Translate

Computer Networks Questions & Answers – Access Networks

 Computer Networks Questions & Answers – Access Networks


This set of Computer Networks Questions & Answers focuses on “Access Networks”.

 

1)  Which of this is not a constituent of residential telephone line?

a)  A high-speed downstream channel

b)  A medium-speed downstream channel

c)  A low-speed downstream channel

d)  None of the mentioned View Answer

Answer: c

Explanation: The third part is ordinary two way telephone channel.





     read more -> computer-networking




 

2)  In DSL telco provides these services

a)  Wired phone access

b)  ISP

c)  All of the mentioned

d)  None of the mentioned View Answer

Answer: c

Explanation: The same company which provides phone connection is also its ISP in DSL.

 

3)  The function of DSLAM is

a)  Convert analog signals into digital signals

b)  Convert digital signals into analog signals

c)  Amplify digital signals

d)  None of the mentioned View Answer

Answer: a

Explanation: The DSLAM located in telco’s Central Office does this function.

 

4)  The following term is not associted with DSL

a)  DSLAM

b)  CO

c)  Splitter

d)  CMTS View Answer

Answer: d

Explanation: Cable modem termination system is used in cable internet access.


5)  HFC contains

a)  Fibre cable

b)  Coaxial cable

c)  Both of the mentioned

d)  None of the mentioned View Answer

Answer: c Explanation: None.

 

6)  Choose the statement which is not applicable for cable internet access

a)  It is a shared broadcast medium

b)  It includes HFCs

c)  Cable modem connects home PC to Ethernet port

d)  Analog signal is converted to digital signal in DSLAM View Answer

Answer: d

Explanation: In cable access analog signal is converted to digital signal by CMTS.

 

7)  Among the optical-distribution architectures that is essentially switched ehternet is

a)  AON

b)  PON

c)  NON

d)  None of the mentioned View Answer

Answer:a

Explanation: Active optical networks are essentially switched ehternets.

 

8)  StarBand provides

a)  FTTH internet access

b)  Cable access

c)  Telephone access

d)  Satellite access View Answer

Answer: d Explanation: None.

 

9)  Home Access is provided by

a)  DSL

b)  FTTP


c)  Cable

d)  All of the mentioned View Answer

Answer: d Explanation: None.

 

10)   ONT is connected to splitter using

a)  High speed fibre cable

b)  HFC

c)  Optical cable

d)  None of the mentioned View Answer

Answer: c Explanation: None.

 

11)   These factors affect transmission rate in DSL

a)  The gauge of the twisted-pair line

b)  Degree of electrical interfernece

c)  Shadow fading

d)  Both a and b View Answer

Answer: d

Explanation: Because DSL is made of twisted wire copper pair.

 

Computer Networks Questions & Answers – Application Layer

This set of Computer Networks Questions & Answers focuses on “Application Layer”.

 

1)  This is not a application layer protocol

a)  HTTP

b)  SMTP

c)  FTP

d)  TCP

View Answer

Answer: d

Explanation: TCP is transport layer protocol

 

2)  The packet of information at the application layer is called

a)  Packet

b)  Message

c)  Segment

d)  Frame View Answer

Answer: b Explanation: None.

 

3)  This is one of the architecture paradigm

a)  Peer to peer

b)  Client-server

c)  HTTP

d)  Both a and b View Answer


Answer: d

Explanation: HTTP is a protocol.

 

4)  Application developer has permission to decide the following on transport layer side

a)  Transport layer protocol

b)  Maximum buffer size

c)  Both of the mentioned

d)  None of the mentioned View Answer

Answer: c Explanation: None.

 

5)  Application layer offers           service

a)  End to end

b)  Process to process

c)  Both of the mentioned

d)  None of the mentioned View Answer

Answer: a Explanation: None.

 

6)  E-mail is

a)  Loss-tolerant application

b)  Bandwidth-sensitive application

c)  Elastic application

d)  None of the mentioned View Answer

Answer: c

Explanation: Because it can work with available throughput.

 

7)  Pick the odd one out

a)  File transfer

b)  File download

c)  E-mail

d)  Interactive games View Answer

Answer: d

Explanation: Internet telephony is Loss-tolerant other applications are not.


8)  Which of the following is an application layer service ?

a)  Network virtual terminal

b)  File transfer, access, and management

c)  Mail service

d)  All of the mentioned View Answer

Answer: d Explanation: None.

 

9)  To deliver a message to the correct application program running on a host, the       address must be consulted

a)  IP

b)  MAC

c)  Port

d)  None of the mentioned View Answer

Answer: c Explanation: None.

