COMPUTER NETWORK AND SECURITY

Data link layer MCQ , Computer Network

 

Services

Question 1:

What is the primary function of the Data Link Layer in the OSI model?

A) End-to-end communication
B) Logical addressing and routing
C) Physical addressing and access to the media
D) Error detection and correction

Answer:

C) Physical addressing and access to the media

 


Question 2:

Which service provided by the Data Link Layer ensures that frames are delivered without errors?

A) Flow control
B) Error detection and correction
C) Frame sequencing
D) Address resolution

Answer:

B) Error detection and correction

 


Question 3:

What is the purpose of frame synchronization in the Data Link Layer?

A) To mark the beginning and end of a frame
B) To ensure secure communication
C) To manage network addresses
D) To control data flow between devices

Answer:

A) To mark the beginning and end of a frame

 


Question 4:

Which service is responsible for avoiding congestion and managing the flow of data between two devices?

A) Error detection
B) Flow control
C) Frame sequencing
D) Address resolution

Answer:

B) Flow control

 


Question 5:

What does the Address Resolution Protocol (ARP) provide at the Data Link Layer?

A) Logical addressing
B) Physical addressing
C) Flow control
D) Error detection

Answer:

B) Physical addressing

 


Question 6:

Which mechanism is used by the Data Link Layer for efficient and orderly frame delivery?

A) Flow control
B) Error correction
C) Frame sequencing
D) Address resolution

Answer:

C) Frame sequencing

 


Question 7:

What service is responsible for detecting and recovering from errors that occur during the transmission of frames?

A) Flow control
B) Address resolution
C) Error detection and correction
D) Frame sequencing

Answer:

C) Error detection and correction

 


Question 8:

Which sublayer of the Data Link Layer is responsible for Media Access Control (MAC) addressing?

A) Logical Link Control (LLC)
B) Service Access Point (SAP)
C) Logical Addressing Sublayer
D) Media Access Control (MAC)

Answer:

D) Media Access Control (MAC)

 


Question 9:

What is the primary function of the Logical Link Control (LLC) sublayer in the Data Link Layer?

A) Error detection and correction
B) Flow control
C) Logical addressing
D) Frame sequencing

Answer:

C) Logical addressing 

 


Question 10:

Which protocol is commonly used for dynamic address resolution in a TCP/IP network?

A) IP
B) TCP
C) ICMP
D) ARP

Answer:

D) ARP


 

Error Detection and Corrections

 

Question 1:

What is the primary purpose of error detection in data communication?

A) To eliminate all errors in the transmitted data
B) To identify and indicate the presence of errors in the transmitted data
C) To correct errors automatically without intervention
D) To ensure faster data transmission

Answer:

B) To identify and indicate the presence of errors in the transmitted data

 


Question 2:

Which error detection technique involves appending an extra bit to each data unit?

A) Checksum
B) Parity bit
C) Cyclic Redundancy Check (CRC)
D) Hamming Code

Answer:

B) Parity bit

 


Question 4:

Which error detection method uses a polynomial division approach?

A) Checksum
B) Parity bit
C) Cyclic Redundancy Check (CRC)
D) Hamming Code

Answer:

C) Cyclic Redundancy Check (CRC)

 


Question 5:

What is the purpose of a checksum in error detection?

A) To add extra bits for correction
B) To identify the location of errors
C) To count the number of errors
D) To generate redundancy for error detection

Answer:

D) To generate redundancy for error detection

 


Question 6:

Which error detection method is capable of both detecting and correcting errors?

A) Checksum
B) Parity bit
C) Cyclic Redundancy Check (CRC)
D) Hamming Code

Answer:

D) Hamming Code

 


Question 7:

What is the advantage of using a cyclic redundancy check (CRC) over a checksum?

A) CRC provides faster error detection.
B) CRC can correct errors automatically.
C) CRC is more efficient for long data streams.
D) CRC is simpler to implement.

Answer:

C) CRC is more efficient for long data streams.

 


Question 8:

In error correction using Hamming Code, how many parity bits are added to a data block of 'n' bits?

A) n
B) log(n)
C) log₂(n) + 1
D) 2n

Answer:

C) log₂(n) + 1

 


Question 9:

What is the purpose of forward error correction (FEC) techniques in data communication?

A) To correct errors automatically without retransmission
B) To detect errors and request retransmission
C) To eliminate the need for error detection
D) To minimize the impact of errors on the network

Answer:

A) To correct errors automatically without retransmission

 


Question 10:

Which error correction technique involves sending redundant bits along with the data?

