You are on page 1of 11

2010

i)

If a signal changes instantaneously, its frequency is


a) 0
b) finite
c) infinite
d) none of these.

ii)

A digital signal has eight levels. How many bits are needed per level ?
a) 0
b) 4
c) 3
d) none of these.

iii)

The value of SNRdB for a noiseless channel is


a) 0
b) finite
c) infinite
d) none of these.

iv)

Total bandwidth required for AM is


a) 0
c) 2B

b) 2 ( 1 + d ) B
d) none of these.

v)

In ____________ we make the highest input data rate the dominant data rate and then add dummy
bits to the input lines with lower rates.
a) multiplexing
b) interleafing
c) pulse stuffing
d) none of these.

vi)

Circuit switching takes place at the _______________ layer.


a) transport
b) data link
c) physical
d) none of these.

vii) The hamming distance d( 000, 011 ) is


a) 0
c) 2

b) 1
d) none of these.

viii) PPP is a _____________ oriented protocol?


a) phase
c) byte

b) bit
d) none of these.

ix)

x)

The address space of IPv4 is


a) 0
c) 232

b) infinite
d) none of these.

All objects managed by SNMP are given an object identifier. The object identifier always starts
with
a) 0
b) 1.3.2.6.1.1
c) 1.3.6.1.2.1
d) none of these.

2011
i)

The total number of links required to connect n devices using Mesh topology is

a) 2n

b) n (n + 1) / 2

ii) Flow control is the responsibilities of the


a) Data link layer
c) Both of these

d) n2.

c) n (n 1) / 2
b) Transport layer
d) None of these.

iii) In selective repeat sliding window protocol, the receiver window size is
a) greater than one
b) one
c) two
d) none of these.
iv) ICMP resides at the same layer as which of the following protocols mentioned below ?
a) TCP
b) UDP
c) IP
d) ARP
v) In HDLC inserts a 0 bit after ________ consecutive 1 bits in the message data.
a) 4
b) 6
c) 5
d) 7
vi) The Hamming code is used for
a) error detection
c) error encapsulation

b) error correction
d) both (a) and (b).

vii) Which Channel access method is used in Ethernet network?


a) CSMA/CD
b) Token bus
c) Token ring
d) all of these.
viii) When a host knows its IP address but not its physical address, it can use
a) RARP
b) ICMP
c) ARP
d) IGMP
ix) Which of the following is a valid host for network 192.168.10.32/28 ?
a) 192.168.10.39
b) 192.168.10.47
c) 192.168.10.14
d) 192.168.10.54
x) Pure ALOHA has a maximum efficiency of
a) 18%
b) 37%

c) 10%

d) none of these.

xi) If user A wants to send a message to user B confidentially, the plain text is encrypted with the public
key of
a) A
b) B
c) the network
d) either A or B.
xii) A) DNS
i) Name service
B) FTP
ii) File sharing
C) NFS
iii) File transfer
D) SMTP
iv) Mail service
Which of the following is the correct match ?
A
B
C
a)
(iv)
(iii)
(ii)
b)
(i)
(ii)
(iii)
c)
(i)
(iii)
(ii)
d)
(ii)
(iv)
(iii)

D
(i)
(iv)
(iv)
(i)

2012
i)

An example of full duplex transmission is


a) Telephone channel
c) Broadcast radio

b) Satellite channel
d) none of these.

ii) The _________________ layer handles the creation of data frames


a) Data link
b) Network
c) Transport
d) Physical.
iii) Which channel access methods is used in Ethernet networks ?
a) Pure ALOHA
b) CSMA/CD
c) CSMA/CA
d) Slotted ALOHA.
iv) Which detection method can detect a single bit error ?
a) CRC
b) Two dimensional parity checks.
c) Simple parity check
.
d) Previous all.
v) Which class of IP address is reserved for multicast communication ?
a) Class A
b) Class B
c) Class C
d) Class D.
vi) Total bandwidth required for AM is
a) 0
c) 2B

b) 2 ( 1 + d ) B
d) none of these.

vii) At which layer circuit switching takes place?


a) Transport layer
c) Physical layer

b) Data link layer.


d) none of these.

viii) The address space of IPv4 is


a) 0
c) 232

b) infinite
d) none of these.

ix) How much of channel output of slotted ALOHA will be in comparison to pure ALOHA ?
a) Same
b) Double
c) Three times
d) none of these.
x) For a 4 bit sliding window, sequence number range is
a) 1 to 16
b) 0 to 7
c) 0 to 15
d) 8 to 15.

