Documente Academic
Documente Profesional
Documente Cultură
UNIT - I
1. The physical layer concerns with
a) bit-by-bit delivery b) process to process delivery
c) application to application delivery d) none of the mentioned
Answer:a
a) querying b) sharing
c) communicating d) polling
Answer: d)
23. A communication network which is used over regional, national or global area is
a) LAN b) WAN
c) MAN d) VAN
Answer: b)
24. What is max data capacity for optical fiber cable?
a) 10 mbps b) 100 mbps
c) 1000 mbps d) 10000 mbps
Answer: c)
25. ........... is used to optimize the use of the channel capacity available in a network, to
minimize the transmission latency and to increase robustness of communication.
a) Message switching b) Linear switching
c) circuit switching d) packet switching
Answer: a)
26. In OSI network architecture, the dialogue control and token management are
responsibility of
a) session layer b) network layer
c) data link layer d) none of above
Answer: a)
27.
In OSI network architecture, the routing is performed by
Answer: a)
28. A communication path way that transfers data from one pint to another is called
a) Link b) Node
c) Medium d) Topology
Answer: a)
29. The multipoint topology is
a) Bus b) Star
c) Mesh d) Ring
Answer: a)
30. The combination of two or more networks are called
a) Internetwork b) WAN
c) MAN d) LAN
Answer: a)
UNIT II
31. The data link layer takes the packets from _____ and encapsulates them into frames
for transmission.
a) network layer b) physical layer
c) transport layer d) application layer
Answer:a
32. Which one of the following task is not done by data link layer?
a) framing b) error control
c) flow control d) channel coding
Answer:d
33. Which sub-layer of the data link layer performs data link functions that depend upon
the type of medium?
a) logical link control sublayer b) media access control sublayer
c) network interface control sublayer d) none of the mentioned
Answer:b
34. Header of a frame generally contains
a) synchronization bytes b) addresses
c) frame identifier d) all of the mentioned
Answer:d
35. Automatic repeat request error management mechanism is provided by
a) logical link control sublayer b) media access control sublayer
Answer: B. Framing
41. In .......... we are looking only to see if any error has occurred.
a) error searching b) error detection
c) error correction d) error transmission
B. error detection
42. In ........... we need to know the exact number of bits that are corrected and more
importantly, their location in the message.
a) error searching b) error detection
c) error correction d) error transmission
C. error correction
43. ............ is the process in which the receiver tries to guess the message by using
redundant bits.
a) Forward error correction b) Backward error correction
c) Transmission d) Retransmission
A. Forward error correction
44. ........... is the technique in which the receiver detects the occurrence of an error and
asks the sender to resend the message.
a) Forward error correction b) Backward error correction
c) Transmission d) Retransmission
C. Retransmission
45. In a real-life network, the data link protocols are implemented as
a) directional b) unidirectional
c) bidirectional d) omnidirectional
Answer: c)
46. The functions of the data link control includes
a) framing b) flow and error control
c) software implemented protocols d) All of the above
Answer: d)
47. The data link layer in the IEEE standard is divided into two sub layers of
a) MAC and ACKs b) LAN and MAC
c) LLC and ANSI d) LLC and MAC
Answer: d)
48. The two main functions of the data link layer are
a) hardware link control and media b) data link control and protocol access
access control control
c) data link control and media access d) both a and c
control
Answer: c)
49. In Frequency Division Multiple Access, the data link layer in each station tells its
a) Multiple Layer b) Physical Layer
c) Dual Layer d) Filtered Layer
Answer: b)
50. The applications of Frequency-Division Multiplexing (FDM) are
a) Television broadcasting. b) AM and FM radio stations
c) cellular telephones d) All of the above
Answer: d)
51. The difference between the Wavelength-Division Multiplexing (WDM) and
Frequency-Division Multiplexing ( FDM ) is that the frequencies are
a) very high b) very low
c) zero d) infinity
Answer: a)
52. FDM is an analog multiplexing technique that combines
a) digital signals b) analog signals
c) both a and b d) None
Answer: b)
53. Which is based on orthogonality?
a) TDM b) FDM
c) Both of the mentioned d) None of the mentioned
Answer: b
54. Which provides constant delay?
a) Synchronous TDM b) Non synchronous TDM
c) Both of the mentioned d) None of the mentioned
Answer: a
55. Example for reservation system is
a) Synchronous TDM b) Non synchronous TDM
c) Both of the mentioned d) None of the mentioned
Answer: a
56. Which are non orthogonal multiplexing?
a) TDM b) FDM
c) Both of the mentioned d) None of the mentioned
Answer: d
57. Which is used by many users to establish their home PC to the Internet via a phone-
line connection
a) FTP b) PPP
c) OSI d) PAR
Answer: b)
58. Sliding window protocol is also used by most of the _______________________
a) Connection oriented protocols b) Connection oriented network
protocols
Answer: b)
59. Sliding window protocol works on _________ in which there is simultaneous two-
way communication
a) no duplex b) half duplex
Answer: c)
60. Sliding window protocol makes use of two types of frames namely
a) Data frame b) Acknowledgement frame
Answer: c)