A) Checksum
B) Parity bit
C) Cyclic Redundancy Check (CRC)
D) Forward Error Correction (FEC)

Answer:

D) Forward Error Correction (FEC)



 

Flow Control

 

Question 1:

What is the purpose of flow control in data communication?

A) To prevent unauthorized access
B) To manage the flow of data between sender and receiver
C) To encrypt transmitted data
D) To detect and correct errors in the data

Answer:

B) To manage the flow of data between sender and receiver

 


Question 2:

Which flow control method involves the receiver sending messages to the sender to control the rate of data transmission?

A) Stop-and-Wait
B) Sliding Window
C) Go-Back-N
D) Selective Repeat

Answer:

A) Stop-and-Wait

 


Question 3:

In flow control, what is the purpose of the "window" concept?

A) To provide encryption for transmitted data
B) To manage the rate of data transmission
C) To detect errors in the data
D) To control access to the network

Answer:

B) To manage the rate of data transmission

 


Question 4:

What is the primary disadvantage of the Stop-and-Wait flow control method?

A) Inefficient use of network bandwidth
B) Difficulty in error detection
C) Complex implementation
D) High overhead in acknowledging each frame

Answer:

A) Inefficient use of network bandwidth

 


Question 5:

Which flow control technique allows multiple frames to be in transit between the sender and receiver simultaneously?

A) Stop-and-Wait
B) Sliding Window
C) Go-Back-N
D) Selective Repeat

Answer:

B) Sliding Window

 


Question 6:

In Go-Back-N flow control, what happens when an error is detected in one frame?

A) The sender retransmits only the frame with the error.
B) The sender retransmits all frames from the one with the error onwards.
C) The sender skips the frame with the error and continues transmitting.
D) The receiver discards the frame with the error.

Answer:

B) The sender retransmits all frames from the one with the error onwards.

 


Question 7:

Which flow control method provides the highest efficiency in terms of network bandwidth utilization?

A) Stop-and-Wait
B) Sliding Window
C) Go-Back-N
D) Selective Repeat

Answer:

D) Selective Repeat

 


Question 8:

What is the purpose of the acknowledgment (ACK) and negative acknowledgment (NAK) messages in flow control?

A) To verify the identity of the sender
B) To request additional data
C) To confirm successful receipt of frames or indicate errors
D) To encrypt transmitted data

Answer:

C) To confirm successful receipt of frames or indicate errors

 


Question 9:

In flow control, what does the term "congestion control" refer to?

A) Managing the flow of data between sender and receiver
B) Detecting and correcting errors in the data
C) Preventing unauthorized access to the network
D) Managing network traffic to avoid congestion and delays

Answer:

D) Managing network traffic to avoid congestion and delays

 


Question 10:

Which flow control method allows the receiver to selectively request retransmission of specific frames?

A) Stop-and-Wait
B) Sliding Window
C) Go-Back-N
D) Selective Repeat

Answer:

D) Selective Repeat


 

Data Link Protocol

 

Question 1:

Which sublayer of the Data Link Layer is responsible for Media Access Control (MAC) addressing?

A) Logical Link Control (LLC)
B) Service Access Point (SAP)
C) Logical Addressing Sublayer
D) Media Access Control (MAC)

Answer:

D) Media Access Control (MAC)

 


Question 2:

In Ethernet, what is the purpose of the MAC address?

A) To identify the physical location of a device on the network
B) To uniquely identify a device on a network segment
C) To establish a secure connection between devices
D) To manage logical addressing

Answer:

B) To uniquely identify a device on a network segment

 


Question 3:

What is the primary function of the Logical Link Control (LLC) sublayer in the Data Link Layer?

A) Error detection and correction
B) Flow control
C) Logical addressing
D) Frame sequencing

Answer:

C) Logical addressing 

 


Question 4:

In the context of Data Link Protocols, what is the purpose of the Frame Check Sequence (FCS)?

A) To mark the beginning and end of a frame
B) To provide logical addressing for the frame
C) To detect errors in the frame
D) To manage flow control

Answer:

C) To detect errors in the frame

 


Question 5:

Which Data Link Protocol is commonly used in wireless LANs and defines the MAC and LLC sublayers?

A) Ethernet
B) Token Ring
C) IEEE 802.11 (Wi-Fi)
D) HDLC

Answer:

C) IEEE 802.11 (Wi-Fi)

 


Question 6:

What is the primary difference between HDLC and PPP (Point-to-Point Protocol)?

