ACN MCQ Merged
ACN MCQ Merged
com
1. The IETF standards documents are called ________
a) RFC
b) RCF
c) ID
d) DFC
Answer: a
Explanation: RFC stands for Request For Comments and they are documents
that describe methods, behaviors, research, or innovations applicable to the
working of the Internet.
2. In the layer hierarchy as the data packet moves from the upper to the lower
layers, headers are ___________
a) Added
b) Removed
c) Rearranged
d) Modified
Answer: a
Explanation: Each layer adds its own header to the packet from the previous
layer. For example, in the Internet layer, the IP header is added over the TCP
header on the data packet that came from the transport layer.
3. The structure or format of data is called ___________
a) Syntax
b) Semantics
c) Struct
d) Formatting
Answer: a
Explanation: The structure and format of data are defined using syntax.
Semantics defines how a particular pattern to be interpreted, and what action
is to be taken based on that interpretation. In programming languages, syntax
of the instructions plays a vital role in designing of the program.
4. Communication between a computer and a keyboard involves
______________ transmission.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
Answer: d
Explanation: In simplex transmission, data flows in single direction which in
this case refers to the data flowing from the keyboard to the computer. Another
example would be of the mouse where the data flows from the mouse to the
computer only.
5. The first Network was called ________
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
Answer: d
Explanation: ARPANET stands for Advanced Research Projects Agency
Networks. It was the first network to be implemented which used the TCP/IP
protocol in the year 1969.
6. A _______ is the physical path over which a message travels.
a) Path
b) Medium
c) Protocol
d) Route
Answer: b
Explanation: Messages travel from sender to receiver via a physical path
called the medium using a set of methods/rules called protocol. Mediums can
be guided (wired) or unguided (wireless).
7. Which organization has authority over interstate and international commerce
in the communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
Answer: c
Explanation: FCC is the abbreviation for Federal Communications
Commission. FCC is responsible for regulating all interstate communications
originating or terminating in USA. It was founded in the year 1934.
8. Which of this is not a network edge device?
a) PC
b) Smartphones
c) Servers
d) Switch
Answer: d
Explanation: Network edge devices refer to host systems, which can host
applications like web browser. A switch can’t operate as a host, but as a
central device which can be used to manage network communication.
9. A _________ set of rules that governs data communication.
a) Protocols
b) Standards
c) RFCs
d) Servers
Answer: a
Explanation: In communications, a protocol refers to a set of rules and
regulations that allow a network of nodes to transmit and receive information.
Each layer in the network model has a protocol set, for example, the transport
layer has TCP and UDP protocols.
10. Three or more devices share a link in ________ connection.
a) Unipoint
b) Multipoint
c) Point to point
d) Simplex
Answer: b
Explanation: A multipoint communication is established when three or many
network nodes are connected to each other. Frame relay, Ethernet and ATM
are some examples of multipoint connections.
Answer: b
Explanation: A Computer network is defined as a collection of interconnected
computers which uses a single technology for connection.
A distributed system is also the same as computer network but the main
difference is that the whole collection of computers appears to its users as a
single coherent system.
Example:- World wide web
2. Two devices are in network if __________
a) a process in one device is able to exchange information with a process in
another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive
Answer: a
Explanation: A computer network, or data network, is a digital
telecommunications network which allows nodes to share resources. In
computer networks, computing devices exchange data with each other using
connections between nodes. The nodes have certain processes which enable
them to share a specific type of data using a distinct protocol.
3. Which of the following computer networks is built on the top of another
network?
a) prior network
b) chief network
c) prime network
d) overlay network
Answer: d
Explanation: An overlay network is a computer network that is built on top of
another network. Some examples of an overlay network are Virtual Private
Networks (VPN) and Peer-to-Peer Networks (P2P).
4. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
Answer: d
Explanation: In a computer network, a node can be anything that is capable of
sending data or receiving data or even routing the data to its destination.
Routers, Computers and Smartphones are some examples of network nodes.
5. Communication channel is shared by all the machines on the network in
________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
Answer: a
Explanation: In a broadcast network, information is sent to all stations in a
network whereas in a multicast network the data or information is sent to a
group of stations in the network. In unicast network, information is sent to only
one specific station. The broadcast address of the network is the last assigned
address of the network.
6. Bluetooth is an example of __________
a) personal area network
b) local area network
c) virtual private network
d) wide area network
Answer: a
Explanation: Bluetooth is a wireless technology used to create a wireless
personal area network for data transfer up to a distance of 10 meters. It
operates on 2.45 GHz frequency band for transmission.
7. A __________ is a device that forwards packets between networks by
processing the routing information included in the packet.
a) bridge
b) firewall
c) router
d) hub
Answer: c
Explanation: A router is a networking device that forwards data packets
between computer networks. Routers perform the traffic directing functions on
the Internet. They make use of routing protocols like RIP to find the cheapest
path to the destination.
8. A list of protocols used by a system, one protocol per layer, is called
________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
Answer: b
Explanation: A protocol stack refers to a group of protocols that are running
concurrently that are employed for the implementation of network protocol
suite. Each layer in the network model has to use one specific protocol from
the protocol stack.
9. Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure
Answer: a
Explanation: Network congestion occurs when traffic in the network is more
than the network could handle. To avoid network congestion, the network
management uses various open-loop and closed-loop congestion control
techniques.
10. Which of the following networks extends a private network across public
networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
Answer: b
Explanation: A virtual private network extends a private network across a
public network, and enables users to send and receive data across shared or
public networks as if their computing devices were directly connected to the
private network.VPN provides enhanced security and online anonymity to
users on the internet. It is also used to unblock websites which are unavailable
in certain regions.
Answer: c
Explanation: A low-speed downstream channel is not a constituent of a
residential telephone line. But it might be just a two-way telephone channel.
Internet can be provided through a high-speed downstream channel in a
residential telephone line.
Answer: c
Explanation: DSL stands for Digital Subscriber Line and ISP stands for Internet
Service Provider. In a Digital Subscriber Line system, the same company
which provides phone connection is also an ISP. The internet is provided
through the pre-installed telephone lines.
3. The function of DSLAM is to __________
a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) De-amplify digital signals
Answer: a
Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and
it’s used by Telcos to convert the analog signals to digital signals for the
purpose of providing internet. The DSLAM located in a telco’s Central Office
does this function.
4. Which of the following terms is not associated with DSL?
a) DSLAM
b) CO
c) Splitter
d) CMTS
Answer: d
Explanation: CMTS stands for Cable modem termination system. It is used in
cable internet access. In cable internet access, internet is not provided through
telephone lines and the companies that provide such connections don’t
necessarily provide telephone access.
5. HFC contains _______
a) Fibre cable
b) Coaxial cable
c) A combination of Fibre cable and Coaxial cable
d) Twisted Pair Cable
Answer: c
Explanation: Hybrid fiber-coaxial (HFC) is a telecommunications industry term
for a broadband network that combines optical fiber and coaxial cable. It has
been popularly used since the early 1990s. It is stronger than the optical fiber
cables and faster than the co-axial cables.
6. Which of the following statements is not applicable for cable internet
access?
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
Answer: d
Explanation: CMTS stands for Cable modem termination system. In cable
access analog signal is converted to digital signal by CMTS. In cable internet
access, internet is not provided through telephone lines. DSLAM is used by
Telecom companies.
7. Among the optical-distribution architectures that are essentially switched
ethernet is __________
a) AON
b) PON
c) NON
d) MON
Answer:a
Explanation: AON stands for Active optical networks which are essentially
switched Ethernets. Each user has his/her own dedicated optical fiber line
connecting to the ISP in an AON.
8. StarBand provides __________
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
Answer: d
Explanation: StarBand was a two-way satellite broadband Internet service
available in the U.S. from 2000–2015. It was discontinued from September 30
2015 due to increasing competition from other ISPs.
9. Home Access is provided by __________
a) DSL
b) FTTP
c) Cable
d) All of the mentioned
Answer: d
Explanation: Home Internet Access is provided by DSL, FTTP, and Cable.
FTTP provides the fastest speeds followed by the cable connections and then
the DSLs. FTTP is popularly used in modern connections.
10. ONT is connected to splitter using _________
a) High speed fibre cable
b) HFC
c) Optical cable
d) Twisted pair cable
Answer: c
Explanation: ONT stands for Optical Network Terminal. The ONT connects to
the Termination Point (TP) with an optical fibre cable. It translates light signals
from the fibre optic line to electric signals that the router can read.
11. Which of the following factors affect transmission rate in DSL?
a) The gauge of the twisted-pair line
b) Degree of electrical interfernece
c) Shadow fading
d) The gauge of the twisted-pair line and degree of electrical interference
Answer: d
Explanation: Because DSL is made of twisted wire copper pair, the gauge of
twisted pair line i.e. the protection and electrical interference would affect the
transmission rate in DSL. Unlike DSL, FTTP is not really affected by these
factors.
1. How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10
Answer: a
Explanation: There are five layers in the Internet Protocol stack. The five layers
in Internet Protocol stack is Application, Transport, Network, Data link and
Physical layer. The internet protocol stack model is also called the TCP/IP
model and it’s used in modern Internet Communication.
2. The number of layers in ISO OSI reference model is __________
a) 5
b) 7
c) 6
d) 10
Answer: b
Explanation: The seven layers in ISO OSI reference model is Application,
Presentation, Session, Transport, Network, Data link and Physical layer. OSI
stands for Open System Interconnect and it is a generalized model.
3. Which of the following layers is an addition to OSI model when compared
with TCP IP model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
Answer: d
Explanation: The only difference between OSI model and TCP/IP model is that
the functions of Presentation and Session layer in the OSI model are handled
by the transport layer itself in TCP/IP. OSI is a generalized model and TCP/IP
is an application specific model.
4. Application layer is implemented in ____________
a) End system
b) NIC
c) Ethernet
d) Packet transport
Answer: a
Explanation: Not only application layer, but presentation layer, session layer
and transport layer are also implemented in the end system. The layers below
are implemented outside the end system, for example, the network layer is
implemented on the routers and the physical layer is implemented for the
medium.
5. Transport layer is implemented in ______________
a) End system
b) NIC
c) Ethernet
d) Signal transmission
Answer: a
Explanation: Application, Presentation, Session and Transport layer are
implemented in the end system. The transport layer handles the process to
process delivery of the packet through ports.
6. The functionalities of the presentation layer include ____________
a) Data compression
b) Data encryption
c) Data description
d) All of the mentioned
Answer: d
Explanation: Some functions of the presentation layer include character-code
translation, data conversion, data encryption and decryption, and data
translation. It connects the application layer with the layers below converting
the human readable text and media to machine readable format and vice-
versa.
7. Delimiting and synchronization of data exchange is provided by
__________
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
Answer: b
Explanation: The session layer provides the mechanism for opening, closing
and managing a session between end-user application processes. The
session layer 5 is responsible for establishing managing synchronizing and
terminating sessions. In TCP/IP protocol stack, the functions of the session
layer are handled by the transport layer itself and thus the session layer is
missing from the TCP/IP model.
8. In OSI model, when data is sent from device A to device B, the 5th layer to
receive data at B is _________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
Answer: d
Explanation: In OSI reference model, the fifth layer is Session layer. Session
layer provides the mechanism for opening, closing and managing a session
between end-user application processes. In TCP/IP protocol stack, the
functions of the session layer are handled by the transport layer itself and thus
the session layer is missing from the TCP/IP model.
9. In TCP IP Model, when data is sent from device A to device B, the 5th layer
to receive data at B is ____________
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
Answer: a
Explanation: In TCP/IP model, the fifth layer is application layer. When data is
sent from device A to device B, the 5th layer to receive data at B is application
layer. Application layer provides the interface between applications and the
network. The user interacts with only this layer.
10. In the OSI model, as a data packet moves from the lower to the upper
layers, headers are _______
a) Added
b) Removed
c) Rearranged
d) Randomized
Answer: b
Explanation: In OSI reference model, when data packet moves from lower
layers to higher layer, headers get removed. Whereas when the data packet
moves from higher layer to lower layers, headers are added. These headers
contain the essential control information for the protocols used on the specific
layer.
11. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model
Answer: c
Explanation: One layer may use the information from another layer, for
example timestamp value. The information is contained in the header inserted
by the previous layer. The headers are added as the packet moves from
higher layers to the lower layers.
Answer: a
Explanation: OSI is the abbreviation for Open System Interconnection. OSI
model provides a structured plan on how applications communicate over a
network, which also helps us to have a structured plan for troubleshooting. It is
recognized by the ISO as the generalized model for computer network i.e. it
can be modified to design any kind of computer network.
2. The number of layers in ISO OSI reference model is __________
a) 4
b) 5
c) 6
d) 7
Answer: d
Explanation: In OSI reference model, there are 7 layers namely Application,
Presentation, Session, Transport, Network, Data Link and Physical layer. Each
layer uses a protocol to perform its designated function, for example, the data
link layer uses error detection protocols for error control functions.
3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer
Answer: a
Explanation: In OSI reference model, there are two layers which are not
present in TCP/IP model. They are Presentation and Session layer. The
functions of Presentation and Session layer in the OSI model are handled by
the transport layer itself in TCP/IP.
4. Which layer is used to link the network support layers and user support
layers?
a) session layer
b) data link layer
c) transport layer
d) network layer
Answer: c
Explanation: Physical, data link and network layers are network support layers
and session, presentation and application layers are user support layers. The
transport layer links these layers by segmenting and rearranging the data. It
uses protocols like TCP and UDP.
5. Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
Answer: d
Explanation: The physical, logical, port and specific addresses are used in
TCP/IP protocol. All the addressing schemes, that is physical (MAC) and
logical address, port address and specific address are employed in both TCP/
IP model and OSI model. In TCP/IP, the addresses are more focused on the
internet implementation of these addresses.
6. TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) with no link to
Answer: a
Explanation: Several TCP/IP prototypes were developed at multiple research
centers between 1978 and 1983, whereas OSI reference model was
developed in the year 1984. TCP/IP was developed with the intention to create
a model for the Internet while OSI was intended to be a general network
model.
7. Which layer is responsible for process to process delivery in a general
network model?
a) network layer
b) transport layer
c) session layer
d) data link layer
Answer: b
Explanation: The role of Transport layer (Layer 4) is to establish a logical end
to end connection between two systems in a network. The protocols used in
Transport layer is TCP and UDP. The transport layer is responsible for
segmentation of the data. It uses ports for the implementation of process-to-
process delivery.
8. Which address is used to identify a process on a host by the transport
layer?
a) physical address
b) logical address
c) port address
d) specific address
Answer: c
Explanation: A port number is a way to identify a specific process to which an
Internet or other network message is to be forwarded when it arrives at a
server. Some examples of port numbers are port 20 which is used for FTP
data, port 22 which is used for SSH remote login ,and port 23 which is used for
TELNET.
9. Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) physical layer
Answer: a
Explanation: In networking, a user mainly interacts with application layer to
create and send information to other computer or network. Application layer
provides the interface between applications and the network. It is the top-most
layer in both the TCP/IP and the OSI model.
10. Transmission data rate is decided by ____________
a) network layer
b) physical layer
c) data link layer
d) transport layer
Answer: b
Explanation: Physical layer is a layer 1 device which deals with network cables
or the standards in use like connectors, pins, electric current used etc.
Basically the transmission speed is determined by the cables and connectors
used. Hence it is physical layer that determines the transmission speed in
network. Some of the cables used for high speed data transmission are optical
fiber cables and twisted pair cables.
Answer: c
Explanation: Fiber optics is considered to have the highest transmission speed
among the all mentioned above. The fiber optics transmission runs at 1000Mb/
s. It is called as 1000Base-Lx whereas IEEE standard for it is 802.3z. It is
popularly used for modern day network connections due to its high
transmission rate.
3. Bits can be sent over guided and unguided media as analog signal by
___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
Answer: a
Explanation: In analog modulation, digital low frequency baseband signal
(digital bit stream) is transmitted over a higher frequency. Whereas in digital
modulation the only difference is that the base band signal is of discrete
amplitude level. The bits are represented by only two frequency levels, one for
high and one for low.
4. The portion of physical layer that interfaces with the media access control
sublayer is called ___________
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) physical transport sublayer
Answer: a
Explanation: The portion of physical layer that interfaces with the medium
access control sublayer is Physical Signaling Sublayer. The main function of
this layer is character encoding, reception, decoding and performs optional
isolation functions. It handles which media connection the signal should be
forwarded to physically.
5. The physical layer provides __________
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
Answer: d
Explanation: Anything dealing with a network cable or the standards in use –
including pins, connectors and the electric current used is dealt in the physical
layer (Layer 1). Physical layer deals with bit to bit delivery of the data aided by
the various transmission mediums.
6. In asynchronous serial communication the physical layer provides
___________
a) start and stop signalling
b) flow control
c) both start & stop signalling and flow control
d) only start signalling
Answer: c
Explanation: In asynchronous serial communication, the communication is not
synchronized by clock signal. Instead of a start and stop signaling and flow
control method is followed. Unlike asynchronous serial communication, in
synchronous serial communication a clock signal is used for communication,
so the start and stop method is not really required.
7. The physical layer is responsible for __________
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
Answer: d
Explanation: The physical layer is responsible for line coding, channel coding
and modulation that is needed for the transmission of the information. The
physical configuration including pins, connectors and the electric current used
is dealt in the physical layer based on the requirement of the network
application.
8. The physical layer translates logical communication requests from the
______ into hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
Answer: a
Explanation: Physical layer accepts data or information from the data link layer
and converts it into hardware specific operations so as to transfer the message
through physical cables. Some examples of the cables used are optical fiber
cables, twisted pair cables and co-axial cables.
9. A single channel is shared by multiple signals by ____________
a) analog modulation
b) digital modulation
c) multiplexing
d) phase modulation
Answer: c
Explanation: In communication and computer networks, the main goal is to
share a scarce resource. This is done by multiplexing, where multiple analog
or digital signals are combined into one signal over a shared medium. The
multiple kinds of signals are designated by the transport layer which is the
layer present on a higher level than the physical layer.
10. Wireless transmission of signals can be done via ___________
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
Answer: d
Explanation: Wireless transmission is carried out by radio waves, microwaves
and IR waves. These waves range from 3 Khz to above 300 Ghz and are more
suitable for wireless transmission. Radio waves can penetrate through walls
and are used in radio communications, microwaves and infrared (IR) waves
cannot penetrate through walls and are used for satellite communications and
device communications respectively
1. The data link layer takes the packets from _________ and encapsulates
them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Answer: a
Explanation: In computer networks, the data from application layer is sent to
transport layer and is converted to segments. These segments are then
transferred to the network layer and these are called packets. These packets
are then sent to data link layer where they are encapsulated into frames.
These frames are then transferred to physical layer where the frames are
converted to bits. Error control and flow control data is inserted in the frames
at the data link layer.
2. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
Answer: d
Explanation: Channel coding is the function of physical layer. Data link layer
mainly deals with framing, error control and flow control. Data link layer is the
layer where the packets are encapsulated into frames.
3. Which sublayer of the data link layer performs data link functions that
depend upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
Answer: b
Explanation: Media access control (MAC) deals with transmission of data
packets to and from the network-interface card, and also to and from another
remotely shared channel. The MAC sublayer also prevents collision using
protocols like CSMA/CD.
4. Header of a frame generally contains ______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
Answer: d
Explanation: In a frame, the header is a part of the data that contains all the
required information about the transmission of the file. It contains information
like synchronization bytes, addresses, frame identifier etc. It also contains
error control information for reducing the errors in the transmitted frames.
5. Automatic repeat request error management mechanism is provided by
________
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
Answer: a
Explanation: The logical link control is a sublayer of data link layer whose main
function is to manage traffic, flow and error control. The automatic repeat
request error management mechanism is provided by the LLC when an error
is found in the received frame at the receiver’s end to inform the sender to re-
send the frame.
6. When 2 or more bits in a data unit has been changed during the
transmission, the error is called ____________
a) random error
b) burst error
c) inverted error
d) double error
Answer: b
Explanation: When a single bit error occurs in a data, it is called single bit
error. When more than a single bit of data is corrupted or has error, it is called
burst error. If a single bit error occurs, the bit can be simply repaired by
inverting it, but in case of a burst error, the sender has to send the frame
again.
7. CRC stands for __________
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Answer: a
Explanation: Cyclic redundancy check is a code that is added to a data which
helps us to identify any error that occurred during the transmission of the data.
CRC is only able to detect errors, not correct them. CRC is inserted in the
frame trailer.
8. Which of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
Answer: d
Explanation: There are many data link layer protocols. Some of them are
SDLC (synchronous data link protocol), HDLC (High level data link control),
SLIP (serial line interface protocol), PPP (Point to point protocol) etc. These
protocols are used to provide the logical link control function of the Data Link
Layer.
9. Which of the following is the multiple access protocol for channel access
control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer: c
Explanation: In CSMA/CD, it deals with detection of collision after collision has
occurred, whereas CSMA/CA deals with preventing collision. CSMA/CD is
abbreviation for Carrier Sensing Multiple Access/Collision detection. CSMA/CA
is abbreviation for Carrier Sensing Multiple Access/Collision Avoidance. These
protocols are used for efficient multiple channel access.
10. The technique of temporarily delaying outgoing acknowledgements so that
they can be hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Answer: a
Explanation: Piggybacking is a technique in which the acknowledgment is
temporarily delayed so as to be hooked with the next outgoing data frame. It
saves a lot of channel bandwidth as in non-piggybacking system, some
bandwidth is reserved for acknowledgement
Answer: c
Explanation: In computer networks, the data from the application layer is sent
to the transport layer and is converted to segments. These segments are then
transferred to the network layer and these are called packets. These packets
are then sent to data link layer where they are encapsulated into frames.
These frames are then transferred to physical layer where the frames are
converted to bits.
2. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) error control
Answer: d
Explanation: In the OSI model, network layer is the third layer and it provides
data routing paths for network communications. Error control is a function of
the data link layer and the transport layer.
3. A 4 byte IP address consists of __________
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
Answer: c
Explanation: An ip address which is 32 bits long, that means it is of 4 bytes
and is composed of a network and host portion and it depends on address
class. The size of the host address and network address depends upon the
class of the address in classful IP addressing.
4. In virtual circuit network each packet contains ___________
a) full source and destination address
b) a short VC number
c) only source address
d) only destination address
Answer: b
Explanation: A short VC number also called as VCID (virtual circuit identifier) is
a type of identifier which is used to distinguish between several virtual circuits
in a connection oriented circuit switched network. Each virtual circuit is used to
transfer data over a larger packet switched network.
5. Which of the following routing algorithms can be used for network layer
design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer: d
Explanation: The routing algorithm is what decides where a packet should go
next. There are several routing techniques like shortest path algorithm, static
and dynamic routing, decentralized routing, distance vector routing, link state
routing, Hierarchical routing etc. The routing algorithms go hand in hand with
the operations of all the routers in the networks. The routers are the main
participants in these algorithms.
6. Which of the following is not correct in relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers
Answer: c
Explanation: In multi-destination routing, there is more than one receiver and
the route for each destination which is contained in a list of destinations is to
be found by the routing algorithm. Multi-destination routing is also used in
broadcasting.
7. A subset of a network that includes all the routers but contains no loops is
called ________
a) spanning tree
b) spider structure
c) spider tree
d) special tree
Answer: a
Explanation: Spanning tree protocol (STP) is a network protocol that creates a
loop free logical topology for ethernet networks. It is a layer 2 protocol that
runs on bridges and switches. The main purpose of STP is to ensure that you
do not create loops when you have redundant paths in your network.
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
Answer: d
Explanation: The Routing Information Protocol (RIP) is used by the network
layer for the function of dynamic routing. Congestion control focuses on the
flow of the traffic in the network and uses algorithms like traffic aware routing,
admission control and load shedding to deal with congestion.
9. The network layer protocol for internet is __________
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol
Answer: b
Explanation: There are several protocols used in Network layer. Some of them
are IP, ICMP, CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for
application layer and ethernet protocol is for data link layer.
10. ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing
Answer: a
Explanation: ICMP abbreviation for Internet Control Message Protocol is used
by networking devices to send error messages and operational information
indicating a host or router cannot be reached. ICMP operates over the IP
packet to provide error reporting functionality as IP by itself cannot report
errors.
Answer: a
Explanation: The flow of data in the OSI model flows in following manner
Application -> Presentation -> Session -> Transport -> Network -> Data Link ->
Physical. Each and every layer has its own set of functions and protocols to
ensure efficient network performance.
2. Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
Answer: c
Explanation: Both TCP and UDP are transport layer protocol in networking.
TCP is an abbreviation for Transmission Control Protocol and UDP is an
abbreviation for User Datagram Protocol. TCP is connection oriented whereas
UDP is connectionless.
3. User datagram protocol is called connectionless because _____________
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly
Answer: a
Explanation: UDP is an alternative for TCP and it is used for those purposes
where speed matters most whereas loss of data is not a problem. UDP is
connectionless whereas TCP is connection oriented.
4. Transmission control protocol ___________
a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
Answer: d
Explanation: TCP provides reliable and ordered delivery of a stream of bytes
between hosts communicating via an IP network. Major internet applications
like www, email, file transfer etc rely on TCP. TCP is connection oriented and it
is optimized for accurate delivery rather than timely delivery.
5. An endpoint of an inter-process communication flow across a computer
network is called __________
a) socket
b) pipe
c) port
d) machine
Answer: a
Explanation: Socket is one end point in a two way communication link in the
network. TCP layer can identify the application that data is destined to be sent
by using the port number that is bound to socket.
6. Socket-style API for windows is called ____________
a) wsock
b) winsock
c) wins
d) sockwi
Answer: b
Explanation: Winsock is a programming interface which deals with input output
requests for internet applications in windows OS. It defines how windows
network software should access network services.
7. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
Answer: a
Explanation: The datagram congestion control is a transport layer protocol
which deals with reliable connection setup, teardown, congestion control,
explicit congestion notification, and feature negotiation. It is used in modern
day systems where there are really high chances of congestion. The protocol
was last updated in the year 2008.
8. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol
Answer: a
Explanation: Just as the IP address identifies the computer, the network port
identifies the application or service running on the computer. A port number is
16 bits. The combination of IP address preceded with the port number is called
the socket address.
9. Transport layer protocols deals with ____________
a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication
Answer: b
Explanation: Transport layer is 4th layer in TCP/IP model and OSI reference
model. It deals with logical communication between process. It is responsible
for delivering a message between network host.
10. Which of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
Answer: a
Explanation: The Stream Control Transmission Protocol (SCTP) is a transport
layer protocol used in networking system where streams of data are to be
continuously transmitted between two connected network nodes. Some of the
other transport layer protocols are RDP, RUDP, TCP, DCCP, UDP etc.
Answer: a
Explanation: Topology in networks is the structure or pattern in which each and
every node in the network is connected. There are many topologies in
networking like bus, tree, ring, star, mesh, and hybrid topology. There is no
particular best topology and a suitable topology can be chosen based on the
kind of application of the network .
2. Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus
Answer: a
Explanation: In star topology, no computer is connected to another computer
directly but all the computers are connected to a central hub. Every message
sent from a source computer goes through the hub and the hub then forwards
the message only to the intended destination computer.
3. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
Answer: d
Explanation: In bus topology, there is a single cable to which all the network
nodes are connected. So whenever a node tries to send a message or data to
other nodes, this data passes through all other nodes in the network through
the cable. It is really simple to install but it’s not secure enough to be used in
most of the computer network applications.
4. Data communication system spanning states, countries, or the whole world
is ________
a) LAN
b) WAN
c) MAN
d) PAN
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network
extends over a large geographical area. WANs are used to connect cities,
states or even countries. A wireless connection is required to build a WAN. The
best example of WAN is the Internet.
5. Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) PAN
Answer: a
Explanation: LAN is an abbreviation for Local Area Network. This network
interconnects computers in a small area such as schools, offices, residence
etc. It is the most versatile kind of data communication system where most of
the computer network concepts can be visibly used.
6. WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network
extends over a large geographical area. These are used to connect cities,
states or even countries. They can be connected through leased lines or
satellites.
7. In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is
technique for combining several low rate channels to a single high rate
channel. For a certain time slot, the several channels could use the maximum
bandwidth. Each channel is inactive for a period of time too. Some other
multiplexing techniques are Frequency division multiplexing and Phase
division multiplexing.
8. _____ is the multiplexing technique that shifts each signal to a different
carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
Answer: a
Explanation: FDM is an abbreviation for Frequency Division Multiplexing. This
technique is used when the bandwidth of the channel is greater than the
combined bandwidth of all the signals which are to be transmitted. The
channel is active at all times unless a collision occurs with another channel
trying to use the same frequency. Some other multiplexing techniques are
Time division multiplexing and Phase division multiplexing.
1. The sharing of a medium and its link by two or more devices is called
_________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
Answer: b
Explanation: Multiplexing is a method using which one can send multiples
signals through a shared medium at the same time. This helps in using less
resources and thus saving the cost of sending messages.
2. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
Answer: b
Explanation: Circuit switching is a switching method by which one can obtain a
physical path between end points. Circuit switching method is also called a
connection oriented network. Two nodes must be physically and logically
connected to each other to create a circuit switching network.
3. Which multiplexing technique used to transmit digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
Answer: b
Explanation: TDM abbreviation for Time Division Multiplexing is a method used
for digital signals. Whereas FDM and WDM abbreviation for Frequency
Division Multiplexing, and Wavelength Division Multiplexing, are used for
analog signals. TDM is used in applications like ISDN (Integrated Services
Digital Network) and PSTN (Public Switched Telephone Network).
4. If there are n signal sources of same data rate, then the TDM link has
_______ slots.
a) n
b) n/2
c) n*2
d) 2n
Answer: a
Explanation: In TDM, the total unit of time is divided equally among all the
signal sources and each and every source has access to the complete
channel bandwidth during its allotted time slot. When the time slot of the
source is not active, it remains idle and waits for its slot to begin.
5. If link transmits 4000frames per second, and each slot has 8 bits, the
transmission rate of circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
Answer: a
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
6. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period
Answer: c
Explanation: There are instances when connection between two endpoints has
been established, but no communication or transfer of messages occurs. This
period of time is called silent period. The silent period ends when either of the
two endpoints starts the communication.
7. Multiplexing provides _________
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy
Answer: d
Explanation: Multiplexing helps us to transfer our messages over a shared
channel. This brings up the issue of privacy and efficiency. Fortunately,
Multiplexing has high efficiency and high privacy when implemented because
in the implementation, the transport layer of the OSI network model handles
the function of multiplexing through interfaces called ports which provide the
required efficiency and privacy.
8. In TDM, the transmission rate of a multiplexed path is always _______ the
sum of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
Answer: a
Explanation: In TDM the transmission rate provided by the path that is
multiplexed will always be greater than the sum of transmission rates of the
single sources. This happens because the transmission rate is provided to
each source only for a small period of time.
9. In TDM, slots are further divided into _________
a) Seconds
b) Frames
c) Packets
d) Bits
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is
technique for combining several low rate channels to a single high rate
channel. For a certain time slot, the several channels could use the maximum
bandwidth. Each channel is inactive for a period of time too. Some other
multiplexing techniques are Frequency division multiplexing and Phase
division multiplexing.
1. Which of the following delay is faced by the packet in travelling from one
end system to another?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned
Answer: d
Explanation: When a packet has to travel from one end system to another, it
first faces the queuing delay when there are multiple packets which are to be
sent, then it faces the transmission delay to convert the packet into bits to be
transmitted, and then it faces the propagation delay to propagate the bits
through the physical medium.
2. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the
transmission delay is ____________ (in microseconds)
a) 3.2
b) 32
c) 0.32
d) 320
Answer: a
Explanation: Transmission rate = length / transmission rate = 32/10 = 3.2
microseconds.
3. The time required to examine the packet’s header and determine where to
direct the packet is part of __________
a) Processing delay
b) Queuing delay
c) Transmission delay
d) Propagation delay
Answer: a
Explanation: Processing delay is induced at a router’s or other network
processor’s end in the path of the packet and is caused by the time taken by
the processor to examine the packet’s header to decide the further path of the
packet.
4. Given L = number of bits in the packet, a = average rate and R =
transmission rate. The Traffic intensity in the network is given by
____________
a) La/R
b) LR/a
c) R/La
d) Ra/L
Answer: a
Explanation: Traffic Intensity = (Number of bits in packet * Average
Transmission rate)/Current Transmission rate.
5. In the transfer of file between server and client, if the transmission rates
along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is
usually ___________
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
Answer: b
Explanation: The throughput is generally the transmission rate of bottleneck
link.
6. If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a
non congested network. The number of routers between source and
destination is?
a) N/2
b) N
c) N-1
d) 2N
Answer: c
Explanation: In the equation N (dproc + dtrans + dprop), N is the number of
checkpoints/stops that the packet makes as it reaches the destination. The
stops are made at each router and the final destination node. Now, since N =
number of routers + final node, then number of routers = N – final node. As we
know, there is only 1 final node in a path, thus, number of routers = N – 1.
Suppose, There is a path A->R1->R2->B for a packet where A is the source
node, B is the final node and R1 and R2 are routers. The total delay would be
given by N (dproc + dtrans + dprop) where N = 3, since the packet would stop
at R1, R2 and B. The number of routers here are 2, and (N – 1) is also 2.
7. The total nodal delay is given by ____________
a) dnodal = dproc – dqueue + dtrans + dprop
b) dnodal = dproc + dtrans – dqueue
c) dnodal = dproc + dqueue + dtrans + dprop
d) dnodal = dproc + dqueue – dtrans – dprop
Answer: c
Explanation: The total node-to-node delay, that is, nodal delay is the sum of all,
the processing delay, queuing delay, transmission delay and propagation
delay. Ideally, the nodal delay must be low as possible for a better Quality of
Service of the network.
8. In a network, If P is the only packet being transmitted and there was no
earlier transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
Answer: b
Explanation: Since there is no other packet to be transmitted, there is no need
for a queue. Therefore, the delay caused due to the queuing would be none
i.e. 0.
9. Transmission delay does not depend on _____________
a) Packet length
b) Distance between the routers
c) Transmission rate
d) Bandwidth of medium
Answer: b
Explanation: Transmission delay = packet length / transmission rate. The
transmission rate depends upon the bandwidth of the medium.
10. Propagation delay depends on ___________
a) Packet length
b) Transmission rate
c) Distance between the routers
d) Speed of the CPU
Answer: c
Explanation: Propagation delay is caused when the packet is in its electric
signal form and is travelling through a medium (a wire or a electromagnetic
wave). Propagation delay is the time it takes a bit to propagate from one router
to the next. If the distance between the routers is increased, it will take longer
time to propagate, that is, there would be more propagation delay.
Answer: b
Explanation: Botnet is a network of compromised devices used by the attacker
without the owner’s knowledge to perform unethical activities such as
spamming. The attacker usually uses the least secure devices to create the
botnet.
2. Which of the following is a form of DoS attack?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
Answer: d
Explanation: In a DoS attack, the attacker won’t let the victims access the
network by using a certain method that ensures that an essential network
resource is unavailable to the victim. In vulnerability attack, the attacker
exploits any obvious vulnerable entity in the network to deny the victim access
into the network. In bandwidth flooding, the attacker floods the victim with a
huge flow of packets and uses up all the bandwidth. In connection flooding, the
attacker floods the victim network with a huge number of connections, so that,
no other machine can connect to it.
3. The DoS attack, in which the attacker establishes a large number of half-
open or fully open TCP connections at the target host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding
Answer: c
Explanation: In Vulnerability attack, the attacker exploits the vulnerable control
points of the network to deny access to the victims. In Bandwidth flooding, the
attacker intentionally uses up all the bandwidth by flooding the victim with a
deluge of packets and makes sure that the victim can’t use any bandwidth. In
UDP flooding, too many UDP packets are sent by the attacker to the victim at
random ports.
4. The DoS attack, in which the attacker sends deluge of packets to the
targeted host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding
Answer: b
Explanation: In Bandwidth flooding, the attacker floods the victim machine with
a deluge of packets to make sure that no bandwidth is available. The victim
then cannot utilize the complete bandwidth to perform its operation.
5. Packet sniffers involve ____________
a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receiver
Answer: b
Explanation: The function of packet sniffers is to just silently receive the
packets flowing in the channel. If they inject any packets into the channel, they
might alert the other users about the intrusion.
6. Sniffers can be prevented by using _______________
a) Wired environment
b) WiFi
c) Ethernet LAN
d) Switched network
Answer: d
Explanation: Switches make sure that the packet is sent to the intended
receiver and no one else, thus preventing Sniffers to perform their function.
Intelligent switches are hence used preferably for the network.
7. Firewalls are often configured to block ___________
a) UDP traffic
b) TCP traffic
c) Sensitive traffic
d) Best-effort traffic
Answer: a
Explanation: UDP is more vulnerable to attacks, so firewalls are often
configured to block suspicious UDP traffic.
8. In a network, If P is the only packet being transmitted and there was no
earlier transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
Answer: b
Explanation: Since there is no other packet to be transmitted, there is no need
for a queue. Therefore, the delay caused due to the queuing would be none
i.e. 0.
Answer: c
Explanation: Wireless LAN is unguided media.
2. UTP is commonly used in __________
a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
Answer: a
Explanation: Unshielded twisted pair(UTP) is commonly used in home access.
3. Coaxial cable consists of _______ concentric copper conductors.
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: Coaxial cable has an inner conductor surrounded by a insulating
layer, which is surrounded by a conducting shield. Coaxial cable is used to
carry high frequency signals with low losses.
4. Fiber optics posses following properties __________
a) Immune electromagnetic interference
b) Very less signal attenuation
c) Very hard to tap
d) All of the mentioned
Answer: d
Explanation: In fibre optics the transmission of information is in the form of light
or photons. Due to all above properties mentioned in options fibre optics can
be submerged in water and are used at more risk environments.
5. If an Optical Carrier is represented as OC-n, generally the link speed
equals(in Mbps) __________
a) n*39.8
b) n*51.8
c) 2n*51.8
d) None of the mentioned
Answer: b
Explanation: The base unit of transmission rates in optical fibre is 51.8 Mbits/s.
So an optical carrier represented as OC-n has n*51.8 Mbits/s transmission
speed. For eg. OC-3 has 3*51.8 Mbits/s speed.
6. Terrestrial radio channels are broadly classifed into _____ groups.
a) 2
b) 3
c) 4
d) 1
Answer: b
Explanation: The three types are those that operate over very short distance,
those that operate in local areas, those that operate in the wide area.
7. Radio channels are attractive medium because __________
a) Can penetrate walls
b) Connectivity can be given to mobile user
c) Can carry signals for long distance
d) All of the mentioned
Answer: d
Explanation: Radio channels can penetrate walls, can be used to provide
connectivity to mobile users and can also carry signals for long distances.
8. Geostationary satellites ___________
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
Answer: a
Explanation: They are placed in orbit at 36,000km above Earth’s surface.
Answer: b
Explanation: The packet switch will not transmit the first bit to outbound link
until it receives the entire packet. If the entire packet is not received and the
time-out period expires, the packet switch will inform the sender to resend the
part of packet or the entire packet based on the algorithm being used.
3. If there are N routers from source to destination, the total end to end delay
in sending packet P(L-> number of bits in the packet R-> transmission rate) is
equal to ______________
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
Answer: b
Explanation: The equation to find the end to end delay when no. of bits,
transmission rate and no. of routers is given by (N*L)/R. The total end to end
delay, that is, nodal delay is the sum of all, the processing delay, queuing
delay, transmission delay and propagation delay.
4. What are the Methods to move data through a network of links and
switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching
Answer: d
Explanation: Packet switching and Circuit switching are two different types of
switching methods used to connect the multiple communicating devices with
one another. Packet switching is used in conventional LAN systems and circuit
switching is used in telephonic systems.
5. The required resources for communication between end systems are
reserved for the duration of the session between end systems in ________
method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
Answer: b
Explanation: In circuit switching, a physical path between the sender and
receiver is established. This path is maintained until the connection is needed.
Circuit switching is implemented in the Physical layer and is used in telephonic
systems.
6. As the resources are reserved between two communicating end systems in
circuit switching, ___________ is achieved.
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
Answer: b
Explanation: Circuit switching is connection oriented and is always
implemented in the physical layer. Once a path is set, all transmission occurs
through the same path. It is used since the early times in telephonic systems.
7. In _________ systems, resources are allocated on demand.
a) packet switching
b) circuit switching
c) line switching
d) frequency switching
Answer: a
Explanation: In packet switching, the bits are received in out of order and need
to be assembled at the receiver end, whereas in the case of Circuit switching,
all the bits are received in order. All transmissions may not occur through the
same path in case of packet switching.
8. Which of the following is not an application layer service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) Error control
Answer: d
Explanation: Application layer is the topmost layer in the OSI model. Network
virtual terminal, mail service, file transfer, access and management are all
services of the application layer. It uses protocols like HTTP, FTP, and DNS
etc. to provide these services.
1. Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
Answer: d
Explanation: TCP is transport layer protocol.
2. The packet of information at the application layer is called __________
a) Packet
b) Message
c) Segment
d) Frame
Answer: b
Explanation: For Application, Presentation and Session layers there is no data
format for message. Message is message as such in these three layers. But
when it comes to Transport, Network, Data and Physical layer they have data
in format of segments, packets, frames and bits respectively.
3. Which one of the following is an architecture paradigms?
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
Answer: d
Explanation: HTTP is a protocol.
4. Application developer has permission to decide the following on transport
layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
Answer: c
Explanation: Application layer provides the interface between applications and
the network. So application developer can decide what transport layer to use
and what should be its maximum buffer size.
5. Application layer offers _______ service.
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
Answer: a
Explanation: End to End service is provided in the application layer. Whereas
process to process service is provided at the transport layer.
6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c
Explanation: Because it can work with available throughput.
7. Pick the odd one out.
a) File transfer
b) File download
c) E-mail
d) Interactive games
Answer: d
Explanation: File transfer, File download and Email are services provided by
the application layer and there are message and data oriented.
8. Which of the following is an application layer service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
Answer: d
Explanation: The services provided by the application layer are network virtual
terminal, file transfer, access and management, mail services, directory
services, various file and data operations.
9. To deliver a message to the correct application program running on a host,
the _______ address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c
Explanation: IP address lets you know where the network is located. Whereas
MAC address is a unique address for every device. Port address identifies a
process or service you want to carry on.
10. Which is a time-sensitive service?
a) File transfer
b) File download
c) E-mail
d) Internet telephony
Answer: d
Explanation: Internet telephony is Loss-tolerant other applications are not.
Answer: d
Explanation: The transport services that are provided to application are reliable
data transfer, security and timing. These are very important for proper end to
end services.
12. Electronic mail uses which Application layer protocol?
a) SMTP
b) HTTP
c) FTP
d) SIP
Answer: a
Explanation: Email uses various protocols like SMTP, IMAP and POP. The
most prominent one used in application layer is SMTP.
Answer: a
Explanation: Domain name system is the way the internet domain names are
stored and translated to IP addresses. The domain names systems matches
the name of website to ip addresses of the website.
2. Which one of the following allows a user at one site to establish a
connection to another site and then pass keystrokes from local host to remote
host?
a) HTTP
b) FTP
c) Telnet
d) TCP
Answer: c
Explanation: Telnet is used for accessing remote computers. Using telnet a
user can access computer remotely. With Telnet, you can log on as a regular
user with whatever privileges you may have been granted to the specific
application and data on the computer.
3. Application layer protocol defines ____________
a) types of messages exchanged
b) message format, syntax and semantics
c) rules for when and how processes send and respond to messages
d) all of the mentioned
Answer: d
Explanation: Application layer deals with the user interface, what message is
to be sent or the message format, syntax and semantics. A user has access to
application layer for sending and receiving messages.
4. Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
Answer: a
Explanation: SMTP, abbreviation for Simple Mail Transfer Protocol is an
application layer protocol. A client who wishes to send a mail creates a TCP
connection to the SMTP server and then sends the mail across the
connection.
5. The ASCII encoding of binary data is called
a) base 64 encoding
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
Answer: a
Explanation: Base64 is used commonly in a number of applications including
email via MIME, and storing complex data in XML. Problem with sending
normal binary data to a network is that bits can be misinterpreted by
underlying protocols, produce incorrect data at receiving node and that is why
we use this code.
6. Which one of the following is an internet standard protocol for managing
devices on IP network?
a) dynamic host configuration protocol
b) simple network management protocol
c) internet message access protocol
d) media gateway protocol
Answer: b
Explanation: SNMP is a set of protocols for network management and
monitoring. This protocol is included in the application layer. SNMP uses 7
protocol data units.
7. Which one of the following is not an application layer protocol?
a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol
d) session initiation protocol
Answer: c
Explanation: Resource reservation protocol is used in transport layer. It is
designed to reserve resources across a network for quality of service using the
integrated services model.
8. Which protocol is a signaling communication protocol used for controlling
multimedia communication sessions?
a) session initiation protocol
b) session modelling protocol
c) session maintenance protocol
d) resource reservation protocol
Answer: a
Explanation: SIP is a signaling protocol in which its function includes initiating,
maintaining and terminating real time sessions. SIP is used for signaling and
controlling multimedia sessions.
9. Which one of the following is not correct?
a) Application layer protocols are used by both source and destination devices
during a communication session
b) HTTP is a session layer protocol
c) TCP is an application layer protocol
d) All of the mentioned
Answer: d
Explanation: HTTP is an application layer protocol. Whereas TCP is a
transport layer protocol.
10. When displaying a web page, the application layer uses the
_____________
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
Answer: a
Explanation: HTTP is abbreviation for hypertext transfer protocol. It is the
foundation of data communication for world wide web. This protocol decides
how the message is formatted and transmitted etc.
1. The number of objects in a Web page which consists of 4 jpeg images and
HTML text is ________
a) 4
b) 1
c) 5
d) 7
Answer: c
Explanation: 4 jpeg images + 1 base HTML file.
2. The default connection type used by HTTP is _________
a) Persistent
b) Non-persistent
c) Can be either persistent or non-persistent depending on connection request
d) None of the mentioned
Answer: a
Explanation: By default the http connection is issued with persistent
connection. In persistent connection server leaves connection open after
sending response. As little as one RTT (Time for a small packet to travel from
client to server and back) is required for all referenced objects.
3. The time taken by a packet to travel from client to server and then back to
the client is called __________
a) STT
b) RTT
c) PTT
d) JTT
Answer: b
Explanation: RTT stands for round-trip time.
4. The HTTP request message is sent in _________ part of three-way
handshake.
a) First
b) Second
c) Third
d) Fourth
Answer: c
Explanation: In first step client sends a segment to establish a connection with
the server. In the second the step the client waits for the acknowledgement to
be received from the server. After receiving the acknowledgement, the client
sends actual data in the third step.
5. In the process of fetching a web page from a server the HTTP request/
response takes __________ RTTs.
a) 2
b) 1
c) 4
d) 3
Answer: b
Explanation: By default the http connection will be persistent connection.
Hence it will take only 1 RTT to fetch a webpage from a server.
6. The first line of HTTP request message is called _____________
a) Request line
b) Header line
c) Status line
d) Entity line
Answer: a
Explanation: The line followed by request line are called header lines and
status line is the initial part of response message.
7. The values GET, POST, HEAD etc are specified in ____________ of HTTP
message
a) Request line
b) Header line
c) Status line
d) Entity body
Answer: a
Explanation: It is specified in the method field of request line in the HTTP
request message.
8. The __________ method when used in the method field, leaves entity body
empty.
a) POST
b) SEND
c) GET
d) PUT
Answer: c
Explanation: There are two methods which help to request a response from a
server. Those are GET and POST. In GET method, the client requests data
from server. In POST method the client submits data to be processed to the
server.
9. The HTTP response message leaves out the requested object when
____________ method is used
a) GET
b) POST
c) HEAD
d) PUT
Answer: c
Explanation: HEAD method is much faster than GET method. In HEAD
method much smaller amount of data is transferred. The HEAD method asks
only for information about a document and not for the document itself.
10. Find the oddly matched HTTP status codes
a) 200 OK
b) 400 Bad Request
c) 301 Moved permanently
d) 304 Not Found
Answer: d
Explanation: 404 Not Found.
11. Which of the following is not correct?
a) Web cache doesnt has its own disk space
b) Web cache can act both like server and client
c) Web cache might reduce the response time
d) Web cache contains copies of recently requested objects
Answer: a
Explanation: Web cache or also known as HTTP cache is a temporary storage
where HTML pages and images are stored temporarily so that server lag could
be reduced.
12. The conditional GET mechanism
a) Imposes conditions on the objects to be requested
b) Limits the number of response from a server
c) Helps to keep a cache upto date
d) None of the mentioned
Answer: c
Explanation: The HTTP protocol requests the server of the website its trying to
access so that it can store its files, images etc. in cache memory. This request
of asking the server for a document considering a specific parameter is called
conditional GET Request.
13. Which of the following is present in both an HTTP request line and a status
line?
a) HTTP version number
b) URL
c) Method
d) None of the mentioned
Answer: a
Explanation: Status line is the the start line of an HTTP response. It contains
the information such as the protocol version, a status text, status code.
1. Multiple objects can be sent over a TCP connection between client and
server in a persistent HTTP connection.
a) True
b) False
Answer: a
Explanation: Persistent connections are kept active after completing
transaction so that multiple objects can be sent over the same TCP
connection.
2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) data link layer
Answer: a
Explanation: HTTP is an Application layer protocol used to define how
messages are formatted and transmitted through the World Wide Web.
3. In the network HTTP resources are located by
a) uniform resource identifier
b) unique resource locator
c) unique resource identifier
d) union resource locator
Answer: a
Explanation: The Uniform Resource Identifier is a name and locator for the
resource to be located by the HTTP. The URLs and URNs are derived through
the identifier.
4. HTTP client requests by establishing a __________ connection to a
particular port on the server.
a) user datagram protocol
b) transmission control protocol
c) border gateway protocol
d) domain host control protocol
Answer: b
Explanation: HTTP clients perform requests using a TCP connection, because
the TCP connection provides a more reliable service. UDP is not a reliable
protocol, border gateway protocol is used on top of TCP, while domain host
control protocol is a network layer protocol.
5. In HTTP pipelining ________________
a) multiple HTTP requests are sent on a single TCP connection without waiting
for the corresponding responses
b) multiple HTTP requests can not be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) multiple HTTP requests are sent at random on a single TCP connection
Answer: a
Explanation: HTTP pipelining helps the client make multiple requests without
having to waiting for each response, thus saving a lot of time and bandwidth
for the client.
6. FTP server listens for connection on port number ____________
a) 20
b) 21
c) 22
d) 23
Answer: b
Explanation: Port 20 is used for FTP data. Port 22 is used for SSH remote
login. Port 23 is used for TELNET.
7. In FTP protocol, client contacts server using ____ as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
Answer: a
Explanation: The clients use the Transmission Control Protocol for FTP as it’s
more reliable than UDP, DCCP, and SCTP, and reliability of file transfer is
required to be as high as possible for FTP.
8. In Active mode FTP, the client initiates both the control and data
connections.
a) True
b) False
Answer: b
Explanation: In Passive mode of FTP, the client initiates both data and control
connections, while in Active mode, the client initiates the control connection
and then the server initiates the data connection.
9. The File Transfer Protocol is built on ______________
a) data centric architecture
b) service oriented architecture
c) client server architecture
d) connection oriented architecture
Answer: c
Explanation: The FTP connection includes a Server and a Client which wish to
share files. The server can have multiple clients at the same time while the
client communicates with only one server at a time.
10. In File Transfer Protocol, data transfer cannot be done in ___________
a) stream mode
b) block mode
c) compressed mode
d) message mode
Answer: d
Explanation: In Stream mode, the data is transferred in a continuous stream.
In Block mode, data is transferred after being divided into smaller blocks. In
Compressed mode, data is transferred after being compressed using some
compression algorithm.
Answer: b
Explanation: File Transfer Protocol is an application layer protocol used to
share “files” between a server and a client. The protocol uses two separate
ports for data and control connections: port 20 for data and port 21 for control.
2. FTP is built on _____ architecture.
a) Client-server
b) P2P
c) Data centric
d) Service oriented
Answer: a
Explanation: An FTP connection includes a Server and a Client which wish to
share a number of data files. The server can transfer files with multiple clients
at the same time while the client communicates with only one server at a time.
3. FTP uses _________ parallel TCP connections to transfer a file.
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: Control connection using FTP port: 21, and data connection using
FTP port: 20. The FTP session is started or ended using port 21 and the actual
data i.e. files are sent through port 20.
4. Identify the incorrect statement regarding FTP.
a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection
Answer: c
Explanation: FTP is out-of-band because the data connection is done
separately through port 20 and control connection is done separately through
port 21.
5. If 5 files are transferred from server A to client B in the same session. The
number of TCP connections between A and B is _______
a) 5
b) 10
c) 2
d) 6
Answer: d
Explanation: The client would first initiate the TCP control connection through
port 21. Then for every file transfer, a separate connection would be made
through port 20. Now, since we have five files to be transferred, 1 control
connection + 5 data connections = 6 total TCP connections.
6. FTP server _____________
a) Maintains state information
b) Is stateless
c) Has single TCP connection for a file transfer
d) Has UDP connection for file transfer
Answer: a
Explanation: FTP server maintains state information of every control
connection to keep track of the active and inactive connections in the session.
This helps the server decide which connection to terminate, in case the
connection is inactive for too long.
7. The commands, from client to server, and replies, from server to client, are
sent across the control connection in ________ bit ASCII format.
a) 8
b) 7
c) 3
d) 5
Answer: b
Explanation: FTP was designed to transmit commands only in English
characters that are possible with just 7 bits in ASCII. Even the media has to be
converted to ASCII before transmission.
8. Find the FTP reply whose message is wrongly matched.
a) 331 – Username OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection
Answer: d
Explanation: The correct response code for the message “Can’t open data
connection” is 425. Response code 452 is sent usually when the connection is
suddenly closed.
9. The data transfer mode of FTP, in which all the fragmenting has to be done
by TCP is ________
a) Stream mode
b) Block mode
c) Compressed mode
d) Message mode
Answer: a
Explanation: Stream mode is the default mode of FTP, in which the TCP
transforms/fragments the data into segments, and then after the transmission
is completed, converts it back to stream of bytes.
10. The password is sent to the server using ________ command
a) PASSWD
b) PASS
c) PASSWORD
d) PWORD
Answer: b
Explanation: The PASS command, preceded by the username, completes the
user’s identification for access control in an FTP session. Without the valid
password, the user won’t be able to initiate the FTP connection.
1. When the mail server sends mail to other mail servers it becomes
____________
a) SMTP server
b) SMTP client
c) Peer
d) Master
Answer: b
Explanation: SMTP clients are the entities that send mails to other mail
servers. The SMTP servers cannot send independent mails to other SMTP
servers as an SMTP server. There are no masters or peers in SMTP as it is
based on the client-server architecture.
2. If you have to send multimedia data over SMTP it has to be encoded into
_______
a) Binary
b) Signal
c) ASCII
d) Hash
Answer: c
Explanation: Since only 7-bit ASCII codes are transmitted through SMTP, it is
mandatory to convert binary multimedia data to 7-bit ASCII before it is sent
using SMTP.
3. Expansion of SMTP is ________
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
Answer: a
Explanation: SMTP or Simple Mail Transfer Protocol is an application layer
protocol used to transport e-mails over the Internet. Only 7-bit ASCII codes
can be sent using SMTP.
4. In SMTP, the command to write receiver’s mail address is written with the
command _______
a) SEND TO
b) RCPT TO
c) MAIL TO
d) RCVR TO
Answer: b
Explanation: RCPT TO command is followed by the recipient’s mail address to
specify where or to whom the mail is going to through the internet. If there is
more than one receiver, the command is repeated for each address
continually.
5. The underlying Transport layer protocol used by SMTP is ________
a) TCP
b) UDP
c) Either TCP or UDP
d) IMAP
Answer: a
Explanation: TCP is a reliable protocol, and Reliability is a mandatory
requirement in e-mail transmission using SMTP.
6. Choose the statement which is wrong incase of SMTP?
a) It requires message to be in 7bit ASCII format
b) It is a pull protocol
c) It transfers files from one mail server to another mail server
d) SMTP is responsible for the transmission of the mail through the internet
Answer: b
Explanation: In SMTP, the sending mail server pushes the mail to receiving
mail server hence it is push protocol. In a pull protocol such as HTTP, the
receiver pulls the resource from the sending server.
7. Internet mail places each object in _________
a) Separate messages for each object
b) One message
c) Varies with number of objects
d) Multiple messages for each object
Answer: b
Explanation: It places all objects into one message as it wouldn’t be efficient
enough if there are different messages for each object. The objects include the
text and all the multimedia to be sent.
8. Typically the TCP port used by SMTP is _________
a) 25
b) 35
c) 50
d) 15
Answer: a
Explanation: The ports 15, 35 and 50 are all UDP ports and SMTP only uses
TCP port 25 for reliability.
9. A session may include ________
a) Zero or more SMTP transactions
b) Exactly one SMTP transactions
c) Always more than one SMTP transactions
d) Number of SMTP transactions cant be determined
Answer: a
Explanation: An SMTP session consists of SMTP transactions only even if no
transactions have been performed. But no transactions in the session might
mean that the session is inactive or is just initiated.
10. Which of the following is an example of user agents for e-mail?
a) Microsoft Outlook
b) Facebook
c) Google
d) Tumblr
Answer: a
Explanation: Among the options, only Microsoft Outlook is an e-mail agent.
Google is a search engine and Facebook, and Tumblr are social networking
platforms. Gmail and Alpine are some other examples of e-mail agent.
11. When the sender and the receiver of an email are on different systems, we
need only _________
a) One MTA
b) Two UAs
c) Two UAs and one MTA
d) Two UAs and two MTAs
Answer: d
Explanation: The sender’s User Agent (UA) submits the message to a
Message Transfer Agent (MTA). Then the MTA sends the message to another
MTA i.e. a mail relay. Then the receiver receives the message from the mail
relay whenever it is available.
12. User agent does not support this ___________
a) Composing messages
b) Reading messages
c) Replying messages
d) Routing messages
Answer: d
Explanation: The user agent is basically a software program that allows the
user to send, and receive e-mail messages. Routing of the message is done
by the Message Transfer Agent.
Answer: a
Explanation: Since TCP is a reliable protocol, it’s more efficient to use TCP
protocol for e-mail transfer. TCP also provides more security than other
transport layer protocols.
2. SMTP connections secured by SSL are known as _____________
a) SMTPS
b) SSMTP
c) SNMP
d) STARTTLS
Answer: a
Explanation: SSMTP is a simple mail transfer program to send mail from a
local PC to a mail host. SNMP is a network management protocol. STARTTLS
connections are secured by TLS.
3. SMTP uses which of the following TCP port?
a) 22
b) 23
c) 21
d) 25
Answer: d
Explanation: Port 21 is used for FTP control connection, port 22 is used by
SSH, and port 23 is used by TELNET.
4. Which one of the following protocol is used to receive mail messages?
a) SMTP
b) Post Office Protocol (POP)
c) Internet Message Access Protocol (IMAP)
d) FTP
Answer: d
Explanation: FTP is used to share files. SMTP, POP and IMAP are the
protocols used to send and receive mails on the internet.
5. What is on-demand mail relay (ODMR)?
a) protocol for SMTP security
b) an SMTP extension
c) protocol for web pages
d) protocol for faster mail transfer
Answer: b
Explanation: ODMR is an extension to SMTP, in which mails are relayed to the
receivers after they are authenticated. It allows only the authorized receivers to
receive the mail.
6. An email client needs to know the _________ of its initial SMTP server.
a) IP address
b) MAC address
c) URL
d) Name
Answer: a
Explanation: The client needs to know the IP of its initial SMTP server as it has
to send the mail first to that server and then the server forwards the mail
ahead on behalf of the user.
7. An SMTP session may not include _______
a) zero SMTP transaction
b) one SMTP transaction
c) more than one SMTP transaction
d) one HTTP transaction
Answer: d
Explanation: An SMTP session can only include SMTP transactions regardless
the number. Any other protocol’s transaction is not included in an SMTP
session.
8. SMTP defines _______
a) message transport
b) message encryption
c) message content
d) message password
Answer: a
Explanation: As the name suggests, Simple Mail Transfer Protocol is only
responsible for “how” the message is transferred i.e. Transport of the
message. Other protocols such as TCP are used to provide other services like
encryption for the messages.
9. Which one of the following is an SMTP server configured in such a way that
anyone on the internet can send e-mail through it?
a) open mail relay
b) wide mail reception
c) open mail reception
d) short mail reception
Answer: a
Explanation: Anyone can send an e-mail through an Open Mail Relay server
so it acted like a free relay for email agents to forward their mails through.
Open Mail Relays are now unpopular because they can be used by attackers
to perform man-in-the-middle attacks.
10. SMTP is not used to deliver messages to ______
a) user’s terminal
b) user’s mailbox
c) user’s word processor
d) user’s email client
Answer: c
Explanation: SMTP can only be used to send messages to user’s terminal,
email client or mailbox. A stand-alone word processor cannot be connected to
a network, so it won’t be possible to deliver messages to it.
Answer: a
Explanation: An entire hostname can have a maximum of 255 characters.
Although each label must be from 1 to 63 characters long. Host name is
actually a label that is given to a device in a network.
2. A DNS client is called _________
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
Answer: b
Explanation: DNS client also known as DNS resolver also known as DNS
lookup helps to resolve DNS requests using an external DNS server.
3. Servers handle requests for other domains _______
a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
Answer: b
Explanation: Whenever a request is received at server from other domains, it
handles this situation by contacting remote DNS server.
4. DNS database contains _______
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
Answer: d
Explanation: Domain Name system not only deals with mapping IP addresses
with the hostname but also deals with exchange of information in the server.
5. If a server has no clue about where to find the address for a hostname then
_______
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Answer: a
Explanation: Root name servers are actually very important and critical as they
are the first step in translating human readable hostnames into IP addresses
for carrying out communication.
6. Which one of the following allows client to update their DNS entry as their IP
address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Answer: a
Explanation: Dynamic DNS or in short DDNS or DynDNS helps in
automatically updating a name server in the DNS. This does not require
manual editing.
7. Wildcard domain names start with label _______
a) @
b) *
c) &
d) #
Answer: b
Explanation: A wildcard DNS record matches requests to a non existent
domain name. This wildcard DNS record is specified by using asterisk “*” as
the starting of a domain name.
8. The right to use a domain name is delegated by domain name registers
which are accredited by _______
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Answer: d
Explanation: The ICANN (Internet Corporation for Assigned Names and
Numbers) deals with IP address space allocation, protocol identifier
assignment, generic and country code Top Level domain name system
management (gTLD and ccTLD).
9. The domain name system is maintained by _______
a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
Answer: a
Explanation: A domain name system is maintained by a distributed database
system. It is a collection of multiple, logically interrelated databases distributed
over a computer network.
10. Which one of the following is not true?
a) multiple hostnames may correspond to a single IP address
b) a single hostname may correspond to many IP addresses
c) a single hostname may correspond to a single IP address
d) none of the mentioned
Answer: c
Explanation: It need not be that a single hostname will correspond to a ip
address. For example facebook.com and fb.com both correspond to same ip
address. So there can be multiple hostnames for a single ip address.
Answer: d
Explanation: SSH provides high encryption and security features while
communicating through a network. It is a cryptographic network protocol.
2. SSH can be used in only _____________
a) unix-like operating systems
b) windows
c) both unix-like and windows systems
d) none of the mentioned
Answer: c
Explanation: SSH isn’t confined to a certain network or operating system. It
can be implemented over different networks and on different operating
systems.
3. SSH uses ___________ to authenticate the remote computer.
a) public-key cryptography
b) private-key cryptography
c) any of public-key or private-key
d) both public-key & private-key
Answer: a
Explanation: Public encryption key is slower but more flexible. Every
cryptographic security system requires a private key for private access and a
public key for location.
4. Which standard TCP port is assigned for contacting SSH servers?
a) port 21
b) port 22
c) port 23
d) port 24
Answer: b
Explanation: Port 22 is used for contacting ssh servers, used for file transfers
(scp, sftp) and also port forwarding.
5. Which one of the following protocol can be used for login to a shell on a
remote host except SSH?
a) telnet
b) rlogin
c) both telnet and rlogin
d) none of the mentioned
Answer: c
Explanation: SSH is more secured then telnet and rlogin.
