InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is not an application layer service?(a) Network virtual terminal(b) File transfer, access, and management(c) Mail service(d) Error controlI have been asked this question in an interview.My question is based upon Packet Switching & Circuit Switching in chapter Security & Physical Layer of Computer Network |
|
Answer» Correct answer is (d) Error control |
|
| 2. |
In _________ systems, resources are allocated on demand.(a) packet switching(b) circuit switching(c) line switching(d) frequency switchingI got this question in class test.My question is based upon Packet Switching & Circuit Switching in portion Security & Physical Layer of Computer Network |
|
Answer» Correct option is (a) PACKET switching |
|
| 3. |
As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved.(a) authentication(b) guaranteed constant rate(c) reliability(d) store and forwardI got this question in an interview for internship.My doubt is from Packet Switching & Circuit Switching in division Security & Physical Layer of Computer Network |
|
Answer» The correct answer is (b) guaranteed CONSTANT rate |
|
| 4. |
The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method.(a) Packet switching(b) Circuit switching(c) Line switching(d) Frequency switchingI had been asked this question in an online interview.Question is from Packet Switching & Circuit Switching topic in chapter Security & Physical Layer of Computer Network |
|
Answer» The correct choice is (b) Circuit switching |
|
| 5. |
What are the Methods to move data through a network of links and switches?(a) Packet switching and Line switching(b) Circuit switching and Line switching(c) Line switching and bit switching(d) Packet switching and Circuit switchingI had been asked this question in a national level competition.My question comes from Packet Switching & Circuit Switching topic in division Security & Physical Layer of Computer Network |
|
Answer» The correct choice is (d) PACKET switching and Circuit switching |
|
| 6. |
If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to ______________(a) N(b) (N*L)/R(c) (2N*L)/R(d) L/RThe question was posed to me in an interview for job.My question comes from Packet Switching & Circuit Switching topic in section Security & Physical Layer of Computer Network |
|
Answer» Right answer is (b) (N*L)/R |
|
| 7. |
Most packet switches use this principle ____________(a) Stop and wait(b) Store and forward(c) Store and wait(d) Stop and forwardThis question was posed to me in my homework.Query is from Packet Switching & Circuit Switching topic in section Security & Physical Layer of Computer Network |
|
Answer» RIGHT option is (b) Store and forward Easy explanation: The packet SWITCH will not transmit the first bit to outbound link until it receives the ENTIRE packet. If the entire packet is not received and the time-out PERIOD expires, the packet switch will inform the sender to resend the part of packet or the entire packet based on the algorithm being used. |
|
| 8. |
A local telephone network is an example of a _______ network.(a) Packet switched(b) Circuit switched(c) Bit switched(d) Line switchedThe question was posed to me in an internship interview.The doubt is from Packet Switching & Circuit Switching in chapter Security & Physical Layer of Computer Network |
|
Answer» Right ANSWER is (B) CIRCUIT switched |
|
| 9. |
Geostationary satellites ___________(a) Are placed at a fixed point above the earth(b) Rotate the earth about a fixed axis(c) Rotate the earth about a varying axis(d) All of the mentionedI had been asked this question in homework.This is a very interesting question from Physical Media in section Security & Physical Layer of Computer Network |
|
Answer» CORRECT choice is (a) Are placed at a FIXED point above the earth The BEST explanation: They are placed in orbit at 36,000km above Earth’s SURFACE. |
|
| 10. |
Radio channels are attractive medium because __________(a) Can penetrate walls(b) Connectivity can be given to mobile user(c) Can carry signals for long distance(d) All of the mentionedThe question was posed to me during a job interview.This interesting question is from Physical Media in section Security & Physical Layer of Computer Network |
|
Answer» The CORRECT choice is (d) All of the mentioned |
|
| 11. |
Terrestrial radio channels are broadly classifed into _____ groups.(a) 2(b) 3(c) 4(d) 1This question was posed to me in an online interview.My doubt is from Physical Media in chapter Security & Physical Layer of Computer Network |
|
Answer» CORRECT choice is (B) 3 To EXPLAIN: The three types are those that OPERATE over very short distance, those that operate in local areas, those that operate in the wide AREA. |
