Multiple Choice Questions of Computer Networking - Manualzz

You might also like

Download as pdf
Download as pdf
You are on page 1of 64
Multiple Choice Questions of Computer Networking 1-4 Computer Network ie A. Collection of hardware components and computers, B. Inlerconnected by communication channels CC. Sharing of resources and information D. Alloftne Above 1-2 What Isa Firewall in Computer Network? A. The physical boundary of Network B_ An operating System of Computor Network C. A system designed to prevent unauthorized access D. Awad browsing Software 1-3 How many layers does OSI Reference Model has? Ag BS ce D7 1-4 DHCP je the abbreviation of A. Dynamic Host Control Protocol 'B. Dynamic Host Configuration Protocol CC. Dynamic Hyper Control Protocol D. Dynamic Hyper Configuration Protocol B 16 bit ©. eit D. bait 1.6 DNS is the abbreviation of ‘A. Dynamic Name System B. Dynamic Network System CC. Domain Name System D. Domain Network Service 1-7 What is the meaning of Bandwidth in Network? ‘A. Transmission capacity of @ communication channels B. Connacted Computers in the Network CC. Class of IP used in Network D. None or Above 1-8 ADSL Ie the abbreviation of A. Asymmetric Duel Subscriber Line B. Asymmetric Digital System Line . Asymmetric Dual System Line D._ Asymmetric Digtal Subscriber Line 1-9 What Is the use of Bridge in Network? A to connect LANS B. toseparate LANs ©. toccontral Natwork Space D. Allofthe above 1-10 Router operates in which layer of OSI Reference Model?” A Layer 1 (Physical Layer) B. Layer 9 (Network Laver) . Layer 4 (Transport Layer) D. Layer 7 (Application Layer) Click Here for Answers 1-D/2-G/3-D/4-B/5-C/8-G/T-A/8-D/9-Al 10-8 Multiple Choice Questions of Computer Networking 2-1 Bach IP packet must contain [A Only Source adress Only Destination adress . Souree and Destination ose D. Sowce of Destination address 2-2 Bridge works in which ayer of the OSI model? ‘A Appliaton laver BB Transport layer Netware aver D. Datalink aver 2 provides a connection-orfented rel ate BaP © ube D. allofthe above 2-4 Which layers ofthe OSI model are host-o-host layers? |A.Transpor, Session, Pevsetaton. Application B Network, Transpor, Session, Pretetation . Datalink, Network, Transport, Session D. Pivsicl, Datalink Netwerk, Transport 2-5 Which of the follwing IP address clas s Multicast, A. Class. B ChssB C Chassc D.ChasD 2-6 Which of the following is correct regarding Class B Address of TP address A. Network bt~ 14, Host t~ 16 1B. Network tit 16, Hot bit 14 . Network it~ 18, Hos bit 16 Network bit= 12 Host bat— 14 2-7 The last address of IP address represents A Unicest address B Network address CC Brosdast acess 1D. None of above 2-8 How many bits are there n the Ethernet address? A. 64 bite Bas bits © 32 its Bote ate 2-9 How many layers are in the TCPAP model? A.disyer BS layers C6 lavers D.7lavers 2-10 Which of the following 'A.Prosetation layer B. Network layer Session ayer . Transport le service for sending messages (Click Here for Ancwere 1-€/2-D/3~A/4-A/5-D/6-A/7-C/8-B/9-A/10-D. Multiple Choice Questions of Computer Networking 3-1, Why IP Protocol is considered as unreliable? ‘A.A packet may be lost, B Packets may arrive out of onder Duplicate packets may be generated Allo th sbove 3-2. What Is the minimum header sizeof am IP packet? Ale bytes B lo bye €.2o bytes Boa bytes 3.3. Which of following provides reliable communication? Arc ap c UDP D.allofthe above 3-4, What is the address size of Pv? Alb Bs bit © 18 bt D.256 bit 3-5. What is the size of Network bits & Host bits of Class A of IP address? [A Nenwork its 7, Host bits 24 |B Network bits § Hom bts 24 Network: its 7, Host its 25 D. Neswork bts 8 Host bts 23 3-6, What does Router do ina network? [A Fonvarde a pocket tall outgoing inks |B Forwards a pocket tothe nen ree outgoing lnk Determines on which outing lnk @ pack sto be forwarded . Fonsazdea packet ta all ostgoug inks skeapt the cigusted lnk 3-7. The Internet isan example of [A Cell stched network BB cizeutsmichad network. Packet suitched network. D.allorabove 3-8, What does protocel defines? [A Protocol dtines whist data is communicated. Protocol defines how data communseated . Protocol defines when data i communicated D.Allof above 3-9. What Is the uses of ubnetting? [A Trainer ons neg natok into several smaller onas 1BIt divides nctwork into network clases Itspeads up the speed of network 1D. None of shows 5-10, Repeater operates fa which layer ofthe OST model? ‘A Physical layer B Data nk aver Network ayer (Transport ler (Click Here for Answers 1-D/2-C/3-A/4~C/5-A/6-C/7-C/8-D/9-A/10-A Multiple C===hoice Questions of Computer Networking “£1, What the benefit of the Networking? A File Sharing 1B Easier acess to Resources Easier acinipe D.Allofths Abore 4.2, Which of the following is not the Networking Devices? A. Guieways B Linx Rowers D. Firewalls 4-3. Whats the size of MAC Address? Aleit. Bsz-bits Case Dietbits 445, Which of te following can be Software? A Rosters B Firewall € Gateway 1D. Modems 45. Whats the use of Ping command? |A To testa device onthe network i ceachable B Totes hand disk faut C.Toterta bug ima Application D.Totesta Pinter Quaity 4.6, MAC Address isthe example of [A Tranepore Layer B Data Link Laver © Application Layee Physical Layer 47. Routing tables ofa router keeps track of ‘A. MAC Address Assignments 'B Port Assignments to natwrk devices . Distnbute IP adaroes to network devices . Routes to use for forwanding dat ois destination 48, Layer 2 Switch i also called A. Mllipet Hub B Multipart Site © Mattison Bidse . Multipoet NIC 48, Difference between TS68A and TS6SB Is A. Difference in wite color 1B Disference in numberof wires ust different lensth of wires D. Just different manufacturer standards 410, The meaning of Straight through Cable i ‘A Four wire pairs comect to the same pin on each end BB Tha cable Which Directly consacte Computes to Computer Four wire pairs nt twisted with each other D. The cable which is not rise (Click Here for Answers 1-D/2-B/3-C/4-B/5-A/6-B/7-D/8-C/9-D/10-A Multiple Choice Questions of Computer Networking ‘1 Which of the follwing snot the External Security Threats? ‘A. Front-docr Thxeats B Back-door Threats Underground Threats 1D. Dental of Service (Des) 5.2 What i the Demiltarized Zone? [A. The ate betvasn fiswall& coaetion to an extemal natok 1B The area betwecn ISP to Military area (CT area surrounded by secured servers The ate surrounded by the Miltary 5.3 What is the fll form of RAID 7 |A Redundant Array of fndependert Disks B. Redundant Array of important Disks Random Access of Indspendont Disks ‘D, Random Access of important Disks 5-4 What is the maximum header size ofan IP packet? Aa bytee B64 bytes 30 bytes Deo bres 5-5 What i the sizeof Host bits in Class B of IP address? aos Boe cis D2 5-6 What is the usable sie of Network bits in Ao Bos. cu bile 5-7 In which ype of RAID, data is mirrored between te disks ARAIDO BRADI c RAID? D.RAID3 5-8 What do you mean by broadcasting in Networking? ‘A Iimeane addceeung a packet o all machine B Temeans addressing a packet to some machine CC Temeans addressing a packet to a perticular machine ‘D, Limeane addrering «packs o except a perour machine 5.9 Which of the folowing ivare Protocols of Application? AIP BDNS C Tein DAllof above 5-10 Which of te Ftlowing protocol is/are defined in Transport layer? AIP BTcp UDP D.B&C lass Bof TP address? (Click Here for Answers 1-C/2-A/3-A/4~D/5-C/6-C/7-B/$-A/9-D/10-D Multiple Choice Questions of Computer Networking 6-1. What's the IP Addrese range of APIPA? [A 169.25400.1 to 1692540. B.169.258001 to 169.254.0255 C168 254001 to 169.254.255.258 1D, 1692540. 