通信网络选择题100+答案

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1.The information to be communicated in a data communications system is the _______.
A、Medium
B、Protocol
C、Transmission
D、Message D
2.Communication between a computer and a keyboard involves ______________ transmission.
A、simplex
B、half-duplex
C、full-duplex
D、automatic A
3. _______ refers to the structure or format of the data, meaning the order in which they are presented.
A、Semantics
B、Timing
C、Syntax
D、none of the above C
4. The host-to-host delivery of the entire message is the responsibility of the _______ layer.
A、Network
B、Transport
C、Application
D、Physical A
5. In OSI/RM, the _______ layer lie between the transport layer and the application layer.
A、data link and network
B、session and presentation
C、session and network
D、presentation and network B
6. When data are transmitted from device A to device B, the header from A's layer 4 is read by B's _______
layer.
A、Physical
B、Data link
C、Transport
D、None of the above C
7. Why was the OSI model developed?
A、Manufacturers disliked the TCP/IP protocol suite.
B、The rate of data transfer was increasing exponentially
C、Standards were needed to allow any two systems to communicate
D、None of the above C
8. In the OSI model, encryption and decryption are functions of the ________ layer.
A、transport
B、presentation
C、session
D、application B
9. _______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.
A、TCP
B、UDP
C、IP
D、None of the above B
10. The physical, data link, and network layers are the ______ support layers.
A、user
B、network
C、both (a) and (b)
D、none of the above A
11. The _________ product defines the number of bits that can fill the link.
A、bandwidth-period
B、frequency-amplitude
C、bandwidth-delay
D、delay-amplitude C
12. _______ encoding has a transition at the beginning of each 0 bit.
A、RZ
B、Manchester
C、Differential Manchester
D、None of the above C
13. If the baud rate is 400 for a QPSK signal, the bit rate is ________ bps.
A、100
B、400
C、800
D、1600 C
14. In _____ transmission, the frequency of the carrier signal is modulated to follow the changing voltage level (amplitude) of the modulating signal. The peak amplitude and phase of the carrier signal remain constant, but as the amplitude of the information signal changes, the frequency of the carrier changes correspondingly.
A、AM
B、PM
C、FM
D、none of the above C
15. ______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted.
A、TDM
B、FDM
C、Both (a) or (b)
D、Neither (a) or (b) B
16. A ________ network is made of a set of switches connected by physical links, in which each link is divided into n channels.
A、line-switched
B、frame-switched
C、circuit-switched
D、none of the above C
17. In __________, each packet is treated independently of all others.
A、datagram switching
B、circuit switching
C、frame switching
D、none of the above A
18. The _______ address in the header of a packet in a datagram network normally remains the same during the entire journey of the packet.
A、source
B、destination
C、local
D、none of the above B
19.In cyclic redundancy checking, the divisor is _______ the CRC.
A、The same size as
B、one bit less than
C、one bit more than
D、None of the above C
20.We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called _________.
A、datawords
B、codewords
C、blockwords
D、none of the above B
21.To guarantee correction of up to 5 errors in all cases, the minimum Hamming distance in a block code must be ________.
A. 5 B、6 C、11 D、none of the above C
22.In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?
A. 0 to 63 B、0 to 64 C、1 to 63 D、1 to 64 A
23.In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an ACK
_______ to the sender.
A、5
B、6
C、7
D、none of the above C
24.In ________ framing, we need a delimiter (flag) to define the boundary of two frames.
A、fixed-size
B、variable-size
C、standard
D、none of the above B
25.In _________ protocols, we use ________.
A、character-oriented; byte stuffing
B、character-oriented; bit stuffing
C、bit-oriented; character stuffing
D、none of the above A
26._______ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment.
A、Flow
B、Error
C、Transmission
D、None of the above A
27.The _______Protocol has both flow control and error control.
A、Stop-and-Wait
B、Go-Back-N ARQ
C、Selective-Repeat ARQ
D、both (b) and (c) D
28.The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for ______ channels.
A、noisy
B、noiseless
C、either (a) or (b)
D、neither (a) nor (b) A
29.In Go-Back-N ARQ, if 5 is the number of bits for the sequence number, then the maximum size of the send window must be _____
A、15
B、16
C、31
D、1 C
30.The vulnerable time for CSMA is the ________propagation time.
A、the same as
B、two times
C、three times
D、None of the above A
31.In the _______method, after the station finds the line idle it sends or refrain from sending based on the outcome of a random number generator. If the line is busy, it tries again.
A、non-persistent
B、1-persistent
C、p-persistent
D、None of the above C
32.In ___________ methods, no station is superior to another station and none is assigned the control over another.
A、random access
B、controlled access
C、channelization
D、none of the above A
33.In ________, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frame is sent again.
A、CSMA/CA
B、CSMA/CD
C、either (a) or (b)
D、both (a) and (b) B
34.If an Ethernet destination address is 07:01:02:03:04:05, then this is a ______ address.