6. Which one of the following is a file transfer protocol using SSH?
a) SCP
b) SFTP
c) Rsync
d) All of the mentioned
Answer: d
Explanation: SCP (Secure copy protocol), SFTP (SSH File Transfer Protocol)
and Rsync all are file transfer protocols which are used by SSH.
7. SSH-2 does not contain ______________
a) transport layer
b) user authentication layer
c) physical layer
d) connection layer
Answer: c
Explanation: SSH2 is a more secure, portable and efficient version of SSH that
includes SFTP, which is functionally similar to FTP, but is SSH2 encrypted.
8. Which one of the following feature was present in SSH protocol, version 1?
a) password changing
b) periodic replacement of session keys
c) support for public-key certificates
d) none of the mentioned
Answer: d
Explanation: All of the mentioned features are provided by SSH-2 and that
SSH-1 only provide strong authentication and guarantee confidentiality.
9. SCP protocol is evolved from __________ over SSH.
a) RCP protocol
b) DHCP protocol
c) MGCP protocol
d) GCP protocol
Answer: a
Explanation: RCP is the abbreviation for Rate Control Protocol is a congestion
control algorithm for fast user response times.
10. Which one of the following authentication method is used by SSH?
a) public-key
b) host based
c) password
d) all of the mentioned
Answer: d
Explanation: SSH used public key authentication, Password authentication,
Host based authentication, keyboard authentication and authentication of
servers.
Answer: a
Explanation: We use DHCP to allow the hosts to acquire their ip addresses
dynamically which is better than visiting each and every host on the network
and configure all of this information manually.
2. DHCP is used for ________
a) IPv6
b) IPv4
c) Both IPv6 and IPv4
d) None of the mentioned
Answer: c
Explanation: DHCP is used for both IPv4 and IPv6 addressing. With DHCP
you get to let the hosts know about the change dynamically, and hosts update
their info themselves.
3. The DHCP server _________
a) maintains a database of available IP addresses
b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client
d) all of the mentioned
Answer: d
Explanation: Whenever a DHCP server gets a request from a client it responds
with a DHCP offer containing IP address being offered, network mask offered,
the amount of time that the client can use and keep it, the ip address of the
DHCP server making this offer.
4. IP assigned for a client by DHCP server is
a) for a limited period
b) for an unlimited period
c) not time dependent
d) none of the mentioned
Answer: a
Explanation: The IP address offered to a client is only for a limited period of
time. There is actually a certain amount of time that the client can use and
keep this IP address.
5. DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
Answer: b
Explanation: 67 is the UDP port number that is used as the destination port of
a server. Whereas UDP port number 68 is used by the client.
6. The DHCP server can provide the _______ of the IP addresses.
a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned
Answer: d
Explanation: When a host acquires multiple offers of IP addresses from
different DHCP servers, the host will broadcast a dhcp request identifying the
server whose offer has been accepted.
7. DHCP client and servers on the same subnet communicate via _________
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
Answer: a
Explanation: DHCP actually employs a connectionless service, which is
provided by UDP, since TCP is connection oriented. It is implemented with two
UDP port numbers 67 and 68 for its operations.
8. After obtaining the IP address, to prevent the IP conflict the client may use
_________
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
Answer: c
Explanation: ARP abbreviation for address resolution protocol is used for
mapping IP addresses to MAC addresses that are present in the local network.
9. What is DHCP snooping?
a) techniques applied to ensure the security of an existing DHCP infrastructure
b) encryption of the DHCP server requests
c) algorithm for DHCP
d) none of the mentioned
Answer: a
Explanation: DHCP snooping is a security feature that is used in OS of a
network in the layer 2. This technology prevents unauthorized DHCP servers
offering IP addresses to DHCP clients.
10. If DHCP snooping is configured on a LAN switch, then clients having
specific ______ can access the network.
a) MAC address
b) IP address
c) Both MAC address and IP address
d) None of the mentioned
Answer: c
Explanation: The DHCP snooping is done to prevent unauthorized IP
addresses being offered by unauthorized servers. This features allows only
specific mac addresses and IP addresses to access the network.
Answer: b
Explanation: IPSec is a set of protocols used to provide authentication, data
integrity and confidentiality between two machines in an IP network. In the
TCP/IP model, it provides security at the IP layer i.e. the network layer.
2. In tunnel mode, IPSec protects the ______
a) Entire IP packet
b) IP header
c) IP payload
d) IP trailer
Answer: a
Explanation: In the tunnel mode, IPSec adds control bits into the packets to
encrypt the entire packet between the IPSec endpoints. Using encryption, it
provides secure communication between the two endpoints.
3. Which component is included in IP security?
a) Authentication Header (AH)
b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
d) All of the mentioned
Answer: d
Explanation: AH ensures that there is no retransmission of data from an
unauthorized source, and protects against data tampering. ESP provides with
content protection and ensures that there is integrity and confidentiality for the
message. IKE is used to make sure that only the intended sender and receiver
can access the message.
4. WPA2 is used for security in _______
a) Ethernet
b) Bluetooth
c) Wi-Fi
d) Email
Answer: c
Explanation: WPA2 or WiFi Protected Access 2 is a security protocol used to
provide users and firms with strong data security and protection for their
wireless networks (WiFi) to give them confidence that only authorized users
can access their network.
5. An attempt to make a computer resource unavailable to its intended users is
called ______
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
Answer: a
Explanation: In a Denial of Service attack, the attacker won’t let the victims
access the network by using a certain method that ensures that an essential
network resource is unavailable to the victim. The methods that the attacker
can use are vulnerability attack, bandwidth flooding and connection flooding.
6. Extensible authentication protocol is authentication framework frequently
used in ______
a) Wired personal area network
b) Wireless networks
c) Wired local area network
d) Wired metropolitan area network
Answer: b
Explanation: The Extensible Authentication Protocol (EAP) is an authentication
protocol used to connect a network node to the Internet. It designed through
extending the methods used by the Point-to-Point Protocol for authentication.
7. Pretty good privacy (PGP) is used in ______
a) Browser security
b) Email security
c) FTP security
d) WiFi security
Answer: b
Explanation: PGP is an encryption method used in e-mail security to encrypt
and decrypt the content of an e-mail transmitted over the internet. It makes
sure that the message cannot be stolen by other unauthorized users.
8. PGP encrypts data by using a block cipher called ______
a) International data encryption algorithm
b) Private data encryption algorithm
c) Internet data encryption algorithm
d) Local data encryption algorithm
Answer: a
Explanation: The IDEA was designed in 1991 by Xuejia Lai and James
Massey. Before IDEA, PGP used the cipher method BassOmatic.
9. When a DNS server accepts and uses incorrect information from a host that
has no authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
Answer: c
Explanation: In DNS spoofing, also known as DNS cache poisoning, an
attacker gets the valid credentials from a victim by spoofing the intended
resource, and tricking the victim to give his/her valid authorization credentials.
Answer: b
Explanation: VPN provides enhanced security and online anonymity to users
on the internet. It is also used to unblock websites that are unavailable in
certain regions.
2. When were VPNs introduced into the commercial world?
a) Early 80’s
b) Late 80’s
c) Early 90’s
d) Late 90’s
Answer: d
Explanation: VPNs were first introduced in the year 1996. Then as the internet
started to get popularized, the need for connection security increased. VPN
was a great solution to this, and that’s when VPNs were implemented in the
commercial world.
3. What protocol is NOT used in the operation of a VPN?
a) PPTP
b) IPsec
c) YMUM
d) L2TP
Answer: c
Explanation: PPTP is a tunneling protocol which was initially used for the
creation of VPNs. IPSec is used in encrypting the traffic flowing in the VPN.
L2TP is used to tunnel all the L2 traffic on the VPN.
4. Which of the following statements is NOT true concerning VPNs?
a) Financially rewarding compared to leased lines
b) Allows remote workers to access corporate data
c) Allows LAN-to-LAN connectivity over public networks
d) Is the backbone of the Internet
Answer: d
Explanation: VPNs are not the backbone of the Internet as they are just a
method to create private intranets on the internet. They are used for enhancing
the connection security for the users.
5. Traffic in a VPN is NOT ____________
a) Invisible from public networks
b) Logically separated from other traffic
c) Accessible from unauthorized public networks
d) Restricted to a single protocol in IPsec
Answer: c
Explanation: Traffic in a VPN is not accessible from any unauthorized public
networks because it is secured with the masking IP address. This provides the
benefit of access to blocked resources to the users.
6. VPNs are financially speaking __________
a) Always more expensive than leased lines
b) Always cheaper than leased lines
c) Usually cheaper than leased lines
d) Usually more expensive than leased lines
Answer: c
Explanation: The services of a VPN are cheaper for moderate to large scale
institutional networks than the services of leased lines. Though for a small
scale network, it does not prove to be as beneficial as the costs are not
reduced to a great degree as compared to leased lines.
7. Which layer 3 protocols can be transmitted over an L2TP VPN?
a) Only IP
b) Only IPX
c) Only ICMP
d) IP and IPX
Answer: d
Explanation: L2TP stands for Layer 2 Tunneling Protocol. It is used to tunnel
all the L2 traffic on an IP network and is able to transmit network layer’s IP and
IPX protocol data.
8. ESP (Encapsulating Security Protocol) is defined in which of the following
standards?
a) IPsec
b) PPTP
c) PPP
d) L2TP
Answer: a
Explanation: ESP is a security component of IPSec. ESP provides content
protection and ensures that there is integrity and confidentiality of the
message. The other security components of IPSec are Authentication Header
and Internet Key Exchange.
9. L2F was developed by which company?
a) Microsoft
b) Cisco
c) Blizzard Entertainment
d) IETF
Answer: b
Explanation: L2F stands for Layer 2 Forwarding protocol. It was designed by
Cisco to tunnel PPP traffic, helping create VPNs over the internet.
10. Which layer of the OSI reference model does PPTP work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
Answer: b
Explanation: PPTP stands for Point-to-Point Tunneling Protocol. PPTP is a
tunneling protocol that was primitively used to create VPNs. It is no longer
used for VPNs due to the lack of security it provides.
11. Which layer of the OSI reference model does IPsec work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
Answer: c
Explanation: IPSec is a set of protocols used to provide authentication, data
integrity and confidentiality between two machines in an IP network. It
operates in the network layer.
Answer: d
Explanation: SAN management, data protection and disk operation are the
main components of the Storage Management Initiative Specification. SMI-S
was developed by the Storage Networking Industry Association.
2. Which of the following is not a storage device?
a) Switch
b) RAID Arrays
c) Tape drives
d) Hub
Answer: d
Explanation: Switches, RAID arrays and tape drives are the main storage
devices in SMI-S, while a Hub is simple networking device that cannot be used
as storage.
3. Which protocols are used for Storage management?
a) SNMP
b) LDAP
c) POP3
d) MIB
Answer: a
Explanation: Simple Network Management Protocol is used for storage
management. Lightweight Directory Access Protocol is used to access or
locate information about directories and other resources on a network. Post
Office Protocol 3 is used for e-mailing on the internet. Management
Information Base is a part of SNMP and contains hierarchically organized
information.
4. Identify the difficulty a SAN administrator does not incur while dealing with
diverse vendors.
a) Proprietary management interfaces
b) Multiple applications to manage storage in the data center
c) No single view
d) Single view
Answer: d
Explanation: A single view is not possible with diverse vendors present.
Proprietary management interfaces, multiple applications management and no
single view are the main difficulties incurred by a SAN administrator in such a
situation.
5. How do Storage administrators ensure secure access to storage devices?
a) By using Zoning
b) By putting a physical lock on the storage device
c) By keeping devices shutdown when not in use
d) By keeping devices when used
Answer: a
Explanation: Zoning is a method in SAN that can be used by a storage
administrator to specify who can see what in the SAN. Zoning might
complicate the scaling process if the size of the SAN increases.
6. Effective Storage management does not include __________
a) security
b) backups
c) reporting
d) connection
Answer: d
Explanation: Connection is the responsibility of the connection manager.
Storage management includes management of all necessities such as
security, backups and reporting facilities.
7. Among the following, identify which task is not involved in Storage Capacity
management?
a) Identifying storage systems are approaching full capacity
b) Monitoring trends for each resource
c) Tracking Total capacity, total used, total available
d) Preventing unauthorized access to the storage
Answer: d
Explanation: Prevention of unauthorized access to storage is the task of
Security management. Identifying when the storage is approaching full
capacity, monitoring trends, reporting and tracking capacity are the tasks of
Storage Capacity management.
8. Effect of open standards like SMI(s) is _______________
a) standardization drives software interoperability and interchange ability
b) breaks the old-style dependence on proprietary methods, trade secrets, and
single providers
c) builds a strong foundation on which others can quickly build and innovate
d) all of the mentioned
Answer: d
Explanation: Open standards like SMI-S inculcate a general ideal through
which the normal designers are able to easily implement the standard into their
software and its scalability. Since it is open-source, nothing is hidden from its
users and they can implement it as they like or require to. As a whole lot of
time is spent to build it as strong and scalable, it provides an efficient
foundation to the designers to build and innovate on.
9. Task of Distributed Management Task Force is not ________
a) to promote interoperability among the management solution providers
b to act as an interface between the various budding technologies and provide
solution to manage various environments
c) to track the operation of the different management solution providers
d) to manage the facility by itself if one of the management solution providers
fail
Answer: d
Explanation: The Distributed Management Task Force is used just to simplify
the overall management of the network. It cannot manage a network facility by
itself in case one of the management solution providers fails. It provides an
interface for promoting interoperability among management solution providers.
10. SMI-S Standard uses which of the following?
a) Java RMI
b) CIM-XML/HTTP
c) CORBA
d) .NET
Answer: b
Explanation: The Distributed Management Task Force maintains a Common
Information Model (CIM) to represent a common set of network objects and
their relationships. CIM-XML/HTTP refers to the operations of CIM being
performed over HTTP or XML. SMI-S uses CIM-XML/HTTP.
Answer: c
Explanation: SNMP stands for Simple Network Management Protocol. It is an
application-level protocol in which a few manager stations control a set of
agents. It is used under the TCP/IP protocol suite and is used for managing
devices on the internet.
2. Full duplex mode increases the capacity of each domain by ________
a) 10 to 20 mbps
b) 20 to 30 mbps
c) 30 to 40 mbps
d) 40 to 50 mbps
Answer: a
Explanation: In full duplex mode, both endpoints share a single channel
bandwidth to achieve two-way transmission. This results in complete utilization
of the band capacity increasing the capacity by 10 to 20 mbps than half-duplex
mode.
3. Configuration management can be divided into which two subsystems?
a) Reconfiguration and documentation
b) Management and configuration
c) Documentation and dialing up
d) Configuration and dialing up
Answer: a
Explanation: The best current practices report is created by a management
group to ensure the most effective configuration management. The group also
makes a MIB (Management Information Base) module to help with the
configuration management.
4. To use a Simple Network Management System, we need _______
a) Servers
b) IP
c) Protocols
d) Rules
Answer: d
Explanation: Rules are a collection of expression containing parameters to
observe the attributes of the user’s device, and then execute some actions. It
specifies the parameters for the managed objects inside the application and
performs operations that would support the expression. The input of a rule
may be many expressions or even a single expression that end in an output of
single object invoking some action.
5. The main difference between SNMPv3 and SNMPv2 is _______
a) Management
b) Integration
c) Classification
d) Enhanced security
Answer: d
Explanation: SNMPv3 has introduced new cryptographic security, through
which confidentiality is provided by encrypting packets and blocking intruders.
It also ensures that the message is coming from a reliable source.
6. In Network Management System, the division that is responsible for
controlling access to network based on a predefined policy is called
_________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
Answer: d
Explanation: Security management is also responsible to provide
confidentiality, authentication and encryption in addition to controlling access
to network. Without security management, the network and its traffic would be
vulnerable to be exploited by attackers.
7. BER stands for ________
a) Basic Encoding Rules
b) Basic Encoding Resolver
c) Basic Encoding Rotator
d) Basic Encoding Router
Answer: a
Explanation: The Basic Encoding Rules are a set of rules that specify the
guidelines to encode the SNMP messages in binary form. Each SNMP
message is encoded into 3 parts namely data, length and type of message.
8. Control of the users’ access to network resources through charges is the
main responsibility of ________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
Answer: c
Explanation: The accounting management keeps track of the users and their
access rights to the network and controls the user’s access by communicating
with the security management. The accounting management takes support of
the Management Information Block to perform its operations.
9. SNMP is the framework for managing devices in an internet using the
______
a) TCP/IP protocol
b) UDP
c) SMTP
d) None
Answer: a
Explanation: SNMP is a management protocol in which a few manager
stations control a set of agents using the TCP/IP protocol suite. SNMP stands
for Simple Network Management Protocol.
10. Structure of Management Information (SMI), is the guideline of ________
a) HTTP
b) SNMP
c) URL
d) MIB
Answer: b
Explanation: SMI was developed by the Storage Networking Industry
Association (SNIA) and it defines a standard that can be manipulated by
SNMP. Basically, it defines the standard format and hierarchy of management
data which is used by the SNMP. It does not describe how the objects are to
be managed.
Answer: a
Explanation: Telnet is an application layer protocol that provides access to the
command-line interface on a remote host. Telnet stands for teletype network.
2. Which amongst the following statements is correct for “character at a time”
mode?
a) Character processing is done on the local system under the control of the
remote system
b) Most text typed is immediately sent to the remote host for processing
c) All text is echoed locally, only completed lines are sent to the remote host
d) All text is processed locally, and only confirmed lines are sent to the remote
host
Answer: b
Explanation: In character at a time mode, the typed text is sent immediately to
the remote host while the user is typing. Another mode used in Telnet is “Old
line by line” mode in which only completed lines are sent to the remote host.
3. _______ allows you to connect and login to a remote computer
a) Telnet
b) FTP
c) HTTP
d) SMTP
Answer: a
Explanation: Telnet provides access to the command-line interface on a
remote computer. One can login to the computer from the command-line
interface.
4. What is the correct syntax to be written in the web browser to initiate a
Telnet connection to www.sanfoundry.com?
a) telnet//www.sanfoundry.com
b) telnet:www.sanfoundry.com
c) telnet://www.sanfoundry.com
d) telnet www.sanfoundry.com
Answer: c
Explanation: telnet://” is the header to be used to initiate a Telnet connection to
a web server. One can browse the website using telnet if they are authorized
to.
5. Telnet is used for _______
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site
Answer: c
Explanation: Telnet is an application layer protocol that provides access to the
command line interface of a remote computer that can be used to perform
remote login.
6. Which one of the following is not correct?
a) telnet is a general purpose client-server program
b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
d) telnet can be used for remote login
Answer: c
Explanation: File Transfer Protocol is used for file transfer. Telnet provides
access to the command-line interface on a remote host.
7. Which operating mode of telnet is full duplex?
a) default mode
b) server mode
c) line mode
d) character mode
Answer: c
Explanation: In line mode, terminal character processing is done on the client
side but editing is enabled on the server side. Line mode reduces the number
of packets and is useful for long delay networks.
8. If we want that a character be interpreted by the client instead of server
_________
a) interpret as command (IAC) escape character has to be used
b) control functions has to be disabled
c) it is not possible
d) cli character has to be used
Answer: a
Explanation: The client must look at each byte that arrives and look for IAC
escape character. If IAC is found, the client moves on to look for any other
code or IAC. If the next byte is IAC – a single byte is presented by the client to
the terminal. If IAC is followed by any other code than IAC, the client interprets
this as a command.
Answer: c
Explanation: TCP port 21 is used for FTP, TCP port 22 is used for SSH and
TCP port 25 is used for SMTP. Telnet provides access to a command line
interface on a remote computer using the TCP port number 23.
2. Which one of the following is not true?
a) telnet defines a network virtual terminal (NVT) standard
b) client programs interact with NVT
c) server translates NVT operations
d) client can transfer files using to remote server using NVT
Answer: d
Explanation: The client can use the NVT only to interact with the programs
already present on the remote server, not to transfer files to it. To transfer files,
an FTP connection has to be used.
3. All telnet operations are sent as ________
a) 4 bits
b) 8 bits
c) 16 bits
d) 32 bits
Answer: b
Explanation: Telnet provides a bi-directional, 8-bit byte oriented
communications facility through which operations are sent as 8-bit bytes for
the server to interpret.
4. AbsoluteTelnet is a telnet client for _______ Operating system.
a) windows
b) linux
c) mac
d) ubuntu
Answer: a
Explanation: AbsoluteTelnet was originally released in 1999. It was developed
by Brian Pence of Celestial Software.
5. The decimal code of Interpret as Command (IAC) character is _______
a) 252
b) 253
c) 254
d) 255
Answer: d
Explanation: If we want that a character be interpreted by the client instead of
server, we use the IAC character. If IAC is followed by any other code than
IAC, the client interprets it as a character.
6. Which of the following is true for character mode operation of telnet
implementation?
a) each character typed is sent by the client to the server
b) each character typed is discarded by the server
c) each character typed is aggregated into a word and then sent to the server
d) each character type is aggregated into a line and then sent to the server
Answer: a
Explanation: In character mode, each character that the user is typing is
immediately sent to the server which then interprets it only after the complete
operation command is received.
7. In which mode of telnet, the client echoes the character on the screen but
does not send it until a whole line is completed?
a) default mode
c) character mode
c) server mode
d) command mode
Answer: a
Explanation: In the default mode, the client does not send each character
typed by the user to the server, thus saving the amount of packet
transmissions required for executing each operation. But the server has to
remain idle until the client sends the completed line wasting a lot of time.
8. Which one of the following is not correct?
a) telnet is a general purpose client-server program
b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
d) telnet can be used for remote login
Answer: c
Explanation: File Transfer Protocol is used for file transfer. Telnet provides
access to the command-line interface on a remote host.
Answer: d
Explanation: TCP is a transport layer protocol that provides reliable and
ordered delivery of a stream of bytes between hosts communicating via an IP
network.
2. In TCP, sending and receiving data is done as _______
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
Answer: a
Explanation: TCP provides stream oriented delivery between hosts
communicating via an IP network and there are no message boundaries. TCP
can concatenate data from a number of send () commands into one stream of
data and still transmit it reliably.
3. TCP process may not write and read data at the same speed. So we need
__________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
Answer: b
Explanation: A TCP receiver has a receive buffer that is used to store the
unprocessed incoming packets in case the sender is sending packets faster
than the processing rate of the received packets.
4. TCP groups a number of bytes together into a packet called _______
a) Packet
b) Buffer
c) Segment
d) Stack
Answer: c
Explanation: A segment may be collection of data from many send ()
statements. TCP transmits each segment as a stream of bytes.
5. Communication offered by TCP is ________
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
Answer: a
Explanation: Data can flow both the directions at the same time during a TCP
communication hence, it is full-duplex. This is the reason why TCP is used in
systems that require full-duplex operation such as e-mail systems.
6. To achieve reliable transport in TCP, ___________ is used to check the safe
and sound arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
Answer: d
Explanation: Acknowledgment mechanism is used to check the safe and
sound arrival of data. The sender actively checks for acknowledgement from
the receiver and once a specific time period has passed, it retransmits the
data.
7. In segment header, sequence number and acknowledgement number fields
refer to _______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
Answer: a
Explanation: As TCP has to ensure ordered delivery of packets, sequence
number and acknowledgement number are used to identify the byte number of
the packet in the stream of bytes being transmitted.
8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte
is numbered 10001. What is the sequence number of the segment if all data is
sent in only one segment?
a) 10000
b) 10001
c) 12001
d) 11001
Answer: b
Explanation: The sequence number given to first byte of a segment, with
respect to its order among the previous segments, is the sequence number of
that segment.
9. Bytes of data being transferred in each connection are numbered by TCP.
These numbers start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
Answer: d
Explanation: One might expect the sequence number of the first byte in the
stream to be 0, or 1. But that does not happen in TCP, Instead, the sender has
to choose an Initial Sequence Number (ISN), which is basically a random 32
bit sequence of 0’s and 1’s, during the connection handshake.
10. The value of acknowledgement field in a segment defines _______
a) sequence number of the byte received previously
b) total number of bytes to receive
c) sequence number of the next byte to be received
d) sequence of zeros and ones
Answer: c
Explanation: The acknowledgement field in a segment defines the sequence
number of the byte which is to be received next i.e. sequence number of byte
that the sender should transmit next.
1. The receiver of the data controls the amount of data that are to be sent by
the sender is referred to as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
Answer: a
Explanation: Flow control is done to prevent the receiver from being
overflowed with data. It is done using various open-loop (prevention) methods
and closed-loop (recovery) methods.
2. Size of TCP segment header ranges between ___________
a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits
Answer: c
Explanation: The size of the header can be 20 bytes at a minimum if there are
no options and can go up to 60 bytes at maximum with 40 bytes in the options
field. The header contains all the control information required to ensure
ordered, error-free and reliable delivery of the segment.
3. Connection establishment in TCP is done by which mechanism?
a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronization
Answer: b
Explanation: A three-way handshake allows both, the server and the client to
choose their Initial Sequence Number and inform about it to the other party.
This won’t be possible using the two-way handshake mechanism.
4. The server program tells its TCP that it is ready to accept a connection. This
process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and
is started by the server. Then the Client picks an ISN (Initial Sequence
Number) and synchronizes (shares) it with the Server requesting a connection.
The Server acknowledges the clients ISN, and then picks an ISN and
synchronizes it with the Client. At last, the Client acknowledges the servers
ISN.
5. A client that wishes to connect to an open server tells its TCP that it needs
to be connected to that particular server. The process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: a
Explanation: This is the second step in the Three-Way Handshaking process
and is done by the client once it finds the open server and picks an ISN. The
Server acknowledges the clients request, and then picks an ISN and
synchronizes it with the Client. At last, the Client acknowledges the servers
ISN.
6. In Three-Way Handshaking process, the situation where both the TCP’s
issue an active open is ___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
Answer: c
Explanation: In simultaneous open situation, two nodes send an SYN signal to
each other and start a TCP connection. Here, both TCP nodes transmit a
SYNC+ACK segment to each other and a connection is established between
them. This doesn’t happen usually, because both sides have to know which
port on the other side to send to.
7. A malicious attacker sends a large number of SYNC segments to a server,
pretending that each of them is coming from a different client by faking the
source IP address in the datagram. Which type of attack is being performed in
this situation?
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
Answer: a
Explanation: SYNC flooding attack is a form of Denial of Service attack. Due to
the overflow of SYNC segments sent to the server, the victims are not able to
request for a connection to the server, thus resulting in Denial of Service.
8. SYNC flooding attack belongs to a type of security attack known as
___________
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
Answer: d
Explanation: During SYNC flooding the system collapses and denies service to
every request, making it a DoS attack. Some other DoS attacks are bandwidth
flooding, connection flooding and UDP flooding.
9. The sizes of source and destination port address in TCP header are
___________ respectively.
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
Answer: b
Explanation: All port addresses are of 16 bits and they specify the type of
service being used by the network entity. For example, port 21 is used for FTP
connections and port 25 is used for ICMP connections.
10. What allows TCP to detect lost segments and in turn recover from that
loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
Answer: b
Explanation: TCP header contains separate fields for sequence number and
acknowledgment number. Comparing these values is what allows TCP to
detect lost segments and in turn recover from that loss. After detecting the lost
segments, the recovery may require retransmission of the lost segments of
data.
Answer: a
Explanation: UDP is an unreliable, connectionless transport layer protocol that
provides message-based data transmission. TCP is an example of connection-
oriented protocols.
2. Return value of the UDP port “Chargen” is _______
a) String of characters
b) String of integers
c) Array of characters with integers
d) Array of zero’s and one’s
Answer: a
Explanation: Using Chargen with UDP on port 19, the server sends a UDP
datagram containing a random number of characters every time it receives a
datagram from the connecting host. The number of characters is between 0
and 512.
3. Beyond IP, UDP provides additional services such as _______
a) Routing and switching
b) Sending and receiving of packets
c) Multiplexing and demultiplexing
d) Demultiplexing and error checking
Answer: d
Explanation: De-multiplexing is the delivering of received segments to the
correct application layer processes at the recipients end using UDP. Error
checking is done through checksum in UDP.
4. What is the main advantage of UDP?
a) More overload
b) Reliable
c) Low overhead
d) Fast
Answer: c
Explanation: As UDP does not provide assurance of delivery of packet,
reliability and other services, the overhead taken to provide these services is
reduced in UDP’s operation. Thus, UDP provides low overhead, and higher
speed.
5. Port number used by Network Time Protocol (NTP) with UDP is ________
a) 161
b) 123
c) 162
d) 124
Answer: b
Explanation: The Network Time Protocol is a clock synchronization network
protocol implemented by using UDP port number 123 to send and receive time
stamps.
6. What is the header size of a UDP packet?
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
Answer: a
Explanation: The fixed size of the UDP packet header is 8 bytes. It contains
four two-byte fields: Source port address, Destination port address, Length of
packet, and checksum.
7. The port number is “ephemeral port number”, if the source host is _______
a) NTP
b) Echo
c) Server
d) Client
Answer: d
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port
numbers in Windows Operating System. Ephemeral port numbers are short-
lived port numbers which can be used for clients in a UDP system where there
are temporary clients all the time.
8. “Total length” field in UDP packet header is the length of _________
a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data
Answer: d
Explanation: Total length is the 16 bit field which contains the length of UDP
header and the data. The maximum value of the Total length field and the
maximum size of a UDP datagram is 65,535 bytes (8 byte header + 65,527
bytes of data).
9. Which is the correct expression for the length of UDP datagram?
a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
d) UDP length = UDP length + UDP header’s length
Answer: a
Explanation: A user datagram is encapsulated in an IP datagram. There is a
field in the IP header that defines the total length of the IP packet. There is
another field in the IP header that defines the length of the header. So if we
subtract the length of the IP header that is encapsulated in the IP packet, we
get the length of UDP datagram.
10. The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port
Answer: b
Explanation: Checksum field is used to detect errors over the entire user
datagram. Though it is not as efficient as CRC which is used in TCP, it gets the
job done for the UDP datagram as UDP doesn’t have to ensure the delivery of
the packet.
1. Which mode of IPsec should you use to assure the security and
confidentiality of data within the same LAN?
a) AH transport mode
b) ESP transport mode
c) ESP tunnel mode
d) AH tunnel mode
Answer: b
Explanation: ESP transport mode should be used to ensure the integrity and
confidentiality of data that is exchanged within the same LAN. ESP tunnel
mode is comparatively more secure and should be used to assure the security
of the data within different LANs.
2. Which two types of encryption protocols can be used to secure the
authentication of computers using IPsec?
a) Kerberos V5
b) SHA
c) MD5
d) Both SHA and MD5
Answer: d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication
protocol, not an encryption protocol; therefore, answer A is incorrect.
Certificates are a type of authentication that can be used with IPsec, not an
encryption protocol; therefore, answer B is incorrect.
3. Which two types of IPsec can be used to secure communications between
two LANs?
a) AH tunnel mode
b) ESP tunnel mode
c) Both AH tunnel mode and ESP tunnel mode
d) ESP transport mode
Answer: c
Explanation: The AH and ESP tunnel mode IPSec should be used for data
transfer purpose, option d is for integrity & confidentiality purpose. Tunnel
mode provides security for the entire original IP packet unlike transport mode
which is not as secure as it only encrypts the data portion and not the whole
packet.
4. ______ provides authentication at the IP level.
a) AH
b) ESP
c) PGP
d) SSL
Answer: a
Explanation: The Authentication Header (AH) authenticates the origin of data,
and guarantees the integrity of the information that’s being sent using IPSec. It
also provides anti-reply security.
5. IPsec defines two protocols: _______ and ________
a) AH; SSL
b) PGP; ESP
c) AH; ESP
d) PGP; SSL
Answer: c
Explanation: AH ensures that there is no retransmission of data from an
unauthorized source, and protects against data tampering. ESP provides with
content protection and ensures that there is integrity and confidentiality for the
message.
6. IP Security operates in which layer of the OSI model?
a) Network
b) Transport
c) Application
d) Physical
Answer: a
Explanation: IPSec is a set of protocols used to provide authentication, data
integrity and confidentiality between two machines in an IP network. In the
TCP/IP model, it provides security at the IP layer i.e. the network layer.
7. ESP does not provide ________
a) source authentication
b) data integrity
c) privacy
d) error control
Answer: d
Explanation: The ESP provides data confidentiality, integrity and
authentication. It provides confidentiality through encryption. ESP can operate
in two modes, transport mode and tunnel mode.
8. In computer security _______ means that computer system assets can be
modified only by authorized parities.
a) confidentiality
b) integrity
c) availability
d) authenticity
Answer: b
Explanation: Integrity means that computer system assets can be modified
only by authorized parities. Confidentiality means that the assets can only be
accessed by authorized parties. Availability refers to the accessibility of the
resource to the authorized parties. Authenticity means that the asset is not
unethically changed.
9. In computer security _______ means that the information in a computer
system only be accessible for reading by authorized parities.
a) confidentiality
b) integrity
c) availability
d) authenticity
Answer: a
Explanation: Confidentiality means that the assets can only be accessed by
authorized parties. Integrity means that computer system assets can be
modified only by authorized parities. Availability refers to the accessibility of
the resource to the authorized parties. Authenticity means that the asset is not
unethically changed.
10. Which of the following organizations is primarily concerned with military
encryption systems?
a) NSA
b) NIST
c) IEEE
d) ITU
Answer: a
Explanation: The NSA is primarily responsible for military encryption systems.
The NSA designs evaluates, and implements encryption systems for the
military and government agencies with high security needs.
Answer: a
Explanation: Open loop congestion control techniques are used to prevent
congestion before it even happens by enforcing certain policies. Closed loop
congestion control techniques are used to treat congestion after it has
happened.
2. In open-loop control, policies are applied to __________
a) Remove after congestion occurs
b) Remove after sometime
c) Prevent before congestion occurs
d) Prevent before sending packets
Answer: c
Explanation: Open loop congestion control techniques are used to prevent
congestion before it even happens by enforcing certain policies.
Retransmission policy, window policy and acknowledgement policy are some
policies that might be enforced.
3. Retransmission of packets must not be done when _______
a) Packet is lost
b) Packet is corrupted
c) Packet is needed
d) Packet is error-free
Answer: d
Explanation: Retransmission refers to the sender having to resend the packet
to the receiver. It needs to be done only when some anomaly occurs with the
packet like when the packet is lost or corrupted.
4. In Go-Back-N window, when the timer of the packet times out, several
packets have to be resent even some may have arrived safe. Whereas in
Selective Repeat window, the sender resends ___________
a) Packet which are not lost
b) Only those packets which are lost or corrupted
c) Packet from starting
d) All the packets
Answer: b
Explanation: In Selective Repeat, the sender side uses a searching algorithm
to find the packets which need to be retransmitted based on the negative
acknowledgements received and then resends only those packets thus saving
bandwidth.
5. Discarding policy is mainly done by _______
a) Sender
b) Receiver
c) Router
d) Switch
Answer: c
Explanation: The discarding policy adopted by the routers mainly states that
the routers discard sensitive or corrupted packets that it receives, thus
controlling the integrity of the packet flow. The discarding policy is adopted as
an open loop congestion control technique.
6. Closed-Loop control mechanisms try to _________
a) Remove after congestion occurs
b) Remove after sometime
c) Prevent before congestion occurs
d) Prevent before sending packets
Answer: a
Explanation: In closed loop congestion control, methods are implemented to
remove congestion after it occurs. Some of the methods used are
backpressure and choke packet.
7. The technique in which a congested node stops receiving data from the
immediate upstream node or nodes is called as _______
a) Admission policy
b) Backpressure
c) Forward signaling
d) Backward signaling
Answer: b
Explanation: In this closed loop congestion control technique, the congested
node propagates in the opposite direction of the data flow to inform the
predecessor node to reduce the flow of packets. This is why this technique is
called a node-to-node congestion control technique.
8. Backpressure technique can be applied only to _______
a) Congestion networks
b) Closed circuit networks
c) Open circuit networks
d) Virtual circuit networks
Answer: d
Explanation: In Virtual circuit networks, each node knows the upstream node
from which a flow data is coming. So, it makes possible for the congested
node to track the source of the congestion and then inform that node to reduce
the flow to remove congestion.
9. The packet sent by a node to the source to inform it of congestion is called
_______
a) Explicit
b) Discard
c) Choke
d) Backpressure
Answer: c
Explanation: Choke packet is sent by a node to the source to inform it of
congestion. Two choke packet techniques can be used for the operation called
hop-by-hop choke packet and source choke packet.
10. In the slow-start algorithm, the size of the congestion window increases
__________ until it reaches a threshold.
a) exponentially
b) additively
c) multiplicatively
d) suddenly
Answer: a
Explanation: In slow-start algorithm, the size of the congestion window
increases exponentially until it reaches a threshold. When it reaches the
threshold, it stops increasing and continues sending packets through the
threshold window thus preventing congestion.
11. In the congestion avoidance algorithm, the size of the congestion window
increases ____________ until congestion is detected.
a) exponentially
b) additively
c) multiplicatively
d) suddenly
Answer: b
Explanation: In the congestion avoidance algorithm, the size of the congestion
window increases additively until congestion is detected. Once congestion is
detected, the size of congestion window is decreased once and then the
packets are transmitted to achieve congestion avoidance.
Answer: d
Explanation: Virtual circuit network is normally implemented in data link layer.
It is a combination of circuit-switched network and datagram network which are
implemented in the physical layer and network layer respectively.
2. The address that is unique in the scope of the network or internationally if
the network is part of an international network is called as ______
a) Global address
b) Network address
c) Physical address
d) IP address
Answer: a
Explanation: Global address is a network address that is unique internationally
and is used as a common address by all the users of the network. It is used to
create a virtual circuit identifier.
3. The Identifier that is used for data transfer in virtual circuit network is called
_______
a) Global address
b) Virtual circuit identifier
c) Network identifier
d) IP identifier
Answer: b
Explanation: A virtual circuit identifier is a type of numeric identifying address
that is used to distinguish between different virtual circuits in a circuit-switched
network. It is used for data transfer and has a switch scope.
4. Which of the following is not a phase of virtual circuit network?
a) Setup phase
b) Data transfer phase
c) Termination phase
d) Teardown phase
Answer: c
Explanation: There are three phases in a virtual circuit network: setup, data
transfer and teardown phase. There is no termination phase in it.
5. Steps required in setup process are ___________
a) Setup request and acknowledgement
b) Setup request and setup response
c) Setup request and setup termination
d) Setup and termination steps
Answer: a
Explanation: Setup request (sent by a source) and acknowledgement (sent by
the destination) are the steps in the setup process. Both the ends’ switches
make table entries during the setup process.
6. During teardown phase, the source, after sending all the frames to
destination, sends a _____ to notify termination.
a) teardown response
b) teardown request
c) termination request
d) termination response
Answer: b
Explanation: The source, after sending all the frames to destination sends
teardown request to which, destination sends teardown response. The
switches then delete the corresponding table entries.
7. Delay of the resource allocated during setup phase during data transfer is
________
a) constant
b) increases for each packet
c) same for each packet
d) different for each packet
Answer: c
Explanation: If a resource is allocated during setup phase, delay is same for
each packet as there is only one-time delay during the setup phase and no
delay during the data transfer phase.
8. Delay of the resource allocated on demand during data transfer is ________
a) constant
b) increases for each packet
c) same for each packet
d) different for each packet
Answer: d
Explanation: If a resource is to be allocated on demand during the data
transfer phase, the delay for each packet would be different depending upon
the resource requirement of the packets.
9. In virtual circuit network, the number of delay times for setup and teardown
respectively are _______
a) 1 and 1
b) 1 and 2
c) 2 and 1
d) 2 and 2
Answer: a
Explanation: There is one-time delay for both setup and teardown phase. The
one-time delay in setup phase is for resource allocation and the one-time
delay in teardown phase is for the de-allocation of the resources.
10. In data transfer phase, how many columns does the table contain?
a) 1
b) 2
c) 3
d) 4
Answer: d
Explanation: The switch maintains a table for each Virtual Circuit Network. In
the data transfer phase, it maintains 2 columns each for incoming data and
outgoing data. The columns are in the following order: Source port, Source
VCI, Destination port, Destination VCI.
Answer: a
Explanation: ATM and frame relay are transmission modes in which
information is transferred through electric circuit layer as packets. ATM has
fixed packet size and frame relay has variable packet size.
2. ATM uses _______________
a) asynchronous frequency division multiplexing
b) asynchronous time division multiplexing
c) asynchronous space division multiplexing
d) asynchronous amplitude division multiplexing
Answer: b
Explanation: ATM uses a constant data stream consisting of transmission cells
to transmit information in a fixed division of time. The packet size remains
fixed.
3. ATM standard defines _______ layers.
a) 2
b) 3
c) 4
d) 5
Answer: b
Explanation: The three layers are physical layer, ATM layer and application
adoption layer. The physical layer corresponds to the physical layer, ATM layer
corresponds to the data link layer and the AAL layer corresponds to the
network layer of the OSI model.
4. ATM can be used for ________
a) local area network
b) wide area network
c) campus area network
d) networks covering any range
Answer: d
Explanation: ATM is a connection oriented network for cell relay which can be
implemented for networks covering any area. It uses Time Division
Multiplexing and supports voice, video and data communications.
5. An ATM cell has the payload field of __________
a) 32 bytes
b) 48 bytes
c) 64 bytes
d) 128 bytes
Answer: b
Explanation: An ATM field contains a header and a payload. The header is of 5
bytes and the payload is of 48 bytes. The size of the header remains fixed.
6. Frame relay has error detection at the ______
a) physical layer
b) data link layer
c) network layer
d) transport layer
Answer: b
Explanation: The Frame Relay header contains an 8-bit Header Error Control
field (HEC). The HEC field contains an 8-bit CRC which is used for error
control.
7. Virtual circuit identifier in frame relay is called ______
a) data link connection identifier
b) frame relay identifier
c) cell relay identifier
d) circuit connection identifier
Answer: a
Explanation: The Data Link Connection Identifier is 10-bit virtual circuit
identifier. It is used to assign frames to the specified Permanent Virtual Circuits
or Switched Virtual Circuits.
8. Frame relay has _______
a) only physical layer
b) only data link layer
c) only network layer
d) both physical and data link layer
Answer: d
Explanation: The physical layer is guided by the protocols recognized by the
ANSI. The data link layer supports the simplified core functions specified by
the OSI model.
9. In frame relay networks, extended address is used _______
a) to increase the range of data link connection identifiers
b) for error detection
c) for encryption
d) for error recovery
Answer: a
Explanation: Extended address is indicated by the last bit of every address
byte in the DLCI. It specifies whether the byte is the last in the addressing
field. It is used to increase the range of data link connection identifiers.
10. What is FRAD in frame relay network?
a) FRAD assembles and disassembles the frames coming from other
protocols
b) FRAD is used for modulation and demodulation
c) FRAD is used for error detection
d) FRAD is used for error recovery
Answer: a
Explanation: FRAD stands for Frame Relay Assembler/Disassembler. It
converts packets into frames that can be transmitted over Frame Relay
Networks. It operates at the physical layer.
Answer: b
Explanation: Frame relay is a standardized wide area network technology and
is popularly used because it is cheaper than leased line WANs. It is also very
simple to configure user equipment in a Frame Relay network.
2. Frame Relay networks offer an option called _______
a) Voice Over For Relay
b) Voice Over Fine Relay
c) Voice On Frame Relay
d) Voice Over Frame Relay
Answer: d
Explanation: Frame Relay networks offer an option called Voice over Frame
Relay, which transmits voice and voice-band data over a Frame Relay
network. It has two sub-protocols FRF11 and FRF12.
3. There are ________ total features of Frame Relay.
a) Five
b) Seven
c) Nine
d) Ten
Answer: c
Explanation: Frame relay is a wide area network technology used to transmit
information over a network in the form of frames using relays. The frames are
of variable size. It is cheaper than other WANs and it’s simple to configure user
equipment in the network.
4. Frame Relay does not provide flow or error control, they must be provided
by the ______
a) Lower Level Protocol
b) Highest Level Protocol
c) Upper Level Protocol
d) Lowest Level Protocol
Answer: c
Explanation: Frame relay only provides error detection using CRC. If errors are
detected, the upper-layer protocols, such as TCP are expected to provide error
correction features. Network layer provides flow control.
5. Frame Relay deploys physical layer carriers such as _______
a) ADMs
b) UPSR
c) BLSR
d) SONET
Answer: d
Explanation: Frame Relays uses carriers such as SONET (for fiber-optic
connections) to physically transmit data frames over a Frame Relay network.
SONET is cheaper and provides better network reliability than other carriers.
6. Frame relay provides error detection at the ______
a) physical layer
b) data link layer
c) network layer
d) transport layer
Answer: b
Explanation: Frame relay provides error detection using CRC in the data link
layer. The transport layer then provides the error correction features if an error
is detected.
Answer: a
Explanation: The Data Link Connection Identifier is 10-bit virtual circuit
identifier. It is used to assign frames to the specified Permanent Virtual Circuits
or Switched Virtual Circuits.
Answer: c
Explanation: The physical layer is guided by the protocols recognized by the
ANSI and provides conversion to frames. The data link layer supports the
simplified core functions specified by the OSI model like error detection.
9. In frame relay networks, extended address is used ________
a) to increase the range of data link connection identifiers
b) for error detection
c) for encryption
d) for error recovery
Answer: a
Explanation: Extended address is indicated by the last bit of every address
byte in the DLCI. It specifies whether the byte is the last in the addressing
field. It is used to increase the range of data link connection identifiers.
10. What is FRAD in frame relay network?
a) FRAD assembles and disassembles the frames coming from other
protocols
b) FRAD is used for modulation and demodulation
c) FRAD is used for error detection
d) FRAD is used for error recovery
Answer: a
Explanation: FRAD stands for Frame Relay Assembler/Disassembler. It
converts packets into frames that can be transmitted over Frame Relay
Networks. It operates at the physical layer.
Answer: b
Explanation: URLs are locators for resources present on the World Wide Web.
A plugin provides extra functionality to the webpage. An extension provides
modification allowance for the core functionality of a webpage. Hyperlink is
piece of icon or image on a web page associated with another webpage.
2. Dynamic web page ______
a) is same every time whenever it displays
b) generates on demand by a program or a request from browser
c) both is same every time whenever it displays and generates on demand by
a program or a request from browser
d) is different always in a predefined order
Answer: b
Explanation: A dynamic web page provides different content every time the
user opens it based on some events like new additions or time of the day.
Languages such as JavaScript are used to respond to client-side events while
languages such as PHP as used to respond to server-side events.
3. What is a web browser?
a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned
Answer: d
Explanation: A web browser is an application program that is used to access
the World Wide Web resources, applications and websites. Some examples of
web browsers are Google Chrome, Internet Explorer and Safari.
4. Common gateway interface is used to _______
a) generate executable files from web content by web server
b) generate web pages
c) stream videos
d) download media files
Answer: a
Explanation: CGI is an interface through servers can run execute console-
based executable files on a web server that generates dynamic web pages. A
CGI script executes only when a request is made. The script then generates
HTML.
5. URL stands for ________
a) unique reference label
b) uniform reference label
c) uniform resource locator
d) unique resource locator
Answer: c
Explanation: The Uniform Resource Locator is a locator for the resource to be
located by HTTP on the World Wide Web. The URL is derived from the
Uniform Resource Identifier.
6. A web cookie is a small piece of data that is _______
a) sent from a website and stored in user’s web browser while a user is
browsing a website
b) sent from user and stored in the server while a user is browsing a website
c) sent from root server to all servers
d) sent from the root server to other root servers
Answer: a
Explanation: A web cookie is a small piece of data sent from a website and
stored in user’s web browser while a user is browsing the website and is used
to remember stateful information about the user’s operations on the website.
This can help the website provide a better browsing experience to the user.
7. Which one of the following is not used to generate dynamic web pages?
a) PHP
b) ASP.NET
c) JSP
d) CSS
Answer: d
Explanation: CSS alone cannot be used to generate dynamic web pages as it
does not provide many event handling functions. It can be used along with
JavaScript to generate dynamic web pages which are visually compelling.
8. An alternative to JavaScript on windows platform is _______
a) VBScript
b) ASP.NET
c) JSP
d) PHP
Answer: a
Explanation: VBScript is a general-purpose, lightweight and active scripting
language which can be used on Microsoft Visual Basic. It was first released in
1996.
9. What is document object model (DOM)?
a) convention for representing and interacting with objects in html documents
b) application programming interface
c) hierarchy of objects in ASP.NET
d) scripting language
Answer: a
Explanation: DOM is a hierarchical model i.e. a tree used to represent an
HTML or XML document. Every node of the tree an object that represents a
part of the document.
10. AJAX stands for _______
a) asynchronous javascript and xml
b) advanced JSP and xml
c) asynchronous JSP and xml
d) advanced javascript and xml
Answer: a
Explanation: AJAX is a group of technologies that works on the client-side to
create asynchronous web applications. It is used to modify only a part of a
webpage and not the whole webpage whenever some event occurs.
Answer: a
Explanation: The Internet Protocol is the networking protocol which establishes
the internet by relaying datagrams across network boundaries. ICMP is a
supporting protocol for IP which handles the Error Reporting functionality.
2. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
Answer: c
Explanation: TOS-type of service identifies the type of packets. It is not related
to fragmentation but is used to request specific treatment such as high
throughput, high reliability or low latency for the IP packet depending upon the
type of service it belongs to.
3. The TTL field has value 10. How many routers (max) can process this
datagram?
a) 11
b) 5
c) 10
d) 1
Answer: c
Explanation: TTL stands for Time to Live. This field specifies the life of the IP
packet based on the number of hops it makes (Number of routers it goes
through). TTL field is decremented by one each time the datagram is
processed by a router. When the value is 0, the packet is automatically
destroyed.
4. If the value in protocol field is 17, the transport layer protocol used is
_____________
a) TCP
b) UDP
c) ICMP
d) IGMP
Answer: b
Explanation: The protocol field enables the demultiplexing feature so that the
IP protocol can be used to carry payloads of more than one protocol type. Its
most used values are 17 and 6 for UDP and TCP respectively. ICMP and
IGMP are network layer protocols.
5. The data field cannot carry which of the following?
a) TCP segment
b) UDP segment
c) ICMP messages
d) SMTP messages
Answer: c
Explanation: Data field usually has transport layer segments, but it can also
carry ICMP messages. SMTP is an application layer protocol. First it must go
through the transport layer to be converted into TCP segments and then it can
be inserted into IP packets.
6. What should be the flag value to indicate the last fragment?
a) 0
b) 1
c) TTl value
d) Protocol field value
Answer: a
Explanation: The Flag field in the IP header is used to control and identify the
fragments. It contains three bits: reserved, don’t fragment and more fragments.
If the more fragments bit is 0, it means that the fragment is the last fragment.
7. Which of these is not applicable for IP protocol?
a) is connectionless
b) offer reliable service
c) offer unreliable service
d) does not offer error reporting
Answer: b
Explanation: IP does not provide reliable delivery service for the data. It’s
dependent upon the transport layer protocols like TCP to offer reliability.
8. Which of the following demerits does Fragmentation have?
a) complicates routers
b) open to DOS attack
c) overlapping of fragments.
d) all of the mentioned
Answer: d
Explanation: Fragmentation makes the implementation of the IP protocol
complex and can also be exploited by attackers to create a DOS attack such
as a teardrop attack. Fragmentation won’t be required if the transport layer
protocols perform wise segmentation.
9. Which field helps to check rearrangement of the fragments?
a) offset
b) flag
c) ttl
d) identifer
Answer: a
Explanation: The Fragment Offset field specifies where the fragment fits in the
original datagram. The offset of the first fragment will always be 0. The size of
the field (13 bits) is 3-bits shorter than the size of the total length field (16 bits).
Answer: b
Explanation: IP does not provide reliable delivery service for the data. It’s
dependent upon the transport layer protocols like TCP to offer reliability.
2. Which of the following demerits does Fragmentation have?
a) Complicates routers
b) Open to DOS attack
c) Overlapping of fragments
d) All of the mentioned
Answer: d
Explanation: Fragmentation makes the implementation of the IP protocol
complex and can also be exploited by attackers to create a DOS attack such
as a teardrop attack. Fragmentation won’t be required if the transport layer
protocols perform wise segmentation.
3. Which field helps to check rearrangement of the fragments?
a) Offset
b) Flag
c) TTL
d) Identifier
Answer: a
Explanation: The Fragment Offset field specifies where the fragment fits in the
original datagram. The offset of the first fragment will always be 0. The size of
the field (13 bits) is 3-bits shorter than the size of the total length field (16 bits).
4. In classless addressing, there are no classes but addresses are still granted
in ______
a) IPs
b) Blocks
c) Codes
d) Sizes
Answer: b
Explanation: In classless addressing, there are no classes but addresses are
still granted in blocks. The total number of addresses in a block of classless IP
addresses = 2(32 – CIDR_value).
5. In IPv4 Addresses, classful addressing is replaced with ________
a) Classless Addressing
b) Classful Addressing
c) Classful Advertising
d) Classless Advertising
Answer: a
Explanation: Classful addressing is replaced with classless addressing as a
large ratio of the available addresses in a class in calssful addressing is
wasted. In classless addressing, one can reserve the number of IP addresses
required by modifying the CIDR value and make sure that not many addresses
are wasted.
6. First address in a block is used as network address that represents the
________
a) Class Network
b) Entity
c) Organization
d) Codes
Answer: c
Explanation: First address in a block is used as network address that
represents the organization. The network address can be found by AND’ing
any address in the block by the default mask. The last address in a block
represents the broadcast address.
7. In classful addressing, a large part of available addresses are ________
a) Organized
b) Blocked
c) Wasted
d) Communicated
Answer: c
Explanation: In classful addressing, a large part of available addresses are
wasted. Thus to solve this classful addressing is replaced with classless
addressing where one can reserve the number of IP addresses required by
modifying the CIDR value and make sure that not many addresses are
wasted.
8. Network addresses are a very important concept of ________
a) Routing
b) Mask
c) IP Addressing
d) Classless Addressing
Answer: c
Explanation: Network addresses are a very important concept of IP
addressing. The first address in a block is used as network address that
represents the organization. The network address can be found by AND’ing
any address in the block or class by the default mask.
9. Which of this is not a class of IP address?
a) Class E
b) Class C
c) Class D
d) Class F
Answer: d
Explanation: Class F is not a class of IP addressing. There are only five
classes of IP addresses: Class A (0.0.0.0 to 127.255.255.255), Class B
(128.0.0.0 to 191.255.255.255), Class C (192.0.0.0 to 223.255.255.255), Class
D (224.0.0.0 to 239.255.255.255), and Class E (240.0.0.0 to
255.255.255.255).
Answer: b
Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340
undecillion addresses are possible in IPv6. IPv4 has only 4 billion possible
addresses and IPv6 would be a brilliant alternative in case IPv4 runs out of
possible new addresses.
2. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes, which results
in faster processing of the datagram. There is one fixed header and optional
headers which may or may not exist. The fixed header contains the mandatory
essential information about the packet while the optional headers contain the
optional “not that necessary” information.
3. In the IPv6 header, the traffic class field is similar to which field in the IPv4
header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
Answer: c
Explanation: The traffic class field is used to specify the priority of the IP
packet which is a similar functionality to the Type of Service field in the IPv4
header. It’s an 8-bit field and its values are not defined in the RFC 2460.
4. IPv6 does not use _________ type of address.
a) broadcast
b) multicast
c) anycast
d) unicast
Answer: a
Explanation: There is no concept of broadcast address in IPv6. Instead, there
is an anycast address in IPv6 which allows sending messages to a group of
devices but not all devices in a network. Anycast address is not standardized
in IPv4.
5. Which among the following features is present in IPv6 but not in IPv4?
a) Fragmentation
b) Header checksum
c) Options
d) Anycast address
Answer: d
Explanation: There is an anycast address in IPv6 which allows sending
messages to a group of devices but not all devices in a network. Anycast
address is not standardized in IPv4.
6. The _________ field determines the lifetime of IPv6 datagram
a) Hop limit
b) TTL
c) Next header
d) Type of traffic
Answer: a
Explanation: The Hop limit value is decremented by one by a router when the
datagram is forwarded by the router. When the value becomes zero the
datagram is discarded. The field is 8-bits wide, so an IPv6 packet can live up
to 255 router hops only.
7. Dual-stack approach refers to _________
a) implementing Ipv4 with 2 stacks
b) implementing Ipv6 with 2 stacks
c) node has both IPv4 and IPv6 support
d) implementing a MAC address with 2 stacks
Answer: c
Explanation: Dual-stack is one of the approaches used to support IPv6 in
already existing systems. ISPs are using it as a method to transfer from IPv4
to IPv6 completely eventually due to the lower number of possible available
addresses in IPv4.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but
they are connected to each other by intervening IPv4 routers. The best
solution here is ________
a) Use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
Answer: b
Explanation: The IPv4 routers can form a tunnel in which at the sender’s side,
the IPv6 datagram is encapsulated in to IPv4, and at the receiver’s side of the
tunnel, the IPv4 packet is stripped and the IPv6 packet is sent to the receiver.
9. Teredo is an automatic tunneling technique. In each client the obfuscated
IPv4 address is represented by bits ______
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
Answer: a
Explanation: Teredo is a technique through which gives the possibility for full
IPv6 network connectivity to IPv6 capable hosts which are currently on an IPv4
network. Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address
of the IPv4 network.
Answer: c
Explanation: Dual-stack is one of the approaches used to support IPv6 in
already existing systems. ISPs are using it as a method to transfer from IPv4
to IPv6 completely eventually due to the lower number of possible available
addresses in IPv4.
2. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but
they are connected to each other by intervening IPv4 routers. The best
solution here is ________
a) Use dual-stack approach
b) Tunneling
c) No solution
d) Replace the system
Answer: b
Explanation: The IPv4 routers can form a tunnel in which at the sender’s side,
the IPv6 datagram is encapsulated in to IPv4, and at the receiver’s side of the
tunnel, the IPv4 packet is stripped and the IPv6 packet is sent to the receiver.
3. Teredo is an automatic tunneling technique. In each client the obfuscated
IPv4 address is represented by bits ______
a) 96 to 127
b) 0 to 63
c) 80 to 95
d) 64 to 79
Answer: a
Explanation: Teredo is a technique through which gives the possibility for full
IPv6 network connectivity to IPv6 capable hosts which are currently on an IPv4
network. Bits 96 to 127 in the datagram represents obfuscated 1Pv4 address
of the IPv4 network.
4. A link local address of local addresses is used in an _______
a) Isolated router
b) Isolated mask
c) Isolated subnet
d) Isolated net
Answer: c
Explanation: Isolated subnet is very huge sharing network area in this link local
address of local addresses is used. A link local address can be configured on
any subnet with the prefix “FE80::”.
5. In subcategories of reserved address in IPv6, address that is used by a host
to test itself without going into network is called _________
a) Unspecified address
b) Loopback address
c) Compatible address
d) Mapped address
Answer: b
Explanation: In subcategories of reserved address in IPv6, address that is
used by a host to test itself without going into network is called loop back
address. IPv6 loopback address is
0000:0000:0000:0000:0000:0000:0000:0001. IPv4 loopback address is
127.0.0.1. It’s a reserved address.
6. A few leftmost bits in each address of IPv6 address define its category is
called ________
a) Prefix type
b) Postfix type
c) Reserved type
d) Local type
Answer: a
Explanation: Prefix is the bits in the IP address which are placed in leftmost
position. A network prefix in IPv6 is given by a CIDR format-liked number at
the end of the address.
7. In IPv6 addresses, addresses that start with eight 0s are called ________
a) Unicast addresses
b) Multicast addresses
c) Any cast addresses
d) Reserved addresses
Answer: d
Explanation: In IPv6 address format, the starting bits are specified with eight
0s to represent reserved addresses. These reserved addresses have a certain
function pre-defined like the loop-back address is used to test a network card.
Reserved addresses cannot be allotted to a machine.
8. Which statement(s) about IPv6 addresses are true?
a) Leading zeros are required
b) Two colons (::) are used to represent successive hexadecimal fields of
zeros
c) Two colons (::) are used to separate fields
d) A single interface cannot have multiple IPv6 addresses of different types
Answer: b
Explanation: In order to shorten the written length of an IPv6 address,
successive fields of zeros may be replaced by double colons. In trying to
shorten the address further, leading zeros may also be removed. Just as with
IPv4, a single device’s interface can have more than one address; with IPv6
there are more types of addresses and the same rule applies. There can be
link-local, global unicast, and multicast addresses all assigned to the same
interface.
9. When was IPv6 launched?
a) June 2, 2012
b) June 4, 2012
c) June 5, 2012
d) June 6, 2012
Answer: d
Explanation: IPv6 is the latest version of the Internet Protocol released on 6th
June 2012. An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340
undecillion addresses are possible in IPv6.
Answer: c
Explanation: The transport layer is responsible for process-to-process delivery,
error control and flow control. It provides an interface for the implementation of
process to process delivery through ports. There are 65,535 port numbers.
2. In process-to-process delivery, two processes communicate in which of the
following methods?
a) Client/Server
b) Source/Destination
c) Message Transfer
d) Peer to Peer
Answer: a
Explanation: The most common method used for this communication is Client/
Server. The client requests a service through a particular port number to the
port of the server using its socket address. Then the server responds by giving
the requested service to the client port.
3. Multiple processes on destinations at transport layer are identified by
__________
a) Mac address
b) Port number
c) Host number
d) Host address
Answer: b
Explanation: Multiple processes on destinations are identified by a transport
layer address also called as port number. The IP address along with the port
number is called the socket address.
4. Range of port numbers in Internet model is __________
a) 0 and 32,765(8-bit)
b) 0 and 32,765(16-bit)
c) 0 and 65,535(32-bit)
d) 0 and 65,535(16-bit)
Answer: d
Explanation: Port numbers are 16-bit integers between 0 and 65,535. They are
an interface for the implementation of process to process delivery for the
transport layer.
5. According to Internet Assigned Numbers Authority (IANA), which of the
following ranges is not a part of port number ranges?
a) Well-known ports
b) Registered ports
c) Dynamic ports
d) Static ports
Answer: d
Explanation: IANA divided port numbers into three ranges i.e., Well-known,
Registered and Dynamic ports. Well-known port numbers range from 0 to
1023, registered port numbers are from 1024 to 49151 and dynamic port
numbers are from 49152 to 65535.
6. The combination of an IP address and port number is called as ________
a) Socket address
b) Port address
c) MAC address
d) Host address
Answer: a
Explanation: Socket address is the combination of an IP address and a port
number and it is used to define the client-end and server-end processes
uniquely.
7. Which of the following is false with respect to Connectionless service of
transport layer protocol?
a) Packets are not numbered
b) Packets are not delayed
c) No acknowledgement
d) Packet may arrive out of sequence
Answer: b
Explanation: There is a high probability in connectionless services like UDP
that the packet gets delayed or lost because there is no connection made
between the two end nodes. No connection means that there is no unique
pathway for the packets to travel.
8. Correct order in the process of Connection-Oriented services is ________
i. Data transfer
ii. Connection release
iii. Connection establishment
a) i-ii-iii
b) iii-ii-i
c) ii-i-iii
d) iii-i-ii
Answer: d
Explanation: First the client has to request a connection and the server has to
accept the connection to establish a connection. Then data transfer can start
between the two ends. Then both client and server need to terminate their
ends to terminate the connection.
9. In transport layer, Multiplexing is done at _________
a) Channel
b) Receiver site
c) Sender site
d) Packet
Answer: c
Explanation: At the sender’s side, there are multiple processes which may
want to send packets. But there is only one transport layer protocol like TCP or
UDP working at a time. So the transport layer protocol gets the messages from
these processes and separates them with different port numbers. This process
is called multiplexing and it is done before sending packets to the receivers
side.
10. The process of error checking and dropping of the header, delivering
messages to appropriate process based on port number is called as _______
a) Delivery of packets
b) Error correction
c) Multiplexing
d) Demultiplexing
Answer: d
Explanation: Demultiplexing is the process of error checking and dropping of
the header, delivering messages to appropriate process based on port
number. The transport layer does this on the receiver’s end after the packet is
received and takes help of the header attached by the sender’s side transport
layer during multiplexing.
Answer: a
Explanation: An ICMP message has an 8-byte header and a variable size data
section. Out of the 8 bytes, the first 4 bytes are of a fixed format having the
type, code and checksum fields and the next 4 bytes depend upon the type of
the message.
3. During error reporting, ICMP always reports error messages to ________
a) Destination
b) Source
c) Next router
d) Previous router
Answer: b
Explanation: ICMP notifies the source about the error when an error is
detected because the datagram knows information about source and
destination IP address. The source can then retransmit the data again or try to
correct those errors.
4. Which of these is not a type of error-reporting message?
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
Answer: c
Explanation: Router error is not a type of error-reporting message in ICMP.
The type of error reporting message is specified in the ICMP header.
Destination unreachable is type 3 error message, source quench is type 4, and
time exceeded is type 11 error message.
5. ICMP error message will not be generated for a datagram having a special
address such as _______
a) 127.0.0.0
b) 12.1.2
c) 11.1
d) 127
Answer: a
Explanation: 127.0.0.0 is a special address known as the loopback address
which is used for testing purpose of a machine without actually communicating
with a network. Thus no error reporting message will be generated for such
special addresses.
6. When a router cannot route a datagram or host cannot deliver a datagram,
the datagram is discarded and the router or the host sends a ____________
message back to the source host that initiated the datagram.
a) Destination unreachable
b) Source quench
c) Router error
d) Time exceeded
Answer: a
Explanation: Router sends destination unreachable message if the destination
is not found. Destination unreachable is type 3 error reporting message. It is
invoked when the router can’t find a path to the intended destination to forward
the packet through.
7. The source-quench message in ICMP was designed to add a kind of
____________ to the IP.
a) error control
b) flow control
c) router control
d) switch control
Answer: b
Explanation: Firstly, it informs the source that the datagram has been
discarded. Secondly, it warns the source that there is congestion in the
network. It’s type 4 error reporting message after which the source is expected
to reduce the flow of packets.
8. In case of time exceeded error, when the datagram visits a router, the value
of time to live field is _________
a) Remains constant
b) Decremented by 2
c) Incremented by 1
d) Decremented by 1
Answer: d
Explanation: This field will be decremented by 1 at every router, and will be
zero by the time it reaches source. This error reporting message is type 11 and
is used to prevent the router from travelling forever in case some unknown
path anomaly occurs.
9. Two machines can use the timestamp request and timestamp replay
messages to determine the ___________ needed for an IP datagram to travel
between them.
a) Half-trip time
b) Round-trip time
c) Travel time for the next router
d) Time to reach the destination/source
Answer: b
Explanation: The round-trip time refers to the total time taken combining the
time taken for a packet sent from a source to reach a destination and the time
taken the acknowledgement sent by the destination to reach the source. The
Router sends destination unreachable message if the destination is not found.
10. During debugging, we can use the ____________ program to find if a host
is alive and responding.
a) traceroute
b) shell
c) ping
d) java
Answer: c
Explanation: Ping program is used to find if a host is alive and responding. It is
to be entered into a command line with the syntax “ping (IP address)” to be
executed. Traceroute is a program used to find the shortest route to the
destination IP.
11. In windows ____________ can be used to trace the route of the packet
from the source to the destination.
a) traceroute
b) tracert
c) ping
d) locater
Answer: b
Explanation: Tracert is used in case of windows, whereas Traceroute in UNIX.
Tracert is a program used to find the shortest route to the destination IP. The
Router sends destination unreachable message if a path to the destination IP
is not found.
12. In a simple echo-request message, the value of the sum is 01010000
01011100. Then, value of checksum is ___________
a) 10101111 10100011
b) 01010000 01011100
c) 10101111 01011100
d) 01010000 10100011
Answer: a
Explanation: The sender side adds the bits of the fragmented packet to find a
sum. Checksum is the compliment of the sum (exchange 0’s and 1’s). The
receiver then has to verify the checksum by adding the bits of the received
packet to ensure that the packet is error-free.
Answer: a
Explanation: Due to huge number of systems on the internet and the lower
number of available addresses on IPv4, transition from IPv4 to IPv6 needs to
happen. IPv4 provides around 4 billion unique IP addresses whereas IPv6
provides over 340 undecillion unique IP addresses.
2. Which of the following is not a transition strategy?
a) Dual stack
b) Tunneling
c) Conversion
d) Header translation
Answer: c
Explanation: As IPv4 addresses are of 32 bits and IPv6 addresses are of 128
bits, it is not possible to convert IPv4 address to IPv6 address. So, Dual stack,
tunneling and header translation are the three strategies which might help in
the transition from IPv4 to IPv6.
3. To determine which version to use when sending a packet to a destination,
the source host queries which of the following?
a) Dual stack
b) Domain Name Server
c) Header information
d) Transport layer
Answer: b
Explanation: Source host queries DNS to determine which version to use
when sending a packet to a destination. The DNS contains both, the IPv4 and
IPv6 addresses of the modern dual stack host servers.
4. The strategy used when two computers using IPv6 want to communicate
with each other and the packet must pass through a region that uses IPv4 is
______________
a) Dual stack
b) Header translation
c) Conversion
d) Tunneling
Answer: d
Explanation: In tunneling, The IPv4 routers can form a tunnel in which at the
sender’s side, the IPv6 datagram is encapsulated in to IPv4, and at the
receiver’s side of the tunnel, the IPv4 packet is stripped and the IPv6 packet is
sent to the receiver.
5. The correct format of packet in tunnel that uses IPv4 region is ________
i. IPv6 header
ii. Payload
iii. IPv4 header
a) iii-i-ii
b) iii-ii-i
c) i-ii-iii
d) i-iii-ii
Answer: a
Explanation: At the sender’s side, the IPv6 datagram is encapsulated in to
IPv4 i.e. An IPv4 header is inserted on top of the IPv6 header, and then the
packet is sent through the tunnel.
6. ___________ is necessary when the sender wants to use IPv6, but the
receiver does not understand IPv6.
a) Dual stack
b) Header translation
c) Conversion
d) Tunneling
Answer: b
Explanation: Header translation is used when the sender wants to use IPv6,
but the receiver does not understand IPv6. It is made possible through a
Network Address Translation – Protocol Translation enabled device such as a
gateway.
7. Header translation uses ___________ to translate an IPv6 address to an
IPv4 address.
a) IP address
b) Physical address
c) Mapped address
d) MAC address
Answer: c
Explanation: A mapped IPv6 address contains the IPv4 address in its last 32-
bits and is preceded by 16 1s and 80 0s. It can be used to translate an IPv6
address to an IPv4 address.
8. Which of the following is not a step in the Header translation procedure?
a) The IPv6 mapped address is changed to an IPv4 address by extracting the
rightmost 32bits
b) The value of the IPv6 priority field is discarded
c) The type of service field in IPv4 is set to zero
d) The IPv6 flow label is considered
Answer: d
Explanation: In the header translation procedure, first the IPv6 mapped
address is changed to an IPv4 address by extracting the rightmost 32bits, then
the value of the IPv6 priority field is discarded, and finally the ToS field in the
IPv4 header is set to zero. IPv6 flow label is ignored in the procedure.
Answer: a
Explanation: The Internet Protocol is the networking protocol that establishes
the internet by relaying datagram across network boundaries. ICMP is a
supporting protocol for IP which handles the Error Reporting functionality.
2. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
Answer: c
Explanation: TOS-type of service identifies the type of packets. It is not related
to fragmentation but is used to request specific treatment such as high
throughput, high reliability or low latency for the IP packet depending upon the
type of service it belongs to.
3. The TTL field has value 10. How many routers (max) can process this
datagram?
a) 11
b) 5
c) 10
d) 1
Answer: c
Explanation: TTL stands for Time to Live. This field specifies the life of the IP
packet based on the number of hops it makes (Number of routers it goes
through). TTL field is decremented by one each time the datagram is
processed by a router. When the value is 0, the packet is automatically
destroyed.
4. If the value in protocol field is 17, the transport layer protocol used is
_________
a) TCP
b) UDP
c) ICMP
d) IGMP
Answer: b
Explanation: The protocol field enables the demultiplexing feature so that the
IP protocol can be used to carry payloads of more than one protocol type. Its
most used values are 17 and 6 for UDP and TCP respectively. ICMP and
IGMP are network layer protocols.
Answer: a
Explanation: The Fragment Offset field specifies where the fragment fits in the
original datagram. The offset of the first fragment will always be 0. The size of
the field (13 bits) is 3-bits shorter than the size of the total length field (16 bits).
6. The size of an IP address in IPv6 is _________
a) 4bytes
b) 128bits
c) 8bytes
d) 100bits
Answer: b
Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340
undecillion unique addresses are available in IPv6. IPv4 has only 4 billion
possible addresses and IPv6 would be a brilliant alternative in case IPv4 runs
out of possible new addresses.
8. In an IPv6 header, the traffic class field is similar to which field in the IPv4
header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field
Answer: c
Explanation: The traffic class field is used to specify the priority of the IP
packet which is a similar functionality to the Type of Service field in the IPv4
header. It’s an 8-bit field and its values are not defined in the RFC 2460.
Answer: a
Explanation: There is no concept of broadcast address in IPv6. Instead, there
is an anycast address in IPv6 which allows sending messages to a group of
devices but not all devices in a network. Anycast address is not standardized
in IPv4.
10. Which are the features present in IPv4 but not in IPv6?
a) Fragmentation
b) Header checksum
c) Options
d) Anycast address
Answer: d
Explanation: There is an anycast address in IPv6 which allows sending
messages to a group of devices but not all devices in a network. Anycast
address is not standardized in IPv4.
Answer: c
Explanation: In this case, the class B network ID is 172.16.0.0. We know that
the default mask of a class B network is 255.255.0.0. If we OR any address in
a network with the complement of the default mask (0.0.255.255), we get the
broadcast address of the network. In this case, the result of OR would be
172.16.255.255.
Answer: b
Explanation: We know that the prefix 172 lies in class B (128 to 191) of IPv4
addresses. From the subnet mask, we get that the class is divided into 2
subnets: 172.16.13.0 to 172.16.13.127 and 172.16.13.128 to 172.16.13.255.
The IP 172.16.13.5 lies in the first subnet. So the starting address 172.16.13.0
is the subnet address and last address 172.16.13.127 is the broadcast
address.
3. If you wanted to have 12 subnets with a Class C network ID, which subnet
mask would you use?
a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248
Answer: c
Explanation: If you have eight networks and each requires 10 hosts, you would
use the Class C mask of 255.255.255.240. Why? Because 240 in binary is
11110000, which means you have four subnet bits and four host bits. Using our
math, we’d get the following:
24-2=14 subnets
24-2=14 hosts.
4. The combination of _________ and __________ is often termed the local
address of the local portion of the IP address.
a) Network number and host number
b) Network number and subnet number
c) Subnet number and host number
d) Host number
Answer: c
Explanation: It is termed as the local address because the address won’t be
applicable outside the subnet. Sub networking is implemented for remote
sensing in transparent way from that host which is contained in the sub
network which called a local operation.
5. _________ implies that all subnets obtained from the same subnet mask.
a) Static subnetting
b) Dynamic subnetting
c) Variable length subnetting
d) Dynamic length subnetting
Answer: a
Explanation: Static subnetting is used when the requirement is of same
number of hosts in each subnet for the institution. The same subnet mask can
be used to find the subnet id of each subnet. It is usually used to divide large
networks into smaller parts.
6. State whether true or false.
i) A connection oriented protocol can only use unicast addresses.
ii) The any cast service is included in IPV6.
a) True, True
b) True, False
c) False, True
d) False, False
Answer: a
Explanation: In a connection oriented protocol, the host can only establish
connection with another host on one unique channel, that’s why it can only use
unicast addresses. In IPv6, there is an anycast address in IPv6 which allows
sending messages to a group of devices but not all devices in a network.
7. __________ is a high performance fiber optic token ring LAN running at 100
Mbps over distances upto 1000 stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR
Answer: a
Explanation: FDDI stands for Fiber Distributed Data Interface. It is a set of
standards for fiber optic token ring LANs running at 100 Mbps over distances
up to 200 km in diameter and 1000 stations connected.
8. Which of the following are Gigabit Ethernets?
a) 1000 BASE-SX
b) 1000 BASE-LX
c) 1000 BASE-CX
d) All of the mentioned
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a
term describing various technologies for transmitting Ethernet frames at a rate
of a gigabit per second (1,000,000,000 bits per second), as defined by the
IEEE 802.3-2008 standard. It came into use beginning in 1999, gradually
supplanting Fast Ethernet in wired local networks, as a result of being
considerably faster.
9. _________ is a collective term for a number of Ethernet Standards that
carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet
speed of 10 Mbit/s.
a) Ethernet
b) Fast Ethernet
c) Gigabit Ethernet
d) Gigabyte Ethernet
Answer: b
Explanation: Fast Ethernet is a set of Ethernet Standards which were
introduced in 1995, that carry traffic at the nominal rate of 1000 Mbit/s.
100BASE-TX is the most commonly used Fast Ethernet standard.
10. _________ is another kind of fiber optic network with an active star for
switching.
a) S/NET
b) SW/NET
c) NET/SW
d) FS/NET
Answer: a
Explanation: A 50-MBd active star fiber optical Local area network (LAN) and
its optical combiner and mixing rod splitter are presented. The limited power
budget and relatively large tapping losses of light wave technology, which limit
the use of fiber optics in tapped bus LAN topologies, are examined and proven
tolerable in optical star topologies.
Answer: d
Explanation: First, if you have two hosts directly connected, as shown in the
graphic, then you need a crossover cable. A straight-through cable won’t work.
Second, the hosts have different masks, which puts them in different subnets.
The easy solution is just to set both masks to 255.255.255.0 (/24).
2. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which
of the following can be valid host IDs on the LAN interface attached to the
router?
i. 172.16.1.100
ii. 172.16.1.198
iii. 172.16.2.255
iv. 172.16.3.0
a) i only
b) ii and iii only
c) iii and iv only
d) ii only
Answer: c
Explanation: The router’s IP address on the E0 interface is 172.16.2.1/23,
which is 255.255.254.0. This makes the third octet a block size of 2. The
router’s interface is in the 172.16.2.0 subnet, and the broadcast address is
172.16.3.255 because the next subnet is 172.16.4.0. The valid host range is
172.16.2.1 to 172.16.3.254. The router is using the first valid host address in
the range.
3. Which two statements describe the IP address 10.16.3.65/23?
i. The subnet address is 10.16.3.0 255.255.254.0.
ii. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
iii. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
iv. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
a) i and iii
b) ii and iv
c) i, ii and iv
d) ii, iii and iv
Answer: b
Explanation: The mask 255.255.254.0 (/23) used with a Class A address
means that there are 15 subnet bits and 9 host bits. The block size in the third
octet is 2 (256 – 254). So this makes the subnets in the interesting octet 0, 2,
4, 6, etc., all the way to 254. The host 10.16.3.65 is in the 10.16.2.0 subnet.
The next subnet is 10.16.4.0, so the broadcast address for the 10.16.2.0
subnet is 10.16.3.255. The valid host addresses are 10.16.2.1 to 10.16.3.254.
4. What is the maximum number of IP addresses that can be assigned to
hosts on a local subnet that uses the 255.255.255.224 subnet mask?
a) 14
b) 15
c) 16
d) 30
Answer: d
Explanation: A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8
subnets, each with 30 hosts. Does it matter if this mask is used with a Class A,
B, or C network address? Not at all. The number of host bits would never
change.
5. You need to subnet a network into 5 subnets, each with at least 16 hosts.
Which classful subnet mask would you use?
a) 255.255.255.192
b) 255.255.255.224
c) 255.255.255.240
d) 255.255.255.248
Answer: b
Explanation: You need 5 subnets, each with at least 16 hosts. The mask
255.255.255.240 provides 16 subnets with 14 hosts which is less than 15, so
this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30
hosts so this may work. The mask 255.255.255.192 provides 4 subnets, each
with 60 hosts so this may work. Comparing both the possible masks,
255.255.255.224 provides the best answer.
6. You have a network that needs 29 subnets while maximizing the number of
host addresses available on each subnet. How many bits must you borrow
from the host field to provide the correct subnet mask?
a) 2
b) 3
c) 4
d) 5
Answer: d
Explanation: A 240 mask is 4 subnet bits and provides 16 subnets, each with
14 hosts. We need more subnets, so let’s add subnet bits. One more subnet
bit would be a 248 mask. This provides 5 subnet bits (32 subnets) with 3 host
bits (6 hosts per subnet). This is the best answer.
7. If an Ethernet port on a router were assigned an IP address of
172.16.112.1/25, what would be the valid subnet address of this host?
a) 172.16.112.0
b) 172.16.0.0
c) 172.16.96.0
d) 172.16.255.0
Answer: a
Explanation: A /25 mask is 255.255.255.128. Used with a Class B network, the
third and fourth octets are used for subnetting with a total of 9 subnet bits, 8
bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the
fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in
the question is in the 0 subnet, which has a broadcast address of 127 since
128 is the next subnet
8. You have an interface on a router with the IP address of 192.168.192.10/29.
Including the router interface, how many hosts can have IP addresses on the
LAN attached to the router interface?
a) 6
b) 8
c) 30
d) 32
Answer: a
Explanation: A /29 (255.255.255.248), regardless of the class of address, has
only 3 host bits. Six hosts are the maximum number of hosts on this LAN,
including the router interface. Out of the 8 addresses possible with the host
bits, the first and the last address are for the subnet id and broadcast address
respectively.
9. What is the subnet id of a host with an IP address 172.16.66.0/21?
a) 172.16.36.0
b) 172.16.48.0
c) 172.16.64.0
d) 172.16.0.0
Answer: c
Explanation: A /21 is 255.255.248.0, which means we have a block size of 8 in
the third octet, so we just count by 8 until we reach 66. The subnet in this
question is 64.0. The next subnet is 72.0, so the broadcast address of the 64
subnet is 71.255.
10. The network address of 172.16.0.0/19 provides how many subnets and
hosts?
a) 7 subnets, 30 hosts each
b) 8 subnets, 8,190 hosts each
c) 8 subnets, 2,046 hosts each
d) 7 subnets, 2,046 hosts each
Answer: b
Explanation: A CIDR address of /19 is 255.255.224.0. This is a Class B
address, so that is only 3 subnet bits, but it provides 13 host bits, or 8 subnets,
each with 8,190 hosts.
1. Which type of Ethernet framing is used for TCP/IP and DEC net?
a) Ethernet 802.3
b) Ethernet 802.2
c) Ethernet II
d) Ethernet SNAP
Answer: c
Explanation: The Ethernet 802.3 framing is used for NetWare versions 2 to
3.11, and the Ethernet 802.2 framing is used for NetWare versions 3.12 and
later plus OSI routing, Ethernet II is used with TCP/IP and DEC net, and
Ethernet SNAP is used with TCP/IP and AppleTalk. The type field in Ethernet
802.2 frame is replaced by a length field in Ethernet 802.3.
2. Consider a situation in which you are a system administrator on a NetWare
network, you are running NetWare 4.11 and you cannot communicate with
your router. What is the likely problem?
a) NetWare 4.11 defaults to 802.2 encapsulation
b) NetWare 4.11 defaults to 802.3 encapsulation
c) Cisco routers only work with NetWare 3.11
d) NetWare 3.11 defaults to 802.2 encapsulation
Answer: a
Explanation: The default encapsulation on Cisco routers is Novell
Ethernet_802.3 and NetWare 3.12and later defaults to 802.2 encapsulation,
3.11 and earlier defaults to 802.3.
3. NetWare IPX addressing uses a network number and a node number.
Which statement is not true?
a) The network address is administratively assigned and can be up to 16
hexadecimal digits long
b) The node address is always administratively assigned
c) The node address is usually the MAC address
d) If the MAC address is used as the node address, then IPX eliminates the
use of ARP
Answer: b
Explanation: The network address can be up to 16 hexadecimal digits in
length. The node number is 12 hexadecimal digits. The node address is
usually the MAC address. An example IPX address is 4a1d.0000.0c56.de33.
The network part is 4a1d. The node part is 0000.0c56.de33. The network
number is assigned by the system administrator of the Novell network and the
MAC address/node address is not assigned by the administrator.
4. Which NetWare protocol works on layer 3–network layer—of the OSI
model?
a) IPX
b) NCP
c) SPX
d) NetBIOS
Answer: a
Explanation: IPX (Internetwork Packet Exchange) is the NetWare network
layer 3 protocol used for transferring information on LANs that use Novell’s
NetWare.
5. Which NetWare protocol provides link-state routing?
a) NLSP
b) RIP
c) SAP
d) NCP
Answer: a
Explanation: NetWare Link Services Protocol (NLSP) provides link-state
routing. SAP (Service Advertisement Protocol) advertises network services.
NCP (NetWare Core Protocol) provides client-to-server connections and
applications. RIP is a distance vector routing protocol. NLSP was developed
by Novell to replace RIP routing protocols.
6. As a system administrator, you want to debug IGRP but are worried that the
“debug IP IGRP transaction” command will flood the console. What is the
command that you should use?
a) Debug IP IGRP event
b) Debug IP IGRP-events
c) Debug IP IGRP summary
d) Debug IP IGRP events
Answer: d
Explanation: The “debug IP IGRP events” is used to display a short summary
of IGRP routing information. You can append an IP address onto either
console’s command-line to see only the IGRP updates from a neighbor. The
command will only give a short summary and hence won’t flood the command
line.
7. What does the following series of commands “Router IGRP 71 network”
accomplish?
10.0.0.0 router IGRP 109 network 172.68.7.0
a) It isolates networks 10.0.0.0 and 172.68.7.0
b) It loads IGRP for networks 109 and 71
c) It disables RIP
d) It disables all routing protocols
Answer: a
Explanation: It isolates network 10.0.0.0 and 172.68.7.0 and associates
autonomous systems 109 and71 with IGRP. IGRP does not disable RIP, both
can be used at the same time.
8. The “IPX delay number” command will allow an administrator to change the
default settings. What are the default settings?
a) For LAN interfaces, one tick; for WAN interfaces, six ticks
b) For LAN interfaces, six ticks; for WAN interfaces, one tick
c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks
d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
Answer: a
Explanation: Tick is basically the update rate of clients in the network. The IPX
delay number will give the ticks at a certain time. The default ticks are–for LAN
interfaces, one tick, and for WAN interfaces, six ticks.
9. As a system administrator, you need to set up one Ethernet interface on the
Cisco router to allow for both sap and Novell-ether encapsulations. Which set
of commands will accomplish this?
a) Interface Ethernet 0.1 IPX encapsulation Novell-ether IPX network 9e
interface
Ethernet 0.2 IPX network 6c
b) Interface Ethernet 0 IPX encapsulation Novell-ether IPX network 9e
interface
Ethernet 0 IPX encapsulation sap IPX network 6c
c) Interface Ethernet 0.1 IPX encapsulation Novell-ether interface Ethernet 0.2
IPX
encapsulation sap
d) Interface Ethernet 0.1ipx encapsulation Novell-ether IPX network 9e
interface
Ethernet 0.2 IPX encapsulation sap IPX network 6c
Answer: d
Explanation: The following commands setup the sub interfaces to allow for two
types of encapsulation:interface Ethernet 0.1 IPX encapsulation Novell-ether
IPX network 9e interface Ethernet0.2 IPX encapsulation sap IPX network 6c.
10. What does the “IPX maximum-paths 2” command accomplish?
a) It enables load sharing on 2 paths if the paths are equal metric paths
b) It sets up routing to go to network 2
c) It is the default for Cisco IPX load sharing
d) It enables load sharing on 2 paths if the paths are unequal metric paths
Answer: a
Explanation: It enables load sharing on 2 paths if the paths are equal metric
paths. The default is 1 path and the maximum is 512 paths. The value must
always be greater than 1 and must be a natural number.
11. You want to enable both arpa and snap encapsulation on one router
interface. How do you do this?
a) The interface can handle multiple encapsulation types with no extra
configuration
b) Assign two network numbers, one for each encapsulation type
c) Enable Novell-ether to run multiple encapsulation types
d) Both arpa and snap are enabled by default so you don’t have to configure
anything
Answer: b
Explanation: To assign multiple network numbers, you usually use sub
interfaces. A sample configuration follows: IPXEthernet 0.1 IPX encapsulation
novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx
network 6c
12. By default, Cisco routers forward GNS SAPs to remote networks.
a) False
b) True
Answer: a
Explanation: GNS is Novell’s protocol to Get Nearest Server. If there is a
server on the local network,that server will respond. If there isn’t, the Cisco
router has to be configured to forward theGNS SAP.
13. To prevent Service Advertisements (SAPs) from flooding a network, Cisco
routers do not forward them. How are services advertised to other networks?
a) Each router builds its own SAP table and forwards that every 60 seconds
b) Each router assigns a service number and broadcasts that
c) SAPs aren’t necessary with Cisco routers
d) Cisco routers filter out all SAPs
Answer: a
Explanation: Cisco routers build SAP tables and forward the table every 60
seconds. All SAPs can’t befiltered even with 4.x since NDS and time
synchronization uses SAPs.
14. Novell’s implementation of RIP updates routing tables every _________
seconds.
a) 60
b) 90
c) 10
d) 30
Answer: a
Explanation: Novell’s RIP updates routing tables every 60 seconds, Apple’s
RTMP is every 10 seconds, routers ARP every 60 seconds, IGRP signal every
90 seconds, and Banyan VINES signals every 90 seconds.
15. In Novell’s use of RIP, there are two metrics used to make routing
decisions. Select the correct metrics.
a) Ticks & Hops
b) Hops & Loops
c) Loops & Counts
d) Counts & Ticks
Answer: a
Explanation: It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses
hops; if hops are equal, then it uses an administratively assigned tiebreaker.
1. Which protocol should you select if the network diameter is more than 17
hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) Both RIPv1 and RIPv2
Answer: a
Explanation: RIP v1 has network diameter is more than 17 hops. It uses
classful routing and the routing updates are broadcasted over the network. It
notifies routers about the update so that they update their own routing tables.
2. How often does a RIPv1 router broadcast its routing table by default?
a) Every 30 seconds
b) Every 60 seconds
c) Every 90 seconds
d) RIPv1 does not broadcast periodically
Answer: a
Explanation: RIPv1 router broadcasts its routing table every 30 seconds by
default. The broadcasted routing table can be used by other routers to find the
shortest path among the network devices.
3. Which command displays RIP routing updates?
a) Show IP route
b) Debug IP rip
c) Show protocols
d) Debug IP route
Answer: b
Explanation: The debug IP rip command is used to show the Internet Protocol
(IP) Routing Information Protocol (RIP) updates being sent and received on
the router. It verifies that the updates are being broadcasted and not
multicasted.
4. Two connected routers are configured with RIP routing. What will be the
result when a router receives a routing update that contains a higher-cost path
to a network already in its routing table?
a) The updated information will be added to the existing routing table Debug IP
rip
b) The update will be ignored and no further action will occur Debug IP route
c) The updated information will replace the existing routing table entry
d) The existing routing table entry will be deleted from the routing table and all
routers will exchange routing updates to reach convergence
Answer: b
Explanation: When a routing update is received by a router, the router first
checks the administrative distance (AD) and always chooses the route with the
lowest AD. However, if two routes are received and they both have the same
AD, then the router will choose the one route with the lowest metrics, or in
RIP’s case, hop count.
5. You type debug IP rip on your router console and see that 172.16.10.0 is
being advertised to you with a metric of 16. What does this mean?
a) The route is 16 hops away Debug IP rip
b) The route has a delay of 16 microseconds Debug IP route
c) The route is inaccessible
d) The route is queued at 16 messages a second
Answer: c
Explanation: You cannot have 16 hops on a RIP network by default, because
the max default hops possible is 15. If you receive a route advertised with a
metric of 16, this means it is inaccessible.
6. Default administrative distance of a static route is ________
a) 0
b) 90
c) 100
d) 1
Answer: d
Explanation: 1 is the default administrative distance of Static Route. It is used
by routers to select the best path when there are different routes to the same
destination. It’s used only two different routing protocols are being used.
7. Which protocol gives a full route table update every 30 seconds?
a) IEGRP
b) RIP
c) ICMP
d) IP
Answer: b
Explanation: RIP gives a full route table update every 30 seconds. The
broadcasted routing table can be used by other routers to find the shortest
path among the network devices.
8. _________ is the default administrative distance of RIP.
a) 0
b) 90
c) 120
d) 130
Answer: c
Explanation: The default administrative distance is the default count of
numbers assigned to arbitrary routes to a destination. The default
administrative distance of RIP is 120. It is used to find the shortest route
amongst the number of paths available.
9. Which statement is true regarding classless routing protocol?
a) The use of discontinuous networks is not allowed
b) Use of variable length subnet masks is permitted
c) RIPv1 is a classless routing protocol
d) IGRP supports classes routing within the same autonomous system
Answer: b
Explanation: Use of variable length subnet masks is permitted in classless
routing protocols. Also use of discontinuous networks is allowed in such
routing protocols. RIPv1 is a classful routing protocol but RIPv2 is classless
routing protocol.
10. Where should we use default routing?
a) On stub networks- which have only one exit path out of the network
b) Which have more than one exit path out of the network
c) Minimum five exit paths out of the network
d) Maximum five exit paths out of the network
Answer: a
Explanation: We must use default routing on stub networks. They have only
one exit path out of the network, so there can be no specific path decided for
such networks.
Answer: b
Explanation: Classful routing means that all hosts in the internetwork use the
same mask. Classless routing means that you can use Variable Length Subnet
Masks (VLSMs) and can also support discontinuous networking.
2. What is route poisoning?
a) It sends back the protocol received from a router as a poison pill, which
stops the regular updates. The use of variable length subnet masks is
permitted
b) It is information received from a router that can’t be sent back to the
originating router.RIPv2 supports classless routing
c) It prevents regular update messages from reinstating a route that has just
come up
d) It describes when a router sets the metric for a downed link to infinity
Answer: d
Explanation: When a network goes down, the distance-vector routing protocol
initiates route poisoning by advertising the network with a metric of 16, or
unreachable.
3. Which of the following is true regarding RIPv2?
a) It has a lower administrative distance than RIPv1
b) It converges faster than RIPv1
c) It has the same timers as RIPv1
d) It is harder to configure than RIPv1
Answer: c
Explanation: RIPv2 is pretty much just like RIPv1. It has the same
administrative distance and timers and is configured just like RIPv1.
4. Which of the situations might not require multiple routing protocols in a
network?
a) When a new Layer 2-only switch is added to the network
b) When you are migrating from one routing protocol to another
c) When you are using routers from multiple vendors
d) When there are host-based routers from multiple vendors
Answer: a
Explanation: Multiple routing protocols are required only when we need to
migrate from one routing protocol to another, or when we are using routers
from multiple vendors, or when there are host-based routers from multiple
vendors. Routing is not a layer-2 function so we don’t require multiple routing
protocols when new layer-2 switch is added.
5. Which two routing protocols can be redistributed into OSPF by a Cisco
router?
a) IP EIGRP and AppleTalk EIGRP
b) AppleTalk EIGRP and RIPv2
c) RIPv2 and IP EIGRP
d) IPX RIP & AppleTalk EIGRP
Answer: c
Explanation: OSPF stands for Open Shortest Path First. It is a Link state
routing protocol. IP EIGRP and RIPv2 can be redistributed into OSPF by a
Cisco router.
6. Which is a reason for avoiding doing route redistribution on two routers
between the same two routing domains?
a) Higher cost of two routers
b) Routing feedback
c) Cisco IOS incompatibility
d) Not possible to use two routers
Answer: b
Explanation: Routing feedback is an anomaly in which the routing protocols go
back and forth between one route and another. Routing feedback is a reason
for avoiding doing route redistribution on two routers between the same two
routing domains.
7. What does administrative distance rank?
a) Metrics
b) Sources of routing information
c) Router reliability
d) Best paths
Answer: b
Explanation: Sources of routing information is the administrative distance rank.
It is used by routers to select the best path when there are different routes to
the same destination. It’s used only two different routing protocols are being
used.
8. Which protocol maintains neighbor adjacencies?
a) RIPv2 and EIGRP
b) IGRP and EIGRP
c) RIPv2
d) EIGRP
Answer: c
Explanation: Neighbor adjacency refers to the formal handshake performed by
neighboring routers. It is to be done before the router share any routing
information. RIP V2 maintains neighbor adjacencies.
9. Which routing protocol implements the diffusing update algorithm?
a) IS-IS
b) IGRP
c) EIGRP
d) OSPF
Answer: c
Explanation: The diffusing update algorithm (DUAL) is used to maintain
backup routes to a destination for when the primary route fails. EIGRP routing
protocol implements the diffusing update algorithm.
10. Which protocol should you select if the network diameter is more than 17
hops?
a) RIPv1
b) RIPv2
c) EIGRP
d) OSPF
Answer: b
Explanation: RIPv2protocol should you select if the network diameter is more
than 17 hops. It uses classless routing and the routing updates are
broadcasted over the network. It notifies routers about the update so that they
update their own routing tables
Answer: a
Explanation: Cipher is a method to implement encryption and decryption of
messages travelling in a network. It’s used to increase the confidentiality of the
messages.
2. In asymmetric key cryptography, the private key is kept by __________
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
Answer: b
Explanation: The private key is kept only by the receiver of the message. Its
aim is to make sure that only the intended receiver can decipher the message.
3. Which one of the following algorithm is not used in asymmetric-key
cryptography?
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) dsa algorithm
Answer: c
Explanation: Electronic code book algorithm is a block cipher method in which
each block of text in an encrypted message corresponds to a block of data. It
is not feasible for block sizes smaller than 40 bits.
4. In cryptography, the order of the letters in a message is rearranged by
__________
a) transpositional ciphers
b) substitution ciphers
c) both transpositional ciphers and substitution ciphers
d) quadratic ciphers
Answer: a
Explanation: In transposition ciphers, the order of letters in a plaintext
message is shuffled using a pre-defined method. Some of such ciphers are
Rail fence cipher and Columnar transposition.
5. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) byte cipher
Answer: a
Explanation: DES is a symmetric key block cipher in which the block size is 64
bits and the key size is 64 bits. It is vulnerable to some attacks and is hence
not that popularly used.
6. Cryptanalysis is used __________
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) to make new ciphers
Answer: a
Explanation: Cryptanalysis is a field of study in which a cryptographic scheme
is intentionally tried to breach in order to find flaws and insecurities. It is used
to make sure that the scheme is least vulnerable to attacks.
7. Which one of the following is a cryptographic protocol used to secure HTTP
connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TLS)
c) explicit congestion notification (ECN)
d) resource reservation protocol
Answer: b
Explanation: TLS has strong message authentication and key-material
generation to prevent eavesdropping, tampering and message forgery. It has
been used since the year 1996.
8. Voice privacy in GSM cellular telephone protocol is provided by _______
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
Answer: a
Explanation: The A5/2 cipher was published in the year 1996 and was
cryptanalysed in the same year within a month. It’s use was discontinued from
the year 2006 as it was really weak.
9. ElGamal encryption system is __________
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) block cipher method
Answer: b
Explanation: The ELGamal encryption system was made by Taher Elgamal in
the year 1985 and is an asymmetric key algorithm. It is popularly used in PGP
and other systems.
10. Cryptographic hash function takes an arbitrary block of data and returns
_________
a) fixed size bit string
b) variable size bit string
c) both fixed size bit string and variable size bit string
d) variable sized byte string
Answer: a
Explanation: Cryptographic hash functions are used in digital signatures and
message authentication codes. The only issue with it is that it returns the same
hash value every time for a message making it vulnerable to attackers to
evaluate and break the cipher.
1. Multiple objects can be sent over a TCP connection between client and
server in a persistent HTTP connection.
a) True
b) False
Answer: a
Explanation: Persistent connections are kept active after completing
transaction so that multiple objects can be sent over the same TCP
connection.
2. HTTP is ________ protocol.
a) application layer
b) transport layer
c) network layer
d) data link layer
Answer: a
Explanation: HTTP is an Application layer protocol used to define how
messages are formatted and transmitted through the World Wide Web.
3. In the network HTTP resources are located by __________
a) Uniform resource identifier
b) Unique resource locator
c) Unique resource identifier
d) Union resource locator
Answer: a
Explanation: The Uniform Resource Identifier is a name and locator for the
resource to be located by the HTTP. The URLs and URNs are derived through
the identifier.
4. HTTP client requests by establishing a __________ connection to a
particular port on the server.
a) User datagram protocol
b) Transmission control protocol
c) Border gateway protocol
d) Domain host control protocol
Answer: b
Explanation: HTTP clients perform requests using a TCP connection, because
the TCP connection provides a more reliable service. UDP is not a reliable
protocol, border gateway protocol is used on top of TCP, while domain host
control protocol is a network layer protocol.
5. In HTTP pipelining __________
a) multiple HTTP requests are sent on a single TCP connection without waiting
for the corresponding responses
b) multiple HTTP requests cannot be sent on a single TCP connection
c) multiple HTTP requests are sent in a queue on a single TCP connection
d) multiple HTTP requests are sent at random on a single TCP connection
Answer: a
Explanation: HTTP pipelining helps the client make multiple requests without
having to waiting for each response, thus saving a lot of time and bandwidth
for the client.
6. FTP server listens for connection on which port number?
a) 20
b) 21
c) 22
d) 23
Answer: b
Explanation: Port 20 is used for FTP data. Port 22 is used for SSH remote
login. Port 23 is used for TELNET.
7. In FTP protocol, a client contacts a server using ______ as the transport
protocol.
a) Transmission control protocol
b) User datagram protocol
c) Datagram congestion control protocol
d) Stream control transmission protocol
Answer: a
Explanation: The clients use the Transmission Control Protocol for FTP as it’s
more reliable than UDP, DCCP, and SCTP, and reliability of file transfer is
required to be as high as possible for FTP.
8. In Active mode FTP, the client initiates both the control and data
connections.
a) True
b) False
Answer: b
Explanation: In Passive mode of FTP, the client initiates both data and control
connections, while in Active mode, the client initiates the control connection
and then the server initiates the data connection.
9. The File Transfer Protocol is built on __________
a) data centric architecture
b) service oriented architecture
c) client server architecture
d) connection oriented architecture
Answer: c
Explanation: The FTP connection includes a Server and a Client which wish to
share files. The server can have multiple clients at the same time while the
client communicates with only one server at a time.
10. In File Transfer Protocol, data transfer cannot be done in __________
a) stream mode
b) block mode
c) compressed mode
d) message mode
Answer: d
Explanation: In Stream mode, the data is transferred in a continuous stream.
In Block mode, data is transferred after being divided into smaller blocks. In
Compressed mode, data is transferred after being compressed using some
compression algorithm.
Answer: b
Explanation: The Public socket accept () method is used by the ServerSocket
class to accept the connection request of exactly one client at a time. The
client requests by initializing the socket object with the servers IP address.
2. Which constructor of Datagram Socket class is used to create a datagram
socket and binds it with the given Port Number?
a) Datagram Socket(int port)
b) Datagram Socket(int port, Int Address address)
c) Datagram Socket()
d) Datagram Socket(int address)
Answer: b
Explanation: Datagram Socket (int port, Int Address address) is used to create
a datagram socket. A datagram socket is created for connection-less
communication between the server and the client. There is no accept() method
in this class.
3. The client in socket programming must know which information?
a) IP address of Server
b) Port number
c) Both IP address of Server & Port number
d) Only its own IP address
Answer: c
Explanation: The client in socket programming must know IP address of
Server as it has to use that IP address in order to initialize the socket class
constructor. That is how the client requests a connection to the server.
4. The URL Connection class can be used to read and write data to the
specified resource that is referred by the URL.
a) True
b) False
Answer: a
Explanation: The URL Connection class can be used to read and write data to
the specified resource referred by the URL. A connection to the URL is
initialized by the OpenConnection() method of the class.
5. Datagram is basically just a piece of information but there is no guarantee of
its content, arrival or arrival time.
a) True
b) False
Answer: a
Explanation: Datagram is basically some information travelling between the
sender and the receiver, but there is no guarantee of its content, arrival or
arrival time. A Datagram socket class object is created to make a datagram
connection between the server and the client.
6. TCP, FTP, Telnet, SMTP, POP etc. are examples of ___________
a) Socket
b) IP Address
c) Protocol
d) MAC Address
Answer: c
Explanation: TCP, FTP, Telnet, SMTP, POP etc. are examples of Protocol. Out
of them, TCP is a transport layer protocol and FTP, TELNET, SMTP and POP
are application layer protocols.
7. What does the java.net.InetAddress class represent?
a) Socket
b) IP Address
c) Protocol
d) MAC Address
Answer: b
Explanation: The java.net.InetAddress class represents IP Address of a
particular specified host. It can be used to resolve the host name from the IP
address or the IP address from the host name.
8. The flush () method of Print Stream class flushes any un-cleared buffers in
the memory.
a) True
b) False
Answer: a
Explanation: The flush () method of Print Stream class flushes any un cleared
buffers in memory.
9. Which classes are used for connection-less socket programming?
a) Datagram Socket
b) Datagram Packet
c) Both Datagram Socket & Datagram Packet
d) Server Socket
Answer: c
Explanation: Datagram is basically some information travelling between the
sender and the receiver, but there is no guarantee of its content, arrival or
arrival time. Datagram Socket, Datagram Packet are used for connection-less
socket programming, while Server Socket is used for connection-oriented
socket programming.
10. In Inet Address class, which method returns the host name of the IP
Address?
a) Public String get Hostname()
b) Public String getHostAddress()
c) Public static InetAddress get Localhost()
d) Public getByName()
Answer: a
Explanation: In Inet Address class public String getHostname() method returns
the host name of the IP Address. The getHostAddress() method returns the IP
address of the given host name.
Answer: b
Explanation: Cookies were originally designed for server side programming,
and at the lowest level, they are implemented as an extension to the HTTP
protocol. They were introduced with the intention of providing a better user
experience for the websites.
Answer: a
Explanation: The cookie property sets or returns all name/value pairs of
cookies in the current document. There are no methods involved: cookies are
queried, set, and deleted by reading and writing the cookie property of the
Document object using specially formatted strings.
Answer: d
Explanation: Cookies are transient by default; the values they store last for the
duration of the web browser session but are lost when the user exits the
browser. While the browsing session is active the cookie stores the user
values in the user’s storage itself and accesses them.
Answer: c
Explanation: If you want a cookie to last beyond a single browsing session,
you must tell the browser how long (in seconds) you would like it to retain the
cookie by specifying a max-age attribute. A number of seconds until the cookie
expires. A zero or negative number will kill the cookie immediately.
5. Which of the following defines the Cookie visibility?
a) Document Path
b) LocalStorage
c) SessionStorage
d) All of the mentioned
Answer: d
Explanation: sessionStorage, localStorage and Document path all are used to
store data on the client-side. Each one has its own storage and expiration limit.
Cookie visibility is scoped by the document origin as Local Storage and
Session Storage are, and also by document path.
6. Which of the following can be used to configure the scope of the Cookie
visibility?
a) Path
b) Domain
c) Both Path and Domain
d) Server
Answer: d
Explanation: The Cookie visibility scope is configurable through cookie
attributes path and domain. Domain attribute in the cookie is used to specify
the domain for which the cookie is sent. Path includes the Path attribute in the
cookie to specify the path for which this cookie is sent.
Answer: a
Explanation: Setting the path of a cookie to “/” gives scoping like that of
localStorage and also specifies that the browser must transmit the cookie
name and value to the server whenever it requests any web page on the site.
Answer: b
Explanation: The final cookie attribute is a boolean attribute named secure that
specifies how cookie values are transmitted over the network. By default,
cookies are insecure, which means that they are transmitted over a normal,
insecure HTTP connection. If a cookie is marked secure, however, it is
transmitted only when the browser and server are connected via HTTPS or
another secure protocol.
Answer: a
Explanation: Cookie values cannot include semicolons, commas, or
whitespace. For this reason, you may want to use the core JavaScript global
function encodeURIComponent() to encode the value before storing it in the
cookie.
Answer: c
Explanation: Each cookie can hold up to only 4 KB. In practice, browsers allow
many more than 300 cookies total, but the 4 KB size limit may still be enforced
by some. Storage of a session has to be a minimum of 5MB.
Answer: b
Explanation: REST stands for Representational State Transfer and is a
software architecture style in which the server sends a representation of the
state of the resource that it requests. It provides interoperability between the
systems.
2. Which of the following protocol is used by Restful web services as a
medium of communication between client and server?
a) HTTP
b) FTP
c) Gopher
d) TELNET
Answer: a
Explanation: Restful web services make use of HTTP protocol as a medium of
communication between client and server. The REST architecture was known
as the HTTP object model back in the year 1994.
3. Which of the following is not a good practice to create a standard URI for a
web service?
a) Maintain Backward Compatibility
b) Use HTTP Verb
c) Using spaces for long resource names
d) Use lowercase letters
Answer: c
Explanation: We must use hyphens (-) or underscores (_) instead of spaces to
represent long resource names. It may lead to the resource to be less
recognizable for the system if we use spaces instead.
4. Which of the following HTTP methods should be idempotent in nature?
a) OPTIONS
b) DELETE
c) POST
d) HEAD
Answer: b
Explanation: DELETE operation should be idempotent, means their result will
always same no matter how many times these operations are invoked. Also,
the PUT operation is supposed to be idempotent.
5. Which of the following directive of Cache Control Header of HTTP response
indicates that resource is cachable by only client and server?
a) Public
b) Private
c) Nocache/nostore
d) Maxage
Answer: b
Explanation: Private directive indicates that resource is cachable by only client
and server; no intermediary can cache the resource. But if we use the public
directive, it indicates that the resource may be cachable by any intermediary
component.
6. Which of the following HTTP Status code means CREATED, when a
resource is successful created using POST or PUT request?
a) 200
b) 201
c) 204
d) 304
Answer: b
Explanation: HTTP Status Code 201 means CREATED, when a resource is
successful created using POST or PUT request. The code 200 means success
i.e. OK, code 204 means NO CONTENT, and the code 304 means NOT
MODIFIED.
7. Which of the following annotation of JAX RS API is used to annotate a
method used to create resource?
a) @Path
b) @GET
c) @PUT
d) @POST
Answer: C
Explanation: @PUT is the HTTP request that is used to create resource and
also define a complete resource path. @POST may also be used to create a
resource but it won’t define a resource path i.e. an accessing medium.
8. Which of the following annotation of JAX RS API binds the parameter
passed to method to a HTTP matrix parameter in path?
a) @PathParam
b) @QueryParam
c) @MatrixParam
d) @HeaderParam
Answer: c
Explanation: @MatrixParam is the annotation that binds the parameter passed
to method to a HTTP matrix parameter in path, while @QueryParam binds to a
query parameter, @PathParam binds to a value and @HeaderParam binds to
the HTTP header in the path.
9. In REST architecture, a REST Server simply provides access to resources
and REST client accesses and presents the resources.
a) False
b) True
Answer: b
Explanation: In REST architecture, a REST Server simply provides access to
resources and REST client accesses and presents the resources. It is
popularly used because it makes efficient use of the bandwidth and can be
cached for better performance and scalability.
10. POST operation should be idempotent.
a) True
b) False
Answer: b
Explanation: POST operation can cause different result so they are not
idempotent. The DELETE and PUT operations are idempotent as they invoke
the same result every time they are called.
1. The term that is used to place packet in its route to its destination is called
__________
a) Delayed
b) Urgent
c) Forwarding
d) Delivering
Answer: c
Explanation: Forwarding is done by the nodes in the path from source to
destination, that are not the intended destination for the packet in order to pass
the packet to the next node in the path. The destination machine does not
forward the packet to any other node.
2. A second technique to reduce routing table and simplify searching process
is called _________
a) Network-Specific Method
b) Network-Specific Motion
c) Network-Specific Maintaining
d) Network-Specific Membership
Answer: a
Explanation: In the network specific forwarding method, there is only one
record, the destination of the packet, in the routing table and not the other
hosts of the network. The other two forwarding methods are the default
method and the next-hop method.
3. Next-Hop Method is used to reduce contents of a _________
a) Revolving table
b) Rotating Table
c) Routing Table
d) Re-allocate table
Answer: c
Explanation: In the next-hop forwarding method, the routing table of each
router in the path contains the address of only the next hop in the path of
packet. This method is suitable for short distances only.
4. Several techniques can make size of routing table manageable and also
handle issues such as __________
a) Maturity
b) Error reporting
c) Tunneling
d) Security
Answer: d
Explanation: The size of the routing table in the technique must be
manageable for the network nodes i.e. it must not be too big. Security of the
forwarding packet is the highest priority for a technique and must be high
enough so that only authorized senders and receivers can access the packet’s
content.
5. Host-specific routing is used for purposes such as checking route or
providing _____
a) Network Measures
b) Security Measures
c) Routing Measures
d) Delivery Measures
Answer: b
Explanation: In host-specific routing, the route of the packet is defined based
on the exact match of the packet’s IP with the routing table entry of the host. It
provides the best security for the packet as the packet is forwarded only to
routers in the pre-defined path.
6. In Unicast routing, if instability is between three nodes, stability cannot be
________
a) Stable
b) Reversed
c) Guaranteed
d) Forward
Answer: c
Explanation: In Unicast routing, there is only sender and one receiver. So, if
there is instability between three nodes, in which one is sender, one is receiver
and one is the router in the path, there is no other path available for the packet
and the stability of the network is not guaranteed.
7. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a
________
a) Graph
b) Tree
c) Network
d) Link
Answer: a
Explanation: The Djikstra’s shortest path algorithm is the fastest among the
algorithms for finding the shortest path in a graph. But it is a greedy method
based algorithm so it does not guarantee the shortest path every time.
8. In Multicast Routing Protocol, flooding is used to broadcast packets but it
creates ________
a) Gaps
b) Loops
c) Holes
d) Links
Answer: b
Explanation: In multicast routing, there is one sender and many receivers. So
flooding is the most basic method to forward packets to many receivers. The
one issue with flooding is that it creates routing loops. One loop prevention
method is that the routers will not send the packet to a node where the packet
has been received before.
9. RPF stands for __________
a) Reverse Path Forwarding
b) Reverse Path Failure
c) Reverse Packet Forwarding
d) Reverse Protocol Failure
Answer: a
Explanation: Reverse Path Forwarding is a loop-free forwarding method for
multi-cast routing in modern systems. The method focuses on forwarding the
packet away from the source IP in each iteration to make sure there is no
loops.
10. LSP stands for __________
a) Link Stable Packet
b) Link State Packet
c) Link State Protocol
d) Link State Path
Answer: b
Explanation: A Link State Packet is a packet created by a router that lists its
neighboring nodes and routers in link state routing protocol. It is shared with
other routers to find the shortest path from a source to the destination.
Answer: a
Explanation: In the tunnel mode, IPSec adds control bits into the packets to
encrypt the entire packet between the IPSec endpoints. Using encryption, it
provides secure communication between the two endpoints.
3. Network layer firewall works as a ________
a) frame filter
b) packet filter
c) signal filter
d) content filter
Answer: b
Explanation: As you know, firewalls are available as hardware appliances, as
software-only, or a combination of the two. In every case, the purpose of a
firewall is to isolate your trusted internal network (or your personal PC) from
the dangers of unknown resources on the Internet and other network
connections that may be harmful. The firewall prevents unauthorized access to
your internal, trusted network from outside threats.
4. Network layer firewall has two sub-categories called ____________
a) stateful firewall and stateless firewall
b) bit oriented firewall and byte oriented firewall
c) frame firewall and packet firewall
d) network firewall and data firewall
Answer: a
Explanation: Most network layer firewalls can operate as stateful or stateless
firewalls, creating two subcategories of the standard network layer firewall.
Stateful firewalls have the advantage of being able to track packets over a
period of time for greater analysis and accuracy — but they require more
memory and operate more slowly. Stateless firewalls do not analyze past
traffic and can be useful for systems where speed is more important than
security, or for systems that have very specific and limited needs. For example,
a computer that only needs to connect to a particular backup server does not
need the extra security of a stateful firewall.
5. WPA2 is used for security in _______
a) ethernet
b) bluetooth
c) wi-fi
d) e-mail
Answer: c
Explanation: WPA2 or WiFi Protected Access 2 is a security protocol used to
provide users and firms with strong data security and protection for their
wireless networks (WiFi) to give them confidence that only authorized users
can access their network.
6. An attempt to make a computer resource unavailable to its intended users is
called ______
a) denial-of-service attack
b) virus attack
c) worms attack
d) botnet process
Answer: a
Explanation: In a Denial of Service attack, the attacker won’t let the victims
access the network by using a certain method that ensures that an essential
network resource is unavailable to the victim. The methods that the attacker
can use are vulnerability attack, bandwidth flooding and connection flooding.
7. Extensible authentication protocol is authentication framework frequently
used in ______
a) wired personal area network
b) wireless networks
c) wired local area network
d) wired metropolitan area network
Answer: b
Explanation: The Extensible Authentication Protocol (EAP) is an authentication
protocol used to connect a network node to the Internet. It designed through
extending the methods used by the Point-to-Point Protocol for authentication.
8. Pretty good privacy (PGP) is used in ______
a) browser security
b) email security
c) FTP security
d) wifi security
Answer: b
Explanation: PGP is an encryption method used in e-mail security to encrypt
and decrypt the content of an e-mail transmitted over the internet. It makes
sure that the message cannot be stolen by other unauthorized users.
9. PGP encrypts data by using a block cipher called ______
a) international data encryption algorithm
b) private data encryption algorithm
c) internet data encryption algorithm
d) local data encryption algorithm
Answer: a
Explanation: The IDEA was designed in 1991 by Xuejia Lai and James
Massey. Before IDEA, PGP used the cipher method BassOmatic.
10. When a DNS server accepts and uses incorrect information from a host
that has no authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
Answer: c
Explanation: In DNS spoofing, also known as DNS cache poisoning, an
attacker gets the valid credentials from a victim by spoofing the intended
resource, and tricking the victim to give his/her valid authorization credentials.
Answer: a
Explanation: In OSPF, the link state of each path is checked, and then the
shortest path is chosen among only the open state links. Each OSPF router
monitors the cost of the link to each of its neighbors and then floods the link
state information to other routers in the network.
2. The computation of the shortest path in OSPF is usually done by
____________
a) Bellman-ford algorithm
b) Routing information protocol
c) Dijkstra’s algorithm
d) Distance vector routing
Answer: c
Explanation: Shortest path in OSPF is usually computed by Dijkstra’s
algorithm. It was proposed by Edsger W. Dijkstra in the year 1956. It is a
greedy method algorithm and hence may not guarantee the shortest path
every time, but is really fast.
3. Which of the following is false with respect to the features of OSPF?
a) Support for fixed-length subnetting by including the subnet mask in the
routing message
b) More flexible link cost than can range from 1 to 65535
c) Use of designated router
d) Distribution of traffic over multiple paths that have equal cost to the
destination
Answer: a
Explanation: OSPF provides support for variable-length sunbathing by
including the subnet mask in the routing message. For fixed length subnets,
there is no requirement for including the subnet mask in the routing message
as there is just one subnet mask for all the subnets.
4. In OSPF, which protocol is used to discover neighbour routers
automatically?
a) Link state protocol
b) Error-correction protocol
c) Routing information protocol
d) Hello protocol
Answer: d
Explanation: Hello protocol is used to discover neighboring routers
automatically. It makes sure that the communication between neighbors is
bidirectional. It’s similar to the real world moral construct of saying “Hello” to
initialize the communication.
5. Which of the following is not a type of OSPF packet?
a) Hello
b) Link-state request
c) Link-state response
d) Link-state ACK
Answer: c
Explanation: The five types of OSPF packets are: Hello, Database description,
Link-state request, Link-state update, and Link-state ACK. There is no Link-
state response packet; the neighbor router sends a Link-state update packet
as a response to the Link-state request packet if there is an update in the
routing table.
6. What is the correct order of the operations of OSPF?
i – Hello packets
ii – Propagation of link-state information and building of routing tables
iii – Establishing adjacencies and synchronization of database
a) i-ii-iii
b) i-iii-ii
c) iii-ii-i
d) ii-i-iii
Answer: b
Explanation: OSPF first implements a hello protocol. Then it later on tries to
establish synchronisation with database. Later on building of routing tables is
done.
7. In OSPF header, which field is used to detect errors in the packet?
a) Type
b) Area ID
c) Authentication type
d) Checksum
Answer: d
Explanation: Checksum field is used to detect errors. It makes sure that the
data portions that are being sent are all in integrity. It can detect duplicated
bits. Once an error is detected, the sender has to re-transmit the data as it
won’t receive an acknowledgement.
8. In OSPF database descriptor packet, if there are more database descriptor
packets in the flow, ‘M’ field is set to ____________
a) 1
b) 0
c) more
d) -1
Answer: a
Explanation: The “M” bit is the more bit, which indicates that there are more
packets to be received in the descriptor packet flow whenever it is set to 1.
There is also an “I” bit which indicates if the packet is first in the flow.
9. In OSPF database descriptor packet, which field is used to indicate that the
router is master?
a) M
b) MS
c) I
d) Options
Answer: b
Explanation: The MS bit is used to indicate if the origin of the packet is a
master or a slave. If it is set to 1, the source of the packet is a master, and if it
is set to 0, the source of the packet is a slave.
10. In OSPF database descriptor packet, which field is used to detect a
missing packet?
a) LSA header
b) MS
c) Database descriptor sequence number
d) Options
Answer: c
Explanation: Sequence number field is used to detect a missing packet. The
packets are to be received in order of the sequence number, so if the receiver
detects that there is a sequence number skipped or missing in the order, it
stops processing the further received packets and informs the sender to
retransmit the packets in sequence.
1. An OSPF router receives an LSA, the router checks its sequence number,
and this number matches the sequence number of the LSA that the receiving
router already has. What does the receiving router do with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
Answer: a
Explanation: When the OSPF router receives an LSA, the router checks its
sequence number. If this number matches the sequence number of the LSA
that the receiving router already has, the router ignores the LSA.
2. An OSPF router receives an LSA. The router checks its sequence number
and finds that this number is higher than the sequence number it already has.
Which two tasks does the router perform with the LSA?
a) Ignores the LSA
b) Adds it to the database
c) Sends newer LSU update to source router
d) Floods the LSA to the other routers
Answer: b
Explanation: An OSPF router receives an LSA. If the router checks its
sequence number and finds that the number is higher than the sequence
number of the LSA that it already has, the router adds it to the database, and
then floods the LSA to the other routers.
3. An OSPF router receives an LSA. The router checks its sequence number
and finds that this number is lower than the sequence number it already has.
What does the router do with the LSA?
a) ignores the LSA
b) adds it to the database
c) sends newer LSU update to source router
d) floods the LSA to the other routers
Answer: c
Explanation: An OSPF router receives an LSA. If the router checks its
sequence number and finds that this number is lower than the sequence
number that it already has, the router sends newer LSU update to source
router. The router then adds it to the database and floods it to the other
routers.
4. Each LSA has its own age timer. By default, how long does an LSA wait
before requiring an update?
a) 30 seconds
b) 1 minute
c) 30 minutes
d) 1 hour
Answer: c
Explanation: Each LSA has its own age timer. By default, an LSA waits for 30
minutes before requiring an update. The router then has to send a LSR (Link
State Request) to its neighbors to get an update.
5. Distance vector protocols use the concept of split horizon, but link-state
routing protocols, such as OSPF, do not.
a) True
b) False
Answer: b
Explanation: In Distance vector routing protocols, there is a problem called
count-to-infinity which occurs regularly. So, to make sure that it does not occur,
the split horizon algorithm is used. There is no requirement for it in OSPF.
6. The outcome of Dijkstra’s calculation is used to populate the __________
a) Topology table
b) Routing table
c) Neighbor table
d) Adjacency table
Answer: b
Explanation: The outcome of Djikstra’s calculation is the main source of entries
in the routing table as it is the algorithm that is used to find the shortest path in
OSPF. The calculations are done after receiving every new LSU.
7. What is the IP protocol number for OSPF packets?
a) 89
b) 86
c) 20
d) 76
Answer: a
Explanation: 89 is the IP protocol number for OSPF packets. 86 is the protocol
number for DGP, 76 is the protocol number for Backroom-SATNET-Monitoring
and 20 is the protocol number for Host Monitoring Protocol.
8. Which packet is NOT an OSPF packet type?
a) LSU
b) LSR
c) DBD
d) Query
Answer: d
Explanation: LSU is the Link State Update packet, LSR is the Link State
Request packet and DBD is the Database Descriptor packet in OSPF. Query
packet is NOT an OSPF packet type.
Answer: a
Explanation: Hello protocol is used to discover neighboring routers
automatically. It makes sure that the communication between neighbors is
bidirectional. The multicast address that the OSPF Hello protocol uses is
224.0.0.5.
10. The Hello protocol sends periodic updates to ensure that a neighbor
relationship is maintained between adjacent routers.
a) True
b) False
Answer: a
Explanation: The Hello protocol sends periodic updates to ensure that a
neighbor relationship is maintained between adjacent routers. It’s similar to the
real world moral construct of saying “Hello” to initialize the communication.
11. DBD packets are involved during which two states?
a) Exstart and exchange
b) Loading and Two-way
c) Init and Full
d) Down and Loading
Answer: a
Explanation: DBD stands for Database Descriptor. DBD packets are involved
during the two states Exstart and Exchange. In exstart, the master and the
slaves are decided and in the exchange state, the DBD is exchanged among
the neighbors.
12. At which interval does OSPF refresh LSAs?
a) 10 seconds
b) 30 seconds
c) 30 minutes
d) 1 hour
Answer: d
Explanation: Each LSA has its own age timer. By default, an LSA waits for 30
minutes before requiring an update. So to make sure that each router first has
an up-to-date LSA, OSPF refreshes LSAs after every 1 hour.
13. Which field is NOT a field within an OSPF packet header?
a) Packet length
b) Router ID
c) Authentication type
d) Maxage time
Answer: d
Explanation: The packet length field gives the length of the packet in bits. The
Authentication type field gives the type of authentication used. The router ID
field gives the ID of the source router of the packet. In an OSPF packet
header, there is no field called Maxage time.
14. Which two commands are required for basic OSPF configuration?
a) “[Network mask] area [area-id]” and “Router ospf [process-id]”
b) “[Wildcard-mask] area [area-id]” and “[Network mask] area [area-id]”
c) Only “Router ospf [process-id]”
d) “[Wildcard-mask] area [area-id]” and “Router ospf [process-id]”
Answer: d
Explanation: The “Router ospf [process-id]” command enables OSPF routing
protocol in the router and the “[Wildcard-mask] area [area-id]” command is
used to select the interfaces that we want to include in the OSPF process.
That is enough for the basic configuration of OSPF in a router.
15. Which OSPF show command describes a list of OSPF adjacencies?
a) Show ip ospf interface
b) Show ip ospf
c) Show ip route
d) Show ip ospf neighbor
Answer: d
Explanation: The “Show ip ospf neighbor” command is the OSPF show
command that can describe a list of OSPF adjacencies i.e. the list of adjacent
nodes or neighbors. The router will only communicate with its neighbors
directly.
Answer: a
Explanation: Datagram switching is normally done at network layer. In
datagram switching, the datagram stream need not be in order as each
datagram can take different routes to the destination.
2. Packets in datagram switching are referred to as ________
a) Switches
b) Segments
c) Datagrams
d) Data-packets
Answer: c
Explanation: As the name suggests, in datagram switching packets are called
as datagram. Each datagram/packet is treated as an individual entity and
routed independently through the network.
3. Datagram networks mainly refers to _________
a) Connection oriented networks
b) Connection less networks
c) Telephone networks
d) Internetwork
Answer: b
Explanation: The switch does not keep the information about the connection
state, hence it is connection less. There is no need for establishing a
handshake to begin the transmission in such networks.
4. Datagrams are routed to their destinations with the help of ________
a) Switch table
b) Segments table
c) Datagram table
d) Routing table
Answer: c
Explanation: Routing table is used to route the packets to their destinations.
The packet/datagram header contains the destination header for the whole
journey to source to the destination through the routers.
5. The main contents of the routing table in datagram networks are
___________
a) Source and Destination address
b) Destination address and Output port
c) Source address and Output port
d) Input port and Output port
Answer: b
Explanation: Routing table contains destination address and output port to
route the packets to their destinations. The port address specifies the
particular application that the packet has to be forwarded to after it has
reached the destination.