9 169.254.255.255 6-2. Which of the following is corvect in VLSM? [A Can have subaste of dere sizes 1B Subucts mut be in same size No required of subnet D Alles sbove 6-3. What does the port number ina TCP connection specify? [A Ttspecifies the communication process onthe two end systems ‘Bt specifies the quality ofthe data & connection Ieepaciy the siz of data D.Allof the above 6-4, The class-based addressing is also known as A Modern Model 1B Classfl Model Chases Model Heterogeneous Model 65. Which of the following is correct in CIDR? ‘A. Clase includes Clare 2 network B. There ate only to netorks (Thats ate high low clare nets 'D. There is no concept of clase A,B, Cnctwerks 6-6. What Is the size of Source and Destination IP address in IP header? Acie B shits CIs bite Daas 6-7. Which of the folowing s reliable communteation? A.TeP BP Cupp D.allorthem 6-8. What Is the typical range of Ephemeral ports? Altos Bt 1024 © soto S080 1D. 1024 wess3s 15-5, What isthe purpose ofthe PSH Nagin the TCP header? ‘A. Typically used to indicate end of message B Typical 2 CC. Typically ood to push the meeesgs D. Typically sed to indicate stp the message 6-10. What isthe natural mask fora class C Network? A.255255255.1 B 255.255.2550 © 255.955.955.254 1B, 255255.255255 (Click Here for Answers 1-C/2-A/3-A/4—B/5-D/6-D/7-A/8-D/9-A/10-B 1. When collection of various computers seems a single coherent system to its client, then it is called a) computer network b) distributed system °) both (a) and (b) d) none of the mentioned View Answer Answer Explanation None, 2. Two devices are a) a process in one device is able to exchange information with a process in another b) a process c) PIDs of the processes d) none View Answer Answer Explanation None, running on running of different of in network if device both devices devices are same the mentioned 3. Which one of the following computer network is built on the top of another network? a) prior b) chief CS) prime d) overlay View Answer answera Explanaton:None 4. In computer a) the computer that b) the computer that °) the computer that d) all of View Answer network network network network network nodes are originates the data routes the data terminates the data the mentioned 5. Communication channel is shared by all the machines on the network in a) b) °c) d) none View Answer Answer Explanation None, 6. Bluetooth a) personal b) local ©) virtual broadcast unicast multicast of network network network the mentioned an example of area network area network private network d) none of the mentioned View Answer answer Explanation None. 7A is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) all of the mentioned View Answer Answer Explanation None, 8. A list of protocols used by a system, one protocol per layer, is called a) protocol architecture b) protocol stack °) protocol suit d) none of the mentioned View Answer answer Explanation None. 9. Network congestion occurs a) in case of traffic overloading b) when a system terminates c) when connection between two _—s nodes __ terminates d) none of the mentioned View Answer answora Explanaton:Nono 10. Which one of the following extends a private network across public networks? a) local area network b) virtual private network °) enterprise private network d) storage area network View Answer ‘Arower Explanation’None, This set of Computer Networks Questins & Answers focuses on ‘Physical Media" 1) Which of this is not a guided media ? a) Fiber optical cable b) Coaxial cable c) Wireless LAN d) Copper wire View Answer Answer: 6 Explanation: Wireless LAN is unguided media. 2) UTP is commonly used in a) DSL. b) FTTP. c) HTTP d) None of the mentioned View Answer Answer: a Explanation: Unshielded twisted pair(UTP) is commonly used in home access. 3) Coaxial cable consists of concentric copper conductors. a)4 b)2 c)3 d)4 View Answer Answer: b Explanation: None. 4) Fiber optics posses following properties a) Immune electromagnetic interference b) Very less signal attenuation c) Very hard to tap ) All of the mentioned View Answer Anwor 4 Explanation: None. 5) If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps), a) n*39.8 b) n’51.8 c) 2n"51.8 d) None of the mentioned View Answer Answer: b Explanation: None. 6) Terrestrial radio channels are broadly classifed into____ groups. a)2 b)3 °)4 d)1 View Answer Answer: Explanation: The three types are those that operate over very short distance, those that operate in local areas, those that operate in the wide area 7) Radio channels are attractive medium because a) Can penetrate walls b) Connectivity can be given to mobile user c) Can carry signals for long distance d) Alll of the mentioned View Answer answer: d Explanation: None. 8) Geostationary satellites a) Are placed at a fixed point above the earth b) Rotate the earth about a fixed axis c) Rotate the earth about a varying axis d) All of the mentioned View Answer Answer: a Explanation: They aro placed in ofbit at 36,000km above Earth's surface 1. A piece of icon or image on a web page associated with another webpage is called a) url b) hyperlink °) plugin d) none of the mentioned View Answer Answer: ExplanationNone, 2. Dynamic web page a) is same every time whenever it displays b) generates on demand by a program or a request from browser c) both (a) and (b) d) none of the mentioned View Answer Answer’ Explanation None, 3. What is a web browser? a) a program that += can_—s display = a_—Ssweb_—soppage b) a program = used = to.~— view ~—shtml~— documents c) it enables user to access the resources of _ internet d) all of the mentioned View Answer answer Explanation None, 4. Common gateway interface is used to a) generate executable files from web content by web server b) generate web pages °) stream videos d) none of the mentioned View Answer answora Explanation None 5. URL stands for a) unique reference label b) uniform reference label c) uniform, resource locator d) unique resource locator View Answer Answer Explanation None, 6. A web cookie is a small piece of data a) sent from a website and stored in user's web browser while a user is browsing a website b) sent from user and stored in the server while a user is browsing a website °) sent from Toot server to all servers d) none of the mentioned View Answer Answora Explanation None, 7. Which one of the following is not used to generate dynamic web pages? a) PHP. b) ASP.NET c) JSP. d) none of the mentioned View Answer 8. An alternative of javascript. on windows platform — is a) VBScript b) ASP.NET °) JSP d) none of the mentioned View Answer answer Explanation None. 9. What is document object model (DOM)? a) convention for representing and interacting with objects in html documents b) application programming interface °) hierarchy of objects in ASP.NET d) none of the mentioned View Answer answora Explanation None 10. AJAX stands for a) asynchronous Javascript and xml b) advanced JSP and xml °) asynchronous JSP and xml d) advanced javascript and xml View