MCQOPTIONS
Saved Bookmarks
This section includes 728 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 601. |
If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps), |
| A. | n*39.8 |
| B. | n*51.8 |
| C. | 2n*51.8 |
| D. | None of the mentioned |
| Answer» C. 2n*51.8 | |
| 602. |
Fiber optics posses following properties |
| A. | Immune electromagnetic interference |
| B. | Very less signal attenuation |
| C. | Very hard to tap |
| D. | All of the mentioned |
| Answer» E. | |
| 603. |
Coaxial cable consists of _______ concentric copper conductors. |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 604. |
UTP is commonly used in |
| A. | DSL |
| B. | FTTP |
| C. | HTTP |
| D. | None of the mentioned |
| Answer» B. FTTP | |
| 605. |
Which of this is not a guided media ? |
| A. | Fiber optical cable |
| B. | Coaxial cable |
| C. | Wireless LAN |
| D. | Copper wire |
| Answer» D. Copper wire | |
| 606. |
Firewalls are often configured to block |
| A. | UDP traffic |
| B. | TCP traffic |
| C. | Both of the mentioned |
| D. | None of the mentioned |
| Answer» B. TCP traffic | |
| 607. |
Sniffers can be deployed in |
| A. | Wired environment |
| B. | WiFi |
| C. | Ethernet LAN |
| D. | All of the mentioned |
| Answer» E. | |
| 608. |
Packet sniffers involve |
| A. | Active receiver |
| B. | Passive receiver |
| C. | Both Active receiver and Passive receiver |
| D. | None of the mentioned |
| Answer» C. Both Active receiver and Passive receiver | |
| 609. |
The DoS attack is which the attacker sends deluge of packets to the targeted host |
| A. | Vulnerability attack |
| B. | Bandwidth flooding |
| C. | Connection flooding |
| D. | All of the mentioned |
| Answer» C. Connection flooding | |
| 610. |
The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host |
| A. | Vulnerability attack |
| B. | Bandwidth flooding |
| C. | Connection flooding |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 611. |
Which of the following is a form of DoS attack ? |
| A. | Vulnerability attack |
| B. | Bandwidth flooding |
| C. | Connection flooding |
| D. | All of the mentioned |
| Answer» E. | |
| 612. |
The attackers a network of compromised devices known as |
| A. | Internet |
| B. | Botnet |
| C. | Telnet |
| D. | D-net |
| Answer» C. Telnet | |
| 613. |
Propagation delay depends on |
| A. | Packet length |
| B. | Transmission rate |
| C. | Distance between the routers |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 614. |
Transmission delay does not depend on |
| A. | Packet length |
| B. | Distance between the routers |
| C. | Transmission rate |
| D. | None of the mentioned |
| Answer» C. Transmission rate | |
| 615. |
In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero |
| A. | Propogation delay |
| B. | Queuing delay |
| C. | Transmission delay |
| D. | Processing delay |
| Answer» C. Transmission delay | |
| 616. |
The total nodal delay is given by |
| A. | dnodal = dproc – dqueue + dtrans + dprop |
| B. | dnodal = dproc + dtrans – dqueue |
| C. | dnodal = dproc + dqueue + dtrans + dprop |
| D. | dnodal = dproc + dqueue – dtrans – dprop |
| Answer» D. dnodal = dproc + dqueue – dtrans – dprop | |
| 617. |
If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is |
| A. | N/2 |
| B. | N |
| C. | N-1 |
| D. | 2N |
| Answer» D. 2N | |
| 618. |
In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually |
| A. | 20Mbps |
| B. | 10Mbps |
| C. | 40Mbps |
| D. | 50Mbps |
| Answer» C. 40Mbps | |
| 619. |
Traffic intensity is given by, where L = number of bits in the packet a = average rate R = transmission rate |
| A. | La/R |
| B. | LR/a |
| C. | R/La |
| D. | None of the mentioned |
| Answer» B. LR/a | |
| 620. |
The time required to examine the packet’s header and determine where to direct the packet is part of |
| A. | Processing delay |
| B. | Queuing delay |
| C. | Transmission delay |
| D. | All of the mentioned |
| Answer» B. Queuing delay | |
| 621. |
For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is(in milliseconds) |
| A. | 3.2 |
| B. | 32 |
| C. | 0.32 |
| D. | None of the mentioned |
| Answer» B. 32 | |
| 622. |
Which of the following delay is faced by the packet in travelling from one end system to another ? |
| A. | Propagation delay |
| B. | Queuing delay |
| C. | Transmission delay |
| D. | All of the mentioned |
| Answer» E. | |
| 623. |
In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources. |
| A. | Greater than |
| B. | Lesser than |
| C. | Equal to |
| D. | Equal to or greater than |
| Answer» B. Lesser than | |
| 624. |
Multiplexing can provide |
| A. | Efficiency |
| B. | Privacy |
| C. | Anti jamming |
| D. | Both Efficiency & Privacy |
| Answer» E. | |
| 625. |
The state when dedicated signals are idle are called |
| A. | Death period |
| B. | Poison period |
| C. | Silent period |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 626. |
If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is |
