With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.In the common scenario, the electronic mail system needs _________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.The adaptive DM (ADM) is used to solve the problem of _________ in DM.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.Under __________ management, individual users, departments, divisions, or even projects are charged for the services they receive from the network.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.Which of the following attacks is threatening integrity?
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In TCP, a FIN + ACK segment consumes _____ sequence number(s) if it does not carry data.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.A socket address is a combination of __________.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.In Bluetooth, multiple ________ form a network called a _________.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.In the TCP/IP protocol suite, which of the following is a network layer protocol?
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.In IEEE 802.11, a BSS with an AP is sometimes referred to as ____________.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.RPF eliminates the ________ in the flooding process.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.In a datagram approach, the forwarding decision is based on the value of the _____________ field in the packet header.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.The first section of a URL identifier is the __________.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.Napster is an example of a ____________ peer-to-peer network
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.The shortest frame in HDLC protocol is usually the _______ frame.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.In an IS-95 system, the frequency-reuse factor is normally _____.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In a client-server paradigm, a _______ program provides services to a (another) _______ program
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.________ is normally referred to as mB/nB coding; it replaces each m-bit group with an n-bit group.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two ________.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.SNMP uses two other protocols: _______ and _________.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.For CHAP authentication, the user takes the system's _______ and its own _______ to create a result that is then sent to the system.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.___________ is a protocol for controlling the flow and quality of data in association with RTP.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.Which multiplexing technique is used for analog signals?
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.The TCP/IP protocol suite consists of _______ layers.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.In Java implementation of TCP, a client uses _________; a server uses __________.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.TCP groups a number of bytes together into a packet called a ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.An ARP request is normally _______.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.In ATM, the _______ layer accepts transmissions from upper-layer services and maps them into cells.
Your Answer:Correct
Your Answer:Incorrect