Sunteți pe pagina 1din 51

1.protocols are?

[A] Agreements on how communication


components and DTE's are to communicate
[B] Logical communication channels for
transferring data
[C] Physical communication channels sued
for transferring data
[D] None of above
Answer: A. Agreements on how
communication components and DTE's are to
communicate
Answer 2 Discussions
5 1
2.Which data communication method is used
to transmit the data over a serial
communication link?
[A] Simplex
[B] Half-duplex
[C] Full duplex
[D] All of above
Answer: C. Full duplex
Answer 1 Discussions
1 1
3.The method of communication in which
transaction takes place in both directions,but
only in one direction at a time, is called ?
[A] Simplex
[B] Four wire circuit
[C] Full duplex
[D] Half-duplex
Answer: D. Half-duplex
Answer 0 Discussions
1 0
4.In communication satellite, multiple
repeaters are known as?
[A] Detectors
[B] Modulators
[C] Stations
[D] Transponders
Answer: D. Transponders
Answer 0 Discussions
2 0
5.Error detection at the data link layer is
achieved by?
[A] Bit stuffing
[B] Cyclic redundancy codes
[C] Hamming codes
[D] Equalization
Answer: B. Cyclic redundancy codes
Answer 0 Discussions
1 0
6.Loss in signal power as light travels down
the fiber is called?
[A] Attenuation
[B] Propagation
[C] Scattering
[D] Interruption
Answer: A. Attenuation
Answer 0 Discussions
0 1
7.The topology with highest reliability is ?
[A] Bus topology
[B] Star topology
[C] Ring Topology
[D] Mesh Topology
Answer: D. Mesh Topology
Answer 1 Discussions
2 0
8.Baud means?
[A] The number of bits transmitted per unit
time
[B] The number of byted transmitted per unit
time
[C] The rate at which the signal changes
[D] None of above
Answer: C. The rate at which the signal
changes
Answer 0 Discussions
2 0
9.In OSI model dialogue control and token
management are responsibilities of ?
[A] Session Layer
[B] Network layer
[C] Transport layer
[D] Data link layer
Answer: A. Session Layer
Answer 0 Discussions
2 0
10.Under mark parity,each parity bit is?
[A] Alternated between 0 and 1
[B] Always set to 0
[C] Always set to 1
[D] Not used
Answer: C. Always set to 1
11.How long is an IPv6 address?
[A] 32 bits
[B] 128 bits
[C] 128 bytes
[D] 64 bits
Answer: B. 128 bits
Explanation:
An IPv6 address is 128 bits long.
Answer 0 Discussions
2 0
12.You have 10 users plugged into a hub
running 10Mbps half-duplex. There is a server
connected to the switch running 10Mbps half-
duplex as well. How much bandwidth does
each host have to the server?
[A] 100 kbps
[B] 10 Mbps
[C] 1 Mbps
[D] 2 Mbps
Answer: B. 10 Mbps
Explanation:
Each device has 10 Mbps to the server.
Answer 0 Discussions
0 0
13.How often are BPDUs sent from a layer 2
device?
[A] Every 2 seconds
[B] Never
[C] Every 10 minutes
[D] Every 30 seconds
Answer: A. Every 2 seconds
Explanation:
Every 2 seconds, BPDUs are sent out from all
active bridge ports by default.
Answer 0 Discussions
2 0
14.Which router command allows you to view
the entire contents of all access lists?
[A] show all access-lists
[B] show access-lists
[C] showip interface
[D] show interface
Answer: B. show access-lists
Explanation:
To see the contents of all access lists, use the
show access-lists command.
Answer 0 Discussions
1 0
15.What protocols are used to configure
trunking on a switch?
[A] VLAN Trunking Protocol
[B] VLAN
[C] 802.1Q
[D] ISL
Answer: B. VLAN
Explanation:
VTP is not right because it has nothing to do
with trunking except that it sends VLAN
information across a trunk link. 802.1Q and
ISL are used to configure trunking on a port.
Answer 0 Discussions
2 0
16.How many collision domains are created
when you segment a network with a 12-port
switch?
[A] 1
[B] 12
[C] 5
[D] 2
Answer: B. 12
Explanation:
Layer 2 switching creates individual collision
domains.
Answer 0 Discussions
2 0
17.Which protocol does Ping use?
[A] TCP
[B] ARP
[C] ICMP
[D] BootP
Answer: C. ICMP
Explanation:
ICMP is the protocol at the Network layer that
is used to send echo requests and replies.
Answer 0 Discussions
2 0
18.What PPP protocol provides dynamic
addressing, authentication, and multilink?
[A] NCP
[B] HDLC
[C] X.25
[D] LCP
Answer: D. LCP
Explanation:
Link Control Protocol in the PPP stack
provides dynamic addressing, authentication,
and multilink.
Answer 0 Discussions
2 0
19.What is a stub network?
[A] A network that has only one entry and exit
point.
[B] A network with only one entry and no exit
point.
[C] A network with more than one exit point.
[D] A network with more than one exit and
entry point.
Answer: A. A network that has only one entry
and exit point.
Explanation:
Stub networks have only one connection to an
internetwork. Only default routes can be set
on a stub network or network loops may
occur.
Answer 0 Discussions
2 0
20.Which of the following services use TCP?
[A] DHCP
[B] SMTP
[C] FTP
[D] TFTP
[E] HTTP
Answer: B. SMTP
Explanation:
SMTP, HTTP and FTP use TCP.
21.Which of the following is private IP
address?
[A] 192.168.24.43
[B] 168.172.19.39
[C] 172.15.14.36
[D] 12.0.0.1
Answer A Discussions
2 0
22.Which class of IP address provides a
maximum of only 254 host addresses per
network ID?
[A] Class A
[B] Class B
[C] Class C
[D] Class D
[E] Class E
Answer C
1 0
23.In dial up remote access a client uses the -
--- to create a physical connection to a part on
a remote access server of the private network.
[A] Public telephone network
[B] Bank�??s branch network
[C] Private network
[D] Public local network
Answer A
1 0
24.Which of the following devices is a PC
component that connects the computer to the
network?
[A] Bridge
[B] NIC
[C] DNS Server
[D] Gateway
Answer B
0 0
25.Which of the following devices modulates
digital signals into analog signals that can be
sent over traditional telephone lines?
[A] Router
[B] Gateway
[C] Switch
[D] Modem
Answer D
0 0
26.Which of the following devices takes data
sent from one network device and forwards it
to all devices on the network regardless of the
intended recipient?
[A] DNS Server
[B] Switch
[C] Hub
[D] Gateway
Answer C
1 0
27.Which of the following devices takes data
sent from one network device and forwards it
to the destination node based on MAC
address?
[A] Hub
[B] Switch
[C] Gateway
[D] Modem
Answer B
1 0
28.Although they've fallen out of favor, which
of the following devices is used to connect
different network segments and manage the
traffic between them?
[A] Bridge
[B] Hub
[C] Gateway
[D] Repeater
Answer A
1 0
29.Which of the following devices direct
network traffic based not by MAC addresses
but by software-configured network
addresses?
[A] Router
[B] Hub
[C] Bridge
[D] NIC
Answer A
1 0
30.Which of the following network
devices/systems translates data from one
format to another?
[A] Hub
[B] DHCP Server
[C] Gateway
[D] NIC
Answer C
31.Which of the following terms is used to
describe a hardware- or software-based
device that protects networks from outside
threats?
[A] NIC
[B] Gateway
[C] Firewall
[D] Hub
Answer: C. Firewall

