Explore topic-wise MCQs in UGC-NET.

This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.

1701.

Using RSA algorithm, what is the value of cipher text C, if the plain textM = 5 and p = 3, q = 11 & d = 7 ?

A. 33
B. 5
C. 25
D. 26
Answer» E.
1702.

Match the following : List – I                                         List – II a. Application layer                  1. TCP b. Transport layer                    2. HDLC c. Network layer                       3. HTTP d. Data link layer                     4. BGP Codes : a b c d

A. 2 1 4 3
B. 3 4 1 2
C. 3 1 4 2
D. 2 4 1 3
Answer» D. 2 4 1 3
1703.

What is the bit rate for transmitting uncompressed 800 x 600 pixel colour frames with 8 bits/pixel at 40 frames/second?

A. 2.4 Mbps
B. 15.36 Mbps
C. 153.6 Mbps
D. 1536 Mbps
Answer» D. 1536 Mbps
1704.

A comparison of frequency division and time division multiplexing system shows that

A. FDM requires a lower bandwidth, but TDM has greater noise immunity.
B. FDM has greater noise immunity and requires lower bandwidth than TDM.
C. FDM requires channel synchronization, while TDM has greater noise immunity.
D. FDM requires more multiplex while TDM requires band pass filter.
Answer» D. FDM requires more multiplex while TDM requires band pass filter.
1705.

The VLF and LF bauds use propagation for communication

A. Ground
B. Sky
C. Line of sight
D. Space
Answer» B. Sky
1706.

The count-to-infinity problem is associated with

A. Flooding algorithm
B. Hierarchical routing algorithm
C. Distance vector routing algorithm
D. Link state routing algorithm
Answer» D. Link state routing algorithm
1707.

___________ is a type of transmission  impairment in which the SIgnal looses strength due to The resistance of the transmission medium.

A. Attenuation
B. Distortion
C. Noise
D. Decible
Answer» B. Distortion
1708.

Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server?

A. FTP
B. TFTP
C. TELNET
D. NFS
Answer» B. TFTP
1709.

When compared with analog cellular systems, an advantage of digital TDMA cellular system is that:

A. it is less complicated
B. it requires less of computer memory
C. it conserves spectrum bandwidth
D. it costs less
Answer» D. it costs less
1710.

Decryption and encryption of data are the responsibility of which of the following layer ?

A. Physical layer
B. Data Link layer
C. Presentation layer
D. Session layer
Answer» D. Session layer
1711.

If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ...............

A. 64 Kbps
B. 32 Mbps
C. 32 Kbps
D. 64 Mbps
Answer» D. 64 Mbps
1712.

Which of the following is widely used inside the telephone system for long-haul data traffic?

A. ISDN
B. ATM
C. Frame Relay
D. ISTN
Answer» C. Frame Relay
1713.

If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:

A. N
B. N-1
C. N*(N-1)/2
D. N*(N+1)/2
Answer» D. N*(N+1)/2
1714.

In classful addressing, an IP address 123.23.156.4 belongs to ______ class format.

A. A
B. B
C. C
D. D
Answer» B. B
1715.

Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle.

A. equal to
B. less than
C. greater than
D. less than or equal to
Answer» D. less than or equal to
1716.

A Multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ?

A. 100 Kbps
B. 200 Kbps
C. 400 Kbps
D. 1000 Kbps
Answer» D. 1000 Kbps
1717.

Which of the following is used in the options field of IPv4 ?

A. Strict source routing
B. Loose source routing
C. time stamp
D. All of the above
Answer» D. All of the above
1718.

In a fully connected mesh network with 10 computers, total ______ number of cables are required and ____ number of ports are required for each device.

A. 40,9
B. 45,10
C. 45,9
D. 50,10
Answer» D. 50,10
1719.

A terminal multiplexer has six 1200 bps' terminals and 'n' 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ?

A. 4
B. 8
C. 16
D. 28
Answer» C. 16
1720.

A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?

A. 1024
B. 2048
C. 4096
D. 8192
Answer» D. 8192
1721.

Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ?

A. 4
B. 8
C. 15
D. 16
Answer» D. 16
1722.

In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination.

A. Physical
B. Host to network
C. Application
D. None of the above
Answer» E.
1723.

The maximum size of the data that the application layer can pass on to the TCP layer below is .........

A. 2^16 bytes
B. 2^16 bytes + TCP header length
C. Any size
D. 2^16 bytes - TCP header length
Answer» D. 2^16 bytes - TCP header length
1724.

A packet whose destination is outside the local TCP/IP network segment is sent to ..............

A. File server
B. DNS server
C. DHCP server
D. Default gateway
Answer» E.
1725.

Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ...........

A. automatically
B. by server
C. by exchanging information with neighbor nodes
D. with back up database
Answer» D. with back up database
1726.

Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be:

A. (1+x) is factor of G(x)
B. (1-x) is factor of G(x)
C. (1+x^2) is factor of G(x)
D. x is factor of G(x)
Answer» B. (1-x) is factor of G(x)
1727.

Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is

A. 20
B. 10
C. 30
D. 40
Answer» C. 30
1728.

Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is ..................

A. nP(1-P)^n-1
B. nP
C. P(1-P)^n-1
D. n^P(1-P)^n-1
Answer» B. nP
1729.

An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ..............

A. Masquerade Attack
B. Replay Attack
C. Passive Attack
D. Denial of Service Attack
Answer» C. Passive Attack
1730.

Match the following Layers and Protocols for a user browsing with SSL:a. Application layer i. TCPb. Transport layer ii. IPc. Network layer iii. PPPd. Datalink layer iv. HTTPCodes: a b c d

A. iv i ii iii
B. iii ii i iv
C. ii iii iv i
D. iii i iv ii
Answer» B. iii ii i iv
1731.

Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions?

A. Session Maintenance Protocol
B. Real - time Streaming Protocol
C. Real - time Transport Control Protocol
D. Session Initiation Protocol
Answer» E.
1732.

Match the following port numbers with their uses :(a) 23 (i) World wide web(b) 25 (ii) Remote Login(c) 80 (iii) USENET news(d) 119 (iv) Emailcode (a)  (b)  (c)  (d)

A. (iv)   (i)  (ii)  (iii)
B. (ii)   (i)  (iv)  (iii)
C. (ii)   (iv)  (iii)   (i)
D. (ii)  (iv)   (i)     (iii)
Answer» E.
1733.

What is the size of the 'total length' field in IPv4 datagram ?

A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
Answer» D. 32 bits
1734.

Which of the following is not associated with the session layer ?

A. Dialog control
B. Token management
C. Semantics of the information transmitted
D. Synchronization
Answer» D. Synchronization
1735.

In Challenge-Response authentication the claimant ...............

A. Proves that she knows the secret without revealing it
B. Proves that she doesn’t know the secret
C. Reveals the secret
D. Gives a challenge
Answer» B. Proves that she doesn’t know the secret
1736.

Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of  the given plain text SUZANNE

A. BUTAEEZ
B. SUZANNE
C. XYZABCD
D. ABCDXYZ
Answer» B. SUZANNE
1737.

The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called :

A. Strobing
B. Amplification
C. Conditioning
D. Quantization
Answer» E.
1738.

A Trojan horse is

A. A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation
B. A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred
C. A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes
D. All of the above
Answer» E.
1739.

The combination of an IP address and a port number is known as ...................

A. network number
B. socket address
C. subnet mask number
D. MAC address
Answer» C. subnet mask number
1740.

The throughput of pure ALOHA is given by:

A. S=G
B. S=e^2G
C. S=Ge^2G
D. Ge^-2G
Answer» E.
1741.

What is the correct subnet mask to use for a class-B address to support 30 Networks and also have the most hosts possible ?

A. 255.255.255.0
B. 255.255.192.0
C. 255.255.240.0
D. 255.255.248.0
Answer» E.
1742.

Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?

A. Transport layer
B. Data link layer
C. Network layer
D. Application layer
Answer» D. Application layer
1743.

The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called:

A. Router
B. Bridge
C. Gateway
D. Switch
Answer» D. Switch
1744.

The period of a signal is 10 ms. What is its frequency in Hertz?

A. 10
B. 100
C. 1000
D. 10000
Answer» C. 1000
1745.

For a channel of 3 KHz bandwidth and signal to noise ratio of 30 dB, the maximum data rate is:

A. 3000 bps
B. 6000 bps
C. 15000 bps
D. 30000 bps
Answer» E.
1746.

TDM is ................

A. A primary/secondary type protocol
B. A peer/peer protocol
C. A Non-priority peer/peer protocol
D. A priority type protocol
Answer» D. A priority type protocol
1747.

In link state routing algorithm after the construction of link state packets, new routes are computed using:

A. DES algorithm
B. Dijkstra's algorithm
C. RSA algorithm
D. Packets
Answer» C. RSA algorithm
1748.

Find the false statement:

A. In modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption
B. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product
C. The AES (Advanced Encryption Standard )   cryptosystem allows variable key lengths  of size 56 bits and 124 bits
D. Pubiic  key algorithms use two different keys for Encryption and Decryption
Answer» D. Pubiic  key algorithms use two different keys for Encryption and Decryption
1749.

Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address?

A. Hub
B. Modem
C. Switch
D. Gateway
Answer» D. Gateway
1750.

In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to.

A. identification
B. fragment offset
C. time to live
D. header checksum
Answer» B. fragment offset