6. Which of the following remains same in the header of the packet in a
datagram network during the entire journey of the packet?
a) Destination address
b) Source address
c) Checksum
d) Padding
Answer: a
Explanation: Destination address remains same in the header during the entire
journey of the packet. There is no pre-decided route for the packets so each
datagram/packet is treated as an individual entity and routed independently
through the network.
7. Which of the following is true with respect to the delay in datagram
networks?
a) Delay is greater than in a virtual circuit network
b) Each packet may experience a wait at a switch
c) Delay is not uniform for the packets of a message
d) All of the mentioned
Answer: d
Explanation: The delay of each packet in a datagram network is different as
each packet might take a different route to the destination. The delay includes
the propagation delay and the processing delay that is induced at each stop/
switch that the packet encounters in its journey.
8. During datagram switching, the packets are placed in __________ to wait
until the given transmission line becomes available.
a) Stack
b) Queue
c) Hash
d) Routing table
Answer: b
Explanation: When there are too many packets to be transmitted and the
transmission line gets blocked while transmitting some packets, the remaining
packets are stored in queue during delay and are served as first in first out.
The delay is called as queuing delay.
9. The probability of the error in a transmitted block _________ with the length
of the block
a) Remains same
b) Decreases
c) Increases
d) Is not proportional
Answer: c
Explanation: Probability of the error in a transmitted block increases with the
length of the block. Hence, the blocks should be as short as possible for ideal
transmission with low possibility of an error.
10. Which of the following is false with respect to the datagram networks?
a) Number of flows of packets are not limited
b) Packets may not be in order at the destination
c) Path is not reserved
d) Delay is the same for all packets in a flow
Answer: d
Explanation: The delay of each packet in a datagram network is different as
each packet might take a different route to the destination. This happens
because there is no pre-decided route for the packets.
Answer: b
Explanation: As you know, firewalls are available as hardware appliances, as
software-only, or a combination of the two. In every case, the purpose of a
firewall is to isolate your trusted internal network (or your personal PC) from
the dangers of unknown resources on the Internet and other network
connections that may be harmful. The firewall prevents unauthorized access to
your internal, trusted network from outside threats.
2. Network layer firewall has two sub-categories as _________
a) State full firewall and stateless firewall
b) Bit oriented firewall and byte oriented firewall
c) Frame firewall and packet firewall
d) Network layer firewall and session layer firewall
Answer: a
Explanation: Most network layer firewalls can operate as stateful or stateless
firewalls, creating two subcategories of the standard network layer firewall.
Stateful firewalls have the advantage of being able to track packets over a
period of time for greater analysis and accuracy — but they require more
memory and operate more slowly. Stateless firewalls do not analyze past
traffic and can be useful for systems where speed is more important than
security, or for systems that have very specific and limited needs. For example,
a computer that only needs to connect to a particular backup server does not
need the extra security of a stateful firewall.
3. A firewall is installed at the point where the secure internal network and
untrusted external network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
Answer: a
Explanation: A firewall can be a PC, a router, a midrange, a mainframe, a
UNIX workstation, or a combination of these that determines which information
or services can be accessed from the outside and who is permitted to use the
information and services from outside. Generally, a firewall is installed at the
point where the secure internal network and untrusted external network meet,
which is also known as a chokepoint.
4. Which of the following is / are the types of firewall?
a) Packet Filtering Firewall
b) Dual Homed Gateway Firewall
c) Screen Host Firewall
d) Dual Host Firewall
Answer: a
Explanation: A firewall can be a PC, a midrange, a mainframe, a UNIX
workstation, a router, or combination of these. Depending on the requirements,
a firewall can consist of one or more of the following functional components:
Packet-filtering router
5. A proxy firewall filters at _________
a) Physical layer
b) Data link layer
c) Network layer
d) Application layer
Answer: d
Explanation: The application firewall is typically built to control all network
traffic on any layer up to the application layer. It is able to control applications
or services specifically, unlike a stateful network firewall, which is – without
additional software – unable to control network traffic regarding a specific
application. There are two primary categories of application firewalls, network-
based application firewalls and host-based application firewalls.
6. A packet filter firewall filters at __________
a) Physical layer
b) Data link layer
c) Network layer or Transport layer
d) Application layer
Answer: c
Explanation: In computing, a firewall is a network security system that monitors
and controls the incoming and outgoing network traffic based on
predetermined security rules.[1] A firewall typically establishes a barrier
between a trusted, secure internal network and another outside network, such
as the Internet, that is assumed not to be secure or trusted.[2] Firewalls are
often categorized as either network firewalls or host-based firewalls.
7. What is one advantage of setting up a DMZ with two firewalls?
a) You can control where traffic goes in three networks
b) You can do stateful packet filtering
c) You can do load balancing
d) Improved network performance
Answer: c
Explanation: DMZ stands for De-Militarized Zone. In a topology with a single
firewall serving both internal and external users (LAN and WAN), it acts as a
shared resource for these two zones. So load balancing can be done by
adding another firewall.
8. What tells a firewall how to reassemble a data stream that has been divided
into packets?
a) The source routing feature
b) The number in the header’s identification field
c) The destination IP address
d) The header checksum field in the packet header
Answer: a
Explanation: The source routing feature provides a path address for the packet
to help the firewall to reassemble the data stream that was divided into
packets. After reassembling, the firewall can then filter the stream.
9. A stateful firewall maintains a ___________ which is a list of active
connections.
a) Routing table
b) Bridging table
c) State table
d) Connection table
Answer: a
Explanation: The routing table basically gives the state of each connection i.e.
whether the connection is active or not. A routing table ensures the best
performance for the stateful firewall.
10. A firewall needs to be __________ so that it can grow proportionally with
the network that it protects.
a) Robust
b) Expansive
c) Fast
d) Scalable
Answer: b
Explanation: The firewall has to be expansive because a network is expected
to grow with time and if the firewall is unable to grow with it, the firewall won’t
be able to handle the growing network traffic flow and will hence fail.
Answer: b
Explanation: Complex networks today are made up of hundreds and
sometimes thousands of components. For effective functioning of these
thousands of components, good network management is essential.
2. Performance management is closely related to _________
a) Proactive Fault Management
b) Fault management
c) Reactive Fault Management
d) Preventive Fault Management
Answer: b
Explanation: Fault management is really closely related to performance
management. It is important to ensure that the network handles faults as
effectively as it handles it’s normal functioning to achieve better performance
management.
3. Configuration management can be divided into two subsystems:
reconfiguration and __________
a) Documentation
b) Information
c) Servers
d) Entity
Answer: a
Explanation: The documentation subsystem of configuration management
handles the log making and reporting functions of the configuration
management. It also reports the errors in the network caused by the
configuration’s failure.
4. In Network Management System, the term that is responsible for controlling
access to network based on predefined policy is called ___________
a) Fault Management
b) Secured Management
c) Active Management
d) Security Management
Answer: d
Explanation: In Network Management System, the term that is responsible for
controlling access to the network based on predefined policy is called security
management. The security management ensures authentication,
confidentiality and integrity in the network.
5. Control of users’ access to network resources through charges is the main
responsibility of ______________
a) Reactive Fault Management
b) Reconfigured Fault Management
c) Accounting Management
d) Security Management
Answer: c
Explanation: Control of users’ access to network resources through charges is
the main responsibility of accounting management. The accounting
management creates a log of the users activity on the network too and goes
hand-in-hand with the configurations management.
6. The physical connection between an end point and a switch or between two
switches is __________
a) Transmission path
b) Virtual path
c) Virtual circuit
d) Transmission circuit
Answer: a
Explanation: The physical connection between an end point and a switch or
between two switches is transmission path. The transmission path is the
physical roadway that the packet needs to propagate in order to travel through
the network.
7. Which of the following networks supports pipelining effect?
a) Circuit-switched networks
b) Message-switched networks
c) Packet-switched networks
d) Stream-switched networks
Answer: c
Explanation: Packet switched network is most preferred for pipelining process.
Pipelining exponentially reduces the time taken to transmit a large number of
packets in the network.
8. In Network Management System, maps track each piece of hardware and
its connection to the _________
a) IP Server
b) Domain
c) Network
d) Data
Answer: c
Explanation: Network is the main entity connecting different components in a
place. A network map is made to track each component and its connection to
the network to ensure better network management.
9. MIB is a collection of groups of objects that can be managed by
__________
a) SMTP
b) UDP
c) SNMP
d) TCP/IP
Answer: c
Explanation: MIB stands for Management Information Base. Simple network
management controls the group of objects in management information base. It
is usually used with SNMP (Simple Network Management Protocol).
10. A network management system can be divided into ___________
a) three categories
b) five broad categories
c) seven broad categories
d) ten broad categories
Answer: b
Explanation: The five broad categories of network management are
• Fault Management
• Configuration Management
• Accounting (Administration)
• Performance Management
• Security Management.
Answer: d
Explanation: PING (Packet Internet Groper) command is the best way to test
connectivity between two nodes, whether it is Local Area Network (LAN) or
Wide Area Network (WAN). Ping uses ICMP (Internet Control Message
Protocol) to communicate to other devices.
2. Ping sweep is a part of _________
a) Traceroute
b) Nmap
c) Route
d) Ipconfig
Answer: b
Explanation: A ping sweep is a method that can establish a range of IP
addresses which map to live hosts and are mostly used by network scanning
tools like nmap. A ping sweep is basically a collective ping command execution
on a range of IP addresses.
3. ICMP is used in _________
a) Ping
b) Traceroute
c) Ifconfig
d) Both Ping & Traceroute
Answer: d
Explanation: ICMP stands for Internet Control Message Protocol. ICMP
operates over the IP packet to provide error reporting functionality, so in case
the node is not active or there is no route, ICMP will be used to report the
specific errors for Ping and Traceroute.
4. __________ command is used to manipulate TCP/IP routing table.
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
Answer: a
Explanation: The route command is used to view and manipulate the TCP/IP
routing table in Windows OS. The manipulations done in the routing table with
the help of this command will count as static routes.
5. If you want to find the number of routers between a source and destination,
the utility to be used is ___________
a) route
b) Ipconfig
c) Ifconfig
d) Traceroute
Answer: d
Explanation: Traceroute command is available on Linux OS to find the path i.e.
the number of the routers that the packet has to go through to reach the
destination. In Windows, Tracert command is used to perform the function.
6. Which of the following is not related to ipconfig in Microsoft Windows?
a) Display all current TCP/IP network configuration values
b) Modify DHCP settings
c) Modify DNS settings
d) Trace the routers in the path to destination
Answer: d
Explanation: The Tracert command is available on Microsoft Windows to find
the path i.e. the number of the routers that the packet has to go through to
reach its destination.
7. __________ allows checking if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup
d) Domain registers
Answer: a
Explanation: There are billions of domains available for registration on the
World Wide Web, and many of them are already registered. So when one
wants to register a domain, they need to check whether the domain is
available through a domain check.
8. Choose the wrong statement from the following.
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters
Answer: c
Explanation: Pathping combines the functionality of ping with that of traceroute
(tracert). The Ping command is used to test connectivity between two nodes
and the Tracert/Traceroute command is used to find the path i.e. the number of
the routers that the packet has to go through to reach its destination.
Answer: b
Explanation: The start frame delimiter is a 1 byte field in the Ethernet frame
that indicates that the preceding bits are the start of the frame. It is always set
to 10101011.
3. MAC address is of ___________
a) 24 bits
b) 36 bits
c) 42 bits
d) 48 bits
Answer: d
Explanation: MAC address is like a local address for the NIC that is used to
make a local Ethernet (or wifi) network function. It is of 48 bits.
4. What is autonegotiation?
a) a procedure by which two connected devices choose common transmission
parameters
b) a security algorithm
c) a routing algorithm
d) encryption algorithm
Answer: a
Explanation: autonegotiation is a procedure by which two connected devices
choose common transmission parameters. It is a signaling mechanism used in
Ethernet over Twisted pair cables.
5. Ethernet in metropolitan area network (MAN) can be used as ___________
a) pure ethernet
b) ethernet over SDH
c) ethernet over MPLS
d) all of the mentioned
Answer: d
Explanation: A metropolitan area network (MAN) that is based on Ethernet
standards is called an Ethernet MAN. It is commonly used to connect nodes to
the Internet. Businesses also use Ethernet MANs to connect their own offices
to each other.
6. A point-to-point protocol over ethernet is a network protocol for __________
a) encapsulating PPP frames inside ethernet frames
b) encapsulating ehternet framse inside PPP frames
c) for security of ethernet frames
d) for security of PPP frames
Answer: a
Explanation: PPoE or Point-to-Point protocol over Ethernet was first introduced
in 1999. It is popularly used by modern day Internet Service Providers for Dial-
up connectivity.
7. High speed ethernet works on _________
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) unshielded twisted pair cable
Answer: c
Explanation: Fast Ethernet is mostly used in networks along with Category 5
(Cat-5) copper twisted-pair cable, but it also works with fiber-optic cable.
Based on the cable being used, There can be three types of Fast Ethernet.
8. The maximum size of payload field in ethernet frame is __________
a) 1000 bytes
b) 1200 bytes
c) 1300 bytes
d) 1500 bytes
Answer: d
Explanation: The minimum size of the payload field is 40 bytes and the
maximum size is 1500 bytes. If the payload size exceeds 1500 bytes, the
frame is called a jumbo frame.
9. What is interframe gap?
a) idle time between frames
b) idle time between frame bits
c) idle time between packets
d) idle time between networks
Answer: a
Explanation: The inter-frame gap is the idle time for the receiver between the
incoming frame flow. The inter-frame gap must be as low as possible for idle
connections.
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64
octets is called _______
a) short frame
b) runt frame
c) mini frame
d) man frame
Answer: b
Explanation: An ethernet frame that is less than the IEEE 802.3 minimum
length of 64 octets is called a runt frame. Such frames are a result of collisions
or software malfunctions.
Answer: a
Explanation: Access point in a wireless network is any device that will allow the
wireless devices to a wired network. A router is the best example of an Access
Point.
2. In wireless ad-hoc network _________
a) access point is not required
b) access point is must
c) nodes are not required
d) all nodes are access points
Answer: a
Explanation: An ad-hoc wireless network is a decentralized kind of a wireless
network. An access point is usually a central device and it would go against
the rules of the ad-hoc network to use one. Hence it is not required.
3. Which multiple access technique is used by IEEE 802.11 standard for
wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
Answer: b
Explanation: CSMA/CA stands for Carrier-sense multiple access/collision
avoidance. It is a multiple access protocol used by IEEE 802.11 standard for
wireless LAN. It’s based on the principle of collision avoidance by using
different algorithms to avoid collisions between channels.
4. In wireless distribution system __________
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) access points are not required
Answer: a
Explanation: A Wireless Distribution System allows the connection of multiple
access points together. It is used to expand a wireless network to a larger
network.
5. A wireless network interface controller can work in _______
a) infrastructure mode
b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
d) WDS mode
Answer: c
Explanation: A wireless network interface controller works on the physical layer
and the data link layer of the OSI model. Infrastructure mode WNIC needs
access point but in ad-hoc mode access point is not required.
6. In wireless network an extended service set is a set of ________
a) connected basic service sets
b) all stations
c) all access points
d) connected access points
Answer: a
Explanation: The extended service set is a part of the IEEE 802.11 WLAN
architecture and is used to expand the range of the basic service set by
allowing connection of multiple basic service sets.
7. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) channel division multiplexing
Answer: b
Explanation: In orthogonal frequency division multiplexing, digital data is
encoded on multiple carrier frequencies. It is also used in digital television and
audio broadcasting in addition to Wireless LANs.
8. Which one of the following event is not possible in wireless LAN?
a) collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks
Answer: a
Explanation: Collision detection is not possible in wireless LAN with no
extensions. Collision detection techniques for multiple access like CSMA/CD
are used to detect collisions in Wireless LANs.
9. What is Wired Equivalent Privacy (WEP)?
a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) security algorithm for emails
Answer: b
Explanation: WEP is a security algorithm for wireless network which intended
to provide data confidentiality comparable to that of traditional wired networks.
It was introduced in 1997.
10. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access
Answer: a
Explanation: WPA or WiFi Protected Access is a security protocol used to
provide users and firms with strong data security and protection for their
wireless networks (WiFi) to give them confidence that only authorized users
can access their network.
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) interconnection of wide area networks
Answer: b
Explanation: Internet is nothing but an interconnected computer network
providing a variety of communication facilities, consisting of a huge amount of
small networks using standardized communication protocols.
2. To join the internet, the computer has to be connected to a _________
a) internet architecture board
b) internet society
c) internet service provider
d) different computer
Answer: c
Explanation: The ISPs (Internet Service Providers) are the main agents
through which every computer is connected to the internet. They are licensed
to allot public IP addresses to its customers in order to connect them to the
internet.
3. Internet access by transmitting digital data over the wires of a local
telephone network is provided by _______
a) leased line
b) digital subscriber line
c) digital signal line
d) digital leased line
Answer: b
Explanation: DSL (Digital Subscriber Line) is the technology designed to use
the existing telephone lines to transport high-bandwidth data to service
subscribers. DSL was used to allow the early users access to the internet and
it provides dedicated, point-to-point, public network access.
4. ISP exchanges internet traffic between their networks by __________
a) internet exchange point
b) subscriber end point
c) isp end point
d) internet end point
Answer: a
Explanation: ISPs exchange internet traffic between their networks by using
Internet Exchange Points. ISPs and CDNs are connected to each other at
these physical locations are they help them provide better service to their
customers.
5. Which of the following protocols is used in the internet?
a) HTTP
b) DHCP
c) DNS
d) DNS, HTTP and DNS
Answer: d
Explanation: HTTP is used to browse all the websites on the World Wide Web,
DHCP is used to allot IPs automatically to the users on the internet, and DNS
is used to connect the users to the host servers on the internet based on the
Domain Name.
6. The size of an IP address in IPv6 is _________
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
Answer: c
Explanation: An IPv6 address is 128 bits long. Therefore, 2128 i.e. 340
undecillion addresses are possible in IPv6. IPv4 has only 4 billion possible
addresses and IPv6 would be a brilliant alternative in case IPv4 runs out of
possible new addresses.
7. Internet works on _______
a) packet switching
b) circuit switching
c) both packet switching and circuit switching
d) data switching
Answer: a
Explanation: Packet switching is the method based on which the internet
works. Packet switching features delivery of packets of data between devices
over a shared network.
8. Which one of the following is not an application layer protocol used in
internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) local procedure call
Answer: c
Explanation: Resource reservation protocol is a transport layer protocol used
on the internet. It operates over IPv4 and IPv6 and is designed to reserve
resources required by the network layer protocols.
9. Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
d) RSVP
Answer: a
Explanation: DHCP stands for Domain Host Control Protocol. It is responsible
to remotely assign IP address to the clients connected to the internet. The
server that performs this fuction is called the DHCP server.
10. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) packet switching
Answer: d
Explanation: Packet switching is not really related to media access control as it
just features delivery of packets of data between devices over a shared
network. Internet is actually based on packet switching.
Answer: a
Explanation: Piconet is the basic unit of a bluetooth system having a master
node and upto seven active slave nodes. A collection of piconets is called
scatternet and a slave node of a piconet may act as a master in a piconet that
is part of the scatternet.
2. In a piconet, there can be up to ________ parked nodes in the network.
a) 63
b) 127
c) 255
d) 511
Answer: c
Explanation: A slave node in a piconet can be instructed by the master node to
go into parked mode. Then the slave node enters the parked mode in which
the node is not disconnected from the network but is inactive unless the
master wakes it up.
3. Bluetooth is the wireless technology for __________
a) local area network
b) personal area network
c) metropolitan area network
d) wide area network
Answer: b
Explanation: Bluetooth is a wireless technology used to create a wireless
personal area network for data transfer up to a distance of 10 meters. It
operates on 2.45 GHz frequency band for transmission.
4. Bluetooth uses __________
a) frequency hopping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) channel division multiplexing
Answer: a
Explanation: Frequency hopping spread spectrum is a method of transmitting
radio signals by rapidly changing the carrier frequency and is controlled by the
codes known to the sender and receiver only.
5. Unauthorised access of information from a wireless device through a
bluetooth connection is called _________
a) bluemaking
b) bluesnarfing
c) bluestring
d) bluescoping
Answer: b
Explanation: Unauthorised access of information from a wireless device
through a bluetooth connection is called Bluesnarfing. It is done through
exploiting the vulnerabilities of the Bluetooth device to steal the transmitted
information.
6. What is A2DP (advanced audio distribution profile)?
a) a bluetooth profile for streaming audio
b) a bluetooth profile for streaming video
c) a bluetooth profile for security
d) a bluetooth profile for file management
Answer: a
Explanation: A2DP stands for Advanced Audio Distribution Profile is a transfer
standard use to transmit high definition audio through Bluetooth. It is mainly
used in Bluetooth speakers and wireless headphones.
7. In a piconet, one master device ________
a) can not be slave
b) can be slave in another piconet
c) can be slave in the same piconet
d) can be master in another piconet
Answer: b
Explanation: In a scatternet, a slave node of one piconet may act as a master
in a piconet that is part of the scatternet. The scatternet uses this property to
connect many piconets together to create a larger network.
8. Bluetooth transceiver devices operate in ______ band.
a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM
Answer: a
Explanation: Bluetooth operates on 2.45 GHz frequency ISM band for
transmission. It is used to create a wireless personal area network for data
transfer up to a distance of 10 meters.
9. Bluetooth supports _______
a) point-to-point connections
b) point-to-multipoint connection
c) both point-to-point connections and point-to-multipoint connection
d) multipoint to point connection
Answer: c
Explanation: In Bluetooth, each slave node communicates with the master of
the piconet independently i.e. each master-slave connection is independent.
The slave is not allowed to communicate with other slaves directly.
10. A scatternet can have maximum __________
a) 10 piconets
b) 20 piconets
c) 30 piconets
d) 40 piconets
Answer: a
Explanation: A scatternet can have maximum of 10 piconets and minimum of 2
piconets. To connect these piconets, a slave node of one piconet may act as a
master in a piconet that is part of the scatternet.
Answer: b
Explanation: WiMAX or worldwide interoperability for microwave access is a
set of wireless communication standards. It provides support for multiple
physical layer (PHY) and Media Access Control (MAC) options. It is based on
IEEE 802.16 standards.
2. WiMAX provides ________
a) simplex communication
b) half duplex communication
c) full duplex communication
d) no communication
Answer: c
Explanation: WiMax was developed to provide wireless broadband access to
buildings. It can also be used to connect WLAN hotspots to the Internet. It is
based on IEEE 802.16 standards.
3. WiMAX uses the _________
a) orthogonal frequency division multiplexing
b) time division multiplexing
c) space division multiplexing
d) channel division multiplexing
Answer: a
Explanation: WiMAX physical layer uses orthogonal frequency division
multiplexing as it provides simplified reception in multipath and allows WiMAX
to operate in NLOS conditions.
4. Which of the following modulation schemes is supported by WiMAX?
a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
c) quadrature amplitude modulation
d) all of the mentioned
Answer: d
Explanation: WiMAX supports a variety of modulation schemes such as binary
phase shift keying modulation, quadrature phase shift keying modulation, and
quadrature amplitude modulation and allows for the scheme to change on a
burst-by-burst basis per link, depending on channel conditions.
5. WiMAX MAC layer provides an interface between ___________
a) higher transport layers and physical layer
b) application layer and network layer
c) data link layer and network layer
d) session layer and application layer
Answer: a
Explanation: WiMAX provides support for multiple physical layer (PHY) on the
physical layer and Media Access Control (MAC) options for higher layers to
provide wireless broadband access to buildings.
6. For encryption, WiMAX supports _______
a) advanced encryption standard
b) triple data encryption standard
c) advanced encryption standard and triple data encryption standard
d) double data encryption standard
Answer: c
Explanation: Both advanced encryption standard and triple data encryption
standard are block cipher techniques and are popularly used in WiMAX and
other applications for secure encryption.
7. WiMAX provides _______
a) VoIP services
b) IPTV services
c) Both VoIP and IPTV services
d) no IPTV services
Answer: c
Explanation: IPTV can be transmitted over WiMAX, and relies on packet-
switching to offer reliable delivery. VoIP can be operated over a WiMax
network with no special hardware or software.
8. Devices that provide the connectivity to a WiMAX network are known as
_________
a) subscriber stations
b) base stations
c) gateway
d) switch stations
Answer: a
Explanation: Subscriber stations in WiMAX are transceivers (transmitter and
receivers). They are used to convert radio signals into digital signals that can
be routed to and from communication devices. There is a variety of types of
WiMAX subscriber stations like portable PCMCIA cards and fixed stations that
provide service to multiple users.
9. WiMAX is mostly used for __________
a) local area network
b) metropolitan area network
c) personal area network
d) wide area network
Answer: b
Explanation: WiMAX provides Wi-Fi connectivity within the home or business
for computers and smartphones. WiMAX network operators typically provide a
WiMAX Subscriber Unit to do so. The subscriber unit is used to connect to the
metropolitan WiMAX network.
10. Which of the following frequencies is not used in WiMAX for
communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
Answer: b
Explanation: The 2.4GHz ISM frequency band is used for personal area
network technologies such as Bluetooth and hence is not suitable for WiMAX
which is mostly used for Metropolitan Area Networks.
Answer: a
Explanation: SONET stands for synchronous optical network. Frame relay
uses SONET to physically transmit data frames over a Frame Relay network
as SONET is cheaper and provides better network reliability than other
carriers.
2. In SONET, STS-1 level of electrical signalling has the data rate of
_________
a) 51.84 Mbps
b) 155.52 Mbps
c) 2488.320 Mbps
d) 622.080 Mbps
Answer: a
Explanation: STS-1 level provides the data rate of 51.84 Mbps, STS-3
provides a data rate of 155.52 Mbps, STS-12 provides a data rate of 622.080
Mbps and STS-48 provides a data rate of 2488.320 Mbps.
3. The path layer of SONET is responsible for the movement of a signal
_________
a) from its optical source to its optical destination
b) across a physical line
c) across a physical section
d) back to its optical source
Answer: b
Explanation: The path layer in SONET is responsible for finding the path of the
signal across the physical line to reach the optical destination. It is ideally
expected to find the shortest and the most reliable path to the destination.
4. The photonic layer of the SONET is similar to the __________ of OSI
model.
a) network layer
b) data link layer
c) physical layer
d) transport layer
Answer: c
Explanation: The photonic layer in SONET is like the physical layer of the OSI
model. It is the lowest layer among the four layers of SONET namely the
photonic, the section, the line, and the path layers.
5. In SONET, each synchronous transfer signal STS-n is composed of
__________
a) 2000 frames
b) 4000 frames
c) 8000 frames
d) 16000 frames
Answer: c
Explanation: SONET defines the electrical signal as STS-N (Synchronous
Transport Signal Level-N) and the optical signal as OC-N (Optical Carrier
Level-N). The building block of SONET is the STS-1/OC-1 signal, which is
based on an 8-kHz frame rate and operates at 51.84 Mbps.
6. Which one of the following is not true about SONET?
a) frames of lower rate can be synchronously time-division multiplexed into a
higher-rate frame
b) multiplexing is synchronous TDM
c) all clocks in the network are locked to a master clock
d) STS-1 provides the data rate of 622.080Mbps
Answer: d
Explanation: In SONET, STS-N stands for Synchronous Transport Signal
Level-N. STS-1 level provides the data rate of 51.84 Mbps, and STS-12
provides a data rate of 622.080 Mbps.
7. A linear SONET network can be ________
a) point-to-point
b) multi-point
c) both point-to-point and multi-point
d) single point
Answer: c
Explanation: Synchronous Optical Network (SONET) is basically an optical
fiber point-to-point or ring network backbone that provides a way to
accommodate additional capacity as the needs of the organization increase to
multipoint networks.
8. Automatic protection switching in linear network is defined at the _______
a) line layer
b) section layer
c) photonic layer
d) path layer
Answer: a
Explanation: The Line layer in SONET operates like the data link layer in the
OSI model and it is responsible for the movement of signal across a physical
line. The Synchronous Transport Signal Mux/Demux and Add/Drop Mux
provide the Line layer functions.
9. A unidirectional path switching ring is a network with __________
a) one ring
b) two rings
c) three rings
d) four rings
Answer: b
Explanation: One ring is used as the working ring and other as the protection
ring in which each node is connected to its respective adjacent nodes by two
fibers, one to transmit, and one to receive.
10. What is SDH?
a) sdh is similar standard to SONET developed by ITU-T
b) synchronous digital hierarchy
c) sdh stands for synchronous digital hierarchy and is a similar standard to
SONET developed by ITU-T
d) none of the mentioned
Answer: c
Explanation: SDH is a standard that allows low bit rates to be combined into
high-rate data streams and as it is synchronous, each individual bit stream can
be embedded into and extracted from high-rate data streams easily.
Answer: d
Explanation: RTP stands for Real-time transport protocol and is for delivering
audio and video over IP networks. Its applications include streaming media,
video teleconference, and television services.
2. RTP is used to ________
a) carry the media stream
b) monitor transmission statistics of streams
c) monitor quality of service of streams
d) secure the stream
Answer: a
Explanation: RTP is used to carry the media stream for delivering audio and
video over IP networks. Its applications include streaming media, video
teleconference, and television services.
3. RTP provides the facility of jitter ____________
a) media stream
b) expansion
c) media modification
d) security
Answer: a
Explanation: RTP provides the facility of jitter media stream through a jitter
buffer which works by reconstructing the sequence of packets on the receiving
side. Then an even audio / video stream is generated.
4. Which protocol provides the synchronization between media streams?
a) RTP
b) RTCP
c) RPC
d) RTCT
Answer: b
Explanation: RTCP stands for Real-time Transport Control Protocol and it
works with RTP to send control packets to the users of the networks while RTP
handles the actual data delivery.
5. An RTP session is established for ____________
a) each media stream
b) all media streams
c) some predefined number of media streams
d) no media stream
Answer: a
Explanation: An RTP session is required to be established for each media
stream for delivering audio and video over the IP network. Each session has
independent data transmission.
6. RTP can use __________
a) unprevileleged UDP ports
b) stream control transmission protocol
c) datagram congestion control protocol
d) all of the mentioned
Answer: d
Explanation: RTP uses unprevileleged UDP ports, stream control transmission
protocol, and datagram congestion control protocol for data delivery over IP
networks.
7. Which one of the following multimedia formats can not be supported by
RTP?
a) MPEG-4
b) MJPEG
c) MPEG
d) TXT
Answer: d
Explanation: RTP is suitable only for multimedia and not for simple text files as
the operation would result into wastage of resources. Other protocols like FTP
are suitable for such transmissions.
8. An RTP header has a minimum size of _________
a) 12 bytes
b) 16 bytes
c) 24 bytes
d) 32 bytes
Answer: a
Explanation: Each RTP packet has a fixed header of size 12 bytes that
contains essential control information like timestamp, payload type etc. for the
receiving system processing.
9. Which one of the following is not correct?
a) RTCP provides canonical end-point identifiers to all session participants
b) RTCP reports are expected to be sent by all participants
c) RTCP itself does not provide any flow encryption or authentication methods
d) RTCP handles the actual data delivery
Answer: d
Explanation: RTCP works with RTP to send control packets to the users of the
networks and provide canonical end-point identifiers to all session participants
while RTP handles the actual data delivery.
10. Which protocol defines a profile of RTP that provides cryptographic
services for the transfer of payload data?
a) SRTP
b) RTCP
c) RCP
d) RTCT
Answer: a
Explanation: SRTP stands for Secure Real-time Transport Protocol. It is like an
extension to RTP which provides stream security through encryption, message
authentication and integrity, and replay attack protection.
Answer: b
Explanation: Remote Procedure Call is a method used for constructing
distributed, client-server applications based on extending the conventional
local procedure calling where the client initiates an RPC to start a connection
process.
2. In RPC, while a server is processing the call, the client is blocked ________
a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) unless the server is disconnected
Answer: a
Explanation: While the server is processing the call i.e. looking through the
specifications, the client is blocked, unless the client sends an asynchronous
request to the server for another operation.
3. A remote procedure call is _______
a) inter-process communication
b) a single process
c) a single thread
d) a single stream
Answer: a
Explanation: Remote procedure calls is a form of inter-process communication
where the client initiates an RPC to start a connection process. It is used to
construct distributed, client-server applications.
4. RPC allows a computer program to cause a subroutine to execute in
_________
a) its own address space
b) another address space
c) both its own address space and another address space
d) applications address space
Answer: b
Explanation: RPC allows a computer program to cause a subroutine to
execute in another address space which is usually the servers address space
in a conventional client-server network.
5. RPC works between two processes. These processes must be
____________
a) on the same computer
b) on different computers connected with a network
c) on the same computer and also on different computers connected with a
network
d) on none of the computers
Answer: c
Explanation: For the operation of RPC between two processes, it is mandatory
that the processes are present on the same computer and also on different
computers connected with its network.
6. A remote procedure is uniquely identified by _________
a) program number
b) version number
c) procedure number
d) all of the mentioned
Answer: d
Explanation: Each remote procedure can be uniquely identified by the program
number, version number and the procedure number in the networks scope.
The identifiers can be used to control the remote procedure by parties involved
in the process.
7. An RPC application requires _________
a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned
Answer: d
Explanation: The RPC technique for constructing distributed, client-server
applications based on extending the conventional local procedure calling. It
requires a client program, a server program and specific protocol for client
server communication to build the system.
8. RPC is used to _________
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) establish a server on remote machine that can respond to queries and
retrieve information by calling a query
d) to secure the client
Answer: c
Explanation: RPC or Remote Procedure Call is used to establish a server on
remote machine that can respond to queries and to retrieve information by
calling a query by other computers.
9. RPC is a _________
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) channel specific operation
Answer: a
Explanation: RPC is a synchronous operation where the remote machine
works in sync with the other machines to act as a server that can respond to
queries called by the other machines.
10. The local operating system on the server machine passes the incoming
packets to the ___________
a) server stub
b) client stub
c) client operating system
d) client process
Answer: a
Explanation: The local operating system on the server machine passes the
incoming packets to the server stub which then processes the packets which
contain the queries from the client machines for retrieving information.
Answer: c
Explanation: Once a protocol has been built and a behavior defined, the
engine can scale more quickly and easily than the signature-based model
because a new signature does not have to be created for every attack and
potential variant.
2. A false positive can be defined as ________
a) An alert that indicates nefarious activity on a system that, upon further
inspection, turns out to represent legitimate network traffic or behavior
b) An alert that indicates nefarious activity on a system that is not running on
the network
c) The lack of an alert for nefarious activity
d) Both An alert that indicates nefarious activity on a system that, upon further
inspection, turns out to represent legitimate network traffic or behavior and An
alert that indicates nefarious activity on a system that is not running on the
network
Answer: d
Explanation: A false positive is any alert that indicates nefarious activity on a
system that, upon further inspection, turns out to represent legitimate network
traffic or behavior.
3. One of the most obvious places to put an IDS sensor is near the firewall.
Where exactly in relation to the firewall is the most productive placement?
a) Inside the firewall
b) Outside the firewall
c) Both inside and outside the firewall
d) Neither inside the firewall nor outside the firewall.
Answer: a
Explanation: There are legitimate political, budgetary and research reasons to
want to see all the “attacks” against your connection, but given the care and
feeding any IDS requires, do yourself a favor and keep your NIDS sensors on
the inside of the firewall.
Answer: c
Explanation: “Shadow honeypots,” as researchers call them, share all the
same characteristics of protected applications running on both the server and
client side of a network and operate in conjunction with an ADS.
5. At which two traffic layers do most commercial IDSes generate signatures?
a) Application layer and Network layer
b) Network layer and Session Layer
c) Transport layer and Application layer
d) Transport layer and Network layer
Answer: d
Explanation: Most commercial IDSes generate signatures at the network and
transport layers. These signatures are used to ensure that no malicious
operation is contained in the traffic. Nemean generates signature at application
and session layer.
6. IDS follows a two-step process consisting of a passive component and an
active component. Which of the following is part of the active component?
a) Inspection of password files to detect inadvisable passwords
b) Mechanisms put in place to reenact known methods of attack and record
system responses
c) Inspection of system to detect policy violations
d) Inspection of configuration files to detect inadvisable settings
Answer: b
Explanation: Secondary components of mechanism are set in place to reenact
known methods of attack and to record system responses. In passive
components, the system I designed just to record the system’s responses in
case of an intrusion.
7. When discussing IDS/IPS, what is a signature?
a) An electronic signature used to authenticate the identity of a user on the
network
b) Attack-definition file
c) It refers to “normal,” baseline network behavior
d) It is used to authorize the users on a network
Answer: b
Explanation: IDSes work in a manner similar to modern antivirus technology.
They are constantly updated with attack-definition files (signatures) that
describe each type of known malicious activity. Nemean is a popular signature
generation method for conventional computer networks.
8. “Semantics-aware” signatures automatically generated by Nemean are
based on traffic at which two layers?
a) Application layer and Transport layer
b) Network layer and Application layer
c) Session layer and Transport layer
d) Application layer and Session layer
Answer: d
Explanation: Nemean automatically generates “semantics-aware” signatures
based on traffic at the session and application layers. These signatures are
used to ensure that no malicious operation is contained in the traffic.
9. Which of the following is used to provide a baseline measure for comparison
of IDSes?
a) Crossover error rate
b) False negative rate
c) False positive rate
d) Bit error rate
Answer: a
Explanation: As the sensitivity of systems may cause the false positive/
negative rates to vary, it’s critical to have some common measure that may be
applied across the board.
10. Which of the following is true of signature-based IDSes?
a) They alert administrators to deviations from “normal” traffic behavior
b) They identify previously unknown attacks
c) The technology is mature and reliable enough to use on production
networks
d) They scan network traffic or packets to identify matches with attack-
definition files
Answer: d
Explanation: They are constantly updated with attack-definition files
(signatures) that describe each type of known malicious activity. They then
scan network traffic for packets that match the signatures, and then raise
alerts to security administrators.
Answer: a
Explanation: Both HDLC and PPP both are Data link layer protocol. HDLC
stands for High level Data Link Control and PPP stands for Point to Point
Protocol.
2. Which protocol does the PPP protocol provide for handling the capabilities
of the connection/link on the network?
a) LCP
b) NCP
c) Both LCP and NCP
d) TCP
Answer: c
Explanation: LCP stands for Link Control Protocol and NCP stands for Network
Control Protocol. LCP and NCP are the PPP protocols which provide interface
for handling the capabilities of the connection/link on the network.
3. The PPP protocol _________
a) Is designed for simple links which transport packets between two peers
b) Is one of the protocols for making an Internet connection over a phone line
c) Is designed for simple links which transport packets between two peers and
making an Internet connection over a phone line
d) Is used for sharing bandwidth
Answer: c
Explanation: The PPP protocol is designed for handling simple links which
transport packets between two peers. It is a standard protocol that is used to
make an Internet connection over phone lines.
4. PPP provides the _______ layer in the TCP/IP suite.
a) Link
b) Network
c) Transport
d) Application
Answer: a
Explanation: PPP provides function of the link layer in the TCP/IP suite. It
focuses on the link between two nodes that is going to be used by the users to
communicate. It can use pre-installed phone line for the purpose.
5. PPP consists of ________components
a) Three (encapsulating, the Domain Name system)
b) Three (encapsulating, a link control protocol, NCP)
c) Two (a link control protocol, Simple Network Control protocol)
d) One (Simple Network Control protocol)
Answer: b
Explanation: PPP consists of three components namely Link Control Protocol
(LCP), Network Control Protocol (NCP), and Encapsulation. LCP and NCP are
the PPP protocols which provide interface for handling the capabilities of the
connection/link on the network and encapsulation provides for multiplexing of
different network-layer protocols.
6. The PPP encapsulation ____________
a) Provides for multiplexing of different network-layer protocols
b) Requires framing to indicate the beginning and end of the encapsulation
c) Establishing, configuring and testing the data-link connection
d) Provides interface for handling the capabilities of the connection/link on the
network
Answer: a
Explanation: Encapsulation is a part of PPP which provides means for
multiplexing of different network-layer protocols. The other two parts of PPP
are Link Control Protocol and Network Control Protocol.
7. A Link Control Protocol (LCP) is used for ____________
a) Establishing, configuring and testing the data-link connection
b) Establishing and configuring different network-layer protocols
c) Testing the different network-layer protocols
d) Provides for multiplexing of different network-layer protocols
Answer: a
Explanation: The Link Control Protocol (LCP) is the part of PPP that is used for
establishing, configuring and testing the data-link connection. The other two
components are Network Control Protocol and Encapsulation.
8. A family of network control protocols (NCPs) ____________
a) Are a series of independently defined protocols that provide a dynamic
b) Are a series of independently-defined protocols that encapsulate
c) Are a series of independently defined protocols that provide transparent
d) The same as NFS
Answer: b
Explanation: The family of network control protocols (NCPs) is a series of
independently-defined protocols that encapsulate the data flowing between the
two nodes. It provides means for the network nodes to control the link traffic.
9. Choose the correct statement from the following.
a) PPP can terminate the link at any time
b) PPP can terminate the link only during the link establishment phase
c) PPP can terminate the link during the authentication phase
d) PPP can terminate the link during the callback control phase
Answer: a
Explanation: PPP allows termination of the link at any time in any phase
because it works on the data link layer which is the layer in control of the link
of the communication.
10. The link necessarily begins and ends with this phase. During the ______
phase, the LCP automata will be in INITIAL or STARTING states.
a) Link-termination phase
b) Link establishment phase
c) Authentication phase
d) Link dead phase
Answer: d
Explanation: The link necessarily begins and ends with the link dead phase.
During this phase, the LCP automata will be in the initial or its final state. The
link is non-functioning or inactive during the link dead phase.
Answer: a
Explanation: EIGRP stands for Enhanced Interior Gateway Routing Protocol is a
routing protocol designed by Cisco. It is available only on Cisco routers.
2. EIGRP metric is ________
a) K-values
b) Bandwidth only
c) Hop Count
d) Delay only
Answer: a
Explanation: EIGRP metric is K-values which are integers from 0 to 128. They
are used to calculate the overall EIGRP cost with bandwidth and delay metrics.
3. EIGRP can support ____________
a) VLSM/subnetting
b) Auto summary
c) Unequal cast load balancing
d) All of the mentioned
Answer: d
Explanation: EIGRP supports variable and fixed length subnetting, Auto
summary, and Unequal cast load balancing to provide efficient routing
functionality on Cisco routers.
4. EIGRP sends a hello message after every ___________ seconds.
a) 5 seconds (LAN), 60 seconds (WAN)
b) 5 seconds (LAN), 5 seconds (WAN)
c) 15s
d) 180s
Answer: a
Explanation: EIGRP routers broadcast the hello packets frequently to familiarize
with the neighbors. EIGRP routers send the hello message after every 5 seconds
on LAN, and every 60 seconds on WAN.
5. Administrative distance for internal EIGRP is ______
a) 90
b) 170
c) 110
d) 91
Answer: a
Explanation: Routers use the metric of administrative distance to select the best
path when there are different routes to the same destination from two different
routing protocols as it is a measure of reliability of routing protocols.
Administrative distance for internal EIGRP is 90.
6. The EIGRP metric values include:
a) Delay
b) Bandwidth
c) MTU
d) All of the mentioned
Answer: d
Explanation: The EIGRP metric values are Delay, Bandwidth, and MTU. MTU
stands for Maximum Transmission Unit. They are combined together to give the
overall EIGRP cost in K-values.
7. For default gateway, which of following commands will you use on a Cisco
router?
a) IP default network
b) IP default gateway
c) IP default route
d) Default network
Answer: a
Explanation: IP default network command is used to find the default gateway in
Cisco router. If the router finds routes to the node, it considers the routes to that
node for installation as the gateway to it.
8. Administrative distance for external EIGRP route is _______
a) 90
b) 170
c) 110
d) 100
Answer: b
Explanation: Routers use the metric of administrative distance to select the best
path when there are different routes to the same destination from two different
routing protocols as it is a measure of reliability of routing protocols.
Administrative distance for external EIGRP is 170.
9. EIGRP uses the ____________ algorithm for finding shortest path.
a) SPF
b) DUAL
c) Linkstat
d) Djikstra’s
Answer: b
Explanation: EIGRP uses the DUAL algorithm for finding shortest path. DUAL
stands for diffusing update algorithm and it is used to prevent routing loops by
recalculating routes globally.
10. In EIGRP best path is known as the successor, where as backup path is
known as __________
a) Feasible successor
b) Back-up route
c) Default route
d) There is no backup route in EIGRP
Answer: a
Explanation: Feasible successor is the backup path. The backup path is used
alternatively used whenever the best path fails. It is not used primarily because it
is comparatively expensive than the best path.
Answer: c
Explanation: A file server allows LAN users to share computer programs and
data. It uses the File Transfer Protocol to provide this feature on the ports 20
and 21. The file server works as a medium for the transfer.
2. STP stands for _________
a) Shielded twisted pair cable
b) Spanning tree protocol
c) Static transport protocol
d) Shielded two power cable
Answer: a
Explanation: STP stands for Shielded twisted pair cable. 100 mbps is the max
data capacity of STP and its default connector is RJ45. It is popularly used in
LANs due to its ease of maintenance and installation.
3. A standalone program that has been modified to work on a LAN by including
concurrency controls such as file and record locking is an example of
___________
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software
Answer: a
Explanation: A standalone program that has been modified to work on a LAN
by including concurrency controls such as file and record locking is an
example of LAN intrinsic software. They are used to give better functionality of
the program and the applications working over it to the users of the LAN.
4. The __________ portion of LAN management software restricts access,
records user activities and audit data etc.
a) Configuration management
b) Security management
c) Performance management
d) Recovery management
Answer: b
Explanation: The Security management portion of LAN management software
restricts access, records user activities and audit data. It is responsible for
controlling access to the network based on predefined policy. The security
management ensures authentication, confidentiality and integrity in the LAN.
5. What is the max cable length of STP?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
Answer: c
Explanation: The max cable length of STP is 100 meters. If the length exceeds
100 meters, the loss of signals flowing through the cable would be really high.
Thus, STP is more suitable smaller networks like LANs.
6. What is the max data transfer rate of STP?
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
Answer: b
Explanation: 100 mbps is the max data transfer rate which can be handled by
STP. STP stands for Shielded twisted pair cable and its default connector is
RJ-45. 100 mbps is a feasible data transfer rate for small networks like LANs.
7. Which connector does STP use?
a) BNC
b) RJ-11
c) RJ-45
d) RJ-69
Answer: c
Explanation: RJ-45 is used for STP cable. STP stands for Shielded twisted pair
cable and 100 mbps is the max data transfer rate which can be handled by
STP. RJ-45 is popularly used to connect to modern day routers, computer
network cards and other network devices.
8. What is the central device in star topology?
a) STP server
b) Hub/switch
c) PDC
d) Router
Answer: b
Explanation: In star topology, no computer is connected to another computer
directly but all the computers are connected to a central switch or hub. Every
message sent from a source computer goes through the switch or hub and the
switch or hub then forwards the message only to the intended destination
computer.
9. What is the max data transfer rate for optical fiber cable?
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
Answer: c
Explanation: 1000 mbps is the max data transfer rate for optical fiber cables. It
is said to be the fastest among the other kinds of cables like STP, and co-axial
cables. People are now using optical fiber cables instead of STP for LANs due
to its fast data transfer capability.
10. Which of the following architecture uses CSMA/CD access method?
a) ARC net
b) Ethernet
c) Router
d) STP server
Answer: b
Explanation: Collision detection is not possible in Ethernet without extensions.
Collision detection techniques for multiple access like CSMA/CD are used to
detect collisions in the Ethernet architecture.
www.onlineinterviewquestions.com
1. The IETF standards documents are called-
• RCF
• RFC
• ID
• Protocol
• Path
• Medium
• Route
• Multipoint
• Point to point
• Unipoint
4. Which one of the following computer network is built on the top of another
network?
• chief network
• prime network
• prior network
• overlay network
• protocol architecture
• protocol suite
• protocol stack
.A list of protocols used by a system, one protocol per layer, is called protocol
stack.
• unicast network
• broadcast network
• multicast network
8. Bluetooth is an example of
• None of these
• Cable access
• Telephone access
• Satellite access
• bit-by-bit delivery
• flow control
• both 1 & 2
• inter-networking
• congestion control
• routing
In the OSI model, network layer is the third layer and it provides data routing
paths for network communications.
• internet protocol
• ethernet
15. The data link layer takes the packets from _________ and encapsulates
them into frames for transmission.
• physical layer
• transport layer
• network layer
• application layer
Network layer
The data link layer takes the packets from network layer and encapsulates
them into frames for transmission.
• hdlc
• ethernet
There are many data link layer protocols. Some of them are SDLC
(synchronous data link protocol), HDLC (High level data link control), SLIP
(serial line interface protocol), PPP (Point to point protocol) etc.
Major internet applications like www, email, file transfer etc rely on tcp. TCP is
connection oriented and it is optimized for accurate delivery rather than timely
delivery. It can incur long delays.
• Networking
• Topology
• Routing
• None of these
Topology
• Mesh
• Star
• Ring
• Bus
Bus
• Circuit switching
• Data switching
• Packet switching
• Anti jamming
• Efficiency
• Privacy
https://mcqquestions.com
1-1 Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels
C. Sharing of resources and information
D. All of the Above
1-2 What is a Firewall in Computer Network?
A. The physical boundary of Network
B. An operating System of Computer Network
C. A system designed to prevent unauthorized access
D. A web browsing Software
1-3 How many layers does OSI Reference Model has?
A. 4
B. 5
C. 6
D. 7
1-4 DHCP is the abbreviation of
A. Dynamic Host Control Protocol
B. Dynamic Host Configuration Protocol
C. Dynamic Hyper Control Protocol
D. Dynamic Hyper Configuration Protocol
1-5 IPV4 Address is
A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit
1-6 DNS is the abbreviation of
A. Dynamic Name System
B. Dynamic Network System
C. Domain Name System
D. Domain Network Service
1-7 What is the meaning of Bandwidth in Network?
A. Transmission capacity of a communication channels
B. Connected Computers in the Network
C. Class of IP used in Network
D. None of Above
1-8 ADSL is the abbreviation of
A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line
C. Asymmetric Dual System Line
D. Asymmetric Digital Subscriber Line
1-9 What is the use of Bridge in Network?
A. to connect LANs
B. to separate LANs
C. to control Network Speed
D. All of the above
1-10 Router operates in which layer of OSI Reference Model?
A. Layer 1 (Physical Layer)
B. Layer 3 (Network Layer)
C. Layer 4 (Transport Layer)
D. Layer 7 (Application Layer)
1 – D / 2 – C / 3 – D / 4 – B / 5 – C / 6 – C / 7 – A / 8 – D / 9 – A / 10 – B
1 – C / 2 – D / 3 – A / 4 – A / 5 – D / 6 – A / 7 – C / 8 – B / 9 – A / 10 – D
1 – D / 2 – C / 3 – A / 4 – C / 5 – A / 6 – C / 7 – C / 8 – D / 9 – A / 10 – A
1 – D / 2 – B / 3 – C / 4 – B / 5 – A / 6 – B / 7 – D / 8 – C / 9 – D / 10 – A
5-1 Which of the following is not the External Security Threats?
A. Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)
5-2 What is the Demilitarized Zone?
A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
5-3 What is the full form of RAID ?
A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks
C. Random Access of Independent Disks
D. Random Access of Important Disks
5-4 What is the maximum header size of an IP packet?
A. 32 bytes
B. 64 bytes
C. 30 bytes
D. 60 bytes
5-5 What is the size of Host bits in Class B of IP address?
A. 04
B. 08
C. 16
D. 32
5-6 What is the usable size of Network bits in Class B of IP address?
A. 04
B. 08
C. 14
D. 16
5-7 In which type of RAID, data is mirrored between two disks.
A. RAID 0
B. RAID 1
C. RAID 2
D. RAID 3
5-8 What do you mean by broadcasting in Networking?
A. It means addressing a packet to all machine
B. It means addressing a packet to some machine
C. It means addressing a packet to a particular machine
D. It means addressing a packet to except a particular machine
5-9 Which of the following is/are Protocols of Application?
A. FTP
B. DNS
C. Telnet
D. All of above
5-10 Which of the following protocol is/are defined in Transport layer?
A. FTP
B. TCP
C. UDP
D. B & C
1 – C / 2 – A / 3 – A / 4 – D / 5 – C / 6 – C / 7 – B / 8 – A / 9 – D / 10 – D
1 – C / 2 – A / 3 – A / 4 – B / 5 – D / 6 – D / 7 – A / 8 – D / 9 – A / 10 – B
1 – B / 2 – C / 3 – D / 4 – A / 5 – A / 6 – B / 7 – C / 8 – C / 9 – A / 10 – B
http://www.allindiaexams.in
1. When collection of various computers seems a single coherent system to
its client, then it is called:
• A. computer network
• B. distributed system
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
Explanation:
None.
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
3. Which one of the following computer network is built on the top of another
network?
• A. prior network
• B. chief network
• C. prime network
• D. overlay network
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. broadcast network
• B. unicast network
• C. multicast network
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. bridge
• B. firewall
• C. router
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. protocol architecture
• B. protocol stack
• C. protocol suit
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
10. Which one of the following extends a private network across public
networks?
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. RFC
• B. RCF
• C. ID
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
12. In the layer hierarchy as the data packet moves from the upper to the
lower layers, headers are:
• A. Added
• B. Removed
• C. Rearranged
• D. Modified
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. Syntax
• B. Semantics
• C. Struct
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
Explanation:
• A. Automatic
• B. Half-duplex
• C. Full-duplex
• D. Simplex
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
Explanation:
• A. CNNET
• B. NSFNET
• C. ASAPNET
• D. ARPANET
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
16. The _______ is the physical path over which a message travels:
• A. Ppath
• B. Medium
• C. Protocol
• D. Route
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
Explanation:
• A. ITU-T
• B. IEEE
• C. FCC
• D. ISOC
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. PC
• B. Smartphones
• C. Servers
• D. Switch
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
Explanation:
Network edge devices refer to host systems, which can host applications like
web browser.
• A. Protocols
• B. Standards
• C. RFCs
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. Unipoint
• B. Multipoint
• C. Point to point
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. coaxial cable
• C. optical fiber
• D. electrical cable
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. bit-by-bit delivery
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. coaxial cable
• C. optical fiber
• D. electrical cable
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
3. Bits can be send over guided and unguided media as analog signal by:
• A. digital modulation
• B. amplitude modulation
• C. frequency modulation
• D. phase modulation
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
4. The portion of physical layer that interfaces with the media access control
sublayer is called:
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• B. flow control
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. line coding
• B. channel coding
• C. modulation
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• B. network layer
• C. trasnport layer
• D. application layer
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. analog modulation
• B. digital modulation
• C. multiplexing
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. radio waves
• B. microwaves
• C. infrared
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
1. The data link layer takes the packets from _____ and encapsulates them
into frames for transmission.
• A. network layer
• B. physical layer
• C. transport layer
• D. application layer
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
2. Which one of the following task is not done by data link layer?
• A. framing
• B. error control
• C. flow control
• D. channel coding
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
3. Which sublayer of the data link layer performs data link functions that
depend upon the type of medium?
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. synchronization bytes
• B. addresses
• C. frame identifier
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
6. When 2 or more bits in a data unit has been changed during the
transmission, the error is called:
• A. random error
• B. burst error
• C. inverted error
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. ethernet
• C. HDLC
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
9. Which one of the following is the multiple access protocol for channel
access control?
• A. CSMA/CD
• B. CSMA/CA
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. piggybacking
• C. fletcher’s checksum
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. bits
• B. frames
• C. packets
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. routing
• B. inter-networking
• C. congestion control
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. network address
• B. host address
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• B. a short VC number
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
5. Which one of the following routing algorithm can be used for network layer
design?
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
6. Multidestination routing:
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
7. A subset of a network that includes all the routers but contains no loops is
called:
• A. spanning tree
• B. spider structure
• C. spider tree
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
8. Which one of the following algorithm is not used for congestion control?
• B. admission control
• C. load shedding
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. ethernet
• B. internet protocol
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• B. addressing
• C. forwarding
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. network layer
• C. application layer
• D. physical layer
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. TCP
• B. UDP
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. socket
• B. pipe
• C. port
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. wsock
• B. winsock
• C. wins
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. port
• B. pipe
• C. node
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. HTTP
• B. FTP
• C. telnet
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• C. rules for when and how processes send and respond to messages
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. base 64 encoding
• B. base 32 encoding
• C. base 16 encoding
• D. base 8 encoding
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
10. When displaying a web page, the application layer uses the:
• A. HTTP protocol
• B. FTP protocol
• C. SMTP protocol
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. HTTP
• B. SMTP
• C. FTP
• D. TCP
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
Explanation:
• A. Packet
• B. Message
• C. Segment
• D. Frame
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. Peer to peer
• B. Client-server
• C. HTTP
• D. Both a and b
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
Explanation:
HTTP is a protocol.
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. End to end
• B. Process to process
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. Loss-tolerant application
• B. Bandwidth-sensitive application
• C. Elastic application
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
Explanation:
• A. File transfer
• B. File download
• C. E-mail
• D. Interactive games
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
Explanation:
• C. Mail service
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. IP
• B. MAC
• C. PORT
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. File transfer
• B. File download
• C. E-mail
• D. Internet telephony
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
Explanation:
• B. Timing
• C. Security
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. SMTP
• B. HTTP
• C. FTP
• D. SIP
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• B. encrypted message
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. sender
• B. receiver
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. RSA algorithm
• B. diffie-hellman algorithm
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. transpositional ciphers
• B. substitution ciphers
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. block cipher
• B. stream cipher
• C. bit cipher
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
6. Cryptanalysis is used:
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. A5/2 cipher
• B. b5/4 cipher
• C. b5/6 cipher
• D. b5/8 cipher
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
10. Cryptographic hash function takes an arbitrary block of data and returns:
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. Internet
• B. Botnet
• C. Telnet
• D. D-net
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. Vulnerability attack
• B. Bandwidth flooding
• C. Connection flooding
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
3. The DoS attack is which the attacker establishes a large number of half-
open or fully open TCP connections at the target host:
• A. Vulnerability attack
• B. Bandwidth flooding
• C. Connection flooding
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
4. The DoS attack is which the attacker sends deluge of packets to the
targeted host:
• A. Vulnerability attack
• B. Bandwidth flooding
• C. Connection flooding
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. Active receiver
• B. Passive receiver
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. Wired environment
• B. WiFi
• C. Ethernet LAN
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. UDP traffic
• B. TCP traffic
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. MAC address
• B. IP address
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. 10101010
• B. 10101011
• C. 00000000
• D. 11111111
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. 24 bits
• B. 36 bits
• C. 42 bits
• D. 48 bits
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
4. What is autonegotiation?
• B. a security algorithm
• C. a routing algorithm
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. pure ethernet
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. coaxial cable
• C. optical fiber
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. 1000 bytes
• B. 1200 bytes
• C. 1300 bytes
• D. 1500 bytes
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64
octets is called:
• A. short frame
• B. run frame
• C. mini frame
• D. man frame
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. Client-server
• B. P2P
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. 1
• B. 2
• C. 3
• D. 4
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
Explanation:
5. If 5 files are transfered from server A to client B in the same session. The
number of TCP connection between A and B is:
• A. 5
• B. 10
• C. 2
• D. 6
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
Explanation:
6. FTP server:
• A. Mantains state
• B. Is stateless
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
7. The commands, from client to server, and replies, from server to client, are
sent across the control connection in ____ bit ASCII format:
• A. 8
• B. 7
• C. 3
• D. 5
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. Stream mode
• B. Block mode
• C. Compressed mode
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. PASSWD
• B. PASS
• C. PASSWORD
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
1. The number of objects in a Web page which consists of 4 jpeg images and
HTML text is ______
• A. 4
• B. 1
• C. 5
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
Explanation:
• A. Persistent
• B. Non-persistent
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
3. The time taken by a packet to travel from client to server and then back to
the client is called ____
• A. STT
• B. RTT
• C. PTT
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
Explanation:
• A. First
• B. Second
• C. Third
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
5. In the process of fetching a web page from a server the HTTP request/
response takes ______ RTTs.
• A. 2
• B. 1
• C. 4
• D. 3
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. Request line
• B. Header line
• C. Status line
• D. Entity line
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
Explanation:
The line followed by request line are called header lines and status line is the
initial part of response message.
7. The values GET, POST, HEAD etc are specified in ____ of HTTP message
• A. Request line
• B. Header line
• C. Status line
• D. Entity body
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
Explanation:
It is specified in the method field of request line in the HTTP request message.
8. The ______ method when used in the method field, leaves entity body
empty.
• A. POST
• B. GET
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
9. The HTTP response message leaves out the requested object when _____
method is used
• A. GET
• B. POST
• C. HEAD
• D. PUT
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. 200 OK
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
Explanation:
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
13. Which of the following is present in both an HTTP request line and a
status line?
• B. URL
• C. Method
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
1. Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer
protocol for electronic mail transfer.
• A. TCP
• B. UDP
• C. DCCP
• D. SCTP
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. SMTPS
• B. SSMTP
• C. SNMP
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. 22
• B. 23
• C. 24
• D. 25
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. SMTP
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• B. an SMTP extension
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
6. An email client needs to know the ____ of its initial SMTP server.
• A. IP address
• B. MAC address
• C. url
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
8. SMTP defines
• A. message transport
• B. message encryption
• C. message content
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
9. Which one of the following is an SMTP server configured in such a way that
anyone on the internet can send e-mail through it?
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. user’s terminal
• B. user’s mailbox
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
11. When the mail server sends mail to other mail servers it becomes _____ ?
• A. SMTP server
• B. SMTP client
• C. Peer
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
12. If you have to send multimedia data over SMTP it has to be encoded into
• A. Binary
• B. Signal
• C. ASCII
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
14. In SMTP, the command to write recievers mail adress is written with this
command
• A. SEND TO
• B. RCPT TO
• C. MAIL TO
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. TCP
• B. UDP
• C. Either a or b
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• B. It is a pull protocol
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
Explanation:
The sending mail server pushes the mail to receiving mail server hence it is
push protocol.
• B. One message
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. 25
• B. 35
• C. 50
• D. 15
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
20. When the sender and the receiver of an email are on different systems, we
need only ______ .
• A. One MTA
• B. Two UAs
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. Composing messages
• B. Reading messages
• C. Replying messages
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• A. 4 bytes
• B. 8 bytes
• C. 16 bytes
• D. 32 bytes
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. windows
• B. linux
• C. mac
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. 252
• B. 253
• C. 254
• D. 255
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
7. In telnet, the client echoes the character on the screen but does not send it
until a whole line is completed in
• A. default mode
• B. character mode
• C. server mode
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. default mode
• B. server mode
• C. line mode
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• C. it is not possible
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
1. The sharing of a medium and its link by two or more devices is called
_______
• A. Fully duplexing
• B. Multiplexing
• C. Both a and b
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. Packet switching
• B. Circuit switching
• C. Data switching
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. FDM
• B. TDM
• C. WDM
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
Explanation:
4. If there are n signal sources of same data rate than TDM link has _______
slots
• A. n
• B. n/2
• C. n*2
• D. 2^n
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
Explanation:
5. If link transmits 4000frames per second, and each slot has 8 bits,the
transmission rate of circuit this TDM is
• A. 32kbps
• B. 500bps
• C. 500kbps
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
Explanation:
• A. Death period
• B. Poison period
• C. Silent period
• View Answer
• Workspace
• Report
• Discuss
Answer: Option C
• A. Efficiency
• B. Privacy
• C. Anti jamming
• D. Both a and b
• View Answer
• Workspace
• Report
• Discuss
Answer: Option D
8. In TDM, the transmission rate of the multiplexed path is usually _______ the
sum of the transmission rates of the signal sources.
• A. Greater than
• B. Lesser than
• C. Equal to
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
• A. Seconds
• B. Frames
• C. Packets
• View Answer
• Workspace
• Report
• Discuss
Answer: Option B
• A. FDM
• B. TDM
• C. Either a or b
• D. Both a and b
• View Answer
• Workspace
• Report
• Discuss
Answer: Option A
Explanation:
www.geeksforgeeks.org
1) The protocol data unit(PDU) for the application layer in the
Internet stack is
(A) Segment
(B) Datagram
(C) Message
(D) Frame
Answer (C)
The Protocol Data Unit for Application layer in the Internet Stack (or TCP/
IP) is called Message.
