1. The physical layer is concerned with ___________
a) bit-by-bit delivery
p) process to process delivery
c) application to application delivery
d) port to port delivery
Answer: a
Explanation: Physical layer deals with bit to bit delivery in networking.
The data unit in the physical layer is bits. Process to process delivery or the
port to port delivery is dealt in the transport layer. The various transmission
mediums aid the physical layer in performing its functions.
2. Which transmission media provides the highest
transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
Answer: c
Explanation: Fiber optics is considered to have the highest transmission
speed among the all mentioned above. The fiber optics transmission runs at
1000Mb/s. It is called as 1000Base-Lx whereas IEEE standard for it is 802.3z.
It is popularly used for modern day network connections due to its high
transmission rate.
3. Bits can be sent over guided and unguided media as
analog signal by ___________
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
Answer: a
Explanation: In analog modulation, digital low frequency baseband signal
(digital bit stream) is transmitted over a higher frequency. Whereas in digital
modulation the only difference is that the base band signal is of discrete
amplitude level. The bits are represented by only two frequency levels, one for
high and one for low.
4. The portion of physical layer that interfaces with
the media access control sublayer is called ___________
a) physical signalling sublayer
b) physical data sublayer
c) physical address sublayer
d) physical transport sublayer
Answer: a
Explanation: The portion of physical layer that interfaces with the medium
access control sublayer is Physical Signaling Sublayer. The main function of
this layer is character encoding, reception, decoding and performs optional
isolation functions. It handles which media connection the signal should be
forwarded to physically.
5. The physical layer provides __________
a) mechanical specifications of electrical connectors
and cables
b) electrical specification of transmission line signal level
c) specification for IR over optical fiber
d) all of the mentioned
Answer: d
Explanation: Anything dealing with a network cable or the standards in use
– including pins, connectors and the electric current used is dealt in the
physical layer (Layer 1). Physical layer deals with bit to bit delivery of the
data aided by the various transmission mediums.
6. In asynchronous serial communication the physical
layer provides ___________
a) start and stop signalling
b) flow control
c) both start & stop signalling and flow control
d) only start signalling
Answer: c
Explanation: In asynchronous serial communication, the communication is not
synchronized by clock signal. Instead of a start and stop signaling and flow
control method is followed. Unlike asynchronous serial communication, in
synchronous serial communication a clock signal is used for communication, so
the start and stop method is not really required.
7. The physical layer is responsible for __________
a) line coding
b) channel coding
c) modulation
d) all of the mentioned
Answer: d
Explanation: The physical layer is responsible for line coding, channel
coding and modulation that is needed for the transmission of the information.
The physical configuration including pins, connectors and the electric current
used is dealt in the physical layer based on the requirement of the network
application.
8. The physical layer translates logical communication
requests from the ______ into hardware specific operations.
a) data link layer
b) network layer
c) trasnport layer
d) application layer
Answer: a
Explanation: Physical layer accepts data or information from the data link
layer and converts it into hardware specific operations so as to transfer the
message through physical cables. Some examples of the cables used are optical
fiber cables, twisted pair cables and co-axial cables.
9. A single channel is shared by multiple signals by
____________
a) analog modulation
b) digital modulation
c) multiplexing
d) phase modulation
Answer: c
Explanation: In communication and computer networks, the main goal is to
share a scarce resource. This is done by multiplexing, where multiple analog or
digital signals are combined into one signal over a shared medium. The multiple
kinds of signals are designated by the transport layer which is the layer
present on a higher level than the physical layer.
10. Wireless transmission of signals can be done via
___________
a) radio waves
b) microwaves
c) infrared
d) all of the mentioned
Answer: d
Explanation: Wireless transmission is carried out by radio waves,
microwaves and IR waves. These waves range from 3 Khz to above 300 Ghz and are
more suitable for wireless transmission. Radio waves can penetrate through
walls and are used in radio communications, microwaves and infrared (IR) waves
cannot penetrate through walls and are used for satellite communications and
device communications respectively.
