Computer Networks MCQ Set 1
1. An interconnected collection of piconet is called
a) scatternet
b) micronet
c) mininet
d) none of the mentioned
Answer
Answer: a [Reason:] Piconet is the basic unit of bluetooth system having a master node and upto seven active slave nodes.
2. In a piconet, there can be up to ________ parked nodes in the net.
a) 63
b) 127
c) 255
d) 511
Answer
Answer: c [Reason:] None.
3. Bluetooth is the wireless technology for
a) local area network
b) personal area network
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: b [Reason:] None.
4. Bluetooth uses
a) frequency hoping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) none of the mentioned
Answer
Answer: a [Reason:] None.
5. Unauthorised access of information from a wireless device through a bluetooth connection is called
a) bluemaking
b) bluesnarfing
c) bluestring
d) none of the mentioned
Answer
Answer: b [Reason:] None.
6. What is A2DP (advanced audio distribution profile)?
a) a bluetooth profile for streaming audio
b) a bluetooth profile for streaming video
c) a bluetooth profile for security
d) none of the mentioned
Answer
Answer: a [Reason:] None.
7. In the piconet of bluetooth one master device
a) can not be slave
b) can be slave in another piconet
c) can be slave in the same piconet
d) none of the mentioned
Answer
Answer: b [Reason:] None.
8. Bluetooth transceiver devices operate in ______ band.
a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM
Answer
Answer: a [Reason:] None.
9. The bluetooth supports
a) point-to-point connections
b) point-to-multipoint connection
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: c [Reason:] None.
10. A scatternet can have maximum
a) 10 piconets
b) 20 piconets
c) 30 piconets
d) 40 piconets
Answer
Answer: a [Reason:] None.
Computer Networks MCQ Set 2
1. _____________ allows LAN users to share computer programs and data.
a) Communication server
b) Print server
c) File server
d) Network
Answer
Answer: c [Reason:] File server allows LAN users to share computer programs and data.
2. STP stands for
a) Shielded twisted pair cable
b) Spanning tree protocol
c) Static transport protocol
d) None of the mentioned
Answer
Answer: a [Reason:] STP stands for Shielded twisted pair cable.
3. A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software
Answer
Answer: a [Reason:] A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of LAN intrinsic software.
4. The __________ portion of LAN management software restricts access, records user activities and audit data etc.
a) Configuration management
b) Security management
c) Performance management
d) None of the mentioned
Answer
Answer: b [Reason:] The Security management portion of LAN management software restricts access, records user activities and audit data etc.
5. What is the max cable length of STP?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
Answer
Answer: d [Reason:] 200m is the max cable length of STP.
6. What is the max data capacity of STP?
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
Answer
Answer: b [Reason:] 100 mbps is the max data capacity of STP.
7. Which connector STP uses?
a) BNC
b) RJ-11
c) RJ-45
d) RJ-69
Answer
Answer: c [Reason:] RJ-45 is used for STP cable.
8. What is the central device in star topology?
a) STP server
b) Hub/switch
c) PDC
d) Router
Answer
Answer: b [Reason:] Hub/switch is the central device in star topology.
9. What is max data capacity for optical fiber cable?
a) 10 mbps
b) 100 mbps
c) 1000 mbps
d) 10000 mbps
Answer
Answer: c [Reason:] 1000 mbps is max data capacity for optical fiber cable.
10. Which of the following architecture uses CSMA/CD access method?
a) ARC net
b) Ethernet
c) Router
d) STP server
Answer
Answer: b [Reason:] Ethernet uses CSMA/CD access method.
Computer Networks MCQ Set 3
1. Two broad categories of congestion control are
a) Open-loop and Closed-loop
b) Open-control and Closed-control
c) Active control and Passive control
d) None of the mentioned
Answer
Answer: a [Reason:] These are two types of congestion control.
2. In open-loop control, policies are applied to __________
a) Remove after congestion occurs
b) Remove after sometime
c) Prevent before congestion occurs
d) Prevent before sending packets
Answer
Answer: c [Reason:] Policies are applied to prevent congestion before it occurs.
3. Retransmission of packets must be done when
a) Packet is lost
b) Packet is corrupted
c) Packet is needed
d) All of the mentioned
Answer
Answer: d [Reason:] Retransmission should be done on account of any of the above cases.
4. In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. whereas in Selective Repeat window, tries to send ___________
a) Packet that have not lost
b) Packet that have lost or corrupted
c) Packet from starting
d) All the packets
Answer
Answer: b [Reason:] In selective repeat window, packet that have lost or corrupted must be sent.
5. Discarding policy is mainly done by
a) Sender
b) Receiver
c) Router
d) Switch
Answer
Answer: c [Reason:] This is done by the routers to prevent congestion.
6. Closed-Loop control mechanism try to
a) Remove after congestion occurs
b) Remove after sometime
c) Prevent before congestion occurs
d) Prevent before sending packets
Answer
Answer: a [Reason:] Policies are applied to remove congestion after it occurs.