Answer (C)
Simple Mail Transfer Protocol (SMTP) is typically used by user clients for
sending mails.
Post Office Protocol (POP) is used by clients for receiving mails.
Checking mails in web browser is a simple HTTP process.
4) After the update in the previous question, the link N1-N2 goes
down. N2 will reflect this change immediately in its distance vector
as cost, ∞. After the NEXT ROUND of update, what will be cost to N1
in the distance vector of N3?
(A) 3
(B) 9
(C) 10
(D) ∞
Answer (C)
In the next round, N3 will receive distance from N2 to N1 as infinite. It will
receive distance from N4 to N1 as 8. So it will update distance to N1 as 8
+ 2.
1) One of the header fields in an IP datagram is the Time to Live
(TTL) field. Which of the following statements best explains the need
for this field?
(A) It can be used to priortize packets
(B) It can be used to reduce delays
(C) It can be used to optimize throughput
(D) It can be used to prevent packet looping
Answer (D)
Time to Live can be thought as an upper bound on the time that an IP
datagram can exist in the network. The purpose of the TTL field is to
avoid a situation in which an undeliverable datagram keeps circulating.
Let transmission time to transfer 1 byte for all nodes be t. The first packet
will take time = (packet size)*3*t. After the first packet reaches the
destination, remaining packets will take time equal to (packet size)*t due
to parallelism.
If we use 4 bytes as packet size, there will be 24
packets
Total Transmission time = Time taken by first packet +
Time taken by remaining packets
= 3*4*t + 23*4*t = 104t
1) What is the maximum size of data that the application layer can
pass on to the TCP layer below?
(A) Any size
(B) 2^16 bytes-size of TCP header
(C) 2^16 bytes
(D) 1500 bytes
Answer (A)
Application layer can send any size of data. There is no limit defined by
standards. The lower layers divides the data if needed.
Answer (B)
The polynomial x^3+1 corresponds to divisor is 1001.
11001001 000 <--- input right padded by 3 bits
1001 <--- divisor
01011001 000 <---- XOR of the above 2
1001 <--- divisor
00010001 000
1001
00000011 000
10 01
00000001 010
1 001
00000000 011 <------- remainder (3 bits)
See this for division process.
After dividing the given message 11001001 by 1001, we get the
remainder as 011 which is the CRC. The transmitted data is, message +
CRC which is 11001001 011.
3) The distance between two stations M and N is L kilometers. All
frames are K bits long. The propagation delay per kilometer is t
seconds. Let R bits/second be the channel capacity. Assuming that
processing delay is negligible, the minimum number of bits for the
sequence number field in a frame for maximum utilization, when the
sliding window protocol is used, is:
Answer (C)
Distance between stations = L KM
Propogation delay per KM = t seconds
Total propagation delay = Lt seconds
(A) P – 2 Q – 1 R – 3 S – 5
(B) P – 1 Q – 4 R – 2 S – 3
(C) P – 1 Q – 4 R – 2 S – 5
(D) P – 2 Q – 4 R – 1 S – 3
Answer (B)
SMTP is an application layer protocol used for e-mail transmission.
TCP is a core transport layer protocol.
BGP is a network layer protocol backing the core routing decisions on the
Internet
PPP is a data link layer protocol commonly used in establishing a direct
connection between two networking nodes.
5
6 5
7 6
8
9
8
9
[Timeout for 7]
7
8 7
9 8
[Timeout for 9]
9
9
2) Frames of 1000 bits are sent over a 10^6 bps duplex link between
two hosts. The propagation time is 25ms. Frames are to be
transmitted into this link to maximally pack them in transit (within
the link).
What is the minimum number of bits (i) that will be required to
represent the sequence numbers distinctly? Assume that no time
gap needs to be given between transmission of two frames.
(A) i=2
(B) i=3
(C) i=4
(D) i=5
Answer (D)
Transmission delay for 1 frame = 1000/(10^6) = 1 ms
Propagation time = 25 ms
The sender can atmost transfer 25 frames before the first frame reaches
the destination.
The number of bits needed for representing 25 different frames = 5
Ques-1: How many bits are allocated for network id (NID) and host
id(HID) in the IP address 25.193.155.233?
(A) 24 bit for NID, 8 bits for HID
(B) 8 bit for NID, 24 bits for HID
(C) 16 bit for NID, 16 bits for HID
(D) none
Explanation:
It is class A IP address and you know, that class A has 24 bits in HID and
8 bits in NID part.
So, option (B) is correct.
Ques-2: The bandwidth of the line is 1.5 Mbps with round trip time(RTT)
as 45 milliseconds.If the size of each packet is 1 KB(kilobytes), then what
is the efficiency in Stop and wait protocol?
(A) 20.3
(B) 10.0
(C) 10.8
(D) 11
Explanation:
So in order to find the efficiency, lets first calculate the propagation delay
(p) and transmission delay(t). You know that,
(2*p) = RTT = 45 ms
Therefore,
p = 45/2 = 22.5 ms
Now, lets find transmission delay (t), you know that, t = L/B (where, L=
size of packet and B= bandwidth). Therefore,
L = 1KB = (1024*8) = 8192 bits
And
B = (1.5*106)
So,
t = L/B = 8192/(1.5*106) = 5.461 ms
Thus efficiency,
= 1/(1 + 2a) {where a = p/t = 22.5/5.461 = 4.12}
= 1/(1 + 2*4.12)
= 0.108
= 10.8 %
So, option (C) is correct.
Ques-3: A 1 km long broadcast LAN has bandwidth (BW) of 107 bps and
uses CSMA/CD, then what is the minimum size of the packet?
Given:
velocity(v) = 2*108 m/sec
(A) 200 bits
(B) 10
(C) 50
(D) 100
Explanation:
Here,
Distance(d) = 1 km = 1*103 meter,
and BW = 107 bps
So,
p = propagation delay
= (d/v) = (103/2*108) = 5*10(-6)
Therefore, minimum size of the packet is,
= (2*p*BW)
= 2*5*10(-6)*107
= 100 bits
So, option (D) is correct.
Ques-4: Consider Subnet mask of class B network on the internet is
255.255.240.0 then, what is the maximum number of hosts per subnets?
(A) 4098
(B) 4096
(C) 4094
(D) 4092
Explanation:
To find number of hosts per Subnet, you need to check number of zeroes
in the host id part.
Here, Subnet mask
= 255.255.240.0
= 11111111.11111111.11110000.00000000
Therefore, number of zeroes is 12 so,
Number of hosts
= (212 - 2)
= 4096 - 2
= 4094
Since, one of them is used for network id of entire network and the other
one is used for the directed broadcast address of the network so, two is
subtracted.
So, option (C) is correct.
Ques-5: What is the maximum window size for data transmission Using
Selective Repeat protocol with n-bit frame sequence number?
(A) 2n
(B) 2n-1
(C) 2n-2
(D) 2n-1
Explanation:
Since, window size of sender(W) = window size of the receiver(R) and we
know that,
(W + R) = 2n
or, (W + W) = 2n since, (W = R)
or, 2*W = 2n
or, W = 2n-1
Hence, option (D) is correct.
Answer: (A)
Explanation: Since the routing prefix is 20, the ISP has 2^(32-20) or
2^12 addresses. Out of these 2^12 addresses, half (or 2^11) addresses
have to be given to organization A and quarter (2^10) addresses have to
be given to organization B. So routing prefix for organization A will be 21.
For B, it will be 22. If we see all options given in the question, only options
(A) and (B) are left as only these options have the same number of
routing prefixes. Now we need to choose from option (A) and (B).
To assign addresses to organization A, ISP needs to take the first 20 bits
from 245.248.128.0 and fix the 21st bit as 0 or 1. Similarly, ISP needs to
fix 21st and 22nd bits for organization B. If we take a closer look at the
options (A) and (B), we can see the 21st and 22nd bits for organization B
are considered as 0 in both options. So the 21st bit of organization A must
be 1. Now take the first 20 bits from 245.248.128.0 and 21st bit as 1, we
get addresses for organization A as 245.248.136.0/21
/mcqslearn.com/
MCQ: The combination of two or more networks are called
• Internetwork
• WAN
• MAN
• LAN
Answer A
MCQ: Which topology covers security, robust and eliminating the traffic
factor?
• Mesh
• Ring
• Star
• Bus
Answer A
MCQ: National Internet Service Provider (ISP) networks are connected to one
another by private switching stations called
• Peering Points
• National ISP
• Regional ISP
Answer B
• Bus
• Star
• Mesh
• Ring
Answer A
MCQ: A communication path way that transfers data from one point to
another is called
• Link
• Node
• Medium
• Topology
Answer A
• Star
• both A & C
Answer D
• MAN
• LAN
• WAN
• Internetwork
Answer A
• Standard
• Protocol
• Forum
• Agency
Answer B
MCQ: The connection in which multi devices share a single link is called
• Point to point
• Multipoint
• Time Shared
• Spatially Shared
Answer B
• Transit Time
• Delay Time
• Processing Time
• Response time
Answer D
• LAN
• WAN
• MAN
• Internetwork
Answer A
• Devices
• Links
• Medium
• Modes
Answer A
MCQ: The bus, ring and star topologies are mostly used in the
• LAN
• MAN
• WAN
• Internetwork
Answer A
• Mesh
• Ring
• Bus
• Hybrid
Answer A
• Star topology
• Mesh topology
• Ring topology
• Bus topology
Answer D
MCQ: The connection of the telephone regional office is the practical example
of
• Ring
• Hybrid
• Mesh
• Bus
Answer C
MCQ: The term that refers to the structure and format of the data is
• Syntax
• Semantics
• Standard
• Agency
Answer A
• Interconnection of network
• LAN
• MAN
• WAN
Answer C
• Node
• router
• Hub
• Modem
Answer C
Answer C
• Star Topology
• Bus Topology
• Ring topology
• Hybrid
Answer D
• Wireless
• Internet
• DSL
• TV Network
Answer A
MCQ: The working document with no official status and a 6-month lifetime is
called
• Internet draft
• Internet standard
• Internet Protocol
• Regulatory Agencies
Answer A
• Star
• Bus
• Mesh
• Ring
Answer B
Answer A
Answer B
MCQ: The network that is usually owned privately and links the devices in the
single office is called
• MAN
• LAN
• WAN
• Internetwork
Answer B
• TCP
• IP
• ISP
• TCPIP
Answer D
MCQ: The parameter that refers to the set of rules that govern data
communications are called
• Forum
• Standard
• Agency
• Protocol
Answer D
• by fact
• by law
• by nature
• by network
Answer A
• Mesh Topology
• Ring Topology
• Bus Topology
• Star Topology
Answer B
MCQ: In bus topology, the device linking all the nodes in a network is
• Router
• DropLine
• Backbone
• hub
Answer C
• MAN
• Switched WAN
• LAN
Answer C
Answer A
• Distance/Propagation speed
• Propagation speed/Bandwidth
• Bandwidth/Queuing time
Answer A
• Frequency
• Phase
• Amplitude
• Signals
Answer A
Answer A
• Reliability of a system
• Efficiency of a system
• Accuracy of a system
• Bandwidth of a system
Answer A
MCQ: The Nyquist formula gives us any signal level while Shannon capacity
gives us the
• Lower Limit
• Upper Limit
• Both B&C
Answer B
• speed of system
• Frequency of system
Answer A
• Zero
• Maximum
• Infinite
• None of Above
Answer A
• 103us
• 105us
• 107us
• 109us
Answer B
• Discrete state
• Continuous state
• Randomly arranged
• None of Above
Answer B
• both a and b
• None of Above
Answer A
• Kilograms
• Seconds
• Decibel
• Hertz
Answer C
• Bandwidth
• Level of signals
• Level of noise
Answer D
• Nano seconds
Answer B
Answer D
• Continuous
• Discrete
• Bits
• Bytes
Answer B
• Modulation
• Demodulation
• Encapsulation
• Bypass
Answer A
• amplitude
• frequency
• Phase
Answer D
• finite bandwidth
• Infinite bandwidth
• zero bandwidth
Answer B
• Sine Waves
• Levels
• Stages
Answer B
• Sine wave
• Digital Signals
• Analog Signals
Answer D
• attenuation
• distortion
• Noise
• Impairments
Answer A
• Attenuated
• Distorted
• Noisy
• Amplified
Answer D
• period
• Cycle
• Frame
• Segment
Answer B
MCQ: The term that describes the position of the waveform relative to time 0
is
• Wavelength
• Period
• Frequency
• Phase
Answer D
• 1sec
• 2sec
• 10sec
• 100sec
Answer A
• Wavelength
• frequency
• Period
• Bandwidth
Answer D
• High Frequency
• Low Frequency
• High Phase
• Low phase
Answer B
• Peak
• Analog Signal
• Digital Signal
Answer B
• medium
• Period
• Phase
• delay
Answer A
MCQ: The transmission impairment that refers to a signal with high energy in
a very short time is
• Thermal Noise
• Induced Noise
• Cross talk
• Impulse Noise
Answer D
• Propagation Speed
• Bit duration
• both B&C
Answer C
• 12000 bps
• 6000 bps
• 1800bps
• zero
Answer B
Answer C
• Hertz
• Kilogram
• Nanosecond
Answer B
MCQ: When there is heavy traffic on the network, the queuing time is
•
• Remains same
• increases
• decreases
Answer C
MCQ: The time required for a bit to travel from source to destination is
• Latency
• Propagation Time
• Delay
• Transmission time
Answer B
• both a and c
Answer C
• Wavelength
• Bandwidth
• amplitude
• Composite
Answer B
• Noisy Channel
• Noiseless channel
• Bandwidth of channel
• Frequency of channel
Answer B
• Noise
• Attenuation
• distortion
Answer D
• zero frequency
• lowest frequencies
• None of Above
Answer B
• frequency-domain plot.
• Time-domain plot.
Answer A
• Second
• Nanosecond
• Hertz
• Megahertz
Answer C
• 87.9ms
• 41.7ms
• 90ms
• 12ms
Answer B
Answer A
• Power lines
Answer A
• Electronic signal
• Magnetic pulses
• Radiations
• Electromagnetic signals
Answer D
Answer C
Answer A
• 10-3 s
• 10-6 s
• 10-9 s
• 10-12 s
Answer D
MCQ: We cannot send the digital signal directly to the channel, when the
channel is
• bandpass
• Bypass
• baseband
• Low pass
Answer A
MCQ: The difference in the delay of the signal may create a difference in
• Phase
• Frequency
• Period
• Decibel
Answer A
• Signals
• Powers
• Noise
• Frequencies
Answer B
• different frequencies
• same frequencies
Answer A
• One
• two
• four
• three
Answer D
• Web
• Server
• Domain
• Client
Answer B
MCQ: To let the client know about the type of document sent, a CGI program
creates
• Body
• Header
• Borders
• Footer
Answer B
• Proxy Domain
• Proxy Documents
• Proxy Server
• Proxy IP
Answer C
• TCP/IP
• WWW
• HTML
• FTP
Answer C
MCQ: A browser can retrieve and run an HTML file that has embedded the
address of
• Applets
• Language
• HTML
• HTTP
Answer A
• WebPage
• WebData
• HTML
• Web-document
Answer C
MCQ: The documents in the WWW can be grouped into three broad
categories
Answer D
MCQ: To use proxy server, the client must be configured to access the proxy
instead of the
• Proxy Server
• Target Server
• Domain Server
• Original Server
Answer B
• IP
• Header
• Document
• Cache
Answer C
• C++
• Perl
• java
• Php
Answer C
MCQ: The documents that are created and stored in a server as a Fixed
Content are called
• Static Documents
• Stateless Document
• Active Documents
• Dynamic Documents
Answer A
• Different
• Similar
• Constant
• Active
Answer B
• Connection Generation
• Reserved Connection
• Connection termination
• Active Connection
Answer B
MCQ: In WWW and HTTP. a technology that creates and handles dynamic
documents is called
• Common Gateway IP
Answer A
• Web Documents
• HyperLink Documents
• Static Documents
• Active Documents
Answer D
MCQ: In World Wide Web (WWW), an electronic store (e-commerce) can use a
cookie for its
• Client Shopper
• Server Usage
• Server Data
• Client Data
Answer A
• Transfer files
Answer D
MCQ: In Hyper Text Transfer Protocol (HTTP), a client can directly connect to
a server using
• Web-based connection
• Domain
• TELNET
• Linear Connection
Answer C
Answer B
Answer D
MCQ: The Uniform Resource Locator (URL), is a standard for specifying any
kind of information on the
• Server-End
• Client-End
• WebPage
• Internet
Answer D
• Stateless Document
• Stateless Program
• Stateless Entity
• Stateless IP
Answer C
• Server
• Client
• Domain
• Mail Server
Answer A
MCQ: The Uniform Resource Locator (URL), defines four things: protocol,
host computer, port and
• Path
• Page
• Program
• Access
Answer A
MCQ: The Hypertext Transfer Protocol (HTTP) uses the services of TCP on
• well-known port 80
• well-known port 81
• well-known port 82
• well-known port 83
Answer A
MCQ: In Uniform Resource Locator (URL), path is the pathname of the file
where the information is
• Stored
• Located
• to be transferred
• Transferred
Answer B
MCQ: The Hypertexts are documents linked to one another through the
concept of
• Variables
• Pointers
• Arrays
• Stacks
Answer B
• C+
• SMTP
• TCP
• Perl
Answer B
• Networks
• Webpages
• Protocols
Answer B
Answer C
• Proxy Server
• Node Server
• Domain Server
• Original Server
Answer D
• Current requests
• Recent requests
• Pending requests
• Recieved Requests
Answer B
MCQ: When a client sends a request to a server, the browser looks for it in the
• Addresses
• Cookie Directory
• Active Directory
• Host Directory
Answer B
• Server
• Domain
• WebServer
• Memory
Answer D
Answer C
MCQ: The field of the MAC frame that alerts the receiver and enables it to
synchronize is known as
• SFD
• preamble
• source address
• destination address
Answer B
• 550 m
• 25 m
• 100 m
• 5000 m
Answer A
MCQ: 1000Base-LX has used two wires for long wave are
• STP Cable
• UTP Cable
• Fiber Optic
• Coaxial Cable
Answer C
• LLC
• HDLC
• MAC
• DSAP
Answer B
MCQ: The terms that control the flow and errors in full duplex switched
Ethernet is called
Answer D
• Thick
• Thin
• Twisted Pair
Answer B
• 6 Bytes
• 4 Bytes
• 2 Bytes
• 7 Bytes
Answer D
• 100 meter
• 185 meters
• 500 meter
• 2000 meter
Answer D
• Unicast
• multicast
• broadcast
Answer D
MCQ: In Ethernet frame, both destination and sender addresses are of length
• 1 Byte
• 2 Bytes
• 4 Bytes
• 6 Bytes
Answer D
• 2
• 4
• 6
• 8
Answer B
• 1980
• 1976
• 1960
• 1967
Answer B
• 3 Fields
• 5 Fields
• 7 Fields
• 9 Fields
Answer C
MCQ: The Computer Society of the IEEE started a project named project 802
in
• 1970
• 1975
• 1980
• 1985
Answer D
Answer A
• Unicast
• Multicast
• Broadcast
Answer A
• Ring Topology
• Bus Topology
• Star Topology
• Mesh Topology
Answer C
• Project 802
• Project 8802
• Project 2088
• Project 208
Answer A
• 10 meter
• 250 meter
• 500 meter
• 5000 meter
Answer C
• ISO
• ANSI
• OSI
Answer B
• LLC
• IEEE
• ANSI
• both a and c
Answer B
MCQ: The minimum frame length for 1O-Mbps Ethernet is 64 bytes and the
maximum is
• 500 bytes
• 1000 bytes
• 1520 bytes
• 1518 bytes
Answer D
MCQ: In half duplex mode of MAC sublayer the stations are connected via
• Switch
• Hub
• Bridge
• Bus
Answer B
• 50 mbps
• 100 mbps
• 150 mbps
• 200 mbps
Answer B
• attenuation
• Frame Bursting
• Collision
• carrier extension
Answer C
• NRZ Scheme
• NRZ - L
• NRZ - I
• Manchester Scheme
Answer D
• Star Topology
• Bus Topology
• Ring Topology
• Mesh Topology
Answer A
MCQ: Three different encoding schemes were used for all the
implementations in
• Standard Ethernet
• fast Ethernet
• Gigabit Ethernet
• 10 Gigabit Ethernet
Answer B
• point to point
• Switch
• Hub
• Bridge
Answer A
• two generations
• three generation
• four generations
Answer D
• Lower Layers
• Sub Layers
• Higher Layers
Answer C
• Manchester
• NRZ
• 4D-PAMS
• MLT-3
Answer B
MCQ: The sublayer of data link layer that frames the data received from upper
layer is called
• MAC Layer
Answer A
• Error Correction
• Sender address
• receiver address
Answer D
MCQ: The term that is used to raise the bandwidth and separate collision
domains are called
• Switch Ethernet
• Bridge
• Hub Ethernet
Answer B
• one to one
• one to many
• many to one
• many to many
Answer B
• 100 m
• 300 m
• 10 km
• 40 km
Answer C
• Duplex Mode
• Quarter Duplex
• Full Duplex
Answer D
• 12 Bytes
• 14 Bytes
• 16 Bytes
• 18 Bytes
Answer D
• 64 Bytes
• 46 Bytes
• 1500 Bytes
• 1518 Bytes
Answer B
• 100 Mbps
• 1000 Mbps
• 1500 Mbps
• 2000 Mbps
Answer B
MCQ: In IEEE Project 802, the Logic Link Control (LLC) is used to control and
handle the
• errors
• flow
• frames
Answer D
MCQ: Round trip time and time required to send the jam sequence is called
the
• frame slots
• Propagation time
• Maximum length
• slot time
Answer D
• 2 Gbps
• 6 Gbps
• 8 Gbps
• 10 Gbps
Answer D
• 75 to 100 mbps
Answer B
• 2 bytes
• 4 bytes
• 6 bytes
• 8 bytes
Answer C
• 111000011
• 10101011
• 10010011
• 11011011
Answer B
MCQ: 10Base5 is a
• Thin Ethernet
• Thick Ethernet
• Fiber
Answer B
• Duplex Mode
Answer D
MCQ: The MAC sublayer frames the data received from upper layer and
passes them to the
• Physical layer
• Network Layer
• Transport Layer
Answer B
• 10 meter
• 100 meter
• 185 meter
• 500 meter
Answer C
Answer A
• 100 Mbps
• 50 Mbps
• 560 Mbps
• 700 Mbps
Answer A
• Single mode
• Double mode
• Multi mode
Answer A
• Standard 802.3u
• Standard 802.3z
• Standard 802.3s
• Standard 802.3y
Answer B
• LAN protocols
• WAN protocol
• MAN protocol
• None
Answer A
MCQ: The data link layer in the IEEE standard is divided into two sub layers of
Answer D
• 100 meter
• 200 meter
• 300 meter
• 400 meter
Answer A
• Manchester
• NRZ - I
• MLT-3
• 8B/6T
Answer B
• Standard 802.3u
• Standard 802.3z
• Standard 802.3s
• Standard 802.3y
Answer A
• 2
• 4
• 6
• 8
Answer B
• Reduced
• Increased
• Eliminated
• diversified
Answer A
• Physical layer
• Logic layer
Answer A
MCQ: Address is unicast, if the least significant bit of the first byte is
• 0
• 1
• -1
• infinity
Answer A
MCQ: The Logic Link Control provides one single data link control protocol for
all IEEE
• Wireless Networks
Answer C
• oftwisted cable
• fiber optic
• coaxial cable
Answer A
• 46 bits
• 48 bits
• 54 bits
• 64 bits
Answer B
• 0.312
• 0.412
• 0.512
• 0.612
Answer C
• 512 bits
• 46 Bits
• 12144 Bits
• 56 Bits
Answer C
• 2 X 10^2
• 2 X 10 ^4
• 2 X 10^6
• 2 X 10^8
Answer D
• CSMA/CD
• CSMA/CA
• FDMA
• TDMA
Answer A
MCQ: In the version field of IPv4 header, when the machine is using some
other version of IPv4 then the datagram is
• Discarded
• Accepted
• Interpreted
• Interpreted incorrectly
Answer A
MCQ: The network layer at the source is responsible for creating a packet
from the data coming from another
• Station
• Link
• Node
• Protocol
Answer D
• 0 to 20 bytes
• 20 to 40 bytes
• 20 to 60 bytes
• 20 to 80 bytes
Answer C
• Fixed length
• Variable length
• Global length
• 0 length
Answer B
MCQ: In IPv4, the service type of the service in the header field, the first 3 bits
are called
• Type of service
• Code bits
• Sync bits
• Precedence bits
Answer D
• TCP
• CDM protocols
• ATM protocols
• IEEE protocols
Answer A
MCQ: To record the Internet routers of IPv4, that handles the datagram is
responsibility of
• Record protocol
• Record Data
• Record Route
• Record Header
Answer C
MCQ: When the source needs to pass information to all routers visited by the
datagram, option used in
• Hop-by-Hop Option
• Loop-by-loop Option
• IP-by-IP option
• Header-by-Header option
Answer A
MCQ: The Internet has chosen the datagram approach to switching in the
• Network Layer
• Physical Layer
• Presentation Layer
Answer B
• 46 Bytes
• 45 Bytes
• 50 Bytes
• 48 Bytes
Answer A
• Unit
• Data Frame
• Datagram
• Adresses
Answer C
• User to Host IP
Answer B
• Independently
• dependently
• Priority basis
• Systematically
Answer A
Answer B
MCQ: In IPv4, fragmented datagram's fragment size should have the first byte
number divisible by
• 2
• 4
• 8
• 16
Answer C
• Protocol
• DataSet
• Headers
• Routes
Answer A
MCQ: The total length of the IPv4 datagram is limited to 65,535 (2^16 - 1)
bytes, the field length is
• 10 Bits
• 12 Bits
• 14 Bits
• 16 Bits
Answer D
Answer B
MCQ: When HEADER LENGTH field of the IPv4 header is at its maximum
size, the value of the field willl be
• 5
• 15
• 20
• 60
Answer B
MCQ: The flag field that does fragmentation of IPv4 segment is the
• 1 bit field
• 2 bit field
• 3 bit field
• 4 bit field
Answer C
MCQ: In an IPv6 datagram, the M bit is 0, the value of HLEN is 5, the value of
total length is 200 and the offset value is
• 400
• 350
• 300
• 200
Answer D
• 2 different ways
• 2 samilar Stations
• 2 similar activities
• Same format
Answer A
MCQ: In IPv4, a machine drops the header and trailer, when it receives a
• Signal
• Frame
• Service
• Request
Answer B
MCQ: A sender can choose a route so that its datagram does not travel
through
• Competitor's Network
• Stations
• Backbone Link
• Competitor's Router
Answer A
MCQ: In fragmentation of IPv4, the 13-bit field that shows the relative position
of the fragment with respect to the whole datagram is called
• Identification field
• flag field
Answer C
MCQ: An option that is used by the source to predetermine a route for the
datagram as it travels through the Internet is known as
• Strict Source
Answer C
• Negative values
• Positive values
• Zero
• One
Answer C
MCQ: Datagram network uses the universal addresses defined in the network
layer to route packets from the source to the
• Same source
• Layers
• Destination
• Application
Answer C
• 65,555 bytes
• 65,545 bytes
• 65,535 bytes
• 65,525 bytes
Answer C
• Independently
• Locally
• Seperately
• Unjointly
Answer B
• 7
• 6
• 5
• 4
Answer C
• Bypassed
• Switched
• Established
• Linked
Answer C
MCQ: The responsibility of Physical and data link layers on the network is
• Data Delivery
• Data Flow
• Data Sync
Answer A
MCQ: The network layer was designed to solve the problem of delivery
through
• Single Link
• Multilevel Link
• Several Link
• Unicast Link
Answer C
MCQ: In IPv4, the 4-bit field that defines the total length of the datagram
header in 4-byte words is the
• Version field
• Service field
Answer B
• Length + header
• length + footer
Answer B
MCQ: If the IPv4 address is not listed in the datagram, a router must not be
• Rechecked
• Synchronized
• Identified
• Visited
Answer D
MCQ: By extracting the 32 rightmost bits from the mapped address, we can
Convert
Answer A
• TCP
• ICMP
• IPv4
• UDP
Answer A
MCQ: In the strict source route, the sender can choose a route with a specific
type of
• Quality
• Service
• Data
• Path
Answer B
• 0 to 2999
• 0 to 3999
• 0 to 4999
• 0 to 5999
Answer B
MCQ: In IPv4, the value of the Maximum Transfer Unit (MTU) depends on the
• UD protocol
Answer A
• Co-host
• Source-host
• Host
• Medium link
Answer B
• Frames
• Addresses
• Protocol
• Packets
Answer D
Answer B
• Data Header
• Payload
• Off load
• Type
Answer B
• Flow
• Error
• Links
• Information
Answer D
MCQ: To combines the concepts of the strict source route and the loose
source route options of IPv4 we use
• Source Extension
• Source Headers
• Source Routing
• Source host
Answer C
• Network Layer
• Physical Layer
• Transport Layer
Answer B
MCQ: The size of the IPv4 datagram may increase, as the underlying
technologies allows
• Greater bandwidth
• Fixed bandwidth
• Reserved bandwidth
• Greater Header
Answer A
• Fixed Bandwidth
• Variable Bandwidth
• High Bandwidth
• Low Bandwidth
Answer C
MCQ: To enhance reliability, IPv4 must be paired with a reliable protocol such
as
• TCP/IP
• UDP
• TCP
• IEEE protocols
Answer C
• Stations
• Nodes
• Protocols
• Datagram
Answer C
MCQ: The field that remains unchanged during the time the IPv4 datagram
travels from the source host to the destination host is
• Destination address
• Source Address
• both A & B
Answer C
• 4
• 5
• 6
• 7
Answer A
• Controlled Transmission
• Close Traffic
• Non-Congestion Traffic
Answer D
• Too Small
• Too Large
• Too busy
• Null
Answer B
MCQ: In the IPv4, the value 0100 of the type of service bits are used to
represent the
• Maximize reliability
• Minimize delay
• Maximize throughput
• Minimize cost
Answer C
MCQ: In IPv6, the format and the length of the IP address were changed
along with the
• Frame format
• Packet alignment
• Frame bits
• Packet Format
Answer D
• On Time
• Before time
• Delayed
• Both A & B
Answer C
• One Part
• Two Parts
• Three parts
• Four parts
Answer B
MCQ: Ethernet protocol has a minimum and maximum restriction on the size
of data that can be encapsulated in a frame is
• 45 to 1200 Bytes
• 45 to 1400 Bytes
• 45 to 1450 Bytes
• 45 to 1500 Bytes
Answer D
MCQ: In IPv4 protocol, the size of the source and destination address is
• 64 Bit
• 16 Bit
• 32 Bit
Answer D
MCQ: When the IPv4 protocol sends a datagram, it copies the current value
of the counter to the identification field and increments the counter by
• 1
• 0
• -1
• 2
Answer A
• Frame Relay
• FSK
• ATM
• both A and C
Answer D
MCQ: While transmission of packets over Internet, when all the packets have
been delivered, the connection is
• Static
• Established
• Terminated
• On-Pause
Answer B
• Lower Layer
• Session layer
• Upper Layer
Answer C
MCQ: In IPv4, parts of the header must be copied by all fragments, if the
datagram is
• Swapped
• Copied
• Fragmented
• Transferred
Answer C
• Random order
• Sequential Order
• No Specific order
• According to priority
Answer B
MCQ: All routers may use universal time, their local clocks may not be
• Authorized
• Digitized
• Synchronized
• Verified
Answer C
• -1
• 2
• 1
• 0
Answer D
Answer A
MCQ: Switching can be divided into three broad categories: circuit switching,
packet switching and
• Data Switching
• IP Switching
• Message Switching
• Frame Switching
Answer C
• Timestamp
• Time frame
• Time delay
• Timewrap
Answer A
• 11 Router Addresses
• 12 Router Addresses
• 13 Router Addresses
• 14 Router Addresses
Answer A
• Protocol
• Link
• Space
• Stations
Answer C
MCQ: Three strategies used to handle the transition from version 4 to version
6 are dual stack, tunneling and
• Header Switching
• Header Translation
• Header transfer
• Header Transmission
Answer B
• Address Authentication
• Address Node
• Address format
• Address Verification
Answer D
MCQ: The total length field defines the total length of the datagram including
the
• Length
• Data Length
• Header
• Footer
Answer C
Answer B
• Visited Data
• Visited Address
• Visited Router
• Visited Header
Answer C
• Difficult
• Efficient
• Slow
• Effective
Answer B
MCQ: A term that has a limited lifetime in its travel through an internet is
called
• Message
• Datagram
• Servers
• Protocols
Answer B
MCQ: If a host does not support the flow label, it sets the flow label field to
• One
• Two
• Three
• Zero
Answer D
• Datagram Network
• Datagram Link
• Datagram Nodes
• Datagram Internet
Answer A
MCQ: When two computers using IPv6 want to communicate with each other,
the strategy is used known as
• Tunneling
• Drilling
• Packaging
• Curving
Answer A
• De-fragmentation
• Fragmentation
• Transfer
• Size
Answer B
• Independency of packets
Answer A
Answer C
• 10
• 5
• 2
• 0
Answer D
• As a switch
• Locally
Answer B
• 10 Fields
• 09 Fields
• 08 Fields
• 07 Fields
Answer C
• Header
• Layers
• Datagrams
• Fragmentation
Answer A
• Stability
• Availibilty
• Reliability
• Confidentiality
Answer D
• Frames
• Packet
• IP
Answer B
• 55 Bytes
• 50 Bytes
• 45 Bytes
• 40 Bytes
Answer D
MCQ: In its simplest form, a flow label can be used to speed up the
processing of a packet by a
• Packet Switch
• Router
• Data Switch
• Protocol
Answer B
MCQ: The source first makes a connection with the destination before
sending a packet in
• Connection-oriented service
• Connectionless service
• Unguided Connection
Answer A
iqsanswers.com
1. What is the other types of OLAP apart from ROLAP?
A. HOLAP
B. MOLAP
C. DOLAP
Ans: B
A. Computers
B. Switches
C. Networks
D. Gateway
Ans: C
A. True
B. False
Ans: A
A. 127.0.0.0
B. 127.0.1.1
C. 127.0.1.0
D. 127.0.0.1
Ans: D
A. ICMP
B. TCP
C. IP
D. UDP
Ans: A
6. Transport layer of OSI model lies between Network and ___________ layer
A. Application
B. Data link
C. Session
D. Presentation
Ans: C
A. POP
B. PPP
C. FTP
Ans: D
A. 25
B. 80
C. 21
D. 65
Ans: B
A. True
B. False
Ans: A
10. From the options below, which suits best for MODEM?
Ans: A
A. 64 bit
B. 128 bit
C. 16 bit
D. 32 bit
Ans: D
A. Hardware address
B. Physical address
D. IP address
Ans: C
13. A network point that provides entrance into another network is called as
___________
A. Node
B. Gateway
C. Switch
D. Router
Ans: B
A. True
B. False
Ans: A
A. One way
B. Two way
Ans: B
A. WAN
B. MAN
C. LAN
Ans: C
17. Which of the following protocol below are suited for email retrieval?
A. POP3
B. IMAP
C. FTP
Ans: D
A. TCP
B. UDP
C. IP
D. DHCP
Ans: A
A. Internet
B. LAN
C. Ethernet
D. Cables
Ans: C
20. The process of assigning IP address for specific times to the various hosts
by DHCP is called as?
A. Lend
B. sublease
C. let
D. Lease
Ans: D
Ans: B
A. x.22
B. x.23
C. x.25
D. x.26
Ans: C
D. both A and B
Ans: D
C. Both b and d
Ans: C
A. False
B. True
Ans: B
26. _______ assigns a unique number to each IP network adapter called the
MAC address.
Ans: A
A. five
B. eight
C. nine
D. four
Ans: B
28. Dynamic addressing doesn’t allow many devices to share limited address
space on a network
A. True
B. False
Ans: B
Ans: C
D. Both A and B
Ans: A
A. UDP
B. TCP
C. SSTP
D. Both B and C
Ans: D
A. Switches operate at physical layer while hubs operate at data link layer
B. Switches operate at data link layer while hubs operate at transport layer
C. Switches operate at data link layer while hubs operate at physical layer
Ans: C
33. When computers in a network listen and receive the signal, it is termed as
active toplogy
A. True
B. False
Ans: A
A. Speed in mbps
B. Number of segments
C. Length of segment
D. Size of segment
Ans: B
A. checksum bit
B. error bit
C. parity bit
Ans: C
36. ALL IP addresses are divided into network address and host address
A. True
B. False
Ans: A
37. How can we examine the current routing tables in command prompt?
A. using routestart
B. using netstart
C. using netstat
D. either a or b
Ans: C
38. Both ping and tracert are used to find If the computer is in network.
A. True
B. False
Ans: B
A. In Ring all nodes are connected with another in a loop while in bus they are
connected to a central cable
B. In Ring all nodes are connected with another loop while in bus they are
connected to a central cable
C. In bus all nodes are connected with another in a loop while in star they are
connected to a central node
D. In Bus all nodes are connected with another loop while in star they are
connected to a central cable
Ans: A
40. MAC addressing works in data link layer while IP addressing works in
network layer.
A. True
B. False
Ans: A
41. A packet whose destination is outside the local TCP/IP network segment
is sent to the ____ .
A. File server
B. Default gateway
C. DNS server
D. DHCP server
Ans: B
Ans: C
A. IP address
B. Default gateway
C. Subnet Mask
D. DNS server
Ans: D
44. The physical layer is concerned with the movement of _______ over the
physical medium.
A. programs
B. dialogs
C. protocols
D. Bits
Ans: D
45. Which protocol below operates at the network layer in the OSI model?
A. IP
B. ICMP
C. RARP
Ans: D
46. In the OSI model, as a data packet moves from the lower to the upper
layers, headers are _______.
A. added
B. removed
C. rearranged
D. Modified
Ans: B
A. Data representation
B. Dialog control
Ans: B
A. 32
B. 64
C. 128
D. Variable
Ans: C
A. Flow control
B. Addressing
Ans: B
A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
Ans: C
A. 8
B. 16
C. 32
D. 64
Ans: C
52. Which routing protocol below is used by exterior routers between the
autonomous systems?
A. RIP
B. IGRP
C. OSPF
D. BGP
Ans: D
53. Which of the IP headers decides when the packet should be discarded?
A. Fragment control
B. TTL
C. Checksum
D. Header length
Ans: B
A. 224.x.x.x
B. 127.x.x.x
C. 0.0.0.0
D. 255.255.255.255
Ans: B
A. 190
B. 190.148
C. 190.148.64
Ans: B
A. 21
B. 23
C. 25
D. 53
Ans: C
A. UDP
B. Ethernet
C. IPX
Ans: D
A. DNS
B. TFTP
C. RIP
Ans: C
A. 62
B. 126
C. 192
D. 254
Ans: A
60. Which of the folowings is not a direct implication of subnet masks in TCP/
IP networks?
Ans: C
engineeringinterviewquestions.com
1. If a datagram router goes down then …………..
(B) only those packets which are queued in the router at that time will suffer
(C) only those packets which are not queued in the router at that time will
suffer
Answer: B
Answer: A
Answer: B
Answer: C
Answer: C
Answer: D
Answer: B
8. In ……………., each packet of a message need not follow the same path
from sender to receiver.
Answer: D
Answer: A
Answer: B
11. The set of optimal routes from all sources to a given destination from a
tree rooted to the destination is known as ……………..
Answer: C
Answer: C
Answer: D
14. In Hierarchical routing for N router subnet, the optimal number of levels is
…………..
Answer: C
15. The router algorithm takes the decision to changes the route when
……………..
Answer: B
16. If route from router I to router J is computed on line based on the current
statistics, then it is called as ………………..
Answer: A
17. If the subnet uses virtual circuits internally, routing decisions are made
only when a new virtual circuit is being setup. This is called as……………..
Answer: A
Answer: B
19. If router J is on the optimal path from router I to router K, then the path
from J to K along the same route is ………………
Answer: B
20. If router J is on the optimal path from router I to router K, then the optimal
path from J to K also falls along the same route is known as ………………..
Answer: B
Answer: A
22. The method of network routing where every possible path between
transmitting and receiving DTE is used is called ……………
Answer: B
23. In Hierarchical routing, the routers are divided into what is called as
……………..
Answer: C
Answer: A
Answer: B
26. If a router sends every incoming packet out only on those lines that are
going approximately in the right direction is known as ……………..
Answer: C
27. In shortest path routing algorithm, the path length is measured based on
……………..
Answer: B
Answer: A
Answer: D
(C) Forwarding
(D) Flooding
Answer: D
31. In multicast routing with spanning tree method, a network with n groups,
each with an average of m members, for each group we require
………………..
Answer: D
Answer: C
33. A well -defined groups that are numerically large in size but small
compared to the network as a whole are used in …………………..
Answer: B
34. The processes that keep track of hosts whose home is in the area, but
who currently visiting another area is ……………..
Answer: A
Answer: A
Answer: D
Answer: D
38. In Broadcast routing, if the router does not know anything all about
spanning tree, ………………. method is preferred.
Answer: A
39. The method of Broadcast routing in which each packet contains either a
list of destinations or a bit map indicating the desired destinations is
……………….
Answer: C
40. Sending a message to a well defined group that are numerically large in
size but small compared to the network as a whole is called ……………….
Answer: B
41. In link state routing, after the construction of link state packets new routes
are computed using …………………
Answer: C
Answer: A
Answer: C
Answer: B
45. In which routing method do all the routers have a common database?
Answer: D
46. In distance vector routing algorithm, the routing tables are updated
…………………
(B) automatically
Answer: A
Answer: B
48. Which of the following routing algorithm takes into account the current
network load.
Answer: D
Answer: D
50. In AODV routing algorithm for MANETs, the route is discovered at time
Answer: C
Answer: A
52. The network in which all the nodes are symmetric and there is no central
control or hierarchy is ……………..
Answer: C
53. What is the type of network in which the topology change from time to
time?
Answer: D
54. The processes that keep track of all mobile hosts visiting the area is
……………..
Answer: C
55. The hosts which are basically stationary hosts who move from one fixed
site to another from time to time but use the network only when they are
physically connected to it are called …………….
Answer: A
56. The hosts who compute on the run and want to maintain their
connections as they move around ……………
Answer: C
57. What is the type of network in which the routers themselves are mobile?
Answer: B
Answer: D
Answer: D
Answer: B
Answer: D
62. The solution to decrease the load on the network when congestion occurs
is ……………..
Answer: D
Answer: D
64. In open loop congestion control techniques, the decisions are based on
the ……………
Answer: A
65. In closed loop congestion control techniques, the decisions are based on
the ……………..
Answer: A
66. ..………..is used to validate the identity of the message sender to the
recipient
Answer: C
67. When too many packets are present in the subnet, and performance
degrades then it leads to ………………..
Answer: B
(A) making sure that subnet is not able to carry the offered traffic
(B) making sure that subnet will allow more than the offered packets
(C) making sure that subnet is able to carry the offered traffic
(D) making sure that subnet will not allow any traffic
Answer: C
(A) monitor the system to detect when and where congestion occurs
Answer: B
Answer: A
Answer: C
72. In transport layer, End to End delivery is the movement of data from
……………….
Answer: C
(C) monitor the system to detect when and where congestion occurs
Answer: C
Answer: C
75. When routers are being inundated by packets that they cannot handle,
they just throw them away is known as ……………….
Answer: D
Answer: D
77. When the source host receives the choke packet, then the source
………………
Answer: C
78. If the buffer fills and a packet segment is dropped, then dropping all the
rest of the segments from that packet, since they will be useless anyway is
called ………………..
Answer: B
Answer: B
80. For applications such as audio and video streaming, the variation in the
packet arrival times is called ……………..
Answer: B
(B) protocol
Answer: D
Answer: D
Answer: B
84. Sending of a IP packet from host 1 to host 2 where both are of same LAN
but the packet is transferred through different intermediate LANs is called
………………
Answer: A
Answer: D
86. In ……………….. all frames are given to the computer, not to those
addressed.
Answer: A
Answer: B
88. In ………………… each packet of a message need not follow the same
path From sender to receiver.
Answer: D
(A) Fast data delivery interface (B) Fiber distributed data interface
(C) Fiber distributed digital interface (D) fast distributed data interface
Answer: B
Answer: A
91. The address field of a frame in HDLC protocol contains the address of the
……………… station.
Answer: B
Answer: C
93. The DNS name space is divided into non overlapping ………………….
Answer: D
94. Source routing bridges in the same LANs must have …………… bridge
Number.
Answer: B
Answer: A
Answer: B
Answer: B
Answer: D
99. How many cross points are needed in a single stage switch with 40 inputs
and 50 outputs.
(A) 40 (B) 50
Answer: D
100. The …………….. of A TSI controls the order of delivering of slot values
that are stored in RAM.
Answer: D
www.siteforinfotech.com
1. The computer network is
A) Bus
B) Ring
C) Star
A) Bus
B) Ring
C) Star
D) Tree
A) File service
B) Print service
C) Database service
A) Bus Topology
B) Ring Topology
C) Star Topology
D) Tree Topology
C) Mail service
C) Synchronization
A) Physical
B) Transport
C) Data Link
D) Presentation
A) Networking
B) Inter-Network
C) Inter-Connection
D) Computer Group
12. A simple cabling method, known as the ………… topology, allows about
30 computers on a maximum cable length of about 600 feet.
A) Star
B) Ring
C) Bus
D) Tree
A) CAN
B) WAN
C) CLAN
D) IAN
14) A ………. line considered as a fast WAN link, transmits at 1.5 Mbps, or 1
million bits per second.
A) L1
B) F1
C) W1
D) T1
A) Networking
B) Broadcasting
C) Switching
D) Transfering
A) Point-to-Point channels
B) Pair-to-Pair channels
C) Broadcast channels
D) Interface channels
A) entity
B) peer
C) peer-to-peer
D) layered
18) …………….. entities are entities in the same layer on different machines.
A) Software
B) Service
C) Peer
D) Interface
A) connection-oriented
B) connection-less
C) service-oriented
D) service-less
A) connection-oriented
B) connection-less
C) service-oriented
D) service-less
Answers:
2. B) Ring
4. A) Bus
6. C) Star Topology
8. C) Mail service
10. A) Physical
11. A) Networking
12. C) Bus
13. B) WAN
14. D) T1
15. C) Switching
17. B) peer
18) C) Peer
19) A) connection-oriented
20) B) connection-less
C) Session D) Transport
A) UDP B) TCP
C) FTP D) Nvt
A) DNS B) FTP
C) NFS D) Telnet
5. The data unit in the TCP/IP data link layer called a …..
A) Message B) Segment
C) Datagram D) Frame
6. DNS can obtain the …………….. of host if its domain name is known and
vice versa.
A) Application B) Presentation
10. Which layers of the OSI determines the interface often system with the
user?
A) Network B) Application
Table of
Contents
READ ALSO: SOLVED MCQ OF WIRELESS MOBILE COMMUNICATION
11. Which of the following of the TCP/IP protocols is the used for transferring
files from one machine to another?
A) FTP C) SNMP
B) SMTP D) Rpe
C) Network D) A and B
14. The …………layer of OSI model can use the trailer of the frame for error
detection.
C) Transport D) Presentation
A) Mesh B) Star
C) Bus D) Ring
A) Gopher B) Newsgroups
C) Browser D) CERN
17. The standard suit of protocols used by the Internet, Intranets, extra-nets
and some other networks.
A) TCP/IP B) Protocol
i) In bus topology, heavy Network traffic slows down the bus speed.
A) Bus B) Tree
20. Which of the following is/ are the drawbacks of Ring Topology?
D) Both of A and B
ANSWERS:
1. C) T-switched network
2. A) Application
3. A) UDP
4. C) NFS
5. D) Frame
6. B) IP address
8. D) Gateway
9. C) Multiplexer
10. B) Application
11. A) FTP
12. D) A and B
15. A) Mesh
16. B) Newsgroups
17. A) TCP/IP
19. C) Bus
A) Primary to peer
B) Peer to primary
C) Primary to secondary
D) Peer to Peer
A) Number of users
C) The transmission
A) Network Layer
B) Transport Layer
C) Session Layer
D) Presentation Layer
4. The name of the protocol which provides virtual terminal in TCP/IP model
is.
A) Telnet
B) SMTP
C) HTTP
A) Physical layer
B) Link layer
C) Router layer
D) Broadcast layer
6. What is the name of the network topology in which there are bi-directional
links between each possible node?
A) Ring
B) Star
C) Tree
D) Mesh
7. What is the commonly used unit for measuring the speed of data
transmission?
B) Baud
D) Both B and C
8. Which of the communication modes support two way traffic but in only
once direction of a time?
A) Simplex
B) Half-duplex
D) Full duplex
9. The loss in signal power as light travels down the fiber is called ………….
A) Attenuation
B) Propagation
C) Scattering
D) Interruption
A) Internet
B) Intranet
C) Network
D) LAN
Table of
Contents
READ ALSO: COMPUTER NETWORKS MCQ INTERVIEW QUESTIONS
A) backbones
12. The …………………… layer is provided by the program that uses TCP/IP
for communication.
A) Transport
B) Application
C) Internetwork
D) Network interface
A) Transport
B) Application
C) Internetwork
D) Network interface
A) TCP
B) IP
C) UDP
D) ICMP
A) TCP
B) IP
C) UDP
D) ICMP
B) Internet protocol
ANSWERS:
1. D) Peer to Peer
3. C) Session Layer
4. A) Telnet
5. A) Physical layer
6. D) Mesh
7. B) Baud
8. B) Half-duplex
9. A) Attenuation
10. A) Internet
12. B) Application
13. A) Transport
14. A) TCP
15. C) UDP
A) Application Layer
B) Session Layer
C) Transport Layer
D) Internetwork layer
2. ………………. address use 7 bits for the <network> and 24 bits for the
<host> portion of the IP address.
A) Class A
B) Class B
C) Class C
D) Class D
A) Class B
B) Class C
C) Class D
D) Class E
A) True, False
B) True, True
C) False, True
D) False, False
A) i only
B) ii only
C) Both A and B
7. Match the following IEEE No to their corresponding Name for IEEE 802
standards for LANs.
i) 802.3 a) WiFi
8. ……….. was the first step in the evolution of Ethernet from a coaxial cable
bus to hub managed, twisted pair network.
A) Star LAN
B) Ring LAN
C) Mesh LAN
9. …………… is the predominant form of Fast Ethernet, and runs over two
pairs of category 5 or above cable.
A) 100 BASE-T
B) 100 BASE-TX
C) 100 BASE-T4
D) 100 BASE-T2
A) 1000 BASE-T
B) 1000 BASE-SX
C) 1000 BASE-LX
D) 1000 BASE-CX
ANSWERS:
1. B) Session Layer
2. A) Class A
3. C) Class D
4. B) True, True
5. A) i only
8. A) Star LAN
9. B) 100 BASE-TX
A) FDDI
B) FDDT
C) FDDR
D) FOTR
A) 1000 BASE-SX
B) 1000 BASE-LX
C) 1000 BASE-CX
A) Ethernet
B) Fast Ethernet
C) Gigabit Ethernet
4. …………… is another kind of fiber optic network with an active star for
switching.
A) S/NET
B) SW/NET
C) NET/SW
D) FS/NET
6. ………………….. implies that all subnets obtained from the same subnet
mask.
A) Static subnetting
B) Dynamic subnetting
D) Both B and C
A) True, True
B) True, False
C) False, True
D) False, False
10. Which of the following is not a mechanism that DHCP supports for IP
address allocation?
A) Automatic allocation
B) Static allocation
C) Dynamic allocation
D) Manual allocation
Answers:
1. A) FDDI
3. B) Fast Ethernet
4. A) S/NET
6. A) Static subnetting
7. A) True, True
A) i only
B) i, and ii only
A) 19 and 20
B) 20 and 21
C) 21 and 22
D) 20 and 22
A) i, and ii only
A) infoset
B) clientinfo
C) cookie
D) transkie
i) 400 a) OK
Table of
Contents
READ ALSO: SOLVED MCQ QUESTIONS ON NETWORK ARCHITECTURE
A) (: : 1)
B) (: : )
C) (: : 0)
D) (1 : : )
A) (: : 1)
B) (: : )
C) (: : 0)
D) (1 : : )
A) Ring
B) Bus
C) Star
D) Mesh
A) Physical
B) Mac sub-layer
C) Network
D) Transport
10. A WAN typically spans a set of countries that have data rates less than
……………. Mbps.
A) 2
B) 1
C) 4
D) 100
ANSWERS:
1. B) i, and ii only
2. B) 20 and 21
4. C) cookie
6. A) (: : 1)
7. B) (: : )
8. B) Bus
10. B) 1
A) class A
B) class B
C) class C
D) class D
A) SMTP
B) TCP
C) IP
D) SCTP
A) static routing
C) adaptive routing
D) dynamic routing
A) logical
B) physical
C) common
D) shared
A) Data Link
B) Physical
C) Network
D) Session
Table of
Contents
READ ALSO: SOLVED MCQ OF CLIENT SERVER COMPUTING
A) ring network
B) spider network
C) hierarchical network
7. The …………… signals are used for the maintenance, troubleshooting, and
overall operation of the network.
A) address
B) network management
C) call Information
D) supervisory
A) flooding
B) variable routing
C) fixed routing
D) random routing
A) connection less
B) indirect link
C) direct link
D) connection-oriented
ANSWERS:
B) class B
A) SMTP
C) adaptive routing
A) logical
A) Data Link
B) spider network
7. The …………… signals are used for the maintenance, troubleshooting and
overall operation of the network.
B) network management
C) fixed routing
D) connection-oriented service
D) connection-oriented
A) class A
B) class B
C) class C
D) class D
A) SMTP
B) TCP
C) IP
D) SCTP
A) static routing
C) adaptive routing
D) dynamic routing
A) logical
B) physical
C) common
D) shared
A) Data Link
B) Physical
C) Network
D) Session
Table of
Contents
READ ALSO: SOLVED MCQ OF CLIENT SERVER COMPUTING
A) ring network
B) spider network
C) hierarchical network
7. The …………… signals are used for the maintenance, troubleshooting, and
overall operation of the network.
A) address
B) network management
C) call Information
D) supervisory
A) flooding
B) variable routing
C) fixed routing
D) random routing
A) connection less
B) indirect link
C) direct link
D) connection-oriented
ANSWERS:
B) class B
A) SMTP
C) adaptive routing
A) logical
A) Data Link
B) spider network
7. The …………… signals are used for the maintenance, troubleshooting and
overall operation of the network.
B) network management
C) fixed routing
D) connection-oriented service
D) connection-oriented
1. Which of the following is/are the main part(s) of the basic cellular system.
A) A mobile Unit
B) A cell Site
A) Direct propagation
B) Multipath Propagation
C) Bi-path Propagation
A) True, False
B) False, True
C) False, False
D) True, True
A) TDMA
B) CDMA
C) FDMA
D) FGMA
A) TDMA
B) CDMA
C) FDMA
D) FGMA
Table of
Contents
READ ALSO: SOLVED MCQ OF NETWORK ARCHITECTURE
A) True, False
B) False, True
C) False, False
D) True, True
A) connection oriented.
B) connection less.
C) packet switching.
D) circuit switching.
A) 2G system.
B) 3G system.
C) 2.5G system.
D) 3.5G system.
A) Directional Antenna
C) Propagation Antenna
ANSWERS:
1. Which of the following is/are the main part(s) of the basic cellular system.
B) Multipath Propagation
B) False, True
C) FDMA
A) TDMA
C) False, False
A) connection-oriented.
C) 2.5G system.
A) Directional Antenna
B) Multithreaded application
C) Application server
D) Client-server application
A) Resource sharing
B) Performance
C) Availability
D) Security
4. In …………………… the client invokes the request and then blocks waiting
for the response.
C) Synchronous Invocation
D) Two-way Invocation
C) Synchronous Invocation
D) Two-way Invocation
Table of
Contents
READ ALSO: SOLVED MCQ OF WIRELESS MOBILE COMMUNICATION
A) Distributed environment
A)Activation Desc
B) Marshalled Object
C) Activation Exception
D) Activation Object
ANSWERS:
D) Security
4. In …………………… the client invokes the request and then blocks waiting
for the response.
C) Synchronous Invocation
B) Marshalled Object
A) Computer Architecture
B) Communication Architecture
C) Network Architecture
D) Internet Architecture
A) i and ii
B) ii and iii
C) iii and iv
D) ii and iv
A) five
B) six
C) seven
D) eight
A) Physical Layer
C) Session Layer
D) Transport Layer
Table of
Contents
READ ALSO: SOLVED MCQ OF CLIENT SERVER COMPUTING
A) Physical Layer
C) Network Layer
D) Transport Layer
A) ARPANET
B) PARPANET
C) USDNET
D) DODNET
8. Which of the following are True for the TCP/IP reference model?
i) The TCP protocol divides the large message into a sequence of packets into
an IP packet.
iii) It is necessary for all the packets in a single message to take the same
route each time it is sent.
iv) The packets are passed from one network to another until they reach their
destination.
A) i and iv only
B) i, ii and iv only
A) Internet Layer
B) Application Layer
C) Transport Layer
D) Presentation Layer
ii) The network layer of the OSI model provides both connectionless and
connection-oriented service.
iv) The TCP/IP model does not fit any other protocol stack.
ANSWERS:
C) Network Architecture
D) ii and iv
C) seven
C) Session Layer
C) Network Layer
A) ARPANET
8. Which of the following are True for the TCP/IP reference model?
i) The TCP protocol divides the large message into a sequence of packets into
an IP packet.
iii) It is necessary for all the packets in a single message to take the same
route each time it is sent.
iv) The packets are passed from one network to another until they reach their
destination.
B) i, ii and iv only
D) Presentation Layer
ii) The network layer of the OSI model provides both connectionless and
connection-oriented service.
iii) The TCP/IP model does not fit any other protocol stack.
A) Analog data
B) Digital data
C) Analog signal
D) Digital signal
A) Analog data
B) Digital data
C) Analog signal
D) Digital signal
A) Analog data
B) Digital data
C) Analog signal
D) Digital signal
4. ………….. can have only limited number of defined values which is often
simple as 0 or 1.
A) Analog data
B) Digital data
C) Analog signal
D) Digital signal
A) periodic
B) framed
C) non periodic
D) discrete
A) phase
B) peak amplitude
C) frequency period
D) period
A) phase
B) peak amplitude
C) frequency
D) period
A) phase
B) peak amplitude
C) frequency
D) period
A) phase
B) peak amplitude
C) frequency
D) period
A) Period
B) Frequency
C) Web-length
D) Phase
A) Composite signal
B) Combined signal
C) Hybrid signal
A) Analog signal
B) Digital signal
C) Hybrid signal
A) repeaters
B) amplifiers
C) routers
D) boosters
14. A ……………….. receives the digital signal, recovers the pattern of 1s and
0s and re-transmits a new signal.
A) repeater
B) amplifier
C) router
D) booster
15. State whether the following statements are True or False for digital signal.
i) Analog data are encoded using a codec to produce digital bit stream
ii) Digital data are encoded to produce a digital signal with desired properties.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
A) repeaters
B) amplifiers
C) routers
D) boosters
A) i and ii only
18. …………….. receive the signal and noise at their input separate out the
signal from noise and regenerate the signal which is free from noise.
A) repeaters
B) amplifiers
C) routers
D) separators
ii) It is possible to detect and correct the errors introduced during the data
transmission.
A) i and ii only
20. State whether the following statements are True or False for digital data
transmission.
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
Answers
1. A) Analog data
2. B) Digital data
3. C) Analog signal
4. D) Digital signal
5. A) periodic
6. B) peak amplitude
7. D) period
8. A) phase
9. C) frequency
10. C) Web-length
13. B) amplifiers
14. A) repeater
16. A) repeaters
18. A) repeaters
A) Baseband transmission
B) Broadband transmission
C) Digital transmission
D) Analog transmission
A) parallel
B) serial
C) analog
D) digital
A) parallel
B) serial
C) analog
D) digital
A) Noise
B) Delay distortion
C) Attenuation distortion
D) Dispersion
5. If the ……………….. is too much, the receiver may not be able to detect
the signal at all or the signal may fall below the noise level.
A) Noise
B) Delay
C) Dispersion
D) Attenuation
ii) Cascade losses and gains can be calculated with simple additions and
subtractions
A) i only
B) ii only
A) Noise
B) Delay distortion
C) Attenuation distortion
D) Dispersion
8. ………….. can be defined as unwanted energy from source other than the
transmitter.
A) Dispersion
B) Attenuation Distortion
C) Delay distortion
D) Noise
A) Thermal
B) Intermodulation
C) Cross talk
D) Impulse
A) Black
B) White
C) Gray
D) Blue
A) Thermal
B) Intermodulation
C) Cross talk
D) Impulse
12. ……………….. is a noise where foreign signal enters the path of the
transmitted signal.
A) Thermal
B) Intermodulation
C) Cross talk
D) Impulse
A) Thermal
B) Intermodulation
C) Cross talk
D) Impulse
14. ……………… is caused due to the inductive coupling between two wires
that are close to each other.
A) Thermal
B) Intermodulation
C) Cross talk
D) Impulse
15. Sometime when talking over the telephone, you can hear another
conversation in the background which is ………………..
A) Thermal
B) Intermodulation
C) Cross talk
D) Impulse
16. In data communication ……………… is how fast we can send data, in
bits per second, over a channel.
A) data rate
B) data flow
C) data speed
D) baud rate
i) The bandwidth available ii) The level of the signals iii) The level of noise
A) i and ii only
18. …………….. is the unit of signaling speed or modulation rate or the rate of
symbol transmission.
A) Data rate
B) Bit rate
D) Baud rate
A) Analog signal
B) Digital signal
C) Hybrid signal
D) Discrete signal
20. The range of frequencies that contain the information is called as the
………..
A) Bandwidth
B) Bit rate
D) Baud rate
Answers
2. A) parallel
3. B) serial
4. C) Attenuation distortion
5. D) Attenuation
7. B) Delay distortion
8. D) Noise
9. A) Thermal
10. B) White
11. B) Intermodulation
13. D) Impulse
20. A) Bandwidth
A) Liners coding
B) Line coding
C) Digital coding
D) Binary coding
i) signal level and data level ii) DC component iii) Pulse rate and bit rate iv)
self synchronization
i) Unipolar codes ii) Non polar codes iii) Bipolar codes iv) Polar codes
4. …………… have only one voltage level other than zero, so the encoded
signal will have either +A volts value or 0.
A) Unipolar codes
B) Bipolar codes
D) Polar codes
5. ………………… uses two voltage levels other than zero such as +A/2 and
-A/2 volts.
A) Unipolar codes
B) Bipolar codes
D) Polar codes
A) Unipolar RZ
B) Unipolar NRZ
C) Polar RZ
D) Polar NRZ
A) Unipolar RZ
B) Unipolar NRZ
C) Polar RZ
D) Polar NRZ
A) Unipolar RZ
B) Unipolar NRZ
C) Bipolar NRZ
D) Polar NRZ
A) Bipolar format
B) Unipolar format
D) Polar format
A) Bipolar
B) Unipolar
D) Polar
11. Which of the following is/are the basic types of modulation techniques for
transmission of digital signals.
i) Amplitude Shift Keying(ASK) ii) Frequency Shift Keying(FSK) iii) Phase Shift
Keying(PSK)
A) i and ii only
A) ASK
B) FSK
C) PSK
D) QPSK
A) ASK
B) FSK
C) PSK
D) QPSK
A) ASK
B) FSK
C) PSK
D) QPSK
15. State the following statements are True or False for the advantage of FSK.
iii) It increases the channel bandwidth required to transmit the FSK signal.
16. The …………………. is not preferred for the high speed modems since
with increase in speed, the bit rate increases.
A) ASK
B) FSK
C) PSK
D) QPSK
17. ………………… is used for high bit rates, where the phase of the
sinusoidal carrier is changed according to the data bit to be transmitted.
