Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

The_________ layer is responsible for the delivery of a message from one process toanother.

A. physical
B. transport
C. network
D. none of the above
Answer» C. network
2.

Shift cipher is sometimes referred to as the

A. Caesar cipher
B. Shift cipher
C. cipher
D. cipher text
Answer» B. Shift cipher
3.

Which sublayer of the data link layer performs data link functions that depend upon thetype of medium?

A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. none of the above
Answer» C. network interface control sublayer
4.

The ports ranging from 49,152 to 65,535 can be used as temporary or private portnumbers. They are called the ________ ports.

A. well-known
B. registered
C. dynamic
D. none of the above
Answer» D. none of the above
5.

Packets in IPv4 layer are called

A. datagrams
B. header length
C. code point
D. tunneling
Answer» B. header length
6.

In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?

A. 0 to 63
B. 0 to 64
C. 1 to 63
D. 1 to 64
Answer» B. 0 to 64
7.

The OSI model consist of

A. 3 layers
B. 5 layers
C. 7 layers
D. 8 layers
Answer» D. 8 layers
8.

Which topology features a point to point line configuration

A. Mesh
B. Star
C. Ring
D. All of above
Answer» E.
9.

The sender is a router that has received a datagram destined for a host on the same network. The logical address that must be mapped to a physical address is ______.

A. the destination IP address in the datagram header
B. the IP address of the router found in the routing table
C. either a or b
D. none of the above
Answer» B. the IP address of the router found in the routing table
10.

When the IP layer of a receiving host receives a datagram, _______.

A. delivery is complete
B. a transport layer protocol takes over
C. a header is added
D. none of the above
Answer» C. a header is added
11.

A port address in UDP is _______bits long.

A. 8
B. 16
C. 32
D. any of the above
Answer» C. 32
12.

Which of the following does UDP guarantee?

A. flow control
B. connection-oriented delivery
C. flow control
D. none of the above
Answer» E.
13.

ARQ stands for _______.

A. Automatic repeat quantization
B. Automatic repeat request
C. Automatic retransmission request
D. Acknowledge repeat request
Answer» C. Automatic retransmission request
14.

_______ in the data link layer separates a message from one source to a destination, or from other messages going from other sources to other destinations.

A. Digitizing
B. Controlling
C. Framing
D. none of the above
Answer» D. none of the above
15.

HDLC is an acronym for _______.

A. High-duplex line communication
B. High-level data link control
C. Half-duplex digital link combination
D. Host double-level circuit
Answer» C. Half-duplex digital link combination
16.

Rules that govern a communication exchange are

A. Media
B. Criteria
C. Protocol
D. All of above
Answer» D. All of above
17.

Heart of Data Encryption Standard (DES), is the

A. Cipher
B. Rounds
C. Encryption
D. DES function
Answer» E.
18.

In sliding window, if the window size is 63, what is the range of sequence numbers?

A. 0 to 63
B. 0 to 64
C. 1 to 63
D. 1 to 64
Answer» B. 0 to 64
19.

The data link layer takes the packets from _____ and encapsulates them into frames fortransmission.

A. network layer
B. physical layer
C. transport layer
D. application layer
Answer» B. physical layer
20.

UDP needs the _______ address to deliver the user datagram to the correct applicationprocess.

A. port
B. application
C. internet
D. none of the above
Answer» B. application
21.

_______ refers to the structure or format of the data, meaning the order in which they arepresented.

A. Semantics
B. Syntax
C. Timing
D. All of the above
Answer» C. Timing
22.

In _______ transmission, the channel capacity is shared by both communicating devicesat all times.

A. simplex
B. half-duplex
C. full-duplex
D. half-simplex
Answer» D. half-simplex
23.

When a primary device wants to send data to a secondary device, it needs to first send _______ frame.

A. ACK
B. Poll
C. SEL
D. ENQ
Answer» E.
24.

________ defines how a particular pattern to be interpreted, and what action is to betaken based on that interpretation.

A. Semantics
B. Syntax
C. Timing
D. None of the above
Answer» B. Syntax
25.

UDP does not add anything to the services of IP except for providing _______communication.

