1. ______ refers to the physical or logical arrangement of a
network.
§
A)
Topology
§
B) Mode of operation
§
C) Data flow
§
D) None of the above
2. A ________ is a set of rules that governs data communication.
§
A)
protocol
§
B) forum
§
C) standard
§
D) none of the above
3. Data flow between two devices can occur in a _______ way.
§
A) simplex
§
B) half-duplex
§
C) full-duplex
§
D) all
of the above
4. The process-to-process delivery of the entire message is the
responsibility of the _______ layer.
§
A) Transport
§
B) Application
§
C) Physical
§
D) Network
5. The_____ address identifies a process on a host.
§
A) specific
§
B) port
§
C) IP
§
D) physical
6. The TCP/IP _______ layer is equivalent to the combined session,
presentation, and application layers of the OSI model.
§
A) data link
§
B) network
§
C) physical
§
D) application
7. When a host on network A sends a message to a host on network
B, which address does the router look at?
§
A) logical
§
B) physical
§
C) port
§
D) none of the above
8. Ethernet uses a ______ physical address that is imprinted on
the network interface card (NIC).
§
A) 32-bit
§
B) 6-byte
§
C) 64-bit
§
D) none of the above
9. TCP/IP is a ______ hierarchical protocol suite developed ____
the OSI model.
§
A)
five-layer; before
§
B) six-layer; before
§
C) seven-layer; before
§
D) five-layer; after
10. _________ can impair a
signal.
§
A) Noise
§
B) Attenuation
§
C) Distortion
§
D)
All of the above
11. ________ is a type of transmission impairment
in which the signal loses strength due to the resistance of the transmission
medium.
§
A) Distortion
§
B) Attenuation
§
C) Noise
§
D) Decibel
12. ________ is a type of
transmission impairment in which the signal loses strength due to the different
propagation speeds of each frequency that makes up the signal.
§
A) Noise
§
B)
Distortion
§
C) Attenuation
§
D) Decibel
13. For a ______ channel,
we need to use the Shannon capacity to find the maximum bit rate.
§
A) noiseless
§
B)
noisy
§
C) low-pass
§
D) bandpass
14. ______ substitutes eight consecutive zeros with
000VB0VB.
§
A) B4B8
§
B)
B8ZS
§
C) HDB3
§
D) none of the above
15. The most common technique to change an analog signal to
digital data is called __________.
§
A) sampling
§
B) PAL
§
C) PCM
§
D) none of the above
16. The minimum bandwidth of Manchester and differential Manchester
is ____ that of NRZ.
§
A) the same as
§
B) twice
§
C) thrice
§
D) none of the above
17. The signal rate is sometimes called the ____ rate.
§
A) bit
§
B) baud
§
C) signal
§
D) none of the above
18. Unipolar, bipolar, and polar encoding are types of _______
encoding.
§
A) line
§
B) block
§
C) NRZ
§
D) Manchester
19. 14. The Nyquist theorem specifies the minimum sampling rate to
be_______.
§
A) equal to the lowest frequency of a signal
§
B) equal to the highest frequency of a signal
§
C) twice the bandwidth of a signal
§
D) twice the
highest frequency of a signal
20. 15. Quadrature amplitude modulation (QAM) is a combination of
___________.
§
A) PSK and FSK
§
B) ASK and FSK
§
C) ASK and
PSK
§
D) none of the above
21. In QAM, both ________ of a carrier frequency are varied.
§
A) phase and frequency
§
B) amplitude
and phase
§
C) frequency and amplitude
§
D) none of the above
22. The sharing of a medium and its link by two or more devices is
called _______.
§
A) modulation
§
B) multiplexing
§
C) encoding
§
D) line discipline
23. _______ is designed to be used in wireless
applications in which stations must be able to share the medium without
interception by an eavesdropper and without being subject to jamming from a
malicious intruder.
§
A) Multiplexing
§
B) Spread
spectrum
§
C) Modulation
§
D) None of the above.
24. _________ are used
for cellular phone, satellite, and wireless LAN communications.
§
A) Radio waves
§
B) Infrared waves
§
C) Microwaves
§
D) none of the above
25. Transmission media are usually categorized as ___________.
§
A) determinate or indeterminate
§
B) fixed or unfixed
§
C)
guided or unguided
§
D) metallic or nonmetallic
26. _________ media
transport electromagnetic waves without the use of a physical conductor.
§
A) Guided
§
B) Unguided
§
C) Either (a) or (b)
§
D) None of the above
27. Which of the following
primarily uses guided media?
