1. | The GSM network is divided into the following three major systems : |
a. | SS, BSS, OSS |
b. | BSS, BSC, MSC |
c. | CELL, BSC, OSS |
d. | SS, CELL, MSC |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).SS, BSS, OSS
|
2. | The Mobile Application Protocol (MAP) typically runs on top of which protocol ? |
a. | SNMP (Simple Network Management Protocol) |
b. | SMTP (Simple Mail Transfer Protocol) |
c. | SS7 (Signalling System 7) |
d. | HTTP (Hyper Text Transfer Protocol) |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (c).SS7 (Signalling System 7)
|
3. | If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment. |
a. | First |
b. | Middle |
c. | Last |
d. | All of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).First
|
4. | The design issue of Datalink Layer in OSI Reference Model is |
a. | Framing |
b. | Representation of bits |
c. | Synchronization of bits |
d. | Connection control |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).Framing
|
5. | Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75Ω used for |
a. | Cable TV |
b. | Ethernet |
c. | Thin Ethernet |
d. | Thick Ethernet |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).Cable TV
|
6. | AES is a round cipher based on the Rijndal Algorithm that uses a 128-bit block of data. AES has three different configurations. ______ rounds with a key size of 128 bits, ______ rounds with a key size of 192 bits and ______ rounds with a key size of 256 bits. |
a. | 5, 7, 15 |
b. | 10, 12, 14 |
c. | 5, 6, 7 |
d. | 20, 12, 14 |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).10, 12, 14
|
7. | Data Encryption Techniques are particularly used for _______. |
a. | protecting data in Data Communication System |
b. | reduce Storage Space Requirement |
c. | enhances Data Integrity |
d. | decreases Data Integrity |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).protecting data in Data Communication System
|
8. | An example of a layer that is absent in broadcast networks is: |
a. | Physical layer |
b. | Presentation layer |
c. | Network layer |
d. | Application layer |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (c).Network layer
|
9. | The ATM cell is |
a. | 48 bytes long |
b. | 53 bytes long |
c. | 64 bytes long |
d. | 69 bytes long |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).53 bytes long
|
10. | The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as |
a. | Bit stuffing |
b. | Piggy backing |
c. | Pipelining |
d. | Broadcasting |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).Piggy backing
|