A) HDLC is synchronous, while PPP is asynchronous.
B) HDLC is used in wired networks, while PPP is used in wireless networks.
C) HDLC is a connection-oriented protocol, while PPP is connectionless.
D) HDLC is a bit-oriented protocol, while PPP is byte-oriented.

Answer:

D) HDLC is a bit-oriented protocol, while PPP is byte-oriented.

 


Question 7:

What is the purpose of the Service Access Point (SAP) in the Data Link Layer?

A) To manage network addresses
B) To mark the beginning and end of a frame
C) To specify the type of service provided by the LLC
D) To provide error detection and correction

Answer:

C) To specify the type of service provided by the LLC

 


Question 8:

Which Data Link Protocol uses a token-passing access method and operates at the Media Access Control (MAC) sublayer?

A) Ethernet
B) Token Ring
C) FDDI (Fiber Distributed Data Interface)
D) PPP (Point-to-Point Protocol)

Answer:

B) Token Ring

 


Question 9:

In Ethernet, what is the default frame type used by the IEEE 802.2 LLC sublayer?

A) Ethernet II frame
B) IEEE 802.3 frame
C) SNAP (Subnetwork Access Protocol) frame
D) LLC (Logical Link Control) frame

Answer:

C) SNAP (Subnetwork Access Protocol) frame

 


Question 10:

What is the primary function of the Media Access Control (MAC) sublayer in the Data Link Layer?

A) Logical addressing and routing
B) Error detection and correction
C) Frame sequencing
D) Controlling access to the network medium

Answer:

D) Controlling access to the network medium

 

Multiple access protocols

 

Question 1:

Which multiple access protocol is commonly used in Ethernet networks, where devices contend for access to the shared medium?

A) TDMA (Time Division Multiple Access)
B) CDMA (Code Division Multiple Access)
C) FDMA (Frequency Division Multiple Access)
D) CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

Answer:

D) CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

 


Question 2:

In a CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) protocol, what action does a device take before transmitting to avoid collisions?

A) It waits for a random time
B) It checks for the availability of the channel
C) It transmits immediately
D) It requests permission from a central authority

Answer:

B) It checks for the availability of the channel

 


Question 3:

Which multiple access protocol assigns a specific time slot to each device for transmission, avoiding collisions?

A) CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
B) TDMA (Time Division Multiple Access)
C) FDMA (Frequency Division Multiple Access)
D) CDMA (Code Division Multiple Access)

Answer:

B) TDMA (Time Division Multiple Access)

 


Question 4:

In a slotted ALOHA protocol, what is a time slot?

A) The time it takes to transmit one frame
B) A fixed interval of time during which transmissions can occur
C) The total time allocated for data transmission
D) The time between collisions

Answer:

B) A fixed interval of time during which transmissions can occur

 


Question 5:

Which multiple access protocol uses a polling mechanism, where a central authority controls access to the shared medium?

A) CSMA/CD
B) TDMA
C) FDMA
D) Polling

Answer:

D) Polling

 


Question 6:

What is the main advantage of CDMA (Code Division Multiple Access) in wireless communication?

A) Efficient use of bandwidth
B) Simple implementation
C) Low latency
D) Fixed time slots for each device

Answer:

A) Efficient use of bandwidth

 


Question 7:

In CSMA/CD, what does a device do after detecting a collision?

A) It continues transmitting without any action.
B) It increases its transmission power.
C) It stops transmitting and waits for a random time before retransmitting.
D) It requests permission from a central authority.

Answer:

C) It stops transmitting and waits for a random time before retransmitting.

 


Question 8:

Which multiple access protocol allows multiple devices to transmit simultaneously on different frequencies?

A) CSMA/CD
B) TDMA
C) FDMA
D) CDMA

Answer:

C) FDMA (Frequency Division Multiple Access)

 


Question 9:

What is the main limitation of ALOHA protocols in terms of channel efficiency?

A) Devices cannot transmit simultaneously.
B) Devices must wait for a central authority's permission.
C) Collisions are not detected.
D) The channel is often underutilized.

Answer:

A) Devices cannot transmit simultaneously.

 


Question 10:

Which multiple access protocol is commonly used in cellular networks, where each device is assigned a unique code?

A) CSMA/CD
B) TDMA
C) FDMA
D) CDMA

Answer:

D) CDMA (Code Division Multiple Access)


 

LAN addressing and ARP (Address Resolution Protocol)

 

Question 1:

In a local area network (LAN), what is the purpose of a MAC address?