2013
i)

If the dataword is 111111, the divisor is 1010, the remainder is 10, the CRC codeword is
a) 1 1 1 1 1 1 1 0 1 0
b) 1 1 1 1 1 1 1 1 0
c) 1 0 1 0 1 1 0
d) 1 1 0 1 0 1 0.

ii)

In ___________ ARQ, if a NAK is received, only the specified damaged or lost frame is transmitted.
a) Go-Back-N
b) Selective Repeat
c) Stop-and-wait
d) all of these.

iii)

_________________ is a collision free technique.


a) Token Passing
b) CSMA
c) ALOHA
d) CSMA/CD.

iv)

Repeaters function in the ___________ layer.


a) Physical
b) Data link
c) Network
d) Transport.

v)

HDLC protocols insert a 0 bit after ___________ consecutive 1 bits in the message data.
b) 7
a) 5
d) 8
c) 4

vi)

Which channel access method is used in IEEE 8025 network?


a) CSMA/CD
b) Token bus
c) Token ring
d) All of these

vii) Which class of IP address is reserved for multicast communication?


a) Class A
b) Class B
c) Class C
d) Class D.
viii) For a 4-bit sliding window, sequence number range is
a) 1 to 16
b) 0 to 7
c) 0 to 15
d) 8 to 15.
ix)

x)

How much of channel output of slotted ALOHA will be in comparison to pure ALOHA ?
a) Same
b) Double
c) Three times
d) none of these.

Process to Process delivery is the function of _____________ layer.


a) Transport
b) Network
c) Physical
d) none of these.

2014
i)

Match with suitable option


LIST I
A) Node-to-Node delivery
B) Reassembly of data packets
C) Bit representation
D) Encryption
LIST II
1) Physical Layer
2) Application Layer
3) Data Link Layer
4) Transport Layer
a) A 4, B 3, C 1, D 2.
c) A 2, B 3, C 4, D 1.

b) A 3, B 4, C 1, D 2.
d) A 4, B 4, C 3, D 3.

ii)

In Ethernet when Manchester encoding is used, the bit rate is


a) Half the baud rates
b) Twice the baud rate
c) Same as the baud rate
d) none of these.

iii)

Error detection and correction at the data link level is achieved by


a) bit stuffing
b) cyclic redundancy codes
c) Hamming codes
d) Equalization

iv)

Match the following list: Sequence number is 5 bits


Protocol
WS , WR
(A) Stop-N-Wait ARQ
(1) 31, 1
(B) Go-Back-N ARQ
(2) 16, 16
(C) Selective repeat ARQ (3)
1, 1
WS : Sender window size
WR : Receiver window size

v)

vi)

a) A 3, B 1, C 2.
c) A 2, B 1, C 3.

b) A 1, B 3, C 2.
d) A 3, B 2, C 1.

IPv6 addresses are _______ bytes long.


a) 6
c) 32

b) 16
d) 128

Let in an IPv4 datagram, total length is 461 bytes and length of data is 433 bytes. What is the header
size in bytes?
a) 28
b) 894
c) 36
d) 27

vii) IP address in the B class is given by


a) 125.123.123.2
c) 191.128.32.56

b) 192.123.21.54
d) 10.14.12.34

viii) Given IP address is 180.25.21.172 and the subnet mask is 225.225.192.0, then what is the subnet
address?
a) 180.25.21.0
b) 180.25.0.0
c) 180.25.8.0
d) 180.0.0.0
ix)

x)

UDP is
a) connection-oriented
c) both (a) and (b)

b) connection-less
d) none of these.

