With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.In SONET, a ________ is a repeater.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.To implement _________, the DS node uses _________________ such as meters, markers, shapers, and droppers
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.SMI emphasizes three attributes to handle an object: _______, ________, and _________.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.Lempel Ziv Welch (LZW) method is an example of ______________.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.In ______ the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data. In other words, each band is reserved for a specific station, and it belongs to the station all the time.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.Three security goals are _______________________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.The transport-layer packet in the TCP/IP protocol suite is called
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.The IEEE 802.11a, uses _________.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.A port number is _______ bits long.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In fiber optics, the signal is _______ waves.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.FTP uses the services of ________.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.The ports ranging from 0 to 1,023 are called the ___________ ports. The ports ranging from 1,024 to 49,151 are called ___________ ports. The ports ranging from 49,152 to 65,535 are called the ___________ ports.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.The use of hierarchy in routing tables can ________ the size of the routing tables.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.To distinguish between different streams, SCTP uses ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.The IP header size is _______ bytes long.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.SNMP uses two other protocols: _______ and _________.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.________ is the process of converting digital data to a digital signal.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In the stop-and-wait protocol, the maximum send window size is ______ and the maximum receive window size is _______ where m is the number of bits in the sequence.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.IS-95 uses the _______ satellite system for synchronization.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22._____________ means concealing the contents of a message by enciphering.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In CRC, the quotient at the sender _______.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In the domain name space, a _________ is a subtree of the domain name space.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.In ________, each node maintains a vector (table) of minimum distances to every node.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.In an IS-95 system, the frequency-reuse factor is normally _____.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.The ______ technique expands the bandwidth of a signal by replacing each data bit with n bits using a spreading code.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.A client program normally uses ____________ port number. A server program normally uses __________ port number.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.PIM-SM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.In the slow start algorithm, the size of the congestion window grows ______________ until ___________________.
Your Answer:Correct
Your Answer:Incorrect