Q1. Communication channel is shared by all the machines on the network in:
(a) broadcast network
(b) unicast network
(c) multicast network
(d) Internet Protocol Address
(e) none of the above
S1. Ans.(a)
Sol. Broadcast networks: It has a single communication channel that is shared by all the machines on the network. Short messages, called packets in certain contexts, sent by any machine are received by all the others.
Q2. Bluetooth is an example of:
(a) personal area network
(b) local area network
(c) virtual private network
(d) wide area network
(e) solid state storage
S2. Ans.(a)
Sol. A personal area network (PAN) is a computer network used for data transmission amongst devices such as computers, telephones, tablets and personal digital assistants. Bluetooth is an example of the same.
Q3. A list of protocols used by a system, one protocol per layer, is called:
(a) protocol architecture
(b) protocol stack
(c) protocol suit
(d) protocol application
(e) none of the above
S3. Ans.(b)
Sol. A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.
Q4. In which of the following scenarios does Network congestion occur?
(a) in case of a node termination
(b) when a system terminates
(c) when connection between two nodes terminates
(d) in case of traffic overloading
(e) none of the above
S4. Ans.(d)
Sol. Network congestion occurs when a network node is carrying more data than it can handle. That is typically due to traffic overloading.
Q5. Which among the following refers to the physical or logical arrangement of network?
(a) Topology
(b) Routing
(c) Networking
(d) Subnetting
(e) None of the above
S5. Ans.(a)
Sol. Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and may be depicted physically or logically.
Q6. Which among the following topology requires multipoint connection?
(a) Star
(b) Mesh
(c) Ring
(d) Bus
(e) Tree
S6. Ans.(d)
Sol. The point-to-point and Multipoint are two types of line configuration. Both describe a method to connect two or more communication devices in a link. Multipoint connection is used in BUS Topology. All the devices are connected to a single transmission medium, which acts as the Backbone of the connection.
Q7. Encryption and Decryption are the functions of __________ layer.
(a) transport
(b) session
(c) application
(d) physical
(e) presentation
S7. Ans. (e)
Sol. Encryption and Decryption are the functions of the presentation layer.
Q8. Which physical layer devices can be used to enlarge the area covered by a single LAN segment?
1. Switch
2. NIC
3. Hub
4. Repeater
5. RJ45 transceiver
(a) 1 only
(b) 1 and 3
(c) 3 and 4
(d) 5 only
(e) None of these
S8. Ans. (c)
Sol. A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over the same network. A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations.
Q9. Which of the following describe router functions?
(a) Packet switching
(b) Packet filtering
(c) Internetwork communication
(d) Path selection
(e) All of the above
S9. Ans. (e)
Sol. All of the given options are router functions.
Q10. A __________ is a computer network that usually spans a city or a large campus.
(a) LAN
(b) DAN
(c) MAN
(d) WAN
(e) None of these
S10. Ans. (c)
Sol. MAN is abbreviation for Metropolitan Area Network and is a computer network that usually spans a city or a large campus.
Q11. What does MAN stands for?
(a) Micro area network
(b) Metropolitan area network
(c) Macro area network
(d) Mix area network
(e) None of these
S11. Ans. (b)
Sol. MAN is abbreviation for Metropolitan Area Network.
Q12. How long is an IPv6 address?
(a) 32 bits
(b) 128 bytes
(c) 64 bits
(d) 128 bits
(e) None of these
S12. Ans. (d)
Sol. IPv6 address is 128 bits long.
Q13. What does P2P stands for?
(a) Peer To Peer
(b) Peek to peek
(c) Past to past
(d) Pair to pair
(e) All of these
S13. Ans. (a)
Sol. P2P stands for Peer To Peer.
Q14. By an intranet we mean:
(a) a LAN of an organization
(b) a Wide Area Network connecting all branches of an organization
(c) a corporate computer network
(d) a network connecting all computers of an organization and using the internet protocol
(e) None of these
S14. Ans. (d)
Sol. An intranet is a private network accessible only to an organization's staff.
Q15. What is a Firewall in Computer Network?
