1. In Ethernet CSMA/CD, the special bit sequence transmitted by media access
management to handle collision is called
Correct : C. Jam
2. What will be the efficiency of a Stop and Wait protocol, if the transmission
time for a frame is 20ns and the propagation time is 30ns?
Correct : B. 25%
3. The physical layer translates logical communication requestsfrom the into hardware specific operations.
Correct : A. Data link layer
4. A single channel is shared by multiple signals by
Correct : C. Multiplexing
5. Wireless transmission of signals can be done via
Correct : D. All of the mentioned
6. ICMP is primarily used for
Correct : A. Error and diagnostic functions
7. Which of the following is a transport layer protocol?
Correct : A. Stream control transmission protocol
8. is the multiplexing technique that shifts each signal to a different carrierfrequency.
Correct : A. FDM
9. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is
Correct : A. 32kbps
10. If there are n signal sources of same data rate, then the TDMlink has slots.
Correct : A. N
11. The state when dedicated signals are idle are called
Correct : C. Silent period
12. In TDM, slots are further divided into
Correct : B. Frames
13. In TDM, the transmission rate of a multiplexed path is always the sum of the transmission rates of the signal sources.
Correct : A. Greater than
14. The time required to examine the packet’s header and determine where to direct the packetis part of
Correct : A. Processing delay
15. Transmission delay does not depend on
Correct : B. Distance between the routers
16. Propagation delay depends on
Correct : C. Distance between the routers
17. Which of the following delay is faced by the packet in travelling from one end system toanother?
Correct : D. All of the mentioned
18. A network router joins two _________ together?
Correct : C. Networks
19. Message Oriented Middleware allows general purpose messages to be exchanged in a Client/Server
system using message queues.
Correct : A. True
20. Which of the following below is a loopback IP address?
Correct : D. 127.0.0.1
21. Transport layer of OSI model lies between Network and ___________ layer
Correct : C. Session
22. IP4 is more commonly used than IPv6?
Correct : A. True
23. From the options below, which suits best for MODEM?
Correct : A. a device that modulates an analog carrier signal to encode digital information
24. A network point that provides entrance into another network is called as ___________
Correct : B. Gateway
25. UDP is an unreliable protocol.
Correct : A. True
26. A stream socket provides _________ communications between a client and a server
Correct : B. Two way
27. TELNET used _________ protocol for data connection
Correct : A. TCP
28. __________ is a standard suite of protocols used for packet switching across computer networks.
Correct : C. x.25
29. ARP works on Ethernet networks.
Correct : B. True
30. _______ assigns a unique number to each IP network adapter called the MAC address.
Correct : A. Media Access Control
31. Piconets in the blue tooth a minimum of two and a maximum of ____________ Bluetooth peer
devices.
Correct : B. eight
32. Dynamic addressing doesn’t allow many devices To share limited address space on a network
Correct : B. False
33. NAT stands for _____ .
Correct : C. network address translation
34. Which of the following is true for secure shell tunneling?
Correct : A. To set up an SSH tunnel, one configures an SSH client to forward a specified local port
35. When computers in a network listen and receive the signal, it is termed as active toplogy
Correct : A. True
36. ______is added to data packet for error detection.
Correct : C. parity bit
37. ALL IP addresses are divided into a network address and host address
Correct : A. True
38. Both ping and tracert are used to find If the computer is in the network.
Correct : B. False
39. What is the difference between ring and bus topology?
Correct : A. In Ring, all nodes are connected with another in a loop while in the bus they are connected to a central cable
40. MAC addressing works in data link layer while IP addressing works in the network layer.
Correct : A. True
41. A packet whose destination is outside the local TCP/IP network segment is sent to the ___ _.
Correct : B. Default gateway
42. The physical layer is concerned with the movement of _______ over the physical medium.
Correct : D. Bits
43. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.