11. The data link layer takes the packets from
_________ and encapsulates them into frames for
transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
Answer: a
Explanation: In computer networks, the data from application layer is sent
to transport layer and is converted to segments. These segments are then
transferred to the network layer and these are called packets. These packets
are then sent to data link layer where they are encapsulated into frames. These
frames are then transferred to physical layer where the frames are converted to
bits. Error control and flow control data is inserted in the frames at the data
link layer.
12. Which of the following tasks is not done by data
link layer?
a) framing
b) error control
c) flow control
d) channel coding
Answer: d
Explanation: Channel coding is the function of physical layer. Data link
layer mainly deals with framing, error control and flow control. Data link
layer is the layer where the packets are encapsulated into frames.
13. Which sublayer of the data link layer performs
data link functions that depend upon the type of medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
Answer: b
Explanation: Media access control (MAC) deals with transmission of data
packets to and from the network-interface card, and also to and from another
remotely shared channel. The MAC sublayer also prevents collision using
protocols like CSMA/CD.
14. Header of a frame generally contains
______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all of the mentioned
Answer: d
Explanation: In a frame, the header is a part of the data that contains all
the required information about the transmission of the file. It contains
information like synchronization bytes, addresses, frame identifier etc. It
also contains error control information for reducing the errors in the
transmitted frames.
15. Automatic repeat request error management
mechanism is provided by ________
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) application access control sublayer
Answer: a
Explanation: The logical link control is a sublayer of data link layer
whose main function is to manage traffic, flow and error control. The automatic
repeat request error management mechanism is provided by the LLC when an error
is found in the received frame at the receiver’s end to inform the sender to
re-send the frame.
16. When 2 or more bits in a data unit has been
changed during the transmission, the error is called ____________
a) random error
b) burst error
c) inverted error
d) double error
Answer: b
Explanation: When a single bit error occurs in a data, it is called single
bit error. When more than a single bit of data is corrupted or has error, it is
called burst error. If a single bit error occurs, the bit can be simply
repaired by inverting it, but in case of a burst error, the sender has to send
the frame again.
17. CRC stands for __________
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Answer: a
Explanation: Cyclic redundancy check is a code that is added to a data
which helps us to identify any error that occurred during the transmission of
the data. CRC is only able to detect errors, not correct them. CRC is inserted
in the frame trailer.
18. Which of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
Answer: d
Explanation: There are many data link layer protocols. Some of them are
SDLC (synchronous data link protocol), HDLC (High level data link control),
SLIP (serial line interface protocol), PPP (Point to point protocol) etc. These
protocols are used to provide the logical link control function of the Data
Link Layer.
19. Which of the following is the multiple access
protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer: c
Explanation: In CSMA/CD, it deals with detection of collision after
collision has occurred, whereas CSMA/CA deals with preventing collision.
CSMA/CD is abbreviation for Carrier Sensing Multiple Access/Collision
detection. CSMA/CA is abbreviation for Carrier Sensing Multiple
Access/Collision Avoidance. These protocols are used for efficient multiple
channel access.
20. The technique of temporarily delaying outgoing
acknowledgements so that they can be hooked onto the next outgoing data frame
is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Answer: a
Explanation: Piggybacking is a technique in which the acknowledgment is
temporarily delayed so as to be hooked with the next outgoing data frame. It
saves a lot of channel bandwidth as in non-piggybacking system, some bandwidth
is reserved for acknowledgement.
21. Physical or logical arrangement of network is
__________
a) Topology
b) Routing
c) Networking
d) Control
Answer: a
Explanation: Topology in networks is the structure or pattern in which each
and every node in the network is connected. There are many topologies in
networking like bus, tree, ring, star, mesh, and hybrid topology. There is no
particular best topology and a suitable topology can be chosen based on the
kind of application of the network .
