data link control layer

data link control layer

University

7 Qs

quiz-placeholder

Similar activities

Types of Animation

Types of Animation

University

12 Qs

Model Desain Pembelajaran

Model Desain Pembelajaran

University

2 Qs

Object Oriented Modeling & Design

Object Oriented Modeling & Design

University - Professional Development

10 Qs

19IT502 - QUIZ 2

19IT502 - QUIZ 2

University

12 Qs

Embedded Formative Assessment

Embedded Formative Assessment

University

7 Qs

P2KP PEMERIKSAAN FISIK BARANG IMPOR

P2KP PEMERIKSAAN FISIK BARANG IMPOR

University - Professional Development

10 Qs

Echo MCQ for F2

Echo MCQ for F2

University

10 Qs

Modernization of NTUC Income

Modernization of NTUC Income

University

10 Qs

data link control layer

data link control layer

Assessment

Quiz

Education

University

Medium

Created by

Sheeba S

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are _______ types of HDLC frames.

1

2

3

4

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An HDLC _______ is used to transport user data and control information.

  • I-frame

  • S-frame

  • U-frame

  • A-frame

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In PPP, _______ is a three-way hand-shaking authentication protocol in which the password is kept secret; it is never sent online.

NCP

LCP

CHAP

PAP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In _________, the configuration is balanced. The link is point-to-point, and each station can function as a primary and a secondary.

ABM

NRM

ARM

NBM

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Byte stuffing means adding a special byte to the data section of the frame when there is a character with the same pattern as the ______.

trailer

flag

header

none of the choices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________framing uses two categories of protocols: character-oriented and bit-oriented.

Fixed-size

Variable-size

none of the choices

Standard

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In _________ protocols, we use ________.

bit-oriented; character stuffing

character-oriented; bit stuffing

character-oriented; byte stuffing

none of the choices