MTE Sample MCQ
MTE Sample MCQ
1. Which of the following is the standard model used to describe network architectures?
• a) ISO
• b) OSI
• c) TCP/IP
• d) IEEE
Answer: b) OSI
• a) 4
• b) 5
• c) 6
• d) 7
Answer: d) 7
3. In the OSI model, which layer is responsible for data encryption and decryption?
• a) Physical layer
• b) Network layer
• c) Presentation layer
• d) Application layer
Answer: c) Presentation layer
• b) Routing of data
• c) End-to-end communication
• d) Framing
Answer: c) End-to-end communication
• a) HTTP
• b) SMTP
• c) FTP
• d) DHCP
Answer: b) SMTP
Topic: Network Hardware Architecture, Topologies, and Devices (HUB, Switch, Routers)
6. Which device operates at the Physical layer of the OSI model?
• a) Router
• b) Switch
• c) Hub
• d) Bridge
Answer: c) Hub
7. In which topology do all devices connect to a central device like a switch or hub?
• a) Mesh topology
• b) Bus topology
• c) Star topology
• d) Ring topology
Answer: c) Star topology
• b) Network layer
• c) Transport layer
• d) Physical layer
Answer: b) Network layer
9. Which device forwards data only to the specific destination device on the network?
• a) Hub
• b) Switch
• c) Repeater
• d) Modem
Answer: b) Switch
10. Which topology allows all devices to be connected with many redundant interconnections?
• a) Bus topology
• b) Ring topology
• c) Star topology
• d) Mesh topology
Answer: d) Mesh topology
• b) Video editing
• c) Image processing
• d) Audio mixing
Answer: a) File sharing
12. A network used to connect computers within a small geographic area, such as a building, is
known as:
• a) WAN
• b) LAN
• c) PAN
• d) MAN
Answer: b) LAN
13. Which of the following is an example of an application layer protocol used in networking?
• a) HTTP
• b) TCP
• c) IP
• d) Ethernet
Answer: a) HTTP
• a) Centralized control
• c) Requires a server
15. Which network type is typically used by organizations spread across different geographical
locations?
• a) LAN
• b) MAN
• c) WAN
• d) PAN
Answer: c) WAN
18. Which network topology is used if each device is connected to two other devices forming a
circular path?
• a) Star
• b) Bus
• c) Ring
• d) Mesh
Answer: c) Ring
• a) Centralized control
• c) Dedicated servers
• a) Bus
• b) Ring
• c) Star
• d) Mesh
Answer: d) Mesh
• a) A private network
• b) A network of networks
• c) A wireless network
• a) FTP
• b) HTTP
• c) SMTP
• d) DHCP
Answer: b) HTTP
• a) Sending emails
• d) Compiling code
Answer: b) Displaying web pages
• a) 256.256.256.256
• b) 192.168.1.1
• c) 1234.123.12
• d) 200.300.400.500
Answer: b) 192.168.1.1
• c) An email address
• d) A security feature
Answer: a) A unique address on the internet
• a) Google Chrome
• b) Mozilla Firefox
• c) Adobe Photoshop
• d) Microsoft Edge
Answer: c) Adobe Photoshop
• b) Sending emails
29. Which of the following is the top-level domain (TLD) in the URL "www.example.com"?
• a) www
• b) example
• c) com
• d) .example
Answer: c) com
• a) 25
• b) 80
• c) 110
• d) 443
Answer: b) 80
• a) 16
• b) 32
• c) 64
• d) 128
Answer: b) 32
• d) A web page
Answer: a) A fixed amount of data sent over a network
33. The process of dividing data into smaller pieces for transmission is called:
• a) Packet switching
• b) Routing
• c) Data fragmentation
• d) Tunneling
Answer: a) Packet switching
• b) To encrypt data
• c) To store webpages
• d) To secure networks
Answer: a) To identify devices on a network
• a) Data encryption
37. TCP is a:
• a) Connectionless protocol
• b) Connection-oriented protocol
38. Which protocol is used for transferring files between systems on a network?
• a) FTP
• b) HTTP
• c) SMTP
• d) SNMP
Answer: a) FTP
• c) File transfers
• d) Secure transactions
Answer: b) Real-time applications like video streaming
• a) SNMP
• b) SMTP
• c) HTTP
• d) IP
Answer: a) SNMP
41. Which device connects multiple networks together and directs data between them?
• a) Switch
• b) Hub
• c) Router
• d) Repeater
Answer: c) Router
42. In which topology does a single point of failure affect the entire network?
• a) Star topology
• b) Mesh topology
• c) Bus topology
• d) Tree topology
Answer: c) Bus topology
• a) Physical layer
• c) Network layer
• d) Transport layer
Answer: b) Data Link layer
45. Which type of network topology is most commonly used in modern Ethernet networks?
• a) Bus
• b) Star
• c) Ring
• d) Mesh
Answer: b) Star
46. A network that allows users to share resources like printers and files is called a:
• a) Public network
• b) Private network
• c) Shared network
• d) Computer network
Answer: d) Computer network
47. A system that controls access to a network and provides security by filtering traffic is called a:
• a) Router
• b) Switch
• c) Firewall
• d) Proxy server
Answer: c) Firewall
• a) Resource sharing
• b) Data communication
• c) Centralized computing
• d) Data storage
Answer: c) Centralized computing
• a) WAN
• b) PAN
• c) LAN
• d) MAN
Answer: c) LAN
• a) Ethernet
• b) Token Ring
• c) Fiber-optic
• d) Coaxial
Answer: c) Fiber-optic
• a) A single room
• b) A small building
• d) A local area
Answer: c) A large geographical area
57. The Internet protocol that allows devices to share information in small units of data is called:
• a) Circuit switching
• b) Packet switching
• c) Frame relay
• d) TDM
Answer: b) Packet switching
59. The web server that serves the most commonly requested websites is:
• a) Apache
• b) FTP
• c) SSH
• d) DHCP
Answer: a) Apache
• c) Request successful
• d) Unauthorized access
Answer: b) Page not found
• d) Cookies
Answer: b) Frequently accessed files from websites
64. Which of the following is used to resolve domain names into IP addresses?
• a) DHCP
• b) DNS
• c) HTTP
• d) SNMP
Answer: b) DNS
• a) SSH
• b) SSL/TLS
• c) FTP
• d) SNMP
Answer: b) SSL/TLS
• a) 192.168.1.10
• b) 8.8.8.8
• c) 172.217.3.110
• d) 157.240.20.35
Answer: a) 192.168.1.10
69. Which device is primarily responsible for forwarding packets to their destination across
networks?
• a) Switch
• b) Router
• c) Hub
• d) Modem
Answer: b) Router
71. Which of the following layers of the OSI model deals with the syntax and semantics of the
information transmitted?
• a) Session layer
• b) Presentation layer
• c) Data link layer
• d) Physical layer
Answer: b) Presentation layer
72. Which layer in the TCP/IP model corresponds to the Transport layer in the OSI model?
• a) Application layer
• b) Internet layer
• c) Host-to-Host layer
73. In the OSI model, which layer is responsible for establishing, managing, and terminating
connections between applications?