0 0
32.Which of the following devices assigns IP
address to devices connected to a network
that uses TCP/IP?
[A] DHCP Server
[B] NIC
[C] Gateway
[D] Hub
Answer: A. DHCP Server
Explanation:
DHCP (Dynamic Host Configuration Protocol)
is used to provide Ip Address to all connected
deviesdynamicaly that uses TCP/IP.
Answer 2 Discussions
2 0
33.Which of the following devices translates
hostnames into IP addresses?
[A] DNS Server
[B] Hub
[C] DHCP Server
[D] Firewall
Answer: A. DNS Server
Answer 0 Discussions
1 0
34.Switch is a Device of _________ Layer of
OSI Model.
[A] Network Layer
[B] Data Link Layer
[C] Application Layer
[D] Session Layer
Answer: B. Data Link Layer
Explanation:
Switches Operate On The Second Layer of
OSI Model That is Data Link Layer.
Answer 0 Discussions
2 0
35.HUB is a _________ Device and Switch is
a ________ Device.
[A] Unicast, Multicast
[B] Malticast, Unicast
[C] Broadcast, Unicast
[D] None of Above
Answer: C. Broadcast, Unicast
Explanation:
Hub is a Broadcasting Device and Switch is a
Unicasting Device because Switch have
Memory Element to Store MAC Address.
Answer 0 Discussions
2 0
36.Star Topology is Based On a Central
Device that can be __________ ?
[A] HUB
[B] Switch
[C] Only A
[D] Both A and B
Answer: D. Both A and B
Explanation:
HUB and Switch are used in Star Type
Networks.
Answer 0 Discussions
0 0
37.The data on a DVD is held in the form of
....... on the disc.
[A] small pits and bumps
[B] small bits
[C] small bytes
[D] None of These
Answer: A. small pits and bumps
1. How many digits of the DNIC (Data
Network Identification Code) identify the
country?
A. first three
B. first four
C. first five
D. first six
E. None of the above
Answer: Option A
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

