
This is the Multiple Choice Questions Part 10 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize with each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.
Continue Practice Exam Test Questions Part 10 of the Series
⇐ MCQ in Computer Network and Networking Part 9 | ECE Board Exam
Choose the letter of the best answer in each question.
451. Which one of the following is not true?
A. telnet defines a network virtual terminal (nvt) standard
B. client programs interact with nvt
C. server translates nvt operations
D. client can transfer files using to remote server using nvt
Answer: Option D
Explanation:
452. All telnet operations are sent as ________
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
Answer: Option B
Explanation:
453. Absolute Telnet is a telnet client for _______ Operating system.
A. windows
B. linux
C. mac
D. ubuntu
Answer: Option A
Explanation:
454. The decimal code of Interpret as Command (IAC) character is _______
A. 252
B. 253
C. 254
D. 255
Answer: Option D
Explanation:
455. Which of the following is false with respect to TCP?
A. connection-oriented
B. process-to-process
C. transport layer protocol
D. unreliable
Answer: Option D
Explanation:
456. In TCP, sending and receiving data is done as _______
A. stream of bytes
B. sequence of characters
C. lines of data
D. packets
Answer: Option A
Explanation:
457. TCP groups a number of bytes together into a packet called _______
A. packet
B. buffer
C. segment
D. stack
Answer: Option C
Explanation:
458. Communication offered by TCP is ________
A. full-duplex
B. half-duplex
C. semi-duplex
D. byte by byte
Answer: Option A
Explanation:
459. The value of acknowledgement field in a segment defines _______
A. sequence number of the byte received previously
B. total number of bytes to receive
C. sequence number of the next byte to be received
D. sequence of zeros and ones
Answer: Option C
Explanation:
460. Size of TCP segment header ranges between ___________
A. 16 and 32 bytes
B. 16 and 32 bits
C. 20 and 60 bytes
D. 20 and 60 bits
Answer: Option C
Explanation:
461. Connection establishment in TCP is done by which mechanism?
A. flow control
B. three-way handshaking
C. forwarding
D. synchronization
Answer: Option B
Explanation:
462. SYNC flooding attack belongs to a type of security attack known as ___________
A. sync flooding attack
B. active attack
C. passive attack
D. denial-of-service attack
Answer: Option D
Explanation:
463. What allows TCP to detect lost segments and in turn recover from that loss?
A. sequence number
B. acknowledgment number
C. checksum
D. both sequence & acknowledgment number
Answer: Option B
Explanation:
464. Which of the following is false with respect to UDP?
A. connection-oriented
B. unreliable
C. transport layer protocol
D. low overhead
Answer: Option A
Explanation:
465. Return value of the UDP port “Chargen” is _______
A. string of characters
B. string of integers
C. array of characters with integers
D. array of zero’s and one’s
Answer: Option A
Explanation:
466. Beyond IP, UDP provides additional services such as _______
A. routing and switching
B. sending and receiving of packets
C. multiplexing and demultiplexing
D. demultiplexing and error checking
Answer: Option D
Explanation:
467. What is the main advantage of UDP?
A. more overload
B. reliable
C. low overhead
D. fast
Answer: Option C
Explanation:
468. Port number used by Network Time Protocol (NTP) with UDP is ________
A. 161
B. 123
C. 162
D. 124
Answer: Option B
Explanation:
469. What is the header size of a UDP packet?
A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Answer: Option A
Explanation:
470. The port number is “ephemeral port number”, if the source host is _______
A. ntp
B. echo
C. server
D. client
Answer: Option D
Explanation:
471. “Total length” field in UDP packet header is the length of _________
A. only udp header
B. only data
C. only checksum
D. udp header plus data
Answer: Option D
Explanation:
472. Which is the correct expression for the length of UDP datagram?
A. udp length = ip length – ip header’s length
B. udp length = udp length – udp header’s length
C. udp length = ip length + ip header’s length
D. udp length = udp length + udp header’s length
Answer: Option A
Explanation:
473. The ______ field is used to detect errors over the entire user datagram.
A. udp header
B. checksum
C. source port
D. destination port
Answer: Option B
Explanation:
474. IPsec defines two protocols: _______ and ________
A. ah; ssl
B. pgp; esp
C. ah; esp
D. pgp; ssl
Answer: Option C
Explanation:
475. IP Security operates in which layer of the OSI model?
A. network
B. transport
C. application
D. physical
Answer: Option A
Explanation:
476. ESP does not provide ________
A. source authentication
B. data integrity
C. privacy
D. error control
Answer: Option D
Explanation:
477. Two broad categories of congestion control are
A. open-loop and closed-loop
B. open-control and closed-control
C. active control and passive control
D. active loop and passive loop
Answer: Option A
Explanation:
478. In open-loop control, policies are applied to __________
A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer: Option C
Explanation:
479. Retransmission of packets must not be done when _______
A. packet is lost
B. packet is corrupted
C. packet is needed
D. packet is error-free
Answer: Option D
Explanation:
480. Discarding policy is mainly done by _______
A. sender
B. receiver
C. router
D. switch
Answer: Option C
Explanation:
481. Closed-Loop control mechanisms try to _________
A. remove after congestion occurs
B. remove after sometime
C. prevent before congestion occurs
D. prevent before sending packets
Answer: Option A
Explanation:
482. Backpressure technique can be applied only to _______
A. congestion networks
B. closed circuit networks
C. open circuit networks
D. virtual circuit networks
Answer: Option D
Explanation:
483. The packet sent by a node to the source to inform it of congestion is called _______
A. explicit
B. discard
C. choke
D. backpressure
Answer: Option C
Explanation:
484. Which of the following is not a characteristic of Virtual Circuit Network?
A. there are setup and teardown phases in addition to the data transfer phase
B. resources can be allocated during setup phase or on demand
C. all packets follow the same path established during the connection
D. virtual circuit network is implemented in application layer
Answer: Option D
Explanation:
485. Which of the following is not a phase of virtual circuit network?
A. setup phase
B. data transfer phase
C. termination phase
D. teardown phase
Answer: Option C
Explanation:
486. Steps required in setup process are ___________
A. setup request and acknowledgement
B. setup request and setup response
C. setup request and setup termination
D. setup and termination steps
Answer: Option A
Explanation:
487. Delay of the resource allocated during setup phase during data transfer is ________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer: Option C
Explanation:
488. Delay of the resource allocated on demand during data transfer is ________
A. constant
B. increases for each packet
C. same for each packet
D. different for each packet
Answer: Option D
Explanation:
489. In data transfer phase, how many columns does the table contain?
A. 1
B. 2
C. 3
D. 4
Answer: Option D
Explanation:
490. ATM and frame relay are ________
A. virtual circuit networks
B. datagram networks
C. virtual private networks
D. virtual public networks
Answer: Option A
Explanation:
491. ATM uses _______________
A. asynchronous frequency division multiplexing
B. asynchronous time division multiplexing
C. asynchronous space division multiplexing
D. asynchronous amplitude division multiplexing
Answer: Option B
Explanation:
492. ATM standard defines _______ layers.
A. 2
B. 3
C. 4
D. 5
Answer: Option B
Explanation:
493. ATM can be used for ________
A. local area network
B. wide area network
C. campus area network
D. networks covering any range
Answer: Option D
Explanation:
494. An ATM cell has the payload field of __________
A. 32 bytes
B. 48 bytes
C. 64 bytes
D. 128 bytes
Answer: Option B
Explanation:
495. Frame relay has error detection at the ______
A. physical layer
B. data link layer
C. network layer
D. transport layer
Answer: Option B
Explanation:
496. Virtual circuit identifier in frame relay is called ______
A. data link connection identifier
B. frame relay identifier
C. cell relay identifier
D. circuit connection identifier
Answer: Option A
Explanation:
497. Frame relay has _______
A. only physical layer
B. only data link layer
C. only network layer
D. both physical and data link layer
Answer: Option D
Explanation:
498. In frame relay networks, extended address is used _______
A. to increase the range of data link connection identifiers
B. for error detection
C. for encryption
D. for error recovery
Answer: Option A
Explanation:
499. What is FRAD in frame relay network?
A. frad assembles and disassembles the frames coming from other protocols
B. frad is used for modulation and demodulation
C. frad is used for error detection
D. frad is used for error recovery
Answer: Option A
Explanation:
500. Frame Relay is cheaper than other _____
A. lans
B. wans
C. mans
D. multipoint networks
Answer: Option B
Explanation:
- MCQ in Computer Network and Networking Part 20 | ECE Board Exam
- MCQ in Computer Network and Networking Part 19 | ECE Board Exam
- MCQ in Computer Network and Networking Part 18 | ECE Board Exam
- MCQ in Computer Network and Networking Part 17 | ECE Board Exam
- MCQ in Computer Network and Networking Part 16 | ECE Board Exam
- MCQ in Computer Network and Networking Part 15 | ECE Board Exam
- MCQ in Computer Network and Networking Part 14 | ECE Board Exam
- MCQ in Computer Network and Networking Part 13 | ECE Board Exam
- MCQ in Computer Network and Networking Part 12 | ECE Board Exam
- MCQ in Computer Network and Networking Part 11 | ECE Board Exam
- MCQ in Computer Network and Networking Part 10 | ECE Board Exam
- MCQ in Computer Network and Networking Part 9 | ECE Board Exam
- MCQ in Computer Network and Networking Part 8 | ECE Board Exam
- MCQ in Computer Network and Networking Part 7 | ECE Board Exam
- MCQ in Computer Network and Networking Part 6 | ECE Board Exam
- MCQ in Computer Network and Networking Part 5 | ECE Board Exam
- MCQ in Computer Network and Networking Part 4 | ECE Board Exam
- MCQ in Computer Network and Networking Part 3 | ECE Board Exam
- MCQ in Computer Network and Networking Part 2 | ECE Board Exam
- MCQ in Computer Network and Networking Part 1 | ECE Board Exam
MCQ in Computer Fundamentals Series
Complete List of MCQ in Communications Engineering per topic
Complete List of MCQ in Electronics Engineering per topic
P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.
“Will you subscribe today via YOUTUBE?”
TIRED OF ADS?
- Become Premium Member and experienced fewer ads to ads-free browsing.
- Full Content Access Exclusive to Premium members
- Access to PINOYBIX FREEBIES folder
- Download Reviewers and Learning Materials Free
- Download Content: You can see download/print button at the bottom of each post.
PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:
- CIVIL ENGINEERING REVIEWER
- CIVIL SERVICE EXAM REVIEWER
- CRIMINOLOGY REVIEWER
- ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
- ELECTRICAL ENGINEERING & RME REVIEWER
- FIRE OFFICER EXAMINATION REVIEWER
- LET REVIEWER
- MASTER PLUMBER REVIEWER
- MECHANICAL ENGINEERING REVIEWER
- NAPOLCOM REVIEWER
- Additional upload reviewers and learning materials are also FREE
FOR A LIMITED TIME
If you subscribe for PREMIUM today!
You will receive an additional 1 month of Premium Membership FREE.
For Bronze Membership an additional 2 months of Premium Membership FREE.
For Silver Membership an additional 3 months of Premium Membership FREE.
For Gold Membership an additional 5 months of Premium Membership FREE.
Join the PinoyBIX community.