32
Demodulation is a process of A. Converting analog to digital signals B. Converting digital to analog signals C. Multiplexing various signals into one high speed line signals D. Performing data description Answer A__________________________________________________________________________ ___________ How many hosts are attached to each of the local area networks at your site? A. 128 B. 256 C. 254 D. 512 Answer C__________________________________________________________________________ ___________ If the period of a signal is 1000 ms, then what is its frequency in kilohertz ? A. 10 –3 KHz B. 10 –2 KHz C. 10 –1 KHz D. 1 KHz Answer A__________________________________________________________________________ ___________ Device on one network can communicate with devices on another network via a A. Hub/Switch B. Utility server C. File server D. Gateway Answer D__________________________________________________________________________ ___________ How many digits of the DNIC (Data Network Identification Code) identify the country? A. First three B. First four C. First five D. First six Answer A__________________________________________________________________________ ___________ Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)

cn new

Embed Size (px)

DESCRIPTION

mcq for data network

Citation preview

Page 1: cn new

 Demodulation is a process of 

 A. Converting analog to digital signals B. Converting digital to analog signals C.  Multiplexing various signals into one high speed line signals D.  Performing data description     Answer  A_____________________________________________________________________________________How many hosts are attached to each of the local area networks at your site? 

 A. 128 B. 256 C.  254 D.  512     Answer  C_____________________________________________________________________________________If the period of a signal is 1000 ms, then what is its frequency in kilohertz ? 

 A. 10–3 KHz B. 10–2 KHz C.  10–1 KHz D.  1 KHz     Answer  A_____________________________________________________________________________________Device on one network can communicate with devices on another network via a 

 A. Hub/Switch B. Utility server C.  File server D.  Gateway     Answer  D_____________________________________________________________________________________How many digits of the DNIC (Data Network Identification Code) identify the country? 

 A. First three B. First four C.  First five D.  First six     Answer  A_____________________________________________________________________________________Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol) 

 A. Transport layer B. Data link layer C.  Network layer D.  Application layer     Answer  C_____________________________________________________________________________________The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called 

 A. Router B. Bridge C.  Gateway D.  Switch     Answer  C_____________________________________________________________________________________Which of the following technique is used for encapsulation? 

 A. A technique used in best-effort delivery systems to avoid endlessly looping packets.

Page 2: cn new

 B. A technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. C.  One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size D.  All of the above     Answer  B_____________________________________________________________________________________What frequency range is used for FM radio transmission? 

 A. Very Low Frequency : 3 kHz to 30. kHz B. Low Frequency : 30 kHz to 300 kHz C.  High Frequency : 3 MHz to 30 MHz D.  Very High Frequency : 30 MHz to 300 MHz     Answer  D_____________________________________________________________________________________Which of the following types of channels moves data relatively slowly? 

 A. Wideband channel B. Voiceband channel C.  Narrowband channel D.  Broadband channel     Answer  CIn cyclic redundancy checking CRC is the 

 A. Divisor B. Quotient C.  Dividend D.  Remainder     Answer  D_____________________________________________________________________________________

Mobile IP provides two basic functions 

 A. Route discovery and registration B. Agent discovery and registration C.  IP binding and registration D.  None of the above     Answer  B_____________________________________________________________________________________

The amount of uncertainty in a system of symbol is called 

 A. Bandwidth B. Entropy C.  Loss D.  Quantum     Answer  B_____________________________________________________________________________________

Match the following with link quality measurement and handoff initiation :(a) Networked-Controlled Handoff(NCHO)    (i) MS connect to BS(b) Mobile-Assisted Handoff(MAHO)            (ii) Process via channel the target BS(c) Forward Handoff                                        (iii) First Generation Analog Cellular System(d) Hard Handoff                                             (iv) Second Generation Digital Cellular System 

 A. (iii)  (iv)  (ii)  (i) B. (ii)  (iii)  (i)  (iv) C.  (ii)  (i)   (iv)  (iii) D.  (iv)  (iii)  (i)  (ii)

Page 3: cn new

     Answer  A_____________________________________________________________________________________

MTU is specified by 

 A. IP Datagram size B. Hardware technology C.  TCP Segment size D.  None of the above     Answer  B_____________________________________________________________________________________

The number of bits required for an IPV6 address is 

 A. 32 B. 64 C.  128 D.  256     Answer  C_____________________________________________________________________________________

Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of 

 A. Integer B. Character C.  Real numbers D.  Bits     Answer  D_____________________________________________________________________________________

Which technology is sometime referred to as wireless cable ? 

