Welcome to Networking Quiz, Intermediate Level !!

Question 1. Which of the following technique is used for fragment?

a technique used in best-effort delivery systems to avoid endlessly looping packets

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

all of the above

Question 2. Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?





Question 3. If the ASCII character G is sent and the character D is received, what type of error is this?





Question 4. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)

POS terminal

data collection terminal

batch processing terminal

intelligent terminal

Question 5. How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?

first three

first four

first five

first seven

Question 6. Error detection at a data link level is achieved by

bit stuffing

cyclic redundancy codes

Hamming codes


Question 7. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?

8000 B frame

80,000 B frame

8 x 105 bit frame

10,000 B frame

Question 8. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is

the method of determining which device has access to the transmission medium at any time.

a medium access control technique for multiple access transmission media

a form of TDMA in which circuit switching is used to dynamically change the channel assignments

all of the above

Question 9. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?

500 bps

1500 bps

5 bps

1000 bps

Question 10. You are working with three networks that have the network IDs,, and What subnet mask can you use to combine these addresses into one?