BCA 4TH SEM COMPUTER NETWORK MCQ
1. Physical or logical arrangement of network is __________
a) Topology
b) Routing
c) Networking
d) Control
View Answer
Explanation: Topology in networks is the structure or pattern in which each and every node in the network is connected. There are many topologies in networking like bus, tree, ring, star, mesh, and hybrid topology. There is no particular best topology and a suitable topology can be chosen based on the kind of application of the network .
2. Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Explanation: In star topology, no computer is connected to another computer directly but all the computers are connected to a central hub. Every message sent from a source computer goes through the hub and the hub then forwards the message only to the intended destination computer.
3. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Explanation: In bus topology, there is a single cable to which all the network nodes are connected. So whenever a node tries to send a message or data to other nodes, this data passes through all other nodes in the network through the cable. It is really simple to install but it’s not secure enough to be used in most of the computer network applications.
4. Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
d) PAN
View Answer
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. WANs are used to connect cities, states or even countries. A wireless connection is required to build a WAN. The best example of WAN is the Internet.
5. Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) PAN
View Answer
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects computers in a small area such as schools, offices, residence etc. It is the most versatile kind of data communication system where most of the computer network concepts can be visibly used.
6. WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network
View Answer
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. These are used to connect cities, states or even countries. They can be connected through leased lines or satellites.
7. In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits
View Answer
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing.
8. _____ is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
View Answer
1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
View Answer
Explanation: Multiplexing is a method using which one can send multiples signals through a shared medium at the same time. This helps in using less resources and thus saving the cost of sending messages.
2. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
View Answer
Explanation: Circuit switching is a switching method by which one can obtain a physical path between end points. Circuit switching method is also called a connection oriented network. Two nodes must be physically and logically connected to each other to create a circuit switching network.
3. Which multiplexing technique used to transmit digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
View Answer
Explanation: TDM abbreviation for Time Division Multiplexing is a method used for digital signals. Whereas FDM and WDM abbreviation for Frequency Division Multiplexing, and Wavelength Division Multiplexing, are used for analog signals. TDM is used in applications like ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network).
4. If there are n signal sources of same data rate, then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n
View Answer
Explanation: In TDM, the total unit of time is divided equally among all the signal sources and each and every source has access to the complete channel bandwidth during its allotted time slot. When the time slot of the source is not active, it remains idle and waits for its slot to begin.
5. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
View Answer
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
6. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period
View Answer
Explanation: There are instances when connection between two endpoints has been established, but no communication or transfer of messages occurs. This period of time is called silent period. The silent period ends when either of the two endpoints starts the communication.
7. Multiplexing provides _________
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy
View Answer
Explanation: Multiplexing helps us to transfer our messages over a shared channel. This brings up the issue of privacy and efficiency. Fortunately, Multiplexing has high efficiency and high privacy when implemented because in the implementation, the transport layer of the OSI network model handles the function of multiplexing through interfaces called ports which provide the required efficiency and privacy.
8. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
View Answer
Explanation: In TDM the transmission rate provided by the path that is multiplexed will always be greater than the sum of transmission rates of the single sources. This happens because the transmission rate is provided to each source only for a small period of time.
9. In TDM, slots are further divided into _________
a) Seconds
b) Frames
c) Packets
d) Bits
View Answer
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing.
1. Which topology has Multipoint connection:
a)Ring
b)Bus
c)Star
d)Mesh
e.both b and c
Answer b
2.Mesh topology, have devices which are connected via
a)single and multiple links
b)Multipoint link
c)Point to point link
d)No Link
e)None of the above
answer c
3.The topology which requires a central controller or hub is
a)Mesh
b)Star
c)Bus
d)Ring
e)both b and c
answer b
4.LAN has mostly used the topologies
a)Bus
b)ring
c)star
d)both of these
e)None of these
answer d
5.Which topologies have two or more Combination:
a) multigrid
b)Star Topology
c)Bus Topology
d)Ring topology
e)Hybrid
Answer e
6.In a mesh topology, each device has a dedicated topology of
b.Point to point linking
c.None of Above
d.Both a and b
e.Single and multiple links
answer a
7.Which topology has the highest reliability?
a.Mesh topology
b.Star topology
c.Ring Topology
d.Bus Topology
e.none of these
answer a
8.Star Topology is basically based on a central device __________ ?
a.HUB
b.Switch
c.gates
d.Both a and b
e.none of these
answer d
9. A topology that is responsible for describing the geometric arrangement of components that make up the LAN.
a) Complex
b) Physical
c) Logical
d) Incremental
Answer: b
10. LAN topology describes the possible connections between pairs of networked end-points that can communicate.
a) Complex
b) Physical
c) decrement
d) Incremental
e) Logical
Answer: e
11.In a network, participating computers are referred to as:
a) Clients
b) Servers
c) Nodes
d) CPUs
e) both a and c
Answer: c
12.Tokens are involved in a topology.
a) Star
b) hybrid
c) Bus
d) Daisy Chaining
e) Ring
Answer: e
13. A ______WAN can be developed by using any other transmission facility:
a) Multi-peer
b) peer-to-peer
c) Two-tiered
d) Three-tiered
e) Hybrids
Answer: b
14. The source computer sent the information along with?
a) data
b) module
c) token
d) element
e) both a and b
Answer: c
15. All the hubs of networks have a serially connected system of?
a) Bus
b) Ring
c) multi-peer
d) Star
e) Daisy chains
View Answer
Answer: e
1._______ field in the base header restricts the lifetime of a datagram In IPv6,
A) version
B) next-header
C) hop limit
D) neighbor-advertisement
Answer: C
2. An HLEN value of decimal 10 means _______In IPv4 header
A) 10 bytes of options
B) 40 bytes of options
C) 10 bytes in the header
D) 40 bytes in the header
Answer: D
3. In IPv4, an HLEN value of decimal 10 means _______.
A) 10 bytes of options
B) 40 bytes of options
C) 40 bytes in the header
D) none of the above
Answer: C
4._______ field in the base header and the sender IP address combine to indicate a unique path identifier In IPv6.
A) flow label
B) next header
C) hop limit
D) destination IP address
Answer: A
5. what is the value of the total length field in bytes In IPv4?
A) 428
B) 407
C) 107
D) 427
Answer: A
6.________ term means that IP provides no error checking.
A) reliable delivery
B) connection-oriented delivery
C) best-effort delivery
D) none of the above
Answer: C
7. ________ protocol is the transmission used by the TCP/IP suite.
A) ARP
B) IP
C) RARP
D) none of the above
Answer: B
8. what is the length of the data field given an HLEN value of 12 and the total length is 40,000 In IPv4?
A) 39,988
B) 40,012
C) 40,048
D) 39,952
Answer: D
9.what is needed to determine the number of the last byte of a fragment In IPv4?
A) Identification number
B) Offset number
C) Total length
Answer: D
10. _______size in the IPv4 header.
A) 20 to 60 bytes long
B) 20 bytes long
C) 60 bytes long
D) none of the above
Answer: A
11. In IPv6, the decision is based on the _______ field in the base header.
A) hop limit
B) priority
C) next header
D) none of the above
Answer: B
12.which bit value unambiguously identifies the datagram as a fragment In IPv4?
A) Do not bit? 0
B) More bit? 0
C) offset = 1000
D) none of the above
Answer: C
13. Which necessary part of the IPv6 datagram?
A) Base header
B) Extension header
C) Data packet from the upper layer
D) (a) and (c)
Answer: A
14. In IPv4, the total size of the datagram must be less than the _______.
A) MUT
B) MAT
C) MTU
D) none of the above
Answer: C
15.options are inserted between _________ and ___________ data,In IPv6, .
A) base header; extension header
B) base header; upper-layer data
C) base header; frame header
D) none of the above
Answer: B
16. datagram is fragmented into three smaller datagrams An IPv4. Which is true?
A) They do not fragment bit is set to 1 for all datagrams.
B) The more fragment bit is set to 0 for all datagrams.
C) The identification field is the same for all datagrams.
D) The offset field is the same
Answer: C
17. if the fragment offset has a value of 100, it means that _______ In IPv4,
A) datagram has not been fragmented
B) datagram is 100 bytes in size
C) the first byte of the datagram is byte 100
D) the first byte of the datagram is byte 800
Answer: D
18. IP is _________ datagram protocol.
A) an unreliable
B) a connectionless
C) both a and b
D) none of the above
Answer: C
19. IPv6 allows _________ security provisions than IPv4.
A) more
B) less
C) the same level
D) none of the above
Answer: A
20. The formerly IPv4 header field known as the service type field is now called?
A) IETF
B) checksum
C) differentiated services
D) none of the above
Answer: C
21. delivery service such as IPv4.
A) error checking
B) error correction
C) datagram acknowledgment
D) none of the above
Answer: D
22. The IPv4 header size _______.
A) 20 to 60 bytes long
B) 20 bytes long
C) 60 bytes long
D) none of the above
Answer: A
23. Which network layer from the sender to receiver deals with the necessity of a three-way handshake transmission of data?