7. The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as
a) Admission policy
b) Backpressure
c) Forward signalling
d) Backward signalling
Answer
Answer: b [Reason:] This is a node-to-node congestion control that starts with a node and propagates in opposite direction of data flow to the source.
8. Backpressure technique can be applied only to
a) Congestion networks
b) Closed circuit networks
c) Open circuit networks
d) Virtual circuit networks
Answer
Answer: d [Reason:] In Virtual circuit networks, each node knows the upstream node from which a flow data is coming.
9. The packet sent by a node to the source to inform it of congestion is called
a) Explicit
b) Discard
c) Choke
d) Backpressure
Answer
Answer: c [Reason:] Choke packet is sent by a node to the source to inform it of congestion.
10. In the slow-start algorithm, the size of the congestion window increases __________ until it reaches a threshold.
a) Exponentially
b) Additively
c) Multiplicatively
d) None of the mentioned
Answer
Answer: a [Reason:] In the slow-start algorithm, the size of the congestion window increases exponentially until it reaches a threshold.
11. In the congestion avoidance algorithm, the size of the congestion window increases ____________ until congestion is detected.
a) Exponentially
b) Additively
c) Multiplicatively
d) None of the mentioned
Answer
Answer: b [Reason:] In the congestion avoidance algorithm, the size of the congestion window increases additively until congestion is detected.
Computer Networks MCQ Set 4
1. Cookies were originally designed for
a) Client side programming
b) Server side programming
c) Both a and b
d) None of the mentioned
Answer
Answer: b [Reason:] Cookies were originally designed for server side programming, and at the lowest level, they are implemented as an extension to the HTTP protocol.
2. The Cookie manipulation is done using which property?
a) cookie
b) cookies
c) manipulate
d) none of the mentioned
Answer
Answer: a [Reason:] There are no methods involved: cookies are queried, set, and deleted by reading and Writing the cookie property of the Document object using specially formatted strings.
3. Which of the following explains Cookies nature?
a) Non Volatile
b) Volatile
c) Intransient
d) Transient
Answer
Answer: d [Reason:] Cookies are transient by default; the values they store last for the duration of the web browser session but are lost when the user exits the browser.
4. Which attribute is used to extend the lifetime of a cookie?
a) Higherage
b) Increaseage
c) Maxage
d) Lifetime
Answer
Answer: c [Reason:] If you want a cookie to last beyond a single browsing session, you must tell the browser how long (in seconds) you would like it to retain the cookie by specifying a manage
attribute. If you specify a lifetime, the browser will store cookies in a file and delete them only once they expire.
5. Which of the following defines the Cookie visibility?
a) Document Path
b) LocalStorage
c) SessionStorage
d) All of the mentioned
Answer
Answer: d [Reason:] Cookie visibility is scoped by document origin as local Storage and session Storage are, and also by document path.
6. Which of the following can be used to configure the scope of the Cookie visibility?
a) Path
b) Domain
c) Both a and b
d) None of the mentioned
Answer
Answer: d [Reason:] The Cookie visibility scope is configurable through cookie attributes path and domain.
7. How can you set a Cookie visibility scope to local Storage?
a) /
b) %
c) *
d) All of the mentioned
Answer
Answer: a [Reason:] Setting the path of a cookie to “/” gives scoping like that of localStorage and also specifies that the browser must transmit the cookie name and value to the server whenever it requests any web page on the site.
8. Which of the following is a Boolean cookie attribute?
a) Bool
b) Secure
c) Lookup
d) Domain
Answer
Answer: b [Reason:] The final cookie attribute is a boolean attribute named secure that specifies how cookie values are transmitted over the network. By default, cookies are insecure, which means that they are transmitted over a normal, insecure HTTP connection. If a cookie is marked secure, however, it is transmitted only when the browser and server are connected via HTTPS or another secure protocol.
9. Which of the following function is used as a consequence of not including semicolons,
Commas or whitespace in the Cookie value?
a) EncodeURIComponent()
b) EncodeURI()
c) EncodeComponent()
d) None of the mentioned
Answer
Answer: a [Reason:] Cookie values cannot include semicolons, commas, or whitespace. For this reason, you may want to use the core JavaScript global function encodeURIComponent() to encode the value before storing it in the cookie.
10. What is the constraint on the data per cookie?
a) 2 KB
b) 1 KB
c) 4 KB
d) 3 KB
Answer
Answer: c [Reason:] Each cookie can hold upto only 4 KB. In practice, browsers allow many more than 300 cookies total, but the 4 KB size limit may still be enforced by some.
Computer Networks MCQ Set 5
1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: a [Reason:] None.
2. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
Answer
Answer: b [Reason:] None.
3. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
Answer
Answer: c [Reason:] None.
4. In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: a [Reason:] None.
5. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
Answer
Answer: a [Reason:] None.
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
Answer
Answer: a [Reason:] None.
7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
Answer
Answer: b [Reason:] None.
8. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
Answer
Answer: a [Reason:] None
9. ElGamal encryption system is
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned
Answer
Answer: b [Reason:] None.
10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
Answer
Answer: a [Reason:] None.