• a) Physical layer
• b) Network layer
• c) Session layer
74. Which of the following is NOT a protocol used in the Application layer?
• a) HTTP
• b) FTP
• c) SMTP
• d) IP
Answer: d) IP
75. Which protocol provides reliability by establishing a connection before data is transferred?
• a) TCP
• b) UDP
• c) ICMP
• d) ARP
Answer: a) TCP
• a) Hub
• b) Router
• c) Repeater
• d) Bridge
Answer: c) Repeater
78. In which topology does each node connect directly to every other node?
• a) Mesh
• b) Star
• c) Bus
• d) Ring
Answer: a) Mesh
80. Which topology connects all nodes to a central cable (or backbone)?
• a) Bus topology
• b) Star topology
• c) Ring topology
• d) Mesh topology
Answer: a) Bus topology
81. Which type of network is used for the exchange of data over a large distance between different
countries?
• a) LAN
• b) WAN
• c) PAN
• d) MAN
Answer: b) WAN
82. In which type of network can data be transmitted between devices within a single person’s
workspace?
• a) PAN
• b) WAN
• c) MAN
• d) LAN
Answer: a) PAN
84. Which type of network is designed for a single building or campus, allowing resource sharing
between devices?
• a) WAN
• b) LAN
• c) MAN
• d) PAN
Answer: b) LAN
• a) WAN
• b) VPN
• c) LAN
• d) MAN
Answer: b) VPN
• a) DNS
• b) DHCP
• c) FTP
• d) HTTP
Answer: b) DHCP
87. In which topology does the failure of a single cable affect all connected devices?
• a) Mesh
• b) Star
• c) Ring
• d) Bus
Answer: d) Bus
• a) Bluetooth connections
• b) Corporate WAN
• d) An intranet
Answer: a) Bluetooth connections
89. What kind of network allows devices to communicate without being connected to a central
router or access point?
• a) Client-server
• b) Peer-to-peer
• c) WAN
• d) VLAN
Answer: b) Peer-to-peer
90. A network that covers multiple buildings within a city is known as:
• a) WAN
• b) PAN
• c) MAN
• d) SAN
Answer: c) MAN
92. Which of the following is the standard communication protocol of the World Wide Web?
• a) FTP
• b) SMTP
• c) HTTP
• d) SNMP
Answer: c) HTTP
93. Which layer of the OSI model is responsible for ensuring that data is transmitted in a format that
both the sender and receiver can understand?
• a) Physical layer
• b) Network layer
• c) Presentation layer
• d) Transport layer
Answer: c) Presentation layer
94. The global system of interconnected computer networks that use the Internet protocol suite is
called:
• a) Intranet
• b) VPN
• c) Extranet
• d) Internet
Answer: d) Internet
• a) FTP
• b) SMTP
• c) HTTP
• d) SNMP
Answer: b) SMTP
96. The part of a URL that indicates the domain name (e.g., www.google.com) is called the:
• a) Protocol
• b) Path
• c) Host
• d) Resource locator
Answer: c) Host
98. The part of a URL that comes after the domain and specifies the file location is called:
• a) Query
• b) Fragment
• c) Path
• d) Protocol
Answer: c) Path
99. Which of the following is used by a web server to store the actual files being requested by a web
browser?
• a) Proxy server
• b) DNS server
• c) HTTP server
• d) FTP server
Answer: c) HTTP server
• a) Domain name
• b) Subdomain
• c) Path
• d) Top-level domain
Answer: d) Top-level domain
Topic: IP Address, Packets
101. Which of the following protocols is used to find the MAC address associated with a given IP
address?
• a) DHCP
• b) ARP
• c) DNS
• d) HTTP
Answer: b) ARP
• a) 32 bits
• b) 64 bits
• c) 128 bits
• d) 256 bits
Answer: c) 128 bits
103. What is the term used for the process of dividing large data into smaller pieces to be sent over a
network?
• a) Fragmentation
• b) Routing
• c) Switching
• d) Encryption
Answer: a) Fragmentation
• a) Hub
• b) Switch
• c) Router
• d) Bridge
Answer: c) Router
• a) FTP
• b) HTTP
• c) DNS
• d) ARP
Answer: c) DNS
Additional Questions for All Topics:
106. Which layer in the OSI model is responsible for error detection and correction?
• b) Transport layer
• c) Network layer
• d) Application layer
Answer: a) Data Link layer
107. In which protocol do devices exchange control messages like ping requests and error reports?
• a) HTTP
• b) ICMP
• c) TCP
• d) DHCP
Answer: b) ICMP
• a) Encrypt data
109. In the OSI model, which layer handles the logical addressing of packets?
• a) Network layer
• c) Physical layer
• d) Application layer
Answer: a) Network layer
110. What is the role of the transport layer in the OSI model?
• a) HTTP
• b) DNS
• c) NetBIOS
• d) TCP
Answer: c) NetBIOS
112. The protocol that ensures error-free delivery of data over the internet is:
• a) UDP
• b) TCP
• c) IP
• d) ARP
Answer: b) TCP
113. Which of the following protocols is NOT used in the Transport layer?
• a) TCP
• b) UDP
• c) IP
• d) SCTP
Answer: c) IP
114. Which network device operates at both the physical and data link layers to segment a network?
• a) Hub
• b) Switch
• c) Repeater
• d) Router
Answer: b) Switch
• a) A network segment
• c) Translates IP addresses
• a) Star
• b) Bus
• c) Ring
• d) Mesh
Answer: d) Mesh
118. A device that converts digital signals to analog signals and vice versa is called a:
• a) Router
• b) Modem
• c) Bridge
• d) Switch
Answer: b) Modem
• d) Unencrypted communication
Answer: b) Secure connection over a public network
• a) Flexibility
• b) Ease of installation
• c) Limited mobility
122. The ability to connect to a network from remote locations is commonly known as:
• a) Local access
• b) Remote access
• c) LAN access
• d) MAN access
Answer: b) Remote access
• a) Centralized security
125. In which topology is each computer connected to every other computer in the network?
• a) Star
• b) Ring
• c) Mesh
• d) Bus
Answer: c) Mesh
126. A network that allows for the connection of networks in different geographical locations is
known as a:
• a) PAN
• b) LAN
• c) MAN
• d) WAN
Answer: d) WAN
127. Which network type is used in smart home systems to connect devices within a short range?
• a) WAN
• b) PAN
• c) LAN
• d) MAN
Answer: b) PAN
128. Which of the following devices would you find in a WAN setup?
• a) Hub
• b) Router
• c) Switch
• d) Repeater
Answer: b) Router
• a) IP address
• b) Web server
• c) Website resource
• d) Network device
Answer: c) Website resource
• d) Convert IP addresses
Answer: c) Increase browsing speed and filter requests
• a) 80
• b) 21
• c) 25
• d) 110
Answer: a) 80
• a) Client-server model
• b) Peer-to-peer model
• c) Star topology
• d) Virtualization
Answer: a) Client-server model
• a) 192.168.0.1
• b) www.example.com
• c) HTTP
• d) /index.html
Answer: b) www.example.com
• a) Educational institutions
• b) Government organizations
• c) Non-profit organizations
• d) Commercial businesses
Answer: c) Non-profit organizations
• c) To send emails
• d) To perform IP routing
Answer: b) To store and serve web pages
• d) To host websites
Answer: b) To display web pages and resources
137. What does a browser cache do?
138. Which protocol is used for secure communication between a web browser and a web server?
• a) HTTP
• b) HTTPS
• c) FTP
• d) SMTP
Answer: b) HTTPS
• a) 8 bits
• b) 16 bits
• c) 32 bits
• d) 128 bits
Answer: c) 32 bits
• a) It is dropped
• b) It is split into smaller packets
143. Which protocol is used to report errors and operational information in an IP network?
• a) TCP
• b) UDP
• c) ICMP
• d) FTP
Answer: c) ICMP
144. Which device ensures secure communication by encrypting and decrypting data?
• a) Router
• b) VPN
• c) Firewall
• d) Encryption gateway
Answer:
4o
You said:
ChatGPT said:
ChatGPT
144. Which device ensures secure communication by encrypting and decrypting data?
• a) Router
• b) VPN
• c) Firewall
• d) Encryption gateway
Answer: d) Encryption gateway
145. What is the primary role of ARP (Address Resolution Protocol) in networking?
• d) Fragment packets
Answer: b) Resolve IP addresses to MAC addresses
146. Which layer in the OSI model is responsible for data formatting and encryption?
• a) Transport layer
• b) Application layer
• c) Session layer
• d) Presentation layer
Answer: d) Presentation layer
• a) Assign IP addresses
• c) Encrypt data
148. Which of the following is a method used to detect errors in transmitted data?
• a) Parity check
• b) Fragmentation
• c) Load balancing
• d) Switching
Answer: a) Parity check
• a) 4
• b) 5
• c) 6
• d) 7
Answer: a) 4
150. Which device is typically used to segment a LAN into multiple smaller LANs and forward packets
between them based on their IP addresses?
• a) Switch
• b) Hub
• c) Router
• d) Bridge
Answer: c) Router
151. What is a common range for private IPv4 addresses used in home networks?
• a) 1.0.0.0 – 1.255.255.255
• b) 192.168.0.0 – 192.168.255.255
• c) 240.0.0.0 – 255.255.255.255
• d) 0.0.0.0 – 255.255.255.255
Answer: b) 192.168.0.0 – 192.168.255.255
152. Which of the following network types is most appropriate for connecting devices in a single
office or building?
• a) WAN
• b) LAN
• c) MAN
• d) PAN
Answer: b) LAN
153. In the OSI model, the physical layer is primarily concerned with:
• a) Data encoding
• b) Logical addressing
• d) Encrypting data
Answer: a) Caching content to improve load times
155. Which network protocol is responsible for converting domain names into IP addresses?
• a) DNS
• b) HTTP
• c) FTP
• d) DHCP
Answer: a) DNS
156. In network security, which of the following is used to detect and prevent unauthorized access to
network resources?
• a) VPN
• b) IDS/IPS
• c) VLAN
• d) DNS
Answer: b) IDS/IPS
157. Which of the following is a type of malicious software that can replicate itself and spread to
other computers?
• a) Virus
• b) Firewall
• c) NAT
• d) DNS
Answer: a) Virus
• a) RIP
• b) OSPF
• c) EIGRP
• d) FTP
Answer: d) FTP
• b) IP address
• c) Domain name
• d) Router
Answer: a) Network interface card
160. Which protocol uses port number 23 and allows remote command execution?
• a) SSH
• b) Telnet
• c) HTTP
• d) DNS
Answer: b) Telnet
• a) Switch
• b) Router
• c) Hub
• d) Repeater
Answer: b) Router
162. In a star topology, the central device that all computers are connected to is often a:
• a) Hub or switch
• b) Router
• c) Repeater
• d) Bridge
Answer: a) Hub or switch
163. Which type of network topology has each node connected to exactly two other nodes, forming
a single pathway for signals?
• a) Mesh
• b) Star
• c) Bus
• d) Ring
Answer: d) Ring
• a) Complex configuration
• a) Bus
• b) Star
• c) Mesh
• d) Ring
Answer: b) Star
Topic: Introduction to Internet
• a) 80
• b) 25
• c) 443
• d) 110
Answer: c) 443
• a) Domain
• b) Protocol
• c) Host
• d) Path
Answer: b) Protocol
• a) 64
• b) 32
• c) 128
• d) 16
Answer: b) 32
Topic: Browser, Web Server, URL, Domain Name
• a) Subdomain
• b) Domain name
• c) Protocol
• d) Path
Answer: a) Subdomain
172. Which of the following is a valid domain name extension for commercial websites?
• a) .gov
• b) .org
• c) .edu
• d) .com
Answer: d) .com
• a) Switches
• b) Web browsers
• c) Firewalls
• d) Routers
Answer: b) Web browsers
174. Which of the following is responsible for maintaining domain name-to-IP address mappings?
• a) DNS
• b) HTTP
• c) SMTP
• d) FTP
Answer: a) DNS
• a) 172.16.0.1
• b) 192.168.0.1
• c) 10.0.0.1
• d) 224.0.0.1
Answer: c) 10.0.0.1
179. What happens when a packet reaches its Time to Live (TTL) limit?
• a) Class A
• b) Class B
• c) Class C
• d) Class D
Answer: d) Class D
Additional MCQs to Complete the Set
181. Which type of network cable is most commonly used in modern LANs?
• a) Coaxial cable
• d) Serial cable
Answer: c) Twisted pair cable
182. Which layer in the OSI model is responsible for establishing, maintaining, and terminating
connections?
• a) Transport layer
• b) Session layer
• c) Presentation layer
• d) Application layer
Answer: b) Session layer
• a) 32
• b) 64
• c) 128
• d) 256
Answer: c) 128
• a) Connection-oriented
• b) Reliable delivery
• a) Switch
• b) Router
• c) Hub
• d) Modem
Answer: b) Router
187. In which of the following types of networks do all devices have equal authority and can initiate
communications?
• a) Client-server
• b) Peer-to-peer
• c) Hybrid
• d) Mesh
Answer: b) Peer-to-peer
• b) Assigning IP addresses
• d) Encrypting data
Answer: a) Blocking unauthorized access
189. Which of the following ports is used by FTP for data transfer?
• a) 21
• b) 23
• c) 80
• d) 443
Answer: a) 21
• a) HTTP
• b) POP3
• c) SMTP
• d) IMAP
Answer: c) SMTP
191. Which type of IP address is automatically assigned and temporary?
• a) Static
• b) Private
• c) Dynamic
• d) Public
Answer: c) Dynamic
192. Which network topology allows data to be transmitted to multiple nodes simultaneously using
the same cable?
• a) Star
• b) Bus
• c) Ring
• d) Mesh
Answer: b) Bus
193. Which layer of the OSI model converts data into signals suitable for transmission over a physical
medium?