Answer Answer Explanation None, 1. Multiple object can be sent over a TCP connection between client and server in a) b) °) both d) none View Answer Answora Explanation None, 2. HTTP a) b) c) d) none View Answer Answera Explanation’None, 3. In the network a) uniform b) unique c) unique d) none View Answer Answer Explanation None, 4. HTTP client requests by establishing 2 port on a) user b) transmission c) broader d) none View Answer Answer’ Explanation None, 5. In persistent nonpersistent (a) of the is application transport network of the HTTP resources resource resource resource of the the datagram control gateway of the HTTP HTTP HTTP (b) mentioned and protocol. layer layer layer mentioned are located ~— by identifier locator identifier mentioned connection to a particular server. protocol protocol protocol mentioned pipelining a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses b) multiple HTTP requests can not be sent on a single TCP connection c) multiple HTTP requests are sent in a queue on a single TCP connection d) none of the mentioned View Answer Answer Explanation None, 6. FTP server listens for connection on port. ~— number a) 20 b) 2 °) 22 d) 23 View Answer Answor' xplanaton:None 7. In FTP protocol, client contacts server using ___as the transport protocol. a) transmission control protocol b) user datagram protocol °) datagram congestion control protocol d) stream control transmission protocol View Answer anawora Explanation:None, 8. In which mode FTP, the client initiates both the control and data connections. a) active mode b) passive mode c) both (a) and (b) d) none of the mentioned View Answer Answer Explanation None. 9. The file transfer protocol is built on a) data centric architecture b) service oriented architecture °) client server architecture d) none of the mentioned View Answer Answer ExplanationNone, 10. In file transfer protocol, data transfer can be done in a) stream mode b) block mode c) compressed mode d) all of the mentioned View Answer answerd Explanation None 1. Ethernet frame consists of a) MAC address b) IP address °) both (a) and (b) d) none of the mentioned View Answer Answer Explanation None 2. What is stat frame delimeter (SFD) in ethernet frame? a) 10101010 b) 10101011 c) 00000000 d) 11111111 View Answer answer Explanation None. 3. MAC address is of 1) 24 bits b) 36 bits c) 42 bits d) 48 bits View Answer answord Explanation None 4. What is autonegotiation? a) a procedure by which two connected devices choose common transmission parameters b) a security algorithm °) a routing algorithm d) none of the mentioned View Answer answora Explanation None 5. Ethernet in metropolitan area network (MAN) can be used as a) pure ethernet b) ethernet over SDH °) ethernet over MPLS d) all of the mentioned View Answer ‘Answer Explenstion:None. 6. A point-to-point protocol over ethemet is a network protocol for a) encapsulating PPP frames inside ethernet_—_—frames b) encapsulating ehtermet_ += framse ~—inside.~=9 «PPP ~—_—iframes °) for security of ethernet frames d) for security of PPP. frames View Answer answera Explanation None. 7. High speed ethernet works on a) coaxial cable b) twisted pair cable °) optical fiber d) none of the mentioned View Answer Answore Explanation None 8. The maximum size of payload field in ethernet frame is a) 1000 bytes b) 1200 bytes °) 1300 bytes d) 1500 bytes View Answer Answer Explanation:None, 9g. What is interframe gap? a) idle time between frames b) idle time between frame bits c) idle time between packets d) none of the mentioned View Answer Answer Explanation None, 10. An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called a) short frame b) run frame °) mini frame d) man frame View Answer Anawerb Explanation’None, ‘Tis set of Computer Networks Questions & Answers focuses on “Topology 1) Physical or logical arrangement of network is a) Topology b) Routing c) Networking d) None of the mentioned View Answer Answer: a Explanation: Nono. 2) In this topology there is a central controller or hub a) Star b) Mesh cc) Ring d) Bus View Answer Answor: a Explanation: None. 3) This topology requires multipoint connection a) Star b) Mesh c) Ring d) Bus View Answer Answer: d Explanation: None. 4) Data communication system spanning states, countries, or the whole world is a) LAN b) WAN c) MAN d) None of the mentioned View Answer Answer Explanation Wide area network(WAN) covers the whole ofthe word network. 5) Data communication system within a building or campus is a) LAN b) WAN c) MAN d) None of the mentioned View Answer Answer: a Explanation: Nono. 6) Expand WAN a) World area network b) Wide area network c) Web area network d) None of the mentioned View Answer Answer: Explanation: None. Computer Networks Questions & Answers — Packet Switching & Circuit Switching This set of Computer Networks Questions & Answers focuses on “Packet Switching and Circuit Switching 1) A local telephone network is an example of a network a) Packet switched »b) Circuit switched ©) both of the mentioned 4) none of the mentioned View Answer Answer: a Explanation: None. 2) Most packet switches use this principle 2) Stop and wait b) Store and forward ©) Both of the mentioned d) None of the mentioned View Answer ‘Answer: b Explanation: The packet switch will not transmit the first bit to outbound lnk unlit recieves the entire packet 3) If there are N routers from source to destination, total end to end delay in sending packet P(L->number of, bits in the packet R-> transmission rate) a)N by (NLR ©) 2N'LYR d)UR View Answer Answer: Explanation: None. 4) Method(s) to move data through a network of links and switches: a) Packet switching »b) Circuit switching ©) Line switching 4) Both a and b View Answer Answer d Explanation: None. 5) The resources needed for communication between end systems are reserved for the duration of session between end systems in 2) Packet switching b) Circuit switching ) Line switching d) Frequency switch View Answer ‘Answer: Explanation: None. 6) As the resoucas are reserved between two communicating end systems in circuit switching, this is achieved a) authentication b) guaranteed constant rate ©) reliability d) store and forward View Answer Answer: Explanation: None. 7)In resources are allocated on demand. 2) packet switching » circuit switching «ine switching 4) frequency switching Viow Answor Answer: a Exolanation: In packet switching there is no reservation. Computer Networks Questions & Answers — |Pv4 ‘This set of Computer Networks Questions & Answers focuses on “IPVa" 1. Which of the following is not applicable for IP? a) Error reporting ) Handle addressing conventions ©) Datagram format d) Packet handling conventions View Answer Answer: a Explanation: Error reporting is handled by ICMP. 2, Which of the following field in IPv4 datagram is not related to fragmentation? a) Flags ») Offset o) TOS 4) Identifier View Answer Answer: & Explanation: TOS-type of service identifies the type of packets 3, The TTL field has value 10. How many routers (max) can process this datagram? ay 11 bys o)10 a1 View Answer Answer: © Explanation: TTL feld is decremented by one each ime the datagram is processed by a router. 