides additional services such as _______
Q.no 51. The port number is “ephemeral port number”, if the source host is _______
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 144/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : NTP
B : Echo
C : Server
D : Client
A : Application layer protocols are used by both source and destination devices during a
communication session
Q.no 53. _____ is used in PPP payload field whenever the flag sequence appears in the
message, so that the receiver does not consider it as the end of the frame.
A : extra stuffing
B : bit stuffing
C : character stuffing
D : Byte stuffing
Q.no 54. HTTP client requests by establishing a __________ connection to a particular port
on the server.
Q.no 55. Which of the following routing protocol used for network layer design?
Q.no 56. A slotted ALOHA network transmits 200 bit frames using a shared channel with a
200 kbps bandwidth. Find the throughput if the system (all stations together) produces 1000
frames per second
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 145/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
Q.no 57. After obtaining the IP address, to prevent the IP conflict the client may use
_________
Q.no 58. A pure ALOHA network transmits 200 bit frames on a shared channel of 200 kbps
What is the throughput if the system (all stations together) produces 250 frames per second
A : 92 frames
B : 368 frames
C : 49 frames
D : 151 frames
Q.no 59. ______ is a communication protocol of the data link layer that is used to transmit
multiprotocol data between two directly connected computers.
B : Internet Protocol
A : network layer
B : physical layer
D : transport layer
Q.no 1. In Active mode FTP, the client initiates both the control and data connections.
A : true
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 146/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : false
C : None
A : 802.3 z
B : 802.3
C : 802.3 u
D : 802.11
Q.no 3. ______is used in dealing with error detection and error correction
A : Samming distance
B : Hamming distance
C : Tamming distance
D : Spamming distance
A : 20
B : 21
C : 22
D : 23
A : 20
B : 101
C : 80
D : 60
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 147/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : ethernet
B : Internet protocol
Q.no 8. The protocol which is used for defining the legal request and replies is called ______ .
A : FTP
B : SMTP
C : TCP
D : HTTP
A : Connection-oriented
B : Process-to-process
D : Unreliable
A : bar
B : uni
C : cyclic
D : hash
A : SAN
B : PAN
D : WAN
Q.no 12. Which type of network is used for small geographical area such as in a one building?
A : WLAN
B : MAN
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 148/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : LAN
D : WAN
A : Gateways
B : Linux
C : Routers
D : Firewalls
A : p persistent
B : nonpersistent
C : 1 persistent
D : Persistent
Q.no 15. In point to point protocol ____ field of PPP Frame carries the user data.
A : flag
B : payload
C : Protocol
D : FCS
Q.no 16. In the congestion avoidance algorithm, the size of the congestion window increases
____________ until congestion is detected.
A : exponentially
B : additively
C : multiplicatively
D : suddenly
Q.no 17. In pure Aloha what is maximum number of retransmission attempts if frame get
congested in the channel
A : Two half
B : One Half
C : Three half
D : Four half
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 149/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : MAC address
B : IP address
C : port address
D : specific address
A : Transport Layer
C : Application Layer
D : Physical Layer
B : Multiple links
B : Coaxial cable
C : Wireless LAN
D : Copper wire
Q.no 22. DHCP (dynamic host configuration protocol) provides __________ to the client.
A : IP address
B : MAC Address
C : Port Address
D : Physical Address
Q.no 23. In File Transfer Protocol, data transfer cannot be done in __________
A : stream mode
B : block mode
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 150/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : compressed mode
D : message mode
A : p persistent
B : nonpersistent
C : 1 persistent
D : Persistent
C : RTCP itself does not provide any flow encryption or authentication methods
Q.no 26. In the slow-start algorithm, the size of the congestion window increases __________
until it reaches a threshold.
A : exponentially
B : additively
C : multiplicatively
D : suddenly
A : 8 bits
B : 4 bits
C : 2 bits
D : 9 bits
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 151/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 29. Bit stuffing means adding extra 0 to the data section of the frame when there is a
sequence of bits with the same pattern as the _____
A : header
B : trailer
C : payload
D : flag
A : TSN
B : SI
C : SSN
D : GSN
Q.no 31. Which one of the following is not an application layer protocol?
A : Persistent
B : Non-persistent
D : P- Persistent
C : One only has to be connected to the server to send and receive email
Q.no 34. Which of the following network device has the slowest type of connection?
A : DSL
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 152/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Router
C : Bridges
D : Dial-up modems
A : packet switching
B : circuit switching
C : line switching
D : frequency switching
Q.no 39. Which protocol gives a full route table update every 30 seconds?
A : IEGRP
B : RIP
C : ICMP
D : IP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 153/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : 6Mbps
B : 11Mbps
C : 22Mbps
D : 54Mbps
Q.no 42. The dump of a UDP header in hexadecimal is CB84000D001C001C. What is the total
length of the user datagram?
