With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.SNMP is a (an) ______________ protocol in which a few manager stations control a set of agents.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.In __________ cryptography, everyone has access to everyone's public key.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.TCP sliding windows are __________ oriented.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In TCP's __________ algorithm the size of the congestion window increases additively until congestion is detected.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.In the TCP/IP protocol suite, a logical address is the identifier at the _______________.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.Low-Earth-orbit (LEO) satellites have _____ orbits.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.SMI emphasizes three attributes to handle an object: _______, ________, and _________.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.In Bluetooth, multiple ________ form a network called a _________.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.In the DNS, the names are defined in ___________ structure.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.Port forwarding is ____________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.In the Go-Back-N protocol, the maximum send window size is ______ and the maximum receive window size is _______, where m is related to the number of bits in the sequence. number.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In the asymmetric-key method used for confidentiality, the receiver uses his/her own ______________ to decrypt the message.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.The _______ protocol provides message authentication, integrity, and privacy.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.An ARP request is normally _______.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.IntServ model is ________________________________________
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.Gnutella is an example of a ____________ peer-to-peer network
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.A simple sine wave can be represented by one single spike in the _____ domain.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.In BER, the tag is a ______ field that defines the type of the data; the length is a ______ field.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In OSPF, a ________ link is a network connected to only one router.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21._______ encoding has a transition at the beginning of each 0 bit.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.In a DHT-based network, each peer
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In a ______ handoff, a mobile station can communicate with two base stations at the same time.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.The IEEE 802.11a, IEEE 802.11g, or IEEE 802.11n OFDM uses ______ modulation.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25._______ data are continuous and take continuous values.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.The adaptive DM (ADM) is used to solve the problem of _________ in DM.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.In RIP, the ________ timer controls the advertising of regular update messages.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.How many carrier frequencies are used in BASK?
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.In ATM, the _______ layer accepts transmissions from upper-layer services and maps them into cells.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.In TCP, an ACK segments that carry no data consumes _______ sequence number(s).
Your Answer:Correct
Your Answer:Incorrect
Practice More Online Tests