REM B LVL 3 Flashcards

(65 cards)

1
Q

If FCC regulations are followed, ____ potential FM stations are theoretically possible in a given area.

A. 50
B. 100
C. 133
D. 150

A

A. 50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In IPv6 digital communication, the
destination address or the address of the intended recipient of the data has ___ bits

A. 128
B. 512
C. 64
D. 256

A

A. 128

IPV6 uses 128 bit address
IPV4 uses 32 bit address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The interval of frequencies outside
which the spectrum is zero is called as

A. none of the mentioned
B. normalized bandwidth
C. absolute bandwidth
D. null to null bandwidth

A

C. absolute bandwidth

The measure of frequencies outside
which spectrum is zero is called as
absolute bandwidth. It is usually infinite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The attenuation level in bounded power
spectral density is

A. 35&50
B. none of the mentioned
C. 50
D. 35

A

A. 35&50

Bounded power spectral density is the bandwidth outside which the spectrum must have fallen to a stated level below that found at the band center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If the ASCIl character G is sent and the
character D is received, what type of
error is this?

A. Burst
B. Recoverable
C. Multiple-bit
D. Single-bit

A

A. Burst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The NRZ digital signal-encoding format
has a ___ component in the waveform.

A. sinusoidal
B. parity
C. harmonic
D. dc

A

D. dc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which error detection method can
detect a burst error?

A. Two-dimensional parity and CRC
B. The parity check
C. CRC
D. Two-dimensional parity check

A

A. Two-dimensional parity and CRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which error detection method involves
the use of parity bits?

A. CRC
B. Simple parity check and Two-
dimensional parity
C. Two-dimensional parity check
D. Simple parity check

A

B. Simple parity check and Two-
dimensional parity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits?

A. Two-dimensional parity check
B. Simple parity check
C. CRC
D. Checksum

A

A. Two-dimensional parity check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pseudorandom implies a sequence that
can be ___ but has the properties of
randomness.

A. detected
B. decoded
C. re-created
D. minimized

A

C. re-created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many samples are there in a T1
frame of TDM system

A. 8
B. 24
C. 64
D. 32

A

B. 24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In TDM, the sampling rate of of T1 and
DS1

A. 24bps
B. 8000bps
C. 1.544Gbps
D. 2.048Gbps

A

B. 8000bps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The frame time for T1 digital carrier in a
time domain multiplexing system

A. 577us
B. 256us
C. 500us
D. 125us

A

D. 125us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which a modulation technique requires
a frequency band sliced into several
hundred of sub-bands, each of which carries a modulated signal as part of the data stream?

A. Discrete Multi-tone (DMT)
B. Differential modulation
C. Orthogonal modulation
D. Carrierless Amplitude and Phase (CAP)

A

A. Discrete Multi-tone (DMT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In AT&T’s FDM hierarchy, the bandwidth
of each group type can be found by
multiplying ____ and adding extra
bandwidth for guard bands.

A. The number of voice channels by 8 bits/
sample
B. The number of voice channels by 4000
Hz
C. The sampling rate by 8 bits/sample
D. The sampling rate by 4000 Hz

A

B. The number of voice channels by 4000
Hz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The baseband frequency of an L600
standard FDM is

A. 312 to 552 KHz
B. 108 to 312 KHz
C. 60 to 108 KHz
D. 60 to 2788 KHz

A

D. 60 to 2788 KHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The bandwidth of an FDM system U600
mastergroup

A. 2728Khz
B. 2520KHz
C. 4kHz
D. 8kHz

A

B. 2520KHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Synchronous transmission is therefore
much ____ than asynchronous
transmission because of the ____ overhead.

A. Faster; greater
B. Slower; greater
C. Slower; lower
D. Faster; lower

A

D. Faster; lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A procedure that decides which device has permission to transmit at a given time is called

A. Sequence control
B. Protocol
C. Flow control
D. Line control

A

D. Line control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In this technique, there is no direct
contact between users and their
programs during execution.

A. System Processing
B. Time Sharing
C. Message Passing
D. Batch Processing

A

D. Batch Processing

In the Batch Environment, there is no direct interaction between users and their programs during execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of circuit is commonly used
for applications where simplicity and
cost-effectiveness are important?

A. Two-wire circuit
B. High-duplex circuit
C. Four-wire circuit
D. Full-duplex circuit

A

A. Two-wire circuit

Two-wire circuits are often used in
applications where simplicity and costeffectiveness are prioritized over highspeed data transfer or full-duplex
communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

For which type of communication is a
half-duplex circuit most appropriate?

A. Satellite communication
B. Telephone conversations
C. Streaming high-definition video
D. High-speed data transfer

A

B. Telephone conversations

Half-duplex circuits, where
communication can occur in both
directions but not simultaneously, are
commonly used in telephone
conversations where one party speaks
while the other listens, and then they
switch roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a disadvantage of four-wire
circuits compared to two-wire circuits?

