0% found this document useful (0 votes)
10 views7 pages

Test MMT

The document consists of a series of multiple-choice questions related to networking concepts, protocols, and layers. Topics covered include transport protocols, data link layer units, application layer protocols, network types, and various functionalities of OSI and TCP/IP models. It also addresses specific technical details such as error detection, transmission methods, and network configurations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views7 pages

Test MMT

The document consists of a series of multiple-choice questions related to networking concepts, protocols, and layers. Topics covered include transport protocols, data link layer units, application layer protocols, network types, and various functionalities of OSI and TCP/IP models. It also addresses specific technical details such as error detection, transmission methods, and network configurations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1. Which of the following transport protocols of HTTP?

A. TCP
B. UDP
C. IP
D. ICMP
2. A data unit on a data link layer is known as ______________.
A. Bit
B. Frame
C. Packet
D. Segment
3. Which of the following is an application layer protocol?
A. IP
B. HTTP
C. UDP
D. TCP
4. Bluetooth is an example of _____
A. Local Area Network
B. Personal Area Network
C. Wide Area Network
D. Metropolitan Area Network
5. In the layers model, as the data packet moves from the upper to the lower layers, headers
are _____
A. Added
B. Rearranged
C. Removed
D. Modified
6. The _____ is the physical transmission over which a message travels.
A. Path
B. Medium
C. Route
D. Protocol
7. A ________________ communication network takes messages from a single sender and
transmits to all endpoints on the network.
A. Point - to - Point.
B. Broadcast.
C. Multicast.
D. None of the mentioned.
8. In a LAN, which address is used to transfer frames to the appropriate destination?
A. MAC address
B. IP address
C. Domain name
D. None of the mentioned
9. Which service(s) does the Network layer provide?
A. None of the mentioned
B. Error control service
C. Flow control service
D. File transfer service
10. This layer is in OSI model and NOT in IP model?
A. Application layer
B. Presentation layer and Session layer
C. Presentation layer
D. Session layer
11. The functionalities of presentation layer includes _____
A. All of the mentioned
B. Data compression
C. Data encryption
D. Data decryption
12. What are the following planes organized for the network layer of the computer network?
A. Physical plane, Data link plane
B. MAC plane, Data link plane
C. Control plane, Data plane
D. Data link plane, Transport plane
13. DNS is a domain-name-service and provided by _____
A. UDP
B. TCP
C. HTTP
D. None of the mentioned
14. Which one of the following protocols does the transport layer use for communication
over the Internet?
A. TCP
B. UDP
C. TCP and UDP
D. IP
15. Which OSI layer is providing end-to-end communication with reliable service?
A. Session layer
B. Transport layer
D. Network layer
D. Data link layer
16. Which OSI layer is dividing the transmitted packet into frames?
A. Data link layer
B. Application layer
C. Network layer
D. Transport layer
17. Which OSI layer is determining which route through the network?
A. Data link layer
B. Network layer
C. Transport layer
D. None of the mentioned
18. Which of the following is a characteristic of the Switch?
A. Plug-and-play
B. Self-learning
C. Routing
D. Plug-and-play and Self-learning
19. Which of the following statements is TRUE for optical fiber?
A. All of the mentioned
B. Large bandwidth
C. Long distance transmission
D. The cost of communication is increasingly independent of distance
20. Which of the following TCP ports is used by SMTP?
A. 22
B. 23
C. 24
D. 25
22. What is the binary sequence for the polynomial code x^3 + x^2 + 1?
A. 111
B. 1110
C. 0111
D. 1101
23. What is the binary sequence for the polynomial arithmetic x^7 + x^6 + x^5 + x^2 + 1?
A. 11011101
B. 11100111
C. 11101101
D. 11100101
24.Which of the following standards is recommended for the Ethernet network?
A. IEEE 802.16
B. IEEE 802.3
C. IEEE802.15
D. IEEE 802.11
25. The checksum of 0000 and 0000 is _____
A. 0101
B. 1010
C. 0000
D. 1111
26. Which of these is not an edge device?
A. PC
B. Smartphones
C. Servers
D. Switch
27. Ensuring that information is not changed during transfer is associated with _____
A. Authentication
B. Integrity
C. Confidentiality
D. Availability
28. Which of the basic elements of ARQ is associated with negative acknowledgement?
A. Error detecting code
B. NAKs
C. ACKs
D. Timeout mechanism
29. Which of the following statements are TRUE for the best-effort service with UDP?
A. Packets can arrive with errors or be lost
B. All of the mentioned
C. Packets can arrive out-of-order
D. Packets can arrive after very long delays
30. Carrier Sense Multiple Access (CSMA) is based on medium called _____
A. Sense before transmit
B. Sense before collision
C. Listen before sending
D. Listen before talk
31. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
A. CDMA
B. CSMA/CA
C. ALOHA
D. CSMA/CD
32. The physical layer is responsible for _____
A. Line coding
B. Channel coding
C. Modulation
D. All of the mentioned