A) To identify the network segment
B) To uniquely identify a device on the LAN
C) To route data between LANs
D) To assign IP addresses

Answer:

B) To uniquely identify a device on the LAN

 


Question 2:

Which layer of the OSI model is responsible for addressing and data-link control in LANs?

A) Network Layer
B) Transport Layer
C) Data Link Layer
D) Physical Layer

Answer:

C) Data Link Layer

 


Question 3:

What is the length of a typical MAC address in a LAN?

A) 8 bits
B) 16 bits
C) 32 bits
D) 48 bits

Answer:

D) 48 bits

 


Question 4:

In Ethernet LANs, what is the format of a MAC address?

A) Decimal
B) Hexadecimal
C) Binary
D) Octal

Answer:

B) Hexadecimal

 


Question 5:

What is the purpose of ARP (Address Resolution Protocol) in a LAN?

A) To assign IP addresses dynamically
B) To translate MAC addresses to IP addresses
C) To route data between different networks
D) To secure communication in the LAN

Answer:

B) To translate MAC addresses to IP addresses

 


Question 6:

In ARP, what happens when a device wants to determine the MAC address associated with a specific IP address?

A) The device broadcasts an ARP request.
B) The device sends a unicast ARP request.
C) The device sends an ICMP request.
D) The device queries the DNS server.

Answer:

A) The device broadcasts an ARP request.

 


Question 7:

What is the purpose of the ARP cache in a device?

A) To store MAC addresses of all devices in the network
B) To store IP addresses of all devices in the network
C) To store a mapping of IP addresses to MAC addresses for quicker reference
D) To store the default gateway's IP address

Answer:

C) To store a mapping of IP addresses to MAC addresses for quicker reference

 


Question 8:

How does ARP handle the situation where two devices on the same LAN have the same IP address?

A) It assigns a unique MAC address to each device.
B) It assigns a unique IP address to each device.
C) It relies on the MAC address for uniqueness.
D) It broadcasts an ARP request to resolve the conflict.

Answer:

C) It relies on the MAC address for uniqueness.

 


Question 9:

What is the typical time-to-live (TTL) for ARP entries in a device's ARP cache?

A) A few seconds
B) Several minutes
C) Hours
D) Indefinite

Answer:

B) Several minutes

 


Question 10:

In ARP, what is the purpose of the ARP reply?

A) To request IP address assignment
B) To acknowledge receipt of an ARP request
C) To inform devices of network topology changes
D) To update the ARP cache with new entries

Answer:

B) To acknowledge receipt of an ARP request


 

IEEE 802.3(Ethernet)

 

Question 1:

Which sublayer of the Data Link Layer in the IEEE 802.3 standard is responsible for Media Access Control (MAC) addressing?

A) Logical Link Control (LLC)
B) MAC Control
C) MAC Management
D) Medium Access Control (MAC)

Answer:

D) Medium Access Control (MAC)

 


Question 2:

What is the maximum data rate supported by the original Ethernet standard (IEEE 802.3)?

A) 10 Mbps
B) 100 Mbps
C) 1 Gbps
D) 10 Gbps

Answer:

A) 10 Mbps

 


Question 3:

In the context of IEEE 802.3 Ethernet, what is the purpose of the preamble and start frame delimiter?

A) To mark the beginning of a frame
B) To indicate the end of a frame
C) To provide error detection
D) To manage network addresses

Answer:

A) To mark the beginning of a frame

 


Question 4:

What type of Ethernet uses twisted-pair cables and supports data rates of 1000 Mbps?

A) 10BASE-T
B) 100BASE-TX
C) 1000BASE-T
D) 10GBASE-T

Answer:

C) 1000BASE-T

 


Question 5:

Which Ethernet standard operates over fiber optic cables and supports data rates of 1 Gbps?

A) 10BASE-T
B) 100BASE-FX
C) 1000BASE-SX
D) 1000BASE-T

Answer:

C) 1000BASE-SX

 


Question 6:

In Ethernet, what is the purpose of the Carrier Extension field in a frame?

A) To extend the physical length of the frame
B) To identify the source and destination MAC addresses
C) To mark the beginning of a frame
D) To provide error detection

Answer:

A) To extend the physical length of the frame

 


Question 7:

Which Ethernet standard operates at a data rate of 10 Gbps over twisted-pair cables?

