Welcome to Networking Quiz, Randomly Selected !!

Question 1. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?

500 bps

1500 bps

5 bps

1000 bps

Question 2. On a class B network, how many hosts are available at each site with a subnet mask of 248?

16,382

8,190

4,094

2,046

Question 3. In CRC there is no error if the remainder at the receiver is ----.

equal to the remainder at the sender

zero

non-zero

the quotient at the sender

Question 4. Which of the following layer protocols are responsible for user and the application programmer support such as passwords, resource sharing, file transfer and network management?

Layer 7 protocols

Layer 6 protocols

Layer 5 protocols

Layer 4 protocols

Question 5. A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?

NBTSTAT.EXE

Performance Monitor

Network Monitor

ARP.EXE

Question 6. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is

the method of determining which device has access to the transmission medium at any time.

a medium access control technique for multiple access transmission media

a form of TDMA in which circuit switching is used to dynamically change the channel assignments

all of the above

Question 7. What technological progress has allowed the full usage of fiber optics within parallel computer architechture?
I. There are compilers and programming that recognise and exploit parallelism.
II. Widely tunable semiconductor lasers allow maultiple wavelength system.
III. Newly designed operating system for parallel processing.
IV. Migration of architectural features previously found on mainframes onto single-chip microprocessors.

I and III only.

II, III and IV only.

I, II and IV only.

I, II, III and IV.

Question 8. Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology

Ethernet, because it is cabled using fiber-optic cable

Token-Ring, because it uses a MAU

Ethernet, because it can be set up with most topologies and can use multiple transfer speeds

Question 9. Which Protocol uses port 123?

RPC

NTP

POP3

NNTP

Question 10. If the ASCII character G is sent and the character D is received, what type of error is this?

single-bit

multiple-bit

burst

recoverable