Computer Networking Quiz Questions - Set 05 - ObjectiveBooks

Computer Networking Quiz Questions - Set 05

Practice Test: Question Set - 05


1. ________is used to validate the identity of the message sender to the recipient
    (A) Encryption
    (B) Decryption
    (C) Digital certificate
    (D) None of these

2. If the source deduces the existence of congestion by making local observations, such as the time needed for acknowledgements to come called as _________
    (A) Explicit feedback algorithm
    (B) Implicit feedback algorithm
    (C) Explicit forward algorithm
    (D) Implicit forward algorithm

3. In distance vector routing the delay metric is _________
    (A) Number of hops
    (B) Geographical distance
    (C) Number of neighbors
    (D) Queue length

4. In Broadcast routing, if the router does not know anything all about spanning tree, _________ method is preferred.
    (A) Reverse Path forwarding
    (B) Multi-destination
    (C) Flooding
    (D) Spanning tree

5. In military applications where large number of routers may be blown to bits at any instant, we use _________
    (A) Shortest path first
    (B) First come first serve
    (C) Forwarding
    (D) Flooding

6. If route from router I to router J is computed on line based on the current statistics, then it is called as ________.
    (A) Dynamic routing
    (B) Session routing
    (C) Temporary routing
    (D) None of these

7. In ________ circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM.
    (A) Space division
    (B) Time division
    (C) Virtual
    (D) None of these

8. In datagram subnet new route is chosen _________
    (A) For every packet sent
    (B) For all the packet sent
    (C) Only for the first packet
    (D) For the packet which is not transmitted

9. In open loop congestion control techniques, the decisions are based on the _________
    (A) Without regard to the current state of the network
    (B) With regard to the current state of the network
    (C) With regard to the choice of the host
    (D) Without regard to the choice of the host

10. If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless is called _________
    (A) Priority dropping
    (B) Tail dropping
    (C) Age based dropping
    (D) None of these

Show and hide multiple DIV using JavaScript View All Answers

 Next Tests:

    Blogger Comment
    Facebook Comment