

MCQOPTIONS
Saved Bookmarks
This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
1701. |
Using RSA algorithm, what is the value of cipher text C, if the plain textM = 5 and p = 3, q = 11 & d = 7 ? |
A. | 33 |
B. | 5 |
C. | 25 |
D. | 26 |
Answer» E. | |
1702. |
Match the following : List – I List – II a. Application layer 1. TCP b. Transport layer 2. HDLC c. Network layer 3. HTTP d. Data link layer 4. BGP Codes : a b c d |
A. | 2 1 4 3 |
B. | 3 4 1 2 |
C. | 3 1 4 2 |
D. | 2 4 1 3 |
Answer» D. 2 4 1 3 | |
1703. |
What is the bit rate for transmitting uncompressed 800 x 600 pixel colour frames with 8 bits/pixel at 40 frames/second? |
A. | 2.4 Mbps |
B. | 15.36 Mbps |
C. | 153.6 Mbps |
D. | 1536 Mbps |
Answer» D. 1536 Mbps | |
1704. |
A comparison of frequency division and time division multiplexing system shows that |
A. | FDM requires a lower bandwidth, but TDM has greater noise immunity. |
B. | FDM has greater noise immunity and requires lower bandwidth than TDM. |
C. | FDM requires channel synchronization, while TDM has greater noise immunity. |
D. | FDM requires more multiplex while TDM requires band pass filter. |
Answer» D. FDM requires more multiplex while TDM requires band pass filter. | |
1705. |
The VLF and LF bauds use propagation for communication |
A. | Ground |
B. | Sky |
C. | Line of sight |
D. | Space |
Answer» B. Sky | |
1706. |
The count-to-infinity problem is associated with |
A. | Flooding algorithm |
B. | Hierarchical routing algorithm |
C. | Distance vector routing algorithm |
D. | Link state routing algorithm |
Answer» D. Link state routing algorithm | |
1707. |
___________ is a type of transmission impairment in which the SIgnal looses strength due to The resistance of the transmission medium. |
A. | Attenuation |
B. | Distortion |
C. | Noise |
D. | Decible |
Answer» B. Distortion | |
1708. |
Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server? |
A. | FTP |
B. | TFTP |
C. | TELNET |
D. | NFS |
Answer» B. TFTP | |
1709. |
When compared with analog cellular systems, an advantage of digital TDMA cellular system is that: |
A. | it is less complicated |
B. | it requires less of computer memory |
C. | it conserves spectrum bandwidth |
D. | it costs less |
Answer» D. it costs less | |
1710. |
Decryption and encryption of data are the responsibility of which of the following layer ? |
A. | Physical layer |
B. | Data Link layer |
C. | Presentation layer |
D. | Session layer |
Answer» D. Session layer | |
1711. |
If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ............... |
A. | 64 Kbps |
B. | 32 Mbps |
C. | 32 Kbps |
D. | 64 Mbps |
Answer» D. 64 Mbps | |
1712. |
Which of the following is widely used inside the telephone system for long-haul data traffic? |
A. | ISDN |
B. | ATM |
C. | Frame Relay |
D. | ISTN |
Answer» C. Frame Relay | |
1713. |
If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: |
A. | N |
B. | N-1 |
C. | N*(N-1)/2 |
D. | N*(N+1)/2 |
Answer» D. N*(N+1)/2 | |
1714. |
In classful addressing, an IP address 123.23.156.4 belongs to ______ class format. |
A. | A |
B. | B |
C. | C |
D. | D |
Answer» B. B | |
1715. |
Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle. |
A. | equal to |
B. | less than |
C. | greater than |
D. | less than or equal to |
Answer» D. less than or equal to | |
1716. |
A Multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ? |
A. | 100 Kbps |
B. | 200 Kbps |
C. | 400 Kbps |
D. | 1000 Kbps |
Answer» D. 1000 Kbps | |
1717. |
Which of the following is used in the options field of IPv4 ? |
A. | Strict source routing |
B. | Loose source routing |
C. | time stamp |
D. | All of the above |
Answer» D. All of the above | |
1718. |
In a fully connected mesh network with 10 computers, total ______ number of cables are required and ____ number of ports are required for each device. |
A. | 40,9 |
B. | 45,10 |
C. | 45,9 |
D. | 50,10 |
Answer» D. 50,10 | |
1719. |
A terminal multiplexer has six 1200 bps' terminals and 'n' 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ? |
A. | 4 |
B. | 8 |
C. | 16 |
D. | 28 |
Answer» C. 16 | |
1720. |
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ? |
A. | 1024 |
B. | 2048 |
C. | 4096 |
D. | 8192 |
Answer» D. 8192 | |
1721. |
Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ? |
A. | 4 |
B. | 8 |
C. | 15 |
D. | 16 |
Answer» D. 16 | |
1722. |
In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination. |
A. | Physical |
B. | Host to network |
C. | Application |
D. | None of the above |
Answer» E. | |
1723. |
The maximum size of the data that the application layer can pass on to the TCP layer below is ......... |
A. | 2^16 bytes |
B. | 2^16 bytes + TCP header length |
C. | Any size |
D. | 2^16 bytes - TCP header length |
Answer» D. 2^16 bytes - TCP header length | |
1724. |
A packet whose destination is outside the local TCP/IP network segment is sent to .............. |
A. | File server |
B. | DNS server |
C. | DHCP server |
D. | Default gateway |
Answer» E. | |
1725. |
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... |
A. | automatically |
B. | by server |
C. | by exchanging information with neighbor nodes |
D. | with back up database |
Answer» D. with back up database | |
1726. |
Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be: |