 

10)   This is a time-sensitive service

a)  File transfer

b)  File download

c)  E-mail

d)  Internet telephony View Answer

Answer: d

Explanation: Internet telephony is Loss-tolerant other applications are not.

 

11)   Transport services available to applications in one or another form

a)  Reliable data transfer

b)  Timing

c)  Security

d)  All of the mentioned View Answer

Answer: d Explanation: None.

 

12)   Electronic mail uses this Application layer protocol

a)  SMTP


b)  HTTP

c)  FTP

d)  SIP

View Answer

Answer: a Explanation: None.

 

Computer Networks Questions & Answers HTTP

This set of Computer Networks Questions & Answers focuses on “HTTP”.

 

1.   The number of objects in a Web page which consists of 4 jpeg images and HTML text is    

a)  4

b)  1

c)  5

d)  None of the mentioned View Answer

Answer: c

Explanation: 4 jpeg images + 1 base HTML file.

 

2.   The default connection type used by HTTP is      

a)  Persistent

b)  Non-persistent

c)  Either of the mentioned

d)  None of the mentioned View Answer

Answer: a Explanation: None.

 

3.   The time taken by a packet to travel from client to server and then back to the client is called            

a)  STT

b)  RTT

c)  PTT

d)  None of the mentioned View Answer

Answer: b

Explanation: RTT stands for round-trip time.

 

4.   The HTTP request message is sent in       part of three-way handshake.

a)  First


b)  Second

c)  Third

d)  None of the mentioned View Answer

Answer: c Explanation: None.

 

5.   In the process of fetching a web page from a server the HTTP request/response takes     RTTs.

a)  2

b)  1

c)  4

d)  3

View Answer

Answer: b Explanation: None.

 

6.   The first line of HTTP request message is called    

a)  Request line

b)  Header line

c)  Status line

d)  Entity line View Answer

Answer: a

Explanation: The line followed by request line are called header lines and status line is the initial part of response message.

 

7.   The values GET, POST, HEAD etc are specified in     of HTTP message

a)  Request line

b)  Header line

c)  Status line

d)  Entity body View Answer

Answer: a

Explanation: It is specified in the method field of request line in the HTTP request message.

 

8.   The            method when used in the method field, leaves entity body empty.

a)  POST

b)  GET

c)  Both of the mentioned


d)  None of the mentioned View Answer

Answer: b Explanation: None.

 

9.   The HTTP response message leaves out the requested object when      method is used

a)  GET

b)  POST

c)  HEAD

d)  PUT

View Answer

Answer: c Explanation: None.

 

10.   Find the oddly matched HTTP status codes

a)  200 OK

b)  400 Bad Request

c)  301 Moved permanently

d)  304 Not Found View Answer

Answer: d

Explanation: 404 Not Found.

 

11.   Which of the following is not correct ?

a)  Web cache doesnt has its own disk space

b)  Web cache can act both like server and client

c)  Web cache might reduce the response time

d)  Web cache contains copies of recently requested objects View Answer

Answer: a Explanation: None.

 

12.   The conditional GET mechanism

a)  Imposes conditions on the objects to be requested

b)  Limits the number of response from a server

c)  Helps to keep a cache upto date

d)  None of the mentioned View Answer


Answer: c Explanation: None.

 

13.   Which of the following is present in both an HTTP request line and a status line?

a)  HTTP version number

b)  URL

c)  Method

d)  None of the mentioned View Answer

Answer: a Explanation: None.

 

 

 

Computer Networks Questions & Answers – Network Utilities

This set of Computer Networks Questions & Answers focuses on “Network Utilities”.

 

1)  Ping can

a)  Measure round-trip time

b)  Report packet loss

c)  Report latency

d)  All of the mentioned View Answer

Answer: d Explanation: None.

 

2)  Ping sweep is a part of

a)  Traceroute

b)  Nmap

c)  Route

d)  Ipconfig View Answer

Answer: b

Explanation: A ping sweep is a method that can establish a range of IP addresses which map to live hosts and are mostly used by network scanning tools like nmap.

 

3)  ICMP is used in

a)  Ping

b)  Traceroute

c)  Ifconfig


d)  Both a and b View Answer

Answer: d Explanation: None.

 

4)            command is used to manipulate TCP/IP routing table.

a)  route

b)  Ipconfig

c)  Ifconfig

d)  Traceroute View Answer

Answer: a Explanation: None.

 

5)  If you want to find the number of routers between a source and destination, the utility to be used is.

a)  route

b)  Ipconfig

c)  Ifconfig

d)  Traceroute View Answer

Answer: d Explanation: None.