 A. MMDS B. ATM C.  LMDS D.  CDMA     Answer  A_____________________________________________________________________________________

Frames from one LAN can be transmitted to another LAN via the device 

 A. Router B. Bridge C.  Repeater D.  Modem     Answer  B_____________________________________________________________________________________

Protocol used to monitor and control network devices operates at 

 A. Application layer B. Transport layer C.  Network layer D.  Data Link layer     Answer  A

FTP does not use 

 A. Two transfer mode B. Control connect ion to remote computer before file can be transfer red

Page 4: cn new

 C.  User Datagram Protocol D.  Authorizat ion of a user through login and password verification     Answer  C_____________________________________________________________________________________

Sending a file from your personal computer primary memory or disk to another computer is called 

 A. Uploading B. Downloading C.  Logging on D.  Hang on     Answer  A_____________________________________________________________________________________

A telephone conference call is an example of which type of communications 

 A. Same time / same place B. Same time / different place C.  Different time / different place D.  Different time / same place     Answer  B_____________________________________________________________________________________

What is the size (in terms of bits) of Header length field in IPV4 header ? 

 A. 2 B. 4 C.  8 D.  16     Answer  B_____________________________________________________________________________________

What is the name of the software package that allows people to send electronic mail along a network of computers and workstations? 

 A. Memory resident package B. Project management package C.  Data communication package D.  Electronic mail package     Answer  C_____________________________________________________________________________________

What are the data transmission channels available for carrying data from one location to another? 

 A. Narrowband B. Voiceband C.  Broadband D.  All of the above     Answer  D_____________________________________________________________________________________

In case of Bus/Tree topology signal balancing issue is overcome by 

 A. Modulation B. Polling C.  Segmentation D.  Strong transmitter     Answer  C_____________________________________________________________________________________

Page 5: cn new

The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband. 

 A. Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel B. Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable C.  Baseband refers to local area networks, and broadband refers to wide area networks. D.  Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed     Answer  B_____________________________________________________________________________________

Which of the following IP address class is a multicast address ? 

 A. Class A B. Class B C.  Class C D.  Class D     Answer  D_____________________________________________________________________________________

Devices interconnected by the LAN should include 

 A. Computers and terminals B. Mass storage device, printers and plotters C.  Bridges and gateways D.  All of the above     Answer  D

A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ? 

 A. Communication software B. Error detection protocols C.  Link access procedure (LAP) D.  Telecommunications     Answer  A_____________________________________________________________________________________

Which one of the following is an error reporting protocol? 

 A. ARP B. ICMP C.  TCP D.  UDP     Answer  B

  Explanation ICMP is an error reporting protocol . 

_____________________________________________________________________________________

An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to Organization A,and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B? 

Page 6: cn new

 A. 245.248.136.0/21 and 245.248.128.0/22 B. 245.248.128.0/21 and 245.248.128.0/22 C.  245.248.132.0/22 and 245.248.132.0/21 D.  245.248.136.0/24 and 245.248.132.0/21     Answer  A_____________________________________________________________________________________

The geostationary satellite used for communication systems 

 A. Rotates with the earth B. Remains stationary relative to the earth C.  Is positioned over equator D.  All of the above     Answer  D_____________________________________________________________________________________

An example of an analog communication method is 

 A. Laser beam B. Microwave C.  Voice grade telephone line D.  All of the above     Answer  D_____________________________________________________________________________________

Which address is the loopback address? 

 A. 0.0.0.1 B. 127.0.0.1 C.  255.255.255.255 D.  127.0.0.0     Answer  B_____________________________________________________________________________________

Network address prefixed by 1110 is a 

 A. Class A address B. Multicast address C.  Class B address D.  Reserve address     Answer  B_____________________________________________________________________________________

ATM is an example of 

 A. Ring topology B. Star topology C.  Bus topology D.  None of the above     Answer  B_____________________________________________________________________________________

A remote batch-processing operation in which data is solely input to a central computer would require a 

 A. Telegraph line B. Simplex lines C.  Mixedband channel D.  All the above

Page 7: cn new

     Answer  B_____________________________________________________________________________________

A Network uses a star topology if 

 A. Computers are arranged in a closed loop B. All computers attach to a central point C.  All computers attach to a single long cable D.  Computers attach to multiple hierarchical cables     Answer  B_________________________

The addressing especially used by Transport Layer is 

 A. Station address B. Network address C.  Application port address D.  Dialog address     Answer  B_____________________________________________________________________________________

Which network topology is considered passive? 