| A. | 32kbps |
| B. | 500bps |
| C. | 500kbps |
| D. | None of the mentioned |
| Answer» B. 500bps | |
| 627. |
If there are n signal sources of same data rate than TDM link has _______ slots |
| A. | n |
| B. | n/2 |
| C. | n*2 |
| D. | 2n |
| Answer» B. n/2 | |
| 628. |
Which multiplexing technique transmits digital signals ? |
| A. | FDM |
| B. | TDM |
| C. | WDM |
| D. | None of the mentioned |
| Answer» C. WDM | |
| 629. |
Multiplexing is used in _______ |
| A. | Packet switching |
| B. | Circuit switching |
| C. | Data switching |
| D. | None of the mentioned |
| Answer» C. Data switching | |
| 630. |
The sharing of a medium and its link by two or more devices is called _________ |
| A. | Fully duplexing |
| B. | Multiplexing |
| C. | Both Fully duplexing and Multiplexing |
| D. | None of the mentioned |
| Answer» C. Both Fully duplexing and Multiplexing | |
| 631. |
Multiplexing technique that shifts each signal to a different carrier frequency |
| A. | FDM |
| B. | TDM |
| C. | Both FDM & TDM |
| D. | None of the mentioned |
| Answer» B. TDM | |
| 632. |
In TDM, slots are further divided into |
| A. | Seconds |
| B. | Frames |
| C. | Packets |
| D. | None of the mentioned |
| Answer» C. Packets | |
| 633. |
Expand WAN |
| A. | World area network |
| B. | Wide area network |
| C. | Web area network |
| D. | None of the mentioned |
| Answer» C. Web area network | |
| 634. |
Data communication system within a building or campus is |
| A. | LAN |
| B. | WAN |
| C. | MAN |
| D. | None of the mentioned |
| Answer» B. WAN | |
| 635. |
Data communication system spanning states, countries, or the whole world is |
| A. | LAN |
| B. | WAN |
| C. | MAN |
| D. | None of the mentioned |
| Answer» C. MAN | |
| 636. |
This topology requires multipoint connection |
| A. | Star |
| B. | Mesh |
| C. | Ring |
| D. | Bus |
| Answer» E. | |
| 637. |
In this topology there is a central controller or hub |
| A. | Star |
| B. | Mesh |
| C. | Ring |
| D. | Bus |
| Answer» B. Mesh | |
| 638. |
Physical or logical arrangement of network is |
| A. | Topology |
| B. | Routing |
| C. | Networking |
| D. | None of the mentioned |
| Answer» B. Routing | |
| 639. |
Which one of the following is a transport layer protocol? |
| A. | stream control transmission protocol |
| B. | internet control message protocol |
| C. | neighbor discovery protocol |
| D. | dynamic host configuration protocol |
| Answer» B. internet control message protocol | |
| 640. |
Transport layer protocols deals with |
| A. | application to application communication |
| B. | process to process communication |
| C. | node to node communication |
| D. | none of the mentioned |
| Answer» C. node to node communication | |
| 641. |
A _____ is a TCP name for a transport service access point. |
| A. | port |
| B. | pipe |
| C. | node |
| D. | none of the mentioned |
| Answer» B. pipe | |
| 642. |
Which one of the following is a version of UDP with congestion control? |
| A. | datagram congestion control protocol |
| B. | stream control transmission protocol |
| C. | structured stream transport |
| D. | none of the mentioned |
| Answer» B. stream control transmission protocol | |
| 643. |
Socket-style API for windows is called |
| A. | wsock |
| B. | winsock |
| C. | wins |
| D. | none of the mentioned |
| Answer» C. wins | |
| 644. |
An endpoint of an inter-process communication flow across a computer network is called |
| A. | socket |
| B. | pipe |
| C. | port |
| D. | none of the mentioned |
| Answer» B. pipe | |
| 645. |
Transmission control protocol is |
| A. | connection oriented protocol |
| B. | uses a three way handshake to establish a connection |
| C. | recievs data from application as a single stream |
| D. | all of the mentioned |
| Answer» E. | |
| 646. |
User datagram protocol is called connectionless because |
| A. | all UDP packets are treated independently by transport layer |
| B. | it sends data as a stream of related packets |
| C. | it is received in the same order as sent order |
| D. | none of the mentioned |
| Answer» B. it sends data as a stream of related packets | |
| 647. |
Which one of the following is a transport layer protocol used in networking? |
| A. | TCP |
| B. | UDP |
| C. | Both TCP and UDP |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 648. |
Transport layer aggregates data from different applications into a single stream before passing it to |
| A. | network layer |
| B. | data link layer |
| C. | application layer |
| D. | physical layer |
| Answer» B. data link layer | |
| 649. |
ICMP is primarily used for |
| A. | error and diagnostic functions |
| B. | addressing |
| C. | forwarding |
| D. | none of the mentioned |
| Answer» B. addressing | |
| 650. |
The network layer protocol of internet is |
| A. | ethernet |
| B. | internet protocol |
| C. | hypertext transfer protocol |
| D. | none of the mentioned |
| Answer» C. hypertext transfer protocol | |