Cn - Objective Questions
Cn - Objective Questions
UNIT:I
3. Bits can be sent over guided and unguided media as analog signal by ___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
Answer: a
4. The portion of physical layer that interfaces with the media access control sublayer is
called ___________
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) physical transport sublayer
Answer: a
Answer: d
8. The physical layer translates logical communication requests from the ______ into
hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
Answer: a
10.. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suit
d) none of the mentioned
Answer:b
14) In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are
a) Added
b) Removed
c) Rearranged
d) Modified
Answer: a
18) The _______ is the physical path over which a message travels
a) Ppath
b) Medium
c) Protocol
d) Route
Answer: b
19) Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
Answer: c
25). TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) presentation layer
c) application layer
d) both (a) and (b)
Answer:d
26). Which layer links the network support layers and user support layers
a) session layer
b) data link layer
c) transport layer
d) network layer
Answer:c
36. PCs connected with --------------can also be used for education, entertainment, etc.
Answer: Modem
37. The meaning of a digital channel means that the channel is --------------.
Answer: Carrying digital data.
39. A different carrier frequency is used for each channel in --------------. Multiplexing.
Answer: Frequency Division
40. The Ethernet ___________ sub layer is responsible for communicating directly with
the physical layer.
Answer: Media Access Control(MAC)
UNIT:II
1. The data link layer takes the packets from _________ and encapsulates them into
frames for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Answer: a
3. Which sublayer of the data link layer performs data link functions that depend upon the
type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
Answer: b
6. When 2 or more bits in a data unit has been changed during the transmission, the error
is called ____________
a) random error
b) burst error
c) inverted error
d) double error
Answer:b
9. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer: c
10. The technique of temporarily delaying outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Answer: a
11. The data link layer takes the packets from _____ and encapsulates them into frames
for transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Answer:a
.
12. Which one of the following task is not done by data link layer?
a) framing
b) error control
c) flow control
d) channel coding
Answer:d
13. Which sublayer of the data link layer performs data link functions that depend
upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) none of the mentioned
Answer:b
16. When 2 or more bits in a data unit has been changed during the transmission, the error is
called
a) random error
b) burst error
c) inverted error
d) none of the mentioned
Answer:b
20. The technique of temporarily delaying outgoing outgoing acknowledgements so that they can
be hooked onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) none of the mentioned
Answer:a
21Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) none of the mentioned
Answer:b
Explanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is
not required.
26. Which one of the following event is not possible in wireless LAN.
a) collision detection
b) Acknowledgement of data frames
c) multi-mode data transmission
d) none of the mentioned
Answer:a
Explanation:None.
28 What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access
Answer:a
33. Aloha is the type of Random access protocol, It have two types one is -------- and another
is------------.
Answer : Pure Aloha and Slotted Aloha
35. Sliding Window Protocol. Sliding window protocols are --------- for reliable and sequential
delivery of data frames.
Answer: data link layer protocols
38. In Selective Repeat protocol, sender window size is always same as -------------
Answer: receiver window size
5. Which of the following routing algorithms can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer: d
6. Which of the following is not correct in relation to multi-destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers
Answer: c
7. A subset of a network that includes all the routers but contains no loops is called _______
a) spanning tree
b) spider structure
c) spider tree
d) special tree
Answer: a
8. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
Answer: d
15. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) none of the mentioned
Answer:c
16. Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
d) none of the mentioned
Answer:a
17. Which one of the following is not used in media access control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) none of the mentioned
Answer:d
22. Which one of the following routing algorithm can be used for network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Answer:d
24. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) none of the mentioned
Answer:a
25. Which one of the following algorithm is not used for congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) none of the mentioned
Answer:d
33. The network layer at the source is responsible for creating a packet from the data coming
from another_______
Answer: protocol
36. Which level is the network layer in the OSI model _________
Answer: Third
38. The network layer is considered as the _______ of the network layer.
Answer: Back bone
39. The network layer contains which hardware device--------------, -------------- and -------
Answer: Routers, Bridges and Switches
Unit IV
1. Transport layer aggregates data from different applications into a single stream before passing
it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
Answer: a
Answer: a. stream-oriented
13) TCP groups a number of bytes together into a packet called a ....
A. user datagram
B. segment
C. datagram
D. packet
Answer: B. segment
14) The .......... of TCP/IP protocol is responsible for figuring out how to get data to its
destination.
A. application layer
B. link layer
C. network layer
D. transport layer.
16) ......... is the protocol that hides the underlying physical network by creating a virtual network
view.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
Answer:A
Answer: B
18) Which of the following is not the name of Regional Internet Registries(RIR) to administer
the network number portion of IP address.
A. American Registry for Internet Numbers(ARIN)
B. Reseaux IP Europeans(RIPE)
C. Europeans Registry for Internet Numbers(ERIN)
D. Asia Pacific Network Information Center(APNIC)
Answer: C
Answer: A
20) ............ addresses use 21 bits for the and 8 bits for the portion of the IP address for TCP/IP
network.
A. Class A
B. Class B
C. Class C
D. Class D
Answer: C
Answer: B
22) .......... messages are never sent in response to datagrams with a broadcast or a multicast
destination address.
A. ICMP
B. ARP
C. IP
D. BOOTP
Answer: A
23) TCP assigns a sequence number to each segment that is being sent. The sequence number for
each segment is number of the ....... byte carried in that segment.
A. first
B. last
C. middle
D. zero
Answer: A
24) .......... is responsible for converting the higher level protocol address (IP addresses) to
physical network addresses.
A. Internet Protocol(IP)
B. Internet Control Message Protocol(ICMP)
C. Address Resolution Protocol(ARP)
D. Bootstrap Protocol(BOOTP)
Answer: C
Answer C
26) ........... is a process-to-process protocol that adds only port addresses, checksum error
control, and length information to the data from upper layer.
A. TCP
B. UDP
C. IP
D. ARP
Answer B
Answer A
Answer C
Answer: B
30) TCP/IP is a .......... hierarchical protocol suite developed before the OSI model.
A. seven-layer
B. five-layer
C. six-layer
D. four-layer
Answer: B. five-layer
35. Using which method in transport layer data integrity can be ensured _______
Answer: Check Sum
37. Transport layer can identify the symptoms of overload nodes using _________
Answer: Traffic Control
39. Congestion control can control traffic entry into a telecommunications network, so to avoid
_________
Answer: Congestive Collapse
4. Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
Answer: c
6. E-mail is _________
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c
8. To deliver a message to the correct application program running on a host, the _______
address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c
Answer:d
14) Application developer has permission to decide the following on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both of the mentioned
d) None of the mentioned
Answer: c
16) E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Answer: c
Explanation: Because it can work with available throughput.
19) To deliver a message to the correct application program running on a host, the _______
address must be consulted
a) IP
b) MAC
c) Port
d) None of the mentioned
Answer: c
27. If a server has no clue about where to find the address for a hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Answer:a
28) Which one of the following allows client to update their DNS entry as their IP address
change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Answer:a
30) The right to use a domain name is delegated by domain name registers which are accredited
by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Answer:d
31. The ____________ translates internet domain and host names to IP address.
Answer: Domain name system
32. Which one of the following allows a user at one site to establish a connection to another site
and then pass keystrokes from local host to remote host _________
Answer: telnet
34. Which one of the following protocol delivers/stores mail to receiver server _______
Answer: Simple mail transfer protocol