Which of the following is an interior routing protocol?


a) RIP
b) OSPF
c) BGP
d) both (a) and (b).

MCQ for Practice I


i)

Which topology technique is a point to point configuration?


a) Mesh
b) Star
c) Bus
d) All of these.

ii)

If the maximum value of a signal is 31 and minimum value is 31, how many bits are used for
coding?
a) 4
b) 5
c) 6
d) 7

iii)

The Hamming code is used for


a) error detection
c) error encapsulation

b) error correction
d) (a) and (b) both.

iv)

For a 4 bit sliding window the sequence number can range from
a) 1 to 16
b) 0 to 7
c) 0 to 15
d) 8 to 15.

v)

How much channel throughput of slotted ALOHA will be in comparison to pure ALOHA?
a) Same
b) Double
c) Three times
d) none of these.

vi)

Which of the following network architectures does not use the token passing access method?
a) IEEE 802.4
b) FDDI
c) CSMA/CD
d) IEEE 802.5.

vii) In which OSI layers does FDDI protocol operate?


a) Physical
b) Data link
c) Network
d) (a) and (b) both.
viii) Which routing algorithm requires more traffic between routers for set-up and updating ?
a) Distance vector
b) Link state
c) Dijkstra
d) Vector link
ix)

Which is not the congestion control transport layer policy?


a) Retransmission
b) Acknowledgement
c) Flow control
d) none of these

x)

Which of the following is not Ipv6 address ?


a) Any cast
b) Multicast
c) Broadcast
d) Unicast.

xi)

E-mail cannot be sent


a) if the sending site does not use TCP/IP
b) if the receiving site does not use TCP/IP
c) through private networks
d) none of these.

xii) Which of the following is an application layer service ?


a) FTP
b) Remote Log in
c) Mail service
d) All of these.
xiii) Which channel access method is used in Ethernet network
a) CSMA/CD
b) Token Bus
c) Token Ring
d) All of these.
xiv) A bridge has access to the __________ address of a station on the same network.
a) Physical(MAC)
b) Network
c) Service access point
d) All of these.
xv) The bit rate always equal to the baud rate in which type of signal ?
a) FSK
b) QAM
c) 4-PSK
d) All of these.
xvi) Which error detection method can detect a burst error ?
a) The parity check
b) Two-dimensional parity check
c) CRC
d) All of these.
xvii) Wavelength is _________ proportional to propagation speed and ________ proportional to period ?
a) inversely, directly
b) directly, inversely
c) inversely, inversely
d) directly, directly.
xviii) Which of the following can be the beginning address of the block that contains 1024 address ?
a) 205.16.37.32
b) 190.16.42.0
c) 17.17.32.0
d) 123.45.24.52
xix) Which one of the following encoding methods does not provide for synchronization ?
a) NRZ-L
b) RZ
c) NRZ-I
d) Manchester.
xx) In _________ there are no setup and teardown phases.
a) circuit switching
b) datagram switching
c) virtual circuit switching
d) none of these.
xxi) In the_________ layer, the data unit is called frame.
a) Physical
b) Network
c) Application
d) Data link.
xxii) In _________ all messages transferred in a unidirectional manner, all the time.
a) Token Bus
b) Token Ring
c) Fast Ethernet
d) None of these.
xxiii) Connections to the thick Ethernet cable are generally made using
a) RJ-45
b) BNC connectors
c) Vampire taps
d) DNC connectors.

xxiv) IP address _________ the physical address.


