McqMate
301. |
Which of the following statements is not applicable for cable internet access? |
A. | it is a shared broadcast medium |
B. | it includes hfcs |
C. | cable modem connects home pc to ethernet port |
D. | analog signal is converted to digital signal in dslam |
Answer» D. analog signal is converted to digital signal in dslam |
302. |
StarBand provides __________ |
A. | ftth internet access |
B. | cable access |
C. | telephone access |
D. | satellite access |
Answer» D. satellite access |
303. |
Home Access is provided by __________ |
A. | dsl |
B. | fttp |
C. | cable |
D. | all of the mentioned |
Answer» D. all of the mentioned |
304. |
ONT is connected to splitter using _________ |
A. | high speed fibre cable |
B. | hfc |
C. | optical cable |
D. | twisted pair cable |
Answer» C. optical cable |
305. |
Which of the following factors affect transmission rate in DSL? |
A. | the gauge of the twisted-pair line |
B. | degree of electrical interfernece |
C. | shadow fading |
D. | the gauge of the twisted-pair line and degree of electrical interference |
Answer» D. the gauge of the twisted-pair line and degree of electrical interference |
306. |
The number of layers in ISO OSI reference model is __________ |
A. | 5 |
B. | 7 |
C. | 6 |
D. | 10 |
Answer» B. 7 |
307. |
Which of the following statements can be associated with OSI model? |
A. | a structured way to discuss and easier update system components |
B. | one layer may duplicate lower layer functionality |
C. | functionality at one layer no way requires information from another layer |
D. | it is an application specific network model |
Answer» C. functionality at one layer no way requires information from another layer |
308. |
OSI stands for __________ |
A. | open system interconnection |
B. | operating system interface |
C. | optical service implementation |
D. | open service internet |
Answer» A. open system interconnection |
309. |
The number of layers in ISO OSI reference model is __________ |
A. | 4 |
B. | 5 |
C. | 6 |
D. | 7 |
Answer» D. 7 |
310. |
TCP/IP model does not have ______ layer but OSI model have this layer. |
A. | session layer |
B. | transport layer |
C. | application layer |
D. | network layer |
Answer» A. session layer |
311. |
Which layer is used to link the network support layers and user support layers? |
A. | session layer |
B. | data link layer |
C. | transport layer |
D. | network layer |
Answer» C. transport layer |
312. |
Which address is used on the internet for employing the TCP/IP protocols? |
A. | physical address and logical address |
B. | port address |
C. | specific address |
D. | all of the mentioned |
Answer» D. all of the mentioned |
313. |
TCP/IP model was developed _____ the OSI model. |
A. | prior to |
B. | after |
C. | simultaneous to |
D. | with no link to |
Answer» A. prior to |
314. |
Which address is used to identify a process on a host by the transport layer? |
A. | physical address |
B. | logical address |
C. | port address |
D. | specific address |
Answer» C. port address |
315. |
Which layer provides the services to user? |
A. | application layer |
B. | session layer |
C. | presentation layer |
D. | physical layer |
Answer» A. application layer |
316. |
Transmission data rate is decided by ____________ |
A. | network layer |
B. | physical layer |
C. | data link layer |
D. | transport layer |
Answer» B. physical layer |
317. |
Which transmission media provides the highest transmission speed in a network? |
A. | coaxial cable |
B. | twisted pair cable |
C. | optical fiber |
D. | electrical cable |
Answer» C. optical fiber |
318. |
A single channel is shared by multiple signals by ____________ |
A. | analog modulation |
B. | digital modulation |
C. | multiplexing |
D. | phase modulation |
Answer» C. multiplexing |
319. |
Which of the following tasks is not done by data link layer? |
A. | framing |
B. | error control |
C. | flow control |
D. | channel coding |
Answer» D. channel coding |
320. |
Header of a frame generally contains ______________ |
A. | synchronization bytes |
B. | addresses |
C. | frame identifier |
D. | all of the mentioned |
Answer» D. all of the mentioned |
321. |
Automatic repeat request error management mechanism is provided by ________ |
A. | logical link control sublayer |
B. | media access control sublayer |
C. | network interface control sublayer |
D. | application access control sublayer |
Answer» A. logical link control sublayer |
322. |
CRC stands for __________ |
A. | cyclic redundancy check |
B. | code repeat check |
C. | code redundancy check |
D. | cyclic repeat check |
Answer» A. cyclic redundancy check |
323. |
Which of the following is a data link protocol? |
A. | ethernet |
B. | point to point protocol |
C. | hdlc |
D. | all of the mentioned |
Answer» D. all of the mentioned |
