Upload
ankurs0919904440605
View
13
Download
1
Tags:
Embed Size (px)
DESCRIPTION
mcq for data network
Citation preview
Demodulation is a process of
A. Converting analog to digital signals B. Converting digital to analog signals C. Multiplexing various signals into one high speed line signals D. Performing data description Answer A_____________________________________________________________________________________How many hosts are attached to each of the local area networks at your site?
A. 128 B. 256 C. 254 D. 512 Answer C_____________________________________________________________________________________If the period of a signal is 1000 ms, then what is its frequency in kilohertz ?
A. 10–3 KHz B. 10–2 KHz C. 10–1 KHz D. 1 KHz Answer A_____________________________________________________________________________________Device on one network can communicate with devices on another network via a
A. Hub/Switch B. Utility server C. File server D. Gateway Answer D_____________________________________________________________________________________How many digits of the DNIC (Data Network Identification Code) identify the country?
A. First three B. First four C. First five D. First six Answer A_____________________________________________________________________________________Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)
A. Transport layer B. Data link layer C. Network layer D. Application layer Answer C_____________________________________________________________________________________The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called
A. Router B. Bridge C. Gateway D. Switch Answer C_____________________________________________________________________________________Which of the following technique is used for encapsulation?
A. A technique used in best-effort delivery systems to avoid endlessly looping packets.
B. A technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size D. All of the above Answer B_____________________________________________________________________________________What frequency range is used for FM radio transmission?
A. Very Low Frequency : 3 kHz to 30. kHz B. Low Frequency : 30 kHz to 300 kHz C. High Frequency : 3 MHz to 30 MHz D. Very High Frequency : 30 MHz to 300 MHz Answer D_____________________________________________________________________________________Which of the following types of channels moves data relatively slowly?
A. Wideband channel B. Voiceband channel C. Narrowband channel D. Broadband channel Answer CIn cyclic redundancy checking CRC is the
A. Divisor B. Quotient C. Dividend D. Remainder Answer D_____________________________________________________________________________________
Mobile IP provides two basic functions
A. Route discovery and registration B. Agent discovery and registration C. IP binding and registration D. None of the above Answer B_____________________________________________________________________________________
The amount of uncertainty in a system of symbol is called
A. Bandwidth B. Entropy C. Loss D. Quantum Answer B_____________________________________________________________________________________
Match the following with link quality measurement and handoff initiation :(a) Networked-Controlled Handoff(NCHO) (i) MS connect to BS(b) Mobile-Assisted Handoff(MAHO) (ii) Process via channel the target BS(c) Forward Handoff (iii) First Generation Analog Cellular System(d) Hard Handoff (iv) Second Generation Digital Cellular System
A. (iii) (iv) (ii) (i) B. (ii) (iii) (i) (iv) C. (ii) (i) (iv) (iii) D. (iv) (iii) (i) (ii)
Answer A_____________________________________________________________________________________
MTU is specified by
A. IP Datagram size B. Hardware technology C. TCP Segment size D. None of the above Answer B_____________________________________________________________________________________
The number of bits required for an IPV6 address is
A. 32 B. 64 C. 128 D. 256 Answer C_____________________________________________________________________________________
Check sum used along with each packet computes the sum of the data, where data is treated as a sequence of
A. Integer B. Character C. Real numbers D. Bits Answer D_____________________________________________________________________________________
Which technology is sometime referred to as wireless cable ?