A) Path determination
B) Forwarding
C) Call Set-up
D) All of the above
Answer: C
24.Transmission purpose is basically a combination of __________
A) group of bits
B) source & destination addresses
C) both a & b
D) none of the above
Answer: C
25.__________crucial role in functions of network layer?
A) Network Service Data Unit (NSDU)
B) Medium Access Control Unit (MACU)
C) Network Address Translation Unit (NATU)
D) None of the above
Answer: A
26._________form of byte assigning strategy is adopted in class B?
A) Network.Node.Node.Node
B) Network.Network.Node.Node
C) Network.Network.Network.Node
D) Network.Node.Node.Node
Answer: B
27. which size of the block depends on classless?
A) Nature & size of an entity
B) Number of addresses
C) Availability of the address space
D) All of the above
Answer: A
28. Which is the ability of a single network to span multiple physical networks?
A) Subnetting
B) Masking
C) Fragmenting
D) Hopping
Answer: A
29. Which field/s of ICMPv6 packet header has minimal integrity levels?
a. Type
b. Code
c. Checksum
d. All of the above
Answer:C
Choose the address of class D is
(A) Unicast
(B) Reserved
(C) Multicast
(D) None of the above
Answer(C) Multicast
Select the wrong class.
(A) CLASS A = 1 to 126
(B) CLASS C = 192 to 220
(C) CLASS B = 128 to 191
(D) CLASS D = 224 to 239
Answer (B) CLASS C = 192 to 220
Select the bits from where the class A address starts.
(A) 110
(B) 10
(D) 1111
Answer (C) 0
MCQ No – 23
Select the bits from where the class B address starts
(A) 0
(B) 110
(C) 10
(D) 1111
Answer (C) 10
Select the bits from where the class C address starts
(A) 0
(B) 10
(C) 110
(D) 1111
Answer (C) 110
Select which one of these is not a class of IP addresses.
(A) Class A
(B) Class F
(C) Class E
(D) Class B
Answer (B) Class F
Select the address of class A, B and C are
(A) Reserved
(B) Multicast
(C) Unicast
(D) None of the above
Answer (C) Unicast
Select the bits from where the class D address starts
(A) 0
(B) 10
(C) 110
(D) 1110
Answer (D) 1110
How many bits are in Version 6 of IP address?
(A) 64 bits
(B) 32 bits
(C) 128 bits
(D) 256 bits
Answer (C) 128 bits
Select the stands for IANA stands.
(A) Internal Associative Numbers Authority
(B) Internal Assigned Numbers Authority
(C) Internet Associative Numbers Authoritative
(D) Internet Assigned Numbers Authority
Answer (D) Internet Assigned Numbers Authority
RIR stands for ________
a) Regional Internal Registries
b) Registries Internet Regional
c) Regional Internet Registries
d) Registries Internal Regional
Answer Regional Internet Registries
Select from the following how many version /s of IP’s are there.
(A) 4 versions
(B) 3 versions
(C) 2 versions
(D) 1 version
Answer (C) 2 versions
Which one are the stands of VLSM?
(A) Version Length Subnet Masking
(B) Version Length Surface Masking
(C) Variable Length Surface Masking
(D) Variable Length Subnet Masking
Answer (D) Variable Length Subnet Masking
Which protocol include in desktops and operating systems.
(A) IPv3 protocol
(B) IPv4 protocol
(C) Both IPv6 and IPv4 protocol
(D) IPv6 protocol
Answer (D) IPv6 protocolIPv6 protocol
Select the field is specified by how the datagram should be handled?
(A) Type of Service
(B) Identification
(C) Header length
(D) Flags
(A) Type of Service
Select the number of bits has assigned to the identification field.
(A) 3
(B) 16
(C) 8
(D) 32
Answer (C) 8
Choose how many bits have assigned to the flag field.
(A) 2
(B) 8
(C) 3
(D) 16
Answer (B) 8
Select the flag value to identify the last fragment?
(A) 1
(B) 0
(C) 2
(D) 11
Answer (B) 0
Select the field that helps to check the rearrangement of the fragments?
(A) identifier
(B) flags
(C) offset
(D) protocols
Answer (C) offset
Select the field in IPv4 datagram is not about to fragmentation
(A) Flags
(B) TOS
(C) Offset
(D) Identifier
(B) TOS
Select the 1st bit In the flags field
(A) do not fragment a bit
(B) reserved for future use
(C) more fragment bit
(D) none of the above
Answer (B) reserved for future use
Select the field that is used to specify by how long an IP packet can reside in-network before it is finished?
(A) Identification
(B) Options
(C) TOS
(D) Time to live
Answer (D) Time to live
Select the field that is used for network testing, debugging, control routing, timing and management.
(A) Identification
(B) Options
(C) Flags
(D) Time to live
Answer (B) Options
classful addressing is replaced with In IPv4 address
(A) Classful advertising
(B) Classful addressing new version
(C) Classless addressing
(D) Classless advertising
Answer (C) Classless addressing
_____ bytes in dotted-decimal notation, in an IP address.
(A) 3
(B) 5
(C) 4
(D) none of the above
Answer (C) 4
Select the minimum header size of an IP packet.
(A) 16 bytes
(B) 20 bytes
(C) 10 bytes
(D) 10 bytes
Answer (B) 20 bytes
Select the size of Network bits and Host bits of Class A of IP address.
(A) Network bits 7, Host bits 23
(B) Network bits 8, Host bits 24
(C) Network bits 7, Host bits 2
(D) Network bits 8, Host bits 23
Answer (C) Network bits 7, Host bits
Select the uses of subnetting.
(A) It speeds up the speed of the network
(B) It divides the network into network classes
(C) It divides one large network into several smaller ones
(D) None of the above
Answer
(C) It divides one large network into several smaller ones
Select from the following which one is correct about Class B Address of IP address.
(A) Network bit – 18, Host bit – 16
(B) Network bit – 16, Host bit – 14
(C) Network bit – 14, Host bit – 16
(D) Network bit – 12, Host bit – 14\
Answer (C) Network bit – 14, Host bit – 16
Select from the following which represents the last address of IP address.
(A) Unicast address
(B) Broadcast address
(C) Network address
(D) None of the above
Answer (B) Broadcast address
Select the size of Host bits in Class B of IP address.
(A) 16
(B) 08
(C) 04
(D) 32
Answer (A) 16
Select from the following which one application is not for IP protocol
(B) offer reliable service
(C) offer unreliable service
(D) no error checking
Answer (B) offer reliable service
Choose the header of the datagram in the IPv4 has.
(A) 0 to 20 bytes
(B) 20 to 60 bytes
(C) 20 to 40 bytes
(D) 20 to 80 bytes
Answer (B) 20 to 60 bytes
Select the format of the IP address.
(A) 34 bit
(B) 32 bit
(C) 16 bit
(D) 64 bit
Answer (B) 32 bit
Choose the usable size of Network bits in Class B of IP address.
(A) 04
(B) 14
(C) 08
(D) 16
Answer (D) 16
Select the bits for the IP address.
(A) 24
(B) 128
(C) 64
(D) 32
Answer (D) 32
Select the size of the header If the value of HELEN in an IP packet is 0101.
(A) 20
(B) 5
(C) 40
(D) 60
Answer (A) 20
1. OSI stands for __________
a) open system interconnection
b) operating system interface
c) optical service implementation
d) open service Internet
View Answer
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides a structured plan on how applications communicate over a network, which also helps us to have a structured plan for troubleshooting. It is recognized by the ISO as the generalized model for computer network i.e. it can be modified to design any kind of computer network.
2. The number of layers in ISO OSI reference model is __________
a) 4
b) 5
c) 6
d) 7
View Answer
Explanation: In OSI reference model, there are 7 layers namely Application, Presentation, Session, Transport, Network, Data Link and Physical layer. Each layer uses a protocol to perform its designated function, for example, the data link layer uses error detection protocols for error control functions.
3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer
View Answer
Explanation: In OSI reference model, there are two layers which are not present in TCP/IP model. They are Presentation and Session layer. The functions of Presentation and Session layer in the OSI model are handled by the transport layer itself in TCP/IP.
4. Which layer is used to link the network support layers and user support layers?
a) session layer
b) data link layer
c) transport layer
d) network layer
View Answer
Explanation: Physical, data link and network layers are network support layers and session, presentation and application layers are user support layers. The transport layer links these layers by segmenting and rearranging the data. It uses protocols like TCP and UDP.
5. Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
View Answer
6. TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) with no link to
View Answer
Explanation: Several TCP/IP prototypes were developed at multiple research centers between 1978 and 1983, whereas OSI reference model was developed in the year 1984. TCP/IP was developed with the intention to create a model for the Internet while OSI was intended to be a general network model.
7. Which layer is responsible for process to process delivery in a general network model?
a) network layer
b) transport layer
c) session layer
d) data link layer
View Answer
Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end connection between two systems in a network. The protocols used in Transport layer is TCP and UDP. The transport layer is responsible for segmentation of the data. It uses ports for the implementation of process-to-process delivery.
