Welcome to Networking Quiz, Intermediate Level !!

Question 1. Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?

SMTP

DHCP

IMAP

POP3

Question 2. You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?

255.255.255.192

255.255.255.224

255.255.255.240

255.255.255.248

Question 3. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)

POS terminal

data collection terminal

batch processing terminal

intelligent terminal

Question 4. Which of the following device is used to connect two systems, especially if the systems use different protocols?

Hub

Bridge

GateWay

Repeater

Question 5. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?

255.255.252.0

225.255.254.0

255.255.255.240

255.255.255.252

Question 6. Which of the following happen to be the limitations of optical fiber ?
I. The architecture of their couplers.
II. Costs of implementing them.
III. Modification of the software and hardware on existing systems.
IV. The difficulty of installing the cables.

II and IV only.

I,II and III only.

I,III and IV only.

I,II,III and IV.

Question 7. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?

500 bps

1500 bps

5 bps

1000 bps

Question 8. If the ASCII character G is sent and the character D is received, what type of error is this?

single-bit

multiple-bit

burst

recoverable

Question 9. In CRC there is no error if the remainder at the receiver is ----.

equal to the remainder at the sender

zero

non-zero

the quotient at the sender

Question 10. Which of the following technique is used for fragment?

a technique used in best-effort delivery systems to avoid endlessly looping packets

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

all of the above