A. MMDS B. ATM C. LMDS D. CDMA Answer A_____________________________________________________________________________________
Frames from one LAN can be transmitted to another LAN via the device
A. Router B. Bridge C. Repeater D. Modem Answer B_____________________________________________________________________________________
Protocol used to monitor and control network devices operates at
A. Application layer B. Transport layer C. Network layer D. Data Link layer Answer A
FTP does not use
A. Two transfer mode B. Control connect ion to remote computer before file can be transfer red
C. User Datagram Protocol D. Authorizat ion of a user through login and password verification Answer C_____________________________________________________________________________________
Sending a file from your personal computer primary memory or disk to another computer is called
A. Uploading B. Downloading C. Logging on D. Hang on Answer A_____________________________________________________________________________________
A telephone conference call is an example of which type of communications
A. Same time / same place B. Same time / different place C. Different time / different place D. Different time / same place Answer B_____________________________________________________________________________________
What is the size (in terms of bits) of Header length field in IPV4 header ?
A. 2 B. 4 C. 8 D. 16 Answer B_____________________________________________________________________________________
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
A. Memory resident package B. Project management package C. Data communication package D. Electronic mail package Answer C_____________________________________________________________________________________
What are the data transmission channels available for carrying data from one location to another?
A. Narrowband B. Voiceband C. Broadband D. All of the above Answer D_____________________________________________________________________________________
In case of Bus/Tree topology signal balancing issue is overcome by
A. Modulation B. Polling C. Segmentation D. Strong transmitter Answer C_____________________________________________________________________________________
The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband.
A. Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel B. Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable C. Baseband refers to local area networks, and broadband refers to wide area networks. D. Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed Answer B_____________________________________________________________________________________
Which of the following IP address class is a multicast address ?
A. Class A B. Class B C. Class C D. Class D Answer D_____________________________________________________________________________________
Devices interconnected by the LAN should include
A. Computers and terminals B. Mass storage device, printers and plotters C. Bridges and gateways D. All of the above Answer D
A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ?
A. Communication software B. Error detection protocols C. Link access procedure (LAP) D. Telecommunications Answer A_____________________________________________________________________________________
Which one of the following is an error reporting protocol?
A. ARP B. ICMP C. TCP D. UDP Answer B
Explanation ICMP is an error reporting protocol .
_____________________________________________________________________________________
An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses available with it: 245.248.128.0/20. The ISP wants to give half of this chunk of addresses to Organization A,and a quarter to Organization B, while retaining the remaining with itself. Which of the following is a valid allocation of addresses to A and B?
A. 245.248.136.0/21 and 245.248.128.0/22 B. 245.248.128.0/21 and 245.248.128.0/22 C. 245.248.132.0/22 and 245.248.132.0/21 D. 245.248.136.0/24 and 245.248.132.0/21 Answer A_____________________________________________________________________________________
The geostationary satellite used for communication systems
A. Rotates with the earth B. Remains stationary relative to the earth C. Is positioned over equator D. All of the above Answer D_____________________________________________________________________________________
An example of an analog communication method is
A. Laser beam B. Microwave C. Voice grade telephone line D. All of the above Answer D_____________________________________________________________________________________
Which address is the loopback address?
A. 0.0.0.1 B. 127.0.0.1 C. 255.255.255.255 D. 127.0.0.0 Answer B_____________________________________________________________________________________
Network address prefixed by 1110 is a
A. Class A address B. Multicast address C. Class B address D. Reserve address Answer B_____________________________________________________________________________________
ATM is an example of
A. Ring topology B. Star topology C. Bus topology D. None of the above Answer B_____________________________________________________________________________________
A remote batch-processing operation in which data is solely input to a central computer would require a
A. Telegraph line B. Simplex lines C. Mixedband channel D. All the above
Answer B_____________________________________________________________________________________
A Network uses a star topology if
A. Computers are arranged in a closed loop B. All computers attach to a central point C. All computers attach to a single long cable D. Computers attach to multiple hierarchical cables Answer B_________________________
The addressing especially used by Transport Layer is
A. Station address B. Network address C. Application port address D. Dialog address Answer B_____________________________________________________________________________________
Which network topology is considered passive?
