adplus-dvertising
1. The GSM network is divided into the following three major systems :
a. SS, BSS, OSS
b. BSS, BSC, MSC
c. CELL, BSC, OSS
d. SS, CELL, MSC
Answer: (a).SS, BSS, OSS

2. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
a. SNMP (Simple Network Management Protocol)
b. SMTP (Simple Mail Transfer Protocol)
c. SS7 (Signalling System 7)
d. HTTP (Hyper Text Transfer Protocol)
Answer: (c).SS7 (Signalling System 7)

3. If a packet arrive with an M-bit value is  '1' and a fragmentation offset value '0', then it is ______ fragment.
a. First
b. Middle
c. Last
d. All of the above
Answer: (a).First

4. The design issue of Datalink Layer in OSI Reference Model is
a. Framing
b. Representation of bits
c. Synchronization of bits
d. Connection control
Answer: (a).Framing

5. Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75Ω used for
a. Cable TV
b. Ethernet
c. Thin Ethernet
d. Thick Ethernet
Answer: (a).Cable TV

6. AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits.
a. 5, 7, 15
b. 10, 12, 14
c. 5, 6, 7
d. 20, 12, 14
Answer: (b).10, 12, 14

7. Data Encryption Techniques are particularly used for _______.
a. protecting data in Data Communication System
b. reduce Storage Space Requirement
c. enhances Data Integrity
d. decreases Data Integrity
Answer: (a).protecting data in Data Communication System

8. An example of a layer that is absent in broadcast networks is:
a. Physical layer
b. Presentation layer
c. Network layer
d. Application layer
Answer: (c).Network layer

9. The ATM cell is
a. 48 bytes long
b. 53 bytes long
c. 64 bytes long
d. 69 bytes long
Answer: (b).53 bytes long

10. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as
a. Bit stuffing
b. Piggy backing
c. Pipelining
d. Broadcasting
Answer: (b).Piggy backing

Page 1 of 33