adplus-dvertising

MCQ in Computer Network and Networking Part 10 | ECE Board Exam

(Last Updated On: January 7, 2023)MCQ in Computer Network and Networking Part 10 | ECE Board Exam

This is the Multiple Choice Questions Part 10 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize with each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.

Continue Practice Exam Test Questions Part 10 of the Series

MCQ in Computer Network and Networking Part 9 | ECE Board Exam

Choose the letter of the best answer in each question.

451. Which one of the following is not true?

A. telnet defines a network virtual terminal (nvt) standard

B. client programs interact with nvt

C. server translates nvt operations

D. client can transfer files using to remote server using nvt

View Answer:

Answer: Option D

Explanation:

452. All telnet operations are sent as ________

A. 4 bits

B. 8 bits

C. 16 bits

D. 32 bits

View Answer:

Answer: Option B

Explanation:

453. Absolute Telnet is a telnet client for _______ Operating system.

A. windows

B. linux

C. mac

D. ubuntu

View Answer:

Answer: Option A

Explanation:

454. The decimal code of Interpret as Command (IAC) character is _______

A. 252

B. 253

C. 254

D. 255

View Answer:

Answer: Option D

Explanation:

455. Which of the following is false with respect to TCP?

A. connection-oriented

B. process-to-process

C. transport layer protocol

D. unreliable

View Answer:

Answer: Option D

Explanation:

456. In TCP, sending and receiving data is done as _______

A. stream of bytes

B. sequence of characters

C. lines of data

D. packets

View Answer:

Answer: Option A

Explanation:

457. TCP groups a number of bytes together into a packet called _______

A. packet

B. buffer

C. segment

D. stack

View Answer:

Answer: Option C

Explanation:

458. Communication offered by TCP is ________

A. full-duplex

B. half-duplex

C. semi-duplex

D. byte by byte

View Answer:

Answer: Option A

Explanation:

459. The value of acknowledgement field in a segment defines _______

A. sequence number of the byte received previously

B. total number of bytes to receive

C. sequence number of the next byte to be received

D. sequence of zeros and ones

View Answer:

Answer: Option C

Explanation:

460. Size of TCP segment header ranges between ___________

A. 16 and 32 bytes

B. 16 and 32 bits

C. 20 and 60 bytes

D. 20 and 60 bits

View Answer:

Answer: Option C

Explanation:

461. Connection establishment in TCP is done by which mechanism?

A. flow control

B. three-way handshaking

C. forwarding

D. synchronization

View Answer:

Answer: Option B

Explanation:

462. SYNC flooding attack belongs to a type of security attack known as ___________

A. sync flooding attack

B. active attack

C. passive attack

D. denial-of-service attack

View Answer:

Answer: Option D

Explanation:

463. What allows TCP to detect lost segments and in turn recover from that loss?

A. sequence number

B. acknowledgment number

C. checksum

D. both sequence & acknowledgment number

View Answer:

Answer: Option B

Explanation:

464. Which of the following is false with respect to UDP?

A. connection-oriented

B. unreliable

C. transport layer protocol

D. low overhead

View Answer:

Answer: Option A

Explanation:

465. Return value of the UDP port “Chargen” is _______

A. string of characters

B. string of integers

C. array of characters with integers

D. array of zero’s and one’s

View Answer:

Answer: Option A

Explanation:

466. Beyond IP, UDP provides additional services such as _______

A. routing and switching

B. sending and receiving of packets

C. multiplexing and demultiplexing

D. demultiplexing and error checking

View Answer:

Answer: Option D

Explanation:

467. What is the main advantage of UDP?

A. more overload

B. reliable

C. low overhead

D. fast

View Answer:

Answer: Option C

Explanation:

468. Port number used by Network Time Protocol (NTP) with UDP is ________

A. 161

B. 123

C. 162

D. 124

View Answer:

Answer: Option B

Explanation:

469. What is the header size of a UDP packet?

A. 8 bytes

B. 8 bits

C. 16 bytes

D. 124 bytes

View Answer:

Answer: Option A

Explanation:

470. The port number is “ephemeral port number”, if the source host is _______

A. ntp

B. echo

C. server

D. client

View Answer:

Answer: Option D

Explanation:

471. “Total length” field in UDP packet header is the length of _________

A. only udp header

B. only data

C. only checksum

D. udp header plus data

View Answer:

Answer: Option D

Explanation:

472. Which is the correct expression for the length of UDP datagram?

A. udp length = ip length – ip header’s length

B. udp length = udp length – udp header’s length

C. udp length = ip length + ip header’s length

D. udp length = udp length + udp header’s length

View Answer:

Answer: Option A

Explanation:

473. The ______ field is used to detect errors over the entire user datagram.

A. udp header

B. checksum

C. source port

D. destination port

View Answer:

Answer: Option B

Explanation:

474. IPsec defines two protocols: _______ and ________

A. ah; ssl

B. pgp; esp

C. ah; esp

D. pgp; ssl

View Answer:

Answer: Option C

Explanation:

475. IP Security operates in which layer of the OSI model?

A. network

B. transport

C. application

D. physical

View Answer:

Answer: Option A

Explanation:

476. ESP does not provide ________

A. source authentication

B. data integrity

C. privacy

D. error control

View Answer:

Answer: Option D

Explanation:

477. Two broad categories of congestion control are

A. open-loop and closed-loop

B. open-control and closed-control

C. active control and passive control

D. active loop and passive loop

View Answer:

Answer: Option A

Explanation:

478. In open-loop control, policies are applied to __________

A. remove after congestion occurs

B. remove after sometime

C. prevent before congestion occurs

D. prevent before sending packets

View Answer:

Answer: Option C

Explanation:

479. Retransmission of packets must not be done when _______

A. packet is lost

B. packet is corrupted

C. packet is needed

D. packet is error-free

View Answer:

Answer: Option D

Explanation:

480. Discarding policy is mainly done by _______

A. sender

B. receiver

C. router

D. switch

View Answer:

Answer: Option C

Explanation:

481. Closed-Loop control mechanisms try to _________

A. remove after congestion occurs

B. remove after sometime

C. prevent before congestion occurs

D. prevent before sending packets

View Answer:

Answer: Option A

Explanation:

482. Backpressure technique can be applied only to _______

A. congestion networks

B. closed circuit networks

C. open circuit networks

D. virtual circuit networks

View Answer:

Answer: Option D

Explanation:

483. The packet sent by a node to the source to inform it of congestion is called _______

A. explicit

B. discard

C. choke

D. backpressure

View Answer:

Answer: Option C

Explanation:

484. Which of the following is not a characteristic of Virtual Circuit Network?

A. there are setup and teardown phases in addition to the data transfer phase

B. resources can be allocated during setup phase or on demand

C. all packets follow the same path established during the connection

D. virtual circuit network is implemented in application layer

View Answer:

Answer: Option D

Explanation:

485. Which of the following is not a phase of virtual circuit network?

A. setup phase

B. data transfer phase

C. termination phase

D. teardown phase

View Answer:

Answer: Option C

Explanation:

486. Steps required in setup process are ___________

A. setup request and acknowledgement

B. setup request and setup response

C. setup request and setup termination

D. setup and termination steps

View Answer:

Answer: Option A

Explanation:

487. Delay of the resource allocated during setup phase during data transfer is ________

A. constant

B. increases for each packet

C. same for each packet

D. different for each packet

View Answer:

Answer: Option C

Explanation:

488. Delay of the resource allocated on demand during data transfer is ________

A. constant

B. increases for each packet

C. same for each packet

D. different for each packet

View Answer:

Answer: Option D

Explanation:

489. In data transfer phase, how many columns does the table contain?

A. 1

B. 2

C. 3

D. 4

View Answer:

Answer: Option D

Explanation:

490. ATM and frame relay are ________

A. virtual circuit networks

B. datagram networks

C. virtual private networks

D. virtual public networks

View Answer:

Answer: Option A

Explanation:

491. ATM uses _______________

A. asynchronous frequency division multiplexing

B. asynchronous time division multiplexing

C. asynchronous space division multiplexing

D. asynchronous amplitude division multiplexing

View Answer:

Answer: Option B

Explanation:

492. ATM standard defines _______ layers.

A. 2

B. 3

C. 4

D. 5

View Answer:

Answer: Option B

Explanation:

493. ATM can be used for ________

A. local area network

B. wide area network

C. campus area network

D. networks covering any range

View Answer:

Answer: Option D

Explanation:

494. An ATM cell has the payload field of __________

A. 32 bytes

B. 48 bytes

C. 64 bytes

D. 128 bytes

View Answer:

Answer: Option B

Explanation:

495. Frame relay has error detection at the ______

A. physical layer

B. data link layer

C. network layer

D. transport layer

View Answer:

Answer: Option B

Explanation:

496. Virtual circuit identifier in frame relay is called ______

A. data link connection identifier

B. frame relay identifier

C. cell relay identifier

D. circuit connection identifier

View Answer:

Answer: Option A

Explanation:

497. Frame relay has _______

A. only physical layer

B. only data link layer

C. only network layer

D. both physical and data link layer

View Answer:

Answer: Option D

Explanation:

498. In frame relay networks, extended address is used _______

A. to increase the range of data link connection identifiers

B. for error detection

C. for encryption

D. for error recovery

View Answer:

Answer: Option A

Explanation:

499. What is FRAD in frame relay network?

A. frad assembles and disassembles the frames coming from other protocols

B. frad is used for modulation and demodulation

C. frad is used for error detection

D. frad is used for error recovery

View Answer:

Answer: Option A

Explanation:

500. Frame Relay is cheaper than other _____

A. lans

B. wans

C. mans

D. multipoint networks

View Answer:

Answer: Option B

Explanation:

MCQ in Computer Fundamentals Series

Complete List of MCQ in Communications Engineering per topic

Complete List of MCQ in Electronics Engineering per topic

Please do Subscribe on YouTube!

P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you subscribe today via YOUTUBE?”

Subscribe

What You Also Get: FREE ACCESS & DOWNLOAD via GDRIVE

TIRED OF ADS?

  • Become Premium Member and experienced fewer ads to ads-free browsing.
  • Full Content Access Exclusive to Premium members
  • Access to PINOYBIX FREEBIES folder
  • Download Reviewers and Learning Materials Free
  • Download Content: You can see download/print button at the bottom of each post.

PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:

  • CIVIL ENGINEERING REVIEWER
  • CIVIL SERVICE EXAM REVIEWER
  • CRIMINOLOGY REVIEWER
  • ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
  • ELECTRICAL ENGINEERING & RME REVIEWER
  • FIRE OFFICER EXAMINATION REVIEWER
  • LET REVIEWER
  • MASTER PLUMBER REVIEWER
  • MECHANICAL ENGINEERING REVIEWER
  • NAPOLCOM REVIEWER
  • Additional upload reviewers and learning materials are also FREE

FOR A LIMITED TIME

If you subscribe for PREMIUM today!

You will receive an additional 1 month of Premium Membership FREE.

For Bronze Membership an additional 2 months of Premium Membership FREE.

For Silver Membership an additional 3 months of Premium Membership FREE.

For Gold Membership an additional 5 months of Premium Membership FREE.

Join the PinoyBIX community.

This offer has expired!

Add Comment

PinoyBIX Engineering. © 2014-2023 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
error: Alert: Content selection is disabled!! (Subscribe to Enable)