• a) Data Link
• b) Transport
• c) Network
• d) Physical
Answer: d) Physical
• b) Data encryption
• c) Physical connectivity
• d) Routing of packets
Answer: a) Reliable data transfer and flow control
• a) SNMP
• b) NTP
• c) DHCP
• d) FTP
Answer: b) NTP
196. What is the default subnet mask for a Class C IP address?
• a) 255.0.0.0
• b) 255.255.0.0
• c) 255.255.255.0
• d) 255.255.255.255
Answer: c) 255.255.255.0
197. Which layer in the OSI model does IP addressing belong to?
• a) Application layer
• b) Transport layer
• c) Network layer
• a) 2001:0db8:85a3::8a2e:0370:7334
• b) 192.168.0.1
• c) fe80:2031::1
199. What is the primary function of the data link layer in the OSI model?
• b) Logical addressing
• d) Route selection
Answer: c) Error detection and frame synchronization
200. Which tool is commonly used to monitor and analyze network traffic?
• a) Ping
• b) Netstat
• c) Wireshark
• d) SSH
Answer: c) Wireshark
NETWORK MODELS: Protocol Layering, TCP/IP Protocol Suite, OSI Model
o a) Simplicity
o b) Modularity
o c) Duplication of functionality
o d) Flexibility
Answer: c
o a) OS operations
o b) Stacking books
o c) Building blocks
o d) Telephone calls
Answer: c
o a) 7
o b) 4
o c) 5
o d) 6
Answer: b
o a) Reduced overhead
o b) Abstraction of functions
o c) Faster transmission
o d) Removal of redundancy
Answer: b
6. Which layer of the protocol stack is responsible for logical communication between
application processes?
o a) Physical Layer
o b) Transport Layer
o c) Network Layer
o a) Application Layer
o c) Transport Layer
o d) Internet Layer
Answer: c
o a) UDP
o b) HTTP
o c) IP
o d) FTP
Answer: c
10. Protocol data units (PDUs) are exchanged between which of the following?
o a) 7
o b) 4
o c) 5
o d) 6
Answer: b
12. Which layer in the TCP/IP model is responsible for host-to-host communication?
o a) Application Layer
o c) Transport Layer
o d) Internet Layer
Answer: c
13. Which of the following protocols is used for email in the TCP/IP model?
o a) SMTP
o b) SNMP
o c) ARP
o d) IP
Answer: a
14. What is the responsibility of the Transport Layer in the TCP/IP model?
o a) Data encapsulation
o a) Connectionless communication
o c) Packet forwarding
o d) Logical addressing
Answer: b
16. UDP is best suited for which type of applications?
o a) Real-time streaming
o b) File transfer
o c) Email
o a) DNS
o b) HTTP
o c) DHCP
o d) FTP
Answer: c
18. Which of the following is a transport layer protocol in the TCP/IP suite?
o a) IP
o b) TCP
o c) HTTP
o d) DNS
Answer: b
19. Which TCP/IP protocol is used to find the MAC address of a host from its IP address?
o a) RARP
o b) ARP
o c) ICMP
o d) TCP
Answer: b
20. Which layer of the TCP/IP model does the "ping" command use?
o a) Application Layer
o b) Transport Layer
o c) Internet Layer
o a) ICMP
o b) ARP
o c) TCP
o d) FTP
Answer: a
22. Which of the following protocols works at the Application Layer of the TCP/IP model?
o a) TCP
o b) IP
o c) FTP
o d) ARP
Answer: c
23. Which protocol in the TCP/IP model is responsible for logical addressing?
o a) IP
o b) TCP
o c) UDP
o d) ICMP
Answer: a
24. Which of the following layers is NOT part of the TCP/IP protocol suite?
o b) Transport Layer
o c) Application Layer
o d) Session Layer
Answer: d
25. Which of the following protocols is used for terminal emulation in the TCP/IP model?
o a) FTP
o b) Telnet
o c) HTTP
o d) SMTP
Answer: b
Part 3: OSI Model
o a) 7
o b) 6
o c) 5
o d) 4
Answer: a
27. The OSI model was developed by which of the following organizations?
o a) IEEE
o b) ISO
o c) IETF
o d) ITU-T
Answer: b
28. Which layer of the OSI model is responsible for error detection and recovery?
o a) Physical Layer
o c) Transport Layer
o d) Session Layer
Answer: b
29. Which layer of the OSI model is responsible for data encryption?
o a) Transport Layer
o b) Session Layer
o c) Presentation Layer
o d) Application Layer
Answer: c
30. Which layer of the OSI model is responsible for establishing, managing, and terminating
sessions?
o a) Session Layer
o b) Transport Layer
o c) Application Layer
o d) Network Layer
Answer: a
31. In the OSI model, which layer translates between different data formats?
o a) Physical Layer
o b) Presentation Layer
o c) Transport Layer
o d) Application Layer
Answer: b
32. Which layer is responsible for determining the best path through a network?
o a) Network Layer
o c) Transport Layer
o d) Application Layer
Answer: a
33. Which layer defines the electrical and mechanical specifications of the transmission
medium?
o b) Physical Layer
o c) Network Layer
o d) Session Layer
Answer: b
34. The data unit at the Network Layer of the OSI model is called what?
o a) Segment
o b) Packet
o c) Frame
o d) Bit
Answer: b
35. Which layer of the OSI model handles flow control and reliable transmission of data?
o a) Application Layer
o c) Network Layer
o d) Transport Layer
Answer: d
36. Which of the following is a key function of the Data Link Layer in the OSI model?
o a) Path determination
o d) Signal conversion
Answer: b
37. In the OSI model, which layer is responsible for ensuring that data transferred between
systems can be reassembled in the correct order?
o a) Network Layer
o b) Transport Layer
o c) Session Layer
o a) Physical Layer
o b) Application Layer
o c) Internet Layer
o d) Presentation Layer
Answer: c
o a) Presentation Layer
o b) Application Layer
o c) Session Layer
o d) Network Layer
Answer: b
41. The PDU at the Transport Layer in the OSI model is called:
o a) Segment
o b) Packet
o c) Frame
o d) Bit
Answer: a
42. Which layer of the OSI model is responsible for data compression?
o a) Presentation Layer
o b) Transport Layer
o c) Network Layer
o d) Data Link Layer
Answer: a
43. Which of the following protocols works at the Application Layer of the OSI model?
o a) TCP
o b) IP
o c) HTTP
o d) ICMP
Answer: c
44. Which of the following is true about the OSI and TCP/IP models?
45. Which layer of the OSI model handles end-to-end message delivery and error recovery?
o a) Transport Layer
o b) Network Layer
o c) Application Layer
46. What is the PDU for the Data Link Layer in the OSI model?
o a) Segment
o b) Packet
o c) Frame
o d) Bit
Answer: c
47. Which layer is concerned with the syntax and semantics of the information exchanged?
o a) Presentation Layer
o c) Network Layer
o d) Session Layer
Answer: a
48. Which of the following statements about the OSI model is true?
o a) It defines specific protocols.
