MCQOPTIONS
Saved Bookmarks
This section includes 304 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
Properties of impulse function are |
| A. | symmetry |
| B. | time scaling |
| C. | shifting |
| D. | all of the mentioned |
| Answer» E. | |
| 252. |
In the digital communication system, signals in different frequency bands are |
| A. | orthogonal |
| B. | non orthogonal |
| C. | orthogonal & non orthogonal |
| D. | none of the mentioned |
| Answer» B. non orthogonal | |
| 253. |
Wireless transmission of signals can be done via |
| A. | radio waves |
| B. | microwaves |
| C. | infrared |
| D. | all of the mentioned |
| Answer» E. | |
| 254. |
A single channel is shared by multiple signals by |
| A. | analog modulation |
| B. | digital modulation |
| C. | multiplexing |
| D. | phase modulation |
| Answer» D. phase modulation | |
| 255. |
The physical layer translates logical communication requests from the              into hardware specific operations. |
| A. | data link layer |
| B. | network layer |
| C. | trasnport layer |
| D. | application layer |
| Answer» B. network layer | |
| 256. |
The physical layer is responsible for |
| A. | line coding |
| B. | channel coding |
| C. | modulation |
| D. | all of the mentioned |
| Answer» E. | |
| 257. |
In asynchronous serial communication the physical layer provides |
| A. | start and stop signalling |
| B. | flow control |
| C. | both start & stop signalling and flow control |
| D. | only start signalling |
| Answer» D. only start signalling | |
| 258. |
The physical layer provides |
| A. | mechanical specifications of electrical connectors and cables |
| B. | electrical specification of transmission line signal level |
| C. | specification for ir over optical fiber |
| D. | all of the mentioned |
| Answer» E. | |
| 259. |
Bits can be sent over guided and unguided media as analog signal by |
| A. | digital modulation |
| B. | amplitude modulation |
| C. | frequency modulation |
| D. | phase modulation |
| Answer» B. amplitude modulation | |
| 260. |
Which transmission media provides the highest transmission speed in a network? |
| A. | coaxial cable |
| B. | twisted pair cable |
| C. | optical fiber |
| D. | electrical cable |
| Answer» D. electrical cable | |
| 261. |
Which of the following is an example of network layer vulnerability? |
| A. | mac address spoofing |
| B. | physical theft of data |
| C. | route spoofing |
| D. | weak or non-existent authentication |
| Answer» D. weak or non-existent authentication | |
| 262. |
Which of the following is an example of physical layer vulnerability? |
| A. | mac address spoofing |
| B. | physical theft of data |
| C. | route spoofing |
| D. | weak or non-existent authentication |
| Answer» C. route spoofing | |
| 263. |
Which of the following is not a vulnerability of the network layer? |
| A. | route spoofing |
| B. | identity & resource id vulnerability |
| C. | ip address spoofing |
| D. | weak or non-existent authentication |
| Answer» E. | |
| 264. |
Which of the following is an example of data-link layer vulnerability? |
| A. | mac address spoofing |
| B. | physical theft of data |
| C. | route spoofing |
| D. | weak or non-existent authentication |
| Answer» B. physical theft of data | |
| 265. |
                                may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN. |
| A. | switches |
| B. | routers |
| C. | hubs |
| D. | repeaters |
| Answer» B. routers | |
| 266. |
                         is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls. |
| A. | vlan attack |
| B. | vlan circumvention |
| C. | vlan compromisation method |
| D. | data-link evading |
| Answer» C. vlan compromisation method | |
| 267. |
Which of the following is not a vulnerability of the data-link layer? |
| A. | mac address spoofing |
| B. | vlan circumvention |
| C. | switches may be forced for flooding traffic to all vlan ports |
| D. | overloading of transport-layer mechanisms |
| Answer» E. | |
| 268. |
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 269. |
In                                      layer, vulnerabilities are directly associated with physical access to networks and hardware. |
| A. | physical |
| B. | data-link |
| C. | network |
| D. | application |
| Answer» B. data-link | |
| 270. |
Which of the following is not physical layer vulnerability? |
| A. | physical theft of data & hardware |
| B. | physical damage or destruction of data & hardware |
| C. | unauthorized network access |
| D. | keystroke & other input logging |
| Answer» D. keystroke & other input logging | |
| 271. |
DDP stands for |
| A. | datagram delivery protocol |
| B. | device delivery protocol |
| C. | datagram device protocol |
| D. | device datagram protocol |
| Answer» B. device delivery protocol | |
| 272. |
RIP stands for |
| A. | reduced information protocol |
| B. | routing internet protocol |
| C. | routing information protocol |
| D. | reduced internet protocol |
| Answer» D. reduced internet protocol | |
| 273. |
The                          model is 7-layer architecture where each layer is having some specific functionality to perform. |
| A. | tcp/ip |