324. |
Which of the following is the multiple access protocol for channel access control? |
A. | csma/cd |
B. | csma/ca |
C. | both csma/cd & csma/ca |
D. | hdlc |
Answer» C. both csma/cd & csma/ca |
325. |
A 4 byte IP address consists of __________ |
A. | only network address |
B. | only host address |
C. | network address & host address |
D. | network address & mac address |
Answer» C. network address & host address |
326. |
User datagram protocol is called connectionless because _____________ |
A. | all udp packets are treated independently by transport layer |
B. | it sends data as a stream of related packets |
C. | it is received in the same order as sent order |
D. | it sends data very quickly |
Answer» A. all udp packets are treated independently by transport layer |
327. |
Socket-style API for windows is called ____________ |
A. | wsock |
B. | winsock |
C. | wins |
D. | sockwi |
Answer» B. winsock |
328. |
_______ topology requires a multipoint connection. |
A. | star |
B. | mesh |
C. | ring |
D. | bus |
Answer» D. bus |
329. |
WAN stands for __________ |
A. | world area network |
B. | wide area network |
C. | web area network |
D. | web access network |
Answer» B. wide area network |
330. |
In TDM, slots are further divided into __________ |
A. | seconds |
B. | frames |
C. | packets |
D. | bits |
Answer» B. frames |
331. |
The sharing of a medium and its link by two or more devices is called _________ |
A. | fully duplexing |
B. | multiplexing |
C. | micropleixng |
D. | duplexing |
Answer» B. multiplexing |
332. |
Multiplexing is used in _______ |
A. | packet switching |
B. | circuit switching |
C. | data switching |
D. | packet & circuit switching |
Answer» B. circuit switching |
333. |
Which multiplexing technique used to transmit digital signals? |
A. | fdm |
B. | tdm |
C. | wdm |
D. | fdm & wdm |
Answer» B. tdm |
334. |
The state when dedicated signals are idle are called __________ |
A. | death period |
B. | poison period |
C. | silent period |
D. | stop period |
Answer» C. silent period |
335. |
Multiplexing provides _________ |
A. | efficiency |
B. | privacy |
C. | anti jamming |
D. | both efficiency & privacy |
Answer» D. both efficiency & privacy |
336. |
In TDM, slots are further divided into _________ |
A. | seconds |
B. | frames |
C. | packets |
D. | bits |
Answer» B. frames |
337. |
The total nodal delay is given by ____________ |
A. | dnodal = dproc – dqueue + dtrans + dprop |
B. | dnodal = dproc + dtrans – dqueue |
C. | dnodal = dproc + dqueue + dtrans + dprop |
D. | dnodal = dproc + dqueue – dtrans – dprop |
Answer» C. dnodal = dproc + dqueue + dtrans + dprop |
338. |
Transmission delay does not depend on _____________ |
A. | packet length |
B. | distance between the routers |
C. | transmission rate |
D. | bandwidth of medium |
Answer» B. distance between the routers |
339. |
Propagation delay depends on ___________ |
A. | packet length |
B. | transmission rate |
C. | distance between the routers |
D. | speed of the cpu |
Answer» C. distance between the routers |
340. |
_____________ allows LAN users to share computer programs and data. |
A. | communication server |
B. | print server |
C. | file server |
D. | network |
Answer» C. file server |
341. |
With respect to physical media, STP cables stands for _________ |
A. | shielded twisted pair cable |
B. | spanning tree protocol cable |
C. | static transport protocol cable |
D. | shielded two power cable |
Answer» A. shielded twisted pair cable |
342. |
What is the max length of the Shielded twisted pair cable? |
A. | 100 ft |
B. | 200 ft |
C. | 100 m |
D. | 200 m |
Answer» C. 100 m |
343. |
What is the max data transfer rate of STP cables? |
A. | 10 mbps |
B. | 100 mbps |
C. | 1000 mbps |
D. | 10000 mbps |
Answer» B. 100 mbps |
344. |
Which connector does the STP cable use? |
A. | bnc |
B. | rj-11 |
C. | rj-45 |
D. | rj-69 |
Answer» C. rj-45 |
345. |
What is the central device in star topology? |
A. | stp server |
B. | hub/switch |
C. | pdc |
D. | router |
Answer» B. hub/switch |
346. |
What is the max data transfer rate for optical fiber cable? |
A. | 10 mbps |
B. | 100 mbps |
C. | 1000 mbps |
D. | 10000 mbps |
Answer» D. 10000 mbps |
347. |
Which of the following architecture uses the CSMA/CD access method? |
A. | arc net |
B. | ethernet |
C. | router |
D. | stp server |
Answer» B. ethernet |
348. |
The attacker using a network of compromised devices is known as _____________ |
A. | internet |
B. | botnet |
C. | telnet |
D. | d-net |
Answer» B. botnet |
349. |
Which of the following is a form of DoS attack? |
A. | vulnerability attack |
B. | bandwidth flooding |
C. | connection flooding |
D. | all of the mentioned |
Answer» D. all of the mentioned |
350. |
Packet sniffers involve ____________ |
A. | active receiver |
B. | passive receiver |
C. | legal receiver |
D. | partially-active receiver |
Answer» B. passive receiver |
351. |
Sniffers can be prevented by using _______________ |
A. | wired environment |
B. | wifi |
C. | ethernet lan |
D. | switched network |
Answer» D. switched network |
352. |
Firewalls are often configured to block ___________ |
A. | udp traffic |
B. | tcp traffic |
C. | sensitive traffic |
D. | best-effort traffic |
Answer» A. udp traffic |
353. |
UTP is commonly used in __________ |
A. | dsl |
B. | fttp |
C. | http |
D. | none of the mentioned |
Answer» A. dsl |
354. |
Terrestrial radio channels are broadly classifed into _____ groups. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 1 |
Answer» B. 3 |
355. |
A local telephone network is an example of a _______ network. |
A. | packet switched |
B. | circuit switched |
C. | bit switched |
D. | line switched |
Answer» B. circuit switched |
356. |
Most packet switches use this principle ____________ |
A. | stop and wait |
B. | store and forward |
C. | store and wait |
D. | stop and forward |
Answer» B. store and forward |
357. |
What are the Methods to move data through a network of links and switches? |
A. | packet switching and line switching |
B. | circuit switching and line switching |
C. | line switching and bit switching |
D. | packet switching and circuit switching |
Answer» D. packet switching and circuit switching |
358. |
In _________ systems, resources are allocated on demand. |
A. | packet switching |
B. | circuit switching |
C. | line switching |
D. | frequency switching |
Answer» A. packet switching |
359. |
Which of the following is not an application layer service? |
A. | network virtual terminal |
B. | file transfer, access, and management |
C. | mail service |
D. | error control |
Answer» D. error control |
360. |
Which is not a application layer protocol? |
A. | http |
B. | smtp |
C. | ftp |
D. | tcp |
Answer» D. tcp |
361. |
The packet of information at the application layer is called __________ |
A. | packet |
B. | message |
C. | segment |
D. | frame |
Answer» B. message |
362. |
Which one of the following is an architecture paradigms? |
A. | peer to peer |
B. | client-server |
C. | http |
D. | both peer-to-peer & client-server |
Answer» D. both peer-to-peer & client-server |
363. |
Application layer offers _______ service. |
A. | end to end |
B. | process to process |
C. | both end to end and process to process |
D. | none of the mentioned |
Answer» A. end to end |
364. |
E-mail is _________ |
A. | loss-tolerant application |
B. | bandwidth-sensitive application |
C. | elastic application |
D. | none of the mentioned |
Answer» C. elastic application |
365. |
Pick the odd one out. |
A. | file transfer |
B. | file download |
C. | |
D. | interactive games |
Answer» D. interactive games |
366. |
Which of the following is an application layer service? |
A. | network virtual terminal |
B. | file transfer, access, and management |
C. | mail service |
D. | all of the mentioned |
Answer» D. all of the mentioned |
367. |
Which is a time-sensitive service? |
A. | file transfer |
B. | file download |
C. | |
D. | internet telephony |
Answer» D. internet telephony |
368. |
Transport services available to applications in one or another form _________ |
A. | reliable data transfer |
B. | timing |
C. | security |
D. | all of the mentioned |
Answer» D. all of the mentioned |
369. |
Electronic mail uses which Application layer protocol? |
A. | smtp |
B. | http |
C. | ftp |
D. | sip |
Answer» A. smtp |
370. |
The ____________ translates internet domain and host names to IP address. |
A. | domain name system |
B. | routing information protocol |
C. | network time protocol |
D. | internet relay chat |
Answer» A. domain name system |
371. |
Application layer protocol defines ____________ |
A. | types of messages exchanged |
B. | message format, syntax and semantics |
C. | rules for when and how processes send and respond to messages |
D. | all of the mentioned |
Answer» D. all of the mentioned |
372. |
When displaying a web page, the application layer uses the _____________ |
A. | http protocol |
B. | ftp protocol |
C. | smtp protocol |
D. | tcp protocol |
Answer» A. http protocol |
373. |
The default connection type used by HTTP is _________ |
A. | persistent |
B. | non-persistent |
C. | can be either persistent or non-persistent depending on connection request |
D. | none of the mentioned |
Answer» A. persistent |
374. |
The HTTP request message is sent in _________ part of three-way handshake. |
A. | first |
B. | second |
C. | third |
D. | fourth |
Answer» C. third |
375. |
The first line of HTTP request message is called _____________ |
A. | request line |
B. | header line |
C. | status line |
D. | entity line |
Answer» A. request line |
376. |
