


















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
This document consists of a series of multiple-choice questions related to Bluetooth technology and data communication concepts such as network layers, addressing, and error control. The questions cover topics like the definition of Bluetooth, packet forwarding, physical and logical addressing, Manchester encoding, and the OSI model.
Typology: Schemes and Mind Maps
1 / 26
This page cannot be seen from the preview
Don't miss anything!
Q. No. Question Options Correct option 1 In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________. A. Added B. Removed C. Rearranged D. Modified
2 The structure or format of data is called ___________. A. Syntax B. Semantics C. Struct D. Formatting
3 Communication between a computer and a keyboard involves ______________ transmission. A. Automatic B. Half-duplex C. Full-duplex D. Simplex
4 The first Network was called ________ A. CNNET B. NSFNET C. ASAPNET D. ARPANET
5 A _______ is the physical path over which a message travels. A. Path B. Medium C. Protocol D. Route
6 A _________ set of rules that governs data communication. A. Protocol B. Standards C. RFCs D. Servers
7 Three or more devices share a link in ________ connection. A. Unipoint B. Multipoint C. Point to point D. Simplex
9 A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
10 Network congestion occurs _________ a) in case of traffic overloading b) when a system terminates c) when connection between two nodes
overloading
terminates
terminates d) in case of transfer failure
between two nodes terminates
failure 11 Physical or logical arrangement of network is
A. Topology B. Routing C. Networking D. Control
12 Which network topology requires a central controller or hub? A. Star B. Mesh C. Ring D. Bus
13 Data communication system spanning states, countries, or the whole world is ________
14 Data communication system within a building or campus is________
14 _______cable consists of two insulated copper wires twisted together. A. Coaxial B. Fiber-optic C. Twisted-pair D. None
15 ______cable can carry signals of higher frequency ranges than _____ cable. A. Twisted pair;fiber- optic B. Coaxial; fiber-optic C. Coaxial; twisted-pair D. None
14 _____________encoding has a transition at the middle of each bit.
B. Manchester C. Differential Manchester D. All the above
15 Unipolar, bipolar, and polar encoding are types of _______ encoding. A. line B. block C. NRZ D. Manchester
16 Which lines are utilized during the enable state of hardware flow control in DTE and DCE devices of RS232?
D. None of the above
17 OSI stands for __________ A. open system interconnection B. operating system interface
D. channel coding 3 Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer
4 Which of the following is the multiple access protocol for channel access control?
C. Both CSMA/CD & CSMA/CA D. HDLC
5 The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
A. Piggybackin B. cyclic redundancy check C. fletcher’s checksum D. parity check
6 _________ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. A. Flow B. Error C. Transmission D. none of the above
7 _________framing uses two categories of protocols: character-oriented and bit-oriented. A. Fixed-size B. Variable-size C. Standard D. None of the above
8 ARQ stands for _________. A. Automatic repeat quantization B. Automatic repeat request C. Automatic retransmission request D. Acknowledge repeat request
9 Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits with the same pattern as the _________. A. Header B. trailer C. flag D. none of the above
10 Both Go-Back-N and Selective-Repeat Protocols use a _________. A. sliding frame B. sliding window C. sliding packet D. none of the above
11 Data link control deals with the design and procedures for _________ communication. A. node-to-node B. host-to-host C. process-to-process
D. none of the above 12 For Stop-and-Wait ARQ, for 10 data packets sent, _________ acknowledgments are needed. A. exactly 10 B. less than 10 C. more than 10 D. none of the above
13 HDLC is an acronym for _________. A. High-duplex line communication B. High-level data link control C. Half-duplex digital link combination D. Host double-level circuit
14 High-level Data Link Control (HDLC) is a _________ protocol for communication over point-to-point and multipoint links. A. bit-oriented B. byte-oriented C. character-oriented D. none of the above
15 In _________ framing, there is no need for defining the boundaries of frames. A. fixed-size B. variable-size C. standard D. none of the above
16 In _________ protocols, we use _________. A. character-oriented; byte stuffing B. character-oriented; bit stuffing C. bit-oriented; character stuffing D. none of the above
17 In _________, the configuration is balanced. The link is point-to-point, and each station can function as a primary and a secondary.
