138
Computer Networking Multiple Choice By Abhishek Jaguessar (Bsc Computer Networking)

Computer Networking Multiple Choice Questions

Embed Size (px)

Citation preview

Page 1: Computer Networking Multiple Choice Questions

Computer Networking Multiple Choice

By Abhishek Jaguessar

(Bsc Computer Networking)

Page 2: Computer Networking Multiple Choice Questions

1. Frames from one LAN can be transmitted to another LAN via the device

A. RouterB. BridgeC. RepeaterD. Modem

Page 3: Computer Networking Multiple Choice Questions

2. Which of the following condition is used to transmit two packets over a medium at the same time?

A. ContentionB. CollisionC. SynchronousD. AsynchronousE. None of the above

Page 4: Computer Networking Multiple Choice Questions

3. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign?

A. 255.240.0.0B. 255.248.0.0C. 255.252.0.0D. 255.254.0.0E. 255.255.255.255

Page 5: Computer Networking Multiple Choice Questions

4. What is the default subnet mask for a class C network?

A. 127.0.0.1B. 255.0.0.0C. 255.255.0.0D. 255.255.255.0E. None of the above

Page 6: Computer Networking Multiple Choice Questions

5. Which of the following is used for modulation and demodulation?

A. modemB. protocolsC. gatewayD. multiplexerE. None of the above

Page 7: Computer Networking Multiple Choice Questions

6. Which of the following is not a disadvantage of wireless LAN?

A. Slower data transmissionB. higher error rateC. interference of transmissions from different

computersD. All of the above

Page 8: Computer Networking Multiple Choice Questions

7. The Internet Control Message Protocol (ICMP)

A. allows gateways to send error a control messages to other gateways or hosts

B. provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another

C. reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem

D. All of the aboveE. None of the above

Page 9: Computer Networking Multiple Choice Questions

8. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.

A. ModemB. CableC. HubD. Router

Page 10: Computer Networking Multiple Choice Questions

9. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiver

A. cannot talk at onceB. can receive and send data simultaneouslyC. can send or receive data one at a timeD. can do one way data transmission onlyE. None of the above

Page 11: Computer Networking Multiple Choice Questions

10.Which of the following technique is used for fragment?

A. a technique used in best-effort delivery systems to avoid endlessly looping packets

B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

C. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

D. All of the aboveE. None of the above

Page 12: Computer Networking Multiple Choice Questions

11.Contention is

A. One or more conductors that serve as a common connection for a related group of devices

B. a continuous frequency capable of being modulated or impressed with a second signal

C. the condition when two or more stations attempt to use the same channel at the same time

D. collection of interconnected functional units that provides a data communications service among stations attached to the network

E. None of the above

Page 13: Computer Networking Multiple Choice Questions

12.When you ping the loopback address, a packet is sent where?

A. On the networkB. Down through the layers of the IP architecture and then up

the layers againC. Across the wireD. through the loopback dongleE. None of the above

Page 14: Computer Networking Multiple Choice Questions

13.Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

A. FTPB. SNMPC. SMTPD. RPCE. None of the above

Page 15: Computer Networking Multiple Choice Questions

14.Which of the following device is used to connect two systems, especially if the systems use different protocols?

A. hubB. bridgeC. gatewayD. repeaterE. None of the above

Page 16: Computer Networking Multiple Choice Questions

15.The synchronous modems are more costly than the asynchronous modems because

A. they produce large volume of dataB. they contain clock recovery circuitsC. they transmit the data with stop and start bits.D. they operate with a larger bandwidthE. None of the above

Page 17: Computer Networking Multiple Choice Questions

16.A distributed network configuration in which all data/information pass through a central computer is

A. bus networkB. star networkC. ring networkD. Point-to-point networkE. None of the above

Page 18: Computer Networking Multiple Choice Questions

17.Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine?

A. UDPB. VMTPC. X.25D. SMTPE. None of the above

Page 19: Computer Networking Multiple Choice Questions

18. A remote batch-processing operation in which data is solely input to a central computer would require a:

A. telegraph lineB. simplex linesC. mixedband channelD. All the aboveE. None of the above

Page 20: Computer Networking Multiple Choice Questions

19.What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?