A) ASK
B) FSK
C) PSK
D) QPSK
18. …………………. has the best performance of all the systems in presence
of noise, which gives the minimum possibility of error.
A) QPSK
B) BPSK
C) QAM
D) FSK
A) i and ii only
20. As the telephone lines have a very low bandwidth, it is not possible to
satisfy the bandwidth requirement of …………………… at higher speed.
A) ASK
B) PSK
C) FSK
D) QPSK
Answers
1. B) Line coding
4. A) Unipolar codes
5. D) Polar codes
6. B) Unipolar NRZ
7. C) Polar RZ
8. C) Bipolar NRZ
9. A) bipolar format
12. D) QPSK
13. A) ASK
14. A) ASK
16. B) FSK
17. C) PSK
18. B) BPSK
20. C) FSK
1. ………………… cables are very cheap and easy to install, but they are
badly affected by the noise interference.
A) STP
B) UTP
C) Co-axial
D) Optical Fiber
A) Category 1
B) Category 2
C) Category 1 and 2
D) Category 1, 2 and 3
A) 10 Mbps
B) 15 Mbps
C) 20 Mbps
D) 25 Mbps
A) 100 Mbps
B) 200 Mbps
C) 300 Mbps
D) 400 Mbps
7. State whether the following statements are True for twisted pair cable.
i) The attenuation of both STP and UTP ii) The cost of UTP is higher than STP
iii) The installation of STP is fairly easy than UTP
B) i and ii only
A) RJ35
B) RJ45
C) RJ11
D) RJ21
A) Co-axial
B) UTP
C) STP
D) Optical Fiber
A) Noise
B) Attenuation
C) Interference
D) Distortion
12. State the following statements are True or False for the characteristics of
Co-axial calble.
A) Optical Fiber
B) UTP
C) STP
D) Co-axial
A) RG – 11
B) RG – 12
C) RG – 58
D) RG – 59
A) RG – 11
B) RG – 12
C) RG – 58
D) RG – 59
i) In the DSL line ii) Analog telephone networks iii) Thick and thin Ethernet iv)
Cable TV
i) BNC connector ii) BNC-L connector iii) BNC-T connector iv) BNC
terminator
B) BNC-L connector
C) BNC-T connector
D) BNC terminator
19. The ……………………. is used at the end of cable to present the reflection
of the signal.
B) BNC-L connector
C) BNC-T connector
D) BNC terminator
20. The ……………. cable was initially developed as the backbone of analog
telephone networks where a single telephone cable would be used to carry
more that 10,000 voice channels at a time.
A) Optical Fiber
B) UTP
C) STP
D) Co-axial
Answers
1. B) UTP
4. C) Category 1 and 2
5. C) 20 Mbps
6. B) 200 Mbps
8. B) RJ45
9. A) Co-axial
11. C) Interference
13. D) Co-axial
14. A) RG – 11
15. D) RG – 59
20. D) Co-axial
A) Fiber optic
B) Co-axial
C) UTP
D) STP
2. State the following statements are True or False for the applications of
optical fiber cables.
ii) The installation cost of optical fibers is higher than that for the Co-axial
cables.
A) ILD
B) LED
C) LOD
D) ELD
A) ILD
B) LED
C) LOD
D) ELD
5. Which of the following statements are True for step index and graded index
fibers.
i) The light rays travel in straight line through the step index fibers.
ii) Acceptance cone of graded index fibers is smaller than that of the step
index fiber.
iii) In graded index fiber, the light rays do not travel in straight line due to
continuous refraction.
A) i and ii only
6. State True or False for following statements about single mode and multi-
mode fibers.
i) Multi-mode fiber can have either step index or graded index profile.
ii) Single mode fiber are high quality fiber for wide band long haul
transmission.
iii) The amount of dispersion introduced in single mode fiber is greater than
that introduced in the multi-mode fibers.
7. ………… cable has much lower attenuation and can carry signal to longer
distances without using amplifiers and repeaters in between.
A) Optical fiber
B) Co-axial
C) UTP
D) STP
A) Fiber optic
B) Co-axial
C) UTP
D) STP
9. State whether the following statements are True for the characteristics of
optical fiber cables.
i) The cost of fiber optic cable is more compared to twisted pair and Co-axial.
iii) The number of modes which a fiber optic can support does not depend on
its length.
A) i and ii only
A) Fiber optic
B) Co-axial
C) UTP
D) STP
11. Which of the following are the advantages of fiber optic communication
over t he conventional means of communication.
i) Small size and light weight ii) Easy availability and low cost iii) No electrical
or electromagnetic interference iv) Large bandwidth
i) Ground loops are absent ii) The initial cost incurred in high iii) Joining the
optical fiber is difficult job
A) i and ii only
13. Fiber optic cables use three types of connectors which are
B) iii, iv an v only
14. The ……………. is used for cable TV, which use a push/pull locking
system.
A) SC connector
B) BC connector
C) ST connector
D) MT-RJ connector
A) SC connector
B) BC connector
C) ST connector
D) MT-RJ connector
16. In …………… short circuit between the two conductors is not possible.
A) Optical fiber
B) Co-axial
C) UTP
D) STP
A) Optical fiber
B) Co-axial
C) UTP
D) STP
B) Co-axial cable
C) UTP cable
D) STP cable
A) 4o to 110
B) 30 to 90
C) 30 to 100
D) 40 to 100
B) Co-axial cable
C) UTP cable
D) STP cable
Answers
1. A) Fiber optic
3. B) LED
4. A) ILD
7. A) Optical fiber
8. A) Fiber optic
14. A) SC connector
15. C) ST connector
19. C) 30 to 100
1. Different ways the unguided signal can travel from the transmitter to
receiver is/are
A) i and ii only
A) 100Km to 10Km
B) 10Km to 1Km
C) 10^3Km to 100Km
D) 100M to 10M
A) 10 Km to 1 Km
B) 100 M to 10 M
C) 10 M to 1 M
D) 1 M to 10 Cm
A) Cellular phones
B) TV broadcasting
C) Satellite communication
D) AM radio broadcast
8. The medium frequencies (MF) from 300KHz to 30MHz are used for ……
A) Cellular phones
B) TV broadcasting
C) Satellite communication
D) AM radio broadcast
9. The signal occupying the range between 0.1mm and 700nm(nanometer) are
called …….
A) electromagnetic signal
B) infrared signal
C) short signal
D) visible light
B) i, ii and iv only
A) electromagnetic signal
B) infrared signal
C) short signal
D) visible light
A) EM waves
B) Microwaves
C) Radiowaves
D) Infrared
13. Radio frequencies below …………. are more suitable for omnidirectional
applications.
A) 30GHz
B) 3GHz
C) 1GHz
D) 300MHz
B) i, ii and iv only
15. State whether the following statements are True or False for the
characteristics of the types of radio wave.
iii) The installation of low power single frequency is simple than other
A) i and ii only
16. Different types of radio waves used for computer network applications are
……
B) i, ii and iv only
A) EM waves
B) Microwaves
C) Radiowaves
D) Infrared
18. Which of the following statements are correct for the characteristics of
terrestrial Microwave systems.
ii) The frequency range used form 4-6 GHz and 21 to 23 GHz
A) i and ii only
19. State whether the following statements are True or False about the
Microwave link.
A) i and ii only
B) i, ii and iv only
Answers
4. A) 100Km to 10Km
5. C) 10 M to 1 M
7. C) Satellite communication
8. D) AM radio broadcast
9. B) infrared signal
12. B) Microwaves
13. C) 1GHz
17. B) Microwaves
A) Medium Waves
B) Short Waves
C) Micro Waves
D) Infrared Waves
A) Medium Waves
B) Short Waves
C) Micro Waves
D) Infrared Waves
3. The wave length of the …………….. ranges from 850nm and 900nm, where
the receivers with good sensitivity are available.
A) visible light
B) infrared light
C) micro waves
D) radio waves
A) IRDA-A
B) IRDA-B
C) IRDA-C
D) IRDA-D
A) IRDA-A
B) IRDA-B
C) IRDA-C
D) IRDA-D
A) IRDA-A
B) IRDA-B
C) IRDA-C
D) IRDA-D
A) infrared
B) microwave
C) radio wave
D) long wave
A) Bandwidth capacity
B) Node capacity
C) Attenuation
D) EMI
A) Point-to-point
B) Point-to-multipoint
C) Broadcast
10. State whether the following statements are correct for the applications of
infrared.
i) very high data rates can be supported, due to very high bandwidth.
A) i and ii only
11. Depending upon the type of application, which of the following is/are the
categories of satellites.
12. Which of the following is/are the typical band of signal frequencies used
for the satellites communication.
A) i and ii only
13. Which of the following is/are the different types of beams used to cover a
specific area of earth.
i) Global beams ii) Spot beams iii) Point-to-Point Spot iv) Use of dual
polarization
C) i, ii and iv only
14. State whether the following statements are True or False for the
characteristics of satellite microwave systems.
15. For ………………. frequencies, the download frequency is 4GHz and up-
link frequency is 6GHz.
A) C band
B) Ku band
C) Ka band
D) Ca band
16. The frequencies having down-link frequency 11GHz and up-link frequency
14GHz is known as ……………… frequency.
A) C band
B) Ku band
C) Ka band
D) Ca band
17. For ……………. frequencies, the download frequency is 30GHz and up-
link frequency 30GHz.
A) C band
B) Ku band
C) Ka band
D) Ca band
18. The electromagnetic web having the wavelength from 1Km to 100M are
known as ………….
A) Long Waves
B) Medium Waves
C) Short Waves
D) Micro Waves
19. The electromagnetic wave having the wave length from 10Km to 1Km are
known as ……….
A) Long Waves
B) Medium Waves
C) Short Waves
D) Micro Waves
A) 24 MHz, 8 Channels
B) 32 MHz, 10 Channels
C) 36 MHz, 12 Channels
D) 38 MHz, 16 Channels
Answers
1. D) Infrared Waves
2. B) Short Waves
3. B) infrared light
4. C) IRDA-C
5. D) IRDA-D
6. C) IRDA-C
7. A) infrared
8. C) Attenuation
9. C) Broadcast
15. A) C band
16. B) Ku band
17. C) Ka band
C. Optical Fiber
D. Wireless
3) ……….. has much lower attenuation and can carry the signal to longer
distances without using amplifiers and repeaters in between.
A. UTP cable
B. STP cable
4) The major problem(s) suffered for transmission lines on the physical layer
is/are ………
A. Attenuation distortion
B. Delay distortion
C. Noise
A. Attenuation distortion
B. Delay distortion
C. Noise
6) ………. is the unwanted energy from sources other than the transmitter.
A. Attenuation distortion
B. Delay distortion
C. Noise
D. Disturbance
A. Thermal
B. Magnetic
C. Inter-modulation
D. Cross talk
Table of
Contents
READ ALSO: OBJECTIVE QUESTIONS ON DATA TRANSMISSION MEDIUM
A. Transmission media
B. Physical media
C. Transmission path
D. Receiving path
10) The key concern in the design of the data transmission system is Data
Rate and ………
A. Data Path
B. Data flow
C. Distance
D. Frequencies
A. Message switching
B. Physical switching
C. circuit switching
D. packet switching
12) Which of the following is not the phase involved in the circuit switching
network?
A. Connection start
B. Connection establishment
C. Data transfer
D. Termination
13) ……….. is also known as store and forward switching since the messages
are stored at intermediate nodes in route to their destinations.
A. Message switching
B. Physical switching
C. circuit switching
D. packet switching
14) State True or False for the following characteristics of optical fiber cables.
i) The cost of fiber optic cable is more compared to twisted pair and co-axial.
A. i-True, ii-True
B. i-False, ii-True
C. i-True, ii-False
D. i-False, ii-False
A. Message switching
B. Linear switching
C. circuit switching
D. packet switching
16) ……….. is used to optimize the use of the channel capacity available in a
network, to minimize the transmission latency and to increase the robustness
of communication.
A. Message switching
B. Linear switching
C. circuit switching
D. packet switching
17) The term ……… describes the position of the waveform relative to time 0.
A. Frequency
B. Phase
C. Phase Shift
D. Time period
18) If the value of a signal changes over a very short span of time, it’s
frequency is …….
A. short
B. low
C. high
D. long
i. Data applications
iv. Fascimile(FAX)
A. Message switching
B. Circuit switching
C. Packet switching
D. Circular switching
ANSWERS:
2) C. Optical Fiber
5) A. Attenuation distortion
6) C. Noise
7) B. Magnetic
9) A. Transmission media
10) C. Distance
17) B. Phase
18) C. high
C. Optical Fiber
D. Wireless
3) ……….. has much lower attenuation and can carry the signal to longer
distances without using amplifiers and repeaters in between.
A. UTP cable
B. STP cable
4) The major problem(s) suffered for transmission lines on the physical layer
is/are ………
A. Attenuation distortion
B. Delay distortion
C. Noise
A. Attenuation distortion
B. Delay distortion
C. Noise
6) ………. is the unwanted energy from sources other than the transmitter.
A. Attenuation distortion
B. Delay distortion
C. Noise
D. Disturbance
A. Thermal
B. Magnetic
C. Inter-modulation
D. Cross talk
Table of
Contents
READ ALSO: OBJECTIVE QUESTIONS ON DATA TRANSMISSION MEDIUM
A. Transmission media
B. Physical media
C. Transmission path
D. Receiving path
10) The key concern in the design of the data transmission system is Data
Rate and ………
A. Data Path
B. Data flow
C. Distance
D. Frequencies
A. Message switching
B. Physical switching
C. circuit switching
D. packet switching
12) Which of the following is not the phase involved in the circuit switching
network?
A. Connection start
B. Connection establishment
C. Data transfer
D. Termination
13) ……….. is also known as store and forward switching since the messages
are stored at intermediate nodes in route to their destinations.
A. Message switching
B. Physical switching
C. circuit switching
D. packet switching
14) State True or False for the following characteristics of optical fiber cables.
i) The cost of fiber optic cable is more compared to twisted pair and co-axial.
A. i-True, ii-True
B. i-False, ii-True
C. i-True, ii-False
D. i-False, ii-False
A. Message switching
B. Linear switching
C. circuit switching
D. packet switching
16) ……….. is used to optimize the use of the channel capacity available in a
network, to minimize the transmission latency and to increase the robustness
of communication.
A. Message switching
B. Linear switching
C. circuit switching
D. packet switching
17) The term ……… describes the position of the waveform relative to time 0.
A. Frequency
B. Phase
C. Phase Shift
D. Time period
18) If the value of a signal changes over a very short span of time, it’s
frequency is …….
A. short
B. low
C. high
D. long
i. Data applications
iv. Fascimile(FAX)
A. Message switching
B. Circuit switching
C. Packet switching
D. Circular switching
ANSWERS:
2) C. Optical Fiber
5) A. Attenuation distortion
6) C. Noise
7) B. Magnetic
9) A. Transmission media
10) C. Distance
17) B. Phase
18) C. high
A) i, ii and iv only
A) SMDS
B) Frame relay
C) X.25
D) ATM
A) Packet Switching
B) Circuit Switching
A) X.25
B) X.21
C) SMDS
D) X.23
A) X.25
B) X.21
C) SMDS
D) ATM
A) Virtual circuit
B) Switched circuit
7. In order to allow the computers who do not use the X.25 to communicate
with the …………………., a packet assembler disassembler (PAD) is used.
A) X.21
B) SMDS
C) Frame relay
D) X.25
i) physical layer ii) data link layer iii) packet layer iv) application layer
A) i, ii and iv only
9. The X.25 defines the interface for exchange of packets between the
user’s machine (DTE) and the packet switching node to which this DTE is
A) DCE
B) DDE
C) DLC
D) HDL
10. At the physical level, …………… physical interface is being used which is
defined for circuit switched data network.
A) X.25
B) X.21
C) Frame relay
D) SMDS
11. The virtual circuit service of X.25 provides for two types of virtual circuits
which are ………….
i) virtual circuit ii) permanent virtual circuit iii) permanent virtual call iv) virtual
call
A) i and ii only
D) ii and iv only
B) Virtual call
C) Virtual circuit
B) Virtual call
C) Virtual circuit
i) Frame delivery is more reliable ii) X.25 is faster than Frame relay iii) Frames
are delivered in order iv) Flow control is provided
A) i, ii and iv only
A) X.25
B) Frame relay
C) SMDS
D) ATM
A) Frame relay
B) X.25
C) SMDS
D) ATM
17. ………….. was developed for taking the advantage of the high data rates
and low error rates in the modern communication system.
A) X.25
B) Frame relay
C) SMDS
D) ATM
18. In …………….. the cell control packets are used for setting up and
clearing virtual circuits.
A) ATM
B) X.25
C) SMDS
D) Frame relay
A) i and ii only
A) X.25
B) Frame relay
C) SMDS
D) ATM
Answers
2. C) X.25
3. A) Packet Switching
4. B) X.21
5. A) X.25
7. D) X.25
9. A) DCE
10. B) X.21
i) Frames are delivered unreliably ii) Packets having errors are simply
discarded iii) Frame relay does not provide flow control iv) Frame relay is
much slower than X.25
A) i, ii and iv only
A) X.25
B) X.21
C) Frame relay
D) SMDS
A) X.25
B) X.21
C) ATM
D) Frame relay
i) X.25 networks work at speed upto 64 kbps ii) X.25 does not provide flow
control iii) X.25 provides acknowledgement signal
i) Frame relay supports virtual leased line ii) Bad frame is discarded by frame
relay iii) Frames are delivered in proper order
A) i and ii only
A) X.25
B) X.21
C) Frame relay
D) SMDS
A) X.25
B) X.21
C) ATM
D) Frame relay
i) Compressed voice and video ii) Synchronous TDM streams such as T-1 iii)
Services using the constant bit rates
A) i and ii only
9. ATM has advantages of better reliability and fidelity which allows faster
packet switching than ……..
A) X.21
B) X.25
C) Frame relay
D) SMDS
10. …………….. is used in non-ISDN systems where the data rates are very
high.
A) X.21
B) X.25
C) ATM
D) SMDS
A) Physical layer
B) ATM layer
C) High layer
A) X.21
B) ATM
C) X.25
D) SMDS
13. ………….. defines the transmission of data in fixed size cells and it also
defines the use of logical connections.
A) Physical layer
B) ATM layer
C) High layer
14. ……………. is a service dependent layer, which is used for supporting the
information transfer protocol not based on ATM.
A) Physical layer
B) ATM layer
C) High layer
15. The ATM protocol architecture consists of the following separate plans
i) user plane ii) control plane iii) server plane iv) plane management
A) i, ii and iv only
A) i and ii only
17. In ATM, the information is transmitted in the form of small packets of fixed
size are called ………..
A) ATM path
B) ATM cell
C) ATM routing
D) ATM follow
A) i and ii only
i) ATM is next step of packet switching technique ii) ATM allows multiple
virtual channel with the data rates iii) Frame relay not allows multiple virtual
channels with the data rates
Answers
2. C) Frame relay
3. D) Frame relay
5. A) i and ii only
6. C) Frame relay
7. A) X.25
9. B) X.25
10. C) ATM
12. B) ATM
A) Encryption
B) Authentication
C) Authorization
D) Non-repudiation
3. The following protocols and systems are commonly used to provide various
degrees of security services in a computer network.
4. A firewall is installed at the point where the secure internal network and
untrusted external network meet which is also known as ………………
A) Chock point
B) meeting point
C) firewall point
D) secure point
A) Tunneling
B) Transferring
C) Trafficking
D) Switching
A) Tunnel
B) Transport
C) Authentication
D) Both A and B
ii) NAT is used for the small number of hosts in a private network.
A) True, False
B) False, True
C) True, True
D) False, False
A) VNP
B) VPN
C) VSN
D) VSPN
Answers:
2. A) Encryption
4. A) Chock point
7. A) Tunneling
8. A) Tunnel
9. C) True, True
10. B) VPN
A) SSL
B) ESP
C) TSL
D) PSL
A) SSL
B) ESP
C) TSL
D) PSL
A) Tunneling
B) Encapsulation
C) Both A and B
A) IPsec
B) Netsec
C) Packetsec
D) Protocolsec
5. At the lower layer of SSL, a protocol for transferring data using a variety of
predefined cipher and authentication combinations called the ……………….
6. While initiating the SSL session, the client code recognizes the SSL request
and establishes a connection through TCP Part …………….. to the SSL code
on the server.
A) 420
B) 1032
C) 443
D) 322
7. On the upper layer of SSL, a protocol for initial authentication and transfer
of encryption keys called the …………………
ii) In proxy, a direct connection is established between the client and the
destination server.
A) True, False
B) False, True
C) True, True
D) False, False
A) Tunnel
B) Encapsulating
C) Transport
D) Gateway
Answers:
1. A) SSL
2. B) ESP
3. C) Both A and B
4. A) IPsec
6. C) 443
8. A) True, False
10. A) Tunnel
A. Correctness
B. Robustness
C. Delay time
D. Stability
2) The ……… protocol allows the administrator to assign a cost, called the
metric, to each route.
A. OSPF
B. RIP
C. BGP
D. BBGP
3) If there is only one routing sequence for each source destination pair, the
scheme is known as …..
A. static routing
C. standard routing
D. dynamic routing
A. distance vector
B. link state
C. path vector
A. static routing
C. standard routing
D. dynamic routing
A. distance vector
B. link state
C. path vector
D. distance code
7) The term …….. refers to which node or nodes in the network are
responsible for the routing decision.
A. decision place
B. routing place
C. node place
D. switching place
8) In ……. routing the least cost route between any two nodes is the minimum
distance.
A. path vector
B. distance vector
C. link state
D. switching
A. designated center
B. control center
C. network center
B. autonomous networks
D. autonomous system
11) In ………. a route is selected for each destination pair of nodes in the
network.
A. flooding
B. variable routing
C. fixed routing
D. random routing
A. open
B. update
C. keep alive
D. close
A. flooding
B. variable routing
C. fixed routing
D. random routing
14) An area is ….
A. part of an AS
A. Variable routing
B. Flooding
C. Fixed routing
D. Random routing
16) In ……….. routing, we assume that there is one node (or more) in each
autonomous system that acts on behave of the entire autonomous system.
A. distant vector
B. path vector
C. link state
D. multipoint
17) When a direct delivery is made, both the deliverer and receiver have the
same ….
A. routing table
B. host id
C. IP address
D. Net id
18) In OSPF, a ……… link is a network with several routers attached to it.
A. point-to-point
B. transient
C. stub
D. multipoint
19) In ……. routing, the mask and the destination address are both 0.0.0.0 in
routing table.
A. next-hop
B. host-specific
C. network-specific
D. default
20) In ………. the router forwards the receive packet through only one of its
interfaces.
A. unicasting
B. multicasting
C. broadcasting
D. point to point
Table of
Contents
ANSWERS:
1) C. Delay time
2) A. OSPF
4) B. link state
5) C. standard routing
6) A. distance vector
7) A. decision place
8) B. distance vector
12) B. update
13) A. flooding
14) A. part of an AS
15) B. Flooding
17) D. Net id
18) B. transient
19) D. default
20) B. multicasting
A. static routing
B. permanent routing
C. standard routing
D. dynamic routing
A. SPF
B. BGP
C. RIP
D. OSPF
A. TELNET
B. TNET
C. ARPANET
D. ARNET
5) In ………. routing, the routing table hold the address of just the next hop
instead of complete route information.
A. next-hop
B. host-specific
C. network-specific
D. default
A. OSPF
B. EIGRP
C. BGP
D. RIP
A. next-hop
B. host-specific
C. network-specific
D. default
A. OSPF
B. EIGRP
C. BGP
D. RIP
A. up
B. host-specific
C. gateway
D. added by redirection
A. Stub
B. Multi-homed
C. Transit
A. up
B. host specific
C. gateway
D. added by redirection
A. Stub
B. Multi-homed
C. Transit
13) In unicast routing, each router in the domain has a table that defines a
……… path tree to possible destinations.
A. average
B. longest
C. shortest
D. very longest
14) ………….. supports the simultaneous use of multiple unequal cost paths
to a destination.
A. OSPF
B. EIGRP
C. BGP
D. RIP
15) In multicast routing, each involved router needs to construct a ……… path
tree for each group.
A. average
B. longest
C. shortest
D. very longest
i) Faster convergence
D. i, ii and iv only
A. point-to-point
B. transient
C. stub
D. multipoint
A. Faster convergence
C. Route summarization
D. Multiple protocols
19) In OSPF, when the link between two routers is broken, the administration
may create a …….. link between them using a longer path that probably goes
through several routers.
A. point-to-point
B. transient
C. stub
D. multipoint
A. Route redistribution
B. Route summarization
C. Route reintroducing
D. Route recreation
Answers:
1) D. dynamic routing
2) D. OSPF
3) C. ARPANET
5) A. next-hop
6) C. BGP
7) C. network-specific
8) A. OSPF
9) D. added by redirection
11) C. gateway
12) C. Transit
13) C. shortest
14) B. EIGRP
15) C. shortest
17) C. stub
19) D. multipoint
1) The principle of ………..states that the routing table is stored from the
longest mask to the shortest mask.
A. Forwarding
B. Routing
C. Directing
D. None directing
4) During an adverse condition, the length of time for every device in the
network to produce an accurate routing table is called the ……….
A. accurate time
B. integrated time
C. convergence time
D. average time
A. static
B. dynamic
C. hierarchical
D. non static
A. static
B. dynamic
C. hierarchical
D. non static
C. Hybrid protocols
A. next-hop
B. network-specific
C. host-specific
D. default
A. Static routing
B. Dynamic routing
C. Hybrid routing
D. Automatic routing
11) In ………. forwarding, the mask and destination addresses are both
0.0.0.0 in the routing table.
A. next-hop
B. network-specific
C. host-specific
D. default
12) To build the routing table, ……….. method use preprogrammed definitions
representing paths through the network.
A. Static routing
B. Dynamic routing
C. Hybrid routing
D. Automatic routing
A. next-hop
B. network-specific
C. host-specific
D. default
15) In ………. forwarding, the routing table holds the address of just the next
hop instead of complete route information.
A. next-hop
B. network-specific
C. host-specific
D. default
A. unicast
B. multicast
C. broadcast
D. point to point
19) A robust routing protocol provides the ability to ……… build and manage
the information in the IP routing table.
A. dynamically
B. statically
C. hierarchically
A. i-True, ii-True
B. i-True, ii-False
C. i-False, ii-True
D. i-False, ii-False
Answers:
3) B. Routing
4) C. convergence time
5) A. static
7) B. dynamic
9) C. host-specific
11) D. default
13) B. network-specific
15) A. next-hop
17) C. broadcast
19) A. dynamically
A. stream-oriented
B. message-oriented
C. block-oriented
D. packet-oriented
A. Physical layer
B. link layer
C. network layer
D. transport layer.
A. user datagram
B. segment
C. datagram
D. packet
4) The ………. of TCP/IP protocol is responsible for figuring out how to get
data to its destination.
A. application layer
B. link layer
C. network layer
D. transport layer.
A. protocol delivery
B. reliable
C. best-effort delivery
D. effortless delivery
A. Internet Protocol(IP)
D. Bootstrap Protocol(BOOTP)
A. four
B. two
C. three
D. four
B. Reseaux IP Europeans(RIPE)
A. user datagrams
B. segments
C. frames
D. packets
10) ………… addresses use 21 bits for the and 8 bits for the portion of the IP
address for TCP/IP network.
A. Class A
B. Class B
C. Class C
D. Class D
Table of
Contents
READ ALSO: SOLVED MCQ ON NETWORK LAYER IN COMPUTER
NETWORKS
A. 16
B. 8
C. 32
D. 64
A. ICMP
B. ARP
C. IP
D. BOOTP
13) TCP assigns a sequence number to each segment that is being sent. The
sequence number for each segment is the number of the ……. byte carried in
that segment.
A. first
B. last
C. middle
D. zero
14) ………. is responsible for converting the higher-level protocol address (IP
addresses) to physical network addresses.
A. Internet Protocol(IP)
D. Bootstrap Protocol(BOOTP)
A. data link
B. network
C. transport
D. interface
A. TCP
B. UDP
C. IP
D. ARP
A. Process-to-process communication
B. Host-to-host communication
D. Interface-to-interface communication.
A. 32
B. 48
C. 16
D. 64
A. delivery is complete
C. a header is added
20) TCP/IP is a ………. hierarchical protocol suite developed before the OSI
model.
A. seven-layer
B. five-layer
C. six-layer
D. four-layer
ANSWERS:
1) A. stream-oriented
2) A. Physical layer
3) B. segment
4) C. network layer
5) B. reliable
6) A. Internet Protocol(IP)
7) B. two
9) A. user datagrams
10) C. Class C
11) B. 8
12) A. ICMP
13) A. first
15) C. transport
16) B. UDP
18) C. 16
20) B. five-layer
1) UDP needs the ……….. address to deliver the user datagram to the correct
application process
A. port
B. application
C. internet
D. intranet
A. ICMP
B. BOOTP
C. UDP
D. ARP
A. Flow control
B. Connection-oriented delivery
C. Data control
C. Internet Protocol(IP)
5) The source port address on the UDP user datagram header defines ………
Table of
Contents
READ ALSO: SOLVED MCQ ON TCP/IP AND UDP IN COMPUTER
NETWORKS
A. Automatic allocation
B. Dynamic allocation
C. Manual allocation
A. connection-oriented, unreliable
B. connectionless, reliable
C. connectionless, unreliable
D. connection, reliable
A. lease
B. limited network
C. timed network
D. assigned network
9) UDP does not add anything to the services of IP except for providing
………. communication.
A. node to node
B. process to process
C. host to host
D. interface to interface
A. ICMP
B. BOOTP
C. UDP
D. ARP
12) ………… is where users typically interact with the TCP/IP network.
A. Link layer
B. Network layer
C. Transport layer
D. Application layer
13) The local host and the remote host are defined using IP addresses. To
define the processes, we need second identifiers called ………
A. UDP addresses
B. transport addresses
C. port addresses
D. TCP addresses
14) The …………. is responsible for communicating with the actual network
hardware.
A. Link layer
B. Network layer
C. Transport layer
D. Application layer
A. an Ethernet frame
B. a TCP segment
C. an IP datagram
D. an Ethernet packets
A. TCP/IP
B. NCP
C. UDP
D. ACM
17) UDP uses …….. to handle outgoing user datagrams from multiple
processes on one host.
A. flow control
B. multiplexing
C. demultiplexing
D. data control
A. TCP
B. UDP
C. IP
D. ARP
A. flow control
B. multiplexing
C. demultiplexing
D. data control
20) In the sending computer, UDP receives a data unit from the ……… layer.
A. application
B. transport
C. IP
D. interface
ANSWERS:
1) A. port
2) B. BOOTP
7) C. connectionless, unreliable
8) A. lease
9) B. process to process
10) B. BOOTP
15) C. an IP datagram
16) A. TCP/IP
17) B. multiplexing
18) A. TCP
19) C. demultiplexing
20) A. application
1. The …….. layer links the network support layers and the user support
layers.
A. transport
B. network
C. data link
D. session
A. physical
B. data link
C. transport
D. network
A. transport
B. network
C. data link
D. physical
A. remote log-in.
C. mail service
A. transport
B. network
C. data link
D. session
A. physical
B. data link
C. network
D. transport
A. transport
B. network
C. data link
D. physical
8) Mail services are available to network users through the ………. layer.
A. data link
B. physical
C. transport
D. application
A. transport
B. network
C. session
D. physical
10) The ………. layer lies between the network layer and the application layer.
A. physical
B. data link
C. transport
D. session
Table of
Contents
READ ALSO: SOLVED MCQ ON APPLICATION LAYER IN OSI/TCP/IP MODEL
A. transport
B. network
C. data link
D. presentation
A. physical
B. network
C. transport
D. application
A. session
B. application
C. data link
D. physical
A. data link
B. physical
C. network
D. transport
15) The ………… layer is responsible for moving frames from one node to the
next.
A. physical
B. data link
C. transport
D. session
16) The routing processor of a router performs the …….. layer functions of the
router.
B. network
C. transport
D. session
17) The …………. layer adds a header to the packet coming from the upper
layer that includes the logical address of the sender and receiver.
A. physical
B. data link
C. network
D. transport
A. physical
B. data link
C. network
D. transport
19) The ………..layer is responsible for the delivery of a message from one
process to another.
A. physical
B. transport
C. network
D. session
20) The data link layer takes the packet it gets from the network layer and
encapsulates them into ……
A. cells
B. frames
C. packet
D. trailer
ANSWERS:
1) A. transport
2) A. physical
3) D. physical
5) B. network
6) A. physical
7) A. transport
8) D. application
9) C. session
10) C. transport
11) D. presentation
12) A. physical
13) B. application
14) B. physical
16) B. network
17) C. network
18) A. physical
19) B. transport
20) B. frames
A. Recursive queries
B. Iterative queries
C. Reverse queries
D. Inverse queries
2) For each resolved query, the DNS resolver caches the returned information
for a time that is specified in each resource record in the DNS response. This
is known as ………
A. Positive caching
B. Time To Live
C. Negative Caching
D. Reverse Caching
A. Positive caching
B. Time To Live
C. Negative Caching
4) …………… can reduce response times for names that DNS cannot resolve
for both the DNS client and DNS servers during an iterative query process.
A. Positive caching
B. Time To Live
C. Negative Caching
A. Time To Cache
B. Time To Live
D. Time To Save
6) Which of the following issues arises, when multiple resource records for the
same resource record type exist.
A. For the DNS server, how to order the resource records in the DNS Name
Query Response message.
B. For the DNS client, how to choose a specific resource record in the DNS
Name Query Response message.
7) To address the issues arises when multiple resource records for the same
resource record type exist, RFC 1794 describes a mechanism named
…………….. to share and distribute loads for network resources.
A. Positive caching
B. Time To Live
C. Negative Caching
8) A ………… gets the data for its zones from locally stored and maintained
files.
9) A …………. gets the data for its zones across the network from another
name server.
10) The process of obtaining zone information across the network is referred
to as a ………
A. zone obtaining
B. zone transfer
C. zone information
D. zone extracting
11) Which of the following is/are the reasons to have secondary name servers
within an enterprise network.
A. Redundancy
B. Remote locations
C. Load distribution
12) The source of the zone information for a secondary name server is
referred to as a ……….
A. Name server
13) In ………. , when a name server receives a DNS query that it cannot
resolve through its own zone files, it sends a recursive query to its forwarder.
A. exclusive mode
B. non-exclusive mode
C. caching mode
D. zonal mode
14) Which of the following is not the work done by a name server using a
forwarder in exclusive mode, when attempting to resolve a name.
A. exclusive mode
B. non-exclusive mode
C. caching mode
D. zonal mode
16) Name servers in ……….. make no attempt to resolve the query on their
own if the forwarder is unable to satisfy the request.
A. exclusive mode
B. non-exclusive mode
C. caching mode
D. zonal mode
17) ……….. are DNS servers that only perform queries, cache the answers,
and return the results.
A. SOA records
B. A records
C. MX records
D. NS records
A. SRV
B. MX
C. PTR
D. NS
A. SRV
B. MX
C. PTR
D. NS
Table of
Contents
ANSWERS:
1) C. Reverse queries
2) A. Positive caching
3) C. Negative Caching
4) C. Negative Caching
5) B. Time To Live
14) D. Attempts to resolve the name through iterative queries to other DNS
servers.
18) D. NS records
19) B. MX
20) A. SRV
A. content-type
B. content-transfer-encoding
C. content-description
D. content-id
A. RFC 1939
B. RFC 0937
C. RFC 2821
D. RFC 2822
A. SMTP
B. MIME
C. POP
D. TCP
A. USER
B. PASS
C. APOP
D. AUTH
A. STAT
B. LIST
C. RETR
D. DELE
6) A MIME compliant message must contain a header field with the ……..
verbatim text.
A. MIME-version:1.0
B. MIME-version:1.1
C. MIME-version:2.0
D. MIME-version:2.1
A. hierarchical
B. sequential
C. flat
D. addressed
A. hierarchical
B. sequential
C. flat
D. addressed
9) The ……… protocol defines a set of messages sent over either User
Datagram Protocol(UDP) port53 or Transmission Control Protocol(TCP)
port53.
A. Name space
B. DNS
C. Domain space
D. Zone transfer
10) Primary specifications for DNS are defined in which of the following
Request for Comments(RFCs)?
A. 974
B. 1034
C. 1035
11) Which of the following is/are the components of DNS defined by RFC
1034?
B. Name servers
C. Resolvers
12) ………… are records in the DNS database that can be used to configure
the DNS database server or to contain information of different types of
process client queries.
A. Domain namespace
B. Resource records
C. Name servers
D. Resolvers
13) ……….. store resource records and information about the domain tree
structure and attempt to resolve received client queries.
A. Domain namespace
B. DNS Names
C. Name servers
D. Resolvers
14) ………… are programs that run on DNS clients and DNS servers and that
create queries to extract information from name servers.
A. Domain namespace
B. Resource records
C. Name servers
D. Resolvers
15) ……….. have a very specific structure, which identifies the location of the
name in the DNS namespace.
A. Domain namespace
B. DNS Names
C. Name servers
D. Resolvers
16) A ………………. is a DNS domain name that has been constructed from
its location relative to the root of the namespace is known as the root domain.
17) State whether the following statements are True or False for the attributes
of Fully Qualified Domain Name(FQDN).
iii) The entire FQDN can not be no more than 255 characters long.
A. Subdomain
B. Zone
C. Sub DNS
D. Sub zone
19) In a/an ……….. of DNS resolver, the queried name server is requested to
respond with the requested data or with an error stating that data of the
requested type or the specified domain name does not exist.
A. Recursive queries
B. Iterative queries
c. Reverse queries
D. Inverse queries
20) In MIME header field, ……… is a plain text description of the object within
the body, which is useful when the object is not human-readable.
A. content-type
B. content-transfer-encoding
C. content-description
D.content-id
Table of
Contents
ANSWERS:
1) D. content-id
2) A. RFC 1939
3) C. POP
4) D. AUTH
5) A. STAT
6) A. MIME-version:1.0
7) C. flat
8) C. flat
9) B. DNS
14) D. Resolvers
18) B. Zone
20) C. content-description
A. Electronic mail
C. USENET
A. session layer
B. presentation layer
C. application layer
A. SMTP
B. TCP
C. IP
D. SCTP
A. 110
B. 25
C. 50
D. 20
A. Reply-to
B. Return-path
C. Subject
D. From
6) In SMTP herder field, ………. is added by the final transport system that
deilvers the mail.
A. Reply-to
B. Return-path
C. Subject
D. From
8) In SMTP mail transaction flow, ………. is sent, to which the receiver will
identify itself by sending back its domain name.
A. HELO
B. MAIL FROM
C. RCPT TO
D. DATA
A. Recieivemail
B. Sendmail
C. MIME
D. POP
11) The ………… is the interface through which a user can read and send
mail.
12) The ………… acts like a mail router, accepting messages from both MTAs
and MUAs.
13) ………. uses a queuing system to manage inbound and outbound mail.
A. Recieivemail
B. Sendmail
C. MIME
D. POP
14) The sender SMTP establishes a TCP connection with the destination
SMTP and then waits for the server to send a …… service ready message.
A. 421
B. 320
C. 220
D. 120
15) ………… is limited to 7-bit ASCII text, with a maximum line length of 1000
characters.
A. SMTP
B. MIME
C. POP
D. MTA
16) A ……….. message is one which can be routed through any number of
networks that are loosely compliant with RFC2821 or are capable of
transmitting RFC2821 messages.
A. SMTP
B. MIME
C. POP
D. MTA
A. 5
B. 7
C. 9
D. 4
18) In MIME header field, ……… describes how the object within the body is
to be interpreted.
A. content-type
B. content-transfer-encoding
C. content-description
D. content-id
19) In MIME header field, ………… describes how the object within the body
was encoded in order that it be included in the message using a mail-safe
form.
A. content-type
B. content-transfer-encoding
C. content-description
D. content-id
20) In a/an ………… of DNS resolver, the queried name server can return the
best answer it currently has back to the DNS resolver.
A. Recursive queries
B. Iterative queries
c. Reverse queries
D. Inverse queries
Table of
Contents
ANSWERS:
2) C. application layer
3) A. SMTP
4) B. 25
5) C. Subject
6) B. Return-path
8) A. HELO
9) B. Sendmail
13) B. Sendmail
14) C. 220
15) A. SMTP
16) B. MIME
17) B. 7
18) A. content-type
19) B. content-transfer-encoding
A. Physical layer
C. Network layer
D. Transport layer
A. Physical layer
C. Network layer
D. Transport layer
A. Network Layer
B. Transport Layer
C. Presentation Layer
D. Application Layer
4) The hardware and/or software within the transport layer which does the
work of making use of the services provided by the network layer is called as
………
A. transport media
B. transport device
C. transport entity
D. network transporter
5) ………. measures the number of bytes of user data transferred per second,
measured over some time interval. It is measured separately for each
direction.
A. Throughput
B. Transit delay
C. Protection
D. Resilience
6) ………… is the time between a message being sent by the transport user
on the source machine and its being received by the transport user on the
destination machine.
A. Throughput
B. Transit delay
C. Protection
D. Resilience
B. Transit delay
C. Protection delay
D. Priority delay
Table of
Contents
READ ALSO: OBJECTIVE QUESTIONS ON APPLICATION LAYER IN OSI/
TCP/IP MODEL
9) …….. are designed for the protocols like ICMP or OSPF, because these
protocols do not use either stream packets or datagram sockets.
A. Berkeley sockets
B. Stream sockets
C. Datagram sockets
D. Raw sockets
A. Berkeley socket
B. Stream socket
C. Datagram socket
D. Raw socket
A. Berkeley socket
B. Stream socket
C. Datagram socket
D. Raw socket
12) ………… is used to implement the transport layer services between the
two transport entities.
A. Transport service
B. Transport protocol
C. Transport address
D. Transport control
A. Error control
B. Sequencing
C. Flow control
14) The internet uses universal port numbers for services and these numbers
are called as …….
15) In the internet model, the client program defines itself with a port number
that is chosen randomly. This number is called…….
16) The port numbers ……….. are known as well known ports and they are
reserved for standard circuits.
A. below 1024
B. above 1024
C. below 2048
D. below 512
17) In the TCP segment header, ………. is a 32-bit number identifying the
current position of the first data byte in the segment within the entire byte
stream for the TCP connection.
A. serial number
B. current number
C. sequence number
D. acknowledgement number
18) In the TCP segment header, ………. is a 32-bit number identifying the next
data byte the sender expects from the receiver.
A. serial number
B. current number
C. sequence number
D. acknowledgment number
A. socket
B. handler
C. requester
D. protocol
A. Congestion
B. Checksum
C. Pseudosum
D. Headersum
ANSWERS:
1) D. Transport layer
2) D. Transport layer
3) B. Transport Layer
4) C. transport entity
5) A. Throughput
6) B. Transit delay
9) D. Raw sockets
19) A. socket
20) B. Checksum
A. physical layer
C. network layer
D. transport layer
A. routing
B. inter-networking
C. internal organization
D. congestion control
A. Static or Non-adaptive
B. Static or adaptive
C. Dynamic or Non-adaptive
D. Dynamic or adaptive
A. Static or Non-adaptive
B. Static or adaptive
C. Dynamic or Non-adaptive
D. Dynamic or adaptive
B. Flooding
D. Hierarchical Routing
B. Flooding
D. Hierarchical Routing
A. class A
B. class C
C. class B
D. class D
Table of
Contents
READ ALSO: SOLVED MCQ ON NETWORK LAYER IN COMPUTER
NETWORKS
8) In ………., the routers are divided into regions. Each router knows all
details about how to route packets to destinations within its own region.
D. Hierarchical Routing
9) In ………., each node uses as its fundamental data a map of the network in
the form of a graph.
D. Hierarchical Routing
10) ……… protocols are simple and efficient in small networks and require
little if any management.
D. Hierarchical Routing
11) In ……….. routing algorithm, each router knows all details about how to
route packets to destinations within its own region. But does not have any
idea about the internal structure of other regions.
D. Hierarchical Routing
12) The set of optimal routers from source to a given destination from a tree
rooted at the destination called a …….. tree.
A. sink
B. optimal
C. rooted
D. routing
A. Identification
B. Protocol
C. Checksum
D. Time-to-Live(TTL)
A. Identification
B. Protocol
C. Checksum
D. Time-to-Live(TTL)
A. Identification
B. Protocol
C. Checksum
D. Time-to-Live(TTL)
16) The IPV4 address of the intermediate or final destination of the IPV4
packet is called …….
A. Source IP Address
B. Destination IP Address
C. Identification
D. Checksum
17) ………. type of IPV4 address is assigned to all network interfaces located
on a subnet, used for one-to-everyone on a subnet communication.
A. Unicast
B. Multicast
C. Broadcast
D. Anycast
18) The ……… header field of IPV6 indicates the number of likes on which the
packet is allowed to travel before being discarded by a router.
A. Source Address
B. Destination Address
C. Next Header
D. Hop Limit
19) ……… is an identifier for either the IPV6 extension header immediately
following the IPV6 header or an upper-layer protocol, such as ICMPv6, TCP or
UDP.
A. Source Address
B. Destination Address
C. Next Header
D. Hop Limit
20) The internet addresses are ……… bits in length in IPV4 addressing
scheme.
A. 16
B. 64
C. 32
D. 48
ANSWERS:
1) C. network layer
2) A. routing
3) A. Static or Non-adaptive
4) D. Dynamic or adaptive
5) B. Flooding
7) C. class B
8) D. Hierarchical Routing
9) B. Link-state Routing
12) A. sink
13) C. Checksum
14) D. Time-to-Live(TTL)
15) B. Protocol
17) C. Broadcast
20) C. 32
A. Data Link
B. Physical
C. Network
D. Session
2) The service primitives provide a way for the data link layer on the
requesting side to learn whether the request was successfully carried out.
A. Request
B. Indication
C. Response
D. Confirm
3) The different types of services provided by the data link layer is/are …
4) ………. is used by the network layer to ask the data link layer to do
something.
A. Request
B. Indication
C. Response
D. Confirm
6) ……….. is the most sophisticated service provided by the data link layer to
the network layer. The source and destination machines establish a
connection before any data transfer takes place.
7) In ………. , there are still no connections used, but each frame sent is
individually acknowledged.
8) ……… is used to indicate to the network layer that an event has happened,
for example, establishment or release of a connection.
A. Request
B. Indication
C. Response
D. Confirm
A. Request
B. Indication
C. Response
D. Confirm
10) In ………. we are looking only to see if any error has occurred. The answer
is a simple yes or no.
A. error searching
B. error detection
C. error correction
D. error transmission
11) In ……….. we need to know the exact number of bits that are corrected
and more importantly, their location in the message.
A. error searching
B. error detection
C. error correction
D. error transmission
12) ………… is the process in which the receiver tries to guess the message
by using redundant bits.
C. Transmission
D. Retransmission
13) ……….. is the technique in which the receiver detects the occurrence of
an error and asks the sender to resend the message.
C. Transmission
D. Retransmission
14) In block coding, we divide our message into blocks, each of k bits, called
……..
A. Dataword
B. Generator
C. Codeword
D. Checker
15) ………… in the data link layer separates a message from one source to a
destination, or from other messages to other destinations, by adding a sender
address and a destination address.
A. Transforming
B. Framing
C. Separating
D. Messaging
16) In …………., there is no need for defining the boundaries of the frames;
the size itself can be used a delimiter.
17) ………… is prevalent in LANs, we need a way to define the end of the
frame and the beginning of the next.
18) Which of the following is/are the methods used for carrying out framing.
A. Character count
19) In …………., the sender sends one frame, stops until it receives
confirmation from the receiver, and then sends the next frame.
B. simplest protocol
20) In ……… , the sliding window is an abstract concept that defines the
range of sequence numbers that is the concern of the sender and receiver.
B. simplest protocol
Answers:
1) A. Data Link
2) D. Confirm
4) A. Request
8) B. Indication
9) B. Indication
13) D. Retransmission
14) A. Dataword
15) B. Framing
www.jobstron.com/
• 1. Where is a hub specified in the OSI model?
•
Answer: B
Explanation : Hubs regenerate electrical signals, which are specified at
the Physical layer.
• 1 points
2. Acknowledgements, sequencing, and flow control are characteristics
of which OSI layer?
• A ) Layer 2
• B ) Layer 3
• C ) Layer 4
• D ) Layer 7
•
Answer : C
• 1 points
3. What is the main reason the OSI model was created?
• A ) To create a layered model larger than the DoD mode
•
Answer : C
Explanation : The primary reason the OSI model was created was so that
different networks could inter-operate.
• 1 points
4. Which protocol does Ping use?
• A ) TCP
• B ) ARP
• C ) ICMP
• D ) BootP
•
Answer : C
Explanation : ICMP is the protocol at the Network layer that is used to
send echo requests and replies.
• 1 points
5. What does a VLAN do?
•
Answer : C
Explanation : VLANs break up broadcast domains at layer 2.
• 1 points
6. Which of the following protocols uses both TCP and UDP?
• A ) FTP
• B ) SMTP
• C ) Telnet
• D ) DNS
•
Answer : D
• 1 points
7. Which layer 4 protocol is used for a Telnet connection?
• A ) IP
• B ) TCP
• C ) TCP/IP
• D ) UDP
•
Answer : B
• 1 points
8. Which of the following is private IP address?
• A ) 12.0.0.1
• B ) 168.172.19.39
• C ) 172.15.14.36
• D ) 192.168.24.43
•
Answer : D
• 1 points
9. What layer in the TCP/IP stack is equivalent to the Transport layer of
the OSI model?
• A ) Application
• B ) Host-to-Host
• C ) Internet
•
Answer : B
• 1 points
10. Which class of IP address has the most host addresses available by
default?
• A ) A
• B ) B
• C ) C
•
Answer : A
Explanation : Class A addressing provides 24 bits for host addressing.
• 1 points
11. Which class of IP address provides a maximum of only 254 host
addresses per network ID?
• A ) Class A
• B ) Class B
• C ) Class C
• D ) Class D
•
Answer : C
Explanation : A Class C network address has only 8 bits for defining
hosts.
• 1 points
12. How many broadcast domains are created when you segment a
network with a 12-port switch?
• A ) 1
• B ) 2
• C ) 5
• D ) 12
•
Answer : A
Explanation : By default, switches break up collision domains but are one
large broadcast domain
• 1 points
13. If you use either Telnet or FTP, which is the highest layer you are
using to transmit data?
• A ) Application
• B ) Presentation
• C ) Session
• D ) Transport
•
Answer : A
Explanation : Both FTP and Telnet use TCP both are Application layer
protocols.
• 1 points
14. Which of the following allows a router to respond to an ARP request
that is intended for a remote host?
• A ) Gateway DP
•
Answer : C
Explanation : Proxy ARP can help machines on a subnet to reach remote
subnets without configuring routing or a default gateway.
• 1 points
15. What is a stub network?
• B ) A network with more than one exit and entry point
• C ) A network with only one entry and no exit point
• D ) A network that has only one entry and exit point
•
Answer : D
• 1 points
16. Which of the following is the decimal and hexadecimal equivalents of
the binary number 10011101?
•
Answer : B
• 1 points
17. How often are BPDUs sent from a layer 2 device?
• A ) Never
•
Answer : B
Explanation : Every 2 seconds, BPDUs are sent out from all active bridge
ports by default.
• 1 points
18. How long is an IPv6 address?
•
Answer : D
Explanation : An IPv6 address is 128 bits long.
• 1 points
19. Which protocol is used to send a destination network unknown
message back to originating hosts?
• A ) TCP
• B ) ARP
• C ) ICMP
• D ) BootP
•
Answer : C
• 1 points
20. What protocol is used to find the hardware address of a local device?
• A ) RARP
• B ) ARP
• C ) IP
• D ) ICMP
•
Answer : B
Explanation : Address Resolution Protocol (ARP) is used to find the
hardware address from a known IP address.
• A ) 14
• B ) 15
• C ) 16
• D ) 30
•
Answer : D
Explanation : This provides 8 subnets, each with 30 hosts.The number of
host bits would never change.
• 1 points
2. What is route poisoning?
• A ) It sends back the protocol received from a router as a poison
pill, which stops the regular updates
• D ) It describes when a router sets the metric for a downed link
to infinity
•
Answer : D
Explanation : Another way to avoid problems caused by inconsistent
updates and to stop network loops is route poisoning.
• 1 points
3. Which switching technology reduces the size of a broadcast domain?
• A ) ISL
• B ) 802.1Q
• C ) VLANs
• D ) STP
•
Answer : C
Explanation : Virtual LANs break up broadcast domains in layer 2
switched internetworks.
• 1 points
4. When a router is connected to a Frame Relay WAN link using a serial
DTE interface, how is the clock rate determined?
•
Answer : A
• 1 points
5. You need to subnet a network that has 5 subnets, each with at least
16 hosts. Which classful subnet mask would you use?
• A ) 255.255.255.192
• B ) 255.255.255.224
• C ) 255.255.255.240
• D ) 255.255.255.248
•
Answer : B
Explanation : You need 5 subnets, each with at least 16 hosts.The mask
255.255.255.224 provides 8 subnets, each with 30 hosts. This is the best
answer.
• 1 points
6. If an Ethernet port on a router were assigned an IP address of
172.16.112.1/25, what would be the valid subnet address of this host?
• A ) 172.16.112.0
• B ) 172.16.0.0
• C ) 172.16.96.0
• D ) 172.16.255.0
•
Answer : A
• 1 points
7. When setting up Frame Relay for point-to-point subinterfaces, which
of the following must not be configured?
•
Answer : C
• 1 points
8. When data is encapsulated, which is the correct order?
•
Answer : C
Explanation : The encapsulation method is data, segment, packet, frame,
bit
• 1 points
9. Segmentation of a data stream happens at which layer of the OSI
model?
• A ) Physical
• C ) Network
• D ) Transport
•
Answer : D
Explanation : The Transport layer receives large data streams from the
upper layers and breaks these up into smaller pieces called segments
• 1 points
10. In which of the following technologies is the term HFC used?
• A ) DSL
• B ) PPPoE
• D ) Dedicated T1
•
Answer : D
Explanation : In a modern network, hybrid fibre-coaxial (HFC) is a
telecommunications industry term for a network that incorporates both
optical fiber and coaxial cable to create a broadband network
• 1 points
11. On a VLSM network, which mask should you use on point-to-point
WAN links in order to reduce the waste of IP addresses?
• A ) /27
• B ) /28
• C ) /29
• D ) /30
•
Answer : D
Explanation : A point-to-point link uses only two hosts. A /30, or
255.255.255.252, mask provides two hosts per subnet.
• 1 points
12. To test the IP stack on your local host, which IP address would you
ping?
• A ) 127.0.0.0
• B ) 1.0.0.127
• C ) 127.0.0.1
• D ) 127.0.0.255
•
Answer : C
Explanation : To test the local stack on your host, ping the loopback
interface of 127.0.0.1
• 1 points
13. What is the subnetwork number of a host with an IP address of
172.16.66.0/21?
• A ) 172.16.36.0
• B ) 172.16.48.0
• C ) 172.16.64.0
• D ) 172.16.0.0
•
Answer : C
• 1 points
14. What is the subnetwork address for a host with the IP address
200.10.5.68/28?
• A ) 200.10.5.56
• B ) 200.10.5.32
• C ) 200.10.5.64
• D ) 200.10.5.0
•
Answer : C
• 1 points
15. What type of RJ45 UTP cable is used between switches?
• A ) Straight-through
•
Answer : B
• 1 points
16. Which of the following is true regarding VLANs?
• A ) You must have at least two VLANs defined in every Cisco
switched network
• C ) You should not have more than 10 switches in the same VTP
domain
•
Answer : D
Explanation : Switches do not propagate VLAN information by default;
you must configure the VTP domain.
• 1 points
17. Which of the following is true regarding RIPv2?
•
Answer : C
Explanation : RIPv2 is pretty much just like RIPv1.
• 1 points
18. Which protocol reduces administrative overhead in a switched
network by allowing the configuration of a new VLAN to be distributed to
all the switches in a domain?
• A ) STP
• B ) VTP
• C ) DHCP
• D ) ISL
•
Answer : B
Explanation : Virtual Trunk Protocol (VTP) is used to pass a VLAN
database to any or all switches in the switched network.
• 1 points
19. Which of the following protocols uses both TCP and UDP?
• A ) FTP
• B ) SMTP
• C ) Telnet
• D ) DNS
•
Answer : D
Explanation : DNS uses TCP for zone exchanges between servers and
UDP when a client is trying to resolve a hostname to an IP address.
• 1 points
20. Which of the following is true regarding VTP?
•
Answer : A
• 1. Frames from one LAN can be transmitted to another LAN via the
device
• A ) Router
• B ) Bridge
• C ) Repeater
• D ) Modem
•
Answer : B
• 1 points
2. Which of the following device is used to connect two systems,
especially if the systems use different protocols?
• A ) Hub
• B ) Bridge
• C ) Gateway
• D ) Repeater
•
Answer : C
• 1 points
3. To connect a computer with a device in the same room, you might be
likely to use
•
Answer : A
• 1 points
4. How many hosts are attached to each of the local area networks at
your site?
• A ) 128
• B ) 254
• C ) 256
• D ) 64
•
Answer : B
• 1 points
5. Internet-like networks within an enterprise.
• A ) Intranets
• D ) Extranets
•
Answer : A
• 1 points
6. Which of the following is used for modulation and demodulation?
• A ) Modem
• B ) Protocols
• C ) Gateway
• D ) Multiplexer
•
Answer : A
• 1 points
7. What is the frequency range of the IEEE 802.11b standard?
• A ) 2.4Gbps
• B ) 5Gbps
• C ) 2.4GHz
• D ) 5GHz
•
Answer : C
Explanation : The IEEE 802.11b and IEEE 802.11g standards both run in
the 2.4GHz RF range.
• 1 points
8. The packets switching concept was first proposed
• B ) In the early 1960s for military communication systems, mainly
to handle speech
•
Answer : B
• 1 points
9. A distributed network configuration in which all data/information pass
through a central computer is
•
Answer : B
• 1 points
10. Which of the following does not allow multiple users or devices to
share one communications line?
• A ) Doubleplexer
• B ) Multipplexer
• C ) Concentrator
• D ) Controller
•
Answer : A
• 1 points
11. In CRC there is no error if the remainder at the receiver is _____.
• B ) Zero
• C ) Nonzero
•
Answer : B
• 1 points
12. The slowest transmission speeds are those of
• D ) Microwaves
•
Answer : A
• 1 points
13. What is the frequency range of the IEEE 802.11a standard?
• A ) 2.4Gbps
• B ) 5Gbps
• C ) 2.4GHz
• D ) 5GHz
•
Answer : D
Explanation : The IEEE 802.11a standard runs in the 5GHz RF range
• 1 points
14. What device separates a single network into two segments but lets
the two segments appear as one to higher protocols?
• A ) Switch
• B ) Bridge
• C ) Gateway
• D ) Router
•
Answer : B
• 1 points
15. What is the maximum data rate for the 802.11a standard?
• A ) 6Mbps
• B ) 11Mbps
• C ) 22Mbps
• D ) 54Mbps
•
Answer : D
Explanation : The IEEE 802.11a standard provides a maximum data rate
of up to 54Mbps.
• 1 points
16. How many non-overlapping channels are available with 802.11b?
• A ) 3
• B ) 12
• C ) 23
• D ) 40
•
Answer : A
Explanation : The IEEE 802.11b standard provides 3 non-overlapping
channels
• 1 points
17. How many non-overlapping channels are available with 802.11a?
• A ) 3
• B ) 12
• C ) 23
• D ) 40
•
Answer : B
Explanation : The IEEE 802.11a standard provides up to 12 non-
overlapping channels.
• 1 points
18. What is the maximum distance with maximum data rate for 802.11g?
•
Answer : B
• 1 points
19. What is the maximum distance with maximum data rate for 802.11b?
•
Answer : C
Explanation : The IEEE 802.11b standard provides a maximum data rate
of up to only 11Mbps and you can be around 150 feet.
• 1 points
20. How many non-overlapping channels are available with 802.11h?
• A ) 3
• B ) 12
• C ) 23
• D ) 40
•
Answer : C
•
Answer : A
• 1 points
2. Number of bits per symbol used in Baudot code is
• A ) 7
• B ) 5
• C ) 8
• D ) 9
•
Answer : B
• 1 points
3. Which of the following communication modes support two-way traffic
but in only one direction at a time?
• A ) Simplex
•
Answer : B
• 1 points
4. Which of the following is considered a broad band communication
channel?
•
Answer : D
• 1 points
5. In _____ topology, if a computer’s network cable is broken, whole
network goes down
• A ) Ring
• B ) Bus
• C ) Star
•
Answer : A
• 1 points
6. Which of the following signal is not standard RS-232-C signal?
• A ) VDR
• B ) RTS
• C ) CTS
• D ) DSR
•
Answer : A
• 1 points
7. Which processes does TCP, but not UDP, use?
• A ) Windowing
• B ) Acknowledgements
•
Answer : B
• 1 points
8. Network cable lies on _____ layer
• A ) Application
• B ) Network
• C ) Physical
• D ) Transport
•
Answer : C
• 1 points
9. You are working with graphic translations. Which layer of the
OSI model is responsible for code formatting and conversion and graphic
standards
•
Answer : D
• 1 points
10. Which of the following is required to communicate between two
computers?
• B ) Protocol
•
Answer : D
• 1 points
11. The process of converting analog signals into digital signals so they
can be processed by a receiving computer is referred to as
• A ) Modulation
• B ) Demodulation
• C ) Synchronizing
• D ) Digitising
•
Answer : D
• 1 points
12. What is the minimum number of wires needed to send data over a
serial communication link layer?
• A ) 1
• B ) 2
• C ) 4
• D ) 6
•
Answer : B
• 1 points
13. what is the propagation time if the distance between the 2 points is
12000km? Assume the propagation speed to be 2.4× m/s
• A ) 0.05s
• C ) 2sec
• D ) 100msec
•
Answer : A
• 1 points
14. If a computer on the network shares resources for others to use, it is
called ____
• A ) Server
• B ) Client
• C ) Mainframe
• D ) Minicomputer
•
Answer : A
• 1 points
15. Print server uses ________ which is a buffer that holds data before it
is send to the printer.
• A ) Queue
• B ) Spool
• C ) Node
•
Answer : B
• 1 points
16. A network with BW of 10 Mbps can pass only an average of 12000
frames per min. with each frame carrying an average of 10000 bits. What
is the throughput of this network
• A ) 5Mbps
• B ) 10Mbps
• C ) 2Mbps
• D ) 100Mbps
•
Answer : C
• 1 points
17. SMTP is a protocol used in
• A ) Application
• B ) Network
• C ) Physical
• D ) Transport
•
Answer : C
• 1 points
18. Expand ARPANET
•
Answer : D
• 1 points
19. Terminators are used in ______ topology.
• A ) Bus
• B ) Star
• C ) Ring
•
Answer : A
• 1 points
20. For large networks, _______ topology is used
• A ) Bus
• B ) Ring
• C ) Star
• D ) Mesh
•
Answer : C
• A ) Bluetooth
• B ) Blacktooth
• C ) Baseband
• D ) Broadband
•
Answer : A
• 1 points
2. Most Web-enabled devices follow a standard known as
• A ) FireWire
• B ) Bluetooth
• C ) TCP/IP
• D ) Wi-Fi
•
Answer : D
• 1 points
3. The rules for exchanging data between computers are called
• A ) Interconnections
• C ) Protocols
•
Answer : C
• 1 points
4. The capacity of a communication channel is measured in
• A ) Bandwidth
•
Answer : A
• 1 points
5. A credit card-sized expansion board that is inserted into portable
computers that connects the modem to the telephone wall jack is the
________.
•
Answer : C
• 1 points
6. A(n) ________ protects an organization’s network from outside attack
• A ) Fortress
• B ) Extranet
• C ) Proxy
• D ) Firewall
•
Answer : D
• 1 points
7. Bluetooth is a type of radio wave information transmission system that
is good for about
•
Answer : A
• 1 points
8. The telephone is an example of a(n) ________ signal.
• A ) Analog
• B ) Digital
• C ) Modulated
• D ) Demodulated
•
Answer : A
• 1 points
9. If the nodes can serve as both servers and clients, the network is said
to be
• A ) Hybrid
• B ) Terminal
• C ) Peer-to-peer
•
Answer : C
• 1 points
10. The standard protocol for the Internet is
• A ) TCP
• D ) TCP/IP
•
Answer : D
• 1 points
11. Any device that is connected to a network is called a
• A ) Client
• B ) Node
• C ) Server
• D ) Manager
•
Answer : B
• 1 points
12. The systems developed to automatically translate text-based
addresses to numeric IP addresses is called
• A ) DSL
• B ) DNS
• C ) SNL
• D ) SDN
•
Answer : B
• 1 points
13. The acronym NOS refers to the
•
Answer : C
• 1 points
14. The greatest capacity for data transmission happens in ________
devices
• A ) Voiceband
• C ) Broadband
• D ) Mega-band
•
Answer : C
• 1 points
15. A network ________ describes how a computer network is configured
and what strategies are employed
• A ) Protocol
• B ) NOS
• C ) Architecture
• D ) Connection
•
Answer : C
• 1 points
16. The arrangement of the computers in a network is called the
• A ) NOS
• B ) Topology
• D ) Protocol
•
Answer : B
• 1 points
17. Voiceband ________
•
Answer : B
• 1 points
18. The most common network strategies are ________
•
Answer : A
• 1 points
19. A small network setup in your home is called a
•
Answer : D
• 1 points
20. ________ is the process of breaking down information sent or
transmitted across the Internet into small parts called packets
• A ) Protocol
• B ) Bandwidth
• C ) Reformatting
• D ) Identification
•
Answer : C
https://t4tutorials.com
A. RCF
B. ID
C. RFC
D. Both A and B
E. None of these
When the information packet moves from the higher to lower layers in layer
hierarchy, headers are.
