REM B LVL 3 Flashcards

1
Q

If FCC regulations are followed, ____ potential FM stations are theoretically possible in a given area.

A. 50
B. 100
C. 133
D. 150

A

A. 50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In IPv6 digital communication, the
destination address or the address of the intended recipient of the data has ___ bits

A. 128
B. 512
C. 64
D. 256

A

A. 128

IPV6 uses 128 bit address
IPV4 uses 32 bit address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The interval of frequencies outside
which the spectrum is zero is called as

A. none of the mentioned
B. normalized bandwidth
C. absolute bandwidth
D. null to null bandwidth

A

C. absolute bandwidth

The measure of frequencies outside
which spectrum is zero is called as
absolute bandwidth. It is usually infinite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The attenuation level in bounded power
spectral density is

A. 35&50
B. none of the mentioned
C. 50
D. 35

A

A. 35&50

Bounded power spectral density is the bandwidth outside which the spectrum must have fallen to a stated level below that found at the band center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If the ASCIl character G is sent and the
character D is received, what type of
error is this?

A. Burst
B. Recoverable
C. Multiple-bit
D. Single-bit

A

A. Burst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The NRZ digital signal-encoding format
has a ___ component in the waveform.

A. sinusoidal
B. parity
C. harmonic
D. dc

A

D. dc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which error detection method can
detect a burst error?

A. Two-dimensional parity and CRC
B. The parity check
C. CRC
D. Two-dimensional parity check

A

A. Two-dimensional parity and CRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which error detection method involves
the use of parity bits?

A. CRC
B. Simple parity check and Two-
dimensional parity
C. Two-dimensional parity check
D. Simple parity check

A

B. Simple parity check and Two-
dimensional parity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which error detection method consists of a parity bit for each data unit as well as an entire data unit of parity bits?

A. Two-dimensional parity check
B. Simple parity check
C. CRC
D. Checksum

A

A. Two-dimensional parity check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pseudorandom implies a sequence that
can be ___ but has the properties of
randomness.

A. detected
B. decoded
C. re-created
D. minimized

A

C. re-created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many samples are there in a T1
frame of TDM system

A. 8
B. 24
C. 64
D. 32

A

B. 24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In TDM, the sampling rate of of T1 and
DS1

A. 24bps
B. 8000bps
C. 1.544Gbps
D. 2.048Gbps

A

B. 8000bps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The frame time for T1 digital carrier in a
time domain multiplexing system

A. 577us
B. 256us
C. 500us
D. 125us

A

D. 125us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which a modulation technique requires
a frequency band sliced into several
hundred of sub-bands, each of which carries a modulated signal as part of the data stream?

A. Discrete Multi-tone (DMT)
B. Differential modulation
C. Orthogonal modulation
D. Carrierless Amplitude and Phase (CAP)

A

A. Discrete Multi-tone (DMT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In AT&T’s FDM hierarchy, the bandwidth
of each group type can be found by
multiplying ____ and adding extra
bandwidth for guard bands.

A. The number of voice channels by 8 bits/
sample
B. The number of voice channels by 4000
Hz
C. The sampling rate by 8 bits/sample
D. The sampling rate by 4000 Hz

A

B. The number of voice channels by 4000
Hz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The baseband frequency of an L600
standard FDM is

A. 312 to 552 KHz
B. 108 to 312 KHz
C. 60 to 108 KHz
D. 60 to 2788 KHz

A

D. 60 to 2788 KHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The bandwidth of an FDM system U600
mastergroup

A. 2728Khz
B. 2520KHz
C. 4kHz
D. 8kHz

A

B. 2520KHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Synchronous transmission is therefore
much ____ than asynchronous
transmission because of the ____ overhead.

A. Faster; greater
B. Slower; greater
C. Slower; lower
D. Faster; lower

A

D. Faster; lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A procedure that decides which device has permission to transmit at a given time is called

A. Sequence control
B. Protocol
C. Flow control
D. Line control

A

D. Line control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In this technique, there is no direct
contact between users and their
programs during execution.

A. System Processing
B. Time Sharing
C. Message Passing
D. Batch Processing

A

D. Batch Processing

In the Batch Environment, there is no direct interaction between users and their programs during execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which type of circuit is commonly used
for applications where simplicity and
cost-effectiveness are important?