|
| 12. |
If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) __________(a) n*39.8(b) n*51.8(c) 2n*51.8(d) None of the mentionedI got this question by my school teacher while I was bunking the class.My question is taken from Physical Media topic in chapter Security & Physical Layer of Computer Network |
|
Answer» CORRECT option is (B) N*51.8 Best explanation: The base unit of transmission rates in optical fibre is 51.8 Mbits/s. So an optical carrier represented as OC-n has n*51.8 Mbits/s transmission SPEED. For eg. OC-3 has 3*51.8 Mbits/s speed. |
|
| 13. |
Fiber optics posses following properties __________(a) Immune electromagnetic interference(b) Very less signal attenuation(c) Very hard to tap(d) All of the mentionedThis question was posed to me in a job interview.I want to ask this question from Physical Media topic in section Security & Physical Layer of Computer Network |
|
Answer» Correct option is (d) All of the MENTIONED |
|
| 14. |
Coaxial cable consists of _______ concentric copper conductors.(a) 1(b) 2(c) 3(d) 4This question was addressed to me by my school teacher while I was bunking the class.This interesting question is from Physical Media in section Security & Physical Layer of Computer Network |
|
Answer» Right CHOICE is (b) 2 |
|
| 15. |
UTP is commonly used in __________(a) DSL(b) FTTP(c) HTTP(d) None of the mentionedThis question was addressed to me by my college director while I was bunking the class.The above asked question is from Physical Media in section Security & Physical Layer of Computer Network |
|
Answer» CORRECT choice is (a) DSL The best explanation: UNSHIELDED twisted pair(UTP) is COMMONLY USED in home ACCESS. |
|
| 16. |
Which of this is not a guided media?(a) Fiber optical cable(b) Coaxial cable(c) Wireless LAN(d) Copper wireThe question was posed to me during an online exam.Query is from Physical Media in section Security & Physical Layer of Computer Network |
|
Answer» Right ANSWER is (C) WIRELESS LAN |
|
| 17. |
In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?(a) Propagation delay(b) Queuing delay(c) Transmission delay(d) Processing delayThe question was asked in exam.My question comes from NetworkAttacks topic in division Security & Physical Layer of Computer Network |
|
Answer» CORRECT option is (B) Queuing DELAY Explanation: Since there is no other packet to be transmitted, there is no need for a queue. THEREFORE, the delay caused due to the queuing would be none i.e. 0. |
|
| 18. |
Firewalls are often configured to block ___________(a) UDP traffic(b) TCP traffic(c) Sensitive traffic(d) Best-effort trafficI had been asked this question during an interview.I need to ask this question from NetworkAttacks in section Security & Physical Layer of Computer Network |
|
Answer» The correct answer is (a) UDP TRAFFIC |
|
| 19. |
Sniffers can be prevented by using _______________(a) Wired environment(b) WiFi(c) Ethernet LAN(d) Switched networkThis question was posed to me during an online interview.This key question is from NetworkAttacks topic in section Security & Physical Layer of Computer Network |
|
Answer» Correct choice is (d) SWITCHED network |
|
| 20. |
Packet sniffers involve ____________(a) Active receiver(b) Passive receiver(c) Legal receiver(d) Partially-active receiverI have been asked this question in an online quiz.My question comes from NetworkAttacks in portion Security & Physical Layer of Computer Network |
|
Answer» Right option is (b) Passive receiver |
|
| 21. |
The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________(a) Vulnerability attack(b) Bandwidth flooding(c) Connection flooding(d) UDP floodingI have been asked this question in homework.I'd like to ask this question from NetworkAttacks in portion Security & Physical Layer of Computer Network |
|
Answer» The CORRECT choice is (b) Bandwidth flooding |
|
| 22. |
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________(a) Vulnerability attack(b) Bandwidth flooding(c) Connection flooding(d) UDP floodingI had been asked this question during an online interview.This intriguing question originated from NetworkAttacks in chapter Security & Physical Layer of Computer Network |
|
Answer» Right ANSWER is (c) Connection flooding |
|
| 23. |
Which of the following is a form of DoS attack?(a) Vulnerability attack(b) Bandwidth flooding(c) Connection flooding(d) All of the mentionedThe question was posed to me in semester exam.Question is taken from NetworkAttacks in chapter Security & Physical Layer of Computer Network |
|
Answer» The correct option is (d) All of the mentioned |
|
| 24. |