A. Limited bandwidth
B. Costly
C. Signal interference
D. Full-duplex communication

A

B. Costly

Four-wire circuits are more complex to implement than two-wire circuits due to the need for separate wire pairs for
transmission and reception and
therefore more costly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a 7-bit ASCII character that is
transmitted serially back to the
transmitter every 10 seconds until the
transmitter recognizes it?

A. NAK
B. SYN
C. BCC
D. SOH

A

A. NAK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a disadvantage of two-wire circuits compared to four-wire circuits? A. Limited bandwidth B. Signal interference C. Full-duplex communication D. Complex implementation
B. Signal interference Two-wire circuits are more susceptible to signal interference and crosstalk compared to four-wire circuits.
26
In ____, the data transmission procedure begins with the receiving computer transmitting a negative acknowledge (NAK) character to the transmitter A. Kermit B. Bisync C. Xmodem D. SDLC
C. Xmodem
27
What advantage does a four-wire circuit have over a two-wire circuit in terms of signal integrity? A. Lower cost B. Full-duplex communication C. Simplicity D. Reduced signal interference
D. Reduced signal interference Four-wire circuits experience less signal interference and crosstalk since they use separate wire pairs for transmission and reception, contributing to improved signal integrity.
28
Which circuit configuration is preferred for Ethernet networks and high-speed data links? A. Simplex circuit B. Four-wire circuit C. Half-duplex circuit D. Two-wire circuit
B. Four-wire circuit Four-wire circuits are preferred for Ethernet networks and high-speed data links due to their higher bandwidth and better signal quality.
29
What is the primary benefit of a two- wire circuit in scenarios where simplicity is critical? A. Full-duplex communication B. Cost-effectiveness C. Reduced signal interference D. Higher bandwidth
B. Cost-effectiveness Two-wire circuits are often chosen in scenarios prioritizing simplicity and cost-effectiveness, as they require fewer wires and resources, making them more economical to implement.
30
Which circuit configuration allows communication in both directions but not simultaneously? A. Full-duplex circuit B. Two-wire circuit C. Half-duplex circuit D. Simplex circuit
C. Half-duplex circuit Half-duplex circuits allow communication in both directions, but only one direction at a time.
31
Which circuit configuration provides better signal quality and lower susceptibility to interference? A. Four-wire circuit B. Half-duplex circuit C. Two-wire circuit D. Simplex circuit
A. Four-wire circuit Four-wire circuits provide better signal quality and lower susceptibility to interference compared to two-wire circuits
32
Cryptographic algorithms are based on mathematical algorithms where these algorithms use ____ for a secure transformation of data. A. add-ons B. external programs C. secondary key D. secret key
D. secret key When plain text is converted to unreadable format through some algorithms, that type of text is termed as cipher text. Cryptographic algorithms are based on mathematical algorithms where these algorithms use the secret key for a secure transformation of data.
33
Cryptographic hash function takes an arbitrary block of data and returns A. variable sized byte string B. variable size bit string C. fixed size bit string D. both fixed size bit string and variable size bit string
C. fixed size bit string Cryptographic hash functions are used in digital signatures and message authentication codes. The only issue with it is that it returns the same hash value every time for a message making it vulnerable to attackers to evaluate and break the cipher.
34
___ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. A. Cryptography B. Exploit writing C. Reverse engineering D. Malware Analysis
A. Cryptography Cryptography is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it where "kryptos" means secret, "graphein" means to-write.
35
If a process is executing in its critical section, then no other processes can be executing in their critical section. What is this condition called? A. asynchronous exclusion B. synchronous exclusion C. critical exclusion D. mutual exclusion
D. mutual exclusion If a process is executing in its critical section, then no other processes can be executed in their critical section. This condition is called Mutual Exclusion. Critical section of the process is shared between multiple processes. If this section is executed by more than one or all of them concurrently then the outcome of this is not as per desired outcome. For this reason the critical section of the process should not be executed concurrently.
36
___is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. A. Reverse engineering B. Exploit writing C. Cryptography D. Malware Analysis
C. Cryptography Cryptography is the process or mechanism used for converting ordinary plain text into garbled non- human readable text & vice-versa. It is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
37
If the power output of a transmitter is increased by four times, how might a nearby receiver's S-meter reading change? A. Decrease by approximately four S units B. Increase by approximately one S unit C. Decrease by approximately one S unit D. Increase by approximately four S units
B. Increase by approximately one S unit The 'S-meter' on a receiver provides a relative indication of received signal strength. S-meters are calibrated at the low end in S units, from S1 to S9. One S unit represents about 6 decibels (four times the power). Above a signal strength of S9, readings are in decibels: 10 dB over S9, 20 dB over S9, 30 dB over S9, etc.