4, If the value in protocol field is 17, the transport layer protocol used is a) TCP by UDP ©) Either of the mentioned ) Nono of the mentioned View Answer Answer: b Explanation For TOP itis 8 5, The data field can carry which of the following? a) TCP segemnt b) UDP segment ©) ICMP messages dd) None of the mentioned View Answer Answer 6 Explanation Data fold usualy has tranaport layer segment, butt can also carry ICMP messages, 6. What should be the flag value to indicate the last fragment? a) by ©) TTivalue ) None of the mentioned View Answer ‘Answer a Explanation’ flag-0 indicates that it isthe last fragment 7. Which of these is not applicable for IP protocol? a) is connectionless. b) offer reliable service ©) offer unreliable service dd) None of the mentioned View Answer Answer Explanation |p offers unrliable service 8, Fragmentation has following demerits a) complicates routers b) open to DOS attack 6) overlapping of fragments. 4) All of the mentioned ‘View Answer answer: d [Exolanation: Fragmentation makes the implementation complex and also can create DOS atteck. 9, Which field helps to check rearrangement ofthe fragments? a) offset b) flag o) TTL 4) identifer View Answer Answer: a Explanation’ offset field species where the fragment is in the original datagram. Computer Networks Questions & Answers — IPv6 ‘Ths set of Computer Networks Questions & Answers focuses on “IPVS" 1. The size of IP address in IPV6 is a) bytes ) 120bits «) bytes 4) 100bits View Answer Answer: Explanation: An IPV6 address & 128 bits long. 2. The header length of an IPV6 datagram is_. a) 10bytes b) 25bytes. ©) 30bytes 0) 40bytes: View Answer Answer: d Explanation: IPv6 datagram has fixed header length of 40bytes, which results is faster processing of the datagram. 3, In the IPV6 header the traffic class field is similar to which field inthe IPv4 header? a) Fragmentation field b) Fast-switching ©) ToS field 4) Option fled View Answer Answer: © Explanation: This feld enables te have diferent typos of IP datagram 4.IPv8 doesnotuse___type of address a) Broadcast b) Multicast ©) Anycast ) None of the mentioned View Answer Answer a Explanation: Broadcast has bean eliminated in IV, 6, These aro the features prasent in IPv4 but notin IPv6. a) Fragmentation ) Header chacksum ©) Options 4) All of the mentioned View Answer Answer: d Explanation Althe features are only present in IPv4 ancl not IPV6, 6. The __field determines the lifetime of IPvé datagram a) Hop limit by TTL ) Next header 1d) None of the mentioned View Answer Answer: a Explanation: The Hop limit value is decremented by one by a router when the datagram fs forwaded by the router. When the value becomes zero the datagram is discarded 7. Duak-stack approach refers to a) Implementing Ipv4 with 2 stacks ') Implementing Ipv6 with 2 stacks ©) Node has both IPv and IPv6 support d) None of the mentioned View Answer Answer: © Explanation: dual stack is ono ofthe approach used to support IPvS in alroady oxisting systoms. 8, Suppose two IPv8 nodes want to interoperate using IPv6 datagrams but are connected to each other by intervening IPv4 routers. The best solution here is a) use dual-stack approach b) Tunneling ©) No solution 4) Replace the system View Answer Answer: b Explanation: The IPvd routers can form a tuunel 9, Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits a) 98 t0 127 b) 01083 ©) 80 t0 95. d) 64 t0 79 View Answer Answer: a Explanation. Bits 96 to 127 inthe datagram represents obfuscated 1Pv4 address. Computer Networks Questions & Answers — Internet This section of our 1000+ Computer Networks MCs focuses on Intemet 1 What a) a b) a vast collection ° interconnection 9) none View Answer Answer Explanation None, 2. To join the — internet, the a) intemet b) ° internet 9) none View Answer Answere Explanation’None, is internet? single network of different networks local ara networks the ‘mentioned has to be connected to a architecture board sociaty service provider the mentioned 8, Internet access by transmitting digital data over the wires of a local telephone network is provided by a) b) digital °) digital d) none View Answer Answer: ExplanationNone, 4, ISP exchanges—_intomot a) internet b) subscriber line subscriber line signal line the mentioned between thelr_—=—networks. «by ‘exchange point end point ° ISP. end point 4) ‘none of the ‘mentioned View Answer Answor'a Explanation None, 5. Which oneof-— the following protocol is_snot_-— used in_intormet?. a) HTTP b) DHCP °) DNS 4) ‘none of the ‘mentioned View Answer Answord Explanation None, 6 IPve addrassad have a size of a) 32 bits b) 64 bits ° 128 bits 4) 265 bits ‘View Answer Answer Explanation None, 7. Internet works: on a) packet switching ») circuit switching ° both @ and ) 4) none of the mentioned View Answer Answora Explanation None, 8 Which one of the following is not an application layer protocol used in internet? a) remote procedure call b) internet relay chat ° resource reservation protocol d) ‘none of the mentioned View Answer Answere Explanation:None, Which protocol assigns IP address to the client connected a) b) ° 4) ‘none of the View Answer Answor'a Explanation None, 10. Which one ofthe following isnot used in madia a) b) digital subscriber ° fiber distributed data d) none of the View Answer Answer Explanation None, Computer Networks Questions & Answers — DHCP This section of our 1000+ Computer Networks MCQs focuses on DHCP Protocol 1. DHCP (dynamic host configuration protocol) provides a) Ip b) Mac. ° 9) none of the View Answer answer Explanation None, 2 DHCP is used a) b) ° both (a) and in the intomot? DHCP iP RPC ‘mentioned access contro? ethernet fine interface mentioned tothe liont. address address ut mentioned for Ive (b) 4) none of the mentioned View Answer Answer Explanation None, 3, The DHCP server a) maintains a database of available IP addresses b) maintains. = the_~— information = about ~—cient’=—configuration parameters cc) grants a IP-address. when receives © a_—request «from = a_— client 9) all of the mentioned View Answer Answerd Explanation None, 4 IP assigned for a client by DHCP server is a) for a limited period b) for Unlimited period °) rot time dependent d) ‘none of the mentioned View Answer Answer:a ExplanatonNone, 5. DHCP uses UDP pot, «_sfor~—seonding = data._—«s tothe. —sorver. a) 66 b) or ° oe 4) 69 View Answer ‘Answer Explanation None, 6 The DHCP sorer can provide the. of the IP addrosses. a) dynamic allocation b) automatic allocation °) static allocation 4) all of the ‘mentioned View Answer Answerd ExplanationNone, 7 DHCP lint and-—servers. © onthe ~— same_—subnat a) upp b) une ° ToP 4) Top View Answer Answor'a Explanation None, 8. After obtaining tho IP address, to prevent the IP conflict the a) internet relay b) broader gateway °) address resolution a) none of the View Answer nawere Explanation None 9. What is DHCP @) techniques applied to ensure the security of | an _axisting by encryption of the DHCP server °) algorithm for a none of the View Answer answer Explanation None, 10. If DHCP snooping is configured on a LAN switch, then clients having specific network. a) Mac. b) Ip °) both (a) and 4) ‘none of the View Answer Answore Explanation None, DHCP communicate via broadcast unicast broadcast unicast client may use chat protocol protocol mentioned snooping? infrastructure requests DHCP mentioned can access the address address ) ‘mentioned Computer Networks Questions & Answers — Access Networks This set of Computor Networks Questions & Answors focuses on “Access Networks" 41) Which of this is not a constituent of residential telephone line? a) A high-spead downstream channel b) A medium-speed downstream channel ©) A low-speed downstream channel dd) None of the mentioned View Answer Answer 6 Explanation: The thid par is ordinary two way telephone channel 2) In DSL talco provides these sarvicas a) Wired phone access by ISP ©) Allof the mentioned d) Nona of the mentioned View Answer Answer 6 Explanation: The seme company which provides phone connection is also its ISP in DSL 3) The function of DSLAM is 2) Convert analog signals into digital signals ) Convert digital signals into analog signals ©) Ampliy digital signals 4) None of the mentioned View Answer Answer: a Explanation: The DSLAM located in telco's Central Office does this function 4) The following term is not associted with DSL. a) DSLAM b)co ©) Splitter ¢) CMTS View Answer Answer d Explanation: Cable modem terminetion system is used in cable internet access 5) HFC contains a) Fibre cable ) Coaxial cable ©) Both of the mentioned 4) None of the mentioned View Answer Answer: & Explanation: None. 6) Choose the statement which is not applicable for cable internet access a) Itis a shared broadcast medium b) Itincludes HFCs ©) Cable modam connects home PC to Ethernet port 4) Analog signal is converted to digital signal in DSLAM View Answer Answer: d Explanation: In cable access analog signal is converted to digital sional by CMTS. 7) Among the optical-distribution architectures that is essentially switched ehtemet is a) AON b) PON ©) NON ) Nono of the mentioned View Answer Answer:a Explanation: Active optical notwarks are essentially switched ehtomets 8) StarBand provides a) FTTH internet access: b) Cable access ©) Telephone access. d) Satellite access View Answer Answer d Explanation: None. 9) Home Access is provided by a) DSL b) FTP ©) Cable 4) All of the mentioned View Answer ‘Answer d Explanation: None. 10) ONT is connacted to splitter using a) High spees fibre cable b) HEC ©) Optical cable dd) None of the mentioned View Answer Answer 6 Explanation: None. 11) Thase factors affect transmission rate in DSL. fa) The gauge of the twisted-pair line bb) Degree of electrical interfemace ©) Shadow fading d) Both a and b ‘View Answer answer: d Explanation: Because DSL is made of twisted wire copper pai. Computer Networks Questions & Answers — Physical Layer ‘This section of our 1000+ Computer Networks MICOS focuses on physical layer. 1 The physical a) P) process. ° application d) ‘none View Answer answera Explanation None, 2. Which transmission media a) has layer ‘concerns bit-by-bit to process, to ‘pplication of the the highest transmission speed coaxial with dolivery delivery delivery mentioned in a network? cable b) twisted pair cable ° optical fiber 9) alectrical cable View Answer Answer Explanation None, 3. Bits can be send over guided and unguided media as analog signal by a) digital modulation b) amplitude modulation °) frequency modulation 9) phase ‘modulation View Answer Answera Explanation’None, 4, The portion of physical layer that interfaces with the media access control sublayer is called a) physical signalling sublayer b) physical data sublayer ° physical address sublayer 4) ‘none of the ‘mentioned View Answer Answer:a ExplanatonNone, 5. physical layer provides a) mechanical — specifications -—=«sof-—=Sslectrical ©=—=«connectors. «= and_=—_cables b) electrical specification of_=—— transmission fine signal level °) specication for IR over optical fiber a all of the mentioned View Answer ‘Anaword Explanation None, 8 In asynchronous serial-~—« communication the -— physical ~—«slayer_—_—provides a) start and stop signalling b) flow contrat ° both () and (b) 4) none View Answer Answer Explanation None, 7 The a) b) ° 9) all View Answer Answerd Explanation None, 8. The physical layer translates logical communication requests from the operations. a) b) ° 4) ‘View Answer answera Explanation None, 9, A a) b) ° single 9) none View Answer Answer Explanation None, 10, Wireless a) b) ° d) all View Answer Physical layer line channel of data network trasnport ‘application channel is-_——shared analog igital of transmission can radio of the mentioned is responsible for coding coding modulation the mentioned into hardware specific link layer layer layer layer by multiple signals. bby ‘modulation modulation | multiplexing the ‘mentioned be done via microwaves: infrared the mentioned Answerd ExplanationNone, Computer Networks Questions & Answers — Network Layer This section of our 1000+ Computer Networks MCOs focuses on network layer. 1 The network layer concerns with a) bits by frames °) packets a none of tho mentioned View Answer ‘Answers Explanaton:None. 2. Which one of-— the following isnot’ a function of network ‘layer? a) routing b) intornetworking °) congestion control a none of the ‘mentioned View Answer ‘Anaword Explanation None 3 The 4 byte Pp addross consists of a) network address b) host address °) both @ and ) a) none of the mentioned View Answer nawere Explanation None 4 In virtual circuit network each packet contains a) ful source and ostination address by a short ve number °) bot @ and © a none of the mentioned View Answer Answer: ExplanationNone, 5. Which one of the following routing algorithm can a) shortest b) tance ° link 4) all of View Answer Answord Explanation None, 8 Multidestination a) is same as b) contains the list ° data is not d) none of View Answer Answer Explanation None, be used for network layer design? path algorthm vector routing state routing the mentioned routing broadcast routing of all destinations sent by packets the mentioned 7. A subset of a network that includes all the routers but contains no loops is called a) spanning b) spider ° spider 4) none of View Answer Answer Explanation None, 8 Which one of /— the following algorithm is a) traffic b) admission ° load 9) none of View Answer Answerd Explanation None, the not used the for treo structure tte0 mentioned congestion contro? routing contro! shedding mentioned 9, a) b) ° 4) View Answer network layer protocol intemet hypertext none Answer Explanation None, 10, loMP primar a) and b) ° 4) View Answer ‘none of Answera Explanation’None, of transfer the ly diagnostic the Computer Networks Questions & Answers — Transport Layer This section of our 1000+ Computer Networks MCQs focuses transport layer. intemet is ethernet protocol protocol ‘mentioned used for functions addressing forwarding mentioned 1. Transport layer aggregates data from different applications into a single stream before passing it 10 a) notwork b) data ° ‘pplication a) physical Viow Answer Answer Explanation None. 2 Which one of the following is. a transport a) by ° both @ a) none of View Answer Answer Explanation None, link layer protocol and the layer layer layer layer used internet? Top pe (b) ‘mentioned in 3, User atagram protocol is called connectionless: because a) all UDP packets are._—strealed ~— independently by —transport—yer b) it sends data as a stream of related packets ° both (@) and ) 9) none of the ‘mentioned View Answer Answer Explanation None, 4 Transmission control protocol is a) ‘connection orionted protocol b) uses a—three = way handshake = to.