A. Removed
B. Rearranged
C. Modified
D. Added
E. None of these
A. Semantics
B. Struck
C. Syntax
D .Both A and B
A. Automatic
B. Simplex
C. Half-duplex
D. Full-duplex
E. None of these
A. ARPANET
B. CNNET
C. NSFNET
D. ASAPNET
E. None of these
________ physical path is used to travel massages form one place to another
A. Path
B. Protocol
C. Route
D. Medium
E. None of these
A. Switch
B. PC
C. Smartphones
D. Servers
E. None of these
A. Standards
B. RFCs
C. Protocols
D. None of these
E. Both A and B
A. Unipoint
B. Point to point
C. Multipoint
D. None of these
E. Both A and C
A. computer network
B. networking system
C. distributed system
D. Both A and B
D. None of these
E. Both A and B
A. overlay network
B. prior network
C. chief network
D. prime network
E. None of these
E. Both A and C
F. None of these
A. unicast network
B. multicast network
C. None of these
D. broadcast network
E. None of these
Bluetooth is an example of
D. Both A and B
E. none of these
A. Router
B. Bridge
C. Firewall
D. Hub
E. All of these
F. None of these
The number of protocols used by a system, one protocol per layer, is known
as
A. Protocol architecture
B. Protocol suite
C. Protocol stack
D. None of these
E. All of these
F. Both A and C
E. None of these
F. All of these
E. None of these
F. All of these
D. None of these
E. All of these
B. ISP
D. None of these
E. All of these
A. DSLAM
B. CMTS
C. CO
D. Splitter
E. All of these
F. None of these
HFC contains_______.
A. Fiber cable
B. Coaxial cable
D. None of these
Which of the following statement is not applicable for cable internet access?
B. It includes HFCs
A. PON
B. NON
C. AON
D. None of these
E. All of these
StarBand provides
A. Satellite access
C. Cable access
D. Telephone access
E. None of these
A. DSL
B. FTTP
C. Cable
D. All of these
E. None of these
A. Optical cable
C. HFC
D. None of these
E. All of these
Ans=A
A.6
B. 7
C. 5
D. None of these
E. All of these
Ans=C
How many layers are there in the ISO OSI reference model?
A. 5
B. 7
C. 6
D. 15
E. 9
F. None of these
This layer is associate degree addition to OSI model in comparison with the
Transmission control protocol Information science model
A. Application layer
B. Presentation layer
C. Session layer
E. None of these
A. NIC
B. Ethernet
C. End system
D. None of these
E. All of these
A. NIC
B. End system
C. Ethernet
D. None of these
E. All of these
A. Data compression
B. Data encryption
C. Data description
E. None of these
A. Application layer
B. Transport layer
C. Link-layer
D. Session layer
E. All of these
F. None of these
In the OSI model, when data is sent from device A to the device B, the 5th
layer to receive data at B is
A. Application layer
B. Session layer
C. Link-layer
D. Transport layer
E. All of these
F. None of these
A. Link layer
B. Transport layer
C. Application layer
D. Session layer
E. None of these
F. All of these
In the OSI model, as an information packet moves from the lower to the
higher layers, headers can
A. Added
B. Rearranged
C. Removed
D. None of these
E. All of these
E. All of These
A. 7
B. 5
C. 6
D. 4
E. 9
F.12
A. Application layer
B. Transport layer
C. Session layer
D. None of these
E. All of these
A. Transport layer
B. Datalink layer
C. Session layer
D. Network layer
E. All of these
F. None of these
B. Port address
C. Specific address
D. All of these
E. None of these
A. Simultaneous to
B. After
C. Prior to
D. None of these
E. All of these
A. Network layer
B. Session layer
C. Transport layer
D. Datalink layer
E. All of these
F. None of these
A. physical address
B. port address
C. logical address
D. specific address
E. None of these
F. All of these
A. Presentation layer
B. Session layer
C. Application layer
D. None of these
E. All of these
ANS=C
A. Network layer
B. Transport layer
C. Datalink layer
D. Physical layer
E. None of these
F. All of these
A. Coaxial cable
C. Optical fiber
D. Electrical cable
E. All of these
F. None of these
Ans=C
Which type of modulation is used to send data over guided and unguided
media as an analog signal?
A. Frequency modulation
B. Amplitude modulation
C. Digital modulation
D. Phase modulation
E. All of these
F. None of these
The portion of the physical layer that interfaces with the media access
management sub-layer are known as.
D. All of these
E. None of these
Ans=A
D. All of these
E. Both A and B
F. None of these
B. Flow control
C. Both A and B
Ans =C
A. Line coding
B. Channel coding
C. Modulation
D. Both A and B
E. All of these
F. None of these
A. Application layer
B. Network layer
C. Transport layer
D. Datalink layer
E. Both A and B
F. None of these
A. Multiplexing
B. Digital modulation
C. Analog modulation
D. Both A and B
E. All of these
F. None of these
A. Radio waves
B. Microwaves
C. Infrared
D. Both A and B
E. All of these
F. None of these
The data link layer is responsible for taking the packets from________ and
encapsulating them into frames for transmission.
A. Physical layer
B. Network layer
C. Transport layer
D. Application layer
E. All of these
F. None of these
A. framing
B. channel coding
C. flow control
D. error control
E. All of these
F. None of these
Which sub-layer of the information link layer performs circuit functions that
depend on the kind of medium?
D. Both A and B
E. All of these
F. None of these
A. Synchronization bytes
B. Addresses
C. Frame identifier
D. Both A and C
E. All of these
F. None of these
When two or more bits in information has been changed during the
transmission, the error is known as?
A. Random error
B. Inverted error
C. Burst error
D. Both A and B
E. All of these
F. None of these
E. All of these
F. None of these
A. Ethernet
C. HDLC
D. Both A and B
E. All of these
F. None of these
A. Bits
B. Frames
C. Packets
D. Both A and B
E. All of these
F. None of these
A. Routing
B. Inter-networking
C. Congestion control
D. Both A and C
E. All of these
F. None of these
Ans=F
A. Network address
B. Host address
C. Both A and B
D. All of these
F. None of these
D. A short VC number
E. Both A and B
F. None of these
D. Both A and C
E. All of these
F. None of these
Multi-destination routing
D. Both B and C
E. All of these
D. None of these
O //A subset of a network that includes all the routers but contains no loops is
called
a) spanning-tree
b) spider structure
c) spider tree
C// A subset of a network that includes all the routers but contains no loops is
called
A. Spider tree
B. Spider structure
C. Spanning tree
D. Both A and B
E. All of these
F. None of these
B. Admission control
C. Load shedding
D. Both A and C
E. All of these
F. None of these
A. Ethernet
C. Internet protocol
D. Both A and B
E. All of these
F. None of these
B. Addressing
C. Forwarding
D. Both B and C
E. All of these
F. None of these
Ans=A
A. Port
B. Pipe
C. Socket
D. Both A and B
E. All of these
F. None of these
A. sock
B. wins
C. Winsock
D. Both A and B
E. All of these
D. None of these
Which of the following is the TCP name of a transport service access point?
A. Node
B. Pipe
C. Port
D. Both A and C
E. All of these
F. None of these
D. Both A and C
E. All of these
D. None of these
A. Networking
B. Routing
C. Topology
D. Both A and C
E. All of these
F. None of these
A. Bus
B. Mesh
C. Ring
D. Star
E. All of these
F. None of these
A. Star
B. Bus
C. Ring
D. Mesh
E. All of these
F. None of these
A. WAN
B. LAN
C. MAN
D. Both A and B
E. All of these
D. None of these
A. session layer
B. application layer
E. All of these
F. None of these
A. Entire IP packet
B. IP payload
C. IP header
E. All of these
F. None of these
B. frame filter
E. All of these
F. None of these
A. ethernet
B. wi-fi
C. Bluetooth
E. All of these
F. Both A and B
A. browser security
B. FTP security
C. email security
E. All of these
F. Both A and B
A. Problems
B. Entities
C. Data
D. Problems
E. Translator
F. All of these
A. 820 bits
B. 160 bits
C. 512 bits
D. 628 bits
E. All of these
F. None of these
A. Message Sending
B. Message Confidentiality
C. Message Integrity
D. Message Splashing
E. All of these
F. None of these
A. Finger Print
B. Hash-Table
C. HashTag
D. HyperText
E. All of these
F. None of these
A. Shared-key system
B. Public-key system
C. All of them
D. All of these
E. None of these
E. All of these
F. None of these
A. Asymmetric-Key
B. Cipher Text
C. Cipher
D. Symmetric-Key
E. All of these
F. None of these
13: Both document and fingerprint are to preserve the integrity of a document
A. Needed
B. Unimportant
C. Not Used
D. Not needed
E. All of these
F. None of these
14: When data were sent arrive at receiver exactly as they, its called
A. Message Confidentiality
B. Message Sending
C. Message Integrity
D. Message Splashing
E. All of these
F. None of these
15: Which one is the correct according to the Message digest needs to be
A. kept secret
B. public
C. private
D. alone
E. All of these
F. None of these
A. High
B. Secret
C. Low
D. Constant 0
E. All of these
F. None of these
A. Nonrepudiation
B. Integrity
C. Confidentiality
D. Authentication
E. All of these
F. None of these
A. Conferencing
B. Sender Site
C. Site
D. Receiver site
E. All of these
F. None of these
A. Signals
B. Frequency
C. Phase
D. Amplitude
E. All of these
F. None of these
20: If the signal changes what is the effect of its frequency is:
A. Infinite
B. Zero
C. Maximum
D. All of these
E. None of these
www.javatpoint.com
1) Which of these is a standard interface for serial data transmission?
1. ASCII
2. RS232C
3. 2
4. Centronics
2) Which type of topology is best suited for large businesses which must
carefully control and coordinate the operation of distributed branch outlets?
1. Ring
2. Local area
3. Hierarchical
4. Star
Explanation: The star topology is the best network topology for large
businesses because it is simple to control and coordinate from the central
computer.
1. Simplex
2. Half Duplex
3. Full Duplex
4. Double Duplex
1. Encryption of data
2. To transmit faster
3. To detect errors
Explanation: The parity bit is also known as the check bit, and has a value of
0 or 1. It is used for error detection for blocks of data.
2. Optical fiber
3. Coaxial cable
4. Microwave
Explanation: The optical fiber is made of glass or plastic. In this cable, the
transmission of data occurs in the form of light rather than the electric current,
so this cable provides higher data transfer speed than other cables.
2. E-mail system
3. Mailing list
1. Protocol
2. URL
3. E-mail address
4. ICQ
2. acting as a backup
10) Which one of the following would breach the integrity of a system?
Explanation: None
1. Firewall
2. Gateway
3. Router
4. Virus checker
1. javat@point.com
2. gmail.com
3. tpoint@.com
4. javatpoint@books
For example, in this email address javat@point.com, "javat" is the prefix, and
"point.com" is the domain.
Explanation: None
14) Which one of the following is the most common internet protocol?
1. HTML
2. NetBEUI
3. TCP/IP
4. IPX/SPX
15) Software programs that allow you to legally copy files and give them away
at no cost are called which of the following?
1. Probe ware
2. Timeshare
3. Shareware
4. Public domain
1. Interface speed
3. Baud rate
4. Megabyte load
1. Star
2. Ring
3. Bus
4. Peer to Peer
1. 32
2. 1024
3. 65535
4. 512
Explanation: None
20) Which of the following statements could be valid with respect to the ICMP
(Internet Control Message Protocol)?
Answer: (b) A redirect message is used when a router notices that a packet
seems to have been routed wrongly.
Explanation: None
1. 255.243.240
2. 255.255.0.0
3. 255.255.0
4. 255.255.255
Explanation: This address belongs to class C, so 8 bits are reserved for the
host ID. 24 bits are reserved for network ID.
22) When the mail server sends mail to other mail servers it becomes ___ ?
1. SMTP client
2. SMTP server
3. Peer
4. Master
1. 32 bits
2. 64 bits
3. 128 bits
4. 256 bits
Explanation: An IPv6 address is 128 bits long, which has 2^128 address
space.
3. Repeaters
4. Analog Transmissions
5. Fiber optics
Explanation: None
1. 121.12.12.248
2. 130.12.12.248
3. 128.12.12.248
4. 129.12.12.248
1. 124.201.3.1.52
2. 01.200.128.123
3. 300.142.210.64
4. 10110011.32.16.8
5. 128.64.0.0
1. 0.0.0.0
2. 127.0.0.1
3. 255.255.255.255
4. 0.255.255.255
29) Which of the following cannot be used as a medium for 802.3 ethernet?
3. A microwave link
30) What IP address class allocates 8 bits for the host identification part?
1. Class A
2. Class B
3. Class C
4. Class D
Explanation: In class C only, 8 bits are reserved for the host ID, and 24 bits
are reserved for network ID.
Explanation: The term IANA stands for Internet Assigned Numbers Authority.
1. 6 version
2. 4 version
3. 2 version
4. 1 version
Explanation: There are only two IP versions are avilable in the present: IP
version 4 (IPv4) and IP version 6 (IPv6).
33) Which layer of the TCP / IP stack corresponds to the OSI model transport
layer?
1. Host to host
2. Application
3. Internet
4. Network Access
Explanation: The host to host layer conforms the transport layer of the OSI
model. This layer is responsible for the final correspondence and error-free
distribution of data.
34) An Aloha network uses an 18.2 kbps channel for sending message
packets of 100 bits long size. Calculate the maximum throughput.
1. 5999
2. 6900
3. 6027
4. 5027
= 1/2e * 3.276
= 0.6027
35) On a simplex data link, which of the following is a possible error recovery
technique?
36) Which of the statement is correct with regard to Time Division Multiplexing
(TDM) and its variants?
1. Statistical TDM makes efficient use of the bandwidth only if the arrival
pattern of the data stream is probabilistic.
Explanation: None
4. None of these
1. Library
2. Network
3. Grouping
4. Integrated system
Explanation: There are many ways to share data between two computers, but
a network connection is established before data sharing.
40) In specific, if the systems use separate protocols, which one of the
following devices is used to link two systems?
1. Repeater
2. Gateway
3. Bridge
4. Hub
41) How many digits of the Data Network Identification Code (DNIC) identify
the country?
1. first three
2. first four
3. first five
4. first six
Explanation: The first three digits of the Data Network Identification Code
(DNIC) is identify the country (first digit to identify a zone and other two digits
to identify the country within the zone).
42) Which of the following methods is used to broadcast two packets on the
medium at a time?
1. Collision
2. Synchronous
3. Asynchronous
43) Which of the following is true with regard to the ping command?
2. The ping command checks the port level connectivity between source
destinations end points.
3. Ping summarizes the packet loss and round-trip delay between two IP
end points.
Answer: (c) Ping summarizes the packet loss and round-trip delay between
two IP end points.
Explanation: None
1. Sender
2. Receiver
Explanation: Only the receiver keeps the private key. Its purpose is to ensure
that the message can only be decrypted by the intended receiver.
1. RSA algorithm
2. Diffie-Hellman algorithm
1. Transposition ciphers
2. Substitution ciphers
3. Both a and b
4. None of these
1. 1.89
2. 17.99
3. 18.999
4. 18.4
Given, G =1/2
= 1 / 2e
= 0.184
= 18.4%
1. 36.8
2. 35.8
3. 35.5
4. 37.8
Given, G = 1
= 1 x e-1
= 1 / e
= 0.368
= 36.8%
49) Which of the following statement is true about error detection techniques
used on communications link?
Explanation: None
50) The correct order of corresponding OSI layers for having functionalities of
routing and reconciling machine representation differences with shared
access resolution and ASCII test protocol is?
Explanation: None
/mcastudy.files.wordpress.com
File hosted by educationobserver.com/forum
a. Separation of responsibility
b. Addition of responsibility
c. Subtraction of responsibility
d. None of these
a. Client
b. Server
c. Both a & b
d. None of these
a. 3
b. 4
c. 5
d. 6
a. Oldest protocol
d. None of these
a. Infinite
b. Finite
c. Large
File hosted by educationobserver.com/forum
d. None of these
7. Layering the communications process means breaking down the communication process
into______ and _____ to handle interdependent categories
a. Smaller
b. Easier
c. Both a & b
d. None of these
8. The convention and rules used in such communications are collectively known as
a. Peer
b. Layer protocol
c. Network
d. None of these
9. The entities comprising the corresponding layers on different computers are called
________ which communicate by using layer protocol
a. Peer
b. Layer protocol
c. Network
d. None of these
e.
c. Both a & b
d. None of these
a. protocols
b. layers
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
12.The groups of layers provides information to allows _________, which correctly obeys the
appropriate protocol
a. Hardware implementation
b. Software implementation
c. Both a & b
d. None of these
13.Which are never form a part of the architecture because they are not visible from the
outside
a. Interface specification
b. Implementation details
c. Both a & b
d. None of these
e.
a. Electronics signal
b. Electrical signal
c. Physical signal
d. Physical circuits
15. For two computers to reliably exchange data, they must have a
c. Both a & b
d. None of these
16.Transmission media deals with the types of medium used , which is dictated by the
a. Desirable bandwidth
b. Immunity to noise
c. Attenuation properties
d. All of these
e.
File hosted by educationobserver.com/forum
a. Communication buffers
b. Communication media
c. Both a & b
d. None of these
a. Error control
b. Logical channels
c. Routing
d. All of these
a. Noise
b. Electromagnetic interference
c. Both a & b
d. None of these
a. 2
b. 3
c. 4
d. 5
21. Data exchange can take place between any _____ workstations
a. 1
b. 2
c. 3
d. 4
22.Depending on the nature of the involved application in layered architecture, the dialog
type may be
a. Duplex
File hosted by educationobserver.com/forum
b. Half duplex
c. Simplex mode
d. All of these
a. Checkpoint
b. Check mechanism
c. Character encoding
d. Terminal emulation
24.The check pointing circumvent session recovery requirement by retransmitting only the
a. Affected files
b. Saving time
c. Bandwidth
d. All of these
e.
25.Some good examples of presentation problems are the existing incompatibilities between
the__________ standard of character encoding
a. ASCII
b. EBCDIC
c. Both a & b
d. None of these
e.
26. This is the entities in the same layers but on different computers
a. Peer entities
b. Entities
c. Service provider
d. SAP
a. Peer entities
b. Entities
c. Service provider
File hosted by educationobserver.com/forum
d. SAP
a. Peer entities
b. Entities
c. Service provider
d. Service user
29.Which is the point from where services can be accessed .each point is the unique address
a. Peer entities
b. Entities
c. Service provider
d. SAP
30. Which are the active elements such as processes, IO chips in every layers
a. Peer entities
b. Entities
c. Service provider
d. SAP
a. Registered E-mail
b. Junk E-mail
c. Both a & b
d. None of these
a. Registered E-mail
b. Junk E-mail
c. Both a & b
d. None of these
e.
a. Client-server model
b. User model
File hosted by educationobserver.com/forum
c. Server model
d. None of these
a. connection-oriented
b. connectionless
c. Both a & b
d. None of these
a. Protocol
b. Primitives
c. Confirmed service
d. SAP
a. Request
b. Confirm
c. Response
d. Indication
e. Primitives
f. All of these
g.
a. Protocol
b. Primitives
c. Confirmed service
d. SAP
a. Request
b. Indication
c. Confirm
File hosted by educationobserver.com/forum
d. Response
e. Both a & b
f. All of these
39.Which are the distinct concepts and are important to release connections between sender
and receiver
a. Services
b. Protocol
c. Both a & b
d. None of these
e.
a. Protocol to service
b. Service to protocol
c. Service primitives
d. None of these
a. Name
b. Content
c. Function
e. All of these
f.
c. Layer above it
d. Layer below it
43.________ the protocol can make communication between the two either difficult or
impossible
a. Breaching
File hosted by educationobserver.com/forum
b. Branching
c. Broaching
d. Brunching
a. Set of layers
b. Set of protocols
c. Set of machines
d. Both a & b
45.The hectic task of designing the whole network can be distributed in the
a. Smaller
b. Easier
d. All of these
46.Which is the computers from the same manufacturer it was not possible to run
both_______ solution and _______ simultaneously
a. IBM
b. DEC
c. Both a & b
d. None of these
47.ISO-OSI reference model these could only be run one at a time by the end__________
a. 1969s
b. 1971s
c. 1970s
d. 1972s
a. Message sequences
b. Byte streams
c. Both a & b
d. None of these
e.
File hosted by educationobserver.com/forum
49.Which is similar to postal system where every message contains the complete destination
address and is mapped through the system, free of all the others
a. Connection-oriented services
b. Connectionless services
c. Both a & b
d. None of these
50.The various types of services provided by the interface to the layers above them are listed
as follows
a. Connection-oriented services
b. Connectionless services
c. Both a & b
d. None of these
a. Unreliable datagram
b. Acknowledged datagram
c. Both a & b
d. None of these
a. Datagram service
b. Data service
d. None of these
53.By the end of _________, the Open System Interconnection model was developed by the
International Organization for Standardization to break the barrier
a. 1980
b. 1970
c. 1990
d. 1960
a. Physical layer
File hosted by educationobserver.com/forum
c. Hardware implementation
d. All of these
55.The seventh and the highest layer is the application layer that deals with the
a. User interface
b. Applications
c. Both a & b
d. None of these
56.In moving from layer one to layer seven, the level of abstraction ________
a. Increases
b. Decreases
d. None of these
e.
a. Hardware of networks
c. Both a & b
d. None of these
a. Signaling
b. Hardware
c. Both a & b
d. None of these
e.
59.The transport layer is the one, which links the communication process to this
_________________
a. Hardware-oriented protocol
b. Software-oriented protocol
c. Both a & b
File hosted by educationobserver.com/forum
d. None of these
a. Data
b. Header
c. Both a & b
d. None of these
61.The seventh layer does not deal with __________ concepts very much
a. Hardware
c. Both a & b
d. None of these
62.The basic philosophy of the seven-layer model is that each layer may be defined
d. None of these
63.The seven layers of the OSI model are categorized into ________ groupings
a. 2
b. 3
c. 4
d. 5
a. 1,2,3
b. 1,2,3,4
c. 1,2,3,4,5
d. 2,3,4,5,6
a. 5,6
b. 5,7
c. 6,7
File hosted by educationobserver.com/forum
d. 5,6,7
66.The lower layers are implemented by using ______________ with the incidence of
hardware ‘reducing’ to software from layer 1 to layer 4
a. Software
b. Hardware
c. Both a & b
d. None of these
e.
67.The upper layers are not expected to know anything about ____________
a. Networking
b. Network addresses
c. Both a & b
d. None of these
a. Networking
b. Network addresses
c. Both a & b
d. None of these
e.
69.The OSI interface is a process of communication between adjacent layers in which data is
passed between
a. Layer n
b. Layer n-1
c. Layer n+1
d. All of these
a. Pass control
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
71.This refers to communication up and down the protocol stack every time any data is sent
received across the network
a. Vertical communication
b. Horizontal communication
c. Protocols
d. OSI interfaces
72.Which is a communication process running at a particular layer on one host machine can
accomplish logical communication with a similar process running at the same layer on
another host machine
a. Vertical communication
b. Horizontal communication
c. Protocols
d. OSI interfaces
a. Modularity
b. Inter-layer interactions
c. Both a & b
d. None of these
e.
Layers Functions
File hosted by educationobserver.com/forum
2 Data link It tends to assemble packets into bytes and bytes into frames
and provides access to media by using MAC address
c. Coaxial cables
e. Wireless
f. All of these
a. Voltage
b. Current
c. Phase or frequency
d. All of these
77.The physical layer uses four types of bit signaling approaches these are
e. All of these
78.What are the two types of systems that are used to provide timing signal
a. Asynchronous communications
b. Synchronous communications
c. Both a & b
d. None of these
a. Bytes
b. Bits
c. Gigabyte
d. Megabyte
80.Which bit stream is to be transmitted with the objective that when the sending side sends
_____ bit
a. 1
b. 0
c. 1,0
d. None of these
81.Which bit stream is to be transmitted with the objective that when the received by the
receiving side as 1 bit, not as ___ bit
a. 1
b. 0
c. 1,0
d. None of these
82.It defines the electrical and mechanical aspects of interfacing to a physical medium for
transmitting data ________________________________
a. As well as setting up
b. Maintaining
d. All of these
d. All of these
84.The physical layer supports various encoding and signaling functions to convert data,
from bit stream to frame and vice versa, to send across the network
d. None of these
a. RS-323C/D
b. RS-232C/D
c. RS-233C/D
d. RS-322C/D
a. HDLC
b. Ethernet
c. Both a & b
d. None of these
c. Data framing
d. Addressing
f. All of these
88.The data link layer also deals with the issue of addressing what is popularly known as
a. Hardware
b. Address
File hosted by educationobserver.com/forum
c. MAC address
d. All of these
c. Both a & b
d. None of these
a. Logical addressing
b. Routing
c. Datagram encapsulation
e. All of these
a. Static
b. Dynamic
c. Both a & b
d. None of these
e.
92.The network layer uses which service for delivering packets across the network
a. Connection-oriented
b. Connectionless service
c. Both a & b
d. None of these
93.In broadcast network ,the routing problem is ________, so the network layer is often thin
or even nonexistent
a. Complex
b. Simple
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
94.The transport layer provides the necessary function to enable communication between
_____________ processes on different computers
a. Software application
b. Hardware application
c. Both a & b
d. None of these
e.
95.The transport layer accepts data from the ______ and splits it up into smaller units so that
it can be passed to the network layer
a. Network layer
b. Session layer
c. Presentation layer
d. Physical layer
a. FTP
b. TFTP
c. HTTP
d. TCP/IP
a. Process-level addressing
f. Flow control
g. All of these
a. Establishing
b. Maintaining
File hosted by educationobserver.com/forum
c. Arbitrating
d. All of these
e.
99. The session layer provides enhanced useful services in some applications such
as
a. Remote login
c. Both a & b
d. None of these
a. NetBIOS
b. TCP/IP sockets
d. All of these
101.Which enable an application to complete specified high level communications over the
network successfully and easily with the help of a standardized set of services
a. RPCs
b. APIs
c. TCP/IP
d. All of these
a. Link layer
b. Data layer
c. Open layer
d. None of these
a. HDLC
b. Ethernet
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
104.Which provides link to many wireless and wired local area networking (LAN) like
Ethernet ,FDDI, IEEE802.11 etc to function
a. Physical layer
c. Transport layer
d. Presentation layer
105.Which layer is responsible for the reliable transfer of data across the physical link
a. Physical layer
c. Transport layer
d. Presentation layer
c. Frame formatting
e. Error detection
f. Link management
g. All of these
107.Which layer performs functions relative to the syntax and semantics of the information
transmitted
a. Physical layer
c. Transport layer
d. Presentation layer
108.The types of data handling issue that presentation layer provides are as follows
a. Translation
b. Compression
c. Encryption
d. All of these
File hosted by educationobserver.com/forum
a. PCs
b. Macintoshes
c. UNIX systems
d. AS/400 servers
e. All of these
a. Physical layer
c. Application layer
d. Presentation layer
a. Distributed database
b. Electronic mail
c. Resource sharing
d. File transfer
f. Network management
g. All of these
a. Physical layer
b. Application layer
c. Transport layer
d. Presentation layer
a. HTTP, FTP
b. SMTP, DHCP
c. NFS, Telnet
d. SNMP, POP3
File hosted by educationobserver.com/forum
e. NNTP, IRC
f. All of these
114.Which model is considered the oldest protocol of all computer networks like the
ARPANET and its successor, the Internet
b. SMTP model
c. Telnet model
d. NNTP model
e.
115.Most users rely on ______ for the purpose of file transfers, electronic mail(e-mail) and
remote login services
a. TCP/IP
b. SMTP
c. DHCP
d. NFS
e.
a. 2
b. 3
c. 4
d. 5
a. Physical layer
b. Application layer
c. Transport layer
d. Presentation layer
a. Internet layer
b. Transport layer
c. Application layer
File hosted by educationobserver.com/forum
e. All of these
a. Application-specific processes
b. Host-specific processes
c. Network-specific processes
d. All of these
120.Which TCP/IP standards define protocols for TCP/IP networks for layer two
implementation to fill the gap between the network layer and the physical layer
b. Point-to-Point Protocol(PPP)
c. Both a & b
d. None of these
121.The Internet layer of the TCP/IP matches with the which layer of the OSI model
a. Network layer
b. Physical layer
c. Session layer
a. Network protocol
b. Internet protocol
c. OSI protocol
d. None of these
a. IP
b. ICMP
c. RIP
d. BGP
e. All of these
a. Ethernet
b. FDDI
c. Token Ring
d. All of these
e.
a. TCP
b. UDP
c. FDDI
d. Both a & b
a. FTP
b. TFTP
c. SMTP
d. NFS
e. TELNET
f. SNMP
g. All of these
h. None of these
a. Reliable
b. Connection-oriented
c. Connectionless
d. Unreliable
i. Both a & b
ii. Both c & d
iii. None of these
a. Numerous
b. UDP
File hosted by educationobserver.com/forum
c. TCP
d. IP
a. Sequence control
c. Flow control
d. All of these
130.TCP layer is a
a. Service
d. None of these
131.The basic functions of application layer are _____________ that wish to communicate
with one another
c. Both a & b
d. None of these
a. Remote machine
d. All of these
a. Issues of authentication
d. All of these
134.Another aspect of the application layer is to __________ ,this application is called telnet
a. Login remotely
File hosted by educationobserver.com/forum
b. Logout
c. Remotely
d. None of these
135.TCP connection with another location and then pass keystrokes from the _______
136.Similarly, there are many other applications such as NNTP enabling communication
between a ___________
a. News server
b. News client
d. All of these
a. Internet
b. Web
c. Both a & b
d. None of these
138.Which is a file server access protocol that enables a user to transfer files between two
hosts
a. SMTP
b. TCP
c. FTP
d. NNTP
139.FTP is widely available on almost all-browsers indicating that all computing platforms,
including _________
a. DOS
b. OS/2
d. All of these
140.Which dose not require any familiarity with the remote operating system
a. SMTP
b. TCP
c. FTP
d. NNTP
e.
a. TCPD
b. FTPD
c. SMTD
d. CTPD
a. Control connection
b. Data connection
c. Both a & b
d. None of these
e.
143.Which is invoked for the entire duration of transfer of file or FTP session
a. Control connection
b. Data connection
c. Both a & b
d. None of these
a. Control connection
b. Data connection
c. Both a & b
d. None of these
e.
145.The main function of data connection is to facilitate transfer of file and directory to and
File hosted by educationobserver.com/forum
from the________
147.Which is also an internet service intended for the transfer of files from one computer to
another over a network
a. TFTP
b. FTP
c. Both a & b
d. None of these
a. Password protection
c. Both a & b
d. None of these
a. FTP
b. SMTP
c. NNTP
d. FTPD
a. Electronic message
b. Electronic mail
c. Electric mail
File hosted by educationobserver.com/forum
d. None of these
e.
a. Post mail
b. Postal mail
c. Post card
d. None of these
a. User agent
c. Both a & b
d. None of these
154.Which is a software package that transports the message created by a user to destination
mailboxes possibly on remote machines
a. User agent
b. MTA
c. Both a & b
d. None of these
155.The MTA has to perform more complex jobs than other applications
c. MTA allows mixing of text, voice appending documents, files and video in a
message
e. All of these
a. Mailbox names
b. Symbolic names
d. All of these
a. User agent
b. MTA
c. Both a & b
d. None of these
a. Mailbox names
b. Symbolic names
d. All of these
159.Which refers to an alias for a set of recipients, that consults an internal database to
specify the mail addresses
a. Mailbox names
b. Symbolic names
d. All of these
160.There are a number of e-mail packages available. Some of them are free like
____________________, while some are paid
a. Google mail
b. Yahoo mail
c. Hotmail
d. All of these
161.In MTA, all of them are also not alike but most of the e-mail software have common basic
functionality these are
File hosted by educationobserver.com/forum
g. All of these
b. An ‘at’ sign(@)
c. The domain name, which basically specifies the address of the user’s mail server
d. All of these
a. dee facto
b. de facto
c. de fact
d. none of these
164.SMTP uses ______ transport for the reliably delivery of mail messages
a. FTP
b. TCP
c. MTA
d. FTPD
a. NNTP
b. Telnet service
c. FTPD
d. none of these
a. UUDP
b. UUCP
File hosted by educationobserver.com/forum
c. UCCP
d. UCPD
a. EBCDIC strings
b. ASCII strings
c. Both a & b
d. None of these
169.________ standards were used to encode binary files for transfer through SMTP, which
has now become a standard with its varied version
a. FTPD
b. FTP
c. MIME
d. UUCP
e.
d. Posting of Protocol
a. SMTP
b. POP3
c. IMAP
d. All of these
a. SMTP
b. POP3
c. IMAP
d. Both b & c
a. User-defined services
b. Well-known services
c. Both a & b
d. None of these
a. User-defined
b. Well-known
c. Client-server
d. All of these
e.
c. Both a & b
d. None of these
d. Convey information
e. All of these
178.Telnet service is unique in the manner that is ___________ like other TCP/IP services
a. Platform-specific
b. Not platform-specific
c. Platform-service
d. None of these
Are You there(AYT) This command allows a client to send an out-of-band query to
verify whether the remote end is still there
180.Novell NetWare is a ___________ network operating system that was created by Novell,
Inc
a. Client type
b. Server type
c. Both a & b
d. None of these
a. 3 layers
b. 4 layers
c. 5 layers
d. 6 layers
183._______ is a networking protocol used by the Novell NetWare operating systems for
performing connectionless communication
a. NVT
b. IPX
c. IP
d. FTP
184.The rise 1985 saw the rise of Novell NetWare when _____________ were launched
c. Both a & b
d. None of these
185.Two methods of operation were supported by NetWare 286 2.x namely are
a. Dedicated
b. Non-dedicated
c. Both a & b
d. None of these
e.
186.Beginning with NetWare 3.x, assistance for _____ protected mode was included,
removing the 16MB memory limit of NetWare 286
a. 16-bit
b. 32-bit
c. 64-bit
d. 128-bit
187.Which managed all functions and was activated at startup or at the time of requirement
b. FTP
c. SMTP
d. FTPD
File hosted by educationobserver.com/forum
a. Protocol
b. Protocol stack
c. Protocol layer
d. None of these
e.
a. 2 layers
b. 3 layers
c. 4 layers
d. 5 layers
e.
a. Upper layer
b. Physical media
c. Next layer
d. Protocol
191.When data travels downwards from upper the layer in TCP/IP, each upper layer attaches
a
a. Footer
b. Header
c. Standard
d. None of these
e.
192.After the transmission of data in bit form to another machine it travels upward,
____________ the header till data reaches the application layer
a. Stripping in
b. Stripping off
c. Tackling off
d. Tackling in
File hosted by educationobserver.com/forum
e.
193.In which year, Netware directory service were added to the Netware version 4
a. 1993
b. 1996
c. 1998
d. 2001
a. 1993
b. 1996
c. 1998
d. 2001
a. 1993
b. 1996
c. 1998
d. 2001
a. 1993
b. 1996
c. 1998
d. 2001
e.
a. Protocol stack
b. Protocol suite
c. Stack
d. Suite
198.Which is a file server access protocol that enables a user to transfer file between two
hosts, across the network or Internet using TCP
a. FTPD
File hosted by educationobserver.com/forum
b. FTP
c. Telnet
d. PPP
199.Which is a remote terminal protocol that enables a user at one location to establish a
TCP connection with another location
a. FTPD
b. FTP
c. Telnet
d. PPP
200.Which protocol is used by network computers operating system for sending error
messages
a. FTPD
a. FTP
b. Telnet
c. ICMP
c. Data encapsulation
d. Both a & b
12. The functions performed by logical layer are
a. Data encapsulation
b. Link management
c. Medium access
d. Both a & b
e.
13. The computer or station is connected to a Ethernet card, Ethernet card consists of
a. Station interface
b. Data packet generator
c. A link management unit
d. All of these
14. The output of a Ethernet card is connected to the data encoder/decoder, which in turn is
connected to the transmission cable through a
a. Repeater
b. Transceiver
c. Segments
d. Groups
15. The IEEE802.3 Ethernet frame format are
a. Preamble-7byte
b. Start of frame-1byte
c. Destination address-6byte
d. Source address-6byte
e. Length-2byte
f. Information field-46to 1500bytes
g. Frame check sequencer-4byte
h. All of these
16. The local area networks that do not require the capabilities of complete Ethernet system, the
IEEE802.3 standard committee has created a new standard called
a. Thin net
b. Star LAN
c. Optical fibre CSMA/CD
d. None of these
17. The characteristics of thin net or cheaper net is
a. Max distance is up to 200meters
b. Max no of nodes is 30
c. Max stations per network is 1024
d. Node spacing is 0.5meters
File hosted by educationobserver.com/forum
g. Date
h. FCS
i. End Delimiter
j. Frame status
k. All of these
31. In a token ring , stations are connected to a
a. Physical ring
b. Logical ring
c. Both a & b
d. None of these
32. How many modes a ring interface can operate
a. 1
b. 2
c. 3
d. 4
33. A ring interface can operate different modes
a. Listen mode
b. Talk mode
c. Both a & b
d. None of these
34. In physical layer of token ring , signal speed of this media is
a. 1Mbps
b. 4Mbps
c. Both a & b
d. None of these
35. IBM released a token ring version that can operate at a speed of ______
a. 4Mbps
b. 6Mbps
c. 8Mbps
d. 16Mbps
36. Differential_______ encoding schema is used for encoding the digital data
a. Manchester
b. Multi programming
c. Multi processor
d. None of these
37. The MAC sub layer is on the____ of the physical layer
a. Bottom
b. Mid
c. Top
File hosted by educationobserver.com/forum
d. None of these
38. When there is no traffic on the ring______ token circulates continuously until some station
grabs it
a. 3-byte
b. 5-byte
c. 7-byte
d. 9-byte
39. The length of the frame_________________
a. Short
b. Long
c. May be long or short
d. None of these
40. The maximum time a station is permitted to hold the token is known as________
a. Token time
b. Token holding time
c. Token ring
d. None of these
41. The IEEE802.5 token frame format are
a. Start of frame and end of frame
b. Access control
c. Frame control
d. Source address and destination address
e. Checksum
f. All of these
42. The token ring management activities are
a. Monitor stations
b. Ring initialization
c. Lost tokens
d. Orphan frames
e. All of these
43. The stations crashed after transmitting a short frame form
a.
b. Monitor stations
c. Ring initialization
d. Lost tokens
e. Orphan frames
f. All of these
44. The FDDI network stands for
a. Fibre Distributed Data Incorporation
File hosted by educationobserver.com/forum
a. Ethernet
b. Token ring
c. Both a & b
d. None of these
58. The FDDI supports four different types of cables as
a. Multimode fibre optic cable
b. Single mode fibre optic cable
c. Unshielded twisted-pair copper wiring
d. Shielded twisted-pair copper wiring
e. All of these
59. The PMD stands for
a. Physical Medium Dependent
b. Physical Medium Distance
c. Physical Media Dependent
d. Permitting Medium Dependent
60. For optical fibre media , which PMD is used
a. TP-PMD
b. Fibre PMD
c. Both a & b
d. None of these
e.
61. For copper media , which PMD is used
a. TP-PMD
b. Fibre PMD
c. Both a & b
d. None of these
e.
62. Other two significant PMD are
a. SMF-PMD(Single Mode Fibre-PMD)
b. LCF-PMD(Low Cost Fibre-PMD)
c. Both a & b
d. None of these
63. The fibre PMD-ANSI X3T9.5/48 describes the physical layer that uses
a. Fibre components
b. Optical components
c. Both a & b
d. None of these
64. The characteristics and parameters of the optical fibre cable allowed for FDDI are
a. Wavelength of light(normal is 1300nm)
File hosted by educationobserver.com/forum
d. IEEE802.4
71. The MAC layer specifies how to handle
a. Synchronous data traffic
b. Asynchronous Data traffic
c. Both a & b
d. None of these
72. IEEE802.2 standard works on ______________ modes
a. Connectionless
b. Connection-oriented
c. Both a & b
d. None of these
73. If the received data is damaged or lost, the destination machine to retransmit the data known
as _____________
a. SNAP
b. ARQ
c. LLC
d. MAC
74. ARQ stands for
a. Array Repeat Request
b. Automatic Repeat Request
c. Automatic Request Repeat
d. Acknowledgement Repeat Request
75. SNAP stands for
a. Subnetwork Access Package
b. Subnetwork Access Packet
c. Structured Access Protocol
d. Subnetwork Access Protocol
76. LLC header contains _______ additional eight-bit address fields known as service access
points or SAPs to request SNAP service
a. 1
b. 2
c. 3
d. 4
77. PDU stands for
a. Packet Device Unit
b. Protocol Device Unit
c. Protocol Data Unit
d. Protocol Data Universal
78. IEEE802.3 Ethernet has become one of the most used ________
File hosted by educationobserver.com/forum
a. WAN media
b. LAN media
c. MAN media
d. None of these
79. Around 1984, DIX(a consortium of Digital, Intel and Xerox) and IEEE created standards for
Ethernet, which are popularly known as the ________
a. IEEE802.3
b. IEEE802.1
c. IEEE802.2
d. IEEE802.3
80. Which another group took the responsibility for developing medium access protocols
a. DLMAC
b. ARQ
c. LAN
d. SNAP
81. Ethernet is the ______ expensive high-speed LAN alternative
a. More
b. Least
c. None of these
82. Ethernet transmits and receives data at a speed of ___________
a. 5 million bits per second
b. 10 million bits per second
c. 15 million bits per second
d. 20 million bits per second
83. In Ethernet, Data is transferred between wiring closets using either a __________
a. Heavy coaxial cable
b. Thick net
c. Fibre optic cable
d. All of these
e.
84. Ethernet was first designed and installed by Xerox Corporation at its Palo Alto Research
Center(PARC) in the mid _________________
a. 1960s
b. 1970s
c. 1980s
d. 1965s
85. In 1980, ____________ came out with a joint specification which has become the de facto
standard
a. DEC
File hosted by educationobserver.com/forum
b. Intel
c. Xerox
d. All of these
86. Ethernet frames travel at the data link layer of the OSI model and must be a minimum of
________
a. 32bytes
b. 64bytes
c. 128bytes
d. 256bytes
87. Ethernet frames travel at the data link layer of the OSI model and must be a maximum of
________
a. 1515bytes
b. 1516bytes
c. 1517bytes
d. 1518bytes
d. None of these
e.
92. Which are used to connect LANs and LAN segments in a campus environment
a. Microwave
b. Infrared systems
c. Both a & b
d. None of these
93. The advantages of coaxial cable include high bandwidth in the range of ________ and more,
better error performance and lack of severe distance limitation
a. 200MHz
b. 300MHz
c. 400MHz
d. 500MHz
94. The disadvantage of coaxial cable have been mitigated to a _______ through the development
of new coaxial designs
a. Small extent
b. Large extent
c. Either large or small
d. None of these
e.
95. Which uses traditional thick baseband coaxial cable in a bus topology to connect multiple
computers, this single line transmission is called a Segment
a. 10Base2(Thick Net/Yellow Ethernet)
b. 10Base5(Thick Net/Yellow Ethernet)
c. 10Base2(Thin Net/Black Ethernet)
d. 10Base5(Thin Net/Black Ethernet)
96. A coaxial cable _______ in diameter known as thick coaxial cable is used as a transmission
line
a. 5mm
b. 10mm
c. 15mm
d. 20mm
97. A transceiver is used to connect a ____________________
a. Coaxial cable
b. Terminals
c. Transmitter
d. Both a & b
98. A transceiver cable also referred to as an __________ cable and is used to connect a
transceiver and the NIC
File hosted by educationobserver.com/forum
a. ALU
b. AUI(Attachment Unit Interface)
c. LAN
d. MAN
99. In 10Base5(Thick Net/ Yellow Ethernet) the maximum length of this cable is ______, up to
100 transceivers can be connected to each segment
a. 40 metres
b. 45 metres
c. 50 metres
d. 55 metres
100. In 10Base5(Thick Net/ Yellow Ethernet) the minimum allowable distance between
transceivers is _______
a. 1.5 metres
b. 2.5 metres
c. 3.5 metres
d. 4.5 metres
e.
101. 10Base stands for ___________
a. 10Mbps
b. Baseband transmission system
c. Both a & b
d. None of these
102. The 5 of 10Base5 signify a maximum of _________ segment length
a. 50- metre
b. 500- metre
c. 5000- metre
d. 550- metre
103. The 5 of 10Base5 segment may be extended up to ______ by using repeaters
a. 500 metres
b. 1000 metres
c. 1500 metres
d. 2000 metres
104. Which uses thinner baseband coaxial cable in a bus topology so that multiple
computers can be connected to a single transmission line
a. 10Base2(Thick Net/Yellow Ethernet)
b. 10Base5(Thick Net/Yellow Ethernet)
c. 10Base2(Thin Net/Black Ethernet)
d. 10Base5(Thin Net/Black Ethernet)
105. In 10Base2(Thin Net/Black Ethernet) a coaxial cable of thinner gauge of _______ in
File hosted by educationobserver.com/forum
diameter
a. 5mm
b. 10mm
c. 15mm
d. 20mm
106. The thinner cable is less costly to acquire and deploy, although its performance is less
in terms of transmission distance because of its cost it is sometimes called ___________
a. Chaplet
b. Cheapnet
c. None of these
107. 10Base2 signifies in the same manner as 10Base5 except 2 is signified here as _______
maximum segment length(actually 185 metres)
a. 100 metres
b. 200 metres
c. 250 metres
d. 300 metres
108. BNC stands for
a. Bayonet Neil Connection
b. Bayonet Neil Connector
c. Bayonet Neil Connectionless
d. Bayonet Network Connection
109. Which is used to connect a cable and terminals or terminators
a. BNC
b. T-connector
c. Both a & b
d. None of these
110. Only up to ______ per segment can be connected to a T-connector
a. 10 nodes
b. 20 nodes
c. 30 nodes
d. 40 nodes
111. The minimum allowable distance is ____ between consecutive connections
a. 0.2 metres
b. 0.5 metres
c. 1.5 metres
d. 2.5 metres
112. UTP stands for
a. Universal Twisted Pair
b. Unshielded Twisted Pair
File hosted by educationobserver.com/forum
Maximum 100 30 -
node/segment
Repeaters/Series 4 4 4
c. Both a & b
d. None of these
118. A DQDB(Distributed Queue Dual Bus) provides service over cable interface for
a. LAN
b. MAN
c. WAN
d. All of these
e.
119. The DQDB supports _______ based on cell switching technology similar to
Asynchronous Transfer Mode(ATM)
a. Data
b. Voice
c. Video transmission
d. All of these
120. The Asynchronous Transfer Mode(ATM) is an _________ for cell relay
a. ITU-TSS(International Telecommunication Union-Telecommunication
Standardization Sector)
b. TIU-ESS
c. PTU-DSS
d. None of these
121. The ATM networks are
a. Connection-less service
b. Connection oriented service
c. Both a & b
d. None of these
122. The ATM cell has a fixed length of
a. 51bytes
b. 62bytes
c. 53bytes
d. 63bytes
123. The cell is broken into the two main sections called
a. Header
b. Payload
c. Both a & b
d. None of these
124. Which sections of cell carries the actual information(voice, data or video)
a. Header
b. Payload(48bytes)
c. Both a & b
File hosted by educationobserver.com/forum
d. None of these
125. Which sections of cell is the addressing mechanism
a. Header(5bytes)
b. Payload(48bytes)
c. Both a & b
d. None of these
e.
126. The disadvantage of DQDB is to have
a. Fluctuating data rate
b. High bandwidth
c. High susceptibility to error
d. Fixed bandwidth distribution
127. The frame format of DQDB are
a. Header
b. ST(Segment Type)
c. MID(Message Identifier)
d. Information
e. LEN(Data Length)
f. CRC(Cyclic Redundancy Check)
g. All of these
128. GPS stands for
a. Global Partition System
b. General Partition System
c. Global Positioning System
d. General Positioning System
129. Which satellite communication involve a satellite relay station that is launched into a
geostationary, geosynchronous, or geostatic orbit
a. Temporary
b. Contemporary
c. Permanent
d. None of these
e.
130. The contemporary satellite communication launched into a
a. Geostationary orbit
b. Geosynchronous orbit
c. Geostatic orbit
d. All of these
131. The contemporary satellite communication are called
a. Geostationary satellite
File hosted by educationobserver.com/forum
b. Geostatic satellite
c. Geosynchronous satellite
d. All of these
132. In case of satellite communication two different frequencies are used as carrier
frequency to avoid interference b/w incoming and outgoing signals are
a. Uplink frequency
b. Downlink frequency
c. Both a & b
d. None of these
133. Which frequency is used to transmit signal from the earth station to satellite
a. Uplink frequency
b. Downlink frequency
c. Broadcast
d. None of these
e.
134. Which frequency is used to transmit signal from the satellite to earth station
a. Uplink frequency
b. Downlink frequency
c. Broadcast
d. None of these
e.
135. In which manner, satellite can serve a point-to-multipoint network requirement
through a single uplink station and multiple downlink stations
a. Uplink frequency
b. Downlink frequency
c. Broadcast
d. None of these
136. The general properties of satellite communication______________
a. Each signal travel 36,000 km in each direction
b. The cost of satellite communication is quite high
c. Security must be imposed through encryption
d. Satellite provides increment in bandwidth
e. Satellite provides extensive error detection and correction capabilities
f. All of these
137. TDMA stands for
a. Time Division Multiplexing Access
b. Time Dynamically Multiple Access
c. Time Division Multiple Access
d. Time Division Multiple Assigning
File hosted by educationobserver.com/forum
d. None of these
e.
145. The VSAT system operates under Ku-Band 1 frequency are
a. 4.000 to 14.500GHz
b. 10.950 to 11.700GHz
c. Both a & b
d. None of these
146. The Ku-band networks are commonly used in
a. Europe and North America
b. Asia and Africa
c. Latin America
d. Both a & b
147. The C-band networks are commonly used in
a. Europe and North America
b. Asia and Africa
c. Latin America
d. Both b & c
148. Which band of frequencies require the large VSAT antenna
a. Ku-band
b. C-band
c. Both a & b
d. None of these
149. Which band of frequencies require the smaller VSAT antenna
a. Ku-band
b. C-band
c. Both a & b
d. None of these
e.
150. The components of VSAT network are
a. Master earth station
b. Remote earth station
c. Satellite
d. All of these
151. The first component-master earth station is also known as
a. Central hub station
b. Central satellite
c. Backbone
d. All of these
152. The master earth station has a large _______ meter antenna
File hosted by educationobserver.com/forum
a. 3
b. 6
c. 5
d. 4
153. The hub earth station consists of
a. Radio frequency(RF)
b. Intermediate frequency(IF)
c. Base-band equipment
d. All of these
154. The RF equipment consists of the following sub-systems are
a. Antenna
b. Low noise amplifier(LNA)
c. Down converter, up converter
d. High-power amplifier
e. All of these
155. The IF and base-band equipment consists of
a. IF combiner/divider
b. Modulator and demodulator
c. Customer equipment interface
d. Processing equipments
e. All of these
156. The customer equipment interface unit provides the interface to the
a. Customer host equipment
b. Protocol emulation
c. Both a & b
d. None of these
157. The remote earth station of VSAT comprises of
a. Outdoor unit(ODU)
b. Indoor unit(IDU)
c. Inter-facility link(IFL)
d. All of these
158. The outdoor unit is generally installed in the
a. Ground
b. Indoor unit
c. Both a & b
d. None of these
159. The VSAT outdoor unit consists of
a. Standard 1.8 meter offset feed antenna
b. Solid-state amplifier(SSPA)
File hosted by educationobserver.com/forum
a. Images
b. Numbers
c. Words
d. All of these
a. Latin
b. Contextual
c. DB
d. None of these
a. 1
b. 2
c. 3
d. 4
a. Qualitative
b. Quantitative
c. Both a & b
d. None of these
a. Highest
File hosted by educationobserver.com/forum
b. Middle
c. Lowest
d. None of these
a. Highest
b. Middle
c. Lowest
d. None of these
a. Highest
b. Middle
c. Lowest
d. None of these
a. Numerical form
b. Non-numerical form
c. Both a & b
d. None of these
a. Numerical form
b. Non-numerical form
c. Both a & b
d. None of these
a. Things
b. Words
c. Text
d. None of these
a. Qualitative data
b. Quantitative data
c. Both a & b
d. None of these
12.Which data are rich, poor, tall, short, good, bad, better
a. Qualitative data
b. Quantitative data
c. Both a & b
d. None of these
a. Values
b. Operations on values
c. Both a & b
d. None of these
a. Integers
b. Floating-point numbers
c. Characters
d. Alphanumeric strings
e. All of these
15. The smallest addressable unit of data is defined as a group of ___ bits is known as a byte:
a. 4
b. 8
c. 16
d. 32
a. Word
b. Number
c. Bit
d. Byte
File hosted by educationobserver.com/forum
17. The machine code unit may be _________ depending on the computer architecture:
a. 8 bit or 16 bit
b. 16 bit or 32 bit
c. 32 bit or 64 bit
18.In a 32-bit word it can represent unsigned integer values ranging from
a. 0 to 232 -1
31 31
b. -2 to 2 -1
c. 0 to 264 -1
31
d. 0 to 2 -1
19.In a 32-bit word it can represent signed integer values ranging from
a. 0 to 232 -1
31 31
b. -2 to 2 -1
c. 231 to 264 -1
31
d. 0 to 2 -1
20.A signal is an
a. Electric current
b. Electromagnetic field
c. Electronic current
d. Both a & b
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
a. A telephone user
c. Both a & b
d. None of these
a. Physical
b. Logical
c. Both a & b
d. None of these
a. Hard wired
b. Wireless
c. Both a & b
d. None of these
a. Upgrades
b. Degrades
c. Both a & b
d. None of these
a. Reproduced
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
28.In channel noise, data by affecting communications and files of all types including
a. Images
b. Audio
c. Text
d. Programs
e. Telemetry
f. All of these
a. Electrical form
b. Electromagnetic form
c. Both a & b
d. None of these
a. Internal
b. External
c. Both a & b
d. None of these
a. 300kHz
b. 300MHz
c. 300GHz
d. 300Hz
32.The noise generated which is lower than the high frequency range of ____ and may have
more interface with the signal of information:
a. 300MHz
b. 300kHz
c. 300GHz
d. 300Hz
a. In the vicinity
e. All of these
a. Channels
b. Receivers
c. Transmitter
d. Both a & b
35.Internal noise is less dependent on frequency, but has a significant effect at:
a. Higher frequency
b. Low frequency
c. Middle frequency
d. No frequency
a. More
b. Less
c. No
d. None of these
c. Both a & b
d. None of these
a. S/N
b. SNR
c. S/M
d. Both a & b
File hosted by educationobserver.com/forum
a. decibels
b. Hertz
c. Micron
e.
40.____________ defined as the size of the range of frequencies that can be transmitted
through a channel
a. Channel Bandwidth
c. Channel noise
d. Channel capacity
41.In other words channel bandwidth may be define it as the volume of information per unit
time that a _____________________
a. Computer
b. Person
d. All of these
a. decibels
b. Hertz
c. Micron
a. decibels
b. Hertz
c. Micron
a. Highest frequency
b. Lowest frequency
c. Both a & b
d. None of these
45.__________ is determined by the maximum number of bits that can be transmitted per
unit time through the physical medium:
a. Channel Bandwidth
c. Channel noise
d. Channel capacity
a. decibels
b. Hertz
c. Micron
a. H.Nyquist in 1924
b. H.Nyquist in 1934
d. None of these
b. Media characteristics
c. Transmission distance
d. All of these
49._____________ is the amount of time that is needed for the information to propagate from
the source to destination through the channel:
a.
b. Propagation time
File hosted by educationobserver.com/forum
c. Channel Latency
d. Channel Utilization
e. Both a & b
a. bits
b. characters
c. blocks passing
d. All of these
a. Bandwidth
b. Channel noise
c. Bit rate
d. Channel latency
a. More
b. Less
c. Medium
d. None of these
a. Nature of medium
c. Nature of distance
d. Both a & b
a. Frequency
b. Frequency spectrum
c. Carrier frequency
d. None of these
File hosted by educationobserver.com/forum
a. Baud rate
b. Pass band
c. Band data
d. Pass
a. Lesser
b. Greater
c. Medium
d. None of these
57.________ refers to the minimum or maximum spatial separation between devices over a
link, in the context of a complete, end to end circuit
a. Bandwidth
b. Channel
c. Distance
d. None of these
58._________ is the rate over network speed which is used to detect errors while transmitting
data
a. Bit rate
b. Data rate
c. Baud rate
d. Pass band
a. >1008GHz
b. <1018GHz
c. >1018GHz
d. <1008GHz
60.The most popular method for detecting errors in bit rate is ________ a parity bit alongside
the data bit for a character
File hosted by educationobserver.com/forum
a. Deleting
b. Inserting
c. Modifying
d. Updating
61.TDM means
62.FEC means
d. Parity bit
a. TDM
b. FEC
c. Framing Bit
d. All of these
a. TDM
b. FEC
c. Framing Bit
d. All of these
d. None of these
d. None of these
69.The size of the multimedia file is the length of recording in seconds divided by:
a. 4
b. 8
c. 12
d. 16
e.
e. All of these
a. Fixed
b. Uniform
d. None of these
a. 1Gbit/s
b. 1Mbit/s
c. 1Mbyte/s
d. 1Gbyte/s
74.Bit rate is used to calculate the speed of time to access the network
a. Equal
b. More
c. Equal or more
d. None of these
a. Signal
b. Data
c. Symbol
d. None of these
77.Lesser bandwidth is required to move these signal units with _____ bits for an efficient
system
a. Less
b. Large
File hosted by educationobserver.com/forum
c. Equal
d. None of these
a. 8-key
b. 6-key
c. 5-key
d. 9-key
a. ITA 1
b. ITA 2
c. ITA 3
d. ITA 4
a. 00011
b. 00101
File hosted by educationobserver.com/forum
c. 00010
d. 10101
a. Line Feed
b. Light Feed
c. Line Format
d. None of these
85.The basic idea behind coding was really workable if number of characters it had to handle
do not require more than
a. 8 characters
b. 16 characters
c. 32 characters
d. 64 characters
a. Characters
b. Punctuation marks
e. All of these
a. Inside computer
b. Outside computer
c. Both a & b
d. None of these
d. Unicode
e. Manchester Code
File hosted by educationobserver.com/forum
g. Return to Zero(RZ)
j. MLT-3
k. 4B/5B
l. 5B/6B
m. All of these
a. UTF-7
b. UTF-8
c. UTF-16
d. UTF-32
e. UTF-EBCDIC
f. All of these
90.Binary Coded Decimal system makes use of a series of _____ to represent a decimal
number
a. 4
b. 8
c. 16
d. 32
e.
a. 8 bits
b. 4 bits
c. 16 bits
d. 32 bits
a. 8 bit
b. 4 bit
c. 16 bit
d. 32 bit
a. 3
b. 4
c. 2
d. 6
a. Zone
b. Digit
c. Byte
d. Bit
a. Zone
b. Digit
c. Byte
d. Bit
a. Characters belong
b. Integers belong
c. String belong
d. None of these
a. 64 bit
b. 7 bit
File hosted by educationobserver.com/forum
c. 16 bit
d. 32 bit
e.
a. 1964
b. 1965
c. 1963
d. 1966
a. Unicode Consortium
b. Unique Consortium
c. Unicode Constant
d. None of these
101.Unicode is appeared in
a. 1992
b. 1991
c. 1993
d. 1994
a. Unicode 1.0
b. Unicode 2.0
c. Unicode 3.0
d. None of these
a. 2005
b. 2006
c. 2007
d. 2004
104.In Unicode there were codes for representing characters and their basic graphical
representation are known as
a. Graphical
File hosted by educationobserver.com/forum
b. Graphemes
c. Graphs
d. None of these
105.The first 256 code points belong to __________ for conversion to Roman Text
a. ISO 5589-1
b. ISO 5569-1
c. ISO 5579-1
d. ISO 5559-1
c. Both a & b
d. None of these
107.Every communication channel has a ________ which is defined as the frequency range
a. Channel
b. Bandwidth
c. Carrier
d. Data rate
a. Physical
b. Logical
c. Both a & b
d. None of these
a. 1M
b. 2M
c. 3M
d. 4M
110.Data rate that can be achieved using a channel depends on the _____________ of a
channel
File hosted by educationobserver.com/forum
a. Frequency
b. Bandwidth
c. Data rate
d. Capacity
a. Anti-Aliasing
b. Aliasing
c. Channel
d. Bandwidth
d. None of these
a. 1
b. 2
c. 3
d. 4
a. Analog
b. Digital
c. Both a & b
d. None of these
b. Discrete form
c. Both a & b
d. None of these
b. Discrete form
c. Both a & b
d. None of these
a. Analog Modulation
b. Analog Manipulation
c. Amplitude Modulation
d. Analog Modeling
a. Frequency Modulation
b. Fourier Manipulation
c. Frequency Manipulation
d. Frequency Modeling
a. 4000Hz
b. 5000Hz
c. 6000Hz
d. 3000Hz
a. 2MHz
b. 4MHz
c. 6MHz
d. 8MHz
e. All of these
File hosted by educationobserver.com/forum
d. All of these
a. Analog
b. Digital
c. Both a & b
d. None of these
124.SS7 means
a. Signal Source7
b. Signaling source7
c. Signaling system7
d. Signal system7
125.SS7 is a
a. System
b. Source
c. Protocol
d. None of these
126.The PSTN provides a _________ path between the destination and source
a. Logical
b. Physical
c. Both a & b
d. None of these
a. Controlling network
d. All of these
File hosted by educationobserver.com/forum
129.SSPs uses Query Service Control Point (SCP) database using Packet switches called
a. Asynchronous
b. Synchronous
c. Synchronization
d. None of these
a. Asynchronous systems
d. All of these
a. Start
b. Stop
c. Start-stop
d. None of these
a. 20MHz
b. 15MHz
c. 10MHz
d. 5MHz
e.
a. Absence
b. Presence
c. Both a & b
d. None of these
a. Rest Condition
File hosted by educationobserver.com/forum
b. Neutral Point
c. Both a & b
d. None of these
a. less
b. more
d. none of these
a. Rest
b. Zero
c. Neutral
d. None of these
a. 2
b. 3
c. 4
d. 5
d. None of these
a. ANSI X3T9.7
b. ANSI X5T9.6
c. ANSI X3T9.5
d. ANSI X6T9.5
144.FDDI uses ANSI X3T9.5 for obtaining 100Mbps from a signal of ______
File hosted by educationobserver.com/forum
a. 32.25MHz
b. 31.25MHz
c. 31.24MHz
d. 32.26MHz
a. Block coding
b. Bit coding
c. Byte coding
d. Block character
a. 1000MHz
b. 100MHz
c. 10MHz
d. 99MHz
147.The 5B/6B scheme encodes the scrambled 5-bit data pattern into predetermined _____
bit symbol
a. 5
b. 4
c. 6
d. 3
a. Audio
b. Video
c. Music
d. Data
File hosted by educationobserver.com/forum
e. All of these
150.The modulation/demodulation is a
a. Linear process
b. Non-linear process
c. Both a & b
d. None of these
a. Special character
b. Start bit
c. Stop bit
d. None of these
a. STN
b. SYN
c. SBN
d. SRN
a. 01001111
b. 10001110
c. 00010110
d. 00110011
a. 2bit
b. 4bit
c. 8bit
d. 16bit
a. 100MHz
b. 10MHz
c. 1000MHz
File hosted by educationobserver.com/forum
d. 10000MHz
a. 1
b. 0
c. Both a & b
d. None of these
a. 10
b. 100
c. 1000
d. 10000
a. Audio
b. Music
c. Video
d. Data
e. All of these
159.Modulation/ demodulation is a non linear process where two different sinusoids are
_________
a. Addition
b. Subtraction
c. Multiplied
d. Division
a. Once
b. Twice
c. Thrice
d. None of these
161.The frequencies that comprise the message (base band) are translated into a _________
File hosted by educationobserver.com/forum
range of frequencies
a. Lower
b. Higher
c. Zero
d. None of these
162.Modulation also reduces the size of antenna for higher frequencies with ________
frequency
a. Lower
b. Greater
c. Middle
d. None of these
a. Even
b. Odd
c. Both a & b
d. None of these
164.Harmonics are the _________ of the frequency, that is the message frequency
a. Addition
b. Subtraction
c. Multiply
d. Division
a. Radio wave
b. Light wave
c. Both a & b
d. None of these
166.The amplitude of carrier frequency ________ in accordance with the modulated signal
b. Change
d. None of these
b. Change
d. None of these
a. DSB-SC
b. DBS-CS
c. BDS-SC
d. BSD-CS
a. Direct data
b. Digital data
c. Device data
d. None of these
a. 32Kbps
b. 64Kbps
File hosted by educationobserver.com/forum
c. 128Kbps
d. 256Kbps
a. Less
b. Middle
c. High
d. None of these
174.In digital signal the main source of noise is ___________, which introduces as the finite
number of quantization levels during the conversion to PCM code
a. Quantization noise
b. Equalization noise
c. Digital noise
d. None of these
175.The main parameters in determining the quality of a PCM system are the
a. Dynamic range
b. Signal-to-Noise Ratio(SNR)
c. Both a & b
d. None of these
a. Original level
b. Quantized level
c. Both a & b
d. None of these
177.The maximum error occurs when the original level falls exactly halfway between ______
quantized levels
a. 2
b. 3
c. 4
d. 1
File hosted by educationobserver.com/forum
c. Both a & b
d. None of these
179.For a six bits system the dynamic range will be approximately equal to ___
a. 34dB
b. 36dB
c. 40dB
d. 38dB
180.In dynamic range, the largest voltage amplitude is _______ the smallest voltage
amplitude
a. 32times
b. 64times
c. 125times
d. 256times
a. Slope overload
b. Granular noise
c. Both a & b
d. None of these
a. Telephone lines
b. Television lines
c. Digital lines
d. None of these
a. Digital media
b. Analog media
c. Both a & b
File hosted by educationobserver.com/forum
d. None of these
184.In the case of telephone lines, the usable bandwidth falls in the range of _______
a. 300Hz to 3000Hz
b. 300Hz to 3300Hz
c. 30Hz to 3300Hz
d. 33Hz to 3300Hz
a. 0
b. 1
c. both a & b
d. none of these
h. All of these
a. Signals
c. Both a & b
d. None of these
188.Telephone lines limit amplitude changes to some _________ changes per second
a. 3000
b. 3300
c. 3100
d. 3330
File hosted by educationobserver.com/forum
189.In the Frequency Shift keying, the frequency of the carrier signal is changed according to
the data
a. Modulation
b. Data
c. Signals
d. None of these
190.In the Phase Shift Keying method a sine wave is transmitted and the phase of the sine
wave carries the ______
a. Analog data
b. Digital data
c. Signal data
d. None of these
a. 0
b. 45
c. 90
d. 180
a. 0
b. 45
c. 90
d. 180
d. None of these
d. None of these
195.In the differential phase shift keying, For a 0 the modem shifts the phase of each
succeeding signal in a certain number of degrees
a. 0
b. 45
c. 90
d. 180
196.In the differential phase shift keying, For a 1 the modem shifts the phase of each
succeeding signal and a different certain number of degrees
a. 0
b. 90
c. 180
d. 270
197.In binary phase shift keying, the case of 4 different phase shifts, where each symbol
represents ____, the modulation technique is called quadrature PSK(QPSK)
a. 2 bits
b. 4 bits
c. 8 bits
d. 16 bits
198.In binary phase shift keying, the case of 8 different phase shifts, where each symbol
represents ____, the modulation technique is called
a. QPSK
b. 8PSK
c. 8QAM
d. 8FSK
a. Decibel
b. Baud
c. Hertz
a. 0
b. 45
c. 90
d. 180
a. Linear process
b. Non-linear process
c. Both a & b
d. None of these
202.The FM is considered as a
a. Linear process
b. Non-linear process
c. Both a & b
d. None of these
a. Amplitude Modulation
b. Frequency Modulation
c. Angle Modulation
a. Frequency
b. Phase
c. Both a & b
d. None of these
e.
a. 21Kbps
b. 24Kbps
c. 64Kbps
File hosted by educationobserver.com/forum
d. 65Kbps
206.In data communication using computers ,________ signal are normally converted into
PCM
a. Analog
b. Digital
c. Both a & b
d. None of these
a. Analog
b. Digital
c. Both a &b
d. None of these
208.________ is a process where multiple analog message signals or digital data streams are
combined into one medium over a shared medium
a. Multiplexing
b. Modulation
c. Encoding technique
d. De-multiplexing
e. All of these
210.In which , Multiple channels are combined onto a single aggregate signal for
transmission
a. Bandwidth
b. Signal
c. Frequency
d. None of these
212._________ was the foremost multiplexing scheme to have the benefits of wide scale
network deployment and till today, such systems are still in use and are used with analog
transmission
e. Both b & c
f. Both a & b
g. Both c & d
214._______ provides a means for merging data from the varied sources into a single
channel to support communication over a microwave system , satellite system or a
telephone lines
a. Synchronous TDM
b. Asynchronous TDM
c. Both a & b
File hosted by educationobserver.com/forum
d. None of these
e.
