Computer Networks Multiple Choice Questions - Set 11

1.       The problem of a station not being able to detect a potential competitor for the medium because it thinks that there is activity between them is called .....................
(A) Exposed Station Problem            (B) Collision Avoidance Problem
(C) Hidden Station Problem              (D) Access Grant Problem
Answer: A
2.       Protocols in which stations listen for a carrier and act accordingly are ..................
(A) ALOHA                    (B) Multiple access
(C) Station Model        (D) CSMA
Answer: D
3.       What is the port number for (Trivial File Transfer Protocol) TFTP?
(A) 65                 (B) 67
(C) 63                 (D) 69
Answer: D
4.       What is the port number for Gopher services?
(A) 23                 (B) 70
(C) 80                 (D) 71
Answer: B
5.       Firewalls are used for ................
(A) routing         (B) security
(C) tunnelling   (D) congestion control
Answer: B

6.       To translate the message semantics from one format to other, ............... is used.
(A) application gateway          (B) transport gateway
(C) session gateway               (D) network gateway
Answer: A
7.       The routing algorithm within each network is ..................
(A) Routing information protocol      (B) Exterior gateway protocol
(C) Interior gateway protocol             (D) Middle gateway protocol
Answer: C
8.       Fragmentation means ...................
(A) adding of small packets to form large packet
(B) breaking large packet into small packets
(C) combining large packets in to a single packet
(D) forwarding a packet through different networks
Answer: B
9.       Bridges are used at ................ layer.
(A) Physical layer        (B) MAC layer
(C) Network                  (D) Transport
Answer: B
10.    Routers are used at ................. layer.
(A) Physical layer        (B) MAC layer
(C) Network                  (D) Transport
Answer: C


Post a Comment

0 Comments