Description : What is the commonly used unit for measuring the speed of data transmission? A) Bytes per second B) Baud C) Bits per second D) Both B and C
Last Answer : B) Baud
Description : What is the commonly used unit for measuring the speed of data transmission? A) Bytes per second B) Baud C) Bits per second
Description : What is the commonly used unit for measuring the speed of data transmission ? (1) Mega Hertz (2) Characters per second (3) Bits per second (4) Nano seconds
Last Answer : Bits per second
Description : What is the commonly used unit for measuring the sped of data transmission? 1) Bits per second 2) Nano seconds 3) Characters per second 4) Mega Hertz
Last Answer : 1) Bits per second
Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above
Last Answer : D) All of the above
Description : How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, two stop bits, and one parity bit ? a. 600 b. 800 c. 876 d. 1200
Last Answer : b. 800
Description : What is the commonly used unit for measuring the speed of data transmission? -Do You Know?
Last Answer : answer:
Description : What is the commonly used unit for measuring the speed of data transmission
Description : 1. If the current in the core decreases, what will the strength of the magnetic field be? 2. What is the commonly used unit for measuring the speed of data transmission? 3. The Govt. of ... flows between the Vindhya and Satpura ranges? 20. Which was a journal brought out by Abul Kalam Azad ?
Last Answer : Answer : 1. Decreases 2. Bits per second 3. Jeevan Sathi Yojana 4. Because warm and cold currents meet 5. Ranga II 6. Fatty tissue 7. Uttar Pradesh 8. Oil gas 9. Silvassa 10. Hunter 11. Sports ... 16. Speaker 17. Because of inadequate supply of air 18. Growth of GNP 19. Narmada 20. Al -Hilal
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : B) i, iii, iv and v only
Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame
Last Answer : D) Frame
Description : IEEE 802.3ab defines Gigabit Ethernet transmission over unshielded twisted pair (UTP) category 5, 5e or 6 cabling known as .................... A) 1000 BASE-T B) 1000 BASE-SX C) 1000 BASE-LX D) 1000 BASE-CX
Last Answer : A) 1000 BASE-T
Description : State the factors to be considered for selecting transmission media.
Last Answer : Eight factors to be considered: 1. Type of medium. 2. No of conductors/connectors. 3. Flexibility. 4. Durability. 5. Bandwidth. 6. Reliability of connection 7. Required ... parallel wires 12. Resistance to external EMI outside the cable. 13. Attenuation characteristics 14. Cost
Description : How many bytes of data can be sent in 15 seconds over a serial link with baud rate of 9600 in asynchronous mode with odd parity and two stop bits in the frame? a. 10,000 bytes b. 12,000 bytes c. 15,000 bytes d. 27,000 bytes
Last Answer : b. 12,000 bytes
Description : is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbits/s against the original Ethernet speed of 10 Mbit/s. A) Ethernet B) Fast Ethernet C) Gigabit Ethernet D) All of the above
Last Answer : B) Fast Ethernet
Description : An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are ............... and .............. (A) 4000 bauds \ sec & ... (B) 2000 bauds \ sec & 1000 bps (C) 1000 bauds \ sec & 500 bps (D) 1000 bauds \ sec & 4000 bps
Last Answer : (D) 1000 bauds \ sec & 4000 bps Explanation: Bit rate is the number of bits per second. Baud rate is the number of signal units per second. Baud rate is less than or equal to the bit rate. Baud rate = 1000 bauds per second (baud/s) Bit rate = 1000 x 4 = 4000 bps
Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol
Last Answer : C) SSL record protocol
Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation
Last Answer : A) Encryption
Description : A WAN typically spans a set of countries that have data ratesless than................ Mbps. A) 2 B) 1 C) 4 D) 100
Last Answer : B) 1
Description : The............ layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation
Last Answer : A) Physical
Description : In FDDI, data normally travel on ..................A) The primary ring B) The Secondary ring C) Both rings D) Neither ring
Last Answer : A) The primary ring
Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B
Last Answer : D) A and B
Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session
Last Answer : B) Application
Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding
Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer
Description : The power flow problem mathematical model for a linear transmission network (A) is non-linear (B) is linear (C) considers time variation of generation (D) does not consider tap-changing transformers
Last Answer : The power flow problem mathematical model for a linear transmission network is non-linear
Description : Which of the following Unit can be used to measure the speed of a computer? A. BAUD B. SYPS C. MIPS D. None of the Above
Last Answer : C. MIPS
Description : What is the unit used to measure the data wf is transmitted through modem? (a) Bytes per second (b) Band -Technology
Last Answer : (c) Bits per second is the unit used to measure the data through modem.
Description : Consider a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits per second) over a 1 km (kilometre) cable with no repeaters. If the minimum frame size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable? a. 8000 b. 10000 c. 16000 d. 20000
Last Answer : d. 20000
Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway
Last Answer : A) Tunnel
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False
Last Answer : A) True, False
Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol
Last Answer : A) SSL handshake protocol
Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322
Last Answer : C) 443
Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN
Last Answer : B) VPN
Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False
Last Answer : C) True, True
Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B
Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling
Last Answer : A) Tunneling
Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above
Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above
Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point
Last Answer : A) Chock point
Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh
Last Answer : Bus
Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie
Last Answer : C) cookie
Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : FTP server listens to connections on port ……………………. A) 19 and 20 B) 20 and 21 C) 21 and 22 D) 20 and 22
Last Answer : B) 20 and 21
Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii
Last Answer : B) i, and ii only