With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions
Question type
Randomized MCQs.Changes every time you visit the test
Total Number of Questions
30
Time Limit
20 Minutes
Points
1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Question 1 of 30
Q-1.In a ______ handoff, a mobile station can communicate with two base stations at the same time.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.The period of a satellite, the time required for a satellite to make a complete trip around the Earth, is determined by _________ law.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.A proposed standard is elevated to ________ standard status after at least two successful tries.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.Which multiplexing technique involves signals composed of light beams?
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5._______ cable consists of an inner copper core and a second conducting outer sheath.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In ______ TCP, when the connection is established, TCP starts the slow start algorithms and sets the ssthresh variable to a pre-agreed value (normally 64 or 128 kilobytes) and the cwnd variable to 1 MSS.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.In ___________, the identity of a party is verified once for the entire duration of system access.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8._______ are used to number the packets of a real-time transmission.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.The third phase of JPEG is ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.During an FTP session the control connection is opened _______.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.The HDLC _______ field defines the beginning and end of a frame.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.___________ is an interdomain routing protocol using path vector routing.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.In IEEE 802.11, when a frame is going from one station in a BSS to another station in the same BSS, the address flag is _____
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.The sender is a router that has received a datagram destined for a host in the same network. The logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.An agent is a host or router that runs the SNMP _______ process.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.The IEEE 802.11g, uses _________.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.__________ creates a collection of named objects, their types, and their relationships to each other in an entity to be managed.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.Low-Earth-orbit (LEO) satellites have _____ orbits.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.In cyclic redundancy checking, what forms the check bits?
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.________ treats the two signs of congestion detections, timeout and three duplicate ACKs, in the same way.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.The _________ layer is responsible for the delivery of a message from one process to another.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In the Ethernet, the _______ field is actually added at the physical layer and is not (formally) part of the frame.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.A _______ shows the time a packet was produced relative to the first or previous packet.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.In Java, which of the following statement is true?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.In __________ cryptography, the same key is used by the sender and the receiver.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.A station, called ________, is a host that runs the SNMP client program.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29._______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.______________ means concealing the message by covering it with something else.
Your Answer:Correct
Your Answer:Incorrect
Practice More Online Tests