2. A station in a network forwards incoming


packets by placing them on its shortest
output queue. What routing algorithm is
being used?
A. hot potato routing
B. Flooding
C. static routing
D. delta routing
E. None of the above
Answer: Option A
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report
3. The probability that a single bit will be in
error on a typical public telephone line
using 4800 bps modem is 10 to the power -
3. If no error detection mechanism is used,
the residual error rate for a communication
line using 9-bit frames is approximately
equal to
A. 0.003
B. 0.009
C. 0.991
D. 0.999
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

4. Frames from one LAN can be transmitted


to another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem
Answer: Option B

. 5. Which of the following condition is used


to transmit two packets over a medium at
the same time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
E. None of the above
Answer: Option B

6. You have a class A network address


10.0.0.0 with 40 subnets, but are required
to add 60 new subnets very soon. You
would like to still allow for the largest
possible number of host IDs per subnet.
Which subnet mask should you assign?
A. 255.240.0.0
B. 255.248.0.0
C. 255.252.0.0
D. 255.254.0.0
E. 255.255.255.255
Answer: Option E
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

7. What are the most commonly used


transmission speeds in BPS used in data
communication?
A. 300
B. 1200
C. 2400
D. 9600
E. None of the above
Answer: Option D
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

8. What is the default subnet mask for a


class C network?
A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
E. None of the above
Answer: Option D
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

9. Which of the following is used for


modulation and demodulation?
A. Modem
B. Protocols
C. Gateway
D. Multiplexer
E. None of the above
Answer: Option A
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

10. Which of the following is not a


disadvantage of wireless LAN?
A. Slower data transmission
B. higher error rate
interference of transmissions from
C.
different computers
D. All of the above
Answer: Option D
11. The Internet Control Message Protocol
(ICMP)
allows gateways to send error a
A. control messages to other gateways
or hosts
provides communication between
B. the Internet Protocol Software on
one machine and the Internet
Protocol Software on another
reports error conditions to the
original source, the source must
C. relate errors to individual application
programs and take action to correct
the problem
D. All of the above
E. None of the above
Answer: Option D
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

12. Your company has a LAN in its


downtown office and has now set up a
LAN in the manufacturing plant in the
suburbs. To enable everyone to share
data and resources between the two
LANs, what type of device(s) are
needed to connect them? Choose the
most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
Answer: Option D
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

13. The term 'duplex' refers to the ability of


the data receiving stations to echo back
a confirming message to the sender. In
full duplex data transmission, both the
sender and the receiver
A. cannot talk at once
can receive and send data
B.
simultaneously
can send or receive data one at a
C.
time
can do one way data transmission
D.
only
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