49. Which layer of the OSI model is primarily responsible for routing decisions?
o a) Transport Layer
o b) Session Layer
o c) Network Layer
50. In the OSI model, what is the main purpose of the Physical Layer?
51. Which OSI layer is responsible for managing multiple sessions between applications?
o a) Application Layer
o b) Session Layer
o c) Transport Layer
o d) Network Layer
Answer: b
52. Which of the following best describes the function of the Application Layer?
53. Which layer of the OSI model provides reliability through flow control?
o a) Physical Layer
o c) Transport Layer
o d) Application Layer
Answer: c
55. Which layer of the OSI model is responsible for packet sequencing?
o a) Transport Layer
o b) Session Layer
o c) Network Layer
57. Which layer of the OSI model is responsible for physical addressing?
o a) Transport Layer
o c) Network Layer
o d) Application Layer
Answer: b
58. Which of the following protocols operates at the Transport Layer of the OSI model?
o a) HTTP
o b) TCP
o c) FTP
o d) IP
Answer: b
59. Which layer of the OSI model is responsible for the representation of data?
o a) Transport Layer
o b) Presentation Layer
o c) Application Layer
o d) Network Layer
Answer: b
60. Which of the following layers provides end-to-end communication services for
applications?
o b) Network Layer
o c) Transport Layer
o d) Physical Layer
Answer: c
61. What is the main focus of the Network Layer in the OSI model?
o b) Process-to-process communication
o a) Application Layer
o b) Transport Layer
o c) Network Layer
o d) Session Layer
Answer: b
63. In the OSI model, which layer is responsible for managing the physical transmission of
data?
o a) Transport Layer
o c) Network Layer
o d) Physical Layer
Answer: d
64. Which of the following describes the function of the Session Layer?
o a) IP
o b) ICMP
o c) TCP
o d) HTTP
Answer: c
66. Which of the following statements about the OSI model is correct?
67. Which layer of the OSI model is responsible for the delivery of messages to the right
application?
o a) Application Layer
o b) Transport Layer
o c) Network Layer
o c) Encrypting data
o d) Routing packets
Answer: a
69. Which layer is responsible for handling data packets and forwarding them to their
destination?
o a) Transport Layer
o b) Network Layer
o d) Application Layer
Answer: b
70. What is the main purpose of the Data Link Layer in the OSI model?
• a) Signal
• b) Media
• c) Protocol
• d) Bandwidth
Answer: b) Media
• a) Continuous values
• b) Discrete values
• c) Infinite variations
• a) Analog signal
• b) Digital signal
• c) Modulated signal
6. The ability of a transmission medium to carry signals over a distance is known as:
• a) Bandwidth
• b) Transmission loss
• c) Signal strength
• d) Transmission capacity
Answer: d) Transmission capacity
• a) Attenuation
• b) Noise
• c) Distortion
9. Which of the following measures the maximum rate of data transmission over a medium?
• a) Latency
• b) Bandwidth
• c) Jitter
• d) Throughput
Answer: b) Bandwidth
• c) Coaxial cables
• d) All of the above
Answer: d) All of the above
• a) Wireless communication
• b) Wired communication
• c) Optical communication
• d) Digital communication
Answer: a) Wireless communication
• a) Radio waves
• b) Infrared signals
• d) Satellite communication
Answer: c) Fiber optic cables
14. What is the primary advantage of fiber optic cables over copper cables?
• a) Lower cost
• c) Easier installation
15. The standard for Ethernet cabling that supports speeds up to 1 Gbps is:
• a) Cat 3
• b) Cat 5e
• c) Cat 6
• d) Cat 7
Answer: b) Cat 5e
• a) Low cost
• b) Limited bandwidth
• c) High attenuation
• d) Easy to install
Answer: c) High attenuation
17. The maximum transmission distance for a standard Category 6 cable is:
• a) 50 meters
• b) 100 meters
• c) 200 meters
• d) 300 meters
Answer: b) 100 meters
18. Which type of modulation is used to encode digital data onto an analog signal?
• a) Distance
• b) Temperature
• c) Cable quality
Continued MCQs
21. Which type of cable uses a single strand of glass or plastic to transmit data?
• a) Coaxial cable
23. In which transmission media does data travel using light pulses?
• a) Twisted pair
• b) Coaxial
• c) Fiber optic
• d) Radio
Answer: c) Fiber optic
24. The electrical interference from external sources can be minimized by using:
• c) Coaxial cables
• a) Cat 5
• b) Cat 5e
• c) Cat 6
• d) Cat 6a
Answer: c) Cat 6
• a) Analog signal
• b) Digital signal
• c) Continuous signal
• d) Sinusoidal signal
Answer: b) Digital signal
• a) 10 Mbps
• b) 100 Mbps
• c) 1 Gbps
• d) 10 Gbps
Answer: c) 1 Gbps
• c) To encrypt data
• d) To segment networks
Answer: a) To amplify the signal
• a) Limited distance
• c) Greater flexibility
32. What type of modulation varies the amplitude of the carrier wave to encode information?
• a) Frequency Modulation
• b) Phase Modulation
• c) Amplitude Modulation
• d) Digital Modulation
Answer: c) Amplitude Modulation
• c) Filter traffic
• d) Encrypt data
Answer: b) Connect multiple devices in a network
34. In a wired network, which of the following media is least likely to be affected by
electromagnetic interference?
• b) Coaxial cable
• d) Ethernet cable
Answer: c) Fiber optic cable
• a) Radio waves
• b) Infrared
• c) Microwave
• c) Bandwidth fluctuation
• d) Error rate
Answer: a) Variability in packet delay
37. Which standard defines the physical layer and media access control for wired Ethernet?
• a) IEEE 802.11
• b) IEEE 802.3
• c) IEEE 802.15
• d) IEEE 802.16
Answer: b) IEEE 802.3
38. Which of the following cabling standards can support PoE (Power over Ethernet)?
• a) Cat 3
• b) Cat 5
• c) Cat 5e
• c) Reflection of signals
• d) Data collision
Answer: b) Interference between adjacent cables
• a) Copper wire
• c) Coaxial cable
41. Which of the following is a measure of how much data can be transmitted over a
communication channel in a given time?
• a) Latency
• b) Throughput
• c) Bandwidth
• d) Signal strength
Answer: c) Bandwidth
• a) Ring topology
• b) Star topology
• c) Mesh topology
• d) Bus topology
Answer: b) Star topology
• a) To transmit data
• b) To modulate signals
• d) To receive data
Answer: c) To convert digital data into analog signals
• a) To reduce costs
47. Which type of modulation is typically used in digital communications to represent bits?
• a) Amplitude modulation
• b) Frequency modulation
• c) Phase-shift modulation
48. A device that connects two different networks and forwards packets between them is known
as a:
• a) Hub
• b) Switch
• c) Router
• d) Repeater
Answer: c) Router
• a) Limited bandwidth
• b) High attenuation
50. Which of the following cabling standards allows for 10 Gbps speeds over longer distances?
• a) Cat 5e
• b) Cat 6a
• c) Cat 7
• d) Cat 8
Answer: b) Cat 6a
51. The maximum transmission distance for an unshielded twisted pair (UTP) cable is:
• a) 50 meters
• b) 100 meters
• c) 200 meters
• d) 300 meters
Answer: b) 100 meters
52. Which factor does NOT affect the quality of the transmission medium?
• a) Cable type
• b) Signal frequency
• d) Environmental conditions
Answer: c) Color of the cable
53. Which type of interference is caused by electrical devices operating near the transmission line?
• a) Thermal noise
• b) Inductive interference
• c) Crosstalk
• d) Impulse noise
Answer: b) Inductive interference
• c) To amplify signals
56. Which of the following is used to increase the transmission range of signals?
• a) Modem
• b) Repeater
• c) Switch
• d) Router
Answer: b) Repeater
• a) 100 MHz
• b) 250 MHz
• c) 500 MHz
• d) 1 GHz
Answer: b) 250 MHz
• a) Infrared
• b) Fiber optic
• c) Coaxial cable
59. The cabling standard that supports data rates up to 100 Gbps is:
• a) Cat 5
• b) Cat 6a
• c) Cat 7
• d) Cat 8
Answer: d) Cat 8
• a) Analog signal
• b) Digital signal
• c) Continuous signal
• d) Sinusoidal signal
Answer: b) Digital signal
• a) Telephone lines
• b) Computer networking
• c) Both a and b
• a) Cost
• b) Security vulnerabilities
• c) Speed
• d) Flexibility
Answer: b) Security vulnerabilities
66. The standard for wireless local area networks (WLAN) is:
• a) IEEE 802.3
• b) IEEE 802.11
• c) IEEE 802.15
• d) IEEE 802.16
Answer: b) IEEE 802.11
• a) White noise
• b) Thermal noise
• c) Impulse noise
• d) Inductive noise
Answer: c) Impulse noise
68. Which of the following cable types is typically used for video surveillance?
• a) Twisted pair
• b) Coaxial
• c) Fiber optic
69. The maximum distance for fiber optic cables in a single mode is:
• a) 100 meters
• b) 2 kilometers
• c) 10 kilometers
• d) 40 kilometers
Answer: c) 10 kilometers
• c) Amplify signals
• d) Encrypt data
Answer: a) Convert analog signals to digital
72. Which type of fiber optic cable is designed for long-distance communication?
• a) Multimode
• b) Single mode
• c) Coaxial
• d) Twisted pair
Answer: b) Single mode
• c) To amplify signals
• d) To store data
Answer: b) To route data between different networks
74. The process of converting a digital signal into an analog signal is known as:
• a) Demodulation
• b) Modulation
• c) Encoding
• d) Decoding
Answer: b) Modulation
• a) High bandwidth
• a) High flexibility
• b) Low cost
• d) Lightweight
Answer: c) Good resistance to interference
79. What type of network topology connects each device directly to every other device?
• a) Ring topology
• b) Star topology
• c) Mesh topology
• d) Bus topology
Answer: c) Mesh topology
81. Which of the following devices operates at the physical layer of the OSI model?
• a) Router
• b) Switch
• c) Hub
• d) Firewall
Answer: c) Hub
• a) Wired network
• b) Optical network
• c) Wireless network
• a) Noise
• b) Interference
• c) Signal attenuation
84. Which type of cable is used to connect devices in a local area network (LAN)?
• a) Fiber optic
• b) Coaxial
• c) Twisted pair
85. The most commonly used twisted pair cable in networking is:
• a) Cat 3
• b) Cat 5
• c) Cat 6
• d) Cat 7
Answer: b) Cat 5
• a) 10 Mbps
• b) 100 Mbps
• c) 1 Gbps
• d) 10 Gbps
Answer: d) 10 Gbps
87. The electrical signal that represents a '1' in digital transmission is known as:
• a) Logic high
• b) Logic low
• c) Noise
• d) Signal attenuation
Answer: a) Logic high
• d) Encrypt data
Answer: c) Facilitate communication between the computer and the network
89. The process of converting analog signals into digital format is known as:
• a) Demodulation
• b) Encoding
• c) Modulation
• d) Sampling
Answer: d) Sampling
• a) Shot noise
• b) Johnson noise
• c) Impulse noise
91. The transmission medium that uses light as the signal is known as:
• a) Coaxial cable
• d) Shielded cable
Answer: c) Fiber optic cable
• b) To route packets
• c) To encrypt data
• d) To filter traffic
Answer: a) To amplify the signal
• b) Encoding of data
• d) Error checking
Answer: d) Error checking
• a) Higher security
• b) Flexibility in installation
• d) Both b and c
Answer: d) Both b and c
97. The measure of how well a cable can transmit a signal without losing power is called:
• a) Bandwidth
• b) Throughput
• c) Attenuation
• d) Resistance
Answer: c) Attenuation
98. Which of the following network topologies has the highest reliability?
• a) Star
• b) Bus
• c) Ring
• d) Mesh
Answer: d) Mesh
• a) Amplitude modulation
• b) Frequency modulation
• c) Phase-shift modulation
100. The physical layer of the OSI model is concerned primarily with:
• a) Data formatting
• b) Data encryption
• d) Network protocols
Answer: c) The physical transmission of data
1. What is modulation?
• a) Frequency Modulation
• b) Phase Modulation
• c) Amplitude Modulation
• d) Quadrature Amplitude Modulation
Answer: c) Amplitude Modulation
11. In which type of multiplexing are time slots allocated to different signals?
• a) Analog to Digital
• b) Digital to Analog
• c) Analog to Analog
• d) Digital to Digital
Answer: a) Analog to Digital
14. What is the term used for the process of encoding information by varying the frequency
of the carrier wave?
• a) Amplitude Modulation
• b) Frequency Modulation
• c) Phase Modulation
• d) Digital Modulation
Answer: b) Frequency Modulation
• a) Amplitude Modulation
• b) Frequency Modulation
• c) Phase Modulation
• d) Pulse Code Modulation
Answer: b) Frequency Modulation
19. In Frequency Division Multiplexing (FDM), the total bandwidth of the channel must be:
20. Which of the following statements about Time Division Multiplexing (TDM) is true?
23. Which modulation technique encodes information in the phase of the signal?
• a) Amplitude Modulation
• b) Frequency Modulation
• c) Phase Shift Keying
• d) Pulse Code Modulation
Answer: c) Phase Shift Keying
24. Which of the following multiplexing methods is often used in digital cellular networks?
28. Which process is used to combine multiple data streams into one for transmission?
• a) Demodulation
• b) Multiplexing
• c) Modulation
• d) Encoding
Answer: b) Multiplexing
29. Which of the following techniques is used to prevent the overlapping of signals in Time
Division Multiplexing (TDM)?
• a) Framing
• b) Filtering
• c) Encoding
• d) Signal averaging
Answer: a) Framing
• a) Amplifier
• b) Modulator
• c) Demodulator
• d) Transceiver
Answer: b) Modulator
• a) Sampling
• b) Encoding
• c) Noise reduction
• d) Signal amplification
Answer: a) Sampling
34. What is the modulation technique that uses discrete levels of signal amplitude?
35. What is the maximum data rate in a communication channel defined by the Nyquist
formula?
• a) 2B log2(N)
• b) B log2(N)
• c) 2B
• d) N log2(B)
Answer: a) 2B log2(N)
36. In terms of bandwidth, what advantage does Time Division Multiplexing (TDM) have
over Frequency Division Multiplexing (FDM)?
38. Which digital modulation technique encodes data by varying both amplitude and phase?
Sure! Here’s a set of 50 multiple-choice questions (MCQs) on the Data Link Layer, covering
design issues, elementary protocols, error detection and correction, and switch working,
including numerical problems with solutions.
1. What is the primary function of the Data Link Layer in the OSI model?
• a) Routing
• b) Frame delimitation and addressing
• c) Error detection and correction
• d) Data formatting
Answer: b) Frame delimitation and addressing
2. Which of the following is NOT a design issue of the Data Link Layer?
• a) Framing
• b) Error detection
• c) Routing
• d) Flow control
Answer: c) Routing
• a) Modulating signals
• b) Dividing the data stream into manageable units
• c) Encrypting data
• d) Error correction
Answer: b) Dividing the data stream into manageable units
4. Which of the following protocols is used in the Data Link Layer for error detection?
• a) TCP
• b) UDP
• c) ARP
• d) HDLC
Answer: d) HDLC
5. What is the main purpose of error detection in the Data Link Layer?
6. How many bits are used in a standard Hamming code for error correction?
• a) 4
• b) 7
• c) 8
• d) 16
Answer: b) 7
7. In a Hamming code, how many parity bits are needed to correct 1-bit errors in a data word
of 4 bits?