 

6)  Which of the following is related to ipconfig in Microsoft Windows ?

a)  Display all current TCP/IP network configuration values

b)  Modify DHCP settings

c)  Modify DNS settings

d)  All of the mentioned View Answer

Answer: d Explanation: None.

 

7)  This allows to check if a domain is available for registration.

a)  Domain Check

b)  Domain Dossier

c)  Domain Lookup

d)  None of the mentioned View Answer


Answer: a Explanation: None.

 

8)  Choose the wrong statement

a)  Nslookup is used to query a DNS server for DNS data

b)  Ping is used to check connectivity

c)  Pathping combines the functionality of ping with that of route

d)  Ifconfig can configure TCP/IP network interface parameters View Answer

Answer: c

Explanation: Pathping combines the functionality of ping with that of traceroute (tracert).

 

Computer Networks Questions & Answers FTP

This set of Computer Networks Questions & Answers focuses on “FTP”.

 

1)  Expansion of FTP is

a)  Fine Transfer Protocol

b)  File Transfer Protocol

c)  First Transfer Protocol

d)  None of the mentioned View Answer

Answer: b Explanation: None.

 

2)  FTP is built on         architecture

a)  Client-server

b)  P2P

c)  Both of the mentioned

d)  None of the mentioned View Answer

Answer: a Explanation: None.

 

3)  FTP uses          parallel TCP connections to transfer a file

a)  1

b)  2

c)  3

d)  4

View Answer


Answer: b

Explanation: Control connection and data connection.

 

4)  Identify the incorrect statement

a)  FTP stands for File Transfer Protocol

b)  FTP uses two parallel TCP connections

c)  FTP sends its control information in-band

d)  FTP sends exactly one file over the data connection View Answer

Answer: c

Explanation: FTP is out-of-band as it has separate control connection.

 

5)  If 5 files are transfered from server A to client B in the same session. The number of TCP connection between A and B is

a)  5

b)  10

c)  2

d)  6

View Answer

Answer: d

Explanation: 1 control connection and other 5 for five file transfers.

 

6)  FTP server

a)  Mantains state

b)  Is stateless

c)  Has single TCP connection for a file transfer

d)  None of the mentioned View Answer

Answer: a Explanation: None.

 

7)  The commands, from client to server, and replies, from server to client, are sent across the control connection in bit ASCII format

a)  8

b)  7

c)  3

d)  5

View Answer


Answer: b Explanation: None.

 

8)  Find the FTP reply whose message is wrongly matched

a)  331 Username OK, password required

b)  425 Can’t open data connection

c)  452 Error writing file

d)  452 – Can’t open data connection View Answer

Answer: d Explanation: None.

 

9)  Mode of data transfer in FTP, where all the is left to TCP

a)  Stream mode

b)  Block mode

c)  Compressed mode

d)  None of the mentioned View Answer

Answer: a Explanation: None.

 

10)   The password is sent to the server using        command

a)  PASSWD

b)  PASS

c)  PASSWORD

d)  None of the mentioned View Answer

Answer: b Explanation: None.

 

Computer Networks Questions & Answers – Network Attacks

This set of Computer Networks Questions & Answers focuses on “Network Attacks”.

 

1)  The attackers a network of compromised devices known as

a)  Internet

b)  Botnet

c)  Telnet

d)  D-net View Answer


Answer: b Explanation: None.

 

2)  Which of the following is a form of DoS attack ?

a)  Vulnerability attack

b)  Bandwidth flooding

c)  Connection flooding

d)  All of the mentioned View Answer

Answer: d Explanation: None.

 

3)  The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host

a)  Vulnerability attack

b)  Bandwidth flooding

c)  Connection flooding

d)  All of the mentioned View Answer

Answer: c Explanation: None.

 

4) The DoS attack is which the attacker sends deluge of packets to the targeted host

a)  Vulnerability attack

b)  Bandwidth flooding

c)  Connection flooding

d)  All of the mentioned View Answer

Answer: b Explanation: None.

 

5)  Packet sniffers involve

a)  Active receiver

b)  Passive receiver

c)  Both of the mentioned

d)  None of the mentioned View Answer

Answer: b

Explanation: They donot inject packets into the channel.


6)  Sniffers can be deployed in

a)  Wired environment

b)  WiFi

c)  Ethernet LAN

d)  All of the mentioned View Answer

Answer: d Explanation: None.

 

7)  Firewalls are often configured to block

a)  UDP traffic

b)  TCP traffic

c)  Both of the mentioned

d)  None of the mentioned View Answer

Answer: a Explanation: None.


Computer Networks Questions & Answers Wireless LAN

This section of our 1000+ Computer Networks MCQs focuses on Wireless LAN.

