Data Communication and Networking
Welcome to NTA NET ASPIRANT ACADEMY
NTA NET ASPIRANT ACADEMY is a training academy for College Lectures, Assistant Professor, Research Scholar and PG Students to make qualified for Assistant Professor & JRF in UGC NET / TNSET
NTA NET ASPIRANT ACADEMY is a training academy for College Lectures, Assistant Professor, Research Scholar and PG Students to make qualified for Assistant Professor & JRF in UGC NET / TNSET
Start
Congratulations - you have completed Data Communication and Networking.
You scored %%SCORE%% out of %%TOTAL%%.
Your performance has been rated as %%RATING%%
Your answers are highlighted below.
Question 1 |
The period of a signal is 100ms. Then the frequency of this signal in kilohertz is __________Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â NTA NET JUNE 2020Â
A | 10 |
B | 10^-1 |
C | 10^-2 |
D | 10^-3 |
Question 2 |
Match List I with List IIÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â NTA NET JUNE 2020Â
Choose the correct answer from the options given below:
List - I | List - II |
---|---|
A. Serial line IP (SLIP) | (i) Application Layer |
B. Border Gateway Protocol | (ii) Transport Layer |
C. User Datagram Protocol | (iii) Datalink Layer |
D. Simple Network Management Protocol | (iv) Network Layer |
A | A - i, B - ii, C - iii, D - iv |
B | A - iii, B - iv, C - ii, D - i |
C | A - ii, B - iii, C - iv, D - i |
D | A - iii, B - i, C - iv, D - ii |
Question 3 |
Firewall is a device that filters access to the protected network from the outside network. Firewalls can filter the packets on the basis of            NTA NET JUNE 2020Â
A. Source IP address
B. Destination IP address
C. TCP Source Port
D. UDP Source Port
E. TCP Destination Port
Choose the correct answer from the options given below:
A. Source IP address
B. Destination IP address
C. TCP Source Port
D. UDP Source Port
E. TCP Destination Port
Choose the correct answer from the options given below:
A | (A), (B) and (C) only |
B | (B) and (E) only |
C | (C) and (D) only |
D | (A), (B), (C), (D) and (E) only |
Question 4 |
Post office protocol (POP) is a message access protocol which is used to extract message for client. In this regard, which of the following are true?         NTA NET JUNE 2020Â
A. Pop has two modes, Delete mode and keep.
B. In Delete mode, mail is deleted from mail box after each retrieval
C. In Delete mode, mail is deleted from mail box before each retrieval
D. In Keep mode, mail is deleted before retrieval
E. In Keep mode, mail remains in mail box after retrieval.
Choose the correct answer from the options given below:
A. Pop has two modes, Delete mode and keep.
B. In Delete mode, mail is deleted from mail box after each retrieval
C. In Delete mode, mail is deleted from mail box before each retrieval
D. In Keep mode, mail is deleted before retrieval
E. In Keep mode, mail remains in mail box after retrieval.
Choose the correct answer from the options given below:
A | (A) and (B) only |
B | (A), (D) and (E) only |
C | (A), (B), (C) and (D) only |
D | (A), (B) and (E) only |
Question 5 |
Given below are two statements:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â NTA NET JUNE 2020Â
Statement I: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryption.
Statement II:Â Diffie - Hellman algorithm is used for exchange of secret key.
In the light of the above statements, choose the correct answer from the options given below:Both Statement I and Statement II are true.
Statement I: In Ceasar Cipher each letter of Plain text is replaced by another letter for encryption.
Statement II:Â Diffie - Hellman algorithm is used for exchange of secret key.
In the light of the above statements, choose the correct answer from the options given below:Both Statement I and Statement II are true.
