http://csmcq.blogspot.
com/2012/03/data-
communication-and-networks-04.html
Sunday, 18 March 2012
Data Communication And Networks 04
1. The device used for splits data into frames and then combines frames into data in
frame relay is termed as
a. FRAD(Frame Relay And Disassembly)
b. Framing
c. Both a & b
d. Slipping Window Protocol
2. The Error controls involves
a. Sequencing of control frame
b. Sending of control frame
c. Both a & b
d. None of these
3. During communication, a channel that is noisy may causes
a. Loss of bits from a frame
b. Flips of bits
c. Complete disappearance of frames
d. Introduction of new bits in the frame
e. All of these
4. The data link layer encapsulates each packet in a frame by adding
a. Header
b. Trailer
c. Both a & b
d. None of these
5. The Frame format of framing are
a. DLCI-10bits
b. EA-2location(First one is fixed at 0 and second at 1)
c. DE-1 is set for the part that can be discarded first when congestion occurs
d. Data size-vary up to 4096bytes
e. All of these
6. Which is a simple data link protocol based on certain ideal assumptions to explain
the working of the data link layer
a. Stop ARQ
b. Wait ARQ
c. Go back-N ARQ
d. Both a & b
7. The assumptions of Stop and Wait ARQ are as
a. Infinite buffer size
b. Half Duplex
c. Does not produce any error
d. Network layers are always ready
e. All of these
8. The protocol based on the assumption are called
a. Elementary data link protocol
b. Data link protocol
c. Sliding Window Protocol
d. HDLC
9. The basic objective of computer communication in a network environment is to
send an infinitely long message from the ____________
a. Source node to the source node
b. Destination node to the destination node
c. Source node to the destination node
d. None of these
10. In stop and wait protocol
a. Sequence number are required
b. Sequence number are not required
c. Both a & b
d. None of these
11. The stop and wait protocol is
a. easy to Implement
b. Does not call for congestion
c. Both a & b
d. None of these
12. The disadvantage of stop and wait protocol is
a. Error free communication channel does not exist
b. Acknowledgement may get lost
c. Deadlock situation may occur
d. All of these
13. Which protocol enables the source machine to possess more than one
outstanding frame at a time by using buffers
a. Stop ARQ
b. Wait ARQ
c. Go back-N ARQ
d. Both a & b
14. The Go back-N ARQ overcomes the problem of
a. PAR
b. PER
c. PRA
d. DAR
15. Another important issue in the design if the data link is to control the rate of data
transmission between _____________
a. Source and destination host
b. Two source and destination host
c. Three source and destination host
d. None of these
16. Which one is the important protocol used by the data link layer
a. Sliding protocol
b. Sliding Window protocol
c. Stop sliding approach
d. None of these
17. The sender keeps a list o consecutive sequence numbers is known as
a. Window
b. Sending window
c. Stop and wait ARQ
d. Sliding window
18. Which protocol is for data transmission and is bi-directional, used in the data link
layer that corresponds to layer 2 of OSI model
a. Sending window
b. Sliding window protocol
c. Stop and wait ARQ
d. Sliding window
19. Sliding window protocol keeps record of frame sequences sent and acknowledged
when communication takes place between ____________
a. Users
b. Two users
c. More users
d. None of these
20. Sliding window protocol is also used by most of the _______________________
a. Connection oriented protocols
b. Connection oriented network protocols
c. Connection network protocols
d. None of these
21. Which is used by many users to establish their home PC to the Internet via a
phone-line connection
a. FTP
b. PPP
c. OSI
d. PAR
e.
22. Sliding window protocol works on _________ in which there is simultaneous
two-way communication
a. no duplex
b. half duplex
c. full duplex
d. single duplex
e.
23. Sliding window protocol makes use of two types of frames namely
a. Data frame
b. Acknowledgement frame
c. Both a & b
d. None of these
24. Another improvement is done over this stop and wait type protocol by use of
________
a. Back
b. Piggybacking
c. Piggy
d. None of these
25. A technique in which acknowledgement is temporarily delayed and then hooked
onto next outgoing frame is known as
a.
b. Back
c. Piggybacking
d. Piggy
e. None of these
26. RTT stands for
a. Robin time taken
b. Round trip time
c. Round time trip
d. Round time trip
27. The variants of sliding window protocol are
a. Go back n
b. Selective repeat
c. Selective reject
d. All of these
28. The sliding window protocol employs ___________
a. A wait approach
b. A stop approach
c. Both a & b
d. None of these
29. HDLC is a __________ synchronous data link layer protocol
a. Bit-oriented
b. Byte-oriented
c. Both a & b
d. None of these
e.
