Data Communication MCQs | Interview Questions and Answers | Basic Computer Knowledge

1.

Which Protocol use link state routing?

   A.) OSPF
   B.) RIP
   C.) IGRP
   D.) All of these

Answer: Option 'A'

OSPF

2.

You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?

   A.) Token-Ring
   B.) CSMA/CD
   C.) Ethernet
   D.) CSMA/CA

Answer: Option 'A'

Token-Ring

3.

In tunnel mode IPsec protects the

   A.) entire IP packet
   B.) IP payload
   C.) IP header
   D.) Either b or c

Answer: Option 'A'

entire IP packet

4.

You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?

   A.) 255.255.255.192
   B.) 255.255.255.224
   C.) 255.255.255.248
   D.) 255.255.255.252

Answer: Option 'B'

255.255.255.224

5.

The TTL field has value 10. How many routers (max) can process this datagram?

   A.) 11
   B.) 10
   C.) 15
   D.) 14

Answer: Option 'B'

10

6.

Which of the following summation operations is performed on the bits to check an error-detecting code?

   A.) Codec
   B.) Coder-decoder
   C.) Checksum
   D.) Attenuation

Answer: Option 'C'

Checksum

7.

A session may include

   A.) Zero or more SMTP transactions
   B.) Exactly one SMTP transactions
   C.) Always more than one SMTP transactions
   D.) Number of SMTP transactions cannot be determined

Answer: Option 'A'

​Zero or more SMTP transactions

8.

An attempt to make a computer resource unavailable to its intended users is called

   A.) virus attack
   B.) worms attack
   C.) denial-of-service attack
   D.) botnet process

Answer: Option 'C'

​denial-of-service attack

9.

Which of the following is an example of client-server model?

   A.) FTP
   B.) TELNET
   C.) DNS
   D.) All of the above

Answer: Option 'D'

All of the above

10.

The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?

   A.) A logical address that identifies the workstation
   B.) A physical address that is randomly assigned each time the computer is started
   C.) A physical address that is assigned by the manufacturer
   D.) The logical domain address for the workstation

Answer: Option 'C'

A physical address that is assigned by the manufacturer

11.

A device which divides the incoming signal into low frequencies to send to voice devices, and high frequencies for data to the computer.

   A.) multicast router
   B.) splitter
   C.) interface
   D.) gateway

Answer: Option 'B'

Splitter

12.

After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called?

   A.) Telex
   B.) Word processor
   C.) Facsimile
   D.) Electronic mail

Answer: Option 'C'

Facsimile

13.

How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?

   A.) first three
   B.) first five
   C.) first four
   D.) first seven

Answer: Option 'C'

​first four

14.

What frequency range is used for FM radio transmission?

   A.) Very Low Frequency : 3 kHz to 30. kHz
   B.) High Frequency : 3 MHz to 30 MHz
   C.) Low Frequency : 30 kHz to 300 kHz
   D.) Very High Frequency : 30 MHz to 300 MHz

Answer: Option 'D'

Very High Frequency : 30 MHz to 300 MHz

15.

Voice privacy in GSM cellular telephone protocol is provided by

   A.) b5/4 cipher
   B.) b5/6 cipher
   C.) A5/2 cipher
   D.) b5/8 cipher

Answer: Option 'C'

A5/2 cipher

16.

What function does a serial interface perform in data communication?

   A.) Converts serial data into audio signals
   B.) Converts analog signals into digital signals
   C.) Converts parallel data into a stream of bits
   D.) Decodes incoming signals into computer data

Answer: Option 'C'

Converts parallel data into a stream of bits

17.

In SMTP, the command to write receivers mail address is written with this command

   A.) SEND TO
   B.) MAIL TO
   C.) RCPT TO
   D.) EMAIL FOR

Answer: Option 'C'

​RCPT TO

18.

Which of the following transmission systems provides the highest data rate to an individual device

   A.) Voice band modem
   B.) Telephone lines
   C.) leased lines
   D.) Computer bus

Answer: Option 'D'

Computer bus

19.

What does the acronym ISDN stand for?

   A.) Indian Standard Digital Network
   B.) Integrated Services Data Network
   C.) Integrated Services Digital Network
   D.) Intelligent Services Digital Network

Answer: Option 'C'

Integrated Services Digital Network

20.

Ethernet in metropolitan area network (MAN) can be used as

   A.) pure ethernet
   B.) ethernet over SDH
   C.) ethernet over MPLS
   D.) all of the mentioned

Answer: Option 'D'

all of the mentioned


Data Communication MCQs Download Pdf