 A. Cross B. Star C.  Bus D.  Tree     Answer  C_____________________________________________________________________________________

The cost of the network is usually determined by 

 A. time complexity B. switching complexity C.  circuit complexity D.  none of these     Answer  B_____________________________________________________________________________________

Internet-like networks within an enterprise 

 A. Intranets B. Switching alternating C.  Inter organizational networks D.  Extranets     Answer  A_____________________________________________________________________________________

Error detecting method that can detect more errors without increasing additional information in each packet is 

 A. Checksum B. Even parity mechanism C.  CRC D.  Odd parity mechanism     Answer  C_____________________________________________________________________________________

The single stage network is also called 

 A. one sided network B. two sided network

Page 8: cn new

 C.  recirculating network D.  pipeline network     Answer  C_____________________________________________________________________________________

The unlicensed National Information Infrastructure band operates at the _________ frequency 

 A. 2.4 GHz B. 5 GHz C.  33 MHz D.  5 MHz     Answer  B_____________________________________________________________________________________

In the IPv4 addressing format, the number of networks allowed under Class C addresses is 

 A. 214

 B. 27

 C.  221

 D.  224

     Answer  C_____________________________________________________________________________________

Which of the following does not allow multiple users or devices to share one communications line? 

 A. Doubleplexer B. Multipplexer C.  Concentrator D.  Controller     Answer  A_____________________________________________________________________________________

The Fiber Distributed Data Interface uses: 

 A. single mode fibers and LEDs B. multimode fibers and LEDs C.  single mode fibers and ILDs D.  multimode fibers and ILDs     Answer  B

The receive equalizer reduces delay distortions using a 

 A. Tapped delay lines B. Gearshift C.  Descrambler D.  Difference Engine     Answer  A_____________________________________________________________________________________

Which one of the following uses the greatest number of layers in the OSI model? 

 A. Bridge B. Repeater C.  Router D.  Gateway     Answer  D_____________________________________________________________________________________

Page 9: cn new

Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is 

 A. Layer – 5 (Application) B. Layer – 1 (Physical) C.  Layer – 3 (Internet) D.  Layer – 2 (Network Interface)     Answer  A_____________________________________________________________________________________

End-to-End connectivity is provided from Last-to-Last in 

 A. Network layer B. Session layer C.  Transport layer D.  Data link layer     Answer  C_____________________________________________________________________________________

Decryption and encryption of data are the responsibility of which of the following layer ? 

 A. Physical layer B. Data Link layer C.  Presentation layer D.  Session layer     Answer  C_____________________________________________________________________________________

Assume that source S and destination D are connected through two intermediate routers labeled R. Determine how many times each packet has to visit the network layer and the data link layer during a transmission from S to D.

 A. Network layer – 4 times and Data link layer-4 times B. Network layer – 4 times and Data link layer-3 times C.  Network layer – 4 times and Data link layer-6 times D.  Network layer – 2 times and Data link layer-6 times     Answer  C

  Explanation Each packet will visit network layer at S and D once and at two intermediate nodes R, R also once, so 4 times in total. Packet will visit Data link layer at S and D once (same as Network Layer), but in addition it will visit data link layer of routers(R, R) each two times. Once at the beginning when packet reaches R and goes up from Physical-Data Link-Network and second time in the reverse order while coming out of router in order Network-Data link-Physical. Hence 6 times in total. 

_____________________________________________________________________________________

The protocol data unit (PDU) for the application layer in the Internet stack is 

 A. Segment B. Datagram

Page 10: cn new

 C.  Message D.  Frame     Answer  C_____________________________________________________________________________________

Identify the incorrect statement 

 A. he ATM adoption layer is not service dependent B. Logical connections in ATM are referred to as virtual channel connections C.  ATM is streamlined protocol with minimal error and flow control capabilities D.  ATM is also known as cell delays     Answer  A_____________________________________________________________________________________

Which of the following transport layer protocols is used to support electronic mail? 

 A. SMTP B. IP C.  TCP D.  UDP     Answer  C_____________________________________________________________________________________

Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? 

