Google News
logo
Networking - Quiz(MCQ)
A)
TDM
B)
PDM
C)
FDM
D)
None of the Above

Correct Answer : Option (C) :   FDM


Explanation : FDM is an abbreviation for Frequency Division Multiplexing. This technique is used when the bandwidth of the channel is greater than the combined bandwidth of all the signals which are to be transmitted. The channel is active at all times unless a collision occurs with another channel trying to use the same frequency. Some other multiplexing techniques are Time division multiplexing and Phase division multiplexing.

A)
D-net
B)
Telnet
C)
Internet
D)
Botnet

Correct Answer : Option (D) :   Botnet


Explanation : Botnet is a network of compromised devices used by the attacker without the owner’s knowledge to perform unethical activities such as spamming. The attacker usually uses the least secure devices to create the botnet.

A)
UDP Flooding
B)
Vulnerability Attack
C)
Bandwidth Flooding
D)
Connection Flooding

Correct Answer : Option (D) :   Connection Flooding


Explanation : In Vulnerability attack, the attacker exploits the vulnerable control points of the network to deny access to the victims. In Bandwidth flooding, the attacker intentionally uses up all the bandwidth by flooding the victim with a deluge of packets and makes sure that the victim can’t use any bandwidth. In UDP flooding, too many UDP packets are sent by the attacker to the victim at random ports.

A)
Bandwidth flooding
B)
UDP flooding
C)
Vulnerability attack
D)
Connection flooding

Correct Answer : Option (A) :   Bandwidth flooding


Explanation : In Bandwidth flooding, the attacker floods the victim machine with a deluge of packets to make sure that no bandwidth is available. The victim then cannot utilize the complete bandwidth to perform its operation.

A)
Active receiver
B)
Passive receiver
C)
Legal receiver
D)
Partially-active receiver

Correct Answer : Option (B) :   Passive receiver


Explanation : The function of packet sniffers is to just silently receive the packets flowing in the channel. If they inject any packets into the channel, they might alert the other users about the intrusion.

A)
TCP traffic
B)
Sensitive traffic
C)
UDP traffic
D)
Best-effort traffic

Correct Answer : Option (C) :   UDP traffic


Explanation : UDP is more vulnerable to attacks, so firewalls are often configured to block suspicious UDP traffic.

A)
Bits
B)
Packets
C)
Frames
D)
Seconds

Correct Answer : Option (C) :   Frames


Explanation : TDM is the abbreviation for Time division multiplexing. It is technique for combining several low rate channels to a single high rate channel. For a certain time slot, the several channels could use the maximum bandwidth. Each channel is inactive for a period of time too. Some other multiplexing techniques are Frequency division multiplexing and Phase division multiplexing.

A)
32kbps
B)
32bps
C)
500bps
D)
500kbps

Correct Answer : Option (A) :   32kbps


Explanation :

Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps

A)
FDM
B)
WDM
C)
FDM & WDM
D)
TDM

Correct Answer : Option (D) :   TDM


Explanation : TDM abbreviation for Time Division Multiplexing is a method used for digital signals. Whereas FDM and WDM abbreviation for Frequency Division Multiplexing, and Wavelength Division Multiplexing, are used for analog signals. TDM is used in applications like ISDN (Integrated Services Digital Network) and PSTN (Public Switched Telephone Network).

A)
Data switching
B)
Circuit switching
C)
Packet switching
D)
Packet & Circuit switching

Correct Answer : Option (B) :   Circuit switching


Explanation : Circuit switching is a switching method by which one can obtain a physical path between end points. Circuit switching method is also called a connection oriented network. Two nodes must be physically and logically connected to each other to create a circuit switching network.