A. 192B. 192.168.10C. 0.0.0.5D. 51E. None of the above

Page 21: Computer Networking Multiple Choice Questions

20.The slowest transmission speeds are those of

A. twisted-pair wireB. coaxial cableC. fiber-optic cableD. microwaves

Page 22: Computer Networking Multiple Choice Questions

21.A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate?

A. 3 KbpsB. 6 KbpsC. 12 KbpsD. 24 Kbps.

Page 23: Computer Networking Multiple Choice Questions

22.Carrier is

A. One or more conductors that serve as a common connection for a related group of devices

B. a continuous frequency capable of being modulated or impressed with a second signal

C. the condition when two or more sections attempt to use the same channel at the same time

D. a collection of interconnected functional units that provides a data communications service among stations attached to the network

E. None of the above

Page 24: Computer Networking Multiple Choice Questions

23.What can greatly reduce TCP/IP configuration problems?

A. WINS ServerB. WINS ProxyC. DHCP ServerD. PDCE. None of the above

Page 25: Computer Networking Multiple Choice Questions

24. Which of the following statements is correct for the use of packet switching?

A. the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure

B. the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied

C. by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved.

D. All of the aboveE. None of the above

Page 26: Computer Networking Multiple Choice Questions

25. A front-end processor is

A. a user computer systemB. a processor in a large-scale computer that executes

operating system instructionsC. a minicomputer that relieves main-frame computers

at a computer centre of communications control functions

D. preliminary processor of batch jobs.E. None of the above

Page 27: Computer Networking Multiple Choice Questions

26.To connect a computer with a device in the same room, you might be likely to use

A. a coaxial cableB. a dedicated lineC. a ground stationD. All of the aboveE. None of the above

Page 28: Computer Networking Multiple Choice Questions

27.Internet-like networks within an enterprise.

A. IntranetsB. Switching alternatingC. Inter organizational networksD. Extranets

Page 29: Computer Networking Multiple Choice Questions

28.With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?

A. 192B. 224C. 240D. 248E. 252

Page 30: Computer Networking Multiple Choice Questions

29.Which of the following types of channels moves data relatively slowly?

A. wideband channelB. voiceband channelC. narrowband channelD. broadband channelE. None of the above

Page 31: Computer Networking Multiple Choice Questions

30.Which of the following is required to communicate between two computers?

A. communications softwareB. protocolC. communications hardwareD. access to transmission mediumE. All of the above

Page 32: Computer Networking Multiple Choice Questions

31.Which of the following does not allow multiple users or devices to share one communications line?

A. doubleplexerB. multipplexerC. concentratorD. controllerE. None of the above

Page 33: Computer Networking Multiple Choice Questions

32.The geostationary satellite used for communication systems

A. rotates with the earthB. remains stationary relative to the earthC. is positioned over equatorD. All of the aboveE. None of the above

Page 34: Computer Networking Multiple Choice Questions

33.Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer:

A. Bandwidth alternativesB. Switching alternatingC. Inter organizational networksD. Extranets

Page 35: Computer Networking Multiple Choice Questions

34.The _____ houses the switches in token ring.

A. transceiverB. nine-pin connectorC. MAUD. NICE. None of the above

Page 36: Computer Networking Multiple Choice Questions

35.What device separates a single network into two segments but lets the two segments appear as one to higher protocols?

A. SwitchB. BridgeC. GatewayD. Router

Page 37: Computer Networking Multiple Choice Questions

36. Which of the following refers to the terms "residual error rate"?

A. the number of bit errors per twenty four hours of continuous operation on an asynchronous line

B. The probability that one or more errors will be undetected when an error detection scheme is used

C. the probability that one or more errors will be detected when an error detection mechanism is used

D. signal to noise ratio divided by the ratio of energy per bit to noise per hertz

E. None of the above

Page 38: Computer Networking Multiple Choice Questions

37. The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband.

A. Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel

B. Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable

C. Baseband refers to local area networks, and broadband refers to wide area networks.

D. Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed

E. Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions

Page 39: Computer Networking Multiple Choice Questions

38.An error-detecting code inserted as a field in a block of data to be transmitted is known as

A. Frame check sequenceB. Error detecting codeC. ChecksumD. flow controlE. None of the above

Page 40: Computer Networking Multiple Choice Questions

39. The cheapest modems can transmit

A. 300 bits per secondB. 1,200 bits per secondC. 2,400 bits per secondD. 4,800 bits per secondE. None of the above

Page 41: Computer Networking Multiple Choice Questions

40. Computers cannot communicate with each other directly over telephone lines because they use digital pulses whereas telephone lines use analog sound frequencies. What is the name of the device which permits digital to analog conversion at the start of a long distance transmission?