 A. Layer 7 protocols B. Layer 6 protocols C.  Layer 5 protocols D.  Layer 4 protocols     Answer  A

The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are 

 A. TCP, UDP, UDP and TCP B. UDP, TCP, TCP and UDP C.  UDP, TCP, UDP and TCP D.  TCP, UDP, TCP and UDP     Answer  C_____________________________________________________________________________________

Which of the following are Data Link Layer standard ?1. Ethernet       2. HSSI      3. Frame Relay4. 10 – Base T  5. Token Ring 

 A. 1, 2, 3 B. 1, 3, 5 C.  1, 3, 4, 5 D.  1, 2, 3, 4, 5     Answer  C_____________________________________________________________________________________

To employ multi-access in GSM, users are given different: 

 A. time slots B. bandpass filters C.  Andsets

Page 11: cn new

 D.  frequency bands     Answer  B_____________________________________________________________________________________

Which of the following summation operations is performed on the bits to check an error-detecting code? 

 A. Codec B. Coder-decoder C.  Checksum D.  Attenuation     Answer  C_____________________________________________________________________________________

 A leased special high-speed connection from the local telephone carrier for business users that transmits at 1.544 mbps is known as ________ carrier. 

 A. T1 B. T2 C.  T3 D.  T4     Answer  A_____________________________________________________________________________________

Which of the following technique is used for fragment? 

 A. A technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame B. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size C.  A technique used in best-effort delivery systems to avoid endlessly looping packets D.  All of the above     Answer  B_____________________________________________________________________________________

Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ? 

 A. FTP B. TFTP C.  TELNET D.  NFS     Answer  A_____________________________________________________________________________________

When you ping the loopback address, a packet is sent where? 

 A. Down through the layers of the IP architecture and then up the layers again B. Across the wire C.  On the network D.  Through the loopback dongle     Answer  A_____________________________________________________________________________________

Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ? 

 A. RAP B. RIP C.  ARP D.  X.25     Answer  C_____________________________________________________________________________________

Page 12: cn new

What can greatly reduce TCP/IP configuration problems? 

 A. WINS Proxy B. WINS Server C.  PDC D.  DHCP Server     Answer  C

  Explanation A Primary Domain Controller (PDC) is a server computer in a Windows domain 

_______________________

Carrier is 

 A. One or more conductors that serve as a common connection for a related group of devices B. A continuous frequency capable of being modulated or impressed with a second signal C.  The condition when two or more sections attempt to use the same channel at the same time D.  A collection of interconnected functional units that provides a data communications service among stations attached to the network     Answer  B_____________________________________________________________________________________

The threshold effect in demodulator is 

 A. exhibited by all demodulator, when the input signal to noise ratio is low. B. the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value. C.  the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value. D.  the property exhibited by correlation receiver.     Answer  B_____________________________________________________________________________________

HMP (Host Monitoring Protocol) is: 

 A. A TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address B. A TCP/IP high level protocol for transferring files from one machine to another. C.  A protocol used to monitor computers D.  A protocol that handles error and control messages     Answer  C_____________________________________________________________________________________

Satellite-Switched Time-Division Multiple Access (SS/TDMA) is 

 A. The method of determining which device has access to the transmission medium at any time. B. A medium access control technique for multiple access transmission media C.  A form of TDMA in which circuit switching is used to dynamically change the channel assignments D.  All of the above     Answer  C_____________________________________________________________________________________

Contention is 

Page 13: cn new

 A. A collection of interconnected functional units that provides a data communications service among stations attached to the network B. The condition when two or more stations attempt to use the same channel at the same time C.  A continuous frequency capable of being modulated or impressed with a second signal D.  One or more conductors that serve as a common connection for a related group of devices     Answer  B_____________________________________________________________________________________

The baud rate is 

 A. always equal to the bit transfer rate B. equal to twice the bandwidth of an ideal channel C.  not equal to the signalling rate D.  equal to half of the bandwidth of an ideal channel     Answer  B_____________________________________________________________________________________

What is the maximum window size in sliding window protocol used in a computer network ? 

 A. 4 B. 8 C.  15 D.  16     Answer  A_____________________________________________________________________________________

Start and stop bits are used in serial communications for 

 A. Error detection B. Error correction C.  Synchronization D.  Slowing down the communication     Answer  C_____________________________________________________________________________________

In order that a code is ‘t’ error correcting, the minimum Hamming distance should be 

 A. T B. 2t-1 C.  2t D.  2t+1     Answer  D_____________________________________________________________________________________

Which of the following condition is used to transmit two packets over a medium at the same time? 

