With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.BER specifies that each piece of data be encoded using three fields: _____________________.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.In the TCP/IP protocol suite, which of the following is a network layer protocol?
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In ________, the phase of the carrier is varied to represent two or more different signal elements. Both peak amplitude and frequency remain constant.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In TCP, the value of the acknowledgment field in a sent segment defines the sequence number related to the ______ byte a party expects to receive next.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.The original telephone network, which is referred to as the plain old telephone system (POTS), was a (an) ________ system.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In __________ compression, the integrity of the data _____ preserved because compression and decompression algorithms are exact inverses of each other.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.How many carrier frequencies are used in BPSK?
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.______________ means accepting items from more than one source. ______________ means delivering items to more than one source.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.If an Ethernet destination address is 08:07:06:05:44:33, then this is a ______ address.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.Currently _______ is responsible for the management of Internet domain names and addresses
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In the Reno TCP, when TCP enters the fast recovery, if a timeout occurs, TCP ____________________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13._______ encoding has a transition at the middle of each bit.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14._______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.In a client-server paradigm, a _______ program provides services to a (another) _______ program
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.In _________, autonegotiation allows two devices to negotiate the mode or data rate of operation.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.__________ creates a collection of named objects, their types, and their relationships to each other in an entity to be managed.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.For data, NVT uses US ASCII characters with the highest order bit set to ______.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In arithmetic coding the entire message is mapped to a real number in the interval _________.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.Pruning and grafting are strategies used in _______.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.A _________ has no filtering capability.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In a DHT-based network, each peer
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.In the TCP/IP protocol suite, a port number is the identifier at the ____________.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.A repeater is a connecting device that operates in the _______ layer(s).
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.In ATM, the ______ layer provides routing, traffic management, switching, and multiplexing services.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.Propagation delay (time) is the ratio of ______________________.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.An IPv6 address is _________ bits long.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.________ is a second-generation cellular phone system based on CDMA and DSSS.
Your Answer:Correct
Your Answer:Incorrect