MCQOPTIONS
Saved Bookmarks
This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
| 1701. |
Using RSA algorithm, what is the value of cipher text C, if the plain textM = 5 and p = 3, q = 11 & d = 7 ? |
| A. | 33 |
| B. | 5 |
| C. | 25 |
| D. | 26 |
| Answer» E. | |
| 1702. |
Match the following : List – I List – II a. Application layer 1. TCP b. Transport layer 2. HDLC c. Network layer 3. HTTP d. Data link layer 4. BGP Codes : a b c d |
| A. | 2 1 4 3 |
| B. | 3 4 1 2 |
| C. | 3 1 4 2 |
| D. | 2 4 1 3 |
| Answer» D. 2 4 1 3 | |
| 1703. |
What is the bit rate for transmitting uncompressed 800 x 600 pixel colour frames with 8 bits/pixel at 40 frames/second? |
| A. | 2.4 Mbps |
| B. | 15.36 Mbps |
| C. | 153.6 Mbps |
| D. | 1536 Mbps |
| Answer» D. 1536 Mbps | |
| 1704. |
A comparison of frequency division and time division multiplexing system shows that |
| A. | FDM requires a lower bandwidth, but TDM has greater noise immunity. |
| B. | FDM has greater noise immunity and requires lower bandwidth than TDM. |
| C. | FDM requires channel synchronization, while TDM has greater noise immunity. |
| D. | FDM requires more multiplex while TDM requires band pass filter. |
| Answer» D. FDM requires more multiplex while TDM requires band pass filter. | |
| 1705. |
The VLF and LF bauds use propagation for communication |
| A. | Ground |
| B. | Sky |
| C. | Line of sight |
| D. | Space |
| Answer» B. Sky | |
| 1706. |
The count-to-infinity problem is associated with |
| A. | Flooding algorithm |
| B. | Hierarchical routing algorithm |
| C. | Distance vector routing algorithm |
| D. | Link state routing algorithm |
| Answer» D. Link state routing algorithm | |
| 1707. |
___________ is a type of transmission impairment in which the SIgnal looses strength due to The resistance of the transmission medium. |
| A. | Attenuation |
| B. | Distortion |
| C. | Noise |
| D. | Decible |
| Answer» B. Distortion | |
| 1708. |
Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server? |
| A. | FTP |
| B. | TFTP |
| C. | TELNET |
| D. | NFS |
| Answer» B. TFTP | |
| 1709. |
When compared with analog cellular systems, an advantage of digital TDMA cellular system is that: |
| A. | it is less complicated |
| B. | it requires less of computer memory |
| C. | it conserves spectrum bandwidth |
| D. | it costs less |
| Answer» D. it costs less | |
| 1710. |
Decryption and encryption of data are the responsibility of which of the following layer ? |
| A. | Physical layer |
| B. | Data Link layer |
| C. | Presentation layer |
| D. | Session layer |
| Answer» D. Session layer | |
| 1711. |
If link transmits 4000 frames per second and each slot has 8 bits, the transmission rate of circuit of this TDM is ............... |
| A. | 64 Kbps |
| B. | 32 Mbps |
| C. | 32 Kbps |
| D. | 64 Mbps |
| Answer» D. 64 Mbps | |
| 1712. |
Which of the following is widely used inside the telephone system for long-haul data traffic? |
| A. | ISDN |
| B. | ATM |
| C. | Frame Relay |
| D. | ISTN |
| Answer» C. Frame Relay | |
| 1713. |
If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: |
| A. | N |
| B. | N-1 |
| C. | N*(N-1)/2 |
| D. | N*(N+1)/2 |
| Answer» D. N*(N+1)/2 | |
| 1714. |
In classful addressing, an IP address 123.23.156.4 belongs to ______ class format. |
| A. | A |
| B. | B |
| C. | C |
| D. | D |
| Answer» B. B | |
| 1715. |
Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle. |
| A. | equal to |
| B. | less than |
| C. | greater than |
| D. | less than or equal to |
| Answer» D. less than or equal to | |
| 1716. |
A Multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ? |
| A. | 100 Kbps |
| B. | 200 Kbps |
| C. | 400 Kbps |
| D. | 1000 Kbps |
| Answer» D. 1000 Kbps | |
| 1717. |