A) 10GBASE-T
B) 1000BASE-T
C) 1000BASE-SX
D) 100BASE-TX

Answer:

A) 10GBASE-T

 


Question 8:

In Ethernet, what is the purpose of the frame check sequence (FCS)?

A) To mark the beginning and end of a frame
B) To provide logical addressing for the frame
C) To detect errors in the frame
D) To manage flow control

Answer:

C) To detect errors in the frame

 


Question 9:

Which Ethernet standard uses a token-passing access method?

A) 10BASE-T
B) 100BASE-TX
C) 100BASE-FX
D) 100BASE-T4

Answer:

C) 100BASE-FX

 


Question 10:

What type of Ethernet uses coaxial cables and supports data rates of 10 Mbps?

A) 10BASE-T
B) 10BASE2
C) 100BASE-TX
D) 100BASE-FX

Answer:

B) 10BASE2


 

802.4(Token Bus)


 

Question 1:

What is the primary access method used in IEEE 802.4 (Token Bus) networks?

A) Carrier Sense Multiple Access (CSMA)
B) Time Division Multiple Access (TDMA)
C) Polling
D) Token Passing

Answer:

D) Token Passing

 


Question 2:

In IEEE 802.4, what is the purpose of the token?

A) To mark the beginning and end of a frame
B) To provide logical addressing for the frame
C) To control access to the network medium
D) To detect errors in the frame

Answer:

C) To control access to the network medium

 


Question 3:

How is access to the network medium controlled in IEEE 802.4 (Token Bus) networks?

A) Devices contend for access through random access
B) Devices must wait for a polling signal
C) Devices pass a token to gain permission to transmit
D) Devices use a reservation system to secure access

Answer:

C) Devices pass a token to gain permission to transmit

 


Question 4:

In IEEE 802.4, what happens when a device receives the token?

A) It discards the token and continues transmitting.
B) It appends its address to the token and passes it to the next device.
C) It checks if it has data to transmit and attaches the data to the token.
D) It waits for a separate permission signal to transmit.

Answer:

C) It checks if it has data to transmit and attaches the data to the token.

 


Question 5:

What is the advantage of the token-passing mechanism in IEEE 802.4 networks?

A) Devices can transmit data simultaneously.
B) Devices do not need to contend for access.
C) Collisions are detected and resolved automatically.
D) Devices have guaranteed access to the network.

Answer:

D) Devices have guaranteed access to the network.

 


Question 6:

In IEEE 802.4, how does a device indicate that it has completed its transmission?

A) By appending a special flag to the token
B) By releasing the token back onto the network
C) By sending a separate acknowledgment frame
D) By broadcasting an acknowledgment signal

Answer:

B) By releasing the token back onto the network

 


Question 7:

Which topology is commonly associated with IEEE 802.4 (Token Bus) networks?

A) Star
B) Bus
C) Ring
D) Mesh

Answer:

B) Bus

 


Question 8:

What is the potential disadvantage of a single point of failure in IEEE 802.4 (Token Bus) networks?

A) Increased network efficiency
B) Guaranteed access to the network
C) Risk of network disruption if the token is lost
D) Simplicity of network management

Answer:

C) Risk of network disruption if the token is lost

 


Question 9:

What happens if a device in an IEEE 802.4 network fails to release the token after transmitting its data?

A) The network becomes congested.
B) The token is discarded, causing a network outage.
C) Other devices cannot access the network.
D) The device is automatically disconnected from the network.

Answer:

A) The network becomes congested.

 


Question 10:

What is the role of the token monitor in IEEE 802.4 networks?

A) To control access to the network medium
B) To supervise the flow of tokens and detect failures
C) To generate tokens and assign addresses
D) To manage logical addressing in the network

Answer:

B) To supervise the flow of tokens and detect failures


 

802.5(Token Ring)

Question 1:

What is the primary access method used in IEEE 802.5 (Token Ring) networks?

A) Carrier Sense Multiple Access (CSMA)
B) Time Division Multiple Access (TDMA)
C) Polling
D) Token Passing

Answer:

D) Token Passing

 


Question 2:

In IEEE 802.5, what is the purpose of the token?

A) To mark the beginning and end of a frame
B) To provide logical addressing for the frame
C) To control access to the network medium
D) To detect errors in the frame

Answer:

C) To control access to the network medium

 


Question 3:

How is access to the network medium controlled in IEEE 802.5 (Token Ring) networks?

A) Devices contend for access through random access
B) Devices must wait for a polling signal
C) Devices pass a token to gain permission to transmit
D) Devices use a reservation system to secure access

Answer:

C) Devices pass a token to gain permission to transmit

 


Question 4:

In IEEE 802.5, what happens when a device receives the token?