| B. | cloud |
| C. | osi |
| D. | ois |
| Answer» D. ois | |
| 274. |
Packets will be transferred in how many types? |
| A. | 5 types |
| B. | 4 types |
| C. | 2 types |
| D. | 3 types |
| Answer» E. | |
| 275. |
ICMP stands for |
| A. | internet coordinate message protocol |
| B. | internet control message protocol |
| C. | interconnect control message protocol |
| D. | interconnect coordinate message protocol |
| Answer» C. interconnect control message protocol | |
| 276. |
Does network layer in TCP/IP and OSI Model are same. |
| A. | true |
| B. | false |
| Answer» C. | |
| 277. |
What are called routers? |
| A. | the devices that operates at session layer |
| B. | the devices that operates at data layer |
| C. | the devices that operates at application layer |
| D. | the devices that operates at network |
| Answer» E. | |
| 278. |
The network layer responds to request from which layer? |
| A. | transport layer |
| B. | data layer |
| C. | application layer |
| D. | session layer |
| Answer» B. data layer | |
| 279. |
IP is connectionless. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 280. |
What are the common protocols associated with the network layer? |
| A. | address resolution protocol |
| B. | reverse address resolution protocol |
| C. | internet protocol |
| D. | neighbour discovery protocol |
| Answer» D. neighbour discovery protocol | |
| 281. |
The network layer issues request to which layer? |
| A. | transport layer |
| B. | data layer |
| C. | application layer |
| D. | session layer |
| Answer» C. application layer | |
| 282. |
The network layer contains which hardware device? |
| A. | routers, bridges |
| B. | bridges only |
| C. | bridges and switches |
| D. | routers, bridges and switches |
| Answer» E. | |
| 283. |
Data in network layer is transferred in the form of |
| A. | layers |
| B. | packets |
| C. | bytes |
| D. | bits |
| Answer» C. bytes | |
| 284. |
Which level is the network layer in the OSI model? |
| A. | third level |
| B. | fourth level |
| C. | second level |
| D. | fifth layer |
| Answer» B. fourth level | |
| 285. |
Network layer protocol exits in |
| A. | host |
| B. | switches |
| C. | packets |
| D. | bridges |
| Answer» B. switches | |
| 286. |
Which one of the following is not used in media access control? |
| A. | ethernet |
| B. | digital subscriber line |
| C. | fiber distributed data interface |
| D. | packet switching |
| Answer» E. | |
| 287. |
Which one of the following is not an application layer protocol used in internet? |
| A. | remote procedure call |
| B. | internet relay chat |
| C. | resource reservation protocol |
| D. | local procedure call |
| Answer» D. local procedure call | |
| 288. |
Internet works on |
| A. | packet switching |
| B. | circuit switching |
| C. | both packet switching and circuit switching |
| D. | data switching |
| Answer» B. circuit switching | |
| 289. |
The size of an IP address in IPv6 is |
| A. | 32 bits |
| B. | 64 bits |
| C. | 128 bits |
| D. | 265 bits |
| Answer» D. 265 bits | |
| 290. |
Internet access by transmitting digital data over the wires of a local telephone network is provided by |
| A. | leased line |
| B. | digital subscriber line |
| C. | digital signal line |
| D. | digital leased line |
| Answer» C. digital signal line | |
| 291. |
3 OVERVIEW OF INTERNET |
| A. | internet exchange point |
| B. | subscriber end point |
| C. | isp end point |
| D. | internet end point |
| Answer» B. subscriber end point | |
| 292. |
           is the multiplexing technique that shifts each signal to a different carrier frequency. |
| A. | fdm |
| B. | tdm |
| C. | both fdm & tdm |
| D. | pdm |
| Answer» B. tdm | |
| 293. |
In TDM, slots are further divided into |
| A. | seconds |
| B. | frames |
| C. | packets |
| D. | bits |
| Answer» C. packets | |
| 294. |
WAN stands for |
| A. | world area network |
| B. | wide area network |
| C. | web area network |
| D. | web access network |
| Answer» C. web area network | |
| 295. |
Data communication system within a building or campus is |
| A. | lan |
| B. | wan |
| C. | man |
| D. | pan |
| Answer» B. wan | |
| 296. |
Data communication system spanning states, countries, or the whole world is |
| A. | lan |
| B. | wan |
| C. | man |
| D. | pan |
| Answer» C. man | |
| 297. |
               topology requires a multipoint connection. |
| A. | star |
| B. | mesh |
| C. | ring |
| D. | bus |
| Answer» E. | |
| 298. |
Which of the following networks extends a private network across public networks? |
| A. | local area network |
| B. | virtual private network |
| C. | enterprise private network |
| D. | storage area network |
| Answer» C. enterprise private network | |
| 299. |
A list of protocols used by a system, one protocol per layer, is called |
| A. | protocol architecture |
| B. | protocol stack |
| C. | protocol suite |
| D. | protocol system |
| Answer» C. protocol suite | |
| 300. |
A Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â is a device that forwards packets between networks by processing the routing information included in the packet. |
| A. | bridge |
| B. | firewall |
| C. | router |
| D. | hub |
| Answer» D. hub | |