With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.In __________ cryptography, the same key is used by the sender and the receiver.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.Which error detection method involves polynomials?
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In FTP, there are three types of _______: stream, block, and compressed.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In FTP, _________ well-known port(s) is (are) used.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.IPSec operates at two different modes: _________ mode and _________ mode.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.Which of the following is not a guided medium?
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.The first section of a URL identifier is the __________.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.._____________ is a language for creating a static document
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In ______ schemes, the voltage level oscillates between a positive and a negative values although it may remain at zero level between the two values.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.The second generation of cable networks is called a(n) _________ network.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.An ARP reply is normally _______.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.Baseband transmission of a digital signal is possible only if we have a ____ channel.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.The address field of a frame in HDLC protocol contains the address of the _______ station.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In __________ compression, the integrity of the data _____ preserved because compression and decompression algorithms are exact inverses of each other.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.The Trap PDU is sent from the ______ to the _______ to report an event.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In the stop-and-wait protocol, the maximum send window size is ______ and the maximum receive window size is _______ where m is the number of bits in the sequence.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.IntServ model is ________________________________________
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.In IEEE 802.11, a BSS with an AP is sometimes referred to as ____________.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.A simple sine wave can be represented by one single spike in the _____ domain.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.The ________ rate defines the number of data elements sent in one second; the ______ rate is the number of signal elements sent in one second.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.A three-layer switch is a __________.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.Which multiplexing technique involves signals composed of light beams?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.A station, called ________, is a host that runs the SNMP client program.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.___________ cryptography is often used for short messages.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.The third phase of JPEG is ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.____________ is used to compress images.
Your Answer:Correct
Your Answer:Incorrect