22. Which network topology requires a central
controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus
Answer: a
Explanation: In star topology, no computer is connected to another computer
directly but all the computers are connected to a central hub. Every message
sent from a source computer goes through the hub and the hub then forwards the
message only to the intended destination computer.
23. _______ topology requires a multipoint connection.
a) Star
b) Mesh
c) Ring
d) Bus
Answer: d
Explanation: In bus topology, there is a single cable to which all the
network nodes are connected. So whenever a node tries to send a message or data
to other nodes, this data passes through all other nodes in the network through
the cable. It is really simple to install but it’s not secure enough to be used
in most of the computer network applications.
24. Data communication system spanning states,
countries, or the whole world is ________
a) LAN
b) WAN
c) MAN
d) PAN
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network
extends over a large geographical area. WANs are used to connect cities, states
or even countries. A wireless connection is required to build a WAN. The best
example of WAN is the Internet.
25. Data communication system within a building or
campus is________
a) LAN
b) WAN
c) MAN
d) PAN
Answer: a
Explanation: LAN is an abbreviation for Local Area Network. This network
interconnects computers in a small area such as schools, offices, residence
etc. It is the most versatile kind of data communication system where most of
the computer network concepts can be visibly used.
26. WAN stands for __________
a) World area network
b) Wide area network
c) Web area network
d) Web access network
Answer: b
Explanation: WAN is the abbreviation for Wide Area Network. This network
extends over a large geographical area. These are used to connect cities,
states or even countries. They can be connected through leased lines or satellites.
27. In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is
technique for combining several low rate channels to a single high rate
channel. For a certain time slot, the several channels could use the maximum
bandwidth. Each channel is inactive for a period of time too. Some other
multiplexing techniques are Frequency division multiplexing and Phase division
multiplexing.
28. _____ is the multiplexing technique that shifts
each signal to a different carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
Answer: a
Explanation: FDM is an abbreviation for Frequency Division Multiplexing.
This technique is used when the bandwidth of the channel is greater than the
combined bandwidth of all the signals which are to be transmitted. The channel
is active at all times unless a collision occurs with another channel trying to
use the same frequency. Some other multiplexing techniques are Time division
multiplexing and Phase division multiplexing.
29. The sharing of a medium and its link by two or
more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
Answer: b
Explanation: Multiplexing is a method using which one can send multiples
signals through a shared medium at the same time. This helps in using less
resources and thus saving the cost of sending messages.
30. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching
Answer: b
Explanation: Circuit switching is a switching method by which one can
obtain a physical path between end points. Circuit switching method is also
called a connection oriented network. Two nodes must be physically and
logically connected to each other to create a circuit switching network.
31. Which multiplexing technique used to transmit
digital signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
Answer: b
Explanation: TDM abbreviation for Time Division Multiplexing is a method
used for digital signals. Whereas FDM and WDM abbreviation for Frequency
Division Multiplexing, and Wavelength Division Multiplexing, are used for
analog signals. TDM is used in applications like ISDN (Integrated Services
Digital Network) and PSTN (Public Switched Telephone Network).
32. If there are n signal sources of same data rate,
then the TDM link has _______ slots.
a) n
b) n/2
c) n*2
d) 2n
Answer: a
Explanation: In TDM, the total unit of time is divided equally among all
the signal sources and each and every source has access to the complete channel
bandwidth during its allotted time slot. When the time slot of the source is
not active, it remains idle and waits for its slot to begin.
33. If link transmits 4000frames per second, and each
slot has 8 bits, the transmission rate of circuit this TDM is _________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
Answer: a
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
34. The state when dedicated signals are idle are
called __________
a) Death period
b) Poison period
c) Silent period
d) Stop period
Answer: c
Explanation: There are instances when connection between two endpoints has
been established, but no communication or transfer of messages occurs. This
period of time is called silent period. The silent period ends when either of
the two endpoints starts the communication.