A. Two-wire circuit
B. High-duplex circuit
C. Four-wire circuit
D. Full-duplex circuit

A

A. Two-wire circuit

Two-wire circuits are often used in
applications where simplicity and costeffectiveness are prioritized over highspeed data transfer or full-duplex
communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

For which type of communication is a
half-duplex circuit most appropriate?

A. Satellite communication
B. Telephone conversations
C. Streaming high-definition video
D. High-speed data transfer

A

B. Telephone conversations

Half-duplex circuits, where
communication can occur in both
directions but not simultaneously, are
commonly used in telephone
conversations where one party speaks
while the other listens, and then they
switch roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a disadvantage of four-wire
circuits compared to two-wire circuits?

A. Limited bandwidth
B. Costly
C. Signal interference
D. Full-duplex communication

A

B. Costly

Four-wire circuits are more complex to implement than two-wire circuits due to the need for separate wire pairs for
transmission and reception and
therefore more costly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a 7-bit ASCII character that is
transmitted serially back to the
transmitter every 10 seconds until the
transmitter recognizes it?

A. NAK
B. SYN
C. BCC
D. SOH

A

A. NAK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a disadvantage of two-wire
circuits compared to four-wire circuits?

A. Limited bandwidth
B. Signal interference
C. Full-duplex communication
D. Complex implementation

A

B. Signal interference

Two-wire circuits are more susceptible
to signal interference and crosstalk
compared to four-wire circuits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In ____, the data transmission
procedure begins with the receiving
computer transmitting a negative
acknowledge (NAK) character to the
transmitter

A. Kermit
B. Bisync
C. Xmodem
D. SDLC

A

C. Xmodem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What advantage does a four-wire circuit have over a two-wire circuit in terms of signal integrity?

A. Lower cost
B. Full-duplex communication
C. Simplicity
D. Reduced signal interference

A

D. Reduced signal interference

Four-wire circuits experience less signal
interference and crosstalk since they
use separate wire pairs for transmission and reception, contributing to improved signal integrity.

28
Q

Which circuit configuration is preferred for Ethernet networks and high-speed data links?

A. Simplex circuit
B. Four-wire circuit
C. Half-duplex circuit
D. Two-wire circuit

A

B. Four-wire circuit

Four-wire circuits are preferred for
Ethernet networks and high-speed data links due to their higher bandwidth and better signal quality.

29
Q

What is the primary benefit of a two-
wire circuit in scenarios where
simplicity is critical?

A. Full-duplex communication
B. Cost-effectiveness
C. Reduced signal interference
D. Higher bandwidth

A

B. Cost-effectiveness

Two-wire circuits are often chosen in
scenarios prioritizing simplicity and
cost-effectiveness, as they require fewer wires and resources, making them more economical to implement.

30
Q

Which circuit configuration allows
communication in both directions but
not simultaneously?

A. Full-duplex circuit
B. Two-wire circuit
C. Half-duplex circuit
D. Simplex circuit

A

C. Half-duplex circuit

Half-duplex circuits allow
communication in both directions, but
only one direction at a time.

31
Q

Which circuit configuration provides
better signal quality and lower
susceptibility to interference?

A. Four-wire circuit
B. Half-duplex circuit
C. Two-wire circuit
D. Simplex circuit

A

A. Four-wire circuit

Four-wire circuits provide better signal
quality and lower susceptibility to
interference compared to two-wire
circuits

32
Q

Cryptographic algorithms are based on mathematical algorithms where these algorithms use ____ for a secure transformation of data.

A. add-ons
B. external programs
C. secondary key
D. secret key

A

D. secret key

When plain text is converted to
unreadable format through some
algorithms, that type of text is termed
as cipher text. Cryptographic algorithms
are based on mathematical algorithms
where these algorithms use the secret
key for a secure transformation of data.

33
Q

Cryptographic hash function takes an
arbitrary block of data and returns

A. variable sized byte string
B. variable size bit string
C. fixed size bit string
D. both fixed size bit string and variable size
bit string

A

C. fixed size bit string

Cryptographic hash functions are used
in digital signatures and message
authentication codes. The only issue with it is that it returns the same hash value every time for a message making it vulnerable to attackers to evaluate and break the cipher.