38
A monitor is a module that encapsulates ____ A. synchronization between concurrent procedure invocation B. procedures that operate on shared data structure C. all of these choices D. shared data structures
C. all of these choices A monitor is a module that encapsulates shared data structures, procedures that operate on shared data structure, synchronization between concurrent procedure invocation.
39
Which one of the following is a cryptographic protocol used to secure HTTP connection? A. transport layer security (TLS) B. explicit congestion notification (ECN) C. resource reservation protocol D. stream control transmission protocol (SCTP)
A. transport layer security (TLS) TLS has strong message authentication and key-material generation to prevent eavesdropping, tampering and message forgery. It has been used since the year 1996.
40
An OSPF router receives an LSA. The router checks its sequence number and finds that this number is lower than the sequence number it already has. What does the router do with the LSA? A. Adds it to the database B. Sends newer LSU update to source router C. Floods the LSA to the other routers D. Ignores the LSA
B. Sends newer LSU update to source router An OSPF router receives an LSA. If the router checks its sequence number and finds that this number is lower than the sequence number that it already has, the router sends newer LSU update to source router. The router then adds it to the database and floods it to the other routers.
41
Which of the following is an advantage of anomaly detection? A. Malicious activity that falls within normal usage patterns is detected B. The engine can scale as the rule set grows C. Custom protocols can be easily analyzed D. Rules are easy to define
B. The engine can scale as the rule set grows Once a protocol has been built and a behavior defined, the engine can scale more quickly and easily than the signature-based model because a new signature does not have to be created for every attack and potential variant.
42
Which of the following modulation schemes is supported by WiMAX? A. all of these choices B. quadrature phase shift keying modulation C. binary phase shift keying modulation D. quadrature amplitude modulation
A. all of these choices WiMAX supports a variety of modulation schemes such as binary phase shift keying modulation, quadrature phase shift keying modulation, and quadrature amplitude modulation and allows for the scheme to change on a burst-by-burst basis per link, depending on channel conditions.
43
Which of the following statements is NOT true concerning VPNs? A. Allows remote workers to access corporate data B. Is the backbone of the Internet C. Financially rewarding compared to leased lines D. Allows LAN-to-LAN connectivity over public networks
B. Is the backbone of the Internet VPNs are not the backbone of the Internet as they are just a method to create private intranets on the internet. They are used for enhancing the connection security for the users
44
The number of objects in a Web page which consists of 4 jpeg images and HTML text is A. 1 B. 5 C. 7 D. 4
D. 4 4 jpeg images + 1 base HTML file.
45
Which of the following subsystem provides radio transmission between mobile station and MSC? A. NSS B. BSS C. OSS D. BSC
B. BSS The BSS provides and manages radio transmission paths between the mobile stations and the Mobile Switching Center (MSC). It also manages the radio interface between the mobile stations and all other subsystems of GSM.
46
WiMAX stands for ____ A. wireless maximum communication B. wireless internet maximum communication C. worldwide interoperability for microwave access D. worldwide international standard for microwave access
C. worldwide interoperability for microwave access WiMAX or worldwide interoperability for microwave access is a set of wireless communication standards. It provides support for multiple physical layer (PHY) and Media Access Control (MAC) options. It is based on IEEE 802.16 standards.
47
___ allows checking if a domain is available for registration. A. Domain Lookup B. Domain registers C. Domain Check D. Domain registers
C. Domain Check There are billions of domains available for registration on the World Wide Web,and many of them are already registered. So when one wants to register a domain, they need to check whether the domain is available through a domain check.
48
The HTTP request message is sent in ___ part of three-way handshake. A. Fourth B. Second C. First D. Third
D. Third In first step client sends a segment to establish a connection with the server.In the second the step the client waits for the acknowledgement to be received from the server. After receiving the acknowledgement, the client sends actual data in the third step.
49
A Link Control Protocol (LCP) is used for A. Provides for multiplexing of different network-layer protocols B. Testing the different network-layer protocols C. Establishing, configuring and testing the data-link connection D. Establishing and configuring different network-layer protocols
C. Establishing, configuring and testing the data-link connection The Link Control Protocol (LCP) is the part of PPP that is used for establishing, configuring and testing the data-link connection. The other two components are Network Control Protocol and Encapsulation.
50
The conditional GET mechanism A. Imposes conditions on the objects to be requested B. None of these choices C. Helps to keep a cache up to date D. Limits the number of response from a server
