Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Properties of impulse function are

A. symmetry
B. time scaling
C. shifting
D. all of the mentioned
Answer» E.
2.

In the digital communication system, signals in different frequency bands are

A. orthogonal
B. non orthogonal
C. orthogonal & non orthogonal
D. none of the mentioned
Answer» B. non orthogonal
3.

Wireless transmission of signals can be done via

A. radio waves
B. microwaves
C. infrared
D. all of the mentioned
Answer» E.
4.

A single channel is shared by multiple signals by

A. analog modulation
B. digital modulation
C. multiplexing
D. phase modulation
Answer» D. phase modulation
5.

The physical layer translates logical communication requests from the              into hardware specific operations.

A. data link layer
B. network layer
C. trasnport layer
D. application layer
Answer» B. network layer
6.

The physical layer is responsible for

A. line coding
B. channel coding
C. modulation
D. all of the mentioned
Answer» E.
7.

In asynchronous serial communication the physical layer provides

A. start and stop signalling
B. flow control
C. both start & stop signalling and flow control
D. only start signalling
Answer» D. only start signalling
8.

The physical layer provides

A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for ir over optical fiber
D. all of the mentioned
Answer» E.
9.

Bits can be sent over guided and unguided media as analog signal by

A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Answer» B. amplitude modulation
10.

Which transmission media provides the highest transmission speed in a network?

A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Answer» D. electrical cable
11.

Which of the following is an example of network layer vulnerability?

A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Answer» D. weak or non-existent authentication
12.

Which of the following is an example of physical layer vulnerability?

A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Answer» C. route spoofing
13.

Which of the following is not a vulnerability of the network layer?

A. route spoofing
B. identity & resource id vulnerability
C. ip address spoofing
D. weak or non-existent authentication
Answer» E.
14.

Which of the following is an example of data-link layer vulnerability?

A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Answer» B. physical theft of data
15.

                                may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

A. switches
B. routers
C. hubs
D. repeaters
Answer» B. routers
16.

                         is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

A. vlan attack
B. vlan circumvention
C. vlan compromisation method
D. data-link evading
Answer» C. vlan compromisation method
17.

Which of the following is not a vulnerability of the data-link layer?

A. mac address spoofing
B. vlan circumvention
C. switches may be forced for flooding traffic to all vlan ports
D. overloading of transport-layer mechanisms
Answer» E.
18.

Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.

A. true
B. false
Answer» B. false
19.

In                                      layer, vulnerabilities are directly associated with physical access to networks and hardware.

A. physical
B. data-link
C. network
D. application
Answer» B. data-link
20.

Which of the following is not physical layer vulnerability?

A. physical theft of data & hardware
B. physical damage or destruction of data & hardware
C. unauthorized network access
D. keystroke & other input logging
Answer» D. keystroke & other input logging
21.

DDP stands for

A. datagram delivery protocol
B. device delivery protocol
C. datagram device protocol
D. device datagram protocol
Answer» B. device delivery protocol
22.

RIP stands for

A. reduced information protocol
B. routing internet protocol
C. routing information protocol
D. reduced internet protocol
Answer» D. reduced internet protocol
23.

The                          model is 7-layer architecture where each layer is having some specific functionality to perform.

A. tcp/ip
B. cloud
C. osi
D. ois
Answer» D. ois
24.

Packets will be transferred in how many types?

A. 5 types
B. 4 types
C. 2 types
D. 3 types
Answer» E.
25.

ICMP stands for

A. internet coordinate message protocol
B. internet control message protocol
C. interconnect control message protocol
D. interconnect coordinate message protocol
Answer» C. interconnect control message protocol
26.

Does network layer in TCP/IP and OSI Model are same.

A. true
B. false
Answer» C.
27.

What are called routers?

A. the devices that operates at session layer
B. the devices that operates at data layer
C. the devices that operates at application layer
D. the devices that operates at network
Answer» E.
28.

The network layer responds to request from which layer?

A. transport layer
B. data layer
C. application layer
D. session layer
Answer» B. data layer
29.

IP is connectionless.

A. true
B. false
Answer» B. false
30.

What are the common protocols associated with the network layer?

A. address resolution protocol
B. reverse address resolution protocol
C. internet protocol
D. neighbour discovery protocol
Answer» D. neighbour discovery protocol
31.

The network layer issues request to which layer?

A. transport layer
B. data layer
C. application layer
D. session layer
Answer» C. application layer
32.

The network layer contains which hardware device?

A. routers, bridges
B. bridges only
C. bridges and switches
D. routers, bridges and switches
Answer» E.
33.

Data in network layer is transferred in the form of

A. layers
B. packets
C. bytes
D. bits
Answer» C. bytes
34.

Which level is the network layer in the OSI model?

A. third level
B. fourth level
C. second level
D. fifth layer
Answer» B. fourth level
35.

Network layer protocol exits in

A. host
B. switches
C. packets
D. bridges
Answer» B. switches
36.

Which one of the following is not used in media access control?

A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. packet switching
Answer» E.
37.

Which one of the following is not an application layer protocol used in internet?

A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. local procedure call
Answer» D. local procedure call
38.

Internet works on

A. packet switching
B. circuit switching
C. both packet switching and circuit switching
D. data switching
Answer» B. circuit switching
39.

The size of an IP address in IPv6 is

A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
Answer» D. 265 bits
40.

Internet access by transmitting digital data over the wires of a local telephone network is provided by

A. leased line
B. digital subscriber line
C. digital signal line
D. digital leased line
Answer» C. digital signal line
41.

3 OVERVIEW OF INTERNET

A. internet exchange point
B. subscriber end point
C. isp end point
D. internet end point
Answer» B. subscriber end point
42.

           is the multiplexing technique that shifts each signal to a different carrier frequency.

A. fdm
B. tdm
C. both fdm & tdm
D. pdm
Answer» B. tdm
43.

In TDM, slots are further divided into

A. seconds
B. frames
C. packets
D. bits
Answer» C. packets
44.

WAN stands for

A. world area network
B. wide area network
C. web area network
D. web access network
Answer» C. web area network
45.

Data communication system within a building or campus is

A. lan
B. wan
C. man
D. pan
Answer» B. wan
46.

Data communication system spanning states, countries, or the whole world is

A. lan
B. wan
C. man
D. pan
Answer» C. man
47.

               topology requires a multipoint connection.

A. star
B. mesh
C. ring
D. bus
Answer» E.
48.

Which of the following networks extends a private network across public networks?

A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
Answer» C. enterprise private network
49.

A list of protocols used by a system, one protocol per layer, is called

A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Answer» C. protocol suite
50.

A                      is a device that forwards packets between networks by processing the routing information included in the packet.

A. bridge
B. firewall
C. router
D. hub
Answer» D. hub