—establish a _——_connection. °) recievs data from application as a single stream d) all of the mentioned View Answer Answerd Explanation’None, 5. An endpoint of an inter-process communication flow across a computer network is called a) socket >) pipe °) port d) ‘none of the mentioned View Answer answer Explanation None, 8 Socket-styla API for windows is called a) ‘wsock b) winsock ° wins 4) ‘none of the ‘mentioned View Answer Answer’ Explanation None, 7. Which one of the following is a version of UDP with congestion contro? a) datagram ‘congestion, control protocol b) stream control transmission protocol ° structured 4) ‘none View Answer Answor'a Explanation None, B A is a Top a) b) °) 4) ‘none View Answer Answor'a Explanation None, 8. Transport a) application b) process ° node 4) none ‘View Answer Answer Explanation None, 10. Which one. ofthe. a) stream b) internet ° neighbor 9) dynamic View Answer Answer Explanation None, layer to for following control control host Computer Networks Questions & Answers — Application Layer This section of our 1000+ Computer Networks MICOS focuses on application layer. 1. The a) domain translates ») routing internet domain stream transport the ‘mentioned a transport service access _ paint. port pipe node the ‘mentioned protocals deals with application communication procass communication node communication the mentioned is a transport — layer protocol? transmission protocol message protocol discovery protocol configuration protocol and host names to IP__ address. name system information protocol ° 4) View Answer Answor'a Explanation None, network internet relay time protocol chat 2. Which one of the following allows a user at one site to astablish a connection to another site and then pass keystrokes from a) b) ° 9) none View Answer Answere Exglanation’None, 3, Application a) types b) message ©) rules for when and 4) View Answer Answerd ExplanationNone, 4, Which one a) b) ° 4) View Answer Answor'a Explanation None, 6. The a) b) ° local host to of layer of messages format, syntax how processes send and of the of the following protacol_dalivers/stores, simple mail transfor post office intemet mail hypertext transfer Ascil ‘encoding of binary base 64 base 22 base 16 host? HTTP FIP telnet mentioned defines ‘exchanged semantics messages mentioned server? protocol protocol protocol protocol called encoding ‘encoding encoding 4) base 8 ‘encoding View Answer Answer Explanation None, 6. Which one of the following is an internet standard protocol for managing devices on IP network? a) dynamic host configuration protocal b) simple newtwork ‘management protocol ° internet message access protocol 9) media gateway protocol View Answer Answer Explanation None, 7. Which one of_— the ~—following isnot. an application layer protocol? a) media gateway protocol b) dynamic host configuration protocol °) resource reservation protocol d) session initiation protocol View Answer Answere Explanation:None, 8. Which protocol is a signalling communication protocol used for controlling multimedia communication sessions? a) session Initiation protocol b) session ‘modeling protocol ° session maintenance protocal 9) none of the ‘mentioned View Answer Answer Explanation None, 9, Which one of the following is not comect? a) application layer protocols are used by both source and destination davicas during a communication session b) application layer protocols implemented on the source and destination host must match °) both (a) and () d) ‘none of the mentioned View Answer Answere Explanation:None, 10. When displaying ~~ web-page, the -— application —_layer a) HTTP by FTP °) SMTP. a none of the View Answer ‘Anawora Explanation None, Computer Networks Questions & Answers — Application Layer ‘This set of Computer Notworks Questions & Answors focuses on “Applicaton Layer. 41) This is not a application layer protocol a) HTTP b) SMTP. ©) FTP 4) TCP View Answer Answer d Explanation: TCP is transpot layer protocol 2) The packet of information at the application layer is called a) Packet b) Massage ©) Segment d) Frame View Answer Answer: Explanation: None. 3) This is one of the architecture paradigm a) Peor to poor b) Client-server ©) HTTP d) Both a and b View Answer uses the protocol protocol protocol ‘mentioned ‘Answer: d Exelanaton: HTTP is protocol 4) Aeplicaton developer has permission to decide the fllowing on ranspor layer side a) Transport layer protocol b) Maximum buffer size. ¢) Both of the mentioned d) None of the mer ed View Answer Answer 6 Explanation: None. 5) Application layer offers service a) End to end 1) Process o process ) Both of the mentioned ed dd) Nona of the mer View Answer Answer a Explanation: None. 6) E-mail is a) Loss-tolerant application ') Bandwidth-sensitive application ) Elastic application ) None of the mentioned View Answer Answer: & Explanation: Because it can work with availabe throughput. 7) Pick the odd one out a) File transfor b) File download ) E-mail ¢) Interactive games View Answer Answer d Explanation: Infemet telephony is Loss-tolerent other applications are not 8) Which of the following is an application layer service ? 2) Network virtual terminal ») File transfer, access, and management ©) Mail service 4) All of the mentioned View Answer Answer: d Explanation: None. 9) To deliver a message to the correct application program running on a host, the consulted a) iP by MAC. ©) Port dd) Nona of the mer View Answer Answer 6 Explanation: None. 10) This is a time-sensitive service a) Filo transfor b) File download ) E-mail 4d) Intemet telephony ‘View Answer Answer: d Explanation: Intemet telephony is Loss-tolerant other applications are not 11) Transport services available to applications in one or another form a) Reliable data transfer ) Timing ©) Security 4) All of the mentioned View Answer Answer d Explanation: None. 12) Electronic mail uses this Application layer protocol a) SMTP. address must be by HTTP o) FTP 9) SIP View Answer Answer: a Explanation: None. Computer Networks Questions & Answers — HTTP ‘This set of Computer Networks Questions & Answers focuses on "HTTP" 1, The number of objects in a Web page which consists of 4 jpeg images and HTML text is____ ay4 b)4 os 4) None of the mentioned View Answer Answer: & Explanation 4 jpeg images +1 base HTML fe 2. The default connection type used by HTTP is__ 2a) Persistent ') Non-persistent ©) Eithor of the mentioned 1d) None of the mentioned View Answer Answer: a Exelanation: None. 3, The time taken by a packet to travel from client to server and then back to the clientis called __ a) STT by RTT o)PTT ) Nono of the mentioned View Answer Answer: b Explanation: RTT stands for round-trip timo. 4, The HTTP request message is sent in ___ part of three-way handshake. a) First ) Second ©) Third 4) None of the mentioned View Answer Answer: & Explanation: None. 5. In the process of fetching a web page from a server the HTTP requestiresponse takes_RTTS. a2 byt o4 a3 Viow Answer ‘Answer: b Exglanation: None. 6. The fist ine of HTTP request message is called _ a) Request line ») Header line ) Status line 4) Entity ino View Answer Answer: a Explanation: The line followed by request lino are called header tins and status lino isthe intial part of response message, 7. The values GET, POST, HEAD ec are specified in___of