With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.________ provides service to the user to make the process of sending or receiving a message easier.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.When propagation speed is multiplied by propagation time, we get the ________.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In the domain name space, a _________ is a subtree of the domain name space.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4._______ provides redundancy to ensure synchronization and inherent error detection.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.The _________ product defines the number of bits that can fill the link.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.Which of the following attacks is threatening integrity?
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.A serious problem can arise in the sliding window operation when either the sending application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.Channelization (or channel partition as sometime called) is a multiple-access method in which the available bandwidth of a link is shared _________ between different stations.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.Which multiplexing technique shifts each signal to a different carrier frequency?
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.A _______ algorithm is a policing technique that allows bursty traffic at a regulated maximum rate and give some credits to the user during idle periods.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.Fast Ethernet has a data rate of ________ Mbps.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In ________, instead of quantizing each sample separately, the differences are quantized.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.The _______ was designed to provide security at the transport layer.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.___________ cryptography is often used for short messages.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.If an Ethernet destination address is 08:07:06:05:44:33, then this is a ______ address.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.How many carrier frequencies are used in BFSK?
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.In ______ schemes, the voltage level oscillates between a positive and a negative values although it may remain at zero level between the two values.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In the TCP/IP protocol suite, a port number is the identifier at the ____________.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.TCP has ____________; SCTP has ____________.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.UDP packets have a fixed-size header of _______ bytes.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.________ is a type of transmission impairment in which the signal loses strength due to the resistance of the transmission medium.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23._______ was formed to connect universities with no defense ties.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.Which multiplexing technique involves signals composed of light beams?
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.The IEEE 802.11b, uses _________.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.In the asymmetric-key method used for confidentiality, which key is publicly known?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.For a ______ channel, the Nyquist bit rate formula defines the theoretical maximum bit rate.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.In Java implementation of TCP, a client uses _________; a server uses __________.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.In CRC, if the dataword is 111111 and the divisor 1010, what is the dividend at the sender?
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.The ________________ class is used to create datagram packets.
Your Answer:Correct
Your Answer:Incorrect