Which of the
through is share the data of two computer?
A. Library
B. Network✔
C. Grouping
D. Integrated
system
In specific, if the systems use separate
protocols, which one of the following devices is used to link two systems?
A. Repeater
B. Gateway✔
C. Bridge
D. Hub
The private key
in asymmetric key cryptography is kept by?
A. Sender
B. Receiver✔
C. Sender
and Receiver
D. None
of the these
Which of the following algorithms is not used
in asymmetric-key cryptography?
A. RSA
algorithm
B. Diffie-Hellman
algorithm
C. Electronic
code book algorithm✔
D. None
of the mentioned
In the cryptography, the sequence of the
letters is rearranged by?
A. Transposition
ciphers✔
B. Substitution
ciphers
C. Both
a and b
D. None
of these
The term IPv4
stands for?
A. Internet
Protocol Version 4✔
B. Internet
Programming Version 4
C. International
Programming Version 4
D. None
of these
The term LAN stands for?
A. Local
Area Net
B. Local
Area Network✔
C. Local
Array Network
D. Local
Array Net
Which of these
is a standard interface for serial data transmission?
A. ASCII
B. RS232C✔
C. 2
D. Centronics
Which type of topology is best suited for
large businesses which must carefully control and coordinate the operation of
distributed branch outlets?
A. Ring
B. Local
area
C. Hierarchical
D. Star✔
Which of the
following transmission directions listed is not a legitimate channel?
A. Simplex
B. Half
Duplex
C. Full
Duplex
D. Double
Duplex✔
"Parity bits" are used for which of
the following purposes?
A. Encryption
of data
B. To
transmit faster
C. To
detect errors✔
D. To
identify the user
What kind of
transmission medium is most appropriate to carry data in a computer network
that is exposed to electrical interferences?
A. Unshielded
twisted pair
B. Optical
fiber✔
C. Coaxial
cable
D. Microwave
A collection of
hyperlinked documents on the internet forms the ?
A. World
Wide Web (WWW) ✔
B. E-mail
system
C. Mailing
list
D. Hypertext
markup language
The location of
a resource on the internet is given by its?
A. Protocol
B. URL✔
C. E-mail
address
D. ICQ
The term HTTP stands for?
A. Hyper
terminal tracing program
B. Hypertext
tracing protocol
C. Hypertext
transfer protocol✔
D. Hypertext
transfer program
A proxy server is used as the computer?
A. with
external access✔
B. acting
as a backup
C. performing
file handling
D. accessing
user permissions
Which software
prevents the external access to a system?
A. Firewall✔
B. Gateway
C. Router
D. Virus
checker
Which of the
following best describes uploading information?
A. Sorting
data on a disk drive
B. Sending
information to a host computer✔
C. Receiving
information from a host computer
D. Sorting
data on a hard drive
Which one of the following is the most common
internet protocol?
A. HTML
B. NetBEUI
C. TCP/IP✔
D. IPX/SPX
Software
programs that allow you to legally copy files and give them away at no cost are
called which of the following?
A. Probe
ware
B. Timeshare
C. Shareware
D. Public
domain✔
The term FTP stands for?
A. File
transfer program
B. File
transmission protocol
C. File
transfer protocol✔
D. File
transfer protection
At what speed does tele-computed refer?
A. Interface
speed
B. Cycles
per second
C. Baud
rate✔
D. Megabyte
load
Which one of the following is not a network
topology?
A. Star
B. Ring
C. Bus
D. Peer
to Peer✔
The maximum
length (in bytes) of an IPv4 datagram is?
A. 32
B. 1024
C. 65535✔
D. 512
The IP network 192.168.50.0 is to be divided
into 10 equal sized subnets. Which of the following subnet masks can be used
for the above requirement?
A. 255.243.240
B. 255.255.0.0
C. 255.255.0✔
D. 255.255.255
When the mail server sends mail to other mail
servers it becomes ___ ?
A. SMTP
client✔
B. SMTP
server
C. Peer
D. Master
The length of
an IPv6 address is?
A. 32
bits
B. 64
bits
C. 128
bits✔
D. 256
bits
Which of the following address belongs class
A?
A. 121.12.12.248✔
B. 130.12.12.248
C. 128.12.12.248
D. 129.12.12.248
Which of the following IP addresses can be
used as (a) loop-back addresses?
A. 0.0.0.0
B. 127.0.0.1✔
C. 255.255.255.255
D. 0.255.255.255
The term WAN stands for?
A. Wide
Area Net
B. Wide
Access Network
C. Wide
Area Network✔
D. Wide
Access Net
Which of the following cannot be used as a
medium for 802.3 ethernet?
A. A
thin coaxial cable
B. A
twisted pair cable
C. A
microwave link✔
D. A
fiber optical cable
What IP address class allocates 8 bits for the
host identification part?
A. Class
A
B. Class
B
C. Class
C✔
D. Class
D
The term IANA stands for?
A. Internet
Assigned Numbers Authority✔
B. Internal
Assigned Numbers Authority
C. Internet
Associative Numbers Authoritative
D. Internal
Associative Numbers Authority
How many versions available of IP?
A. 6
version
B. 4
version
C. 2
version✔
D. 1
version
How many fields are in the SMDS packet?
A. Two
B. Three✔
C. Four
D. Five
What is the maximum data transfer rate of the
optical fiber wire?
A. 50
kbps
B. 1000
kbps
C. 1000
Mbps✔
D. None
of the these
POTS network works on the principle of
________
A. Telephone
switching
B. Proxy
server
C. File
system
D. Circuit
system✔
Which of the following protocols is the
bit-oriented protocol?
