For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is ____________ (in microseconds)
1. 3.2
2.32
3. 0.32
4. 320
If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is?
1.N/2
2. N
3.N-1
4.2n
Most packet switches use this principle _____
1.Stop and wait
2. Store and forward
3. Store and wait
4.Stop and forward
Radio channels are attractive medium because ______
1. Radio channels are attractive medium because ______
2.Connectivity can be given to mobile user
3.Can carry signals for long distance
4.All of the mentioned
Terrestrial radio channels are broadly classifed into _____ groups.
1.2
2.3
3.4
4.1
The attacker using a network of compromised devices is known as _______
1.Internet
2.Botnet
3. Telnet
4. D-net
The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method.
1.Packet switching
2. Circuit switching
3.Line switching
4.Frequency switching
The time required to examine the packet’s header and determine where to direct the packet is part of _______
1. Processing delay
2. Queuing delay
3.Transmission delay
4.Propagation delay
Transmission delay does not depend on ______
1. Packet length
2. Distance between the routers
3.Transmission rate
4. Bandwi Bandwidth of mediumdth of medium
A local telephone network is an example of a _______ network.
1.Packet switched
2. Circuit switched
3.Bit switched
4. Line switched
A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of _______
1. LAN intrinsic software
2.LAN aware software
3.Groupware
4.LAN ignorant software
As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved.
1.authentication
2.guaranteed constant rate
3.reliability
4.store and forward
Coaxial cable consists of _______ concentric copper conductors.
1.1
2.2
3.3
4.4
Fiber optics posses following properties _______
1. Immune electromagnetic interference
2.Very less signal attenuation
3.Very hard to tap
4. All of the mentioned
Firewalls are often configured to block _____
1.UDP traffic
2.TCP traffic
3.Sensitive traffic
4.Best-effort traffic
Geostationary satellites _______
1.Are placed at a fixed point above the earth
2.Rotate the earth about a fixed axis
3.Rotate the earth about a varying axis
4. All of the mentioned
Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by _________
1. La/R
2. LR/a
3. R/La
4. Ra/L
If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) ______
1.n*39.8
2. n*51.8
3.2n*51.8
4.none of the mentioned
If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is ____
1. 32kbps
2.500bps
3.500kbps
4. 32bps
If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to ____
1.N
2. (N*L)/R
3.(2N*L)/R
4.L/R
If there are n signal sources of same data rate, then the TDM link has _______ slots.
1.n
2.n/2
3.n*2
4.2n
In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?
1. Propagation delay
2.Queuing delay
3.Transmission delay
4. Processing delay
In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.
1. Greater than
2. Lesser than
3.Equal to
4.Equal to or greater than
In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ________
1. 20Mbps
2. 10Mbps
3.40Mbps
4. 50Mbps
Multiplexing is used in _______
1.Packet switching
2.Circuit switching
3.Data switching
4.Packet & Circuit switching
Multiplexing provides ________
1.Efficiency
2. Privacy
3.Anti jamming
4. Both Efficiency & Privacy
Packet sniffers involve _______
1.Active receiver
2. Passive receiver
3.Legal receiver
4.Partially-active receiver
Propagation delay depends on _______
1. Packet length
2.Transmission rate
3.Distance between the routers
4. Speed of the CPU
Sniffers can be prevented by using ________
1.Wired environment
2.WiFi
3.Ethernet LAN
4.Switched network
Sniffers can be prevented by using __________
1.Wired environment
2.WiFi
3.Ethernet LAN
4.Switched network
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________
1. Vulnerability attack
2. Bandwidth flooding
3.Connection flooding
4. UDP flooding
The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________
1. Vulnerability attack
2.Bandwidth flooding
3.Connection flooding
4.UDP flooding
The sharing of a medium and its link by two or more devices is called _____
1. Fully duplexing
2.Multiplexing
3.Micropleixng
4.Duplexing
The state when dedicated signals are idle are called _____
1.Death period
2.Poison period
3.Silent period
4.Stop period
The total nodal delay is given by _______
1.dnodal = dproc – dqueue + dtrans + dprop
2.dnodal = dproc + dtrans – dqueue
3.dnodal = dproc + dqueue + dtrans + dprop
4.dnodal = dproc + dqueue – dtrans – dprop
The __________ portion of LAN management software restricts access, records user activities and audit data, etc.
1. Configuration management
2.Security management
3.Performance management
4.Recovery management
UTP is commonly used in _____
1. DSL
2. FTTP
3.HTTP
4.none of the mentioned
What are the Methods to move data through a network of links and switches?
1.Packet switching and Line switching
2.Circuit switching and Line switching
3. Line switching and bit switching
4.Packet switching and Circuit switching
What is the central device in star topology?
1.STP server
2. Hub/switch
3.PDC
4.Router
What is the max data transfer rate for optical fiber cable?
1. 10 Mbps
2.100 Mbps
3.1000 Mbps
4.10000 Mbps
What is the max data transfer rate of STP cables?
1. 10 Mbps
2.100 Mbps
3.1000 Mbps
4.10000 Mbps
What is the max length of the Shielded twisted pair cable?
1. 100 ft
2. 200 ft
3.100 m
4.200 m
Which connector does the STP cable use?
1.BNC
2. RJ-11
3.RJ-45
4.RJ-69
Which multiplexing technique used to transmit digital signals?
1.FDM
2.TDM
3.WDM
4.FDM & WDM
Which of the following architecture uses the CSMA/CD access method?
1.ARC net
2.Ethernet
3.Router
4.STP server
Which of the following delay is faced by the packet in travelling from one end system to another?
1.Propagation delay
2.Queuing delay
3.Transmission delay
4.all of the mentioned
Which of the following is a form of DoS attack?
1.Vulnerability attack
2.Bandwidth flooding
3.Connection flooding
4.all of the mentioned
Which of this is not a guided media?
1. Fiber optical cable
2.Coaxial cable
3. Wireless LAN
4.Copper wire
With respect to physical media, STP cables stands for _________
1.Shielded Twisted Pair Cable
2.Spanning Tree Protocol Cable
3.Static Transport Protocol Cable
4.Shielded Two Power Cable
________ allows LAN users to share computer programs and data.
1. Communication server
2.Print server
3.File server
4.network