With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.Lempel Ziv Welch (LZW) method is an example of ______________.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.During an FTP session the control connection is opened _______.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.Which of the following could not be an Ethernet unicast destination address?
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.Port forwarding is ____________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.How many carrier frequencies are used in BFSK?
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In the TCP/IP protocol suite, which of the following is a transport layer protocol?
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.In IEEE 802.11, distributed coordination function (DCF) uses _______ as the access method.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.In a ___________ connection, the server leaves the connection open for more requests after sending a response.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.Which of the following best describes a single-bit error?
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12._____ is an application layer protocol that establishes, manages, and terminates a multimedia session.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.The root of the DNS tree is _______.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.The _______ data types are atomic data types.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.A (An) ______ signal is the corresponding optical signals of an electrical signal level STS-n.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.For many applications, we need a program or a script to be run at the client site. These are called _______________ documents
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In the Ethernet, the _______ field is actually added at the physical layer and is not (formally) part of the frame.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20._______ describes the position of the waveform relative to time 0.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.In IEEE 802.11, a station with ________ mobility can move from one BSS to another, but the movement is confined inside one ESS.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.TCP groups a number of bytes together into a packet called a ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.Clark's solution can solve the silly window syndrome created by the _________.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.Which of the following statements about wired and wireless LANs is correct?
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.When a user logs into a local time-sharing system, it is called ________ login.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.A serious problem can arise in the sliding window operation when either the sending application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.In IEEE 802.11, when a frame is coming from an AP and going to a station, the address flag is _______.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.The formal protocol that defines the MTA client and server in the Internet is called ___________.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.Controlled-Load services in IntServ model is designed for applications that ______________________.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.
Your Answer:Correct
Your Answer:Incorrect