📘 Chapter 1 – Multiple Choice Questions (MCQs)
🟢 Easy (Câu dễ)
1. What does a computer network consist of?
A. Single CPU
B. Isolated devices
C. Interconnected devices
D. Cables only
2. What type of device connects networks together?
A. Switch
B. Hub
C. Router
D. Monitor
3. Which of the following is a client-server application?
A. BitTorrent
B. Skype
C. HTTP
D. None
4. What type of switching breaks data into packets?
A. Circuit switching
B. Packet switching
C. Channel switching
D. Static switching
5. What unit is used to measure bandwidth?
A. Mbps
B. Volts
C. Frames
D. DB
6. Which layer is responsible for data transport between processes?
A. Network
B. Transport
C. Link
D. Application
7. What does the physical layer transmit?
A. Web pages
B. Bits
C. Files
D. Packets
🟡 Medium (Câu trung bình)
8. Which protocol is connection-oriented?
A. UDP
B. HTTP
C. TCP
D. IP
9. What is propagation delay?
A. Time to process packet
B. Time to transmit packet
C. Time for signal to travel across the link
D. Time waiting in queue
10. What type of address can be faked in a spoofing attack?
A. MAC
B. DNS
C. IP
D. URL
11. What is the function of DNS?
A. Routing packets
B. Mapping IP to MAC
C. Translating domain names to IP addresses
D. Encrypting data
12. In packet switching, what happens if router buffers are full?
A. Packets are queued
B. Packets are lost
C. Packets are rerouted
D. Transmission stops
13. What does HTTP stand for?
A. Hypertext Transfer Protocol
B. Host Transfer Transport Protocol
C. High Text Transport Protocol
D. Hyper Transport Top Protocol
14. What is a protocol?
A. A server
B. A firewall
C. A set of rules for communication
D. A DNS lookup
🔴 Hard (Câu khó)
15. What causes queuing delay in routers?
A. High bandwidth
B. Signal reflection
C. Too many packets arriving too quickly
D. Low latency
16. In the 5-layer Internet model, where is TCP used?
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
17. What makes packet switching scalable?
A. Guaranteed bandwidth
B. Dedicated links
C. Sharing and bursty traffic
D. Complex scheduling
18. What is the main drawback of circuit switching?
A. Packet loss
B. Buffer overflow
C. Idle reserved resources
D. Variable transmission rate
19. Which device is used in both packet and circuit switching?
A. Hub
B. Repeater
C. Router
D. Switch
20. What protocol handles email sending?
A. HTTP
B. FTP
C. SMTP
D. IP
🧠 CHƯƠNG 2
🟢 Easy
1. What does the physical layer transmit?
A. Packets
B. Frames
C. Bits
D. Signals
2. Which signal has discrete levels?
A. Analog
B. Digital
C. Sine wave
D. Radio
3. What is the unit of frequency?
A. Watts
B. dB
C. Hertz
D. Volt
4. What is the speed of light in a vacuum?
A. 1.5×10⁸ m/s
B. 2×10⁸ m/s
C. 3×10⁸ m/s
D. 4×10⁸ m/s
5. Which line code is unipolar?
A. NRZ
B. AMI
C. Manchester
D. RZ
6. In a coaxial cable, what is the inner conductor made of?
A. Plastic
B. Glass
C. Copper
D. Iron
7. What does UTP stand for?
A. Universal Transport Protocol
B. Unshielded Twisted Pair
C. Unified Twisted Path
D. Untracked Pair
🟡 Medium
8. Which formula gives the wavelength of a signal?
A. λ = f / c
B. λ = c / f
C. λ = A / f
D. λ = c × f
9. What is the effective bandwidth?
A. The full spectrum range
B. The entire frequency range
C. The range with most signal energy
D. The difference of f_max and f_min
10. Which code helps detect single-bit errors?
A. Unipolar NRZ
B. Polar NRZ
C. Bipolar AMI
D. Manchester
11. Which type of signal contains infinite frequencies?
A. Square wave
B. Sine wave
C. Sawtooth wave
D. Constant signal
12. Which line code is most immune to baseline wandering?
A. NRZ
B. RZ
C. AMI
D. Unipolar
13. Which technology uses WDM?
A. DSL
B. Fiber optics
C. Coaxial
D. Wi-Fi
14. What does FDM divide the channel by?
A. Time slots
B. Voltage levels
C. Frequency bands
D. Amplitude
🔴 Hard
15. Which modulation method is most used in Wi-Fi?
A. AM
B. FM
C. OFDM
D. ASK
16. What does Shannon’s Theorem describe?
A. Ideal bandwidth
B. Maximum theoretical capacity
C. Line code speed
D. Analog noise
17. Why is clock recovery important in line coding?
A. Synchronize bits
B. Measure noise
C. Change amplitude
D. Compress data
18. What happens when M (signal levels) increases?
A. Bandwidth decreases
B. Channel becomes simpler
C. Capacity increases
D. Clock is lost
19. What is a main advantage of wireless transmission?
A. Cheap
B. Complex setup
C. Mobility
D. No interference
20. Which spectrum is regulated by the government?
A. ISM band
B. Unlicensed band
C. Licensed spectrum
D. Free-space spectrum
🧠 CHƯƠNG 3
🟢 Easy (1–7)
