1. In military applications where large number of routers may be blown to bits at any instant, we use ……………….

(A) Shortest path first
(B) First come first serve
(C) Forwarding
(D) Flooding

2. In Internet protocol stack, when data is sent from device A to device B, the 5th layer to receive data at B is

(A) Application layer
(B) Transport layer
(C) Link layer
(D) Session layer

3. Bits can be send over guided and unguided media as analog signal by

(A) digital modulation
(B) amplitude modulation
(C) frequency modulation
(D) phase modulation

4. If router J is on the optimal path from router I to router K, then the path from J to K along the same route is ………………

(A) does not exist
(B) optimal
(C) maximum
(D) constant

5. In computer network nodes are

(A) the computer that originates the data
(B) the computer that routes the data
(C) the computer that terminates the data
(D) all of the mentioned

6. Which organization has authority over interstate and international commerce in the communications field?


7. When too many packets are present in the subnet, and performance degrades then it leads to ………………..

(A) Ingestion
(B) Congestion
(C) Digestion
(D) Diffusion

8. The ....................... layer Provides the end-to-end data transfer by delivering data from an application to its remote peer. 

(A) Transport
(B) Application
(C) Internetwork
(D) Network interface

9. A _____ is a TCP name for a transport service access point.

(A) port
(B) pipe
(C) node
(D) none of the above

10. What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?

(A) 4
(B) 2
(C) 6
(D) 3