

MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
601. |
If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps), |
A. | n*39.8 |
B. | n*51.8 |
C. | 2n*51.8 |
D. | None of the mentioned |
Answer» C. 2n*51.8 | |
602. |
Fiber optics posses following properties |
A. | Immune electromagnetic interference |
B. | Very less signal attenuation |
C. | Very hard to tap |
D. | All of the mentioned |
Answer» E. | |
603. |
Coaxial cable consists of _______ concentric copper conductors. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 | |
604. |
UTP is commonly used in |
A. | DSL |
B. | FTTP |
C. | HTTP |
D. | None of the mentioned |
Answer» B. FTTP | |
605. |
Which of this is not a guided media ? |
A. | Fiber optical cable |
B. | Coaxial cable |
C. | Wireless LAN |
D. | Copper wire |
Answer» D. Copper wire | |
606. |
Firewalls are often configured to block |
A. | UDP traffic |
B. | TCP traffic |
C. | Both of the mentioned |
D. | None of the mentioned |
Answer» B. TCP traffic | |
607. |
Sniffers can be deployed in |
A. | Wired environment |
B. | WiFi |
C. | Ethernet LAN |
D. | All of the mentioned |
Answer» E. | |
608. |
Packet sniffers involve |
A. | Active receiver |
B. | Passive receiver |
C. | Both Active receiver and Passive receiver |
D. | None of the mentioned |
Answer» C. Both Active receiver and Passive receiver | |
609. |
The DoS attack is which the attacker sends deluge of packets to the targeted host |
A. | Vulnerability attack |
B. | Bandwidth flooding |
C. | Connection flooding |
D. | All of the mentioned |
Answer» C. Connection flooding | |
610. |
The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host |
A. | Vulnerability attack |
B. | Bandwidth flooding |
C. | Connection flooding |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
611. |
Which of the following is a form of DoS attack ? |
A. | Vulnerability attack |
B. | Bandwidth flooding |
C. | Connection flooding |
D. | All of the mentioned |
Answer» E. | |
612. |
The attackers a network of compromised devices known as |
A. | Internet |
B. | Botnet |
C. | Telnet |
D. | D-net |
Answer» C. Telnet | |
613. |
Propagation delay depends on |
A. | Packet length |
B. | Transmission rate |
C. | Distance between the routers |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
614. |
Transmission delay does not depend on |
A. | Packet length |
B. | Distance between the routers |
C. | Transmission rate |
D. | None of the mentioned |
Answer» C. Transmission rate | |
615. |
In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero |
A. | Propogation delay |
B. | Queuing delay |
C. | Transmission delay |
D. | Processing delay |
Answer» C. Transmission delay | |
616. |
The total nodal delay is given by |
A. | dnodal = dproc – dqueue + dtrans + dprop |
B. | dnodal = dproc + dtrans – dqueue |
C. | dnodal = dproc + dqueue + dtrans + dprop |
D. | dnodal = dproc + dqueue – dtrans – dprop |
Answer» D. dnodal = dproc + dqueue – dtrans – dprop | |
617. |
If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is |
A. | N/2 |
B. | N |
C. | N-1 |
D. | 2N |
Answer» D. 2N | |
618. |
In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually |
A. | 20Mbps |
B. | 10Mbps |
C. | 40Mbps |
D. | 50Mbps |
Answer» C. 40Mbps | |
619. |
Traffic intensity is given by, where L = number of bits in the packet a = average rate R = transmission rate |
A. | La/R |
B. | LR/a |
C. | R/La |
D. | None of the mentioned |
Answer» B. LR/a | |
620. |
The time required to examine the packet’s header and determine where to direct the packet is part of |
A. | Processing delay |
B. | Queuing delay |
C. | Transmission delay |
D. | All of the mentioned |
Answer» B. Queuing delay | |
621. |
For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is(in milliseconds) |
A. | 3.2 |
B. | 32 |
C. | 0.32 |
D. | None of the mentioned |
Answer» B. 32 | |
622. |
Which of the following delay is faced by the packet in travelling from one end system to another ? |
A. | Propagation delay |
B. | Queuing delay |
C. | Transmission delay |
D. | All of the mentioned |
Answer» E. | |
623. |
In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources. |
A. | Greater than |
B. | Lesser than |
C. | Equal to |
D. | Equal to or greater than |
Answer» B. Lesser than | |
624. |
Multiplexing can provide |
A. | Efficiency |
B. | Privacy |
C. | Anti jamming |
D. | Both Efficiency & Privacy |
Answer» E. | |
625. |
The state when dedicated signals are idle are called |
A. | Death period |
B. | Poison period |
C. | Silent period |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
626. |
If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is |