The attacker using a network of compromised devices is known as _____________(a) Internet(b) Botnet(c) Telnet(d) D-netI have been asked this question during an internship interview.My question is taken from NetworkAttacks topic in division Security & Physical Layer of Computer Network |
|
Answer» Correct choice is (b) Botnet |
|
| 25. |
Which of the following architecture uses the CSMA/CD access method?(a) ARC net(b) Ethernet(c) Router(d) STP serverI have been asked this question during an interview for a job.The question is from STP Cables topic in section Security & Physical Layer of Computer Network |
|
Answer» Right option is (B) ETHERNET |
|
| 26. |
What is the max data transfer rate for optical fiber cable?(a) 10 Mbps(b) 100 Mbps(c) 1000 Mbps(d) 10000 MbpsThe question was asked in homework.The origin of the question is STP Cables topic in section Security & Physical Layer of Computer Network |
|
Answer» Correct option is (d) 10000 Mbps |
|
| 27. |
What is the central device in star topology?(a) STP server(b) Hub/switch(c) PDC(d) RouterI have been asked this question in an international level competition.Question is from STP Cables in portion Security & Physical Layer of Computer Network |
|
Answer» The CORRECT answer is (b) Hub/switch |
|
| 28. |
Which connector does the STP cable use?(a) BNC(b) RJ-11(c) RJ-45(d) RJ-69I had been asked this question in an interview.This interesting question is from STP Cables topic in division Security & Physical Layer of Computer Network |
|
Answer» Right answer is (C) RJ-45 |
|
| 29. |
What is the max data transfer rate of STP cables?(a) 10 Mbps(b) 100 Mbps(c) 1000 Mbps(d) 10000 MbpsThis question was addressed to me by my college professor while I was bunking the class.I would like to ask this question from STP Cables in chapter Security & Physical Layer of Computer Network |
|
Answer» The correct answer is (b) 100 MBPS |
|
| 30. |
What is the max length of the Shielded twisted pair cable?(a) 100 ft(b) 200 ft(c) 100 m(d) 200 mI had been asked this question during an interview.My doubt is from STP Cables topic in chapter Security & Physical Layer of Computer Network |
|
Answer» Correct choice is (c) 100 m |
|
| 31. |
The __________ portion of LAN management software restricts access, records user activities and audit data, etc.(a) Configuration management(b) Security management(c) Performance management(d) Recovery managementThe question was posed to me in a job interview.This interesting question is from STP Cables in chapter Security & Physical Layer of Computer Network |
|
Answer» The correct choice is (b) Security management |
|
| 32. |
A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________(a) LAN intrinsic software(b) LAN aware software(c) Groupware(d) LAN ignorant softwareThe question was asked in a job interview.I would like to ask this question from STP Cables in chapter Security & Physical Layer of Computer Network |
|
Answer» Correct answer is (a) LAN intrinsic software |
|
| 33. |
With respect to physical media, STP cables stands for _________(a) Shielded Twisted Pair Cable(b) Spanning Tree Protocol Cable(c) Static Transport Protocol Cable(d) Shielded Two Power CableI have been asked this question in semester exam.I would like to ask this question from STP Cables in division Security & Physical Layer of Computer Network |
|
Answer» Correct answer is (a) SHIELDED Twisted Pair Cable |
|
| 34. |
_____________ allows LAN users to share computer programs and data.(a) Communication server(b) Print server(c) File server(d) NetworkI had been asked this question by my school teacher while I was bunking the class.The origin of the question is STP Cables topic in chapter Security & Physical Layer of Computer Network |
|
Answer» The correct answer is (c) FILE server |
|
| 35. |
Propagation delay depends on ___________(a) Packet length(b) Transmission rate(c) Distance between the routers(d) Speed of the CPUI got this question in an internship interview.This interesting question is from Delays and Loss topic in portion Security & Physical Layer of Computer Network |
|
Answer» The correct answer is (c) Distance between the routers |
|
| 36. |
Transmission delay does not depend on _____________(a) Packet length(b) Distance between the routers(c) Transmission rate(d) Bandwidth of mediumThe question was posed to me during an interview.Enquiry is from Delays and Loss topic in chapter Security & Physical Layer of Computer Network |
|
Answer» Right CHOICE is (B) Distance between the routers |
|
| 37. |
In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?(a) Propagation delay(b) Queuing delay(c) Transmission delay(d) Processing delayThis question was addressed to me in a job interview.I'm obligated to ask this question of Delays and Loss topic in portion Security & Physical Layer of Computer Network |