33. Which of the following is the correct arrangement of data units of the OSI model based
on a top-down approach?
A. Data, Frame, Packet, Segment, Bit
B. Data, Packet, Segment, Frame, Bit
C. Data, Segment, Packet, Frame, Bit
D. Data, Segment, Frame, Packet, Bit
34. In the Internet, packet switching is at the _____
A. Application layer
B. Network layer
C. Data link layer
D. Physical layer
35. For a 10Mbps Ethernet link, if the length of the packet is 32 bits, the transmission delay
is _____ microseconds
A. 320
B. 0.32
C. 32
D. 3.2
36. Which of the following is the implementation of distance vector approach in the IP
routing protocol?
A. OSPF
B. RIP
C. BGP
D. None of the mentioned
37. The data link layer takes the packets from _____ and encapsulates them into frames..
A. Network layer
B. Physical layer
C. Transport layer
D. Application layer
38. CRC is _____
A. cyclic redundancy check
B. code repeat check
C. code redundancy check
D. cyclic repeat check
39. ICMP in ping command is primarily used for _____
A. error and diagnostic functions
B. addressing
C. forwarding
D. none of the mentioned
40. Which is an application layer protocol?
A. HDLC
B. SMTP
C. UDP
D. TCP
41. Which application layer protocol does the email service use?
A. SMTP
B. HTTP
C. FTP
D. SIP
42. Which is a time-sensitive (requires low delay) service?
A. File transfer
B. Web service
C. Email
D. Internet telephony
43. Which frame field is used by a destination node to detect the transmitted data signal has
not been changed by interference, distortion, or signal loss?
A. Transport layer error check field
B. Error correction process field
C. Flow control field
D. Frame check sequence field
44. Which of the following is a function of the Data link layer?
A. Defines the electrical characteristics of signals passed between the computer and
communication devices
B. Provides error detection and correction
C. Select path for transferring data
D. None of the mentioned
45. What will happen if the default gateway address is incorrectly configured on a host?
A. The host cannot communicate with hosts in other networks.
B. The host cannot communicate with other hosts in the local network.
C. A ping from the host to 127.0.0.1 would not be successful.
D. The switch will not forward packets initiated by the host.
46. Which two protocols operate at the top layer of the TCP/IP protocol suite?
A. HTTP and DNS
B. DNS and IP
C. IP and TCP
D. TCP and Ethernet
47. What does the term attenuation mean in data communication?
A. Strengthening of a signal by a networking device
B. Leakage of signals from one cable pair to another
C. Loss of signal strength as distance increases
D. Time for a signal to reach its destination
48. Which subnet would include the address 192.168.1.96?
A. 192.168.1.32/27
B. 192.168.1.32/28
C. 192.168.1.64/29
D. 192.168.1.64/26
49. What service is provided by HTTP?
A. An application that allows real-time chatting among remote users.
B. Uses encryption to secure the exchange of text, graphic images, sound, and video on the
web.
C. Allows for data transfers between a client and a file server.
D. A basic set of rules for exchanging text, graphic images, sound, video, and other
multimedia files on the web.
50. The packet has a destination port number of 67. What service is the client requesting?
A. Telnet
B. FTP
C. SSH
D. DHCP
51. Which type of server relies on record types such as A, NS, AAAA, and MX in order to
provide services?
A. Email
B. File
C. Web
D. DNS
52. A network administrator is adding a new LAN to a branch office. The new LAN must
support 200 connected devices. What is the smallest network mask that the network
administrator can use for the new network?
A. 255.255.255.224
B. 255.255.255.240
C. 255.255.255.192
D. 255.255.255.0
53. Which of the following is not an application layer protocol?
A. HTTP
B. SMTP
C. FTP
D. TCP
54. Which value, that is contained in an IPv4 header field, is decremented by each router that
receives a packet?
A. Differentiated Services
B. Fragment Offset
C. Header Length
D. Time-to-Live
55. Which of the random access protocols does the Wi-Fi apply?
A. CSMA/CD
B. CSMA/CA
C. ALOHA
D. Slotted ALOHA
56. The TCP/IP model does not have _____
A. Application layer
B. Transport layer
C. Network layer
D. Session layer
57. What technique is used with UTP cable to help protect against signal interference from
crosstalk?
A. Terminating the cable with special grounded connectors
B. Twisting the wires together into pairs
C. Wrapping a foil shield around the wire pairs
D. Encasing the cables within a flexible plastic sheath
58. The packet has a destination port number of 53. What service is the client requesting?
A. SSH
B. FTP
C. Telnet
D. DNS
59. What service is provided by HTTPS?
A. Allows remote access to network devices and servers.
B. Resolves domain names, such as cisco.com, into IP addresses.
C. Uses encryption to provide secure remote access to network devices and servers.
D. Uses encryption to secure the exchange of text, graphic images, sound, and video on the
web.
60. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination
address be in the frame when it leaves host A?
A. AA:AA:AA:AA:AA:AA
B. CC:CC:CC:CC:CC:CC
C. BB:BB:BB:BB:BB:BB
D. DD:DD:DD:DD:DD:DD

You might also like