mcq-on-computer-networks--5eea6a0939140f30f369d8f8 (1)

You might also like

Download as pdf
Download as pdf
You are on page 1of 19
ee) Computer Networks Questions Latest Computer Networks MCQ Objective Questions CER ABR he lial RI a eon Start Complete Exam Preparation Glens Practice fox} Mock Tests osc) Cree ee xtc) Jownload App Question 1: View this Question Online > Circuit switching takes place at the ___layer. 1. Data line Physical . Transport 4. Network . Application Answer (Detailed Solution Below) Option 2: Physical coaching ad Computer Networks Question 1 Detailed Solution Key difference between Switching Techniques are: Gireuit Packet Message Switching | Switching | switching Connection- oriented because | Connectionless dedicate because | Message first store then the path [Dynamic routing| forwarded to needed before| happens during] ensure communication] communication| Communication, Most efficient High costly | switching | Less Costly Technique Used in Better than telephone |Used in Internet ircuit switching service, and less costly. 3 Implemented |Implemented at! ~ lat the physical] the network layer layer. Important Point Physical Layer: Responsible for the physical connection between devices. Data-link layer: Responsible for reliable transfer of data frames from one node to another, connected by a physical layer. Network layer: It manages the delivery of individual data packets from source to destination through Routing. Transport layer: Responsible for the delivery of the center message from source host to a destination host. Here, Data is referred to as segments. Session layer: It establishes sessions between users and offers services like dialog control and synchronization Presentation layer: Monitors syntax and semantics of transmitted information through translation, compression, and encryption Application layer: Provides high-level application program Interface to user Eee Eee) Pela me CM cine yle lated) eC a a eee lice oe hes MasteClasses IS J Question Bank Download App 21 Question 2: View this Question Online > You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface? Answer (Detailed Solution Below) wemteeacecec: Computer Networks Question 2 Detailed Solution The correct option is (1) 6 hosts Explanation:- Six hosts are the maximum number of hosts on this LAN) including the router interface. © Key Points + Although your router AM. up to 250 IP addresses, this does not imply that 100 devices can connect to the same wireless network at the same time. * A router should have five different IP addresses and five different link-layer addresses. + Each IP address belongs to the set of addresses assigned to 2 network. + Each link-layer address also identifies the data-link layer connection’s router. + Onan Android device, slide down from the top of the screen and ernet to locate your router's IP address. Then, on the right, hit the gear button to select your WiFi network. Finally, beside Gateway, you'll notice your router's IP address if you scroll down. + A message is broadcast to all hosts on a network using the 255 address. Just keep in mind that no one host can be assigned to the first and last addresses in any network or subnet. You should be able to assign IP addresses to 255 hosts at this point. & ESE aL ec isco Start Complete Exam Preparation Rea eo Download App Question 3: View this Question Online > Suppose a CSMA / CD local Area Network of 1.Gbpsis there over a 1 km cable. If the signal speed in the cable is 2 x 105 km /sec, what will be the minimum frame size? 1, 4000 2. 100000 ~~ 10 4. 10000 5. 1200 Answer (Detailed Solution Below) Option 4: 10000 Computer Networks Question 3 Detailed Solution Answer: Option 3 Concep' Minimum Frame size in CSMA/CD LAN to avoid collision = x propagation delay x bandwidth Data: Length of the cable = 1 km ~ Bandwidth = 1 Gbps Signal speed = 2 x 10° km\sec Calculation: length of the cable Propagation delay: —stgnat-spee¢— = mene = 0.000005 Minimum Frame size = 2 x 0.000005x 1 x 10° = 10000 bits VERE anon Portia Start Complete Exam Preparation @ Trusted by 1,86,00,449+ Student Prue) rb ar Giees Cobre Go ere Download App Question 4: View this Question Online > Symmetric Key Cryptography uses stream cipher to encrypt the information. One of ——— > 1. SHA = 0° 5. None of the above Answer (Detailed Solution Below) Option 2: RC4 Computer Networks Question 4 Detailed Solution The correct answer is option 2. Concept: Symmetric Key Cryptography uses a stream cipher to encrypt the information. One example of stream cipher is RC4. oO Stream cipher: G Asstream cipher is an encryption technique that encrypts and decrypts a ity OF data using a symmetric key. In contrast to an asymmetric cipher key, a symmetri an encryption tool that may be used for both encryption and decryption. Rivest Cipher 4: XO + Rivest Cipher 4, often known as RC4, F that was developed in 1987. A stream cipher is a sort of encryption algorithi rypts data one byte at a time + RC4 isa stream cipher that en used in the Secure Socket Layer (SSL)/Transport Layer Security (TLS) protocols t 2.11 wireless LAN standard, and the Wi-Fi Security Protocol WEP (Wireless Equivalent T Hence the correct answer is RC4. ©& Additional Information + Secure hashing algorithm (SHA) is an acronym for secure hashing algorithm. SHA is a hashing algorithm that is based on MDS. It is used to hash data and certificates. Using bitwise operations, modular additions, and compression functions, a hashing algorithm compresses the input data into @ smaller form that cannot be comprehended. + Blowfish is the first symmetric encryption algorithm created by Bruce Schneier in 1993. Symmetric encryption uses a single encryption key to both encrypt and decrypt data. Ca Pie ABET Belial Start Complete Exam Preparation (Ca) rey pes Ceca koe Download App Question 5: View this Question Online > Keyloggers are a form of __. 