A. Cross B. Star C. Bus D. Tree Answer C_____________________________________________________________________________________
The cost of the network is usually determined by
A. time complexity B. switching complexity C. circuit complexity D. none of these Answer B_____________________________________________________________________________________
Internet-like networks within an enterprise
A. Intranets B. Switching alternating C. Inter organizational networks D. Extranets Answer A_____________________________________________________________________________________
Error detecting method that can detect more errors without increasing additional information in each packet is
A. Checksum B. Even parity mechanism C. CRC D. Odd parity mechanism Answer C_____________________________________________________________________________________
The single stage network is also called
A. one sided network B. two sided network
C. recirculating network D. pipeline network Answer C_____________________________________________________________________________________
The unlicensed National Information Infrastructure band operates at the _________ frequency
A. 2.4 GHz B. 5 GHz C. 33 MHz D. 5 MHz Answer B_____________________________________________________________________________________
In the IPv4 addressing format, the number of networks allowed under Class C addresses is
A. 214
B. 27
C. 221
D. 224
Answer C_____________________________________________________________________________________
Which of the following does not allow multiple users or devices to share one communications line?
A. Doubleplexer B. Multipplexer C. Concentrator D. Controller Answer A_____________________________________________________________________________________
The Fiber Distributed Data Interface uses:
A. single mode fibers and LEDs B. multimode fibers and LEDs C. single mode fibers and ILDs D. multimode fibers and ILDs Answer B
The receive equalizer reduces delay distortions using a
A. Tapped delay lines B. Gearshift C. Descrambler D. Difference Engine Answer A_____________________________________________________________________________________
Which one of the following uses the greatest number of layers in the OSI model?
A. Bridge B. Repeater C. Router D. Gateway Answer D_____________________________________________________________________________________
Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is
A. Layer – 5 (Application) B. Layer – 1 (Physical) C. Layer – 3 (Internet) D. Layer – 2 (Network Interface) Answer A_____________________________________________________________________________________
End-to-End connectivity is provided from Last-to-Last in
A. Network layer B. Session layer C. Transport layer D. Data link layer Answer C_____________________________________________________________________________________
Decryption and encryption of data are the responsibility of which of the following layer ?
A. Physical layer B. Data Link layer C. Presentation layer D. Session layer Answer C_____________________________________________________________________________________
Assume that source S and destination D are connected through two intermediate routers labeled R. Determine how many times each packet has to visit the network layer and the data link layer during a transmission from S to D.
A. Network layer – 4 times and Data link layer-4 times B. Network layer – 4 times and Data link layer-3 times C. Network layer – 4 times and Data link layer-6 times D. Network layer – 2 times and Data link layer-6 times Answer C
Explanation Each packet will visit network layer at S and D once and at two intermediate nodes R, R also once, so 4 times in total. Packet will visit Data link layer at S and D once (same as Network Layer), but in addition it will visit data link layer of routers(R, R) each two times. Once at the beginning when packet reaches R and goes up from Physical-Data Link-Network and second time in the reverse order while coming out of router in order Network-Data link-Physical. Hence 6 times in total.
_____________________________________________________________________________________
The protocol data unit (PDU) for the application layer in the Internet stack is
A. Segment B. Datagram
C. Message D. Frame Answer C_____________________________________________________________________________________
Identify the incorrect statement
A. he ATM adoption layer is not service dependent B. Logical connections in ATM are referred to as virtual channel connections C. ATM is streamlined protocol with minimal error and flow control capabilities D. ATM is also known as cell delays Answer A_____________________________________________________________________________________
Which of the following transport layer protocols is used to support electronic mail?
