

MCQOPTIONS
Saved Bookmarks
This section includes 169 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science knowledge and support exam preparation. Choose a topic below to get started.
1. |
In ________ framing, we need a delimiter (flag) to define the boundary of two frames. |
A. | fixed-size |
B. | variable-size |
C. | standard |
D. | none of the above |
Answer» C. standard | |
2. |
A(n) _____ is a trusted third party that assigns a symmetric key to two parties. |
A. | KDC |
B. | CA |
C. | KDD |
D. | none of the above |
Answer» B. CA | |
3. |
If r is the number of data elements carried per signal element, N is the data rate, and S isthe signal rate, then |
A. | S= N x r |
B. | S = N/r |
C. | N = S x r x r |
D. | None of the above |
Answer» C. N = S x r x r | |
4. |
1 TeraHertz = |
A. | 1000000 Hz |
B. | 1000000000 Hz |
C. | 1000000000000 Hz |
D. | None of the above |
Answer» D. None of the above | |
5. |
Which of the following functions does UDP perform? |
A. | process-to-process communication |
B. | host-to-host communication |
C. | end-to-end reliable data delivery |
D. | none of the above |
Answer» B. host-to-host communication | |
6. |
Transport layer aggregates data from different applications into a single stream beforepassing it to |
A. | network layer |
B. | data link layer |
C. | application layer |
D. | physical layer |
Answer» B. data link layer | |
7. |
_________ means that a sender must not be able to deny sending a message that he sent. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Non-repudiation |
Answer» E. | |
8. |
______ control refers to methods of error detection and correction. |
A. | Flow |
B. | Error |
C. | Transmission |
D. | None of the above |
Answer» C. Transmission | |
9. |
Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the ______. |
A. | header |
B. | trailer |
C. | flag |
D. | none of the above |
Answer» D. none of the above | |
10. |
UDP and TCP are both _______ layer protocols. |
A. | data link |
B. | network |
C. | transport |
D. | none of the above |
Answer» D. none of the above | |
11. |
In _________ protocols, we use ________. |
A. | character-oriented; byte stuffing |
B. | character-oriented; bit stuffing |
C. | bit-oriented; character stuffing |
D. | none of the above |
Answer» B. character-oriented; bit stuffing | |
12. |
Multi-destination routing |
A. | is same as broadcast routing |
B. | contains the list of all destinations |
C. | data is not sent by packets |
D. | none of the above |
Answer» D. none of the above | |
13. |
Bit stuffing means adding an extra 0 to the data section of the frame when there is asequence of bits with the same pattern as the ________. |
A. | Header |
B. | Trailer |
C. | Flag |
D. | None of the above |
Answer» D. None of the above | |
14. |
Dialog control is the function of which layer |
A. | Transport |
B. | Session |
C. | Presentation |
D. | Application |
Answer» C. Presentation | |
15. |
In the sending computer, UDP sends a data unit to the _______ layer. |
A. | application |
B. | transport |
C. | IP |
D. | none of the above |
Answer» D. none of the above | |
16. |
Data unit is called a frame in |
A. | Physical layer |
B. | Network layer |
C. | Presentation layer |
D. | Data link layer |
Answer» E. | |
17. |
Which is also known as a connectionless protocol for a packet-switching network thatuses the Datagram approach? |
A. | IPV5 |
B. | IPV4 |
C. | IPV6 |
D. | None of these |
Answer» C. IPV6 | |
18. |
The _____________ translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» B. routing information protocol | |
19. |
The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______. |
A. | the destination IP address in the datagram header |
B. | the IP address of the router found in the routing table |
C. | either a or b |
D. | none of the above |
Answer» C. either a or b | |
20. |
The local host and the remote host are defined using IP addresses. To define theprocesses, we need second identifiers called ____________. |
A. | UDP addresses |
B. | transport addresses |
C. | port addresses |
D. | none of the above |
Answer» D. none of the above | |
21. |
Which organization has authority over interstate and international commerce in thecommunications field? |
A. | ITU-T |
B. | IEEE |
C. | FCC |
D. | ISOC |
Answer» D. ISOC | |
22. |
_______ are special-interest groups that quickly test, evaluate, and standardize newtechnologies. |
A. | Forums |
B. | Regulatory agencies |
C. | Standards organizations |
D. | All of the above |
Answer» B. Regulatory agencies | |
23. |
Layer 2 from bottom in TCP/IP is the ___________. |
A. | Physical layer |
B. | Application layer |
C. | Transport layer |
D. | Internet layer |
Answer» E. | |
24. |
Which agency developed standards for physical connection interfaces and electronicsignaling specifications? |
A. | EIA |
B. | ITU-T |
C. | ANSI |
D. | ISO |
Answer» B. ITU-T | |
25. |
An ARP request is normally _______. |
A. | broadcast |