35. Multiplexing provides _________
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy
Answer: d
Explanation: Multiplexing helps us to transfer our messages over a shared
channel. This brings up the issue of privacy and efficiency. Fortunately,
Multiplexing has high efficiency and high privacy when implemented because in
the implementation, the transport layer of the OSI network model handles the
function of multiplexing through interfaces called ports which provide the
required efficiency and privacy.
36. In TDM, the transmission rate of a multiplexed
path is always _______ the sum of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
Answer: a
Explanation: In TDM the transmission rate provided by the path that is
multiplexed will always be greater than the sum of transmission rates of the
single sources. This happens because the transmission rate is provided to each
source only for a small period of time.
37. In TDM, slots are further divided into _________
a) Seconds
b) Frames
c) Packets
d) Bits
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is
technique for combining several low rate channels to a single high rate
channel. For a certain time slot, the several channels could use the maximum
bandwidth. Each channel is inactive for a period of time too. Some other
multiplexing techniques are Frequency division multiplexing and Phase division
multiplexing.
38. Which of the following delay is faced by the
packet in travelling from one end system to another?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned
Answer: d
Explanation: When a packet has to travel from one end system to another, it
first faces the queuing delay when there are multiple packets which are to be
sent, then it faces the transmission delay to convert the packet into bits to
be transmitted, and then it faces the propagation delay to propagate the bits
through the physical medium.
39. For a 10Mbps Ethernet link, if the length of the
packet is 32bits, the transmission delay is ____________ (in microseconds)
a) 3.2
b) 32
c) 0.32
d) 320
Answer: a
Explanation: Transmission rate = length / transmission rate = 32/10 = 3.2
microseconds.
40. The time required to examine the packet’s header
and determine where to direct the packet is part of __________
a) Processing delay
b) Queuing delay
c) Transmission delay
d) Propagation delay
Answer: a
Explanation: Processing delay is induced at a router’s or other network
processor’s end in the path of the packet and is caused by the time taken by
the processor to examine the packet’s header to decide the further path of the
packet.
42. Given L = number of bits in the packet, a =
average rate and R = transmission rate. The Traffic intensity in the network is
given by ____________
a) La/R
b) LR/a
c) R/La
d) Ra/L
Answer: a
Explanation: Traffic Intensity = (Number of bits in packet * Average
Transmission rate)/Current Transmission rate.
43. In the transfer of file between server and client,
if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The
throughput is usually ___________
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
Answer: b
Explanation: The throughput is generally the transmission rate of bottleneck
link.
44. If end to end delay is given by dend-end = N(dproc
+ dtrans + dprop) is a non congested network. The number of routers between
source and destination is?
a) N/2
b) N
c) N-1
d) 2N
Answer: c
Explanation: In the equation N (dproc + dtrans + dprop), N is the number of
checkpoints/stops that the packet makes as it reaches the destination. The
stops are made at each router and the final destination node. Now, since N =
number of routers + final node, then number of routers = N – final node. As we
know, there is only 1 final node in a path, thus, number of routers = N – 1.
Suppose, There is a path A->R1->R2->B for a packet where A is the
source node, B is the final node and R1 and R2 are routers. The total delay
would be given by N (dproc + dtrans + dprop) where N = 3, since the packet
would stop at R1, R2 and B. The number of routers here are 2, and (N – 1) is
also 2.
45. The total nodal delay is given by ____________
a) dnodal = dproc – dqueue + dtrans + dprop
b) dnodal = dproc + dtrans – dqueue
c) dnodal = dproc + dqueue + dtrans + dprop
d) dnodal = dproc + dqueue – dtrans – dprop
Answer: c
Explanation: The total node-to-node delay, that is, nodal delay is the sum
of all, the processing delay, queuing delay, transmission delay and propagation
delay. Ideally, the nodal delay must be low as possible for a better Quality of
Service of the network.