A. SSL
B. http
C. HDLC✔
D. All
of the these
SLIP stands for _______
A. System
line internet protocol
B. Serial
line internet protocol✔
C. Signal
line internet protocol
D. Signal
internet protocol
The second port is used to ____________ in the
two-port network.
A. Input
terminal
B. Output
terminal✔
C. Signal
terminal
D. Bandwidth
terminal
Which of the following layers does the HTTP
protocol work on?
A. Physical
layer
B. Data-link
layer
C. Application
layer✔
D. None
of the these
Which of the following statement correct about
the cipher in cryptography?
A. It
is a method for performing encryption and decryption✔
B. It
is used to establish the network connection
C. It
is a message event
D. All
of the these
SONET stands for ______________.
A. Signal
Operation Network
B. Synchronous
Optical Network✔
C. System
Optical Network
D. Signal
Optical Network
How many layers does the SONET contain?
A. 2
layers
B. 3
layers
C. 4
layers✔
D. 5
layers
RAKE receiver designed for _____.
A. Multipath
fading✔
B. Signals
C. Data
network
D. Network
connection
What is the formula of high rate in zigzag
code?
A. J
/ (J * 1)
B. -Z
/ (1 + J)
C. Z
* (1 + J)
D. J
/ (J + 1) ✔
What is the size of the sender window in the
Go Back N (ARQ) protocol?
A. 0
B. 1
C. 10
D. n✔
What is the efficiency of the Go back N (ARQ)
protocol?
A. N
= N / (2a + 2a)
B. N
= N / (1 + 2a) ✔
C. N
= N * (2a + 2a)
D. N
= N * (1 + 2a)
What is the size of the destination port in
the UDP protocol?
A. 8
bits
B. 16
bits✔
C. 20
bits
D. 32
bits
What network utility uses the time-To-Live
(TTL) field in the IP header to elicit ICMP error messages?
A. Ping
B. Route
C. Traceroute✔
D. Ifconfig
A client of the DNS (Domain Name System)
application is called _____.
A. DNS
server
B. DNS
Name
C. DNS
resolver✔
D. DNS
inquirer
During normal IP packet forwarding by a
router, which of the following fields of the IP header is updated?
A. Repeater
B. Source
address
C. Destination
address
D. Checksum✔
MAC address is also called ______.
A. Physical
address
B. Logical
address
C. Source
address
D. Destination
address
Which of the following addresses is 32-bit?
A. MAC
address✔
B. Virtual
address
C. Source
address
D. Destination
address
EDI stands for ____.
A. Electronic
Data Interchange✔
B. Electronic
Digital Internet
C. Electronic
Digital Interchange
D. Electronic
Data Internet
What is the maximum data transfer rate of the
ISDN?
A. 1024
Mbps
B. 64
Mbps✔
C. 64
kbps
D. 1024
kbps
What is the size of the UDP header?
A. 8
bytes✔
B. 16
bytes
C. 20
bytes
D. 64
bytes
Which of the following protocols is the
connection-less protocol?
A. UDP✔
B. TCP
C. IP
D. All
of the these
What is the maximum length of the STP wire?
A. 20
ft
B. 50
ft
C. 50
meters
D. 100
meters✔
Which network is suitable for a building?
A. WAN
B. LAN✔
C. MAN
D. PAN
________ is a 2G mobile telecommunications
based on the CDMA.
A. IS-95✔
B. ISO
1990
C. IS-97
D. None
of the these
Which of the following statements is correct
about IRC?
A. It
sends the messages in virtual time
B. It
is an application layer protocol✔
C. It
works on the proxy model
D. All
of the these
Which of the following devices is not a
networking device?
A. Hub
B. Switch
C. Bridge
D. None
of the these✔
Which layer of
the TCP / IP stack corresponds to the OSI model transport layer?
A. Host
to host✔
B. Application
C. Internet
D. Network
Access
An Aloha network uses an 18.2 kbps channel for
sending message packets of 100 bits long size. Calculate the maximum
throughput.
A. 5999
B. 6900
C. 6027✔
D. 5027
Which of the following
methods is used to broadcast two packets on the medium at a time?
A. Collision✔
B. Synchronous
C. Asynchronous
D. None
of the above
What is the maximum efficiency of pure aloha
at G = 1/2?
A. 1.89
B. 17.99
C. 18.999
D. 18.4✔
What is the maximum efficiency of slotted
aloha at G = 1?
A. 36.8✔
B. 35.8
C. 35.5
D. 37.8
Which of the following statement is true about
error detection techniques used on communications link?
A. Cyclic
Redundancy Check (CRC) sequence can detect as well as correct errors.
B. Error
detection cannot be used on simplex links.
C. Hamming
code can detect up to 3-bit errors.
D. All
of the these✔
In which of the following switching methods,
the message is divided into small packets?
A. Message
switching
B. Packet
switching✔
C. Virtual
switching
D. None
of the these
Which of the following switch methods creates
a point-to-point physical connection between two or more computers?
A. Message
switching✔
B. Packet
switching
C. Circuit
switching
D. None
of the these
What is the second name of the proxy server?
A. Proxy
tools
B. Application
proxy
C. Application-level
gateway✔
D. All
of the these
Which of the
following devices does not require power to forward the signals?
A. Active
hub
B. Passive
hub✔
C. Repeater
D. Bridge
How many pins does RJ-45 contain?
A. Two
B. Four
C. Eight✔
D. Ten
1 Comments
good mcqs
ReplyDelete