• a) 1
• b) 2
• c) 3
• d) 4
Answer: b) 3
• a) Error correction
• b) Error detection
• c) Data compression
• d) Flow control
Answer: b) Error detection
• a) 1 + x^2 + x^3
• b) x^8 + x^2 + x + 1
• c) x^4 + x^3 + x^2 + 1
• d) x^7 + x^4 + 1
Answer: b) x^8 + x^2 + x + 1
10. If a frame contains 1000 bits and the CRC is 16 bits long, what is the total number of bits
transmitted?
• a) 1000
• b) 1016
• c) 1024
• d) 2000
Answer: b) 1016
Numerical Questions
11. Given a data block of 8 bits: 10110100. What is the Hamming code generated for this
data block if 4 parity bits are used?
Solution:
12. A parity bit is added to a data block of 7 bits. If the data is 1010110, what will be the
parity bit for even parity?
• a) 0
• b) 1
Solution:
• The number of 1's is 4 (even). To maintain even parity, the parity bit must be 0.
Answer: a) 0
13. If a frame has a length of 1500 bytes and a checksum of 32 bits is added, what is the total
length of the frame in bits?
• a) 12000
• b) 12016
• c) 15000
• d) 15016
Solution:
• Frame length = 1500 bytes = 1500 × 8 = 12000 bits
• Total length = 12000 + 32 = 12032 bits
Answer: b) 12032
• Performing binary division using the polynomial, the remainder will be calculated as
follows:
o Data: 11011010
o Polynomial: 100000111
o Remainder: 11000000 (after the calculation)
Answer: 11000000
15. If a switch forwards packets based on MAC addresses, how many frames can it handle
simultaneously if it has 8 ports and each port can handle 10 frames at once?
• a) 80
• b) 100
• c) 70
• d) 90
Solution:
• Total frames handled = Ports × Frames per port = 8 × 10 = 80 frames.
Answer: a) 80
More MCQs
• a) IP addressing
• b) MAC addressing
• c) Port addressing
• d) Subnet addressing
Answer: b) MAC addressing
17. Which of the following is a fundamental operation of the Data Link Layer?
• a) Routing
• b) Packet switching
• c) Frame sequencing
• d) Path determination
Answer: c) Frame sequencing
18. What type of error detection method uses an extra bit to ensure that the number of 1's in a
data block is even?
• a) Parity Check
• b) Checksum
• c) CRC
• d) Hamming Code
Answer: a) Parity Check
19. The Data Link Layer can use which of the following to prevent collisions in a network?
• a) CSMA/CD
• b) HTTP
• c) FTP
• d) SMTP
Answer: a) CSMA/CD
20. In error detection using checksums, what is the process of adding all the segments of data
called?
• a) XOR operation
• b) Addition
• c) Parity calculation
• d) Division
Answer: b) Addition
21. Which method of error correction can detect but not correct errors?
• a) Parity bit
• b) Hamming code
• c) Reed-Solomon code
• d) Block coding
Answer: a) Parity bit
22. A frame is transmitted with a length of 800 bits. If 32 bits are used for error detection,
what is the effective data payload?
• a) 768 bits
• b) 800 bits
• c) 832 bits
• d) 128 bits
Answer: a) 768 bits
• a) Network layer
• b) Transport layer
• c) Data Link layer
• d) Physical layer
Answer: c) Data Link layer
24. How many bits are needed to detect errors in a 12-bit data word using Hamming code?
• a) 3
• b) 4
• c) 5
• d) 6
Answer: b) 4
25. Which type of switch forwarding method sends packets as soon as the destination MAC
address is read?
26. Given a binary data block of 110010, how many parity bits are required if you want to
ensure that it can correct single-bit errors?
• a) 2
• b) 3
• c) 4
• d) 5
Solution:
• Number of bits (k) = 6
• Number of parity bits (p) must satisfy 2p≥k+p+12^p \geq k + p + 12p≥k+p+1.
• For p=3p = 3p=3, 23=82^3 = 823=8 which satisfies 6+3+1=106 + 3 + 1 =
106+3+1=10.
Answer: b) 3
27. A device uses CRC-16 for error detection. What is the number of bits in the CRC?
• a) 8 bits
• b) 12 bits
• c) 16 bits
• d) 32 bits
Answer: c) 16 bits
28. Which of the following describes a switch that learns and stores the MAC addresses of
connected devices?
• a) Static switch
• b) Dynamic switch
• c) Managed switch
• d) Unmanaged switch
Answer: b) Dynamic switch
29. What is the maximum length of a segment in Ethernet (IEEE 802.3) for effective
communication?
• a) 100 meters
• b) 200 meters
• c) 300 meters
• d) 1500 meters
Answer: a) 100 meters
30. If the transmitted data block is 10111010 and the parity check for even parity is added,
what will the new data block be?
• a) 10111010
• b) 101110100
• c) 101110101
• d) 101110110
Solution:
• Number of 1's = 6 (even), so parity bit = 0. New data block = 10111010.
Answer: a) 10111010
31. What is the maximum number of hosts in a network with a subnet mask of
255.255.255.0?
• a) 254
• b) 255
• c) 256
• d) 512
Solution:
• Hosts = 28−2=2542^8 - 2 = 25428−2=254 (subtracting 2 for network and broadcast
addresses).
Answer: a) 254
32. If a checksum is generated by summing up data segments of 64 bits each, what will be the
length of the checksum?
• a) 16 bits
• b) 32 bits
• c) 64 bits
• d) 128 bits
Answer: a) 16 bits
33. In a LAN with a switch, if a packet is received at port 2 destined for a device on port 5,
what will the switch do?
• a) Hamming Code
• b) CRC
• c) Checksum
• d) Parity Bit
Answer: d) Parity Bit
36. The binary data is 1101011. What is the even parity bit?
• a) 0
• b) 1
Solution:
• Number of 1's = 5 (odd). To make it even, the parity bit must be 1.
Answer: b) 1
37. For a data block of 15 bits, how many parity bits are required using Hamming code?
• a) 4
• b) 5
• c) 6
• d) 7
Solution:
• 2p≥15+p+12^p \geq 15 + p + 12p≥15+p+1
o For p=4p = 4p=4: 16≥15+4+116 \geq 15 + 4 + 116≥15+4+1 (satisfied).
Answer: a) 4
38. What is the error detection method that involves summing binary words and keeping the
overflow?
• a) Hamming Code
• b) Parity Check
• c) Checksum
• d) CRC
Answer: c) Checksum
39. A switch uses a buffer size of 512 KB. If each frame is 1500 bytes, how many frames can
it buffer at maximum?
• a) 340
• b) 360
• c) 350
• d) 370
Solution:
• Maximum frames = 512 KB÷1500 bytes=512×10241500≈349.52512 \, \text{KB} \div
1500 \, \text{bytes} = \frac{512 \times 1024}{1500} \approx
349.52512KB÷1500bytes=1500512×1024≈349.52.