a) is the same as
b) is the English conversion of
c) means
d) has no relation with.
xxv) Which of the following topologies is used in Ethernet ?
a) Bus
b) Ring
c) Tree
d) Mesh.
xxvi) Which of the following protocols is a Network layer protocol ?
a) IPX
b) FTP
c) UDP
d) Telnet.
xxvii) Which of the following cabling techniques is considered best for establishing LANs between
buildings ?
a) 10 Base 5
b) 10 Base F
c) 10 Base 2
d) 10 Base T.
xxviii) Sliding Window protocol is a technique used for
a) Error control
b) Session control
c) Flow control
d) Concurrency control.
xxix) Which of the following information is not used by Screening Routers ?
a) Profile information
b) Hardwired address
c) IP address
d) Type of connection.
xxx) _________ work at a higher level in the protocol stack to provide more opportunities controlling for
monitoring and controlling access between network ?
a) Routers
b) Switches
c) Gateways
d) Bridges.
xxxi) For Stop and Wait ARQ, for n data packets sent, _________ acknowledgements are needed.
a) n
b) 2n
c) n 1
d) n + 1
xxxii) A bridge has access to the _________ address of a station on the same network.
a) Physical(MAC)
b) Network
c) Service access point
d) All of these.
xxxiii) Which of the following is an interior routing protocol ?
a) RIP
b) OSPF
c) BGP
d) (a) & (b).

MCQ for Practice II


i)
Port number is
a) process number
c) both (a) and (b)

b) computer physical address


d) none of these.

ii)

What network topology implements at least two paths to and from each node ?
a) Bus
b) Ring
c) Mesh
d) Star

iii)

Segmentation is done in
a) Data link layer
c) Transport layer

b) Network layer
d) Physical layer.

iv)

Which channel access method is used in Ethernet networks?


a) Pure ALOHA
b) CSMA/CD
c) CSMA/CA
d) Slotted ALOHA.

v)

UDP is
a) connection-oriented
c) both (a) & (b)

b) connectionless
d) none of these.

Which address cannot be changed ?


a) Hardware address
c) both (a) & (b)

b) Logical address
d) none of these.

vi)

vii) The data link layer is divided into two sub layers. Two correct sub layers are
a) LLC & DLC
b) MAE & MCA
c) MAC & LDC
d) MAC & LLC.
viii) Which detection method can detect a single bit error ?
a) Simple parity check
b) Two dimensional parity check
c) CRC
d) all of these.
ix)

x)

xi)

Checksum of 10101001 00111001 ?


a) 00001101
c) 00011101

b) 11100001
d) 11110001.

Flow control is the responsibility of


a) Data link layer
c) both (a) & (b)

b) Transport layer
d) Application layer

Which orbit has the highest altitude ?


a) LEO
c) MEO

b) GEO
d) HEO

xii) The /n format representation of mask ?


11111111 11111111 11111111 00000000
a) /8
c) /16

b) /24
d) /3

xiii) IEEE 8025 standard is for


a) Token Ring
c) ALOHA

b) Ethernet
d) CSMA

xiv) Port No. in packet indicates


a) LAN card port number in a computer
b) Host Identification No. in network
c) Unique No. for a communicating process
d) PID No. of a communicating process under O/S
xv) To locate the destination, ARP request packet contains
a) broadcast address
b) destination logical address
c) multicast address
d) none of these.
xvi) 4-way handshaking of connection establishment is associated with
a) HTTP protocol
b) UDP protocol
c) TCP protocol
d) FTP protocol
xvii) Identify the class of IP address 191.1.2.3.
a) Class A
c) Class C

b) Class B
d) Class D

xviii) In go_back_n ARQ, if frames 4, 5, 6 are received successfully then the receiver can send an ACK
____________ to the sender.
a) 5
b) 6
c) 7
d) any of these
xix) Which of the following routing algorithms requires more traffic between routers for setup and
updating ?
a) Distance vector
b) Link state
c) Dijkstra
d) Vector link
xx) If the baud rate is 400 for a 4 PSK signal, the bit rate is ............ bps.
a) 100
b) 400
c) 800
d) 1600
xxi) A ____________ can forward or block messages based on the information in the message itself.
a) proxy firewall
b) packet filter firewall
c) message digest
d) private key
xxii) A class B destination IP address in a packet in the form 0.0.5.25 indicates
a) 'this' host in 'this' network
b) a host in 'this' network
c) any host in 'this' network
d) a host in any network.

You might also like