On This Page

This set of Wireless Network Multiple Choice Questions & Answers (MCQs) focuses on Wireless Network Set 2

Q1 | The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called …………….
  • migratory hosts
  • stationary hosts
  • mobile hosts
Q2 | The hosts who compute on the run and want to maintain their connections as they move around ……………
  • migratory hosts
  • stationary hosts
  • mobile hosts
Q3 | What is the type of network in which the routers themselves are mobile?
  • wide area network
  • mobile ad hoc network
  • mobile network
Q4 | In open loop congestion control techniques, the decisions are based on the ……………
  • without regard to the current state of the network
  • with regard to the current state of the network
  • with regard to the choice of the host
Q5 | In closed loop congestion control techniques, the decisions are based on the ……………..
  • concept of a feedback loop
  • concept of a forward loop
  • concept of current state of network
Q6 | ..………..is used to validate the identity of the message sender to the recipient
  • encryption
  • decryption
  • digital certificate
Q7 | When too many packets are present in the subnet, and performance degrades then it leads to ………………..
  • ingestion
  • congestion
  • digestion
Q8 | What is it goal of congestion control?
  • making sure that subnet is not able to carry the offered traffic
  • making sure that subnet will allow more than the offered packets
  • making sure that subnet is able to carry the offered traffic
Q9 | The service of open loop congestion control technique is …………………..
  • monitor the system to detect when and where congestion occurs
  • when to accept new traffic
  • pass the information to places where action can be taken
Q10 | In …………… case higher bandwidth can be achieved.
  • connectionless networks
  • connection oriented networks
  • virtual circuit networks
Q11 | In transport layer, End to End delivery is the movement of data from ……………….
  • one station to the next station
  • one network to the other network
  • source to destination
Q12 | The service of closed loop congestion control technique is ………………
  • when to accept new traffic
  • when to discard the packets
  • monitor the system to detect when and where congestion occurs
Q13 | The solution to increase the capacity when congestion occurs is …………………
  • denying service to the users
  • degrading the service to the users
  • splitting traffic over multiple routes
Q14 | When the source host receives the choke packet, then the source ………………
  • reduces the capacity of the line
  • reduces the line utilization factor
  • reduces the traffic generation
Q15 | If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..
  • priority dropping
  • tail dropping
  • age based dropping
Q16 | Flow control policy is implemented in ………………….
  • network layer
  • transport layer
  • application layer
Q17 | For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..
  • random early detection
  • jitter
  • delay difference
Q18 | The first collision free protocol is ……………….
  • binary countdown
  • basic bitmap
  • reservation protocol
Q19 | Sending of a IP packet from host 1 to host 2 where both are of same LAN but the packet is transferred through different intermediate LANs is called ………………
  • tunnelling
  • routing
  • diverting
Q20 | FDDI is an acronym for ……………
  • fast data delivery interface
  • fiber distributed data interface
  • fiber distributed digital interface
Q21 | The address field of a frame in HDLC protocol contains the address of the ……………… station.
  • primary
  • secondary
  • tertiary
Q22 | In ………………. transmission, the channel capacity is shared by both communicating devices at all times.
  • simplex
  • half-duplex
  • full-duplex
Q23 | Source routing bridges in the same LANs must have …………… bridge Number.
  • same
  • different
  • source
Q24 | A repeater takes a weakened or corrupted signal and …………… it.
  • amplifies
  • regenerates
  • resample
Q25 | The PSTN is an example of …………….. network.
  • packet-switched
  • circuit-switched
  • message-switched