46. In a network, If P is the only packet being
transmitted and there was no earlier transmission, which of the following
delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
Answer: b
Explanation: Since there is no other packet to be transmitted, there is no
need for a queue. Therefore, the delay caused due to the queuing would be none
i.e. 0.
47. Transmission delay does not depend on
_____________
a) Packet length
b) Distance between the routers
c) Transmission rate
d) Bandwidth of medium
Answer: b
Explanation: Transmission delay = packet length / transmission rate. The
transmission rate depends upon the bandwidth of the medium.
48. Propagation delay depends on ___________
a) Packet length
b) Transmission rate
c) Distance between the routers
d) Speed of the CPU
Answer: c
Explanation: Propagation delay is caused when the packet is in its electric
signal form and is travelling through a medium (a wire or a electromagnetic
wave). Propagation delay is the time it takes a bit to propagate from one
router to the next. If the distance between the routers is increased, it will
take longer time to propagate, that is, there would be more propagation delay.
49. _____________ allows LAN users to share computer
programs and data.
a) Communication server
b) Print server
c) File server
d) Network
Answer: c
Explanation: A file server allows LAN users to share computer programs and
data. It uses the File Transfer Protocol to provide this feature on ports 20
and 21. The file server works as a medium for the transfer.
50. With respect to physical media, STP cables stands
for _________
a) Shielded Twisted Pair Cable
b) Spanning Tree Protocol Cable
c) Static Transport Protocol Cable
d) Shielded Two Power Cable
Answer: a
Explanation: For physical media, STP cable stands for Shielded twisted pair
cable. 100 Mbps is the max data capacity of STP cable and its default connector
is RJ45. It is popularly used in LANs due to its ease of maintenance and
installation.
51. A standalone program that has been modified to
work on a LAN by including concurrency controls such as file and record locking
is an example of ___________
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software
Answer: a
Explanation: A standalone program that has been modified to work on a LAN
by including concurrency controls such as file and record locking is an example
of LAN intrinsic software. They are used to give better functionality of the
program and the applications working over it to the users of the LAN.
52. The __________ portion of LAN management software
restricts access, records user activities and audit data, etc.
a) Configuration management
b) Security management
c) Performance management
d) Recovery management
Answer: b
Explanation: The Security management portion of LAN management software
restricts access, records user activities, and audit data. It is responsible for
controlling access to the network based on predefined policy. The security
management ensures authentication, confidentiality, and integrity in the LAN.
53. What is the max length of the Shielded twisted
pair cable?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
Answer: c
Explanation: The max the Shielded twisted pair cable is 100 meters. If the
length exceeds 100 meters, the loss of signals flowing through the cable would
be really high. Thus, STP cable is more suitable for smaller networks like
LANs.
54. What is the max data transfer rate of STP cables?
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps
Answer: b
Explanation: 100 Mbps is the max data transfer rate that can be handled by
STP cables, and its default connector is RJ-45. 100 Mbps is a feasible data
transfer rate for small networks like LANs.
55. Which connector does the STP cable use?
a) BNC
b) RJ-11
c) RJ-45
d) RJ-69
Answer: c
Explanation: RJ-45 is used for STP cable. 100 Mbps is the max data transfer
rate that can be handled by STP. RJ-45 is popularly used to connect to
modern-day routers, computer network cards, and other network devices.
56. What is the central device in star topology?
a) STP server
b) Hub/switch
c) PDC
d) Router
Answer: b
Explanation: In star topology, no computer is connected to another computer
directly but all the computers are connected to a central switch or hub. Every
message sent from a source computer goes through the switch or hub and the
switch or hub then forwards the message only to the intended destination computer.
57. What is the max data transfer rate for optical
fiber cable?
a) 10 Mbps
b) 100 Mbps
c) 1000 Mbps
d) 10000 Mbps
Answer: d
Explanation: Fiber channel speeds have been increasing over the years.