§
A) radio broadcasting
§
B) satellite communications
§
C) local
telephone system
§
D) cellular telephone system
28. When a beam of light travels through media of two different
densities, if the angle of incidence is greater than the critical angle,
_______ occurs.
§
A) refraction
§
B) reflection
§
C) criticism
§
D) incidence
29. Microwaves are
_________.
§
A) omnidirectional
§
B) bidirectional
§
C) unidirectional
§
D) none of the above
30. Radio waves are _________.
§
A) unidirectional
§
B)
omnidirectional
§
C) bidirectional
§
D) none of the above
31. In a fiber-optic cable, the signal is propagated along the
inner core by __________.
§
A) refraction
§
B) reflection
§
C) modulation
§
D) none of the above
32. 1. Packet-switched networks can also be divided into _________
subcategories: virtual-circuit networks and datagram networks.
§
A) five
§
B) three
§
C)
two
§
D) four
33. 2. In __________, each packet is treated independently of all
others.
§
A) circuit switching
§
B) datagram
switching
§
C) frame switching
§
D) none of the above
33. In _______ switching, the paths in the circuit are separated
from one another spatially.
§
A) time-division
§
B) two-dimensional
§
C) space-division
§
D) three-dimensional
34. A ________ network is made of a set of switches connected by
physical links, in which each link is divided into n channels.
§
A) circuit-switched
§
B) line-switched
§
C) frame-switched
§
D) none of the above
35. A _________ network is a cross between a circuit-switched
network and a datagram network. It has some characteristics of both.
§
A) packet-switched
§
B) frame-switched
§
C) virtual-circuit
§
D) none of the above
36. Circuit switching takes place at the ________ layer.
§
A) physical
§
B) data line
§
C) network
§
D) transport
37. A ________ switch combines crossbar switches in several
(normally three) stages.
§
A) multiple path
§
B) multiple crossbar
§
C) multistage
§
D) none of the above
38. A ________ switch is a multistage switch with micro
switches at each stage that route the packets based on the output port
represented as a binary string.
§
A) TSI
§
B) banyan
§
C) crossbar
§
D) none of the above
39. In cyclic redundancy checking, the divisor is _______ the CRC.
§
A) one bit less than
§
B) one bit
more than
§
C) The same size as
§
D) none of the above
40. In cyclic redundancy checking, what is the CRC?
§
A) The quotient
§
B) The dividend
§
C) The divisor
§
D) The
remainder
41. A _____ error means that two or more bits in the data unit have
changed.
§
A) burst
§
B) double-bit
§
C) single-bit
§
D) none of the above
42. HDLC is an acronym for _______.
§
A) Half-duplex digital link combination
§
B) Host double-level circuit
§
C) High-duplex line communication
§
D) High-level
data link control
43. _______ control refers to a set of procedures used to
restrict the amount of data that the sender can send before waiting for
acknowledgment.
§
A) Flow
§
B) Error
§
C) Transmission
§
D) none of the above
44. High-level Data Link Control (HDLC) is a _______ protocol for
communication over point-to-point and multipoint links.
§
A) byte-oriented
§
B) bit-oriented
§
C) character-oriented
§
D) none of the above
45. Bit stuffing means adding an extra 0 to the data section of the
frame when there is a sequence of bits with the same pattern as the ________.
§
A) trailer
§
B) flag
§
C) header
§
D) none of the above
46. In the _________ method, after the station finds the line idle,
it sends its frame immediately. If the line is not idle, it continuously senses
the line until it finds it idle.
A) p-persistent
B) nonpersistent
C) 1-persistent
D) none of the above
47. The vulnerable time for CSMA is the ________propagation time.
A) three times
B) two times
C) the same
as
D) none of the above
48. The
maximum throughput for pure ALOHA is ________ per cent.
A) 36.8
B) 18.4
C) 12.2
D) none of the above
49. 13. In ___________ methods, no station is superior to
another station and none is assigned the control over another.
A) controlled access
B) random
access
C) channelization
D) none of the above
50. In the ________method, a station that has a frame to send
senses the line. If the line is idle, it sends immediately. If the line is not
idle, it waits a random amount of time and then senses the line again.
A) 1-persistent
B) non-persistent
C) p-persistent
D) none of the above
51. In the _______method, after the station finds the line idle
it sends or refrain from sending based on the outcome of a random number
generator. If the line is busy, it tries again.
A) p-persistent
B) nonpersistent
C) 1-persistent
D) none of the above
52. In _______, collisions are avoided through the use of three
strategies: the interframe space, the contention window, and acknowledgments.
