With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.In ATM, the ______ layer provides routing, traffic management, switching, and multiplexing services.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2._________ cryptography is often used for long messages.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.How many carrier frequencies are used in BASK?
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.______ is based on a principle called trilateration.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.According to the PPP transition phases diagram, verification of user identification occurs in the _______ state.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6._______ data are continuous and take continuous values.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.__________ coding is based on the science of psychoacoustics, which is the study of how people perceive sound.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.In TCP, ________ retransmission timer is set for an ACK segment.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.ASK, PSK, FSK, and QAM are examples of ________ conversion.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.A serious problem can arise in the sliding window operation when either the sending application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.In RIP, the ________ timer controls the advertising of regular update messages.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.The _______ data types are atomic data types.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.In the TCP/IP protocol suite, which of the following is an application layer protocol?
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.In _____ transmission, the carrier signal is modulated so that its amplitude varies with the changing amplitudes of the modulating signal.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.._________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In ___________, the identity of a party is verified once for the entire duration of system access.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.SONET sends ________ frames per second
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.A proxy firewall filters at the __________ layer.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.Integrated Services is a _______________ QoS model designed for IP.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.In ________, instead of quantizing each sample separately, the differences are quantized.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.In FTP, when we _______, it is copied from the client to the server.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In the Reno TCP, when TCP enters the fast recovery, if a new (non duplicate) ACK arrives TCP ____________________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.TCP is a __________ protocol.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.If the fragment offset has a value of 100, it means that _______.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________ addressing.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.For a ______ channel, the Nyquist bit rate formula defines the theoretical maximum bit rate.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.In TCP, an ACK segments that carry no data consumes _______ sequence number(s).
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.SMI uses another standard, ___________, to encode data to be transmitted over the network.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.The ___________ management system is responsible for controlling access to the network based on the pre-defined policy.
Your Answer:Correct
Your Answer:Incorrect