 A. Contention B. Synchronous C.  Collision D.  Asynchronous     Answer  C

The Internet Control Message Protocol (ICMP) 

 A. Allows gateways to send error a control messages to other gateways or hosts

Page 14: cn new

 B. Provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another C.  Reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem D.  All of the above     Answer  D_____________________________________________________________________________________

CDMA Cell uses ________ carriers of 1.25 MHz. 

 A. 9 B. 18 C.  22 D.  64     Answer  B_____________________________________________________________________________________

Handoff is the mechanism that 

 A. Transfer an ongoing call from one base station to another B. Initiating a new call C.  Dropping an ongoing call D.  None of above     Answer  A_____________________________________________________________________________________

Which of the following refers to the terms "residual error rate"? 

 A. The number of bit errors per twenty four hours of continuous operation on an asynchronous line B. The probability that one or more errors will be undetected when an error detection scheme is used C.  The probability that one or more errors will be detected when an error detection mechanism is used D.  Signal to noise ratio divided by the ratio of energy per bit to noise per hertz     Answer  B_____________________________________________________________________________________

Error detection at a data link level is achieved by 

 A. Bit stuffing B. Cyclic redundancy codes C.  Hamming codes D.  Equalization     Answer  B_____________________________________________________________________________________

  ______ is a satellite based tracking system that enables the determination of person’s position. 

 A.  Bluetooth B. WAP C.  Short Message Service D.  Global Positioning System     Answer  D_____________________________________________________________________________________

Error rate is 

 A. An error-detecting code based on a summation operation performed on the bits to be checked.

Page 15: cn new

 B. A check bit appended to an array of binary digits to make the sum of all the binary digits. C.  a code in which each expression conforms to Specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected D.  The ratio of the number of data units in error to the total number of data units     Answer  D_____________________________________________________________________________________

Which of the following is used for modulation and demodulation? 

 A. Protocols B. Repeater C.  Modem D.  Gateway     Answer  C_____________________________________________________________________________________

What is the maximum operating rate of a wireless LAN using infrared communication ? 

 A. 1 mbps B. 2 mbps C.  3 mbps D.  4 mbps     Answer  A_____________________________________________________________________________________

Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? 

 A. POP B. SMTP C.  FTP D.  HTTP     Answer  B

Radio signals generally propagate according to the following mechanisms 

 A. Modulation, Amplification, Scattering B. Reflection, Diffraction, Scattering C.  Amplification, Diffraction, Modulation D.  Reflection, Amplification, Diffraction     Answer  B_____________________________________________________________________________________

For the transmission of the signal, Bluetooth wireless technology uses 

 A. time division multiplexing B. frequency division multiplexing C.  time division duplex D.  frequency division duplex     Answer  C_____________________________________________________________________________________

An error-detecting code inserted as a field in a block of data to be transmitted is known as 

 A. Frame check sequence B. Error detecting code C.  Checksum

Page 16: cn new

 D.  Flow control     Answer  A_____________________________________________________________________________________

Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? 

 A. UDP B. VMTP C.  X.25 D.  SMTP     Answer  A_____________________________________________________________________________________

The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to 

 A. 0.003 B. 0.009 C.  0.991 D.  0.999     Answer  B_____________________________________________________________________________________

ICMP (Internet Control Message Protocol) is 

 A. A TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address B. a TCP/IP high level protocol for transferring files from one machine to anothe C.  a protocol used to monitor computers D.  a protocol that handles error and control messages     Answer  D_____________________________________________________________________________________

A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate? 

 A. 3 Kbps B. 6 Kbps C.  12 Kbps D.  16 Kbps     Answer  B_____________________________________________________________________________________

In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ? 