|
Answer» Right option is (B) QUEUING DELAY |
|
| 38. |
The total nodal delay is given by ____________(a) dnodal = dproc – dqueue + dtrans + dprop(b) dnodal = dproc + dtrans – dqueue(c) dnodal = dproc + dqueue + dtrans + dprop(d) dnodal = dproc + dqueue – dtrans – dpropI got this question during an interview.Asked question is from Delays and Loss in portion Security & Physical Layer of Computer Network |
|
Answer» The correct choice is (C) dnodal = dproc + dqueue + DTRANS + dprop |
|
| 39. |
If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is?(a) N/2(b) N(c) N-1(d) 2NI got this question in exam.My question is based upon Delays and Loss topic in division Security & Physical Layer of Computer Network |
|
Answer» Right option is (c) N-1 |
|
| 40. |
In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ___________(a) 20Mbps(b) 10Mbps(c) 40Mbps(d) 50MbpsI got this question by my college professor while I was bunking the class.My doubt stems from Delays and Loss topic in division Security & Physical Layer of Computer Network |
|
Answer» The correct answer is (b) 10Mbps |
|
| 41. |
Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by ____________(a) La/R(b) LR/a(c) R/La(d) Ra/LI had been asked this question in a national level competition.This interesting question is from Delays and Loss in division Security & Physical Layer of Computer Network |
|
Answer» RIGHT CHOICE is (a) La/R Explanation: Traffic INTENSITY = (Number of bits in PACKET * Average Transmission RATE)/Current Transmission rate. |
|
| 42. |
The time required to examine the packet’s header and determine where to direct the packet is part of __________(a) Processing delay(b) Queuing delay(c) Transmission delay(d) Propagation delayThis question was addressed to me in examination.Question is taken from Delays and Loss topic in division Security & Physical Layer of Computer Network |
|
Answer» The correct choice is (a) PROCESSING delay |
|
| 43. |
For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is ____________ (in microseconds)(a) 3.2(b) 32(c) 0.32(d) 320I have been asked this question during an interview.This question is from Delays and Loss topic in portion Security & Physical Layer of Computer Network |
|
Answer» CORRECT CHOICE is (a) 3.2 To elaborate: TRANSMISSION rate = LENGTH / transmission rate = 32/10 = 3.2 MICROSECONDS. |
|
| 44. |
Which of the following delay is faced by the packet in travelling from one end system to another?(a) Propagation delay(b) Queuing delay(c) Transmission delay(d) All of the mentionedI had been asked this question in an online interview.My doubt is from Delays and Loss in division Security & Physical Layer of Computer Network |
|
Answer» The correct option is (d) All of the mentioned |
|
| 45. |
In TDM, slots are further divided into _________(a) Seconds(b) Frames(c) Packets(d) BitsThe question was asked by my college professor while I was bunking the class.Query is from Multiplexing in section Security & Physical Layer of Computer Network |
|
Answer» Correct CHOICE is (b) Frames |
|
| 46. |
In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.(a) Greater than(b) Lesser than(c) Equal to(d) Equal to or greater thanThis question was posed to me during an internship interview.My doubt stems from Multiplexing in portion Security & Physical Layer of Computer Network |
|
Answer» Right option is (a) Greater than |
|
| 47. |
Multiplexing provides _________(a) Efficiency(b) Privacy(c) Anti jamming(d) Both Efficiency & PrivacyThis question was posed to me in exam.This intriguing question comes from Multiplexing in portion Security & Physical Layer of Computer Network |
|
Answer» Right answer is (d) Both Efficiency & Privacy |
|
| 48. |
The state when dedicated signals are idle are called __________(a) Death period(b) Poison period(c) Silent period(d) Stop periodThis question was posed to me during an online exam.My query is from Multiplexing in portion Security & Physical Layer of Computer Network |
|
Answer» Correct option is (c) Silent period |
|
| 49. |
If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is _________(a) 32kbps(b) 500bps(c) 500kbps(d) 32bpsThe question was asked in a national level competition.My question is based upon Multiplexing topic in division Security & Physical Layer of Computer Network |
|
Answer» Correct answer is (a) 32kbps |
|
| 50. |
If there are n signal sources of same data rate, then the TDM link has _______ slots.(a) n(b) n/2(c) n*2(d) 2^nI had been asked this question at a job interview.This question is from Multiplexing topic in chapter Security & Physical Layer of Computer Network |
|
Answer» The correct CHOICE is (a) n |
|