Home / CSE / Networking :: Section 3

CSE :: Networking

  1. The transmission signal coding method of TI carrier is called

  2. A.
    Bipolar
    B.
    NRZ
    C.
    Manchester
    D.
    Binary
    E.
    None of the above

  3. Which of the following statement is correct?

  4. A.
    Buffering is the process of temporarily storing the data to allow for small variation in device speeds
    B.
    Buffering is a method to reduce cross-talks
    C.
    Buffering is a method to reduce the routing overhead
    D.
    Buffering is storage of data within the transmitting medium until the receiver is ready to receive
    E.
    None of the above

  5. You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?

  6. A.
    255.255.255.192
    B.
    255.255.255.224
    C.
    255.255.255.240
    D.
    255.255.255.248
    E.
    255.255.255.252

  7. Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?

  8. A.
    Paperless office
    B.
    Electronic mail
    C.
    Global network
    D.
    Electronic newspaper
    E.
    None of the above

  9. HDLC (High-level Data Link Control) is

  10. A.
    a method of determining which device has access to the transmission medium at any time
    B.
    a method access control technique for multiple-access transmission media
    C.
    a very common bit-oriented data link protocol issued by ISO.
    D.
    network access standard for connecting stations to a circuit-switched network
    E.
    None of the above

  11. You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?

  12. A.
    255.255.255.192
    B.
    255.255.255.224
    C.
    255.255.255.240
    D.
    255.255.255.248
    E.
    255.255.255.252

  13. Establishing a virtual connection is functionally equivalent to

  14. A.
    Connecting as virtual memory
    B.
    Physically connecting a DTE and DCE
    C.
    Placing a telephone call prior to a conversation
    D.
    Placing a modem prior to a conversation
    E.
    None of the above

  15. The first step in troubleshooting many problems is to verify which of the following?

  16. A.
    The subnet mask is valid
    B.
    TCP/IP is installed correctly on the client
    C.
    The WINS server is running
    D.
    The BDC is operable
    E.
    None of the above

  17. You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?

  18. A.
    255.255.192.0
    B.
    255.255.224.0
    C.
    255.255.240.0
    D.
    255.255.248.0
    E.
    255.255.255.0

  19. Which of the following files is used for NetBIOS name resolution?

  20. A.
    HOSTS
    B.
    LMHOSTS
    C.
    ARP
    D.
    FQDN
    E.
    None of the above