A) CSMA/CD
B) CSMA/CA
C) either (a) or (b)
D) both (a) and (b)
53. __________ uses thin
coaxial cable.
A)
10Base2
B) 10Base5
C) 10Base-F
D) 10Base-T
54. Standard Ethernet (10-Mbps) uses _______ encoding.
A) AMI
B) Manchester
C) NRZ
D) differential Manchester
55. Gigabit Ethernet access methods include _______ mode.
A) full-duplex
B) half-duplex
C) both (a)
and (b)
D) neither (a) nor (b)
56. In Ethernet addressing, if the least significant bit of the
first byte is 1, the address is _________.
A)
multicast
B) broadcast
C) unicast
D) none of the above
57. _______ is the most
widely used local area network protocol.
A) Token Bus
B) Ethernet
C) Token Ring
D) none of the above
58. The _____ sublayer is
responsible for the operation of the CSMA/CD access method and framing.
A) MAC
B) MII
C) LLC
D) none of the above
59. ______defines a protocol data unit (PDU) that is
somewhat similar to that of HDLC.
A) LLC
B) LLU
C) MAC
D) none of the above
60. The original IEEE 802.11, has a data rate of ________ Mbps.
A) 11
B) 22
C) 6
D)
1
61. In IEEE 802.11, when a frame is going from one station in a
BSS to another without passing through the distribution system, the address
flag is _________.
A) 11
B)
00
C) 10
D) 01
62. In
IEEE 802.11, the access method used in the PCF sublayer is ______.
A) polling
B) controlled
C) contention
D) none of the above
63. In IEEE 802.11, a BSS without an AP is called an _________.
A) an infrastructure network
B) an ad hoc
architecture
C) either (a) or (b)
D) neither (a) nor (b)
64. In
IEEE 802.11, the addressing mechanism can include up to ______addresses.
A) six
B) five
C) four
D) none of the above
65. In
Bluetooth, the _______ layer is roughly equivalent to the physical layer of the
Internet model.
A) baseband
B) radio
C) L2CAP
D) none of the above
66. In
IEEE 802.11, a station with ________ mobility is either stationary (not moving)
or moving only inside a BSS.
A) ESS-transition
B) no-transition
C) BSS-transition
D) none of the above
67. A
Bluetooth network is called a ________.
A) scatternet
B) bluenet
C) piconet
D) none of the above
68. A
Bluetooth network consists of _____ primary device(s) and up to ____ secondary
devices.
A) one; seven
B) one; five
C) five; three
D) two; six
69. Bluetooth
uses ______method in the physical layer to avoid interference from other
devices or other networks.
A) FHSS
B) DSSS
C) FDMA
D) none of the above
70. n Bluetooth, the _____layer is roughly
equivalent to the MAC sublayer in
LANs.
A) L2CAP
B) radio
C) baseband
D) none of the above
71. IEEE
has defined the specifications for a wireless LAN, called _______, which covers
the physical and data link layers.
A) IEEE 802.5
B) IEEE
802.11
C) IEEE 802.2
D) IEEE 802.3
72. In
IEEE 802.11, the access method used in the DCF sublayer is _________.
A) CSMA/CA
B) CSMA/CD
C) ALOHA
D) none of the above
73. A bridge can use the _________ algorithm to
create a loopless topology.
A) multiway tree
B) binary tree
C) spanning
tree
D) none of the above
74. A
_______ can check the MAC addresses contained in the frame.
A) repeater
B) bridge
C) router
D) passive hub
75. A
two-layer switch is a ______.
A) router
B) repeater
C) bridge
D) none of the above
76. A
________receives a signal and, before it becomes too weak or corrupted,
regenerates the original bit pattern. It then sends the refreshed signal.
A) router
B) bridge
C) repeater
D) passive hub
77. A
three-layer switch is a kind of ________.
A) bridge
B) router
C) repeater
D) none of the above
78. Some
new two-layer switches, called _______ switches, have been designed to forward
the frame as soon as they check the MAC addresses in the header of the frame.
A) come-through
B) go-through
C) cut-through
D) none of the above
Thank You for sharing this information which is very helpful for us. Explore thousand of online certification courses such as
ReplyDeleteSalesforce tutorial
Power BI tutorial
Accounting for Begginers Tutorial
Software Tester Tutorial
Cyber Security Tutorial
Data Science Tutorial
Cloud Computing Tutorial
Digital Marketing Tutorial or many more.