A | Both Statement I and Statement II are true. |
B | Both Statement I and Statement II are false. |
C | Statement I is true but Statement II is false. |
D | Statement I is false but Statement II is true. |
Question 6 |
Protocols in which the sender sends one frame and then waits for an acknowledgement before proceeding for next frame are called as _________Â Â Â Â Â Â Â Â Â Â Â Â NTA NET JUNE 2020Â
A | Simplex protocols |
B | Unrestricted simplex protocols |
C | simplex stop and wait protocols |
D | Restricted simplex protocols |
Question 7 |
Which of the following class of IP address has the last address as 223.255.255.255?              NTA NET December 2019Â
A | Class A |
B | Class B |
C | Class C |
D | Class D |
Question 8 |
Consider a subnet with 720 routers. If a three - level hierarchy is chosen, with eight clusters, each containing 9 regions of 10 routers, then total number of entries in hierarchical table of each router is                                     NTA NET December 2019Â
A | 25 |
B | 27 |
C | 53 |
D | 72 |
Question 9 |
Piconet is a basic unit of a bluetooth system consisting of _________ master node and up to _________ active slave nodes.             NTA NET December 2019Â
A | one, five |
B | one, seven |
C | two, eight |
D | one, eight |
Question 10 |
Match List I with List IIÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â NTA NET December 2019Â
Choose the correct option from those given below:
List - I | List - II |
---|---|
A. Physical layer | (i) Provide token management service |
B. Transport layer | (ii) Concerned with transmitting raw bits over a communication channel |
C. Session Layer | (iii) Concerned with the syntax and semantics of the information transmitted |
D. Presented Layer | (iv) True end-to-end layer from source to destination |
A | A - ii, B - iv, C - iii, D - i |
B | A - iv, B - iii, C - ii, D - i |
C | A - ii, B - iv, C - i, D - iii |
D | A - iv, B - ii, C - i, D - iii |
Question 11 |
A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. What is the throughput of this network?                           NTA NET December 2019Â
A | 1,000,000 bps |
B | 2,000,000 bps |
C | 12,000,000 bps |
D | 1,200,00,000 bps |
Question 12 |
The full form of ICANN is                    NTA NET December 2019Â
A | Internet Corporation for Assigned Names and Numbers |
B | Internet Corporation for Assigned Numbers and Names |
C | Institute of Corporation for Assigned Names and Numbers |
D | Internet Connection for Assigned Names and Numbers |
Question 13 |
Consider the following statements with respect to network security:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â NTA NET December 2019Â
A. Message confidentiality means that the sender and the receiver expect privacy.
B. Message integrity means that the data must arrive at the receiver exactly as they were sent.
C. Message authentication means that the receiver is ensured that the message is coming from the intended sender.
Which of the statements is (are) correct?
A. Message confidentiality means that the sender and the receiver expect privacy.
B. Message integrity means that the data must arrive at the receiver exactly as they were sent.
C. Message authentication means that the receiver is ensured that the message is coming from the intended sender.
Which of the statements is (are) correct?
A | (A) and (B) only |
B | (A) and (C) only |
C | (B) and (C) only |
D | (A), (B) and (C) only |
Question 14 |
Consider the following statements:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â NTA NET December 2019Â
A. Fiber optic cable is much lighter than copper cable.
B. Fiber optic cable is not affected by power surges or electromagnetic interference.
C. Optical transmission is inherently bidirectional.
Which of the following statements is / are correct?
A. Fiber optic cable is much lighter than copper cable.
B. Fiber optic cable is not affected by power surges or electromagnetic interference.
C. Optical transmission is inherently bidirectional.
Which of the following statements is / are correct?
A | Only (A) and (B) |
B | Only (A) and (C) |
C | Only (B) and (C) |
D | (A), (B) and (C) |
Question 15 |
When using Dijkstra's algorithm to find shortest path in a graph, which of the following statement is not true?                              NTA NET December 2019Â
A | It can find shortest path within the same graph data structure. |
B | Every time a new node is visited, we choose the node with smallest known distance/cost (weight) to visit first. |
C | Shortest path always passes through least number of vertices. |
D | The graph needs to have a non - negative weight on every edge. |
Question 16 |
Which of the following is not needed by an encryption algorithm used in Cryptography?                       NTA NET December 2019Â
A | Key |
B | Message |
C | Cipher text |
D | User details |
Question 17 |
Consider the following two statements with respect to IPv4 in computer networking:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â NTA NET JUNE 2019Â
P: The loopback (IP) address is a member of class B network.
