With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.Given the Ethernet address 01011010 00010001 01010101 00011000 10101010 00001111 in binary, what is the address in hexadecimal notation?
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.__________ control refers to the mechanisms and techniques to keep the load below the capacity.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In TCP, the sequence number for each segment is the number of the _______ byte (virtual byte) carried in that segment.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.The _________ routing uses the Dijkstra algorithm to build a routing table.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In the Reno TCP, when TCP enters the fast recovery, if a timeout occurs, TCP ____________________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.Which of the following compression methods is considered as predictive coding?
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.IEEE has defined the specifications for a wireless LAN, called _______, which covers the physical and data link layers.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.The _______ translates local characters into NVT characters.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.DNS can use the services of ________.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.The idea of RZ and the idea of NRZ-I are combined into the ________ scheme.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.________ provides service to the user to make the process of sending or receiving a message easier.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.ICMP is a (an) _________ layer protocol.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.An iterative server handles _________________.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.According to the PPP transition phases diagram, verification of user identification occurs in the _______ state.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16._____ is an application layer protocol that establishes, manages, and terminates a multimedia session.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In _________ cryptography, the same key is used in both directions.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.The _________ component in the SSH provides confidentiality, integrity, authentication and compression.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19._______ cable consists of an inner copper core and a second conducting outer sheath.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.In IEEE 802.11, a BSS without an AP is called _________.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.For a 1-byte length field, what is the maximum value for the data length?
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.____________ is used to compress images.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.SNMP is a (an) ______________ protocol in which a few manager stations control a set of agents.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.HTTP uses the services of _________
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.In IEEE 802.11, the ______ is a time period used for collision avoidance.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.The first address assigned to an organization in classless addressing _______.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.In __________ compression, the integrity of the data _____ preserved because compression and decompression algorithms are exact inverses of each other.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.In TCP, a special segment called a probe is sent by a sending TCP when the _______ timer goes off.
Your Answer:Correct
Your Answer:Incorrect