8. Which address is used to identify a process on a host by the transport layer?
a) physical address
b) logical address
c) port address
d) specific address
View Answer
Explanation: A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. Some examples of port numbers are port 20 which is used for FTP data, port 22 which is used for SSH remote login ,and port 23 which is used for TELNET.
9. Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) physical layer
View Answer
Explanation: In networking, a user mainly interacts with application layer to create and send information to other computer or network. Application layer provides the interface between applications and the network. It is the top-most layer in both the TCP/IP and the OSI model.
10. Transmission data rate is decided by ____________
a) network layer
b) physical layer
c) data link layer
d) transport layer
View Answer
d) phase modulation
View Answer
Explanation: In analog modulation, digital low frequency baseband signal (digital bit stream) is transmitted over a higher frequency. Whereas in digital modulation the only difference is that the base band signal is of discrete amplitude level. The bits are represented by only two frequency levels, one for high and one for low.
4. The portion of physical layer that interfaces with the media access control sublayer is called ___________
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) physical transport sublayer
View Answer
Explanation: The portion of physical layer that interfaces with the medium access control sublayer is Physical Signaling Sublayer. The main function of this layer is character encoding, reception, decoding and performs optional isolation functions. It handles which media connection the signal should be forwarded to physically.
5. The physical layer provides __________
a) mechanical specifications of electrical connectors and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
View Answer
Explanation: Anything dealing with a network cable or the standards in use – including pins, connectors and the electric current used is dealt in the physical layer (Layer 1). Physical layer deals with bit to bit delivery of the data aided by the various transmission mediums.
6. In asynchronous serial communication the physical layer provides ___________
a) start and stop signalling
b) flow control
c) both start & stop signalling and flow control
d) only start signalling
View Answer
Explanation: In asynchronous serial communication, the communication is not synchronized by clock signal. Instead of a start and stop signaling and flow control method is followed. Unlike asynchronous serial communication, in synchronous serial communication a clock signal is used for communication, so the start and stop method is not really required.
7. The physical layer is responsible for __________
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
View Answer
Explanation: The physical layer is responsible for line coding, channel coding and modulation that is needed for the transmission of the information. The physical configuration including pins, connectors and the electric current used is dealt in the physical layer based on the requirement of the network application.
8. The physical layer translates logical communication requests from the ______ into hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
View Answer
Explanation: Physical layer accepts data or information from the data link layer and converts it into hardware specific operations so as to transfer the message through physical cables. Some examples of the cables used are optical fiber cables, twisted pair cables and co-axial cables.
9. A single channel is shared by multiple signals by ____________
a) analog modulation
b) digital modulation
c) multiplexing
d) phase modulation
View Answer
Explanation: In communication and computer networks, the main goal is to share a scarce resource. This is done by multiplexing, where multiple analog or digital signals are combined into one signal over a shared medium. The multiple kinds of signals are designated by the transport layer which is the layer present on a higher level than the physical layer.
10. Wireless transmission of signals can be done via ___________
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
View Answer
Explanation: Wireless transmission is carried out by radio waves, microwaves and IR waves. These waves range from 3 Khz to above 300 Ghz and are more suitable for wireless transmission. Radio waves can penetrate through walls and are used in radio communications, microwaves and infrared (IR) waves cannot penetrate through walls and are used for satellite communications and device communications respectively.
1. The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
View Answer
Explanation: In computer networks, the data from application layer is sent to transport layer and is converted to segments. These segments are then transferred to the network layer and these are called packets. These packets are then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical layer where the frames are converted to bits. Error control and flow control data is inserted in the frames at the data link layer.
2. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
View Answer
Explanation: Channel coding is the function of physical layer. Data link layer mainly deals with framing, error control and flow control. Data link layer is the layer where the packets are encapsulated into frames.
3. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
View Answer
Explanation: Media access control (MAC) deals with transmission of data packets to and from the network-interface card, and also to and from another remotely shared channel. The MAC sublayer also prevents collision using protocols like CSMA/CD.
4. Header of a frame generally contains ______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
View Answer
Explanation: In a frame, the header is a part of the data that contains all the required information about the transmission of the file. It contains information like synchronization bytes, addresses, frame identifier etc. It also contains error control information for reducing the errors in the transmitted frames.
5. Automatic repeat request error management mechanism is provided by ________
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
View Answer
Explanation: The logical link control is a sublayer of data link layer whose main function is to manage traffic, flow and error control. The automatic repeat request error management mechanism is provided by the LLC when an error is found in the received frame at the receiver’s end to inform the sender to re-send the frame.
6. When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________
a) random error
b) burst error
c) inverted error
d) double error
View Answer
Explanation: When a single bit error occurs in a data, it is called single bit error. When more than a single bit of data is corrupted or has error, it is called burst error. If a single bit error occurs, the bit can be simply repaired by inverting it, but in case of a burst error, the sender has to send the frame again.
7. CRC stands for __________
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
View Answer
Explanation: Cyclic redundancy check is a code that is added to a data which helps us to identify any error that occurred during the transmission of the data. CRC is only able to detect errors, not correct them. CRC is inserted in the frame trailer.
8. Which of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
View Answer
Explanation: There are many data link layer protocols. Some of them are SDLC (synchronous data link protocol), HDLC (High level data link control), SLIP (serial line interface protocol), PPP (Point to point protocol) etc. These protocols are used to provide the logical link control function of the Data Link Layer.
9. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
View Answer
Explanation: In CSMA/CD, it deals with detection of collision after collision has occurred, whereas CSMA/CA deals with preventing collision. CSMA/CD is abbreviation for Carrier Sensing Multiple Access/Collision detection. CSMA/CA is abbreviation for Carrier Sensing Multiple Access/Collision Avoidance. These protocols are used for efficient multiple channel access.
10. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
View Answer
Explanation: Piggybacking is a technique in which the acknowledgment is temporarily delayed so as to be hooked with the next outgoing data frame. It saves a lot of channel bandwidth as in non-piggybacking system, some bandwidth is reserved for acknowledgement.
1. The network layer is concerned with __________ of data.
a) bits
b) frames
c) packets
d) bytes
View Answer
Explanation: In computer networks, the data from the application layer is sent to the transport layer and is converted to segments. These segments are then transferred to the network layer and these are called packets. These packets are then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical layer where the frames are converted to bits.
2. Which one of the following is not a function of network layer?
a) routing
b) inter-networking
c) congestion control
d) error control
View Answer
Explanation: In the OSI model, network layer is the third layer and it provides data routing paths for network communications. Error control is a function of the data link layer and the transport layer.
3. A 4 byte IP address consists of __________
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
View Answer
Explanation: An ip address which is 32 bits long, that means it is of 4 bytes and is composed of a network and host portion and it depends on address class. The size of the host address and network address depends upon the class of the address in classful IP addressing.
4. In virtual circuit network each packet contains ___________
a) full source and destination address
b) a short VC number
c) only source address
d) only destination address
View Answer
Explanation: A short VC number also called as VCID (virtual circuit identifier) is a type of identifier which is used to distinguish between several virtual circuits in a connection oriented circuit switched network. Each virtual circuit is used to transfer data over a larger packet switched network.
5. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
View Answer
Explanation: The routing algorithm is what decides where a packet should go next. There are several routing techniques like shortest path algorithm, static and dynamic routing, decentralized routing, distance vector routing, link state routing, Hierarchical routing etc. The routing algorithms go hand in hand with the operations of all the routers in the networks. The routers are the main participants in these algorithms.
6. Which of the following is not correct in relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers
View Answer
Explanation: In multi-destination routing, there is more than one receiver and the route for each destination which is contained in a list of destinations is to be found by the routing algorithm. Multi-destination routing is also used in broadcasting.
7. A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree
b) spider structure
c) spider tree
d) special tree
View Answer
Explanation: Spanning tree protocol (STP) is a network protocol that creates a loop free logical topology for ethernet networks. It is a layer 2 protocol that runs on bridges and switches. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network.
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
View Answer
Explanation: The Routing Information Protocol (RIP) is used by the network layer for the function of dynamic routing. Congestion control focuses on the flow of the traffic in the network and uses algorithms like traffic aware routing, admission control and load shedding to deal with congestion.
9. The network layer protocol for internet is __________
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol
View Answer
Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP, CLNP, ARP, IPX, HRSP etc. Hypertext transfer protocol is for application layer and ethernet protocol is for data link layer.
10. ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing
View Answer
Explanation: ICMP abbreviation for Internet Control Message Protocol is used by networking devices to send error messages and operational information indicating a host or router cannot be reached. ICMP operates over the IP packet to provide error reporting functionality as IP by itself cannot report errors.
1. Transport layer aggregates data from different applications into a single stream before passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
View Answer
Explanation: The flow of data in the OSI model flows in following manner Application -> Presentation -> Session -> Transport -> Network -> Data Link -> Physical. Each and every layer has its own set of functions and protocols to ensure efficient network performance.
2. Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
View Answer
Explanation: Both TCP and UDP are transport layer protocol in networking. TCP is an abbreviation for Transmission Control Protocol and UDP is an abbreviation for User Datagram Protocol. TCP is connection oriented whereas UDP is connectionless.
3. User datagram protocol is called connectionless because _____________
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly
View Answer
Explanation: UDP is an alternative for TCP and it is used for those purposes where speed matters most whereas loss of data is not a problem. UDP is connectionless whereas TCP is connection oriented.
4. Transmission control protocol ___________
a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
View Answer
Explanation: TCP provides reliable and ordered delivery of a stream of bytes between hosts communicating via an IP network. Major internet applications like www, email, file transfer etc rely on TCP. TCP is connection oriented and it is optimized for accurate delivery rather than timely delivery.
5. An endpoint of an inter-process communication flow across a computer network is called __________
a) socket
b) pipe
c) port
d) machine
View Answer
Explanation: Socket is one end point in a two way communication link in the network. TCP layer can identify the application that data is destined to be sent by using the port number that is bound to socket.
6. Socket-style API for windows is called ____________
a) wsock
b) winsock
c) wins
d) sockwi
View Answer
Explanation: Winsock is a programming interface which deals with input output requests for internet applications in windows OS. It defines how windows network software should access network services.
7. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
View Answer
Explanation: The datagram congestion control is a transport layer protocol which deals with reliable connection setup, teardown, congestion control, explicit congestion notification, and feature negotiation. It is used in modern day systems where there are really high chances of congestion. The protocol was last updated in the year 2008.
8. A _____ is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol
View Answer
Explanation: Just as the IP address identifies the computer, the network port identifies the application or service running on the computer. A port number is 16 bits. The combination of IP address preceded with the port number is called the socket address.
9. Transport layer protocols deals with ____________
a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication
View Answer
Explanation: Transport layer is 4th layer in TCP/IP model and OSI reference model. It deals with logical communication between process. It is responsible for delivering a message between network host.
10. Which of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
View Answer
Explanation: The Stream Control Transmission Protocol (SCTP) is a transport layer protocol used in networking system where streams of data are to be continuously transmitted between two connected network nodes. Some of the other transport layer protocols are RDP, RUDP, TCP, DCCP, UDP etc.
1. Physical or logical arrangement of network is __________
a) Topology
b) Routing
c) Networking
d) Control
View Answer
Explanation: Topology in networks is the structure or pattern in which each and every node in the network is connected. There are many topologies in networking like bus, tree, ring, star, mesh, and hybrid topology. There is no particular best topology and a suitable topology can be chosen based on the kind of application of the network .
2. Which network topology requires a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Explanation: In star topology, no computer is connected to another computer directly but all the computers are connected to a central hub. Every message sent from a source computer goes through the hub and the hub then forwards the message only to the intended destination computer.
3. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
View Answer
Explanation: In bus topology, there is a single cable to which all the network nodes are connected. So whenever a node tries to send a message or data to other nodes, this data passes through all other nodes in the network through the cable. It is really simple to install but it’s not secure enough to be used in most of the computer network applications.
4. Data communication system spanning states, countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
d) PAN
View Answer
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. WANs are used to connect cities, states or even countries. A wireless connection is required to build a WAN. The best example of WAN is the Internet.
5. Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) PAN
View Answer
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects computers in a small area such as schools, offices, residence etc. It is the most versatile kind of data communication system where most of the computer network concepts can be visibly used.
6. WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network
View Answer
Explanation: WAN is the abbreviation for Wide Area Network. This network extends over a large geographical area. These are used to connect cities, states or even countries. They can be connected through leased lines or satellites.
7. In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits
View Answer
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing.
8. _____ is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
View Answer
Explanation: FDM is an abbreviation for Frequency Division Multiplexing. This technique is used when the bandwidth of the channel is greater than the combined bandwidth of all the signals which are to be transmitted. The channel is active at all times unless a collision occurs with another channel trying to use the same frequency. Some other multiplexing techniques are Time division multiplexing and Phase division multiplexing.
1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
View Answer
Explanation: Multiplexing is a method using which one can send multiples signals through a shared medium at the same time. This helps in using less resources and thus saving the cost of sending messages.
2. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
View Answer
Explanation: Circuit switching is a switching method by which one can obtain a physical path between end points. Circuit switching method is also called a connection oriented network. Two nodes must be physically and logically connected to each other to create a circuit switching network.
3. Which multiplexing technique used to transmit digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
View Answer
Explanation: TDM abbreviation for Time Division Multiplexing is a method used for digital signals. Whereas FDM and WDM abbreviation for Frequency Division Multiplexing, and Wavelength Division Multiplexing, are used for analog signals. TDM is used in applications like ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network).
4. If there are n signal sources of same data rate, then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n
View Answer
Explanation: In TDM, the total unit of time is divided equally among all the signal sources and each and every source has access to the complete channel bandwidth during its allotted time slot. When the time slot of the source is not active, it remains idle and waits for its slot to begin.
5. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
View Answer
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
6. The state when dedicated signals are idle are called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period
View Answer
Explanation: There are instances when connection between two endpoints has been established, but no communication or transfer of messages occurs. This period of time is called silent period. The silent period ends when either of the two endpoints starts the communication.
7. Multiplexing provides _________
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy
View Answer
Explanation: Multiplexing helps us to transfer our messages over a shared channel. This brings up the issue of privacy and efficiency. Fortunately, Multiplexing has high efficiency and high privacy when implemented because in the implementation, the transport layer of the OSI network model handles the function of multiplexing through interfaces called ports which provide the required efficiency and privacy.
8. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
View Answer
Explanation: In TDM the transmission rate provided by the path that is multiplexed will always be greater than the sum of transmission rates of the single sources. This happens because the transmission rate is provided to each source only for a small period of time.
9. In TDM, slots are further divided into _________
a) Seconds
b) Frames
c) Packets
d) Bits
View Answer
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing.
1. _____________ allows LAN users to share computer programs and data.
a) Communication server
b) Print server
c) File server
d) Network
View Answer
Explanation: A file server allows LAN users to share computer programs and data. It uses the File Transfer Protocol to provide this feature on ports 20 and 21. The file server works as a medium for the transfer.
2. With respect to physical media, STP cables stands for _________
a) Shielded Twisted Pair Cable
b) Spanning Tree Protocol Cable
c) Static Transport Protocol Cable
d) Shielded Two Power Cable
View Answer
Explanation: For physical media, STP cable stands for Shielded twisted pair cable. 100 Mbps is the max data capacity of STP cable and its default connector is RJ45. It is popularly used in LANs due to its ease of maintenance and installation.
3. A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software
View Answer
Explanation: A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of LAN intrinsic software. They are used to give better functionality of the program and the applications working over it to the users of the LAN.
4. The __________ portion of LAN management software restricts access, records user activities and audit data, etc.
a) Configuration management
b) Security management
c) Performance management
d) Recovery management
View Answer
Explanation: The Security management portion of LAN management software restricts access, records user activities, and audit data. It is responsible for controlling access to the network based on predefined policy. The security management ensures authentication, confidentiality, and integrity in the LAN.
5. What is the max length of the Shielded twisted pair cable?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
View Answer
Explanation: The max the Shielded twisted pair cable is 100 meters. If the length exceeds 100 meters, the loss of signals flowing through the cable would be really high. Thus, STP cable is more suitable for smaller networks like LANs.
6. What is the max data transfer rate of STP cables?
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps
View Answer
Explanation: 100 Mbps is the max data transfer rate that can be handled by STP cables, and its default connector is RJ-45. 100 Mbps is a feasible data transfer rate for small networks like LANs.
7. Which connector does the STP cable use?
a) BNC
b) RJ-11
c) RJ-45
d) RJ-69
View Answer
Explanation: RJ-45 is used for STP cable. 100 Mbps is the max data transfer rate that can be handled by STP. RJ-45 is popularly used to connect to modern-day routers, computer network cards, and other network devices.
8. What is the central device in star topology?
a) STP server
b) Hub/switch
c) PDC
d) Router
View Answer
Explanation: In star topology, no computer is connected to another computer directly but all the computers are connected to a central switch or hub. Every message sent from a source computer goes through the switch or hub and the switch or hub then forwards the message only to the intended destination computer.
9. What is the max data transfer rate for optical fiber cable?
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps
View Answer
Explanation: Fiber channel speeds have been increasing over the years. 10000 Mbps is the max data transfer rate for optical fiber cables. It is said to be the fastest among the other kinds of cables like STP cables and co-axial cables. People are now using optical fiber cables instead of STP cables for LANs due to their fast data transfer capability.
10. Which of the following architecture uses the CSMA/CD access method?
a) ARC net
b) Ethernet
c) Router
d) STP server
View Answer
Explanation: Collision detection is not possible in Ethernet without extensions. Collision detection techniques for multiple access like CSMA/CD are used to detect collisions in the Ethernet architecture.