A. InterfaceB. ModemC. AttenuationD. TeleprocessorE. None of the above

Page 42: Computer Networking Multiple Choice Questions

41. Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.

A. 12B. 81C. 48D. 729

Page 43: Computer Networking Multiple Choice Questions

42.Sending a file from your personal computer's primary memory or disk to another computer is called

A. uploadingB. downloadingC. logging onD. hang onE. None of the above

Page 44: Computer Networking Multiple Choice Questions

43. HMP (Host Monitoring Protocol) is:

A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address

B. a TCP/IP high level protocol for transferring files from one machine to another.

C. a protocol used to monitor computersD. a protocol that handles error and control messagesE. None of the above

Page 45: Computer Networking Multiple Choice Questions

44.Which of the following is a voiceband channel?

A. Telephone lineB. Telegraph lineC. Coaxial cableD. Microwave systemsE. None of the above

Page 46: Computer Networking Multiple Choice Questions

45.Demodulation is a process of

A. converting analog to digital signalsB. converting digital to analog signalsC. multiplexing various signals into one high speed line signalsD. performing data description.

Page 47: Computer Networking Multiple Choice Questions

46.Internet-like networks between a company and its business partners. Select the best fit for answer:

A. Bandwidth alternativesB. Switching alternatingC. Inter organizational networksD. Extranets

Page 48: Computer Networking Multiple Choice Questions

47.An example of an analog communication method is

A. laser beamB. microwaveC. voice grade telephone lineD. All of the aboveE. None of the above

Page 49: Computer Networking Multiple Choice Questions

48.Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?

A. Layer 7 protocolsB. Layer 6 protocolsC. Layer 5 protocolsD. Layer 4 protocolsE. None of the above

Page 50: Computer Networking Multiple Choice Questions

49.What frequency range is used for FM radio transmission?

A. Very Low Frequency : 3 kHz to 30. kHzB. Low Frequency : 30 kHz to 300 kHzC. High Frequency : 3 MHz to 30 MHzD. Very High Frequency : 30 MHz to 300 MHzE. None of the above

Page 51: Computer Networking Multiple Choice Questions

50.Transmission of computerised data from one location to another is called

A. data transferB. data flowC. data communicationD. data managementE. None of the above

Page 52: Computer Networking Multiple Choice Questions

51.Compared to analog signals, digital signals

A. allow faster transmissionB. are more accurateC. both (a) and (b)D. All of the aboveE. None of the above

Page 53: Computer Networking Multiple Choice Questions

52.FDDI is a

A. ring networkB. star networkC. mesh networkD. bus based networkE. None of the above

Page 54: Computer Networking Multiple Choice Questions

53.A central computer surrounded by one or more satellite computers is called a

A. bus networkB. ring networkC. star networkD. All of the aboveE. None of the above

Page 55: Computer Networking Multiple Choice Questions

54. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?

A. 500 bpsB. 1500 bpsC. 5 bpsD. 1000 bps

Page 56: Computer Networking Multiple Choice Questions

55.HOSTS file entries are limited to how many characters?

A. 8B. 255C. 500D. UnlimitedE. None of the above

Page 57: Computer Networking Multiple Choice Questions

56. Which of the following statement is incorrect?

A. The Addresses Resolution Protocol, ARP, allows a host to find the physical address of a target host on the same physical network, given only the target IP address.

B. The sender's IP - to- physical address binding is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet.

C. ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP-addresses of our choice to every machine.

D. All of the aboveE. None of the above

Page 58: Computer Networking Multiple Choice Questions

57.Which of the following best illustrates the default subnet mask for a class A,B, and C Network?