UNIT III
61. The network layer concerns with
a) Bits b) frames
c) Packets d) none of the mentioned
Answer:c
62. Which one of the following is not a function of network layer?
a) Routing b) inter-networking
c) congestion control d) none of the above
Answer:d
63. The 4 byte IP address consists of
a) network address b) host address
c) both (a) and (b) d) none of the mentioned
Answer:c
64. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm b) distance vector routing
c) link state routing d) all of the these
Answer:d
65. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing b) admission control
c) load shedding d) none
Answer:d
66. A network that needs human beings to manually route signals is called....
a) Fiber Optic Network b) Bus Network
c) T-switched network d) Ring network
Answer: c)
67. TCP/IP ................. layer corresponds to the OSI models to three layers.
a) Application b) Presentation
c) Session d) Transport
Answer: a)
68. Which of the transport layer protocols is connectionless?
a) UDP b) TCP
c) FTP d) Nvt
Answer: a)
69. Which of the following applications allows a user to access and change remote files
without actual transfer?
a) DNS b) FTP
c) NFS d) Telnet
Answer: c)
70. The data unit in the TCP/IP layer called a .....
a) Message b) Segment
c) Datagram d) Frame
Answer: d)
71. DNS can obtain the ................. of host if its domain name is known and vice versa.
a) Station address b) IP address
c) Port address d) Checksum
Answer: b)
72. The network layer concerns with
a) Bits b) frames
c) Packets d) none of the mentioned
Answer: c)
73. Which one of the following is not a function of network layer?
a) Routing b) inter-networking
c) congestion control d) none of the mentioned
Answer:d
74. The 4 byte IP address is not consists of
a) network address b) host address
c) both (a) and (b) d) none of the mentioned
Answer: d)
75. In the version field of header IPv4, when the machine is using some other version of
IPv4 then the datagram is
a) discarded b) terminated
c) switched d) linked
Answer: a)
76. The network layer at the source is responsible for creating a packet from the data
coming from another
a) Data b) Link
c) IP d) Protocol
Answer: d)
77. The header of the datagram in the IPv4 has
a) 0 to 20 bytes b) 20 to 40 bytes
c) 20 to 60 bytes d) 20 to 80 bytes
Answer: c)
78. In the IPv4 layer, the datagram is a
a) fixed length b) variable length
c) long length d) short length
Answer: b)
79. In IPv4, the service type of the service in the header field, the first 3 bits are called
a) type of service b) code bits
c) differentiated bits d) precedence bits
Answer: d)
80. In IPv4, to record the Internet routers that handle the datagram, a option is used
which is
a) Record IP b) Record Data
c) Record Router d) Record Header
Answer: c)
81. The Internet has chosen the datagram approach to switching in the
a) Data Link Layer b) network Layer
c) Switched Layer d) Linear Layer
Answer: b)
82. In IPv4, the thing encapsulated in a frame is
a) Instagram b) Data Frame
c) Datagram d) Minigram
Answer: c)
83. In Internetwork, network layer is responsible for
a) Host to Host Link b) Host to Host Delivery
c) Host to Host IP d) Host to Host Information
Answer: b)
84. CCT stands for
a) Close Circuit Transmission b) Congestion Controlled Traffic
c) Congestion Controlled d) Close Circuit Traffic
Transmission
Answer: b)
85. The total length of the IPv4 datagram is limited to 65,535 (216 - 1) bytes, since the
field length is
a) 10 Bits b) 12 Bits
c) 14 Bits d) 16 Bits
Answer: d)
86. When the option of the IPv4 is at its maximum size, the value of this field is
a) 5 b) 15
c) 20 d) 60
Answer: b)
87. The effective bandwidth is the bandwidth that the network needs to allocate for the
a) Flow of Data b) Flow of Protocol
c) Flow of Traffic d) Flow of Amount
Answer: c)
88. In Congestion Control, DVL stands for
a) Delay Versus Lose b) Delay Versus Line
c) Delay Versus Load d) Delay Versus Louden
Answer: c)
89. In Congestion, CBR stands for
a) Control Bit Rate b) Constant Bit Rate
c) Constant Byte Rate d) Control Byte Rate
Answer: b)
90. Four different attributes to control traffic have been devised in
a) Data Relay b) Source Relay
c) Frame Relay d) IP Relay
Answer: c)
UNIT IV
Answer: b)
129. One of the protocols to provide security at the application layer is
a) Pretty Good Privacy b) Handshake Protocol
c) Alert Protocol d) Record Protocol
Answer: a)
130. The SSL divides the data into blocks of
a) 2*6 b) 2*14
c) 2*20 d) 2*24
Answer: b)
131. A packet filter firewall filters at the
a) application or transport b) data link layer
c) physical d) network or transport layer
Answer: d)
132. A proxy firewall filters at the
a) physical layer b) application layer
c) data link layer d) network layer
Answer: b)
133. The man-in-the-middle attack can endanger the security of the Diffie-Hellman
method if two parties are not
a) Authenticated b) Joined
c) Submit d) Separate
Answer: a)
134. What are major components of intrusion detection system ?
a) Analysic Engine b) Event provider
c) Zone system d) Alert Database
********************