With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions
Question type
Randomized MCQs.Changes every time you visit the test
Total Number of Questions
30
Time Limit
20 Minutes
Points
1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Question 1 of 30
Q-1.In TCP's __________ algorithm the size of the congestion window increases additively until congestion is detected.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.__________ means combining several streams of traffic into one stream.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.The ________ rate defines the number of data elements sent in one second; the ______ rate is the number of signal elements sent in one second.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In the TCP/IP protocol suite, which of the following is a transport layer protocol?
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.The application layer in the TCP/IP protocol suite is usually considered to be the combination of ________ layers in the OSI model
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.An HLEN value of decimal 10 means _______.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.Pruning and grafting are strategies used in _______.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.In ___________, the identity of a party is verified once for the entire duration of system access.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.________ means the producer delivers the items when they are produced. _______ means the consumer takes the items when it is ready to do so.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.In FTP, there are three types of _______: stream, block, and compressed.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.___________ cryptography is often used for short messages.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.Which of the following functions are performed by UDP?
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.Gnutella is an example of a ____________ peer-to-peer network
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.The use of hierarchy in routing tables can ________ the size of the routing tables.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.In the domain name space, a full domain name is a sequence of labels separated by ________.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.Communication at the data-link layer is ___________________.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.Which QoS model depends heavily on resource reservation?.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.TCP sliding windows are __________ oriented.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.The class used in Java network programming for socket address is the ______________ class.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.PIM-SM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.Routing inside an autonomous system is referred to as ________ routing.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.For control, NVT uses US ASCII characters with the highest order bit set to ______.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC).
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.Since the square matrix that represents the DCT coefficient is an ____________ matrix, inverse and transpose are the same.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.In OSPF, a ________ defines the links of a network.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.Three security goals are _______________________________________.
Your Answer:Correct
Your Answer:Incorrect
Practice More Online Tests