Computer networks MCQ

Ace your homework & exams now with Quizwiz!

A

A _____ is a TCP name for a transport service access point. a) port b) pipe c) node d) protocol

B

A _______ is the physical path over which a message travels. a) Path b) Medium c) Protocol d) Route

A

Bits can be sent over guided and unguided media as analog signal by ___________ a) digital modulation b) amplitude modulation c) frequency modulation d) phase modulation

A

Bluetooth is an example of __________ a) personal area network b) local area network c) virtual private network d) wide area network

A

Firewalls are often configured to block ___________ a) UDP traffic b) TCP traffic c) Sensitive traffic d) Best-effort traffic

A

Geostationary satellites ___________ a) Are placed at a fixed point above the earth b) Rotate the earth about a fixed axis c) Rotate the earth about a varying axis d) All of the mentioned

A

Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by ____________ a) La/R b) LR/a c) R/La d) Ra/L

C

HFC contains _______ a) Fibre cable b) Coaxial cable c) A combination of Fibre cable and Coaxial cable d) Twisted Pair Cable

B

Multiplexing is used in _______ a) Packet switching b) Circuit switching c) Data switching d) Packet & Circuit switching

A

Network congestion occurs _________ a) in case of traffic overloading b) when a system terminates c) when connection between two nodes terminates d) in case of transfer failure

C

ONT is connected to splitter using _________ a) High speed fibre cable b) HFC c) Optical cable d) Twisted pair cable

A

OSI stands for __________ a) open system interconnection b) operating system interface c) optical service implementation d) open service Internet

B

Packet sniffers involve ____________ a) Active receiver b) Passive receiver c) Legal receiver d) Partially-active receiver

A

TCP/IP model was developed _____ the OSI model. a) prior to b) after c) simultaneous to d) with no link to

C

The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes

C

To deliver a message to the correct application program running on a host, the _______ address must be consulted. a) IP b) MAC c) Port d) None of the mentioned

A

Two devices are in network if __________ a) a process in one device is able to exchange information with a process in another device b) a process is running on both devices c) PIDs of the processes running of different devices are same d) a process is active and another is inactive

A

UTP is commonly used in __________ a) DSL b) FTTP c) HTTP d) None of the mentioned

A

User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

D

Which of the following terms is not associated with DSL? a) DSLAM b) CO c) Splitter d) CMTS

A

A _________ set of rules that governs data communication. a) Protocols b) Standards c) RFCs d) Servers

C

A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub

B

A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system

C

A single channel is shared by multiple signals by ____________ a) analog modulation b) digital modulation c) multiplexing d) phase modulation

A

Among the optical-distribution architectures that are essentially switched ethernet is __________ a) AON b) PON c) NON d) MON

A

An endpoint of an inter-process communication flow across a computer network is called __________ a) socket b) pipe c) port d) machine

C

Application developer has permission to decide the following on transport layer side a) Transport layer protocol b) Maximum buffer size c) Both Transport layer protocol and Maximum buffer size d) None of the mentioned

A

Application layer is implemented in ____________ a) End system b) NIC c) Ethernet d) Packet transport

B

As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved. a) authentication b) guaranteed constant rate c) reliability d) store and forward

A

Automatic repeat request error management mechanism is provided by ________ a) logical link control sublayer b) media access control sublayer c) network interface control sublayer d) application access control sublayer

C

DSL telcos provide which of the following services? a) Wired phone access b) ISP c) Wired phone access and ISP d) Network routing and ISP

B

Delimiting and synchronization of data exchange is provided by __________ a) Application layer b) Session layer c) Transport layer d) Link layer

C

E-mail is _________ a) Loss-tolerant application b) Bandwidth-sensitive application c) Elastic application d) None of the mentioned

A

FTP server _____________ a) Maintains state information b) Is stateless c) Has single TCP connection for a file transfer d) Has UDP connection for file transfer

B

FTP server listens for connection on port number ____________ a) 20 b) 21 c) 22 d) 23

B

HTTP client requests by establishing a __________ connection to a particular port on the server. a) user datagram protocol b) transmission control protocol c) border gateway protocol d) domain host control protocol