A. | 32kbps |
B. | 500bps |
C. | 500kbps |
D. | None of the mentioned |
Answer» B. 500bps | |
627. |
If there are n signal sources of same data rate than TDM link has _______ slots |
A. | n |
B. | n/2 |
C. | n*2 |
D. | 2n |
Answer» B. n/2 | |
628. |
Which multiplexing technique transmits digital signals ? |
A. | FDM |
B. | TDM |
C. | WDM |
D. | None of the mentioned |
Answer» C. WDM | |
629. |
Multiplexing is used in _______ |
A. | Packet switching |
B. | Circuit switching |
C. | Data switching |
D. | None of the mentioned |
Answer» C. Data switching | |
630. |
The sharing of a medium and its link by two or more devices is called _________ |
A. | Fully duplexing |
B. | Multiplexing |
C. | Both Fully duplexing and Multiplexing |
D. | None of the mentioned |
Answer» C. Both Fully duplexing and Multiplexing | |
631. |
Multiplexing technique that shifts each signal to a different carrier frequency |
A. | FDM |
B. | TDM |
C. | Both FDM & TDM |
D. | None of the mentioned |
Answer» B. TDM | |
632. |
In TDM, slots are further divided into |
A. | Seconds |
B. | Frames |
C. | Packets |
D. | None of the mentioned |
Answer» C. Packets | |
633. |
Expand WAN |
A. | World area network |
B. | Wide area network |
C. | Web area network |
D. | None of the mentioned |
Answer» C. Web area network | |
634. |
Data communication system within a building or campus is |
A. | LAN |
B. | WAN |
C. | MAN |
D. | None of the mentioned |
Answer» B. WAN | |
635. |
Data communication system spanning states, countries, or the whole world is |
A. | LAN |
B. | WAN |
C. | MAN |
D. | None of the mentioned |
Answer» C. MAN | |
636. |
This topology requires multipoint connection |
A. | Star |
B. | Mesh |
C. | Ring |
D. | Bus |
Answer» E. | |
637. |
In this topology there is a central controller or hub |
A. | Star |
B. | Mesh |
C. | Ring |
D. | Bus |
Answer» B. Mesh | |
638. |
Physical or logical arrangement of network is |
A. | Topology |
B. | Routing |
C. | Networking |
D. | None of the mentioned |
Answer» B. Routing | |
639. |
Which one of the following is a transport layer protocol? |
A. | stream control transmission protocol |
B. | internet control message protocol |
C. | neighbor discovery protocol |
D. | dynamic host configuration protocol |
Answer» B. internet control message protocol | |
640. |
Transport layer protocols deals with |
A. | application to application communication |
B. | process to process communication |
C. | node to node communication |
D. | none of the mentioned |
Answer» C. node to node communication | |
641. |
A _____ is a TCP name for a transport service access point. |
A. | port |
B. | pipe |
C. | node |
D. | none of the mentioned |
Answer» B. pipe | |
642. |
Which one of the following is a version of UDP with congestion control? |
A. | datagram congestion control protocol |
B. | stream control transmission protocol |
C. | structured stream transport |
D. | none of the mentioned |
Answer» B. stream control transmission protocol | |
643. |
Socket-style API for windows is called |
A. | wsock |
B. | winsock |
C. | wins |
D. | none of the mentioned |
Answer» C. wins | |
644. |
An endpoint of an inter-process communication flow across a computer network is called |
A. | socket |
B. | pipe |
C. | port |
D. | none of the mentioned |
Answer» B. pipe | |
645. |
Transmission control protocol is |
A. | connection oriented protocol |
B. | uses a three way handshake to establish a connection |
C. | recievs data from application as a single stream |
D. | all of the mentioned |
Answer» E. | |
646. |
User datagram protocol is called connectionless because |
A. | all UDP packets are treated independently by transport layer |
B. | it sends data as a stream of related packets |
C. | it is received in the same order as sent order |
D. | none of the mentioned |
Answer» B. it sends data as a stream of related packets | |
647. |
Which one of the following is a transport layer protocol used in networking? |
A. | TCP |
B. | UDP |
C. | Both TCP and UDP |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
648. |
Transport layer aggregates data from different applications into a single stream before passing it to |
A. | network layer |
B. | data link layer |
C. | application layer |
D. | physical layer |
Answer» B. data link layer | |
649. |
ICMP is primarily used for |
A. | error and diagnostic functions |
B. | addressing |
C. | forwarding |
D. | none of the mentioned |
Answer» B. addressing | |
650. |
The network layer protocol of internet is |
A. | ethernet |
B. | internet protocol |
C. | hypertext transfer protocol |
D. | none of the mentioned |
Answer» C. hypertext transfer protocol | |