A. SMTP B. IP C. TCP D. UDP Answer C_____________________________________________________________________________________
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols Answer A
The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are
A. TCP, UDP, UDP and TCP B. UDP, TCP, TCP and UDP C. UDP, TCP, UDP and TCP D. TCP, UDP, TCP and UDP Answer C_____________________________________________________________________________________
Which of the following are Data Link Layer standard ?1. Ethernet 2. HSSI 3. Frame Relay4. 10 – Base T 5. Token Ring
A. 1, 2, 3 B. 1, 3, 5 C. 1, 3, 4, 5 D. 1, 2, 3, 4, 5 Answer C_____________________________________________________________________________________
To employ multi-access in GSM, users are given different:
A. time slots B. bandpass filters C. Andsets
D. frequency bands Answer B_____________________________________________________________________________________
Which of the following summation operations is performed on the bits to check an error-detecting code?
A. Codec B. Coder-decoder C. Checksum D. Attenuation Answer C_____________________________________________________________________________________
A leased special high-speed connection from the local telephone carrier for business users that transmits at 1.544 mbps is known as ________ carrier.
A. T1 B. T2 C. T3 D. T4 Answer A_____________________________________________________________________________________
Which of the following technique is used for fragment?
A. A technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame B. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size C. A technique used in best-effort delivery systems to avoid endlessly looping packets D. All of the above Answer B_____________________________________________________________________________________
Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ?
A. FTP B. TFTP C. TELNET D. NFS Answer A_____________________________________________________________________________________
When you ping the loopback address, a packet is sent where?
A. Down through the layers of the IP architecture and then up the layers again B. Across the wire C. On the network D. Through the loopback dongle Answer A_____________________________________________________________________________________
Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ?
A. RAP B. RIP C. ARP D. X.25 Answer C_____________________________________________________________________________________
What can greatly reduce TCP/IP configuration problems?
A. WINS Proxy B. WINS Server C. PDC D. DHCP Server Answer C
Explanation A Primary Domain Controller (PDC) is a server computer in a Windows domain
_______________________
Carrier is
A. One or more conductors that serve as a common connection for a related group of devices B. A continuous frequency capable of being modulated or impressed with a second signal C. The condition when two or more sections attempt to use the same channel at the same time D. A collection of interconnected functional units that provides a data communications service among stations attached to the network Answer B_____________________________________________________________________________________
The threshold effect in demodulator is
A. exhibited by all demodulator, when the input signal to noise ratio is low. B. the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value. C. the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value. D. the property exhibited by correlation receiver. Answer B_____________________________________________________________________________________
HMP (Host Monitoring Protocol) is:
A. A TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address B. A TCP/IP high level protocol for transferring files from one machine to another. C. A protocol used to monitor computers D. A protocol that handles error and control messages Answer C_____________________________________________________________________________________
Satellite-Switched Time-Division Multiple Access (SS/TDMA) is
A. The method of determining which device has access to the transmission medium at any time. B. A medium access control technique for multiple access transmission media C. A form of TDMA in which circuit switching is used to dynamically change the channel assignments D. All of the above Answer C_____________________________________________________________________________________
Contention is
A. A collection of interconnected functional units that provides a data communications service among stations attached to the network B. The condition when two or more stations attempt to use the same channel at the same time C. A continuous frequency capable of being modulated or impressed with a second signal D. One or more conductors that serve as a common connection for a related group of devices Answer B_____________________________________________________________________________________
The baud rate is
A. always equal to the bit transfer rate B. equal to twice the bandwidth of an ideal channel C. not equal to the signalling rate D. equal to half of the bandwidth of an ideal channel Answer B_____________________________________________________________________________________
What is the maximum window size in sliding window protocol used in a computer network ?
A. 4 B. 8 C. 15 D. 16 Answer A_____________________________________________________________________________________
Start and stop bits are used in serial communications for
A. Error detection B. Error correction C. Synchronization D. Slowing down the communication Answer C_____________________________________________________________________________________
In order that a code is ‘t’ error correcting, the minimum Hamming distance should be
A. T B. 2t-1 C. 2t D. 2t+1 Answer D_____________________________________________________________________________________
Which of the following condition is used to transmit two packets over a medium at the same time?