A) It discards the token and continues transmitting.
B) It appends its address to the token and passes it to the next device.
C) It checks if it has data to transmit and attaches the data to the token.
D) It waits for a separate permission signal to transmit.

Answer:

C) It checks if it has data to transmit and attaches the data to the token.

 


Question 5:

What is the advantage of the token-passing mechanism in IEEE 802.5 networks?

A) Devices can transmit data simultaneously.
B) Devices do not need to contend for access.
C) Collisions are detected and resolved automatically.
D) Devices have guaranteed access to the network.

Answer:

D) Devices have guaranteed access to the network.

 


Question 6:

In IEEE 802.5, how does a device indicate that it has completed its transmission?

A) By appending a special flag to the token
B) By releasing the token back onto the network
C) By sending a separate acknowledgment frame
D) By broadcasting an acknowledgment signal

Answer:

B) By releasing the token back onto the network

 


Question 7:

Which topology is commonly associated with IEEE 802.5 (Token Ring) networks?

A) Star
B) Bus
C) Ring
D) Mesh

Answer:

C) Ring

 


Question 8:

What is the potential disadvantage of a single point of failure in IEEE 802.5 (Token Ring) networks?

A) Increased network efficiency
B) Guaranteed access to the network
C) Risk of network disruption if the token is lost
D) Simplicity of network management

Answer:

C) Risk of network disruption if the token is lost

 


Question 9:

What happens if a device in an IEEE 802.5 network fails to release the token after transmitting its data?

A) The network becomes congested.
B) The token is discarded, causing a network outage.
C) Other devices cannot access the network.
D) The device is automatically disconnected from the network.

Answer:

A) The network becomes congested.

 


Question 10:

What is the role of the monitor in IEEE 802.5 networks?

A) To control access to the network medium
B) To supervise the flow of tokens and detect failures
C) To generate tokens and assign addresses
D) To manage logical addressing in the network

Answer:

B) To supervise the flow of tokens and detect failures


 

CSMA/CD

Question 1:

What does CSMA/CD stand for in networking?

A) Centralized Spectrum Management with Collision Detection
B) Carrier Sense Multiple Access with Collision Detection
C) Collision-Safe Multiple Access with Carrier Detection
D) Control and Synchronization for Multiple Access with Collision Detection

Answer:

B) Carrier Sense Multiple Access with Collision Detection

 


Question 2:

In CSMA/CD, what does the term "Carrier Sense" refer to?

A) Detecting the presence of other devices on the network
B) Sensing the carrier frequency for modulation
C) Identifying the network medium
D) Detecting collisions during data transmission

Answer:

A) Detecting the presence of other devices on the network

 


Question 3:

What is the primary purpose of Collision Detection in CSMA/CD?

A) To prevent collisions
B) To detect collisions
C) To resolve collisions
D) To avoid collisions

Answer:

B) To detect collisions

 


Question 4:

In CSMA/CD, what action does a device take if it detects a collision while transmitting data?

A) It continues transmitting without any action.
B) It increases its transmission power.
C) It stops transmitting and initiates a collision recovery process.
D) It requests permission from a central authority.

Answer:

C) It stops transmitting and initiates a collision recovery process.

 


Question 5:

What is the purpose of the "Backoff" mechanism in CSMA/CD?

A) To increase the transmission power after a collision
B) To delay retransmission attempts after a collision
C) To initiate a new transmission immediately after a collision
D) To adjust the carrier frequency based on network conditions

Answer:

B) To delay retransmission attempts after a collision

 


Question 6:

In CSMA/CD, when is a collision considered to occur?

A) When two devices transmit simultaneously without sensing the carrier
B) When two devices sense the carrier but transmit at different times
C) When the network is congested with too many devices
D) When a device fails to sense the carrier frequency

Answer:

A) When two devices transmit simultaneously without sensing the carrier

 


Question 7:

What type of network topology is well-suited for CSMA/CD?

A) Bus
B) Star
C) Ring
D) Mesh

Answer:

A) Bus

 


Question 8:

In CSMA/CD, what is the purpose of the "Jam Signal"?

A) To jam communication between devices
B) To indicate the end of a successful transmission
C) To alert other devices about a collision
D) To synchronize devices on the network

Answer:

C) To alert other devices about a collision

 


Question 9:

What is the potential drawback of CSMA/CD in large and high-traffic networks?

