With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.The IEEE 802.11a, uses _________.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.________ is a type of transmission impairment in which the signal loses strength due to the resistance of the transmission medium.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.We can divide ____ into two different schemes: synchronous or statistical.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In a DHT-based network, each peer
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.________ provides synchronization without increasing the number of bits.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.An e-mail message contains the ________ and the __________.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10._______ cable consists of an inner copper core and a second conducting outer sheath.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.TCP has ____________; SCTP has ____________.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.The TCP/IP protocol suite consists of _______ layers.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.An agent is a host or router that runs the SNMP _______ process.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.In RIP, the ________ timer is used to purge invalid routes from the table.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.The idea of RZ and the idea of NRZ-I are combined into the ________ scheme.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.In the _______ random-access method collision is avoided.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.What is the default prefix length for class A in CIDR notation?
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.An RTP packet is encapsulated in _______.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.The _________ in IPv6 is designed to provide special handling for a particular flow of data.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.The _________ routing uses the Dijkstra algorithm to build a routing table.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In IEEE 802.11, the ______ is a time period used for collision avoidance.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In TCP, the _______ timer is needed to handle the zero window-size advertisement.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.PIM-DM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.The first step in PCM is ________.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.SONET uses _______ TDM multiplexing.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.The signal from a satellite is normally aimed at a specific area called the _________.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.In the TCP/IP protocol suite, a port number is the identifier at the ____________.
Your Answer:Correct
Your Answer:Incorrect