30. HDLC provides
a. Switched protocol
b. Non- Switched protocol
c. Both a & b
d. None of these
31. HDLC is a superset of ___________
a. ADCCP
b. SDLC
c. ISO
d. OSI
32. HDLC also has a subset of ______________
a. ADCCP
b. SDLC
c. ISO
d. FRAD
33. Which is another subset of HDLC that finds use in packet switched networks of
ITU-TS X.25
a. ADCCP
b. SDLC
c. LAP-B(Link Access Protocol-Balanced)
d. None of these
34. In HDLC three types of stations are specified by the data link layer
a. Primary Station
b. Secondary Station
c. Combined Station
d. All of these
35. HDLC works on three different types of configurations namely
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. All of these
36. Frames of secondary station are known as _________ are sent only on request by
the primary station
a. Response
b. Responses frame
c. Both a & b
d. None of these
37. Which is a unit of data transmission
a. Frame
b. Stop and wait ARQ
c. HDLC
d. Frame relay
38. A configuration has at least two combined stations in which every station has
equal and complimentary responsibility known as __________________
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. None of these
39. Balanced configurations find use only in the such cases as given below
a. Operation: Full or half duplex
b. Network: Point to Point
c. Both a & b
d. None of these
40. A configuration has one primary station and at least one secondary station , and
it exists as one station exercises control over other stations known as ________
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. None of these
41. Symmetrical configurations comprises of _________________________
a. Two independent
b. Unbalanced stations
c. Connected point to point
d. All of these
e.
42. Logically, every station is considered as __________ stations
a. 1
b. 2
c. 3
d. 4
e.
43. The protocol and data are totally independent, this property known as
____________
a. Transmission
b. Transparency
c. Transparent
d. Transport
44. In HDLC, problems like _______________ do not occur
a. Data loss
b. Data duplication
c. Data corruption
d. All of these
45. How many modes of operations are defined for the HDLC protocol
a. 2
b. 3
c. 4
d. 5
46. Three modes of operations are defined for the HDLC protocol
a. Normal Response Mode(NRM)
b. Asynchronous Response Mode(ARM)
c. Synchronous Balanced Mode(ABM)
d. All of these
47. In primary station initializes links for controlling the data flow between
___________
a. Primary and secondary stations
b. Error control
c. Logical disconnection of the second stations
d. All of these
48. The ABM mode is suitable only to __________ environment
a. Point
b. Point-to-point
c. First-to-end-point
d. None of these
49. In the HDLC protocol, frame consists of __________
a. Three fields
b. Four fields
c. Five fields
d. Six fields
e.
50. A special eight-bit sequence ________ is referred to as a flag
a. 01111111
b. 01111110
c. 11101110
d. 11101110
51. In the HDLC protocol, every frame consists of __________ with a flag
a. Starts
b. End
c. Both a & b
d. None of these
52. A 8-bit address is used when the total number of stations exceeds _______
a. 64
b. 128
c. 256
d. None of these
53. Data can be arbitrarily ______
a. Long
b. Empty
c. Full
d. Both a & b
54. The HDLC procedure uses a flag synchronous system, these are
a. Bit order of transmission (information frame)
b. Bit order of transmission (supervisor frame)
c. Both a & b
d. None of these
55. FCS (frame check sequence) is a _______ sequence for error control
a. 4bit
b. 16bit
c. 32bit
d. 64bit
56. The disadvantage of SLIP are as follows
a. No error check function is available
b. Protocols other than IP cannot be used
c. No function is available to authenticate link level connections
d. No function is available to detect loops
e. All of these
57. PPP has several advantages over non-standard protocol such as
a. SLIP
b. X.25
c. Both a & b
d. None of these
e.
