Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
29 views14 pages

Telcom MCQ

Mcq

Uploaded by

Praveen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views14 pages

Telcom MCQ

Mcq

Uploaded by

Praveen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

TELCOM MCQ

1. VOIP is possible because of :

High speed networks with Efficient compression algorithms

High Quality Voice on Handsets

Virtual Optical Internet

New Internet Protocol

2. 3G systems are based on

GSM

GPRS

CDMA

GSM and CDMA

3. VLANs provides

time-efficiency and security

reduce network traffic

both a and b

None

4. Which is not a desirable property of Optical Fiber

less signal attenuation


Fragile

Immunity to electromagnetic interference

Light weight

5. What is VPN

Virtual Private Node

Virtual Public Network

Virtual Private Network

Voice Public Network

6. 5G uses

TDMA

TDMA/FDMA

CDMA

OFDMA

7. SS7 is a

Signaling between Users on network

Signaling for Security of data

Signaling between Switching nodes

Secure System for Traffic Compression


8. In a mobile network, the details of the roaming subscribers is stored in -

HLR

VLR

RSR

VSR

9. The following is assigned by mobile handset equipment manufacturer for


its unique identification

TMSI

IMSI

IMEI

SIM

10. The sub system that manages call switching function in GSM

OSS

BSS

MSC

NMS

11. DSL stands for

Direct Subscriber Line

Digital Synchronous Line


Digital Symmetric Loop

Digital Subscriber Line

12. FCAPS means

Fault Configuration Accounting Performance Security

Fault Configuration Authentication Performance Security

Fault Configuration Accounting Performance Services

Fault Configuration Authorisation Performance Security

13. IMSI is assigned by the

Manufacturer

By the service provider

By the Visiting network’s VLR

All of the above

14. Which protocol is primarily used for traffic engineering in core networks?

RIP

MPLS

DHCP

DNS
15. What technology is essential for enabling call handoff (Process of
transferring a mobile telephone call from one cell to another without
dropping the call) in mobile networks?

OSPF

MPLS

Mobile Switching Centre

BGP

16. Which component is not typically considered a part of service network


architectures?

Routers

Switches

Smartphones

Firewalls

17. What is the primary goal of CDN load balancing?

To ensure all content is stored on a single server

To distribute traffic evenly across servers

To increase the load on content servers

To reduce the quality of service


18. A telecommunications company is looking to upgrade its residential
internet service in a suburban area. According to you, which access
network technology should they deploy to offer high-speed internet?

Traditional DSL

Satellite

Fiber-optic (e.g., GPON)

3G mobile network

19. A video surveillance company wants to implement real-time analytics


for facial recognition in their cameras deployed at various locations. What
network architecture do you think would best serve the purpose, should
they use to minimize latency?

Centralized data processing in a single, remote data center

Edge computing to process data closer to the camera locations

Sole reliance on cloud computing without local processing

Direct connection to PSTN for all data processing

20. A startup needs to quickly adjust its computing resources based on


demand. Which cloud model is best for them?

Only using their own servers

Renting space in a data center

Using public cloud services

Buying more computers


21. An e-commerce platform experiences slow load times during peak sales
events. Which practical approach can help maintain fast, reliable access to
their website globally?

Centralizing all servers in one location

Deploying a CDN to distribute website content closer to users

Upgrading network infrastructure

Limiting the number of users who can access the site

22. An ISP needs to optimize its network to handle diverse traffic types
efficiently. What technology can they implement to manage bandwidth
and prioritize different services?

Analog signal amplifiers

Quality of Service (QoS) mechanisms

Paper-based user registration

Single-band Wi-Fi routers

23. A business needs to connect its new office building to the PSTN. Which
component is essential for connecting the office phones to the network?

Wi-Fi routers

Local loop connections

Ethernet cables

USB cables
24. Authentication of a mobile subscriber with home MSC is performed
during

Registering

Making calls

Visiting a new network

All of the above


25. Which of the statement about Edge Computing is false?

Is a computer at the edge or at the terminal point of a network

Is a distributed architecture of computing resources

Edge Networking uses Machine learning

All of them

26. Which of the following does not include in BSS?

Network Fault management

Billing

Fraud Management

Revenue Assurance

27. BSS and OSS are referred respectively as

South Bound system and North Bound system

North Bound system and South Bound system

South Bound systems


North Bound systems

28. CRM is part of

BSS

OSS

Sales

Marketing

29. OSS handles customer activation on the network

True

False

30. NMS handles Security Management of the Network

True

False

31. Keeping t rack of warehouse materials is _____________ type of


management

Config management

Workforce management

Inventory management

EMS
32. Select a function which is not included in Operation Support System

Config management

Workforce management

Fault detection

Fraud Management

33. eTOM addresses

Market

Service

Supply

Market and Service both

Market, Service and Supply

34. DOCSIS is a standard for

Fiber optic transmission

Hybrid Fiber Coaxial networks

Data through Cable Service networks

None of the above

35. Who makes rules for internet?

ITU
TRAI

3GPP

IETF

36. TMN uses KPI to assess __________

Programming interfaces of the system

Performance of the system

Knowledge and Information of the system

None of the above

37. Which framework is designed to provide a comprehensive set of


standards for BSS and OSS integration?

eTOM

NGOSS

ITIL

TRAI

38. Which of the following is a key component of Service Activation in OSS?

Performance Management

Service Order Management

Invoicing

Payment Collection
39. What is typically the first step in the billing life cycle in a BSS?

Rating

Invoicing

Customer acquisition

Payment

40. An ISP notices that certain customers are experiencing intermittent


service outages. They need to identify and resolve the issue as quickly as
possible.

Which OSS function is primarily responsible for addressing these service


outages?

Customer Relationship Management

Fault Management

Billing Management

Service Fulfillment

41. NGOSS Provides ____________

Next Generation Hardware and Software for Telecom systems

Common language for software providers and integrators

Enterprise Management

Business Processes
42. One of the main Performance indicators of OSS/BSS is

T2R

Bit Rate

Customer Schemes

Power Consumption

43. The practice of Revenue Assurance within BSS is critical because it:

Ensures that all marketed services are technically feasible and can be delivered

Guarantees that every bit of data usage by customers is accurately captured and billed

Provides assurance that the company's revenue will increase year over year

Ensures the physical security of the company's data centers and network operations
centers

44. An OSS application responsible for collecting and analyzing


performance data to ensure that network performance meets predefined
standards is called:

Service Fulfillment

Performance Management

Fault Management

Configuration Management

45. In a BSS/OSS architecture, the process of Convergent Charging refers to:


In a BSS/OSS architecture, the process of Convergent Charging refers to:

The unified method of charging customers for different types of services on a single
platform

The integration of customer feedback into the product development cycle

The synchronization of network equipment power cycles to save energy

You might also like