1. Which of this is not a guided media?
a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire
View Answer
Explanation: Wireless LAN is unguided media.
2. UTP is commonly used in __________
a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
View Answer
Explanation: Unshielded twisted pair(UTP) is commonly used in home access.
3. Coaxial cable consists of _______ concentric copper conductors.
a) 1
b) 2
c) 3
d) 4
View Answer
Explanation: Coaxial cable has an inner conductor surrounded by a insulating layer, which is surrounded by a conducting shield. Coaxial cable is used to carry high frequency signals with low losses.
4. Fiber optics posses following properties __________
a) Immune electromagnetic interference
b) Very less signal attenuation
c) Very hard to tap
d) All of the mentioned
View Answer
Explanation: In fibre optics the transmission of information is in the form of light or photons. Due to all above properties mentioned in options fibre optics can be submerged in water and are used at more risk environments.
5. If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) __________
a) n*39.8
b) n*51.8
c) 2n*51.8
d) None of the mentioned
View Answer
Explanation: The base unit of transmission rates in optical fibre is 51.8 Mbits/s. So an optical carrier represented as OC-n has n*51.8 Mbits/s transmission speed. For eg. OC-3 has 3*51.8 Mbits/s speed.
6. Terrestrial radio channels are broadly classifed into _____ groups.
a) 2
b) 3
c) 4
d) 1
View Answer
Explanation: The three types are those that operate over very short distance, those that operate in local areas, those that operate in the wide area.
7. Radio channels are attractive medium because __________
a) Can penetrate walls
b) Connectivity can be given to mobile user
c) Can carry signals for long distance
d) All of the mentioned
View Answer
Explanation: Radio channels can penetrate walls, can be used to provide connectivity to mobile users and can also carry signals for long distances.
8. Geostationary satellites ___________
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
View Answer
Explanation: They are placed in orbit at 36,000km above Earth’s surface.
1. A local telephone network is an example of a _______ network.
a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched
View Answer
Explanation: Circuit switching is connection oriented switching technique, whereas in the case of packet switching, it is connectionless. Circuit switching is implemented in the Physical layer, whereas packet switching is implemented in the Network layer. Internet too is based on the concept of circuit switching.
2. Most packet switches use this principle ____________
a) Stop and wait
b) Store and forward
c) Store and wait
d) Stop and forward
View Answer
Explanation: The packet switch will not transmit the first bit to outbound link until it receives the entire packet. If the entire packet is not received and the time-out period expires, the packet switch will inform the sender to resend the part of packet or the entire packet based on the algorithm being used.
3. If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to ______________
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
View Answer
Explanation: The equation to find the end to end delay when no. of bits, transmission rate and no. of routers is given by (N*L)/R. The total end to end delay, that is, nodal delay is the sum of all, the processing delay, queuing delay, transmission delay and propagation delay.
4. What are the Methods to move data through a network of links and switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching
View Answer
Explanation: Packet switching and Circuit switching are two different types of switching methods used to connect the multiple communicating devices with one another. Packet switching is used in conventional LAN systems and circuit switching is used in telephonic systems.
5. The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
View Answer
Explanation: In circuit switching, a physical path between the sender and receiver is established. This path is maintained until the connection is needed. Circuit switching is implemented in the Physical layer and is used in telephonic systems.
6. As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved.
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
View Answer
Explanation: Circuit switching is connection oriented and is always implemented in the physical layer. Once a path is set, all transmission occurs through the same path. It is used since the early times in telephonic systems.
7. In _________ systems, resources are allocated on demand.
a) packet switching
b) circuit switching
c) line switching
d) frequency switching
View Answer
Explanation: In packet switching, the bits are received in out of order and need to be assembled at the receiver end, whereas in the case of Circuit switching, all the bits are received in order. All transmissions may not occur through the same path in case of packet switching.
8. Which of the following is not an application layer service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) Error control
View Answer
Explanation: Application layer is the topmost layer in the OSI model. Network virtual terminal, mail service, file transfer, access and management are all services of the application layer. It uses protocols like HTTP, FTP, and DNS etc. to provide these services.
1. Which is not a application layer protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
View Answer
Explanation: TCP is transport layer protocol.
2. The packet of information at the application layer is called __________
a) Packet
b) Message
c) Segment
d) Frame
View Answer
Explanation: For Application, Presentation and Session layers there is no data format for message. Message is message as such in these three layers. But when it comes to Transport, Network, Data and Physical layer they have data in format of segments, packets, frames and bits respectively.
3. Which one of the following is an architecture paradigms?
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
View Answer
Explanation: HTTP is a protocol
4. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
View Answer
Explanation: Application layer provides the interface between applications and the network. So application developer can decide what transport layer to use and what should be its maximum buffer size.
5. Application layer offers _______ service.
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
View Answer
Explanation: End to End service is provided in the application layer. Whereas process to process service is provided at the transport layer.
6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
View Answer
Explanation: Because it can work with available throughput.
7. Pick the odd one out.
a) File transfer
b) File download
c) E-mail
d) Interactive games
View Answer
Explanation: File transfer, File download and Email are services provided by the application layer and there are message and data oriented.
8. Which of the following is an application layer service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
View Answer
Explanation: The services provided by the application layer are network virtual terminal, file transfer, access and management, mail services, directory services, various file and data operations.
9. To deliver a message to the correct application program running on a host, the _______ address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
View Answer
Explanation: IP address lets you know where the network is located. Whereas MAC address is a unique address for every device. Port address identifies a process or service you want to carry on.
10. Which is a time-sensitive service?
a) File transfer
b) File download
c) E-mail
d) Internet telephony
View Answer
Explanation: Internet telephony is Loss-tolerant other applications are not.
11. Transport services available to applications in one or another form _________
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
View Answer
Explanation: The transport services that are provided to application are reliable data transfer, security and timing. These are very important for proper end to end services.
12. Electronic mail uses which Application layer protocol?
a) SMTP
b) HTTP
c) FTP
d) SIP
View Answer
Explanation: Email uses various protocols like SMTP, IMAP and POP. The most prominent one used in application layer is SMTP.
statement regarding FTP.
a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection
View Answer
Explanation: FTP is out-of-band because the data connection is done separately through port 20 and control connection is done separately through port 21.
5. If 5 files are transferred from server A to client B in the same session. The number of TCP connections between A and B is _______
a) 5
b) 10
c) 2
d) 6
View Answer
Explanation: The client would first initiate the TCP control connection through port 21. Then for every file transfer, a separate connection would be made through port 20. Now, since we have five files to be transferred, 1 control connection + 5 data connections = 6 total TCP connections.
6. FTP server _____________
a) Maintains state information
b) Is stateless
c) Has single TCP connection for a file transfer
d) Has UDP connection for file transfer
View Answer
Explanation: FTP server maintains state information of every control connection to keep track of the active and inactive connections in the session. This helps the server decide which connection to terminate, in case the connection is inactive for too long.
7. The commands, from client to server, and replies, from server to client, are sent across the control connection in ________ bit ASCII format.
a) 8
b) 7
c) 3
d) 5
View Answer
Explanation: FTP was designed to transmit commands only in English characters that are possible with just 7 bits in ASCII. Even the media has to be converted to ASCII before transmission.
8. Find the FTP reply whose message is wrongly matched.
a) 331 – Username OK, password required
b) 425 – Can’t open data connection
c) 452 – Error writing file
d) 452 – Can’t open data connection
View Answer
Explanation: The correct response code for the message “Can’t open data connection” is 425. Response code 452 is sent usually when the connection is suddenly closed.
9. The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is ________
a) Stream mode
b) Block mode
c) Compressed mode
d) Message mode
View Answer
Explanation: Stream mode is the default mode of FTP, in which the TCP transforms/fragments the data into segments, and then after the transmission is completed, converts it back to stream of bytes.
10. The password is sent to the server using ________ command.
a) PASSWD
b) PASS
c) PASSWORD
d) PWORD
View Answer
Explanation: The PASS command, preceded by the username, completes the user’s identification for access control in an FTP session. Without the valid password, the user won’t be able to initiate the FTP connection.
1. The entire hostname has a maximum of ___________
a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
View Answer
Explanation: An entire hostname can have a maximum of 255 characters. Although each label must be from 1 to 63 characters long. Host name is actually a label that is given to a device in a network.
2. A DNS client is called _________
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
View Answer
Explanation: DNS client also known as DNS resolver also known as DNS lookup helps to resolve DNS requests using an external DNS server.
3. Servers handle requests for other domains _______
a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
View Answer
Explanation: Whenever a request is received at server from other domains, it handles this situation by contacting remote DNS server.
4. DNS database contains _______
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
View Answer
Explanation: Domain Name system not only deals with mapping IP addresses with the hostname but also deals with exchange of information in the server.
5. If a server has no clue about where to find the address for a hostname then _______
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
View Answer
Explanation: Root name servers are actually very important and critical as they are the first step in translating human readable hostnames into IP addresses for carrying out communication.