A) Inefficiency due to collisions
B) Increased security vulnerabilities
C) Complexity in implementation
D) Lack of carrier sensing capability

Answer:

A) Inefficiency due to collisions

 


Question 10:

Which Ethernet standard originally employed CSMA/CD but is now mostly obsolete?

A) 10BASE-T
B) 100BASE-TX
C) 1000BASE-SX
D) 10GBASE-T

Answer:

A) 10BASE-T


 

Wireless LANs
 

Question 1:

What does the acronym WLAN stand for?

A) Wired Local Area Network
B) Wireless Local Area Network
C) Wide Local Area Network
D) Web Local Area Network

Answer:

B) Wireless Local Area Network

 


Question 2:

Which of the following is a commonly used frequency band for WLANs?

A) 2.4 GHz
B) 5 GHz
C) Both A and B
D) Neither A nor B

Answer:

C) Both A and B

 


Question 3:

What is the purpose of the SSID (Service Set Identifier) in a WLAN?

A) To encrypt data transmissions
B) To uniquely identify a WLAN
C) To assign IP addresses
D) To manage flow control

Answer:

B) To uniquely identify a WLAN

 


Question 4:

Which IEEE standard defines the operation of WLANs using the 2.4 GHz and 5 GHz frequency bands?

A) IEEE 802.11
B) IEEE 802.15
C) IEEE 802.16
D) IEEE 802.3

Answer:

A) IEEE 802.11

 


Question 5:

What is the primary advantage of using MIMO (Multiple Input, Multiple Output) technology in WLANs?

A) Increased coverage area
B) Higher data transfer rates
C) Lower latency
D) Improved security

Answer:

B) Higher data transfer rates

 


Question 6:

Which security protocol is commonly used to secure WLANs by providing encryption and authentication?

A) WEP (Wired Equivalent Privacy)
B) WPA (Wi-Fi Protected Access)
C) SSL (Secure Sockets Layer)
D) HTTP (Hypertext Transfer Protocol)

Answer:

B) WPA (Wi-Fi Protected Access)

 


Question 7:

What is the purpose of the MAC address in a WLAN?

A) To uniquely identify a device on the internet
B) To assign IP addresses dynamically
C) To uniquely identify a device on the WLAN
D) To manage logical addressing

Answer:

C) To uniquely identify a device on the WLAN

 


Question 8:

Which topology is commonly associated with WLANs?

A) Bus
B) Star
C) Ring
D) Mesh

Answer:

B) Star

 


Question 9:

What is the purpose of the Beacon Frame in a WLAN?

A) To provide encryption for data transmissions
B) To synchronize devices on the network
C) To indicate the beginning and end of a frame
D) To manage logical addressing

Answer:

B) To synchronize devices on the network

 


Question 10:

What technology allows mobile devices to seamlessly switch between different WLAN access points without losing connectivity?

A) Roaming
B) Bridging
C) Tunneling
D) Multiplexing

Answer:

A) Roaming

 

PPP (Point to Point Protocol)

Question 1:

What is PPP an abbreviation for in networking?

A) Point-to-Point Protocol
B) Public Packet Processing
C) Peer-to-Peer Protocol
D) Primary Port Procedure

Answer:

A) Point-to-Point Protocol

 


Question 2:

What is the primary purpose of PPP in networking?

A) To connect multiple devices in a LAN
B) To provide secure communication over the internet
C) To establish point-to-point communication over serial links
D) To manage IP addresses dynamically

Answer:

C) To establish point-to-point communication over serial links

 


Question 3:

Which layer of the OSI model does PPP operate on?

A) Data Link Layer
B) Network Layer
C) Transport Layer
D) Physical Layer

Answer:

A) Data Link Layer

 


Question 4:

What authentication protocols are commonly used with PPP for establishing secure connections?

A) PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol)
B) SSL (Secure Sockets Layer) and TLS (Transport Layer Security)
C) HMAC (Hash-Based Message Authentication Code) and MD5 (Message Digest Algorithm 5)
D) AES (Advanced Encryption Standard) and DES (Data Encryption Standard)

Answer:

A) PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol)

 


Question 5:

In PPP, what is the purpose of the Link Control Protocol (LCP)?

A) To provide error detection and correction
B) To establish, configure, and test the link
C) To manage logical addressing
D) To control access to the network medium

Answer:

B) To establish, configure, and test the link

 


Question 6:

What feature of PPP allows multiple network layer protocols, such as IPv4 and IPv6, to be transmitted over the same physical link?