A. 0.0.0.0, 0.0.0.1, 0.0.1.1B. 255.255.255.0, 255.255.0.0, 255.0.0.0C. 255.0.0.0, 255.255.0.0, 255.255.255.0D. 255.255.0.0, 255.255.255.0, 255.255.255.255E. None of the above

Page 59: Computer Networking Multiple Choice Questions

58. Modulation is the process of

A. converting analog signals to digital signalsB. converting digital signals to analog signalsC. Multiplexing various signals into high speed line signalsD. performing data encryption.

Page 60: Computer Networking Multiple Choice Questions

59.Devices interconnected by the LAN should include

A. Computers and terminalsB. mass storage device, printers and plottersC. bridges and gatewaysD. All of the aboveE. None of the above

Page 61: Computer Networking Multiple Choice Questions

60.On a class B network, how many hosts are available at each site with a subnet mask of 248?

A. 16,382B. 8,190C. 4,094D. 2,046E. 1,022

Page 62: Computer Networking Multiple Choice Questions

61.Which of the following technique is used for encapsulation?

A. a technique used in best-effort delivery systems to avoid endlessly looping packets.

B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.

C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

D. All of the aboveE. None of the above

Page 63: Computer Networking Multiple Choice Questions

62.You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?

A. 255.255.252.0B. 225.255.254.0C. 255.255.255.240D. 255.255.255.252

Page 64: Computer Networking Multiple Choice Questions

63.With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?

A. 192B. 224C. 240D. 248E. 252

Page 65: Computer Networking Multiple Choice Questions

64.A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as

A. GatewaysB. mail gatewayC. bridgesD. User AgentE. None of the above

Page 66: Computer Networking Multiple Choice Questions

65.Error detection at a data link level is achieved by

A. bit stuffingB. cyclic redundancy codesC. Hamming codesD. equalization

Page 67: Computer Networking Multiple Choice Questions

66.When the computer provides the manager with a multiple choice of possible answers, the prompting technique is

A. question and answerB. form fillingC. open-ended questionD. menu selectionE. None of the above

Page 68: Computer Networking Multiple Choice Questions

67.Which network topology is considered passive?

A. CrossB. RingC. StarD. MeshE. Bus

Page 69: Computer Networking Multiple Choice Questions

68.Which address is the loopback address?

A. 0.0.0.1B. 127.0.0.0C. 127.0.0.1D. 255.255.255.255E. None of the above

Page 70: Computer Networking Multiple Choice Questions

69.Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:

A. Network ServerB. Virtual Private NetworkC. Network operating systemD. OSI

Page 71: Computer Networking Multiple Choice Questions

70.Which of the following is an advantage to using fiber optics data transmission?

A. resistance to data theftB. fast data transmission rateC. low noise levelD. few transmission errorsE. All of the above

Page 72: Computer Networking Multiple Choice Questions

71.Communication network is

A. one or more conductors that serve as a common connection for a related group of devices

B. a continuous frequency capable of being modulated or impressed with a second signal

C. the condition with two or more stations attempt to use the same channel at the same time

D. a collection of interconnected functional units that provides a data communications service among stations attached to the network

E. None of the above

Page 73: Computer Networking Multiple Choice Questions

72.Which of the following technique is used for Time-To-Line (TTL)?

A. a technique used in best-effort delivery system to avoid endlessly looping packets.

B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.

D. All of the aboveE. None of the above

Page 74: Computer Networking Multiple Choice Questions

73. Which of the following statement is incorrect?

A. if a host moves from one network to another, its IP address must change

B. routing uses the network portion of the IP address, the path taken by packets travelling to a host with multiple IP addresses depends on the address used.

C. IP addresses encode both a network and a host on that network, they do not specify an individual machine, but a connection to a network.

D. All of the aboveE. None of the above

Page 75: Computer Networking Multiple Choice Questions

74.Bandlimited signal is

A. transmission of signals without modulationB. a signal all of whose energy is contained within a

finite frequency rangeC. simultaneous transmission of data to a number of

stationsD. All of the aboveE. None of the above

Page 76: Computer Networking Multiple Choice Questions

75.Computers in a LAN can be interconnected by radio and infrared technologies.

A. Wireless LANsB. Network TopologiesC. MultiplexerD. Modem

Page 77: Computer Networking Multiple Choice Questions

76.How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?