B. | multicast |
C. | unicast |
D. | none of the above |
Answer» B. multicast | |
26. |
The idea of address aggregation was designed to alleviate the increase in routing tableentries when using ________. |
A. | classful addressing |
B. | classless addressing |
C. | both a and b |
D. | none of the above |
Answer» C. both a and b | |
27. |
Substitutional cipers are |
A. | Monoalphabatic |
B. | Sami alphabetic |
C. | polyalphabetic |
D. | both a and c |
Answer» E. | |
28. |
_______ control refers to a set of procedures used to restrict the amount of data that thesender can send before waiting for acknowledgment. |
A. | Flow |
B. | Error |
C. | Transmission |
D. | None of the above |
Answer» B. Error | |
29. |
_______ refers to two characteristics: when data should be sent and how fast it can besent. |
A. | Semantics |
B. | Syntax |
C. | Timing |
D. | none of the above |
Answer» D. none of the above | |
30. |
_________framing uses two categories of protocols: character-oriented and bit-oriented. |
A. | Fixed-size |
B. | Variable-size |
C. | Standard |
D. | None of the above |
Answer» C. Standard | |
31. |
The _____of errors is more difficult than the ______. |
A. | correction; detection |
B. | detection; correction |
C. | creation; correction |
D. | creation; detection |
Answer» B. detection; correction | |
32. |
In _______ framing, there is no need for defining the boundaries of frames. |
A. | fixed-size |
B. | variable-size |
C. | standard |
D. | none of the above |
Answer» B. variable-size | |
33. |
Although there are several ways to achieve process-to-process communication, the mostcommon is through the __________ paradigm. |
A. | client-server |
B. | client-client |
C. | server-server |
D. | none of the above |
Answer» B. client-client | |
34. |
________ means to prove the identity of the entity that tries to access the system'sresources. |
A. | Message authentication |
B. | Entity authentication |
C. | Message confidentiality |
D. | none of the above |
Answer» C. Message confidentiality | |
35. |
A ________ is a local address. Its jurisdiction is over a local network. |
A. | physical |
B. | logical |
C. | a and b |
D. | none of the above |
Answer» B. logical | |
36. |
Data link control deals with the design and procedures for ______ communication. |
A. | node-to-node |
B. | host-to-host |
C. | process-to-process |
D. | none of the above |
Answer» B. host-to-host | |
37. |
In a _________ protocol, the data section of a frame is a sequence of bits. |
A. | byte-oriented |
B. | bit-oriented |
C. | either (a) or (b) |
D. | none of the above |
Answer» C. either (a) or (b) | |
38. |
When 2 or more bits in a data unit has been changed during the transmission, the error iscalled |
A. | random error |
B. | burst error |
C. | inverted error |
D. | none |
Answer» C. inverted error | |
39. |
In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an ACK _______ to the sender. |
A. | 5 |
B. | 6 |
C. | 7 |
D. | any of the above |
Answer» D. any of the above | |
40. |
IP makes a __________ of datagram delivery. |
A. | worst effort |
B. | guaranteed delivery |
C. | best effort |
D. | all of the above |
Answer» D. all of the above | |
41. |
NRZ L and NRZ I differ in |
A. | synchronization |
B. | transition |
C. | Both a and b |
D. | None |
Answer» D. None | |
42. |
_______codes are special linear block codes with one extra property. If a codeword isrotated, the result is another codeword. |
A. | Non-linear |
B. | Convolution |
C. | Cyclic |
D. | none of the above |
Answer» D. none of the above | |
43. |
For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed. |
A. | exactly 10 |
B. | less than 10 |
C. | more than 10 |
D. | none of the above |
Answer» B. less than 10 | |
44. |
In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table. |
A. | next-hop |
B. | network-specific |
C. | host-specific |
D. | default |
Answer» E. | |
45. |
Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not |
A. | Authenticated |
B. | Joined |
C. | Submit |
D. | Separate |
Answer» B. Joined | |
46. |
The information to be communicated in a data communication system is |
A. | Medium |
B. | Protocol |
C. | Message |
D. | Transmission |
Answer» D. Transmission | |
47. |
Ethernet uses a ______ physical address that is imprinted on the network interface card(NIC). |
A. | 32-bit |
B. | 64-bit |
C. | 6-byte |
D. | none of the above |
Answer» D. none of the above | |
48. |
QAM combines |
A. | ASK and FSK |
B. | FSK and PSK |
C. | ASK and PSK |
D. | None of the above |
Answer» D. None of the above | |
49. |
When a packet is lost in transit, it should be handled by _____________. |
A. | Sequence control |
B. | Loss control |
C. | Error control |
D. | Duplication control |
Answer» B. Loss control | |
50. |
The ________ address, also known as the link address, is the address of a node as definedby its LAN or WAN. |
A. | port |
B. | physical |
C. | logical |
D. | none of the above |
Answer» C. logical | |