Networking MCQ-2

Data Communication and Networking MCQ Questions and Answers


1. Communication between a computer and a keyboard involves ____________ transmission





Answer : D
Explanation : In simplex transmission, data flows in single direction which in this case refers to the data flowing from the keyboard to the computer. Another example would be of the mouse where the data flows from the mouse to the computer only.


2. The _______ is the physical path over which a message travels.





Answer : B
Explanation : Messages travel from sender to receiver via a physical path called the medium using a set of methods/rules called protocol. Mediums can be guided (wired) or unguided (wireless).


3. Home access is provided by





Answer : D
Explanation : Home Internet Access is provided by DSL, FTTP, and Cable. FTTP provides the fastest speeds followed by the cable connections and then the DSLs. FTTP is popularly used in modern connections.


4. Choose the statement which is not applicable for a cable internet access





Answer : D
Explanation : CMTS stands for Cable modem termination system. In cable access analog signal is converted to digital signal by CMTS. In cable internet access, internet is not provided through telephone lines. DSLAM is used by Telecom companies.


5. Two devices can share a singles link





Answer : B


Networking MCQ

6. Transmission data rate is decided by





Answer : B
Explanation : Basically the transmission speed is determined by the cables and connectors used. Hence it is physical layer that determines the transmission speed in network.


7. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______





Answer : B
Explanation : In OSI reference model, when data packet moves from lower layers to higher layer, headers get removed. Whereas when the data packet moves from higher layer to lower layers, headers are added.


8. A single channel is shared multiple signals by





Answer : C
Explanation : Multiplexing is achieved by using a device called Multiplexer (MUX) that combines n input lines to generate a single output line.


9. In virtual circuit network each packet contains





Answer : B
Explanation : A short VC number also called as VCID (virtual circuit identifier) is a type of identifier which is used to distinguish between several virtual circuits in a connection oriented circuit switched network.


10. Automatic repeat request error management mechanism is provided by





Answer : A
Explanation : The logical link control is a sublayer of data link layer whose main function is to manage traffic, flow and error control.


Networking MCQ

11. Which of the following is a version of UDP with congestion control?





Answer : A
Explanation : The datagram congestion control is a transport layer protocol which deals with reliable connection setup, teardown, congestion control, explicit congestion notification, and feature negotiation.


12. Which of the following is not used to generate dynamic web pages ?





Answer : D
Explanation : All of above are used to create dyamic webpage.


13. Data communication system within a building or campus is





Answer : A
Explanation : LAN is an abbreviation for Local Area Network. This network interconnects computers in a small area such as schools, offices, residence etc.


14. In segment header sequence number and acknowledgment number field refers to





Answer : A
Explanation : TCP has to ensure ordered delivery of packets, sequence number and acknowledgement number are used to identify the byte number of the packet in the stream of bytes being transmitted.


15. The value of acknowledgement field in a segment defines





Answer : C
Explanation : The acknowledgement field in a segment defines the sequence number of the byte which is to be received next i.e. sequence number of byte that the sender should transmit next.


Networking MCQ

16. In wireless distribution system





Answer : A
Explanation : A Wireless Distribution System allows the connection of multiple access points together. It is used to expand a wireless network to a larger network.


17. A wireless network interface controller can work in





Answer : C
Explanation : A wireless network interface controller works on the physical layer and the data link layer of the OSI model. Infrastructure mode WNIC needs access point but in ad-hoc mode access point is not required.


18. The DOS attack is which the attacker establishes and large number of half-open or fully open TCP connections at the target host





Answer : B
Explanation : In Vulnerability attack, the attacker exploits the vulnerable control points of the network to deny access to the victims. In Bandwidth flooding, the attacker intentionally uses up all the bandwidth by flooding the victim with a deluge of packets and makes sure that the victim can’t use any bandwidth. In UDP flooding, too many UDP packets are sent by the attacker to the victim at random ports.


19. In the resource are reserved between two communicating end systems in circuit switching this is achieved





Answer : B
Explanation : Circuit switching is connection oriented and is always implemented in the physical layer. Once a path is set, all transmission occurs through the same path.


20. Application layer is implemented in





Answer : A
Explanation : Application, Presentation, Session and Transport layer are implemented in the end system.




Related Links

Leave a Comment

Your email address will not be published.