With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.At the CRC generator, _______ is (are) added to the dataword after the division process to create the codeword.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.Which of the following is not an analog-to-analog conversion?
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.The metric used by _______ is the hop count.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.What is needed to determine the number of the last byte of a fragment?
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.Communication at the data-link layer is ___________________.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.To use the services of UDP, we need ________ socket addresses.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.Pruning and grafting are strategies used in _______.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8._______ signals can have only a limited number of values in a time interval.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9._______ are used to number the packets of a real-time transmission.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.IPSec defines two protocols: _________ and __________.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11._______ provides redundancy to ensure synchronization and inherent error detection.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.__________ control refers to the mechanisms and techniques to keep the load below the capacity.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.The original telephone network, which is referred to as the plain old telephone system (POTS), was a (an) ________ system.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.All objects managed by SNMP are given an object identifier. The object identifier always starts with _______.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.The application layer in the TCP/IP protocol suite is usually considered to be the combination of ________ layers in the OSI model
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.In PPP, what is the purpose of LCP packets?
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.A packet-filter firewall filters at the ________ or ___________ layer.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.During an FTP session the control connection is opened _______.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.The __________ cellular phone system provided universal personal communication.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.A proxy firewall filters at the __________ layer.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.The source port number on the UDP user datagram header defines _______.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.One of the main duties of the transport layer is to provide ____________ communication.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.An RFC is labeled ________ if it must be implemented by all Internet systems.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.________ uses two carriers, one in-phase and the other quadrature.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25._______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.In TCP, the value of the acknowledgment field in a sent segment defines the sequence number related to the ______ byte a party expects to receive next.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.UDP and TCP are two protocols at the ___________ layer.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.In the domain name space, a _________ is a subtree of the domain name space.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.What is present in all HDLC control fields?
Your Answer:Correct
Your Answer:Incorrect