A、unicast
B、multicast
C、broadcast
D、any of the above B
35.Which of the following could not be an Ethernet multicast destination?
A、77:7B:6C:DE:10:00
B、9B:AA:C1:23:45:32
C、AC:56:21:1A:DE:F4
D、C3:32:21:21:4D:34 C
36.The _____ sub-layer is responsible for the operation of the CSMA/CD access method and framing.
A、LLC
B、MAC
C、MII
D、None of the above B
37.In _________, autonegotiation allows two dvices to negotiate the mode or data rate of operation.
A、Standard Ethernet
B、Fast Ethernet
C、Gigabit Ethernet
D、Ten-Gigabit Ethernet B
38.The first address assigned to an organization in classless addressing _______.
A、must be a power of 4
B、must be evenly divisible by the number of addresses
C、must belong to one of the A, B, or C classes
D、None of the above B
39.An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length?
A、/20
B、/24
C、/25
D、/26 B
40.In a block, the prefix length is /24; what is the mask? _______
A、255.255.255.0
B、255.255.242.0
C、255.255.0.0
D、None of the above A
41.In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes?
A、428
B、427
C、407
D、107 A
42.An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true?
A、The do not fragment bit is set to 1 for all three datagrams.
B、The more fragment bit is set to 0 for all three datagrams.
C、The identification field is the same for all three datagrams.
D、The offset field is the same for all three datagrams. C
43.In IPv4, what is needed to determine the number of the last byte of a fragment?
A、Identification number
B、Offset number
C、Total length
D、(b) and (c) D
44.The term ________ means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.
A、reliable delivery
B、connection-oriented delivery
C、best-effort delivery
D、none of the above C
45.The IPv4 header field formerly known as the service type field is now called the _______ field.
A、IETF
B、checksum
C、differentiated services
D、none of the above C
46.A _______ address is an internetwork address with universal jurisdiction.
A、physical
B、logical
C、both a and b
D、none of the above B
47.If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.
A、the destination IP address in the datagram header
B、the IP address of the router found in the routing table
C、either a or b
D、none of the above A
48.If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.
A、the destination IP address in the datagram header
B、the IP address of the router found in the routing table
C、either a or b
D、none of the above B
49.The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.
A、the destination IP address in the datagram header
B、the IP address of the router found in the routing table
C、either a or b
D、none of the above B
50.The sender is a router that has received a datagram destined for a host on the same network. The logical address that must be mapped to a physical address is ______.
A、the destination IP address in the datagram header
B、the IP address of the router found in the routing table
C、either a or b
D、none of the above
51.The _______ is the physical path over which a message travels.
A、Protocol
B、Medium
C、Signal
D、All the above B
52.A television broadcast is an example of _______ transmission.
B、simplex B、half-duplex
C、full-duplex
D、automatic A
53. ________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
A、Semantics
B、Timing
C、Syntax
D、none of the above A
54. The _______ layer lies between the network layer and the application layer.
A、Physical
B、Data link
C、Transport
D、None of the above C
55. Why was the OSI model developed?
A、Manufacturers disliked the TCP/IP protocol suite.
B、The rate of data transfer was increasing exponentially
C、Standards were needed to allow any two systems to communicate
D、None of the above C
56. When a host on network A sends a message to a host on network B, which address does the router look at?
A、Port
B、Logical
C、Physical
D、Any of the above B
57、__________ provides full transport layer services to applications.
A、TCP
B、UDP
C、ARP
D、IP A
58、A port address in TCP/IP is ______ bits long.
A、32
B、48
C、16
D、64 C
59、The ____ created a model called the Open Systems Interconnection, which allows diverse systems to communicate.
A、OSI
B、ISO
C、IEEE
D、None of the above B
60、_________ can impair a signal.
A、Attenuation
B、Distortion
C、Noise
D、All of the above D
61、Unipolar, bipolar, and polar encoding are types of _______ encoding.
A、line
B、Manchester
C、NRZ
D、Manchester A
62、In QAM, both ________ of a carrier frequency are varied.
A、frequency and amplitude
B、phase and frequency
C、amplitude and phase
D、none of the above C
63、In _____ transmission, the phase of the carrier signal is modulated to follow the changing voltage level (amplitude) of the modulating signal.
A、AM
B、PM
C、FM
D、none of the above B
64、________ can be achieved by using multiplexing; ______ can be achieved by using spreading.
A、Efficiency; privacy and antijamming
B、Privacy and antijamming; efficiency
C、Privacy and efficiency; antijamming
D、Efficiency and antijamming; privacy A
65、____ is designed to use the high bandwidth capability of fiber-optic cable.
A、FDM
B、TDM
C、WDM
D、None of the above C
66.Circuit switching takes place at the ________ layer.
A、data link
B、physical
C、network
D、transport B
67.In _______ there are no setup or teardown phases.
A、datagram switching
B、circuit switching
C、frame switching
D、none of the above A
68.The network layer in the Internet is designed as a __________ network.