216.In which type of TDM , a single channel is divided into time slots and each transmitting
device is assigned for least one of the time slots for its transmission
a. Synchronous TDM
b. Asynchronous TDM
c. Both a & b
d. None of these
a. Statistical TDM
b. Static TDM
c. Dynamic TDM
d. None of these
a. FDM
b. TDM
c. CDM
d. None of these
219.In which way of multiplex ,the whole amount for a certain amount of time is provided to
the user and all user uses the same frequency but at different time
a. FDM
b. TDM
c. CDM
d. None of these
a. CDM
b. FDM
c. STDM
d. CDMA
b. Ultra –Half-Form
c. Ultra- High-Frequency
d. Ultra-Half-Frequency
222.________ may be defined as the form of multiplexing where the transmitter encodes the
signal using a pseudo random sequence
a. CDM
b. FDM
c. STDM
d. CDMA
a. Bit rate
b. Data rate
c. Baud rate
d. Chip rate
224.If one or more bits are transmitted at the same frequency are called
a. Frequency doping
b. Frequency hopping
c. Frequency hoping
d. Frequency hipping
d. All of these
a. 1963
b. 1989
c. 1979
d. 1958
File hosted by educationobserver.com/forum
227.In CDMA system ,all user transmit in the ______ bandwidth simultaneously
a. Different
b. Same
c. Both a & b
d. None of these
e.
a. More secure
c. Both a & b
d. None of these
e.
229.A CDMA call starts with a standard rate of ___________ bits per second
a. 9500
b. 9200
c. 9300
d. 9600
d. Both a & b
231.In spread spectrum technique, a receiver is only capable of selecting the desired signal if
it has the knowledge about the code of the intended
a. Receiver
b. Transmitter
c. Both a & b
d. Signal
e. All of these
a. Hipping
b. Hyping
c. Harping
d. Hopping
236.________ is best known spread spectrum technique in which a pseudo random noise
code multiples the signal
a. FHSS
b. FCSS
c. DSSS
d. DHSS
237.A pseudo random noise code is a sequence of chips valued________ with noise-like
properties
a. -1 and1(polar)
b. 0 and 1(non-polar)
c. Both a & b
File hosted by educationobserver.com/forum
d. None of these
e.
a. FDM
b. Dwell
c. Dowel
d. Dowry
e.
a. FDM
b. TDM
c. CDM
d. Both a & b
e.
a. Data
b. Audio
d. All of these
a. System
b. Carrier
c. Carrier system
d. None of these
a. Bell Laboratory
b. Hell Laboratory
c. Dull Laboratory
d. None of these
File hosted by educationobserver.com/forum
a. Japan
b. North America
c. Both a & b
d. None of these
a. T1
b. E1
c. DS0
d. DS1
a. Direct Service-Level 1
b. Digital Service-Level 1
c. Double Service-Level 1
d. Digital Slide-Level 1
a. North America
b. Japan
c. South Korea
d. All of these
a. 24 channels
b. 26 channels
c. 28 channels
d. 30 channels
a. Timeslots
b. DS0
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
a. 68Kbit/s
b. 64Kbit/s
c. 62Kbit/s
d. 70Kbit/s
250.DS1 is full-duplex circuit in which the circuit does concurrent transmission and
reception at a data rate of ___
a. 1.533Mbit/s
b. 1.544Mbit/s
c. 1.566Mbit/s
d. 1.555Mbit/s
251.By sampling each 8-bit frame for 8000 times per second, total bandwidth achieved is
________
a. 1.537Kbit/s
b. 1.536Kbit/s
c. 1.538Kbit/s
d. 1.539Kbit/s
a. Super Frame(SF)
c. Both a & b
d. None of these
253.Framing channel has been divided into two each with ______ in Super Frame
a. 2Kbit/s
b. 3Kbit/s
c. 4Kbit/s
d. 6Kbit/s
a. 10
b. 12
File hosted by educationobserver.com/forum
c. 14
d. 16
255.There are _____ contiguous frames of 193-bit each in a Extended Super Frame
a. 20
b. 22
c. 24
d. 26
256.Framing channel has been divided into two each with _______ in Super frame
a. 2Kbit/s
b. 4Kbit/s
c. 6Kbit/s
d. 8Kbit/s
a. Terminal frame
b. Signaling frame
c. Super frame
d. Switching frame
e.
a. Terminal frame
b. Signaling frame
c. Super frame
d. Switching frame
e.
259.Alignment of terminal is carried out with frames having _______ in the super frame
a. Even-number
b. Odd-number
c. Prime-number
d. None of these
260.A frame having _________ in the super frame is used for signaling alignment of frame
File hosted by educationobserver.com/forum
a. Even-number
b. Odd-number
c. Prime-number
d. None of these
a. 1.566Mbit/s
b. 1.544Mbit/s
c. 1.555Mbit/s
d. 1.533Mbit/s
a. AMI
b. LAN
c. DS1
d. CEPT
263.AMI means
a. Bandwidth
b. Signal
c. Both a & b
d. None of these
265.CEPT means
d. None of these
266.CEPT after ten years of launch of T1 system used _____ for framing known as European
File hosted by educationobserver.com/forum
E1
a. 2bits
b. 4bits
c. 8bits
d. 16bits
a. 2.084Mbps
b. 2.048Mbps
c. 2.044Mbps
d. 2.088Mbps
a. 30
b. 32
c. 34
d. 36
269.32 time slots implements an individual communication channel supporting a bit rate of
________
a. 60Kbps
b. 62Kbps
c. 64Kbps
d. 66Kbps
a. 128bits
b. 256bits
c. 64bits
d. 192bits
271.Which is used to exchange information over the E1 carriers that connect remote zones
b. Cell Relay
c. Both a & b
File hosted by educationobserver.com/forum
d. None of these
e.
a. T-carrier system
b. E-carrier system
c. Both a & b
d. None of these
e.
a. T-carrier system
b. E-carrier system
c. E1 system
d. T1 system
274.ITU-T finds wide use all over the world except three nations namely
275.PDH means
276. In 32 timeslots of E1, only ___ are used two of these are used for framing and signalling
call setup
a. 20
b. 15
c. 30
d. 40
File hosted by educationobserver.com/forum
277.High quality of call is ensured since transmission takes place with a constant
a. Latency
b. Capacity
c. Both a & b
d. None of these
a. TS16
b. TS15
c. TS14
d. TS13
a. Teardown
b. Call setup
c. Both a & b
d. None of these
280.E1 is different from earlier T-carrier systems since all ___ of every sampling are available
for every call
a. 4bits
b. 8bits
c. 16bits
d. 32bits
a. Bounded(guided) media
b. Unbounded(unguided) media
c. Both a & b
d. None of these
a. Twisted pair
b. Coaxial cable
d. All of these
d. all of these
a. Physical conductor
c. Logical conductor
d. Both a & b
a. Copper
b. Glass
c. Both a & b
d. None of these
e.
a. Microwave
b. Satellite
c. Infrared
a. Radio
b. TV
c. Cellular phones
d. All of these
a. Satellite signal
b. Satellite relay
File hosted by educationobserver.com/forum
c. Analog signal
d. Digital signal
c. Both a & b
d. None of these
a. Mutual interference
c. Both a & b
d. None of these
291.PDAs means
292.ADSL means
293.A pair of copper wires twisted together and wrapped with a plastic coating as a twisted
pair and which has a diameter of ____:
a. 0.2-0.6
b. 0.4-0.7
c. 0.2-0.8
d. 0.4-0.8
a. Teflon(r)
File hosted by educationobserver.com/forum
b. Flouropolymer resin
c. Polyvinyl chloride
d. Polyethylene
e. All of these
f.
a. 24Kbps
b. 28Kbps
c. 30Kbps
d. 32Kbps
e.
a. Copper medium
b. Copper signal
c. Copper set up
d. None of these
e.
297.The unshielded twisted pair states the link between the end in the communication closet
and the outlet which is further restricted to
a. 60metres
b. 90metres
c. 100metres
d. 190metres
a. 2 to 240
b. 2 to 4200
c. 2 to 2400
d. None of these
a. Bandwidth is lower
File hosted by educationobserver.com/forum
b. Bandwidth is higher
c. Bandwidth is limited
d. Bandwidth is dynamic
a. 1 pair
b. 2 pairs
c. 3 pairs
d. 4 pairs
a. 2 pairs
b. 3 pairs
c. 4 pairs
d. 5 pairs
a. 52.5/125
b. 72.5/125
c. 62.5/125
d. 82.5/125
a. Flexibility
b. Cost-effective media
d. All of these
305.LED means
a. Spacing of amplifiers
e. All of these
a. 10BASE5
b. 10BASE2
c. 10BASET
d. All of these
a. Baseband
b. Broadband
c. Both a & b
d. None of these
a. Thicker
b. Thinner
c. Heavy
d. Bulky
a. Thick
b. Heavy
c. Bulky
d. All of these
File hosted by educationobserver.com/forum
311.Twin axial cables contains _____ such configurations within a single cable sheath
a. 2
b. 3
c. 4
d. 5
c. Both a & b
d. None of these
313.The bandwidth is typically ________ over a length of one kilometer of fibre expressed as
‘MHz-Km’
a. 10 to 20
b. 20 to 30
c. 30 to 40
d. 40 to 50
314.In which multimode fibre, light is refracted by an increasing amount as it moves away
from the core
d. All of these
c. Both a & b
d. None of these
d. All of these
318.In which multimode fibre , different wavelength of light travel at a different speeds
d. All of these
b. Lowest cost
d. All of these
b. Large bandwidth
f. All of these
a. Light sources
b. Cables
c. Light detectors
d. All of these
a. Repeater
b. EMI
c. RMI
d. RFI
323.EMI/RFI means
d. None of these
324.Monomode fibre optic systems routinely are capable of transmitting signal over distances
in excess of
a. 250Km
b. 350Km
c. 225Km
d. 325Km
325.CAD means
d. None of these
a. Wired
b. Wireless
c. Both a & b
d. None of these
a. Attenuation
b. Distortion
c. Noise
d. All of these
329.___________ is the loss of the signal power while traversing a transmission media
including electronic circuitry
a. Attenuation
b. Distortion
c. Noise
d. None of these
a. Hertz
b. Micro
c. decibel
d. Kilometer
c. Both a & b
d. None of these
a. Loss
File hosted by educationobserver.com/forum
b. Gain
d. None of these
a. Loss
b. Gain
d. None of these
e.
b. Transmitter powers
c. Modulation techniques
e. Atmospheric conditions
f. All of these
a. Atmospheric conditions
b. Modulation techniques
c. Operating frequency
d. Operating system
336.Equalizing devices are ________ at intermediate points to keep the shape of the signal
intact
a. Created
b. Inserted
c. Modified
d. Deleted
337.Data processing and transmission systems experience errors due to several reasons
d. All of these
338.The main constraints are due to the physical medium that produces
a. Noise
b. Distortion
c. Attenuation
d. Dropouts
e. All of these
339.The digital signals do not suffer from ___________ but they are susceptible to dropouts
a. Noise
b. Distortion
c. Both a & b
d. None of these
d. All of these
341.SECDEC means
b. Burst Errors
c. Both a & b
d. None of these
e.
File hosted by educationobserver.com/forum
a. Inductance
b. Capacitance
c. Resistance
d. All of these
c. Both a & b
d. None of these
a. Causes the amplitude of the signal to reduce and therefore loss of power
c. Both a & b
d. None of these
a. Burst errors
c. Both a & b
d. None of these
e.
a. Burst errors
c. Both a & b
d. None of these
348.ENQ means
a. Enquiry
b. Encryptions
c. Enquire
File hosted by educationobserver.com/forum
d. None of these
350.NAK means
a. None Acknowledge
b. Noise Acknowledge
c. Negative Acknowledgement
d. Network Acknowledgement
351.The No of bits that get affected in burst errors depends upon the
c. Both a & b
d. None of these
a. correction of errors
b. detection of errors
c. Redundancy check
d. All of these
a. Parity check
c. Checksum
d. All of these
e.
a. CRC
File hosted by educationobserver.com/forum
b. Parity check
c. Checksum
d. All of these
e.
355.Which redundancy process can detect the more than 95 per cent of all errors
a. CRC
b. Parity check
c. Checksum
d. All of these
356.CRC means
d. None of these
d. None of these
a. Signal attenuation
b. Signal bandwidth
c. Frequency
d. Data rate
a. 1
b. 2
c. 3
d. 4
File hosted by educationobserver.com/forum
c. Both a & b
d. None of these
1. The device used for splits data into frames and then combines frames into data in frame
relay is termed as
b. Framing
c. Both a & b
c. Both a & b
d. None of these
b. Flips of bits
e. All of these
a. Header
b. Trailer
c. Both a & b
d. None of these
a. DLCI-10bits
c. DE-1 is set for the part that can be discarded first when congestion occurs
e. All of these
6. Which is a simple data link protocol based on certain ideal assumptions to explain the
working of the data link layer
a. Stop ARQ
b. Wait ARQ
c. Go back-N ARQ
d. Both a & b
b. Half Duplex
e. All of these
d. HDLC
d. None of these
c. Both a & b
d. None of these
a. easy to Implement
c. Both a & b
d. None of these
d. All of these
13. Which protocol enables the source machine to possess more than one outstanding frame
at a time by using buffers
a. Stop ARQ
b. Wait ARQ
c. Go back-N ARQ
d. Both a & b
a. PAR
b. PER
c. PRA
d. DAR
15.Another important issue in the design if the data link is to control the rate of data
transmission between _____________
d. None of these
File hosted by educationobserver.com/forum
16.Which one is the important protocol used by the data link layer
a. Sliding protocol
d. None of these
a. Window
b. Sending window
d. Sliding window
18.Which protocol is for data transmission and is bi-directional, used in the data link layer
that corresponds to layer 2 of OSI model
a. Sending window
d. Sliding window
19.Sliding window protocol keeps record of frame sequences sent and acknowledged when
communication takes place between ____________
a. Users
b. Two users
c. More users
d. None of these
d. None of these
21.Which is used by many users to establish their home PC to the Internet via a phone-line
connection
a. FTP
File hosted by educationobserver.com/forum
b. PPP
c. OSI
d. PAR
e.
22. Sliding window protocol works on _________ in which there is simultaneous two-way
communication
a. no duplex
b. half duplex
c. full duplex
d. single duplex
e.
a. Data frame
b. Acknowledgement frame
c. Both a & b
d. None of these
24.Another improvement is done over this ‘stop and wait’ type protocol by use of ________
a. Back
b. Piggybacking
c. Piggy
d. None of these
25.A technique in which acknowledgement is temporarily delayed and then hooked onto next
outgoing frame is known as
a.
b. Back
c. Piggybacking
d. Piggy
e. None of these
a. Go back n
b. Selective repeat
c. Selective reject
d. All of these
a. A wait approach
b. A stop approach
c. Both a & b
d. None of these
a. Bit-oriented
b. Byte-oriented
c. Both a & b
d. None of these
e.
30.HDLC provides
a. Switched protocol
c. Both a & b
d. None of these
a. ADCCP
b. SDLC
c. ISO
d. OSI
a. ADCCP
b. SDLC
c. ISO
d. FRAD
33.Which is another subset of HDLC that finds use in packet switched networks of ITU-TS
X.25
a. ADCCP
b. SDLC
d. None of these
34.In HDLC three types of stations are specified by the data link layer
a. Primary Station
b. Secondary Station
c. Combined Station
d. All of these
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. All of these
36.Frames of secondary station are known as _________ are sent only on request by the
primary station
a. Response
b. Responses frame
c. Both a & b
d. None of these
a. Frame
c. HDLC
File hosted by educationobserver.com/forum
d. Frame relay
38.A configuration has at least two combined stations in which every station has equal and
complimentary responsibility known as __________________
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. None of these
39.Balanced configurations find use only in the such cases as given below
c. Both a & b
d. None of these
40. A configuration has one primary station and at least one secondary station , and it exists
as one station exercises control over other stations known as ________
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. None of these
a. Two independent
b. Unbalanced stations
d. All of these
e.
a. 1
b. 2
c. 3
d. 4
e.
File hosted by educationobserver.com/forum
43.The protocol and data are totally independent, this property known as ____________
a. Transmission
b. Transparency
c. Transparent
d. Transport
a. Data loss
b. Data duplication
c. Data corruption
d. All of these
45.How many modes of operations are defined for the HDLC protocol
a. 2
b. 3
c. 4
d. 5
d. All of these
47.In primary station initializes links for controlling the data flow between ___________
b. Error control
d. All of these
a. Point
b. Point-to-point
c. First-to-end-point
d. None of these
File hosted by educationobserver.com/forum
a. Three fields
b. Four fields
c. Five fields
d. Six fields
e.
a. 01111111
b. 01111110
c. 11101110
d. 11101110
51.In the HDLC protocol, every frame consists of __________ with a flag
a. Starts
b. End
c. Both a & b
d. None of these
52.A 8-bit address is used when the total number of stations exceeds _______
a. 64
b. 128
c. 256
d. None of these
a. Long
b. Empty
c. Full
d. Both a & b
c. Both a & b
File hosted by educationobserver.com/forum
d. None of these
a. 4bit
b. 16bit
c. 32bit
d. 64bit
e. All of these
a. SLIP
b. X.25
c. Both a & b
d. None of these
e.
58.PPP was designed to work with layer 3 network layer protocols including ___________
a. IP
b. IPX
c. Apple talk
d. All of these
e. All of these
a. HDLC
b. PPP
c. IP
d. IPX
61.RAS has an important role in the proliferation of Internet based services in the form of
_________________
a. VoIP
b. Data over IP
c. Both a & b
d. None of these
62.Which is opening new challenges in the development of RAS where VoIP enabled RAS are
the need of time
a. Voice convergence
b. Data convergence
d. None of these
d. Dedicated line
e. All of these
a. Communication
b. Communication server
c. Layer
d. None of these
a. Enterprise
b. Infrastructure
File hosted by educationobserver.com/forum
c. Both a & b
d. None of these
a. Encapsulating datagrams
d. All of these
a. DTE
b. DCE
c. Both a & b
d. None of these
a. RS232C
b. RS-423
c. Both a & b
d. None of these
e.
70.In PPP, the default maximum length of the information field is ________
a. 1000bytes
b. 1500bytes
c. 2000bytes
d. 2500bytes
e.
71.The protocols that are differentiate PPP from HDLC are the
File hosted by educationobserver.com/forum
c. Both a & b
d. None of these
a. Link establishment
d. Configuration terminates
e. All of these
c. Both a & b
d. None of these
d. None of these
d. All of these
76.The NCP phase in PPP link connection process is used for establishing and configuring
different network layer protocols such as
a. IP
b. IPX
c. AppleTalk
File hosted by educationobserver.com/forum
d. All of these
a. NCP
b. LCP
d. All of these
c. Both a & b
d. None of these
b. The called peer can assign the caller one from a pool of addresses
c. Both a & b
d. None of these
80.If the calling peer does not have an IP address, it tells the
b. The called peer can assign the caller one from a pool of addresses
c. Both a & b
d. None of these
a. RADIUS server
c. Both a & b
d. None of these
82.The Authentication transaction used between a Remote access user and RAS can be divided
into two categories are
c. Both a & b
d. None of these
83.The digest is a
a. One-way encryption
84.The technology which is useful for creating Virtual Private Networks (VPNs) has been
developed by
a. Microsoft Corporation
b. U.S. Robotics
d. All of these
85.PPTP means
86.The PPTP is used to ensure that message transmitted from one VPN node to another are
a. Not secure
b. Secure
c. Networks
d. IPX
a. PPP
b. RAS
d. None of these
c. Both a & b
d. None of these
a. ADSL
b. Dialup POTS
c. ISDN
d. Other service
e. All of these
90.Which is a platform on which Internet service providers(ISP) and other service providers
enables their user to access the various internet based services
a. RAS
b. TCP
c. ARQ
d. SLIP
a. Resources
b. Information
c. Both a & b
d. None of these
2. The first operational computer network in the world was the _________ for the United
States Department of Defense
a. ARPANET
b. ERNET
c. SKYNET
d. DARPANET
e.
4. _______ is the technology that connects the machines and people within a site in a small
area
a. LAN
b. MAN
c. WAN
d. None of these
5. ______ is a network that covers geographic areas that are larger, such as districts or cities
a. LAN
b. MAN
c. WAN
d. None of these
e.
6. ______ is a network that this technology connects sites that are in diverse locations
a. LAN
b. MAN
c. WAN
d. None of these
a. LAN
b. MAN
c. WAN
d. Ring topology
8. ______ refers to tone signals used for various control purposes via the telephone network
a. SMS
b. DTMF
c. GSM
File hosted by educationobserver.com/forum
d. None of these
a. Small area
b. Large area
c. Both a & b
d. None of these
a. Hardware
b. Cabling protocols
c. Standards
d. All of these
e.
a. Ethernet
b. Token ring
c. Both a & b
d. None of these
12.The Institute of Electrical and Electronics Engineers established a project named IEEE
project 802 during the year _____
a. 1990
b. 1970
c. 1980
d. 1960
a. 2
b. 3
c. 4
d. 5
14.ISO revised these standards and reintroduced them as ISO 8802 standards during
____
File hosted by educationobserver.com/forum
a. 1977
b. 1987
c. 1997
d. 1999
a. IEEE 802.1- overview and relationship among the various IEEE standards
f. All of these
16.When compared with the OSI reference model, the IEEE standard contains the following
layers:
a. Physical layer
b. Medium access control(MAC) equivalent to the lower part of the OSI data link layer
c. Logical link layer(LAC) equivalent to the upper part of the data link layer
d. Network layer, the OSI network layer, that performs some of the higher order layer
functions
e. All of these
17.The 802.2 compatible interfaces provide two major types of services, which are
a. Unacknowledged
b. Connectionless
c. Both a & b
d. None of these
a. IBM of LAN
b. LAN of IBM
c. Both a & b
d. None of these
e.
File hosted by educationobserver.com/forum
a. Logical ring
b. Physical ring
c. Both a & b
d. None of these
e.
a. Four-byte
b. Three-byte
c. Two-byte
d. One-byte
21.Start of frame and end of frame are used to _______ the frame boundaries
a. Mark
b. Modify
c. Delete
d. Find
a. Frame technique
b. Frame type
c. Both a & b
d. None of these
a. Send messages
b. Send data
c. Delete data
File hosted by educationobserver.com/forum
d. Create data
25.The maximum length of this field is _______ when the address is _______
26.The maximum length of this field is _______ when the address is _______
a. Error correction
b. Error detection
c. Both a & b
d. None of these
e.
a. Sending station
b. Successor
c. Both a & b
d. None of these
29.Government agencies and local libraries often use a MAN to connect to private
a. Industries
b. Citizens
c. Both a & b
d. None of these
e.
b. Span a city
d. None of these
a. Telephone exchange
b. Computer wires
c. Both a & b
d. None of these
a. RS-232
b. X.25
c. Frame relay
e. ISDN
f. OC-3lines(155 Mbps)
34.WAN technologies function at the lower three layers of the OSI reference model
a. Physical layer
c. Network layer
d. All of these
e.
a. Local exchange
File hosted by educationobserver.com/forum
c. Both a & b
36. Packet switching technologies such as _____________ are used to implement WAN along
with statistical multiplexing
a. ATM
b. Frame relay
d. X.25
e. All of these
a. Long exchange
b. Local carrier
c. Both a & b
d. None of these
e.
a. Hardware
b. Protocols
c. Both a & b
d. None of these
e.
a. Hardware
b. Protocols(software)
c. Applications(useful software)
a. Education
b. Productivity
File hosted by educationobserver.com/forum
c. Enlightenment
d. All of these
41.The Government of India had set up ERNET in ______ to provide TCP/IP connections for
education and research communities in India
a. 1976
b. 1986
c. 1996
d. 1999
a. DISHNET
b. JAINTV
c. Mantra online
d. All of these
43.The other government organizations like _______________ to enter this field to bring the
Internet to common people
a. NIC
b. VSNL
c. MTNL
e.
44.The major network infrastructure available in the country has two types of WAN
a. Terrestrial WAN
b. VSAT WAN
c. Both a & b
d. None of these
e.
45.Following are different options for setting up the Intranet, education portal or e-
commerce, etc………….
a. Leased line
b. Dial Up connection
File hosted by educationobserver.com/forum
c. VSAT
d. Radio link
46. The networks can be broadly divided into three categories namely
a. Main frame
b. Dumb terminals
c. Both a & b
d. None of these
48.TC means
a. Terminal Computer
b. Terminal Controller
c. Technical Computer
d. None of these
a. Internetwork
b. Internet
c. Network
d. None of these
e.
a. Control packet
b. Data packet
c. Both a & b
d. None of these
51.A terminal controller may be used to integrate two or more terminals for connection with
File hosted by educationobserver.com/forum
d. Both a & b
d. None of these
a. ISDN
b. Leased Line
c. Frame relay
d. All of these
e.
54.Which function allows selection of the appropriate route based on IP header information
and sends packets through this route
a. Forwarding function
b. Filtering function
c. Both a & b
d. None of these
55.Which function allows dumping of invalid packets for a specific network instead of
forwarding
a. Forwarding function
b. Filtering function
c. Both a & b
d. None of these
a. Local routing
File hosted by educationobserver.com/forum
b. Static routing
c. Dynamic routing
d. Distributing routing
c. Both a & b
d. None of these
a. Fixed routing
b. Dynamic routing
c. Both a & b
d. Distributed routing
59.If routing information is automatically updated by routers when changes are made to the
network configuration are called
a.
b. Fixed routing
c. Dynamic routing
d. Both a & b
e. Distributed routing
60.The processing required to transferring a packet from the source host to the destination
host or to the relaying router are called
a. Fixed routing
b. Dynamic routing
c. Local routing
d. Distributed routing
e.
62.If two or more routers are connected to the same subnet, the network administration
determines which of the routers the messages should be sent to.. to eliminate this
problem._____ are used
a. MAC messages
b. ICMP messages
c. INDP messages
d. IMCP messages
e.
63.If two or more routers are available in distributed routing, which route should be selected
c. Link cost
d. Both b & c
64.If there is no any specific intention, the cost for a single link is usually set at ___
a. 1
b. 2
c. 3
d. 4
a. Distance-vector type
b. Link-state type
c. Both a & b
d. None of these
66. If there are two or more routes to reach the same destination at the same cost, which
method is applicable to determine how to select this route
c. Mixed method
File hosted by educationobserver.com/forum
d. All of these
67.The Mixed method remains _________ for the amount of processing required
a. Effective
b. Ineffective
c. Both a & b
d. None of these
68. A set of networks interconnected by routers within a specific area using the same routing
protocol is called
a. Domain
b. Backbone
c. Inter-domain router
d. All of these
a. Domain
b. Backbone
c. Inter-domain router
d. All of these
a. Domain
b. Backbone
c. Inter-domain router
d. All of these
a. Domain
b. Backbone
c. Inter-domain router
d. Higher-order domain
a. Operation domain
b. Backbone
File hosted by educationobserver.com/forum
c. Inter-domain
d. All of these
e.
73.Routing protocol in such an internet system can be broadly divided into two types named
c. Both a & b
d. None of these
c. Both a & b
d. None of these
d. All of these
76.________ are the algorithms are available to update contents of routing tables
a. Distance-Vector Protocol
b. Link-State Protocol
c. Both a & b
d. None of these
a. RIP
c. Both a & b
d. None of these
c. Both a & b
d. None of these
a. Small
b. Large
c. Medium
d. None of these
e.
a. Complex
b. Simple
c. Both a & b
d. None of these
82.Which protocol are used in link state type routing protocol developed for use in large scale
network
c. Both a & b
d. None of these
a. Packet type
b. Packet length
c. Router ID
d. Area ID
File hosted by educationobserver.com/forum
e. Authentication type
f. Authentication data
g. Version
h. Checksum
j. All of these
b. Internal router
d. All of these
a. Intra-area routing
b. Inter-area routing
c. Inter-domain routing
d. All of these
a. Serial Line IP
b. Standard Line IP
c. Serial Link IP
d. Standard Link IP
88.________ is used mainly for connection between LANs that are remotely located from one
another
a. SLIP
b. PPP
File hosted by educationobserver.com/forum
c. Both a & b
d. None of these
e.
89. _________ is used for connection between routers or equipment that must be highly
reliable
a. SLIP
b. PPP
c. Both a & b
d. None of these
c. Both a & b
d. None of these
a. 24Mbps
b. 2 Mbps
c. 4 Mbps
d. 8 Mbps
b. 2GHz bands
c. 5 GHz bands
d. All of these
93. A hub antennae is located at a _________ from where line-of-sight can be established
with the various terminal antennae.
a. Highest point
b. Lowest point
c. Central point
d. None of these
File hosted by educationobserver.com/forum
a. 1 to 2 Mbps
b. 2 to 3 Mbps
c. 3 to 4 Mbps
d. 4 to 5 Mbps
97._______ are wireless network standard with a data rate of only 2Mbps
a. IEEE802.11a
b. IEEE802.11b
c. IEEE803.11a
d. IEEE803.11b
a. IEEE802.11a
b. IEEE802.11b
c. IEEE803.11a
d. IEEE803.11b
99.IEEE802.11a and IEEE802.11b have a distance limitation up to _____ from the access
point router
a. 1000feet
b. 100feet
c. 101feet
File hosted by educationobserver.com/forum
d. 110feet
a. 1.4GHz
b. 2.4GHz
c. 3.4GHz
d. 4.4GHz
a. IEEE802.11g
b. IEEE803.11a
c. IEEE803.11b
d. IEEE802.11a
e.
a. User mobility
b. Device portability
c. Both a & b
d. None of these
e.
103.A user can access to the same or similar telecommunication services at different places
a. User mobility
b. Device portability
c. Both a & b
d. None of these
e.
a. Sensor
b. Mobile-phone
c. PDA
d. Embedded controller
e. Pager
File hosted by educationobserver.com/forum
f. Palmtop
g. Notebook
h. All of these
i.
105.The availability of _________ made the wireless communication popular among the
masses.
b. Digital switching
c. Both a & b
d. None of these
a. Cellular mobile
b. Cellular phone
c. Both a & b
d. None of these
a. Receiver
b. Transmitter
c. Both a & b
d. None of these
a. Use of radio
c. Both a & b
a. Modulation
b. Radiation
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
e.
110.A transmitter and an antenna are used to ____________ the modulated signal within
radio spectrum
a. Modulate
b. Radiate
c. Both a & b
d. None of these
e.
111.In telephone system as we know that a voice with bandwidth of approximately ____
modulates the current of a telephone line
a. 2kHz
b. 3 kHz
c. 4 kHz
d. 5 kHz
a. Radio transmission
b. Reception of signals
c. Both a & b
d. None of these
a. Reused
b. Used
c. Not be used
d. Not be reused
116.The shape of cell mat not be a ___________ and depends up on the environment
a. Hexagon
b. Circle
c. Pentagon
d. Both a & b
118.Frequencies for communication may vary from very high frequency to ________
a. Medium range
b. Microwave range
c. Digital range
d. None of these
e.
a. Amplitude
b. Frequency
c. Phase modulation
d. All of these
e. All of these
a. Higher capacity
d. More robust
f. Transmission area
g. All of these
d. All of these
a. Cell sizing
d. All of these
124.In the beginning around 1980, analog cellular telephone systems were developing in
___________
a. USA
b. UK
c. Europe
d. Japan
d. Spectral efficiency
e. ISDN compatibility
f. All of these
a. First generation
b. Second generation
c. Third generation
d. None of these
e.
a. 8.6kbps
b. 9.6kbps
c. 7.6kbps
d. 8.8kbps
129.The uplink and downlink frequencies for GSM are different and therefore a channel has
a pair of frequencies _______ apart
a. 70MHz
b. 80MHz
c. 90MHz
d. 60MHz
a. Duplex distance
b. Double distance
File hosted by educationobserver.com/forum
c. Triplex distance
d. None of these
131.In a channel the separation between adjacent carrier frequencies is known as channel
separation which is _______ in case of GSM
a. 100kHz
b. 200 kHz
c. 300 kHz
d. 400 kHz
a. Telephony
c. Call forwarding
d. Caller ID
e. Call waiting
f. All of these
b. ISDN
e. All of these
a. X.25
b. X.32
c. Both a & b
d. None of these
a. Telephony or teleservices
c. Supplementary services
File hosted by educationobserver.com/forum
d. All of these
a. Bearer
b. Teleservices
c. Both a & b
d. None of these
e.
137.Dual tone signals are used for various control purposes via the
a. Telephone network
c. Both a & b
d. None of these
a. 150
b. 160
c. 170
d. 180
a. CCIIT
b. CCITT
c. CCCIT
d. CCTTI
a. Telephony or teleservices
c. Supplementary services
d. All of these
e. All of these
a. Mobile station(MS)
d. Operation subsystem(OSS)
e. All of these
a. Mobile station
c. Both a & b
d. None of these
c. Operation subsystem
d. All of these
a. Mobile station(MS)
c. Both a & b
d. None of these
a. BSS
b. Cellular layout
File hosted by educationobserver.com/forum
d. All of these
148.MS contains a SIM card in the form of a very _______ inside the equipment
a. Large chip
b. Small chip
c. Both a & b
d. None of these
a. Base station
b. Antennas
c. Both a & b
d. None of these
e.
a. Cell sites
b. Cell systems
c. Cell forwarding
d. None of these
a. Pentagon
b. Hexagon
c. Both a & b
d. None of these
e.
152.The size of cells in case of GSM and Personal Communication Service(PCS) are much
File hosted by educationobserver.com/forum
a. 5Kms
b. 10Kms
c. 15Kms
d. 20Kms
a. Portions
b. Sectors
c. Cell sector
d. None of these
a. RBS
b. PCS
c. GSM
d. SIM
a. Antennas
b. Signal processors
c. Amplifiers
d. All of these
e.
156.Base station may also be placed near center of cell and known as
a. Excited cell
c. Center cell
d. None of these
157.The actual cell is the _____ hexagon, with the towers at the corners
a. Red
b. Blue
d. None of these
158.Antenna always transmits inward to each cell and area served depends on
a. Topography
b. Population
c. Traffic
d. All of these
d. All of these
a. BTS
b. BSS
c. BSC
d. Um
a. BTS
b. BSS
d. Um interface
e. Both c & d
a. FDMA
b. TDMA
c. CDMA
d. All of these
a. 25MHz
b. 35MHz
c. 24MHz
d. 20MHz
164.The FDMA channel are further divided in time with a burst period of approximately
_______ using a TDMA technique
a. 0.277ms
b. 0.377ms
c. 0.477ms
d. 0.577ms
165.The eight burst period are grouped into a TDMA frame which forms the basic unit for
definition of
a. Physical channel
b. Logical channel
c. Both a & b
d. None of these
a. Physical channel
b. Logical channel
c. Both a & b
d. None of these
a. GSM
b. No of base station
c. No of mobile station
d. Transmitter power
a. GSM
b. No of base station
c. No of mobile station
File hosted by educationobserver.com/forum
d. Transmitter power
a. BS(Base Station)
b. MS(Mobile Switch)
d. Both b & c
a. Mobile station
b. Base station
c. Transmitter station
d. None of these
a. MSCs
b. PSTN
c. ISDN
d. None of these
a. Switching
d. None of these
a. Registration
b. Handover
c. Authentication
d. Location updating
f. All of these
174.The MSC provided to establish link with other fixed networks termed as
a. Local MSC
File hosted by educationobserver.com/forum
b. Router MSC
c. Gateway MSC
d. Remote MSC
a. Interworking function(IWF)
d. SS7
e. All of these
c. Both a & b
d. None of these
c. Both a & b
d. None of these
e.
179.Subscriber’s all administrative information along with the current location in GSM
network including in database of HLR are
a. IMEI number
b. Directory number
c. Current city
File hosted by educationobserver.com/forum
f. All of these
180.HLR keeps the ____________ of each mobile that belongs to the MSC to which it is
interacting
a. Last location
b. First location
c. Current location
d. None of these
a. Delivery of calls
c. Both a & b
d. None of these
a. Static information
b. Dynamic information
c. Both a & b
d. None of these
c. Account status
d. All of these
184.The dynamic information is the _________ area of the mobile subscriber which is the
identity of the currently serving VLR
a. Last location
b. First location
c. Current location
File hosted by educationobserver.com/forum
d. None of these
a. MSCs
b. VLR nodes
c. Both a & b
d. None of these
e.
a. MSC
b. IMSI
c. TMSI
d. Roaming
e. All of these
187.In nutshell we can say that both the ___________work together to provide local
connections as well as roaming outside the local service area
a. HLR
b. VLR
c. Both a & b
d. None of these
e.
188.The operations and Maintenance Center oversees the all important for__________
a. Proper operation
d. All of these
189.Operation Subsystem also provides interface NSS via O-Interface that may be
__________
a. X.25 interface
b. X.32 interface
c. X.23 interface
File hosted by educationobserver.com/forum
d. None of these
e.
a. Authentication
c. Cryptographic codes
d. All of these
191.AuC is responsible for maintaining all data needed to authenticate a call and to encrypt
__________________
a. Voice traffic
b. Signaling messages
c. Both a & b
d. None of these
a. Security
b. Authentication
c. Both a & b
d. None of these
194.SIM card has a secret key for ________________ over the radio channel
a. Authentication
b. Encryption
c. Both a & b
d. None of these
e.
195.GSM network checks the __________________ of a mobile device through EIR database
File hosted by educationobserver.com/forum
a. Type
b. Serial number
c. Both a & b
d. None of these
e.
a. Manufacturing devices
b. Malfunctioning devices
c. Functioning devices
d. None of these
a. Mobile station
b. Base station
c. Both a & b
d. None of these
e.
a. 890-910MHz
b. 890-915MHz.
c. 890-901MHz
d. 890-911MHz
e.
a. 935-960MHz
b. 940-970MHz
c. 945-950MHz
d. 925-960MHz
a. Addition
b. Divide
File hosted by educationobserver.com/forum
c. Both a & b
d. None of these
a. Normal burst
b. Access burst
c. Synchronization burst
e. Dummy burst
f. All of these
b. Approximately 572ms
c. Approximately 567ms
d. Approximately 578ms
a. Frequency space
b. Guard space
c. Information space
d. Bandwidth space
204.Which is a dedicated time slots within a data or bit stream which repeats after a certain
period of time
a. Frequency
b. Amplitude
c. Channel
d. Normal burst
a. Dedicated channel
b. Common channel
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
a. Base station
b. Mobile station
c. Mobile switch
d. All of these
e.
207.When a slot repeated every 4.615ms constitute a _______ channel which can be split
into several logical channel
a. Logical
b. Physical
c. Both a & b
d. None of these
208. TDMA is used to split carrier frequency of 200kHz into_______ time slots
a. 4
b. 8
c. 16
d. 24
a. 125
b. 124
c. 248
d. 247
a. 125
b. 124
c. 248
d. 247
a. Logical channel
b. Physical channel
File hosted by educationobserver.com/forum
c. Both a & b
d. None of these
e.
a. 9.6kb/s
b. 4.8kb/s
c. 2.4kb/s
d. All of these
e.
a. 120ms
b. 130ms
c. 150ms
d. 160ms
214. How many frames are included for traffic in 26TDMA frames
a. 1
b. 24
c. 25
d. 16
215.How many frames are included for Slow Associated Control Channel(SACCH) in
26TDMA frames
a. 1
b. 24
c. 25
d. 16
216.How many frames are included for currently unused in 26TDMA frames
a. 1
b. 24
c. 25
d. 16
File hosted by educationobserver.com/forum
a. CCHs
b. TCH
c. Both a & b
d. None of these
e.
218.Depending upon the task performed by the Control Channels(CCHs),they are categorized
in
d. All of these
a. Idle mode
c. Both a & b
d. None of these
a. BCCH
b. CCCH
c. DCCH
d. All of these
a.
b. BCCH
c. CCCH
d. DCCH
e. All of these
File hosted by educationobserver.com/forum
f.
a. BCCH
b. CCCH
c. DCCH
d. All of these
a. Multiframe
b. Traffic-multiframe
c. Multiprogramming
d. None of these
224.Out of 26 frames, 24 are used for traffic, one is used for the __________ and one is
currently unused
c. BCCH
d. CCCH
a. 4.516ms
b. 4.615ms
c. 4.156ms
d. 4.165ms
a. 234.5ms
b. 233.5ms
c. 235.4ms
d. 235.3ms
a. hyperframe
b. lowerframe
c. strongerframe
d. none of these
a. Physical layer
d. All of these
229.In OSI model, the lower three layers usually terminate in the ______ but it is not true in
case of GSM
a. Another node
b. Same node
c. Two nodes
d. None of these
a. MS
b. BTS
c. BSC
d. MSC
e. All of these
231.Physical layer is the ___________ which provides transfer of bit streams over the
physical radio links through Um interface
a. Lowest layer
b. Highest layer
c. First layer
d. None of these
a. Creation of bursts
File hosted by educationobserver.com/forum
f. All of these
233.The digital modulation and security related issues such as encryption of digital data are
carried over the radio interface between ____________
a. MS
b. BTS
c. Both a & b
d. None of these
e.
234.The communication on Abis interface between _____ and BSC is established by using the
standard LAPD
a. MS
b. BTS
c. MTS
d. None of these
235.A reliable data link service is provided between _________ through Message Transfer
Part of SS7
a. BSC
b. MSC
c. Both a & b
d. None of these
e.
b. MM(Mobility management)
d. All of these
File hosted by educationobserver.com/forum
a. Location update
b. Authentication
d. Reallocation
e. All of these
f.
238.CM performs
a. Establishment
b. Maintenance
d. All of these
e.
a. Supplementary service(SS)
c. Both a & b
d. None of these
a. BSC
b. BSS
c. MSC
d. MTS
241.The radio resource management is used to establish physical connections over the call-
related signaling and traffic channels between the ______________
a. BSC
b. BSS
c. MS
d. Both b & c
242.The RR layer is the part of RR layer is implemented in the BTS to provide functions
File hosted by educationobserver.com/forum
a. BTS
b. BSC
c. MSC
d. Both a & b
a. Handover
b. Handoff
c. Both a & b
d. None of these
244.Which uses signal strength measurements and cell congestion information to determine
when a handoff should occur
a. MSC
b. BSS
c. BSC
d. Both a & b
245.Handoff notifications are sent to respective ____ which in turn forward them to HLRs
a. VLRs
b. VLCs
c. VCDs
d. LCDs
246.The mobility management sublayer on the _____ of the RR is terminated at the MSC
a. Low
b. Top
c. Center
d. First
247.MM is used to
a. Establish
b. Maintain
e. All of these
a. first-to-end
b. end-to-end
c. end-to-first
d. first-to-first
c. Both a & b
d. None of these
250.MAP is used between _________in the form of query and response messages
a. MSC
b. VLR
c. HLR
d. AuC
e. All of these
251.____________ Together with the MSC. Provide the call routing and roaming capabilities
of GSM where a subscriber can roam nationally and even internationally
a. HLR
b. VLR
c. CLR
d. Both a & b
a. MSISDN number
b. IMSI number
c. TMSI number
d. MSRN
c. Subscriber number
d. All of these
c. Subscriber number
d. All of these
a. MSISDN Number
b. IMSI Number
c. TMSI Number
d. MSRN
257.It sits inside SIM card, which can be carried out anywhere and can be used in any MS
a. MSISDN Number
b. IMSI Number
c. TMSI Number
d. MSRN
d. All of these
259.Which is used in the place of the IMSI for the definite identification and addressing of
File hosted by educationobserver.com/forum
a. MSISDN Number
b. IMSI Number
c. TMSI Number
d. MSRN
260.In TMSI nobody can determine the identity of the subscriber by listening to the
__________
a. Video channel
b. Radio channel
c. Audio channel
d. None of these
e.
261.GSM used the _______ byte TMSI for local subscriber identification
a. 2
b. 4
c. 6
d. 8
a. MSISDN Number
b. IMSI Number
c. TMSI Number
d. MSRN
c. The identification of the current MSC along with the subscriber number(SN)
d. All of these
c. Both a & b
d. None of these
265.___________ becomes necessary when mobile moves from area of one BSC into another
area of the same or into another BSC
a. Handoff
b. Handover
c. Haddon
d. Handwork
a. Intra-cell handover
e. All of these
267.Which involve the transfer of connections from one channel to another channel on the
same BTS
a. Intra-cell handover
268.Which involve the transfer of the connection from one BTS to another BTS on the same
BSC
a. Intra-cell handover
269.The connections is transferred between BTS belonging to two different BSCs within one
MSC is called
a. Intra-cell handover
270.Which involve the transfer of a connection to a BTS between two cells within another
MSC
a. Intra-cell handover
a. Internet
b. Internetwork
c. Network
d. Internetworking
a. Internet
b. Internetwork
c. Network
d. Internetworking
a. SMTP
b. PPP
c. TCP/IP
d. NNTP
a. Gateway
b. Router
c. TCP/IP
d. Both a & b
275.If single computer network is divided into segments and router are added between them
it forms an
File hosted by educationobserver.com/forum
a. Internet
b. Internetwork
c. Network
d. Internetworking
276.Which was used as original term for an internetwork which meant a method for
connecting networks with disparate technologies
a. Catenet
b. Bridge
c. PANs
d. Novell netware
b. Novell Netware
c. Both a & b
d. None of these
a. Different
b. Same
d. None of these
a. internet
b. Internet
c. Both a & b
d. None of these
a. internet
b. Internet
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
e.
a. TCP
b. UDP
c. IP
d. Both a & b
a. TCP
b. UDP
c. IP
d. Both a & b
a. IP
b. UDP
c. TCP
d. None of these
a. 0 to 245
b. 0 to 254
c. 0 to 255
d. 0 to 265
e.
286.__________ is used for every computer needs one protocol stack for communicating on
the Internet
a. Protocol stack
File hosted by educationobserver.com/forum
b. Protocol
c. Transmission protocol
d. None of these
287.Which protocol layer uses the protocols are WWW, HTTP, FTP, SMTP, e-mail etc
d. Hardware Layer
288.Which protocol uses TCP routes to an application on a computer by use of a port number
d. Hardware Layer
d. Hardware Layer
290.Which contains network interface cards, modems for phones or wireless lines for
converting binary packet data to network signals and vice versa
d. Hardware Layer
a. Bytes of data
b. Bits of data
c. Both a & b
d. None of these
292.Where is the TCP layer is situated in the application layer in the protocol stack
File hosted by educationobserver.com/forum
a. Below
b. Top
c. Center
d. None of these
a. Source computer
b. Destination computer
c. Both a & b
d. None of these
a. Textual
b. Not textual
c. None of these
d.
a. 16bit
b. 16byte
c. 32bit
d. 32byte
a. 80
b. 25
c. 23
d. 20/21
a. 25
b. 23
c. 20/21
d. 27960
a. 25
b. 23
c. 20/21
d. 27960
a. 25
b. 23
c. 20/21
d. 27960
a. 25
b. 23
c. 20/21
d. 27960
301.TCP is ______________
a. Connection-oriented
b. Reliable
c. Both a & b
d. None of these
e.
302.IP is ___________
a. Connectionless
b. Unreliable
c. Both a & b
d. None of these
e.
303.IP does not ensure movement of a packet to its destination and have no knowledge of
__________
a. Port numbers
b. Connections
File hosted by educationobserver.com/forum
c. Both a & b
d. None of these
e.
a. May
b. May not
d. None of these
e.
306.SMDS is a packet switched, high speed, connectionless public data service that extends
d. All of these
a. IEEE 802.5
b. IEEE 802.4
c. IEEE 802.6
d. IEEE 802.2
b. Broadband ISDN(B-ISDN)
c. Both a & b
d. None of these
a. 1.5Mbit/s
b. 45Mbits/s
c. 1.6Mbit/s
d. 46Mbit/s
e.
a. 1.5Mbit/s
b. 45Mbits/s
c. 1.6Mbit/s
d. 46Mbit/s
312.SMDS network also planned to link B-ISDN and SONET OC3 with a data rate of
a. 1.5Mbit/s
b. 45Mbits/s
c. 155Mbit/s
d. 1.9Mbit/s
313.SMDS is a
a. Data service
b. Telephone service
c. Frame service
d. Video service
314.SMDS is a
a. Technology
b. Protocol
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
e.
a. Continuous traffic
b. Finite traffic
c. Bursty traffic
d. All of these
a. Continuous traffic
b. Finite traffic
c. Bursty traffic
d. All of these
a. Country code
b. Area code
c. Subscriber code
d. All of these
a. Only area
b. Only nationally
c. Internationally
d. None of these
e.
320.Address of source and destination in SMDS both consists of 4 bit code followed by a
telephone no of max.
a. 12 decimal digits
File hosted by educationobserver.com/forum
b. 16 decimal digits
c. 15 decimal digits
d. 20 decimal digits
e.
c. Both a & b
d. None of these
a. 53 octets
b. 56 octets
c. 58 octets
d. 55 octets
e.
a. IEEE802.3
b. IEEE802.5
c. FDDI
d. All of these
a. Copper
b. Fiber media
c. Both a & b
d. None of these
325.In SMDS, with a tick every 10msec user can send_________ on the average
a. 100,000 bytes/sec
b. 10,000 bytes/sec
c. 100,0000 bytes/sec
d. 100,000,00 bytes/sec
File hosted by educationobserver.com/forum
a. SNMP
b. Scalability
c. Screening
d. Simple
e.
327. Which is a network protocol that is based on UDP and is a component of the component
of the Internet Protocol Suite, defined by IETF(Internet Engineering Task Force)
a. SNMP
b. Scalability
c. Screening
d. Multicasting
e.
328.The user can have access to high speed lines ______ connected to MAN
a. 32Mbits/s
b. 33Mbits/s
c. 34Mbits/s
d. 35Mbits/s
a. 151Mbits/s
b. 152Mbits/s
c. 154Mbits/s
d. 155Mbits/s
a. 139Mbits/s
b. 140Mbits/s
c. 155Mbits/s
d. 134Mbits/s
a. 34Mbits/s
File hosted by educationobserver.com/forum
b. 4Mbits/s
c. 10Mbits/s
d. 16Mbits/s
e. 25Mbits/s
a. LAN
b. MAN
c. WAN
d. PAN
a. Ethernet
c. Both a & b
d. None of these
334.SMDS networks have many underlying devices for supporting high-speed service are
b. Carrier equipment
d. All of these
a. PCs(Personal computers)
b. Intermediate nodes
c. Terminals
d. All of these
e.
a. Multiplexers
b. Modems
c. Routers
File hosted by educationobserver.com/forum
d. All of these
337.PDUs contain
a. Source address
b. Destination address
c. Both a & b
d. None of these
a. Group addressing
b. Security features
c. Both a & b
d. None of these
b. Address screening
c. Both a & b
d. None of these
a. Timesharing connection
b. Terminal connection
c. Both a & b
d. None of these
a. Low cost
b. High cost
c. Medium cost
File hosted by educationobserver.com/forum
d. All of these
a. Speed
b. Matching
c. Speed matching
d. None of these
344.In X.25 DTEs are not required to use the same line speed because of the
a. Store
d. All of these
345. In X.25, A host connected at 56kbps and communicating with numerous remote sites
can be linked with cheaper______ lines
a. 18.2kbps
b. 19.2kbps
c. 20.2kbps
d. 22.2kbps
a. Layer 2 to Layer 3
b. Layer 1 to Layer 2
c. Layer 1 to Layer 3
d. Layer 3 to Layer 2
347.Based on X.25 rules, how many logical channel can be set on a single physical line
a. 256
b. 16
c. 4096
d. 2556
e.
348.To enable control of 4096 logical channels in X.25, there are ____ channel groups
a. 256
File hosted by educationobserver.com/forum
b. 16
c. 4096
d. 2556
a. 256
b. 16
c. 4096
d. 2556
c. Both a & b
d. None of these
351.X.25 is a
a. Protocol
b. Data service
c. Telephone service
d. Technology
a. 1975
b. 1976
c. 1977
d. 1978
a. A node
b. A user device
c. Both a & b
d. None of these
a. DTE
File hosted by educationobserver.com/forum
b. DCE
c. Both a & b
d. None of these
355.A terminal of 1.2kbit/s can communicate with host computer at _______ through the
packet switched network
a. 9600bits/s
b. 8600bits/s
c. 7600bits/s
d. 6600bits/s
356.The transmission speed of sender should be ___________ as that of receiver in the X.25
a. Same
b. Different
c. Both a & b
d. None of these
a. Connectionless
b. Connection-oriented
c. Both a & b
d. None of these
a. Control packet
b. Data packet
c. Both a & b
d. None of these
e.
File hosted by educationobserver.com/forum
a. Frame field
b. Data field
c. Information field
a. 64bytes to 128bytes
c. 64bytes to 256bytes
d. 32bytes to 64bytes
d. None of these
d. All of these
a. First
b. Second
c. Third
d. Fourth
d. QLLC
File hosted by educationobserver.com/forum
a. 0 and 1025
b. 0 and 125
c. 0 and 256
d. 0 and 1023
e.
367.The device which splits data into frames as well as combines frames into data is referred
as
b. FDLC
c. HDLC
d. DLCI
368.Frame relay indicates network congestion using two flags namely ________ bits in data
frames
c. Both a & b
d. None of these
369.Cell relay is data transmission services that uses transmission technology referred to as
b. BTM
c. STM
d. DTM
a. Cell
b. Frame
c. Relay
d. Cell relay
a. High-speed transmission
File hosted by educationobserver.com/forum
b. Multiplexing transmission
c. Both a & b
d. None of these
b. High cost
c. Both a & b
d. None of these
a. One
b. Two
c. Three
d. Four
374.The part that corresponds to second layer, that is, data link layer is referred to as
a. DLC layer
b. ATM layer
c. STM layer
d. Protocol layer
a. Virtual Channels(VCs)
b. Virtual Paths(VPs)
c. Both a & b
d. None of these
a. Frames
b. Cells
c. Relay
d. Protocol
377.VP is a bundle of
a. VCs
File hosted by educationobserver.com/forum
b. VCM
c. VCI
d. VIP
378.Identifiers are called ___________________ are used to identify VPS and VCs
a. VCIs
b. VIPs
c. Both a & b
d. None of these
a. Two VP
b. Two VC
c. VP and VC
d. VP and VCI
380.ATM is an
a. International Telecommunication
b. International Telecommunication-Union
a. Connectionless
b. Interconnected
c. Connection oriented
d. None of these
382.In today ATM, separate networks are used to carry _________ information mostly
a. Voice
b. Video
c. Data
d. All of these
a. Continuous
b. Bursty
c. Discontinuous
d. None of these
a. 52bytes
b. 53bytes
c. 54bytes
d. 55bytes
a. Payload(48bytes)
b. Payment
c. Payroll
d. None of these
a. High speed
b. Low-delay multiplexing
c. Switching networks
d. All of these
387.ATM is specifically designed as ________ technology for voice, video, and data
a. Single
b. Double
c. Multiple
d. None of these
a. Different speeds
b. Traffic types
d. All of these
389.ATM cells coming from a user are guaranteed delivery at the other end with a
File hosted by educationobserver.com/forum
a. High probability
b. Low delay
c. Both a & b
d. None of these
a. The transport speeds of most ATM applications are most often 155Mbps and
622Mbps
b. ATM is a flexible service made possible by the size of the packets (cells).
c. The small cell size allows a variety of applications to run on ATM networks
including voice, video and data
d. All of these
a. Circuit-switched voice
b. Circuit-switched data
c. Low-speed packet
d. High-speed packet
e. All of these
a. Transmission service
b. Transport service
c. Transfer service
d. None of these
a. CCITT
b. ITU
c. Both a & b
d. None of these
394.Narrow band ISDN is a digital service where the transport speeds are ______ (T1) or less
a. 1.533Mbps
File hosted by educationobserver.com/forum
b. 1.544Mbps
c. 1.555Mbps
d. 1.552Mbps
395.The range of speeds for the broadband ISDN services usually range from ______ to the
Gigabit range
a. 24Mbs
b. 25Mbs
c. 26Mbs
d. 27Mbs
e.
397.BRA affords an ISDN user with simultaneous access to two _____ data channels
a. 32kbps
b. 64kbps
c. 128kbps
d. 256kbps
a. Terminal Adapters(TAs)
b. ISDN Bridges
c. ISDN Routers
d. All of these
a. Quality
b. Economy
c. Availability
d. All of these
File hosted by educationobserver.com/forum
e.
a. High rate-of-error
b. Low rate-of-error
c. Both a & b
d. None of these
e.
a. A-channel
b. B-channel
c. C-channel
d. F-channel
a. Voice
b. Data
c. Both a & b
d. None of these
a. 12Kbps
b. 14Kbps
c. 16Kbps
d. 18Kbps
404.The D-channel in BRA is used for sending and receiving signal between
a. User devices
b. ISDN
c. Both a & b
d. None of these
a. 144kbit/s
b. 145kbit/s
File hosted by educationobserver.com/forum
c. 146kbit/s
d. 147kbit/s
a. I.430
b. I.420
c. I.440
d. I.450
c. Both a & b
d. None of these
a. I.420
b. I.421
c. I.422
d. I.423
409.The CCITT eventually was reformed in to the group which is now called the ________
a. ITU-T
b. UIT-T
c. TIU-T
d. TUI-T
a. RJ-45 type plug and socket uses unshielded twisted pair cable
c. Both a & b
d. None of these
c. Both a & b
d. None of these
e.
a. One , two
b. Two, three
d. Three, two
a. 62kbps
b. 63kbps
c. 64kbps
d. 65kbps
a. 20+D
b. 30+D
c. 40+D
d. 50+D
a. 62kbps
b. 63kbps
c. 64kbps
d. 65kbps