6. Which one of the following allows client to update their DNS entry as their IP address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
View Answer
Explanation: Dynamic DNS or in short DDNS or DynDNS helps in automatically updating a name server in the DNS. This does not require manual editing.
7. Wildcard domain names start with label _______
a) @
b) *
c) &
d) #
View Answer
Explanation: A wildcard DNS record matches requests to a non existent domain name. This wildcard DNS record is specified by using asterisk “*” as the starting of a domain name.
8. The right to use a domain name is delegated by domain name registers which are accredited by _______
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
View Answer
Explanation: The ICANN (Internet Corporation for Assigned Names and Numbers) deals with IP address space allocation, protocol identifier assignment, generic and country code Top Level domain name system management (gTLD and ccTLD).
9. The domain name system is maintained by _______
a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
View Answer
Explanation: A domain name system is maintained by a distributed database system. It is a collection of multiple, logically interrelated databases distributed over a computer network.
10. Which one of the following is not true?
a) multiple hostnames may correspond to a single IP address
b) a single hostname may correspond to many IP addresses
c) a single hostname may correspond to a single IP address
d) none of the mentioned
View Answer
Explanation: It need not be that a single hostname will correspond to a ip address. For example facebook.com and fb.com both correspond to same ip address. So there can be multiple hostnames for a single ip address.
1. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned
View Answer
Explanation: We use DHCP to allow the hosts to acquire their ip addresses dynamically which is better than visiting each and every host on the network and configure all of this information manually.
2. DHCP is used for ________
a) IPv6
b) IPv4
c) Both IPv6 and IPv4
d) None of the mentioned
View Answer
Explanation: DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the hosts know about the change dynamically, and hosts update their info themselves.
3. The DHCP server _________
a) maintains a database of available IP addresses
b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client
d) all of the mentioned
View Answer
Explanation: Whenever a DHCP server gets a request from a client it responds with a DHCP offer containing IP address being offered, network mask offered, the amount of time that the client can use and keep it, the ip address of the DHCP server making this offer.
4. IP assigned for a client by DHCP server is
a) for a limited period
b) for an unlimited period
c) not time dependent
d) none of the mentioned
View Answer
Explanation: The IP address offered to a client is only for a limited period of time. There is actually a certain amount of time that the client can use and keep this IP address.
5. DHCP uses UDP port _________ for sending data to the server.
a) 66
b) 67
c) 68
d) 69
View Answer
Explanation: 67 is the UDP port number that is used as the destination port of a server. Whereas UDP port number 68 is used by the client.
6. The DHCP server can provide the _______ of the IP addresses.
a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned
View Answer
Explanation: When a host acquires multiple offers of IP addresses from different DHCP servers, the host will broadcast a dhcp request identifying the server whose offer has been accepted.
7. DHCP client and servers on the same subnet communicate via _________
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
View Answer
Explanation: DHCP actually employs a connectionless service, which is provided by UDP, since TCP is connection oriented. It is implemented with two UDP port numbers 67 and 68 for its operations.
8. After obtaining the IP address, to prevent the IP conflict the client may use _________
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
View Answer
Explanation: ARP abbreviation for address resolution protocol is used for mapping IP addresses to MAC addresses that are present in the local network.
9. What is DHCP snooping?
a) techniques applied to ensure the security of an existing DHCP infrastructure
b) encryption of the DHCP server requests
c) algorithm for DHCP
d) none of the mentioned
View Answer
Explanation: DHCP snooping is a security feature that is used in OS of a network in the layer 2. This technology prevents unauthorized DHCP servers offering IP addresses to DHCP clients.
10. If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.
a) MAC address
b) IP address
c) Both MAC address and IP address
d) None of the mentioned
View Answer
Explanation: The DHCP snooping is done to prevent unauthorized IP addresses being offered by unauthorized servers. This features allows only specific mac addresses and IP addresses to access the network.
1. IPSec is designed to provide security at the _________
a) Transport layer
b) Network layer
c) Application layer
d) Session layer
View Answer
Explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer.
2. In tunnel mode, IPSec protects the ______
a) Entire IP packet
b) IP header
c) IP payload
d) IP trailer
View Answer
3. Which component is included in IP security?
a) Authentication Header (AH)
b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE)
d) All of the mentioned
View Answer
Explanation: AH ensures that there is no retransmission of data from an unauthorized source, and protects against data tampering. ESP provides with content protection and ensures that there is integrity and confidentiality for the message. IKE is used to make sure that only the intended sender and receiver can access the message.
4. WPA2 is used for security in _______
a) Ethernet
b) Bluetooth
c) Wi-Fi
d) Email
View Answer
Explanation: WPA2 or WiFi Protected Access 2 is a security protocol used to provide users and firms with strong data security and protection for their wireless networks (WiFi) to give them confidence that only authorized users can access their network.
5. An attempt to make a computer resource unavailable to its intended users is called ______
a) Denial-of-service attack
b) Virus attack
c) Worms attack
d) Botnet process
View Answer
Explanation: In a Denial of Service attack, the attacker won’t let the victims access the network by using a certain method that ensures that an essential network resource is unavailable to the victim. The methods that the attacker can use are vulnerability attack, bandwidth flooding and connection flooding.
6. Extensible authentication protocol is authentication framework frequently used in ______
a) Wired personal area network
b) Wireless networks
c) Wired local area network
d) Wired metropolitan area network
View Answer
Explanation: The Extensible Authentication Protocol (EAP) is an authentication protocol used to connect a network node to the Internet. It designed through extending the methods used by the Point-to-Point Protocol for authentication.
7. Pretty good privacy (PGP) is used in ______
a) Browser security
b) Email security
c) FTP security
d) WiFi security
View Answer
Explanation: PGP is an encryption method used in e-mail security to encrypt and decrypt the content of an e-mail transmitted over the internet. It makes sure that the message cannot be stolen by other unauthorized users.
8. PGP encrypts data by using a block cipher called ______
a) International data encryption algorithm
b) Private data encryption algorithm
c) Internet data encryption algorithm
d) Local data encryption algorithm
View Answer
Explanation: The IDEA was designed in 1991 by Xuejia Lai and James Massey. Before IDEA, PGP used the cipher method BassOmatic.
9. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) DNS authorizing
View Answer
Explanation: In DNS spoofing, also known as DNS cache poisoning, an attacker gets the valid credentials from a victim by spoofing the intended resource, and tricking the victim to give his/her valid authorization credentials.
1. A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.
a) VNP
b) VPN
c) VSN
d) VSPN
View Answer
Explanation: VPN provides enhanced security and online anonymity to users on the internet. It is also used to unblock websites that are unavailable in certain regions.
2. When were VPNs introduced into the commercial world?
a) Early 80’s
b) Late 80’s
c) Early 90’s
d) Late 90’s
View Answer
Explanation: VPNs were first introduced in the year 1996. Then as the internet started to get popularized, the need for connection security increased. VPN was a great solution to this, and that’s when VPNs were implemented in the commercial world.
3. What protocol is NOT used in the operation of a VPN?
a) PPTP
b) IPsec
c) YMUM
d) L2TP
View Answer
Explanation: PPTP is a tunneling protocol which was initially used for the creation of VPNs. IPSec is used in encrypting the traffic flowing in the VPN. L2TP is used to tunnel all the L2 traffic on the VPN.
4. Which of the following statements is NOT true concerning VPNs?
a) Financially rewarding compared to leased lines
b) Allows remote workers to access corporate data
c) Allows LAN-to-LAN connectivity over public networks
d) Is the backbone of the Internet
View Answer
Explanation: VPNs are not the backbone of the Internet as they are just a method to create private intranets on the internet. They are used for enhancing the connection security for the users.
5. Traffic in a VPN is NOT ____________
a) Invisible from public networks
b) Logically separated from other traffic
c) Accessible from unauthorized public networks
d) Restricted to a single protocol in IPsec
View Answer
Explanation: Traffic in a VPN is not accessible from any unauthorized public networks because it is secured with the masking IP address. This provides the benefit of access to blocked resources to the users.
6. VPNs are financially speaking __________
a) Always more expensive than leased lines
b) Always cheaper than leased lines
c) Usually cheaper than leased lines
d) Usually more expensive than leased lines
View Answer
Explanation: The services of a VPN are cheaper for moderate to large scale institutional networks than the services of leased lines. Though for a small scale network, it does not prove to be as beneficial as the costs are not reduced to a great degree as compared to leased lines.
7. Which layer 3 protocols can be transmitted over an L2TP VPN?
a) Only IP
b) Only IPX
c) Only ICMP
d) IP and IPX
View Answer
Explanation: L2TP stands for Layer 2 Tunneling Protocol. It is used to tunnel all the L2 traffic on an IP network and is able to transmit network layer’s IP and IPX protocol data.
8. ESP (Encapsulating Security Protocol) is defined in which of the following standards?
a) IPsec
b) PPTP
c) PPP
d) L2TP
View Answer
Explanation: ESP is a security component of IPSec. ESP provides content protection and ensures that there is integrity and confidentiality of the message. The other security components of IPSec are Authentication Header and Internet Key Exchange.