 A. Space division B. Time division C.  Virtual D.  Packet     Answer  B_____________________________________________________________________________________

Frequency shift keying is used mostly in 

 A. Radio transmission B. Telegraphy C.  Telephone D.  None of the above

Page 17: cn new

     Answer  B_____________________________________________________________________________________

GSM/CDMA systems 

 A. are limited to very low speed data B. are predominantly used for voice C.  are predominantly used for voice D.  all of the above     Answer  D_____________________________

Consider the following statement :(i) The bandwidth of the A.M., wave depends on the band width of the modulating signal.(ii) The bandwidth of the A.M., wave depends on the modulation index.(iii) The bandwidth of the F.M, wave for all practical purpose depends on the amplitude of the carrier. Of these statements the correct statements are 

 A. (i, ii) B. (i, iii) C.  (ii, iii) D.  All of the above     Answer  B_____________________________________________________________________________________

What device separates a single network into two segments but lets the two segments appear as one to higher protocols? 

 A. Switch B. Bridge C.  Gateway D.  Router     Answer  B_____________________________________________________________________________________

What part of 192.168.10.51 is the Network ID, assuming a default subnet mask? 

 A. 192.0.0.1 B. 192.168.10 C.  255.255.255.0 D.  0.0.0.5     Answer  B_____________________________________________________________________________________

Which of the following statements is correct for the use of packet switching? 

 A. The subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure B. The employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied C.  By employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved. D.  All of the above     Answer  D_____________________________________________________________________________________

Which of the following device is used to connect two systems especially if the systems use different protocols? 

 A. Hub

Page 18: cn new

 B. Bridge C.  Gateway D.  Repeater     Answer  C_____________________________________________________________________________________

What is the default subnet mask for a class C network? 

 A. 255.255.0.0 B. 255.255.255.0 C.  127.0.0.1 D.  255.0.0.0     Answer  B_____________________________________________________________________________________

Which of the following switching techniques is most suitable for interactive traffic ? 

 A. Circuit switching B. Message switching C.  Packet switching D.  All of the above     Answer  C_____________________________________________________________________________________

Another name of IEEE 802.11 a is ____________ 

 A.  Wi-Max B. Fast Ethernet C.  Wi-Fi D.  802.11 g     Answer  C_____________________________________________________________________________________

A front-end processor is 

 A. A user computer system B. A processor in a large-scale computer that executes operating system instructions C.  A minicomputer that relieves main-frame computers at a computer centre of communications control functions D.  Preliminary processor of batch jobs.     Answer  D_____________________________________________________________________________________

Which of the following network access standard disassembler is used for connection station to a packet switched network ? 

 A. X.3 B. X.21 C.  X.25 D.  X.75     Answer  C

 

Networks that use different technologies can be connected by using 

 A. Packets B. Switches C.  Bridges D.  Routers

Page 19: cn new

     Answer  D_____________________________________________________________________________________

A comparison of frequency division and time division multiplexing system shows that 

 A. FDM requires a lower bandwidth, but TDM has greater noise immunity. B. FDM has greater noise immunity and requires lower bandwidth than TDM. C.  FDM requires channel synchronization, while TDM has greater noise immunity. D.  FDM requires more multiplex while TDM requires band pass filter.     Answer  C_____________________________________________________________________________________

 Match the following :(i) Ethernet                     (a) Deterministic(ii) Token Ring               (b) Utilize the full wire speed(iii) Cut-through switch  (c) Prevent looping(iv) Spanning tree           (d) Checking valid address 

 A. i – d, ii – a, iii – b, iv – c B. i – d, ii – a, iii – b, iv – c C.  i – d, ii – d, iii – c, iv – b D.  i – d, ii – c, iii – b, iv – a     Answer  A_____________________________________________________________________________________

Which of the following device is used to connect two systems, especially if the systems use different protocols? 

 A. Hub B. Bridge C.  Gateway D.  Repeater     Answer  C_____________________________________________________________________________________

You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign? 

 A. 255.254.0.0 B. 255.240.0.0 C.  255.248.0.0 D.  255.252.0.0     Answer  A_____________________________________________________________________________________

X.25 is ________ Network 

 A. Connection Oriented Network B. Connection Less Network C.  Either Connection Oriented or Connection Less D.  Neither Connection Oriented nor Connection Less     Answer  A_____________________________________________________________________________________

FDDI is a 

 A. Ring network B. Star network C.  Mesh network D.  Bus based network     Answer  A_____________________________________________________________________________________

Page 20: cn new

Which of the following best illustrates the default subnet mask for a class A,B, and C Network 

 A. 0.0.0.0, 0.0.0.1, 0.0.1.1 B. 255.255.255.0, 255.255.0.0, 255.0.0.0 C.  255.0.0.0, 255.255.0.0, 255.255.255.0 D.  255.255.0.0, 255.255.255.0, 255.255.255.255     Answer  C_____________________________________________________________________________________