A : 24Bytes
B : 64Bytes
C : 28Bytes
D : 32 Bytes
Q.no 43. Which of the following statements is TRUE about CSMA with collision detection
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
Q.no 44. For Stop-and-Wait ARQ, for 20 data packets sent, _______ acknowledgments are
needed.
A : less than 10
B : 19
C : 21
D : 20
Q.no 45. Define the type of the following destination MAC address 4A:30:10:21:10:1A
A : IEEE 802.11 wireless LAN runs CSMA with collision detection protocol
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 154/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : CSMA with collision detection is not suitable for a high propagation delay network like satellite
network
Q.no 46. The process of modifying IP address information in IP packet headers while in
transit across a traffic routing device is called
C : Address mapping
D : Port mapping
Q.no 47. In _________, the configuration is balanced. The link is point-to-point, and each
station can function as a primary and a secondary.
A : ARM
B : ABM
C : NBM
D : NRM
A : RFC822
B : RFC 800
C : Ethernet
D : RFC 1521
Q.no 49. The dump of a UDP header in hexadecimal is CB84000D001C001C. What is source
port number.
A : 000D
B : CB84
C : 001C
D : 001D
Q.no 50. Port number used by Network Time Protocol (NTP) with UDP is ________
A : 161
B : 123
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 155/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : 162
D : 124
Q.no 51. The _________Protocol, adds a simple error control mechanism to the
_______Protocol.
Q.no 52. A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps
What is the requirement to make this frame collision free
A : multicast address
B : Broadcast address
C : Unicast address
D : Anycast address
Q.no 53. Which one of the following allows a user at one site to establish a connection to
another site and then pass keystrokes from local host to remote host?
A : HTTP
B : FTP
C : Telnet
D : TCP
Q.no 54. Byte stuffing means adding a special byte to the data section of the frame when there
is a character with the same pattern as the ______.
A : trailer
B : header
C : payload
D : flag
Q.no 55. The right to use a domain name is delegated by domain name registers which are
accredited by _______
B : internet society
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 156/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 56. In wireless network most of the energy is lost during transmission. How many
percentage of additional energy is added if there is collision
A : 135 frames
B : 92 frames
C : 38 frames
D : 156 frames
Q.no 57. IPv6 does not support which of the following addressing modes?
A : unicast addressing
B : multicast addressing
C : broadcast addressing
D : anycast addressing
Q.no 58. a character-oriented approach and a bit-oriented approaches used in which type of
framing?
A : fixed size
B : zero size
C : variable-size
D : cells
Q.no 59. For which one of the following reasons does Internet Protocol (IP) use the timeto-
live (TTL) field in the IP datagram header
D : Limit the time for which the packet gets queued in intermediate routers
Q.no 60. ____ refers to a set of procedures used to restrict the amount of data
that the sender can send before waiting for acknowledgment.
A : Flow control
B : Speed control
C : Error control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 157/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Data control
A:4
B:5
C:6
D:7
A : Topology
B : Routing
C : Networking
D : Control
A : 802.3 z
B : 802.3
C : 802.3 u
D : 802.11
A : Packet is lost
B : Packet is corrupted
C : Packet is needed
D : Packet is error-free
A : Addresses are allocated after a negotiation between the server and the host to determine the
length of the agreement.
B : Addresses are assigned for a fixed period of time. At the end of period, a new quest for an
address must be made, and another address is then assigned.
C : Addresses are leased to host. A host will usually keep the same address by periodically
contacting the DHCP sever to renew the lease.
D : Addresses are permanently assigned so that the host uses the same address at all times.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 158/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
A : IP address of Server
B : Port number
A : receiver
B : bit
C : byte
D : both b & c
Q.no 8. Which networking device connect one LAN to other LAN using same protocol?
A : Router
B : Switch
C : Bridge
D : Modem
Q.no 9. Which network is able to connect to each computer through a common central line?
A : Bus
B : Star
C : router
D : WAN
A : Protocols
B : Standards
C : RFCs
D : Servers
A : Routers
B : Firewalls
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 159/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
C : bridge
D : Modems
Q.no 12. In _______ framing, there is no need for defining the boundaries of frames.
A : standard
B : fixed-size
C : variable-size
D : character
Q.no 13. TCP process may not write and read data at the same speed. So we need __________
for
A : Packets
B : Buffers
C : Segments
D : Stacks
Q.no 14. Bytes of data being transferred in each connection are numbered by TCP. These
numbers start with a _________
A : Fixed number
C : One
Q.no 15. Data communication system spanning states, countries, or the whole world is
________
A : LAN
B : WAN
C : MAN
D : PAN
A : Communication
B : Standard
C : Metropolitian communication
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 160/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : Bandwidth
B : Application Layer
C : Transport Layer
D : Network Layer
Q.no 18. Which protocol provides the synchronization between media streams?
