With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.TCP uses _________________ to check the safe and sound arrival of data.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.A link-layer switch is a connecting device that operates in the _______ layer(s).
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In the TCP/IP protocol suite, a logical address is the identifier at the _______________.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.During an FTP session the data connection may be opened _______.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.In FTP, _________ well-known port(s) is (are) used.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.A packet-filter firewall filters at the ________ or ___________ layer.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.___________ is a second-generation cellular phone system used in Europe.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.______________ means accepting items from more than one source. ______________ means delivering items to more than one source.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.______________ assigns shorter codes to symbols that occur more frequently and longer codes to those that occur less frequently.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.In IEEE 802.11, the access method used in the PCF sublayer is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.In __________ a key is stored in a node whose identifier is numerically closest to the key.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In the TCP/IP protocol suite, a port number is the identifier at the ____________.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.In the domain name space, a _________ is a subtree of the domain name space.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.In the domain name space, what a server is responsible for or has authority over is called a _________.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.In SONET, for each byte, the bits are transmitted ____________.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.A _______ shows the time a packet was produced relative to the first or previous packet.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In the PPP frame, the _______ field is similar to that of the U-frame in HDLC.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.In ATM, the _______ layer accepts transmissions from upper-layer services and maps them into cells.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In OSPF, a ________ defines the links of a network.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.BER specifies that each piece of data be encoded using three fields: _____________________.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.A _______ server is a computer whose zone system consists of the whole tree.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23._______ encoding has a transition at the middle of each bit.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In Java, which of the following statement is true?
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.In IEEE 802.11, a station with ________ mobility can move from one BSS to another, but the movement is confined inside one ESS.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.Bluetooth uses ______ in the physical layer to avoid interference from other devices or other networks.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.Three security goals are _______________________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.In IEEE 802.11, a station with ________ mobility is either stationary (not moving) or moving only inside a BSS.
Your Answer:Correct
Your Answer:Incorrect