A. Contention B. Synchronous C. Collision D. Asynchronous Answer C
The Internet Control Message Protocol (ICMP)
A. Allows gateways to send error a control messages to other gateways or hosts
B. Provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another C. Reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem D. All of the above Answer D_____________________________________________________________________________________
CDMA Cell uses ________ carriers of 1.25 MHz.
A. 9 B. 18 C. 22 D. 64 Answer B_____________________________________________________________________________________
Handoff is the mechanism that
A. Transfer an ongoing call from one base station to another B. Initiating a new call C. Dropping an ongoing call D. None of above Answer A_____________________________________________________________________________________
Which of the following refers to the terms "residual error rate"?
A. The number of bit errors per twenty four hours of continuous operation on an asynchronous line B. The probability that one or more errors will be undetected when an error detection scheme is used C. The probability that one or more errors will be detected when an error detection mechanism is used D. Signal to noise ratio divided by the ratio of energy per bit to noise per hertz Answer B_____________________________________________________________________________________
Error detection at a data link level is achieved by
A. Bit stuffing B. Cyclic redundancy codes C. Hamming codes D. Equalization Answer B_____________________________________________________________________________________
______ is a satellite based tracking system that enables the determination of person’s position.
A. Bluetooth B. WAP C. Short Message Service D. Global Positioning System Answer D_____________________________________________________________________________________
Error rate is
A. An error-detecting code based on a summation operation performed on the bits to be checked.
B. A check bit appended to an array of binary digits to make the sum of all the binary digits. C. a code in which each expression conforms to Specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected D. The ratio of the number of data units in error to the total number of data units Answer D_____________________________________________________________________________________
Which of the following is used for modulation and demodulation?
A. Protocols B. Repeater C. Modem D. Gateway Answer C_____________________________________________________________________________________
What is the maximum operating rate of a wireless LAN using infrared communication ?
A. 1 mbps B. 2 mbps C. 3 mbps D. 4 mbps Answer A_____________________________________________________________________________________
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
A. POP B. SMTP C. FTP D. HTTP Answer B
Radio signals generally propagate according to the following mechanisms
A. Modulation, Amplification, Scattering B. Reflection, Diffraction, Scattering C. Amplification, Diffraction, Modulation D. Reflection, Amplification, Diffraction Answer B_____________________________________________________________________________________
For the transmission of the signal, Bluetooth wireless technology uses
A. time division multiplexing B. frequency division multiplexing C. time division duplex D. frequency division duplex Answer C_____________________________________________________________________________________
An error-detecting code inserted as a field in a block of data to be transmitted is known as
A. Frame check sequence B. Error detecting code C. Checksum
D. Flow control Answer A_____________________________________________________________________________________
Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine?
A. UDP B. VMTP C. X.25 D. SMTP Answer A_____________________________________________________________________________________
The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to
A. 0.003 B. 0.009 C. 0.991 D. 0.999 Answer B_____________________________________________________________________________________
ICMP (Internet Control Message Protocol) is
A. A TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address B. a TCP/IP high level protocol for transferring files from one machine to anothe C. a protocol used to monitor computers D. a protocol that handles error and control messages Answer D_____________________________________________________________________________________
A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate?
A. 3 Kbps B. 6 Kbps C. 12 Kbps D. 16 Kbps Answer B_____________________________________________________________________________________
In which circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM ?
A. Space division B. Time division C. Virtual D. Packet Answer B_____________________________________________________________________________________
Frequency shift keying is used mostly in
A. Radio transmission B. Telegraphy C. Telephone D. None of the above
Answer B_____________________________________________________________________________________
GSM/CDMA systems
A. are limited to very low speed data B. are predominantly used for voice C. are predominantly used for voice D. all of the above Answer D_____________________________
Consider the following statement :(i) The bandwidth of the A.M., wave depends on the band width of the modulating signal.(ii) The bandwidth of the A.M., wave depends on the modulation index.(iii) The bandwidth of the F.M, wave for all practical purpose depends on the amplitude of the carrier. Of these statements the correct statements are
A. (i, ii) B. (i, iii) C. (ii, iii) D. All of the above Answer B_____________________________________________________________________________________
What device separates a single network into two segments but lets the two segments appear as one to higher protocols?
