With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.Which multiplexing technique is used for analog signals?
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.An RFC is labeled ________ if it must be implemented by all Internet systems.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In TCP, Karn's algorithm is used in calculations by the _______ timer.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.In the Internet, an e-mail address consists of two parts: a _______ and a _______.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.Which of the following method is used to improve QoS?
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.In a DHT-based network, each peer
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.In TCP, a FIN segment consumes ____ sequence numbers if it does not carry data.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.Which of the following encoding methods does not provide for synchronization?
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.________ is a type of transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11._______________ is responsible for establishing a connection.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.HDLC is an acronym for _______.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.TCP sliding windows are __________ oriented.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.In ______, the router forwards the received packet through only one of its interfaces.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.________ treats the two signs of congestion detections, timeout and three duplicate ACKs, in the same way.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In OSPF, a ________ link is a network connected to only one router.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.Propagation delay (time) is the ratio of ______________________.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.The idea of RZ and the idea of NRZ-L are combined into the ________ scheme.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.__________ control refers to the mechanisms and techniques to keep the load below the capacity.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.Pruning and grafting are strategies used in _______.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using __________ paradigm.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.The _______ protocol provides message authentication, integrity, and privacy.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.The Response PDU is sent from the ______ to the ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.________ provides synchronization without increasing the number of bits.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.In the PPP frame, the _______ field is for error control.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.RPB guarantees that each destination receives _________ of the packet.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.If the ASCII character G is sent and the character D is received, what type of error is this?
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.In a ______ handoff, a mobile station can communicate with two base stations at the same time.
Your Answer:Correct
Your Answer:Incorrect