D

Header of a frame generally contains ______________ a) synchronization bytes b) addresses c) frame identifier d) all of the mentioned

A

How many layers are present in the Internet protocol stack (TCP/IP model)? a) 5 b) 7 c) 6 d) 10

D

If 5 files are transferred from server A to client B in the same session. The number of TCP connections between A and B is _______ a) 5 b) 10 c) 2 d) 6

C

If you have to send multimedia data over SMTP it has to be encoded into _______ a) Binary b) Signal c) ASCII d) Hash

B (Control connection only)

In Active mode FTP, the client initiates both the control and data connections. a) True b) False

A

In FTP protocol, client contacts server using ____ as the transport protocol. a) transmission control protocol b) user datagram protocol c) datagram congestion control protocol d) stream control transmission protocol

D

In File Transfer Protocol, data transfer cannot be done in ___________ a) stream mode b) block mode c) compressed mode d) message mode

A

In HTTP pipelining ________________ a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses b) multiple HTTP requests can not be sent on a single TCP connection c) multiple HTTP requests are sent in a queue on a single TCP connection d) multiple HTTP requests are sent at random on a single TCP connection

D

In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________ a) Application layer b) Transport layer c) Link layer d) Session layer

A

In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a) Application layer b) Transport layer c) Link layer d) Session layer

B

In TDM, slots are further divided into _________ a) Seconds b) Frames c) Packets d) Bits

A

In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources. a) Greater than b) Lesser than c) Equal to d) Equal to or greater than

A

In _________ systems, resources are allocated on demand. a) packet switching b) circuit switching c) line switching d) frequency switching

B

In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______ a) Added b) Removed c) Rearranged d) Randomized

A

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________ a) Added b) Removed c) Rearranged d) Modified

B

Most packet switches use this principle ____________ a) Stop and wait b) Store and forward c) Store and wait d) Stop and forward

D

Sniffers can be prevented by using _______________ a) Wired environment b) WiFi c) Ethernet LAN d) Switched network

B

Terrestrial radio channels are broadly classifed into _____ groups. a) 2 b) 3 c) 4 d) 1

C

The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________ a) Vulnerability attack b) Bandwidth flooding c) Connection flooding d) UDP flooding

C

The File Transfer Protocol is built on ______________ a) data centric architecture b) service oriented architecture c) client server architecture d) connection oriented architecture

C

The HTTP request message is sent in _________ part of three-way handshake. a) First b) Second c) Third d) Fourth

C

The HTTP response message leaves out the requested object when ____________ method is used a) GET b) POST c) HEAD d) PUT

A

The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

A

The default connection type used by HTTP is _________ a) Persistent b) Non-persistent c) Can be either persistent or non-persistent depending on connection request d) None of the mentioned

A

The function of DSLAM is to __________ a) Convert analog signals into digital signals b) Convert digital signals into analog signals c) Amplify digital signals d) De-amplify digital signals

D

The functionalities of the presentation layer include ____________ a) Data compression b) Data encryption c) Data description d) All of the mentioned

B

The network layer protocol for internet is __________ a) ethernet b) internet protocol c) hypertext transfer protocol d) file transfer protocol

B

The number of layers in ISO OSI reference model is __________ a) 5 b) 7 c) 6 d) 10

A

The physical layer is concerned with ___________ a) bit-by-bit delivery b) process to process delivery c) application to application delivery d) port to port delivery

A

The physical layer translates logical communication requests from the ______ into hardware specific operations. a) data link layer b) network layer c) trasnport layer d) application layer

B

The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method. a) Packet switching b) Circuit switching c) Line switching d) Frequency switching

B

The sharing of a medium and its link by two or more devices is called _________ a) Fully duplexing b) Multiplexing c) Micropleixng d) Duplexing

A

The structure or format of data is called ___________ a) Syntax b) Semantics c) Struct d) Formatting

A

The time required to examine the packet's header and determine where to direct the packet is part of __________ a) Processing delay b) Queuing delay c) Transmission delay d) Propagation delay

A

The values GET, POST, HEAD etc are specified in ____________ of HTTP message a) Request line b) Header line c) Status line d) Entity body