9. L2F was developed by which company?
a) Microsoft
b) Cisco
c) Blizzard Entertainment
d) IETF
View Answer
Explanation: L2F stands for Layer 2 Forwarding protocol. It was designed by Cisco to tunnel PPP traffic, helping create VPNs over the internet.
10. Which layer of the OSI reference model does PPTP work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
View Answer
Explanation: PPTP stands for Point-to-Point Tunneling Protocol. PPTP is a tunneling protocol that was primitively used to create VPNs. It is no longer used for VPNs due to the lack of security it provides.
11. Which layer of the OSI reference model does IPsec work at?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
View Answer
Explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. It operates in the network layer.
1. Telnet protocol is used to establish a connection to __________
a) TCP port number 21
b) TCP port number 22
c) TCP port number 23
d) TCP port number 25
View Answer
Explanation: TCP port 21 is used for FTP, TCP port 22 is used for SSH and TCP port 25 is used for SMTP. Telnet provides access to a command line interface on a remote computer using the TCP port number 23.
2. Which one of the following is not true?
a) telnet defines a network virtual terminal (NVT) standard
b) client programs interact with NVT
c) server translates NVT operations
d) client can transfer files using to remote server using NVT
View Answer
Explanation: The client can use the NVT only to interact with the programs already present on the remote server, not to transfer files to it. To transfer files, an FTP connection has to be used.
3. All telnet operations are sent as ________
a) 4 bits
b) 8 bits
c) 16 bits
d) 32 bits
View Answer
Explanation: Telnet provides a bi-directional, 8-bit byte oriented communications facility through which operations are sent as 8-bit bytes for the server to interpret.
4. AbsoluteTelnet is a telnet client for _______ Operating system.
a) windows
b) linux
c) mac
d) ubuntu
View Answer
Explanation: AbsoluteTelnet was originally released in 1999. It was developed by Brian Pence of Celestial Software.
5. The decimal code of Interpret as Command (IAC) character is _______
a) 252
b) 253
c) 254
d) 255
View Answer
Explanation: If we want that a character be interpreted by the client instead of server, we use the IAC character. If IAC is followed by any other code than IAC, the client interprets it as a character.
6. Which of the following is true for character mode operation of telnet implementation?
a) each character typed is sent by the client to the server
b) each character typed is discarded by the server
c) each character typed is aggregated into a word and then sent to the server
d) each character type is aggregated into a line and then sent to the server
View Answer
Explanation: In character mode, each character that the user is typing is immediately sent to the server which then interprets it only after the complete operation command is received.
7. In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed?
a) default mode
b) character mode
c) server mode
d) command mode
View Answer
Explanation: In the default mode, the client does not send each character typed by the user to the server, thus saving the amount of packet transmissions required for executing each operation. But the server has to remain idle until the client sends the completed line wasting a lot of time.
8. Which one of the following is not correct?
a) telnet is a general purpose client-server program
b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
d) telnet can be used for remote login
View Answer
Explanation: File Transfer Protocol is used for file transfer. Telnet provides access to the command-line interface on a remote host.
1. Which of the following is false with respect to TCP?
a) Connection-oriented
b) Process-to-process
c) Transport layer protocol
d) Unreliable
View Answer
Explanation: TCP is a transport layer protocol that provides reliable and ordered delivery of a stream of bytes between hosts communicating via an IP network.
2. In TCP, sending and receiving data is done as _______
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
View Answer
Explanation: TCP provides stream oriented delivery between hosts communicating via an IP network and there are no message boundaries. TCP can concatenate data from a number of send () commands into one stream of data and still transmit it reliably.
3. TCP process may not write and read data at the same speed. So we need __________ for storage.
a) Packets
b) Buffers
c) Segments
d) Stacks
View Answer
Explanation: A TCP receiver has a receive buffer that is used to store the unprocessed incoming packets in case the sender is sending packets faster than the processing rate of the received packets.
4. TCP groups a number of bytes together into a packet called _______
a) Packet
b) Buffer
c) Segment
d) Stack
View Answer
Explanation: A segment may be collection of data from many send () statements. TCP transmits each segment as a stream of bytes.
5. Communication offered by TCP is ________
a) Full-duplex
b) Half-duplex
c) Semi-duplex
d) Byte by byte
View Answer
Explanation: Data can flow both the directions at the same time during a TCP communication hence, it is full-duplex. This is the reason why TCP is used in systems that require full-duplex operation such as e-mail systems.
6. To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
View Answer
Explanation: Acknowledgment mechanism is used to check the safe and sound arrival of data. The sender actively checks for acknowledgement from the receiver and once a specific time period has passed, it retransmits the data.
7. In segment header, sequence number and acknowledgement number fields refer to _______
a) Byte number
b) Buffer number
c) Segment number
d) Acknowledgment
View Answer
Explanation: As TCP has to ensure ordered delivery of packets, sequence number and acknowledgement number are used to identify the byte number of the packet in the stream of bytes being transmitted.
8. Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?
a) 10000
b) 10001
c) 12001
d) 11001
View Answer
Explanation: The sequence number given to first byte of a segment, with respect to its order among the previous segments, is the sequence number of that segment.
9. Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________
a) Fixed number
b) Random sequence of 0’s and 1’s
c) One
d) Sequence of zero’s and one’s
View Answer
Explanation: One might expect the sequence number of the first byte in the stream to be 0, or 1. But that does not happen in TCP, Instead, the sender has to choose an Initial Sequence Number (ISN), which is basically a random 32 bit sequence of 0’s and 1’s, during the connection handshake.
10. The value of acknowledgement field in a segment defines _______
a) sequence number of the byte received previously
b) total number of bytes to receive
c) sequence number of the next byte to be received
d) sequence of zeros and ones
View Answer
Explanation: The acknowledgement field in a segment defines the sequence number of the byte which is to be received next i.e. sequence number of byte that the sender should transmit next.
1. Which of the following is false with respect to UDP?
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
View Answer
Explanation: UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols.
2. Return value of the UDP port “Chargen” is _______
a) String of characters
b) String of integers
c) Array of characters with integers
d) Array of zero’s and one’s
View Answer
Explanation: Using Chargen with UDP on port 19, the server sends a UDP datagram containing a random number of characters every time it receives a datagram from the connecting host. The number of characters is between 0 and 512.
3. Beyond IP, UDP provides additional services such as _______
a) Routing and switching
b) Sending and receiving of packets
c) Multiplexing and demultiplexing
d) Demultiplexing and error checking
View Answer
Explanation: De-multiplexing is the delivering of received segments to the correct application layer processes at the recipients end using UDP. Error checking is done through checksum in UDP.
4. What is the main advantage of UDP?
a) More overload
b) Reliable
c) Low overhead
d) Fast
View Answer
Explanation: As UDP does not provide assurance of delivery of packet, reliability and other services, the overhead taken to provide these services is reduced in UDP’s operation. Thus, UDP provides low overhead, and higher speed.
5. Port number used by Network Time Protocol (NTP) with UDP is ________
a) 161
b) 123
c) 162
d) 124
View Answer
Explanation: The Network Time Protocol is a clock synchronization network protocol implemented by using UDP port number 123 to send and receive time stamps.
6. What is the header size of a UDP packet?
a) 8 bytes
b) 8 bits
c) 16 bytes
d) 124 bytes
View Answer
Explanation: The fixed size of the UDP packet header is 8 bytes. It contains four two-byte fields: Source port address, Destination port address, Length of packet, and checksum.
7. The port number is “ephemeral port number”, if the source host is _______
a) NTP
b) Echo
c) Server
d) Client
View Answer
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in Windows Operating System. Ephemeral port numbers are short-lived port numbers which can be used for clients in a UDP system where there are temporary clients all the time.
8. “Total length” field in UDP packet header is the length of _________
a) Only UDP header
b) Only data
c) Only checksum
d) UDP header plus data
View Answer
Explanation: Total length is the 16 bit field which contains the length of UDP header and the data. The maximum value of the Total length field and the maximum size of a UDP datagram is 65,535 bytes (8 byte header + 65,527 bytes of data).
9. Which is the correct expression for the length of UDP datagram?
a) UDP length = IP length – IP header’s length
b) UDP length = UDP length – UDP header’s length
c) UDP length = IP length + IP header’s length
d) UDP length = UDP length + UDP header’s length
View Answer
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP header that defines the total length of the IP packet. There is another field in the IP header that defines the length of the header. So if we subtract the length of the IP header that is encapsulated in the IP packet, we get the length of UDP datagram.
10. The ______ field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port
View Answer
Explanation: Checksum field is used to detect errors over the entire user datagram. Though it is not as efficient as CRC which is used in TCP, it gets the job done for the UDP datagram as UDP doesn’t have to ensure the delivery of the packet.