The __________ method when used in the method field, leaves entity body empty. |
A. | post |
B. | send |
C. | get |
D. | put |
Answer» C. get |
377. |
Which of the following is not correct? |
A. | web cache doesnt has its own disk space |
B. | web cache can act both like server and client |
C. | web cache might reduce the response time |
D. | web cache contains copies of recently requested objects |
Answer» A. web cache doesnt has its own disk space |
378. |
HTTP is ________ protocol. |
A. | application layer |
B. | transport layer |
C. | network layer |
D. | data link layer |
Answer» A. application layer |
379. |
In the network HTTP resources are located by |
A. | uniform resource identifier |
B. | unique resource locator |
C. | unique resource identifier |
D. | union resource locator |
Answer» A. uniform resource identifier |
380. |
FTP server listens for connection on port number ____________ |
A. | 20 |
B. | 21 |
C. | 22 |
D. | 23 |
Answer» B. 21 |
381. |
The File Transfer Protocol is built on ______________ |
A. | data centric architecture |
B. | service oriented architecture |
C. | client server architecture |
D. | connection oriented architecture |
Answer» C. client server architecture |
382. |
In File Transfer Protocol, data transfer cannot be done in ___________ |
A. | stream mode |
B. | block mode |
C. | compressed mode |
D. | message mode |
Answer» D. message mode |
383. |
Expansion of FTP is __________ |
A. | fine transfer protocol |
B. | file transfer protocol |
C. | first transfer protocol |
D. | fast transfer protocol |
Answer» B. file transfer protocol |
384. |
FTP is built on _____ architecture. |
A. | client-server |
B. | p2p |
C. | data centric |
D. | service oriented |
Answer» A. client-server |
385. |
FTP uses _________ parallel TCP connections to transfer a file. |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» B. 2 |
386. |
Identify the incorrect statement regarding FTP. |
A. | ftp stands for file transfer protocol |
B. | ftp uses two parallel tcp connections |
C. | ftp sends its control information in-band |
D. | ftp sends exactly one file over the data connection |
Answer» C. ftp sends its control information in-band |
387. |
FTP server _____________ |
A. | maintains state information |
B. | is stateless |
C. | has single tcp connection for a file transfer |
D. | has udp connection for file transfer |
Answer» A. maintains state information |
388. |
Find the FTP reply whose message is wrongly matched. |
A. | 331 – username ok, password required |
B. | 425 – can’t open data connection |
C. | 452 – error writing file |
D. | 452 – can’t open data connection |
Answer» D. 452 – can’t open data connection |
389. |
The password is sent to the server using ________ command |
A. | passwd |
B. | pass |
C. | password |
D. | pword |
Answer» B. pass |
390. |
When the mail server sends mail to other mail servers it becomes ____________ |
A. | smtp server |
B. | smtp client |
C. | peer |
D. | master |
Answer» B. smtp client |
391. |
If you have to send multimedia data over SMTP it has to be encoded into _______ |
A. | binary |
B. | signal |
C. | ascii |
D. | hash |
Answer» C. ascii |
392. |
The underlying Transport layer protocol used by SMTP is ________ |
A. | tcp |
B. | udp |
C. | either tcp or udp |
D. | imap |
Answer» A. tcp |
393. |
Choose the statement which is wrong incase of SMTP? |
A. | it requires message to be in 7bit ascii format |
B. | it is a pull protocol |
C. | it transfers files from one mail server to another mail server |
D. | smtp is responsible for the transmission of the mail through the internet |
Answer» B. it is a pull protocol |
394. |
Internet mail places each object in _________ |
A. | separate messages for each object |
B. | one message |
C. | varies with number of objects |
D. | multiple messages for each object |
Answer» B. one message |
395. |
Typically the TCP port used by SMTP is _________ |
A. | 25 |
B. | 35 |
C. | 50 |
D. | 15 |
Answer» A. 25 |
396. |
A session may include ________ |
A. | zero or more smtp transactions |
B. | exactly one smtp transactions |
C. | always more than one smtp transactions |
D. | number of smtp transactions cant be determined |
Answer» A. zero or more smtp transactions |
397. |
Which of the following is an example of user agents for e-mail? |
A. | microsoft outlook |
B. | |
C. | |
D. | tumblr |
Answer» A. microsoft outlook |
398. |
User agent does not support this ___________ |
A. | composing messages |
B. | reading messages |
C. | replying messages |
D. | routing messages |
Answer» D. routing messages |
399. |
SMTP connections secured by SSL are known as _____________ |
A. | smtps |
B. | ssmtp |
C. | snmp |
D. | starttls |
Answer» A. smtps |
400. |
SMTP uses which of the following TCP port? |
A. | 22 |
B. | 23 |
C. | 21 |
D. | 25 |
Answer» D. 25 |
Done Reading?