A. Switch B. Bridge C. Gateway D. Router Answer B_____________________________________________________________________________________
What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
A. 192.0.0.1 B. 192.168.10 C. 255.255.255.0 D. 0.0.0.5 Answer B_____________________________________________________________________________________
Which of the following statements is correct for the use of packet switching?
A. The subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure B. The employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied C. By employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved. D. All of the above Answer D_____________________________________________________________________________________
Which of the following device is used to connect two systems especially if the systems use different protocols?
A. Hub
B. Bridge C. Gateway D. Repeater Answer C_____________________________________________________________________________________
What is the default subnet mask for a class C network?
A. 255.255.0.0 B. 255.255.255.0 C. 127.0.0.1 D. 255.0.0.0 Answer B_____________________________________________________________________________________
Which of the following switching techniques is most suitable for interactive traffic ?
A. Circuit switching B. Message switching C. Packet switching D. All of the above Answer C_____________________________________________________________________________________
Another name of IEEE 802.11 a is ____________
A. Wi-Max B. Fast Ethernet C. Wi-Fi D. 802.11 g Answer C_____________________________________________________________________________________
A front-end processor is
A. A user computer system B. A processor in a large-scale computer that executes operating system instructions C. A minicomputer that relieves main-frame computers at a computer centre of communications control functions D. Preliminary processor of batch jobs. Answer D_____________________________________________________________________________________
Which of the following network access standard disassembler is used for connection station to a packet switched network ?
A. X.3 B. X.21 C. X.25 D. X.75 Answer C
Networks that use different technologies can be connected by using
A. Packets B. Switches C. Bridges D. Routers
Answer D_____________________________________________________________________________________
A comparison of frequency division and time division multiplexing system shows that
A. FDM requires a lower bandwidth, but TDM has greater noise immunity. B. FDM has greater noise immunity and requires lower bandwidth than TDM. C. FDM requires channel synchronization, while TDM has greater noise immunity. D. FDM requires more multiplex while TDM requires band pass filter. Answer C_____________________________________________________________________________________
Match the following :(i) Ethernet (a) Deterministic(ii) Token Ring (b) Utilize the full wire speed(iii) Cut-through switch (c) Prevent looping(iv) Spanning tree (d) Checking valid address
A. i – d, ii – a, iii – b, iv – c B. i – d, ii – a, iii – b, iv – c C. i – d, ii – d, iii – c, iv – b D. i – d, ii – c, iii – b, iv – a Answer A_____________________________________________________________________________________
Which of the following device is used to connect two systems, especially if the systems use different protocols?
A. Hub B. Bridge C. Gateway D. Repeater Answer C_____________________________________________________________________________________
You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign?