14. How many hosts are attached to each of


the local area networks at your site?
A. 128
B. 254
C. 256
D. 64
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

15. Which of the following technique is used


for fragment?
a technique used in best-effort
A. delivery systems to avoid endlessly
looping packets
a technique used by protocols in
which a lower level protocol accepts
B. a message from a higher level
protocol and places it in the data
portion of the low level frame
one of the pieces that results when
an IP gateway divides an IP
datagram into smaller pieces for
C.
transmission across a network that
cannot handle the original datagram
size
D. All of the above
E. None of the above
Answer: Option C

16. Contention is
One or more conductors that serve as
A. a common connection for a related
group of devices
a continuous frequency capable of
B.
being modulated or impressed with a
second signal
the condition when two or more
C. stations attempt to use the same
channel at the same time
a collection of interconnected
functional units that provides a data
D.
communications service among
stations attached to the network
E. None of the above
Answer: Option C
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

17. Avalanche photodiode receivers can


detect hits of transmitted data by receiving
A. 100 photons
B. 200 photons
C. 300 photons
D. 400 photons
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

18. Satellite-Switched Time-Division Multiple


Access (SS/TDMA) is
the method of determining which
A. device has access to the transmission
medium at any time.
a medium access control technique
B. for multiple access transmission
media
a form of TDMA in which circuit
C. switching is used to dynamically
change the channel assignments
D. All of the above
E. None of the above
Answer: Option C
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

19. When you ping the loopback address, a


packet is sent where?
A. On the network
Down through the layers of the IP
B. architecture and then up the layers
again
C. Across the wire
D. through the loopback dongle
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

20. Which of the following TCP/IP protocol is


used for transferring electronic mail
messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
Answer: Option C
Explanation:
21. Which of the following device is used to
connect two systems, especially if the
systems use different protocols?
A. Hub
B. bridge
C. gateway
D. repeater
E. None of the above
Answer: Option C
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

22. The synchronous modems are more


costly than the asynchronous modems
because
A. they produce large volume of data
B. they contain clock recovery circuits
they transmit the data with stop and
C.
start bits.
D. they operate with a larger bandwidth
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

23. A distributed network configuration in


which all data/information pass through a
central computer is
A. bus network
B. star network
C. ring network
D. Point-to-point network
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

24. Which of the following TCP/IP protocol


allows an application program on one
machine to send a datagram to an
application program on another machine?
A. UDP
B. VMTP
C. X.25
D. SMTP
E. None of the above
Answer: Option A
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

25. A remote batch-processing operation in


which data is solely input to a central
computer would require a:
A. telegraph line
B. simplex lines
C. mixedband channel
D. All the above
E. None of the above
Answer: Option B
26. ICMP (Internet Control Message Protocol)
is
a TCP/IP protocol used to
dynamically bind a high level IP
A.
Address to a low-level physical
hardware address
a TCP/IP high level protocol for
B. transferring files from one machine to
another
C. a protocol used to monitor computers
a protocol that handles error and
D.
control messages
E. None of the above
Answer: Option D
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

27. If you get both local and remote echoes,


every character you type will appear on
the screen
A. once
B. twice
C. three times
D. never
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

28. What part of 192.168.10.51 is the Network


ID, assuming a default subnet mask?
A. 192
B. 192.168.10
C. 0.0.0.5
D. 51
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

29. The slowest transmission speeds are


those of
A. twisted-pair wire
B. coaxial cable
C. fiber-optic cable
D. microwaves
Answer: Option A
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report
30. A noiseless 3 KHz Channel transmits bits
with binary level signals. What is the
maximum data rate?
A. 3 Kbps
B. 6 Kbps
C. 12 Kbps
D. 24 Kbps.
Answer: Option B
31. Carrier is
One or more conductors that serve as
A. a common connection for a related
group of devices
a continuous frequency capable of
B. being modulated or impressed with a
second signal
the condition when two or more
C. sections attempt to use the same
channel at the same time
a collection of interconnected
functional units that provides a data
D.
communications service among
stations attached to the network
E. None of the above
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