Which of the following is used in the options field of IPv4 ? |
| A. | Strict source routing |
| B. | Loose source routing |
| C. | time stamp |
| D. | All of the above |
| Answer» D. All of the above | |
| 1718. |
In a fully connected mesh network with 10 computers, total ______ number of cables are required and ____ number of ports are required for each device. |
| A. | 40,9 |
| B. | 45,10 |
| C. | 45,9 |
| D. | 50,10 |
| Answer» D. 50,10 | |
| 1719. |
A terminal multiplexer has six 1200 bps' terminals and 'n' 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ? |
| A. | 4 |
| B. | 8 |
| C. | 16 |
| D. | 28 |
| Answer» C. 16 | |
| 1720. |
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ? |
| A. | 1024 |
| B. | 2048 |
| C. | 4096 |
| D. | 8192 |
| Answer» D. 8192 | |
| 1721. |
Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ? |
| A. | 4 |
| B. | 8 |
| C. | 15 |
| D. | 16 |
| Answer» D. 16 | |
| 1722. |
In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination. |
| A. | Physical |
| B. | Host to network |
| C. | Application |
| D. | None of the above |
| Answer» E. | |
| 1723. |
The maximum size of the data that the application layer can pass on to the TCP layer below is ......... |
| A. | 2^16 bytes |
| B. | 2^16 bytes + TCP header length |
| C. | Any size |
| D. | 2^16 bytes - TCP header length |
| Answer» D. 2^16 bytes - TCP header length | |
| 1724. |
A packet whose destination is outside the local TCP/IP network segment is sent to .............. |
| A. | File server |
| B. | DNS server |
| C. | DHCP server |
| D. | Default gateway |
| Answer» E. | |
| 1725. |
Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... |
| A. | automatically |
| B. | by server |
| C. | by exchanging information with neighbor nodes |
| D. | with back up database |
| Answer» D. with back up database | |
| 1726. |
Let G(x) be generator polynomial used for CRC checking. The condition that should be satisfied by G(x) to correct odd numbered error bits, will be: |
| A. | (1+x) is factor of G(x) |
| B. | (1-x) is factor of G(x) |
| C. | (1+x^2) is factor of G(x) |
| D. | x is factor of G(x) |
| Answer» B. (1-x) is factor of G(x) | |
| 1727. |
Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is |
| A. | 20 |
| B. | 10 |
| C. | 30 |
| D. | 40 |
| Answer» C. 30 | |
| 1728. |
Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is .................. |
| A. | nP(1-P)^n-1 |
| B. | nP |
| C. | P(1-P)^n-1 |
| D. | n^P(1-P)^n-1 |
| Answer» B. nP | |
| 1729. |
An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. |
| A. | Masquerade Attack |
| B. | Replay Attack |
| C. | Passive Attack |
| D. | Denial of Service Attack |
| Answer» C. Passive Attack | |
| 1730. |
Match the following Layers and Protocols for a user browsing with SSL:a. Application layer i. TCPb. Transport layer ii. IPc. Network layer iii. PPPd. Datalink layer iv. HTTPCodes: a b c d |
| A. | iv i ii iii |
| B. | iii ii i iv |
| C. | ii iii iv i |
| D. | iii i iv ii |
| Answer» B. iii ii i iv | |
| 1731. |
Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? |
| A. | Session Maintenance Protocol |
| B. | Real - time Streaming Protocol |
| C. | Real - time Transport Control Protocol |
| D. | Session Initiation Protocol |
| Answer» E. | |
| 1732. |
Match the following port numbers with their uses :(a) 23 (i) World wide web(b) 25 (ii) Remote Login(c) 80 (iii) USENET news(d) 119 (iv) Emailcode (a) (b) (c) (d) |
| A. | (iv) (i) (ii) (iii) |
| B. | (ii) (i) (iv) (iii) |
| C. | (ii) (iv) (iii) (i) |
| D. | (ii) (iv) (i) (iii) |
| Answer» E. | |
| 1733. |
What is the size of the 'total length' field in IPv4 datagram ? |
| A. | 4 bits |
| B. | 8 bits |
| C. | 16 bits |
| D. | 32 bits |
| Answer» D. 32 bits | |
| 1734. |