A) Multiplexing
B) Demultiplexing
C) Multicasting
D) Tunneling

Answer:

A) Multiplexing

 


Question 7:

Which field in the PPP frame is responsible for detecting errors during transmission?

A) Start Flag
B) Frame Check Sequence (FCS)
C) Protocol Field
D) Address Field

Answer:

B) Frame Check Sequence (FCS)

 


Question 8:

What is the default encapsulation method used by PPP for transporting IP packets?

A) HDLC (High-Level Data Link Control)
B) Ethernet
C) MPLS (Multiprotocol Label Switching)
D) TCP/IP (Transmission Control Protocol/Internet Protocol)

Answer:

A) HDLC (High-Level Data Link Control)

 


Question 9:

What is the purpose of the NCP (Network Control Protocol) in PPP?

A) To provide encryption for data transmissions
B) To negotiate and configure options for network layer protocols
C) To manage logical addressing in the network
D) To establish a secure tunnel between two devices

Answer:

B) To negotiate and configure options for network layer protocols

 


Question 10:

Which of the following is a common use case for PPP?

A) Connecting devices within a local area network (LAN)
B) Providing secure communication over the internet
C) Establishing point-to-point links over serial connections
D) Managing routing within a large-scale network

Answer:

C) Establishing point-to-point links over serial connections


 

Wide area protocols.

Question 1:

Which of the following is a commonly used WAN protocol that operates at the Data Link Layer and uses virtual circuits for communication?

A) TCP (Transmission Control Protocol)
B) IP (Internet Protocol)
C) Frame Relay
D) SNMP (Simple Network Management Protocol)

Answer:

C) Frame Relay

 


Question 2:

What is the primary function of a WAN protocol at the Network Layer?

A) Error detection and correction
B) Physical addressing of devices
C) Logical addressing of devices
D) Multiplexing of data streams

Answer:

C) Logical addressing of devices

 


Question 3:

Which WAN protocol is commonly used for secure communication over the internet and operates at the Transport Layer?

A) MPLS (Multiprotocol Label Switching)
B) IPsec (Internet Protocol Security)
C) PPP (Point-to-Point Protocol)
D) HDLC (High-Level Data Link Control)

Answer:

B) IPsec (Internet Protocol Security)

 


Question 4:

In WANs, what does MPLS (Multiprotocol Label Switching) aim to achieve?

A) Secure point-to-point communication
B) Quality of Service (QoS) and traffic engineering
C) Physical addressing of devices
D) Reliable data link connections

Answer:

B) Quality of Service (QoS) and traffic engineering

 


Question 5:

Which WAN protocol is often used for connecting remote offices over the internet and utilizes tunneling for secure communication?

A) Frame Relay
B) GRE (Generic Routing Encapsulation)
C) ATM (Asynchronous Transfer Mode)
D) X.25 (Packet Switched Protocol)

Answer:

B) GRE (Generic Routing Encapsulation)

 


Question 6:

What is the role of a WAN optimization protocol in wide area networks?

A) To provide secure communication
B) To improve data transfer efficiency
C) To manage logical addressing
D) To control access to the network medium

Answer:

B) To improve data transfer efficiency

 


Question 7:

Which WAN protocol is designed for connecting devices in a secure and point-to-point manner, commonly used for remote access scenarios?

A) PPPoE (Point-to-Point Protocol over Ethernet)
B) MPLS (Multiprotocol Label Switching)
C) ISDN (Integrated Services Digital Network)
D) X.25 (Packet Switched Protocol)

Answer:

A) PPPoE (Point-to-Point Protocol over Ethernet)

 


Question 8:

What is the primary function of a WAN protocol at the Physical Layer?

A) Logical addressing of devices
B) Error detection and correction
C) Multiplexing of data streams
D) Physical addressing of devices

Answer:

D) Physical addressing of devices

 


Question 9:

Which WAN protocol is associated with the use of dedicated leased lines and provides a constant, dedicated bandwidth between two points?

A) PPP (Point-to-Point Protocol)
B) ISDN (Integrated Services Digital Network)
C) Frame Relay
D) T1/E1 (Digital Transmission Lines)

Answer:

D) T1/E1 (Digital Transmission Lines)

 


Question 10:

In WAN communication, what is the purpose of a tunneling protocol?

A) To provide logical addressing for devices
B) To establish secure connections over the internet
C) To manage physical addressing in the network
D) To control access to the network medium

Answer:

B) To establish secure connections over the internet