Shriram Mantri Vidyanidhi Info Tech Academy: DCN Question Bank
Shriram Mantri Vidyanidhi Info Tech Academy: DCN Question Bank
Shriram Mantri Vidyanidhi Info Tech Academy: DCN Question Bank
7) In a ______ connection, two and only two devices are connected by a dedicated link.
a) multipoint b) point-to-point c) (a) and (b) d) none of the above
10) Frequency of failure and network recovery time after a failure are measures of the
_______of a network.
a) Performance b) Security c) Reliability d) Feasibility
12) Data flow between two devices can occur in a _______ way.
a) simplex b) half-duplex c) full-duplex d) all of the above
1
Shriram Mantri Vidyanidhi Info Tech Academy
DCN Question Bank
13) _______ are special-interest groups that quickly test, evaluate, and standardize new
technologies.
a) Standards organizations b) Regulatory agencies
c) Forums d) All of the above
14) Which agency developed standards for physical connection interfaces and electronic
signaling specifications?
a) ISO b) ITU-T c) ANSI d) EIA
16) _______ refers to two characteristics: when data should be sent and how fast it can
be sent.
a) Semantics b) Timing c) Syntax d) none of the above
22) Which organization has authority over interstate and international commerce in the
communications field?
a) FCC b) IEEE c) ITU-T d) ISOC
2
Shriram Mantri Vidyanidhi Info Tech Academy
DCN Question Bank
24) Communication between a computer and a keyboard involves ______________
transmission.
a) simplex b) half-duplex c) full-duplex d) automatic
26) The _______ is the physical path over which a message travels.
a) Protocol b) Signal c) Medium d) All the above
27) In a _______ connection, more than two devices can share a single link.
a) multipoint b) point-to-point c) primary d) secondary
28) _______ refers to the structure or format of the data, meaning the order in which
they are presented.
a) Semantics b) Syntax c) Timing d) All of the above
3
Shriram Mantri Vidyanidhi Info Tech Academy
DCN Question Bank
36) Multiplexing technique that shifts each signal to a different carrier frequency
a) FDM b) TDM c) Either a or b d) Both a and b
Explanation: FDM stands for Frequency division multiplexing.
39) Specialized program that allows user to utilize in specific application is classified as
a) relative programs b) application programs
c) relative programs d)replicate programs
Answer B
40) Program which is used to control system performance is classified as
a) experimental program b) system program
c) specialized program d) organized program
43) The process-to-process delivery of the entire message is the responsibility of the
_______ layer.
a) Network b) Transport c) Application d) Physical
43) The _______ layer is the layer closest to the transmission medium.
a) Physical b) Data link c) Network d) Transport
44) Mail services are available to network users through the _______ layer.
a) Data link b) Physical c) Transport d) Application
45) As the data packet moves from the upper to the lower layers, headers are _______.
a) Added b) Removed c) Rearranged d) Modified
4
Shriram Mantri Vidyanidhi Info Tech Academy
DCN Question Bank
46) The _______ layer lies between the network layer and the application layer.
a) Physical b) Data link c) Transport d) None of the above
47) Layer 2 lies between the physical layer and the _______ layer.
a) Network b) Data link c) Transport d) None of the above
48) When data are transmitted from device A to device B, the header from A's layer 4 is
read by B's _______ layer.
a) Physical b) Transport c) Application d) None of the above
52) The _______ model shows how the network functions of a computer ought to be
organized.
a) CCITT b) OSI c) ISO d) ANSI
53) The physical layer is concerned with the movement of _______ over the physical
medium.
a) programs b) dialogs c) protocols d) bits
55) In the OSI model, as a data packet moves from the lower to the upper layers, headers
are _______.
a) added b) removed c) rearranged d) modified
56) In the OSI model, when data is transmitted from device A to device B, the header from
A's layer 5 is read by B's _______ layer.
a) Physical b) transport c) session d) presentation
5
Shriram Mantri Vidyanidhi Info Tech Academy
DCN Question Bank
57) In the OSI model, what is the main function of the transport layer?
a) node-to-node delivery b) process-to-process message delivery
c) synchronization d)updating and maintenance of routing tables
58) In the OSI model, encryption and decryption are functions of the ________ layer.
a) Transport b) session c) presentation d) application
59) When a host on network A sends a message to a host on network B, which address
does the router look at?
a) Port b) logical c) physical d) none of the above
60) To deliver a message to the correct application program running on a host, the
_______ address must be consulted.
a) Port b) IP c) physical d) none of the above
63) The ______ layer is responsible for moving frames from one hop (node) to the next.
a) Physical b) data link c) transport d) none of the above
64) The ______ layer adds a header to the packet coming from the upper layer that
includes the logical addresses of the sender and receiver.
a) physical b) data link c) network d) none of the above
65) The_________ layer is responsible for the delivery of a message from one process to
another.
a) Physical b) transport c) network d) None of the above
67) _______ is a process-to-process protocol that adds only port addresses, checksum
error control, and length information to the data from the upper layer.
