With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.Communication at the data-link layer is ___________________.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.In _______ routing, the least cost route between any two nodes is the route with the minimum distance.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In the TCP/IP protocol suite, which of the following is a transport layer protocol?
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In arithmetic coding the entire message is mapped to a real number in the interval _________.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.In a frequency-domain plot, the horizontal axis measures the ________.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.___________ cryptography is often used for short messages.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.HTTP uses the services of _________
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.Which of the following is not a Chord interface.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.________ uses two carriers, one in-phase and the other quadrature.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.IS-95 uses the _______ satellite system for synchronization.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.SNMP uses the services of UDP on two well-known ports, _______ and _______.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.A _________ has no filtering capability.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.In CRC, if the dataword is 111111 and the divisor 1010, what is the dividend at the sender?
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.The largest portion of the bandwidth for ADSL carries _______.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19._______ are used to number the packets of a real-time transmission.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In Ethernet addressing, if all the bits are 1s, the address is _________.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.In Bluetooth, multiple ________ form a network called a _________.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.When the majority of the Internet has moved to the IPv6 but some still use IPv4, which transition strategy should be used?
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In FTP, there are three types of _______: stream, block, and compressed.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.__________ control refers to the mechanisms and techniques to keep the load below the capacity.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26._______ signals can have only a limited number of values in a time interval.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.______________ can provide authentication, integrity, and nonrepudiation for a message.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.The IEEE 802.11b, uses _________.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.A (An) ______ signal is the corresponding optical signals of an electrical signal level STS-n.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.Baseband transmission of a digital signal is possible only if we have a ____ channel.
Your Answer:Correct
Your Answer:Incorrect