34
Q

___ is a means of storing &
transmitting information in a specific
format so that only those for whom it is
planned can understand or process it.

A. Cryptography
B. Exploit writing
C. Reverse engineering
D. Malware Analysis

A

A. Cryptography

Cryptography is a means of storing &
transmitting information in a specific
format so that only those for whom it is
planned can understand or process it
where “kryptos” means secret,
“graphein” means to-write.

35
Q

If a process is executing in its critical
section, then no other processes can be executing in their critical section. What is this condition called?

A. asynchronous exclusion
B. synchronous exclusion
C. critical exclusion
D. mutual exclusion

A

D. mutual exclusion

If a process is executing in its critical
section, then no other processes can be
executed in their critical section. This
condition is called Mutual Exclusion.
Critical section of the process is shared
between multiple processes. If this
section is executed by more than one or
all of them concurrently then the
outcome of this is not as per desired outcome. For this reason the critical section of the process should not be executed concurrently.

36
Q

___is the process or mechanism
used for converting ordinary plain text into garbled non-human readable text & vice-versa.

A. Reverse engineering
B. Exploit writing
C. Cryptography
D. Malware Analysis

A

C. Cryptography

Cryptography is the process or
mechanism used for converting
ordinary plain text into garbled non-
human readable text & vice-versa. It is a
means of storing & transmitting
information in a specific format so that
only those for whom it is planned can
understand or process it.

37
Q

If the power output of a transmitter is increased by four times, how might a nearby receiver’s S-meter reading
change?

A. Decrease by approximately four S units
B. Increase by approximately one S unit
C. Decrease by approximately one S unit
D. Increase by approximately four S units

A

B. Increase by approximately one S unit

The ‘S-meter’ on a receiver provides a
relative indication of received signal
strength. S-meters are calibrated at the low end in S units, from S1 to S9. One S unit represents about 6 decibels (four times the power). Above a signal strength of S9, readings are in decibels:
10 dB over S9, 20 dB over S9, 30 dB over S9, etc.

38
Q

A monitor is a module that
encapsulates ____

A. synchronization between concurrent procedure invocation
B. procedures that operate on shared data structure
C. all of these choices
D. shared data structures

A

C. all of these choices

A monitor is a module that
encapsulates shared data structures,
procedures that operate on shared data
structure, synchronization between
concurrent procedure invocation.

39
Q

Which one of the following is a
cryptographic protocol used to secure
HTTP connection?

A. transport layer security (TLS)
B. explicit congestion notification (ECN)
C. resource reservation protocol
D. stream control transmission protocol
(SCTP)

A

A. transport layer security (TLS)

TLS has strong message authentication and key-material generation to prevent eavesdropping, tampering and message forgery. It has been used since the year 1996.

40
Q

An OSPF router receives an LSA. The
router checks its sequence number and finds that this number is lower than the sequence number it already has. What does the router do with the LSA?

A. Adds it to the database
B. Sends newer LSU update to source
router
C. Floods the LSA to the other routers
D. Ignores the LSA

A

B. Sends newer LSU update to source
router

An OSPF router receives an LSA. If the router checks its sequence number and finds that this number is lower than the sequence number that it already has, the router sends newer LSU update to source router. The router then adds it to the database and floods it to the other routers.

41
Q

Which of the following is an advantage
of anomaly detection?

A. Malicious activity that falls within normal
usage patterns is detected
B. The engine can scale as the rule set
grows
C. Custom protocols can be easily analyzed
D. Rules are easy to define

A

B. The engine can scale as the rule set
grows

Once a protocol has been built and a
behavior defined, the engine can scale
more quickly and easily than the
signature-based model because a new signature does not have to be created for every attack and potential variant.

42
Q

Which of the following modulation
schemes is supported by WiMAX?

A. all of these choices
B. quadrature phase shift keying modulation
C. binary phase shift keying modulation
D. quadrature amplitude modulation

A

A. all of these choices

WiMAX supports a variety of
modulation schemes such as binary
phase shift keying modulation,
quadrature phase shift keying
modulation, and quadrature amplitude modulation and allows for the scheme to change on a burst-by-burst basis per link, depending on channel conditions.