A、virtual-circuit
B、datagram
C、circuit-switched
D、none of the above B
69、In _____ coding, we divide our message into blocks, each of k bits, called ___.
A、block; blockwords
B、linear; datawords
C、block; datawords
D、none of the above C
70.For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed.
A、exactly 10
B、less than 10
C、more than 10
D、none of the above A
71.In _______ framing, there is no need for defining the boundaries of frames.
A、fixed-size
B、variable-size
C、standard
D、none of the above A
72.Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the ______.
A、header
B、trailer
C、flag
D、None of the above C
73.The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for ______ channels.
A、noisy
B、noiseless
C、either (a) or (b)
D、neither (a) nor (b) C
74.Both Go-Back-N and Selective-Repeat Protocols use a _________.
A、sliding frame
B、sliding window
C、sliding packet
D、None of the above B
75.In Go-Back-N ARQ, if 5 is the number of bits for the sequence number, then the maximum size of the send window must be _____
A、15
B、31
C、16
D、1 B
76.In the Go-Back-N Protocol, if the size of the sequence number field is 8, the sequence numbers are in ________ arithmetic,
A、modulo-2
B、modulo- 8.
C、modulo- 256
D、Any of the above C
77.In ________ each station sends a frame whenever it has a frame to send.
A、pure ALOHA
B、slotted ALOHA
C、both (a) and (b)
D、neither (a) nor (b) A
78.In pure ALOHA, the vulnerable time is ______ the frame transmission time.
A、the same as
B、two times
C、three times
D、None of the above B
79.In the ________method, a station that has a frame to send senses the line. If the line is idle, it sends immediately. If the line is not idle, it waits a random amount of time and then senses the line again.
A、non-persistent
B、1-persistent
C、p-persistent
D、None of the above A
80.In ______, the chance of collision can be reduced if a station senses the medium before trying to use it.
A、MA
B、CSMA
C、FDMA
D、CDMA B
81.In _______ methods, the stations consult one another to find which station has the right to send.
A、random access
B、controlled access
C、channelization
D、none of the above B
82.The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation
10-Mbps Ethernet.
A、non-persistent
B、1-persistent
C、p-persistent
D、None of the above B
83.Which of the following could not be an Ethernet unicast destination?
A、B4:AA:C1:23:45:32
B、E6:56:21:1A:DE:F4
C、98:32:21:21:4D:34
D、A3:7B:6C:DE:10:00 D
84.The minimum frame length for 10-Mbps Ethernet is _______bytes.
A、320
B、640
C、680
D、None of the above D
85.Gigabit Ethernet access methods include _______ mode.
A、half-duplex
B、full-duplex
C、both (a) and (b)
D、neither (a) nor (b) C
86.The purpose of the _______ is to provide flow and error control for the upper-layer protocols that actually demand these services
A、MAC
B、LLC
C、LLU
D、None of the above B
87.In the Ethernet frame, the _______ field contains error detection information.
A、CRC
B、preamble
C、address
D、none of the above A
88.Membership in a VLAN can be based on _________.
A、port numbers
B、MAC addresses
C、IP addresses
D、all of the above D
89.Which address could be the beginning address of a block of 32 classless addresses?
A、2.4.6.5
B、2.4.6.16
C、2.4.6.64
D、none of the above C
90.An organization is granted a block of classless addresses with the starting address 199.34.76.64/28. How many addresses are granted?
A、32
B、8
C、16
D、none of the above C
91.In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000?
A、39,988
B、40,012
C、40,048
D、39,952 D
92.In IPv4, if the fragment offset has a value of 100, it means that _______.
A、the datagram has not been fragmented
B、the datagram is 100 bytes in size
C、the first byte of the datagram is byte 100
D、the first byte of the datagram is byte 800 D
93.In IPv4, which field or bit value unambiguously identifies the datagram as a fragment?
A、Do not fragment bit ? 0
B、More Fragment bit ? 0
C、Fragment offset = 1000
D、None of the above C
94.UDP and TCP are both _______ layer protocols.
A、Network
B、Transport
C、Data link
D、Physical B
95.UDP needs the _______ address to deliver the user datagram to the correct application program.
A、Port
B、Physical
C、Internet
D、Application A
96.In IPv4, when a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.
A、MUT
B、MAT
C、MTU
D、none of the above C
97.For a system using TCP, the sender window size is determined by the _______ window size.
A、Receiver
B、Sender
C、Congestion
D、(a) and (c) D
98.When the load is greater than the capacity, the delay _______.
A、Decreases
B、Increases linearly
C、Goes to infinity
D、Goes to zero C
99.The _______ is the maximum data rate of the traffic.
A、Average data rate
B、Maximum burst size
C、Effective bandwidth
D、Peak data rate D
100.A client issues _______ when it needs service from a server.
A、An active open
B、A finite open
C、An active request
D、A passive open A。

相关文档
最新文档