Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity
Last Answer : b. Traffic control
Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above
Last Answer : bit-oriented
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : The number of characters that can be stored in given physical space is a. Word length b. Byte c. Data density d. Field
Last Answer : Data density
Description : An ICMP message has _____ headerand a variable-size data section. A) a 16-byte B) a 32-byte C) an 8-byte D) noneof the above
Last Answer : an 8-byte
Description : Actual data processing operations are performed in the arithmetic logic section, but not in the “. Storage section of a processor unit a. Primary b. Accumulator c. Buffer d. Secondary
Last Answer : Primary
Description : A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is a. Memory b. Buffer c. Accumulator d. Address
Last Answer : Buffer
Description : Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is __________. a. 400 bps b. 800 bps c. 1600 bps d. 3200 bps
Last Answer : d. 3200 bps
Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320
Last Answer : b. 40
Description : In Bluetooth, the_____ link is used when data integrity is more important than avoiding latency. A) SCO B) ACL C) ACO D) SCL
Last Answer : ACL
Description : In Bluetooth, the_____ link is used when avoiding latency (delay in data delivery) is more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL
Last Answer : SCO
Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above
Last Answer : protecting data indata communication systems
Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction
Last Answer : d. Error detection and correction
Description : A 32 bit microprocessor has the word length equal to a. 2 byte b. 32 byte c. 4 byte d. 8 byte
Last Answer : 4 byte
Description : A byte consists of a. One bit b. Four bits c. Eight bits d. Sixteen bits
Last Answer : Eight bits
Description : Which of the following magazines covers only the IBM PC and its compatibles? a. Byte b. PC Magazine c. Personal Computing d. Interface Age
Last Answer : PC Magazine
Description : A name or number used to identify a storage location devices? a. A byte b. A record c. An address d. All of above
Last Answer : An address
Description : A band is always equivalent to a. a byte b. a bit c. 100 bits d. none of above
Last Answer : none of above
Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above
Last Answer : 48-b
Description : The most common protocol for point-to-pointaccess is the Point-to-Point Protocol (PPP), which is a _________protocol. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above
Last Answer : byte-oriented
Description : In______ transmission, wesend1 start bit (0) at thebeginningand 1 or more stop bits (1s) at the end of each byte. A) synchronous B) asynchronous C) isochronous D) none of the above
Last Answer : asynchronous
Description : In_______transmission, astartbit and a stopbit frame a character byte. A) asynchronous serial B) synchronous serial C) parallel D) (a) and (b)
Last Answer : asynchronous serial
Description : Each ________in a SONET framecancarry a digitized voice channel. A) bit B) byte C) frame D) none of the above
Last Answer : byte
Description : In SONET, for each byte, the bitsare transmitted ____________. A) from least significant to the most significant B) from most significant tothe least significant C) two at atime D) three at atime
Last Answer : from least significant to the most significant
Description : In Frame Relay, the EA field defines thenumber of bytes; it is _____ in the last byte of the address. A) 0 B) 1 C) 2 D) 3
Last Answer : 1
Description : In IPv4, what is needed to determine thenumber of the last byte of a fragment? A) Identification number B) Offset number C) Total length D) (b) and (c)
Last Answer : (b) and (c)
Description : In IPv4, if the fragment offset hasa value of 100, it means that _______. A) thedatagram has notbeen fragmented B) thedatagram is 100 bytes in size C) thefirst byte of the datagram is byte100 D) the first byteof the datagram is byte800
Last Answer : the first byteof the datagram is byte800
Description : The computer abbreviation KB usually means– (A) Key Block (B) Kernel Boot (C) Key Byte (D) Kit Bit (E) Kilo Byte
Last Answer : Kilo Byte
Description : Which form of byte assigning strategy is adopted in class B type of network corresponding to IP addresses? a. Network.Node.Node.Node b. Network.Network.Node.Node c. Network.Network.Network.Node d. Network.Node.Node.Node
Last Answer : b. Network.Network.Node.Node
Description : A 4 byte IP address consists of __________ a. only network address b. only host address c. network address & host address d. network address & MAC address
Last Answer : c. network address & host address
Description : What is the difference between the Ethernet frame preamble field and the IEEE 802.3 preamble and start of frame Delimiter fields? a. 1 byte b. 1 bit c. 4 bit d. 16 bit
Last Answer : a. 1 byte
Description : One 4 byte IP address is subdivided into __________ A. only network address B. only host address C. network address & host address D. network address & MAC address
Last Answer : C. network address & host address
Description : Interface electronic circuit is used to interconnect I/O devices to a computer’s CPU or a. ALU b. Memory c. Buffer d. Register
Last Answer : Memory
Description : The use of spooler programs and/or “. Hardware allows personal computer operators to do the processing work at the same time a printing operation is in progress a. Registered mails b. Memory c. CPU d. Buffer
Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register
Last Answer : Address register
Description : A directly accessible appointment calendar is feature of a “ resident package a. CPU b. Memory c. Buffer d. ALU
Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D
Last Answer : a. A & B
Description : The range of sequence number which is the concern of the receiver is called the receive sliding window. A. receive sliding window. B. sliding window C. frame buffer D. both a and b
Last Answer : A. receive sliding window.
Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance
Last Answer : a. You can control where traffic goes in the three networks
Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive
Last Answer : c. Congestive collapse
Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol
Last Answer : d. routing information protocol
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Last Answer : All of theabove
Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above
Last Answer : c. Checksum
Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL
Last Answer : C. ESP
Description : Which algorithm is used to shape the bursty traffic into a fixed rate traffic by averaging the data rate? a. solid bucket algorithm b. spanning tree algorithm c. hocken helm algorithm d. leaky bucket algorithm
Last Answer : d. leaky bucket algorithm
Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above
Last Answer : Frame check sequence
Description : Which among the following represents the objectives/requirements of Data Link Layer? a. Frame Synchronization b. Error & Flow Control c. Both a & b d. None of the above
Last Answer : c. Both a & b
Description : How big of a massacre would the military be willing to perpetrate in order to prevent Area 51 from being overrun?
Last Answer : You really need a hobby. Why bother to kill them, when you can gas the entire bunch and simply put them to sleep? Loli in your bright but peculiar busy little head, have you considered the logistical aspects of concentrating a mass of 100,000 people at a god forsaken spot in rural Nevada?