A. first threeB. first fourC. first fiveD. first sevenE. None of the above

Page 78: Computer Networking Multiple Choice Questions

77.Which of the following is the address of the router?

A. The IP addressB. The TCP addressC. The subnet maskD. The default gatewayE. None of the above

Page 79: Computer Networking Multiple Choice Questions

78.A devices that links two homogeneous packet-broadcast local networks, is

A. hubB. bridgeC. repeaterD. gatewayE. None of the above

Page 80: Computer Networking Multiple Choice Questions

79.Identify the odd term amongst the following group:

A. Coaxial cableB. Optical fibreC. Twisted pair wireD. MicrowavesE. None of the above

Page 81: Computer Networking Multiple Choice Questions

80.Which of the following divides the high speed signal into frequency bands?

A. t-switchB. modemC. frequency-division multiplexerD. time-division multiplexerE. None of the above

Page 82: Computer Networking Multiple Choice Questions

81.What is the first octet range for a class C IP address?

A. 192 - 255B. 192 - 223C. 192 - 226D. 128 - 191E. 1 - 126

Page 83: Computer Networking Multiple Choice Questions

82.Which of the following conditions is used to transmit two packets over a medium at the same time?

A. ContentionB. CollisionC. SynchronousD. Asynchronous

Page 84: Computer Networking Multiple Choice Questions

83. Distributed Queue Dual Bus is a standard for

A. LANB. MANC. WAND. Wireless LAN.E. LAN and MAN

Page 85: Computer Networking Multiple Choice Questions

84. A teleprocessing system may consist of

A. user systemsB. communications systemsC. computer center systemsD. All of the aboveE. None of the above

Page 86: Computer Networking Multiple Choice Questions

85.If the ASCII character G is sent and the character D is received, what type of error is this?

A. single-bitB. multiple-bitC. burstD. recoverable

Page 87: Computer Networking Multiple Choice Questions

86.Which layer of OSI determines the interface of the system with the user?

A. NetworkB. ApplicationC. Data-linkD. SessionE. None of the above

Page 88: Computer Networking Multiple Choice Questions

87.The transfer of data from a CPU to peripheral devices of a computer is achieved through

A. modemsB. computer portsC. interfacesD. buffer memoryE. None of the above

Page 89: Computer Networking Multiple Choice Questions

88.What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?

A. 4B. 2C. 6D. 3E. None of the above

Page 90: Computer Networking Multiple Choice Questions

89.Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?

A. Teletex systemB. Fax systemC. Videotex systemD. Microwave systemE. None of the above

Page 91: Computer Networking Multiple Choice Questions

90.Which of the following statements is correct?

A. Terminal section of a synchronous modem contains the scrambler

B. Receiver section of a synchronous modem contains the scrambler

C. Transmission section of a synchronous modem contains the scrambler

D. Control section of a synchronous modem contains the scrambler

E. None of the above

Page 92: Computer Networking Multiple Choice Questions

91.Because the configuration information for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?

A. PINGB. TRACERTC. ARPD. IPCONFIGE. None of the above

Page 93: Computer Networking Multiple Choice Questions

92.Which of the following characteristic(s) is/are suited to the PSS applications?

A. bursty traffic and low communications intensityB. widely dispersed terminals and access to international

packets switched servicesC. Multiple remote host or applications accessed by a single

local access circuit terminal and circuitD. All of the aboveE. None of the above

Page 94: Computer Networking Multiple Choice Questions

93.Which of the following is separated by a subnet mask?

A. DHCP scopesB. Network ID and host IDC. DomainsD. Subnets

Page 95: Computer Networking Multiple Choice Questions

94.The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is

A. 6200 bpsB. 9600 bpsC. 34000 bpsD. 31000 bpsE. None of the above

Page 96: Computer Networking Multiple Choice Questions

95. TCP is:

A. Operates at the Data Link layerB. Connection orientated and unreliableC. Connection orientated and reliableD. Connectionless and unreliable

Page 97: Computer Networking Multiple Choice Questions

96. An encyclopedic database

A. is an information utility that specializes in storing and searching information

B. is generally freeC. is easy for beginners to useD. All of the aboveE. None of the above

Page 98: Computer Networking Multiple Choice Questions

97.Which of the following statements is correct?