HTTP message a) Request line ) Header line ¢) Status ine &) Entity body View Answer ‘Anowor: a Explanation Its specitiod ia the method fod of request ino inthe HTTP request message 8. Tho ___ method whan used in the method fold, loaves entity body empty. a) POST »)GeT ©) Both ofthe mentioned ) None of the mentioned View Answer Answer: Explanation: None. 9, The HTTP response message leaves out the requested object when _method is used a) GET b) POST. o) HEAD 9) PUT View Answer Answer: e Explanation: None. 10. Find the oddly matched HTTP status codes a) 200 OK b) 400 Bad Request ) 301 Moved permanently ) 304 Not Found View Answer ‘Answer: d Explanaton: 404 Not Found, 11. Which of the following is not correct ? a) Web cache doesnt has its own disk space b) Web cache can act both like server and aliont c) Web cache might reduce the response time dd) Web cache contains copies of recently requestad objects View Answer ‘Answer a Explanation: None. 12, The conditional GET mechanism a) Imposes conditions on the objects to be requested b) Limits the number of response from a server ©) Helps to keep a cache upto date ) None of the mentioned View Answer Answer: © Explanation: Nono. 13, Which of the following is present in both an HTTP request line and a status line? a) HTTP version number by URL ©) Method ) None of the mentioned View Answer Answer a Explanation: None. Computer Networks Questions & Answers — Network Utilities This set of Computor Networks Questions & Answers focuses on "Network Utitios” 1) Ping can a) Measure round-trip time ) Report packet loss ) Report latency 4) All of the mentioned View Answer Answer d Explanation: None. 2) Ping sweep is a part of a) Traceroute b) Nmap ) Route 3) Ipconfig, View Answer angwer: Explanation A ping sweep is @ metiod that can establish & range of IP addresses wich map (ov hosts and are mostiy used by network scanning tools ike nap. 3) ICMP is used in a) Ping b) Traceroute ©) lfconfig d) Both a and b View Answer Answer: d Explanation: None. 4) __ command is used to manipulate TCP/IP routing table, a) route ») Ipconfig, ©) lfconfig 4d) Traceroute View Answer Answer: a Explanation: None. 5) If you want to find the number of routers between a source and destination, the ull to be used is. a) route b) Ipeontig, ©) lfeonfig d) Traceroute View Answer ‘Answer: d Explanation: Nono. 6) Which of the following is related to ipconfig in Microsoft Windows ? 2) Display all current TCP/IP network configuration values ) Modify DHCP settings ©) Modify DNS settings 4) All of the mentioned View Answer ‘Answer d Explanation: None. 7) This allows to check if a domain is available for registration. a) Domain Check ) Domain Dossior c) Domain Lookup dd) None of the mentioned View Answer Answer: a Explanation: Nono. 8) Choose the wrong statement a) Nslookup is used to query a DNS server for DNS data b) Ping is used to check connectivity c) Pathping combines the functionality of ping with that of route 4) lfconfig can configure TCP/IP network interface parameters View Answer Answer 6 Explanation: Pathping combines the functionality of ping with that of traceroute (tracert). Computer Networks Questions & Answers — FTP This sot of Computor Networks Questions & Answors focuses on “FTP” 4) Expansion of FTP is a) Fine Transfer Protocol b) Filo Transfer Protocol ©) First Transfer Protocol ) None of the mentioned View Answer Answer Explanation: None. 2) FTP is built on architecture a) Client-server b) 2p ) Both of the mentioned d) Nona of the mentioned View Answer Answer a Explanation: None. 3) FTP uses___parallel TCP connections to transfer a fle a) by2. 03 94 View Answer Answer: b Explanation: Control connection and data connection. 4) Identify the incorrect statement 8) FTP stands for File Transfer Protocol b) FTP uses two parallel TCP connections ¢) FTP sends its control information in-band d) FTP sends exactly one file over the data connection View Answer Answer 6 Explanation: FTP is out-of-band as ithas separate control connection 6) If files are transfered from server A to cliont B in the same session. The number of TCP connection between A and Bis a)5 b) 10 o)2 a6 View Answer Answer: d Explanation: 1 control connection and ether 5 for fk—o fle transfor. 6) FTP sorvor a) Mantains state b) Is statoloss ) Has single TCP connection for a file transfer ) None of the mentioned View Answer ‘Answer a Explanation: None. 7) The commands, from cliant to server, and replies, from server to client, are sent across the control connection in__ bit ASCII format ays »)7 3 as View Answer Answer: b Explanation: Nono. 8) Find the FTP reply whose message is wrongly matched a) 331 — Usemame OK, password required b) 425 — Can't open data connection ) 452 — Error writing file dd) 452 ~ Can't open data connection View Answer Answer d Explanation: None. 8) Mode of data transfer in FTP, whore all the is loft to TCP. a) Stream mode ) Block mode ) Compressed mode d) Nona of the mentioned View Answer Answer a Explanation: None. 10) The password is sent to the server using__command a) PASSWD b) PASS c) PASSWORD ) None of the mentioned View Answer Answer: Explanation: None. Computer Networks Questions & Answers — Network Attacks ‘This set of Computer Networks Questions & Answers focuses on "Network Attacks” 1) The attackers a network of compromisad devices known as a) Internet b) Botnet ©) Tolnot d) Dnet View Answer Answer: b Explanation: Nono. 2) Which ofthe following isa form of DoS attack ? a) Vulnerability attack ) Bandwidth flooding 6) Connection flooding 4) Allof the mentioned View Answer Answer d Explanation: None. 8) The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host a) Vulnerability attack ) Bandwidth flooding ) Connection flooding 4) All of the mentioned View Answer Answer: © Explanation: Nono. 4)The DoS attack is which the attacker sends deluge of packets to the targeted host a) Vulnerability attack ») Bandwidth flooding ¢) Connection flooding 4) Allof the mentioned View Answer ‘Answer: Explanation: None. 5) Packet sniffers involve a) Active receiver b) Passive receiver ©) Both of the mentioned dd) None of the mentioned View Answer Answer: Explanation’ They donot injact packets ino the channel 6) Sniffers can be deployed in a) Wired environment by WiFi ) Ethernet LAN 4) All of the mentioned View Answer Answer: d Explanation: None. 7) Firewalls are often configured to block a) UDP traffic b) TCP traffic ©) Both of the mentioned d) None of the mentioned View Answer Answer: a Exelanation: None. Computer Networks Questions & Answers — Security In The Internet This section of our 1000+ Computer Networks MCOs focuses on Security In The Internet, 1 IPSec is designed to provide. =the. == security at a) transport b) network ° pplication d) session View Answer ‘Answer Explanation’None, 2. In tunnel mode IPsec protects, a) entire 1 b) iP ° IP 4) ‘none of the View Answer Answer:a Explanation None, the layer layer layer layer the packet header payload ‘mentioned 3, a) b) ° 4) View Answer Answer Explanation None, 4 a) b) ° 4) View Answer bit Answera Explanation’None, 6. a) b) ° 4) View Answer Answere Explanation None, 68. An attempt a) b) ° 4) View Answer Answor'a Explanation None, 7. Extensible a) ») Network Network stateful WPAZ layer both none layer oriented frame firewal ‘none ‘none to make a