1. What does the data link layer do?
A. Routes packets
B. Provides IP addresses
C. Transfers frames between directly connected nodes
D. Encrypts data
2. What is the name of the layer 2 packet?
A. Datagram
B. Segment
C. Frame
D. Cell
3. What method adds ESC before flag-like bytes?
A. Bit stuffing
B. Byte count
C. Byte stuffing
D. Physical coding violation
4. What is a MAC address used for?
A. Encryption
B. Local link addressing
C. Routing
D. IP management
5. Which duplex mode allows both nodes to send at the same time?
A. Simplex
B. Half-duplex
C. Full-duplex
D. Half-simplex
6. What does CRC stand for?
A. Circular Random Code
B. Cyclic Redundancy Check
C. Checksum Repetition Code
D. Correct Random Calculation
7. What does the flag field in a frame do?
A. Encodes IP
B. Signals start/end of frame
C. Stores MAC address
D. Measures error rate
🟡 Medium (8–14)
8. In bit stuffing, what is inserted after five 1s?
A. 1
B. 0
C. ESC
D. Flag
9. Which method uses polynomial division for error detection?
A. Parity
B. Checksum
C. CRC
D. Byte count
10. In Stop-and-Wait protocol, what must the sender wait for?
A. Error
B. CRC
C. Acknowledgment
D. Timeout
11. Which protocol retransmits only corrupted frames?
A. Go-Back-N
B. Utopian
C. Stop-and-Wait
D. Selective Repeat
12. What does a sliding window protocol use?
A. Encryption
B. TCP ports
C. Buffers on sender/receiver
D. Physical flags
13. Which protocol uses bit stuffing and CRC in HDLC?
A. IP
B. HTTP
C. HDLC
D. FTP
14. What is the trailer in a frame used for?
A. MAC address
B. Error detection
C. Source routing
D. IP assignment
🔴 Hard (15–20)
15. What kind of error can 2D parity correct?
A. None
B. Single bit
C. Multiple burst
D. CRC errors
16. What is the main drawback of Go-Back-N?
A. Complex to implement
B. High delay on retransmission
C. Requires too many checksums
D. Only works with fiber
17. What happens if a flag byte appears in data in byte-stuffed frames?
A. It's ignored
B. Transmission stops
C. It is escaped with ESC
D. Replaced with parity
18. Which layer handles logical addressing?
A. Physical
B. Data Link
C. Network
D. Application
19. In HDLC, what does a supervisory frame do?
A. Send data
B. Report link status and control flow
C. Assign MAC address
D. Reset connection
20. What is the main purpose of framing?
A. Error correction
B. Routing
C. Delimit messages
D. Encryption
🧠 Chương 4
🟢 Easy (1–7)
1. What causes collisions in shared media?
A. Signal loss
B. Two nodes transmitting at the same time
C. MAC address conflict
D. Buffer overflow
2. Which MAC protocol uses fixed time slots?
A. CSMA
B. ALOHA
C. TDMA
D. FDMA
3. Which protocol listens before transmitting?
A. TDMA
B. ALOHA
C. CSMA
D. Token ring
4. Which one avoids collision instead of detecting it?
A. CSMA/CD
B. CSMA/CA
C. ALOHA
D. Polling
5. What does ARP do?
A. Assigns IP addresses
B. Maps IP to MAC
C. Detects collisions
D. Synchronizes clocks
6. In Ethernet, what access protocol is used?
A. Token passing
B. Polling
C. CSMA/CD
D. CSMA/CA
7. What is the preamble in Ethernet used for?
A. Error correction
B. Synchronization
C. MAC addressing
D. Routing
🟡 Medium (8–14)
8. What happens in Slotted ALOHA if two nodes transmit in the same slot?
A. Both succeed
B. Collision occurs
C. One gets priority
D. The slot is idle
9. What is the function of a switch?
A. Broadcast data
B. Forward frames based on MAC
C. Assign IP addresses
D. Repeat signals
10. How does CSMA/CD handle collisions?
A. Ignores them
B. Retransmits immediately
C. Detects and backs off
D. Discards all frames
11. What is the typical MAC address length?
A. 32 bits
B. 64 bits
C. 48 bits
D. 128 bits
12. In CSMA/CA, what is DIFS?
A. Delay between bits
B. Backoff time
C. Interframe spacing
D. Data integrity check
13. Which MAC protocol requires a token to transmit?
A. ALOHA
B. CSMA
C. Token Ring
D. Polling
14. Which protocol uses backoff before transmission?
A. Token passing
B. CSMA/CA
C. FDMA
D. HDLC
🔴 Hard (15–20)
15. What is RTS/CTS used for in 802.11?
A. Encrypt data
B. Power saving
C. Collision avoidance
D. Error correction
16. What is a main advantage of switches over hubs?
A. Faster routing
B. Eliminate collisions
C. Work wirelessly
D. Simplify configuration
17. How does a switch learn MAC addresses?
A. From ARP
B. Static configuration
C. By analyzing incoming frames
D. IP lookup
18. What happens if a MAC address is not in the switch table?
A. Frame is dropped
B. Frame is stored
C. Frame is flooded
D. Frame is rerouted
19. What technique does Gigabit Ethernet use to maintain sync?
A. CRC
B. Manchester
C. 8B/10B encoding
D. Pulse modulation
20. In wireless LANs, what replaces collision detection?
A. CSMA/CD
B. RTS only
C. CSMA/CA
D. FDM