Top 50+ Solved Wireless Network MCQ Questions Answer
Q. ..………..is used to validate the identity of the message sender to the recipient
a. encryption
b. decryption
Q. When too many packets are present in the subnet, and performance degrades then it leads to ………………..
a. ingestion
b. congestion
Q. What is it goal of congestion control?
a. making sure that subnet is not able to carry the offered traffic
b. making sure that subnet will allow more than the offered packets
Q. The service of open loop congestion control technique is …………………..
a. monitor the system to detect when and where congestion occurs
b. when to accept new traffic
Q. In …………… case higher bandwidth can be achieved.
a. connectionless networks
b. connection oriented networks
Q. In transport layer, End to End delivery is the movement of data from ……………….
a. one station to the next station
b. one network to the other network
Q. The service of closed loop congestion control technique is ………………
a. when to accept new traffic
b. when to discard the packets
Q. The solution to increase the capacity when congestion occurs is …………………
a. denying service to the users
b. degrading the service to the users
Q. When the source host receives the choke packet, then the source ………………
a. reduces the capacity of the line
b. reduces the line utilization factor
Q. For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..
a. random early detection
b. jitter