43
Q

Which of the following statements is
NOT true concerning VPNs?

A. Allows remote workers to access
corporate data
B. Is the backbone of the Internet
C. Financially rewarding compared to leased
lines
D. Allows LAN-to-LAN connectivity over
public networks

A

B. Is the backbone of the Internet

VPNs are not the backbone of the
Internet as they are just a method to
create private intranets on the internet.
They are used for enhancing the
connection security for the users

44
Q

The number of objects in a Web page which consists of 4 jpeg images and HTML text is

A. 1
B. 5
C. 7
D. 4

A

D. 4

4 jpeg images + 1 base HTML file.

45
Q

Which of the following subsystem
provides radio transmission between
mobile station and MSC?

A. NSS
B. BSS
C. OSS
D. BSC

A

B. BSS

The BSS provides and manages radio
transmission paths between the mobile
stations and the Mobile Switching
Center (MSC). It also manages the radio
interface between the mobile stations
and all other subsystems of GSM.

46
Q

WiMAX stands for ____

A. wireless maximum communication
B. wireless internet maximum
communication
C. worldwide interoperability for
microwave access
D. worldwide international standard for
microwave access

A

C. worldwide interoperability for
microwave access

WiMAX or worldwide interoperability for
microwave access is a set of wireless
communication standards. It provides
support for multiple physical layer
(PHY) and Media Access Control (MAC)
options. It is based on IEEE 802.16
standards.

47
Q

___ allows checking if a domain is
available for registration.

A. Domain Lookup
B. Domain registers
C. Domain Check
D. Domain registers

A

C. Domain Check

There are billions of domains available for registration on the World Wide Web,and many of them are already registered. So when one wants to register a domain, they need to check
whether the domain is available through
a domain check.

48
Q

The HTTP request message is sent in ___ part of three-way handshake.

A. Fourth
B. Second
C. First
D. Third

A

D. Third

In first step client sends a segment to establish a connection with the server.In the second the step the client waits
for the acknowledgement to be received
from the server. After receiving the
acknowledgement, the client sends
actual data in the third step.

49
Q

A Link Control Protocol (LCP) is used for

A. Provides for multiplexing of different
network-layer protocols
B. Testing the different network-layer
protocols
C. Establishing, configuring and testing
the data-link connection
D. Establishing and configuring different
network-layer protocols

A

C. Establishing, configuring and testing
the data-link connection

The Link Control Protocol (LCP) is the
part of PPP that is used for establishing,
configuring and testing the data-link
connection. The other two components
are Network Control Protocol and
Encapsulation.

50
Q

The conditional GET mechanism

A. Imposes conditions on the objects to be
requested
B. None of these choices
C. Helps to keep a cache up to date
D. Limits the number of response from a
server

A

C. Helps to keep a cache up to date

The HTTP protocol requests the server
of the website its trying to access so
that it can store its files, images etc. in
cache memory. This request of asking
the server for a document considering a specific parameter is called conditional GET Request.

51
Q

The entity that overseas global IP
address allocation, DNS root zone
management, media types, and other
internet protocol assignments operated
by Internet Corporation for Assigned
Names and Numbers (ICANN).

A. Address Supporting Organization (ASO)
B. Internet Architecture Board (IAB)
C. Internet Engineering Task Force (IETF)
D. Internet Assigned Numbers Authority (IANA)

A

D. Internet Assigned Numbers Authority (IANA)

Internet Protocol (IP) is the principal
communications protocol used for
relaying datagrams (packets) across an internetwork using the Internet Protoco Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet

52
Q

EIGRP metric is ___

A. Delay only
B. Hop Count
C. K-values
D. Bandwidth only

A

C. K-values

EIGRP metric is K-values which are
integers from 0 to 128. They are used to
calculate the overall EIGRP cost with
bandwidth and delay metrics.

53
Q

An OSPF router receives an LSA, the
router checks its sequence number, and
this number matches the sequence
number of the LSA that the receiving
router already has. What does the
receiving router do with the LSA?