A. | (1+x) is factor of G(x) |
B. | (1-x) is factor of G(x) |
C. | (1+x^2) is factor of G(x) |
D. | x is factor of G(x) |
Answer» B. (1-x) is factor of G(x) | |
1727. |
Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is |
A. | 20 |
B. | 10 |
C. | 30 |
D. | 40 |
Answer» C. 30 | |
1728. |
Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is .................. |
A. | nP(1-P)^n-1 |
B. | nP |
C. | P(1-P)^n-1 |
D. | n^P(1-P)^n-1 |
Answer» B. nP | |
1729. |
An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. |
A. | Masquerade Attack |
B. | Replay Attack |
C. | Passive Attack |
D. | Denial of Service Attack |
Answer» C. Passive Attack | |
1730. |
Match the following Layers and Protocols for a user browsing with SSL:a. Application layer i. TCPb. Transport layer ii. IPc. Network layer iii. PPPd. Datalink layer iv. HTTPCodes: a b c d |
A. | iv i ii iii |
B. | iii ii i iv |
C. | ii iii iv i |
D. | iii i iv ii |
Answer» B. iii ii i iv | |
1731. |
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? |
A. | Session Maintenance Protocol |
B. | Real - time Streaming Protocol |
C. | Real - time Transport Control Protocol |
D. | Session Initiation Protocol |
Answer» E. | |
1732. |
Match the following port numbers with their uses :(a) 23 (i) World wide web(b) 25 (ii) Remote Login(c) 80 (iii) USENET news(d) 119 (iv) Emailcode (a) (b) (c) (d) |
A. | (iv) (i) (ii) (iii) |
B. | (ii) (i) (iv) (iii) |
C. | (ii) (iv) (iii) (i) |
D. | (ii) (iv) (i) (iii) |
Answer» E. | |
1733. |
What is the size of the 'total length' field in IPv4 datagram ? |
A. | 4 bits |
B. | 8 bits |
C. | 16 bits |
D. | 32 bits |
Answer» D. 32 bits | |
1734. |
Which of the following is not associated with the session layer ? |
A. | Dialog control |
B. | Token management |
C. | Semantics of the information transmitted |
D. | Synchronization |
Answer» D. Synchronization | |
1735. |
In Challenge-Response authentication the claimant ............... |
A. | Proves that she knows the secret without revealing it |
B. | Proves that she doesn’t know the secret |
C. | Reveals the secret |
D. | Gives a challenge |
Answer» B. Proves that she doesn’t know the secret | |
1736. |
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE |
A. | BUTAEEZ |
B. | SUZANNE |
C. | XYZABCD |
D. | ABCDXYZ |
Answer» B. SUZANNE | |
1737. |
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called : |
A. | Strobing |
B. | Amplification |
C. | Conditioning |
D. | Quantization |
Answer» E. | |
1738. |
A Trojan horse is |
A. | A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation |
B. | A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred |
C. | A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes |
D. | All of the above |
Answer» E. | |
1739. |
The combination of an IP address and a port number is known as ................... |
A. | network number |
B. | socket address |
C. | subnet mask number |
D. | MAC address |
Answer» C. subnet mask number | |
1740. |
The throughput of pure ALOHA is given by: |
A. | S=G |
B. | S=e^2G |
C. | S=Ge^2G |
D. | Ge^-2G |
Answer» E. | |
1741. |
What is the correct subnet mask to use for a class-B address to support 30 Networks and also have the most hosts possible ? |
A. | 255.255.255.0 |
B. | 255.255.192.0 |
C. | 255.255.240.0 |
D. | 255.255.248.0 |
Answer» E. | |
1742. |
Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)? |
A. | Transport layer |
B. | Data link layer |
C. | Network layer |
D. | Application layer |
Answer» D. Application layer | |
1743. |
The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called: |
A. | Router |
B. | Bridge |
C. | Gateway |
D. | Switch |
Answer» D. Switch | |
1744. |
The period of a signal is 10 ms. What is its frequency in Hertz? |
A. | 10 |
B. | 100 |
C. | 1000 |
D. | 10000 |
Answer» C. 1000 | |
1745. |
For a channel of 3 KHz bandwidth and signal to noise ratio of 30 dB, the maximum data rate is: |
A. | 3000 bps |
B. | 6000 bps |
C. | 15000 bps |
D. | 30000 bps |
Answer» E. | |
1746. |
TDM is ................ |
A. | A primary/secondary type protocol |
B. | A peer/peer protocol |
C. | A Non-priority peer/peer protocol |
D. | A priority type protocol |
Answer» D. A priority type protocol | |
1747. |
In link state routing algorithm after the construction of link state packets, new routes are computed using: |
A. | DES algorithm |
B. | Dijkstra's algorithm |
C. | RSA algorithm |
D. | Packets |
Answer» C. RSA algorithm | |
1748. |
Find the false statement: |
A. | In modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption |
B. | The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product |
C. | The AES (Advanced Encryption Standard ) cryptosystem allows variable key lengths of size 56 bits and 124 bits |
D. | Pubiic key algorithms use two different keys for Encryption and Decryption |
Answer» D. Pubiic key algorithms use two different keys for Encryption and Decryption | |
1749. |
Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address? |
A. | Hub |
B. | Modem |
C. | Switch |
D. | Gateway |
Answer» D. Gateway | |
1750. |
In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. |
A. | identification |
B. | fragment offset |
C. | time to live |
D. | header checksum |
Answer» B. fragment offset | |