10000 Mbps is the max data transfer rate for optical fiber cables. It is said
to be the fastest among the other kinds of cables like STP cables and co-axial
cables. People are now using optical fiber cables instead of STP cables for
LANs due to their fast data transfer capability.
58. Which of the following architecture uses the
CSMA/CD access method?
a) ARC net
b) Ethernet
c) Router
d) STP server
Answer: b
Explanation: Collision detection is not possible in Ethernet without
extensions. Collision detection techniques for multiple access like CSMA/CD are
used to detect collisions in the Ethernet architecture.
59. The attacker using a network of compromised
devices is known as _____________
a) Internet
b) Botnet
c) Telnet
d) D-net
Answer: b
Explanation: Botnet is a network of compromised devices used by the attacker
without the owner’s knowledge to perform unethical activities such as spamming.
The attacker usually uses the least secure devices to create the botnet.
60. Which of the following is a form of DoS attack?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
Answer: d
Explanation: In a DoS attack, the attacker won’t let the victims access the
network by using a certain method that ensures that an essential network
resource is unavailable to the victim. In vulnerability attack, the attacker
exploits any obvious vulnerable entity in the network to deny the victim access
into the network. In bandwidth flooding, the attacker floods the victim with a
huge flow of packets and uses up all the bandwidth. In connection flooding, the
attacker floods the victim network with a huge number of connections, so that,
no other machine can connect to it.
61. The DoS attack, in which the attacker establishes
a large number of half-open or fully open TCP connections at the target host is
________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding
Answer: c
Explanation: In Vulnerability attack, the attacker exploits the vulnerable
control points of the network to deny access to the victims. In Bandwidth
flooding, the attacker intentionally uses up all the bandwidth by flooding the
victim with a deluge of packets and makes sure that the victim can’t use any
bandwidth. In UDP flooding, too many UDP packets are sent by the attacker to
the victim at random ports.
62. The DoS attack, in which the attacker sends deluge
of packets to the targeted host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding
Answer: b
Explanation: In Bandwidth flooding, the attacker floods the victim machine
with a deluge of packets to make sure that no bandwidth is available. The
victim then cannot utilize the complete bandwidth to perform its operation.
63. Packet sniffers involve ____________
a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receiver
Answer: b
Explanation: The function of packet sniffers is to just silently receive
the packets flowing in the channel. If they inject any packets into the
channel, they might alert the other users about the intrusion.
64. Sniffers can be prevented by using _______________
a) Wired environment
b) WiFi
c) Ethernet LAN
d) Switched network
Answer: d
Explanation: Switches make sure that the packet is sent to the intended
receiver and no one else, thus preventing Sniffers to perform their function.
Intelligent switches are hence used preferably for the network.
65. Firewalls are often configured to block
___________
a) UDP traffic
b) TCP traffic
c) Sensitive traffic
d) Best-effort traffic
Answer: a
Explanation: UDP is more vulnerable to attacks, so firewalls are often
configured to block suspicious UDP traffic.
66. In a network, If P is the only packet being
transmitted and there was no earlier transmission, which of the following
delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
Answer: b
Explanation: Since there is no other packet to be transmitted, there is no
need for a queue. Therefore, the delay caused due to the queuing would be none
i.e. 0.
67. Which of this is not a guided media?
a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire
Answer: c
Explanation: Wireless LAN is unguided media.
68. UTP is commonly used in __________
a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
Answer: a
Explanation: Unshielded twisted pair(UTP) is commonly used in home access.
69. Coaxial cable consists of _______ concentric
copper conductors.
a) 1
b) 2
c) 3
d) 4
Answer: b
Explanation: Coaxial cable has an inner conductor surrounded by a
insulating layer, which is surrounded by a conducting shield. Coaxial cable is
used to carry high frequency signals with low losses.
