With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.In TCP, the window should not be _________.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.Which of the following compression method is not lossless?
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.ICMP is a (an) _________ layer protocol.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.GSM allows a reuse factor of _______.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.________ provides synchronization without increasing the number of bits.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In TCP's __________ algorithm the size of the congestion window increases additively until congestion is detected.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.The TCP/IP protocol suite consists of _______ layers.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.________ uses two carriers, one in-phase and the other quadrature.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.In the Reno TCP, when TCP enters the fast recovery, if duplicate ACKs continue to come, TCP ____________________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.An ARP reply is normally _______.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.The IP header size is _______ bytes long.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.The _____ scheme uses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-level signal.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.In the Internet, an e-mail address consists of two parts: a _______ and a _______.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.BitTorrent is an example of a ____________ peer-to-peer network
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.In TCP, a special segment called a probe is sent by a sending TCP when the _______ timer goes off.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In the TCP/IP protocol suite, which of the following is a network layer protocol?
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.In the PPP frame, the _______ field defines the contents of the data field.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.To distinguish between different data chunks belonging to the same stream, SCTP uses ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In BER, the tag is a ______ field that defines the type of the data; the length is a ______ field.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.In IPv6, the _______ field in the base header restricts the lifetime of a datagram.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.In cyclic redundancy checking, what forms the check bits?
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.________ defines the general rules for naming objects, defining object types, and showing how to encode objects and values.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two ________.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.In arithmetic coding the entire message is mapped to a real number in the interval _________.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.The Response PDU is sent from the ______ to the ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.The use of hierarchy in routing tables can ________ the size of the routing tables.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.Which encoding method uses alternating positive and negative values for 1s?
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.___________ conversion involves three techniques: line coding, block coding, and scrambling.
Your Answer:Correct
Your Answer:Incorrect