A. node-to-node
B. process-to-process
C. host-to-host
D. none of the above
Answer» C. host-to-host
26.

This was the first network.

A. CSNET
B. NSFNET
C. ANSNET
D. ARPANET
Answer» E.
27.

_______________is a reliable delivery mechanism.

A. IP
B. TCP
C. UDP
D. ARP
Answer» C. UDP
28.

In _______ forwarding, the routing table holds the address of just the next hop instead of complete route information.

A. next-hop
B. network-specific
C. host-specific
D. default
Answer» B. network-specific
29.

In a network with 25 computers, which topology would require most extensive calling

A. Mesh
B. Star
C. Bus
D. Ring
Answer» B. Star
30.

In a ________ protocol, the data section of a frame is a sequence of characters.

A. bit-oriented
B. character-oriented
C. either (a) or (b)
D. none of the above
Answer» C. either (a) or (b)
31.

Transport layer is _____________ the data link layer.

A. Above
B. Below
C. Depended on
D. None of the above
Answer» B. Below
32.

In modulo-2 arithmetic, we use only ______.

A. 1 and 2
B. 0 and 2
C. 0 and 1
D. none of the above
Answer» D. none of the above
33.

In the sending computer, UDP receives a data unit from the _______ layer.

A. application
B. transport
C. IP
D. none of the above
Answer» B. transport
34.

Differential Manchester and multi line transmission (MLT-3) schemes differ in

A. Number of transition rules to encode binary data
B. Self synchronization
C. Both a and b
D. None of the above
Answer» D. None of the above
35.

If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.

A. the destination IP address in the datagram header
B. the IP address of the router found in the routing table
C. either a or b
D. none of the above
Answer» B. the IP address of the router found in the routing table
36.

Message _______ means that the receiver is ensured that the message is coming from theintended sender, not an imposter.

A. confidentiality
B. integrity
C. authentication
D. none of the above
Answer» D. none of the above
37.

The principle of ________ states that the routing table is sorted from the longest mask tothe shortest mask.

A. first mask matching
B. shortest mask matching
C. longest mask matching
D. none of the above
Answer» D. none of the above
38.

Communication between a computer and a keyboard involves ______________transmission.

A. simplex
B. half-duplex
C. full-duplex
D. automatic
Answer» B. half-duplex
39.

An ARP reply is normally _______.

A. broadcast
B. multicast
C. unicast
D. none of the above
Answer» D. none of the above
40.

The PDU of network layer is

A. bits
B. frames
C. packets
D. none
Answer» D. none
41.

A technique called ______ is used to create a subnetting effect.

A. ARP
B. RARP
C. proxy ARP
D. none of the above
Answer» D. none of the above
42.

UDP is called a ________________transport protocol.

A. connectionless, reliable
B. connection-oriented, unreliable
C. connectionless, unreliable
D. none of the above
Answer» D. none of the above
43.

In ________ protocols, we use ________.

A. byte-oriented; bit stuffing
B. character-oriented; bit stuffing
C. bit-oriented; bit stuffing
D. none of the above
Answer» D. none of the above
44.

If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.

A. the destination IP address in the datagram header
B. the IP address of the router found in the routing table
C. either a or b
D. none of the above
Answer» C. either a or b
45.

A(n) ________function creates a message digest out of a message.

A. encryption
B. decryption
C. hash
D. none of the above
Answer» D. none of the above
46.

In a linear block code, the _______ of any two valid codewords creates another valid codeword

A. XORing
B. ORing
C. ANDing
D. none of the above
Answer» B. ORing
47.

Subnetting is actually

A. collection of networks
B. sub division of networks
C. one sub network
D. None
Answer» C. one sub network
48.

UDP is an acronym for _______.

A. User Delivery Protocol
B. User Datagram Procedure
C. User Datagram Protocol
D. None of the above
Answer» D. None of the above
49.

In modulo-11 arithmetic, we use only the integers in the range ______, inclusive.

A. 1 to 10
B. 1 to 11
C. 0 to 10
D. none of the above
Answer» D. none of the above
50.

Performance of data communications depend on

A. No. of users
B. Transmission media
C. H/w and S/w
D. All of above
Answer» E.