A. Ignores the LSA
B. Adds it to the database
C. Floods the LSA to the other routers
D. Sends newer LSU update to source router

A

A. Ignores the LSA

When the OSPF router receives an LSA,the router checks its sequence number.If this number matches the sequence number of the LSA that the receiving router already has, the router ignores the LSA.

54
Q

Which layer of the OSI reference model
does PPTP work at?

A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 1

A

A. Layer 2

PTP stands for Point-to-Point Tunneling Protocol. PPTP is a tunneling protocol that was primitively used to create VPNs. It is no longer used for VPNs due to the lack of security it provides.

55
Q

ATM cells have fixed length of

A. 47 bytes
B. 48 bytes
C. 53 bytes
D. 5 bytes

A

C. 53 bytes

ATM cells have a fixed length of 53
bytes. It consists of 48 bytes of data
and 5 bytes of header information.
Fixed length packets result in simple
implementation of fast packet switches.

56
Q

The data unit of ATM is

A. Molecule
B. Packet
C. Cell
D. Atom

A

C. Cell

The data unit of ATM is cell. They are routed based on header information in each unit (called a label) that identifies the cell as belonging to a specific ATM virtual connection.

57
Q

Information bearing channels in ISDN
are called ___

A. Voice channels
B. B channels
C. Data channels
D. D channels

A

B. B channels

The ISDN interface is divided into three different types of channels. Information bearing channels called bearer channels(B channels) are used exclusively for end user traffic (voice, data and video).

58
Q

Which of the following is true for ATM?

A. Handle only voice users
B. Multiple access technique
C. Multiplexing technique
D. Circuit switched

A

C. Multiplexing technique

ATM is a packet switching and
multiplexing technique which has been
specifically designed to handle both
voice users and packet data users in a
single physical channel.

59
Q

Which of the following speech coder is
used in USDC?

A. Multipulse Excited Linear Predictive coder
B. Vector Sum Excited Linear Predictive
coder
C. Formant Vocoder
D. Residual Excited Linear Predictive coder

A

B. Vector Sum Excited Linear Predictive
coder

The USDC speech coder is called the Vector Sum Excited Linear Predictive coder (VSELP). This belongs to the class of Code Excited Linear Predictive coders (CELP) or Stochastically Excited Linear Predictive coders.

60
Q

S-interface is a ___ bus.

A. None of these choices
B. Two wire bus
C. Four wire bus
D. Single wired bus

A

C. Four wire bus

The S interface is a four wire bus that
ISDN consumer devices plug into

61
Q

Which of the following channel in USDC
is used to send important control or
specialized traffic data between the
base station and mobile units?

A. CVDCC
B. SACCH
C. DTC
D. FACCH

A

D. FACCH

FACCH (fast associated control
channel) is used to send important
control or specialized traffic data
between the base station and mobile
units. The FACCH data, when
transmitted, takes the place of user
information data within a frame.

62
Q

Which of the following channel in USDC
provides a signalling channel?

A. CVDCC
B. DTC
C. SACCH
D. FACCH

A

C. SACCH

The SACCH (slow associated control channel) is sent in every time slot and provides a signalling channel in parallel with the digital speech. The SACCH carries various control and supervisory messages between the subscriber unit and the base station.

63
Q

USDC has ___ as many control channels as AMPS.

A. Twice
B. Three times
C. Same
D. Four times

A

A. Twice

USDC has twice as many control
channels as AMPS. In addition to the
forty-two primary AMPS control
channels, USDC specifies forty-two
additional control channels called the
secondary control channels.

64
Q

Which of the following is based on ATM
technology?

A. CCS
B. ARDIS
C. B-ISDN
D. SS7

A

C. B-ISDN

Emerging networking technique,
broadband ISDN (B-ISDN) is based on
asynchronous transfer mode (ATM)
technology. It allows packet switching
rates up to 2.4 Gbps and total switching
capacities as high as 100 Gbps.

65
Q

Access signalling is governed by the
SS7 suite of protocols.

A. None of these choices
B. False
C. True
D. Both of these choices

A

B. False

The second signalling component of
ISDN, network signalling is governed by the SS7 suite of protocols. For wireless communication systems, the SS7 protocols within ISDN are critical to providing backbone network
connectivity between MSCs throughout
the world.