Top 50+ Solved Wireless Network MCQ Questions Answer

From 31 to 45 of 50

Q. ..………..is used to validate the identity of the message sender to the recipient

a. encryption

b. decryption

  • c. digital certificate

Q. What is it goal of congestion control?

a. making sure that subnet is not able to carry the offered traffic

b. making sure that subnet will allow more than the offered packets

  • c. making sure that subnet is able to carry the offered traffic

Q. The service of open loop congestion control technique is …………………..

a. monitor the system to detect when and where congestion occurs

b. when to accept new traffic

  • b. when to accept new traffic

Q. In …………… case higher bandwidth can be achieved.

a. connectionless networks

b. connection oriented networks

  • a. connectionless networks

Q. In transport layer, End to End delivery is the movement of data from ……………….

a. one station to the next station

b. one network to the other network

  • c. source to destination

Q. The service of closed loop congestion control technique is ………………

a. when to accept new traffic

b. when to discard the packets

  • c. monitor the system to detect when and where congestion occurs

Q. The solution to increase the capacity when congestion occurs is …………………

a. denying service to the users

b. degrading the service to the users

  • c. splitting traffic over multiple routes

Q. When the source host receives the choke packet, then the source ………………

a. reduces the capacity of the line

b. reduces the line utilization factor

  • c. reduces the traffic generation

Q. Flow control policy is implemented in ………………….

a. network layer

b. transport layer

  • b. transport layer

Q. The first collision free protocol is ……………….

a. binary countdown

b. basic bitmap

  • b. basic bitmap

Q. FDDI is an acronym for ……………

a. fast data delivery interface

b. fiber distributed data interface

  • b. fiber distributed data interface
Subscribe Now

Get All Updates & News