1. Social Engineering 2. Trojan 3. Shoulder Surfing & 5. None of the above Answer (Detailed Solution Below) Option 4: Spyware Computer Networks Question 5 Detailed Solution The correct answer is option 4. Concept: Keyloggers, also known as keystroke loggers, are software applications or hardware devices that record the activity (keys tapped) on a keyboard. Keyloggers are a type of spyware'in which users are unaware that their actions are being recorded, ‘Spyware: et aca ac the end user's knowledge. Characteristics: + Keyloggers may be used for a number of objectives, including fraudulently gaining access to your private information and monitoring staff actions. Some keyloggers may also record your screen at random intervals; these are known as screen recorders. + Keylogger software normally saves your keystrokes in a tiny file that may be viewed later or automatically sent to the person watching your activity. + A keylogger is a malicious computer application that records everything you write on the keyboard and learns the keystroke pattern, including words, characters, and symbols, and then sends all of the recorded information to hostile hackers. Hence the correct answer is Spyware. Top Computer Networks MCG Objective Questions SP eee) Start Complete Exam Preparation Calm ce ott lee pee ies forscieprey ‘Question Bank Download App Exotic) Question 6 View this Question Online > In computing, is a network security'system that monitors and controls incoming and outgoing network traffic based of predetermined security rules. 1. Spyware ‘@ 3. Spam 4. Firewall Answer (Detailed Solution Below) Option 4: Firewall Computer Networks Question 6 Detailed Solution The correct answer is option 4) ie. wall. + A firewall is @ type of omputer-security system, + A firewall controls the flow of data from oné\computer or network to another and they are mainly intended to protect an individual computer system or a network from being accessed by an intruder, especialuia the Internet. Note: + Cookies are small files that are stored on a user's computer. They are designed to hold a modest amount of data specific to a particular client and website and can be accessed either by the web server or the client computer. + Spam is an undesired or illegal email message. + Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. India’s #1 Learning Platform Rca A ott Pela Meow CMe lied) ei a) rvs Cl ieee Download App ‘Question 7 View this Question Online > Which among the following network topologies has the highest transmission speed? A)LAN B) WAN ©) MAN D) Both LAN and WAN have equal transmission speeds. LA ~ Answer (Detailed Solution Below) Option 1: Computer Networks Question 7 Detailed Solution Option 1 is the correct answer: Local Area Network (LAN) has the highest transmission speed. [Network Features [type aTHetoNerageareaay be limited to a room or a building or a group of buildings. + For eg. Devil isestares og Devon tyr He Retvoue or office connected to eac other or with a common : (LAN) router. + Connections can be established either through Ethernet cables of radio waves. + Itinterconnects the computers/users oceted ina bigger geographical area as Nateapolitah compared to a LAN. Naar + For eg. A chain of emergency response teams across a big city. + It covers the largest area as Wide Area compared to LAN and MAN. It Network can cover the whole country. wan) + The Internet is the best example of WAN. eee see paca Reo a otc PS ela mew Chime Lelie) Py ans Question 8 View this Question Online > What is the full form of LAN’? 1. Line Area Network 2. Linear Area Network 3. Local Area Network 4. Land Area Network Answer (Detailed Solution Below) Option 3: Local Area Network Computer Networks Question 8 Detailed Solution The correct answer is og Necerritaw: -» important Foints + It isa computer network within a small geographical area. + A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN & & eRe seen Pertti eer ASE Ta meee) (CM Cn de) (8) Daily Live (= eed Mock Te irene peta rag Pxotis re Download App Question 9 IPv6 addresses have a size of 1. 64 bits 2. 128 bits 3. 256bits on Gs We bits” Answer (Detailed Solution Below) Option 2: 128 bits View this Question Online > Computer Networks Question 9 Detailed Solution The correct answer is 128 bits, © Key Points + An IPv6 address has a size of 128 bits. + Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. + IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long- anticipated problem of IPv4 address exhaustion. + IPv6 is intended to replace IPv4. + 1 Bytes is equal to 8 bit IPv6 Base Header priority/ version (4) flow label 0110 aa aad (20) next | —> 4 Byler —— source IP address (128) —16Byte destination IP address (128) —>16Byte B> Additional Information + IPv4 (internet Protocol version 4) uses a 32-bit addressing scheme. + This means that IPv4 addresses are composed of 32 binary bits, which are typically represented as four sets of decimal numbers separated by periods (e.g, 192.168.0.1). + Each decimal number in the address represents an 8-bit segment, also known as an octet, resulting in a total of four octets in an IPv4 address. ere ere “EEG cela mew cima) le het) i) Pea ented Poecmery estat Download App ‘Question 10 View this Question Online > Which among the following pratocals is known as the terminal emulation protocol? 