18 In________ the station configuration is unbalanced. We have one primary station and multiple secondary stations
19 In a _________ protocol, the data section of a frame is a sequence of bits. A. byte-oriented B. bit-oriented C. either A or B D. none of the above
20 In a _________ protocol, the data section of a frame is a sequence of characters. A. bit-oriented B. character-oriented C. either A or B D. none of the abov
21 In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? A. 0 to 63 B. 0 to 64 C. 1 to 63 D. 1 to 64
33 The _________Protocol has both flow control and error control. A. Stop-and-Wait B. Go-Back-N ARQ C. Selective-Repeat ARQ D. both B and C
34 The Simplest Protocol and the Stop-and-Wait Protocol are for _________ channels. A. Noisy B. noiseless C. either A or B D. neither A nor B
35 he Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for _________ channels. A. Noisy B. noiseless C. either A or B D. neither A nor B
36 A burst error means that two or more bits in the data unit have changed. A. double-bit B. burst C. single-bit D. none of the above
37 A generator that contains a factor of __________ can detect all odd-numbered errors. A. x B. x + 1 C. 1 D. none of the above
38 A simple parity-check code can detect __________ errors. A. an even-number of B. two C. no errors D. an odd-number of
39 Checksums use __________ arithmetic. A. two's complement arithmetic B. one's complement arithmetic C. either A or B D. none of the above
40 n cyclic redundancy checking, the divisor is __________ the CRC. A. The same size as B. one bit less than C. one bit more than D. none of the above
41 In cyclic redundancy checking, what is the CRC? A. The divisor B. The quotient C. The dividend D. The remainder
43 n modulo-11 arithmetic, we use only the integers in the range __________, inclusive. A. 1 to 10 B. 1 to 11 C. 0 to 10 D. none of the above
44 e __________ between two words is the number of differences between corresponding bits. A. Hamming code B. Hamming distance C. Hamming rule D. none of the above
45 he __________ of a polynomial is the highest power in the polynomial. A. Range B. degree C. power
D. none of the above 46 the __________ of errors is more difficult than the __________. A. correction; detection B. detection; correction C. creation; correction D. creation; detection
47 The checksum of 0000 and 0000 is __________.
48 The divisor in a cyclic code is normally called the __________. A. Degree B. generator C. redundancy D. none of the above
49 The Hamming distance between 100 and 001 is __________.
D. none of the above
50 The Hamming distance between equal codewords is __________.
B. n C. 0 D. none of the above
_______ is the most widely used local area network protocol. A. Token Ring B. Token Bus C. Ethernet D. None
Unit III (^1) Which of the following describe router function? A. Packet filtering B. Internetwork communication C. Packet switching D. All of the above
2 There are two popular approaches to ________switching;the datagram approach and the virtual circuit approach. A. Circuit B. packet C. message D. none
3 In __________, each packet is treated independently of all others. A. circuit switching B. datagram switching C frame switching D none of the above
4 The network layer in the Internet is designed as a __________ network. A. circuit-switched B. datagram C. virtual-circuit D. none of the above
5 Which of the following is the broadcast address for a Class B network ID using the default subnetmask?
14 Count-to-Infinity problem occurs in ..................... (A) distance vector routing (B) short path first (C) link state routing (D) hierarchical routing
15 In Which routing method do all the routers have a common database? (A) Distance Vector (B) Link Vector (C) Shortest path (D) Link State
16 In distance vector routing algorithm, the routing tables are updated ..................... (A) by exchanging information with the neighbours (B) automatically (C) using the backup database (D) by the server
17 Distance vector routing algorithm is implemented in Internet as ........................
loop
Closed-control
Passive control
Passive loop
19 In open-loop control, policies are applied to
A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets
20 Retransmission of packets must not be done when _______ A. Packet is lost B. Packet is corrupted C. Packet is needed D. Packet is error-free
21 Closed-Loop control mechanisms try to
A. Remove after congestion occurs B. Remove after sometime
C. Prevent before congestion occurs D. Prevent before sending packets 22 The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as
A. Admission policy B. Backpressure C. Forward signalling D. Backward signaling
23 Backpressure technique can be applied only to
A. Congestion networks B. Closed circuit networks C. Open circuit networks D. Virtual circuit networks
24 The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure
1 Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer As
3 User datagram protocol is called connectionless because ___________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly
4 Trans6mission control protocol ___________ A. is a connection- oriented protocol B. uses a three way handshake to establish a connection C. receives data from application as a single stream D. all of the mentioned
12 “Total length” field in UDP packet header is the length of _________ A.Only UDP header B. Only data C. Only checksum
D. UDP header plus data
13 Which is the correct expression for the length of UDP datagram? A. UDP length = IP length
14 The ______ field is used to detect errors over the entire user datagram. A. udp header B. checksum C. source porr D. destination port
15 _______is not suitable for interactive multimedia traffic because we cannot allow retransmission of packets.
16 Which of the following is not a characteristic attributed to a data flow?. A. Reliability B. Delay C. Bandwidth D. All are correct
27 Which of the following method is used to improve QoS A. Scheduling B. Resource reservation C. Traffic shaping or policing D. All
18 A _______algorithm is a policing technique that shapes the bursty traffic into fixed- rate traffic by averaging the data rate, but it does not give credit to the user using idle periods.
. A. .leaky bucket B. Token bucket C. Priority queuing D. Weighted fair queing
19 In _________, when a source makes a reservation, it needs to define a flow specification A. Integrated services B. Differentiated services C. Connectionless D. Connectiin- oriented
20 The _______ bucket algorithm allows idle hosts to accumulate credit for the future in the form of tokens. A) leaky B) token C) either A or B
D) neither A nor B UNIT V 1 Which of the following protocols below work in the application layer?
