Technical :: All Aptitude Test ::

Hassan
1.What is a primary function of the trailer information added by the data link layer encapsulation?
A. Supports error detection
B. Ensures ordered arrival of data
C. Identifies the devices on the local network
D. Supports error detection

2.Error detection at the data link layer is achieved by?
A. Bit stuffing
B. Cyclic redundancy codes
C. Hamming codes
D. Bit stuffing

3.Which of the following devices is a PC component that connects the computer to the network?
A. Bridge
B. NIC (Network Interface Card)
C. DNS Server
D. Bridge

4.Switch is a Device of _________ Layer of OSI Model.?
A. Network Layer
B. Data Link Layer
C. Application Layer
D. Network Layer

5.HUB is a _________ Device and Switch is a ________ Device.?
A. Unicast, Multicast
B. Malticast, Unicast
C. Broadcast, Unicast
D. Unicast, Multicast

6.Which one of the following task is not done by data link layer?
A. framing
B. error control
C. flow control
D. framing

7.Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
A. logical link control sublayer
B. media access control sub-layer
C. network interface control sublayer
D. logical link control sublayer

8.Header of a frame generally contains?
A. synchronization bytes
B. addresses
C. frame identifier
D. synchronization bytes

9.Automatic repeat request error management mechanism is provided by?
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. logical link control sublayer

10.When 2 or more bits in a data unit has been changed during the transmission, the error is called?
A. random error
B. burst error
C. inverted error
D. random error

11.Which one of the following is the multiple access protocol for channel access control?
A. CSMA/CD
B. CSMA/CA
C. both (a) and (b)
D. CSMA/CD

12.The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called?
A. piggybacking
B. cyclic redundancy check
C. fletcher’s checksum
D. piggybacking

13.How the error detection is achieved at data link layer?
A. Hamming codes
B. Bit stuffing
C. Detection manager
D. Hamming codes

14.The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called?
A. piggybacking
B. cyclic redundancy check
C. fletcher’s checksum
D. piggybacking

15.Switch operates at second layer of OSI model that is _______layer.?
A. Physical layer
B. Network layer
C. Data link layer
D. Physical layer

16.Bridge works in which layer of the OSI model?
A. Application layer
B. Transport layer
C. Network layer
D. Application layer

17.MAC Address is used by which layer ?
A. Transport Layer
B. Data Link Layer
C. Application Layer
D. Transport Layer

18.Layer-2 Switch is also called?
A. Multiport Bridge
B. Multiport Hub
C. Multiport Switch
D. Multiport Bridge

19.____________ is added to data packet for error detection.?
A. checksum bit
B. error bit
C. parity bit
D. checksum bit

20.Which error detection method uses one's complement arithmetic?
A. Simple parity check
B. Two-dimensional parity check
C. CRC
D. Simple parity check

21.____________ is added to data packet for error detection.?
A. checksum bit
B. error bit
C. parity bit
D. checksum bit

22.When a host on network A sends a message to a host on network B, which address does the router look at?
A. port
B. logical
C. physical
D. port

23.How long is an IPv6 address?
A. 32 bits
B. 128 bits
C. 128 bytes
D. 32 bits

24.Which router command allows you to view the entire contents of all access lists?
A. show all access-lists
B. show access-lists
C. show ip interface
D. show all access-lists

25.What PPP protocol provides dynamic addressing, authentication, and multilink?
A. NCP
B. HDLC
C. X.25
D. NCP

26.Which of the following is private IP address?
A. 192.168.24.43
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43

27.Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. Class A
B. Class B
C. Class C
D. Class A

28.Which of the following devices direct network traffic based not by MAC addresses but by software-configured network addresses?
A. Router
B. Hub
C. Bridge
D. Router

29.Which of the following network devices/systems translates data from one format to another?
A. Hub
B. DHCP Server
C. Gateway
D. Hub

30.Which of the following terms is used to describe a hardware- or software-based device that protects networks from outside threats?
A. NICcc
B. Gateway
C. Firewall
D. NICcc


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers