With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.Which multiplexing technique involves signals composed of light beams?
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.AM, FM, and PM are examples of ________ conversion.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In a client-server paradigm
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.DVMRP is a ________ routing protocol, based on RIP.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.In Java two methods, getOutputStream and getInputStream, are provided in the ________ class.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.The application layer in the TCP/IP protocol suite is usually considered to be the combination of ________ layers in the OSI model
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.The _________ layer is responsible for the delivery of a message from one process to another.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.________ is the cell relay protocol designed by the corresponding Forum and adopted by the ITU-T.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.An HTTP request message always contains _______.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.In the _______ tree approach to multicasting, each router needs to create a separate tree for each source-group.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.Two common scrambling techniques are ________.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.In Bluetooth, the _____ link is used when data integrity is more important than avoiding latency.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.In DHCP, the client uses ________ port and the server uses _________ port.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.A device, called ________, is a router (or a host) that runs the SNMP server program.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.Packetizing at the network layer involves
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.For a ______ channel, the Nyquist bit rate formula defines the theoretical maximum bit rate.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In SCTP, a data chunk is numbered using ________.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In IEEE 802.11, the ______ is a time period used for collision avoidance.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21._______ is a first-generation cellular phone system.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.The class used in Java network programming for socket address is the ______________ class.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In BER, the tag is a ______ field that defines the type of the data; the length is a ______ field.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.IS-95 uses the ISM _______ band.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.A router is involved in ____________ layers of the TCP/IP protocol suite.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.The ports ranging from 0 to 1,023 are called the ___________ ports. The ports ranging from 1,024 to 49,151 are called ___________ ports. The ports ranging from 49,152 to 65,535 are called the ___________ ports.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.__________ means that the sender and the receiver expect confidentiality.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.The third phase of JPEG is ___________.
Your Answer:Correct
Your Answer:Incorrect