32. What can greatly reduce TCP/IP


configuration problems?
A. WINS Server
B. WINS Proxy
C. DHCP Server
D. PDC
E. None of the above
Answer: Option C
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

33. In CRC there is no error if the remainder


at the receiver is _____.
A. equal to the remainder at the sender
B. zero
C. nonzero
D. the quotient at the sender
Answer: Option B
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

34. Which of the following statements is


correct for the use of packet switching?
the subdivision of information into
individually addressed packets in
conjunction with alternative routing
A. arrangement enabled the
transmission path to be altered in the
event of congestion or individual link
failure
the employment of additional
B. intelligence within the network
enabled more sophisticated error
control and link control procedures to
be applied
by employing wide bandwidth circuits
for the trunk networks substantial
C.
economies through extensive sharing
of capacity could be achieved.
D. All of the above
E. None of the above
Answer: Option D
Explanation:
No answer description available for this
question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

35. A front-end processor is


A. a user computer system
a processor in a large-scale computer
B. that executes operating system
instructions
a minicomputer that relieves main-
frame computers at a computer
C.
centre of communications control
functions
D. preliminary processor of batch jobs.
E. None of the above
Answer: Option C

36. What is the port number for NNTP?


A. 119
B. 80
C. 79
D. 70
Answer: Option A
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

37. Eight stations are competing for the


use of a shared channel using the
'Adaptive tree Walk Protocol'. If the
stations 7 and 8 are suddenly become
ready at once, how many bit slots are
needed to resolve the contention?
A. 7 slots
B. 5 slots
C. 10 slots
D. 14 slots
Answer: Option A
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

38. Usually, it takes 10-bits to represent


one character. How many characters
can be transmitted at a speed of 1200
BPS?
A. 10
B. 12
C. 120
D. 1200
E. None of the above
Answer: Option C
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

39. To connect a computer with a device


in the same room, you might be likely
to use
A. a coaxial cable
B. a dedicated line
C. a ground station
D. All of the above
E. None of the above
Answer: Option A
Explanation:
41. How many bits internet address is
assigned to each host on a TCP/IP
internet which is used in all
communications with the host?
A. 16 - bits
B. 32 - bits
C. 48 - bits
D. 64 - bits
E. None of the above
Answer: Option B
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

42. With an IP address of 100, you


currently have 80 subnets. What
subnet mask should you use to
maximize the number of available
hosts?
A. 192
B. 224
C. 240
D. 248
E. 252
Answer: Option E
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report
43. Which of the following types of
channels moves data relatively
slowly?
A. wideband channel
B. voiceband channel
C. narrowband channel
D. broadband channel
E. None of the above
Answer: Option C
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

44. Which of the following is required to


communicate between two
computers?
A. communications software
B. protocol
C. communications hardware
D. access to transmission medium
E. All of the above
Answer: Option E
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

45. Which of the following does not allow


multiple users or devices to share one
communications line?
A. doubleplexer
B. multipplexer
C. concentrator
D. controller
E. None of the above
Answer: Option A
Explanation:

46. The geostationary satellite used for


communication systems
A. rotates with the earth
B. remains stationary relative to the
earth
C. is positioned over equator
D. All of the above
E. None of the above
Answer: Option D
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

47. Telecommunication networks


frequently interconnect an
organization with its customers and
suppliers. Select the best fit for
answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
Answer: Option C
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

48. The packets switching concept was


first proposed
in the late 1980s for the Defense
A.
Ministry of US.
in the early 1960s for military
B. communication systems, mainly
to handle speech
in the late 1950s for Defense
C.
Ministry of US
D. All of the above
E. None of the above
Answer: Option B
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

49. The _____ houses the switches in


token ring.
A. transceiver
B. nine-pin connector
C. MAU
D. NIC
E. None of the above
Answer: Option C
Explanation:
No answer description available for
this question. Let us discuss.
View Answer Discuss in
Forum Workspace Report

50. What device separates a single


network into two segments but lets the
two segments appear as one to higher
protocols?
A. Switch
B. Bridge
C. Gateway
D. Router
Answer: Option B
Explanation:

S-ar putea să vă placă și