D. Both A and C
2 What is the port number for HTTP? A. 25 B. 80 C. 21 D. 65
3 From the options below, which suits best for MODEM? A. a device that modulates an analog carrier signal to encode digital information B. a device that modulates a digital carrier signal to encode analog information C. a device that modulates an analog carrier signal to decode digital information D. a device that modulates a digital carrier signal to decode analog information
4 UDP is an unreliable protocol. A. True B. False
5 Which of the following protocol below are suited for email retrieval?
D. Both and b above
6 TELNET used _________ protocol for data connection
7 What is the full form of URL? A. Uniform routing locator B. Uniform Resource Locator C. Universal Resource Locator D. Uniform router locator
8 56. Which port is reserved for use of the SMTP protocol?
19 Which one of the following allows client to update their DNS entry as their IP address change? A. dynamic DNS B. mail transfer agent C. authoritative name server D. none of the mentioned
20 Wildcard domain names start with label
21 The domain name system is maintained by
A. distributed database system B. a single server C. a single computer D. none of the mentioned
22 One commonly used public-key cryptography method is the ______ algorithm.
23 A(n) ______ algorithm transforms ciphertext to plaintext. A) encryption B) decryption C) either (a) or (b) D) neither (a) nor (b)
24 The ________ is the message after transformation. A) ciphertext B) plaintext C) secret-text D) none of the above
25 The ________ method provides a one-time session key for two parties. A) Diffie-Hellman B) RSA C) DES D) AES
26 A ________ cipher replaces one character with another character. A) substitution B) transposition C) either A or B D) neither A nor B
27 The ________ cipher reorders the plaintext characters to create a ciphertext. A) substitution B) transposition C) either A or B D) neither A nor B
28 In an asymmetric-key cipher, the receiver uses the ______ key. A) private B) public C) either A or B D) neither A nor B
29 DES is a(n) ________ method adopted by the U.S. government. A) symmetric-key B) asymmetric-key C) either A or B D) neither A nor B
30 DES uses a key generator to generate sixteen _______ round keys. A) 32-bit B) 48-bit C) 54-bit D) 42-bit
31 The Caesar cipher is a _______cipher that has a key of 3. A) transposition B) additive C) shift D) none of the above
33 _________ ciphers can be categorized into two broad categories: monoalphabetic and polyalphabetic. A) Substitution B) Transposition C) either A or B D) neither A nor B
34 The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a modulus of 26. A) transposition B) additive C) shift D) none of the above
35 In an asymmetric-key cipher, the sender uses the__________ key. A) private B) public C) either A or B D) neither A nor B
46 Digital signature cannot provide ________ for the message. A) integrity B) confidentiality C) nonrepudiation D) authentication
47 To authenticate the data origin, one needs a(n) _______.
C) either A or B D) neither A nor B
48 A(n) _________ can be used to preserve the integrity of a document or a message. A) message digest B) message summary C) encrypted message D) none of the above
49 A digital signature needs a(n)_________ system. A) symmetric-key B) asymmetric-key C) either A or B D) neither A nor B
50 Message ________ means that the sender and the receiver expect privacy. A) confidentiality B) integrity C) authentication D) none of the above
51 In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses. A) message authentication B) entity authentication C) message confidentiality D) message integrity
52 _________ means that a sender must not be able to deny sending a message that he sent. A) Confidentiality B) Integrity C) Authentication D) Nonrepudiation
53 ________________ is the kind of firewall is connected between the device and the network connecting to internet. A. Hardware Firewall B. Software Firewall C. Stateful Inspection Firewall D. Microsoft Firewall
54 _________ is software that is installed using an internet connection or they come by-default with operating systems. A. Hardware Firewall B. Software Firewall C. Stateful Inspection Firewall D. Microsoft Firewall
55 Network layer firewall works as a __________ A. Frame filter B. Packet filter C. Content filter D. Virus filter
56 Network layer firewall has two sub-categories as _________ A. State full firewall and stateless firewall B. Bit oriented firewall and byte oriented firewall C. Frame firewall and packet firewall D. Network layer firewall and session layer firewall
57 A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as
A. Chock point B. Meeting point C. Firewall point D. Secure point
58 Which of the following is / are the types of firewall? A. Packet Filtering Firewall B. Dual Homed Gateway Firewall C. Screen Host Firewall D. Dual Host Firewall
59 A proxy firewall filters at _________ A. Physical layer B. Data link layer C. Network layer D. Application layer
60 A packet filter firewall filters at __________ A. Physical layer B. Data link layer C. Network layer or Transport layer D. Application layer
61 What tells a firewall how to reassemble a data stream that has been divided into packets? A. The source routing feature B. The number in the header’s identification field C. The destination IP address D. The header checksum field in the packet header