A. Protocol converters are the same as multiplexersB. Protocol converters are the same as TDMsC. Protocol converters are usually not operated in pairs.D. Protocol converters are usually operated inE. None of the above

Page 99: Computer Networking Multiple Choice Questions

98.Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:

A. Bandwidth alternativesB. Switching alternatingC. Inter organizational networksD. Extranets

Page 100: Computer Networking Multiple Choice Questions

99.The physical layer, in reference to the OSI model, defines

A. data link procedures that provide for the exchange of data via frames that can be sent and received

B. the interface between the X.25 network and packet mode device

C. the virtual circuit interface to packet-switched serviceD. All of the aboveE. None of the above

Page 101: Computer Networking Multiple Choice Questions

100.A required characteristic of an online real-time system is:

A. more than one CPUB. offline batch processingC. no delay in processingD. All of the aboveE. None of the above

Page 102: Computer Networking Multiple Choice Questions

101.How many class A, B, and C network IDs can exist?

A. 2,113,658B. 16,382C. 126D. 128E. None of the above

Page 103: Computer Networking Multiple Choice Questions

102.Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?

A. Paperless officeB. Electronic mailC. Global networkD. Electronic newspaperE. None of the above

Page 104: Computer Networking Multiple Choice Questions

103. HDLC (High-level Data Link Control) is

A. a method of determining which device has access to the transmission medium at any time

B. a method access control technique for multiple-access transmission media

C. a very common bit-oriented data link protocol issued by ISO.D. network access standard for connecting stations to a circuit-

switched networkE. None of the above

Page 105: Computer Networking Multiple Choice Questions

104.The first step in troubleshooting many problems is to verify which of the following?

A. The subnet mask is validB. TCP/IP is installed correctly on the clientC. The WINS server is runningD. The BDC is operableE. None of the above

Page 106: Computer Networking Multiple Choice Questions

105.What protocol is used between E-Mail servers?

A. FTPB. SMTPC. SNMPD. POP3

Page 107: Computer Networking Multiple Choice Questions

106.If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.

A. Network Properties dialog boxB. Server Services dialog boxC. DHCPINFO command-line utilityD. Advanced Properties tab of TCP/ IP Info.E. None of the above

Page 108: Computer Networking Multiple Choice Questions

107.In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and

A. PCB. synchronous portC. crossover cableD. asynchronous portE. None of the above

Page 109: Computer Networking Multiple Choice Questions

108.A hard copy would be prepared on a

A. typewriter terminalB. line printerC. plotterD. All of the aboveE. None of the above

Page 110: Computer Networking Multiple Choice Questions

109.Arzeenah is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Arzeenah to set up?

A. Peer-to-peerB. Master domainC. Server-basedD. WANE. Share-level

Page 111: Computer Networking Multiple Choice Questions

110.When UPC is used, the price of the item is located

A. on the itemB. on the item and on the shelfC. in computer storageD. on the shelf and in computer storageE. None of the above

Page 112: Computer Networking Multiple Choice Questions

111. Error control is needed at the transport layer because of potential errors occurring

A. from transmission line noiseB. in routersC. from out-of-sequence deliveryD. from packet losses.

Page 113: Computer Networking Multiple Choice Questions

112.The transport layer protocol is connectionless.

A. NVTB. FTPC. TCPD. UDPE. None of the above

Page 114: Computer Networking Multiple Choice Questions

113.The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are

A. universal accessibility for private network Data Terminal Equipment (DTE)

B. adequate cost control mechanisms for administration of the private networks

C. to assign address to private network DTEsD. a and b bothE. None of the above

Page 115: Computer Networking Multiple Choice Questions

114.Communication between computers is almost always

A. serialB. parallelC. series parallelD. directE. None of the above

Page 116: Computer Networking Multiple Choice Questions

115.The difference between a multiplexer and a statistical multiplexer is

A. Statistical multiplexers need buffers while multiplexers do not need buffers

B. Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol

C. Multiplexers often waste the output link capacity while statistical multiplexers optimize its use

D. Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM)

E. None of the above

Page 117: Computer Networking Multiple Choice Questions

116.You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?

