MCQOPTIONS
Saved Bookmarks
This section includes 169 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In ________ framing, we need a delimiter (flag) to define the boundary of two frames. |
| A. | fixed-size |
| B. | variable-size |
| C. | standard |
| D. | none of the above |
| Answer» C. standard | |
| 2. |
A(n) _____ is a trusted third party that assigns a symmetric key to two parties. |
| A. | KDC |
| B. | CA |
| C. | KDD |
| D. | none of the above |
| Answer» B. CA | |
| 3. |
If r is the number of data elements carried per signal element, N is the data rate, and S isthe signal rate, then |
| A. | S= N x r |
| B. | S = N/r |
| C. | N = S x r x r |
| D. | None of the above |
| Answer» C. N = S x r x r | |
| 4. |
1 TeraHertz = |
| A. | 1000000 Hz |
| B. | 1000000000 Hz |
| C. | 1000000000000 Hz |
| D. | None of the above |
| Answer» D. None of the above | |
| 5. |
Which of the following functions does UDP perform? |
| A. | process-to-process communication |
| B. | host-to-host communication |
| C. | end-to-end reliable data delivery |
| D. | none of the above |
| Answer» B. host-to-host communication | |
| 6. |
Transport layer aggregates data from different applications into a single stream beforepassing it to |
| A. | network layer |
| B. | data link layer |
| C. | application layer |
| D. | physical layer |
| Answer» B. data link layer | |
| 7. |
_________ means that a sender must not be able to deny sending a message that he sent. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authentication |
| D. | Non-repudiation |
| Answer» E. | |
| 8. |
______ control refers to methods of error detection and correction. |
| A. | Flow |
| B. | Error |
| C. | Transmission |
| D. | None of the above |
| Answer» C. Transmission | |
| 9. |
Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the ______. |
| A. | header |
| B. | trailer |
| C. | flag |
| D. | none of the above |
| Answer» D. none of the above | |
| 10. |
UDP and TCP are both _______ layer protocols. |
| A. | data link |
| B. | network |
| C. | transport |
| D. | none of the above |
| Answer» D. none of the above | |
| 11. |
In _________ protocols, we use ________. |
| A. | character-oriented; byte stuffing |
| B. | character-oriented; bit stuffing |
| C. | bit-oriented; character stuffing |
| D. | none of the above |
| Answer» B. character-oriented; bit stuffing | |
| 12. |
Multi-destination routing |
| A. | is same as broadcast routing |
| B. | contains the list of all destinations |
| C. | data is not sent by packets |
| D. | none of the above |
| Answer» D. none of the above | |
| 13. |
Bit stuffing means adding an extra 0 to the data section of the frame when there is asequence of bits with the same pattern as the ________. |
| A. | Header |
| B. | Trailer |
| C. | Flag |
| D. | None of the above |
| Answer» D. None of the above | |
| 14. |
Dialog control is the function of which layer |
| A. | Transport |
| B. | Session |
| C. | Presentation |
| D. | Application |
| Answer» C. Presentation | |
| 15. |
In the sending computer, UDP sends a data unit to the _______ layer. |
| A. | application |
| B. | transport |
| C. | IP |
| D. | none of the above |
| Answer» D. none of the above | |
| 16. |
Data unit is called a frame in |
| A. | Physical layer |
| B. | Network layer |
| C. | Presentation layer |
| D. | Data link layer |
| Answer» E. | |
| 17. |
Which is also known as a connectionless protocol for a packet-switching network thatuses the Datagram approach? |
| A. | IPV5 |
| B. | IPV4 |
| C. | IPV6 |
| D. | None of these |
| Answer» C. IPV6 | |
| 18. |
The _____________ translates internet domain and host names to IP address. |
| A. | domain name system |
| B. | routing information protocol |
| C. | network time protocol |
| D. | internet relay chat |
| Answer» B. routing information protocol | |
| 19. |
The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______. |
| A. | the destination IP address in the datagram header |
| B. | the IP address of the router found in the routing table |
| C. | either a or b |
| D. | none of the above |
| Answer» C. either a or b | |
| 20. |
The local host and the remote host are defined using IP addresses. To define theprocesses, we need second identifiers called ____________. |
| A. | UDP addresses |
| B. | transport addresses |
| C. | port addresses |
| D. | none of the above |
| Answer» D. none of the above | |
| 21. |
Which organization has authority over interstate and international commerce in thecommunications field? |
| A. | ITU-T |
| B. | IEEE |
| C. | FCC |
| D. | ISOC |
| Answer» D. ISOC | |
| 22. |
_______ are special-interest groups that quickly test, evaluate, and standardize newtechnologies. |
| A. | Forums |
| B. | Regulatory agencies |
| C. | Standards organizations |
| D. | All of the above |
| Answer» B. Regulatory agencies | |
| 23. |
Layer 2 from bottom in TCP/IP is the ___________. |
| A. | Physical layer |
| B. | Application layer |
| C. | Transport layer |
| D. | Internet layer |
| Answer» E. | |
| 24. |
Which agency developed standards for physical connection interfaces and electronicsignaling specifications? |
| A. | EIA |
| B. | ITU-T |
| C. | ANSI |
| D. | ISO |
| Answer» B. ITU-T | |
| 25. |
An ARP request is normally _______. |
