Q.1

Which of the following statement is correct?

  • Buffering is the process of temporarily storing the data to allow for small variation in device speeds
  • Buffering is a method to reduce cross-talks
  • Buffering is a method to reduce the routing overhead
  • Buffering is storage of data within the transmitting medium until the receiver is ready to receive
  • None of the above
Q.2

Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:

  • Bandwidth alternatives
  • Switching alternating
  • Inter organizational networks
  • Extranets
Q.3

Computers in a LAN can be interconnected by radio and infrared technologies.

  • Wireless LANs
  • Network Topologies
  • Multiplexer
  • Modem
Q.4

Which of the following statements is correct?

  • Terminal section of a synchronous modem contains the scrambler
  • Receiver section of a synchronous modem contains the scrambler
  • Transmission section of a synchronous modem contains the scrambler
  • Control section of a synchronous modem contains the scrambler
  • None of the above
Q.5

Which utility is useful for finding the local host name?

  • NBTSTAT
  • Netstat
  • PING
  • Hostname
  • None of the above
Q.6

You are working with a network that has the network ID 192.168.10.What subnet should you use that supports four subnets and a maximum number of hosts?

  • 255.255.255.192
  • 255.255.255.224
  • 255.255.255.240
  • 255.255.255.248
  • 255.255.255.252
Q.7

Which of the following statements is correct for the use of packet switching?

  • the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure
  • the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied
  • by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved.
  • All of the above
  • None of the above
Q.8

You are working with a network that has the network ID 192.168.10.What subnet should you use that supports up tohosts and a maximum number of subnets?

  • 255.255.255.192
  • 255.255.255.224
  • 255.255.255.240
  • 255.255.255.248
  • 255.255.255.252
Q.9

The slowest transmission speeds are those of

  • twisted-pair wire
  • coaxial cable
  • fiber-optic cable
  • microwaves
Q.10

Error rate is

  • an error-detecting code based on a summation operation performed on the bits to be checked.
  • a check bit appended to an array of binary digits to make the sum of all the binary digits.
  • a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected.
  • the ratio of the number of data units in error to the total number of data units
  • None of the above
Q.11

The communication mode that supports two-way traffic but only one direction at a time is

  • simplex
  • duplex
  • half duplex
  • multiplex
  • None of the above
Q.12

If digital data rate ofbps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is

  • 1200 bands
  • 3200 bands
  • 4800 bands
  • 9600 bands
  • None of the above
Q.13

What frequency range is used for FM radio transmission?

  • Very Low Frequency : 3 kHz to 30. kHz
  • Low Frequency : 30 kHz to 300 kHz
  • High Frequency : 3 MHz to 30 MHz
  • Very High Frequency : 30 MHz to 300 MHz
  • None of the above
Q.14

On a class B network, how many hosts are available at each site with a subnet mask of 248?

  • 16,382
  • 8,190
  • 4,094
  • 2,046
  • 1,022
Q.15

If the ASCII character G is sent and the character D is received, what type of error is this?

  • single-bit
  • multiple-bit
  • burst
  • recoverable
Q.16

You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?

  • 255.255.255.192
  • 255.255.255.224
  • 255.255.255.240
  • 255.255.255.248
  • 255.255.255.252
Q.17

Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?

  • Five
  • Two
  • Four
  • Six
  • Three
Q.18

TCP is:

  • Operates at the Data Link layer
  • Connection orientated and unreliable
  • Connection orientated and reliable
  • Connectionless and unreliable
Q.19

Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?

  • SMTP
  • DHCP
  • IMAP
  • POP3
Q.20

The physical layer, in reference to the OSI model, defines

  • data link procedures that provide for the exchange of data via frames that can be sent and received
  • the interface between the X.25 network and packet mode device
  • the virtual circuit interface to packet-switched service
  • All of the above
  • None of the above
Q.21

If communication software can be called the "traffic cop" of a micro communication system, then what should the modem be called?

  • Park
  • Bridge
  • Interface
  • Link
  • None of the above
Q.22

You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at leasthost IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?

  • 255.255.224.0
  • 255.255.240.0
  • 255.255.248.0
  • 255.255.255.0
  • 255.255.255.255
Q.23

Which of the following characteristic(s) is/are suited to the PSS applications?

  • bursty traffic and low communications intensity
  • widely dispersed terminals and access to international packets switched services
  • Multiple remote host or applications accessed by a single local access circuit terminal and circuit
  • All of the above
  • None of the above
Q.24

Which of the following conditions is used to transmit two packets over a medium at the same time?

  • Contention
  • Collision
  • Synchronous
  • Asynchronous
Q.25

Establishing a virtual connection is functionally equivalent to

  • Connecting as virtual memory
  • Physically connecting a DTE and DCE
  • Placing a telephone call prior to a conversation
  • Placing a modem prior to a conversation
  • None of the above
Q.26

A front-end processor is

  • a user computer system
  • a processor in a large-scale computer that executes operating system instructions
  • a minicomputer that relieves main-frame computers at a computer centre of communications control functions
  • preliminary processor of batch jobs.
  • None of the above
Q.27

Which of the following best illustrates the default subnet mask for a class A,B, and C Network?

  • 0.0.0.0, 0.0.0.1, 0.0.1.1
  • 255.255.255.0, 255.255.0.0, 255.0.0.0
  • 255.0.0.0, 255.255.0.0, 255.255.255.0
  • 255.255.0.0, 255.255.255.0, 255.255.255.255
  • None of the above
Q.28

A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate?

  • 3 Kbps
  • 6 Kbps
  • 12 Kbps
  • 24 Kbps.
Q.29

Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:

  • Network Server
  • Virtual Private Network
  • Network operating system
  • OSI
Q.30

HMP (Host Monitoring Protocol) is:

  • a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address
  • a TCP/IP high level protocol for transferring files from one machine to another.
  • a protocol used to monitor computers
  • a protocol that handles error and control messages
  • None of the above
0 h : 0 m : 1 s