(a) The physical boundary of Network
(b) An operating System of Computer Network
(c) A system designed to prevent unauthorized access
(d) A web browsing Software
(e) None of these
(a) broadcast network
(b) unicast network
(c) multicast network
(d) Internet Protocol Address
(e) none of the above
S1. Ans.(a)
Sol. Broadcast networks: It has a single communication channel that is shared by all the machines on the network. Short messages, called packets in certain contexts, sent by any machine are received by all the others.
Q2. Bluetooth is an example of:
(a) personal area network
(b) local area network
(c) virtual private network
(d) wide area network
(e) solid state storage
S2. Ans.(a)
Sol. A personal area network (PAN) is a computer network used for data transmission amongst devices such as computers, telephones, tablets and personal digital assistants. Bluetooth is an example of the same.
Q3. A list of protocols used by a system, one protocol per layer, is called:
(a) protocol architecture
(b) protocol stack
(c) protocol suit
(d) protocol application
(e) none of the above
S3. Ans.(b)
Sol. A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.
Q4. In which of the following scenarios does Network congestion occur?
(a) in case of a node termination
(b) when a system terminates
(c) when connection between two nodes terminates
(d) in case of traffic overloading
(e) none of the above
S4. Ans.(d)
Sol. Network congestion occurs when a network node is carrying more data than it can handle. That is typically due to traffic overloading.
Q5. Which among the following refers to the physical or logical arrangement of network?
(a) Topology
(b) Routing
(c) Networking
(d) Subnetting
(e) None of the above
S5. Ans.(a)
Sol. Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and may be depicted physically or logically.
Q6. Which among the following topology requires multipoint connection?
(a) Star
(b) Mesh
(c) Ring
(d) Bus
(e) Tree
S6. Ans.(d)
Sol. The point-to-point and Multipoint are two types of line configuration. Both describe a method to connect two or more communication devices in a link. Multipoint connection is used in BUS Topology. All the devices are connected to a single transmission medium, which acts as the Backbone of the connection.
Q7. Encryption and Decryption are the functions of __________ layer.
(a) transport
(b) session
(c) application
(d) physical
(e) presentation
S7. Ans. (e)
Sol. Encryption and Decryption are the functions of the presentation layer.
Q8. Which physical layer devices can be used to enlarge the area covered by a single LAN segment?
1. Switch
2. NIC
3. Hub
4. Repeater
5. RJ45 transceiver
(a) 1 only
(b) 1 and 3
(c) 3 and 4
(d) 5 only
(e) None of these
S8. Ans. (c)
Sol. A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over the same network. A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations.
Q9. Which of the following describe router functions?
(a) Packet switching
(b) Packet filtering
(c) Internetwork communication
(d) Path selection
(e) All of the above
S9. Ans. (e)
Sol. All of the given options are router functions.
Q10. A __________ is a computer network that usually spans a city or a large campus.
(a) LAN
(b) DAN
(c) MAN
(d) WAN
(e) None of these
S10. Ans. (c)
Sol. MAN is abbreviation for Metropolitan Area Network and is a computer network that usually spans a city or a large campus.
Q11. What does MAN stands for?
(a) Micro area network
(b) Metropolitan area network
(c) Macro area network
(d) Mix area network
(e) None of these
S11. Ans. (b)
Sol. MAN is abbreviation for Metropolitan Area Network.
Q12. How long is an IPv6 address?
(a) 32 bits
(b) 128 bytes
(c) 64 bits
(d) 128 bits
(e) None of these
S12. Ans. (d)
Sol. IPv6 address is 128 bits long.
Q13. What does P2P stands for?
(a) Peer To Peer
(b) Peek to peek
(c) Past to past
(d) Pair to pair
(e) All of these
S13. Ans. (a)
Sol. P2P stands for Peer To Peer.
Q14. By an intranet we mean:
(a) a LAN of an organization
(b) a Wide Area Network connecting all branches of an organization
(c) a corporate computer network
(d) a network connecting all computers of an organization and using the internet protocol
(e) None of these
S14. Ans. (d)
Sol. An intranet is a private network accessible only to an organization's staff.
Q15. What is a Firewall in Computer Network?
(a) The physical boundary of Network
(b) An operating System of Computer Network
(c) A system designed to prevent unauthorized access
(d) A web browsing Software
(e) None of these
S15. Ans. (c)
Sol. A firewall is a network security system designed to prevent unauthorized access to or from a private network.
0 Comments:
Post a Comment