With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.___________ conversion involves three techniques: line coding, block coding, and scrambling.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2._______ requires one primary station and one or more secondary stations.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In _________ cryptography, the same key is used in both directions.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.____ is designed to use the high bandwidth capability of fiber-optic cable.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.The root of the DNS tree is _______.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.Which multiplexing technique is used for digital signals?
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.Which of the following could not be an Ethernet multicast destination address?
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.The congestion window size, after it passes the initial slow start state, follows a saw tooth pattern called _________________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.A router is a connecting device that that operates in the _______ layer(s).
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.For CHAP authentication, the user takes the system's _______ and its own _______ to create a result that is then sent to the system.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.A link-layer switch is involved in ______________ layers of the TCP/IP protocol suite
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.A concurrent server can server ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.HTTP uses the services of _________
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.The performance of a network can be measured in terms of ________.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.The first section of a URL identifier is the __________.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.Bluetooth is a _______ technology that connects devices (called gadgets) in a small area.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.An RFC is labeled ________ if it must be implemented by all Internet systems.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In the Ethernet frame, the _______ field contains error detection information.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.Which step of transform coding used in multimedia is lossy?
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.To solve the network addressing problem, a mobile host _____________________.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In TCP, a SYN segment consumes _____ sequence number(s).
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In Ethernet addressing, if the least significant bit of the first byte is 0, the address is _________.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.._________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.What is needed to determine the number of the last byte of a fragment?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.The number of addresses assigned to an organization in classless addressing _______.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.In RIP, the ________ timer controls the advertising of regular update messages.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.SMI has two broad categories of data type: _______ and _______.
Your Answer:Correct
Your Answer:Incorrect