Q: The loopback (IP) address is used to send a packet from host to itself.
What can you say about the statements P and Q?
P: The loopback (IP) address is a member of class B network.
Q: The loopback (IP) address is used to send a packet from host to itself.
What can you say about the statements P and Q?
A | P - True ; Q - False |
B | P - False ; Q - True |
C | P - True ; Q - True |
D | P - False ; Q - False |
Question 18 |
How many address lines and data lines are required to provide a memory capacity of 16K x 16?                  NTA NET JUNE 2019Â
A | 10, 4 |
B | 16, 16 |
C | 14, 16 |
D | 4, 16 |
Question 19 |
In the TCP / IP model, encryption and decryption are functions of _________ layer.
A | data link |
B | network |
C | transport |
D | application |
Question 20 |
What is the name of the protocol that allows a client to send a broadcast message with its MAC address and receive an IP address in reply?              NTA NET JUNE 2019Â
A | ARP |
B | DNS |
C | RARP |
D | ICMP |
Question 21 |
You are designing a link layer protocol for a link with bandwidth of 1 Gbps ( 109 bits/second) over a fiber link with length of 800 km. Assume the speed of light in this medium is 200000 km/second. what is the propagation delay in this link?                       NTA NET JUNE 2019Â
A | 1 milliseconds |
B | 2 milliseconds |
C | 3 milliseconds |
D | 4 milliseconds |
Question 22 |
A slotted ALOHA network transmits 200 - bit frames using a shared channel with a 200Kbps bandwidth. Find the throughput of the system, if the system(all stations put together) produces 250 frames per second:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â CBSE NET JULY 2018Â
A | 49 |
B | 368 |
C | 149 |
D | 151 |
Question 23 |
The period of a signal is 100 ms. Its frequency is __________.                    CBSE NET JULY 2018Â
1. 1003 Hertz
2. 10-2 KHz
3. 2. 10-3 KHz
4. 2. 105 Hertz
1. 1003 Hertz
2. 10-2 KHz
3. 2. 10-3 KHz
4. 2. 105 Hertz
A | 1 |
B | 2 |
C | 3 |
D | 4 |
Question 24 |
The dotted - decimal notation of the following IPv4 address in binary notation is ________. 10000001Â Â Â Â 00001011Â Â Â Â Â Â 00001011Â Â Â Â Â Â Â 11101111Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â CBSE NET JULY 2018Â
A | 111.56.45.239 |
B | 129.11.10.238 |
C | 129.11.11.239 |
D | 111.56.11.239 |
Question 25 |
Which of the following statements are true?            CBSE NET JULY 2018Â
A. Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.
B. IS - 95 is a second generation cellular phone system based on CDMA and DSSS.
C. The Third generation cellular phone system will provide universal personnel communication.
A. Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.
B. IS - 95 is a second generation cellular phone system based on CDMA and DSSS.
C. The Third generation cellular phone system will provide universal personnel communication.
A | (A) and (B) only |
B | (B) and (C) only |
C | (A), (B) and (C) |
D | (A) and (C) only |
Question 26 |
Match the following symmetric block ciphers with corresponding block and key sizes:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â CBSE NET JULY 2018Â
List - I | List - II |
---|---|
A. DES | (i) Block size 64 and key size ranges between 32 and 448 |
B. IDEA | (ii) Block size 64 and Key size 64 |
C. BLOW FISH | (iii) Block size 128 and key sizes 128,192,256 |
D. AES | (iv) Block size 64 and key size 128 |
A | A - iv, B - ii, C - i, D - iii |
B | A - ii, B - iv, C - i, D - iii |
C | A - ii, B - iv, C - iii, D - i |
D | A - iv, B - ii, C - iii, D - i |
Question 27 |
Which of the following statements are true?                    CBSE NET JULY 2018Â
A. Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks
B. Circuit Switched Network resources need not reserved during the set up phase.
C. In packet switching there is no resource allocation for packets.
A. Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks
B. Circuit Switched Network resources need not reserved during the set up phase.
C. In packet switching there is no resource allocation for packets.
A | (A) and (B) only |
B | (B) and (C) only |
C | (A) and (C) only |
D | (A), (B) and (C) |
Question 28 |
In Challenge - Response authentication the claimant ________.                CBSE NET JULY 2018Â
A | Proves that she knows the secret without revealing it. |
B | Proves that she doesn't know the secret |
C | Reveals the secret |
D | Gives a challenge |
Question 29 |
Decrypt the message "WTAAD" using the Caesar Cipher with key = 15.               CBSE NET JULY 2018Â
A | LIPPS |
B | HELLO |
C | OLLEH |
D | DAATW |
Question 30 |
To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be _______.           CBSE NET JULY 2018Â
A | t + 1 |
B | t - 2 |
C | 2t - 1 |
D | 2t + 1 |
Question 31 |
Encrypt the Message "HELLO MY DEARZ" using Transposition Cipher with CBSE NET JULY 2018Â
Plain Text Key - 2 4 1 3
Cipher Text Key - 1 2 3 4
Plain Text Key - 2 4 1 3
Cipher Text Key - 1 2 3 4
A | HLLEO YM AEDRZ |
B | EHOLL ZYM RAED |
C | ELHL MDOY AZER |
D | ELHL DOMY ZAER |
Question 32 |
Match the following Secret Key Algorithms (List I) with the Corresponding Key Lengths (List II) and choose the correct answer from the code given below.                 CBSE NET JULY 2018Â
List - I | List - II |
---|---|
A. Blowfish | (i) 128 - 256 bits |
B. DES | (ii) 128 bits |
C. IDEA | (iii) 1 - 448 bits |
D. RC5 | (iv) 56 bits |
A | A - iv; B - iii; C - ii; D - i; |
B | A - iii; B - iv; C - i; D - ii; |
C | A - iii; B - iv; C - ii; D - i; |
D | A - ii; B - iii; C - iv; D - i; |
Question 33 |
The four byte IP address consists of               CBSE NET JULY 2018Â
A | Network Address |
B | Host Address |
C | Both Network and Host Addresses |
D | Neither Network nor Host Address |
Question 34 |
Consider ISO - OSI network architecture reference model. Session layer of this model offers dialog control, token management and ______ as services.                       SynCBSE NET JULY 2018Â
A | Synchronization |
B | Asynchronization |
C | Flow control |
D | Errors |
Question 35 |
Suppose a cloud contains software stack such as Operating systems, Application softwares, etc. This model is referred as ____ model.                         CBSE NET JULY 2018Â
A | SaaS |
B | PaaS |
C | IaaS |
D | MaaS |
Question 36 |
The Third Generation mobile phones are digital and based on                       CBSE NET JULY 2018Â
A | AMPS |
B | D - AMPS |
C | CDMA |
D | Broadband CDMA |
Question 37 |
Which of the following statement is / are true?               CBSE NET JULY 2018Â
(i) Firewalls can screen traffic going into or out of an organization.
(ii) Virtual private networks can simulate an old leased network to provide certain desirable properties.
Choose the correct answer from the code given below:
(i) Firewalls can screen traffic going into or out of an organization.
(ii) Virtual private networks can simulate an old leased network to provide certain desirable properties.
Choose the correct answer from the code given below:
A | (i) only |
B | (ii) only |
C | Both (i) and (ii) |
D | Neither (i) nor (ii) |
Question 38 |
Which of the following statement is / are true?                               CBSE NET JULY 2018Â
(i) Window XP supports bot peer - peer and client - server networks.
(ii) Windows XP implements Transport Protocols as drivers that can be loaded and unloaded from the system dynamically.
Choose the correct answer from the code given below:
(i) Window XP supports bot peer - peer and client - server networks.
(ii) Windows XP implements Transport Protocols as drivers that can be loaded and unloaded from the system dynamically.
Choose the correct answer from the code given below:
A | (i) only |
B | (ii) only |
C | Neither (i) nor (ii) |
D | Both (i) and (ii) |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 38 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!