1, HTTP. 2. FTP 3. SMTP 4. TELNET Answer (Detailed Solution Below) Option 4: TELNET Computer Networks ™~ 10 Detailed Solution + TELNET is the terminal emulation protocol in a TCP/IP environment for the remote access of a terminal (client) to a server. + TELNET uses the TCP as the transport protocol to establish a connection between server and client. Ca eee Pela mee (CM CM n etl eel) OR ema cer ical } Dally Live eed Prac MasterCl esta Exltica) Download App Question 11 View this Question Online > Which one of the following protocélls is used for E-mail services? 1. HTTP. am 3. SMTP 4. PPP Answer (Detailed Solution Below) Option 3: SMTP Computer Networks Question 11 Detailed Solution The correct answer is SMTP. @ Key Points ~~ ST Ee Se ee gee ena en tee ves ees Mee attachments. + IP:- The Intemet Protocol (IP) is a routable protocol responsible for IP addressing and the fragmentation and reassembly of packets. + UDP:- UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service. UDP is used when the amount of data to be transferred is small RS NEB rele eae a en Re NR Te ee RP TT pT acral Cee aR ete Start Complete Exam Preparation EC) ee Cn Download App Trea Question 12 \View this Question Online > A computer virus is a 1, Hardware 2. Software 3. Bacteria 4, Freeware Answer (Detailed Solution Below) Option 2: Software Computer Networks Question 12 Detailed Solution The correct answer is nN + A computer virus is aNmllicious software that, when executed replicates itself by modifying other computer programs. + The full form of VIRUS is Vital Information Resources Under Seize because they replicate and multiply and use up computer memory processing power with fake repetitive commands. It causes the system to become slow and keeps hanging. ce India’s #1 Learning Platform PS ela me (CMC ime elie) Gliese Poca aad ba oe eels Exo Download App ‘Question 13 Which of the following statements is true for network hub? A hub COMM@cts different stations in a private network. 2. Itsends data packets to the intended recipient. 3. It contains two ports: one for input and other for output = It works at the network layer Answer Option 1: A hub connects different stations in a private network. Computer Networks QU@Stion 13 Detailed Solution Anetw k hub is a hardware device for connecting multiple devices together CCC a So View this Question Online > making them act asa single private network segment. It has multiple input/output (/O) ports, in which a signal ntroduced at the input of any port app: A hub works at the phys cal layer (layer 1) of the OSI mode ra India’s #1 Learning Platform Start Complete Exam Preparation ar Practice ices Posten Question Bank Download App Extra itput of every poi pt the original incoming, aC ec Question 14 ’ ) View this Question nline > Which of the following internet service is appropriate to access the computer of your office from home? 1, WWW LAA Answer (Detailed Solution Below) Option 4: Telnet Computer Networks Question 14 Det The correct answer is Telnet. © keypoints + Any application that empowers users to remotely access another computer(no matter how far away) |s called remote access. ; + Telnet is an application protocol that uses a virtualterminal’connection to offer bidirectional interactive text-oriented communication over the Intemet. + Telnet facilitates remote login on a computer. + It also facilitates terminal emulation purposes. + Telnet was developed in 1969. + Telnet allows users to = various application programmes on a distant site and then transport the results back. local computer. ©; Additional information + The Hypertext Transfer Protocol (HTTP) is the backbone of th ° Itis a stateless protocol. + Real-Time Protocol (RTP) is 2 protocol designed to handle real-time traffic (like audio and video) of the Internet. + File Transfer Protocol is a set of rules that govern how computers transfer files from one system to another over the internet iternet's data transfer. Start Complete Exam Preparation Wau bed rote Download App ‘Question 15 View this Question Online > Which of the following device is used to connect similar LAN with same protocols? 1. Gateways 2. Router 3. Switches, es = My Answer (Detailed Solution Below) Option 4: Bridges Computer Networks Question 15 Detailed Solution The correct answer is option 4. Concept: The bridge is used to connect similar LANs with the same protocols. A bridge operates t the data link layer. It is also used for interconnecting two LANs working on the same proto6®l. It hes a single input and single output port, thus making it a 2 port device. A bridge must contain addressing and routing capability. Abridge is 2 network device that joins two or more LANs (local aréa networks) to build a larger LAN. Network bridging is the process of aggregating netWorks, A bridge joins the various components to make them appear as if they are all part of the same network. Hence the correct answer is /~_ B additianal Infarm + Switches are networking devices that operate at the OSI model's layer 2 or data link layer. They connect network devices and use packet switching to deliver, receive, and forward data packets or data frames across the network. A switch has a number of ports into which computers can be connected. + A router is a networking device that sends data packets from one computer network to another. On the Internet, routers are in charge of traffic direction. Data packets are used to send data over the internet, such as @ web page or an email. + A gateway is a network node that serves as a connection point between two networks that use distinct transmission protocols.

You might also like