C. Helps to keep a cache up to date The HTTP protocol requests the server of the website its trying to access so that it can store its files, images etc. in cache memory. This request of asking the server for a document considering a specific parameter is called conditional GET Request.
51
The entity that overseas global IP address allocation, DNS root zone management, media types, and other internet protocol assignments operated by Internet Corporation for Assigned Names and Numbers (ICANN). A. Address Supporting Organization (ASO) B. Internet Architecture Board (IAB) C. Internet Engineering Task Force (IETF) D. Internet Assigned Numbers Authority (IANA)
D. Internet Assigned Numbers Authority (IANA) Internet Protocol (IP) is the principal communications protocol used for relaying datagrams (packets) across an internetwork using the Internet Protoco Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet
52
EIGRP metric is ___ A. Delay only B. Hop Count C. K-values D. Bandwidth only
C. K-values EIGRP metric is K-values which are integers from 0 to 128. They are used to calculate the overall EIGRP cost with bandwidth and delay metrics.
53
An OSPF router receives an LSA, the router checks its sequence number, and this number matches the sequence number of the LSA that the receiving router already has. What does the receiving router do with the LSA? A. Ignores the LSA B. Adds it to the database C. Floods the LSA to the other routers D. Sends newer LSU update to source router
A. Ignores the LSA When the OSPF router receives an LSA,the router checks its sequence number.If this number matches the sequence number of the LSA that the receiving router already has, the router ignores the LSA.
54
Which layer of the OSI reference model does PPTP work at? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 1
A. Layer 2 PTP stands for Point-to-Point Tunneling Protocol. PPTP is a tunneling protocol that was primitively used to create VPNs. It is no longer used for VPNs due to the lack of security it provides.
55
ATM cells have fixed length of A. 47 bytes B. 48 bytes C. 53 bytes D. 5 bytes
C. 53 bytes ATM cells have a fixed length of 53 bytes. It consists of 48 bytes of data and 5 bytes of header information. Fixed length packets result in simple implementation of fast packet switches.
56
The data unit of ATM is A. Molecule B. Packet C. Cell D. Atom
C. Cell The data unit of ATM is cell. They are routed based on header information in each unit (called a label) that identifies the cell as belonging to a specific ATM virtual connection.
57
Information bearing channels in ISDN are called ___ A. Voice channels B. B channels C. Data channels D. D channels
B. B channels The ISDN interface is divided into three different types of channels. Information bearing channels called bearer channels(B channels) are used exclusively for end user traffic (voice, data and video).
58
Which of the following is true for ATM? A. Handle only voice users B. Multiple access technique C. Multiplexing technique D. Circuit switched
C. Multiplexing technique ATM is a packet switching and multiplexing technique which has been specifically designed to handle both voice users and packet data users in a single physical channel.
59
Which of the following speech coder is used in USDC? A. Multipulse Excited Linear Predictive coder B. Vector Sum Excited Linear Predictive coder C. Formant Vocoder D. Residual Excited Linear Predictive coder
B. Vector Sum Excited Linear Predictive coder The USDC speech coder is called the Vector Sum Excited Linear Predictive coder (VSELP). This belongs to the class of Code Excited Linear Predictive coders (CELP) or Stochastically Excited Linear Predictive coders.
60
S-interface is a ___ bus. A. None of these choices B. Two wire bus C. Four wire bus D. Single wired bus
C. Four wire bus The S interface is a four wire bus that ISDN consumer devices plug into
61
Which of the following channel in USDC is used to send important control or specialized traffic data between the base station and mobile units? A. CVDCC B. SACCH C. DTC D. FACCH
D. FACCH FACCH (fast associated control channel) is used to send important control or specialized traffic data between the base station and mobile units. The FACCH data, when transmitted, takes the place of user information data within a frame.
62
Which of the following channel in USDC provides a signalling channel? A. CVDCC B. DTC C. SACCH D. FACCH
C. SACCH The SACCH (slow associated control channel) is sent in every time slot and provides a signalling channel in parallel with the digital speech. The SACCH carries various control and supervisory messages between the subscriber unit and the base station.
63
USDC has ___ as many control channels as AMPS. A. Twice B. Three times C. Same D. Four times
A. Twice USDC has twice as many control channels as AMPS. In addition to the forty-two primary AMPS control channels, USDC specifies forty-two additional control channels called the secondary control channels.
64
Which of the following is based on ATM technology? A. CCS B. ARDIS C. B-ISDN D. SS7
C. B-ISDN Emerging networking technique, broadband ISDN (B-ISDN) is based on asynchronous transfer mode (ATM) technology. It allows packet switching rates up to 2.4 Gbps and total switching capacities as high as 100 Gbps.
65
Access signalling is governed by the SS7 suite of protocols. A. None of these choices B. False C. True D. Both of these choices
B. False The second signalling component of ISDN, network signalling is governed by the SS7 suite of protocols. For wireless communication systems, the SS7 protocols within ISDN are critical to providing backbone network connectivity between MSCs throughout the world.