Correct : B. removed
44. IPv6 has _______ -bit addresses.
Correct : C. 128
45. An IP address contains________ bits ?
Correct : C. 32
46. Which routing protocol below is used by exterior routers between the autonomous systems?
Correct : D. BGP
47. What is the network ID for a computer whose IP address is 190.148.64.23?
Correct : B. 190.148
48. 9
93. Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s.
Correct : B. 2
49. The combination of an IP address and a port number is known as ___________.
Correct : B. socket address
50. The Internet Control Message Protocol (ICMP)
Correct : D. All of the above
51. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.
Correct : D. Router
52. Which of the following TCP/IP protocol is used for transferring electronic
mail messages from one machine to another?
Correct : C. SMTP
53. Which of the following device is used to connect two systems, especially if
the systems use different protocols?
Correct : C. gateway
54. _______ can detect burst error of length less than or equal to degree of the
polynomial and detects burst errors that affect odd number of bits.
Correct : B. CRC
55. The PSTN is an example of a ………………… network.
Correct : B. circuit switched
56. A subset of a network that includes all the routers but contains no loops is
called:
Correct : A. spanning tree
57. An endpoint of an inter-process communication flow across a computer network is called:
Correct : A. socket
58. In an Ethernet local area network, which one of the following statements is TRUE?
Correct : D. The exponential back off mechanism reduces the probability of collision on retransmissions
59. A small network making up the Internet and also having a small numbers of computers within it is called
Correct : C. Subdomain
60. If a file consisting of 50,000 characters takes 40 seconds to send, then the
data rate is __________.
Correct : D. 10 kbps
61. In CRC there is no error if the remainder at the receiver is _____.
Correct : B. zero
62. A modulator converts a _____ signal to a(n) _____ signal.
Correct : C. analog; digital
63. ASK, PSK, FSK, and QAM are examples of _____ encoding.
Correct : B. digital-to-analog
64. With an IP address of 201.142.23.12, what is your default subnet mask?
Correct : D. 255.255.255.0
65. DSL stands for ------------------------
Correct : D. digital subscriber lines
66. The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?
Correct : B. Token passing
67. One of the header fields in an IP datagram is the Time to Live (TTL) field.
Which of the following statements best explains the need for this field?
Correct : D. It can be used to prevent packet looping
68. Which of the following system calls results in the sending of SYN packets?
Correct : D. connect
69. What is the maximum size of data that the application layer can pass on to the TCP layer below?
Correct : A. Any size
70. Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what is the number of packets that A will transmit for sending the message to B?
Correct : C. 16
71. Which one of the following statements is FALSE?
Correct : B. Packet switching results in less variation in delay than circuit switching.
72. In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ________.
Correct : D. 5 bytes
73. In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called
Correct : C. Jam
74. How many digits of the DNIC (Data Network Identification Code) identify the country?
Correct : A. First three
75. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
Correct : C. SMTP
76. Which of the following device is used to connect two systems, especially if the systems use different protocols?
Correct : C. gateway
77. _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.
Correct : B. CRC
78. If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is:
Correct : D. 6
79. In an Ethernet local area network, which one of the following statements is TRUE?
Correct : A. A station stops to sense the channel once it starts transmitting a frame.
80. Which of the following to keep track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet.
Correct : C. Hypertext transfer Protocol (HTTP)
81. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________.
Correct : D. 10 kbps
82. Sending a file from your personal computer's primary memory or disk to another computer is called
Correct : A. uploading
83. Consider different activities related to email.
m1:Send an email from a mail client to mail server
m2:Download an email from mailbox server to a mail client
m3:Checking email in a web browser
Which is the applicable level protocol user in each activity?
Correct : C. m1:SMTP, m2:POP, m3:HTTP
84. In the slow start phase of the TCP congestion control algorithm, the size of the congestion window
Correct : D. increases exponentially
85. Match the following:
(P) SMTP (1) Application layer
(Q) BGP (2) Transport layer
(R) TCP (3) Data link layer
(S) PPP (4) Network layer
(5) Physical layer
Correct : B. P – 1 Q – 4 R – 2 S – 3
86. In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because
Correct : A. Receiver is to be synchronized for byte reception
87. What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?