With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.A proposed standard is elevated to ________ standard status after at least two successful tries.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.The IEEE 802.11 or IEEE 802.11b DSSS uses ______ modulation.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.For many applications, we need a program or a script to be run at the client site. These are called _______________ documents
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.Controlled-Load services in IntServ model is designed for applications that ______________________.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.In TCP, a SYN + ACK segment consumes _____ sequence numbers.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6._______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.Which of the following attacks is threatening availability?
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.Which error detection method uses one's complement arithmetic?
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.Which of the following statements about wired and wireless LANs is correct?
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.In cyclic redundancy checking, what forms the check bits?
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.._____________ is a language for creating a static document
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.The Internet Protocol (IP) is ________ protocol.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.The DagramSocket class is used to create sockets ________________.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.Baseband transmission of a digital signal is possible only if we have a ____ channel.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.The most common technique to change an analog signal to digital data is called __________.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.In IEEE 802.11, communication between two stations in two different BSSs usually occurs via two ________.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.IEEE has defined the specifications for a wireless LAN, called _______, which covers the physical and data link layers.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.In TCP, the window should not be _________.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.To implement _________, the DS node uses _________________ such as meters, markers, shapers, and droppers
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.The sender is a router that has received a datagram destined for a host in the same network. The logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.Integrated Services is a _______________ QoS model designed for IP.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.In a _________ name space, each name is made of several parts.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.SCTP allows __________ service in each association.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.The first section of a URL identifier is the __________.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.Since the square matrix that represents the DCT coefficient is an ____________ matrix, inverse and transpose are the same.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.Which of the following encoding methods does not provide for synchronization?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.In Ethernet addressing, if all the bits are 1s, the address is _________.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.In IEEE 802.11, the ______ is a time period used for collision avoidance.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.In IEEE 802.11, the addressing mechanism can include up to ______ addresses.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.We need to multiply the header length field by _______ to find the total number of bytes in the TCP header.
Your Answer:Correct
Your Answer:Incorrect