

MCQOPTIONS
Saved Bookmarks
This section includes 29 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks knowledge and support exam preparation. Choose a topic below to get started.
1. |
The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ |
A. | piggybacking |
B. | cyclic redundancy check |
C. | fletcher’s checksum |
D. | parity check |
Answer» B. cyclic redundancy check | |
2. |
When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________ |
A. | random error |
B. | burst error |
C. | inverted error |
D. | double error |
Answer» C. inverted error | |
3. |
The data link layer takes the packets from _________ and encapsulates them into frames for transmission. |
A. | network layer |
B. | physical layer |
C. | transport layer |
D. | application layer |
Answer» B. physical layer | |
4. |
Home broadband connections that work on DSL (Digital Subscriber Line) use ___ protocol. |
A. | PPPoE (PPP over Ethernet) |
B. | PPPoA (PPP over ATM) |
C. | Bridge protocol |
D. | All the above |
Answer» E. | |
5. |
The Dial-up connections to access the internet uses ___ protocol. |
A. | PPP (Point to Point protocol) |
B. | X.25 protocol |
C. | PLIP protocol |
D. | None |
Answer» B. X.25 protocol | |
6. |
Which protocols adopted the standards of HDLC (High-Level Link Control) protocol? |
A. | X.25 protocol as LAPB (Link Access Procedure Balanced), V.42 protocol as LAPM (Link Access Procedure for Modems) |
B. | Frame Relay protocol as LAPF (Link Access Procedure for Frame Relay) |
C. | ISDN (Integrated Services Digital Network) protocol as LAPD (Link Access Procedure on D-channel) |
D. | All the above |
Answer» E. | |
7. |
Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? |
A. | ARQ (Automatic Repeat Request) |
B. | ARP (Address Resolution Protocol) |
C. | SLIP (Serial Line Internet Protocol) |
D. | PLIP (Parallel Line Internet Protocol) |
Answer» C. SLIP (Serial Line Internet Protocol) | |
8. |
Choose the Protocols used in the Data Link Control layer of OSI model below? |
A. | SLIP (Serial Line Internet Protocol), CSLIP(Compressed SLIP), PLIP (Parallel Line Internet Protocol) |
B. | PPP (Point to Point Protocol) |
C. | X.25, ITU-T G.hn DLL |
D. | All the above |
Answer» E. | |
9. |
Choose the Protocols working in the Data Link Control Layer of OSI model below. |
A. | ATM (Asynchronous Transfer Mode), Frame Relay |
B. | HDLC (High-Level Data Link Control), SDLC (Synchronous Data Link Control) |
C. | ARP (Address Resolution Protocol), IEEE-802.3 |
D. | All the above |
Answer» E. | |
10. |
The physical address to each machine is provided by which layer in an OSI reference model? |
A. | Physical layer |
B. | Data Link Layer |
C. | Network Layer |
D. | Transport Layer |
Answer» C. Network Layer | |
11. |
A Token Ring implementation works on the __ mode. |
A. | Contention |
B. | Reservation |
C. | Round Robin |
D. | None |
Answer» D. None | |
12. |
The contention mode of MAC implementation is best suited for __ traffic. |
A. | Low |
B. | Medium |
C. | High |
D. | Very High |
Answer» B. Medium | |
13. |
In a Contention mode of MAC implementation, different stations can have different priorities set by the admin. State TRUE/FALSE. |
A. | TRUE |
B. | FALSE |
C. | - |
D. | - |
Answer» B. FALSE | |
14. |
In a contention mode of MAC implementation, each station in the network ___ data at the same time whether a collision occurs or not. |
A. | can transmit |
B. | can not transmit |
C. | - |
D. | - |
Answer» B. can not transmit | |
15. |
In Reservation mode of MAC, each station in the network ___ a time slot for a finite or infinite amount of time to access the shared medium. |
A. | should reserve |
B. | need not reserve |
C. | - |
D. | - |
Answer» B. need not reserve | |
16. |
In Round-robin mode of MAC, each station gets ___ priority whether access to the medium is needed or not. |
A. | different |
B. | equal |
C. | - |
D. | - |
Answer» C. - | |
17. |
The modes of a MAC to share a transmission medium are ___. |
A. | Round Robin |
B. | Reservation |
C. | Contention |
D. | All the above |
Answer» E. | |
18. |
The types of Medium Access Control are ___. |
A. | Centrally Access Control |
B. | Distributed Access Control |
C. | Both option-A and option-B |
D. | None |
Answer» D. None | |
19. |
Every Computer or an Internet device has a unique MAC address. State TRUE/FALSE. |
A. | TRUE |
B. | FALSE |
C. | - |
D. | - |
Answer» B. FALSE | |
20. |
Which is the layer that is responsible for sharing the physical media (transmission medium) among many computers or devices? |
A. | LLC (Logical Link Control) layer |
B. | MAC (Medium Access Control) layer |
C. | - |
D. | - |
Answer» C. - | |
21. |
The types of data services offered by an LLC (Logical Link Control) layer are ___. |
A. | Connectionless which is fast and unreliable |
B. | Connection-Oriented which is slow and reliable |
C. | Both OptionA and optionB. |
D. | None |
Answer» D. None | |
22. |
The functions of a Logical Link Layer (LLC) are ___. |
A. | Error control |
B. | Flow control |
C. | Creating and managing the communication link between two devices with the help of the Transport layer. |
D. | All the above |
Answer» E. | |
23. |
Which is the sub-layer that accepts frames from the upper layer that is Network Layer? |
A. | LLC (Logical Link Control Layer) |
B. | MAC (Medium Access Control) layer |
C. | - |
D. | - |
Answer» B. MAC (Medium Access Control) layer | |
24. |
The two sub-layers of a Data Link layer are ___. |
A. | LLC - Logical Link Control Layer |
B. | MAC - Medium Access Control Layer |
C. | Both A and B |
D. | Data Layer |
Answer» D. Data Layer | |
25. |
A Data Link Layer converts a packet of data into __ finally. |
A. | Frames |
B. | Bits |
C. | - |
D. | - |
Answer» C. - | |
26. |
WHICH_ONE_OF_THE_FOLLOWING_IS_THE_MULTIPLE_ACCESS_PROTOCOL_FOR_CHANNEL_ACCESS_CONTROL??$ |
A. | CSMA/CD |
B. | CSMA/CA |
C. | Both CSMA/CD & CSMA/CA |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
27. |
The_technique_of_temporarily_delaying_outgoing_acknowledgements_so_that_they_can_be_hooked_onto_the_next_outgoing_data_frame_is_called$ |
A. | piggybacking |
B. | cyclic redundancy check |
C. | fletcher’s checksum |
D. | none of the mentioned |
Answer» B. cyclic redundancy check | |
28. |
CRC stands for |
A. | cyclic redundancy check |
B. | code repeat check |
C. | code redundancy check |
D. | cyclic repeat check |
Answer» B. code repeat check | |
29. |
Which one of the following task is not done by data link layer? |
A. | framing |
B. | error control |
C. | flow control |
D. | channel coding |
Answer» E. | |