D

Transmission control protocol ___________ a) is a connection-oriented protocol b) uses a three way handshake to establish a connection c) receives data from application as a single stream d) all of the mentioned

B

Transmission data rate is decided by ____________ a) network layer b) physical layer c) data link layer d) transport layer

A

Transport layer aggregates data from different applications into a single stream before passing it to ____________ a) network layer b) data link layer c) application layer d) physical layer

A

Transport layer is implemented in ______________ a) End system b) NIC c) Ethernet d) Signal transmission

B

Transport layer protocols deals with ____________ a) application to application communication b) process to process communication c) node to node communication d) man to man communication

B

When collection of various computers seems a single coherent system to its client, then it is called _________ a) computer network b) distributed system c) networking system d) mail system

C

Which address is used to identify a process on a host by the transport layer? a) physical address b) logical address c) port address d) specific address

D

Which is a time-sensitive service? a) File transfer b) File download c) E-mail d) Internet telephony

B

Which layer is responsible for process to process delivery in a general network model? a) network layer b) transport layer c) session layer d) data link layer

C

Which layer is used to link the network support layers and user support layers? a) session layer b) data link layer c) transport layer d) network layer

A

Which layer provides the services to user? a) application layer b) session layer c) presentation layer d) physical layer

B

Which multiplexing technique used to transmit digital signals? a) FDM b) TDM c) WDM d) FDM & WDM

C

Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP

D

Which of the following delay is faced by the packet in travelling from one end system to another? a) Propagation delay b) Queuing delay c) Transmission delay d) All of the mentioned

D

Which of the following factors affect transmission rate in DSL? a) The gauge of the twisted-pair line b) Degree of electrical interfernece c) Shadow fading d) The gauge of the twisted-pair line and degree of electrical interference

D

Which of the following is a form of DoS attack? a) Vulnerability attack b) Bandwidth flooding c) Connection flooding d) All of the mentioned

D

Which of the following is not an application layer service? a) Network virtual terminal b) File transfer, access, and management c) Mail service d) Error control

A

Which of the following is present in both an HTTP request line and a status line? a) HTTP version number b) URL c) Method d) None of the mentioned

D

Which of the following layers is an addition to OSI model when compared with TCP IP model? a) Application layer b) Presentation layer c) Session layer d) Session and Presentation layer

B

Which of the following networks extends a private network across public networks? a) local area network b) virtual private network c) enterprise private network d) storage area network

C

Which of the following statements can be associated with OSI model? a) A structured way to discuss and easier update system components b) One layer may duplicate lower layer functionality c) Functionality at one layer no way requires information from another layer d) It is an application specific network model

D

Which of the following statements is not applicable for cable internet access? a) It is a shared broadcast medium b) It includes HFCs c) Cable modem connects home PC to Ethernet port d) Analog signal is converted to digital signal in DSLAM

D

Which of the following tasks is not done by data link layer? a) framing b) error control c) flow control d) channel coding

C

Which of this is not a constituent of residential telephone line? a) A high-speed downstream channel b) A medium-speed downstream channel c) A low-speed downstream channel d) An ultra-high speed downstream channel

C

Which of this is not a guided media? a) Fiber optical cable b) Coaxial cable c) Wireless LAN d) Copper wire

D

Which of this is not a network edge device? a) PC b) Smartphones c) Servers d) Switch

A

Which one of the following is a version of UDP with congestion control? a) datagram congestion control protocol b) stream control transmission protocol c) structured stream transport d) user congestion control protocol

C

Which transmission media provides the highest transmission speed in a network? a) coaxial cable b) twisted pair cable c) optical fiber d) electrical cable

B

he DoS attack, in which the attacker sends deluge of packets to the targeted host is ________ a) Vulnerability attack b) Bandwidth flooding c) Connection flooding d) UDP flooding


Related study sets

Chapter 48-Diabetes Mellitus (QUESTIONS)

View Set

Splunk core certified user exam questions

View Set

older adult exam 2 practice questions

View Set

Chapter 12: Skin, Hair, and Nails

View Set

Unit 3- Clinical decision making

View Set