70. Fiber optics posses following properties
__________
a) Immune electromagnetic interference
b) Very less signal attenuation
c) Very hard to tap
d) All of the mentioned
Answer: d
Explanation: In fibre optics the transmission of information is in the form
of light or photons. Due to all above properties mentioned in options fibre
optics can be submerged in water and are used at more risk environments.
71. If an Optical Carrier is represented as OC-n,
generally the link speed equals(in Mbps) __________
a) n*39.8
b) n*51.8
c) 2n*51.8
d) None of the mentioned
Answer: b
Explanation: The base unit of transmission rates in optical fibre is 51.8
Mbits/s. So an optical carrier represented as OC-n has n*51.8 Mbits/s
transmission speed. For eg. OC-3 has 3*51.8 Mbits/s speed.
72. Terrestrial radio channels are broadly classifed
into _____ groups.
a) 2
b) 3
c) 4
d) 1
Answer: b
Explanation: The three types are those that operate over very short
distance, those that operate in local areas, those that operate in the wide
area.
73. Radio channels are attractive medium because
__________
a) Can penetrate walls
b) Connectivity can be given to mobile user
c) Can carry signals for long distance
d) All of the mentioned
Answer: d
Explanation: Radio channels can penetrate walls, can be used to provide
connectivity to mobile users and can also carry signals for long distances.
74. Geostationary satellites ___________
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
Answer: a
Explanation: They are placed in orbit at 36,000km above Earth’s surface.
75. A local telephone network is an example of a
_______ network.
a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched
Answer: b
Explanation: Circuit switching is connection oriented switching technique,
whereas in the case of packet switching, it is connectionless. Circuit
switching is implemented in the Physical layer, whereas packet switching is
implemented in the Network layer. Internet too is based on the concept of
circuit switching.
76. Most packet switches use this principle
____________
a) Stop and wait
b) Store and forward
c) Store and wait
d) Stop and forward
Answer: b
Explanation: The packet switch will not transmit the first bit to outbound
link until it receives the entire packet. If the entire packet is not received
and the time-out period expires, the packet switch will inform the sender to
resend the part of packet or the entire packet based on the algorithm being
used.
77. If there are N routers from source to destination,
the total end to end delay in sending packet P(L-> number of bits in the
packet R-> transmission rate) is equal to ______________
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
Answer: b
Explanation: The equation to find the end to end delay when no. of bits,
transmission rate and no. of routers is given by (N*L)/R. The total end to end
delay, that is, nodal delay is the sum of all, the processing delay, queuing
delay, transmission delay and propagation delay.
78. What are the Methods to move data through a
network of links and switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching
Answer: d
Explanation: Packet switching and Circuit switching are two different types
of switching methods used to connect the multiple communicating devices with
one another. Packet switching is used in conventional LAN systems and circuit
switching is used in telephonic systems.
79. The required resources for communication between
end systems are reserved for the duration of the session between end systems in
________ method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
Answer: b
Explanation: In circuit switching, a physical path between the sender and
receiver is established. This path is maintained until the connection is
needed. Circuit switching is implemented in the Physical layer and is used in
telephonic systems.
80. As the resources are reserved between two
communicating end systems in circuit switching, ___________ is achieved.
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
Answer: b
Explanation: Circuit switching is connection oriented and is always
implemented in the physical layer. Once a path is set, all transmission occurs
through the same path. It is used since the early times in telephonic systems.
81. In _________ systems, resources are allocated on
demand.
a) packet switching
b) circuit switching
c) line switching
d) frequency switching
Answer: a
Explanation: In packet switching, the bits are received in out of order and
need to be assembled at the receiver end, whereas in the case of Circuit
switching, all the bits are received in order. All transmissions may not occur
through the same path in case of packet switching.
82. Which of the following is not an application layer
service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) Error control
Answer: d
Explanation: Application layer is the topmost layer in the OSI model.
Network virtual terminal, mail service, file transfer, access and management
are all services of the application layer. It uses protocols like HTTP, FTP,
and DNS etc. to provide these services.
0 Comments