computer authentication protocol wired firewall firewall firewall firewall fame packet @) of has and and 7 and of of resource unavailable denial-of-service worms botnet 1 is authentication personal works and the two stateless byte packet the for the to its framework area sub-categories oriented intended as a fitor fier ® mentioned as firewall firewall firewall mentioned security in ethemet bluetooth wii ‘mentioned users is called attack attack attack process frequently used in network networks ° wired 4) ‘none View Answer ‘Answer Explanation None, 8 Pratty a) b) °) good 4) ‘none View Answer Answer’ Explanation None, 8. PGP encrypts data a) international b) private ° intrenet 4) none ‘View Answer answera Explanation None, privacy browser omail FIP of by data data data using (Pcp) area block encryption encryption encryption the used cipher network ‘mentioned security security security ‘mentioned called algorithm algorithm algorithm mentioned 10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that Information, thon a) b) ° 4) ‘none View Answer Answore Explanation None, DNS DNS DNs of it is Computer Networks Questions & Answers — Security In The Internet This section of our 1000+ Computer Networks MCQs focuses on Security In The Internet 1 IPSec is designed a) to transport provide the security called lookup hijacking spoofing ‘mentioned layer b) ° 4) View Answer Answer Explanation None, 2 In tunnel a) entire b) ° 9) none View Answer Answera Explanation’None, 3, Network, layer a) b) ° both 4) ‘none View Answer Answer: ExplanationNone, 4, Network, layer a) stateful b) bit ° frame oriented 4) ‘none View Answer Answor'a Explanation None, 6. WPA is a) b) ° firewall firewall network application session mode IP Ip of firewall frame packet fa) of firewall has and firewall and and used layer layer layer IPsec protects the © packot header payload the mentioned works as a fier fiter and (b) the ‘mentioned to sub-categories as stateless, byte otientod packet firewall firewall firewall the ‘mentioned for security in ethemet bluetooth wisi 4) none of the mentioned View Answer Answer Explanation None, 6 An attempt to make a computer resource unavailable to its intended users is called a) donial-of-service attack b) virus attack ° worms attack 9) botnet process View Answer Answer Explanation None, 7. Extensible authentication protocol is authentication framework frequently used in a) wired personal area network b) wireless networks °) wired local area network d) ‘none of the mentioned View Answer Answer: ExplanationNone, 8. Pretty good privacy (pcr) is used in a) browser security b) email security °) FIP security a none of the ‘mentioned View Answer ‘Answer’ Explanation None, ® PGP — encrypts data. «by using ©=—a@—siblosk ~—ciphor call a) international ata encryption algorithm b) prvata data concryption algorithm °) intrenet ata encryption algorithm a) none of the mentioned View Answer Answer:a Explanation:None, 10. When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called a) DNS lookup ») DNs hijacking °) DNs spoofing a none: of the mentioned Viow Answer answere Explanation None, Computer Networks Questions & Answers — Wireless LAN This section of our 1000+ Computer Networks MCs focuses on Wireless LAN, 1, What is the access point (AP) in wireless LAN? 2) device that allows wireless devices to connect to a wired network b) wireless devices itselt c) both (a) and (b) d) none of the mentioned View Answer Answer Explanation None, 2. In wireless ad-hoc network a) access point is not required ') access point is must ) nodes are not required d) none of the mentioned View Answer Answera ExplanationNone, 3, Which multiple access technique Is used by IEEE 802.11 standard for wireless LAN? a) CDMA b) CSMA/CA, ©) ALOHA, d) none of the mentioned View Answer Answer Explanation None, 4, In wireless distribution system ) multiple access point are inter-connected with each other ') there is no access point ©) only one access point exists d) none of the mentioned View Answer Answer Explanation None, 5. A wireless network interface controller can work in a) infrastructure mode ) ad-hoc mode c) both (a) and (b) d) none of the mentioned View Answer Answere Explanatom:in infrastructure mode WNIC noods access point but in ad-hoc modo access point isnot require. 6. Inwiroloss network an extended service set is a sot of a) connected basic service sets b) all stations. c) all access points d) none of the mentioned View Answer Answor'a Explanation None, 7. Mostly is used in wiroless LAN. a) time division multiplexing ») orthogonal frequency division multiplexing ©) space division multiplexing ) none of the mentioned View Answer Answer: ExplanationNone, 8. Which one of the following event is not possible in wireless LAN. a) collision detection bb) Acknowledgement of data frames ) multimode data transmission d) none of the mentioned View Answer Answor'a Explanation None, 8. What is Wired Equivalent Privacy (WEP)? a) security algorithm for ethernet b) security algorithm for wirless networks ©) security algorithm for usb communication 4) none of the mantioned View Answer ‘answer’ planation None 10. What is WPA? 2) wie protected accoss ) wired protected access ©) wited process accoss 4) wis process access View Answer Answer Explanation None, Computer Networks Questions & Answers — WiMAX “This section of our 1000+ Computer Networks MICOS focuses on WIMAX 1. WIMAX stands for a) wireless maximum communication ) worldwide interoperability for microwave access c) worldwide international standard for microwave access d) none of the mentioned View Answer Answer: ExplanationNone, 2. WIMAX provides a) simplex communication b) half duplex communication ¢) full duplex communication d) none of the mentioned View Answer Answore Explanation None, 8, WIMAX uses the a) orthogonal frequency division multiplexing b) time division mul lexing ) space division multiplexing d) all of the mentioned View Answer Answer Explanation None, ‘4, Which one of the following modulation scheme is supported by WiMAX? a) binary phase shift keying modulation ) quadrature phase shift keying modulation ©) quadrature amplitude modulation d) all of the mentioned View Answer Answord Explanation None, 5, WIMAX MAC layer provides an interface between a) higher transport layers and physical layer ») application layer and network layer ©) data link layer and network layer d) none of the mentioned View Answer Answer Explanation None, 6. For encryption, WiMAX supports a) advanced encryption standard ») triple data encryption standard c) both (a) and (b) 4) none of the mentioned View Answer Answer Explanation None, 7. WIMAX provides a) VolP services b) IPTV services ¢) both (a) and (b) d) none of the mentioned View Answer Answere Exglanation’None, 8. Devices that provide the connectivity to a WIMAX network are known as a) subscriber stations bb) base stations ©) gateway ) none of the mentioned View Answer Answer:a Explanation None, 9. WIMAX is mostly used for a) local area network b) metropolitan area network ©) personal area network ) none of the mentioned View Answer Answer’ Explanation None, 10. Which one of the following frequency is nat used in WiMAX for communication? a) 2.3 GHz b) 2.4 GHz ©) 2.5GHz d) 3.5GHz View Answer ‘Answer Explanation None,

You might also like