With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions
Question type
Randomized MCQs.Changes every time you visit the test
Total Number of Questions
30
Time Limit
20 Minutes
Points
1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Question 1 of 30
Q-1.In the domain name space, a full domain name is a sequence of labels separated by ________.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.The IEEE 802.11a, IEEE 802.11g, or IEEE 802.11n OFDM uses ______ modulation.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.___________ is a second-generation cellular phone system used in Europe.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.TCP is a __________ protocol.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.._________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.Integrated Services is a _______________ QoS model designed for IP.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.The _____ scheme uses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-level signal.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10._______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In ATM, the _______ layer accepts transmissions from upper-layer services and maps them into cells.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.In ________ TDM, slots are dynamically allocated to improve bandwidth efficiency.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.__________ means that the sender and the receiver expect confidentiality.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.SMTP is a __________ protocol.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.__________ is the protocol designed to handle real-time traffic on the Internet.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In _________, the frequency of the carrier signal is varied to represent data. Both peak amplitude and phase remain constant.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.Which error detection method consists of just one redundant bit per data unit?
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In the Ethernet, the _______ field is actually added at the physical layer and is not (formally) part of the frame.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In Manchester and differential Manchester encoding, the transition at the middle of the bit is used for __________.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.In IEEE 802.11, when a frame is going from a station to an AP, the address flag is _____.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.________ is normally referred to as mB/nB coding; it replaces each m-bit group with an n-bit group.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.The _______ translates local characters into NVT characters.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In an SCTP packet, control chunks come ___________ data chunks.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25._____ is a standard designed by ITU to allow telephones on the public telephone network to talk to computers connected to the Internet.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.In the domain name space, if a label is not terminated by a null string, it is called a __________.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.The first phase of JPEG compression process is ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.A socket address is a combination of __________.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29._______ describes the position of the waveform relative to time 0.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.
Your Answer:Correct
Your Answer:Incorrect
Practice More Online Tests