With each visit of this Data Communication and Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.The IEEE 802.11 wireless LANs use ________ types of frames
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.A ________ signature is included in the document; a _______ signature is a separate entity.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In OSPF, a ________ link is a network is connected to only one router.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In IPv6, the ________ prefix defines the purpose of the address
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5._________ utilization is the use of available bandwidth to achieve specific goals.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In a three-stage space division switch, if N = 200, the number of crosspoints is ______
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.ICMPv6 includes _______
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.In the ______ bucket algorithm, bursty chunks are stored in the bucket and sent out at an average rate.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.________ is a repository of information linked together from points all over the world.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.In fiber optics, the signal is _______ waves.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.For a 1-byte length field, what is the maximum value for the data length?
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.A SYN segment cannot carry data; it consumes _____ sequence number(s).
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13._______ happens in any system that involves waiting.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.PCM is an example of _______ conversion.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.In Frame Relay, when a _____ is selected, the corresponding table entry is recorded for all switches by the administrator
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16._______ is the standard mechanism provided by TCP/IP for copying a file from one host to another
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.The session, presentation, and application layers are the ____ support layers.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.In the OSI model, when data is transmitted from device A to device B, the header from A's layer 5 is read by B's _______ layer.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In the __________ method, the signal is included in the packets that carry data.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.A(n)_________ signal is a composite analog signal with an infinite bandwidth.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21._______ refers to two characteristics: when data should be sent and how fast it can be sent.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.The SYN flooding attack belongs to a group of security attacks known as a _____ attack
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.IGMP is a companion to the ______ protocol.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.In PPP, ________ is a simple authentication procedure with a two-step process:
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.In IPv4, when a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.A signal is measured at two different points. The power is P 1 at the first point and P 2 at the second point. The dB is 0. This means ________.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.In ______ transmission, we send 1 start bit (0) at the beginning and 1 or more stop bits (1s) at the end of each byte.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.In the OSI model, encryption and decryption are functions of the ________ layer.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.In Ethernet addressing, if the least significant bit of the first byte is 1, the address is _________
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.According to the Nyquist theorem, we need to sample an analog signal ________times the highest frequency.
Your Answer:Correct
Your Answer:Incorrect