A. Token-RingB. CSMA/CDC. EthernetD. CSMA/CAE. ARCnet

Page 118: Computer Networking Multiple Choice Questions

117.A decrease in magnitude of current, voltage, a power of a signal in transmission between points, is known as

A. AttenuationB. AmplitudeC. AlohaD. CarrierE. None of the above

Page 119: Computer Networking Multiple Choice Questions

118.The term "remote job entry" relates to

A. batch processingB. realtime processingC. transaction processingD. distributed processingE. None of the above

Page 120: Computer Networking Multiple Choice Questions

119.The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer:

A. Internetworked enterpriseB. Information super highwayC. Business applications of telecommunicationsD. Client/Server networksE. None of the above

Page 121: Computer Networking Multiple Choice Questions

120.When using the loopback address, if TCP/IP is installed correctly, when should you receive a response?

A. ImmediatelyB. Only if the address failsC. After the next host comes onlineD. Within two minutesE. None of the above

Page 122: Computer Networking Multiple Choice Questions

121. MAC is

A. a method of determining which device has access to the transmission medium at any time

B. a method access control technique or multiple-access transmission media

C. a very common bit-oriented data link protocol issued to ISO.D. network access standard for connecting stations to a circuit-

switched networkE. None of the above

Page 123: Computer Networking Multiple Choice Questions

122. Parity bit is

A. an error-detecting code based on a summation operation performed on the bits to be checked.

B. a check bit appended to an array of binary digits to make the sum of all the binary digits.

C. a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors in detected

D. the ratio of the number of data units in error to the total number of data units

E. None of the above

Page 124: Computer Networking Multiple Choice Questions

123.Which of the following file retrieval methods use hypermedia?

A. HTTPB. WAISC. VeronicaD. ArchieE. None of the above

Page 125: Computer Networking Multiple Choice Questions

124.Which IP address class has few hosts per network?

A. DB. CC. BD. AE. None of the above

Page 126: Computer Networking Multiple Choice Questions

125. What is the port number for POP3?

A. 110B. 90C. 80D. 49

Page 127: Computer Networking Multiple Choice Questions

126.Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?

A. SMTPB. DHCPC. IMAPD. POP3

Page 128: Computer Networking Multiple Choice Questions

127.Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

A. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology

B. Ethernet, because it is cabled using fiber-optic cableC. Token-Ring, because it uses a MAUD. Ethernet, because it can be set up with most topologies and can use

multiple transfer speedsE. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet

can be used in all topologies

Page 129: Computer Networking Multiple Choice Questions

128.Two devices are in network if

A. a process in one device is able to exchange information with a process in another device

B. a process is running on both devicesC. PIDs of the processes running of different devices are sameD. none of the mentioned

Page 130: Computer Networking Multiple Choice Questions

129.When collection of various computers seems a single coherent system to its client, then it is called

A. computer networkB. distributed systemC. both (a) and (b)D. none of the mentioned

Page 131: Computer Networking Multiple Choice Questions

130.Which one of the following computer network is built on the top of another network?

A. prior networkB. chief networkC. prime networkD. overlay network

Page 132: Computer Networking Multiple Choice Questions

131.In computer network nodes are

A. the computer that originates the dataB. the computer that routes the dataC. the computer that terminates the dataD. all of the mentioned

Page 133: Computer Networking Multiple Choice Questions

132.Communication channel is shared by all the machines on the network in

A. broadcast networkB. unicast networkC. multicast networkD. none of the mentioned

Page 134: Computer Networking Multiple Choice Questions

133. Bluetooth is an example of

A. personal area networkB. local area networkC. virtual private networkD. none of the mentioned

Page 135: Computer Networking Multiple Choice Questions

134.A list of protocols used by a system, one protocol per layer, is called

A. protocol architectureB. protocol stackC. protocol suitD. none of the mentioned

Page 136: Computer Networking Multiple Choice Questions

135.Which one of the following extends a private network across public networks?

A. local area networkB. virtual private networkC. enterprise private networkD. storage area network

Page 137: Computer Networking Multiple Choice Questions

136. The IETF standards documents are called

A. RFCB. RCFC. IDD. None of the mentioned

Page 138: Computer Networking Multiple Choice Questions

END

THANK YOU

ABHISHEK JAGUESSAR