Which of the following is not associated with the session layer ? |
| A. | Dialog control |
| B. | Token management |
| C. | Semantics of the information transmitted |
| D. | Synchronization |
| Answer» D. Synchronization | |
| 1735. |
In Challenge-Response authentication the claimant ............... |
| A. | Proves that she knows the secret without revealing it |
| B. | Proves that she doesn’t know the secret |
| C. | Reveals the secret |
| D. | Gives a challenge |
| Answer» B. Proves that she doesn’t know the secret | |
| 1736. |
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE |
| A. | BUTAEEZ |
| B. | SUZANNE |
| C. | XYZABCD |
| D. | ABCDXYZ |
| Answer» B. SUZANNE | |
| 1737. |
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called : |
| A. | Strobing |
| B. | Amplification |
| C. | Conditioning |
| D. | Quantization |
| Answer» E. | |
| 1738. |
A Trojan horse is |
| A. | A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation |
| B. | A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred |
| C. | A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes |
| D. | All of the above |
| Answer» E. | |
| 1739. |
The combination of an IP address and a port number is known as ................... |
| A. | network number |
| B. | socket address |
| C. | subnet mask number |
| D. | MAC address |
| Answer» C. subnet mask number | |
| 1740. |
The throughput of pure ALOHA is given by: |
| A. | S=G |
| B. | S=e^2G |
| C. | S=Ge^2G |
| D. | Ge^-2G |
| Answer» E. | |
| 1741. |
What is the correct subnet mask to use for a class-B address to support 30 Networks and also have the most hosts possible ? |
| A. | 255.255.255.0 |
| B. | 255.255.192.0 |
| C. | 255.255.240.0 |
| D. | 255.255.248.0 |
| Answer» E. | |
| 1742. |
Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)? |
| A. | Transport layer |
| B. | Data link layer |
| C. | Network layer |
| D. | Application layer |
| Answer» D. Application layer | |
| 1743. |
The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called: |
| A. | Router |
| B. | Bridge |
| C. | Gateway |
| D. | Switch |
| Answer» D. Switch | |
| 1744. |
The period of a signal is 10 ms. What is its frequency in Hertz? |
| A. | 10 |
| B. | 100 |
| C. | 1000 |
| D. | 10000 |
| Answer» C. 1000 | |
| 1745. |
For a channel of 3 KHz bandwidth and signal to noise ratio of 30 dB, the maximum data rate is: |
| A. | 3000 bps |
| B. | 6000 bps |
| C. | 15000 bps |
| D. | 30000 bps |
| Answer» E. | |
| 1746. |
TDM is ................ |
| A. | A primary/secondary type protocol |
| B. | A peer/peer protocol |
| C. | A Non-priority peer/peer protocol |
| D. | A priority type protocol |
| Answer» D. A priority type protocol | |
| 1747. |
In link state routing algorithm after the construction of link state packets, new routes are computed using: |
| A. | DES algorithm |
| B. | Dijkstra's algorithm |
| C. | RSA algorithm |
| D. | Packets |
| Answer» C. RSA algorithm | |
| 1748. |
Find the false statement: |
| A. | In modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption |
| B. | The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product |
| C. | The AES (Advanced Encryption Standard ) cryptosystem allows variable key lengths of size 56 bits and 124 bits |
| D. | Pubiic key algorithms use two different keys for Encryption and Decryption |
| Answer» D. Pubiic key algorithms use two different keys for Encryption and Decryption | |
| 1749. |
Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address? |
| A. | Hub |
| B. | Modem |
| C. | Switch |
| D. | Gateway |
| Answer» D. Gateway | |
| 1750. |
In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. |
| A. | identification |
| B. | fragment offset |
| C. | time to live |
| D. | header checksum |
| Answer» B. fragment offset | |