A. 255.254.0.0 B. 255.240.0.0 C. 255.248.0.0 D. 255.252.0.0 Answer A_____________________________________________________________________________________
X.25 is ________ Network
A. Connection Oriented Network B. Connection Less Network C. Either Connection Oriented or Connection Less D. Neither Connection Oriented nor Connection Less Answer A_____________________________________________________________________________________
FDDI is a
A. Ring network B. Star network C. Mesh network D. Bus based network Answer A_____________________________________________________________________________________
Which of the following best illustrates the default subnet mask for a class A,B, and C Network
A. 0.0.0.0, 0.0.0.1, 0.0.1.1 B. 255.255.255.0, 255.255.0.0, 255.0.0.0 C. 255.0.0.0, 255.255.0.0, 255.255.255.0 D. 255.255.0.0, 255.255.255.0, 255.255.255.255 Answer C_____________________________________________________________________________________
X.25 protocol consists of
A. Physical and Frame levels B. Frame and Packet levels C. Physical, Frame and Packet levels D. None of the above Answer C_____________________________________________________________________________________
If carrier modulated by a digital bit stream, has one one of the possible phase of 0, 90, 180 and 270 degrees, then modulation called
A. BPSK B. QPSK C. QAM D. MSK Answer B___________________
The _____ houses the switches in token ring
A. Transceiver B. Nine-pin connector C. MAU D. NIC Answer C_____________________________________________________________________________________
When compared with analog cellular systems, an advantage of digital TDMA cellular system is that
A. it is less complicated B. it requires less of computer memory C. it conserves spectrum bandwidth D. it costs less Answer C_____________________________________________________________________________________
Hub is a term used with
A. A Star Networks B. A Ring Networks C. A Router D. A Bridge Answer A_____________________________________________________________________________________
Which of the following can be used for clustering of data ?
A. Single layer perception B. Multilayer perception C. Self organizing map
D. Radial basis function Answer C_____________________________________________________________________________________
The cellular frequency reuse factor for the cluster size N is
A. N B. N2
C. 1/N D. 1/N2
Answer C_____________________________________________________________________________________
The station to hub distance in which it is 2000 metres
A. 100 Base-Tx B. 100 Base-FX C. 100 Base-T4 D. 100 Base-T1 Answer B_____________________________________________________________________________________
A station in a network in a network forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used ?
A. Hot potato routing B. Flooding C. Static routing D. Delta routing Answer A_____________________________________________________________________________________
After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as
A. Authenticity B. Non-Repudiability C. Auditability D. Repudiability Answer B_____________________________________________________________________________________
Usually information security in a network is achieved by
A. Layering B. Cryptography C. Grade of service D. None of the above Answer B_____________________________________________________________________________________
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
A. Network Server B. Virtual Private Network C. Network operating system D. OSI Answer B
A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used?
A. Hot potato routing B. Delta routing C. Flooding D. Static routing Answer A_____________________________________________________________________________________
What is the routing algorithm used by RIP and IGRP ?
A. OSPF B. Link-state C. Dynamic D. Dijkestra vector Answer D_____________________________________________________________________________________
In which Routing Method do all the routers have a common database?
A. Distance vector B. Link state C. Link vector D. Dijkestra method Answer B_____________________________________________________________________________________
1) BSC is a ?
a. Character Oriented Protocol
b. Bit Oriented Protocol
c. Full duplex protocol
d. Half duplex protocol
e. A and D2) Which of the following are non - polling system ?
a. TDMA
b. Stop & wait
c. Xon/Xoff
d. Continuous ARQ
e. A and C3) Adaptive or dynamic directory used in packet routing changes?
a. within each user session
b. with each user session
c. at system generation time only
d. Both A and B4) The parameter which gives the probability of the transport layer itself spontaneously terminating a connection due to internal problem is called?
a. protection
b. resilience
c. option negotiation
d. transfer failure6) Which of the following is an example of bounded media ?
a. Wave guide
b. Coaxial Cable
c. Fiber optic cable
d. All of above5) What is the main purpose of a data link content monitor ?
a. to detect problems in protocols
b. to determine the type of switching
c. to determine the type of transmission used in data link
d. to determine the flow of data7) ICMPv6 includes ......?
a. RARP
b. ARP
c. ICMP
d. B and C8) IPv6 has ...... bit address ?
a. 32
b. 64
c. 128
d. variable9) What is the main difference between DDCMP and SDLC ?
a. DDCMP does not need special hardware to final the beginning of a message
b. DDCMP has a message header
c. SDLC has a IP address
d. SDLC does not use CPC10) Number of bits per symbol used in Baudot code is ?
a. 7
b. 8
c. 5
d. 91) The Hamming distance between 100 and 001 is _____. ?
a. 0
b. 1
c. 2
d. 3