1. Guided media is also known as_______.
A. bound media
B. guided media
C. unguided media
D. none of the above
2. How many forms in twisted pair cable?
A. 2
B. 4
C. 3
D. non
3. UTP stands for…
A. unshielded transport pair cable
B. unshielded twisted pair cable
C. unshielded transmission pair cable
D. unshielded twisted pair control
4. What is the frequency range of UTP cable?
A. 100Hz to 5MHz
B. 100MHz to 5MHz
C. 100Hz to 5Hz
D. 1000Hz to 5MHz
5. What are the disadvantages of UTP cable?
A. costly
B. easy to use
C. flexible
D. easy to install
6. STP stands for…
A. shielded twisted pair cable
B. shielded twisted pair connectors
C. shielded transport pair cable
D. shielded transport pair connectors
7. Which of the following cable come into guided media?
A. coaxial cable
B. twisted pair cable
C. fiber optic cable
D. all of the above
8. Which of the following cable doesn’t come into guided media?
A. coaxial cable
B. twisted pair cable
C. fiber optic cable
D. microwave
9. Which of the following waves come into unguided media?
A. microwave
B. infrared wave
C. radio wave
D. all of the above
10. Which of the following waves do not come into unguided media?
A. microwave
B. infrared wave
C. radio wave
D. laser
11. What is the frequency range of the coaxial cable?
A. 100KHz to 500MHz
B. 100MHz to 500MHz
C. 1000KHz to 500MHz
D. 10MHz to 50MHz
12. How many types of coaxial cable?
A. 2
B. 3
C. 4
D. 5
13. which of the following are coaxial cable-layers?
A. thinnet
B. thicknet
C. copper
D. A and B both
14. Thicknet can carry signal for_____meters.
A. 500m
B. 1000m
C. 100m
D. 200m
15. How many connectors are used for coaxial cable?
A. 3
B. 5
C. 4
D. 2
16. Which of the following connectors dosen’t come into
coaxial cable connectors?
A. barrel
B. BNC
C. T-connectors
D. UTP
17. BNC stands for…
A. Bayonet network connector
B. Bayonet network cable
C. Barrel network cable
D. nono of the above
18. BNC connectors are used to connect_____or_____with the NIC.
A. RG-58, RG-48
B. RG-62, RG-58
C. RG-58, RG-62
D. RJ-48 , RJ-49
19. BNC connectors is generally used in____and____topology.
A. bus, ring
B. tree, mesh
C. star, bus
D. mesh,bus
20. In the single fibers the core is__to__microns.
A. 9,15
B. 8,10
C. 4,6
D. 10,13
21. How many thicknesses of flexible coaxial cable?
A. 0.25 inch
B. 12 m
C. 15 m
D. 1.25 inch
22. Which cable is used for thicknet coaxial cable?
A. RG-8
B. RG-9
C. RG-11
D. All of the above
23. How many components of fiber optic communication?
A. 3
B. 2
C. 4
D. 5
24. The waves are ranging between 1 and 300 GHz are called______.
A. infrared
B. microwave
C. laser
D. redio wave
25. which of the following components are fiber optic communication?
A. light source
B. transmission medium
C. detector
D. all of the above
26. microwaves are_____.
A. unidirectional
B. directional
C. indirect
D. direct
27. which of the following is not an application of microwaves?
A. cellular phones
B. satellite network
C. wireless clocks
D. wireless lans
28. Electromagnetic waves having frequencies from 300GHz to 400THz are called_____.
A. microwave
B. infrared wave
C. laser
D. radio wave
29. Infrared waves are useful for_______.
A. high range communication
B. short-range frequency
C. short-range communication
D. long range communication
30. Infrared waves are useless for______.
A. long-range communication
B. short-range communication
C. A and B
D. non of thje above
31. The remote controls used on television, VCRs Based on______.
A. laser we’ve
B. microwave
C. radio wave
D. infrared wave
32. LASER stands for…
A. light amplification by simuleted mission of radiation
B. light amplification by stimulated emission of radiation
C. long amplification by stimulated emission of radiation
D. none of the above
33. On a LAN, laser light technology is similar to_____technlogy.
A. infrared
B. microwave
C. laser
D. redio wave
34. L in laser stands for…
A. laser
B. light
C. long
D. limited
35. ______consist of 2 conductors twisted round each other.
A. fiber-optic cable
B. coaxial cable
C. microwave cable
D. twisted-pair cable
36. Category 5 UTP cables______category 1 cables.
A. transmit data at higher rates than
B. transmit data at lower rates then
C. have less twisted per foot then
D. non of the above
37. The most frequently used UTP connector is_____.
A. category 5 connector
B. EIA 232
C. RJ45
D. JR45
38. UTP is popular in LAN technology due to its_____.
A. flexibility
B. low cost
C. ease of installation
D. all of the above
39. The outer metallic sheath in coaxial cable functions as______.
A. a shield against noise
B. a second conductor
C. A and B
D. a unshield against noise
40. The most popular connector used with_____cable is the BNC.
A. twisted-pair
B. shielded twisted-pair
C. coaxial
D. fiber-optic
41. The core of an optical fiber is_____.
A. glass
B. plastic
C. metal
D. A and B
42. light travels at______in a vacuum.
A. 300,000km/s
B. 300,000miles/s
C. 300,000m/s
D. 186,000m/s
43. Light travels at______in the atmosphere.
A. less than 186,000 miles/s
B. greater than 186,000 miles/s
C. 186,000 miles/s
D. 186,000m/s
44. The angle of_____is measured with respect to the vertical axis.
A. incidence
B. reflection
C. refraction
D. all of the above
45. As a beam of light goes from the air into a body of water, its speed_____.
A. increases
B. decreases
C. remains the same
D. doubles
46. There is no reflection until the angle of incidence is greater than the____angle.
A. horizontal
B. refractive
C. critical
D. vertical
45. when the angle of____is 90 degrees the angle of____is equal to the critical angle.
A. incidence; refraction
B. refraction; incidence
C. refraction; reflection
D. reflection; refraction
46. In which propagation mode is the core a uniform single-density?
A. multimode step-index
B. multimode graded-index
C. single mode
D. A and C
47. In which propagation mode the core of varying density is?
A. multimode step-index
B. multimode graded-index
C. single mode
D. A and B
48. A beam of light is least distorted in a_____fiber.
A. multimode step-index
B. multimode graded-index
C. single-mode step-index
D. A and B
49. The____surrounds the_____in a fiber-optic cable.
A. fiber;cladding
B. core; fiber
C. core;claddind
D. cladding;core
50. _____cable is not susceptible to most noise that is electrical.
A. twisted-pair
B. shielded twisted-pair
C. coaxial
D. fiber-optic
1. WDM stands for?
a) Wave division multiplexing
b) Wavelength division multiplexing
c) Wavelength dependent multiplexing
d) Wave dependent multiplexing
View Answer
Explanation: It stands for Wavelength division multiplexing. It has same general architecture as FDM. FDM is frequency division multiplexing.
2. In TDM, the samples occupy adjacent time slots.
a) True
b) False
View Answer
Explanation: The statement is true. The TDM technique is based on sampling and they occupy adjacent slots and are transmitted in a sequence.
3. In this type of multiplexing time slots are preassigned to sources and fixed.
a) TDM
b) Synchronous TDM
c) Asynchronous TDM
d) FDM
View Answer
Explanation: TDM is time division multiplexing. Data rate of medium exceeds data rate of digital signal to be transmitted.
4. Controlling the frequency is referred as _________
a) frequency modulation
b) hertz modulation
c) amplitude modulation
d) phase modulation
View Answer
Explanation: It is referred to as frequency modulation. When there is a change in frequency, it is referred to as frequency modulation.
5. A technique that can be a solution to the problem of synchronizing data sources.
a) framing
b) data link control
c) full link control
d) pulse stuffing
View Answer
Explanation: Pulse stuffing is a technique that can be a solution to the problem of synchronizing data sources. In pulse stuffing, the outgoing data rate is higher than sum of incoming rates.
6. For voice, each channel contains a ___ word of digitized data.
a) 2
b) 1
c) 0
d) 4
View Answer
Explanation: In digital carrier systems, for voice each channel contains one word of digitized data. The data rate is 1.544 Mbps. Five out of six frames have 8 bit PCM samples.
7. Many time slots are wasted in __________
a) TDM
b) Synchronous TDM
c) Asynchronous TDM
d) FDM
View Answer
Explanation: In Synchronous TDM, many time slots are wasted. Other techniques can help overcome this problem.
8. A technique that allocates time slots dynamically.
a) TDM
b) WDM
c) Dynamic TDM
d) Statistical TDM
View Answer
Explanation: Statistical TDM assigns time slots dynamically. They are allocated based on demand. Multiplexer scans input lines and collects data until the frame is full.
9. A system in which two channels are dedicated to transfer data.
a) TV
b) Cable
c) Modem
d) Cable modem
View Answer
Explanation: A cable modem has two dedicated channels from cable TV provider dedicated to data transfer. One in each direction.
10. In this technique, there is a link between subscriber and network and a local loop.
a) SSDL
b) DSDL
c) ASDL
d) TSDL
View Answer
Comments
Post a Comment