a) TCP b) UDP c) IP d) none of the above
70) Ethernet uses a ______ physical address that is imprinted on the network interface
card (NIC).
a) 32- bit b) 64- bit c) 6- byte d) none of the above
71) The ____ created a model called the Open Systems Interconnection, which allows
diverse systems to communicate.
a) OSI b) ISO c) IEEE d) none of the above
72) The seven-layer _____ model provides guidelines for the development of universally
compatible networking protocols.
a) OSI b) ISO c) IEEE d) none of the above
73) The physical, data link, and network layers are the ______ support layers.
a) user b) network c) both (a) and (b) d) neither (a) nor (b)
74) The session, presentation, and application layers are the ____ support layers.
a) user b) network c) both (a) and (b) d) neither (a) nor (b)
75) The _______ layer links the network support layers and the user support layers.
a) transport b) network c) data link d) session
76) The _______ layer coordinates the functions required to transmit a bit stream over a
physical medium.
a) transport b) network c) data link d) physical
77) The _______ layer is responsible for delivering data units from one station to the next
without errors.
a) transport b) network c) data link d) physical
78) The ______ layer is responsible for the source-to-destination delivery of a packet
across multiple network links.
a) transport b) network c) data link d) physical
79) The ________ layer is responsible for the process-to-process delivery of the entire
message.
a) transport b) network c) data link d) physical
7
Shriram Mantri Vidyanidhi Info Tech Academy
DCN Question Bank
80) The ______ layer establishes, maintains, and synchronizes the interactions between
communicating devices.
a) transport b) network c) session d) physical
81) The _______ layer ensures interoperability between communicating devices through
transformation of data into a mutually agreed upon format
a) transport b) network c) data link d) presentation
82) The _________ layer enables the users to access the network.
a) transport b) application c) data link d) physical
83) TCP/IP is a ______ hierarchical protocol suite developed ____ the OSI model.
a) seven-layer; before b) five-layer; before
c) six-layer; before d) five-layer; after
84) The TCP/IP _______ layer is equivalent to the combined session, presentation, and
application layers of the OSI model.
a) application b)network c) data link d) physical
87) Ifthe ACK value is 200, then what byte has been received successfully TCP/IP
handshake?
a) 199 b) 200 c) 201 d) 202
89) Which of the internetworking device takes data sent from one network device and
forwards it to the destination node based on MAC address?
a) Switch b) Router c) Hub d) Bridge
91) ____________ is a subset of a network that includes all the routers but contains no
loops.
a) Spanning Tree b) LEACH c) Spider Structure d) Spider Tree
96) The _______ sublayer is responsible for the operation of the CSMA/CD access
method and framing.
a) MAC b) Mll c) LLC d) Datalink
97) An organization is granted a block of classless addresses with the starting address
199.34.76.128/29. How many addresses are granted?
a) 8 b) 16 c) 32 d) 4
98) Which of the following application protocols generally does NOT use UDP as
transport protocol
a) Simple Mail Transfer protocol b) Real-time Transport protocol
c) Simple Network Management protocol d) Domain Name System(DNS)
99) Which all transport layer header flags are involved while establishing a
connection?
a) SYN and FIN b) SYN and ACK c) SYN, ACK and FIN d) FIN and ACK
101) IEEE has defined the specifications for a wireless LAN, called ___________ , which
covers the physical and data-link layers.
A. IEEE 802.3 B. IEEE 802.5 C. IEEE 802.11 D. IEEE 802.2
108) What does the server HTTP error code 404 mean?
A. Unauthorised B. Not Found C. Forbidden D. Request
Timeout
113) How many collisions and how many broadcast will happen
115) In error correction, the receiver asks the sender to send the data again.
A. forward
B. backward
C. retransmission
D. none of the above
117) Which of the following network topology is the most redundant in nature.
A) bus B) Star C) Ring D) Mesh
118) A_____________ is a connecting device that operates in the physical and data
link layers on the Internet model.
A) router B) Repeater C) Bridge D) Gateway
122) In Ethernet addressing, if all the bits are 1s, the address is______________.
A) multicast B) Broadcast C) Unicast D) anycast
123) What is the first address of a block of classless addresses if one of the addresses is
12.2.2.76/27?
A) 12.2.2.0 B) 12.22.32 C) 12.22.64 D) 12.22.72
124) Which application layer protocol allows administrators to log into a sewer from
remote locations and control a server as though logged in locally?
A. DNS B. FTP C. SMTP D. Telnet
125) What protocol is allowed a user to retrieve her/his mail from the mail server to
her/his mail reader?
A. POP3 B. FTP C. SMTP D. SNMP
126) Which application layer protocol allows administrators to log into a server from
remote locations and control a server as though logged in locally?
A: DNS B: FTP C: SMTP D: Telnet
127) Which of the following is uses IEEE 802.11 at the Data link layer
A:WLAN B:MAN C:WAN D:LAN
130) Which of the following protocol is used for sending or retrieving emails?
A: SMTP B: POP3
C: IMAP D: All of the above
138) The protocol does Three-Way Handshake for network communication is?
A: TCP B: UDP C: IP D: Ethernet
13