With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1._______ is (are) a channelization protocol.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.._____________ is a language for creating a static document
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.A proposed standard is elevated to ________ standard status after at least two successful tries.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In IEEE 802.11, distributed coordination function (DCF) uses _______ as the access method.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.According to the PPP transition phases diagram, options are negotiated in the _______ state.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In ______ TCP, when the connection is established, TCP starts the slow start algorithms and sets the ssthresh variable to a pre-agreed value (normally 64 or 128 kilobytes) and the cwnd variable to 1 MSS.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.A GEO have ________ orbit and revolves in phase with Earth.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.In a datagram approach, the forwarding decision is based on the value of the _____________ field in the packet header.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.__________ means combining several streams of traffic into one stream.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.The SYN flooding attack belongs to a group of security attacks known as a _____ attack.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.FTP uses the services of ________.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.During an FTP session the control connection is opened _______.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14._________ can impair a signal.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.At the transport layer, to define the processes, we need two identifiers called ____________.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.An HTTP request message always contains _______.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.____________ is used to compress images.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In the _______ tree approach to multicasting, each router needs to create a separate tree for each source-group.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.IntServ model is ________________________________________
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.A server in a client-server paradigm can be designed either as an _______ server or a _________ server.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22._____________ means concealing the contents of a message by enciphering.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.________ uses two carriers, one in-phase and the other quadrature.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.How many carrier frequencies are used in BPSK?
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.The ___________ management system is responsible for controlling access to the network based on the pre-defined policy.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.The ________ rate defines the number of data elements sent in one second; the ______ rate is the number of signal elements sent in one second.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.A _______ algorithm is a policing technique that shapes bursty traffic into fixed-rate traffic by averaging the data rate, but it does not give credit to the user during idle periods.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.Which of the following compression methods is considered as predictive coding?
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.Baseband transmission of a digital signal is possible only if we have a ____ channel.
Your Answer:Correct
Your Answer:Incorrect