A : RTP
B : RTCP
C : RPC
D : RTCT
C : Bootstrap Protocol
Q.no 20. An email client needs to know the _________ of its initial SMTP server.
A : IP address
B : MAC address
C : URL
D : Name
A : Only one
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 161/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Two
C : Three
D : Four
Q.no 23. Which of the following layers is an addition to OSI model when compared with TCP
IP model?
A : Application layer
B : Presentation layer
C : Session layer
Q.no 24. Network layer at source is responsible for creating a packet from data coming from
another ________
A : Station
B : Link
C : Node
D : Protocol
A : bit
B : byte
C : gigabyte
D : megabyte
Q.no 26. What are the Methods to move data through a network of links and switches?
Q.no 27. DHCP uses UDP port _________ for sending data to the server.
A : 66
B : 67
C : 68
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 162/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : 69
A:1
B:2
C:3
D:4
B : acting as a backup
Q.no 30. Which of the following is not a congestion policy at network layer?
D : Routing Algorithm
Q.no 31. Which of the following layer of OSI model also called end-to-end layer?
A : Presentation layer
B : Network layer
C : Session layer
D : Transport layer
A : Ethernet
C : Token Ring
D : ATM
Q.no 34. The data link layer pack bits into ____.
A : segments
B : clusters
C : packets
D : frames
A : TCP
B : PPP
C : IP
D : IPX
A : Sender
B : Receiver
C : Router
D : Switch
Q.no 37. DHCP uses UDP port _________ for sending data to the server.
A : 66
B : 67
C : 68
D : 69
A : Physical layer
C : Network layer
D : Transport layer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 164/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 39. The ____________ translates internet domain and host names to IP address.
Q.no 41. Simplex protocol of Data Link Layer works on ____ channels
A : noiseless
B : broadband
C : noisy
D : creative
A : Automatic
B : Half-duplex
C : Full-duplex
D : Simplex
Q.no 43. Which one of the following algorithm is not used for congestion control?
B : admission control
C : load shedding
Q.no 44. In TCP IP Model, when data is sent from device A to device B, the 5th layer to
receive data at B is ____________
A : Application layer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 165/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
B : Transport layer
C : Link layer
D : Session layer
Q.no 45. When collection of various computers seems a single coherent system to its client,
then it is called _________
A : computer network
B : distributed system
C : networking system
D : mail system
A : base 64 encoding
B : base 32 encoding
C : base 16 encoding
D : base 8 encoding
Q.no 47. In the IPv4 addressing format, the number of networks allowed under Class C
addresses is
A : 2 rest to 14
B : 2 rest to 7
C : 2 rest to 21
D : 2 rest to 24
Q.no 48. In OSI model, when data is sent from device A to device B, the 5th layer to receive
data at B is _________
A : Application layer
B : Transport layer
C : Link layer
D : Session layer
Q.no 49. After obtaining the IP address, to prevent the IP conflict the client may use
_________
Q.no 50. _____ is used in PPP payload field whenever the flag sequence appears in the
message, so that the receiver does not consider it as the end of the frame.
A : extra stuffing
B : bit stuffing
C : character stuffing
D : Byte stuffing
Q.no 51. Each frame in HDLC protocol may contain up ___ fields
A:4
B:5
C:6
D:7
Q.no 52. The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for
______ channels.
A : signal
B : wireless
C : noisy
D : noiseless
Q.no 54. A slotted ALOHA network transmits 200 bit frames using a shared channel with a
200 kbps bandwidth. Find the throughput if the system (all stations together) produces 1000
frames per second
A : 135 frames
B : 92 frames
C : 38 frames
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 167/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
D : 156 frames
Q.no 55. In PPP, the default maximum length of the information field is ________
A : 1500 bytes
B : 15000 bytes
C : 150 bytes
D : 15 bytes
A : Socket
B : IP Address
C : Protocol
D : MAC Address
Q.no 57. Peer-to-peer processes are processes on two or more devices communicating at a
A : same layer
B : different layer
D : none of above
Q.no 58. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is
numbered 10001. What is the sequence number of the segment if all data is sent in only one
segment?
A : 10000
B : 10001
C : 12001
D : 11001
A : network layer
B : physical layer
D : transport layer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 168/169
23/12/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15
Q.no 60. In _________, the station configuration is unbalanced. We have one primary station
and multiple secondary stations.
A : ARM
B : NBM
C : NRM
D : ABM
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=5788&code=1052000&showTest=319&actForm=edit&set=15 169/169