• Maximum frames = 349.
Answer: a) 340
40. If a data packet is transmitted using a CRC-32 polynomial, what is the number of bits for
the CRC?
• a) 16
• b) 24
• c) 32
• d) 64
Answer: c) 32
41. What is the purpose of the control field in a data link frame?
• a) 24
• b) 48
• c) 64
• d) 128
Answer: b) 48
43. What is the method used by Ethernet to manage access to the shared medium?
• a) Token Ring
• b) CSMA/CD
• c) ARP
• d) HDLC
Answer: b) CSMA/CD
44. Which of the following protocols is not used in the Data Link Layer?
• a) Ethernet
• b) PPP
• c) IP
• d) HDLC
Answer: c) IP
45. In error detection using checksums, if two errors occur in the same segment, what will
happen?
46. What is the primary disadvantage of using parity bits for error detection?
48. What happens to a frame with a detected error in the Data Link Layer?
• a) It is transmitted again.
• b) It is dropped.
• c) It is logged.
• d) None of the above.
Answer: b) It is dropped.
49. Which error detection technique involves polynomial division?
• a) Parity Check
• b) Checksum
• c) Hamming Code
• d) CRC
Answer: d) CRC
50. If a network uses a switch to connect 10 devices, how many collision domains are
created?
• a) 1
• b) 10
• c) 5
• d) 0
Answer: b) 10
• a) CSMA/CD
• b) Token Ring
• c) ALOHA
• d) FDMA
Answer: c) ALOHA
• a) 18.4%
• b) 36.8%
• c) 50%
• d) 100%
Answer: b) 36.8%
• a) Continue transmitting
• b) Stop transmitting and wait a random amount of time
• c) Immediately retransmit
• d) Send a signal to all nodes
Answer: b) Stop transmitting and wait a random amount of time
• a) Token passing
• b) Controlled access
• c) Random access
• d) Hybrid access
Answer: c) Random access
7. In the CSMA/CD protocol, a station listens to the channel before transmitting to:
• a) Detect collisions
• b) Know the bandwidth
• c) Save power
• d) Reduce latency
Answer: a) Detect collisions
• a) High efficiency
• b) Simple implementation
• c) Requires time synchronization
• d) Uses a token for access
Answer: b) Simple implementation
• a) Randomly
• b) By a central controller
• c) Using a token
• d) Both b and c
Answer: d) Both b and c
• a) Wired networks
• b) Wireless networks
• c) Fiber optic networks
• d) Satellite networks
Answer: b) Wireless networks
11. Which MAC sublayer protocol uses a token to manage access to the medium?
• a) ALOHA
• b) CSMA/CD
• c) Token Ring
• d) Ethernet
Answer: c) Token Ring
• a) Higher throughput
• b) Simplicity
• c) Lower collision rate
• d) All of the above
Answer: a) Higher throughput
• a) Collision Detection
• b) Channel Detection
• c) Collision Domain
• d) Carrier Detection
Answer: a) Collision Detection
• a) High complexity
• b) High collision rate
• c) Low throughput
• d) Both b and c
Answer: d) Both b and c
15. Which of the following protocols is typically used in wired Ethernet networks?
• a) CSMA
• b) ALOHA
• c) CSMA/CD
• d) Token Bus
Answer: c) CSMA/CD
• a) ALOHA
• b) CSMA/CD
• c) TCP/IP
• d) Token Ring
Answer: c) TCP/IP
• a) In a wired environment
• b) In a wireless environment
• c) For high-speed networks
• d) For low-speed networks
Answer: b) In a wireless environment
• a) To manage routing
• b) To control access to the physical transmission medium
• c) To establish end-to-end connections
• d) To encrypt data
Answer: b) To control access to the physical transmission medium
• a) CSMA
• b) CSMA/CD
• c) CSMA/CA
• d) Token Ring
Answer: a) CSMA
More MCQs
21. Which access method allows only one station to transmit at a time?
• a) ALOHA
• b) CSMA/CD
• c) Controlled access
• d) Both b and c
Answer: c) Controlled access
• a) 18.4%
• b) 36.8%
• c) 100%
• d) 90%
Answer: b) 36.8%
• a) Randomly
• b) In a pre-defined sequence
• c) Based on time slots
• d) By priority
Answer: b) In a pre-defined sequence
25. Which protocol is best suited for networks with high collision rates?
• a) ALOHA
• b) CSMA/CD
• c) Token Ring
• d) None of the above
Answer: c) Token Ring
• a) It is simpler
• b) It is more efficient
• c) It reduces collisions in wireless networks
• d) None of the above
Answer: c) It reduces collisions in wireless networks
• a) Token-based access
• b) Carrier sense multiple access
• c) Circuit-switched connections
• d) All of the above
Answer: b) Carrier sense multiple access
29. In a CSMA/CD network, what is the purpose of the jam signal?
30. Which of the following protocols allows devices to share a common communication
medium?
• a) TCP
• b) ALOHA
• c) CSMA/CD
• d) Both b and c
Answer: d) Both b and c
31. What is the role of the Network Interface Card (NIC) in relation to the MAC sublayer?
• a) It encrypts data
• b) It controls access to the physical medium
• c) It establishes end-to-end connections
• d) It routes packets
Answer: b) It controls access to the physical medium
• a) Ethernet
• b) Token Ring
• c) ALOHA
• d) CSMA/CD
Answer: a) Ethernet
33. In a CSMA/CD network, after a collision is detected, what is the next step?
• a) It is too complex
• b) It requires a centralized control
• c) It has a high collision rate
• d) It is only suitable for small networks
Answer: c) It has a high collision rate
• a) CSMA/CD
• b) Token Ring
• c) CSMA/CA
• d) ALOHA
Answer: c) CSMA/CA
39. Which network topology does the Token Ring protocol typically use?
• a) Star
• b) Ring
• c) Bus
• d) Mesh
Answer: b) Ring
40. What happens when two devices transmit simultaneously in an ALOHA network?
41. In CSMA/CD, how does a station know that it has successfully transmitted its data?
• a) By receiving an acknowledgment
• b) By monitoring the channel for silence
• c) By checking the carrier signal
• d) By using a timer
Answer: a) By receiving an acknowledgment
• a) Managing IP addresses
• b) Providing error detection
• c) Access control to the physical medium
• d) Encrypting data packets
Answer: c) Access control to the physical medium
43. What type of network employs the Carrier Sense Multiple Access with Collision
Avoidance protocol?
• a) Wired networks
• b) Local Area Networks (LANs)
• c) Wireless networks
• d) Metropolitan Area Networks (MANs)
Answer: c) Wireless networks
• a) Randomly
• b) In a sequential manner
• c) On a first-come, first-served basis
• d) Using multiple paths
Answer: b) In a sequential manner
• a) Low efficiency
• b) High complexity
• c) Expensive hardware requirements
• d) High collision rates
Answer: a) Low efficiency
50. In a CSMA/CA protocol, how does a device indicate it wants to send data?
• a) By sending a signal
• b) By listening to the channel
• c) By waiting for a token
• d) By transmitting a small data packet
Answer: a) By sending a signal