1. When collection of various computers seems a single coherent system to its client, then it is called computer network distributed system mail system networking system 2. Two devices are in network if pids of the processes running of different devices are same a process is active and another is inactive a process in one device is able to exchange information with a process in another device a process is running on both devices 3. Which of the following computer networks is built on the top of another network? overlay network prior network prime network chief network 4. In computer network nodes are the computer that originates the data the computer that routes the data the computer that terminates the data all of the mentioned 5. Communication channel is shared by all the machines on the network in anycast network broadcast network multicast network unicast network 6. Which of the following networks extends a private network across public networks? local area network virtual private network storage area network enterprise private network 7. Which network topology requires a central controller or hub? bus ring star mesh 8. Which one of the following is not used in media access control? fiber distributed data interface ethernet packet switching digital subscriber line 9. Data communication system spanning states, countries, or the whole world is pan man wan lan 10. Physical or logical arrangement of network is topology routing networking control 11. Data communication system within a building or campus is wan man lan pan 12. Which one of the following is not an application layer protocol used in internet? local procedure call internet relay chat remote procedure call resource reservation protocol 13. The model is 7-layer architecture where each layer is having some specific functionality to perform. ois tcp/ip cloud osi 14. Which protocol assigns IP address to the client connected in the internet? ip dhcp rpc rsvp 15. Which level is the network layer in the OSI model? second level third level fifth layer fourth level 16. The full form of OSI is OSI model is open systems internet open software interconnection open systems interconnection open software internet 17. Data in network layer is transferred in the form of packets layers bytes bits 18. The network layer contains which hardware device? routers, bridges and switches routers, bridges bridges only bridges and switches 19. DDP stands for datagram device protocol device delivery protocol device datagram protocol datagram delivery protocol 20. RIP stands for reduced internet protocol routing internet protocol reduced information protocol routing information protocol 21. topology requires a multipoint connection. bus ring mesh star 22. Which of the following is not physical layer vulnerability? unauthorized network access physical damage or destruction of data & hardware physical theft of data & hardware keystroke & other input logging 23. Properties of Fourier transform are time shifting property duality property all of the mentioned modulation property 24. Which of the following is an example of data-link layer vulnerability? physical theft of data weak or non-existent authentication route spoofing mac address spoofing 25. Header of a frame generally contains addresses all of the mentioned synchronization bytes frame identifier 26. In the digital communication system, signals in different frequency bands are orthogonal & non orthogonal orthogonal non orthogonal none of the mentioned 27. CRC stands for code redundancy check code repeat check cyclic redundancy check cyclic repeat check 28. Properties of impulse function are shifting time scaling all of the mentioned symmetry 29. A base-band signal can be up-converted using none of the mentioned filtering sine wave cosine wave 30. Which sublayer of the data link layer performs data link functions that depend upon the type of medium? logical link control sublayer network interface control sublayer error control sublayer media access control sublayer 31. Which of the following is an example of network layer vulnerability? weak or non-existent authentication physical theft of data route spoofing mac address spoofing 32. A band-pass signal can be down-converted using cosine wave sine wave none of the mentioned time delayed wave 33. In down-conversion multiplication with cosine wave is followed by bandpass filter low pass filter bandstop filter high pass filter 34. Which of the following is an example of physical layer vulnerability? route spoofing keystroke & other input logging weak or non-existent authentication mac address spoofing 35. Which of the following tasks is not done by data link layer? channel coding flow control framing error control 36. When 2 or more bits in a data unit has been changed during the transmission, the error is called random error double error inverted error burst error 37. Which of the following is a data link protocol? point to point protocol all of the mentioned ethernet hdlc 38. Which can be used as an intermediate device in between transmitter entity and receiver entity? ip router all of the mentioned microwave router telephone switch 39. What is interframe gap? idle time between networks idle time between packets idle time between frame bits idle time between frames 40. MAC address is of 42 bits 24 bits 48 bits 36 bits 41. The time required to transmit frame depends on channel capacity frame size & channel capacity frame size none of the mentioned 42. The maximum size of payload field in ethernet frame is 1000 bytes 1300 bytes 1200 bytes 1500 bytes 43. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called runt frame short frame mini frame man frame 44. What is WPA? wi-fi protected access wired process access wired protected access wi-fi process access 45. Window given the number of bytes frames bytes & frames none of the mentioned 46. In wireless ad-hoc network nodes are not required access point is not required access point is must all nodes are access points 47. Routing is none of the mentioned static dynamic static & dynamic Submit Answers Retake Test More Computer Science Engineering Study Material › Computer Science Engineering Mock Tests with Answers Distributed Computing System Mock Test Software Project Management Mock TestArtificial Intelligence and Robotics Mock TestBasics of Database Management Mock TestC# Programming Mock TestC#.NET Programming Mock TestCloud Computing Mock TestCommunication Network Mock TestComputer Architecture Mock TestComputer Architecture and Organization Mock TestComputer Fundamentals Mock TestComputer Networking Mock TestComputer Networks Mock TestCPP Programming Mock TestData Analysis Mock TestData Communication and Computer Network Mock TestData Compression and Data Retrieval Mock TestData Mining and Business Intelligence Mock TestData Mining and Data Warehouse Mock TestData Structure and Algorithms Mock TestData Structures Mock TestDataBase Management System Mock TestDesign and Analysis of Algorithms Mock TestDigital Electronics and Logic Design Mock TestDigital Logic Circuits Mock TestDigital Principles and System Design Mock TestDiscrete Mathematics Mock TestDiscrete Structure Mock TestDotNet Technology Mock TestEmbedded Real Time Operating System Mock TestGreen Computing Mock TestHigh Performance Computing Mock TestInformation Cyber Security Mock TestInformation and Network Security Mock TestInformation Retrival Techniques Mock TestInformation Systems and Engineering Economics Mock TestMachine Learning Mock TestMicroprocessor and Interfacing Technique Mock TestMicroprocessors Mock TestMuli core Architectures and Pro Mock TestMulti core processors Mock TestNetwork Security Mock TestNeural Networks and Fuzzy Control Object Oriented Programming Mock TestOperating System Architecture Mock TestOperating System Mock TestProblem Solving and Python Programming Mock TestProgramming for Problem Solving Mock TestPython Programming Mock TestSoft Computing Mock TestSoftware Design Modeling Mock TestSoftware Engineering Mock TestSoftware Testing Mock TestSoftware Testing and Quality Assurance Mock TestTheory of Computation and Compiler Design Mock TestTheory of Computation Mock TestUbiquitous Computing System Mock Test Computer Science Engineering Mock Tests