X.25 protocol consists of 

 A. Physical and Frame levels B. Frame and Packet levels C.  Physical, Frame and Packet levels D.  None of the above     Answer  C_____________________________________________________________________________________

If carrier modulated by a digital bit stream, has one one of the possible phase of 0, 90, 180 and 270 degrees, then modulation called 

 A. BPSK B. QPSK C.  QAM D.  MSK     Answer  B___________________

The _____ houses the switches in token ring 

 A. Transceiver B. Nine-pin connector C.  MAU D.  NIC     Answer  C_____________________________________________________________________________________

When compared with analog cellular systems, an advantage of digital TDMA cellular system is that 

 A. it is less complicated B. it requires less of computer memory C.  it conserves spectrum bandwidth D.  it costs less     Answer  C_____________________________________________________________________________________

Hub is a term used with 

 A. A Star Networks B. A Ring Networks C.  A Router D.  A Bridge     Answer  A_____________________________________________________________________________________

Which of the following can be used for clustering of data ? 

 A. Single layer perception B. Multilayer perception C.  Self organizing map

Page 21: cn new

 D.  Radial basis function     Answer  C_____________________________________________________________________________________

The cellular frequency reuse factor for the cluster size N is 

 A. N B. N2

 C.  1/N D.  1/N2

     Answer  C_____________________________________________________________________________________

The station to hub distance in which it is 2000 metres 

 A. 100 Base-Tx B. 100 Base-FX C.  100 Base-T4 D.  100 Base-T1     Answer  B_____________________________________________________________________________________

A station in a network in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ? 

 A. Hot potato routing B. Flooding C.  Static routing D.  Delta routing     Answer  A_____________________________________________________________________________________

After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as 

 A. Authenticity B. Non-Repudiability C.  Auditability D.  Repudiability     Answer  B_____________________________________________________________________________________

Usually information security in a network is achieved by 

 A. Layering B. Cryptography C.  Grade of service D.  None of the above     Answer  B_____________________________________________________________________________________

Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: 

 A. Network Server B. Virtual Private Network C.  Network operating system D.  OSI     Answer  B

 

Page 22: cn new

A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? 

 A. Hot potato routing B. Delta routing C.  Flooding D.  Static routing     Answer  A_____________________________________________________________________________________

What is the routing algorithm used by RIP and IGRP ? 

 A. OSPF B. Link-state C.  Dynamic D.  Dijkestra vector     Answer  D_____________________________________________________________________________________

In which Routing Method do all the routers have a common database? 

 A. Distance vector B. Link state C.  Link vector D.  Dijkestra method     Answer  B_____________________________________________________________________________________

1) BSC is a  ? 

a. Character Oriented Protocol

b. Bit Oriented Protocol

c. Full duplex protocol

d. Half duplex protocol

e. A and D2) Which of the following are non - polling system ? 

a. TDMA

b. Stop & wait

c. Xon/Xoff

d. Continuous ARQ

e. A and C3) Adaptive or dynamic directory used in packet routing changes? 

a. within each user session

b. with each user session

c. at system generation time only

d. Both A and B4) The parameter which gives the probability of the transport layer itself spontaneously terminating a connection due to internal problem is called? 

a. protection

b. resilience

c. option negotiation

Page 23: cn new

d. transfer failure6) Which of the following is an example of bounded media ? 

a. Wave guide

b. Coaxial Cable

c. Fiber optic cable

d. All of above5) What is the main purpose of a data link content monitor ? 

a. to detect problems in protocols

b. to determine the type of switching

c. to determine the type of transmission used in data link

d. to determine the flow of data7) ICMPv6 includes ......? 

a. RARP

b. ARP

c. ICMP

d. B and C8) IPv6 has ...... bit address ? 

a. 32

b. 64

c. 128

d. variable9) What is the main difference between DDCMP and SDLC ? 

a. DDCMP does not need special hardware to final the beginning of a message

b. DDCMP has a message header

c. SDLC has a IP address

d. SDLC does not use CPC10) Number of bits per symbol used in Baudot code is ? 

a. 7

b. 8

c. 5

d. 91) The Hamming distance between 100 and 001 is _____. ? 

a. 0

b. 1

c. 2

d. 3