Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

1. network-security-interview-questions-answers-q1
Which network topology does this represent?
a) Mesh
b) Star
c) Bus
d) Ring

View Answer

Answer: a [Reason:] The figure represents the mesh topology.

2. ‘Jitter’ refers to-
a) errorless delivery
b) variation in the packet arrival time
c) timely delivery of message
d) none of the mentioned

View Answer

Answer: b [Reason:] ‘Jitter’ refers to variation in the packet arrival time.

3. 2 Half duplex systems can make a Full-Duplex.
a) True
b) False

View Answer

Answer: a [Reason:] The statement is true.

4. Which topology requires the most amount of wiring?
a) Mesh
b) Star
c) Bus
d) Ring

View Answer

Answer: a [Reason:] This is the disadvantage of mesh topology.

5. How many links are there for N nodes in the mesh topology?
a) 1
b) N(N+1)/2
c) N
d) N(N-1)/2

View Answer

Answer: d [Reason:] There are N(N-1)/2 links for N nodes.

6. Which topology has a central hub?
a) Mesh
b) Star
c) Bus
d) Ring

View Answer

Answer: b [Reason:] The star topology has a single hub.

7. Which topology has the toughest fault identification?
a) Mesh
b) Star
c) Bus
d) Ring

View Answer

Answer: c [Reason:] In the bus topology, fault identification is tougher.

8. Ethernet LANs use which topology?
a) Mesh
b) Star
c) Bus
d) Ring

View Answer

Answer: c [Reason:] Ethernet LANs use bus topology,

9. Which topology uses the token passing algorithm?
a) Mesh
b) Star
c) Bus
d) Ring

View Answer

Answer: d [Reason:] The ring topology uses the token passing algorithm. The token holder gets its turn at communication.

10. How many lines are required for the bus topology?
a) N(N-1)/2
b) N
c) N+1
d) none of the mentioned

View Answer

Answer: c [Reason:] N drop lines and 1 bus line.

11. A list of protocols used is known as –
a) protocol access
b) protocol stack
c) permutation stack
d) none of the mentioned

View Answer

Answer: b [Reason:] A list of the protocols used by a certain system, one protocol per layer, is called a protocol stack.

12. In order to prevent a fast sender from swamping a slow receiver with data, feedback is often used. This process is known as-
a) flow control
b) multiplexing
c) congestion
d) none of the mentioned

View Answer

Answer: a [Reason:] The process defined above is known as Flow Control.

.woocommerce-message { background-color: #98C391 !important; }