1. The
problem of a station not being able to detect a potential competitor for the
medium because it thinks that there is activity between them is called
.....................
(A) Exposed Station Problem (B) Collision Avoidance Problem
(C) Hidden Station Problem (D) Access Grant Problem
Answer: A
2. Protocols
in which stations listen for a carrier and act accordingly are
..................
(A) ALOHA (B) Multiple access
(C) Station Model (D) CSMA
Answer: D
3.
What is the port number for (Trivial File Transfer Protocol)
TFTP?
(A) 65 (B)
67
(C) 63 (D)
69
Answer: D
4.
What is the port number for Gopher services?
(A) 23 (B)
70
(C) 80 (D)
71
Answer: B
5. Firewalls
are used for ................
(A) routing (B)
security
(C) tunnelling (D) congestion control
Answer: B
6. To
translate the message semantics from one format to other, ............... is
used.
(A) application gateway (B) transport gateway
(C) session gateway (D) network gateway
Answer: A
7. The
routing algorithm within each network is ..................
(A) Routing information protocol (B) Exterior gateway protocol
(C) Interior gateway protocol (D) Middle gateway protocol
Answer: C
8. Fragmentation
means ...................
(A) adding of small packets to form large
packet
(B) breaking large packet into small packets
(C) combining large packets in to a single
packet
(D) forwarding a packet through different
networks
Answer: B
9. Bridges
are used at ................ layer.
(A) Physical layer (B) MAC layer
(C) Network (D)
Transport
Answer: B
10. Routers
are used at ................. layer.
(A) Physical layer (B) MAC layer
(C) Network (D)
Transport
Answer: C
0 Comments