58. PPP was designed to work with layer 3 network layer protocols including
___________
a. IP
b. IPX
c. Apple talk
d. All of these
59. PPP can connect computers using _________
a. Serial cable, phone line
b. Trunk line, cellular telephone
c. Specialized radio links
d. Fiber optic links
e. All of these
60. Most dial-up access to Internet is accomplished by using _____
a. HDLC
b. PPP
c. IP
d. IPX
61. RAS has an important role in the proliferation of Internet based services in the
form of _________________
a. VoIP
b. Data over IP
c. Both a & b
d. None of these
62. Which is opening new challenges in the development of RAS where VoIP
enabled RAS are the need of time
a. Voice convergence
b. Data convergence
c. Voice and data convergence
d. None of these
63. Remote access is possible through an __________________
a. Internet service provider
b. Dial up connection through desktop
c. Notebook over regular telephone lines
d. Dedicated line
e. All of these
64. A remote access server also known as ____________________
a. Communication
b. Communication server
c. Layer
d. None of these
65. RAS technology can be divided into two segments _________
a. Enterprise
b. Infrastructure
c. Both a & b
d. None of these
66. VPN stands for
a. Virtual Public networking
b. Virtual private networking
c. Virtual package networking
d. Virtual packet networking
67. PPP provides three principal components
a. Encapsulating datagrams
b. Establishment, configurations and testing
c. Establishment and configurations
d. All of these
68. PPP is able to function across any _______ interface
a. DTE
b. DCE
c. Both a & b
d. None of these
69. PPP may include
a. RS232C
b. RS-423
c. Both a & b
d. None of these
e.
70. In PPP, the default maximum length of the information field is ________
a. 1000bytes
b. 1500bytes
c. 2000bytes
d. 2500bytes
e.
71. The protocols that are differentiate PPP from HDLC are the
a. Link Control Protocol(LCP)
b. Network Control Protocol(NCP)
c. Both a & b
d. None of these
72. For terminate PPP ,the four steps are
a. Link establishment
b. Link configuration negotiation
c. Configuration acknowledgement frame
d. Configuration terminates
e. All of these
73. The LCP can terminates the link at any time is done by
a. Request to the user
b. Not Request to the user
c. Both a & b
d. None of these
74. The termination of link may happen
a. Due to physical event
b. Due to logical event
c. Due to window event
d. None of these
75. The three classes of LCP frames are
a. Link establishment frame
b. Link termination frame
c. Link maintenance frame
d. All of these
76. The NCP phase in PPP link connection process is used for establishing and
configuring different network layer protocols such as
a. IP
b. IPX
c. AppleTalk
d. All of these
77. In NCP, The link traffic consists of any possible combination of
a. NCP
b. LCP
c. Network-layer protocol packets
d. All of these
78. The IP control Protocol(IPCP) is the
a. IP-specific LCP protocol
b. IP-specific NCP protocol
c. Both a & b
d. None of these
79. If the calling peer has an IP address, it tells the
a. Called peer What it is
b. The called peer can assign the caller one from a pool of addresses
c. Both a & b
d. None of these
80. If the calling peer does not have an IP address, it tells the
a. Called peer What it is
b. The called peer can assign the caller one from a pool of addresses
c. Both a & b
d. None of these
81. The authentication process involves transmission of password information
between
a. RADIUS server
b. RAS(Remote Access Server)
c. Both a & b
d. None of these
82. The Authentication transaction used between a Remote access user and RAS can
be divided into two categories are
a. PAP(Password Authentication Protocol)
b. CHAP(Challenge Handshake Authentication Protocol)
c. Both a & b
d. None of these
83. The digest is a
a. One-way encryption
b. Two- way encryption
c. Three- way encryption
d. Four- way encryption
84. The technology which is useful for creating Virtual Private Networks (VPNs) has
been developed by
a. Microsoft Corporation
b. U.S. Robotics
c. Several remote access vendor companies, known as PPTP forum
d. All of these
85. PPTP means
a. Point-to-Point Tunneling Protocol
b. Point-to-Point Termination Protocol
c. Private-to-Private termination protocol
d. Private-to-Private Tunneling Protocol
86. The PPTP is used to ensure that message transmitted from one VPN node to
another are
a. Not secure
b. Secure
c. Networks
d. IPX
87. What is the extension of PPTP
a. PPP
b. RAS
c. L2TP(Layer Two Tunneling Protocol)
d. None of these
88. The two main components that make up L2TP are the
a. L2TP Access Concentrator(LAC)
b. L2TP Network Server(LNS)
c. Both a & b
d. None of these
89. A user connects to NAS through
a. ADSL
b. Dialup POTS
c. ISDN
d. Other service
e. All of these
90. Which is a platform on which Internet service providers(ISP) and other service
providers enables their user to access the various internet based services
a. RAS
b. TCP
c. ARQ
d. SLIP