| A. | broadcast |
| B. | multicast |
| C. | unicast |
| D. | none of the above |
| Answer» B. multicast | |
| 26. |
The idea of address aggregation was designed to alleviate the increase in routing tableentries when using ________. |
| A. | classful addressing |
| B. | classless addressing |
| C. | both a and b |
| D. | none of the above |
| Answer» C. both a and b | |
| 27. |
Substitutional cipers are |
| A. | Monoalphabatic |
| B. | Sami alphabetic |
| C. | polyalphabetic |
| D. | both a and c |
| Answer» E. | |
| 28. |
_______ control refers to a set of procedures used to restrict the amount of data that thesender can send before waiting for acknowledgment. |
| A. | Flow |
| B. | Error |
| C. | Transmission |
| D. | None of the above |
| Answer» B. Error | |
| 29. |
_______ refers to two characteristics: when data should be sent and how fast it can besent. |
| A. | Semantics |
| B. | Syntax |
| C. | Timing |
| D. | none of the above |
| Answer» D. none of the above | |
| 30. |
_________framing uses two categories of protocols: character-oriented and bit-oriented. |
| A. | Fixed-size |
| B. | Variable-size |
| C. | Standard |
| D. | None of the above |
| Answer» C. Standard | |
| 31. |
The _____of errors is more difficult than the ______. |
| A. | correction; detection |
| B. | detection; correction |
| C. | creation; correction |
| D. | creation; detection |
| Answer» B. detection; correction | |
| 32. |
In _______ framing, there is no need for defining the boundaries of frames. |
| A. | fixed-size |
| B. | variable-size |
| C. | standard |
| D. | none of the above |
| Answer» B. variable-size | |
| 33. |
Although there are several ways to achieve process-to-process communication, the mostcommon is through the __________ paradigm. |
| A. | client-server |
| B. | client-client |
| C. | server-server |
| D. | none of the above |
| Answer» B. client-client | |
| 34. |
________ means to prove the identity of the entity that tries to access the system'sresources. |
| A. | Message authentication |
| B. | Entity authentication |
| C. | Message confidentiality |
| D. | none of the above |
| Answer» C. Message confidentiality | |
| 35. |
A ________ is a local address. Its jurisdiction is over a local network. |
| A. | physical |
| B. | logical |
| C. | a and b |
| D. | none of the above |
| Answer» B. logical | |
| 36. |
Data link control deals with the design and procedures for ______ communication. |
| A. | node-to-node |
| B. | host-to-host |
| C. | process-to-process |
| D. | none of the above |
| Answer» B. host-to-host | |
| 37. |
In a _________ protocol, the data section of a frame is a sequence of bits. |
| A. | byte-oriented |
| B. | bit-oriented |
| C. | either (a) or (b) |
| D. | none of the above |
| Answer» C. either (a) or (b) | |
| 38. |
When 2 or more bits in a data unit has been changed during the transmission, the error iscalled |
| A. | random error |
| B. | burst error |
| C. | inverted error |
| D. | none |
| Answer» C. inverted error | |
| 39. |
In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an ACK _______ to the sender. |
| A. | 5 |
| B. | 6 |
| C. | 7 |
| D. | any of the above |
| Answer» D. any of the above | |
| 40. |
IP makes a __________ of datagram delivery. |
| A. | worst effort |
| B. | guaranteed delivery |
| C. | best effort |
| D. | all of the above |
| Answer» D. all of the above | |
| 41. |
NRZ L and NRZ I differ in |
| A. | synchronization |
| B. | transition |
| C. | Both a and b |
| D. | None |
| Answer» D. None | |
| 42. |
_______codes are special linear block codes with one extra property. If a codeword isrotated, the result is another codeword. |
| A. | Non-linear |
| B. | Convolution |
| C. | Cyclic |
| D. | none of the above |
| Answer» D. none of the above | |
| 43. |
For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. |
| A. | exactly 10 |
| B. | less than 10 |
| C. | more than 10 |
| D. | none of the above |
| Answer» B. less than 10 | |
| 44. |
In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table. |
| A. | next-hop |
| B. | network-specific |
| C. | host-specific |
| D. | default |
| Answer» E. | |
| 45. |
Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not |
| A. | Authenticated |
| B. | Joined |
| C. | Submit |
| D. | Separate |
| Answer» B. Joined | |
| 46. |
The information to be communicated in a data communication system is |
| A. | Medium |
| B. | Protocol |
| C. | Message |
| D. | Transmission |
| Answer» D. Transmission | |
| 47. |
Ethernet uses a ______ physical address that is imprinted on the network interface card(NIC). |
| A. | 32-bit |
| B. | 64-bit |
| C. | 6-byte |
| D. | none of the above |
| Answer» D. none of the above | |
| 48. |
QAM combines |
| A. | ASK and FSK |
| B. | FSK and PSK |
| C. | ASK and PSK |
| D. | None of the above |
| Answer» D. None of the above | |
| 49. |
When a packet is lost in transit, it should be handled by _____________. |
| A. | Sequence control |
| B. | Loss control |
| C. | Error control |
| D. | Duplication control |
| Answer» B. Loss control | |
| 50. |
The ________ address, also known as the link address, is the address of a node as definedby its LAN or WAN. |
| A. | port |
| B. | physical |
| C. | logical |
| D. | none of the above |
| Answer» C. logical | |