 

1.  What is the access point (AP) in wireless LAN?

a)  device that allows wireless devices to connect to a wired network

b)  wireless devices itself

c)  both (a) and (b)

d)  none of the mentioned View Answer

Answer:a Explanation:None.

 

2.   In wireless ad-hoc network

a)  access point is not required

b)  access point is must

c)  nodes are not required

d)  none of the mentioned View Answer

Answer:a Explanation:None.

 

3.  Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

a)  CDMA

b)  CSMA/CA

c)  ALOHA


d)  none of the mentioned View Answer

Answer:b Explanation:None.

 

4.   In wireless distribution system

a)  multiple access point are inter-connected with each other

b)  there is no access point

c)  only one access point exists

d)  none of the mentioned View Answer

Answer:a Explanation:None.

 

5.   A wireless network interface controller can work in

a)  infrastructure mode

b)  ad-hoc mode

c)  both (a) and (b)

d)  none of the mentioned View Answer

Answer:c

Explanation:In infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.

 

6.   In wireless network an extended service set is a set of

a)  connected basic service sets

b)  all stations

c)  all access points

d)  none of the mentioned View Answer

Answer:a Explanation:None.

 

7.   Mostly               is used in wireless LAN.

a)  time division multiplexing

b)  orthogonal frequency division multiplexing

c)  space division multiplexing

d)  none of the mentioned View Answer


Answer:b Explanation:None.

 

8.  Which one of the following event is not possible in wireless LAN.

a)  collision detection

b)  Acknowledgement of data frames

c)  multi-mode data transmission

d)  none of the mentioned View Answer

Answer:a Explanation:None.

 

9.  What is Wired Equivalent Privacy (WEP) ?

a)  security algorithm for ethernet

b)  security algorithm for wireless networks

c)  security algorithm for usb communication

d)  none of the mentioned View Answer

Answer:b Explanation:None.

 

10.   What is WPA?

a)  wi-fi protected access

b)  wired protected access

c)  wired process access

d)  wi-fi process access View Answer

Answer:a Explanation:None.

 

Computer Networks Questions & Answers – WiMAX

This section of our 1000+ Computer Networks MCQs focuses on WiMAX.

 

1.  WiMAX stands for

a)  wireless maximum communication

b)  worldwide interoperability for microwave access

c)  worldwide international standard for microwave access

d)  none of the mentioned View Answer


Answer:b Explanation:None.

 

2.  WiMAX provides

a)  simplex communication

b)  half duplex communication

c)  full duplex communication

d)  none of the mentioned View Answer

Answer:c Explanation:None.

 

3.  WiMAX uses the

a)  orthogonal frequency division multiplexing

b)  time division multiplexing

c)  space division multiplexing

d)  all of the mentioned View Answer

Answer:a Explanation:None.

 

4.  Which one of the following modulation scheme is supported by WiMAX?

a)  binary phase shift keying modulation

b)  quadrature phase shift keying modulation

c)  quadrature amplitude modulation

d)  all of the mentioned View Answer

Answer:d Explanation:None.

 

5.  WiMAX MAC layer provides an interface between

a)  higher transport layers and physical layer

b)  application layer and network layer

c)  data link layer and network layer

d)  none of the mentioned View Answer

Answer:a Explanation:None.


6.   For encryption, WiMAX supports

a)  advanced encryption standard

b)  triple data encryption standard

c)  both (a) and (b)

d)  none of the mentioned View Answer

Answer:c Explanation:None.

 

7.  WiMAX provides

a)  VoIP services

b)  IPTV services

c)  both (a) and (b)

d)  none of the mentioned View Answer

Answer:c Explanation:None.

 

8.   Devices that provide the connectivity to a WiMAX network are known as

a)  subscriber stations

b)  base stations

c)  gateway

d)  none of the mentioned View Answer

Answer:a Explanation:None.

 

9.  WiMAX is mostly used for

a)  local area network

b)  metropolitan area network

c)  personal area network

d)  none of the mentioned View Answer

Answer:b Explanation:None.

 

10.   Which one of the following frequency is not used in WiMAX for communication?

a)  2.3 GHz

b)  2.4 GHz


c)  2.5 GHz

d)  3.5 GHz View Answer

Answer:b Explanation:None


यदि आप पिछले या फिर Next --- Daily use English Sentence बाले पोस्ट को पढना चाहते हैं, तो नीचे दिए गए link पर click करके पढें ।

 Thanks for reading Computer Networks Questions & Answers – Packet Switching & Circuit Switching

Newest
You are reading the newest post

Post a Comment

0 Comments